The CCNP/ This course is ideal for individuals looking to deepen their knowledge of core Cisco technologies and prepare for both CCNP (Cisco Certified Network Professional) and CCIE (Cisco Certified Internetwork Expert) certifications.
The CCNP/ This course is ideal for individuals looking to deepen their knowledge of core Cisco technologies and prepare for both CCNP (Cisco Certified Network Professional) and CCIE (Cisco Certified Internetwork Expert) certifications.
The ENCOR 300-415 exam focuses on the implementation, configuration, and management of various Cisco networking technologies that are foundational to modern enterprise networks. Topics include routing and switching, security, automation, and advanced network services, providing a robust foundation for professionals who want to optimize and manage the network infrastructure of large-scale organizations.
In today’s fast-evolving network environments, companies demand professionals who can design and manage complex, scalable, and secure networks. This course covers the essentials and provides practical, hands-on experience with critical technologies, such as SD-WAN, VPNs, QoS, and network security. You'll also gain expertise in advanced routing protocols, including
Completing the CCNP/ It is tailored to ensure that professionals can implement cutting-edge solutions and troubleshoot network challenges effectively, enabling organizations to thrive in the digital age.
By mastering the skills taught in this course, you will be well-positioned to advance your career and take on high-impact roles in enterprise networking. Take the next step towards becoming a network leader and earn the credibility and opportunities that come with CCNP and CCIE certification.
1- Transmission Control Protocol/Internet Protocol (TCP/IP) Model Introduction
2- Open Systems Interconnection (OSI) Model Introduction
3- media access control (MAC) Introduction
4- Collision Domains Introduction
5- Carrier Sense Multiple Access/Collision Detect (CSMA/CD) Introduction
6- Collision Domains on a Hub Versus a Switch Introduction
7- Switch Unicast and Broadcast Traffic Patterns Introduction
8- Known and Unknown Unicast Frame Introduction
1- Virtual LANs Introduction
2- Virtual LANs Configuration
3- Virtual LANs Verification
4- Access Ports Introduction
5- Access Ports Configuration
6- Access Ports Verification
7- Trunk Ports Introduction
8- Trunk Ports Configuration
9- Trunk Ports Verification
10- IEEE802.1Q Protocol Introduction
11- Tag protocol identifier (TPID) Introduction
12- Priority code point (PCP) Introduction
13- Drop elgible indicator (DEI) Introduction
14- VLAN identifier (VLAN ID) Introduction
1- Native VLANs Introduction
2- Native VLANs Configuration
3- Native VLANs Verification
4- Allowed VLANs Introduction
5- Allowed VLANs Configuration
6- Allowed VLANs Verification
7- Layer 2 Diagnostic Commands Introduction
8- MAC Address Table Verification Commands
9- Switch Port Status Verification Commands
10- Interface Status Verification Commands
1- Layer 3 Forwarding Introduction
2- Local Network Forwarding Introduction
3- Address Resolution Protocol (ARP) Introduction
4- Packet Routing Introduction
5- IP Address Assignment Introduction
6- IPv6 Address Assignment Introduction
7- Routed Subinterfaces Introduction
8- Switched Virtual Interfaces [SVI] Introduction
9- Routed Switch Ports Introduction
10- Verification of IP Addresses Introduction
11- Verification of IPv6 Addresses Introduction
1- Forwarding Architectures Introduction
2- Process switching Introduction
3- Fast switching Introduction
4- Cisco Express Forwarding [CEF] Introduction
5- Application-Specific Integrated Circuits (ASICs) Introduction
6- Network Processing Units (NPUs) Introduction
7- Ternary Content Addressable Memory [TCAM] Introduction
8- Content Addressable Memory [CAM] Introduction
9- Centralized Forwarding Introduction
10- Distributed Forwarding Introduction
11- Software CEF Introduction
12- Hardware CEF Introduction
1- Stateful Switchover [SSO] Introduction
2- Checkpointing Introduction
3- Nonstop forwarding (NSF) Introduction
4- Nonstop routing (NSR) Introduction
5- SDM Templates Introduction
6- Switching Database Manager (SDM) Introduction
7- Switching Database Manager (SDM) Configuration
8- Switching Database Manager (SDM) Verification
1- The Need to Spanning Tree Protocol [STP] Introduction
2- The STP Root Bridge Introduction
3- The STP Root Port Role Introduction
4- The STP Designated Port Role Introduction
5- The STP Bridge ID Introduction
6- STP Bridge Priority Configuration
7- The STP Bandwidth/Cost Introduction
8- The Importance of STP Root Bridge in Active Topology
1- The STP Tie Breakers Introductions
2- The STP Tie Breakers for Root Port Election Introductions
3- The STP Tie Breakers for Designated Port Election Introductions
4- The STP Alternate Port Introduction
5- The STP Backup Port Introduction
6- The Per VLAN STP Plus [PVST+] Introduction
7- The Per VLAN STP Plus [PVST+] Configuration
8- The Per VLAN STP Plus [PVST+] Verification
1- The STP Real Scenario Introductions
