Course Overview

The Managing Enterprise Networks with Cisco Prime Infrastructure is an instructor-led, lab-based, hands-on course. This course provides network engineers and technicians with tools necessary to design, deploy, operate, and optimize enterprise networks with the Cisco Prime Infrastructure solution.

CLASS INFORMATION
Price: 
$3,750
Duration: 
5 days
Version: 
4.1
Learning Credits: 
38
  • The tasks and features covered in Managing Enterprise Networks with Cisco Prime Infrastructure are centered around network management.

    • Module 1: Cisco Prime Infrastructure Overview
      •  Introducing Cisco Prime Infrastructure
        •  Cisco Unified Access® Networks Management
        •  Cisco Prime Infrastructure Features and Benefits
        •  Deployment Options
      • Getting Started with Cisco Prime Infrastructure
        • Cisco Prime Infrastructure GUI Overview
        •  CLI Interface Overview
      •  Configuring Initial Server Settings
        • Configure Basic Server Settings
      •  Introducing Cisco Prime Infrastructure Licenses
        •  License Basics ◦ Determining License Requirements
        •  Licensing Model Changes (3.0 and Higher)
        •  Managing Licenses in the GUI
        • Management Token Option
        • Smart Licensing
        • License Troubleshooting
    • Module 2: Inventory Management and Reporting
      • Overall Process for Adding Devices to Inventory
        •  Credential Profiles
        •  Add Devices to the Inventory
      •  Generating Reports
        •  Report Basics
        •  Create a Report
        •  Composite Reports
        •  Saved Reports
        •  Custom Reports Feature
        •  Schedule Reports
      •  Managing the Network Inventory
        • View Network Inventory
        • Edit Network Inventory
        • Manage User-Defined Fields
      •  Managing Groups
        • Cisco Prime Infrastructure Groups and Subgroups
        •  Manage User-Defined Groups
      •  Managing Network Device Software Images
        •  Device Software Management Overview
        •  Software Management Tasks
    • Module 3: Network Mapping
      • Managing Network Topology Maps
        •  Topology Map Overview
        •  View Devices in Topology Maps
        •  Edit Topology Maps
        •  Data Center Topology Maps
      •  Managing Wireless Maps
        • Wireless Technology Overview
        • Cisco MSE Integration
        • Wireless Site Maps Basics
        • Configure Wireless Site Maps
        • Optional Wireless Map Configuration Features
    •  Module 4: Role-Based Access Control
      •  Managing Virtual Domains
        •  Introduction to Virtual Domains
        •  Root Domain
        •  User-Defined Virtual Domains
      •  Managing User Authentication and Authorization
        •  View and Modify User Groups
        •  User Management
        • Password Management
        •  User Monitoring
      •  Managing Remote AAA Mode Settings
        •  Using External Authentication
        •  Using an SSO Server
    • Module 5: Configuration Management
      •  Managing the Configuration Archive
        •  Archive Management Overview
        •  View Configuration Files
        •  Manage Archive Settings and Schedule
      •  Managing Configurations for Wired Devices
        • Modify Configurations for Individual Wired Devices
        •  Configuration Templates Overview
        •  Create or Use Configuration Templates
        •  Deploy a Template
      •  Managing Configurations for Wireless Devices
        •  Wireless Devices Support
        •  Wireless Configuration Templates and Tools
        •  Modify Configurations for Individual Wireless Devices
        •  Create or Use Wireless Templates
        • Configure with Wireless Technologies
        •  Additional Wireless Configuration Features
      •  Configuring Plug and Play
        • Plug and Play Overview
        •  Configure Plug and Play
        •  Verify the Activation Process
    • Module 6: Compliance Management
      •  Performing Configuration Audits Using Compliance
        •  Compliance Audit Overview
        •  Create a Policy, Rules, and a Profile
        •  Run a Compliance Audit
        •  Evaluate the Audit Results
