1 00:00:03,790 --> 00:00:04,120 OK. 2 00:00:04,390 --> 00:00:10,840 So let me go to the next slide, the next slide is about the topics. 3 00:00:11,140 --> 00:00:17,930 These are the six main topics that will be covered under and that is OK, one more thing. 4 00:00:18,400 --> 00:00:22,390 What I noticed is basically Cisco and cool paper. 5 00:00:22,390 --> 00:00:24,220 You will see two different quotes. 6 00:00:24,940 --> 00:00:28,480 OK, now don't get confused when one is this and one is. 7 00:00:30,060 --> 00:00:31,020 Something like this. 8 00:00:31,700 --> 00:00:35,910 OK, so I'm not sure what is the logic behind this? 9 00:00:36,630 --> 00:00:41,550 So basically, Cisco launched it first, the disco and then they changed it to. 10 00:00:41,550 --> 00:00:42,200 This might be. 11 00:00:42,930 --> 00:00:46,320 This was getting overlapped with some other tracks, so might be. 12 00:00:46,320 --> 00:00:50,490 Then they just revised it and introduced a new code. 13 00:00:50,540 --> 00:00:53,120 OK, so the new code now is not this. 14 00:00:53,130 --> 00:00:56,130 Instead, it's three five eight four zero one. 15 00:00:56,640 --> 00:00:56,910 OK. 16 00:00:56,940 --> 00:01:00,780 Your Encore People exam code is T54 zero one. 17 00:01:01,500 --> 00:01:05,300 So the core paper consists of six topics not now. 18 00:01:05,640 --> 00:01:10,380 This is the additional topic which is introduced for the first time in 2020. 19 00:01:10,710 --> 00:01:13,710 This is also a new topic, as well as this OK? 20 00:01:14,280 --> 00:01:17,280 And I guess even the virtualization is a new topic, OK? 21 00:01:17,670 --> 00:01:24,780 So these are the six topics, and you can see the webpage just next to them. 22 00:01:25,230 --> 00:01:25,590 OK. 23 00:01:26,190 --> 00:01:32,220 So basically, this is having the highest rated infrastructure, which is all about your layer two layer 24 00:01:32,220 --> 00:01:32,610 three. 25 00:01:32,790 --> 00:01:40,790 OK, all the routing protocols, your layer two protocols architecture is about your enterprise architectures. 26 00:01:41,870 --> 00:01:46,980 Your wireless architectures, your as different architectures, OK? 27 00:01:47,000 --> 00:01:53,570 Basically, all your two tiered architecture treated architecture, spine, live architecture, the 28 00:01:53,570 --> 00:01:59,120 orientation of the network devices that is being categorized and placed under architecture. 29 00:01:59,720 --> 00:02:07,730 Now regarding virtualisation, anything which is which is coming under virtual things like the or, 30 00:02:07,730 --> 00:02:15,860 let's say, VPN virtual private network and via this virtual routing forward. 31 00:02:16,040 --> 00:02:20,450 So basically, these are all categorized under virtual virtualisation topic. 32 00:02:20,870 --> 00:02:21,140 OK. 33 00:02:21,980 --> 00:02:30,870 Similarly, the infrastructure is all your code topics like a two topics and three topics of your other 34 00:02:30,950 --> 00:02:38,510 other topics like routing, protocol switching topics and all the main things over network assurance 35 00:02:38,510 --> 00:02:42,110 deals with the advancement. 36 00:02:42,110 --> 00:02:47,300 Like you have your DNA coming up here, you have your SDK coming up here. 37 00:02:47,720 --> 00:02:47,960 OK? 38 00:02:48,740 --> 00:02:51,920 All the assurance how you can assure the traffic. 39 00:02:52,370 --> 00:03:00,560 Now security is all about the traffic security or the network security, like your VPN connections or 40 00:03:00,560 --> 00:03:08,390 the layer two attacks, or the security terms like vulnerability, security breaches, trade assets. 