Only 14 days
Classroom
28/10/2024 (Monday)
Overview
On this accelerated 14-day Cisco CCNP Wireless course, you'll develop advanced knowledge of wireless technologies.
You'll be immersed in the curriculum with our unique Lecture | Lab | Review technique, which combines classroom lectures and practical exercises to help you learn how to design, implement, and operate Cisco Wireless networks and mobility infrastructures, faster.
Your expert instructor will guide you through networking principles and theory and teach you how to assess and translate network business requirements into technical specifications that in turn, are combined into successful installations.
During the course, you'll prepare for and sit the following four exams, covered by your Certification Guarantee.
- 300-360 WIDESIGN
- 300-365 WIDEPLOY
- 300-370 WITSHOOT
- 300-375 WISECURE
Benefits
Reasons for Cisco certification include career advancement, personal improvement, skills enhancement, higher earnings, and increased on-the-job productivity.
Why Cisco Certifications?
- Cisco Certified Professionals are among the highest paid in the world.
- Cisco Certification gives you respect in IT Industry by allowing you to provide great value and service to any organisation you work for.
- Cisco Certification validates an individual's achievement, thereby increasing the holder's professional credibility by ensuring high standards of technical expertise.
- Industry trend shows that with each certification there is an increase in salary of the certificate holders. Additionally, multiple certifications directly correlate to further increases.
Cisco certifications also afford you special membership benefits:
- A certificate of accomplishment.
- A wallet card, logo and designation for your personal promotion to clients or potential employers.
- Access to the secure Cisco on-line tracking system so you can download logos, and track your Cisco certification progress throughout your career.
Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.
Curriculum
Designing Cisco Wireless Enterprise Networks (300-360)
1.0 Obtaining Customer Requirements as Related to the WLAN Installation
1.1 Identify business and RF application needs
1.2 Identify client density, capabilities and their impact on the wireless network
- Client quantity, radio type, spatial streams
1.3 Identify the challenges of setting up a wireless network by various vertical markets
1.4 Describe required site survey documentation
- Customer questionnaire
- Floor plans & their quality
- Describe the deliverables of the site survey
1.5 Identify coverage area requirements
- Mesh
- High density
- Security sensitive
- Real-time applications
2.0 Determine Facility Type and Constraints Related to WLAN Deployments
2.1 Describe the impact of regulatory domains
- Mesh
- Channel and power
- Multi-national deployments
2.2 Identify deployment location safety considerations
2.3 Identify the impact of customer aesthetic limitations on the installation
2.4 Assess the existing wired and wireless infrastructure
- Determine high-throughput and very high throughput (VHT) protocol (n/ac) impact
- Determine existing wireless infrastructure if required
2.5 Identify impact of material attenuation
- Walls, cubicles, and the likes
- Single/multi-floor
- Campus
- Warehouse/retail
- Subtitle number 2.2
3.0 WLAN Predictive Design
3.1 Select the criteria used for coverage design
- Data vs voice vs video vs location
3.2 Demonstrate the impact of frequency planning in a high-density environment
- Band select for high density
- Optimise 2.4 GHz radio utilisation
- Legacy devices
- Channel width
3.3 Use PI and Ekahau planning tools to make network plan
- Enter network requirements in the tool
- Capacity requirements
- Coverage requirements
- Define the environment
- Maps and scale
- Types of RF obstacles
- Place and configure simulated APs and antennas
