成长值: 64955
|
CCIE Enterprise Infrastructure Exam Topics - Practical Exam
/ c5 A& W8 X8 zExam Description
$ A9 l/ h+ g' v) _1 K- P( a4 Z4 F' F0 w
The Cisco CCIE Enterprise Infrastructure (v1.0) Practical Exam is an eight-hour, hands-on exam that requires a candidate to plan, design, deploy, operate, and optimize dual stack solutions (IPv4 and IPv6) for complex enterprise networks.* s) q+ X) O( ^0 w# k7 I; v
8 H7 @* Q ?& u- u! e! z: T9 \; M
Candidates are expected to program and automate the network within their exam, as per exam topics below.+ `* n2 p1 z: h) k; d# p8 F
. Q$ Z7 T% E1 e) Z8 HThe following topics are general guidelines for the content likely to be included on the exam. Your knowledge, skills and abilities on these topics will be tested throughout the entire network lifecycle, unless explicitly specified otherwise within this document.' @( O4 ]3 Z9 b7 Q
# @# c7 {. r$ k0 @- J
3 j5 @% R u6 V
第一部分 network infrastructure 30%
! R) s5 |, Q# @0 O6 F) v1.1 Switched campus) K/ U- W0 f! Q' _# u% P' g0 h3 k
1.1.a Switch administration d& k+ i( r) q& N
1.1.a i Managing MAC address table& o6 W, ^. K( d3 i; `0 o/ P
1.1.a ii Errdisable recovery
" {/ z. C" }3 y- n! F5 Y Y: e2 G1 _4 \1.1.a iii L2 MTU- a- A/ D7 B! y% t+ f
1.1.b Layer 2 protocols8 a. e% O2 v0 o4 c
1.1.b i CDP, LLDP' I- @: s( {! z0 A! G4 A& J( r: J
1.1.b ii UDLD
0 T% O& M" C% R2 }, j0 `$ x1.1.c VLAN technologies
7 N+ G6 V$ F4 [1 v1.1.c i Access ports/ F9 u( b+ e! @' L1 ]9 C
1.1.c ii Trunk ports (802.1Q)6 R2 X$ a& _4 @; ]' R' J
1.1.c iii Native VLAN
; n8 [, \. C+ y3 `1.1.c iv Manual VLAN pruning% w( n6 Q* a6 B+ d. F
1.1.c v VLAN database
- p' n' }! {+ Q' O" }8 r$ g1 i1.1.c vi Normal range and extended range VLANs0 B' c9 J ^% Y: n
1.1.c vii Voice VLAN t: v! ?3 L( v2 ~4 } A
1.1.c viii VTP( D7 G9 @$ c2 a. ?/ p& Q
1.1.d EtherChannel
# C) x2 H4 @- |3 B- v1.1.d i LACP, static; b5 z. @* K$ l$ V
1.1.d ii Layer 2, Layer 3
1 K. j! }! @, }3 z6 j1.1.d iii Load balancing
& b7 e; E! q4 }* I- d/ C3 D( Z1.1.d iv EtherChannel Misconfiguration Guard
# U% O! e+ f) `' I* s1.1.e Spanning- Tree Protocol: W' v) Z" V8 k1 C
1.1.e i PVST+, Rapid PVST+, MST# a% V0 g) O; Z. G1 P0 p2 Z
1.1.e ii Switch priority, port priority, path cost, STP timers
# I9 ]) P4 n9 C E/ ?1.1.e iii PortFast, BPDU Guard, BPDU Filter
2 w" C. Y* M$ a# m6 X0 K1.1.e iv Loop Guard, Root Guard+ R/ v+ X7 G( x
1.2 Routing Concepts- H/ u, [5 Y( N; a; m
1.2.a Administrative distance
' x# Q7 R5 x* V) d1.2.b VRF-lite: l& k' f/ A- L7 d9 {
1.2.c Static routing
) x9 Z* w6 L5 b1.2.d Policy Based Routing
5 E3 q7 n, n/ B8 w- @4 V1.2.e VRF aware routing with any routing protocol
: e0 V$ m8 x; c% B' o/ Z1.2.f Route filtering with any routing protocol
1 T9 W# E4 z. M7 X% w' T; }! k, W0 X1.2.g Manual summarization with any routing protocol
5 S; g( n+ c2 Q' f1 Z1.2.h Redistribution between any pair of routing protocols6 Z: \- V$ O2 X
1.2.i Routing protocol authentication
3 v+ ^; e; f% w1 i8 ~6 d2 w* H: K9 t1.2.j Bidirectional Forwarding Detection( _" N* `6 U8 N6 M
