Companies Home Search Profile

CCNP Data Center Application Centric Infrastructure 300-620 DCACI

Focused View

22:02:10

73 View
  • 001. CCNP Data Center Application Centric Infrastructure 300-620 DCACI Introduction.mp4
    03:54
  • 001. Learning objectives.mp4
    00:34
  • 002. 1.1 Understanding the Shortcomings of Traditional Networks.mp4
    13:05
  • 003. 1.2 Understanding the Benefits of ACI - Part 1.mp4
    13:55
  • 004. 1.3 Understanding the Benefits of ACI - Part 2.mp4
    14:22
  • 001. Learning objectives.mp4
    00:21
  • 002. 2.1 ACI Topologies.mp4
    15:44
  • 003. 2.2 APIC Clusters.mp4
    09:40
  • 004. 2.3 Spine Hardware Options.mp4
    03:35
  • 005. 2.4 Leaf Hardware Options.mp4
    04:14
  • 001. Learning objectives.mp4
    00:47
  • 002. 3.1 Planning Fabric Initialization.mp4
    10:06
  • 003. 3.2 Switch Discovery Process.mp4
    03:56
  • 004. 3.3 Fabric Discovery Phases.mp4
    03:59
  • 005. 3.4 Switch Discovery States.mp4
    03:31
  • 006. 3.5 Initializing an ACI Fabric - Part 1.mp4
    10:28
  • 007. 3.6 Initializing an ACI Fabric - Part 2.mp4
    12:20
  • 008. 3.7 Pre-Staging Switch Activation.mp4
    02:12
  • 009. 3.8 Configuring Out-of-Band Management.mp4
    09:53
  • 010. 3.9 Understanding Post-Initialization Connectivity.mp4
    13:29
  • 011. 3.10 Upgrading an ACI Fabric.mp4
    19:20
  • 012. 3.11 Performing Configuration Backups.mp4
    11:40
  • 013. 3.12 Restoring Configurations from Backups.mp4
    07:35
  • 014. 3.13 Configuring NTP.mp4
    10:43
  • 015. 3.14 Configuring DNS Lookups.mp4
    02:49
  • 016. 3.15 Taking a Look at COOP Configuration.mp4
    02:08
  • 017. 3.16 Converting Fabric Ports to Access Ports.mp4
    04:27
  • 001. Learning objectives.mp4
    00:32
  • 002. 4.1 ACI Access Methods.mp4
    08:05
  • 003. 4.2 The ACI Object Model.mp4
    02:57
  • 004. 4.3 Understanding and Managing Faults.mp4
    06:01
  • 005. 4.4 Monitoring Policies in ACI.mp4
    05:49
  • 006. 4.5 Understanding Health Scores.mp4
    08:13
  • 007. 4.6 Understanding and Managing Events.mp4
    02:52
  • 008. 4.7 Understanding and Using Audit Logs.mp4
    02:21
  • 001. Learning objectives.mp4
    00:35
  • 002. 5.1 The Challenge of Designing around Subnet Boundaries.mp4
    10:24
  • 003. 5.2 Understanding the Basic Objects within Tenants.mp4
    14:42
  • 004. 5.3 Classifying Endpoints into EPGs.mp4
    05:12
  • 005. 5.4 Contract Security Enforcement Basics.mp4
    06:13
  • 006. 5.5 Enabling L3 Connectivity Outside the Fabric.mp4
    04:28
  • 007. 5.6 Tenant Hierarchy in Review.mp4
    03:44
  • 001. Learning objectives.mp4
    00:47
  • 002. 6.1 Understanding Pools.mp4
    03:50
  • 003. 6.2 Understanding Domains.mp4
    09:01
  • 004. 6.3 VLAN Pool and Domain Design Examples.mp4
    07:21
  • 005. 6.4 Understanding AAEPs.mp4
    08:48
  • 006. 6.5 Implementing Pools, Domains, and AAEPs.mp4
    05:06
  • 007. 6.6 Understanding Interface Policies.mp4
    03:34
  • 008. 6.7 Understanding Interface Policy Groups.mp4
    03:47
  • 009. 6.8 Sample Interface Policies and Policy Groups.mp4
    03:27
  • 010. 6.9 Implementing Interface Policies.mp4
    07:23
  • 011. 6.10 Understanding Switch Policies.mp4
    02:16
  • 012. 6.11 Understanding Switch Policy Groups.mp4
    00:49
  • 013. 6.12 Mapping Interface Policy Groups to Ports.mp4
    03:07
  • 014. 6.13 Sample Switch and Interface Profile Designs.mp4
    03:28
  • 015. 6.14 Implementing Profiles and Selectors.mp4
    06:46
  • 016. 6.15 Access Policies and Tenancy in Review.mp4
