top of page
top

AR-ASTS

AR-ASTS

Aruba Advanced OS-CX Switching & Troubleshooting Solutions

HPE_Aruba_Authorized_Learning_Partner_152x152.jpg

Price:
Duration:

USD 3,250.00 excl. VAT

5 Days

switching.jpg
PDF.jpg
PDF Outline

Who Should Attend

The ideal candidate for this course is very familiar with Aruba wired switching solutions, including the ability to implement and optimize enterprise

level Aruba Switching campus LAN solutions. Typical candidates in the ASTS course are preparing for the ACSX written and/or ACSX practical exams.

Prerequisits

Prerequisites

The suggested prerequisites for this course are to attend the Implementing ArubaOS-CX

Solutions course or pass the Aruba Certified Switching Professional (ACSP) certification exam.

Course Content

What you'll will learn

This course is structured to help the candidate gain this highest level of expertise, with Aruba wired switching solutions, including the ability to implement and optimize enterprise level Aruba Switching campus LAN solutions. The course focuses on interpreting complex network architectures and customer requirements to implement, monitor, troubleshoot, and optimize multi-vendor network solutions. This course is approximately 30% lecture and 70% hands-on lab scenario-based exercises.

The candidate is encouraged to use critical thinking skills to resolve complex issues in the environments that are beyond the expertise of the professional level integrator. During the performance of his/her primary tasks, the candidate is encouraged to also demonstrate the highest level of strategic thinking and problem solving. This will include defining operational plans for desired outcomes for the purpose of satisfying immediate requirements as well as anticipated future growth opportunities.

Objectives

Course Objective

After you successfully complete this course, expect to be able to:
• Describe diagnostic principles
• Use a proven problem-solving methodology
• Describe REST API, NAE, IP SLA, SNMPv3 and NetEdit troubleshooting tools
• Configure, validate and troubleshoot Network Virtualization features
• Configure and validate PBR
• Deploy and troubleshoot multi-area OSPF
• Deploy and troubleshoot BGP

• Deploy and troubleshoot Route Redistribution
• Deploy and troubleshoot VRF and Route Leaking
• Deploy and troubleshoot Multicast
• Deploy and troubleshoot QoS
• Deploy and troubleshoot Dynamic Segmentation
• Deploy and troubleshoot Network Security
• Deploy and troubleshoot IPv6

Outlines

Course Outline

• Plan The Wired Network Solutions
o Gather customer requirements and network design
o Information gathering steps and questionnaire
o Create and use a Proof-of-Concept (POC) plan
o Creating and using a golden configuration
• Troubleshooting
o Diagnostic Principles
▪ Troubleshooting Principles
▪ Troubleshooting Zones
▪ Troubleshooting Components
o Problem-solving methodology
▪ Identification and Analysis
▪ Hypothesis and Validation
▪ Implement and Verify
o Log files and debugging
▪ Assess and set desired debugging states
▪ Remote logging and log rotation
▪ Event and Account logging
▪ Password reset
o Diagnostic Commands
▪ Resource utilization
▪ Capacities and Environment
▪ Diagnostic tools and diag on-demand
▪ Support Files
o Traffic Analysis
▪ Mirroring concepts and configuration
▪ Mirroring validation
▪ Wireshark setup and usage
▪ Wireshark display filters
• Monitoring and Automation Tools
o REST API
▪ Network Automation and REST API
▪ REST methods
▪ Using the REST interface
o Sending REST API Requests
▪ Swagger resource reference and interface
▪ cURL CLI tool and library
▪ Postman
o Network Analytic Engine
▪ Overview
▪ Scripts and agents
▪ Script types and sources
▪ NAE maximums
▪ Script components
▪ Agent functions
▪ Troubleshooting
o Other Monitoring
▪ IP SLA use and configuration
▪ SNMPv3 use and configuration
▪ NetEdit topology and logs
• VSX, VSF, and Layer 2 Technologies
o VSF
▪ Overview
▪ Stack requirements
▪ Member roles and links
▪ Link failure and split detection
▪ Split stack link and member failures
o VSF Troubleshooting
▪ Status and members
▪ Links and topology
▪ Removing a VSF member
o VSX
▪ Overview
▪ Components
▪ Aggregation: Single routing model
▪ Aggegation: Multiplle VRF routing
▪ Virtual and System MAC guidance
o VSX Best Practices
▪ Nodes, bandwidth, and ISL
▪ Roles and synchronization
▪ Configuration sync
▪ LAG and MSTP configuration
▪ SVI configuration
o VSX Troubleshooting
▪ Status and LAG interfaces
▪ Configuration and VSX sync
▪ Debugging
▪ Configuration consistency
▪ Link/interface status
▪ MAC/peer consistency
▪ LACP interfaces
▪ Configuration parser
o VSX Split Brain
▪ Analyze down conditions and results
▪ Analyze failure scenarios
• Layer 3 Routing and OSPF
o Static Routing
▪ Overview
▪ Default route
▪ Floating static routes
▪ Static Routes with BFD
▪ Routes with Tags
o Policy Based Routing
▪ Overview
▪ Configuration
▪ Validation
▪ VRF
o OSPF Single Area
▪ Review
▪ Adjacencies
▪ Route table vs. diagram
▪ Neighbor table vs. diagram
▪ LSDB vs diagram
▪ LSDB vs network types

