learn. practice. achieve. @ cciein8weeks · 2019-08-22 · new ccie written exams (hey, gone are...

17

Upload: others

Post on 12-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older
Page 2: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

2

All-in-One Enterprise Network Core Technologies (ENCOR) 300-401 V1.0 Exam Cert Guide

1st Edition

Page 3: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

3

Contents at a Glance Chapter 1 Architecture Chapter 2 Virtualization Chapter 3 Infrastructure Chapter 4 Network Assurance Chapter 5 Security Chapter 6 Automation

Page 4: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

4

Preface.................................................................................................................................................................7

Study Guide Scope............................................................................................................................................8

How to Use This Study Guide........................................................................................................................8

CHAPTER 1 ARCHITECTURE..................................................................................................................9Explain the Different Design Principles Used in an Enterprise Network.......................................................................10

Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning..................................................11High availability techniques such as redundancy, FHRP, and SSO...........................................................................13

Analyze Design Principles of a WLAN Deployment............................................................................................................17Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch).............................................................................................................................................................................................18Location services in a WLAN design...................................................................................................................................24Further Reading............................................................................................................................................................................24

Differentiate Between on-premises and Cloud Infrastructure Deployments.................................................................25Explain the Working Principles of the Cisco SD-WAN Solution.....................................................................................42

SD-WAN Control and Data Planes Elements....................................................................................................................42Further Reading............................................................................................................................................................................45

Explain the Working Principles of the Cisco SD-Access Solution..................................................................................45SD-Access Control and Data Planes Elements..................................................................................................................45Traditional Campus Interoperating with SD-Access.......................................................................................................53Further Reading............................................................................................................................................................................53

Describe Concepts of Wired and Wireless QOS.....................................................................................................................53QoS Components.........................................................................................................................................................................54QoS Policy.....................................................................................................................................................................................54

Differentiate Hardware and Software Switching Mechanisms..........................................................................................55Process and CEF Switching.....................................................................................................................................................56MAC Address Table and TCAM...........................................................................................................................................57FIB vs. RIB....................................................................................................................................................................................58

CHAPTER 2 VIRTUALIZATION.............................................................................................................60Describe Device Virtualization Technologies.........................................................................................................................61

Hypervisor Type 1 and Type 2................................................................................................................................................62Virtual Machine............................................................................................................................................................................63

Kubernetes.........................................................................................................................................................................................66Virtual Switching.........................................................................................................................................................................69

Configure and Verify Data Path Virtualization Technologies...........................................................................................72VRF...................................................................................................................................................................................................74ConfiguringMulti-VRFCE......................................................................................................................................................75PEConfiguration........................................................................................................................................................................77VerifyingVRFConfiguration.................................................................................................................................................78Further Reading............................................................................................................................................................................79GRE and IPsec Tunneling.........................................................................................................................................................79ConfiguringGREandIPSecTunneling..............................................................................................................................80VerifyingGRE/IPSecConfiguration...................................................................................................................................82

Describe Network Virtualization Concepts..............................................................................................................................83LISP..................................................................................................................................................................................................83Further Reading............................................................................................................................................................................84VXLAN...........................................................................................................................................................................................84Further Reading............................................................................................................................................................................86

CHAPTER 3 INFRASTRUCTURE...........................................................................................................87Layer 2..................................................................................................................................................................................................88

Configure and Verify Common Spanning Tree Protocols (RSTP and MST).........................................................92Layer 3..................................................................................................................................................................................................95

Page 5: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

5

Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)..............................................................................................................................95Further Reading............................................................................................................................................................................96Further Reading............................................................................................................................................................................98Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)................98Further Reading..........................................................................................................................................................................104Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships).............................................................................................................................................................104Further Reading..........................................................................................................................................................................106

Wireless..............................................................................................................................................................................................107Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities......................................................................................................................................107Describe AP modes and antenna types...............................................................................................................................109Describe access point discovery and join process (discovery algorithms, WLC selection process).............110Further Reading..........................................................................................................................................................................112Describe the main principles and use cases for Layer 2 and Layer 3 roaming.....................................................112Troubleshoot WLAN configuration and wireless client connectivity issues.........................................................113

IPServices.........................................................................................................................................................................................119Describe Network Time Protocol (NTP)...........................................................................................................................119Configure and Verify NAT/PAT..........................................................................................................................................119Configure First Hop Redundancy Protocols, such as HSRP and VRRP.................................................................122Describe Multicast Protocols, such as PIM and IGMP v2/v3....................................................................................126