41 00:03:08,390 --> 00:03:14,600 So basically everything comes standard security and under automation we have a python. 42 00:03:15,770 --> 00:03:23,240 We have Ansible, we have the data types like string byte. 43 00:03:26,130 --> 00:03:31,200 Tuples list, so basically, it's up, enterprise. 44 00:03:32,070 --> 00:03:40,830 OK, so under interpret what is an enterprise enterprise is something which deals on a higher level 45 00:03:40,830 --> 00:03:42,540 of your networking concept. 46 00:03:42,660 --> 00:03:50,940 OK, now if you go back to your seats, GNP 2019 tax, they used to be routing, routing, switching 47 00:03:50,940 --> 00:03:51,890 and troubleshooting. 48 00:03:51,940 --> 00:03:59,130 OK, now someone who is going ahead with routing, switching, he used to be master of routing, switching, 49 00:03:59,130 --> 00:04:02,340 but he used to be zero at network automation. 50 00:04:02,340 --> 00:04:07,170 He used to be zero at violence, used to be zero at security. 51 00:04:07,260 --> 00:04:16,020 OK, what Cisco thought was what Cisco thinks or what Cisco thought is that getting some engineer blindly 52 00:04:16,020 --> 00:04:20,220 only focused on routing switching is not going to help in the enterprise. 53 00:04:20,670 --> 00:04:23,190 OK, then you go towards enterprise. 54 00:04:23,190 --> 00:04:29,870 Job enterprise is something where you have to deal with a mixture of technology. 55 00:04:29,880 --> 00:04:34,230 It's not only dedicated to routing switching, it is routing. 56 00:04:34,230 --> 00:04:37,620 Switching is one part, but along with routing, switching now it is. 57 00:04:37,950 --> 00:04:41,110 Industry is all focusing on automation. 58 00:04:41,130 --> 00:04:42,690 It is focusing on wireless. 59 00:04:42,690 --> 00:04:44,490 It is focusing on security. 60 00:04:44,490 --> 00:04:49,680 But that is why this new trade focus on enterprise, not just routing, switching. 61 00:04:49,980 --> 00:04:55,410 OK, so you are going to learn everything which is seen in the enterprise. 62 00:04:55,530 --> 00:04:58,470 Now, let's see in future you. 63 00:04:58,510 --> 00:05:03,810 Your interest in your interest is more on the varonis, not on routing switching. 64 00:05:04,140 --> 00:05:07,080 So then you can go and take the CCI wireless in that case. 65 00:05:07,620 --> 00:05:07,920 OK. 66 00:05:08,160 --> 00:05:16,350 So all your export level or the export or the domain level of interest is all categorized or in the 67 00:05:16,350 --> 00:05:18,170 CCI level in. 68 00:05:18,870 --> 00:05:21,410 And it's more of enterprise. 69 00:05:21,420 --> 00:05:24,690 It's not about individual track like routing, switching. 70 00:05:25,110 --> 00:05:31,860 Now, if you talk about CCR, if you just go back to CTIA, this used to be nine tracks. 71 00:05:32,870 --> 00:05:39,440 But in 2020, we only have one track for Canada, which is two zero zero three zero one, and it consists 72 00:05:39,440 --> 00:05:46,010 of everything wireless routing, switching, data center, network automation, everything on one paper 73 00:05:46,010 --> 00:05:47,990 and it's called a an enterprise. 74 00:05:48,210 --> 00:05:50,240 OK, so this is very drastic. 75 00:05:50,240 --> 00:05:55,680 Change in the syllabus might be from last 10 years or 10 15 years. 76 00:05:55,710 --> 00:06:04,610 We are following one particular way of patents, but for the first time, this is completely different. 77 00:06:04,640 --> 00:06:04,890 OK. 78 00:06:05,180 --> 00:06:06,530 This is completely different. 79 00:06:06,770 --> 00:06:11,840 And the good thing is, you're going to learn a lot of things which you will see in day to day activities. 