1.3 EIGRP* G u2 }0 F, ^4 J9 ?
1.3.a Adjacencies
0 S# P$ @. k- T" }) v+ @6 c; ?1.3.b Best path selection
" [6 m, m7 Y* t( e( p2 v( ^1.3.b i RD, FD, FC, successor, feasible successor
- G. _3 o% @5 {! m1.3.b ii Classic Metrics and Wide Metrics3 J) c& A$ q/ P+ |7 K8 a9 M0 [
1.3.c Operations
" d& y5 t2 {' E4 [/ i1 o; K5 K. e1.3.c i General operations
9 m8 v8 O$ }. r# r" p* V* W8 |5 H1.3.c ii Topology table
( B1 ^# d( }0 p$ \9 _, A& `1.3.c iii Packet types# _: |8 B5 E* R" \
1.3.c iv Stuck In Active
: \& E, Q2 d5 j( |* b: `$ a1.3.c v Graceful shutdown
( j( U" {& J8 r( [1.3.d EIGRP load-balancing" ~* f9 s7 N/ F6 F: j/ w
1.3.d i Equal-cost: B$ o+ j; h# z4 d# B0 A8 m
1.3.d ii Unequal-cost
0 k; j8 W, s* t4 Z( ~$ ]" }1.3.d iii Add-path( T1 {7 S8 C2 }* C0 c% c I
1.3.e EIGRP Named Mode
8 j6 T A3 I1 ^# L5 K" ] u- y8 z1.3.f Optimization, convergence and scalability1 h0 l' O/ z0 H$ @% z1 a
1.3.f i Fast convergence requirements) [' C* ^6 |% F0 Y7 v( Z
1.3.f ii Query propagation boundaries$ W# _ s) x. z. |3 S2 J0 f
1.3.f iii IP FRR (single hop)
7 E/ ] ?" A8 L& i) a3 O1.3.f iv Leak-map with summary routes
~ }4 h: }3 X/ [4 e1.3.f v EIGRP stub with leak map
6 \. |0 p! u, [( _/ e1.4 OSPF (v2 and v3)
1 N) I4 R: p2 i6 c }, S1.4.a Adjacencies
0 R! H- w3 u8 Q/ u' [2 u' H1.4.b Network types, area types
- C' W7 ^. K1 L9 _/ D; i. C1.4.c Path preference
5 A! c# F2 ?* [1.4.d Operations
+ A! t# u5 i) B; R' I1.4.d i General operations) S8 T2 f1 v5 j8 ]+ a2 P& h
1.4.d ii Graceful shutdown# z$ [1 @, n( T
1.4.d iii GTSM (Generic TTL Security Mechanism)
- Z# s3 g; s- r$ q) ?) n7 n1.4.e Optimization, convergence and scalability- U& |$ |3 s7 K
1.4.e i Metrics- ^4 Z; H1 M! f! M
1.4.e ii LSA throttling, SPF tuning, fast hello. J0 N$ y: F/ _8 s7 `9 w* Y
1.4.e iii LSA propagation control (area types)' M% O' d! A: M V
1.4.e iv Stub router: j# Q3 Q! b6 C
1.4.e v Loop-free alternate
7 C( P2 x4 i/ c8 m1.4.e vi Prefix suppression
% r/ Q% z' u& ]& s1 |: O% S9 g# q3 v1 y1.5 BGP" s* p1 w) Q, k# Y0 d2 Y% e6 K" L
1.5.a IBGP and EBGP peer relationships4 ]9 }" T5 q& u' O( I; X4 a
1.5.a i Peer-group/update-group, template
% h; ]2 L6 n, U/ ]/ H( U5 p1.5.a ii Active, passive6 _) \% w" m0 p2 A! s5 ?
