ROUTE - Implementing Cisco IP Routing v2.0

5 Day | Instructor Led

In this course, you will gain the knowledge and skills needed to plan, implement, and monitor a scalable routed network. You will focus on routing protocols for both IPv4 and IPv6: EIGRP and OSPF for an enterprise and BGP for enterprise Internet connectivity. You will also learn how to redistribute routes, implement path control, and secure Cisco routers.

Inquire About
ROUTE - Implementing Cisco IP Routing v2.0

Ideal Candidates for ROUTE - Implementing Cisco IP Routing v2.0 Class

Network engineers and technicians
Support engineers
Systems engineers
Network analysts
Senior network administrators
Anyone involved in planning, implementing, verifying, and troubleshooting routing protocols in enterprise networks

ROUTE - Implementing Cisco IP Routing v2.0 Prerequisites

aking ICND1 v2.0 and ICND2 v2.0 (or CCNAX v2.0) is highly recommended
Know how to:
Configure network fundamentals, including the ability to establish Internet, LAN, and WAN connectivity using both IPv4 and IPv6
Operate and support a medium-sized LAN that has multiple switches, including VLANs, trunking, and spanning tree functionality
Troubleshoot IPv4 and IPv6 connectivity issues
Configure and troubleshoot EIGRP and OSPF, for both IPv4 and IPv6
Configure devices for SNMP, Syslog, and NetFlow
Manage network device security, Cisco device configurations, Cisco IOS images, and licenses

What You'll Get in ROUTE - Implementing Cisco IP Routing v2.0

What You'll Learn in ROUTE - Implementing Cisco IP Routing v2.0

Routing protocols, network technologies, and remote connectivity options
RIPng in an IPv6 environment
Technologies, operations, and metrics that EIGRP uses
Configure and verify EIGRP in IPv4 and IPv6 environments including optimizing its behavior and named EIGRP configuration
Multiarea OSPF including over different network types and how to optimize its database
Configure and verify OSPFv2 in IPv4 environments and OSPFv3 in IPv4 and IPv6 environments
Route redistribution and how it is implemented using distribute list, prefix list, and route map filtering mechanisms
Use Cisco Express Forwarding for efficient Layer 3 packet forwarding
Implement path control using policy based routing and IP Service Level Agreement (SLA)
Establishing enterprise Internet connectivity for IPv4 and IPv6
BGP for enterprise IPv4 and IPv6 Internet connectivity
Secure Cisco routers according to best practices including the configuring routing protocol authentication

ROUTE - Implementing Cisco IP Routing v2.0 Certification

CCNP Routing and Switching

ROUTE - Implementing Cisco IP Routing v2.0 Outline

1. Basic Network and Routing Concepts

  • Differentiating Routing Protocols
  • Understanding Network Technologies
  • Connecting Remote Locations with the Headquarters
  • Implementing RIPng

2. EIGRP Implementation

  • Establishing EIGRP Neighbor Relationships
  • Building the EIGRP Topology Table
  • Optimizing EIGRP Behavior
  • Configuring EIGRP for IPv6
  • Discovering Named EIGRP Configuration

3. OSPF Implementation

  • Establishing OSPF Neighbor Relationship
  • Building the Link State Database
  • Optimizing OSPF Behavior
  • Configuring OSPFv3

4. Configuration of Redistribution

  • Implementing Basic Routing Protocol Redistribution
  • Manipulating Redistribution Using Route Filtering

5. Path Control Implementation

  • Using Cisco Express Forwarding Switching
  • Implementing Path Control

6. Enterprise Internet Connectivity

  • Planning Enterprise Internet Connectivity
  • Establishing Single-Homed IPv4 Internet Connectivity
  • Establishing Single-Homed IPv6 Internet Connectivity
  • Improving Resilience of Internet Connectivity
  • Considering Advantages of Using BGP
  • Implementing Basic BGP Operations
  • Using BGP Attributes and Path Selection Process
  • Controlling BGP Routing Updates
  • Implementing BGP for IPv6 Internet Connectivity

7. Routers and Routing Protocol Hardening

  • Securing Cisco Routers
  • Describing Routing Protocol Authentication Options
  • Configuring EIGRP Authentication
  • Configuring OSPF Authentication
  • Configuring BGP Authentication

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

In this course, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices, and identifying basic security threats. The goal of the course is to provide you with the knowledge and skills necessary to install, configure, and operate a small- to medium-sized network.



In this course, you will learn how to install, configure, operate, and troubleshoot a small enterprise network. Key additions to this latest revision include; understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact enterprise networks, along with an overview of network programmability, and the related controller types and tools that are available to support software defined network architectures.



In this course, you will gain the knowledge and skills needed to create an efficient and expandable enterprise network. You will focus on Layer 2 and multilayer switch functions including VLANs, trunks, inter-VLAN routing, port aggregation, spanning tree, first hop redundancy, as well as network security and high availability features.



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W