80 00:06:12,530 --> 00:06:23,090 So I have seen people coming up who are seen in Cairo Things City of coming up with network automation 81 00:06:23,090 --> 00:06:27,260 topics, or they want to attend the class where I teach network automation. 82 00:06:27,530 --> 00:06:27,830 OK. 83 00:06:28,250 --> 00:06:32,480 So being a routing switching, they want to learn network automation. 84 00:06:32,570 --> 00:06:32,990 Why? 85 00:06:33,170 --> 00:06:35,780 Because industry is leading. 86 00:06:35,780 --> 00:06:38,300 What industry is moving towards automation? 87 00:06:38,430 --> 00:06:45,920 OK, if you don't learn automation, probably you will end up only in that smaller segment of routing 88 00:06:45,920 --> 00:06:46,650 and switching. 89 00:06:46,670 --> 00:06:47,720 But everyone knows. 90 00:06:48,950 --> 00:06:50,180 No, not now routing. 91 00:06:50,180 --> 00:06:58,490 Switching is getting advanced with the help of all this segmented routing ISP's as divine automation. 92 00:06:58,880 --> 00:07:06,320 So even CCI routing switching guys are now upgrading their skills by joining the Stephen Class or network 93 00:07:06,320 --> 00:07:07,160 automation class. 94 00:07:07,160 --> 00:07:14,120 But you guys have the privilege of learning everything in the in this latest CCN because, OK. 95 00:07:14,510 --> 00:07:16,850 Because we are going to see every, every topic. 96 00:07:17,420 --> 00:07:20,900 OK, so that's that's the advantage of, of course, here. 97 00:07:21,530 --> 00:07:27,920 OK, now let me take you to the next slide, which I will show you the optional paper. 98 00:07:28,150 --> 00:07:30,980 OK, so CCN P consists of two paper. 99 00:07:30,980 --> 00:07:35,180 One is end quote, which we just discussed, and the second one is enhanced. 100 00:07:35,390 --> 00:07:36,040 So it's a. 101 00:07:37,600 --> 00:07:44,860 Advance routing, switching topic now under this, we will see very good topics of very good laps under 102 00:07:44,860 --> 00:07:49,660 layer two technology like BGP, BGP, BGP virus. 103 00:07:50,590 --> 00:07:58,950 We have all ISPs, we have IP, etc., etc. There are very interesting topics here underneath the technology. 104 00:07:59,620 --> 00:08:04,060 Similarly, under VPN, we have IP SEC. 105 00:08:04,900 --> 00:08:07,420 We have DRM VPN. 106 00:08:08,610 --> 00:08:12,720 We have TRT, we have MPLS, VPN. 107 00:08:13,410 --> 00:08:18,020 OK, now this is something which you're getting to learn in the System B level. 108 00:08:18,170 --> 00:08:20,850 Now, no, this is very, very interesting. 109 00:08:20,850 --> 00:08:23,840 Topics like these are very hot topics. 110 00:08:24,030 --> 00:08:30,390 These are all the VPN, which we see in all the large enterprises, and we are able to read them. 111 00:08:30,420 --> 00:08:33,990 We are able to lab the infrastructure security. 112 00:08:33,990 --> 00:08:35,930 There are again, security lapses. 113 00:08:36,390 --> 00:08:38,580 There are both security labs data. 114 00:08:40,620 --> 00:08:42,720 There are many layers to attacks. 115 00:08:42,870 --> 00:08:51,510 OK, and then infrastructure services like all your knocked back DHCP DNS. 116 00:08:51,900 --> 00:08:56,380 So assist log SMP, that interest fixes. 117 00:08:56,400 --> 00:08:57,270 So this is OK. 118 00:08:57,660 --> 00:09:03,510 So basically, this topic is very interesting, and this will, of course, help you in your CCI. 119 00:09:04,110 --> 00:09:08,340 Not not this season, not talking about only from a certification point of view. 120 00:09:08,550 --> 00:09:13,500 Even your day to day activities, most of the things will be of what covered in the syllabus. 