2- Modifying the Root Bridge Election Introductions
3- The STP Primary Root Bridge Introductions
4- The STP Primary Root Bridge Configuration
5- The STP Secondary Root Bridge Introductions
6- The STP Secondary Root Bridge Configuration
7- The STP Bridge Protocol Data Unit [BPDU] Fields Introduction
8- The STP Standards and Models Introduction
9- The STP Modes Configuration
1- The Traditional Spanning Tree Protocol Review
2- The Rapid Spanning Tree Protocol [RSTP] Introduction
3- The Rapid Spanning Tree Protocol [RSTP] Configuration
4- The Rapid Spanning Tree Protocol [RSTP] Verification
5- The RSTP Synchronization Introduction
6- The RSTP Roles Introduction
7- The RSTP States Introduction
8- The RSTP Link Types Introduction
9- Comparing STP and RSTP
1- The STP Convergence Introduction
2- The STP Listening State Introduction
3- The STP Learning State Introduction
4- The STP Topology Change Notification [TCN] Introduction
5- The STP Direct Topology Change Introduction
6- The STP InDirect Topology Change Introduction
7- The STP Insignificant Topology Change Introduction
8- The STP Hello Timer Introduction
9- The STP Forward Delay Timer Introduction
10- The STP Max Age Timer Introduction
11- The STP Portfast Feature Introduction
12- The STP Portfast Feature Configuration
13- The STP Portfast Feature Verification
14- The STP Portfast Introduction
15- The STP Portfast Configuration
16- The STP Portfast Verification
17- The STP BPDU-Guard Introduction
18- The STP BPDU-Guard Configuration
19- The STP BPDU-Guard Verification
20- The Interface Err-Disabled Status Introduction
21- The STP Interface Cost Configuration
22- The STP Interface Cost Verification
23- The STP Interface Priority Configuration
24- The STP Interface Priority Verification
25- Recommendation for Root Bridge Place in STP
1- STP Topology Tuning Introduction
2- Root Bridge Placement Introduction
3- Modifying STP Root Port and Blocked Switch Port Locations Introduction
4- Modifying STP Port Cost Introduction
5- Modifying STP Port Priority Introduction
6- Spanning-tree vlan vlan-id priority priority Command Introduction , Configuration , Verification
7- spanning-tree vlan vlan-id root {primary | secondary} [diameter diameter] Command Introduction , Configuration , Verification
8- spanning tree [vlan vlan-id] cost cost Introduction , Configuration , Verification
9- spanning-tree [vlan vlan-id] port-priority priority Introduction , Configuration , Verification
10- show spanning-tree [vlan vlan-id] detail Introduction , Verification
1- STP Protection Mechanisms Introduction
2- STP Root Guard Introduction
3- STP Root Guard Configuration
4- STP Root Guard Verification
5- STP Loop Guard Introduction
6- STP Loop Guard Configuration
7- STP Loop Guard Verification
8- Unidirectional Link Detection (UDLD) Introduction
9- Unidirectional Link Detection (UDLD) Configuration
10- Unidirectional Link Detection (UDLD) Verification
11- BPDU Filter Introduction
12- BPDU Filter Configuration
13- BPDU Filter Verification
14- STP Portfast Introduction
15- STP Portfast Configuration
16- STP Portfast Verification
1- Multiple Spanning Tree Protocol Introduction
2- MST Instances (MSTIs) Introduction
3- MST Configuration Introduction
4- MST Verification Introduction
5- MST Tuning Introduction
6- Common MST Misconfigurations Introduction
7- VLAN Assignment to the IST Introduction
8- VLAN Assignment to the IST Configuration
9- Trunk Link Pruning Introduction
10- MST Region Boundary Introduction
11- PVST simulation mechanism Introduction
12- PVST simulation mechanism Configuration
13- PVST simulation check Introduction
14- PVST simulation check Configuration
1- Dynamic Trunking Protocol [DTP] Introduction
2- Dynamic Trunking Protocol [DTP] Configuration
3- Dynamic Trunking Protocol [DTP] Verification
4- DTP Administrative Mode Introduction
5- DTP Operational Mode Introduction
6- DTP Administrative Encapsulation Mode Introduction
7- DTP Operational Encapsulation Mode Introduction
1- VLAN Trunking Protocol [VTP] Introduction
2- VLAN Trunking Protocol [VTP] Domain Introduction
3- VLAN Trunking Protocol [VTP] Modes [ Server | Client | Transparent | off ] Introduction
4- VLAN Trunking Protocol [VTP] Versions [ 1,2,3 ] Introduction
5- VLAN Trunking Protocol [VTP] Configuration Revision Number Introduction
6- VLAN Trunking Protocol [VTP] Message Types [ Summary | Subset | Client Request ] Introduction
7- VLAN Trunking Protocol [VTP] Domain Configuration
8- VLAN Trunking Protocol [VTP] Modes Configuration
9- VLAN Trunking Protocol [VTP] Versions Configuration
10- VLAN Trunking Protocol [VTP] Verification Introduction
1- The Need to EtherChannel Introduction
2- The EtherChannel Requirement Introduction
3- The EtherChannel Configuration Methods Introduction
4- The Etherchannel Configuration with Manual Method
5- The Etherchannel Configuration with PAgP
6- The Etherchannel Configuration with LACP
7- The EtherChannel Verification
8- The EtherChannel Load-Balancing Introduction
9- The L3 EtherChannel Introduction
10- The L3 EtherChannel Configuration
