CCNA 2023 Final
CCNA 2023 Final
Application Visibility and Control (AVC): AVC makes it possible to look deeply into the application
layer data to identify the application to defend against attacks that use random port numbers.
Advanced Malware Protection (AMP): AMP can block file transfers that would install malware and
save copies of files for later analysis.
Uniform resource locator (URL) filtering: URL filtering examines the URLs in each web request,
categorizes the URLs, and either filters or rate limits the traffic based on rules. The Cisco Talos
security group monitors and creates reputation scores for each domain known in the Internet, and
URL filtering can use those scores in its decisions to categorize, filter, or rate limit.
NGIPS: Cisco’s NGFW products can also run their NGIPS feature along with the firewall.
• - Prevent waste of IP
• - Better Management
• - Faster Neighborship / Forwarding
• - Each VLAN use different subnets
• - Router connects different subnets
• Cisco protocol
• Negotiation for trunking
• Auto and Desirable mode
• VLAN filtering on trunk
• Tunneling
11
Copyright Ⓒ ZoomByte | CCNA
2
Three Basic Concepts of Network Security
• Confidentiality
Only the authorized individuals/systems can view sensitive or classified information.
• Integrity
Changes made to data are done only by authorized individuals/systems.
• Availability
Data should be accessible whenever needed.
11
Copyright Ⓒ ZoomByte | CCNA
4
Security Terminology
• Password Policy
• Management Policy
• Mitigation Techniques
• User awareness
• User training
11
Copyright Ⓒ ZoomByte | CCNA
5
Asset Classification
11
Copyright Ⓒ ZoomByte | CCNA
6
Classifying Vulnerabilities
• Policy flaws
• Design errors
• Protocol weaknesses
• Misconfiguration
• Software vulnerabilities
• Human factors
• Malicious software
• Hardware vulnerabilities
• Physical access to network resources
11
Copyright Ⓒ ZoomByte | CCNA
7
Introduction to an Attack
• An attack is the process of attempting to steal data, destroy data, gain unauthorized access
to a device, or even shut down/disable a system. preventing legitimate users from
accessing the resources.
• Types of Attack:
o Reconnaissance
o Social Engineering
o Privilege escalation
o Back door
o Code execution
o Trust exploitation
o Brute force
o Botnet
o DoS and DDoS
11
Copyright Ⓒ ZoomByte | CCNA
8
Man in the Middle attack
• When attackers place themselves in line between two devices that are communicating, with the
intent to perform reconnaissance or to manipulate the data as it moves between them.
• Example: ARP Poisoning, DAI, Fake Root , Rogue Router, Rogue DHCP.
11
Copyright Ⓒ ZoomByte | CCNA
9
Fundamental Security Principles to Network Design
• Rule of Least Privilege
• Defense in depth
• Separation of duties
• Auditing
12
Copyright Ⓒ ZoomByte | CCNA
0
Motivation behind the attack
• Financial
• Disruption
• Geopolitical
12
Copyright Ⓒ ZoomByte | CCNA
1
Distributed Deny of Service Attack
• Directed
• Reflected
• Amplification
12
Copyright Ⓒ ZoomByte | CCNA
2
Social Engineering
• Phishing
• Malvertising
• Phone scams
12
Copyright Ⓒ ZoomByte | CCNA
3
Defense against social engineering
• Password management
• Two-factor authentication
• Antivirus/antiphishing defense
• Change management
• Information classification
• Document handling and destruction
• Physical security
12
Copyright Ⓒ ZoomByte | CCNA
4
Port Security
• Switching Security Feature
• Prevent from Unauthorized Access, ARP spoofing attack and MAC flooding
• Limit access to switchport by maximum mac address
• Violation mode:
• Shutdown* : Shut the port , Syslog , SNMP , Default, Count 1234…
• Restrict: Up , Syslog , SNMP, Count 12345 …
• Protect: Up , No Syslog, No SNMP, Count 12345 …
• Aging Type and Aging time
• Mac address learning : Manual and sticky
• Recovery interval and cause
12
Copyright Ⓒ ZoomByte | CCNA
5
DHCP Snooping
• Switching Security Feature
• Prevent from unauthorized DHCP or Rogue DHCP, MitM attack, DHCP
starvation, limit the DHCP request messages.
