Please enable JavaScript.
Coggle requires JavaScript to display documents.
CCNA Data Center (1.0 Data Center Physical Infrastructure (1.1 Describe…
CCNA Data Center
1.0 Data Center Physical Infrastructure
1.1 Describe different types of cabling, uses, and limitations
1.3 Identify physical components of a server and perform basic troubleshooting
1.4 Identify physical port roles
1.5 Describe power redundancy modes
1.2 Describe different types of transceivers, uses, and limitations
3.0 Advanced Data Center Networking Concepts
3.1 Basic routing operations
3.1.b Compare and contrast static and dynamic routing
Routers maintain a route table
When determining routes to the same network, the smallest route takes priority
Static routing involves manually telling the router the paths to other networks
As the network grows they can become less manageable and require routing protocols
Routing protocols automatically propagate and share routes with other participating routers.
There are three flavors of routing protocols
Link-State
Each router builds a map of the network within memory and can calculate the shortest path to a network based on link speed, hop counts
Exterior-Gateway
Used routing traffic between autonomous systems
Distance-Vector
Is purely concerned with distance and the amount of hops that a network is away from itself - This is considered somewhat limited
They share their entire routing table to neighboring routers
3.1.c Perform basic configuration of SVI/routed interfaces
3.1.a Explain and demonstrate IPv4/IPv6 addressing
3.2 Compare and contrast the First Hop Redundancy Protocols
3.2.b GLBP
Cisco proprietary
Load balances traffic
One router is the AVG (Active Virtual Gateway) - which responds to requests with the different MAC addresses participating
Round robin by default but can be weighted
The devices involved in the configuration are AVFs (Active Virtual Forwarders) - of which there can be four at a time participating
3.2.c HSRP
Cisco proprietary
One switch/router is considered a primary role - Priority can be forced but preemption must be configured in order to force control from an active router/switch with lesser priority
Configured per interface
Uses IP address on each interface but shares a virtual IP and virtual MAC
Has 2 versions
Uses Inter-switch hello packets to determine the role
3.2.a VRRP
Not proprietary - can be used across all standards
Can use the actual interface IP for the virtual IP - Useful for saving IPs
Can also use a shared virtual IP which is the recommended method for VRRP
3.3 Compare and contrast common data center network architectures
3.3.a 2 Tier
Commonly called a collapsed core at the distribution layer
Designed for north-south networking
3.3.b 3 Tier
Employs access distribution and core layers
3.3.c Spine-leaf
A two tiered model which is designed for east west networking and intra-datacenter communciations
No spanning-tree blocking
All layer-3
Expansion does not cause downtime
3.4 Describe the use of access control lists to perform basic traffic filtering
There are two flavors of access control lists (ACLs)
Standard & Extended and they are bound to an interface from an inside or outside perspective
They have multiple uses
QoS Tagging
VPN Crypto-maps
Filtering Traffic
NAT matching
Standard
Are placed closest to the traffic destination because the only filter on the source IP address
Extended
Are places closest to the traffic source as it is possible to filter on the destination IP address
Can filter on nearly any criteria in the IP packet: Source/Dest IP or port, Protocol, IP precedence, etc
Nexus names ACLs are extended
ACL Prcessing
ACLs are evaluated in the order that they are entered
The first matching ACL rule stops processing
Place more specific rules towards the top of the list
The is an implicit "deny all" at the bottom of the list
Uses wildcard masks
Configuration
Build ACL
ip access-list <name>
deny/permit <protocol> host <ip> host <ip> eq <port>
permit ip any any (otherwise all is blocked)
Apply ACL
access desired interface mode
ip access-group <name> in/out
show access-lists shows the lists created on the device
3.5 Describe the basic concepts and components of authentication, authorization, and accounting
Authenticaton
Username and password
Can be stored locally or use RADIUS/TACACS+
Authorization
What rights a user has
Derived from the authentication server
Accounting
Collects security information for an audit
Tracks login/logout times
AAA is used to secure access to the control plane
4.0 Basic Data Center Storage
4.2 Describe the roles of FC/FCoE port types
4.3 Describe the purpose of a VSAN
4.1 Differentiate between file and block based storage protocols
4.4 Describe the addressing model of block based storage protocols
4.4.a FC
4.4.b iSCSI
5.0 Advanced Data Center Storage
5.2 Describe Node Port Virtualization
5.3 Describe zone types and their uses
5.1 Describe FCoE concepts and operations
5.1.b DCB
5.1.c vFC
5.1.a Encapsulation
5.1.d Topologies
5.1.d [ii] Multihop
5.1.d [iii] Dynamic
5.1.d [i] Single hop
5.4 Verify the communication between the initiator and target
5.4.b FCNS
5.4.c active zone set
5.4.a FLOGI
2.0 Basic Data Center Networking Concepts
2.1 Compare and contrast the OSI and the TCP/IP models
2.2 Describe classic Ethernet fundamentals
2.2.a Forward
2.2.c Flood
2.2.d MAC address table
2.2.b Filter
2.3 Describe switching concepts and perform basic configuration
2.3.a STP
2.3.b 802.1q
2.3.c Port channels
802.3ad - Open Standard & uses Link Aggregation Control Protocol
Up to 8 active links an 8 standby links
active/passive
active/desirable - The port sends PAgP/LACP frames to bring up the port channel
passive/auto - Waits for the other end to bring up the port channel
Etherchannel - Cisco proprietary & uses Port Aggregation Protocol (PAgP)
Up to 8 active links, no standby
desirable/auto
2.3.d Neighbor discovery
2.3.d [i] CDP
Cisco proprietary
Automatically discovers Cisco branded neighbours
show cdp neighbours - will show dcp discovered devices
show cdp - will show the global cdp information
By default CDP packets are sent every 60 seconds and default holdtime is 180 seconds
2.3.d [ii] LLDP
Automatically discovers details of non-proprietary devices - an open standard
show lldp neighbours - will show lldp discovered devices
show lldp will show the global lldp information
By default lldp packets are sent every 30 seconds and default holdtime is 120 seconds :
2.3.e Storm control