- Place simulated APs (manual, automatics)
- Adjust APs and Antennas / AP TX power height and down tilt
- Analyse key network metrics using heat maps for 2.4 and 5GHz
- Analyse coverage, SNR, and channel overlap
- Analyse AP placements in regards to real time handoffs around corner
4.0 Pre-Deployment Site Survey
4.1 Identify the appropriate site survey equipment and access requirements based on environmental needs
4.2 Complete the Layer 2 site survey for indoor, and outdoor MESH environments
- Select proper AP and antenna for conducting site survey
- Configure AP
- Survey for worst case client
4.3 Complete Layer 1 survey (Cisco CleanAir, Metageek Chanalyzer)
5.0 Post-Deployment Site Survey
5.1 Verify RF coverage
- Utilise tools (Ekahau) for audit
- RRM, controller
- Analyse SNR, channel overlap, and packet loss
5.2 Verify network applications and performance
- Apply PI tools (voice readiness, location readiness, site calibration)
5.3 Reconcile any deployment issues
5.4 Assemble and deliver installation report to the customer
- Indoor
- Outdoor MESH
6.0 Design the Infrastructure of the Wireless Network
6.1 Determine physical infrastructure requirements
- AC Power and POE
- Understand cable plant considerations
- Mounting considerations: NEMA
- Outdoor grounding and lighting protection
- Rack capacity
- Switch port capacity
6.2 Determine logical infrastructure requirements
- Determine AP count, controller count, and license requirements
- Decide the type of architecture for the deployment
6.3 Describe IPv6 optimisation on the WLC
- RA filter
- DHCP Server guard
- DHCPv6 Source guard
7.0 Describe and Design Wireless Architecture for Real-time Applications
7.1 Describe the relationship between real-time applications & the wireless networks
- Packet Error Rate (PER)
- RF Coverage
- Bit Error Rate (BER)
- QoS
- Call Admission Control (CAC)
- Client roaming decision algorithm
7.2 Describe voice and video as they apply to the wireless network
- Device capabilities (hardware and software)
- Call setup/data flow overview
- Other wireless voice and video services (i.e. Jabber, Lync, Skype, Viber, Facetime)
- Standards and WIFI Alliance (WFA) certifications (.11r, .11e, .11n/ac, .11k, CCKM, voice enterprise, voice personal, WMM, UAPSD)
- Cisco Compatible Extensions (voice features)
- Voice and video codecs
- Skinny Client Control Protocol (SCCP)
- Session Initiation Protocol (SIP)
7.3 Describe real-time applications (other than voice and video) as they apply to the wireless network
- Session-based and non-session based
- Roaming sensitivity
- Disconnection issue
7.4 Design wireless roaming parameters for supporting real-time applications
- 802.11 r/k, CCKM, OKC, mobility groups, interface groups,
- Tuning RF parameters
- AP placement considerations
7.5 Design wireless parameters for supporting real-time applications
- Minimum speed requirements-RSSI and SNR
- Client transmit and receive sensitivity/mismatch with AP
- Cell overlap requirements
- Cell separations
- Traffic control and management, QoS, VLAN, WMM, AVC
- Delay and jitter requirements
- CAC and TSPEC
- Spectrum
- 802.11n/ac enhancements
- Concurrent client connections
- Band select
Deploying Cisco Wireless Enterprise Networks (300-365)
1.0 Implement QoS for Wireless Applications
1.1 Describe and implement general considerations for wired QoS
- Configurations
- DSCP/IP precedence to 802.1p mapping
- Voice VLAN
- Trust boundaries
1.2 Describe and implement the appropriate wireless QoS deployment schemes
- 802.11e / WMM
- Mapping-wired to wireless
- Alloy QOS
1.3 Configure infrastructure QoS for wireless clients
- CAC
- TSPEC
- EDCA parameters
- Queues
- Bandwidth control and override
1.4 Implement AVC
- Configure AVC
- Profiles
- Netflow/NBAR2
- Monitor AVC
- Controller
- PI
2.0 Implement Multicast over Wireless
2.1 Describe general multicast concepts
- PIM
- Cisco Group Management Protocol
- IGMP snooping
- RP
