{"id":412,"date":"2024-04-18T03:04:30","date_gmt":"2024-04-18T03:04:30","guid":{"rendered":"https:\/\/blog.devops955.com\/swain\/?p=412"},"modified":"2024-04-19T09:43:32","modified_gmt":"2024-04-19T09:43:32","slug":"ccnp-enterprise","status":"publish","type":"post","link":"https:\/\/blog.devops955.com\/swain\/zh\/2024\/04\/18\/ccnp-enterprise\/","title":{"rendered":"CCNP Enterprise \u8ba4\u8bc1\u7b14\u8bb0"},"content":{"rendered":"<p>\u76ee\u524dCCNP\u4e3a\u7b14\u8bd5\uff0c\u4e00\u4e2a\u5fc5\u8003\u6838\u5fc3\u79d1\u76ee\u548c\u4e00\u4e2a\u591a\u9009\u4e00\u9009\u8003\u79d1\u76ee\u3002<\/p>\n<p>\u6838\u5fc3\u79d1\u76ee\u4e3a <strong>350-401 ENCOR: Implementing Cisco Enterprise Network Core Technologies<\/strong> \u540c\u65f6\u4e5f\u662fCCIE\u7684\u7b14\u8bd5\u5185\u5bb9\u3002<br \/>\n\u9009\u8003\u79d1\u76ee\u6709\uff1a<\/p>\n<ol>\n<li><strong>300-410 ENARSI (Implementing Cisco Enterprise Advanced Routing and Services)<\/strong>\uff1a\u8fd9\u95e8\u8003\u8bd5\u4e3b\u8981\u805a\u7126\u4e8e\u4f01\u4e1a\u7ea7\u9ad8\u7ea7\u8def\u7531\u6280\u672f\u548c\u670d\u52a1\u7684\u5b9e\u73b0\uff0c\u6d89\u53ca\u8def\u7531\u534f\u8bae\u3001\u7b56\u7565\u3001\u7f51\u7edc\u670d\u52a1\u7b49\u3002<\/li>\n<li><strong>300-415 ENSDWI (Implementing Cisco SD-WAN Solutions)<\/strong>\uff1a\u4e13\u6ce8\u4e8eCisco SD-WAN\u89e3\u51b3\u65b9\u6848\u7684\u5b9e\u73b0\uff0c\u5305\u62ec\u90e8\u7f72\u3001\u914d\u7f6e\u3001\u7ba1\u7406\u548c\u76d1\u63a7\u3002<\/li>\n<li><strong>300-420 ENSLD (Designing Cisco Enterprise Networks)<\/strong>\uff1a\u6d89\u53caCisco\u4f01\u4e1a\u7f51\u7edc\u7684\u8bbe\u8ba1\uff0c\u5305\u62ec\u9ad8\u7ea7\u5730\u5740\u5206\u914d\u3001\u8def\u7531\u7b56\u7565\u548c\u7f51\u7edc\u670d\u52a1\u8bbe\u8ba1\u3002<\/li>\n<li><strong>300-425 ENWLSD (Designing Cisco Enterprise Wireless Networks)<\/strong>\uff1a\u4e13\u95e8\u9488\u5bf9\u4f01\u4e1a\u65e0\u7ebf\u7f51\u7edc\u8bbe\u8ba1\uff0c\u5305\u62ec\u65e0\u7ebf\u7f51\u7edc\u67b6\u6784\u3001\u8bbe\u8ba1\u7b56\u7565\u548c\u5b9e\u73b0\u3002<\/li>\n<li><strong>300-430 ENWLSI (Implementing Cisco Enterprise Wireless Networks)<\/strong>\uff1a\u5173\u6ce8\u4e8e\u4f01\u4e1a\u65e0\u7ebf\u7f51\u7edc\u7684\u5b9e\u73b0\uff0c\u6db5\u76d6\u914d\u7f6e\u3001\u76d1\u63a7\u548c\u6545\u969c\u6392\u9664\u3002<\/li>\n<li><strong>300-435 ENAUTO (Automating Cisco Enterprise Solutions)<\/strong>\uff1a\u8fd9\u95e8\u8bfe\u7a0b\u4e13\u6ce8\u4e8e\u4f7f\u7528\u81ea\u52a8\u5316\u6280\u672f\u548c\u7f16\u7a0b\u8bed\u8a00\u6765\u7ba1\u7406\u548c\u914d\u7f6eCisco\u4f01\u4e1a\u89e3\u51b3\u65b9\u6848\u3002<\/li>\n<li><strong>300-440 ENCC (Designing and Implementing Cloud Connectivity)<\/strong>\uff1a\u6d89\u53ca\u4e91\u8fde\u63a5\u7684\u8bbe\u8ba1\u4e0e\u5b9e\u73b0\uff0c\u5305\u62ec\u4e91\u670d\u52a1\u7684\u96c6\u6210\u548c\u7f51\u7edc\u4f18\u5316\u3002<\/li>\n<li><strong>300-445 ENNA (Designing and Implementing Enterprise Network Assurance)<\/strong>\uff1a\u4e13\u6ce8\u4e8e\u4f01\u4e1a\u7f51\u7edc\u4fdd\u969c\u7684\u8bbe\u8ba1\u548c\u5b9e\u65bd\uff0c\u5305\u62ec\u7f51\u7edc\u76d1\u63a7\u3001\u5206\u6790\u548c\u4f18\u5316\uff0c\u662f\u65b0\u79d1\u76ee\uff0c2024\u5e745\u670820\u65e5\u4e0a\u7ebf\u3002<\/li>\n<\/ol>\n<p>\u540e\u9762\u5c06\u4ecb\u7ecd\u4e0b<strong>ENCOR 350-401: Implementing Cisco Enterprise Network Core Technologies<\/strong> \u548c <strong>ENARSI 300-410: Implementing Cisco Enterprise Advanced Routing and Services<\/strong><\/p>\n<h1>ENCOR 350-401: Implementing Cisco Enterprise Network Core Technologies<\/h1>\n<h2><strong><a href=\"https:\/\/blog.devops955.com\/swain\/zh\/2024\/04\/19\/ccnp-encor-architecture\/\" title=\"Architecture\uff0815%\uff09\">Architecture\uff0815%\uff09<\/a><\/strong><\/h2>\n<ol>\n<li>Explain