设为首页收藏本站language 语言切换
查看: 3831|回复: 15
收起左侧

[其他] CCNP核心考试 (350-401)大纲

[复制链接]
 成长值: 65090
发表于 2020-2-13 10:07:09 | 显示全部楼层 |阅读模式
Implementing Cisco Enterprise Network Core Technologies v1.0 (350-401)' }! K+ K# Q% {% m3 x6 O" g6 h( k- \
Exam Description: Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401)
" i3 `! g/ s; ^& o2 L' H$ j& Ris a 120-minute exam associated with the CCNP and CCIE Enterprise Certifications. This exam tests a" L7 F/ d( t# a  [  T/ f) b
candidate's knowledge of implementing core enterprise network technologies including dual stack (IPv4
) @1 @0 B5 v% gand IPv6) architecture, virtualization, infrastructure, network assurance, security and automation. The
% D1 W+ d! G, ~( ~& ^course, Implementing Cisco Enterprise Network Core Technologies, helps candidates to prepare for this+ ^6 N: ^* o! C8 N- P2 u4 ?# T
exam.
9 ^% R  l" |/ \' y% k/ ~% VThe following topics are general guidelines for the content likely to be included on the exam. However,
. n: c7 n1 }' Z* f. ]2 i1 rother related topics may also appear on any specific delivery of the exam. To better reflect the contents2 d; y( j8 h( }7 V6 X, k  U& ?
of the exam and for clarity purposes, the guidelines below may change at any time without notice.
5 u" D) ?8 s% t3 D5 C4 k8 {2 R4 V, i1 t% t) }) z
15% 1.0 Architecture7 y' r8 q: X2 ~! Q0 O, ?" s
1.1 Explain the different design principles used in an enterprise network
. Z) ?7 ^9 |6 [1.1.a Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
9 C7 E$ k* E1 U2 O- f2 p1.1.b High availability techniques such as redundancy, FHRP, and SSO
$ s' d/ b" m; L, k9 H2 W7 w( u2 G1.2 Analyze design principles of a WLAN deployment6 Z5 f* ~5 R0 }
1.2.a Wireless deployment models (centralized, distributed, controller-less, controller; }7 G/ M8 e" z6 _( ]2 `
based, cloud, remote branch)1 v( e; i+ @7 [1 a- c+ {
1.2.b Location services in a WLAN design- A! i0 C6 s7 R! c8 q  h0 ?
1.3 Differentiate between on-premises and cloud infrastructure deployments% K! Y( U+ I$ U. E/ T, _. _5 x
1.4 Explain the working principles of the Cisco SD-WAN solution/ [3 Q3 D1 {; `: J3 Z
1.4.a SD-WAN control and data planes elements) R* t8 A# s; U* J& V9 [
1.4.b Traditional WAN and SD-WAN solutions3 N( \- K7 B& Y- L' {5 [
1.5 Explain the working principles of the Cisco SD-Access solution
9 I3 g2 O. d( N8 U. J; Y1.5.a SD-Access control and data planes elements
" Q: I! _* d2 M$ m( p1.5.b Traditional campus interoperating with SD-Access$ Q: |2 y, I( o6 r  V" Z
1.6 Describe concepts of wired and wireless QoS
1 ~* W% @4 H5 X1.6.a QoS components: w6 X( F+ m4 r; g8 l; z8 H
1.6.b QoS policy
5 F% Q% I" a+ T4 T% J9 s: e- n) M1.7 Differentiate hardware and software switching mechanisms
9 @0 w3 k; x$ a& e1.7.a Process and CEF
( Q- ?3 m5 g- P' g5 B1 M$ y1.7.b MAC address table and TCAM
9 ^" O2 S5 @5 ^8 \1.7.c FIB vs. RIB$ U& P+ U& Z3 t! [" j0 }
  n( g1 Z$ P, |
10% 2.0 Virtualization
6 e2 D& B+ e4 t) Y7 H* J1 `2.1 Describe device virtualization technologies
$ S2 U. j, d# a. S9 u2.1.a Hypervisor type 1 and 24 v# z- N) K% R/ f; i- ~# e
2.1.b Virtual machine8 l) `" H6 S* f! W  Q* _4 ~
2.1.c Virtual switching7 |( i+ @2 K$ V: K/ C
2.2 Configure and verify data path virtualization technologies) f' n" D% {4 U$ [1 Y; Q
2.2.a VRF; l2 b& n2 X8 E# X$ v$ i
2.2.b GRE and IPsec tunneling
: m8 C* H, x# U4 R' r2.3 Describe network virtualization concepts( d& r4 d3 x( B: O* P% y1 j
2.3.a LISP$ R  F2 R$ z: j% V' P/ D$ B( c
2.3.b VXLAN% {5 q  m" \6 K