1.5.a iii Timers
( _. m/ U1 j1 F# p. j1.5.a iv Dynamic neighbors
) I5 C9 |5 {$ ]3 w9 V$ M1.5.a v 4-bytes AS numbers0 j/ T2 ]! Y* l& f4 e y* y
1.5.a vi Private AS
- h! p. u* e; ?5 x, b. F9 ~1.5.b Path selection
- S6 ~8 k9 x( x( f) L4 ]0 R8 e1.5.b i Attributes
& |- x+ `$ W- _1.5.b ii Best path selection algorithm
/ c% Y) |& Q3 o1 d7 |; x1 W1.5.b iii Load-balancing
x6 S8 @ Y- [( r# Q1.5.c Routing policies
2 O5 x' S# c3 n1 r1.5.c i Attribute manipulation9 {* i8 _5 g- i
1.5.c ii Conditional advertisement
# \1 w: l# ~; s6 N/ {% _2 a+ A1.5.c iii Outbound Route Filtering
) S f) I8 t+ [2 g! @( i! M1.5.c iv Standard and extended communities4 y! ]8 n, N( l( c* o7 Q& I
1.5.c v Multi-homing A. V0 ~/ g& z3 |. D+ L. \: d
1.5.d AS path manipulations
5 z; {0 m) e! C. K* |; f8 a1.5.d i local-AS, allowas-in, remove-private-as, x0 q& y! I5 p% c1 G& o
1.5.d ii Prepend2 w$ S9 ], z+ [" p/ w
1.5.d iii Regexp
' J8 E: L% e5 w8 P$ M/ o% q# B1.5.e Convergence and scalability
) R( p& g& V ~6 z x1.5.e i Route reflector
5 p* {: W; M8 L2 ]2 h& C$ |9 V1.5.e ii Aggregation, as-set4 C Z9 g$ d8 H0 V
1.5.f Other BGP features& c' b6 }( m1 m1 p& [6 r
1.5.f i Multipath, add-path. m: q( G" o' Z3 N y2 H8 d
1.5.f ii Soft reconfiguration, Route Refresh
/ `- w6 y; y. r B1.6 Multicast
' c& s# M5 ?* \+ g* f1 O% Z1.6.a Layer 2 multicast
8 b. X3 y/ j3 ^: S; P1.6.a i IGMPv2, IGMPv3
: Q/ O9 r2 R* c( g% a% j$ _1.6.a ii IGMP Snooping, PIM Snooping
# l, s: U9 g0 b1.6.a iii IGMP Querier& G" T$ W& d# S f% z
1.6.a iv IGMP Filter
% {/ H4 e! w/ I5 K9 _6 P1.6.a v MLD$ |3 T$ d0 Q) z" c; x
1.6.b Reverse path forwarding check
4 G& Q- S: X/ _: A* T. ~" |: U1.6.c PIM
7 t+ V5 t F1 l( C, _1.6.c i Sparse Mode. i( u# s) H) D0 j t# z0 Y2 W
1.6.c ii Static RP, BSR, AutoRP9 H; N5 U9 R. X7 r- A
1.6.c iii Group to RP Mapping1 _# q8 m; r; c- p" l/ e2 G2 Y
1.6.c iv Bidirectional PIM
/ A1 G. m: ?3 ?1.6.c v Source-Specific Multicast
, J7 |( A& h# K* [/ f/ S1.6.c vi Multicast boundary, RP announcement filter/ Y+ x6 l! d3 h. o& @
1.6.c vii PIMv6 Anycast RP: N) [' j2 y$ b2 p
1.6.c viii IPv4 Anycast RP using MSDP
9 y2 `" B) Z- b! ?# o1.6.c ix Multicast multipath# [0 k- d* }7 j: j$ W E9 Y
+ v3 d9 W3 g- i" y4 ]第二部分 software defined infrastructure 25%0 P6 y+ S# @5 Y0 @
2.1 Cisco SD Access; b1 q! [8 V4 A, j
2.1.a Design a Cisco SD Access solution
! j0 s7 c6 L# Z2.1.a i Underlay network (IS-IS, manual/PnP)
! g. v1 r/ _% G: l: t/ I2.1.a ii Overlay fabric design (LISP, VXLAN, Cisco TrustSec)
" [. G* w. P q7 k# p8 j2.1.a iii Fabric domains (single-site and multi-site using SD-WAN transit)
- S# T5 g4 X+ P6 I" b5 b2.1.b Cisco SD Access deployment( Y; u3 U1 B) m+ e! S4 |) W
2.1.b i Cisco DNA Center device discovery and device management' b& T1 W7 U+ ]# e: J8 O
2.1.b ii Add fabric node devices to an existing fabric
( c. C3 \6 g* X! T2.1.b iii Host onboarding (wired endpoints only)
- H" u8 a2 {, a3 ^2.1.b iv Fabric border handoff) I4 y* N; C' E$ o: Z- c! ?- j
2.1.c Segmentation
8 L, E0 R) [ c/ Z8 ?2.1.c i Macro-level segmentation using VNs& S2 l5 {4 d; W2 l* R
2.1.c ii Micro-level segmentation using SGTs (using Cisco ISE)
