|
Introduction to SD-Access Solution
|
|
|
|
Challenges in Traditional Network
21:00
|
|
|
|
Overcoming WAN challenges using SD-WAN
27:00
|
|
|
|
Overcoming LAN challenges using SD-Access
34:00
|
|
|
|
Planes of Operation on Devices
21:00
|
|
|
|
Underlay and Overlay in Traditional Network
18:00
|
|
|
|
Implementing SDA Solution in Campus Fabric-New
11:00
|
|
|
SD-Access Architecture
|
|
|
|
Layers in SDA Architecture
8:00
|
|
|
|
SDA Physical Layer and Devices
31:00
|
|
|
|
SDA Network Layer and Devices
23:00
|
|
|
|
SDA Controller Layer and Devices
12:00
|
|
|
|
SDA Management Layer and Devices
18:00
|
|
|
|
Summary of SDA Architecture
6:00
|
|
|
|
Platform Support in SDA and Scaling the Controllers
9:00
|
|
|
|
Document Resources
|
|
|
Control Plane based on LISP
|
|
|
|
The Locator-ID Conundrum?
22:00
|
|
|
|
LISP Control Plane and Data Plane
18:00
|
|
|
|
LISP Device Roles - ITR, ETR, MS/MR, PITR, PETR
16:00
|
|
|
|
How LISP Operates?
16:00
|
|
|
|
Final thoughts on LISP
6:00
|
|
|
Data Plane based on VxLAN
|
|
|
|
Why use VXLAN?
13:00
|
|
|
|
VXLAN Operation and Use -Cases
22:00
|
|
|
Policy Plane using Cisco TrustSec
|
|
|
|
What is CTS and How it is used in SDA?
15:00
|
|
|
|
Micro/Macro Segmentation using SGT and VN
11:00
|
|
|
|
End-User Authentication
14:00
|
|
|
SD-Access Operation
|
|
|
|
Endpoint Onboarding and Roaming
18:00
|
|
|
|
Reaching to External Networks - Fusion Router
18:00
|
|
|
|
What is Anycast Gateway in SDA?
12:00
|
|
|
|
SDA Packet Forwarding Process
20:00
|
|
|
Designing an SDA Fabric
|
|
|
|
Choosing Compatible Devices and Licence
23:00
|
|
|
|
Scaling SD-Access Devices and DNAC
15:00
|
|
|
|
Underlay Design for SDA
8:00
|
|
|
|
Transit Network and Fabric Sites
16:00
|
|
|
|
Migrating from Traditional to SDA Network
16:00
|
|
|
|
Migration Methods - Parallel, Incremental and Hybrid
13:00
|
|
|
|
Layer-2 Border Handoff
8:00
|
|
|
|
Additional Resources
|
|
|
AAA Concepts
|
|
|
|
27-AAA Authentication
4:00
|
|
|
|
28-AAA Authorization
3:00
|
|
|
|
29-AAA Accounting
2:00
|
|
|
|
30-AAA Protocols RADIUS and TACACS+
2:00
|
|
|
Cisco ISE Concepts & Configuration
|
|
|
|
01-Cisco ISE Introduction
1:00
|
|
|
|
02-Cisco ISE Services
4:00
|
|
|
|
03-Cisco ISE Identity And Context Awareness
6:00
|
|
|
|
04-Cisco ISE As A Centralized Policy Server
5:00
|
|
|
|
05-Cisco NAC History
5:00
|
|
|
|
06-Cisco ISE Solutions Infrastructure Components
7:00
|
|
|
|
07-Cisco ISE Solutions Policy Components
2:00
|
|
|
|
08-Cisco ISE Solutions Endpoint Components
2:00
|
|
|
|
09-Cisco ISE Personas Introduction
6:00
|
|
|
|
10-Cisco ISE Performance
3:00
|
|
|
|
11-Cisco ISE Personas Bandwidth Requirements
1:00
|
|
|
|
12-Cisco ISE Deployment Options
2:00
|
|
|
|
1. ISE-2.4.0 Lab Topology Introduction
3:00
|
|
|
|
2. ISE-2.4.0 Installation Using ISO
16:00
|
|
|
|
3. ISE-2.4.0 Installation Using OVF
12:00
|
|
|
|
4. ISE-2.4.0 Snapshot
1:00
|
|
|
|
12. ISE-2.4.0 Patch Installation Using CLI