2.2 Describe implications for multicast in 802.11
- Highest mandatory data rate
- Unicast and multicast modes
- Roaming
- Controllers having same CAPWAP multicast group
- Video stream (reliable multicast)
- mDNS
2.3 Configure multicast in a wireless network
- Infrastructure multicast group
- IGMP snooping on the controller
- Video stream (reliable multicast)
- Switch peer group / Mobility group multicast
2.4 Configure mDNS
- mDNS gateway
- LSS
- Service advertisement
- MAC priority
- AAA override
- ISE portal
- Static advertisements on converged access
- mDNS profiling
3.0 Implement High Density
3.1 Design for High Density
- High client count (high capacity)
- High AP count (high density)
3.2 Implement RXSOP
3.3 Implement enhanced roaming
3.4 Implement AP Groups
- RF profiles
3.5 Implement interface groups
3.6 Implement client limits
- Per Radio
- Per WLAN
- Per Interface
4.0 Design and Deploy WLAN Infrastructure for Mobility
4.1 Describe the impact of client VLAN assignment on mobility
- AP group VLANS
- Identity-based networking
4.2 Minimise inter-controller roaming
4.3 Describe mobility control plane architectures
4.4 Describe mobility tunneling process
- Formation
- Ability to identify the tunnels created
- Tear down
- Messaging
- Handoff types
4.5 Implementing client mobility
- Switch Peer Group (SPG)
- Mobility groups
- Mobility lists
- Anchoring
- Virtual interface continuity
- Mobility Optimisation (11k/11v)
- Verify resulting mobility tunneling structure
5.0 Implement Cisco MSE Architecture
5.1 Describe Cisco MSE capabilities and integration with wireless network architecture
- Context aware
- Adaptive wireless IPS
- Analysis
- CleanAir
- Scalability
5.2 Describe location techniques
- Angulation
- Cell of origin
- TDoa and ToA lateration
- RSS lateration
- Pattern recognition
- RF Fingerprinting
- Compare probe based location vs data frame based location
- Bluetooth Low Energy (BLE)
5.3 Identify the relevant parameters required Initialise MSE for network operations
5.4 Implement base location services
- Calibration procedure
- PI based
- Ekahau based
- Complex environments
- Mixed use environments
- Complex RF environments
- Small areas ( i.e new presence capabilities)
- Multi-floor facilities
- Recalibration
- NMSP
- Synchronisation
- History parameters
- Tracking parameters
- Active RFID tag
- WiFi-Devices
- Active Interferes
- Rogue devices
5.5 Implement advanced location services
- Analytics
- Location (Zone based)
- Presence (site based)
- Visitor connect
- Describe AppEngage
- Facebook for Wi-Fi
- Integrate MSE with PI
- Identify the relevant components to integrate the MSE with PI
- Identify the relevant steps to Integrate MSE with PI
- Identify the relevant steps required to Maintain MSE
6.0 Design and Implement FlexConnect Architecture
6.1 Compare and contrast the components of FlexConnect architecture
- Local switching vs Central switching
- Local Auth vs Central Auth
- Connected mode vs Standalone mode
6.2 Describe and implement the capabilities of a FlexConnect group
- VLAN mapping
- ACLs
- AP Image upgrade
- Authentication and key management
- Central vs Local DHCP
6.3 Describe the impact of FlexConnect architecture on roaming
- ACLs
- Authentication
- Key management
- Real-time application
6.4 Describe and implement Office Extend operation
- Configuration
- Controller
- AP
- Split tunneling for printing and general traffic
7.0 Implement Controller and AP High Availability
7.1 Configure the wireless network for high availability
- LAG vs Port based
- Backup primary and backup secondary outside of mobility group
- Anchor controller redundancy
7.2 Configure high availability for the AP
- AP fallback
- AP prioritisation
- Legacy primary ,secondary, and tertiary
7.3 Configure high availability for the Controller
- AireOS
- Stateful switchover (SSO)
- IOS-XE
- Stateful switchover (SSO)
- Stacking
8.0 Wireless Bridging (MESH)
