{"id":23,"date":"2021-12-26T19:35:59","date_gmt":"2021-12-26T19:35:59","guid":{"rendered":"http:\/\/der-technik.de\/?p=23"},"modified":"2021-12-28T17:00:50","modified_gmt":"2021-12-28T17:00:50","slug":"ccie-data-center-learning-matrix","status":"publish","type":"post","link":"https:\/\/der-technik.de\/?p=23","title":{"rendered":"CCIE Data Center Learning Matrix"},"content":{"rendered":"\n<p>Seit nunmehr 14 Jahren bin ich im Netzwerkumfeld unterwegs. Seit gef\u00fchlten zehn Jahren (ganz so lange ist es zum Gl\u00fcck noch nicht) strebe ich den CCIE DC an. Da w\u00e4re es doch gelacht, wenn ich das eine oder andere Thema nicht bereits hinreichend beherrschen w\u00fcrde.<\/p>\n\n\n\n<p>Beginnen wir also unsere Reise (ja wir, der Pluralis Majestatis scheint mir hier durchaus angebracht) mit einem kleinen, wie sagt man noch auf Neudeutsch &#8222;Self-Assessment&#8220;, um zu pr\u00fcfen, wo wir eigentlich stehen. Metaphorisch gesprochen noch beim W\u00e4lzen von Reisekatalogen oder vielleicht bereits am Flughafen, Gate A42 kurz vor Boarding.<\/p>\n\n\n\n<p>Die durch Cisco bereitgestellte <a href=\"https:\/\/www.cisco.com\/c\/dam\/en_us\/training-events\/le31\/le46\/cln\/marketing\/learning-matrix\/CCIE-Data-Center-v3-Learning-Matrix.xlsx\">Learning Matrix<\/a> sieht folgende Themen vor, mit denen wir uns wohl oder \u00fcbel auseinandersetzen d\u00fcrfen:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>ID<\/th><th>Thema<\/th><th>Unterthema<\/th><th>Mein Kenntnisstand<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Data Center L2\/L3 Connectivity<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>1.1<\/td><td>L2 Technologies<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>1.1.a<\/td><td>Link Aggregation<\/td><td><\/td><td>2<\/td><\/tr><tr><td>1.1.a i<\/td><td><\/td><td>vPC<\/td><td>2<\/td><\/tr><tr><td>1.1.a ii<\/td><td><\/td><td>Port-Channel<\/td><td>1<\/td><\/tr><tr><td>1.1.b<\/td><td>Tagging\/Trunking<\/td><td><\/td><td>1<\/td><\/tr><tr><td>1.1.c<\/td><td>Static Path Binding<\/td><td><\/td><td>1<\/td><\/tr><tr><td>1.1.d<\/td><td>Spanning Tree Protocol<\/td><td><\/td><td>2<\/td><\/tr><tr><td>1.1.d i<\/td><td><\/td><td>PVST<\/td><td>1<\/td><\/tr><tr><td>1.1.d ii<\/td><td><\/td><td>MST<\/td><td>3<\/td><\/tr><tr><td>1.2<\/td><td>Routing Protocols and Features<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>1.2.a<\/td><td>OSPF (v2 and v3)<\/td><td><\/td><td>2<\/td><\/tr><tr><td>1.2.a i<\/td><td><\/td><td>Authentication<\/td><td>2<\/td><\/tr><tr><td>1.2.a ii<\/td><td><\/td><td>Adjacencies<\/td><td>1<\/td><\/tr><tr><td>1.2.a iii <\/td><td><\/td><td>Network Types and Area Types<\/td><td>4<\/td><\/tr><tr><td>1.2.a iv  <\/td><td><\/td><td>LSA Types<\/td><td>4<\/td><\/tr><tr><td>1.2.a v  <\/td><td><\/td><td>Route Aggregation\/Summarization<\/td><td>2<\/td><\/tr><tr><td>1.2.a vi  <\/td><td><\/td><td>Route Redistribution<\/td><td>2<\/td><\/tr><tr><td>1.2.b<\/td><td>ISIS<\/td><td><\/td><td>3<\/td><\/tr><tr><td>1.2.b