CHAPTER 4 NETWORK ASSURANCE..............................................................................................128Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog...................................................................................................................................................................................................129Configure and verify device monitoring using syslog for remote logging..................................................................130Configure and verify NetFlow and Flexible NetFlow.........................................................................................................131Configure and verify SPAN/RSPAN/ERSPAN....................................................................................................................136Configure and verify IPSLA........................................................................................................................................................138Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management........140Configure and verify NETCONF and RESTCONF............................................................................................................142

CHAPTER 5 SECURITY..........................................................................................................................148Configure and verify device access control............................................................................................................................149

Lines and password protection..............................................................................................................................................149Authentication and authorization using AAA..................................................................................................................150

Configure and verify infrastructure security features..........................................................................................................150ACLs..............................................................................................................................................................................................150Further Reading..........................................................................................................................................................................151CoPP...............................................................................................................................................................................................151Describe REST API security.................................................................................................................................................156

Configure and verify wireless security features....................................................................................................................157EAP................................................................................................................................................................................................157WebAuth.......................................................................................................................................................................................158Pre-shared Key (PSK)..............................................................................................................................................................160

Describe the components of network security design.........................................................................................................161Threat defense.............................................................................................................................................................................161Endpoint security.......................................................................................................................................................................161Next-generation firewall..........................................................................................................................................................162TrustSec, MACsec.....................................................................................................................................................................162

Network access control with 802.1X, MAB, and WebAuth.............................................................................................162

CHAPTER 6 AUTOMATION..................................................................................................................163Interpret Basic Python Components and Scripts...................................................................................................................164

Page 6: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

6

Construct Valid JSON Encoded File........................................................................................................................................166Describe the High-level Principles and Benefits of a Data Modeling Language, Such as YANG......................167Describe APIs for Cisco DNA Center and vManage..........................................................................................................172Interpret REST API Response Codes and Results in Payload Using Cisco DNA Center and RESTCONF....173Construct EEM Applet to Automate Configuration, Troubleshooting, or Data Collection...................................175Compare Agent Vs. Agentless Orchestration Tools, Such as Chef, Puppet, Ansible, and SaltStack.................176Version Control Systems (Git and SVN).................................................................................................................................178

Page 7: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

7

Preface On June 10, 2019 at #CiscoLive2019 San Diego, Cisco announced one of the most sweeping changes to Cisco Career Certifications portfolio since inception. Cisco flipped upside down, just about everything, that you know about CCNA, CCNP and CCIE written and Lab exams. All announced changes go into effect at the same starting February 24, 2020.

To boot, CCNA is no longer a perquisite to CCNP come 2/2020 and CCNP core exams are the new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older format, Cisco had 8 Professional level exams, which now have shrunk down to 6 in the new format including DevNet (your new 300 series exams). Professional track will now be organized around two major exams, the core (aka fundamentals or horizontal knowledge base) and the concentration (aka specialization or vertical knowledge base). A technology core exam is one of the two exams required for CCNP, CCIE, and Cisco Certified DevNet Professional certifications. For CCNP, there are five technology core exams available, comprising of Enterprise, Security, Service Provider, Collaboration and Data Center. Technology core exams cover the foundational and common concepts that are required for a candidate to be proficient in a technology architecture.

Concentration exams take a deeper dive into a relevant and related technology to the Core, allowing the candidate to choose a topic that is either of interest or related to his or her chosen technology area of focus. For CCNP, there are concentration exams for all five technology tracks, i.e. Enterprise, Security, Service Provider, Collaboration and Data Center.

As mentioned earlier, CCNP technology core exams are the new CCIE written exams, i.e. they cross over Professional and Expert level boundaries. Today, CCNP level exams are not a perquisite for CCIE lab exams since it has its own 400 series exams (e.g. 400-101 for R&S) however that changes come 2/2020 where you must take a CCNP level core exam to qualify for a CCIE lab exam (E.g. ENCOR 300-401 exam would qualify you for CCIE Enterprise Infrastructure and Enterprise Wireless Labs). Now, keep in mind that in order to qualify for CCIE Security lab, you will need to take the corresponding CCNP Security Core exam (SCOR or 300-701), likewise for SP, DC, and Collaboration labs.

