Playlist
You can watch all videos in this course in sequence, using the playlist. It will place you automatically on the last video you watched.
Go to playlistUsing an ANUAL subscription
¡+32 Hours!
Jose Leitao
You can watch all videos in this course in sequence, using the playlist. It will place you automatically on the last video you watched.
Go to playlistIS-IS videos for the CCNP SP (SPROUTE) 642-883 certification exam
ISIS protocol overview, introduction to the CLNS addressing, routing levels and general operation of the ISIS routing
CLNS addressing structure, how a NET addresses is built for integrated ISIS and the two most common ways to structure a NET address (using loopbacks and mac)
In this video we explore how routing is done following the ISO CLNS routing model and how it is done today with integrated IS-IS, general intra area routing and the implementation of the backbone
In this video we are going to analyze the ISIS messages - PDU (Hello, LSP, PSNP and CSNP), what is their function and when are they sent
In this video we go into the detail behind the formation of ISIS adjacencies in both broadcast and point-to-point network types, the steps the protocol go through, database synchronization and general state knowledge for troubleshooting
In this session we explore the base configuration and verification methods for ISIS in Cisco IOS devices.
In this video we go through the basic configuration and verification procedures for ISIS in Cisco XR devices devices.
In this video we are going to explore how the ISIS basic timers work: hello interval, hold time and the CSNP interval, but also we are going to attack timers related to the SPF calculation (LSP timers)
Configuration and verification methods for the basic ISIS timers (hello, hold and CSNP) and LSP related timers on Cisco IOS devices
ISIS hello, hold, CSNP and LSP related timers configuration and verification on Cisco IOS XR devices
In this video we go through the ISIS SPF timers on Cisco IOS devices
IS-IS handles two types of networks: broadcast and point-to-point. In this video we will see how the protocol works with this two different types and their implications
Broadcast and point-to-point network type configuration and verification on Cisco IOS devices
Configuration and verification methods to understand and work with broadcast and point-to-point network types on Cisco IOS XR devices
How to modify the natural DIS selection with the DIS priority on ISIS Cisco IOS devices, troubleshooting and verification procedures
DIS priority configuration to modify the DIS selection on ISIS Cisco XR devices, troubleshooting and verification procedures
Configuration and verification methods for integrated IS-IS in a multi area setup, we'll see how inter area routing is done and the different moving parts that interact in this kind of topology. Everything on Cisco IOS devices
In this video we go through the configuration and verification procedures on Cisco XR for IS-IS in a multiarea deployment, we'll focus on how routing is performed and the different elements that are involved.
Configuration and verification step to deploy ISIS authentication using MD5/Clear text credentials and level vs interface mode on Cisco IOS devices
ISIS Authentication configuration using multiple setup options and troubleshooting/verification steps on Cisco IOS XR devices
In this video we go through the creation of summary advertisements and route leaking on Cisco IOS devices
Summarization configuration and route leaking on Cisco IOS XR devices
In this video we explore the traffic engineering extensions of ISIS (wide metrics) and how they compare to the narrow metrics, including all the configuration and verification commands for Cisco IOS devices.
Configuration, verification and troubleshooting of the traffic engineering extensions of ISIS (wide metrics) on Cisco IOS XR devices
OSPF videos for the CCNP SP (SPROUTE) 642-883 certification exam
Introduction to Link State protocols and how they compare with distance vector, general overview on the OSPF routing protocol, its performance, metric and the mechanisms that allows OSPF to scale
In this video we analyze the function of the router-id in OSPF, why is a key element in the SPF calculations, its role on the LSA advertisements and what may happen if we found the same router-id on two devices not directly connected
In this video we the function of the areas, how the protocol behaves when dealing with multiple areas, and a high level overview on how the protocol advertises information between areas
In this session we define what are the: Internal Routers, Area Border Routers (ABR), Backbone Routers and AS Boundary Routers (ASBR)
Description of how OSPF adjacencies are formed, the OSPF FSM, analysis on the parameters that must match or be equal for two devices to reach the FULL state
Introduction to OSPF behaviour in multi-access segments. We will provide an overview on how the DR/BDR work and why OSPF uses this kind of mechanisms
Function, structure and types of LSA used by OSPF for the exchange of information
Basic OSPF Configuration in a multi area topology on Cisco IOS devices. Common verification and troubleshooting procedures
Operation Hello and Dead interval. How they behave in different types of networks and their influence on the formation of adjacencies.
Configuring Hello / Dead timer in Cisco IOS devices and how to verify and troubleshoot its operation.
OSPF point-to-point and point-to-multipoint Network types. How they behave, implications and default timers
Configuration, verification and troubleshooting procedures for the OSPF network types: Point-To-Point and Point-to-Multipoint on Cisco IOS devices.
Operation of the OSPF broadcast and non-broadcast network types, selection of the DR / BDR roles and overall operation.
Configuration, verification and troubleshooting of the OSPF network types: broadcast and non-broadcast OSPF on Cisco IOS devices.
In this video we go into the operation details of the OSPF LSA 1 (router LSA) and LSA 2 (network LSA), what information they represent and contain and their impact on the general performance of the OSPF routing protocol
In this video we explore how to interpret the OSPF database on Cisco IOS devices focusing on LSA 1 and LSA 2, and analyzing how to manually build the topology information using this LSA
In this session we explore in detail the operation of the Summary LSA (Type 3), what information they represent and contain, together with the details of how OSPF routers calculate the metric.
In this session we explore how to interpret the OSPF database, focusing on the LSA type 3, how they are generated and the calculations that take place on OSPF Cisco IOS routers whit the information contained in the Summary LSA.
