- 20 hours on-demand video
- 3 downloadable resources
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Configure, verify and Troubleshoot medium to large scale EIGRP Networks
- Configure, verify and Troubleshoot medium to large scale OSPF Networks
- Configure, verify and Troubleshoot medium to large scale BGP Networks
- Its recommended to posses the CCNA certification
CCNP ROUTE is the cornerstone of the CCNP certification. Advanced routing is a critical skill for today's network administrators that work with LANs/WANs of any medium-to-large organization. In this course, we cover well known technologies such as EIGRP, BGP, OSPF, IPv6 and route redistribution.
Our goal is that you are not only able to pass the certification exam but that you gain a thorough understanding of these key technologies and protocols.
We are working right now to bring you videos of IPv6 for this exam as soon as possible.
This course comes straight out from our subscription based site: networkfaculty.com/en/
A preview of each video available in this course can be seen in here:
- Network Administrators
- CCNA holders wanting to get into the next level certification
- Professionals wanting to get deep understanding on protocols like EIGRP, OSPF and BGP
- Candidates looking to get the CCNP certification
In this video we discuss the different timers that EIGRP implements, and the configuration and verification procedures to implement them.
Basic configuration, verification and troubleshooting procedures for EIGRP on Cisco IOS devices.
In this video we are going to explore the different packets types and messages that EIGRP uses to operate.
In this video we will explore how EIGRP calculate the metric and the influence that the K values have on it. We will also see how we can change the K values and how to manually calculate the metric using a formula
In this video we will how the EIGRP DUAL algorithm works and the different commands we have available to verify its operation
In this video we are going to see the implications of running EIGRP on a hub and spoke topology, how the L2/L3 address resolution works, and considerations regarding the next-hop. We will see all the procedure to configure and verify this kind of setups.
In this video we are going to explore the EIGRP capabilities to do load share (commonly called load balance), the function of the variance feature, and the different commands to verify and troubleshoot this functionality
In this session we will see how we can configure the announcements of summarized routes from more specific prefixes on EIGRP, using Cisco IOS devices.
In this video we are going to discuss how to configure leak maps on EIGRP to allow just a specific set of routes to "leak" after doing summarization
In this video we explain how the stub feature works on EIGRP, together with the configuration and verification procedures.
In this session we explore how the EIGRP authentication works, and how to configure and verify its operation
Introduction to Link State protocols and how they compare with distance vector, general overview on the OSPF routing protocol, its performance, metric and the mechanisms that allows OSPF to scale
In this video we analyze the function of the router-id in OSPF, why is a key element in the SPF calculations, its role on the LSA advertisements and what may happen if we found the same router-id on two devices not directly connected
In this video we the function of the areas, how the protocol behaves when dealing with multiple areas, and a high level overview on how the protocol advertises information between areas
In this session we define what are the: Internal Routers, Area Border Routers (ABR), Backbone Routers and AS Boundary Routers (ASBR)
Description of how OSPF adjacencies are formed, the OSPF FSM, analysis on the parameters that must match or be equal for two devices to reach the FULL state
Introduction to OSPF behavior in multi-access segments. We will provide an overview on how the DR/BDR work and why OSPF uses this kind of mechanisms
Function, structure and types of LSA used by OSPF for the exchange of information
Basic OSPF Configuration in a multi area topology on Cisco IOS devices. Common verification and troubleshooting procedures
Operation Hello and Dead interval. How they behave in different types of networks and their influence on the formation of adjacencies.
Configuring Hello / Dead timer in Cisco IOS devices and how to verify and troubleshoot its operation.
OSPF point-to-point and point-to-multipoint Network types. How they behave, implications and default timers
Configuration, verification and troubleshooting procedures for the OSPF network types: Point-To-Point and Point-to-Multipoint on Cisco IOS devices.
Operation of the OSPF broadcast and non-broadcast network types, selection of the DR / BDR roles and overall operation.
Configuration, verification and troubleshooting of the OSPF network types: broadcast and non-broadcast OSPF on Cisco IOS devices.
In this video we go into the operation details of the OSPF LSA 1 (router LSA) and LSA 2 (network LSA), what information they represent and contain and their impact on the general performance of the OSPF routing protocol
In this session we explore in detail the operation of the Summary LSA (Type 3), what information they represent and contain, together with the details of how OSPF routers calculate the metric.
