成长值: 65165
|
300-420 ENSLD Exam: Designing Cisco Enterprise Networks- R5 R/ R' o6 q5 g! ~
Exam Description* _/ G( \1 |& V; ]
The Designing Cisco Enterprise Networks v1.0 (ENSLD 300-420) exam is a 90-minute exam associated with the CCNP Enterprise and Cisco Certified Specialist - Enterprise Design certifications. This exam certifies a candidate's knowledge of enterprise design including advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security services, network services, and SDA. The course, Designing Cisco Enterprise Networks, helps candidates to prepare for this exam.
$ w9 M5 ^: X" f1 C
2 V0 C6 \; h/ |% P2 l% vThe following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.8 v0 [: ?7 m( n8 B3 s) E5 d
) y- }* Y1 Y% N* e3 M# U 第一部分 advanced addressing and routing solutions 25%! z, f( r$ o |! k" j0 V6 ^
1.1 Create structured addressing plans for IPv4 and IPv6
$ W! q% ^& u6 c# x+ {1.2 Create stable, secure, and scalable routing designs for IS-IS
6 M1 E. _$ O3 Z6 f' x1.3 Create stable, secure, and scalable routing designs for EIGRP
7 i/ h' i, k# W+ V) }1.4 Create stable, secure, and scalable routing designs for OSPF
/ [, ~ a0 x; t& w) b2 I5 e1.5 Create stable, secure, and scalable routing designs for BGP
0 R) i& A& i" u4 i9 B1.5.a Address families* B8 A! x- R( C9 `3 N
1.5.b Basic route filtering
* j. G6 Y- |$ J1.5.c Attributes for path preference
2 ?" f! w! k, m! A$ M1.5.d Route reflectors7 p# v' @0 U+ ~, i* H' @: [ T4 z
1.5.e Load sharing
# W3 X* G3 B9 f, C% J3 h" R$ w1.6 Determine IPv6 migration strategies
1 Y7 q6 O1 l' }7 d9 C2 B1.6.a Overlay (tunneling)
! c1 r- G% D4 O; n1.6.b Native (dual-stacking)* d+ M1 z" X% Z6 ? j7 e( S' f
1.6.c Boundaries (IPv4/IPv6 translations)5 N9 H' M* K6 B- \' ~0 M
/ A- B' E( K1 u& K" V! R S第二部分 advanced enterprise campus networks 25%
l; Y$ M# O, }% S/ d6 C2.1 Design campus networks for high availability% Q1 @2 w7 q+ a. V$ i6 g
2.1.a First Hop Redundancy Protocols5 o; l: D0 ~' @3 T B
2.1.b Platform abstraction techniques1 G+ \, o7 F; ~. v9 l
2.1.c Graceful restart
, B# p7 f( @7 K) y3 W3 c3 k! C2.1.d BFD) V( Q7 w, v6 D" S- C
2.2 Design campus Layer 2 infrastructures% M0 e w6 S0 c6 x( G
2.2.a STP scalability$ {7 K/ \; Y* A3 ~8 ]
2.2.b Fast convergence0 C0 H7 S$ a6 G- I# v G
2.2.c Loop-free technologies
' v4 F* p8 h8 `; T3 P# F: o0 Q2.2.d PoE and WoL5 E" E; f" k. q' K7 C, [5 p
2.3 Design multicampus Layer 3 infrastructures
: f6 v5 ^; T E2.3.a Convergence/ {0 {' X* U& S9 n2 J
2.3.b Load sharing
5 \+ h& n" v8 H T% I0 @) Y; |2.3.c Route summarization9 B' f7 E$ N% T2 Z0 [& ^+ C- j
2.3.d Route filtering
# d# L+ [. N% t, W8 H \2.3.e VRFs- O; y* F& T. g+ K
2.3.f Optimal topologies
, Y3 t+ a- \# l) `6 u2.3.g Redistribution$ R' w0 T! E6 W3 ]
2.4 Describe SD-Access Architecture (underlay, overlay, control and data plane, automation, wireless, and security)
+ q9 p/ K `# |0 {* u2 O" P' o2.5 Describe SD-Access fabric design considerations for wired and wireless access (overlay, fabric design, control plan design, border design, segmentation, virtual networks, scalability, over the top and fabric for wireless, multicast)