• Untrusted ports and trusted ports
• DORA process
• Block Offer and Acknowledge on untrusted ports
• DHCP snooping per-vlan configuration
• DHCP Snooping database
12
Copyright Ⓒ ZoomByte | CCNA
6
Dynamic ARP Inspection (DAI)
• Switching Security Feature
• Limit the Dynamic ARP
packets
• Prevent from ARP spoofing,
ARP poisoning, gratuitous ARP
and MitM.
• Untrusted ports and trusted
ports
• Port security and DHCP
snooping is pre-requisites
• DAI use the DHCP Snooping
database information
• Static MAC address using ACL.
12
Copyright Ⓒ ZoomByte | CCNA
7
AAA Concept
12
Copyright Ⓒ ZoomByte | CCNA
8
AAA Server
• Authentication: who is the user?
• Authorization: what is the user allowed to do?
• Accounting: what did the user do ?
Cisco devices can the following two protocols to communicate with AA server:
• TACACS+ : A Cisco proprietary protocol that separate each of the AAA functions, communication is
secure and encrypted over TCP 49.
• RADIUS: A standard-base protocol that combine authentication & authorization into a single
resource, communication uses UDP port 1812 & 1813. Unencrypted accounting
12
Copyright Ⓒ ZoomByte | CCNA
9
AAA server …
• Network Access Server (NAS) & Network Access Device (NAD) the Switch or WAP who wants
authentication.
• Cisco implementation uses ACS and ISE
• Authentication methods:
Configuring locally on the switch
Use external RADIUS server
Use external TACACS server
13
Copyright Ⓒ ZoomByte | CCNA
0
Remote-Access VPN
13
Copyright Ⓒ ZoomByte | CCNA
1
Site to Site VPN
13
Copyright Ⓒ ZoomByte | CCNA
2
Comparing wired & wireless
13
Copyright Ⓒ ZoomByte | CCNA
5
WLAN Topology
13
Copyright Ⓒ ZoomByte | CCNA
6
WLAN Terms
13
Copyright Ⓒ ZoomByte | CCNA
7
Distribution System Multiple SSID
13
Copyright Ⓒ ZoomByte | CCNA
8
Scaling Wireless Coverage
13
Copyright Ⓒ ZoomByte | CCNA
9
IBSS & Repeater
14
Copyright Ⓒ ZoomByte | CCNA
0
Workgroup bridge
• Universal Workgroup Bridge
• Workgroup Bridge: Cisco pro.
14
Copyright Ⓒ ZoomByte | CCNA
1
Outdoor Bridge
14
Copyright Ⓒ ZoomByte | CCNA
2
Mesh wireless network
14
Copyright Ⓒ ZoomByte | CCNA
3
Radio Frequency
• Electromagnetic waves do not travel in a straight line. Instead,
they travel by expanding in all directions away from the
antenna.
• What is Cycle?
• Frequency unit names.
14
Copyright Ⓒ ZoomByte | CCNA
4
Radio Frequency
14
Copyright Ⓒ ZoomByte | CCNA
5
Wifi Channel
• Wifi channel is a collection of different frequencies which work together or
A Human word to simply describe a range of frequencies.