7 P% T, C; S0 v$ } f* o2.1.d Assurance5 C/ ~; ^3 ?$ D" }
2.1.d i Network and client health (360) h$ B0 k$ q0 `
2.1.d ii Monitoring and troubleshooting- \0 w( t) K5 O5 l; b
2.2 Cisco SD-WAN) u- S$ g* g# O# s ?
2.2.a Design a Cisco SD-WAN solution
, s ^9 J* M1 u2.2.a i Orchestration plane (vBond, NAT)
* \3 ~' q7 ?1 l- J" N; y2 [2.2.a ii Management plane (vManage)
0 M6 L6 G7 I( f- {. @0 D9 `2.2.a iii Control plane (vSmart, OMP)) g0 m) H4 _) U5 p* o
2.2.a iv Data plane (vEdge/cEdge)7 a7 C7 _9 E; t
2.2.b WAN edge deployment
- K0 G/ @! W$ @6 _9 F- {2.2.b i Onboarding new edge routers
- S4 C- }# B6 O) G6 {) @2.2.b ii Orchestration with zero-touch provisioning/Plug-And-Play& p' z) o! L) u8 v; f1 M
2.2.b iii OMP
) Q5 k1 @- @/ ?. \- g3 ?2.2.b iv TLOC
6 w) m/ ^8 E" f7 A) ?8 G2.2.c Configuration templates$ R# {7 g! g. |# d5 M* @
2.2.d Localized policies (only QoS)* h2 @2 [6 e }
2.2.e Centralized policies
) z! d& k0 V6 [3 l+ a9 a2.2.e i Application Aware Routing) w! c# p& p2 y) Q
2.2.e ii Topologies
* a! a1 U" n* H) q$ u
8 |& Y$ a1 x4 y6 n6 _2 E1 G第三部分 transport technologies and solutions 15%1 ~' L" W- |. M; E1 y+ L C
3.1 MPLS
9 o4 c) i5 K2 W9 i( I3.1.a Operations+ H/ Y% h8 o) {, x7 z7 m! n
3.1.a i Label stack, LSR, LSP
& H9 f E7 w& r2 \6 V$ e3.1.a ii LDP
1 Z4 |# z3 r- ?- K S3.1.a iii MPLS ping, MPLS traceroute) Q& b. [: P% ^; R' K0 Q
3.1.b L3VPN
4 _7 D9 S" _9 a$ M3.1.b i PE-CE routing5 O l& ?$ e( B9 J
3.1.b ii MP-BGP VPNv4/VPNv6$ {& q& Y. b% n$ e. p- z/ A
3.1.b iii Extranet (route leaking)
. Z4 g# [2 i/ i9 H3 [3.2 DMVPN
+ k. G# @$ M/ \ j5 R3.2.a Troubleshoot DMVPN Phase 3 with dual-hub
- Y+ P1 q; B6 f! I$ Q3.2.a i NHRP0 u6 Z2 p4 c: [7 H3 Z
3.2.a ii IPsec/IKEv2 using pre-shared key& t* @( Q t9 K5 o, p9 D" t: N
3.2.a iii Per-Tunnel QoS
) H( |# d; w+ r+ M. j; }3.2.b Identify use-cases for FlexVPN8 m' q# K$ y Z( n# c3 [
3.2.b i Site-to-site, Server, Client, Spoke-to-Spoke; x/ F n5 c* a( ^( {
3.2.b ii IPsec/IKEv2 using pre-shared key
. i' ^- A" @, E6 r3 f3.2.b iii MPLS over FlexVPN
7 m4 k/ B$ u4 R7 f/ |( k" s( Y- o( ~3 H) J$ |; ?! p
第四部分 infrastructrue security and sevices 15%
0 a8 ]& \& T9 @8 S4 X5 t4.1 Device Security on Cisco IOS XE3 A Z# K$ l" ~2 W3 h' K
4.1.a Control plane policing and p rotection
2 ]2 I/ { S$ D5 n( C9 C) ?4.1.b AAA
1 S+ v8 r- v( l$ ?* Z# p$ h9 f. b4.2 Network Security9 B3 o2 D6 H \- J/ S3 I- v
4.2.a Switch security features$ g: Y, u6 F+ f+ c, C( b
4.2.a i VACL, PACL
! d a0 p4 i( _6 F4.2.a ii Storm control
- H# n) L& O6 {* W4.2.a iii DHCP Snooping, DHCP option 82
% V* }* x; f u8 X- p2 q4.2.a iv IP Source Guard
( _ V) Y7 O) J7 u4 m# i8 e4.2.a v Dynamic ARP Inspection
