Courses

Best Courses we offer

  • Home
  • CCNP-Service Provider

CCNP Enterprise CCNP Security CCNP-Data Center CCNP-Service Provider CCNP Collaboration

CCNP Service Provider Training


IPsolutions offers CCNP Service Provider training which is best suited to network engineers, system engineers, and network specialists who are capable of rapid expansion to support continuous service delivery, accountable for delivering reliable carrier-grade networks, and other consumer needs.

80 hrs

Classroom Training
Online Training
Corporate Training

Sunday


CCNP-Service Provider

After completion of training, you will be able to implement OSPF Routing, stable OSPF, control BGP Route Selection, design with BGP Route Reflectors, implement Advanced BGP Operations, map Multicast IP Addresses to MAC Addresses, deploy IPv6 to the Service Provider Network, implement IP Multicast Inter-Domain and delegate traffic to BGP Confederations Traffic Tunnels.




  1. Implementing and Operating Cisco Service Provider Network Core Technologies v1.0 (350-501)
    • 1.0 Architecture
      • 1.1 Describe service provider architectures
        • 1.1.a Core architectures (Metro Ethernet, MPLS, unified MPLS, SR, SRTE, SRv6)
        • 1.1.b Transport technologies (xDSL, DWDM, DOCSIS, TDM, and xPON)
        • 1.1.c Mobility (packet core, RAN xhaul transport for 5G vRAN and ORAN transport)
        • 1.1.d Routed optical network
      • 1.2 Describe Cisco network software architecture
        • 1.2.a IOS
        • 1.2.b IOS XE
        • 1.2.c IOS XR
      • 1.3 Describe service provider virtualization
        • 1.3.a NFV infrastructure
        • 1.3.b VNF workloads
        • 1.3.c Containers
        • 1.3.d Application hosting
      • 1.4 Describe QoS architecture
        • 1.4.a MPLS QOS models (Pipe, Short Pipe, and Uniform)
        • 1.4.b MPLS TE QoS (MAM, RDM, CBTS, PBTS, and DS-TE)
        • 1.4.c DiffServ and IntServ QoS models
        • 1.4.d Trust boundaries between enterprise and SP environments
        • 1.4.e IPv6 flow label
      • 1.5 Configure and verify control plane security
        • 1.5.a Control plane protection techniques (LPTS and CoPP)
        • 1.5.b BGP-TTL security and protocol authentication
        • 1.5.c BGP prefix suppression
        • 1.5.d LDP security (authentication and label allocation filtering)
        • 1.5.e BGP sec
        • 1.5.f BGP flowspec
      • 1.6 Describe management plane security
        • 1.6.a Traceback
        • 1.6.b AAA and TACACS
        • 1.6.c RestAPI security
        • 1.6.d DDoS
      • 1.7 Implement data plane security
        • 1.7.a uRPF
        • 1.7.b ACLs
        • 1.7.c RTBH
        • 1.7.d MACsec
    • 2.0 Networking
      • 2.1 Implement IS-IS (IPv4 and IPv6)
        • 2.1.a Route advertisement
        • 2.1.b Area addressing
        • 2.1.c Multitopology
        • 2.1.d Metrics
      • 2.2 Implement OSPF (v2 and v3)
        • 2.2.a Neighbor adjacency
        • 2.2.b Route advertisement
        • 2.2.c Multiarea (addressing and types)
        • 2.2.d Metrics
      • 2.3 Describe BGP path selection algorithm
      • 2.4 Implement BGP (v4 and v6 for IBGP and EBGP)
        • 2.4.a Neighbors
        • 2.4.b Prefix advertisement
        • 2.4.c Address family
        • 2.4.d Path selection
        • 2.4.e Attributes
        • 2.4.f Redistribution
        • 2.4.g Additional Paths
        • 2.4.h PIC
      • 2. 5 Implement routing policy language and route maps (BGP, OSPF, IS-IS)
      • 2.6 Troubleshoot routing protocols
        • 2.6.a Neighbor adjacency (IS-IS, OSPF, BGP)
        • 2.6.b Route advertisement (IS-IS, OSPF, BGP)
      • 2.7 Describe IPv6 transition (NAT44, NAT64, CGNAT, MAP-T, and DS Lite)
