Deploying a Cisco SD-WAN Training Course
SD-WAN is a software-defined approach to managing a Wide Area Network (WAN).
This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software-defined network.
By the end of this training, participants will be able to:
- Install and configure a Cisco SD-WAN system.
- Create policies to manage network traffic effectively.
- Understand and implement overlay routing techniques.
- Simplify the management of networks used for public cloud applications.
Format of the Course
- Interactive lectures and discussions.
- Extensive exercises and practical activities.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
- How an SD-WAN differs from a traditional WAN
Overview of Cisco SD-WAN Features
Understanding Cisco's SD-WAN Offerings: iWAN, Meraki SD-WAN, and Viptela)
Cloud Based vs On-Premise Deployment
Case Study: The Impact of SaaS/IaaS on the WAN
Navigating the Management Dashboard
Setting up an SD-WAN Network
Provisioning a Network
Configuring the Network Using Templates
Configuring Overlay Routing
Setting up Policies for Network Traffic Management
Securing the Network
Implementing Quality of Service (QoS)
Working with SD-WAN vEdge Routers
Deploying SD-WAN on Cisco ISR/ASR
Monitoring SD-WAN Components
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of networking.
Audience
- Network engineers
- System administrators
- System Integrators
Open Training Courses require 5+ participants.
Deploying a Cisco SD-WAN Training Course - Booking
Deploying a Cisco SD-WAN Training Course - Enquiry
Testimonials (1)
good knowledge of technical issues, very detailed explanation of topics
Marcin Brzozowski - Asseco Business Solutions S.A.
Course - Deploying a Cisco SD-WAN
Upcoming Courses
Related Courses
CCNA 200-301 exam prep
35 HoursThis CCNA course provides extensive training and resources to ensure participants are well-prepared for the CCNA certification exam. With hands-on labs, continuous assessments, and significant savings on certification costs, this course is designed to support participants in achieving their networking certification goals.
Cisco ASA/Pix Operation
28 HoursThis is a four-day, instructor-led, hands-on course designed to familiarize participants with the Cisco ASA Firewall CLI and ASDM. The course covers key commands used for configuring and securing networks using the ASA Firewall with version 8 of the operating system and version 6 of the ASDM.
Participants will configure the ASA using the console port, TFTP server, telnet, and SSH, employing both local and RADIUS authentication methods. The device will also be set up to utilize Syslog and SNMP.
The course includes configuring ASA Firewalls to use Access-Lists, Network Address Translation, and VPNs utilizing IPSec protocols. It delves into the theory of Public/Private Keys, shared secret keys, and their application in establishing site-to-site VPNs between ASA Firewalls using IKE and IPSec. Students will configure units to create site-to-site VPNs, remote access VPNs using the Cisco Secure VPN Client, and Web VPNs. The course also covers failover theory, with participants configuring Active/Standby failover on the ASA.
Where necessary, privileged commands and protocol analyzer traces will be used to debug protocols and ensure the proper operation of the ASA Firewall. Participants will also perform password recovery operations.
The course involves interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a real-world network environment.
Audience:
This course is suitable for anyone involved in configuring ASA firewalls and ensuring network security.
Approximately 50% of the course is hands-on practical work.
CBROPS - UNDERSTANDING CISCO CYBERSECURITY OPERATIONS FUNDAMENTALS V1.0
35 HoursThe CBROPS - Understanding Cisco Cybersecurity Operations Fundamentals v1.0 course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
Certified Chief Information Security Officer (CCISO)
35 HoursEC-Council’s CCISO Program has certified top-tier information security professionals globally. A dedicated group of high-level information security executives, known as the CCISO Advisory Board, played a crucial role in shaping the program. They laid the groundwork by defining the exam content, body of knowledge, and training curriculum. Members of the board contributed in various capacities—some as authors, others as exam writers, quality assurance specialists, or trainers. Each component of the program is designed with aspiring CISOs in mind, aiming to pass on the expertise of seasoned professionals to the next generation, focusing on the most critical areas for developing and maintaining a successful information security program.
The Certified CISO (CCISO) program is a pioneering training and certification initiative aimed at producing elite information security executives. Unlike other programs that focus solely on technical knowledge, the CCISO emphasizes the practical application of information security management principles from an executive perspective. Developed by current CISOs for both existing and aspiring CISOs, this program ensures a comprehensive approach to leadership in the field of information security.
CCNA Routing & Switching
28 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at expert-level network professionals who wish to prepare for the CCNA Routing & Switching certification exam.
By the end of this training, participants will be able to:
- Develop a comprehensive understanding of networking fundamentals.
- Master IP connectivity and understand WAN technologies.
- Secure network devices using Access Control Lists (ACLs), VPNs, and other security protocols to prevent unauthorized access and threats.
- Prepare for the CCNA Routing & Switching Certification exam.
Implementing and Administering Cisco Solutions (CCNA) v1.0
35 HoursThis course gives you a broad fundamental knowledge for all networking careers. Learn how to
• install, operate, configure, and verify basic IPv4 and IPv6 networks
• configure network components such as switches, routers, and wireless LAN controllers;
• manage network devices; and
• Identify basic security threats.
The course also gives a foundation in network programmability, automation, and software-defined
networking.