the different design principles used in an enterprise network\n<ul>\n<li>High-level enterprise network design such as 2-tier, 3-tier, fabric, and cloud<\/li>\n<li>High availability techniques such as redundancy, FHRP, and SSO<\/li>\n<\/ul>\n<\/li>\n<li>Describe wireless network design principles\n<ul>\n<li>Wireless deployment models (centralized, distributed, controller-less, controller-based, cloud, remote branch)<\/li>\n<li>Location services in a WLAN design<\/li>\n<li>Client density<\/li>\n<\/ul>\n<\/li>\n<li>Explain the working principles of the Cisco SD-WAN solution\n<ul>\n<li>SD-WAN control and data planes elements<\/li>\n<li>Benefits and limitations of SD-WAN solutions<\/li>\n<\/ul>\n<\/li>\n<li>Explain the working principles of the Cisco SD-Access solution\n<ul>\n<li>SD-Access control and data planes elements<\/li>\n<li>Traditional campus interoperating with SD-Access<\/li>\n<\/ul>\n<\/li>\n<li>Interpret wired and wireless QoS configurations\n<ul>\n<li>QoS components<\/li>\n<li>QoS policy<\/li>\n<\/ul>\n<\/li>\n<li>Describe hardware and software switching mechanisms such as CEF, CAM, TCAM, FIB, RIB, and adjacency tables<\/li>\n<\/ol>\n<h2><strong>Virtualization\uff0810%\uff09<\/strong><\/h2>\n<ol>\n<li>Describe device virtualization technologies\n<ul>\n<li>Hypervisor type 1 and 2<\/li>\n<li>Virtual machine<\/li>\n<li>Virtual switching<\/li>\n<\/ul>\n<\/li>\n<li>Configure and verify data path virtualization technologies\n<ul>\n<li>VRF<\/li>\n<li>GRE and IPsec tunneling<\/li>\n<\/ul>\n<\/li>\n<li>Describe network virtualization concepts\n<ul>\n<li>LISP<\/li>\n<li>VXLAN<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2><strong>Infrastructure\uff0830%\uff09<\/strong><\/h2>\n<ol>\n<li>Layer 2\n<ul>\n<li>Troubleshoot static and dynamic 802.1q trunking protocols<\/li>\n<li>Troubleshoot static and dynamic EtherChannels<\/li>\n<li>Configure and verify common Spanning Tree Protocols (RSTP, MST) and Spanning Tree enhancements such as root guard and BPDU guard<\/li>\n<\/ul>\n<\/li>\n<li>Layer 3\n<ul>\n<li>Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. link state, load balancing, path selection, path operations, metrics, and area types)<\/li>\n<li>Configure simple OSPFv2\/v3 environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point, and broadcast network types, and passive-interface)<\/li>\n<li>Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)<\/li>\n<li>Describe policy-based routing<\/li>\n<\/ul>\n<\/li>\n<li>Wireless\n<ul>\n<li>Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference, noise, bands, channels, and wireless client devices capabilities<\/li>\n<li>Describe AP modes and antenna types<\/li>\n<li>Describe access point discovery and join process (discovery algorithms, WLC selection process)<\/li>\n<li>Describe the main principles and use cases for Layer 2 and Layer 3 roaming<\/li>\n<li>Troubleshoot WLAN configuration and wireless client connectivity issues using GUI only<\/li>\n<li>Describe wireless segmentation with groups, profiles, and tags<\/li>\n<\/ul>\n<\/li>\n<li>IP Services\n<ul>\n<li>Interpret network time protocol configurations such as NTP and PTP<\/li>\n<li>Configure NAT\/PAT<\/li>\n<li>Configure first hop redundancy protocols, such as HSRP, VRRP<\/li>\n<li>Describe multicast protocols, such as RPF check, PIM and IGMP v2\/v3<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2><strong>Network Assurance\uff0810%\uff09<\/strong><\/h2>\n<ol>\n<li>Diagnose network problems using tools such as debugs, conditional debugs, traceroute, ping, SNMP, and