      • 2.8 Implement high availability
        • 2.8.a NSF / graceful restart
        • 2.8.b NSR
        • 2.8.c BFD
        • 2.8.d Link aggregation
    • 3.0 MPLS and Segment Routing
      • 3.1 Implement MPLS
        • 3.1.a LDP sync
        • 3.1.b LDP session protection
        • 3.1.c LDP neighbors
        • 3.1.d Unified MPLS
        • 3.1.e MPLS OAM
      • 3.2 Describe traffic engineering
        • 3.2.a ISIS and OSPF extensions
        • 3.2.b RSVP functionality
        • 3.2.c FRR
      • 3.3 Describe segment routing
        • 3.3.a Segment types
        • 3.3.b SR control plane (BGP, OSPF, IS-IS)
        • 3.3.c Segment routing traffic engineering
        • 3.3.d TI-LFa
        • 3.3.e PCE-PCC architectures
        • 3.3.f Flexible algorithm
        • 3.3.g Locator, micro-segment, encapsulation, interworking gateway
    • 4.0 Services
      • 4.1 Describe VPN services
        • 4.1.a EVPN
        • 4.1.b Inter-AS VPN
        • 4.1.c CSC
        • 4.1.d mVPN
      • 4.2 Configure L2VPN and Carrier Ethernet
        • 4.2.a Ethernet services (E-Line, E-Tree, E-Access, E-LAN)
        • 4.2.b IEEE 802.1ad, IEEE 802.1ah, and ITU G.8032
        • 4.2.c Ethernet OAM
        • 4.2.d VLAN tag manipulation
      • 4.3 Configure L3VPN
        • 4.3.a Intra-AS VPN
        • 4.3.b Shared services (extranet and Internet)
      • 4.4 Implement multicast services
        • 4.4.a PIM (PIM-SM, PIM-SSM, and PIM-BIDIR)
        • 4.4.b IGMP v1/v2/v3 and MLD
      • 4.5 Implement QoS services
        • 4.5.a Classification and marking
        • 4.5.b Congestion avoidance, traffic policing, and shaping
    • 5.0 Automation and Assurance
      • 5.1 Describe the programmable APIs used to include Cisco devices in network automation
      • 5.2 Interpret an external script to configure a Cisco device using a REST API
      • 5.3 Describe the role of Network Services Orchestration (NSO)
      • 5 .4 Describe the high-level principles and benefits of a data modeling language, such as YANG
      • 5.5 Describe configuration management tools, such as Ansible and Terraform
      • 5.6 Describe Secure ZTP
      • 5.7 Configure dial-in/out, TCP, TLS, and mTLS certificates using gRPC and gNMI
      • 5.8 Configure and verify NetFlow/IPFIX
      • 5.9 Configure and verify NETCONF and RESTCONF
      • 5.10 Configure and verify SNMP (v2c/v3)
  2. Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (300-510)
    • 1.0 Unicast Routing
      • 1.1 Compare OSPF and IS-IS routing protocols
      • 1.2 Troubleshoot OSPF multiarea operations (IPv4 and IPv6)
        • 1.2.a Route advertisement
        • 1.2.b Summarization
      • 1.3 Troubleshoot IS-IS multilevel operations (IPv4 and IPv6)
        • 1.3.a Route advertisement
        • 1.3.b Summarization
      • 1.4 Describe the BGP scalability and performance
        • 1.4.a BGP confederations
        • 1.4.b Route reflectors
      • 1.5 Troubleshoot BGP
        • 1.5.a Route advertisement
        • 1.5.b Route reflectors
        • 1.5.c Confederations
        • 1.5.d Multihoming
        • 1.5.e TTL security and inter-domain security
        • 1.5.f Maximum prefix
        • 1.5.g Route dampening
        • 1.5.h Dynamic neighbors
        • 1.5.i Communities
      • 1.6 Describe IPv6 tunneling mechanisms
        • 1.6.a Static IPv6-in-IPv4 tunnels
        • 1.6.b Dynamic 6to4 tunnels
        • 1.6.c IPv6 provider edge (6PE)
      • 1.7 Implement fast convergence
        • 1.7.a Bidirectional forwarding detection
        • 1.7.b Nonstop Forwarding
        • 1.7.c NSR
        • 1.7.d Timers
        • 1.7.e BGP pic (edge and core)
        • 1.7.f LFA