121 00:09:13,740 --> 00:09:15,020 OK, fine. 122 00:09:15,030 --> 00:09:16,890 So let's go to the next slide. 123 00:09:17,910 --> 00:09:19,690 OK, I have these PDF. 124 00:09:20,490 --> 00:09:21,510 So what I'll do is. 125 00:09:24,420 --> 00:09:25,590 I'll click on them. 126 00:09:33,190 --> 00:09:39,040 So we can see in detail what are the topics and yes, of course, I shared this PDF. 127 00:09:39,070 --> 00:09:41,620 One of the the classic is over. 128 00:09:41,860 --> 00:09:47,170 So basically the same thing which I explained to you, this is the first chapter under architecture. 129 00:09:47,180 --> 00:09:49,660 We will be seeing the enterprise networks. 130 00:09:50,140 --> 00:09:53,560 I'll let you do three of the fabric, all those things. 131 00:09:53,890 --> 00:09:56,230 These are the wireless architecture. 132 00:09:56,280 --> 00:09:59,350 These are all your on premises versus cloud. 133 00:09:59,620 --> 00:10:03,910 Your as divan as the access cube with. 134 00:10:04,420 --> 00:10:04,750 OK. 135 00:10:05,320 --> 00:10:07,500 All the Mac just cables. 136 00:10:07,510 --> 00:10:09,000 My goodness, tables decamped. 137 00:10:09,490 --> 00:10:16,030 And this is the second chapter is virtualization that will read about hypervisor virtual machine virtual 138 00:10:16,030 --> 00:10:16,610 switching. 139 00:10:16,990 --> 00:10:25,300 We have virtual routing, forwarding GRC IP seq, basically VCs like all all virtualization, not only 140 00:10:25,300 --> 00:10:26,980 from the VM, their point of view. 141 00:10:26,980 --> 00:10:34,360 You guys might be thinking that virtualization might be only VMware, so virtualization is a virtual 142 00:10:34,780 --> 00:10:35,130 event. 143 00:10:35,140 --> 00:10:38,800 You and your IPsec is a virtual VPN, part of a VPN. 144 00:10:39,130 --> 00:10:41,110 So that is also part of virtualization. 145 00:10:41,620 --> 00:10:43,080 Then we have the infrastructure. 146 00:10:43,090 --> 00:10:45,500 Infrastructure is your main layer two and layer three. 147 00:10:45,500 --> 00:10:53,660 OK, all the layer two things like document you TPV, LAN, ITR, channel DTP spanning three protocols. 148 00:10:53,670 --> 00:11:02,430 So understanding we have amnesty and arrested and under layer three, we have IP or ISPs e BGP. 149 00:11:02,440 --> 00:11:05,020 OK, so we would be doing a lot of labs here. 150 00:11:06,340 --> 00:11:11,830 Then we have violence topic, as I told you, this will also consist of a lot less topic like all the 151 00:11:11,830 --> 00:11:20,530 layer two near to the principles the societies, all the access point mode and the Antennagate. 152 00:11:20,830 --> 00:11:21,130 OK. 153 00:11:21,640 --> 00:11:25,330 The there are two antennas 2.4 gigahertz and five gigahertz. 154 00:11:25,570 --> 00:11:29,320 So in-depth knowledge on those topics. 155 00:11:29,890 --> 00:11:31,290 These are IP services. 156 00:11:31,300 --> 00:11:36,220 They'll be checking the network time protocol network address translation. 157 00:11:36,520 --> 00:11:40,480 The first top rated NC protocol, SRP and VRR repeat. 158 00:11:40,810 --> 00:11:42,460 We have multicast topics. 159 00:11:42,670 --> 00:11:45,220 OK, so this is it under infrastructure. 160 00:11:46,000 --> 00:11:51,790 So under network assurance, we have topics like SMP syslog traceroute. 161 00:11:51,970 --> 00:11:53,560 We have the remote locking. 162 00:11:53,560 --> 00:11:55,360 How do we enable remote logging? 163 00:11:55,360 --> 00:11:58,840 What is the UDP protocol for the system? 164 00:11:58,990 --> 00:12:02,680 So anyone knows what is the UDP protocol for this lock? 165 00:12:03,040 --> 00:12:08,920 And I know if someone asked during interview, these are something which you have to remember and also 166 00:12:08,920 --> 00:12:10,930 it will help you during troubleshooting. 