Training Video Course

350-601: Implementing and Operating Cisco Data Center Core Technologies (DCCOR)

PDFs and exam guides are not so efficient, right? Prepare for your Cisco examination with our training course. The 350-601 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Cisco certification exam. Pass the Cisco 350-601 test with flying colors.

Rating
4.46rating
Students
123
Duration
17:54:00 h
$16.49
$14.99

Curriculum for 350-601 Certification Video Course

Name of Video Time
Play Video: 350-601 DCCOR introduction
1. 350-601 DCCOR introduction
4:00
Play Video: 1 1 a OSPFv2, OSPFv3 Introduction
2. 1 1 a OSPFv2, OSPFv3 Introduction
2:00
Play Video: OSPF Basics
3. OSPF Basics
10:00
Play Video: OSPF LSA Types
4. OSPF LSA Types
10:00
Play Video: OSPF DR BDR & Lab
5. OSPF DR BDR & Lab
20:00
Play Video: OSPF Network Types Metric Passive interface Theory
6. OSPF Network Types Metric Passive interface Theory
11:00
Play Video: OSPF Network Types Metric Passive interface Lab
7. OSPF Network Types Metric Passive interface Lab
13:00
Play Video: OSPF Authentication & Virtual Link Theory
8. OSPF Authentication & Virtual Link Theory
3:00
Play Video: OSPF Authentication & Virtual Link Lab
9. OSPF Authentication & Virtual Link Lab
19:00
Play Video: OSPF Summary Area Types & Default Route 01
10. OSPF Summary Area Types & Default Route 01
12:00
Play Video: SPF Summary Area Types & Default Route 02
11. SPF Summary Area Types & Default Route 02
3:00
Play Video: OSPFv3 Part 01
12. OSPFv3 Part 01
7:00
Play Video: OSPFv3 Part 02
13. OSPFv3 Part 02
6:00
Play Video: 1 .1 b MP BGP
14. 1 .1 b MP BGP
1:00
Play Video: Border Gateway Protocol BGP
15. Border Gateway Protocol BGP
12:00
Play Video: BGP Basic Lab iBGP vs eBGP
16. BGP Basic Lab iBGP vs eBGP
8:00
Play Video: BGP Basic Lab iBGP vs eBGP Continue
17. BGP Basic Lab iBGP vs eBGP Continue
1:00
Play Video: BGP Neighbor & Synchronization
18. BGP Neighbor & Synchronization
6:00
Play Video: BGP Neighbor & Synchronization Lab
19. BGP Neighbor & Synchronization Lab
14:00
Play Video: PIM next 2 Videos
20. PIM next 2 Videos
1:00
Play Video: Protocol Independent Multicast PIM
21. Protocol Independent Multicast PIM
6:00
Play Video: Protocol Independent Multicast PIM Lab
22. Protocol Independent Multicast PIM Lab
9:00
Play Video: FHRP Starts
23. FHRP Starts
1:00
Play Video: FHRP HSRP Theory
24. FHRP HSRP Theory
11:00
Play Video: HSRP Lab
25. HSRP Lab
15:00
Play Video: VRRP Theory
26. VRRP Theory
6:00
Play Video: VRRP Lab
27. VRRP Lab
5:00
Play Video: LACP RSTP vPC start ....
28. LACP RSTP vPC start ....
1:00
Play Video: Etherchannel theory - LACP
29. Etherchannel theory - LACP
12:00
Play Video: Etherchannel Lab LACP
30. Etherchannel Lab LACP
10:00
Play Video: RSTP Rapid Spanning Tree Protocol
31. RSTP Rapid Spanning Tree Protocol
18:00
Play Video: RSTP TCN
32. RSTP TCN
6:00
Play Video: RSTP Lab
33. RSTP Lab
17:00
Play Video: Nexus vPC
34. Nexus vPC
10:00
Play Video: Nexus vPC Part 01 Configuration.1
35. Nexus vPC Part 01 Configuration.1
5:00
Play Video: Nexus vPC Part 02 Configuration.1
36. Nexus vPC Part 02 Configuration.1
5:00
Play Video: 37 Nexus vPC Part 03 Configuration.1
37. 37 Nexus vPC Part 03 Configuration.1
5:00
Play Video: Nexus vPC Part 04 Configuration.1
38. Nexus vPC Part 04 Configuration.1
5:00
Play Video: Vxlan EVPN & OTV starts...
39. Vxlan EVPN & OTV starts...
1:00
Play Video: Vxlan Basics
40. Vxlan Basics
8:00
Play Video: Vxlan Terminologies
41. Vxlan Terminologies
8:00
Play Video: vxlan encapsulation
42. vxlan encapsulation
7:00
Play Video: Vxlan Types
43. Vxlan Types
12:00
Play Video: Topology & Underlay Config
44. Topology & Underlay Config
6:00
Play Video: Scenario 1. Establish iBGP Peer between Spine and Leaf Switches
45. Scenario 1. Establish iBGP Peer between Spine and Leaf Switches
15:00
Play Video: scenario-2-configuring-multicast-to-support-bum-in-vxlan-fabric-