i<\/td><td><\/td><td>Adjacencies<\/td><td>2<\/td><\/tr><tr><td>1.2.b.i 1<\/td><td><\/td><td>Single area, single topology<\/td><td>2<\/td><\/tr><tr><td>1.2.b ii<\/td><td><\/td><td>Network Types, Levels and Router Types<\/td><td>4<\/td><\/tr><tr><td>1.2.b.ii 1<\/td><td><\/td><td>NSAP Addressing<\/td><td>4<\/td><\/tr><tr><td>1.2.b.ii 2<\/td><td><\/td><td>Point-to-Point, Broadcast<\/td><td>4<\/td><\/tr><tr><td>1.2.c<\/td><td>BGP<\/td><td><\/td><td>3<\/td><\/tr><tr><td>1.2.c i<\/td><td><\/td><td>Path Selection<\/td><td>3<\/td><\/tr><tr><td>1.2.c ii<\/td><td><\/td><td>External and Internal Peering<\/td><td>3<\/td><\/tr><tr><td>1.2.c iii<\/td><td><\/td><td>Route Reflectors and Route Server<\/td><td>2<\/td><\/tr><tr><td>1.2.c iv<\/td><td><\/td><td>Peer Templates<\/td><td>2<\/td><\/tr><tr><td>1.2.c v<\/td><td><\/td><td>Multi-Hop EBGP<\/td><td>3<\/td><\/tr><tr><td>1.2.c vi<\/td><td><\/td><td>Route Aggregation\/Summarization<\/td><td>2<\/td><\/tr><tr><td>1.2.c vii<\/td><td><\/td><td>Route Redistribution<\/td><td>2<\/td><\/tr><tr><td>1.2.d<\/td><td>BFD<\/td><td><\/td><td>2<\/td><\/tr><tr><td>1.2.e<\/td><td>FHRP<\/td><td><\/td><td>2<\/td><\/tr><tr><td>1.3<\/td><td>Multicast Protocols<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>1.3.a<\/td><td>PIM<\/td><td><\/td><td>2<\/td><\/tr><tr><td>1.3.a i<\/td><td><\/td><td>Sparse Mode<\/td><td>2<\/td><\/tr><tr><td>1.3.a ii<\/td><td><\/td><td>BiDir<\/td><td>2<\/td><\/tr><tr><td>1.3.a iii<\/td><td><\/td><td>StaticRP, BSR, AutoRP, Phantom RP<\/td><td>2<\/td><\/tr><tr><td>1.3.a iv<\/td><td><\/td><td>IPv4 PIM Anycast<\/td><td>3<\/td><\/tr><tr><td>1.3.a v<\/td><td><\/td><td>IPv4 Anycast RP using MSDP<\/td><td>4<\/td><\/tr><tr><td>1.3.b<\/td><td>IGMP<\/td><td><\/td><td>2<\/td><\/tr><tr><td>1.3.b i<\/td><td><\/td><td>IGMPv2, IGMPv3<\/td><td>2<\/td><\/tr><tr><td>1.3.b ii<\/td><td><\/td><td>IGMP Snooping<\/td><td>2<\/td><\/tr><tr><td>1.3.b iii<\/td><td><\/td><td>IGM Querier<\/td><td>2<\/td><\/tr><tr><td>2<\/td><td>Data Center Fabric Infrastructure<\/td><td><\/td><td><\/td><\/tr><tr><td>2.1<\/td><td>Physical Fabric Components<\/td><td><\/td><td>1<\/td><\/tr><tr><td>2.1.a<\/td><td><\/td><td>Fabric Discovery<\/td><td>1<\/td><\/tr><tr><td>2.1.b<\/td><td><\/td><td>Controllers\/Network Managers<\/td><td>1<\/td><\/tr><tr><td>2.1.c<\/td><td><\/td><td>Switches<\/td><td>1<\/td><\/tr><tr><td>2.2<\/td><td>Fabric Policies<\/td><td><\/td><td>1<\/td><\/tr><tr><td>2.2.a<\/td><td><\/td><td>Access Policies<\/td><td>1<\/td><\/tr><tr><td>2.2.b<\/td><td><\/td><td>Multitenancy<\/td><td>1<\/td><\/tr><tr><td>2.2.c<\/td><td><\/td><td>Monitoring Policies<\/td><td>2<\/td><\/tr><tr><td>2.3<\/td><td>Tenant Policies<\/td><td><\/td><td>1<\/td><\/tr><tr><td>2.3.a<\/td><td><\/td><td>Application Profiles and EPGs<\/td><td>1<\/td><\/tr><tr><td>2.3.b<\/td><td><\/td><td>Networking<\/td><td>1<\/td><\/tr><tr><td>2.3.c<\/td><td><\/td><td>Security<\/td><td>1<\/td><\/tr><tr><td>2.4<\/td><td>Fabric Monitoring<\/td><td><\/td><td>2<\/td><\/tr><tr><td>2.4.a<\/td><td><\/td><td>Faults<\/td><td>1<\/td><\/tr><tr><td>2.4.b<\/td><td><\/td><td>Events<\/td><td>1<\/td><\/tr><tr><td>2.4.c<\/td><td><\/td><td>Health