167 00:12:11,460 --> 00:12:11,710 OK. 168 00:12:12,790 --> 00:12:16,670 We net flow, flexible neck flow span spent. 169 00:12:17,280 --> 00:12:18,370 You are spent. 170 00:12:18,790 --> 00:12:19,480 This is IP. 171 00:12:19,990 --> 00:12:21,700 Let's say we have to. 172 00:12:23,390 --> 00:12:24,620 ISP connection. 173 00:12:24,670 --> 00:12:31,040 OK, I want to modify or I want to manipulate my LAN users. 174 00:12:31,340 --> 00:12:39,050 Let me say one user was taking up ISP one and the second user was taking ISP to know if ISP two went 175 00:12:39,050 --> 00:12:39,380 down. 176 00:12:39,560 --> 00:12:46,250 And all of all of sudden, you want to track that, and all of a sudden you want to push this user through 177 00:12:46,250 --> 00:12:48,220 to the ISP one. 178 00:12:48,360 --> 00:12:48,560 Right. 179 00:12:48,620 --> 00:12:50,090 So that is all coming under. 180 00:12:50,090 --> 00:12:54,560 Ipsen is a tracking for AVANCER groups. 181 00:12:55,130 --> 00:12:58,610 We have Cisco Disant also called SD NAC. 182 00:12:59,120 --> 00:13:04,820 So basically, now it is even your manager, even your director of your company. 183 00:13:05,000 --> 00:13:11,450 They can have this software installed on their mobile and they can see who is using what. 184 00:13:11,450 --> 00:13:15,440 What is that, which is the application which is consuming the highest bandwidth? 185 00:13:15,650 --> 00:13:20,240 What is the wireless users at this moment? 186 00:13:20,570 --> 00:13:24,890 How many users are connected to this life model? 187 00:13:25,130 --> 00:13:26,570 Everything can be monitored. 188 00:13:26,780 --> 00:13:27,030 OK. 189 00:13:27,050 --> 00:13:28,280 This is a DNS, Anthony. 190 00:13:28,280 --> 00:13:32,340 So let's latest topic and then we have neck control and response. 191 00:13:32,400 --> 00:13:32,570 So. 192 00:13:32,810 --> 00:13:38,420 So in short, this is related to your transport layer. 193 00:13:38,600 --> 00:13:41,530 OK, so we all know what is the let and SNH? 194 00:13:41,800 --> 00:13:50,300 It is all the Nexus S of all the high end devices comes with NEC conference response capacity, so these 195 00:13:50,300 --> 00:13:54,350 are dependent on the STP transport layer. 196 00:13:54,890 --> 00:13:55,190 OK. 197 00:13:55,430 --> 00:14:02,000 And these are used for automation, network automation, not the devices and higher end devices which 198 00:14:02,000 --> 00:14:04,990 don't support net conference wrist control. 199 00:14:05,600 --> 00:14:08,720 So automation is done over Telnet and S-H. 200 00:14:08,840 --> 00:14:09,130 OK? 201 00:14:09,440 --> 00:14:17,750 So let me let me just write here for, let's say, 80 percent of devices are legacy devices, legacy 202 00:14:17,750 --> 00:14:20,030 devices in the sense, all devices. 203 00:14:20,030 --> 00:14:21,530 All your twenty seven. 204 00:14:21,530 --> 00:14:22,850 Fifty thirty seven. 205 00:14:22,850 --> 00:14:23,510 Fifty. 206 00:14:24,140 --> 00:14:25,130 Nineteen hundred. 207 00:14:25,370 --> 00:14:33,360 So these are some legacy devices like legacy devices, which only rely on the left and assistants. 208 00:14:34,130 --> 00:14:38,960 So in case you want to run automation, you either have to use the on. 209 00:14:38,960 --> 00:14:43,610 Either you have to either you have to use it in order to. 210 00:14:45,250 --> 00:14:53,830 Automated things like network automation rest 20 percent are your modern devices, which are kept in 211 00:14:53,830 --> 00:15:00,320 the code looks like your are Nexus 90. 