Details on how the OSPF LSA 4 (ASBR-Summary) and LSA 5 (External) operate and what information they contain. We'll take special attention into how the calculations are made to reach external routes.
Operation of LSA Type 7 on NSSA areas. How translation is performed by the ABR's from a LSA Type 7 to a LSA type 5 and the calculations performed with the forward address to get the metric to any specific route
In this session we will see how to modify and check the cost on Cisco IOS devices for the OSPF routing protocol (interface level and global configuration)
In this session we analyze the operation of the area 0 (backbone) and regular areas, what optimization they provide and the benefit of using multiple areas
In this video we explore how stub and totally stub areas (stub no-summary) work, what OSPF LSA they filter and how OSPF provide connectivity to the routes that are lost with this LSA filtering
We explore in this session the operation of NSSA and totally NSSA areas (NSSA no-summary) what LSA types they filter, how Type 7 LSA are translated to Type 5 LSA and how routing is done within these areas
In this session we configure different stub area types of OSPF (stub, totally stub, NSSA and totally NSSA). We will observe independently the behavior of each of them and their implications.
In this video we go deep into the details behind the operation of the OSPF authentication, authentication types and their implications
Configuration, verification and troubleshooting of OSPF authentication on Cisco IOS devices. In this video we work with all different authentication types available and how to fix any problem that may show up using this security feature
In this session we explore the details behind the operation of virtual links, why they exist, the most common uses and the implications of using them
Configuration, verification and troubleshooting of OSPF virtual links on Cisco IOS devices
This video will show you how to generate a default route into OSPF on Cisco IOS devices, with three possible scenarios and configurations.
In this video we will provide an introduction to BGP, its philosophy and operation at a very high level. We'll see concepts like the mechanics of Path vector protocols, BGP conceptual differences with IGP's and an introduction to the use of attributes for routing.
In this session we explore the different messages used by BGP to establish sessions, warn of possible errors, exchange information and keep up sessions. These messages are: OPEN, NOTICE, UPDATE and KEEPALIVE.
In this video we will see how sessions are established between two endpoints running BGP. Analyze the implications of using TCP as the transport protocol and the BGP Finite State Machine.
This video will show you how to setup a session between two BGP neighbors on Cisco IOS devices. You will see the different commands to check the protocol status, the TCP-level implications, and how to solve common problems and troubleshooting procedures (with corresponding debugs).
This video will show you what are the capabilities of BGP, how they are negotiated and represented in the BGP OPEN message. We will pay special attention to one of the most important capability: Multiprotocol Extension.
In this session we will explore the different types of attributes that BGP uses, we will see what are the characteristics and scope of each of them, along with some examples.
In this video we will look at how the autonomous systems numbers are structure, the operation of the AS-Path attribute, introduction to using private autonomous system number and the numbers of 4 bytes
In this video we explain the BGP decision algorithm. We will go through each of the path selection steps that the protocol takes to select which of the different paths received is the best.
In this video we will explore the different BGP authentication methods, concentrating on the authentication provided by the transport layer (TCP) using MD5 and its implications.
In this video we will explore how we can implement BGP MD5 authentication on Cisco IOS devices using the mechanism provided by TCP. Special attention is taken to the verification and troubleshooting procedures.
In this video we will explore how iBGP sessions work. We will focus on the implications of these sessions in terms of next-hop, the advertisements between iBGP sessions, the AS-Path management and synchronization.
In this session we will see how we can check and configure iBGP sessions on Cisco IOS devices. We will see the implications of these sessions in the management of the Next-Hop, advertisements between iBGP routers and synchronization.
In this video we will explore eBGP sessions, the controls that the protocols implements for session establishment, TTL considerations and Next-Hop management.
In this chapter we will explore the configuration and verification procedures for eBGP sessions on Cisco equipment. We will focus in features like ttl-security settings, ebgp-multihop and disable-connected-check.
In this video we explore how we can create Network Layer Reachability Information of IPv4 networks. We will also see how we can modify the attributes of the advertisements with the network or redistribute commands in Cisco IOS.