11- The L3 EtherChannel Verification
1- Routing Table Introduction
2- Routing Table Fields Introduction
3- Routing Table Verification Command Introduction
4- Static Route Configuration with Outgoing Interface
5- Static Route Configuration with Next Hop IP Address
6- Static Route Configuration with Outgoing Interface and Next Hop IP Address
7- ARP Proxy Feature Introduction
8- Compare three Method of Static Route Configuration
9- The ICMP Destination Host Unreachable Introduction
10- The Usage of "do" in CLI Introduction
1- Static Route Advantages Introduction
2- Static Route DisAdvantages Introduction
3- Static default Route Introduction
4- Static default Route Configuration
5- Static default Route Verification
6- Static default Route Usage in Internet Connectivity
7- Load Sharing Configuration with Static Route
8- Fault Tolerance Configuration with Static Route
9- Static Host Route Configuration
10- Administrative Distance [AD] Introduction
11- Floating Static Route Introduction
12- Routing Table Verification
1- IPv6 Connected Route Introduction
2- IPv6 Local Route Introduction
3- IPv6 Static Route Introduction
4- IPv6 Static Route Configuration with Outgoing Interface
5- IPv6 Static Route Configuration with Outgoing Interface and Global Unicast Address Next-Hop
6- IPv6 Static Route Configuration with Outgoing Interface and Link Local Address Next-Hop
7- IPv6 Static Route Configuration with Global Unicast Address Next-Hop
8- IPv6 Connected Route Verification
9- IPv6 Local Route Verification
10-IPv6 Static Route Verification
11-IPv6 Static Default Route Introduction
12-IPv6 Static Default Route Configuration
13-IPv6 Static Default Route Verification
14- IP Static Discard route Introduction
15- IP Static Discard route Configuration
16- IP Static Discard route Verification
1- Dynamic Routing Protocol Introduction
2- Routed Protocol / Routable Protocol Introduction
3- Autonomous System [AS] Introduction
4- Interior Gateway Protocols [IGP] Introduction
5- Exterior Gateway Protocols [EGP] Introduction
6- IGP vs. EGP Introduction
7- IGP Routing Protocol Categories
8- Metric Calculation in IGPs Introduction
9- Distance Vector Algorithm Introduction
10- Link State Algorithm Introduction
11- Path Vector Vector Algorithm Introduction
1- Routing Table Basics
2- ICMP Echo Request , ICMP Echo Reply , ICMP Destination Host Unreachable
3- Static Route Configuration with Outgoing Interface
4- Static Route Configuration with Next Hop IP Address
5- Static Route Configuration with Outgoing Interface and Next Hop IP Address
6- Static Route Verification
7- VRF Lite Routing Concept
8- VRF Lite Routing Configuration with Static Routing
9- VRF Lite Routing Verification
10- VRF Lite using Subinterfaces concept
11- VRF Lite using Subinterfaces configuration
12- VRF Lite using Subinterfaces verification
13- VRF Lite using Subinterfaces capture
14- Compare Physical Network and Virtual Network with eachother
15- VRF Lite Configuration for Dual Stack Concept
16- VRF Lite Configuration for Dual Stack with VRF Defnition Command
17- VRF Lite for Dual Stack verification
1- Enhanced Interior Gateway Routing Protocol [EIGRP] Introduction
2- EIGRP Neighborship Process Introduction
3- EIGRP Path Exchange Introduction
4- EIGRP Topology Table Introduction
5- EIGRP Process Introduction
6- EIGRP Classic Configuration Introduction
7- EIGRP Named Configuration Introduction
8- EIGRP Classic Configuration Example
9- EIGRP Named Configuration Example
10- EIGRP Classic Configuration Verification
11- EIGRP Named Configuration Verification
12- EIGRP Router-ID Introdution
13- EIGRP Router-ID Configuration
1- EIGRP Multicast Address Introduction
2- EIGRP Messages Introduction
3- EIGRP Hello Message Introduction
4- EIGRP Passive Interface Introduction
5- EIGRP Passive Interface Configuration in Classic Mode
6- EIGRP Passive Interface Configuration in Named Mode
7- EIGRP Neighborship Conditions Introduction
8- EIGRP Authentication Introduction
9- Key Chain Introduction
10- EIGRP Authentication Configuration in Classic Mode
11- EIGRP Authentication Configuration in Named Mode
12- EIGRP K Values Introduction
13- EIGRP K Values Configuration in Classic Mode
14- EIGRP K Values Configuration in Named Mode
15- EIGRP Hello Interval Introduction
16- EIGRP Hold Time Introduction
17- EIGRP Hello Interval Configuration in Classic Mode
18- EIGRP Hello Interval Configuration in Named Mode
19- EIGRP Hold Time Configuration in Classic Mode
20- EIGRP Hold Time Configuration in Named Mode
1- Interface Bandwidth Introduction
2- Interface Delay Introduction
3- Interface Load Introduction
4- Interface Reliability Introduction
5- Interface MTU Introduction
6- EIGRP Update Introduction
7- EIGRP Update Metric Parammeters Introduction
8- EIGRP Update Non-Metric Parammeters Introduction
9- EIGRP Classic Path Metric Calculation Introduction
10- EIGRP Classic Path Metric Calculation Calculation
11- EIGRP Classic Path Metric Calculation Shortcomings
12- EIGRP Wide Path Metric Calculation Introduction
13- EIGRP Wide Path Metric Calculation Calculation