46. scenario-2-configuring-multicast-to-support-bum-in-vxlan-fabric-
15:00
Play Video: Scenario-3-configuring-vxlan-fabric-part-01
47. Scenario-3-configuring-vxlan-fabric-part-01
15:00
Play Video: Scenario 3. Configuring VXLAN Fabric part 02_m1
48. Scenario 3. Configuring VXLAN Fabric part 02_m1
7:00
Play Video: Scenario 4. Configuring BGP EVPN Control Plane
49. Scenario 4. Configuring BGP EVPN Control Plane
12:00
Play Video: Scenario 5. Verify VXLAN EVPN Control Plane Update
50. Scenario 5. Verify VXLAN EVPN Control Plane Update
13:00
Play Video: Scenario 6. Configure Border Leaf to External Entity
51. Scenario 6. Configure Border Leaf to External Entity
6:00
Play Video: Final Verification
52. Final Verification
6:00
Play Video: otv terminology part 01_m
53. otv terminology part 01_m
7:00
Play Video: otv configuration steps 02
54. otv configuration steps 02
6:00
Play Video: otv configuration steps 02-m
55. otv configuration steps 02-m
13:00
Play Video: ACI Apply Policy starts...
56. ACI Apply Policy starts...
2:00
Play Video: What is ACI Ver 01
57. What is ACI Ver 01
9:00
Play Video: ACI Bring up process Theory part 01
58. ACI Bring up process Theory part 01
9:00
Play Video: Bring up process Part 02
59. Bring up process Part 02
5:00
Play Video: ACI Fabric Discovery
60. ACI Fabric Discovery
8:00
Play Video: ACI Constructs
61. ACI Constructs
10:00
Play Video: Fabric Access Policies
62. Fabric Access Policies
8:00
Play Video: Describe Resolution & Deployment immediacy
63. Describe Resolution & Deployment immediacy
9:00
Play Video: Service Graph Theory
64. Service Graph Theory
6:00
Play Video: Section 1.5 Starts...
65. Section 1.5 Starts...
3:00
Play Video: What is ACI Endpoint
66. What is ACI Endpoint
8:00
Play Video: what is vxlan_2
67. what is vxlan_2
12:00
Play Video: Vxlan Encapsulation
68. Vxlan Encapsulation
7:00
Play Video: ACI Overlay Vxlan _ TEP 01
69. ACI Overlay Vxlan _ TEP 01
7:00
Play Video: ACI Overlay Vxlan _ TEP 02
70. ACI Overlay Vxlan _ TEP 02
10:00
Play Video: Endpoint EPG EP Learning _ COOP
71. Endpoint EPG EP Learning _ COOP
14:00
Play Video: Endpoint Learning
72. Endpoint Learning
11:00
Play Video: 1.6 Starts...
73. 1.6 Starts...
1:00
Play Video: What is Cloud Computing
74. What is Cloud Computing
8:00
Play Video: Physical Cloud Data Center
75. Physical Cloud Data Center
3:00
Play Video: Common Cloud Characteristics
76. Common Cloud Characteristics
6:00
Play Video: Measured Services
77. Measured Services
8:00
Play Video: Around the Corner Agile, Cloud-Scale Applications, and DevOps
78. Around the Corner Agile, Cloud-Scale Applications, and DevOps
6:00
Play Video: Chapter 02 Service Providers and Information Technology
79. Chapter 02 Service Providers and Information Technology
5:00
Play Video: Service-Level Agreement
80. Service-Level Agreement
6:00
Play Video: Infrastructure as a Service
81. Infrastructure as a Service
9:00
Play Video: Platform as a Service
82. Platform as a Service
3:00
Play Video: SaaS & XaaS
83. SaaS & XaaS
2:00
Play Video: Chapter 03 Public Clouds
84. Chapter 03 Public Clouds
8:00
Play Video: Private Cloud
85. Private Cloud
4:00
Play Video: Community & Hybrid Clouds
86. Community & Hybrid Clouds
2:00
Play Video: Cisco Intercloud
87. Cisco Intercloud
8:00
Play Video: Chapter 4 Cloud Portal Cisco Prime Service Catalog
88. Chapter 4 Cloud Portal Cisco Prime Service Catalog
7:00
Play Video: Cloud Orchestrator
89. Cloud Orchestrator
7:00
Play Video: Cloud Meter
90. Cloud Meter
4:00
Play Video: Cloud Journey , Consolidation , Virtualization , Standardization & Automation
91. Cloud Journey , Consolidation , Virtualization , Standardization & Automation
7:00
Play Video: Orchestration, Application Programming Interfaces , RESTful APIs
92. Orchestration, Application Programming Interfaces , RESTful APIs
7:00
Play Video: Around the Corner OpenStack
93. Around the Corner OpenStack
5:00
