Nokia Data Center Fabric Fundamentals
Course number: OP004936
Course duration: 4 hours
Price: €400
Course overview
This eLearning course reviews the modern data center networking architectures and the advantages of using Layer 3 and BGP for routing. It describes the architecture of SR Linux and the Nokia 7220/7250 IXR routers and introduces the Event Driven Automation (EDA) platform. Participants will make extensive use of the SR Linux CLI and learn how to configure and verify interfaces and routing protocols. Participants will also gain experience configuring L2 and L3 EVPN services and SR Linux logging, monitoring, and filtering features. Basic node management and Zero Touch Provisioning (ZTP) is covered, and the course concludes with an overview of the use and capabilities of EDA.
Nokia IP Networks and Services Fundamentals (3FL30632AAAAZZZZA) or equivalent IP networking experience
Nokia Data Center Fabric Fundamentals (4A0-D01)
This course will help participants working towards the following certifications:
Course objectives
After completing the course, students should be able to:
- List the key characteristics of SR Linux and the Event Driven Automation platform
- Explain how an SR Linux router can be configured through CLI, gNMI or JSON/RPC
- Describe the architecture of the SR Linux CLI
- Describe the capabilities for customizing the SR Linux CLI
- Explain the use and configuration of IP-VRF and MAC-VRF network instances
- Configure network interfaces and sub-interfaces
- Configure and verify the underlay network (static routes, BGP)
- Configure and verify L2 and L3 EVPN overlay networks
- Use and configure the logging and monitoring tools in SR Linux
- Explain the purpose and benefits of EDA
- Describe how a data center fabric can be designed and deployed using EDA
Course modules
Module 1 – Nokia DC Fabric solution
- Describe the modern Layer 3 data center architecture
- Explain the advantages of using Layer 3 with BGP as the routing protocol for the data center network
- Explain how VXLAN and EVPN provide a multi-tenant network overlay solution
- List the key characteristics of SR Linux and the Nokia DC fabric solution
- Explain how external applications can use the SR Linux API to configure the router
- Describe the requirements to manage a data center switch fabric
- List the main operations supported by the Fabric Services System
Module 2 – SR Linux Configuration and Routing
- Describe the YANG-based, model-driven architecture of the SR Linux CLI
- Describe how to configure CLI output in a table or JSON format and use CLI filters
- Explain the different configuration datastores and modes and make configuration changes
- Explain the use of configuration checkpoints
- Explain the benefits and application of CLI aliases and environment variables
- Describe how to configure network interfaces and sub-interfaces
- Describe how to show information and statistics about interfaces and sub-interfaces
- Describe how to verify the IPv4 and IPv6 routing table
- Explain the use and configuration of IP-VRF and MAC-VRF network instances
- Describe how MAC move is used to control loops in a MAC-VRF
- Explain the purpose of next-hop-groups
- Describe how to configure and verify static routes
- Explain how ECMP is used to distribute traffic over multiple links in the fabric
- Describe how to configure and verify BGP peers and route policies
- Describe how to configure and verify a BFD session between two BGP peers
- Explain how VXLAN provides tunneling capabilities to support overlay networks
- Explain how SR Linux uses BGP EVPN routes to distribute MAC and IP addresses
- Describe L2 EVPN-VXLAN operations
- Describe how to configure and verify a L2 EVPN-VXLAN network overlay
- Describe L3 EVPN-VXLAN operations, including the asymmetric and symmetric models
- Describe how to configure and verify a L3 EVPN-VXLAN network overlay
Module 3 – SR Linux Logging, Monitoring, and Filtering
- Describe the logging capabilities of SR Linux and SR Linux log files
- Describe the purpose and operation of interface ACLs
- Describe the purpose and operations of system ACLs
- Describe the purpose and operation of the CPM-filter and its policers
- Describe how to configure CPM-filter and interface ACLs
- Describe the capture-filter and how it can be used for traffic monitoring
Module 4 – SR Linux User and System Management
- Describe the different types of SR Linux users and how privileges are managed through user roles
- Explain why TLS server profiles may be required and how to configure a TLS profile for gNMI or JSON-RPC
- List the requirements for zero-touch provisioning (ZTP)
- Describe the configuration and autoboot process with ZTP
- Describe common ZTP failure scenarios
Module 5 – EDA (Event Driven Automation) Introduction
- EDA overview
- EDA and Kubernetes
- Main EDA use cases:
- Fabric-intent automation
- Service-Intent automation
- Network observability