• For example: In channel-1 in the 2.4 GHz consist of 2.401 GHz through 2.423 GHz
14
Copyright Ⓒ ZoomByte | CCNA
6
Non Overlapping Channel 2.4
14
Copyright Ⓒ ZoomByte | CCNA
7
14
Copyright Ⓒ ZoomByte | CCNA
8
14
Copyright Ⓒ ZoomByte | CCNA
9
Wireless Bands and channels
• One of the two main frequency ranges used for wireless LAN communication lies between 2.400 and
2.4835 GHz. This is usually called the 2.4-GHz band.
• The other wireless LAN range is usually called the 5-GHz band because it lies between 5.150 and 5.825
GHz. (24 Non overlapping channel)
• The 5-GHz band consist of non-overlapping channels but 2.4 GHz band not.
• Use channel 1, 6, and 11 to avoid overlaps
• Wireless devices & Aps should all be capable of operating in same Band.
• Device support means: 802.11b/g/a/n/ac
• Cisco AP support dual radio {2.4 & 5 GHz} also multiple SSID.
• In open space, RF reach further on the 2.4-GHz band than on the 5-GHz band. They also tend to
penetrate indoor walls and objects easier at 2.4 GHz than 5 GHz.
15
Copyright Ⓒ ZoomByte | CCNA
0
IEEE 802.11 Amendments
15
Copyright Ⓒ ZoomByte | CCNA
1
Autonomous vs Light-weight mode
• Autonomous mode: each APs must be configured and maintain individually & do not require a
controller to control the AP for management.
• Light-weight mode: each APs require a WLC to configure, control and maintain all of the AP and
provide ease of management for the communication setting between APs.
• An AP will operate in a combine mode, means when connected to Controller can be controlled by WLC
{Light-weight} mode and when it disconnected can operate Autonomous mode
• Interface BVI = Switch Virtual interface for IP assign, telnet, ssh and MGMT
15
Copyright Ⓒ ZoomByte | CCNA
2
Wireless Network with Autonomous APs
15
Copyright Ⓒ ZoomByte | CCNA
3
Cloud-Based APs
• Cisco Prime Infrastructure in a Central location within the enterprise or internet.
• The Cisco Meraki cloud register device and adds the intelligence needed to automatically instruct
each AP on which channel and transmit power level to use. It can also collect information from all of
the APs about things such as RF interference, rogue or unexpected wireless devices that were
overheard, and wireless usage statistics.
• Cisco Meraki products are not only APs. Switches, Routers, Security … also include.
15
Copyright Ⓒ ZoomByte | CCNA
4
Cloud-based AP {Meraki}
15
Copyright Ⓒ ZoomByte | CCNA
5
Comparing WLC deployment
• A unified or centralized WLC deployment,
which tends to follow the concept that
most of the resources users need to reach
are located in a central location such as a
data center or the Internet.
• Unified support up to: 6000 APs
• If need more add another unified.
15
Copyright Ⓒ ZoomByte | CCNA
6
Virtual WLC
• a cloud-based WLC deployment, where the
WLC exists as a virtual machine rather than
a physical device.
• Support up to: 3000 APs.
15
Copyright Ⓒ ZoomByte | CCNA
7
Embedded WLC
This is known as an embedded WLC
deployment because the controller is
embedded with in the switching hardware.
Typical Cisco embedded WLCs can support up
to 200 APs.
15
Copyright Ⓒ ZoomByte | CCNA
8
Mobility Express
Support up to: 100 APs.
15
Copyright Ⓒ ZoomByte | CCNA
9
Mobility Express
16
Copyright Ⓒ ZoomByte | CCNA
0
Summary of WLC Deployment Mode
16
Copyright Ⓒ ZoomByte | CCNA
1
WLC base AP & Split-MAC Arch
• Split-Mac Architectures: The lightweight AP-WLC division of labor is known as a split-MAC architecture,
where the normal MAC operations are pulled apart into two distinct locations.
• Control and Provisioning of Wireless Access Points (CAPWAP) control message and data messages.
• It can use one IP address for both management and tunneling. No trunk link is needed because all of the
VLANs it supports are encapsulated and tunneled as Layer 3 IP packets, rather than individual Layer 2
VLANs.