Play Video: 94 1.7 Software upgrade nondisruptive
94. 94 1.7 Software upgrade nondisruptive
16:00
Play Video: Distuptive & SMU or Patches
95. Distuptive & SMU or Patches
13:00
Play Video: Hardware upgrade - EPLD
96. Hardware upgrade - EPLD
8:00
Play Video: Section 1.8 Starts...
97. Section 1.8 Starts...
1:00
Play Video: ACI Management
98. ACI Management
5:00
Play Video: Implement OOB Management
99. Implement OOB Management
6:00
Play Video: Syslog & SNMP
100. Syslog & SNMP
6:00
Play Video: Syslog Lab
101. Syslog Lab
4:00
Play Video: SNMP Configuration details
102. SNMP Configuration details
5:00
Play Video: SNMP Configuration Lab
103. SNMP Configuration Lab
17:00
Play Video: Backup
104. Backup
3:00
Play Video: Backup Lab
105. Backup Lab
6:00
Play Video: Section 1.9 Starts....
106. Section 1.9 Starts....
1:00
Play Video: Understand Netflow
107. Understand Netflow
6:00
Play Video: Netflow Configuration
108. Netflow Configuration
12:00
Play Video: Flexible Netflow
109. Flexible Netflow
4:00
Play Video: Capture the Packet over Data Plan SPAN RSPAN ERSPAN
110. Capture the Packet over Data Plan SPAN RSPAN ERSPAN
3:00
Play Video: SPAN Lab
111. SPAN Lab
7:00
Play Video: Explain network assurance concepts such as streaming telemetry - software
112. Explain network assurance concepts such as streaming telemetry - software
14:00
Play Video: 113 Explain network assurance concepts such as streaming telemetry - hardware
113. 113 Explain network assurance concepts such as streaming telemetry - hardware
7:00
Name of Video Time
Play Video: Section 02 Compute Starts ....
1. Section 02 Compute Starts ....
3:00
Play Video: UCS Architecture
2. UCS Architecture
13:00
Play Video: Chassis Connectivity
3. Chassis Connectivity
7:00
Play Video: UCS Bring up Process
4. UCS Bring up Process
6:00
Play Video: UCS Dashboard walkthrough
5. UCS Dashboard walkthrough
11:00
Play Video: UCS What is Service Profile
6. UCS What is Service Profile
7:00
Play Video: UCS Service Profile Continue ..
7. UCS Service Profile Continue ..
9:00
Play Video: UCS Service Profile Lab 01
8. UCS Service Profile Lab 01
19:00
Play Video: Service Profile Lab part 02
9. Service Profile Lab part 02
4:00
Play Video: UCS Network Management
10. UCS Network Management
7:00
Play Video: UCS Network Management Part 02
11. UCS Network Management Part 02
6:00
Play Video: Storage Related Terminologies
12. Storage Related Terminologies
10:00
Play Video: Section 2.3 & 2.6 Starts..
13. Section 2.3 & 2.6 Starts..
3:00
Play Video: HyperFlex Basics
14. HyperFlex Basics
11:00
Play Video: Course Introduction_C
15. Course Introduction_C
1:00
Play Video: Cisco Intersight_C
16. Cisco Intersight_C
6:00
Play Video: Cisco Intersight Architecture Overview_C
17. Cisco Intersight Architecture Overview_C
4:00
Play Video: Claim Devices_C
18. Claim Devices_C
7:00
Play Video: Scenario 2. Dashboard Overview_C
19. Scenario 2. Dashboard Overview_C
8:00
Play Video: Scenario 3. Add and Remove a Dashboard_C
20. Scenario 3. Add and Remove a Dashboard_C
4:00
Play Video: Scenario 4. Activate Trial Essentials License_C
21. Scenario 4. Activate Trial Essentials License_C
3:00
Play Video: Scenario 5. UCS Management via Intersight_C
22. Scenario 5. UCS Management via Intersight_C
7:00
Play Video: Scenario 6 & 7. Delete All Claimed Devices,Submitting Feedback and Further
23. Scenario 6 & 7. Delete All Claimed Devices,Submitting Feedback and Further
2:00
Play Video: Hyperflex Deployment
24. Hyperflex Deployment
11:00
Play Video: Post Installtion Basic Verification
25. Post Installtion Basic Verification
8:00
Play Video: VM Deployment
26. VM Deployment
5:00
Play Video: UCS Firmware upgrade 01
27. UCS Firmware upgrade 01
10:00
Play Video: UCS Firmware upgrade 02
28. UCS Firmware upgrade 02
7:00
Play Video: UCS Firmware upgrade 03
29. UCS Firmware upgrade 03
6:00
Play Video: UCS Firmware upgrade 04
30. UCS Firmware upgrade 04
4:00