2 j+ @' n  X) |1 \& G$ _, G! M/ u30% 3.0 Infrastructure. S* M3 S& m+ O& ?% G2 Y
3.1 Layer 21 D+ u) n$ \/ p9 O4 D7 M, L
3.1.a Troubleshoot static and dynamic 802.1q trunking protocols
* E  d6 }/ }1 e# [1 S9 y  ^2 c" [, w3.1.b Troubleshoot static and dynamic EtherChannels
% k1 y$ L% v: ^& N' V3.1.c Configure and verify common Spanning Tree Protocols (RSTP and MST)
- @' z, [; e( i. \' Q: \3.2 Layer 37 k7 k( b* I! \7 ~
3.2.a Compare routing concepts of EIGRP and OSPF (advanced distance vector vs.7 e. O0 c) g1 l1 h+ T
linked state, load balancing, path selection, path operations, metrics)
4 f& ]+ U1 Q7 \' }  W3.2.b Configure and verify simple OSPF environments, including multiple normal
* t- J9 p3 m$ W0 f. mareas, summarization, and filtering (neighbor adjacency, point-to-point and% g4 {3 r& g9 z- l
broadcast network types, and passive interface)  C" l/ ^& Y9 X1 z
3.2.c Configure and verify eBGP between directly connected neighbors (best path6 ~5 H7 V; q* a: o0 e+ t, E$ j
selection algorithm and neighbor relationships)
4 A; y, V8 `" F! `( Y9 }3.3 Wireless; E* {7 Z# _4 @. {
3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise,6 U; {0 u+ U1 K) |& ?/ m
band and channels, and wireless client devices capabilities! M% ~7 z& M3 n. q% Y& e! [5 f
3.3.b Describe AP modes and antenna types
6 M: O( g+ j- H, Z3 z  e5 F. H$ a3.3.c Describe access point discovery and join process (discovery algorithms, WLC selection process)
/ Y: P* o  e$ N& z4 r6 @+ w. {2 \: D3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming+ i0 t; X8 M, `
3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues( a: \9 U! f; N' c- B( F
3.4 IP Services
; y, B* l: u0 B' K3.4.a Describe Network Time Protocol (NTP)1 }8 z; h  H. n' o4 k
3.4.b Configure and verify NAT/PAT
/ T6 g9 E$ o6 q% x- W0 C  {3.4.c Configure first hop redundancy protocols, such as HSRP and VRRP5 {1 ?* R# y/ a' `) s$ K
3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3- ~1 b5 N  G4 m6 G8 b2 W

' {- ^' S2 Q3 P% B10% 4.0 Network Assurance0 J+ c; i+ R4 \+ b. C
4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog% j) p& H+ L( P: X9 ~8 T9 U
4.2 Configure and verify device monitoring using syslog for remote logging
. l3 t% h% K' X6 s2019 Cisco Systems, Inc. This document is Cisco Public. Page 3
( L* R5 |# M+ P' }  P4.3 Configure and verify NetFlow and Flexible NetFlow% X% ~3 b$ W1 y
4.4 Configure and verify SPAN/RSPAN/ERSPAN& N0 }% G2 `% z; C, L  h" L4 l" w
4.5 Configure and verify IPSLA9 O- f$ q* p* }' D3 ~: f8 r
4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
7 q/ _& q( r/ [& ]4.7 Configure and verify NETCONF and RESTCONF, o; o* n) {5 P4 x# \