Last but not least, the CCIE lab exam is also being updated in order to assess candidates’ skills through the entire lifecycle of designing, deploying, operating and optimizing complex network scenarios. The lab format will change to assess those skills end-to-end. Obviously, they are beyond the scope of this study guide.

Page 8: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

8

Study Guide Scope This study guide includes all of the topics from Cisco’s official exam blueprint for Implementing Cisco Enterprise Network Core Technologies, i.e. ENCOR 300-401. Broadly speaking, ENCOR exam contains subject matter from six domains which also happen to be the six chapters in this study guide.

1. Architecture 2. Virtualization 3. Infrastructure 4. Network Assurance 5. Security 6. Automation

How to Use This Study Guide While it is pretty straightforward since we have organized the overall content exactly, i.e. verbatim, as per the Cisco’s official exam blueprint. Each section on the exam is a chapter in this study guide, so you know where you are in your learning journey as you read through the study guide. As mentioned in preface, ENCOR 300-401 exam and this study guide now doubles up in terms of its use, i.e. you can use it for preparing for CCNP core exam as well as CCIE qualification exams for Enterprise Infrastructure and Enterprise Wireless Labs.

Page 9: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

9

CHAPTER 1 ARCHITECTURE This chapter covers the following exam topics from Cisco’s official 300-401 V1.0 Enterprise Network Core Technologies (ENCOR) exam blueprint.

• Explain the different design principles used in an enterprise network o Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning o High availability techniques such as redundancy, FHRP, and SSO

• Analyze design principles of a WLAN deployment o Wireless deployment models (centralized, distributed, controller-less, controller

based, cloud, remote branch) o Location services in a WLAN design

• Differentiate between on-premises and cloud infrastructure deployments • Explain the working principles of the Cisco SD-WAN solution

o SD-WAN control and data planes elements o Traditional WAN and SD-WAN solutions

• Explain the working principles of the Cisco SD-Access solution o SD-Access control and data planes elements o Traditional campus interoperating with SD-Access

• Describe concepts of wired and wireless QoS o QoS components o QoS policy

• Differentiate hardware and software switching mechanisms o Process and CEF o MAC address table and TCAM o FIB vs. RIB

Page 10: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

10

Explain the Different Design Principles Used in an Enterprise Network Before we get into the specifics of network design discussion for an enterprise network, it behooves us to look at the big picture and the very fundamentals of network design. Network is simply a resource and means to an end. Every enterprise network is laid out to facilitate the applications running on top of it. Network will meet its goals if enterprise applications can run in a reliable and performant manner. With the increasing adoption of cloud applications (or SaaS apps such as CRM or HRM), i.e. applications that are hosted by the providers (such as Salesforce) in their own data centers as opposed to being on-premise, role of the network changes again. In the new world of cloud apps, network still has to provide reliable and performant access to those off-premise apps, but even more so maintain the necessary user experience, security and compliance with visibility and control with the help of solutions such as Cloud Access Security Broker (or CASB).

You can never know everything. While you’ve to build your network for current requirements, it must be able to evolve over time. If you think in a modular fashion, where your core design choices stay the same (for example, 2-tier versus 3-tier architecture) but at the same time other parts of the network can evolve much like building blocks of a Lego. Whether you are designing for only on-premise or for everything off-prem (SaaS/PaaS), you are design will still need to be performant, resilient, and scalable. Until 2009, i.e. before the advent of Software-Defined Networking (or SDN), there was only one way to pick your building blocks when designing your network, i.e. go with Cisco or Juniper as

Page 11: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

11

far as routing and switching go. Today, we live in a world where we have more choices available to us, so ensuring that your network design choices at least take into account the possibility of and mitigate against the vendor lock-in, is a must. It still doesn’t mean that open source and open standard vendors (such as Cumulus Networks) can provide you the best in class solution but keeping your design flexible and keeping your options open would pay off over time.

Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning Enterprise campus network can consist of a single building or a group of buildings spread out over a large geographic area much like a college campus but still in closer proximity. The primary goal of the campus design is to deliver the fastest speed (say 1 or 10 Gbps) and variety of access (LAN, WLAN) to the endpoints. Campus network design can be organized around three core set of principles, i.e.