16
Copyright Ⓒ ZoomByte | CCNA
2
WLC Based APs
16
Copyright Ⓒ ZoomByte | CCNA
3
Autonomous vs LWAP
16
Copyright Ⓒ ZoomByte | CCNA
4
WLC-Based APs
16
Copyright Ⓒ ZoomByte | CCNA
5
Cisco WAP Modes
• Local Modes
Default mode for (LAPs), Create CAPWAP tunnel to Controller
All clients disconnected when CAPWAP tunnel fail until find next controller
• Bridge Modes
The WAP act as a Client and associate to a LAPs. Like : pic ->
Mostly use for those devices which are not support wireless
• Monitor Mode:
Cisco WAP spend 0.2% of resources for channel scanning
It allows the WAP to generate rogue alerts, signature attacks,
IPS & IDS alerts
16
Copyright Ⓒ ZoomByte | CCNA
6
Cisco WAP Modes
• Sniffer Mode
Similar to Monitor but only sniff or select individual channel (2.4/5 GHz)
All wifi traffic captured sent to controller , then controller can send it to IPS, IDS, Wireshark …
• Sensor Mode
An WAP works as a Sensor or a auditor to check the QoS , Bandwidth, RF, Channels ...
It needs for WLC controller and cisco DNA center
• Mesh Mode
Uses in environment when no
physical connection to DS or switch. →
• FlexConnect Mode
16
Copyright Ⓒ ZoomByte | CCNA
7
WLC Activities and APs
• Dynamic channel assignment
• Transmit power optimization
• Self-healing wireless coverage
• Flexible client roaming
• Dynamic client load balancing
• RF monitoring
• Security management
• Wireless intrusion protection system
16
Copyright Ⓒ ZoomByte | CCNA
8
WLC Activities and APs
16
Copyright Ⓒ ZoomByte | CCNA
9
Authentication
• What is authentication ?
• Message integrity check (MIC) is a security tool that can protect against data tampering.
17
Copyright Ⓒ ZoomByte | CCNA
0
WEP
• The original 802.11 standard offered only two choices to authenticate a client: open authentication and
WEP.
• Wired Equivalent privacy: use RC4 cipher algorithm
• Symmetric encryption or shared-key security
• 40 to 104 bit longs, 10 to 26 hex digits.
• Consider weak encryption and not recommended at this time.
17
Copyright Ⓒ ZoomByte | CCNA
1
802.1x/EAP
• Extensible Authentication Protocol
• EAP defines a set of common functions that actual authentication methods can use to authenticate users
• It can integrate with the IEEE 802.1x port-based access control standard.
17
Copyright Ⓒ ZoomByte | CCNA
2
LEAP
• Lightweight EAP {LEAP}
• Cisco developed a proprietary wireless authentication method called Lightweight EAP (LEAP). It can
integrate with the IEEE 802.1x port-based access control standard.
• Both the client and authentication server must exchange challenge message that are then encrypted and
returned. {mutual authentication}
• LEAP has been deprecated and should not use it.
17
Copyright Ⓒ ZoomByte | CCNA
3
EAP-FAST
• EAP - Flexible Authentication by Secure Tunneling.
• Cisco developed a proprietary wireless authentication
• Authentication credentials are protected by passing a protected access credential (PAC) between the AS
and the supplicant.
• PAC is a form of shared secret that is generated by the AS and used for mutual authentication
• EAP-FAST has three phases: Phase 0 | Phase 1 | Phase 2
• Notice that two separate authentication occur in EAP-FAST—one between the AS and the supplicant and
another with the end user. These occur in a nested fashion, as an outer authentication (outside the TLS
tunnel) and an inner authentication (inside the TLS tunnel).
17
Copyright Ⓒ ZoomByte | CCNA
4
PEAP
• Protected EAP {PEAP}
• Auth. Server presents a digital certificate to authenticate itself with the supplicant in the outer
authentication.
• Auth. Server and client build a TLS tunnel to use for the inner authentication and encryption key
exchange.
