Kurset e trajnimit‎ > ‎Cisco CCNA‎ > ‎

Interconnecting Cisco Network Devices 2 (ICND2)




ICT Education Newsletter


Pershkrim i kursit

Kursi i Cisco /ICND2 i jep kandidatit qe mer pjese ne kete kurs aftesine per te instaluar, konfiguruar, operuar dhe per te realizuar troubleshoot te rrjeteve te permasave mesatare.


Ceshtjet qe perfshihen

  • Vlsm dhe adresimi i Ipv6.
  • Verifikimi dhe troubleshooting i Vlans.
  • Percaktimi i Ip te ruterit.
  • Menaxhimi i trafikut Ip me access list, Nat dhe DHCP. 
  • Stabilizimi i lidhjeve point- point dhe stabilizimi i lidhjeve Frame Relay.

Njohuri paraprake

Ky kurs ka nevoje per njohurite paraprake te kursit Interconnecting Cisco Network Devices 1

Kohezgjatja e kursit

Kursi eshte i organizuar ne 24 ore mesimore dhe zhvillohet ne nje periudhe 1-2 Muaj.
Zhvillohet dy deri ne tre here ne jave,me nga dy ore, kryesisht ne oraret e pasdites. 


Organizimi i kursit

Kursi zhvillohet ne laborator dhe eshte i orientuar nga praktika. 
Zhillohet me nje numer te kufizuar pjesemarresish, ku secili punon ne nje kompjuter te vetem.
Leksionet e trajnimit jane edhe on-line.


Certifikimi

  • ICT Education


Provim nr

  • 200 - 101

Programi i kursit


Module 1: Cisco Device Management

1.    Overview

2.    Objectives

3.    Understanding the IOS Boot Process

4.    Loading IOS Images

5.    Changing the IOS Image Load Location

6.    Upgrading IOS

     Troubleshooting IOS Upgrades

7.    Understanding and Modifying the Confi guration Register

8.    Using the Configuration Register for Password Recovery

9.    Managing Configuration Files

10.  Managing Licensing

11.  Using SNMP to Manage Licenses

12.   Review Question

13.   Lab Exercises 


Module 2: Troubleshooting and Data Collection

1.    Overview

2.    Objectives

3.    Understanding the Systematic Approach

4.     Understanding Troubleshooting Techniques


      a.     Understanding the OSI Model

      b.     Implementing the OSI Techniques
                                    The Bottom Up Troubleshooting Technique
                                    The Top Down Troubleshooting Technique
                                    The Divide and Conquer Troubleshooting Technique

      c.     Implementing the Non-OSI Techniques
                                    The Follow the Path Troubleshooting Technique
                                    The Move the Problem Troubleshooting Technique
                                    The Spot the Difference Troubleshooting Technique

5.    Understanding show Commands

6.    Understanding debug Commands

7.     Understanding Syslog


      Configuring Log Severity Levels

8.    Understanding the ping Command

9.    Understanding the traceroute Command

10.  Understanding SNMP

11.  Configuring SNMP

12.  Understanding NetFlow

13.  Using NetFlow Data

14.  Configuring NetFlow

15.  Verifying NetFlow

16.  Analyzing NetFlow Data

17.  Solving Common Network Problems

18.  Troubleshooting Connectivity

19.  Troubleshooting Physical Layer Connectivity

20.  Troubleshooting Data Link Layer Connectivity

21.  Troubleshooting Network Layer Connectivity


      Network Addressing
      IPv4 Connectivity
      IPv6 Connectivity
          Path Selection
      InterVLAN Routing

22.  Troubleshooting Beyond Layer 3

23.  Troubleshooting Layer 4


      Using Telnet to Troubleshoot Layer 4
      Resolving Layer 4 Connectivity

24.  Troubleshooting Beyond Layer 4

25.   Review Question

26.   Lab Exercises 


Module 3: Network Addressing

1.    Overview

2.    Objectives

3.    Understanding IPv4 Subnets

4.    Understanding IPv4 Subnetting

5.    Understanding VLSMs

6.     Understanding IPv6 Addressing


     
IPv6 Address Composition
      IPv6 Address Prefi xes
      IPv6 Address Types
      IPv6 Address Confi guration
      EUI-64 Interface IDs