8:00
|
|
|
|
5. ISE-2.4.0 Web Portal Introduction
13:00
|
|
|
|
6. ISE-2.4.0 Active Directory Integration And Identity Source Sequence
6:00
|
|
|
|
7. ISE-2.4.0 Ldap Integration And Identity Source Sequence
5:00
|
|
|
|
8. ISE-2.4.0 Registration Self-Signed Certificate
11:00
|
|
|
|
9. ISE-2.4.0 Registration Microsoft CA Certificate
43:00
|
|
|
|
19. ISE-2.4.0 Lab Initial Configuration
32:00
|
|
|
|
20. ISE-2.4.0 Wired MAC Authentication Bypass Configuration
3:00
|
|
|
|
21. ISE-2.4.0 Wired MAC Authentication Bypass Verification
6:00
|
|
|
|
22. ISE-2.4.0 Wired Dot1x Configuration With MD5
5:00
|
|
|
|
23. ISE-2.4.0 Wired Dot1x Verification With MD5
5:00
|
|
|
MAB, 802.1x Concepts & Configuration
|
|
|
|
MAC Authentication Bypass (MAB)
5:00
|
|
|
|
MAC Authentication Bypass (MAB) Configuration Lab
15:00
|
|
|
|
MAC Authentication Bypass (MAB) Verification Lab
5:00
|
|
|
|
8021x
7:00
|
|
|
|
8021x Configuration Lab
4:00
|
|
|
|
8021x Verification Lab
4:00
|
|
|
Cisco WLC Concepts & Configuration
|
|
|
|
58. ISE-2.4.0 Cisco WLC Installation on VMware
6:00
|
|
|
|
59. ISE-2.4.0 Cisco Wlc Initial Configuration
12:00
|
|
|
|
60. ISE-2.4.0 Cisco Ap Registration With Cisco WLC
10:00
|
|
|
|
61. ISE-2.4.0 Wireless Open Authentication Configuration
25:00
|
|
|
|
62. ISE-2.4.0 Wireless Open Authentication Verification
3:00
|
|
|
|
63. ISE-2.4.0 Wireless Dot1x Configuration
15:00
|
|
|
|
64. ISE-2.4.0 Wireless Dot1x Verification
7:00
|
|
|
SDA Labs
|
|
|
|
1_DNAC 2.2.3.4 GUI Overview
|
|
|
|
2-Cisco DNAC Hardware Overview and Installation
|
|
|
|
3_DNAC Day 0 Operations - Verification
|
|
|
|
4_Configuring RBAC in DNAC
|
|
|
|
5_Preparing ISE for Integraton
|
|
|
|
6. ISE Integration Lab
|
|
|
|
7. Introduction to the topology
|
|
|
|
8. Lab Topology Initial Configuration
|
|
|
|
9. First Discovery of LAN Devices
|
|
|
|
10. Creating Sites in Design Workflow of DNAC
|
|
|
|
11. Adding Netwrok Settings for Sites
|
|
|
|
12_Creating IP Address Pools in DNAC
|
|
|
|
13_Using Image Repository for Golden Images
|
|
|
|
14-Assigning and Provisioning Devices to the Branches
|
|
|
|
15-Micro and Macro Segmentation in DNAC
|
|
|
|
16-Creating Fabric Sites and Domains
|
|
|
|
17-Provisioning and Assinging Roles to the Devices
|
|
|
|
18-Host Onboarding on Fabric Edge Node
|
|
|
|
19-Reserving IP address Pools for SGs
|
|
|
|
20-Creating Users and Policies on ISE for Device Administration
|
|
|
|
21-LAN Automation and Device Provisioning
|
|
|
|
22-Interacting with Leagcy Branches or DC - Topology
|
|
|
|
23-Creating Transit Network and L3 Handoff
|
|
|
|
24-Fusion Router Configuration and Verification
|
|
|
|
25-The Assurance Workflow
|
|
|
|
26-Other Workflows, Tools and Setting in DNAC
|
|
|
|
27-Interacting with DNAC using APIs
|
|
|
|
28-Introducing Wireless in DNAC - Compatibity Matrix
|
|
|
|
29-Discovering WLC and Adding Wireless Profile
|
|
|
|
30-Overview of Configuration done by DNAC
|
|