Deploying a Cisco SD-WAN Training Course
SD-WAN is a software-defined approach to managing a Wide Area Network (WAN).
This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software-defined network.
By the end of this training, participants will be able to:
- Install and configure a Cisco SD-WAN system.
- Create policies to manage network traffic effectively.
- Understand and implement overlay routing techniques.
- Simplify the management of networks used for public cloud applications.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical activities.
- Hands-on implementation in a live-lab environment.
Customization Options for the Course
- To request a customized training session for this course, please contact us to arrange.
Course Outline
Introduction
- How an SD-WAN differs from a traditional WAN
Overview of Cisco SD-WAN Features
Understanding Cisco's SD-WAN Offerings: iWAN, Meraki SD-WAN, and Viptela)
Cloud Based vs On-Premise Deployment
Case Study: The Impact of SaaS/IaaS on the WAN
Navigating the Management Dashboard
Setting up an SD-WAN Network
Provisioning a Network
Configuring the Network Using Templates
Configuring Overlay Routing
Setting up Policies for Network Traffic Management
Securing the Network
Implementing Quality of Service (QoS)
Working with SD-WAN vEdge Routers
Deploying SD-WAN on Cisco ISR/ASR
Monitoring SD-WAN Components
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of networking.
Audience
- Network engineers
- System administrators
- System Integrators
Need help picking the right course?
Deploying a Cisco SD-WAN Training Course - Enquiry
Testimonials (1)
good knowledge of technical issues, very detailed explanation of topics
Marcin Brzozowski - Asseco Business Solutions S.A.
Course - Deploying a Cisco SD-WAN
Related Courses
CCNA 200-301 exam prep
35 HoursThis CCNA course provides extensive training and resources to ensure participants are well-prepared for the CCNA certification exam. With hands-on labs, continuous assessments, and significant savings on certification costs, this course is designed to support participants in achieving their networking certification goals.
Cisco ASA/Pix Operation
28 HoursThis is a four-day instructor-led practical course designed to familiarize delegates with the Cisco ASA Firewall Command Line Interface (CLI) and the ASDM. The course covers key commands used for configuring and securing networks using the ASA Firewall, specifically with version 8 of the operating system and version 6 of the ASDM.
Delegates will learn to configure the ASA using various methods such as the console port, TFTP server, telnet, and SSH, along with local and RADIUS authentication. The device will also be set up to utilize Syslog and SNMP for monitoring and management purposes.
The course delves into configuring ASA Firewalls to use Access-Lists, Network Address Translation (NAT), and Virtual Private Networks (VPNs) using IPSec protocols. It includes the theoretical aspects of Public/Private Keys, shared secret keys, and their application in establishing Site-to-Site VPNs between ASA Firewalls using IKE and IPSec. Students will configure units to create site-to-site VPNs, remote access VPNs using the Cisco Secure VPN Client, and Web VPNs. Additionally, the course covers failover theory, with delegates configuring Active/Standby failover on the ASA.
Privileged commands and protocol analyzer traces will be utilized as needed to debug protocols and ensure the proper operation of the ASA Firewall. Students will also perform password recovery operations.
The course involves interfacing the ASA with other network equipment, such as routers and switches, simulating a real-world network environment.
Audience:
This course is suitable for anyone involved in configuring ASA firewalls and ensuring network security. The course is approximately 50% hands-on practical work.
CBROPS - UNDERSTANDING CISCO CYBERSECURITY OPERATIONS FUNDAMENTALS V1.0
35 HoursThe CBROPS - Understanding Cisco Cybersecurity Operations Fundamentals v1.0 course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
Certified Chief Information Security Officer (CCISO)
35 HoursEC-Council’s CCISO Program has certified top-tier information security professionals globally. A select group of high-level information security executives, known as the CCISO Advisory Board, played a crucial role in shaping the program. They laid the groundwork for the program and defined the content that would be covered in the exam, body of knowledge, and training. Some members of the Board served as authors, others as exam writers, some as quality assurance reviewers, and still others as trainers. Each part of the program was designed with aspiring CISOs in mind, aiming to pass on the expertise of seasoned professionals to the next generation in the most critical areas for developing and maintaining a successful information security program.
The Certified CISO (CCISO) program is a pioneering training and certification initiative focused on producing top-tier information security executives. Unlike other certifications, the CCISO emphasizes not just technical knowledge but also the practical application of information security management principles from an executive perspective. Developed by current CISOs for both existing and aspiring CISOs, this program ensures that participants gain the necessary skills to lead effective information security initiatives.
CCNA Routing & Switching
28 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at expert-level network professionals who wish to prepare for the CCNA Routing & Switching certification exam.
By the end of this training, participants will be able to:
- Develop a comprehensive understanding of networking fundamentals.
- Master IP connectivity and understand WAN technologies.
- Secure network devices using Access Control Lists (ACLs), VPNs, and other security protocols to prevent unauthorized access and threats.
- Prepare for the CCNA Routing & Switching Certification exam.
Implementing and Administering Cisco Solutions (CCNA) v1.0
35 HoursThis course gives you a broad fundamental knowledge for all networking careers. Learn how to
• install, operate, configure, and verify basic IPv4 and IPv6 networks
• configure network components such as switches, routers, and wireless LAN controllers;
• manage network devices; and
• Identify basic security threats.
