Training Video Course

300-435: Automating Cisco Enterprise Solutions (ENAUTO)

PDFs and exam guides are not so efficient, right? Prepare for your Cisco examination with our training course. The 300-435 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Cisco certification exam. Pass the Cisco 300-435 test with flying colors.

Rating
4.52rating
Students
104
Duration
08:28:00 h
$16.49
$14.99

Curriculum for 300-435 Certification Video Course

Name of Video Time
Play Video: ENAUTO Introduction
1. ENAUTO Introduction
4:00
Play Video: Find the Topics
2. Find the Topics
7:00
Play Video: Section 1.0 Network Programmability Foundation
3. Section 1.0 Network Programmability Foundation
4:00
Play Video: Introduction to git
4. Introduction to git
7:00
Play Video: Lab using GNS3
5. Lab using GNS3
9:00
Play Video: git Lab
6. git Lab
5:00
Play Video: Git Architecture & GitHub
7. Git Architecture & GitHub
5:00
Play Video: 1.2 What is API
8. 1.2 What is API
7:00
Play Video: REST Representational state transfer
9. REST Representational state transfer
9:00
Play Video: gRPC
10. gRPC
1:00
Play Video: 1.3 Syncronous vs asyncrhonous APIs
11. 1.3 Syncronous vs asyncrhonous APIs
6:00
Play Video: 1.4 Python Basics
12. 1.4 Python Basics
1:00
Play Video: Let's Learn Python
13. Let's Learn Python
11:00
Play Video: Python Conceptual Hierarchy
14. Python Conceptual Hierarchy
8:00
Play Video: 1.5 Python Virtual Environment
15. 1.5 Python Virtual Environment
9:00
Play Video: 1.6 Explain Benefits of Ansible & Puppet
16. 1.6 Explain Benefits of Ansible & Puppet
7:00
Name of Video Time
Play Video: 2.0 Automate APIs & Protocols
1. 2.0 Automate APIs & Protocols
1:00
Play Video: Evolution of Network Mgmt
2. Evolution of Network Mgmt
11:00
Play Video: Model Driven Programming
3. Model Driven Programming
6:00
Play Video: JSON
4. JSON
12:00
Play Video: XML
5. XML
9:00
Play Video: Data Models
6. Data Models
5:00
Play Video: Yet Another Next Generation YANG
7. Yet Another Next Generation YANG
6:00
Play Video: Model Driven Programming Protocols
8. Model Driven Programming Protocols
3:00
Play Video: Netconf
9. Netconf
12:00
Play Video: Restconf
10. Restconf
7:00
Name of Video Time
Play Video: 27 3.0 Network Device Programmability
1. 27 3.0 Network Device Programmability
1:00
Play Video: 28 3.1 Netmiko Intro
2. 28 3.1 Netmiko Intro
3:00
Play Video: 29 Lab Setup over GNS3
3. 29 Lab Setup over GNS3
10:00
Play Video: 30 Lab Setup over GNS3 Part 02
4. 30 Lab Setup over GNS3 Part 02
18:00
Play Video: 31 Build Basic Lab Install Python
5. 31 Build Basic Lab Install Python
9:00
Play Video: 32 Check Python is Running in the Lab Install Netmiko
6. 32 Check Python is Running in the Lab Install Netmiko
3:00
Play Video: 33 SSH via Netmiko
7. 33 SSH via Netmiko
3:00
Play Video: 34 Do the SSH via Netmiko
8. 34 Do the SSH via Netmiko
15:00
Play Video: 35 Add more Commands via Netmiko
9. 35 Add more Commands via Netmiko
10:00
Play Video: 36 SSH to Multiple Devices
10. 36 SSH to Multiple Devices
9:00
Play Video: 37 Run Bulk Commands via SSH
11. 37 Run Bulk Commands via SSH
13:00
Play Video: 38 ncclient to Configure IOX-XE Devcies
12. 38 ncclient to Configure IOX-XE Devcies
3:00
Play Video: 39 Lab ncclient IOS-XE
13. 39 Lab ncclient IOS-XE
16:00
Play Video: 40 3.3 Configure Device via RESTCONF API Python
14. 40 3.3 Configure Device via RESTCONF API Python
1:00
Play Video: 41 Lab Task Integrating Python API --1
15. 41 Lab Task Integrating Python API --1
2:00
Play Video: 42 Lab Task Integrating Python API --2
16. 42 Lab Task Integrating Python API --2
15:00
Play Video: 43 3.4 using Ansible configure IOS-XE
17. 43 3.4 using Ansible configure IOS-XE
7:00
Play Video: 44 Install Ansible Centos
18. 44 Install Ansible Centos
5:00
Play Video: 45 Ansible IOS-XE Lab
19. 45 Ansible IOS-XE Lab
10:00
Play Video: 3.5 Model Driven Telemetry
20. 3.5 Model Driven Telemetry
14:00
Play Video: Network Subscription
21. Network Subscription
9:00
Play Video: Model Driven Telemetry Lab Devnet
22. Model Driven Telemetry Lab Devnet
17:00
Play Video: 3.8 iPXE
23. 3.8 iPXE
7:00
Play Video: ZTP SDWAN
24. ZTP SDWAN
7:00
Play Video: ZTP Lab
25. ZTP Lab
10:00
Play Video: PnP SDWAN
26. PnP SDWAN
10:00
Name of Video Time
Play Video: 5.0 SDWAN API
1. 5.0 SDWAN API
2:00
Play Video: SDWAN API 01
2. SDWAN API 01
10:00
Play Video: SDWAN API 02
3. SDWAN API 02
4:00
Play Video: 5.1 vManage Certificate Administration
4. 5.1 vManage Certificate Administration
13:00
Play Video: 5.2 SDWAN API integration with Python Part 01
5. 5.2 SDWAN API integration with Python Part 01
8:00
Play Video: 5.2 SDWAN API integration with Python part 02
6. 5.2 SDWAN API integration with Python part 02
6:00
Play Video: 5.2 SDWAN API integration with Python part 03
7. 5.2 SDWAN API integration with Python part 03
5:00
Play Video: 5.3 vmanage administration api
8. 5.3 vmanage administration api
5:00
Play Video: 5.4 Implement Python Script to Configure SDWAN with API Part 01
9. 5.4 Implement Python Script to Configure SDWAN with API Part 01
11:00
Play Video: 5.4 Implement Python Script to Configure SDWAN with API Part 02
10. 5.4 Implement Python Script to Configure SDWAN with API Part 02
17:00
Play Video: 5.5 vManage Monitoring API
11. 5.5 vManage Monitoring API
14:00
Play Video: 5.6 vManage troubleshooting API
12. 5.6 vManage troubleshooting API
14:00