Indicators<\/td><td>3<\/td><\/tr><tr><td>2.4.d<\/td><td><\/td><td>Audit Logs<\/td><td>2<\/td><\/tr><tr><td>2.5<\/td><td>Virtual Networking<\/td><td><\/td><td>1<\/td><\/tr><tr><td>2.5.a<\/td><td><\/td><td>vSphere VDS<\/td><td>1<\/td><\/tr><tr><td>3<\/td><td>Data Center Fabric Connectivity<\/td><td><\/td><td>2<\/td><\/tr><tr><td>3.1<\/td><td>VRF Lite<\/td><td><\/td><td>2<\/td><\/tr><tr><td>3.2<\/td><td>L3Out<\/td><td><\/td><td>1<\/td><\/tr><tr><td>3.2.a<\/td><td>OSPF<\/td><td><\/td><td>2<\/td><\/tr><tr><td>3.2.a i<\/td><td><\/td><td>Authentication<\/td><td>2<\/td><\/tr><tr><td>3.2.a ii<\/td><td><\/td><td>Adjacencies<\/td><td>2<\/td><\/tr><tr><td>3.2.a iii<\/td><td><\/td><td>Network Types and Area Types<\/td><td>4<\/td><\/tr><tr><td>3.2.a iv<\/td><td><\/td><td>Route Redistribution<\/td><td>2<\/td><\/tr><tr><td>3.2.b<\/td><td>BGP<\/td><td><\/td><td>3<\/td><\/tr><tr><td>3.2.b i<\/td><td><\/td><td>AS Manipulation<\/td><td>3<\/td><\/tr><tr><td>3.2.b ii<\/td><td><\/td><td>External and Internal Peering<\/td><td>3<\/td><\/tr><tr><td>3.2.b iii<\/td><td><\/td><td>Route Reflectors<\/td><td>2<\/td><\/tr><tr><td>3.2.b iv<\/td><td><\/td><td>Route Redistribution<\/td><td>2<\/td><\/tr><tr><td>3.3<\/td><td>Transit Routing<\/td><td><\/td><td>3<\/td><\/tr><tr><td>3.3.a<\/td><td>Multi-Pod<\/td><td><\/td><td>2<\/td><\/tr><tr><td>3.3.b<\/td><td>Multi-Site<\/td><td><\/td><td>3<\/td><\/tr><tr><td>3.3.c<\/td><td>Virtual Pod<\/td><td><\/td><td>4<\/td><\/tr><tr><td>3.3.d<\/td><td>Remote Leaf<\/td><td><\/td><td>4<\/td><\/tr><tr><td>3.4<\/td><td>Overlays<\/td><td><\/td><td>2<\/td><\/tr><tr><td>3.4.a<\/td><td>VXLAN EVPN<\/td><td><\/td><td>2<\/td><\/tr><tr><td>4<\/td><td>Data Center Compute<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>4.1<\/td><td>Compute Resources<\/td><td><\/td><td>5<\/td><\/tr><tr><td>4.1.a<\/td><td>UCSM Policies, Profiles and Templates<\/td><td><\/td><td>5<\/td><\/tr><tr><td>4.1.b<\/td><td>Hyperflex<\/td><td><\/td><td>5<\/td><\/tr><tr><td>4.2<\/td><td>Compute Connectivity<\/td><td><\/td><td>5<\/td><\/tr><tr><td>4.2.a<\/td><td>SAN\/LAN Uplinks<\/td><td><\/td><td>5<\/td><\/tr><tr><td>4.2.b<\/td><td>Rack Server Integration<\/td><td><\/td><td>5<\/td><\/tr><tr><td>4.2.c<\/td><td>Port Modes<\/td><td><\/td><td>5<\/td><\/tr><tr><td>5<\/td><td>Data Center Storage Protocols and Features<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>5.1<\/td><td>FC and FCoE<\/td><td><\/td><td>3<\/td><\/tr><tr><td>5.1.a<\/td><td>Zoning<\/td><td><\/td><td>3<\/td><\/tr><tr><td>5.1.b<\/td><td>NPV\/NPIV<\/td><td><\/td><td>4<\/td><\/tr><tr><td>5.1.c<\/td><td>Trunking<\/td><td><\/td><td>2<\/td><\/tr><tr><td>5.1.d<\/td><td>Port-Channel<\/td><td><\/td><td>2<\/td><\/tr><tr><td>5.1.e<\/td><td>Load Balancing<\/td><td><\/td><td>4<\/td><\/tr><tr><td>5.2<\/td><td>iSCSI<\/td><td><\/td><td>5<\/td><\/tr><tr><td>5.2.a<\/td><td>Authentication<\/td><td><\/td><td>5<\/td><\/tr><tr><td>5.2.b<\/td><td>Multipathing<\/td><td><\/td><td>5<\/td><\/tr><tr><td>5.3<\/td><td>RoCE