7.       Review Question

8.       Lab Exercises


Module 4: VLANs and Trunking

1.    Overview

2.    Objectives

3.    What Do VLANs Do?

4.    Creating and Configuring VLANs

5.    Verifying VLANs

6.    Configuring Access Ports

7.    Verifying VLAN Membership

8.    Understanding Trunk Ports

9.    Configuring Trunk Ports

10.  Verifying Trunk Ports

11.  Understanding and Configuring DTP

12.  Common VLAN and Trunk Problems

13.  Review Question

14.  Lab Exercises


Module 5: Spanning Tree Protocol

1.    Overview

2.    Objectives

3.    Understanding STP

4.     Root Switch Election


      Verifying the Root Switch

5.    Path Costs

6.     Determining Port Roles


      Root Port
      Designated Port

7.    STP Port States

8.    STP Timers

9.     Understanding RSTP


      Differences Between STP and RSTP
      Understanding RSTP Port States
      RSTP Alternate and Backup Port Roles

10.  Understanding Cisco Implementations of STP


      Per-VLAN Spanning Tree Plus
      PVST+ Bridge IDs
      Per-VLAN Rapid Spanning Tree Plus
      Multiple Spanning Tree Protocol

11.  Cisco Enhancements to ST


      PortFast
      BPDU Guard
      Loop Guard
      Root Guard

12.   Review Question

13.   Lab Exercises


Module 6: Advanced Switch Redundancy

1.    Overview

2.    Objectives

3.    Understanding EtherChannel

4.     Understanding EtherChannel Protocols

      Understanding PAgP and LACP Modes


                         The On Mode
                          PAgP Modes
                          LACP Modes

5.    Configuring EtherChannel

6.    Configuring PAgP EtherChannel

7.    Configuring LACP EtherChannel

8.    Understanding EtherChannel’s Effects on STP

9.    Verifying EtherChannel

10.  Troubleshooting EtherChannel


      Aggregation Protocol Mismatches
      Bundle Confi guration Mismatches

11.  Understanding Gateway Redundancy

12.  Understanding HSRP

13.  Configuring HSRP


     Configuring Preemption and Interface Tracking
     Configuring Multigroup HSRP

14.  Verifying HSRP

15.  Understanding GLBP

16.  Configuring GLBP

17.  Configuring GLBP Options

18.  Verifying GLBP

19.  Review Question

20.  Lab Exercises


Module 7: Switches

1.    Overview

2.    Objectives

3.    Establishing Written Security Policies

4.     Securing Access


      Restricting Physical Access to the Switch
      Creating Secure Passwords for Console and Remote Access
                                        Configuring ACLs to Control Remote Access
      Creating a Secure Password for Privileged EXEC Mode Access
          Encrypting Passwords on the Switch
      Securing, Disabling, or Replacing Vulnerable Services
      Configuring Warning Banners

5.     Securing Switch Ports


      Disabling Unused Ports
      Securing Trunk and Access Ports
          Restricting Ports by Client MAC Address
      Verifying Port Security
      Understanding 802.1X Port-based Authentication
                                          How 802.1X Port-based Authentication Works
                                          Configuring 802.1X Port-based Authentication

6.    Securing VLAN 1

7.     Securing Spanning Tree Protocol


      Configuring Root Guard
      Configuring BPDU Guard
      Logging
                                          Configuring Accurate Time
                                          Configuring Log Severity Levels
                                          Configuring and Using a Logging Server

8.    Review Question

9.    Lab Exercises


Module 8: Routing Fundamentals

1.    Overview

2.    Objectives

3.    Understanding Router Path Selection

4.    Understanding Static Routes

5.    Understanding Dynamic Routes

6.    Understanding Administrative Distance

7.    Understanding Routing Metrics

8.    Understanding Autonomous Systems

9.    Understanding Routing Protocols

10.  Understanding the Types of IGPs

11.  Understanding Distance-Vector Routing Protocols


      Learning Distance-Vector Routes
      Updating Distance-Vector Routes

12.  Preventing Distance-Vector Problems


      Understanding the Counting to Infinity Problem
                                               Understanding Maximum Counts
              Understanding Routing Loops
                                               Preventing Routing Loops