Cisco ENAUTO 300-435 Exam Dumps, Practice Test Questions

100% Latest & Updated Cisco ENAUTO 300-435 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

Cisco 300-435 Premium Bundle
$54.98
$44.99

300-435 Premium Bundle

  • Premium File: 105 Questions & Answers. Last update: Apr 10, 2024
  • Training Course: 64 Video Lectures
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

300-435 Premium Bundle

Cisco 300-435 Premium Bundle
  • Premium File: 105 Questions & Answers. Last update: Apr 10, 2024
  • Training Course: 64 Video Lectures
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$54.98
$44.99

Free 300-435 Exam Questions & 300-435 Dumps

File Name Size Votes
File Name
cisco.certkiller.300-435.v2024-02-25.by.grace.63q.vce
Size
3.72 MB
Votes
1
File Name
cisco.braindumps.300-435.v2021-08-18.by.benjamin.50q.vce
Size
2.71 MB
Votes
1
File Name
cisco.actualtests.300-435.v2021-03-31.by.ida.49q.vce
Size
1.93 MB
Votes
2

Cisco 300-435 Training Course

Want verified and proven knowledge for Automating Cisco Enterprise Solutions (ENAUTO)? Believe it's easy when you have ExamSnap's Automating Cisco Enterprise Solutions (ENAUTO) certification video training course by your side which along with our Cisco 300-435 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Automate APIs & Protocols

9. Netconf

Now, the next important topic we have is the net conference. So let's understand "net conf" and "net con" for network configuration protocol. One of the use cases for this, at least at this present time, is that if you check the Cisco SDWAN fabric, you'll find that the V manager inside the management plane is using netconfol to configure all the devices inside the data plane, or maybe pushing the configuration to the control plane via other controllers as well, like Smart. So that is one of the use cases. The other use case that I will show you here is that I'll go and log in to the CSR router.