Cisco CCNP
35 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at advanced-level network professionals who wish to gain a deeper understanding of Cisco Enterprise Network and pass the CCNP certification exam.
By the end of this training, participants will be able to:
- Understand the architecture and components of Cisco enterprise networks.
- Implement and troubleshoot advanced routing technologies and secure enterprise LAN and WAN networks.
- Configure and manage Cisco SD-WAN solutions for enterprise networks.
- Design enterprise networks with an emphasis on scalability, security, and availability.
- Take the CCNP Certification Exam with confidence.
Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1
21 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at intermediate-level network professionals who wish to achieve more agile, secure, and efficient networks that align closely with their business objectives and adapt to changing needs and threats dynamically.
By the end of this training, participants will be able to:
- Understand the fundamentals of Intent-Based Networking.
- Implement network automation and integrate security in the Intent-Based Network.
- Use analytics for network monitoring and how assurance can provide insights into network performance and user experience.
- Designing and deploying an IBN that meets business requirements and operational objectives.
Cisco ISE Management and Administration
28 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at intermediate-level network administrators who wish to learn how to implement, configure, and optimize ISE for effective network security.
By the end of this training, participants will be able to:
- Deploy Cisco ISE in various network environments, considering best practices, hardware, and software requirements.
- Implement network profiling to identify and classify connected devices.
- Manage authorization and access control.
- Configure posture policies, remediation actions, and compliance modules.
Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0
21 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at intermediate-level network security professionals who wish to learn how to implement and configure Cisco ISE to enhance the security posture of their network infrastructure.
By the end of this training, participants will be able to:
- Understand Cisco ISE architecture and access control capabilities.
- Implement basic network access control and advanced network access control.
- Configure and manage TACACS+ for device administration, command authorization, and role-based access control.
Cisco Unified Communications Management v12.x Administration
35 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at intermediate-level network engineers who wish to gain the skills and knowledge necessary to effectively administer, manage, and optimize Cisco Unified Communications Manager (CUCM) v12.x.
By the end of this training, participants will be able to:
- Understand CUCM architecture and deployment.
- Learn how to install, set up, and perform initial configurations of CUCM, including the setup of users, devices, and basic network settings.
- Implement and manage call routing.
- Perform system maintenance and troubleshooting.
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2
35 HoursAfter taking this course, you should be able to:
- Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
- Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
- Troubleshoot Layer 2 connectivity using VLANs and trunking
- Implementation of redundant switched networks using Spanning Tree Protocol
- Troubleshooting link aggregation using Etherchannel
- Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
- Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
- Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
- Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
- Describe the virtualization technology of servers, switches, and the various network devices and components
- Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
- Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
- Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
- Describe wireless roaming and location services
- Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
- Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
- Troubleshoot wireless client connectivity issues using various available tools
- Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
- Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
- Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
- Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
- Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
- Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
- Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
- Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
- Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
- Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
- Explain basic Python components and conditionals with script writing and analysis
- Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
- Describe APIs in Cisco DNA Center and vManage
Implementing Cisco Enterprise Wireless Networks (ENWLSI) v2.0
21 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at intermediate-level network professionals who wish to implement and secure wireless networks within an enterprise environment using Cisco equipment and technologies.
By the end of this training, participants will be able to:
- Design and Implement FlexConnect Architectures.
- Implement Quality of Service in a wireless network environment.
- Configure and troubleshoot multicast in a wireless network.
- Implement security for wireless client connectivity.
Securing Email with Cisco Email Security Appliance (SESA) v3.1
28 HoursThis class will help you:
- Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
- Gain leading-edge career skills focused on enterprise security
Objectives
After taking this course, you should be able to:
- Describe and administer the Cisco Email Security Appliance (ESA)
- Control sender and recipient domains
- Control spam with Talos SenderBase and anti-spam
- Use anti-virus and outbreak filters
- Use mail policies
- Use content filters
- Use message filters to enforce email policies
- Prevent data loss
- Perform LDAP queries
- Authenticate Simple Mail Transfer Protocol (SMTP) sessions
- Authenticate email
- Encrypt email
- Use system quarantines and delivery methods
- Perform centralized management using clusters
- Test and troubleshoot
SIP protocol in VoIP
21 HoursThe course is divided into two complementary sections: a theoretical part and a practical part. The first section, which spans one day, provides an introduction to the SIP protocol, covering its motivation, philosophy, fundamentals, and operational rules. It focuses on how SIP is used to implement telecom services, particularly in IP telephony and VoIP. The second section, lasting two days, offers hands-on laboratory exercises that delve into the practical aspects of service operation. These exercises provide detailed insights into configuring components of SIP telephony architecture, analyzing SIP signaling at both message sequence chart and internal message structure levels, and addressing typical problems and troubleshooting, including security and telecom fraud issues. The trainers will share their extensive experience in launching, operating, and managing SIP telephony services, including virtualization and cloud-based solutions. The practical part of the course uses both SIP hardphones and softphones, as well as IP telephony servers like Asterisk and Freeswitch. Participants can benefit from the trainers' rich technical and business expertise in IP telephony by submitting their own problems and questions, which will be incorporated into the agenda during the wrap-up session to address clients' current urgent needs. This training is designed for participants who have a basic understanding and experience in telecom services, particularly VoIP and IP networking.