CCNP Data Center Application Centric Infrastructure 300-620 DCACI
Focused View
22:02:10
73 View
001. CCNP Data Center Application Centric Infrastructure 300-620 DCACI Introduction.mp4
03:54
001. Learning objectives.mp4
00:34
002. 1.1 Understanding the Shortcomings of Traditional Networks.mp4
13:05
003. 1.2 Understanding the Benefits of ACI - Part 1.mp4
13:55
004. 1.3 Understanding the Benefits of ACI - Part 2.mp4
14:22
001. Learning objectives.mp4
00:21
002. 2.1 ACI Topologies.mp4
15:44
003. 2.2 APIC Clusters.mp4
09:40
004. 2.3 Spine Hardware Options.mp4
03:35
005. 2.4 Leaf Hardware Options.mp4
04:14
001. Learning objectives.mp4
00:47
002. 3.1 Planning Fabric Initialization.mp4
10:06
003. 3.2 Switch Discovery Process.mp4
03:56
004. 3.3 Fabric Discovery Phases.mp4
03:59
005. 3.4 Switch Discovery States.mp4
03:31
006. 3.5 Initializing an ACI Fabric - Part 1.mp4
10:28
007. 3.6 Initializing an ACI Fabric - Part 2.mp4
12:20
008. 3.7 Pre-Staging Switch Activation.mp4
02:12
009. 3.8 Configuring Out-of-Band Management.mp4
09:53
010. 3.9 Understanding Post-Initialization Connectivity.mp4
13:29
011. 3.10 Upgrading an ACI Fabric.mp4
19:20
012. 3.11 Performing Configuration Backups.mp4
11:40
013. 3.12 Restoring Configurations from Backups.mp4
07:35
014. 3.13 Configuring NTP.mp4
10:43
015. 3.14 Configuring DNS Lookups.mp4
02:49
016. 3.15 Taking a Look at COOP Configuration.mp4
02:08
017. 3.16 Converting Fabric Ports to Access Ports.mp4
04:27
001. Learning objectives.mp4
00:32
002. 4.1 ACI Access Methods.mp4
08:05
003. 4.2 The ACI Object Model.mp4
02:57
004. 4.3 Understanding and Managing Faults.mp4
06:01
005. 4.4 Monitoring Policies in ACI.mp4
05:49
006. 4.5 Understanding Health Scores.mp4
08:13
007. 4.6 Understanding and Managing Events.mp4
02:52
008. 4.7 Understanding and Using Audit Logs.mp4
02:21
001. Learning objectives.mp4
00:35
002. 5.1 The Challenge of Designing around Subnet Boundaries.mp4
10:24
003. 5.2 Understanding the Basic Objects within Tenants.mp4
14:42
004. 5.3 Classifying Endpoints into EPGs.mp4
05:12
005. 5.4 Contract Security Enforcement Basics.mp4
06:13
006. 5.5 Enabling L3 Connectivity Outside the Fabric.mp4
04:28
007. 5.6 Tenant Hierarchy in Review.mp4
03:44
001. Learning objectives.mp4
00:47
002. 6.1 Understanding Pools.mp4
03:50
003. 6.2 Understanding Domains.mp4
09:01
004. 6.3 VLAN Pool and Domain Design Examples.mp4
07:21
005. 6.4 Understanding AAEPs.mp4
08:48
006. 6.5 Implementing Pools, Domains, and AAEPs.mp4
05:06
007. 6.6 Understanding Interface Policies.mp4
03:34
008. 6.7 Understanding Interface Policy Groups.mp4
03:47
009. 6.8 Sample Interface Policies and Policy Groups.mp4
03:27
010. 6.9 Implementing Interface Policies.mp4
07:23
011. 6.10 Understanding Switch Policies.mp4
02:16
012. 6.11 Understanding Switch Policy Groups.mp4
00:49
013. 6.12 Mapping Interface Policy Groups to Ports.mp4
03:07
014. 6.13 Sample Switch and Interface Profile Designs.mp4
03:28
015. 6.14 Implementing Profiles and Selectors.mp4
06:46
016. 6.15 Access Policies and Tenancy in Review.mp4
04:51