There you will see that we have so many capabilities related to network configuration on netconf, which is important because this is something called a transaction based protocol. That means that if they do not do all the transactions, they will abort all the data. So until the data is transferred, unless they say otherwise, if you have any interruption, they will not send the rest of the data. The second important thing here is that you can see that the network is confirming that there are running candidates and a startup configuration. So not only do we have the running and startup configurations, but we also have something called the candidate configuration as well. And suppose if you want to put this configuration, this candidate configuration, so there is one command called commit. You can go ahead and do the commit, although we have commit verification, validation checks, et cetera.

So you can do a commit check; those things are also there, which means you're checking the commands that you want to put. So somewhere in between, you have some transactional data that is still not confirmed to push to the device that will be working as a candidate running. We know that it is serving the RAM and startup in the NVRAM, correct? So that's the thing we have now. Earlier, we discussed that NetCorp is a protocol. This is not your transport method. So the underlying transport, the underlying secure transport, we have the SSH, why we need net confidence That's the most important thing we have now. NetConfig is a new model for network management, and this is a transaction based network management protocol that has much more capability than what we can do with SNMP. And SNMP itself has problems, vulnerabilities, and restrictions that you cannot add. The SNMP MIPS libraries are preloaded inside the operating system. There are so many things. The most important thing we have with SNMP in terms of the problem or the restriction is that it's very tight and very vendor-specific. On the other hand, NetComp is widely used because, under the data model, it can be changed, it can be altered, and it is going to give you a number of capabilities that are not possible with SNMP, right?

So now that we have SNMP, even if you check the feature list between SNMP and NetConf, you'll find that NetConf has a huge advantage with respect to SNMP. Now that it can be integrated, the Internet can be integrated via API. And in this lab, we have seen that we are using the restrained API integration with Python. And you have seen how quickly it takes in input from the centralised management plan. Correct. So NETCONF is the protocol that most of the companies are looking at, and a few of the companies are actively using it as well. Now, what are the other features we have in the net comp? They are transactional-based; they are using the client server model. And what does it mean? I will show you in the diagram we have a follow up diagram to understand this client-based communication or client server based communication. Now again, I told you earlier that netconf is a protocol. So the encoding method is maybe XML or maybe JSON, correct? The transport and communication method may be SSH. So you can see that SSH is the transport protocol for the client server model.

So these things will be there. The good thing we have with NETCONF is its flexibility, features, and wide usability. Correct. So the protocol is stacked with the NETCONF here, and we can clearly see the protocol, the message, the RPC and RPC reply, the layers, and the example. Already, we have discussed that we have gifts and four methods. So in general, say Get, Put, Post, and Delete. So these are the methods we have, and apart from those, there are other methods as well. But these are the most widely used methods inside the risk API or full protocol. Now, one by one, you can see that we have explanations about the protocol. So what protocol is it using? The list of the protocol is associated version two SoapTLS. What messages we have, although we have a list of messages, few of the messages are listed here, like RPC, RPC replied to the operations, what operations and how they are going to do the operation, we'll see that. So this client and several communications are going to happen over SSH. Let me quickly show you that. Let me quickly log into the device and show you what it looked like. So here you can see that I logged into my lab, and this is my automation tool, and this is the CSR device. In the CSR device, what I have done is actually generate the crypto key, and we know how to do that.

You need to give the host name and the domain name. And then I have given SSH version two here, and then I have enabled two features, say, NETCONF and netconfying. That's it. After that, you will get the syslog message that your NETCONF is ready to run. You can go and connect like this again; I have set the username and password as "Cisco," but you can give any strong password. Now I try to communicate with the CSR device using SSH. Obviously, the underlying protocol is SSH, and now if I click into, you can see the capabilities that we have all the capabilities related to the network configured inside CSR We have the long list of features, so we have the data collection. We have the three OEM GRP enhancement pool entities; you can see the long list of features that are there inside the net confiscated; you can go and communicate again; we'll discuss more and more about this communication in upcoming slides. How exactly are we communicating now with the methods we have in place for the operation? Config. Edit. Delete. Copy. Lock. Unlock. Close session. Close the session okay. As the name suggests, "kill" means "kill the session." "Close" means close the session. Lock and lock It's a widely used thing that you can go and lock the operation, or you can lock the configuration for some period of time, et cetera, then delete. Edit. Copy, and these are the normal operations that we are doing.