• Certificates provided by third party Certification Authority (CA).
• certificate is also used to pass a public key, in plain view, which can be used to help decrypt messages
from the AS.
• The client does not have or use a certificate of its own, so it must be authenticated within the TLS tunnel
using one of the following two methods:
• MSCHAPv2: Microsoft Challenge Authentication Protocol version 2
• GTC: Generic Token Card; a hardware device that generates one-time passwords for the user or a
manually generated password
17
Copyright Ⓒ ZoomByte | CCNA
5
EAP-TLS
• EAP – Transport Layer security
• Auth. Server and Client both require digital certificate
• Auth. Server and Supplicant both exchange certificate and can authenticate each other.
• A TLS tunnel is built afterward so that encryption key material can be surely exchange.
• Implement a Public Key Infrastructure (PKI) that could supply certificates securely and efficiently and revoke
them when a client or user should no longer have access to the network.
• Certification Authority (CA) will release digital certificate
• The most secure wireless authentication.
17
Copyright Ⓒ ZoomByte | CCNA
6
Wireless Privacy & Integrity
• Temporal Key Integrity Protocol (TKIP)
• TKIP adds the following security features using legacy hardware and the underlying WEP encryption:
• MIC {Message Integrity Check} : Add hash to the frame
• Time stamp: a time stamp is added into the MIC to prevent replay attackers
• Sender’s MAC address
• TKIP sequence counter: add sequence # to the frame
• Key mixing algorithm: adds a unique 128-bit WEP key
• Longer initialization vector (IV): prevent from brute-force calculation
17
Copyright Ⓒ ZoomByte | CCNA
7
CCMP
• Counter/CBC-MAC Protocol {CCMP}
• More secure that TKIP, and consist of two algorithms:
1. Advanced Encryption Standard {AES} counter mode encryption
2. Cipher Block Chain Message Authentication Code {CBC-MAC} used as a MIC
• AES is open, publicly accessible, and represents the most secure encryption method available today.
• The devices should checked to support AES before applying CCMP
17
Copyright Ⓒ ZoomByte | CCNA
8
GCMP
• Galois/Counter Mode Protocol {GCMP}
• The robust authenticated encryption suite that is more secure and more efficient than CCMP.
• GCMP consist of two algorithms:
1. AES counter mode encryption
2. Galois Message Authentication Code used as a MIC
• GCMP is used in WPA3
17
Copyright Ⓒ ZoomByte | CCNA
9
Wi-Fi Protect Access (WPA)
• Wi-Fi Alliance, a nonprofit wireless industry association, has worked out straightforward ways to do that
through its Wi-Fi Protected Access (WPA) industry certifications. To date, there are three different versions:
WPA, WPA2, and WPA3.
• The Wi-Fi Alliance first generation WPA certification was based on parts of 802.11i and included 802.1x
authentication, TKIP, and a method for dynamic encryption key management.
• Wi-Fi Alliance (WPA2) certification is based around the superior AES CCMP algorithms. It should be obvious
that WPA2 was meant as a replacement for WPA.
• In 2018, the Wi-Fi Alliance introduced (WPA3) as a future replacement for WPA2. WPA3 leverages stronger
encryption by AES with the (GCMP). It also uses Protected Management Frames (PMF) to secure important
802.11 management frames between APs and clients, to prevent malicious activity that might spoof or
tamper with a BSS’s operation.
18
Copyright Ⓒ ZoomByte | CCNA
0
WPA , WPA2 , WPA3 Summarization
• Each successive version is meant to replace prior versions by offering better security features. You
should avoid using WPA and use WPA2 instead—at least until WPA3 becomes widely available on
wireless client devices, APs, and WLCs.
18
Copyright Ⓒ ZoomByte | CCNA
1
Personal Mode and Enterprise mode
• WPA versions support two client authentication modes: a pre-shared key (PSK) or 802.1x, based on the scale
of the deployment.