14- EIGRP Wide Metric Metric Backward Compatibility Introduction
1- EIGRP Successor Path [S] Introduction
2- EIGRP Feasible Successor [FS] Introduction
3- EIGRP Feasible Distance [FD] Introduction
4- EIGRP Reported Distance [RD] Introduction
5- EIGRP Feasibility Condition Introduction
6- EIGRP Query/Reply Mechanism Introduction
7- EIGRP SIA-Query/SIA Reply Introduction
8- EIGRP Active Timer Introduction
9- EIGRP Active Timer Configuration in Traditional Configuration
10- EIGRP Active Timer Configuration in Named Configuration
11- EIGRP Passive / Active Path Introduction
12- EIGRP Stuck in Active [SIA] Introduction
1- EIGRP Load Balancing Introduction
2- EIGRP Equal Cost Multi Path [ECMP] Introduction
3- EIGRP Equal Cost Multi Path [ECMP] Classic Configuration
4- EIGRP Equal Cost Multi Path [ECMP] Named Configuration
5- EIGRP Equal Cost Multi Path [ECMP] Verification
6- EIGRP Unequal Cost Load Balancing [UCLB] Introduction
7- EIGRP Variance Multiplier Introduction
8- EIGRP Unequal Cost Load Balancing [UCLB] Classic Configuration
9- EIGRP Unequal Cost Load Balancing [UCLB] Named Configuration
10- EIGRP Unequal Cost Load Balancing [UCLB] Verification
1- Route Summarization Introduction
2- EIGRP Route Summarization Introduction
3- EIGRP Interface Specific Summarization Introduction
4- EIGRP Summarization Metric Introduction
5- EIGRP Interface Specific Summarization Classic Configuration
6- EIGRP Summary Metric Classic Configuration
7- EIGRP Interface Specific Summarization Named Configuration
8- EIGRP Summary Metric Named Configuration
9- EIGRP Summary Route (Discard Route) Introduction
10- EIGRP Automatic Summarization Introduction
11- EIGRP Automatic Summarization Classic Configuration
12- EIGRP Automatic Summarization Named Configuration
1- Open Shortest Path First [OSPF] Introduction
2- Open Shortest Path First [OSPF] Fundamentals
3- OSPF Internal Router Introduction
4- OSPF Area Border Router (ABR) Introduction
5- OSPF Backbone Router Introduction
6- OSPF Autonomous System Boundary Router (ASBR) Introduction
7- OSPF Considerations Introduction
8- OSPF Area Fundamentals
9- OSPF Area's Advantages Introduction
10- Link State (LS) Algorithm Introduction
1- OSPF Traditional (Network Command) Introduction
2- OSPF Traditional (Network Command) Configuration
3- OSPF Traditional (Network Command) Verification
4- OSPF Interface Specific (Explicit Command) Introduction
5- OSPF Interface Specific (Explicit Command) Configuration
6- OSPF Interface Specific (Explicit Command) Verification
7- OSPF Router-ID Introduction
8- OSPF Router-ID Configuration
9- OSPF Router-ID Verification
10- OSPF Passive-Interface Introduction
11- OSPF Passive-Interface Configuration
12- OSPF Passive-Interface Verification
13- OSPF Cost Introduction
1- OSPF Neighborship Introduction
2- OSPF Multicast Address Introduction
3- OSPF Hello Packet Introduction
4- OSPF Neighborship Requirement Introduction
5- OSPF Neighborship Router-ID Requirement
6- OSPF Neighborship Subnet Number Requirement
7- OSPF Neighborship MTU Requirement
8- OSPF Neighborship Area-ID Requirement
9- OSPF Hello Timer Introduction
10- OSPF Dead Timer Introduction
11- OSPF Hello Timer Configuration
12- OSPF Dead Timer Configuration
13- OSPF Neighborship Hello Timer Requirement
14- OSPF Neighborship Dead Timer Requirement
15- OSPF Authentication Types Introduction
16- OSPF Plain Text Authentication Configuration
17- OSPF Message Digest Authentication Configuration
1- OSPF Finite State Machine [FSM] Introduction
2- OSPF States Introduction
3- OSPF Down State Introduction
4- OSPF Init State Introduction
5- OSPF 2-Way State Introduction
6- OSPF Exstart State Introduction
7- OSPF Exchange State Introduction
8- OSPF Loading State Introduction
9- OSPF Full State Introduction
10- OSPF Attempt State Introduction
11- OSPF Static Neighborship Introduction
12- OSPF Static Neighborship Configuration
13- OSPF Static Neighborship Verification
14- OSPF Database Description [DBD] Introduction
15- OSPF Link State Request [LSR] Introduction
16- OSPF Link State Update [LSU] Introduction
17- OSPF Link State Acknowledgement [LSAck] Introduction
1- OSPF Designated Router [DR] Introduction
2- OSPF Backup Designated Router [BDR] Introduction
3- OSPF DRother Introduction
4- OSPF Priority Introduction
5- OSPF DR/BDR Selection Rules Introduction
6- OSPF DR/BDR Configuration
7- OSPF DR/BDR Verification
1- OSPF LSA Types Introduction
2- OSPF LSA Type-1 ( Router LSA ) Introduction
3- OSPF LSA Type-1 Contents Introduction
4- OSPF Stub Link Introduction
5- OSPF Single Area with Stub Links Configuration
6- OSPF LSA Type-1 Verification
7- OSPF LSA Age Introduction
8- OSPF LSA Sequence Number Introduction
9- OSPF LSA Refresh Time Introduction
1- OSPF LSA Type-1 Transit Link Introduction
2- OSPF LSA Type-2 ( Network LSA ) Introduction
3- OSPF LSA Type-2 Contents Introduction
4- OSPF LSA Type-2 Verification
5- OSPF Single Area with Stub and Transit Link Configuration
1- OSPF LSA Type-3 ( Summary LSA ) Introduction
2- OSPF LSA Type-3 Contents Introduction
3- OSPF LSA Type-3 Verification
4- OSPF LSA Type-3 LSA ID Introduction