Cisco DCCOR 350-601 Exam Dumps, Practice Test Questions

100% Latest & Updated Cisco DCCOR 350-601 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

Cisco 350-601 Premium Bundle
$69.97
$49.99

350-601 Premium Bundle

  • Premium File: 526 Questions & Answers. Last update: Oct 3, 2024
  • Training Course: 143 Video Lectures
  • Study Guide: 1923 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

350-601 Premium Bundle

Cisco 350-601 Premium Bundle
  • Premium File: 526 Questions & Answers. Last update: Oct 3, 2024
  • Training Course: 143 Video Lectures
  • Study Guide: 1923 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free 350-601 Exam Questions & 350-601 Dumps

File Name Size Votes
File Name
cisco.certkey.350-601.v2024-06-27.by.leo.109q.vce
Size
872 KB
Votes
1
File Name
cisco.real-exams.350-601.v2022-02-23.by.maisie.153q.vce
Size
7.1 MB
Votes
1
File Name
cisco.passit4sure.350-601.v2021-08-10.by.michael.136q.vce
Size
4.75 MB
Votes
1
File Name
cisco.test-inside.350-601.v2021-07-28.by.ryan.109q.vce
Size
872 KB
Votes
1
File Name
cisco.prep4sure.350-601.v2021-04-16.by.darcey.117q.vce
Size
4.67 MB
Votes
2
File Name
cisco.real-exams.350-601.v2021-01-06.by.santiago.88q.vce
Size
3.36 MB
Votes
2

Cisco 350-601 Training Course

Want verified and proven knowledge for Implementing and Operating Cisco Data Center Core Technologies (DCCOR)? Believe it's easy when you have ExamSnap's Implementing and Operating Cisco Data Center Core Technologies (DCCOR) certification video training course by your side which along with our Cisco 350-601 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Introduction

41. Vxlan Terminologies

Another very important fact is In traditional VLAN, we know that we have two power tools. That translates to approximately 4K VLANs supported. And in V xLAN, you can see two to the power of 24. It's a huge number and is calculated. But you can understand how many VLANsegments we can create with this large number. Let's understand what the terminologies used for Bxlan? Now, before going there, there are some summary points. We have already discussed that VXLAN is a good way to maintain the control plane as well. So actually, what it is doing is that inside the control plane you have L two information.

So you have the Mac landing, you have the optimal, you have the Bumreplication, broadcast unicorn, and multicast. That's the key here, with the help of the control plane. So your control plane is now able to understand the two related information layers, the layer two information. And that's why in the upcoming session you'll understand how we can extend a network from one location to another location. And you can use the same type of technology that VPLs is using.So you can do layer two extensions. So, from one data centre to another, you can consider DCI as well as data centre to data centre connectivity, and Mpbgp as a protocol. And since your control plane is aware of LTC information, you can extend or you can stretch LTC. Correct. Now the other thing is that because it's using a routed type of infrastructure, we can either use OSPF or EIGRP, is, etc. as the endeavor. So that's why it supports ECMP, correct? And that's why there's not a break later to agency requirements. It will not break; it has a stateless V motion. So you can take a VM from one DC and move it because there is a pure solid underlying behind the scenes.