• With personal mode, a key string must be shared or configured on every client and AP before the clients can
connect to the wireless network.
• clients and APs work through a four-way handshake procedure that uses the pre-shared key string to
construct and exchange encryption key material that can be openly exchanged. Once that process is
successful, the AP can authenticate the client and the two can secure data frames that are sent over the air.
• With WPA-Personal and WPA2-Personal modes, a malicious user can eavesdrop and capture the four-way
handshake between a client and an AP. That user can then use a dictionary attack to automate guessing the
pre-shared key. If he is successful, he can then decrypt the wireless data or even join the network posing as a
legitimate user.
• WPA3-Personal avoids such an attack by strengthening the key exchange between clients and APs through a
method known as Simultaneous Authentication of Equals (SAE). Rather than a client authenticating against a
server or AP, the client and AP can initiate the authentication process equally and even simultaneously.
• Even if a password or key is compromised, WPA3-Personal offers forward secrecy, which prevents attackers
from being able to use a key to unencrypt data that has already been transmitted over the air.
18
Copyright Ⓒ ZoomByte | CCNA
2
Using WLC Ports
• Service port: Used for out-of-band management, system recovery, and initial boot functions; always
connects to a switch port in access mode
• Distribution system port: Used for all normal AP and management traffic; usually connects to a switch port
in 802.1Q trunk mode
• Console port: Used for out-of-band management, system recovery, and initial boot functions; asynchronous
connection to a terminal emulator
• Redundancy port: Used to connect to a peer controller for high availability (HA) operation
18
Copyright Ⓒ ZoomByte | CCNA
3
Using WLC Ports
18
Copyright Ⓒ ZoomByte | CCNA
4
Using WLC Ports
18
Copyright Ⓒ ZoomByte | CCNA
5
Using WLC Interfaces
• Management interface: Used for normal management traffic, such as RADIUS user authentication, WLC-to-
WLC communication, web-based and SSH sessions, SNMP, (NTP), syslog, and so on. The management
interface is also used to terminate CAPWAP tunnels between the controller and its APs.
• Redundancy management: The management IP address of a redundant WLC that is part of a high availability
pair of controllers. The active WLC uses the management interface address, while the standby WLC uses the
redundancy management address.
• Virtual interface: IP address facing wireless clients when the controller is relaying client DHCP requests,
performing client web authentication, and supporting client mobility.
• Service port interface: Bound to the service port and used for out-of-band management.
• Dynamic interface: Used to connect a VLAN to a WLAN.
18
Copyright Ⓒ ZoomByte | CCNA
6
Using WLC interfaces
18
Copyright Ⓒ ZoomByte | CCNA
7
Configuring WLC
18
Copyright Ⓒ ZoomByte | CCNA
8
18
Copyright Ⓒ ZoomByte | CCNA
9
Control, Data, Management Plan
19
Copyright Ⓒ ZoomByte | CCNA
0
Data plane
• Actions taken by the data plane include the following:
• Layer 2 and Layer 3 de-encapsulation/encapsulation
• Addition or removal of an 802.1Q trunking header
• MAC address table lookups
• IP routing table lookups
• Data encryption and addition of a new IP header (as in VPNs)
• Change to the source or destination IP address (with NAT)
• Message discard due to a filter (such as an ACL or port security)
19
Copyright Ⓒ ZoomByte | CCNA
1
Control plane
• The following are the most common control plane protocols:
▪ Routing protocols (OSPF, EIGRP, RIP, BGP)
▪ IPv4 ARP
▪ IPv6 NDP
▪ Switch MAC learning & building MAC table
▪ STP
19
Copyright Ⓒ ZoomByte | CCNA
2
Management Plane
• CLI
• Console
• SNMP
• Cisco configuration professional (CCP)
• Rest-API
• SSH
• Telnet
• GUI
• NET-Flow
19
Copyright Ⓒ ZoomByte | CCNA
3
Software Defined-Networking (SDN)
19
Copyright Ⓒ ZoomByte | CCNA
4
SDN architecture
19
Copyright Ⓒ ZoomByte | CCNA
5
SDN introduction
• SDN is the general term for all process which control planes move to a central position.
