You are previewing Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320, Fourth Edition.
O'Reilly logo
Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320, Fourth Edition

Book Description

This is the Rough Cut version of the printed book.

This is Cisco's authorized, self-paced, foundation learning tool for the latest version of the Cisco Designing Network Service Architectures (ARCH 300-301) exam, now required for CCDP certification. It presents a structured and modular approach to designing networks that are scalable, resilient, offer outstanding performance and availability, and have well-defined failure domains.

In this entirely new Fourth Edition, Marwan Al-shawi and Andre Laurent guide you through performing the conceptual, intermediate, and detailed design of a modern network infrastructure. You'll learn how to create designs that support a wide variety of high-value network solutions over intelligent network services. Closely following the newest CCDP ARCH exam requirements, the authors discuss routing and switching designs of campus and enterprise networks in detail, including data center and wireless networks. Coverage includes:

  • Enterprise IGP and BGP connectivity

  • Wide Area Network (WAN) design

  • Enterprise network to data center integration

  • Designing enterprise security services

  • Designing QoS for enterprise networks

  • Designing large-scale IPv6 networks

  • Designing IP Multicast for the enterprise

  • Software Defined Networking (SDN) for the enterprise

  • As a Foundation Learning Guide, this book fully reflects the content of the newest Cisco CCDP ARCH course. Real-world scenarios illustrate key concepts; chapter learning objectives and summaries help focus study; and review questions help readers assess their knowledge.