1- OSPF Special Rule About Intra-Area and Inter-Area Routes Introduction
2- OSPF Special Rule About Intra-Area and Inter-Area Routes Configuration
3- OSPF Special Rule About Intra-Area and Inter-Area Routes Verification
4- Comparing OSPF Intra Area , Inter Area , External Type 2 , External Type 1
1- OSPF Default Route Advertisement Introduction
2- OSPF Default Information Originate Command Introduction
3- OSPF Default Information Originate Metric Command Introduction
4- OSPF Default Information Originate Metric-Type Command Introduction
5- OSPF Default Information Originate Always Command Introduction
6- OSPF Default Information Originate Route-Map Introduction
7- OSPF Default Route Advertisement with Single Edge Configuration
8- OSPF Default Route Advertisement with single Edge Verification
9- OSPF Default Route Advertisement with Multiple Edge Configuration
10- OSPF Default Route Advertisement with Multiple Edge Verification
1- OSPF Automatic Cost Introduction
2- OSPF Automatic Cost Reference Bandwidth Configuration
3- OSPF Automatic Cost Reference Bandwidth Verification
4- OSPF Manual Cost Introduction
5- OSPF Manual Cost Configuration
6- OSPF Manual Cost Verification
7- OSPF Path Selection Rules Introduction
8- OSPF Intra-Area Routes vs Inter-Area Routes Introduction
9- OSPF Intra-Area Routes vs Inter-Area Routes Verification
10- OSPF Inter-Area Routes vs Inter-Area Routes Introduction
11- OSPF Inter-Area Routes vs Inter-Area Routes Verification
12- OSPF Equal Cost Multi Path [ECMP] Introduction
13- OSPF Equal Cost Multi Path [ECMP] Configuration
14- OSPF Equal Cost Multi Path [ECMP] Verification
1- OSPF Summarization Introduction
2- OSPF Inter-Area Summarization Introduction
3- OSPF Inter-Area Summarization Configuration
4- OSPF Inter-Area Summarization Verification
5- OSPF Inter-Area Discard Route Introduction
6- OSPF Filtering with Inter-Area Summarization Command
1- OSPF Network Type Introduction
2- OSPF Point-to-Point Network Type Introduction
3- OSPF Point-to-Point Network Type Configuration
4- OSPF Broadcast Network Type Introduction
5- OSPF Broadcast Network Type Configuration
6- OSPF Non-Broadcast Network Type Introduction
7- OSPF Non-Broadcast Network Type Configuration
8- OSPF Point-to-Multipoint Network Type Introduction
9- OSPF Point-to-Multipoint Network Type Configuration
10- OSPF Point-to-Multipoint Non-Broadcast Network Type Introduction
11- OSPF Point-to-Multipoint Non-Broadcast Network Type Configuration
12- OSPF Loopback Network Type Introduction
13- OSPF Loopback Network Type Configuration
1- OSPF Filtering with Summarization Introduction
2- OSPF Filtering with Summarization Configuration
3- OSPF Filtering with Summarization Verification
4- OSPF Area Filtering Introduction
5- OSPF Area Filtering Configuration with IP Prefix List
6- OSPF Area Filtering Verification
7- Local OSPF Filtering Introduction
8- Local OSPF Filtering Configuration with Access Control List
9- Local OSPF Filtering Configuration with IP Prefix List
10- Local OSPF Filtering Configuration with Route Map
11- Local OSPF Filtering Verification
1- OSPFv3 Fundamentals Introduction
2- OSPFv3 Basic Configuration Command Introduction
3- OSPFv3 Verification Commands Introduction
4- OSPFv3 Example Configuration
5- OSPFv3 Example Verification
6- OSPFv3 Passive Interface Introduction and Configuration
7- OSPFv3 Summarization Introduction and Configuration
8- OSPFv3 Network Type Introduction and Configuration
9- OSPFv3 Link-Local Forwarding Introduction and Configuration
10- OSPFv3 Packet Types Introduction
1- OSPFv3 LSAs Introduction
2- OSPFv3 LSA Type-1 [ Router LSA ] Introduction
3- OSPFv3 LSA Type-2 [ Network LSA ] Introduction
4- OSPFv3 LSA Type-3 [ Inter-Area-Prefix LSA ] Introduction
5- OSPFv3 LSA Type-4 [ Inter-Area-Router LSA ] Introduction
6- OSPFv3 LSA Type-5 [ AS-External LSA ] Introduction
7- OSPFv3 LSA Type-6 [ Group-Membership LSA ] Introduction
8- OSPFv3 LSA Type-7 [ Type-7 LSA ] Introduction
9- OSPFv3 LSA Type-8 [ Link LSA ] Introduction
10- OSPFv3 LSA Type-9 [ Intra-Area-Prefix LSA ] Introduction
11- OSPFv3 LSA Flooding Scope Introduction
12- OSPFv3 LSA Type Code Introduction [ U / S2 / S1 / Function ]
13- OSPFv4 Option bits Introduction [ v6 / E / R / DC / MC / N ]
1- OSPFv3 Address Family Configuration Introduction
2- OSPFv3 Address Family Configuration
3- OSPFv3 Address Family Verification
4- OSPFv3 Address Family Show Command Introduction
1- Border Gateway Protocol [BGP] Introduction
2- Path Vector Protocol Introduction
3- BGP Update Message Introduction
4- BGP Path Attribute [PA] Introduction
5- BGP AS-Path PA Introduction
6- BGP AS-Path Best Path Selection Introduction
7- BGP AS-Path Loop Prevention Introduction
8- BGP Messages Introduction
9- TCP 3-Way Handshake Introduction
10- BGP Traditional Configuration
11- BGP Traditional Verification
12- BGP Address Family Configuration
13- BGP Address Family Verification
14- BGP Router-ID Introduction
15- BGP Router-ID Configuration
16- BGP Router-ID Verification
1- BGP Timers Introduction
2- BGP Keep Alive Introduction