• The cisco SDN specifically is ACI and one of this ACI component which does the network controller
task is called APIC.
• Cisco Sell this APIC which is inside ACI in shape of hardware & software.
• A northbound interface (NBI) also exists between the SDN controller and the applications that are
installed on the controller. These applications are what enable network programmability.
• The controller sits at the top of a network topology diagram, and the connections to the networking
devices are called the southbound interface (SBI)
19
Copyright Ⓒ ZoomByte | CCNA
6
19
Copyright Ⓒ ZoomByte | CCNA
7
19
Copyright Ⓒ ZoomByte | CCNA
8
19
Copyright Ⓒ ZoomByte | CCNA
9
20
Copyright Ⓒ ZoomByte | CCNA
0
When you request something form SDN by python , its HTTP GET in REST API and the response come in JSON
20
Copyright Ⓒ ZoomByte | CCNA
1
SDN OpenDayLight
• OpenDaylight is an open source SDN controller / framework, hosted by the Linux Foundation. It’s
one of the more popular (open source) SDN controllers at the moment.
• One of the southbound interface protocols it supports is OpenFlow. To test OpenDaylight, we’ll
need some switches that support OpenFlow.
• You could buy some hardware that supports OpenFlow but a great alternative is Mininet.
• Mininet allows you to run a virtual network on your own computer with devices that support
OpenFlow.
• Open Network Foundation is model , OpenDaylight is Controller , OpenFlow is protocol
20
Copyright Ⓒ ZoomByte | CCNA
2
Controllers Comparison
• OpenFlow: this is probably the most popular SBI at the moment, it’s an open-source protocol
from the ONF. There are quite a few network devices and SDN controllers that support OpenFlow.
• Cisco OpFlex: this is Cisco’s answer to OpenFlow. It’s also an open- source protocol which has
been submitted to the IETF for standardization.
• CLI: Cisco offers APIC-EM which is an SDN solution for the current generation of routers and
switches. It uses protocols that are available on current generation hardware like telnet, SSH, and
SNMP.
20
Copyright Ⓒ ZoomByte | CCNA
3
Controllers Comparison
20
Copyright Ⓒ ZoomByte | CCNA
4
20
Copyright Ⓒ ZoomByte | CCNA
5
Software Define-Access
• SD Access provides a network wide fabric, which
can be used for end-to-end segmentation based on
policies you create.
• The design of the fabric, creation of these policies
and monitoring of the SD Access components is
done through DNA-Center. SD Access is a network
wide solution, which is managed and monitored
through DNA-Center.
• Cisco DNA Center is the Controller of SDA.
• SDA use : SGT , TrustSec, MacSec , ISE, VXLAN, LISP
20
Copyright Ⓒ ZoomByte | CCNA
6
DNA Center
• DNA is the management plane, and SDA is the underlying technology to deliver a specific feature set.
• Cisco DNA Center has two roles:
▪ A controller in a network that uses Cisco SDA
▪ A network management platform for traditional (non-SDA) network devices
• Cisco DNA Center supports several SBI APIs so that the controller can communicate with the devices it
manages:
▪ Telnet, SSH, and SNMP to support traditional networking devices
▪ NETCONF and RESTCONF to support newer devices
20
Copyright Ⓒ ZoomByte | CCNA
7
DNA Center cont…
• Supports the expression of intent for multiple use cases, including basic automation capabilities,
fabric provisioning, and policy-based segmentation (SGTs) in the enterprise network.
• Cisco DNA Center is a network management and command center for provisioning and
configuring network devices. It is a hardware and software platform that provides a “single pane
of glass”(also called a dashboard) that focuses on assurance, analytics, and automation.
