成长值: 64835
|
300-430 ENWLSI Exam: Implementing Cisco Enterprise Wireless Networks4 p( v, F! P& ^" q7 B
Exam Description8 K# u* G7 x( S( ?& ^* F2 O
, L- O; D7 m2 O* S6 f
0 @ |" u) ~0 [- s3 S. O9 OThe Implementing Cisco Enterprise Wireless Networks v1.0 (ENWLSI 300-430) exam is a 90-minute exam associated with the CCNP Enterprise and Cisco Certified Specialist - Enterprise Wireless Implementation certifications. This exam certifies a candidate's knowledge of wireless network implementation including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring and device hardening. The course, Implementing Cisco Enterprise Wireless Networks, helps candidates to prepare for this exam.: _9 K4 K" d) [
; I, e3 j. K% _' |( q
+ G7 b' ?6 `2 d* F: J
? W: V) r8 fThe following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.6 _, n) h a" A6 H) H( d) ]) }
4 }5 r$ p8 O, N) }. `% E
* x Y. d f, Q( A$ Y- E* ]
# Q) O/ s+ o) s4 w
第一部分 Flexconnect 15%
8 Q" K. {8 ?( |! Q- {1.1 Deploy FlexConnect components such as switching and operating modes
7 N. {8 b& D" {- t9 f1.2 Deploy FlexConnect capabilities7 P6 y' K+ \' j& K4 ^- K2 S" l7 T4 e' x
1.2.a FlexConnect groups and roaming
( V& f* Z: p- j& A/ ^1.2.b Split tunneling and fault tolerance) ]# q7 E7 g# ~/ E7 a" N
1.2.c VLAN-based central switching and Flex ACL3 x8 J9 J% R+ H6 F; B. z# R0 Y
1.2.d Smart AP image upgrade) E2 O7 f4 f0 J4 O
1.3 Implement Office Extend8 r5 N5 J s+ p
# l4 t# ]9 Q9 a/ B第二部分 QOS on a wireless network 10%" @ {5 a1 P2 R! G- `9 ~1 x) `
2.1 Implement QoS schemes based on requirements including wired to wireless mapping- n: N! F5 E5 ~
2.2 Implement QoS for wireless clients; d. c4 a0 B7 z' y3 C9 m8 N
2.3 Implement AVC including Fastlane (only on WLC)1 e. L+ L/ f u E0 j- x9 G
& {* |) p, X( B2 s' q1 k* w' q. z第三部分 Multicast 10%+ Q" `5 [# Y. w
3.1 Implement multicast components
) R& }* `: y: M1 L, u) D& K( g3.2 Describe how multicast can affect wireless networks
( c" u6 [! u* u3.3 Implement multicast on a WLAN: c) p8 A: Y4 H" P
3.4 Implement mDNS, y4 N, e8 p$ h6 l7 I; M' w
3.5 Implement Multicast Direct
* {- Q6 d5 M6 f4 x) K8 N; g9 `4 w7 G' m
第四部分 Location services 10%
1 H* u( P; |' m+ H7 f4.1 Deploy MSE and CMX on a wireless network4 q6 g0 C% a+ J8 h
4.2 Implement location services
5 F1 L6 [3 t& j7 i g5 }4.2.a client tracking
- ~1 H2 c6 A) V0 W* e" ]: U* U4.2.b RFID tags (tracking only)
. a5 i/ [# b/ ^! Z/ B4.2.c Interferers
- g/ y. Z4 C N& w) F$ \% N6 U4.2.d Rogue APs6 P: {- o, C( k& Q2 e
4.2.e Clients ( v) m5 w9 L% Q1 f; ? F
* D/ [2 _& L- C" W0 k8 W第五部分 advanced location services 10%5 W0 S- Z* A P" J
5.1 Implement CMX components
8 n% c6 Y; k; f( S6 x5.1.a Detect and locate
( P. l. c: ?# \0 q5.1.b Analytics
! ^$ M3 D# S; @( @- y' Q7 a' J& o: K5.1.c Presence services
0 U" s- n r4 i; n1 s0 i! v8 T& [5.2 Implement location-aware guest services using custom portal and Facebook Wi-Fi3 X) c0 K0 ~$ Z z% p
5.3 Troubleshoot location accuracy using Cisco Hyperlocation0 k' a: m' I$ k9 f# {+ }
5.4 Troubleshoot CMX high availability& M5 h6 A' W/ t1 O, k2 @
5.5 Implement wIPS using MSE
' X2 _* c3 D, ]! e. _+ j6 C0 [
" ~5 H0 w8 \2 \3 \7 [3 T7 Q第六部分 security for wireless client connectivity 20%
8 |3 b3 M) E$ \! ?3 A6.1 Configure client profiling on WLC and ISE
+ p5 j% `% `( `. W6.2 Implement BYOD and guest* f- C. u: U6 E; Y% {* C( n( @
6.2.a CWA using ISE (including self-registration portal)/ ~7 ]1 y) D' u0 r
6.2.b LWA using ISE or WLC; s$ R7 T7 I: w5 @. o9 j* c
6.2.c Native supplicant provisioning using ISE
* Z8 q S$ d7 T" s6.2.d Certificate provisioning on the controller
& R0 i2 ?1 e7 |6.3 Implement 802.1X and AAA on different wireless architectures and ISE; ?4 X: [9 V6 r* a5 i5 I
6.4 Implement Identity-Based Networking on different wireless architectures (VLANs, QoS, ACLs)2 @. _9 [8 _( m0 |( K& j
' g! S( l$ Y2 i2 i# H/ c
第七部分 Monitoring 15%
9 J1 m% V1 x0 w7.1 Utilize reports on PI and Cisco DNA center
, _* j& }" ?7 a2 s1 m' d8 {- X8 S7.2 Manage alarms and rogues (APs and clients) z( ~- r5 j6 P% X6 E3 C: v- C+ d
7.2.a WLC6 }# W# a9 L2 {6 i! r
7.2.b PI& |. I" k/ Q0 V4 S5 d$ b1 B
7.2.c Cisco DNA center
3 r: q" D1 A) f5 T7.3 Manage RF interferers4 u9 T# |; @) p5 U
7.3.a WLC$ P7 ]- v% F& X: @7 L
7.3.b PI$ {. B. C8 D+ R/ o" [& l! M
7.3.c Cisco DNA center1 X0 B; G4 n" k( y& B |. R6 A. D
7.4 Troubleshoot client connectivity
; \6 O6 ?8 R& q7.4.a WLC
) A( `1 f8 y3 t7.4.b ISE( _+ G3 ]/ \( ]# y( _ }2 N
7.4.c PI( V k7 g& l8 v. Q$ W, _# V) i
7.4.d Cisco DNA center
: o8 U7 R! D( g$ Z* u0 c6 K% d* E( a" _1 w8 }) S
第八部分 device hardening 10%2 ~! u0 G4 ?" t, w
8.1 Implement device access controls (including RADIUS and TACACS+)# L& V( ]( |2 l- P$ r7 N
8.2 Implement access point authentication (including 802.1X)' C5 R* `, w: a/ G0 _
8.3 Implement CPU ACLs on the controller
7 c$ l1 j S1 l }( {! u- h" R" [
4 g2 A! { Y7 c% Z) p" w) |- q' [) n
|
|