13.  Understanding Link-State Routing Protocols

14.  Understanding Link-State Relationships

15.  Understanding the LSDB

16.  Learning Link-State Routes

17.  Review Question

18.  Lab Exercises


Module 9: OSPF Configuration

1.    Overview

2.    Objectives

3.    Understanding OSPF

4.     Understanding OSPF Areas

     
      Understanding Nonbackbone Areas
          Understanding Single-Area and Multiarea Confi gurations

5.     Understanding OSPF Router Roles


       Autonomous System Boundary Routers
       Area Border Routers
       Backbone and Nonbackbone Routers

6.     Configuring OSPF


       Configuring Single-Area OSPFv2
       Configuring Multiarea OSPFv2
       Configuring Areas in OSPFv3

7.    Verifying OSPF

8.    Understanding OSPF Router IDs

9.    Understanding OSPF Adjacencies

10.  Understanding DR and BDR Elections

11.  Understanding the LSDB

12.  Verifying OSPF Adjacencies

13.  Verifying OSPF Link States

14.  Troubleshooting OSPF Adjacencies

15.  Using Cost to Load Balance OSPF

16.  Review Question

17.  Lab Exercises


Module 10: EIGRP Configuration

1.    Overview

2.    Objectives

3.     Understanding EIGRP


a.   
Choosing Between OSPF and EIGRP

4.     Understanding EIGRP Adjacencies


a.   
Configuring Hello and Hold Timers

5.     Understanding EIGRP Path Selection


      Understanding Advertised Distance and Feasible Distance
      Understanding EIGRP Tables

6.    Configuring EIGRP

7.    Verifying and Troubleshooting EIGRP

8.     Understanding EIGRP Load Balancing


a.    Using Variance to Load Balance EIGRP

9.    Understanding EIGRP Route Summarization

10.  Review Question

11.  Lab Exercises


Module 11: PPP WANs

1.    Overview

2.    Objectives

3.    Implementing PPP

4.    Establishing PPP Links

5.    Configuring PPP on a Router Interface

6.     Configuring PPP Authentication


      Configuring Router Host Names, User Names, and Passwords
      Configuring PAP Authentication
      Configuring CHAP Authentication
      Configuring PAP and CHAP on the Same Interface

7.    Review Question

8.    Lab Exercises


Module 12: Frame Relay WANs

1.    Overview

2.    Objectives

3.    Connecting to a Frame Relay Network

4.    Understanding Frame Relay Packets

5.    Understanding Virtual Circuits

6.    Enabling Frame Relay

7.    Understanding Frame Relay Topologies


     Full-Mesh Topology
     Partial-Mesh Topology
     Hub-and-Spoke Topology

8.    Working Around Split Horizon

9.     Configuring Subinterfaces


      Configuring Point-to-Point Frame Relay
      Creating a Point-to-Point Subinterface
      Configuring Multipoint Frame Relay
      Creating a Multipoint Subinterface

10.  Configuring Frame Relay Maps


     Configuring Static Frame Relay Maps
     Automatic Frame Relay Map Confi guration

11.  Configuring LMI Signaling

12.  Configuring Inverse ARP

13.  Configuring DLCIs

14.  Verifying Frame Relay Connections


     Verifying the Frame Relay Encapsulation Type
     Verifying the Frame Relay LMI Type
     Verifying Frame Relay Mappings
     Verifying Frame Relay DLCI Status

15.  Performing a Loopback Test

16.  Review Question

17.  Lab Exercises


Module 13: Secure VPNs and Tunneling

1.    Overview

2.    Objectives

3.    Understanding the Purpose of a VPN

4.     The Two Types of VPNs

5.     Understanding Site-to-Site VPNs

6.    Understanding Remote Access VPNs

7.     Understanding the IPSec Protocol

8.     IPSec Encryption Methods

9.     IPSec Data Integrity Methods

10.  IPSec Authentication Methods

11.  Understanding GRE Tunnels

12.  Differences Between Secure VPNs and GRE Tunnels

13.  Confi guring GRE Tunnels

14.  Verifying GRE Tunnels

15.  Review Question

16.  Lab Exercises