      • Running Reports to View Device Security Vulnerabilities
        •  PSIRT, EOX, and Field Notice Reports
    • Module 7: Services Management
      •  Introducing Services
        •  What Are Services?
        • Service Prerequisites
      •  Deploying Cisco TrustSec® Identity Services
        •  Cisco TrustSec Overview
        •  Enable 802.1X on Devices for Authentication
        •  Generate a Cisco TrustSec Readiness Assessment Report
      •  Introducing AVC Services
        • AVC Services Overview
      • Introducing Network Services and Router Virtual Containers
        • Network Services and Router Virtual Containers Overview
        •  IWAN Enablement
    • Module 8: Network Monitoring
      •  Exploring Monitoring Tools
        •  Monitoring Overview
        •  Dashboards and Dashlets
        •  Data Collection
        •  Policies
        •  Alarms and Events
      •  Monitoring Wired Devices and Data Centers
        •  Monitor with Maps
        • Monitor with Dashboards
        • Monitor with Reports
        • Monitor Compute Device Resources
      •  Monitoring the Wireless Network
        •  Wireless Device Monitoring Overview
        •  Monitor with Wireless Dashboards and Dashlets
        •  Monitor with Wireless Maps
        •  Monitor with Wireless Reports
        • Example Wireless Monitoring Tasks
      •  Monitoring Applications
        •  Application Monitoring Overview
        •  Monitor with Dashboards and Dashlets
        •  Monitor with Reports
        •  Business-Critical Application Health Monitoring
      •  Monitoring Clients
        •  Client Monitoring Overview
        •  Monitor with Dashboards and Dashlets
        •  Client and User Monitoring Tool
        •  Monitor with Reports
        •  Client Troubleshooting
        •  Wireless Client Profiling
    • Module 9: System Administration
      •  Monitoring System Health
        • System Monitoring Dashboard
      •  Monitoring Network Health
        •  Network Health Dashboard
        •  Network Health Configuration Options
      • Monitoring KPIs
        •  KPI Performance Graphs Overview
        •  Exporting or Printing Graph Data
        •  Reviewing Device or Interface 360° Views
      •  Managing the Server
        •  Logging
        •  CLI Commands for the Server
        •  Server Backup and Restore
        •  Software Updates
      •  Introducing Operations Center for Large Deployments
        •  Operations Center Overview
        •  Activate Operations Center License
        •  SSO Configuration
        •  Adding Instances
        •  Operations Center Data Aggregation
    • Lab 1: Access Cisco Prime Infrastructure
    • Lab 2: Cisco Prime Infrastructure Configuration
    • Lab 3: Populate the Network Inventory
    • Lab 4: Manage the Network Inventory
    • Lab 5: Manage Groups
    • Lab 6: Manage Device Software Images
    • Lab 7: Manage Wireless Maps
    • Lab 8: Manage Network Topology Maps
    • Lab 9: Create a Virtual Domain and Add a User
    • Lab 10: Manage the Configuration Archive
    • Lab 11: Manage Wired Device Templates
    • Lab 12: Manage Wireless Device Configurations
    • Lab 13: Manage Compliance Features
    • Lab 14: Manage Converged Access Work Flow
    • Lab 15: Manage AVC and QoS
    • Lab 16: Monitor Devices and Interfaces
    • Lab 17: Monitor the Wireless Network
    • Lab 18: Track Clients Users, and Applications
    • Lab 19: Generate Reports
    • Lab 20: Cisco Prime API Operation
    • Lab 21: Configure Operations Center
    • Knowledge of networks and networking terminology (CCNA Routing and Switching qualifications, or equivalent)
    • Knowledge of wireless networks and wireless networking terminology (CCNA Wireless qualifications, or equivalent)
    • Basic understanding of Simple Network Management Protocol (SNMP) and syslog network management components, or previous training in, or experience with, network administration, management, and troubleshooting
    • Cisco courses: ICND1, ICND2, and WIFUND.
  • The intended audience for this course is network engineers and technicians.

    Targeted roles include:

    • Designers
    • Installers
    • Operations personnel
    • High-level troubleshooters
    • Compliance managers