8.1 Describe the following MESH AP modes of operation
- RAP
- MAP
- Flex on MESH
8.2 Describe the considerations for a MESH deployment
- Hop count
- Backhaul caveats
- AP authorisation
- Outdoor RF considerations
- VLAN transparent bridging
8.3 Describe the convergence of a MESH network
- Cisco AWPP
- Bridge group names
- Parent selection
- Fast convergence modes
- Re-convergence
8.4 Implement workgroup bridge
- Proprietary
- Reliable multicast
- Roaming
- Universal
8.5 Describe the passive client feature
- No IP address learning
- Third party WGB support
Troubleshooting Cisco Wireless Enterprise Networks (300-370)
1.0 Troubleshooting Methodology
1.1 Apply the appropriate troubleshooting methods to identify an issue
- Bottom-up
- Top-down
- Divide and Conquer
- Shoot from the hip
1.2 Utilise the appropriate tools to assist in isolating an issue
- Interpret Show commands
- Interpret Debug commands
- Interpret Config analyser output
- Interpret Sniffer traces
- Interpret Spectrum analysis
- Interpret Ekahau output
2.0 Troubleshoot AP Joining Issues
2.1 Resolve controller discovery issues
- Compare controller discovery methods
- Analyse Controller selection method
2.2 Resolve DTLS session establishment issues
2.3 Resolve AP Joining issues
- Analyse join phase issues
- Analyse configuration phase issues
3.0 Troubleshoot Client Connectivity Issues
3.1 Identify and resolve authentication issues
- Identify 802.11 issues
- Analyse external EAP issues
- Resolve local EAP issues
- Resolve WebAuth issues
3.2 Identify RF signal issues
- Analyse poor RSSI/SNR issues due to AP-client positions
- Evaluate degraded RF conditions in the cell
- Evaluate excessive retries
- Resolve poor roaming performances (client stickiness or cell overlap issues)
3.3 Resolve supplicant configuration issues – (iOS, Android, Windows, MAC OS, year 2013+)
3.4 Troubleshooting autonomous AP links
- Troubleshooting workgroup bridge connectivity
- Troubleshoot WGB roaming issues
- Evaluate AP to AP EAP authentication issues
- Resolve root and non-root connectivity issues
4.0 Identify and Locate RF Interferences
4.1 Identify and mitigate rogues
- Characterise rogue clients and rogue access point
- Implement rogue mitigation techniques
4.2 Manage non-802.11 interferences
- Detect and characterise non-802.11 interferences
- Evaluate interference Zone of impact
- Assess interference security severity
5.0 Troubleshoot Client Performance Issues
5.1 Characterise roaming issues
- Identify client stickiness
- Mitigate ping-pong effect
- Resolve cross-band roaming issues
5.2 Evaluate throughput and data rate issues
- Identify rate shifting issues
- Evaluate incompatible client requirements vs AP settings
5.3 Identify the source of poor user experience
- Evaluate L2 issues vs upper Layer issues
- Identify cell design issues
- Mitigate Overlapping Basic Service Sets (OBSS) issues in high-density designs
- Resolve channel planning issues
6.0 Identify Common Wired Infrastructure Issues Based on the Output From Common Troubleshooting Tools
6.1 Identify DHCP - DHCPv4 / DHCPv6 issues
6.2 Identify DNS issues
6.3 Identify VLAN issues
6.4 Analyse end to end IP connectivity issues
6.5 Assess POE issues
6.6 Describe stacking as it related to wireless licenses and WCM role
7.0 Troubleshoot WLC and AP High Availability Issues
7.1 Troubleshoot primary, secondary, tertiary controller join issues
- Resolve configuration mismatch
- Address capacity and capability mismatch
7.2 Troubleshoot Stateful Switch Over (SSO) issues
- Resolve primary and backup communication issues
- Assess primary and backup unsynchronised elements
- Analyse AP and client failover process
Securing Cisco Wireless Enterprise Networks (300-375)
1.0 Integrate Client Device Security
1.1. Describe Extensible Authentication Protocol (EAP) authentication process
1.2. Configure client for secure EAP authentication