So the VM motion is seamless, it will work, it will allow multi tenancy. Yes, you can create multiple tenants. You can create multiple logical networks. Tenant means multiple logical networks, and inside that, you can go and assign the resources and it will work fine. In our lab also, you'll find that we are creating one and inside that we are going to assign all those VXLAN entries and the EVPN et cetera. Then customers, you can see there's a separation of customer traffic over the Y because now you can create Tina one and Tina two, so you have the same hardware infrastructure. But on top of that, you can create different types of tins and since you have different logical networks, you can segregate the customer network, finally allowing for overlapping L-2 and L-3 addresses like Vlad, IP, etcetera. That's a thing. Because since we have multiple logical networks and those are private to that particular tenant or the network, that means you can create multiple addresses, places, etc. and you can reuse those things. Now let's understand the terminology that is used. To understand the terminology, you can go and refer to this diagram.

So you can see what you have in this diagram. You have a V tip, you have a tangent, correct? These are your tenant endpoints. These are your V tips. Then you will know that you have the overlay. So I have VXLAN overlay, but below this overlay you have underlay as well, and maybe you are running OSPF or ISIS. In our lab we are going to use OSPF. So you have the underlay as well, and then you have the overlay, and you have V tip. Then you learn your new term, and in the next session we are going to discuss more about Vnid V net. So what's that? It's very much equivalent to the sVLAN number that we have discussed. But you have a good number of them. Here you can see that we have a VXLAN network identifier, correct? So you will understand that this is the identifier inside the VX line frame or inside the VX line package. And with this identifier, you will understand where you are doing communication.

So we need 100, or 100, or 200, etc. So, if you're communicating in CMV, that means you're in the same segment. But suppose you are doing communication across multiple venues, across multiple segments, or logical segments. So you need to get rid of the VX line at that point, correct? So, whatever terms you have here, you have Vtip, you have Vnet, you have VX line overlay. Then you will find something called NVE. Now this Nven network function enables virtualization encapsulation, et cetera. This environment is nothing but your tenant interface. Let me show you all these things. So overlapping, we have discussed that VTE input. We know that you're maybe Nexus five Kor, maybe seven K as well. But on Nexus Five K or any device where you have the Vslan that you are configuring, this interface will be known as a VTEP because this is your tunnel endpoint. This may be the source, and somewhere you may have the destination endpoint. source and destination VTEPs. Correct. But how are you learning the end points? How are you learning the Mac addresses? So here you have, for example, servers you may have switched to and then you're learning the Mac addresses.

For example, I have one server, learning the Mac address 1111, etcetera. That's why you'll find that you have one switchboard interface that is going towards the servers or local endpoint. And then you may have three interfaces. You may have a SVI interface where you are forming the VCs. correct? If you have two different VX land segments and want to do the communication, you need the VXLAN gateway that we have already discussed. Then in the next section we are going to learn more about this vein and its usability, and exactly where it is in the frame for it.

But this is the VLAN type of ID, and we know that ID can be up to power. 24 is a big number, and it will be sitting inside the frame, and you can go and manually define all the V temps participating in Vslan. It's just an identifier. At this moment, we will understand that this is the identifier. We have the VLAN identifier, then we have the NV Network Virtualization Edge or Network Virtualization or encapsulation, and we are telling you that. But again, it's a virtualization edge. It's a logical thing to do. It's a tunnel interface and whenever you have the V types, one other usability of V tap is the recapitulation and encapsulation. Suppose you have your Edge, you have your VTEP, let's say your device. So when you're sending the packet in the overlay, obviously you will do encapsulation here and when you are receiving the packet, obviously here we will do it and it will get to the receiving end. correct? Finally, you have the underlying network, where you are running the OSP of BGP, and so on. All right, so let's stop here and in the next section we will learn the VXLAN data format in detail.

42. vxlan encapsulation

Next, an important topic We have VXLAN encapsulation. Now let's understand that VXLAN Encapsulation means that you have your inner header, obviously the PLL, and the inner header where you have the excuse source and destination. Then we have the VM VXLAN header, the UDP header, and then the Outer Header. That's why we could have 16 million segments. We have some reserve fields as well for future scope or purpose. Then you can see that we have a reserve and one bit is on. That means that VXLAN is on or we need it to be on.

