This is a 4-day workshop aimed at Cisco partners and customers who are/have deployed Cisco DNA Center. This class will help enable Cisco DNA Center adoption in a brownfield environment utilizing Assurance as a feature to manage and troubleshooting both a wired and wireless environment, followed by migrating to Software Defined Access for both Wired and Wireless.
Course Content
The course leads you into detailed coverage of using DNA Center in a brownfield environment with Assurance its components and implementation as well as supported architectures and migration paths to SDA.
Who should attend
CiscoCustomers
Sales Engineers
Enterprise Customers
Field Engineers
Prerequisites
Attendees should have prior knowledge of Routing, Switching and Wireless.
As this course is part ofCiscoBlack Belt Academy Aligned Content, attendees should also completeBlack BeltCiscoDNA Deployment Stage 1.
Course Objectives
Describe and Implement the need forDNACin a Brownfield environment
Visibility and Troubleshoot with Assurance
Describe and Implement the need for a new networking model
Describe theCiscoSoftware-Defined Access solution, its components and features
Describe and ImplementCiscoDNA Center as the management solution for the new architecture
Implement a Wired SDA Infrastructure
Implement a Wireless SDA Infrastructure
Implement ETA with Stealthwatch
Outline: DNAC Activation and Assurance (DNACAA)
Day 1: Introduction to DNA
Introduction to DNA
Advantages ofCiscoDNA Center without SDA
Setup Prerequisites for a brownfield site
Software Updates
Network Hierarchy
Build an inventory of wired and wireless devices for a brownfield environment
Manage the Inventory
Automating Image Management
Command Runner
Templates
Topology
Application Polices
Day 1: - Labs
Create sites and building in theCiscoDNA Center
Configure Network Settings
Discover Network Devices – wired and wireless
Place APS on the floor
Verify the Topology
Command Runner
Template Editor
Verify wireless and wired client connectivity
Day 2: - Assurance and SDA Migration
Assurance for Wired and Wireless
Wireless as a Sensor
Intelligent Capture
Prime vsCiscoDNA Center
Trustworthy Systems
Network Design for SD Access
Migration strategy to SD Access:
Architecture
Underlay network Design
Overlay Fabric Design
Design Sizing Considerations
Day 2: - Labs
Assurance for Wired and Wireless
Setup wireless sensors integration with Assurance
Setup intelligent capture integration with Assurance
Walk through Troubleshooting with Assurance
Preparing the Underlay Network for SDA
Preparing the Overlay
Day 3: – SD-Access Wired
Controller Fundamentals
ISE andDNACIntegration
Understanding Virtual Networks and SGTs in SD Access
Policy Enforcement
CiscoTrustSec Segmentation
SDA Borders
Wired SDA Implementation
Troubleshooting Wired SDA Access with Assurance
Day 3: - Labs
Creating IP Pools
Create and Manage Fabric
Adding Devices to the Fabric
SDA Access Network Administration
SDA Policy Administration
Day 4: – SD-Access Wireless
SD Access Wireless Architecture and Solution Components
SD Access Wireless Protocols and Communication Interfaces
Designing Wireless Integration in SD Acess
SD Access Wireless Guest Access Design
High Availability in SD Access Wireless
Troubleshooting Wireless SDA Access with Assurance
Stealthwatch with ETA
4 Labs
Provision the WLC to the SD-Access FABRIC
DNA Center to Provision SSID
Guest Access
Stealthwatch with ETA
(DNACAA)
DNAC Activation and Assurance (DNACAA)
Cybersecurity certification courses
Ethical hacking training
Network security certification
Information security training
Cybersecurity bootcamp
SOC analyst training
Penetration testing course
Cybersecurity online certification
IT security certifications for beginners
Advanced cybersecurity training
IBM cybersecurity certification
IBM security training courses
IBM QRadar training
IBM cyber security professional certificate
IBM SIEM certification
Palo Alto certification training
Palo Alto firewall course
PCNSE certification training
Palo Alto network security certification
Palo Alto online training
CompTIA Security+ certification
CompTIA CySA+ training
CompTIA PenTest+ course
CompTIA Network+ certification
CompTIA A+ cybersecurity path
Cisco cybersecurity certification
Cisco CCNA security training
Cisco CCNP security course
Cisco network security certification
Cisco ethical hacking course
Cybersecurity certification Singapore
Ethical hacking course Singapore
Cisco certification Singapore
CompTIA Security+ Singapore
Palo Alto training Singapore
IBM cybersecurity course Singapore
Cybersecurity training Malaysia
Ethical hacking Malaysia course
Cisco certification Malaysia
CompTIA certification Malaysia
Palo Alto Malaysia training
IBM cybersecurity Malaysia
Cybersecurity certification Thailand
Ethical hacking course Thailand
Cisco Thailand training
CompTIA Thailand certification
Palo Alto Thailand course
IBM cybersecurity Thailand
Cybersecurity training Cambodia
Ethical hacking Cambodia course
Cisco certification Cambodia
CompTIA Cambodia training
Palo Alto Cambodia certification
IBM cybersecurity Cambodia
Cybersecurity training Myanmar
Ethical hacking Myanmar course
Cisco Myanmar certification
CompTIA Myanmar training
Palo Alto Myanmar certification
IBM cybersecurity Myanmar
Cybersecurity certification USA
Ethical hacking course USA
Cisco certification USA
CompTIA Security+ USA
Palo Alto training USA
IBM cybersecurity certification USA
Cybersecurity certification UK
Ethical hacking course UK
Cisco certification UK
CompTIA UK training
Palo Alto UK certification
IBM cybersecurity UK
Cybersecurity certification UAE
Cybersecurity course Dubai
Ethical hacking Dubai
Cisco certification Dubai
CompTIA UAE training
Palo Alto Dubai certification
IBM cybersecurity UAE
Best cybersecurity certification for beginners in Singapore
Online CompTIA Security+ course with certification USA
Cisco CCNA security training institute in Dubai
Palo Alto PCNSE certification training in Malaysia
IBM cybersecurity certification online UK