v2 over IP Networks<\/td><td><\/td><td>6<\/td><\/tr><tr><td>6<\/td><td>Data Center Security and Network Services<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>6.1<\/td><td>Security Features<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.1.a<\/td><td>ACLs<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.1.b<\/td><td>First Hop Security<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.1.c<\/td><td>Port Security<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.1.d<\/td><td>Private VLANs<\/td><td><\/td><td>3<\/td><\/tr><tr><td>6.1.e<\/td><td>Contracts<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.2<\/td><td>RBAC<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.2.a<\/td><td>RADIUS<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.2.b<\/td><td>TACACS+<\/td><td><\/td><td>4<\/td><\/tr><tr><td>6.2.c<\/td><td>LDAP<\/td><td><\/td><td>4<\/td><\/tr><tr><td>6.2.d<\/td><td>AAA<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.3<\/td><td>Network Services Insertion and Redirection<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.3.a<\/td><td>Policy Based Routing<\/td><td><\/td><td>4<\/td><\/tr><tr><td>6.3.b<\/td><td>Policy Based Redirect<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.3.c<\/td><td>Inter VRF Communication<\/td><td><\/td><td>3<\/td><\/tr><tr><td>6.3.d<\/td><td>Route Targets<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.3.e<\/td><td>Prefix Lists<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.4<\/td><td>Services<\/td><td><\/td><td>2<\/td><\/tr><tr><td>6.4.a<\/td><td>Flow\/Telemetry Support<\/td><td><\/td><td>3<\/td><\/tr><tr><td>6.4.b<\/td><td>SPAN<\/td><td><\/td><td>1<\/td><\/tr><tr><td>6.4.c<\/td><td>SNMP<\/td><td><\/td><td>1<\/td><\/tr><tr><td>6.4.d<\/td><td>Syslog<\/td><td><\/td><td>1<\/td><\/tr><tr><td>6.4.e<\/td><td>DHCP<\/td><td><\/td><td>1<\/td><\/tr><tr><td>6.4.f<\/td><td>NTP\/PTP<\/td><td><\/td><td>1<\/td><\/tr><tr><td>6.5<\/td><td>Traffic Engineering<\/td><td><\/td><td>3<\/td><\/tr><tr><td>6.5.a<\/td><td>Queueing<\/td><td><\/td><td>3<\/td><\/tr><tr><td>6.5.b<\/td><td>Policing<\/td><td><\/td><td>3<\/td><\/tr><tr><td>6.5.c<\/td><td>Classification\/Marking<\/td><td><\/td><td>3<\/td><\/tr><tr><td>6.5.d<\/td><td>Scheduling<\/td><td><\/td><td>3<\/td><\/tr><tr><td>6.5.e<\/td><td>CoPP<\/td><td><\/td><td>3<\/td><\/tr><tr><td>7<\/td><td>Data Center Automation and Orchestration<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>7.1<\/td><td>Data Center Tasks Using Scripts (Python and Ansible)<\/td><td><\/td><td>2<\/td><\/tr><tr><td>7.1.a<\/td><td>Create, Read, Update, Delete using RESTful APIs<\/td><td><\/td><td>2<\/td><\/tr><tr><td>7.1.b<\/td><td>Deploy and modify Configurations<\/td><td><\/td><td>2<\/td><\/tr><tr><td>7.1.c<\/td><td>Statistics, Data Collection<\/td><td><\/td><td>4<\/td><\/tr><tr><td>7.2<\/td><td>Data Center Automation and Orchestration using