    Table of Contents

    1. Title Page
    2. Copyright Page
    3. About the Author(s)
    4. About the Technical Reviewers
    5. Dedications
    6. Acknowledgments
    7. Contents at a Glance
    8. Contents
    9. Icons Used in This Book
    10. Command Syntax Conventions
    11. Introduction
      1. Goals of This Book
      2. Who Should Read This Book
      3. How This Book Is Organized
    12. Part I: Designing Reliable and Resilient Enterprise Layer 2 and Layer 3 Networks
      1. Chapter 1. Optimal Enterprise Campus Design
        1. Enterprise Campus Design Principles
        2. Hierarchy
        3. Modularity
        4. Flexibility
        5. Resiliency
        6. Summary
        7. Review Questions
      2. Chapter 2. EIGRP Design
        1. Scalable EIGRP Design Overview
        2. EIGRP with Multiple Autonomous Systems
        3. EIGRP Multilayer Architectures
        4. EIGRP Hub-and-Spoke Design
        5. EIGRP Fast Convergence Design Considerations
        6. EIGRP Graceful Restart/NSF Considerations
        7. Summary
        8. Review Questions
      3. Chapter 3. OSPF Design
        1. OSPF Scalability Design Considerations
        2. OSPF Area Design Considerations
        3. OSPF Full-Mesh Design
        4. OSPF Hub-and-Spoke Design
        5. OSPF Convergence Design Considerations and Optimization Techniques
        6. Summary
        7. Review Questions
      4. Chapter 4. IS-IS Design
        1. Protocol Overview
        2. IS-IS Hierarchical Architecture Overview
        3. IS-IS Versus OSPF
        4. IS-IS Technical Deep Dive
        5. IS-IS Design Considerations
        6. Summary
        7. Review Questions
      5. Chapter 5. Border Gateway Protocol Design
        1. BGP Overview
        2. Designing Scalable iBGP Networks
        3. BGP Route Reflector Design
        4. Enhancing the Design of BGP Policies with BGP Communities
        5. Case Study: Designing Enterprisewide BGP Policies Using BGP Communities
        6. BGP Load-Sharing Design
        7. Summary
        8. Review Questions
    13. Part II: Emperies IPv6 Design Considerations and Challenges
      1. Chapter 6. IPv6 Design Considerations in the Enterprise
        1. IPv6 Deployment and Design Considerations
        2. Considerations for Migration to IPv6 Design
        3. IPv6 Transition Mechanisms
        4. Final Thoughts on IPv6 Transition Mechanisms
        5. Summary
        6. Review Questions
      2. Chapter 7. Challenges of the Transition to IPv6
        1. IPv6 Services
        2. Link Layer Security Considerations
        3. Summary
        4. Review Questions
    14. Part III: Modern Enterprise Wide Area Networks Design
      1. Chapter 8. Service Provider–Managed VPNs
        1. Choosing Your WAN Connection
        2. Layer 3 MPLS VPNs
        3. Case Study: MPLS VPN Routing Propagation
        4. Layer 2 MPLS VPN Services
        5. Summary
        6. Review Questions
      2. Chapter 9. Enterprise-Managed WANs
        1. Enterprise-Managed VPN Overview
        2. GRE Overview
        3. Multipoint GRE Overview
        4. Point-to-Point and Multipoint GRE Comparison
        5. IPsec Overview
        6. IPsec and Dynamic VTI
        7. DMVPN Overview
        8. Case Study: EIGRP DMVPN
        9. DMVPN and Redundancy
        10. Case Study: MPLS/VPN over GRE/DMVPN
        11. SSL VPN Overview
        12. FlexVPN Overview
        13. GETVPN
        14. Summary
        15. Review Questions
      3. Chapter 10. Enterprise WAN Resiliency Design
        1. WAN Remote Site Overview
        2. MPLS Layer 3 WAN Design Models
        3. Common Layer 2 WAN Design Models
        4. Common VPN WAN Design Models
        5. 3G/4G VPN Design Models
        6. Remote Site Using Local Internet
        7. Remote-Site LAN
        8. Case Study: Redundancy and Connectivity
        9. NGWAN, SDWAN, and IWAN Solution Overview
        10. IWAN Design Overview
        11. Cisco PfR Overview
        12. Enterprise WAN and Access Management
        13. Summary
        14. Review Questions
    15. Part IV: Enterprise Data Center Designs
      1. Chapter 11. Multitier Enterprise Data Center Designs
        1. Case Study 1: Small Data Centers (Connecting Servers to an Enterprise LAN)
        2. Case Study 2: Two-Tier Data Center Network Architecture
        3. Case Study 3: Three-Tier Data Center Network Architecture
        4. Summary
        5. Review Questions
      2. Chapter 12. New Trends and Techniques to Design Modern Data Centers
        1. The Need for a New Network Architecture
        2. Limitations of Current Networking Technology
        3. Modern Data Center Design Techniques and Architectures
        4. Multitenant Data Center
        5. Summary
        6. Review Questions
      3. Chapter 13. Cisco Application-Centric Infrastructure
        1. ACI Characteristics
        2. How the Cisco ACI Addresses Current Networking Limitations
        3. Cisco ACI Architecture Components
        4. ACI Network Virtualization Overlays
        5. Application Design Principles with the Cisco ACI Policy Model
        6. ACI Routing
        7. Summary
        8. Review Questions
      4. Chapter 14. Data Center Connections
