• Classroom
  • Online, Instructor-Led
Course Description

This curriculum covers the theory of BGP, configuration of BGP on Cisco IOS routers, detailed troubleshooting information, and hands-on exercises that provide learners with the skills that they need to configure and troubleshoot BGP networks in customer environments. Different service solutions in the curriculum cover BGP network design issues and usage rules for various BGP features, preparing learners to design and implement efficient, optimal, and trouble free BGP networks.

Learning Objectives

After completion of this course, students will be able to… Describe how to configure, monitor, and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains. Describe how to use BGP policy controls to influence the BGP route selection process in a network scenario in which you must support connections to multiple ISPs. Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections. Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented. Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems. Enable route reflection as possible solution to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems. Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP network.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis
  • Network Services
  • Risk Management
  • Software Development
  • Test and Evaluation
  • Threat Analysis
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management