Again, you can see the transaction method we have running a startup and candidate candidate means until you can go and do the commit confirm, it will not push to the device, and it will be there stored as an intermediate configuration, correct? Now that you can see how the communication is happening here, you can see that the client server model client will try to be my network automation client. He tried to send port number 830 with the SSH transport protocol to do the communication with the server. Now what is happening behind the scenes, here you can see these steps that I want to do the communication. For that, I just wanted to connect to the server. I will send my request, and then the server will send the response. Here, you can see the SSH that I have done to the device. Now once I send my request, I'll get the response with the correct capabilities, and we have a long list of capabilities. Once you log in, you can see these are the capabilities; some of them are listed here, but as we have seen, we have a long list of capabilities. Now the client is responding for the supported capabilities, which means I want to run some capabilities, maybe EIGRP, maybe USPS, so now you can see the transaction is happening between the client and server model: the client is sending the query and the server is responding.

So first of all, the server is responding that these are my capabilities. What you're looking for, then, is what the client is sending Okay, I'm looking for EIGRP or OSPF, and for that, I can send my operational code, whatever code I have, like get, put, post, delete, et cetera. But in netconf, we have different commands like get, edit, log, unlock, etcetera. And then, finally, you can go and do the configuration. Suppose if you want to do the configuration for any of the interfaces without using any IP operations or IP related commands. You can go into it. So now you're sending the request for the configuration for the operation to the server, and then the server finally sends the response to the client. Okay. And this will be the summary slide we have. So you can think of this as a step 1234 and 5 and how the client server module underlying protocol SSH is doing the capability exchange on the server. They have to do the configuration as per your operational request. You are the client, and it will provide the response. Okay. Alright. So this way, we can go and do the configuration for the network. Let's stop here.

10. Restconf

Next protocol we have Rest conv. Now suppose that if we understand NETCONF and if we know HTTPS, then Rest Conf is a mix of both. Now again, just to review the things, if you go and check what the protocol to call is NETCONF, what's the data model we are going to use as young? Now what's the transport? So transport may be different. In this case, we have HTTP, but we may also have TLS, SSHP, two HTTPs, etc. For the encoding method, we have XML and JSON. If you go and draw the stack, So here at the bottom, you have the saved data model, and then you have transport.

Now this transport might be SSH, maybe HTTP, maybe TLS, and then you have the encoding method. So encoding is nothing but your XML and your JSON. And then we have the protocol. The protocol we are talking about at this point in time is RESTCONF, which is a mixture of HTTP and NET CONF. So here you can see in the diagram that Conf.young plus Https become Rest.Conference. We have a study that is true at this point in time. Now, if you go and compare the risk and net count, then we'll see that the same thing that we are doing with the net count is different, and the same thing we are doing with the rest of the name is different. Some syntax will be different.

Obviously, we have different methods. So here is the list of methods. We have methods that make what we are doing with web browsing very efficient. So we have get, put, patch, delete. Now, get means like the runningshow command in Cisco devices. "Post" means we are creating a new object. Put means you are updating the object; patch means you are making a margin. Delete obviously means deleting the object with respect to object oriented programming. And then we are doing various operations. Now, let me quickly show you the difference. So, I have the difference between the operations of NETCONF and the West Conf. Clearly, you can see that Get is getconfig, Post is edit, the operation is create, and the operations are create, replace, merge, and delete. very similar from line to line. We can understand that both are running in parallel. It depends on which platform is using what type of protocol. So, for example, if I go and take the example of St. Wan, I can go and login to the vanage; that is my management plan.

And then I can open my API dock. Here you can see in the example that Getmethods related to CSR restaurant API configuration are native. So what this API will do is that. I'll show you a quick example related to the Wemanagement API, showing how you can retrieve the data, how you can read that data, how you can run it, and how you can get the output correct. So what method can we go with and build with our restaurants? And so we have the Python tool; we have Postman. We have Firefox rest client; these are the tools we have, but we see that most of the management plans have inbuilt integration with some of the API tools, and from there you can also go and run them with the help of your web browser. So let me quickly go to my view manager web browser, and I'll show you how we can execute certain APIs, alright? So here you can see I have my view managed, and I can go back and do API documents, so I can reach the API inside this API document. I am very interested in building and running one of the APIs related to monitoring related to interface monitoring, so I can go ahead and search for real time monitoring and enterface.

