A Detailed Breakdown of the New CCNA Exam

ccna r/s Jun 10, 2019

On Monday June 10, 2019 Cisco announced an unprecedented revamp of their certification program. This post dives into one of the major updates, the new CCNA certification. (We'll have a future blog post with updates on the CCNP changes.)

First, if you’re currently preparing for your CCNA R/S (or any other CCNA for that matter), don’t panic. You have until February 24, 2020 to complete your certification, at which time you’ll be given the new CCNA certification, plus a “badge” indicating your area of specialization (based on which CCNA you earned). So, Cisco recommends you “keep going” if you’re working towards any CCNA certification. 

Even if you’re just thinking about going after a CCNA cert, personally, I would do it now before the February deadline hits.

 However, just having a current CCENT certification won't help. You'll need a full CCNA to be granted the new CCNA certification. So, if you do just have your CCENT,...

Continue Reading...

Fundamentals of Border Gateway Protocol (BGP) - Part 6

ccie r/s ccna r/s ccnp r/s Jun 04, 2019

This post is the 6th and final in a series of Border Gateway Protocol (BGP) posts. If you missed any of the first five parts, here are the links:

In this post, we're going to take a look at how we can work with BGP in IPv6.

BGP in IPv6

You will recall from this chapter that BGP was constructed to support many different protocols and NLRI right out from its creation. As a result, we have robust support for such technologies as IPV6, MPLS VPNs, and more.

You will also relish in the fact that once you master the basics of BGP that we have covered in this , working with BGP in IPv6 is much more similar than it is different!

BGP is so remarkably flexible, as discussed earlier in this chapter, you can use IPv4 as the “carrier” protocol for IPv6...

Continue Reading...

Fundamentals of Border Gateway Protocol (BGP) - Part 5

ccie r/s ccna r/s ccnp r/s May 21, 2019

This post is the 5th in a series of Border Gateway Protocol (BGP) posts. If you missed any of the first four, here are the links:

In this post, we're going to take a look at BGP scalability mechanisms and related concepts.

BGP Scalability Mechanisms

Just as IP address depletion has been a concern with the Internet, so has the depletion of available autonomous system numbers. To help solve this, the engineers turned to a familiar solution. They marked an AS number range as private-use only. This permits you to experiment with AS construction and policy in a lab (for example) and use AS numbers that are guaranteed not to conflict with Internet-based systems.

Remember, the AS number is a 16-bit number permitting up to 65,536 AS numbers. The private space is marked as 64512-65535.

Another...

Continue Reading...

Fundamentals of Border Gateway Protocol (BGP) - Part 4

ccie r/s ccna r/s ccnp r/s May 07, 2019

This post is the 4th in a series of Border Gateway Protocol (BGP) posts. If you missed any of the first three, here are the links:

In this post, we're going to take a look at configuring BGP to advertise Network Layer Reachability Information (NLRI), and also the configuration of a BGP routing policy.

Advertising NLRI

Before we even begin advertising NLRI using our various commands in this section, let’s take a moment to discuss an old feature of BGP that Cisco disables by default for you. The feature is called BGP synchronization. For proof that Cisco has disabled this feature on your device, just perform a show running-configuration on one of your lab BGP speakers and under the BGP process you will find the command no synchronization. If enabled, the synchronization feature prevents a BGP speaker from entering prefixes into BGP...

Continue Reading...

Fundamentals of Border Gateway Protocol (BGP) - Part 3

ccie r/s ccna r/s ccnp r/s Apr 08, 2019

This post is the 3rd in a series of Border Gateway Protocol (BGP) posts. If you missed either of the first two, here are the links:

Now, in this post, you'll learn about how BGP neighborships are formed, within an autonomous system, between autonomous systems, and even between routers that are not directly connected. Also, we'll check out BGP authentication.

eBGP Peerings

Given that BGP is an AS-to-AS routing protocol, it would make good sense that external BGP (i.e. eBGP) is a key ingredient in its operations. The very first thing that we need to keep in mind with eBGP is that the standards are built so that there is a requirement for a direct connection. This is something that we can work around (of course), but this point is worth consideration. Because a direct connection is assumed, the BGP protocol does two things:

  • It's going to check for a time-to-live (TTL) value, and that the...
Continue Reading...