% g, Z! d7 L, Y" v- h2 T8 D" u+ m! d" f4.2.a vi Port Security
* |+ K, U% W& f' S0 `5 B3 y5 N" o4.2.a vii Private VLAN
; c! @0 K9 r( `$ f. S4.2.b Router security features
- u9 S( i1 p; m% i c5 R4 r& V6 a, j4.2.b i IPv6 Traffic Filters: z: w9 \! S( n& \ ~' w+ M
4.2.b ii IPv4 Access Control Lists
{% y5 o p% L" b" L/ M" |4.2.b iii Unicast Reverse Path Forwarding
/ q' t$ `) W0 ]0 O" x7 t% Z# ?4.2.c IPv6 infrastructure security features
- l0 `9 r- l# e4.2.c i RA Guard6 n+ O! w) `3 P- V6 {' a( O
4.2.c ii DHCP Guard
" A( @! u5 o3 X; X: z6 ~1 W4.2.c iii Binding table# Z8 q2 K8 k3 }6 Q7 o8 I
4.2.c iv Device tracking1 x( S6 `# d% ? U
4.2.c v ND Inspection/Snooping
: p: J; S% |& d& ?3 I: ]5 p" H4.2.c vi Source Guard+ D0 ]2 V" M3 K0 ~
4.2.d IEEE 802.1X Port-Based Authentication) T j; Q6 L1 l2 N& P0 ]
4.2.d i Device roles, port states
6 d4 ^4 `0 ^8 g2 P+ u0 I) R4.2.d ii Authentication process, v- F2 J7 Y3 ]
4.2.d iii Host modes" W9 n3 x" X& s" j' ], K
4.3 System Management8 s8 b0 j. D- D! `0 i, A* o
4.3.a Device management
0 Y9 } R4 J- \/ J5 V4.3.a i Console and VTY
! J) P5 w% b# M2 C8 E' S4.3.a ii SSH, SCP& w- E Q: Y- G* e7 N) s9 H' P
4.3.a iii RESTCONF, NETCONF
. R/ B2 g, u" L# n6 e6 f3 G4.3.b SNMP O/ W" r1 l6 J- p, X! C1 Y- J
4.3.b i v2c( f! [5 D* l4 H% @
4.3.b ii v3
4 x, `2 \% z) P* C4.3.c Logging0 Q( _4 G) J$ X; X" G2 C
4.3.c i Local logging, syslog, debugs, conditional debugs8 s/ S5 C+ @( T
4.3.c ii Timestamps! y" h. ~3 }7 j
4.4 Quality of Service
- G" X. l( J8 i) ~' D4.4.a End to end L3 QoS using MQC" }( e. F6 d! e' b! B, A
4.4.a i DiffServ
* Y3 ^+ Z& M& H% l4.4.a ii CoS and DSCP Mapping
# D0 h0 q; h' Z6 ]% |6 T9 ^4.4.a iii Classification" ~' W. s( S" c& C K2 p6 L9 S
4.4.a iv Network Based Application Recognition (NBAR)
) ?! R! Q) f5 H8 U1 u9 S. t4.4.a v Marking using IP Precedence, DSCP, CoS: @4 d1 T) i# A, N' v
4.4.a vi Policing, shaping1 W( E# C V$ m* \; g/ O5 e& }
4.4.a vii Congestion management and avoidance3 k# C t* o$ B
4.4.a viii HQoS, Sub-rate Ethernet Link Z- L! R0 ~0 V6 E* f; \
4.5 Network Services" k$ q8 }3 ]8 l; E* L
4.5.a First-Hop Redundancy Protocols" e6 k1 R0 c( C. {7 }
4.5.a i HSRP, GLBP, VRRP6 P: z# T! J$ t
4.5.a ii Redundancy using IPv6 RS/RA
( x! U& q/ q3 v& \) x x4.5.b Network Time Protocol
8 U4 t4 [: X% T, h4.5.b i Master, client2 ?: d: w+ z8 f; c) `
4.5.b ii Authentication9 l& W! \% n' x; C/ U- @" |+ k2 N- w
4.5.c DHCP on Cisco IOS
( X1 F7 g9 R+ I+ R: j' ^, ?4.5.c i Client, server, relay8 g) g1 ]% w) l4 N1 f
4.5.c ii Options
7 S7 l* T/ ^2 J6 \6 |( H; Y4.5.c iii SLAAC/DHCPv6 interaction; F' [/ y8 X w2 B4 b" R: w! y