So that's the VXLAN header. Then you have the UDP header. You have the UDP source and destination. I'll explain this in the upcoming slides, and then you have the Auto Header.So that means whenever the packet starts, it will get attached with the Vslan header and the UDPHeader and then it will go to the next shop, correct? So suppose if you go and do the packet capture, we can see the packet capture will look like this: you have the actual source and then you have the actual destination. Then once you have the actual source and destination, you have the VXLAN header and here you can see that you have the flag and one of the bits ison, which means the VXLAN network is true. So, if the condition is true, you have the inner header, then the VXLAN, and finally the UDP. You can see that you have a UDP source that will be randomly generated and the destination is 4789 in the case of VXLAN. In the case of Ibxlan, that's used inside ACI, it'll be a different port. We'll see that and then you have the Outer Header. You can see the outer header is nothing but the V Tip. So suppose you have two leaves.

These leaves are termed as VTEP Seven and VTEP Two. And are these IP 1010, 51, and 1152 correct for these V tips? Then you should have some actual source and actual destination, those actual source and destination having IP addresses like this. So once they form the dynamic tunnel in between them, I will have two leaves and then I will form the dynamic tunnel in between them. So this is your V Tip and your VTIP where we are encapsulating VXLAN and UDP and then reaching out from one location to another with an available path, correct? Now what are the interesting fields or important fields we have inside this header format? Let me clean this up. So here you can see that inside Vxline Header we have these fields The vineyard is important because it provides 16 million possible segments, and the UDP header clearly shows that the source will be the hash. So you can take any of the available paths to reach your destination, but the destination UDP destination port will be fixed at UDP 4789, correct? The source may be something that it can take multiple paths. That's why we have the ACMP load balance with some fixedrange of port numbers and destination is one portfix 4789 to reach from one place to another.

Then you can go ahead and check the outer header source and destination. Those will be the V tap addresses and then you can check the automatic address as well. We have a total of 50 bytes of overhead with the VX line header. Let me quickly go ahead and show you some of the explanation of those fields. So we have eight bytes for VXLAN divided into those four parts. Three bytes is used as a Vnid to create the segments. The UDP header of eight bytes. The outer destination port is 4789 and the inner source is the hash value inbetween. So here you can see the hash of L two. L three. You have four headers, so you can do the ECMP, correct? Then we have the outer IP header, which is nothing more than the source and destination IP of the V tips. Apart from that, we have to check some UDP protocol and the IP header miscellaneous data. So everything we have checked so far belongs to the Vxline encapsulation, possibly Nexus as well. You can go ahead and enable the VX line and this will work like this. What about ACI Vxline information? ACI VXLAN is termed as IVX Land because if you have two different EPGs, One and Two, you need a contract in between them, correct? So now if the VXLAN communication happens, we have one extra field here for contract that will fall under the flag, we have SP, we have DP, and we have thePC tag as well. That will tell you about the source.

The APG and Flag means the contract is applied or not, soextra fields we have here which will tell whether context isapplied or not the source EPG information is there or not. Then there is a slight change in the UDP destination port. The UDP destination port is 48879. Here we can see 48879. This will be used inside the ACI. Although the entireIVX Land configuration is optimized, we don't need to write a single line of code to do this IVX Land inside the ACI. What we need to do is simply bring up the fabric. Connect the endpoints. Create the rules policy and then attach the leaf switches to what you want from source to destination. What policy? What VM policy, what L four, L seven integration, etcetera et cetera and then the traffic will flow. You don't need to worry about the VXLAN configuration because this is fully 100% optimized inside the ACL fabric.

43. Vxlan Types

Before starting the lab, let's understand a little bit more about VXLAN types VXLAN has three methodologies for the communication it can use, flood, and learn with respect to multicast in this replication. If you don't want to use multicast and then MPGP basedepvpn, in the lab we are going to discuss that and even in this course agenda we have to understand that we have to actually perform the lab related to VPN Let's understand all three one by one and then we'll go and perform the lab task. Flood and learn: as the name suggests, if you don't know the destination, you can flood the traffic across all these segments, but here where you are flooding the traffic inside that multi-cast group that is attached with V an ID or Vnid, what we need to do is that multi-cast group knows that we need it and when you don't know the bum destinations, then for the broadcast unicost So you're flooding the traffic within the same multicast group, right?