Tools<\/td><td><\/td><td>&#8211;<\/td><\/tr><tr><td>7.2.a<\/td><td>DCNM<\/td><td><\/td><td>5<\/td><\/tr><tr><td>7.2.b<\/td><td>UCSD<\/td><td><\/td><td>5<\/td><\/tr><tr><td>7.2.b i<\/td><td><\/td><td>Tasks<\/td><td>5<\/td><\/tr><tr><td>7.2.b ii<\/td><td><\/td><td>Workflows<\/td><td>5<\/td><\/tr><tr><td>7.2.b iii<\/td><td><\/td><td>Catalog<\/td><td>5<\/td><\/tr><tr><td>7.2.c<\/td><td>Intersight<\/td><td><\/td><td>6<\/td><\/tr><tr><td>7.2.d<\/td><td>CloudCenter Suite<\/td><td><\/td><td>6<\/td><\/tr><tr><td>7.2.d i<\/td><td><\/td><td>Applications<\/td><td>6<\/td><\/tr><tr><td>7.2.d ii<\/td><td><\/td><td>Deployment<\/td><td>6<\/td><\/tr><tr><td>7.2.d iii<\/td><td><\/td><td>Action Orchest<\/td><td>6<\/td><\/tr><\/tbody><\/table><figcaption>Self Assessment Learning Matrix<\/figcaption><\/figure>\n\n\n\n<p>Ich vergebe Schulnoten von 1 bis 6, wobei alles, was ich zumindest mal theoretisch gelernt habe mindestens eine 5 bekommt. Die 6 behalte ich Themen vor, von denen ich noch nie etwas geh\u00f6rt habe. Bestnoten gibt es nur f\u00fcr Themen, mit denen ich praktisch schon gearbeitet habe.<\/p>\n\n\n\n<p>Es zeigt sich, was ich vorher auch schon wusste: Der Netzwerkteil hat L\u00fccken ist aber im Gro\u00dfen und Ganzen gut ausgebaut. Bei Compute und Storage gibt es schlicht keine wirkliche Erfahrung aus Projektt\u00e4tigkeiten, was das Behalten des Wissens erschwert. Die Grunlagen sind da, m\u00fcssen aber wieder herausgekramt und angereichert wissen.<\/p>\n\n\n\n<p>Also, auf geht&#8217;s, es gibt viel zu tun!<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Seit nunmehr 14 Jahren bin ich im Netzwerkumfeld unterwegs. Seit gef\u00fchlten zehn Jahren (ganz so lange ist es zum Gl\u00fcck noch nicht) strebe ich den <a class=\"mh-excerpt-more\" href=\"https:\/\/der-technik.de\/?p=23\" title=\"CCIE Data Center Learning Matrix\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":27,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,8],"tags":[3,6,4,5],"_links":{"self":[{"href":"https:\/\/der-technik.de\/index.php?rest_route=\/wp\/v2\/posts\/23"}],"collection":[{"href":"https:\/\/der-technik.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/der-technik.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/der-technik.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/der-technik.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=23"}],"version-history":[{"count":3,"href":"https:\/\/der-technik.de\/index.php?rest_route=\/wp\/v2\/posts\/23\/revisions"}],"predecessor-version":[{"id":26,"href":"https:\/\/der-technik.de\/index.php?rest_route=\/wp\/v2\/posts\/23\/revisions\/26"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/der-technik.de\/index.php?rest_route=\/wp\/v2\/media\/27"}],"wp:attachment":[{"href":"https:\/\/der-technik.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=23"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/der-technik.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=23"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/der-technik.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}