001. Learning objectives.mp4
00:36
002. 7.1 Configuring Individual Ports.mp4
08:54
003. 7.2 Configuring Port-Channels.mp4
04:09
004. 7.3 Configuring vPC Domains and vPCs.mp4
07:26
005. 7.4 Configuring Fabric Extenders.mp4
11:04
006. 7.5 Configuring Breakout Ports.mp4
03:41
007. 7.6 Modifying QoS Settings.mp4
01:47
001. Learning objectives.mp4
00:38
002. 8.1 ACI Endpoint Learning and Forwarding.mp4
13:17
003. 8.2 Implementing Basic Tenant Policies - Part 1.mp4
21:42
004. 8.3 Implementing Basic Tenant Policies - Part 2.mp4
09:57
005. 8.4 Deploying a 2-Tier Application - Part 1.mp4
17:34
006. 8.5 Deploying a 2-Tier Application - Part 2.mp4
18:56
007. 8.6 Deploying a 2-Tier Application - Part 3.mp4
19:00
008. 8.7 Deploying a 2-Tier Application - Part 4.mp4
11:01
009. 8.8 Configuring AAEP EPGs.mp4
13:06
010. 8.9 Verifying Endpoint Learning and Forwarding.mp4
08:54
001. Learning objectives.mp4
00:38
002. 9.1 L3Out Fundamentals.mp4
06:56
003. 9.2 MP-BGP Route Reflectors.mp4
15:47
004. 9.3 Implementing an EIGRP L3Out.mp4
03:34
005. 9.4 Tagging Routes.mp4
06:11
006. 9.5 Implementing an OSPFv2 L3Out.mp4
16:40
007. 9.6 Preferred Group Member Settings.mp4
04:08
008. 9.7 Setting OSPF Metrics and Metric Types.mp4
07:39
009. 9.8 Modifying an L3Out for Firewall Peering.mp4
13:04
010. 9.9 Implementing OSPFv3 L3Outs.mp4
07:29
011. 9.10 Implementing BGP L3Outs - Part 1.mp4
18:56
012. 9.11 Implementing BGP L3Outs - Part 2.mp4
07:10
013. 9.12 Implementing BGP L3Outs - Part 3.mp4
12:03
014. 9.13 Implementing BFD on L3Outs.mp4
09:57
015. 9.14 Implementing BGP Community Strings.mp4
10:31
016. 9.15 Implementing Route Filtering.mp4
15:43
017. 9.16 Advertising Default Routes via L3Outs.mp4
03:25
018. 9.17 Granting Differing Access to External Users - Part 1.mp4
18:47
019. 9.18 Granting Differing Access to External Users - Part 2.mp4
05:54
020. 9.19 Granting Differing Access to External Users - Part 3.mp4
04:57
021. 9.20 Granting Differing Access to External Users - Part 4.mp4
19:17
022. 9.21 Using the Established Bit in Contracts.mp4
09:53
001. Learning objectives.mp4
00:44
002. 10.1 Spanning-Tree and ACI.mp4
05:53
003. 10.2 Understanding Network-Centric Deployments.mp4
04:45
004. 10.3 Tenant Design Considerations for Migrations.mp4
08:46
005. 10.4 ACI and STP TCNs.mp4
05:32
006. 10.5 Comparing EPG Extensions and L2Outs.mp4
09:23
007. 10.6 Implementing EPG Extension.mp4
08:02
008. 10.7 Implementing Protections Against STP TCNs.mp4
13:04
009. 10.8 Migrating Overlapping VLANs into ACI - Part 1.mp4
17:05
010. 10.9 Migrating Overlapping VLANs into ACI - Part 2.mp4
09:39
011. 10.10 Implementing L2Outs - Part 1.mp4
12:01
012. 10.11 Implementing L2Outs - Part 2.mp4
06:07
013. 10.12 Migrating Default Gateways into ACI.mp4
05:52
001. Learning objectives.mp4
00:49
002. 11.1 vSphere Networking Primer.mp4
13:42
003. 11.2 Implementing Basic Connectivity to ESXi Servers - Part 1.mp4
08:39
004. 11.3 Implementing Basic Connectivity to ESXi Servers - Part 2.mp4
12:41
005. 11.4 Implementing Basic Connectivity to ESXi Servers - Part 3.mp4