        • 1.7.g BGP additional and backup path
    • 2.0 Multicast Routing
      • 2.1 Compare multicast concepts
        • 2.1.a Multicast domains, distribution trees, and IGMP operations
        • 2.1.b Any-Source Multicast (ASM) versus Source Specific Multicast (SSM)
        • 2.1.c Intra-domain versus inter-domain multicast routing
      • 2.2 Describe multicast concepts
        • 2.2.a Mapping of multicast IP addresses to MAC addresses
        • 2.2.b Multiprotocol BGP for IPv4 and IPv6
        • 2.2.c Principles and operations of PIM-SM
        • 2.2.d Multicast Source Discovery Protocol (MSDP) operations
        • 2.2.e MLDP/P2MP
      • 2.3 Implement PIM-SM operations
        • 2.3.a Auto-RP, PIMv2 BSR, anycast RP
        • 2.3.b BIDIR-PIM operations
        • 2.3.c SSM operations
        • 2.3.d MSDP operations
      • 2.4 Troubleshoot multicast routing
        • 2.4.a Single domain
        • 2.4.b Multidomain
    • 3.0 Routing Policy and Manipulation
      • 3.1 Compare routing policy language and route maps
      • 3.2 Describe conditional matching
        • 3.2.a Operations
        • 3.2.b Semantics of policy applications and statements
        • 3.2.c Regular expressions
        • 3.2.d Policy sets
        • 3.2.e Tags
        • 3.2.f ACLs
        • 3.2.g Prefix lists and prefix sets
        • 3.2.h Route types
        • 3.2.i BGP attributes and communities
        • 3.2.j Hierarchical and parameterized structures
      • 3.3 Troubleshoot route manipulation for IGPs
        • 3.3.a IS-IS
        • 3.3.b OSPF
      • 3.4 Troubleshoot route manipulation for BGP
        • 3.4.a Route filtering
        • 3.4.b Traffic steering
    • 4.0 MPLS and Segment Routing
      • 4.1 Troubleshoot MPLS
        • 4.1.a LDP
        • 4.1.b LSP
        • 4.1.c Unified BGP
        • 4.1.d BGP free core
        • 4.1.e RSVP TE tunnels
      • 4.2 Implement segment routing
        • 4.2.a Routing protocol extensions (OSPF, IS-IS, BGP)
        • 4.2.b SRGB and SRLB
        • 4.2.c Topology-Independent Loop-Free Alternate (TI-LFA)
        • 4.2.d Migration procedures (SR prefer and mapping server)
      • 4.3 Describe segment routing traffic engineering
        • 4.3.a Automated steering and coloring
        • 4.3.b Policies (constraints, metrics, and attributes)
        • 4.3.c PCE-based path calculation
      • 4.4 Describe segment routing v6 (SRv6)
        • 4.4.a Control plane operations
        • 4.4.b Data plane operations
  3. Implementing Cisco Service Provider VPN Services v1.0 (300-515)
    • 1.0 VPN Architecture
      • 1.1 Compare VPN architecture
        • 1.1.a Layer 2 and Layer 3 VPN
        • 1.1.b Inter-AS and Intra-AS
      • 1.2 Troubleshoot underlay
        • 1.2.a Core IGP
        • 1.2.b LSP
      • 1.3 Describe Layer 2 service architecture
        • 1.3.a IOS XR Ethernet Flowpoints
        • 1.3.b IOS XE Ethernet Virtual Circuits
      • 1.4 Describe the L3VPN control plane operation
        • 1.4.a MP-BGP
        • 1.4.b Route distinguisher
        • 1.4.c VPNv4 address
        • 1.4.d Route target
        • 1.4.e VPN label
        • 1.4.f VRF routing instance
        • 1.4.g PE-CE route advertisement
      • 1.5 Describe the L3VPN data plane operation
        • 1.5.a Underlay label
        • 1.5.b VRF forwarding instance
    • 2.0 Layer 2 VPNs
      • 2.1 Troubleshoot L2VPN Services
        • 2.1.a E-LAN
        • 2.1.b E-Line
        • 2.1.c E-Tree
      • 2.2 Describe EVPN concepts
        • 2.2.a Data plane and control plane operation
        • 2.2.b Multihoming mechanisms
        • 2.2.c Suppression mechanisms
        • 2.2.d Traffic forwarding operation
      • 2.3 Implement Ethernet Operations, Administration, and Maintenance (E-OAM)