The course also gives a foundation in network programmability, automation, and software-defined
networking.
Cisco CCNP
35 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at advanced-level network professionals who wish to gain a deeper understanding of Cisco Enterprise Network and pass the CCNP certification exam.
By the end of this training, participants will be able to:
- Understand the architecture and components of Cisco enterprise networks.
- Implement and troubleshoot advanced routing technologies and secure enterprise LAN and WAN networks.
- Configure and manage Cisco SD-WAN solutions for enterprise networks.
- Design enterprise networks with an emphasis on scalability, security, and availability.
- Take the CCNP Certification Exam with confidence.
Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level network professionals who wish to achieve more agile, secure, and efficient networks that align closely with their business objectives and adapt to changing needs and threats dynamically.
By the end of this training, participants will be able to:
- Understand the fundamentals of Intent-Based Networking.
- Implement network automation and integrate security in the Intent-Based Network.
- Use analytics for network monitoring and how assurance can provide insights into network performance and user experience.
- Designing and deploying an IBN that meets business requirements and operational objectives.
Cisco ISE Management and Administration
28 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level network administrators who wish to learn how to implement, configure, and optimize ISE for effective network security.
By the end of this training, participants will be able to:
- Deploy Cisco ISE in various network environments, considering best practices, hardware, and software requirements.
- Implement network profiling to identify and classify connected devices.
- Manage authorization and access control.
- Configure posture policies, remediation actions, and compliance modules.
Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level network security professionals who wish to learn how to implement and configure Cisco ISE to enhance the security posture of their network infrastructure.
By the end of this training, participants will be able to:
- Understand Cisco ISE architecture and access control capabilities.
- Implement basic network access control and advanced network access control.
- Configure and manage TACACS+ for device administration, command authorization, and role-based access control.
Cisco Unified Communications Management v12.x Administration
35 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level network engineers who wish to gain the skills and knowledge necessary to effectively administer, manage, and optimize Cisco Unified Communications Manager (CUCM) v12.x.
By the end of this training, participants will be able to:
- Understand CUCM architecture and deployment.
- Learn how to install, set up, and perform initial configurations of CUCM, including the setup of users, devices, and basic network settings.
- Implement and manage call routing.
- Perform system maintenance and troubleshooting.
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2
35 HoursAfter taking this course, you should be able to:
- Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
- Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
- Troubleshoot Layer 2 connectivity using VLANs and trunking
- Implementation of redundant switched networks using Spanning Tree Protocol
- Troubleshooting link aggregation using Etherchannel
- Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
- Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
- Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
- Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
- Describe the virtualization technology of servers, switches, and the various network devices and components
- Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
- Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
- Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
- Describe wireless roaming and location services
- Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
- Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
- Troubleshoot wireless client connectivity issues using various available tools
- Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
- Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
- Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
- Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
- Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
- Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
- Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
- Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
- Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
- Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
- Explain basic Python components and conditionals with script writing and analysis
- Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
- Describe APIs in Cisco DNA Center and vManage
Implementing Cisco Enterprise Wireless Networks (ENWLSI) v2.0
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level network professionals who wish to implement and secure wireless networks within an enterprise environment using Cisco equipment and technologies.
By the end of this training, participants will be able to:
- Design and Implement FlexConnect Architectures.
- Implement Quality of Service in a wireless network environment.
- Configure and troubleshoot multicast in a wireless network.
- Implement security for wireless client connectivity.
Securing Email with Cisco Email Security Appliance (SESA) v3.1
28 HoursThis class will help you:
- Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
- Gain leading-edge career skills focused on enterprise security
Objectives
After taking this course, you should be able to:
- Describe and administer the Cisco Email Security Appliance (ESA)
- Control sender and recipient domains
- Control spam with Talos SenderBase and anti-spam
- Use anti-virus and outbreak filters
- Use mail policies
- Use content filters
- Use message filters to enforce email policies
- Prevent data loss
- Perform LDAP queries
- Authenticate Simple Mail Transfer Protocol (SMTP) sessions
- Authenticate email
- Encrypt email
- Use system quarantines and delivery methods
- Perform centralized management using clusters
- Test and troubleshoot
SIP protocol in VoIP
21 HoursThe course comprises two complementary sections: a theoretical segment and a practical one. The theoretical part, which spans one day, introduces the motivation, philosophy, fundamentals, and operational rules of the SIP protocol. It focuses on how SIP is utilized to implement telecom services, particularly in IP telephony and VoIP. The practical section, which lasts for two days, allows participants to gain hands-on experience through laboratory exercises. These exercises provide a detailed understanding of configuring components within a SIP telephony architecture, examining SIP signaling at both the message sequence chart level and internal message structure level. This segment also aids in troubleshooting typical issues, including security concerns and telecom fraud. The trainers will share their expertise on launching, operating, and managing SIP telephony systems, with additional insights into virtualization and cloud-based solutions. Practical sessions involve using both SIP hardphones and softphones, as well as IP telephony servers such as Asterisk and Freeswitch. Participants can leverage the trainers' extensive technical and business experience in IP telephony by submitting their own problems and questions, which will be addressed during the wrap-up session to meet the immediate needs of the clients. The training is designed for participants who have a basic understanding and experience in telecom services, particularly in VoIP and IP networking.