( x: i% L+ v8 C+ A, g8 ~0 t6 G
第三部分 WAN for Enterprise networks 20%
6 N/ w1 a( D* j) `+ n2 V. `1 k3.1 Compare WAN connectivity options! D' y6 Y0 H1 o4 G$ J- N; P) F }; ]! _
3.1.a Layer 2 VPN, }# L/ @$ S2 z
3.1.b MPLS Layer 3 VPN
( T8 ], ]) `9 M4 b' g! ^0 S3.1.c Metro Ethernet
( c% h9 a" m% X4 M# [7 u5 V3.1.d DWDM
; |# _, |& x) Z7 | R3.1.e 4G/5G" n7 A$ S0 ]( w$ C. u! ?/ }- T
3.1.f SD-WAN customer edge( ~1 g6 u0 z1 l* Z, ^
3.2 Design site-to-site VPN+ S% `) i; `: O; D: ]; e
3.2.a Dynamic Multipoint VPN (DMVPN)
9 @1 I. E: z/ J, Q6 w3.2.b Layer 2 VPN
+ V2 ~% [& @! N3.2.c MPLS Layer 3 VPN
( D6 _0 J. \. X+ i3.2.d IPsec* m2 d9 P5 ~7 O/ Q+ f- e( @
3.2.e Generic Routing Encapsulation (GRE)
8 G8 [" ~+ g* X4 s5 T2 B3.2.f Group Encrypted Transport VPN (GET VPN)
% [5 n, Y% R0 f6 j* H O% k3.3 Design high availability for enterprise WAN
9 X6 _# f7 v3 m, }' h3.3.a Single-homed
: R9 ]+ I; A/ b! [ Z/ v0 {/ R7 ~, Z3.3.b Multihomed9 g' K& n) |; D& p( g+ b+ w
3.3.c Backup connectivity
: ?7 p. i, }4 b2 i4 S3.3.d Failover
/ E1 t, V* x1 ~3 V3.4 Describe Cisco SD-WAN Architecture (orchestration plane, management plane, control plane, data plane, on-boarding and provisioning, security)# U/ h# @7 h+ [/ Y# s! j
3.5 Describe Cisco SD-WAN design considerations (control plane design, overlay design, LAN design, high availability, redundancy, scalability, security design, QoS and multicast over SD-WAN fabric)1 X1 D) h; Y7 ?5 G; [
, U5 a* {$ {1 [# b第四部分 Network service 20%
8 \; k, P. p4 [. e: N1 J4.1 Select appropriate QoS strategies to meet customer requirements (DiffServ, IntServ)
) k! o4 Z6 C" B: o7 k0 r4.2 Design end-to-end QoS policies+ E% S J4 F1 [- [
4.2.a Classification and marking, _9 f/ k" n- C- D. n) S& d
4.2.b Shaping! K' x, }! G! f( G) Y
4.2.c Policing
" ?9 s4 i9 p+ S) L3 x( L2 U9 W4.2.d Queuing
2 M- o3 Q" k B4.3 Design network management techniques
$ B3 p& |" f2 _! ?8 B4.3.a In-band vs. out-of-band
' ]. m% X0 Y# R3 n# j3 ^4.3.b Segmented management networks1 N& @+ a, U4 |* l
4.3.c Prioritizing network management traffic
( f- ?) J2 F# t1 C3 {/ B4.4 Describe multicast routing concepts (source trees, shared trees, RPF, rendezvous points)' x4 {7 t$ H/ e3 `8 e9 |
4.5 Design multicast services (SSM, PIM bidirectional, MSDP)
% W+ D) v2 f6 O# `! C; b4 _' ^3 T6 `0 r
第五部分 Automation 10%
; q, b# ]# h8 u5.1 Choose the correct YANG data model set based on requirements
4 G) ^$ U/ ?9 ~4 s) J5.2 Differentiate between IETF, Openconfig, and Cisco native YANG models" |1 t! g; U- A4 ^1 ?
5.3 Differentiate between NETCONF and RESTCONF
; \, F3 A9 H8 J, C5.4 Describe the impact of model-driven telemetry on the network. f z7 ~; k/ E" ~
5.4.a Periodic publication! u, G3 M @5 S' U
5.4.b On-change publication
& L4 }; H2 y( U6 F: p- G9 Y+ {% V5.5 Compare dial-in and dial-out approaches to model-driven telemetry. M' S8 b% R7 H3 S" B$ X3 t3 Y
/ g9 B! f- b. ^' a+ U
3 }7 w; G3 e! ^* q3 t/ z' t! J |
评分
-
查看全部评分
|