3- BGP Keep Alive Interval Introduction
4- BGP Hold Time Introduction
5- BGP Keep Alive Configuration
6- BGP Keep Alive Verification
7- BGP Hold Time Configuration
8- BGP Hold Time Verification
9- BGP Neighborship Over Multiple Links Introduction
10- BGP Neighborship Over Multiple Links Configuration
11- BGP Neighborship Over Multiple Links Verification
12- BGP Finite State Machine [FSM] Introduction
13- BGP States Introudction
14- BGP IDLE , Connect , Active , OpenSent , OpenConfirm , Established State
1- BGP Table Introduction
2- BGP Update Introduction
3- BGP Methods for Injecting Routes into BGP Table Introduction
4- Injecting Routes into BGP Table with Network Command Introduction
5- Injecting Routes into BGP Table with Network Command Configuration
6- Injecting Routes into BGP Table with Network Command Verification
7- The Effect of Auto Summary Command to Network Statement
8- Injecting Routes into BGP Table with Redistribution Command Introduction
9- Injecting Routes into BGP Table with Redistribution Command Configuration
10- Injecting Routes into BGP Table with Redistribution Command Verification
11- The Effect of Auto Summary Command to Redistribution
1- BGP Summarization Introduction
2- Benefits of BGP Summarization Introduction
3- BGP Aggregation Command Introduction
4- BGP Aggregation Command with Summary-only Introduction
5- BGP Aggregation Command with AS-SET Introduction
6- BGP Aggreagtion Configuration
7- BGP Aggregation Command with Summary-only Configuration
8- BGP Aggregation Command with AS-SET Configuration
9- BGP AS-Path Segments Introduction
10- BGP Aggregator Attribute Introduction
11- BGP Atomic Aggregator Introduction
12- BGP Discard Route Introduction
1- Multi Protocol BGP [MP-BGP] Introduction
2- MP-BGP for IPv6 Configuration over IPv6 TCP Session Introduction
3- MP-BGP for IPv6 Configuration over IPv6 TCP Session Configuration
4- MP-BGP for IPv6 Configuration over IPv6 TCP Session Verification
5- MP-BGP for IPv6 Configuration over IPv4 TCP Session Introduction
6- MP-BGP for IPv6 Configuration over IPv4 TCP Session Configuration
7- MP-BGP for IPv6 Configuration over IPv4 TCP Session Verification
8- MP-BGP IPv6 Summarization Introduction
9- MP-BGP IPv6 Summarization Configuration
10- MP-BGP IPv6 Summarization Verification
11- BGP MP-REACH_NLRI Path Attribute Introduction
12- BGP MP-UNREACH_NLRI Path Attribute Introduction
1- Access Control List [ACL] Introduction
2- Access Control List [ACL] Process Introduction
3- Standard Numbered Access Control List [ACL] Introduction
4- Standard Named Access Control List [ACL] Introduction
5- Extended Numbered Access Control List [ACL] Introduction
6- Extended Named Access Control List [ACL] Introduction
7- Standard Access Control List [ACL] Configuration
8- Extended Access Control List [ACL] Configuration
9- Standard Access Control List [ACL] for IGP Introduction
10- Standard Access Control List [ACL] for IGP Configuration
11- Standard Access Control List [ACL] for BGP Introduction
12- Standard Access Control List [ACL] for BGP Configuration
13- Extended Access Control List [ACL] for IGP Introduction
14- Extended Access Control List [ACL] for IGP Configuration
15- Extended Access Control List [ACL] for BGP Introduction
16- Extended Access Control List [ACL] for BGP Configuration
1- IP Prefix List Introduction
2- IP Prefix List Process Introduction
3- IP Prefix List High Order Bit Pattern Introduction
4- IP Prefix List High Order Bit Count Introduction
5- IPv6 Prefix List Introduction
6- IP Prefix List Configuration
7- IP Prefix List Verification
8- IPv6 Prefix List Configuration
9- IPv6 Prefix List Verification
1- Route-Map Introduction
2- Route-Map Components Introduction
3- Route-Map Processing Order Introduction
4- Route-Map Match Conditions Introduction
5- Route-Map Optional Actions Introduction
6- Route-Map Multiple Match Conditions [Boolean OR] Introduction
7- Route-Map Multiple Match Conditions [Boolean OR] Configuration
8- Route-Map Multiple Match Conditions [Boolean AND] Introduction
9- Route-Map Multiple Match Conditions [Boolean AND] Configuration
10- Route-Map Continue Introduction
11- Route-Map Continue Configuration
1- BGP Filtering Introduction
2- BGP Filtering with ACL Configuration
3- BGP Loc-RIB Table Introduction
4- BGP Adj-RIB-In Table Introduction
5- BGP Adj-RIB-Out Table Introduction
6- BGP Soft Reconfiguration Inbound Introudction
7- BGP Filtering with ACL Verification
8- BGP Filtering with IP Prefix Configuration
9- BGP Filtering with IP Prefix Verification
10- BGP Filtering with Route-Map Configuration
11- BGP Filtering with Route-Map Verification
12- BGP Filtering with AS-Path ACL Configuration
13- BGP Filtering with AS-Path ACL Verification
14- BGP Regular Expression [REGEXP] Introduction
1- BGP Clear(Reset) Introduction
2- BGP Hard Clear Introduction
3- BGP Hard Clear Configuration
4- BGP Hard Clear Verification
5- BGP Outbound Soft Clear Introduction
6- BGP Outbound Soft Clear Configuration
7- BGP Outbound Soft Clear Verification
8- BGP Inbound Soft Clear Introduction
9- BGP Inbound Soft Clear Configuration