      • 2.4 Implementing EVPN
        • 2.4.a EVPN IRB
        • 2.4.b EVPN VPWS
        • 2.4.c EVPN native
    • 3.0 Layer 3 VPNs
      • 3.1 Describe routing requirements
        • 3.1.a MP-BGP
        • 3.1.b PE-CE routing protocol
      • 3.2 Troubleshoot Intra-AS L3VPNs
        • 3.2.a PE-CE
        • 3.2.b PE-PE
        • 3.2.c PE-RR
      • 3.3 Implement multicast VPN
        • 3.3.a Intranet MVPN
        • 3.3.b Extranet MVPN
        • 3.3.c MLDP
      • 3.4 Implement extranet/shared services
        • 3.4.a Import and export route targets
        • 3.4.b Route policy
      • 3.5 Describe Inter-AS L3VPNs
        • 3.5.a Option A
        • 3.5.b Option B
        • 3.5.c Option AB
        • 3.5.d Option C
      • 3.6 Describe CSC concepts
    • 4.0 IPv6 VPNs
      • 4.1 Describe routing requirements
        • 4.1.a MP-BGP
        • 4.1.b PE-CE routing protocol
      • 4.2 Troubleshoot IPv6 VPN provider edge
        • 4.2.a PE-PE
        • 4.2.b PE-CE
  4. Automating and Programming Cisco Service Provider Solutions v1.0 (300-535)
    • 1.0 Network Programmability Foundation
      • 1.1 Utilize common version control operations with git (add, clone, push, commit, diff, branching, and merging conflict)
      • 1.2 Describe characteristics of API styles (REST and RPC)
      • 1.3 Describe the challenges encountered and patterns used when consuming APIs synchronously and asynchronously
      • 1.4 Interpret Python scripts containing data types, functions, classes, conditions, and looping
      • 1.5 Describe the benefits of Python virtual environments
      • 1.6 Explain the benefits of using network configuration tools such as Ansible and Puppet for automating IOS XE or IOS XR platforms
    • 2.0 Automation APIs and Protocols
      • 2.1 Describe the characteristics and use of YANG Data Models (OpenConfig, IETF, and Vendor)
      • 2.2 Describe common HTTP authentication mechanisms (basic, token, and oauth)
      • 2.3 Compare common data types (JSON, XML, YAML, plain text, gRPC, and protobuf)
      • 2.4 Identify the JSON instance based on a YANG model
      • 2.5 Identify the XML instance based on a YANG model
      • 2.6 Interpret a YANG module tree generated by pyang
      • 2.7 Implement configuration and operation management using RESTCONF protocol
      • 2.8 Implement configuration and operation management using NETCONF protocol
      • 2.9 Compare the NETCONF datastores
    • 3.0 Network Device Programmability
      • 3.1 Deploy device configuration and validate operational state using ncclient
      • 3.2 Construct a Python script using NETCONF with YDK
      • 3.3 Deploy device configuration and validate operational state using NetMiko
      • 3.4 Deploy device configuration and validate operational state using Ansible playbooks
      • 3.5 Compare gNMI with NETCONF
      • 3.6 Construct a Python script using RESTCONF with JSON
      • 3.7 Construct Xpath notation for a given node or instance of a node
      • 3.8 Diagnose model-driven dial-in/-out telemetry streams with gRPC for a Cisco IOS XR
    • 4.0 Automation and Orchestration Platforms
      • 4.1 Describe ETSI NFV
      • 4.2 Describe NSO architecture
      • 4.3 Identify the benefits of NSO
      • 4.4 Construct a Python script to configure a device using NSO RESTCONF API
      • 4.5 Describe the management and automation of Cisco ESC components
      • 4.6 Implement XR traffic controller (including topology information transfer to XTC)
      • 4.7 Identify the uses of Cisco WAE
      • 4.8 Construct a service template using NSO
      • 4.9 Deploy a service package using NSO

Your message has been sent. Thank you!