- Native OS (iOS, Android, Windows, MAC OS, year 2013+) or AnyConnect client
1.3. Describe the impact of security configurations on application and client roaming
- Key caching
- 802.11r
1.4. Implement 802.11w Protected Management Frame (PMF) on the WLAN
- Client support
- PMF modes
- Relevant timer settings
1.5. Implement Cisco Management Frame Protection (MFP)
- Cisco Compatible Extensions (CCX)
- Infrastructure mode
- Client and infrastructure mode
1.6. Describe and configure client profiling
- ISE
- WLC
2.0 Implement Secure Distribution System Connectivity Services on the Wireless Infrastructure
2.1. Describe the impact of BYOD on wireless security
- Additional security risks
- Loss of device control
- Increased complexity of policy enforcement
2.2. Implement BYOD policies
- Single vs dual SSID
- Self-registration
- mDNS sharing
- Wi-Fi Direct
2.3. Implement AAA based Layer 3 security on the controller
- Local Web Auth (LWA)
- External authentication)
- Locally significant certificates
- Pre-authentication ACL
- Pass through configuration
2.4. Describe regulatory compliance considerations for protecting data and access and providing accountability
- PCI
2.5. Utilise security audit tools for Distribution Systems
- PI reports
- PCI audit
3.0 Implement Secure Client Connectivity Services on the Wireless Infrastructure
3.1. Implement 802.1x wireless client authentication
- AireOS
- Local
- Central
- IOS-XE
- Autonomous
- Local authentication
- Remote authentication
- FlexConnect
- Local authentication
- Remote authentication
3.2. Implement Identity Based Networking (IBN)
- AireOS
- VLANs
- QoS
- ACLs
- IOS-XE
- VLANs
- QoS
- ACLs
- Autonomous
- VLAN
- FlexConnect
- VLAN
- ACLs
- QoS
3.3. Implement ISE AAA parameters for integration with the wireless network
- Network device
- IBN profile
3.4. Implement AAA based Layer 3 security using ISE
- Utilising ISE as AAA service
- Locally significant certificates on ISE
- Using captive portal capabilities for guest access
- Central Web Auth (CWA
- Returned values and overrides
- Access accept
- AAA override statement
3.5. Configure MSE based web authentication
3.6. Utilise security audit tools for client connectivity
- PI reports
- PCI audit
4.0 Implement Secure Management Access on the WLAN Infrastructure
4.1. Controlling administrative access to the wireless infrastructure
- RADIUS
- TACACS
- Controller and ISE integration
- Access point administration credentials
4.2. Configure APs and switches for 802.1x access to the wired infrastructure
- Controller based
- Autonomous
4.3. Implement SNMPv3 on the wireless infrastructure
- AireOS
- IOS-XE
- Autonomous
5.0 Monitoring Security on the WLAN Infrastructure
5.1. Execute Security reports on PI
5.2. Perform Rogue Management
- Rogue Containment on WLC and PI
- RLDP on WLC and PI
- SwitchPort tracing on PI
- Location on PI
- Rogue Rules on WLC and PI
5.3. Monitor rogue APs and clients
- PI Maps
- Controller
5.4. Monitor Alarms
- 2 items
- PI Security Tab
- Controller Trap Logs
5.5. Identify RF related Security interferers on WLC and PI Maps
- Jammers
- Inverted Wi-Fi
- Wi-Fi invalid channel
5.6. Implement wIPS
- Enhanced Local Mode (ELM)
Exam Track
You'll sit the following exams at the Firebrand Training Centre during the course, covered by your Certification Guarantee:
- 300-360 WIDESIGN
- Number of questions: 55-65 questions
- Exam duration: 90 Minutes
- Languages: English
- 300-365 WIDEPLOY
- Number of questions: 55-65 questions
- Exam duration: 90 Minutes
- Languages: English
- 300-375 WISECURE
- Number of questions: 55-65 questions
- Exam duration: 90 Minutes
- Languages: English
- 300-370 WITSHOOT
- Number of questions: 55-65 questions
- Exam duration: 90 Minutes
- Languages: English
What's Included
Included on this course:
- Official Cisco Courseware
Prerequisites
Before taking this course, you must have gained a valid Cisco CCNA Wireless certification or any Cisco CCIE certification.