10- BGP Inbound Soft Clear Verification
1- BGP Community Introduction
2- BGP Community Configuration with Route-Map
3- BGP Community Advertisement Configuration
4- BGP Community New Format Presentation
5- BGP Community Replace Configuration
6- BGP Community Append Configuration
7- BGP Stundard Number Community List Configuration
8- BGP Stundard Named Community List Configuration
9- BGP Expanded Number Community List Configuration
10- BGP Expanded Named Community List Configuration
11- BGP Well-Known Community Introduction
12- BGP Internet Well-Known Community Introduction
13- BGP Internet Well-Known Community Configuration
14- BGP No-Advertise Well-Known Community Introduction
15- BGP No-Advertise Well-Known Community Configuration
16- BGP No-Export Well-Known Community Introduction
17- BGP No-Export Well-Known Community Configuration
18- BGP Local-As Well-Known Community Introduction
19- BGP Local-As Well-Known Community Configuration
1- BGP Path Selection Using the Longest Match Introduction
2- BGP Path Selection Using the Longest Match Configuration
3- BGP Path Selection Using the Longest Match Verification
4- BGP Path Selection Using the Longest Match Limitation
1- BGP Best Path Selection Rules
2- BGP Next Hop Reachability Requirement Introduction
3- BGP Weight Attribute introduction
4- BGP Weight Attribute Configuration per neighbor
5- BGP Weight Attribute Configuration per route
6- BGP Weight Attribute for Locally Injected Routes
7- BGP Weight Attribute Verification
1- BGP Best Path Selection RulesIntroduction
2- BGP Local Preference Introduction
3- BGP Local Preference Configuration Globally
4- BGP Local Preference Configuration per route
5- BGP Local Preference Verification
6- Routing Table Manager [RTM] Introduction
7- BGP RIB-Failure Introduction
8- BGP RIB-Failure Verification
1- BGP Best Path Selection Rules Introduction
2- BGP Preference of Locally Injected Path Introduction
3- BGP Preference of Locally Injected Path Verification
1- BGP Best Path Selection Rules Introduction
2- BGP Accumulated Interior Gateway Protocol (AIGP) Introduction
3- BGP Accumulated Interior Gateway Protocol (AIGP) Usage
4- BGP Accumulated Interior Gateway Protocol (AIGP) Configuration
5- BGP Accumulated Interior Gateway Protocol (AIGP) Verification
1- BGP Best Path Selection Rules Introduction
2- BGP AS-Path Introduction
3- BGP Best Path Selection with AS-Path Introduction
4- BGP Best Path Selection with AS-Path Verification
5- BGP AS-Path Prepending Introduction
6- BGP AS-Path Prepending Configuration
7- BGP AS-Path Prepending Verification
1- BGP Best Path Selection Rules Introduction
2- BGP Origin-Code Introduction
3- BGP Best Path Selection with Origin-Code Introduction
4- BGP Best Path Selection with Origin-Code Verification
5- BGP Policy Configuration with Origin Code
1- BGP Best Path Selection Rules Introduction
2- BGP Multi Exit Discriminator [MED] Introduction
3- BGP Multi Exit Discriminator [MED] Default Behavior Introduction
4- BGP Multi Exit Discriminator [MED] Default Behavior Verification
5- BGP Multi Exit Discriminator [MED] Inbound Policy Introduction
6- BGP Multi Exit Discriminator [MED] Inbound Policy Configuration
7- BGP Multi Exit Discriminator [MED] Inbound Policy Verification
1- BGP Best Path Selection Rules Introduction
2- BGP Best Path Selection about Prefer eBGP to iBGP Path Introduction
3- BGP Best Path Selection about Prefer eBGP to iBGP Path Configuration
4- BGP Best Path Selection about Prefer eBGP to iBGP Path Verification
1- BGP Best Path Selection Rules Introduction
2- BGP Best Path Selection about Lowest IGP Metric to Next-Hop Introduction
3- BGP Best Path Selection about Lowest IGP Metric to Next-Hop Configuration
4- BGP Best Path Selection about Lowest IGP Metric to Next-Hop Verification
1- BGP Best Path Selection Rules Introduction
2- BGP Best Path Selection about Prefer Oldest eBGP Path Introduction
3- BGP Best Path Selection about Prefer Oldest eBGP Path Configuration
4- BGP Best Path Selection about Prefer Oldest eBGP Path Verification
1- BGP Best Path Selection Rules Introduction
2- BGP Best Path Selection about Lower BGP Router ID Introduction
3- BGP Best Path Selection about Lower BGP Router ID Configuration
4- BGP Best Path Selection about Lower BGP Router ID Verification
1- BGP Best Path Selection Rules Introduction
2- BGP Best Path Selection about Lowest Neighbor IP Address Introduction
3- BGP Best Path Selection about Lowest Neighbor IP Address Configuration
4- BGP Best Path Selection about Lowest Neighbor IP Address Verification
1- BGP Path Attributes Types Introduction
2- BGP Well-Known Attributes Introduction
3- BGP Optional Attributes Introduction
4- BGP Well-Known Manadatory Introduction
5- BGP Well-Known Discretionary Introduction
6- BGP Optional Transitive Introduction
7- BGP Optional Non-Transitive Introduction
1- 16-bits Autonomous-System (AS) Introduction
2- 32-bits Autonomous-System (AS) Introduction
3- Public AS Number Introduction
4- Private AS Number Introduction
5- Documentation AS Number Introduction
6- BGP Remove Private AS Number Introduction