So you flood and learn again. If you have a large network with a large number of host machines and when you need if you have thousands of hosts attached, it's not advisable to use this method, but mix and matches are still possible. So in one switch in one vein, you're using one method. You can use other methods as well. The red indicates that unicast packets to the host Mac are sent directly to the source V tip as VX line inappropriations, allowing for a clear distinction between bump traffic and normal traffic. This is how it works. You're flooding that but for unicorn traffic, you're sending that traffic directly with the encapsulation next in thisreplication in case that customer doesn't want to use the multicast methodology to flood it The other option we have is to replicate that traffic. Correct now in the notes section, you can see I have clearly mentioned that when we are using option one, that's the invoice replication, the leaf switch will be able to replicate a packet to every other leaf switch using a specific VNI. So here who is doing the replication, the application is performed with respect to the leaf switch, but if you go and check the multicast methods, So in that method we have this fine switchresponsible to glue. So what is happening here is that inside the multicast group we are sending that request to the spine switch and then a spine switch. That's the course which we have in this topology.

He is performing the task on behalf of the leaf, so you can see that it requires responsesto be able to replicate packet to all the leaf switcheslistening in my Tigers group. So clearly, you can see that there is a difference. And in this replication, all the features are loaded. But in the case of multicast methods that we are using, again with respect to the third option we have, and that's the MPGP L-2 VPN, we are going to use multicast here. Even here, we are using multicast. So in those use cases, what is happening is that your spine switch has to learn and then they have to teach it to the leaf. correct? Let's discuss the third option. We have the Mpbgp option. Now when we are using Mpbgp in that case, and again we'll see later on, we have a difference between the flood and loan and the multi castle.You can see flood and VPN control. So we'll check the difference. But here you can see the case of MPGP-based learning. So control plane learning for the host and whether it's L two or L three, everything will be learned. Understand? With respect to MP BGP, or multi-protocol BGP,because BGP has that capability to learn that. And then, since now it is inside the BGP control plane, we can easily do the distribution as well.

So whether it's within the segment or it's going from one place to another place, we can do the segmentation. But obviously, when we are using BGP. So, at that point, we'd like to communicate from one to another, or perhaps from one data centre where we've defined one to another data centre where you've defined another. Correct. Again, there may be different use cases. You just want to use these methodologies to do the communication in between a data centre or maybe you have some transit in between. So maybe one data centre is working in transit and two DCs are communicating over the transit side. Multiple use cases are there. L two. Again, you can see that the EVPN VNI types, you may have L two, you may have L three. Within the same gateway, within the same Viny boundary, you are doing the communication.

So A is doing something inside A, and B is inside B. But if you have L three, that means A and B want to do the crosstalk somehow from asubnet belongs. He wants to communicate to a subnet inside B. Then he needs a gateway and the gateway learning obviously can happen with the EVPN. We'll check this later on. And no, this is specific to one data center. So maybe your VLAN A is in DC. One and VLAN B are both inside DC. Two. And then you have some gateway, some bridge with respect to MPGP VPN and you want to do the communication. Again, here you can see that the V tips are learning the Mac addresses and you have l two and L three V, which I defined again as the bridge between L two and L three. So if two L two want to communicate, your bridge will come into play. We will see in the next section of the lab what advantage we have with MPV Gpbased methodology. You can see that we minimise network flooding through protocol driven host slash macro distribution and arc separation on the local VDP because clearly you're delegating that task to us. And again, we have the communication method with respect to multicast. So that's one thing that the flooding will reduce, and the second is that it will provide optimal forwarding from east to west and north to south.

So that's true because now you have one control plane and that control plane is aware that it is running BGP and now we know that BGP Finally, this provides VTEP peer discovery and authentication, which mitigates the attack and increases network security. Inside the overlay So these are the important points we have here related to the Vs' land and their types. Now in the final slide, you can see this is the summary slide. You can see the difference between the flood and learning and the EVPN that we are going to use in the next section. So the overlay services are Lt plus Lt. They are providingboth underlying services. You can use any protocol like ISIS. We are going to use OSPF in our lab. Both the technologies are Mac and UDP. They have already discussed the peer discovery they are doing with Mppcp in EVPN. Peer authentication is possible in EVPN methodology As you can see, the host route learning is data-driven. The switches where you are connecting the service are learning that locally and the removed host is using some L2 VPN learning method to learn the remotehost host route redistribution distribution. We can do this with MPGPL two. We have unicast encapsulationof the places that we have discussed earlier. For unicorn traffic, you can do the encapsulation and send it bump traffic here. You can see that multicast replication. As you can see, there are fewer differences here, which is why the Flood and Learn feature is also useful.