20
Copyright Ⓒ ZoomByte | CCNA
8
Cisco DNA Center
• Design
• Policy
• Provision
• Assurance
• Plateform
Some of the features unique to
Cisco DNA Center include
• the following:
• Easy QoS
• Encrypted Traffic Analysis:
• Network Time Travel:
• Path Trace:
20
Copyright Ⓒ ZoomByte | CCNA
9
• Data Formats
• Ansible
• Puppet
• Chef
21
Copyright Ⓒ ZoomByte | CCNA
0
Data Format
• Data formats provide a way to store and exchange data in a structured format. These are some
common data formats used in network automation and programmability:
• JavaScript Object Notation (JSON)
• Extensible Markup Language (XML)
• YAML Ain’t Markup Language (YAML)
21
Copyright Ⓒ ZoomByte | CCNA
1
JSON Data Format
• JSON is a human-readable
data format used by
applications for storing,
transferring, and reading
data. It is easy to parse and
can be used with most
modern programming
languages, including Python.
21
Copyright Ⓒ ZoomByte | CCNA
2
JSON Syntax Rules
• JSON data is a collection of key:value pairs that follow these rules:
• Key:value pair: One key:value pair
• Key: Text inside double quotes and before the colon that is used as the name that references a
value
• Value: The item after the colon that represents the value of the key, which can be
• Text: Listed in double quotes
• Numeric: Listed without quotes
• Array: A list of values enclosed in square brackets [ ]
• Object: One or more key:value pairs enclosed in braces { }
• Multiple Pairs: When listing multiple key:value pairs, separate the pairs with a comma at the end
of each pair (except the last one)
21
Copyright Ⓒ ZoomByte | CCNA
3
RESTful APIs
• APIs exist to allow two programs to exchange data. Some APIs are for inter-program
communications within a single operating system (OS). Other APIs are available to programs that
run on other computers. These APIs must define the networking protocol. Many are based on REST.
• REST is an architectural style for designing web service applications. A REST API is an API that works
on top of the HTTP protocol. It defines a set of functions developers can use to perform requests
and receive responses through HTTP, such as GET and POST. An API can be considered RESTful if it
has the following features:
• Client/server: The client handles the front end, and the server handles the back end. Either can be
replaced independently of the other.
• Stateless: No client data is stored on the server between requests. The session state is stored on
the client.
• Cacheable: Clients can cache responses to improve performance.
21
Copyright Ⓒ ZoomByte | CCNA
4
CRUD
21
Copyright Ⓒ ZoomByte | CCNA
5
RESTful API Requests
• A RESTful API is requested by using a URI, which is a string of characters that identifies a specific
network resource. URI has two specializations:
• Uniform resource name (URN): Identifies only the namespace of the resource without reference to
the protocol.
• Uniform resource locator (URL): Defines the network location of a specific resource on the
network.
21
Copyright Ⓒ ZoomByte | CCNA
6
21
Copyright Ⓒ ZoomByte | CCNA
7
21
Copyright Ⓒ ZoomByte | CCNA
8
21
Copyright Ⓒ ZoomByte | CCNA
9
22
Copyright Ⓒ ZoomByte | CCNA
0
22
Copyright Ⓒ ZoomByte | CCNA
1
Comparison of Ansible , Puppet & Chef
22
Copyright Ⓒ ZoomByte | CCNA
2
Prepare for exam
• Complete CCNA 200-301 Class
• Complete & Practice All Technologies
• Study the CCNA Cert. Guide for more
• Focus on knowledge gaps
• Study & Practice Passing online toolkit
• Set a date and be committed
• You feel good when passing exam
• Don’t stop at CCNA, go ahead
• Think positives!
22
Copyright Ⓒ ZoomByte | CCNA
3
Cabling Windows Server
Thank you!
IoT & Cloud
22
Copyright Ⓒ ZoomByte | CCNA
4