Details on how the OSPF LSA 4 (ASBR-Summary) and LSA 5 (External) operate and what information they contain. We'll take special attention into how the calculations are made to reach external routes.
In this session we explore how to interpret the OSPF database in Cisco IOS devices, focusing on LSA type 5 and type 4. We'll see in detail how the ASBR generates Type 5 LSA and how the ABR generate type 4 LSA
Operation of LSA Type 7 on NSSA areas. How translation is performed by the ABR's from a LSA Type 7 to a LSA type 5 and the calculations performed with the forward address to get the metric to any specific route
In this video we go through the steps needed to interpret the OSPF database on Cisco IOS devices focusing on the OSPF LSA type 7. We'll see in our configuration how the LSA type 7 is translated to a LSA type 5, the forward metric and metric types, how to check and calculate manually the metric, among other concepts
In this session we will see how to modify and check the cost on Cisco IOS devices for the OSPF routing protocol (interface level and global configuration)
In this session we analyze the operation of the area 0 (backbone) and regular areas, what optimization they provide and the benefit of using multiple areas
In this video we explore how stub and totally stub areas (stub no-summary) work, what OSPF LSA they filter and how OSPF provide connectivity to the routes that are lost with this LSA filtering
We explore in this session the operation of NSSA and totally NSSA areas (NSSA no-summary) what LSA types they filter, how Type 7 LSA are translated to Type 5 LSA and how routing is done within these areas
In this session we configure different stub area types of OSPF (stub, totally stub, NSSA and totally NSSA). We will observe independently the behavior of each of them and their implications.
In this video we go deep into the details behind the operation of the OSPF authentication, authentication types and their implications
Configuration, verification and troubleshooting of OSPF authentication on Cisco IOS devices. In this video we work with all different authentication types available and how to fix any problem that may show up using this security feature
In this session we explore the details behind the operation of virtual links, why they exist, the most common uses and the implications of using them
Configuration, verification and troubleshooting of OSPF virtual links on Cisco IOS devices
This video will show you how to generate a default route into OSPF on Cisco IOS devices, with three possible scenarios and configurations.
In this video we configure in Cisco IOS devices different route filtering methods and the implications of using distribute-lists directly into a backbone or internal router
BGP videos for the CCNP SP (SPROUTE) 642-883 certification exam
In this video we will provide an introduction to BGP, its philosophy and operation at a very high level. We'll see concepts like the mechanics of Path vector protocols, BGP conceptual differences with IGP's and an introduction to the use of attributes for routing.
In this session we explore the different messages used by BGP to establish sessions, warn of possible errors, exchange information and keep up sessions. These messages are: OPEN, NOTICE, UPDATE and KEEPALIVE.
In this video we will see how sessions are established between two endpoints running BGP. Analyze the implications of using TCP as the transport protocol and the BGP Finite State Machine.
This video will show you how to setup a session between two BGP neighbors on Cisco IOS devices. You will see the different commands to check the protocol status, the TCP-level implications, and how to solve common problems and troubleshooting procedures (with corresponding debugs).
This video will show you what are the capabilities of BGP, how they are negotiated and represented in the BGP OPEN message. We will pay special attention to one of the most important capability: Multiprotocol Extension.
In this session we will explore the different types of attributes that BGP uses, we will see what are the characteristics and scope of each of them, along with some examples.
In this video we will look at how the autonomous systems numbers are structure, the operation of the AS-Path attribute, introduction to using private autonomous system number and the numbers of 4 bytes
We will see in detail how the 4 bytes (32 bits) autonomous system numbers work, how this new numbering interact with systems that only support 2 bytes ASN and the operation of new capabilities, attributes, etc.
In this video we explain the BGP decision algorithm. We will go through each of the path selection steps that the protocol takes to select which of the different paths received is the best.
In this video we explore how we can create Network Layer Reachability Information of IPv4 networks. We will also see how we can modify the attributes of the advertisements with the network or redistribute commands in Cisco IOS.
In this video we will explore how iBGP sessions work. We will focus on the implications of these sessions in terms of next-hop, the advertisements between iBGP sessions, the AS-Path management and synchronization.
In this session we will see how we can check and configure iBGP sessions on Cisco IOS devices. We will see the implications of these sessions in the management of the Next-Hop, advertisements between iBGP routers and synchronization.
In this video we will explore eBGP sessions, the controls that the protocols implements for session establishment, TTL considerations and Next-Hop management.
In this chapter we will explore the configuration and verification procedures for eBGP sessions on Cisco equipment. We will focus in features like ttl-security settings, ebgp-multihop and disable-connected-check.
In this video you'll see how route reflectors operate. We will also analyze in depth the function of the attributes that this functionality introduces, which are the Originator-ID and the Cluster-ID as well as some design implications.
In this session we explore how we can configure and verify proper operation of BGP Route-Reflectors on Cisco IOS devices. We go into the details behind the operation of the Originator-ID and Cluster-ID used to stop any possible feedback loops.
In this session we discuss in depth the operation of Confederations, which introduce attributes (focusing on the AS Confederation Set) and the different implications of using these mechanisms.
Session dedicated to the configuration and verification procedures for BGP confederations in Cisco IOS devices.
In this video we will explore the different BGP authentication methods, concentrating on the authentication provided by the transport layer (TCP) using MD5 and its implications.
In this video we will explore how we can implement BGP MD5 authentication on Cisco IOS devices using the mechanism provided by TCP. Special attention is taken to the verification and troubleshooting procedures.