212 00:15:00,820 --> 00:15:04,420 OK, all your high end devices like sixty five hundred. 213 00:15:04,900 --> 00:15:09,550 So these devices by default have to let an associate. 214 00:15:10,560 --> 00:15:16,500 But also, it has advanced things like neck control and response. 215 00:15:17,220 --> 00:15:21,930 OK, now network automation don't have to be done over this. 216 00:15:22,200 --> 00:15:28,110 We can do network automation over this and it relies on a strictly pre transport layer. 217 00:15:28,320 --> 00:15:28,560 OK. 218 00:15:28,770 --> 00:15:33,600 So this is something which we will learn in depth in the network automation topics. 219 00:15:33,990 --> 00:15:38,250 So that is why I said seasoned enterprise is very interesting topic. 220 00:15:38,250 --> 00:15:43,110 And even if you are already done the CC and be routing switching in previously. 221 00:15:43,380 --> 00:15:46,230 So this is something which you will learn a lot of things. 222 00:15:46,380 --> 00:15:52,420 It's not something very something which you are going to read in repeat mode or something. 223 00:15:52,440 --> 00:15:52,710 OK. 224 00:15:52,980 --> 00:15:58,350 The topics are brand new topics you under security. 225 00:15:58,360 --> 00:16:06,000 We have replay, we have access to this, we have control plane access, we have this API. 226 00:16:06,000 --> 00:16:13,410 We have all the wireless security concepts like ERP Extensible Protocol. 227 00:16:13,500 --> 00:16:17,400 This was also used in a point to point protocol. 228 00:16:17,430 --> 00:16:23,610 This is also used in Tripoli, in Tripoli to back end of Tripoli. 229 00:16:23,610 --> 00:16:27,240 So do you guys know how rapidly? 230 00:16:27,510 --> 00:16:34,700 So basically, there are two protocol here when it's called a gas and second one is called Radius, 231 00:16:34,710 --> 00:16:35,010 OK? 232 00:16:35,340 --> 00:16:42,690 So basically what happens is, let's say I have a user here who wants to log in to the network device. 233 00:16:43,170 --> 00:16:45,030 So let's say he does it as such. 234 00:16:45,330 --> 00:16:52,890 So when he does exit this network device in the background will be connected to some centralized, replaceable. 235 00:16:53,160 --> 00:16:54,420 OK, now which? 236 00:16:55,960 --> 00:16:58,980 Protocol this is taking this is taking EPO. 237 00:16:59,650 --> 00:17:05,650 It's nothing but extensible protocol overland, once it reaches the network device network device is 238 00:17:05,650 --> 00:17:12,580 going to send that to Tripoli and Tripoli, Server is going to see whether it's a rightful user I.D. 239 00:17:12,580 --> 00:17:12,850 or not. 240 00:17:13,000 --> 00:17:16,510 It's going to authenticate authenticate authorization account. 241 00:17:16,690 --> 00:17:17,980 That's the full form of this. 242 00:17:18,610 --> 00:17:22,240 Then Tripoli server is letting the network devices. 243 00:17:22,510 --> 00:17:27,970 Yes, this is a rightful device, and the and the device will give the open status. 244 00:17:28,270 --> 00:17:33,550 And now you can do all your show commands like running your IP and all those things. 245 00:17:33,610 --> 00:17:33,850 Right? 246 00:17:34,120 --> 00:17:41,290 So Tripoli is this topic, and EFP is that protocol which is coming under the security topics? 247 00:17:41,450 --> 00:17:43,360 OK, that was just a brief. 248 00:17:43,870 --> 00:17:45,700 We will take them in depth. 249 00:17:46,480 --> 00:17:50,590 And the last chapter here was automation and the end quote people. 250 00:17:52,020 --> 00:17:59,290 So automation is all about your Python, Ansible, the DNA center we have, we manage, which is as 251 00:17:59,310 --> 00:18:05,760 divine Jason is one of the data guides and we have basic Python component and scripts. 