syslog<\/li>\n<li>Configure and verify Flexible NetFlow<\/li>\n<li>Configure SPAN\/RSPAN\/ERSPAN<\/li>\n<li>Configure and verify IPSLA<\/li>\n<li>Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management<\/li>\n<li>Configure and verify NETCONF and RESTCONF<\/li>\n<\/ol>\n<h2><strong>Security\uff0820%\uff09<\/strong><\/h2>\n<ol>\n<li>Configure and verify device access control\n<ul>\n<li>Lines and local user authentication<\/li>\n<li>Authentication and authorization using AAA<\/li>\n<\/ul>\n<\/li>\n<li>Configure and verify infrastructure security features\n<ul>\n<li>ACLs<\/li>\n<li>CoPP<\/li>\n<\/ul>\n<\/li>\n<li>Describe REST API security<\/li>\n<li>Configure and verify wireless security features\n<ul>\n<li>802.1X<\/li>\n<li>WebAuth<\/li>\n<li>PSK<\/li>\n<li>EAPOL (4-way handshake)<\/li>\n<\/ul>\n<\/li>\n<li>Describe the components of network security design\n<ul>\n<li>Threat defense<\/li>\n<li>Endpoint security<\/li>\n<li>Next-generation firewall<\/li>\n<li>TrustSec and MACsec<\/li>\n<li>Network access control with 802.1X, MAB, and WebAuth<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2><strong>Automation\uff0815%\uff09<\/strong><\/h2>\n<ol>\n<li>Interpret basic Python components and scripts<\/li>\n<li>Construct valid JSON-encoded files<\/li>\n<li>Describe the high-level principles and benefits of a data modeling language, such as YANG<\/li>\n<li>Describe APIs for Cisco DNA Center and vManage<\/li>\n<li>Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF<\/li>\n<li>Construct an EEM applet to automate configuration, troubleshooting, or data collection<\/li>\n<li>Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack<\/li>\n<\/ol>\n<h1>ENARSI 300-410: Implementing Cisco Enterprise Advanced Routing and Services<\/h1>\n<h2>Layer 3 Technologies (35%)<\/h2>\n<ol>\n<li>Troubleshoot administrative distance (all routing protocols)<\/li>\n<li>Troubleshoot route map for any routing protocol (attributes, tagging, filtering)<\/li>\n<li>Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route poisoning)<\/li>\n<li>Troubleshoot redistribution between any routing protocols or routing sources<\/li>\n<li>Troubleshoot manual and auto-summarization with any routing protocol<\/li>\n<li>Configure and verify policy-based routing<\/li>\n<li>Configure and verify VRF-Lite<\/li>\n<li>Describe Bidirectional Forwarding Detection<\/li>\n<li>Troubleshoot EIGRP (classic and named mode; VRF and global)\n<ul>\n<li>Address families (IPv4, IPv6)<\/li>\n<li>Neighbor relationship and authentication<\/li>\n<li>Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in active)<\/li>\n<li>Stubs<\/li>\n<li>Load balancing (equal and unequal cost)<\/li>\n<li>Metrics<\/li>\n<\/ul>\n<\/li>\n<li>Troubleshoot OSPF (v2\/v3)<br \/>\n<h3>Address families (IPv4, IPv6)<\/h3>\n<h3>Neighbor relationship and authentication<\/h3>\n<h3>Network types, area types, and router types<\/h3>\n<ul>\n<li>Point-to-point, multipoint, broadcast, nonbroadcast<\/li>\n<li>Area type: backbone, normal, transit, stub, NSSA, totally stub<\/li>\n<li>Internal router, backbone router, ABR, ASBR<\/li>\n<li>Virtual link<br \/>\n<h3>Path preference<\/h3>\n<\/li>\n<\/ul>\n<\/li>\n<li>Troubleshoot BGP (Internal and External, unicast, and VRF-Lite)\n<ul>\n<li>Address families (IPv4, IPv6)<\/li>\n<li>Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private AS, route refresh, synchronization, operation, peer group, states and timers)<\/li>\n<li>Path preference (attributes and best-path)<\/li>\n<li>Route reflector (excluding multiple route reflectors, confederations, dynamic peer)<\/li>\n<li>Policies (inbound\/outbound filtering, path manipulation)<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2>VPN Technologies (20%)<\/h2>\n<ol>\n<li>Describe MPLS operations (LSR, LDP, label switching, LSP)<\/li>\n<li>Describe MPLS Layer 3 VPN<\/li>\n<li>Configure and verify DMVPN (single hub)\n<ul>\n<li>GRE\/mGRE<\/li>\n<li>NHRP<\/li>\n<li>IPsec<\/li>\n<li>Dynamic neighbor<\/li>\n<li>Spoke-to-spoke<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2>Infrastructure Security (20%)<\/h2>\n<ol>\n<li>Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)<\/li>\n<li>Troubleshoot router security features\n<ul>\n<li>IPv4 access control lists (standard, extended, time-based)<\/li>\n<li>IPv6 traffic filter<\/li>\n<li>Unicast reverse path forwarding (uRPF)<\/li>\n<\/ul>\n<\/li>\n<li>Troubleshoot control plane policing (CoPP) (Telnet, SSH, HTTP(S), SNMP, EIGRP, OSPF, BGP)<\/li>\n<li>Describe IPv6 First Hop security features (RA guard, DHCP guard, binding table, ND inspection\/snooping, source guard)<\/li>\n<\/ol>\n<h2>Infrastructure Services (25%)<\/h2>\n<ol>\n<li>Troubleshoot device management\n<ul>\n<li>Console and VTY<\/li>\n<li>Telnet, HTTP, HTTPS, SSH, SCP<\/li>\n<li>(T)FTP<\/li>\n<\/ul>\n<\/li>\n<li>Troubleshoot SNMP (v2c, v3)<\/li>\n<li>Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs, timestamps)<\/li>\n<li>Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP options)<\/li>\n<li>Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay, connectivity)<\/li>\n<li>Troubleshoot NetFlow (v5, v9, flexible NetFlow)<\/li>\n<li>Troubleshoot network problems using Cisco DNA Center assurance (connectivity, monitoring, device health, network health)<\/li>\n<\/ol>\n<blockquote>\n<p>\u53c2\u8003\u8d44\u6599\uff1a<br \/>\n<a href=\"https:\/\/learningnetwork.cisco.com\/s\/ccnp-enterprise\">https:\/\/learningnetwork.cisco.com\/s\/ccnp-enterprise<\/a><br \/>\n<a href=\"https:\/\/learningnetwork.cisco.com\/s\/enarsi-exam-topics\">https:\/\/learningnetwork.cisco.com\/s\/enarsi-exam-topics<\/a><br \/>\n<a href=\"https:\/\/learningnetwork.cisco.com\/s\/encor-exam-topics\">https:\/\/learningnetwork.cisco.com\/s\/encor-exam-topics<\/a><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>\u672c\u6587\u7b80\u5355\u4ecb\u7ecd\u4e86CCNP Enterprise \u8ba4\u8bc1\u8003\u8bd5\u7684\u79d1\u76ee\u5185\u5bb9\uff0c\u4e3b\u8981\u4ecb\u7ecd\u4e86CCNP 350-401 ENCOR \u548cCCNP 300-410 ENARSI\u7684\u8003\u8bd5\u5185\u5bb9\u53ca\u5360\u6bd4\uff0c\u5e76\u5217\u4e3e\u51fa\u8ba4\u8bc1\u9700\u8981\u638c\u63e1\u7684\u77e5\u8bc6\u70b9\u3002<\/p>\n","protected":false},"author":3,"featured_media":429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_jetpack_memberships_contains_paid_content":false},"categories":[29],"tags":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/blog.devops955.com\/swain\/wp-content\/uploads\/sites\/2\/2024\/04\/Cisco-Logo.jpg","_links":{"self":[{"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/posts\/412"}],"collection":[{"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/comments?post=412"}],"version-history":[{"count":9,"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/posts\/412\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/posts\/412\/revisions\/453"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/media\/429"}],"wp:attachment":[{"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/media?parent=412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/categories?post=412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.devops955.com\/swain\/wp-json\/wp\/v2\/tags?post=412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}