    04:51
  • 001. Learning objectives.mp4
    00:36
  • 002. 7.1 Configuring Individual Ports.mp4
    08:54
  • 003. 7.2 Configuring Port-Channels.mp4
    04:09
  • 004. 7.3 Configuring vPC Domains and vPCs.mp4
    07:26
  • 005. 7.4 Configuring Fabric Extenders.mp4
    11:04
  • 006. 7.5 Configuring Breakout Ports.mp4
    03:41
  • 007. 7.6 Modifying QoS Settings.mp4
    01:47
  • 001. Learning objectives.mp4
    00:38
  • 002. 8.1 ACI Endpoint Learning and Forwarding.mp4
    13:17
  • 003. 8.2 Implementing Basic Tenant Policies - Part 1.mp4
    21:42
  • 004. 8.3 Implementing Basic Tenant Policies - Part 2.mp4
    09:57
  • 005. 8.4 Deploying a 2-Tier Application - Part 1.mp4
    17:34
  • 006. 8.5 Deploying a 2-Tier Application - Part 2.mp4
    18:56
  • 007. 8.6 Deploying a 2-Tier Application - Part 3.mp4
    19:00
  • 008. 8.7 Deploying a 2-Tier Application - Part 4.mp4
    11:01
  • 009. 8.8 Configuring AAEP EPGs.mp4
    13:06
  • 010. 8.9 Verifying Endpoint Learning and Forwarding.mp4
    08:54
  • 001. Learning objectives.mp4
    00:38
  • 002. 9.1 L3Out Fundamentals.mp4
    06:56
  • 003. 9.2 MP-BGP Route Reflectors.mp4
    15:47
  • 004. 9.3 Implementing an EIGRP L3Out.mp4
    03:34
  • 005. 9.4 Tagging Routes.mp4
    06:11
  • 006. 9.5 Implementing an OSPFv2 L3Out.mp4
    16:40
  • 007. 9.6 Preferred Group Member Settings.mp4
    04:08
  • 008. 9.7 Setting OSPF Metrics and Metric Types.mp4
    07:39
  • 009. 9.8 Modifying an L3Out for Firewall Peering.mp4
    13:04
  • 010. 9.9 Implementing OSPFv3 L3Outs.mp4
    07:29
  • 011. 9.10 Implementing BGP L3Outs - Part 1.mp4
    18:56
  • 012. 9.11 Implementing BGP L3Outs - Part 2.mp4
    07:10
  • 013. 9.12 Implementing BGP L3Outs - Part 3.mp4
    12:03
  • 014. 9.13 Implementing BFD on L3Outs.mp4
    09:57
  • 015. 9.14 Implementing BGP Community Strings.mp4
    10:31
  • 016. 9.15 Implementing Route Filtering.mp4
    15:43
  • 017. 9.16 Advertising Default Routes via L3Outs.mp4
    03:25
  • 018. 9.17 Granting Differing Access to External Users - Part 1.mp4
    18:47
  • 019. 9.18 Granting Differing Access to External Users - Part 2.mp4
    05:54
  • 020. 9.19 Granting Differing Access to External Users - Part 3.mp4
    04:57
  • 021. 9.20 Granting Differing Access to External Users - Part 4.mp4
    19:17
  • 022. 9.21 Using the Established Bit in Contracts.mp4
    09:53
  • 001. Learning objectives.mp4
    00:44
  • 002. 10.1 Spanning-Tree and ACI.mp4
    05:53
  • 003. 10.2 Understanding Network-Centric Deployments.mp4
    04:45
  • 004. 10.3 Tenant Design Considerations for Migrations.mp4
    08:46
  • 005. 10.4 ACI and STP TCNs.mp4
    05:32
  • 006. 10.5 Comparing EPG Extensions and L2Outs.mp4
    09:23
  • 007. 10.6 Implementing EPG Extension.mp4
    08:02
  • 008. 10.7 Implementing Protections Against STP TCNs.mp4
    13:04
  • 009. 10.8 Migrating Overlapping VLANs into ACI - Part 1.mp4
    17:05
  • 010. 10.9 Migrating Overlapping VLANs into ACI - Part 2.mp4
    09:39
  • 011. 10.10 Implementing L2Outs - Part 1.mp4
    12:01
  • 012. 10.11 Implementing L2Outs - Part 2.mp4
    06:07
  • 013. 10.12 Migrating Default Gateways into ACI.mp4
    05:52
  • 001. Learning objectives.mp4
    00:49
  • 002. 11.1 vSphere Networking Primer.mp4
    13:42
  • 003. 11.2 Implementing Basic Connectivity to ESXi Servers - Part 1.mp4
    08:39
  • 004. 11.3 Implementing Basic Connectivity to ESXi Servers - Part 2.mp4
    12:41
  • 005. 11.4 Implementing Basic Connectivity to ESXi Servers - Part 3.mp4