4.5.c iv Stateful, stateless DHCPv63 X& c5 F* S2 b
4.5.c v DHCPv6 Prefix Delegation
* ]$ W; ^# E' F. Z' b3 D4.5.d IPv4 Network Address Translation
( x- Z' \# G7 i" r8 s3 i# J( I5 k9 z ]4.5.d i Static NAT, PAT( m2 c: e6 C O3 v
4.5.d ii Dynamic NAT, PAT
7 B: O* ?0 `% [8 E, N$ u4.5.d iii Policy-based NAT, PAT7 b$ y0 B2 l2 n9 u+ A# L5 B
4.5.d iv VRF aware NAT, PAT
9 T$ ]7 a8 s( s( E) |4.5.d v IOS-XE VRF-Aware Software Infrastructure (VASI) NAT
! T; e0 K! \* X8 V. e4.6 Network optimization
/ u+ o" G* Y4 j( g4.6.a IP SLA z0 h& L4 S H) X4 _1 `+ E7 E
4.6.a i ICMP probes w' [+ k9 A* m: l$ r
4.6.a ii UDP probes
0 r' [, V4 V: r, }4.6.a iii TCP probes
" Z# l m% S: e- q9 x1 k \) O4.6.b Tracking object
) `$ a% y- M8 i2 K4.6.c Flexible Netflow
& N3 V5 ^& W5 [' A% a, s4.7 Network operations
1 C' D. }$ }$ X9 ?3 K8 @" M: v: d4.7.a Traffic capture
0 U0 R8 e3 t* i9 s0 B7 z* G2 s4.7.a i SPAN' t1 }% {5 v$ W9 Z0 z
4.7.a ii RSPAN
/ A- W+ J1 o. z1 S3 ?+ `9 O, J# |4.7.a iii ERSPAN$ n, l( L) X1 W% B- K l
4.7.a iv Embedded Packet Capture+ D5 s; O ^( Y
4.7.b Cisco IOS-XE troubleshooting tools/ z; h* `& ?; G4 b- D) S) Y0 l
4.7.b i Packet Trace
6 w) [# w: u E0 \7 D" R4.7.b ii Conditional debugger (debug platform condition)/ E' \% s" @: N O2 Z
5 O1 }! n. Q3 }( v第五部分 infrastructure automation and programmability 15%
# \3 r) G! \5 ]$ @% D5.1 Data encoding formats
0 S3 }7 R- |% T1 y/ M5.1.a JSON
4 K) a, H$ }/ o2 b, n5.1.b XML+ W; c I" ?) Q+ G
5.2 Automation and scripting1 t y1 ?5 o1 z4 F! Q5 e9 J$ v, l
5.2.a EEM applets
) J2 U# H) C( q; q) X) X7 @7 [5.2.b Guest shell
( w2 _3 t2 ~+ S$ P5.2.b i Linux environment/ s, k% U: M7 d' {' u3 e- G
5.2.b ii CLI Python module( s- O c* f6 k+ x
5.2.b iii EEM Python module7 I$ u( I) ?$ @; [% z7 @' V# q
5.3 Programmability
& q3 X/ q3 F9 P8 L6 [, a6 w& I5.3.a Interaction with vManage API3 H4 X; B6 e" L) J" O y
5.3.a i Python requests library and Postman. {+ [+ S3 h j3 E; c9 u- r
5.3.a ii Monitoring endpoints5 u5 ~& w5 a3 \$ G3 ^
5.3.a iii Configuration endpoints
1 J' f- ^- k+ K. Y5.3.b Interaction with Cisco DNA Center API
# N8 x% C8 @& K5.3.b i HTTP request (GET, PUT, POST) via Python requests library and Postman9 e0 D/ \$ s! S6 q. |- e7 C" J# |
5.3.c Interaction with Cisco IOS XE API5 Z W. N ~' u: ^4 }1 @ p* q4 t' w
5.3.c i Via NETCONF/YANG using Python ncclient library
3 `* v" l; a8 |5.3.c ii Via RESTCONF/YANG using Python requests library and Postman- J5 e7 e Z& F6 q
5.3.d Deploy and verify model-driven telemetry
# t2 @; Y9 \: }3 J: T& |5.3.d i Configure on-change subscription using gRPC- F7 S% I; \8 W1 v/ }
1 n3 [$ p1 u" s+ o8 U5 N
3 N, g5 f; b& E, s' E" }5 \/ r* f
|
|