It is used in several places, but mostly we find that the EVPN control plan methodology is the most popular. So if you have a small data centre and you want to do the extension of L two or you want to work with your oils, it's very easy. You can go and do the Flood and Learn configuration. But if you want some more features, like authentication and the extension that your controlplane will learn the Mac host, RP, etc., So you can use MPGP. Now, Cisco is using an Mpbgp-type of methodology inside the ACI, correct? So if you go and learn the ACIACI fabric, you'll find that Cisco in the data plane, we have something called IVX land. But in the control plane learning and extension control plane, mpbgp is working there. And it's very easy to use Mpbgp inside the SEI fabric, and it's very easy to use VXLANas well, because we don't need to do anything. VXLAN is completely optional, so it is not included in the SLA. All right, so let's just stop here. The next section will start our lab.

44. Topology & Underlay Config

Let us quickly discuss ourlaptopology and the underlying configuration. Here you can see in our topology we have two spines, spine one and spine two, and these are the respective loops back to address them. Now, these spine and these leaves have dual home, which means I have a back-to-back connection with the spine and the interfaces, as you can see from spine one I have e one less than 112-1314 and from leaf I have e one, e one two, and then one is going towards the server.

Likewise, we have the same sort of interfaces that are going towards the spine and that are going towards the server that are used here in this topology. This topology, you can see, is fairly easy and I'll show you what the IP address is configured here in this. But we are running OSPF as an underlying protocol on this particular infrastructure, and in the next section we'll learn we will go into configuring IBGP. So here with all these leaves and spinestructures, we have a BGP relationship where my spines are acting as route reflectors, okay? And then finally, I have one van router and, again, it is connected to one of the servers. So let us go to the next slide and check what IP address schema is configured here. You can see that from one leaf, that is the dual homeone interface, is going towards spine one, one is going towards spine two, and these are something like p two-P configuration where I have enabled OSPF.

Okay, so let me quickly go to the CLI and from there I'll show you the IP addresses and the OSPs configuration. Here you can see the configuration and what the IP address is configured over the loopback and the physical interfaces. These physical interfaces are point-to-point interfaces, obviously. And let me go to spine two. You can take a note like this: leaf one, leaf two, leaf three, and then the final leaf four. Okay, so whatever was there in the slide is the same type of IP address schema we have. So let me show you one of the interfaces, at least one or two interfaces. So let me show you Salabeback and the last one. So I can go here. I can check loop 0 and then I can check e one, the last one. Suppose if you want to check one, slash one to four, you can use this command here. You can see that the description is going towards leapone, leap two, leap three, and leap four. They have 30 as an IP address because this is the point-to-point type of configuration. We also have an IPOs PF network point to point configured in OSPF. Let me quickly show you the OSPF configuration as well.

So what can I do? I can go and checkOSPF and I will send this script to all. Here you can see OSPF and the router ID as a loopback. Then over all the interfaces, we have this running like this. And then finally, what I can do here is go and run this script so that we can check the underlying routing information that these devices are learning. So I can show the IP route with respect to OSPF. And let me send this script to you all. Let me execute this command one more time. So here you can see that this command is no problem; it is up and running. And here we have the OSPF routing information. Let me type show IPOs, not always, but always, because these are point-to-point networks. So you will get all these neighbourhood relationships. They are in the full estate. That's okay, no problem. Here on the route as well, you can see all the routing updates and information inside this leaf and spine structure. So, likewise, we can check the OSB for our underlying route as well. Okay, so this is the information related to the IP address teams that we have and what type of OSPF configuration that is running in this particular infrastructure. Got you. And then finally, you can check the ShowOSPF routes and the neighbours as well.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap Implementing and Operating Cisco Data Center Core Technologies (DCCOR) certification video training course that goes in line with the corresponding Cisco 350-601 exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about 350-601 Exams. Don't share your email address asking for 350-601 braindumps or 350-601 exam pdf files.

Add Comment

Purchase Individually

350-601  Premium File
350-601
Premium File
526 Q&A
$43.99 $39.99
350-601  Training Course
350-601
Training Course
143 Lectures
$16.49 $14.99
350-601  Study Guide
350-601
Study Guide
1923 Pages
$16.49 $14.99

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.