• Hierarchy (2-tier / 2-layer or 3-tier / 3-layer) • Modularity (functional building blocks, collection of devices within a layer) • Resiliency • Flexibility

In 1999, Cisco pioneered the campus network design with hierarchical design model which used a layered approach. The hierarchical network design can help break otherwise down complex and flat network into multiple smaller and manageable network tiers or layers. Each layer is focused on a specific set of requirements and roles. With this design, network designers can pick the most suitable platform and software features for each layer. As we discussed earlier, regardless of how a network was designed, the ability to modify an existing design, i.e. without rip and replace, is of utmost importance. There can be many underlying reasons for such modifications, i.e. addition of newer services, more bandwidth, and so on. Tier-3 Network Design When you think of network design, you’re likely thinking about the most discussed and much talked about three tier or layer design. Three-layer design is most suited to large enterprise campus networks. Those three well known layers are

1. Core 2. Distribution 3. Access

Now, let me describe primary functions of each layer.

Page 12: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

12

• Core layer provides transport between distribution layer devices. • Distribution layer provides policy driven connectivity and boundary control between the

access and core layers. It is the boundary between the layer 2 and layer 3 domains. • Access layer provides users access to the network

Tier-2 Network Design Two-layer design is a modified three-layer design where the core has been collapsed into the distribution layer. The main motivation for collapsing core has to do with cost and the operational simplicity that it brings. It is best suited for small to medium size networks.

Page 13: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

13

It is worth noting that above discussion is about enterprise campus design and not enterprise data center. Campus is where end-users connect to the network whereas data center provides connectivity to the servers and devices such as load balancers and storage arrays. Let me summarize the key differences between the two network designs before we move on.

Campus Network Data Center Network Architecture Three or two-tier Three-tier or Leaf-Spine Clos Traffic Flow Mostly north-south North-South and East-West

(depending on the applications)

Speeds and Feeds Mostly 1G for access and 10/40G for uplinks

Mostly 10/40G for access and 10/40/100G for uplinks

Oversubscription Typically, 20:1 Typically, 1:1 or 4:1 Failure domains Mostly limited impact Mostly larger impact Access Medium Wired and Wireless Wired only

High availability techniques such as redundancy, FHRP, and SSO When designing an enterprise network, network engineers should try to include redundancy at each layer. Let’s first discuss the broad HA and redundancy considerations.

• You should try to use Host Standby Routing Protocol (HSRP) or Gateway Load Balancing Protocol (GLBP) with sub-second timers for redundancy at the default gateway

Page 14: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

14

• Avoid daisy chaining switches, and use StackWise and chassis-based solutions instead • Avoid protecting against double failures and over engineering with three or more

redundant links • L2/L3 distribution should be implemented with HSRP or GLBP with the distribution

layer at the boundary. It is known to provide up to sub-second convergence • L3-based access, i.e. using a routing protocol in the access layer and an L3 p2p routed

link between the access and distribution switches, is recommended for sub-200 milliseconds failover

Let’s now discuss some specific redundancy considerations by each campus network layer. Core Distribution Access L2 versus L3 L3 design are better

than L2 L3 to Core switches L2 to Access switches

HW redundancy

Link redundancy Redundant p2p L3 interconnections lead to faster convergence

Dual L3 equal-cost paths to Core layer

SW redundancy via LACP or EC

First-Hop Routing Protocols (FHRPs) The purpose of default gateway or first hop redundancy is to help protect against a single node failure, so that traffic from end hosts can continue flowing through active default gateway device after a small sub-second convergence. In the hierarchical design that we have discussed so far, distribution switches define the L2/L3 network boundary and act as default gateway to the entire L2 domain facing the access layer. Without some form of redundancy in place, default gateway failure could result in a massive outage. HSRP, VRRP and GLBP are three popular first-hop routing protocols for implementing default gateway redundancy. HSRP and GLBP are Cisco proprietary, whereas VRRP is an IETF standard based protocol defined in RFC 3768 and RFC 5798. HSRP and VRRP are the recommended protocols and can provide sub-second failover with some tuning for redundant distribution switches. If you are using Cisco switches, best practices indicate that you would be better off using feature rich HSRP however VRRP is a must when your design requires vendor inter-op.