    10:14
  • 006. 11.5 Implementing VMM Integration - Part 1.mp4
    11:51
  • 007. 11.6 Implementing VMM Integration - Part 2.mp4
    12:35
  • 008. 11.7 Implementing vSwitch Policies.mp4
    05:59
  • 009. 11.8 Pushing Port-Groups to vCenter - Part 1.mp4
    15:43
  • 010. 11.9 Pushing Port-Groups to vCenter - Part 2.mp4
    09:40
  • 011. 11.10 Integrating a VDS into Dual-port Servers - Part 1.mp4
    15:52
  • 012. 11.11 Integrating a VDS into Dual-port Servers - Part 2.mp4
    05:03
  • 001. Learning objectives.mp4
    00:24
  • 002. 12.1 Service Graph Basics.mp4
    10:31
  • 003. 12.2 Service Graph Design Options.mp4
    11:03
  • 004. 12.3 Deployment Modes.mp4
    02:39
  • 005. 12.4 Implementing Unmanaged Firewall Service Graphs - Part 1.mp4
    11:30
  • 006. 12.5 Implementing Unmanaged Firewall Service Graphs - Part 2.mp4
    11:07
  • 007. 12.6 Implementing Managed Firewall Service Graphs - Part 1.mp4
    06:45
  • 008. 12.7 Implementing Managed Firewall Service Graphs - Part 2.mp4
    15:21
  • 009. 12.8 Implementing Managed Firewall Service Graphs - Part 3.mp4
    16:39
  • 010. 12.9 Implementing Managed Firewall Service Graphs - Part 4.mp4
    07:12
  • 001. Learning objectives.mp4
    00:28
  • 002. 13.1 Enforcing Custom Contracts for OOB Management.mp4
    11:51
  • 003. 13.2 Understanding Inband Management.mp4
    08:56
  • 004. 13.3 Access Policies for Inband Management.mp4
    07:07
  • 005. 13.4 Assigning IPs and EPGs to Inband Management.mp4
    13:29
  • 006. 13.5 Enabling Inband Communication via L3Outs and Contracts.mp4
    08:24
  • 001. Learning objectives.mp4
    00:26
  • 002. 14.1 Understanding System Messages.mp4
    05:16
  • 003. 14.2 Implementing Basic Syslog Forwarding.mp4
    17:50
  • 004. 14.3 Implementing Syslog in Multi-Tenant Environments.mp4
    10:59
  • 005. 14.4 Understanding SNMP.mp4
    05:40
  • 006. 14.5 Configuring ACI for SNMP.mp4
    11:31
  • 001. Learning objectives.mp4
    00:28
  • 002. 15.1 Understanding Security Domains.mp4
    07:09
  • 003. 15.2 Understanding Privileges and Roles.mp4
    05:34
  • 004. 15.3 Creating Local Users and Assigning Access.mp4
    14:38
  • 005. 15.4 Tweaking Roles and User Access.mp4
    04:51
  • 006. 15.5 Implementing Custom RBAC Rules.mp4
    08:01
  • 007. 15.6 Understanding Login Domains.mp4
    09:35
  • 008. 15.7 Configuring ACI for LDAP Authentication.mp4
    16:06
  • 009. 15.8 Configuring ACI for TACACS+ Authentication and Authorization.mp4
    08:48
  • 010. 15.9 Understanding the Required ISE Configuration.mp4
    10:05
  • 001. Learning objectives.mp4
    00:49
  • 002. 16.1 ACI Multi-Pod Use Cases.mp4
    07:43
  • 003. 16.2 Basic Demo of Multi-Site Orchestrator.mp4
    19:42
  • 004. 16.3 ACI Multi-Site Use Cases.mp4
    13:56
  • 005. 16.4 Comparing Multi-Site and Multi-Pod.mp4
    04:04
  • 001. Learning objectives.mp4
    00:25
  • 002. 17.1 Exam Preparation Advice.mp4
    02:29
  • 003. 17.2 Next Steps.mp4
    02:55
  • 001. Module introduction.mp4
    00:45
  • 001. Module introduction.mp4
    00:35
  • 001. Module introduction.mp4
    00:31
  • 001. Module introduction.mp4
    00:37
  • 001. Module introduction.mp4
    00:32
  • 001. Module introduction.mp4
    00:31
  • 001. Module introduction.mp4
    00:16
  • 001. CCNP Data Center Application Centric Infrastructure 300-620 DCACI Summary.mp4
    00:39
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 170
    • duration 22:02:10
    • Release Date 2023/11/07