Now you can see that you have the monitoring and if I can check any other real time monitoring interface, I will get the device, and if I scroll down, you can see that the model is schema and you should put the device name or device ID, and then here you have the methods: 200 ms x 400 macros 403 forbidden 500 They are the few quotes Now here I have the query API, so I can use this query data service API and I can paste it here in the web browser, although you can see the response is 200 there, which means that it was successful, and then you can see the headers and you can see the data as well. Let me quickly run here in the web browser, and once I run here, you can see the output.

The nice thing about this is that I can go to the header and then I am looking for certain interfaces and the status of those, so I can go and filter, and if you can see clearly that the interface is gigabit with respect to this device, and that zero one is up, then it is up. Two is up like that, and you can go and filter if you go and check the name, so you have various things like, "This is the DC one, and this is the interface." This is the device IP, but apart from that, you have so much good information if you're looking for RX and TX packets. You can go and check the TX, you can go and check the RX, and likewise OK, so you can see how easy it is to run and get the output, and because we are doing the API call, this is very much to machine interaction. We are executing the API, and then we are getting the result.

Network Device Programmability

1. 27 3.0 Network Device Programmability

Now we reach Section 3, where we have to learn about network device programmability. And this section is actually a big one, where we have to go and do the automation. We have a series of labs where we can understand the use of Net Miko. We are going to use the NC client, and then we are going to do the configuration of iOS 6 and 8 devices. Then I'll show you the nice example in Section 3, where, with the help of Python, we will do and call the Restful API. Restructed API, and we can see the issue of the get lapse related to SDWAN. Then use the ancient to do the configuration of iOS XE, check the subscription model, the public, and then some of the plug and play options. Okay, so this section is going to be good, informative, and a little bit longer. But we are going to get a good amount of information and knowledge in this particular section. That is section three.

2. 28 3.1 Netmiko Intro

After this recording, we have nine videos just to understand the lab related to Net maker. What is Netmico? Net Migo is nothing but a type of library, or it's a program. You can think of it as a programme to do the SSH devices on the multivendor devices, and then we can send the instructions or send the commands as well. Now, in the lab section, you will understand more and more about the Internet, Miguel. Here you can see the list of supported devices. Not only Cisco, but other vendors are also supported with net Miko.

Again, before Net Miko, you may have a number of vendors and devices, and once you apply Net Miko in a proper manner, you can arrange and recognise your infrastructure. It's very easy to install. We can go and use the pipe. In our case, we have pip three, which you will see in the lab section. Pip three instals net MCO, and net MCO will be up and running to get the instructions. Now, I have given her a good amount of references and links from which you can go and learn more and get more knowledge about Net Miko, Python, and the automation tool. Here you can see that if you go to GitHub, you can go and check this particular link, where you will get a good amount of configurations as well.

Again, if you want to host your devices and do the labs over the cloud, that option is also there. You can go and check the labs, which means you can deploy the devices over the lab and do the practice. The best way that I'm using is that you use the GNS, and if you have the proper images, you can play around with the images, like iOS, XC, Steve, or any other type of device on which you want to do the automation, for we are very much restricted or we are very much working with Cisco specific devices. But if you are in a multi-vendor environment, you can go and check the libraries for these operating systems as well. Now here are the operating systems, for example, Palo Alto, Aruba, and Juliet. These are actually very popular, and most of the companies there are also using these devices as well. So while you are doing the automation, you can write the code and the script for these devices as well. As I already told you, we have nine followers after this video. So watch all those videos, and you will get a good amount of working knowledge related to net migration. All right, so let's stop here.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap Automating Cisco Enterprise Solutions (ENAUTO) certification video training course that goes in line with the corresponding Cisco 300-435 exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about 300-435 Exams. Don't share your email address asking for 300-435 braindumps or 300-435 exam pdf files.

Add Comment

Purchase Individually

300-435  Premium File
300-435
Premium File
105 Q&A
$43.99 $39.99
300-435  Training Course
300-435
Training Course
64 Lectures
$16.49 $14.99

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.