Page 15: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

15

The configuration snippet below shows how you can use HSRP in an enterprise campus deployment and achieve sub-second failover times. interface Vlan100 description Data VLAN for Access-Switch ip address 10.1.1.1 255.255.255.0 ip helper-address 10.1.2.1 standby 1 ip 10.1.1.2 standby 1 timers msec 200 msec 750 standby 1 priority 150 standby 1 preempt standby 1 preempt delay minimum 180 It is strongly recommended to configure HSRP with preemption feature which allows a previously failed device to reclaim its role upon recovery. It is a desired behavior because STP/RSTP root should be the same device as the HSRP primary device for a given subnet or VLAN. Without consolidating HSRP primary and STP root in a single device, the transit link between the distribution switches can act as a transit link where traffic to/from default gateway takes multiple L2 hops. It is also recommended that preemption delay is set to 150% of the time that it takes for the switch to boot up from scratch. HSRP preemption needs to be configured with switch boot time and overall connectivity to the rest of the network. If preemption and neighbor adjacency occur before switch has L3 connectivity to the core, no traffic will actually and remain blackholed until complete L3 connectivity is restored. GLBP protects traffic against device or circuit failure much like HSRP or VRRP, but in addition to that, it also allows packet load sharing between a group of redundant routers. Prior to GLBP, you could only implement HSRP or VRRP hacks to get load balancing to work. For example, you could configure distributes devices as alternate root switches and divide and direct traffic from VLANs into both. Yet another hack would have been to use multiple HSRP groups on a single interface and use DHCP to alternate between the default gateways. As you can see, none of these hacks are clean and could very easily become an administrative nightmare. HSRP uses a virtual IP and MAC pair which is always assumed by the active router whereas GLBP uses one virtual IP address for multiple virtual MAC addresses. The configuration snippet below shows GLBP configuration.

Page 16: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

16

interface Vlan100 description Data VLAN for Access-Switch ip address 10.1.1.1 255.255.255.0 ip helper-address 10.1.2.1 glbp 1 ip 10.1.1.2 glbp 1 timers msec 250 msec 750 glbp 1 priority 150 glbp 1 preempt delay minimum 180 Let’s now wrap up the FHRP discussion with a side by side comparison table. HSRP VRRP GLBP Interop Cisco proprietary IETF standard Cisco proprietary Redundancy mechanism

Active / Standby Active / Standby Active / Active

Preemption Supported, disabled by default

Supported, enabled by default

Supported, enabled by default

Multicast address for hellos

224.0.0.2/224.0.0.102 224.0.0.18 224.0.0.102

Transport UDP 1985 IP (Protocol #112) UDP 3222 Stateful Switchover (SSO) Today, most network devices can provide level of high availability intra-box, i.e. in the form of redundant supervisors such as Cisco Catalyst 6500, 4500, and Nexus 7K. When you have redundant supervisors, the box can also support Stateful Switchover or SSO which ensures that standby supervisor blade contains state information from the active blade and can thus switchover and become primary to assume the L2 forwarding function. The Cisco Catalyst 6500 and N7K switches support L3 Non-Stop Forwarding or NSF which allows redundant supervisors to assume L3 forwarding functions without tearing down and rebuilding L3 neighbor adjacencies in the event of primary supervisor failure.

Page 17: Learn. Practice. Achieve. @ CCIEin8Weeks · 2019-08-22 · new CCIE written exams (hey, gone are the days when you could say that you are CCIE Written Certified! J). In the older

Learn. Practice. Achieve. @ CCIEin8Weeks.com

17

Now, in a hierarchical network design, the core and distribution nodes are connected via L3 p2p links which means distribution or core related failures are about loss of link, i.e. if a supervisor fails on a non-redundant device, the links fail and the network simply re-converges through the second core or distribution device within sub-200 milliseconds let’s say using EIGRP or OSPF. With redundant supervisors, links are not dropped due to SSO/NSF convergence event if a supervisor were to fail. There will be momentary interruption to traffic during SSO, once SSO is completed NSF follows suit. This will obviously result in some downtime during re-convergence too. If L2/L3 boundary is in the access layer, i.e. a routed access design, then SSO/NSF can provide an increased level of HA. If your access layer design is switched (or L2), then you should consider using dual redundant supervisors with SSO.

Analyze Design Principles of a WLAN Deployment Today, the campus WLAN is used to provide voice, video and data connectivity for employees, internet access for guests, and connectivity for various sensors, cameras and Internet of Things (or IoT) devices in general. There are plenty of design principles and gotchas when it comes to WLAN deployment, so let’s go over some of the high order bits before we dive into the actual WLAN deployment models.

• Coverage versus Capacity: You’ve to provide adequate coverage because its wireless, but when coming up with your design be sure to focus on capacity. You can’t simply add capacity by adding more APs later on.