o OSPF Multi-area
▪ OSPF review
▪ LSA types and usage
▪ ABRs
▪ Route aggregation and filtering
▪ Interface costs
▪ Passive interfaces
▪ Authentication
▪ BFD
▪ Best practice and troubleshooting review
• BGP
o BGP Concepts and Peers
▪ Use case and features
▪ Configure BGP peers
▪ Sessions and states
▪ eBGP multihop
▪ iBGP full-mesh
▪ Validate BGP peers
o BGP Advertisement
▪ Three key points about BGP advertisements
▪ iBGP and next-hop-self
▪ BGP reachability requirement
▪ The network command
▪ Aggregate-address command
o BGP Metrics and Tuning
▪ Path selection criteria
▪ Prefix lists and route maps
▪ Weight
▪ Local Preference
▪ AS path length
▪ MED
o Route Control
▪ Reasons to control eBGP routes
▪ Route control implementation
▪ Route control validation
▪ Inbound route control
▪ Peer groups
▪ Route reflectors
• Route Redistribution
o Intro to Redistribution
▪ Overview
▪ Redistribute static to OSPF
▪ Static to OSPF configuration and validation
▪ OSPF Type 1 vs Type 2 routes
▪ Using and tuning the default metric
▪ Compare tuning techniques
▪ Prefix list tuning and validation
o Redistribute OSPF to BGP
▪ Scenario
▪ Configuration
▪ Network statements and route maps
o Advanced Route Redistribution
▪ Scenario
▪ AS-path list
▪ Improve BGP convergence times
▪ Route tags
• VRF and Route Leaking
o VRF Overview and Configuration
▪ Overview
▪ Configuration
o VRF Route Leaking
▪ Methods
▪ Restrictions and limitations
▪ Static route leaking configuration and validation
▪ Dynamic route leaking configuration and validation
• Multicast
o Multicast
▪ Introduction
▪ IP address assignments
o Network Access and L2 Multicast
▪ Switching multicast frames
▪ MAC address mapping
▪ IGMP – v1, v2, v3
▪ IGMPv3 messages – membership report, querier election,
▪ IGMPv3 Snooping
▪ IGMPv3 Configuration and verification
▪ VSX and IGMPv3
o IP Multicast at Layer 3
▪ Overview
▪ Tree types Shared/RP, source/SPF trees
▪ Group states
▪ RPF
o PIM
▪ Versions
▪ Messages
o PIM-SIM
▪ Designated Routers
▪ Rendezvous Point
▪ Build-up process
▪ Wireshark analysis
o RP Configuration
▪ Static RP
▪ Dynamic RP
▪ BSR mechanism
▪ Wireshark analysis
▪ VSX and PIM

o Multicast Deployment
▪ Overview
▪ PIM Configuration
▪ Multicast Troubleshooting
• QoS
o Quality of Service
▪ Overview
▪ Traffic characterization
▪ Differentiated Services model
▪ AOS-CX QoS processing
o Ingress Stage
▪ Rate Limiting
▪ Configuration
▪ Verification
o Prioritization Stage
▪ Classifier and Class of service
▪ Marking and Trust
▪ Configuration and Verification
▪ Queuing Stage
▪ Configuration and verification
o Scheduler Stage
▪ Strict Priority
▪ DWRR and WFQ
▪ Configuration and verification
o Remark QoS
▪ Configuration
▪ Verification
• Dynamic Segmentation
o Overview
▪ Objective and benefits
▪ Port-based vs user-based tunneling
▪ UBT components
o Understanding UBT
▪ Tunnel establishment
▪ Role assignment and redirection
▪ Infrastructure requirements
▪ Broadcast and multicast traffic
▪ Configuration and Wireshark analysis
▪ Verification commands
o Deployment Using NetEdit
▪ Configure dynamic segmentation using NetEdit
▪ Verify dynamic segmentation using NetEdit
• Network Security
o Access Control Lists
▪ Overview
▪ Applying ACLs
▪ Object Groups
▪ ACL verification
▪ Counting and logging
▪ ACL resource utilization
o Classifier Policies
▪ Overview
▪ Configuration
▪ Application
▪ Verification
o Control Plane Policing
▪ Overview
▪ Configuration
▪ Verification
o Local User and Group Management
▪ Local AAA
▪ Built-in user groups
▪ User-defined user groups
o TACACS+ Management
▪ Remote AAA using TACACS+
▪ Communication with TACACS+ server
▪ Configure and verify AAA using TACACS+
o DHCP Snooping and ARP Inspection
▪ DHCP snooping configuration and verification
▪ Dynamic ARP operation, configuration, and verification
• IPv6
o IPv6
▪ Features
▪ Headers
▪ Extension headers
▪ Address representation
o Address Types
▪ Unicast
▪ Multicast
▪ Anycast
o ICMPv6
▪ Overview
▪ Neighbor discovery
o Manual IPv6 Addressing
▪ Configuration
▪ Verification
▪ DAD
o Dynamic IPv6 Addressing
▪ Router Advertisements
▪ SLAAC
▪ DHCPv6
o IPv6 Routing
▪ Static
▪ OSPFv3
o IPv6 Access Control Lists
▪ Configuration
▪ Verification

Further information

reg1

If you would like to know more about this course please contact us

HPE_Aruba_Authorized_Learning_Partner_152x152.jpg
HPE_Aruba_Authorized_Learning_Partner_152x152.jpg
HPE_Aruba_Authorized_Learning_Partner_152x152.jpg
Schedule
For dates in South Africa and Africa region 
reg

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT
bottom of page