# @1 u9 A( X* v: j. O20% 5.0 Security
3 E- ]5 k' W5 J, Z5.1 Configure and verify device access control
) ^. B/ a/ i. b6 h# X5.1.a Lines and password protection
8 q- K& V: W5 ^1 u1 p) r; V* Z) v# Q5.1.b Authentication and authorization using AAA% f0 o0 ^, M& H- [
5.2 Configure and verify infrastructure security features
( `2 n/ {+ P* ^6 p4 W; N3 K5.2.a ACLs
! ?* d, w! B" k0 b  a5 _) P+ ?5.2.b CoPP
# A5 F" D( i. e% n7 g0 _2 O5.3 Describe REST API security
' `2 p: e  A7 {/ `' f" Y5.4 Configure and verify wireless security features8 T8 B3 Q3 V8 a4 g7 M  ~4 V
5.4.a EAP
. f7 R; e( \8 ]+ y4 M9 g; b5.4.b WebAuth+ \' ], f& u/ n5 C0 s
5.4.c PSK
. d3 T0 A* F6 h2 j" S# ^5.5 Describe the components of network security design
+ j4 i0 F! k; x. y5.5.a Threat defense
1 C3 C# I& O4 }5.5.b Endpoint security2 L: _& u5 M$ u1 p; z1 M0 c+ Z/ @
5.5.c Next-generation firewall$ `; Y# q/ m9 e/ c1 n7 M1 g! m
5.5.d TrustSec, MACsec. w4 ?/ D. D6 o7 e9 n3 c
5.5.e Network access control with 802.1X, MAB, and WebAuth
3 Y2 ?5 `. O1 P6 _% o% \! p0 _2 K2 f- [: M
15% 6.0 Automation
8 Y8 H5 R, d3 J/ `$ p. s6.1 Interpret basic Python components and scripts+ n1 B) l/ O# u! w& Y8 ?
6.2 Construct valid JSON encoded file
4 \, ^, X1 A$ F8 d1 ?) |. U# T6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG  O% W% O+ p& Z; u( S/ n4 g3 J9 v
6.4 Describe APIs for Cisco DNA Center and vManage
9 Y3 D& ~$ F2 {, k! q1 I6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF" W! g& E. n( N- s
6.6 Construct EEM applet to automate configuration, troubleshooting, or data collection1 x$ Q6 m! g  @% S- B  K* g7 G
6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack4 k  b* [+ f+ i6 O. k. S- [& S
$ d7 d% \- C- ~/ A* g" u' q% Z

评分

参与人数 1好评度 -1 收起 理由
13609293794 -1

查看全部评分

 成长值: 65090
发表于 2020-2-13 11:20:34 | 显示全部楼层
NP改版的比较多 大多数都是新内容了
板凳 2020-2-13 11:20:34 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-13 17:56:49 | 显示全部楼层
谢谢分享. 看了一下和现在CCNP还是有很大区别,居然还要懂Python 和 REST API ,看来CISCO对新一代拿CCNP的人要求更高了,要懂得东西更多了。 如果考试不再集中在选择题的话,多加入一些简单网络设计或者QOS的实验题,那考试难度就高多了。 下星期300-115 switch一定要过啊,这样就可以多点时间focus在CCNP Security了
地板 2020-2-13 17:56:49 回复 收起回复
回复 支持 反对

使用道具 举报

头像被屏蔽
发表于 2020-2-14 09:41:38 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
6# 2020-2-14 09:41:38 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-14 14:20:07 | 显示全部楼层
唉太多要看的了
7# 2020-2-14 14:20:07 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-15 08:43:24 | 显示全部楼层
没得选择,准备3月份去考它了。要不然3月的ccnp RS & security要过期了。
8# 2020-2-15 08:43:24 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-17 22:36:11 | 显示全部楼层
Thanks for sharing
11# 2020-2-17 22:36:11 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-2-22 14:24:25 | 显示全部楼层
Thanks for sharing.想考的新人有点害怕,要求太多了
12# 2020-2-22 14:24:25 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-8-6 16:57:30 | 显示全部楼层
作为一个新手不知道该从哪里开始学习NP了
15# 2020-8-6 16:57:30 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-26 05:25 , Processed in 0.102344 second(s), 23 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表