7- BGP Remove Private AS Number Configuration
8- BGP Remove Private AS Number Verification
1- BGP Multihoming Introduction
2- Resiliency in Service Providers Introduction
3- Internet Transit Routing Introduction
4- Branch Transit Routing Introduction
5- Deterministic Routing During Failover Introduction
6- Nondeterministic Routing During Failover Introduction
1- What is the Policy Based Routing or PBR
2- Relation between a PBR and Routing-Table
3- PBR Configuration with ACL as a Match Conditioner
4- PBR Configuration with outgoing Interface as a Set Conditioner
5- PBR Configuration with Next Hop IP Address as a Set Conditioner
6- PBR Verification with Show and Debug Commands
1- What is the Policy Based Routing or PBR
2- Relation between a PBR and Routing-Table
3- PBR Configuration with Packet Length as a Match Conditioner
4- PBR Configuration with outgoing Interface as a Set Conditioner
5- PBR Configuration with Next Hop IP Address as a Set Conditioner
6- PBR Verification with Show and Debug Commands
1- Multicast Fundamentals Introduction
2- Transmission methods Introduction
3- Unicast Transmission methods Introduction
4- Multicast Transmission methods Introduction
5- Broadcast Transmission methods Introduction
6- Multicast Addressing Introduction
7- Well-Known Reserved Multicast Addresses Introduction
8- IP Multicast Addresses Assigned by IANA Introduction
9- Local network control block (224.0.0/24) Introduction
10- Internetwork control block (224.0.1.0/24) Introduction
11- Source Specific Multicast (SSM) block (232.0.0.0/8) Introduction
12- GLOP block (233.0.0.0/8) Introduction
13- Administratively scoped block (239.0.0.0/8) Introduction
14- Layer 2 Multicast Addresses Introduction
1- Internet Group Management Protocol [IGMP] v1 Introduction
2- Internet Group Management Protocol [IGMP] v1 Message Format Introduction
3- Internet Group Management Protocol [IGMP] v1 Message Types Introduction
4- Internet Group Management Protocol [IGMP] v1 Configuration
5- Internet Group Management Protocol [IGMP] v2 Introduction
6- Internet Group Management Protocol [IGMP] v2 Message Format Introduction
7- Internet Group Management Protocol [IGMP] v2 Message Types Introduction
8- Internet Group Management Protocol [IGMP] v2 Configuration
9- Internet Group Management Protocol [IGMP] v3 Introduction
10- Internet Group Management Protocol [IGMP] v3 Message Format Introduction
11- Internet Group Management Protocol [IGMP] v3 Message Types Introduction
12- Internet Group Management Protocol [IGMP] v3 Configuration
13- Internet Group Management Protocol [IGMP] Snooping Introduction
1- Protocol Independent Multicast [PIM] Introduction
2- PIM Distribution Trees - Source Tree Introduction
3- PIM Distribution Trees - Shortest Path Tree(SPT) Introduction
4- Reverse Path Forwarding (RPF) Introduction
5- Reverse Path Forwarding (RPF) Interface Introduction
6- Reverse Path Forwarding (RPF) Neighbor Introduction
7- Multicast Routing Information Base (MRIB) Introduction
8- Multicast Forwarding Information Base (MFIB) Introduction
9- Multicast state (S,G) Introduction
10- Incoming interface (IIF) Introduction
11- Outgoing interface List (OIL) Introduction
12- Last-hop router (LHR) Introduction
13- First-hop router (FHR) Introduction
14- PIM operating modes Introduction
15- PIM Dense Mode Introduction
16- PIM-DM Flood and Prune Operation Introduction
17- PIM Dense Mode Configuration
18- PIM Dense Mode Verification
1- Protocol Independent Multicast [PIM] Introduction
2- PIM Distribution Trees - Shared Tree Introduction
3- PIM Distribution Trees - RP trees (RPT) Introduction
4- PIM Sparse Mode Introduction
5- PIM Sparse Mode Configuration
6- PIM Sparse Mode Verification
7- PIM Sparse Mode Source Registration Introduction
8- PIM Register Message Introduction
9- PIM Register Stop Message Introduction
10- PIM Join Message Introduction
11- PIM Prune Message Introduction
12- PIM Sparse Mode PIM SPT Switchover Introduction
13- PIM Sparse Mode Reverse Path Forwarding [RPF] Introduction
1- PIM Sparse Mode Introduction
2- PIM Shared and Source Path Trees Introduction
3- PIM Sparse Mode Shared Tree Join Introduction
4- PIM Sparse Mode Source Registration Introduction
5- PIM Sparse Mode PIM SPT Switchover Introduction
6- PIM Designated Router Introduction
7- PIM Designated Router Configuration
8- PIM Designated Router Verification
9- PIM Forwarder Router Introduction
10- PIM Forwarder Router Configuration
11- PIM Forwarder Router Verification
12- PIM Assert Mechanism Introduction
1- Rendezvous Points Introduction
2- Static RP Introduction
3- Static RP Configuration
4- Static RP Verification
5- Cisco Auto-RP Introduction
6- Cisco Auto-RP Candidate RPs Introduction
7- Cisco Auto-RP Mapping Agent Introduction
8- Cisco Auto-RP Configuration
9- Cisco Auto-RP Verification
10- PIM Bootstrap Router Introduction
11- PIM Bootstrap Router Candidate RPs Introduction
12- PIM Bootstrap Router BSR Introduction
13- PIM Bootstrap Router Configuration
14- PIM Bootstrap Router Verification
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.