        1. Data Center Traffic Flows
        2. The Need for DCI
        3. IP Address Mobility
        4. Case Study: Dark Fiber DCI
        5. Pseudowire DCI
        6. Summary
        7. Review Questions
    16. Part V: Design QoS for Optimized User Experience
      1. Chapter 15. QoS Overview
        1. QoS Overview
        2. IntServ Versus DiffServ
        3. Classification and Marking
        4. Policers and Shapers
        5. Policing Tools: Single-Rate Three-Color Marker
        6. Policing Tools: Two-Rate Three-Color Marker
        7. Queuing Tools
        8. Dropping Tools
        9. Summary
        10. Review Questions
      2. Chapter 16. QoS Design Principles and Best Practices
        1. QoS Overview
        2. Classification and Marking Design Principles
        3. Policing and Remarking Design Principles
        4. Queuing Design Principles
        5. Dropping Design Principles
        6. Per-Hop Behavior Queue Design Principles
        7. RFC 4594 QoS Recommendation
        8. QoS Strategy Models
        9. Summary
        10. Review Questions
      3. Chapter 17. Campus, WAN, and Data Center QoS Design
        1. Campus QoS Overview
        2. WAN QoS Overview
        3. Data Center QoS Overview
        4. Summary
        5. Review Questions
      4. Chapter 18. MPLS VPN QoS Design
        1. The Need for QoS in MPLS VPN
        2. Layer 2 Private WAN QoS Administration
        3. Fully Meshed MPLS VPN QoS Administration
        4. MPLS DiffServ Tunneling Modes
        5. Sample MPLS VPN QoS Roles
        6. Summary
        7. Review Questions
      5. Chapter 19. IPsec VPN QoS Design
        1. The Need for QoS in IPsec VPN
        2. VPN Use Cases and Their QoS Models
        3. IPsec Refresher
        4. IOS Encryption and Classification: Order of Operations
        5. MTU Considerations
        6. DMVPN QoS Considerations
        7. GET VPN QoS Considerations
        8. Summary
        9. Review Questions
    17. Part VI: IP Multicast Design
      1. Chapter 20. Enterprise IP Multicast Design
        1. How Does IP Multicast Work?
        2. Multicast Protocols
        3. Multicast Forwarding and RPF Check
        4. Multicast Protocol Basics
        5. PIM-SM Overview
        6. Multicast Routing Table
        7. Basic SSM Concepts
        8. Bidirectional PIM
        9. Summary
        10. Review Questions
      2. Chapter 21. Rendezvous Point Distribution Solutions
        1. Rendezvous Point Discovery
        2. Anycast RP Features
        3. Anycast RP Example
        4. MSDP Protocol Overview
        5. Summary
        6. Review Questions
    18. Part VII: Designing Optimum Enterprise Network Security
      1. Chapter 22. Designing Security Services and Infrastructure Protection
        1. Network Security Zoning
        2. Cisco Modular Network Architecture
        3. Cisco Next-Generation Security
        4. Designing Infrastructure Protection
        5. Summary
        6. Review Questions
      2. Chapter 23. Designing Firewall and IPS Solutions
        1. Firewall Architectures
        2. Virtualized Firewalls
        3. Case Study 1: Separation of Application Tiers
        4. Case Study 2: Implementing Firewalls in a Data Center
        5. Case Study 3: Firewall High Availability
        6. IPS Architectures
        7. Case Study 4: Building a Secure Campus Edge Design (Internet and Extranet Connectivity)
        8. Summary
        9. Review Questions
      3. Chapter 24. IP Multicast Security
        1. Multicast Security Challenges
        2. Problems in the Multicast Network
        3. Multicast Network Security Considerations
        4. Summary
        5. Review Questions
      4. Chapter 25. Designing Network Access Control Solutions
        1. IEEE 802.1X Overview
        2. Extensible Authentication Protocol
        3. 802.1X Supplicants
        4. IEEE 802.1X Phased Deployment
        5. Cisco TrustSec
        6. Case Study: Authorization Options
        7. Summary
        8. Review Questions
    19. Part VIII: Design Scenarios
      1. Chapter 26. Design Case Studies
        1. Case Study 1: Design Enterprise Connectivity
        2. Case Study 2: Design Enterprise BGP Network with Internet Connectivity
        3. Case Study 3: Design Enterprise IPv6 Network
        4. Case Study 4: Design Enterprise Data Center Connectivity
        5. Case Study 5: Design Resilient Enterprise WAN
        6. Case Study 6: Design Secure Enterprise Network
        7. Case Study 7: Design QoS in the Enterprise Network
    20. Appendix A. Answers to Review Questions
      1. Chapter 1
      2. Chapter 2
      3. Chapter 3
      4. Chapter 4
      5. Chapter 5
      6. Chapter 6
      7. Chapter 7
      8. Chapter 8
      9. Chapter 9
      10. Chapter 10
      11. Chapter 11
      12. Chapter 12
      13. Chapter 13
      14. Chapter 14
      15. Chapter 15
      16. Chapter 16
      17. Chapter 17
      18. Chapter 18
      19. Chapter 19
      20. Chapter 20
      21. Chapter 21
      22. Chapter 22
      23. Chapter 23
      24. Chapter 24
      25. Chapter 25
    21. Appendix B. References
      1. Chapter 1
      2. Chapter 12
      3. Chapter 13
      4. Other References