Fundamentals of Border Gateway Protocol (BGP) - Part 2

ccie r/s ccna r/s ccnp r/s Mar 12, 2019

Part 1 of our blog series on Border Gateway Protocol (BGP) gave you an overview of  BGP and then delved into BGP message types and neighbor states. Now, in this post, you'll learn about one of the most challenging aspects of BGP, how it makes its path selection decision. While routing protocols such as RIP, OSPF, and EIGRP each have their own metrics used to pick the "best" path to a destination network, BGP uses a collection of path attributes (PAs).

BGP Path Attributes

When your BGP speaker receives a BGP prefix, there are going to be many path attributes tagged to it, and we know that these are going to be critical when it comes to BGP doing things like choosing a very best path to a destination. Interestingly, not all of these path attributes are created equal.

All BGP path attributes fall into one of four main categories. Note that this list also provides example attributes in each category. Do not be too concerned with these specific attribute values now, as you will...

Continue Reading...

Fundamentals of Border Gateway Protocol (BGP) - Part 1

ccie r/s ccna r/s ccnp r/s Jan 29, 2019

One of the most intimidating topics for Cisco certification candidates in the Route/Switch track is Border Gateway Protocol (BGP). To help remove the FUD (Fear, Uncertainty, and Doubt) surrounding BGP, I'll be sharing a series of blog posts with you to help demystify this routing protocol. In this first post of the series, you'll be introduced to the very basics of BGP and learn about its various message types and states.

An Overview of BGP

Let’s face it - Border Gateway Protocol is just incredibly unique, especially when we compare it to other routing protocols. The very first thing that makes BGP so unique, is what it does for us. It is our only Exterior Gateway Protocol (EGP) in major use today. We know we have our Interior Gateway Protocols (IGPs), and that would be like OSPF running inside of an autonomous system. But BGP is an EGP, which means that it is (usually) going to take prefixes that are inside an autonomous system and send those to other autonomous systems....

Continue Reading...

Interview with Network Chuck

 

I recently returned from the Cisco Live US 2018 event in Orlando, Florida. It was a great experience, with lots of conversations, sessions, and insight. You can expect more content about what I learned over the coming weeks.

But for now, I'd love for you to checkout an interview I did with Network Chuck. If you're not familiar with Network Chuck, you're in for a treat. He's an instructor at CBT Nuggets, but I've been a fan of his YouTube channel well before that. His enthusiasm for all things IT is contagious, and I'm sure you'll get some valuable insight from him in this interview.

If you'd like to follow Chuck on any of his social media channels, here are his links:

Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945

Continue Reading...

Wireless LAN Security

ccna r/s network plus Apr 06, 2018
 

In this new video, you'll learn the need for wireless LAN (WLAN) security, along with multiple approaches and protocols for better securing your wireless LANs.

Topics include:

  • War Driving
  • MAC Filtering
  • Geofencing
  • Wired Equivalent Privacy (WEP)
  • Initialization Vector (IV)
  • RC4 Encryption
  • Pre-Shared Key (PSK) Mode
  • Enterprise Mode
  • IEEE 802.1X
  • Temporal Key Integrity Protocol (TKIP)
  • Message Integrity Check (MIC)
  • Advanced Encryption Standard (AES)
  • Counter Mode with Cipher Block Chaining Message Authentication Code (CCMP)
  • Wi-Fi Protected Access (WPA)
  • WPA2
  • WPA3
  • Extensible Authentication Protocol (EAP)
  • EAP-TLS
  • EAP-FAST
  • PEAP

This video is a sample from Kevin's new CompTIA Network+ (N10-007) Complete Video Course. To save 50% on your purchase of the video course, use the Coupon Code WALLACE50 during checkout HERE.

Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945

Continue Reading...

Configuring QoS with Cisco's Intent-Based Networking

career success ccna r/s Jan 09, 2018

Over the past few months, you might have noticed Cisco’s publicity push regarding intent-based networking. The first time I saw this new brand messaging was at the Las Vegas McCarran International Airport, when I arrived for Cisco Live 2017. Walking up and down the Vegas strip, there it was again, larger than life on the Cosmopolitan Hotel's sign.

Then, once attending Cisco Live, I repeatedly heard the message and the promise of intent-based networking. That’s the focus of this blog post: what is intent-based networking, and how can it make your life easier. Even though intent-based networking can ease the configuration of multiple features, to provide a tangible example, this blog post focuses on how it can be used for quality of service (QoS) configuration.

At a high level, intent-based networking is the idea that you can easily communicate to your network the behavior you wish to be carried out in the network, without the need to know the underlying command line...

Continue Reading...
1 2 3 4
Close

50% Complete

Two Step

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.