10:14
006. 11.5 Implementing VMM Integration - Part 1.mp4
11:51
007. 11.6 Implementing VMM Integration - Part 2.mp4
12:35
008. 11.7 Implementing vSwitch Policies.mp4
05:59
009. 11.8 Pushing Port-Groups to vCenter - Part 1.mp4
15:43
010. 11.9 Pushing Port-Groups to vCenter - Part 2.mp4
09:40
011. 11.10 Integrating a VDS into Dual-port Servers - Part 1.mp4
15:52
012. 11.11 Integrating a VDS into Dual-port Servers - Part 2.mp4
05:03
001. Learning objectives.mp4
00:24
002. 12.1 Service Graph Basics.mp4
10:31
003. 12.2 Service Graph Design Options.mp4
11:03
004. 12.3 Deployment Modes.mp4
02:39
005. 12.4 Implementing Unmanaged Firewall Service Graphs - Part 1.mp4
11:30
006. 12.5 Implementing Unmanaged Firewall Service Graphs - Part 2.mp4
11:07
007. 12.6 Implementing Managed Firewall Service Graphs - Part 1.mp4
06:45
008. 12.7 Implementing Managed Firewall Service Graphs - Part 2.mp4
15:21
009. 12.8 Implementing Managed Firewall Service Graphs - Part 3.mp4
16:39
010. 12.9 Implementing Managed Firewall Service Graphs - Part 4.mp4
07:12
001. Learning objectives.mp4
00:28
002. 13.1 Enforcing Custom Contracts for OOB Management.mp4
11:51
003. 13.2 Understanding Inband Management.mp4
08:56
004. 13.3 Access Policies for Inband Management.mp4
07:07
005. 13.4 Assigning IPs and EPGs to Inband Management.mp4
13:29
006. 13.5 Enabling Inband Communication via L3Outs and Contracts.mp4
08:24
001. Learning objectives.mp4
00:26
002. 14.1 Understanding System Messages.mp4
05:16
003. 14.2 Implementing Basic Syslog Forwarding.mp4
17:50
004. 14.3 Implementing Syslog in Multi-Tenant Environments.mp4
10:59
005. 14.4 Understanding SNMP.mp4
05:40
006. 14.5 Configuring ACI for SNMP.mp4
11:31
001. Learning objectives.mp4
00:28
002. 15.1 Understanding Security Domains.mp4
07:09
003. 15.2 Understanding Privileges and Roles.mp4
05:34
004. 15.3 Creating Local Users and Assigning Access.mp4
14:38
005. 15.4 Tweaking Roles and User Access.mp4
04:51
006. 15.5 Implementing Custom RBAC Rules.mp4
08:01
007. 15.6 Understanding Login Domains.mp4
09:35
008. 15.7 Configuring ACI for LDAP Authentication.mp4
16:06
009. 15.8 Configuring ACI for TACACS+ Authentication and Authorization.mp4
08:48
010. 15.9 Understanding the Required ISE Configuration.mp4
10:05
001. Learning objectives.mp4
00:49
002. 16.1 ACI Multi-Pod Use Cases.mp4
07:43
003. 16.2 Basic Demo of Multi-Site Orchestrator.mp4
19:42
004. 16.3 ACI Multi-Site Use Cases.mp4
13:56
005. 16.4 Comparing Multi-Site and Multi-Pod.mp4
04:04
001. Learning objectives.mp4
00:25
002. 17.1 Exam Preparation Advice.mp4
02:29
003. 17.2 Next Steps.mp4
02:55
001. Module introduction.mp4
00:45
001. Module introduction.mp4
00:35
001. Module introduction.mp4
00:31
001. Module introduction.mp4
00:37
001. Module introduction.mp4
00:32
001. Module introduction.mp4
00:31
001. Module introduction.mp4
00:16
001. CCNP Data Center Application Centric Infrastructure 300-620 DCACI Summary.mp4
00:39
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 170
- duration 22:02:10
- Release Date 2023/11/07