252 00:18:05,790 --> 00:18:12,690 OK, I'll show good examples of Python scripts here, and I'll show you how we automate or how the automation 253 00:18:13,440 --> 00:18:15,360 is done nowadays in the office. 254 00:18:16,170 --> 00:18:20,070 So this was regards to code paper consisting of six chapters. 255 00:18:20,490 --> 00:18:28,230 Now let's go to the second module in Hershey, which consists of four chapters, and it's it's also 256 00:18:28,230 --> 00:18:29,340 called this concentration. 257 00:18:29,720 --> 00:18:29,950 OK. 258 00:18:31,250 --> 00:18:37,490 So the first topic here, this layer three technology literate technology is all about routing. 259 00:18:53,930 --> 00:18:59,390 You can't hear, you know, so yeah, yeah, actually, I have some latency, so I'm just waiting to 260 00:18:59,390 --> 00:19:00,170 get cleared. 261 00:19:08,700 --> 00:19:15,570 Actually, I had some latency at a single point of time, so I was just on impulse, OK, so now looks 262 00:19:15,570 --> 00:19:24,240 like it's like, OK, yeah, so under military technology, we have all the routing protocol related 263 00:19:24,240 --> 00:19:24,800 labs. 264 00:19:24,810 --> 00:19:27,720 So and hopefully it's more on labs. 265 00:19:27,760 --> 00:19:35,410 OK, so wherever you see the to troubleshoot, it's basically setting up the lab and proving the concepts 266 00:19:35,450 --> 00:19:35,730 OK? 267 00:19:36,060 --> 00:19:45,060 Although the auto summarization various policy based things e HRP or SPF and the Chapter two is about 268 00:19:45,270 --> 00:19:46,480 VPN technology. 269 00:19:46,800 --> 00:19:52,640 So under VPN technology, we only have theoretical points for MPLS. 270 00:19:52,650 --> 00:20:00,170 But what I'm going to do is I'm going to take one lab here so that we we can prove this whatever we 271 00:20:00,170 --> 00:20:01,380 read for MPLS. 272 00:20:01,410 --> 00:20:03,430 We can also prove it over the lab. 273 00:20:03,450 --> 00:20:03,780 OK. 274 00:20:04,470 --> 00:20:07,080 And apart from MPLS, we have D.A.R.E.. 275 00:20:07,080 --> 00:20:07,990 We have a niche. 276 00:20:08,010 --> 00:20:14,460 RPV have IPv6 and we have all these -- VPN sculptor's folks up to spoke. 277 00:20:14,580 --> 00:20:14,880 OK. 278 00:20:15,330 --> 00:20:22,340 So a lot of things over here and then we have infrastructure security where we are dealing with Tripoli. 279 00:20:22,470 --> 00:20:31,440 We have all the access list, IPv6 router, unique USB, reverse forwarding control plane policies such 280 00:20:31,440 --> 00:20:34,040 as an MP or SPF BGP. 281 00:20:34,050 --> 00:20:41,070 We have the first top protocols and then we have the last chapter which deals with the device. 282 00:20:41,400 --> 00:20:47,160 Telnet Steps FCP all the file transfer protocol. 283 00:20:47,160 --> 00:20:51,740 We have SMP, which is B to C and version three. 284 00:20:51,750 --> 00:20:53,220 What is the difference between this? 285 00:20:53,220 --> 00:20:59,910 We would do some lab for SMP view and see what is the UDP packets here. 286 00:20:59,910 --> 00:21:03,450 How how SMP works, what is SNP manager? 287 00:21:03,990 --> 00:21:08,340 We have been logging as a separate topic under 4.3. 288 00:21:08,610 --> 00:21:15,950 Did we have a local logging, syslog logging debunks timestamp etc etc. And then we have the TCP IP. 289 00:21:15,960 --> 00:21:22,920 Really, we have IP and the NIC flows, the D, the descent. 290 00:21:23,180 --> 00:21:30,000 OK, so basically the first chapters and these are the topics which is falling under CC and.