(301) 220 2802
Our Cisco Software-Defined Access (SDA) class is a five-day, instructor-led, deep dive into the capabilities of the Cisco Software-Defined Access solution. We'll teach you how to implement SDA across different solution verticals and how to manage and troubleshoot the underlying solution components.
Cisco's SDA provides zero-trust capabilities for streamlining user and device access while combating risks from unknown IoT devices. Understanding how to implement, configure and troubleshoot the SDA solution will advance your Cisco skills, opening new opportunities.
Our Cisco instructors have years of industry experience and Cisco certifications – and frequently will have CCNP or CCIE, as well as accreditation from other vendors.
Got Questions?
For more information about your specific needs, call us at (301) 220 2802 or complete the form below:
Jump To:
Class Schedule
-
Live-Online Only
01/06/25 - 01/10/25 GTR
Mon-Fri (10am-6pm)
-
Live-Online Only
02/03/25 - 02/07/25
Mon-Fri (10am-6pm)
-
Live-Online Only
03/03/25 - 03/07/25
Mon-Fri (10am-6pm)
-
Live-Online Only
04/07/25 - 04/11/25
Mon-Fri (10am-6pm)
-
Live-Online Only
05/19/25 - 05/23/25
Mon-Fri (10am-6pm)
-
Live-Online Only
06/23/25 - 06/27/25
Mon-Fri (10am-6pm)
-
Live-Online Only
07/21/25 - 07/25/25
Mon-Fri (10am-6pm)
Get your Cisco SDAOTS (Software-Defined Access) - Implementation, operations, and troubleshooting training in our convenient IT training centers in Maryland or Virginia.
Why Take Cisco Software-Defined Access Training in the Washington DC?
Software-Defined Networking (SDN) technology can manage computer networks in a dynamic and programmatically efficient way closer to cloud computing than traditional network architecture. These tools' efficiency, performance, and monitoring enable organizations to manage both traditional servers and IoT devices effectively.
Cisco's SDN platform uses SD-Access to enhance these SDN capabilities, further enabling businesses to reap the benefits of mobile technology and the Internet of Things (IoT) securely and efficiently in a zero-trust environment.
With the proliferation of mobile and IoT devices throughout government and commercial businesses, the need for SD-Access technology and people with the skills to implement, manage and troubleshoot them is growing rapidly. This is particularly true around Washington DC, where flexibility and security are critical to the federal government and military organizations.
This demand for Cisco-skilled workers is driving demand in Washington, Virginia, and Maryland, with locally based companies such as CDW, Peraton, CACI, and BAE looking for technicians with SD-Access skills.
On completion of our SD-Access class, students will be able to:
- Explain the value of Cisco SDA Use Cases
- Set up a SDA environment
- Troubleshoot processes and methods
- Perform onboarding of devices
- Create network design configurations
- Understand and articulate access control, applications, and virtual network policies
- Set up provisioning
- Perform network segmentation
- Assurance to monitor network, endpoint, and applications
- Integrate ServiceNow (IT service management lifecycle)
- Integrate InfoBlox (IPAM)
What Jobs Can I Get with Cisco Software-Defined Access ?
Cisco SDA training is ideal for senior IT management and network roles. As an advanced Cisco training class, organizations through the Washington DC region, such as CDW, Intellibrdge, CACI, and BAE, are looking for people with SDA skills.
- IT management will gain a better understanding of how the efficiencies and flexibility of SDA can apply essential business requirements
- IT solution architects will learn how SDA enables efficiency and flexibility for network services relating to IT solution delivery
- IT and network security architects will be able to design better and implement network segmentation focused security through SDA's integrated capabilities
- IT operations engineers will benefit from SDA's integrating network and application visibility and root cause analysis into integrated IT case handling workflows
- Networking Admin and Operations roles will learn how to install, integrate, set up, and operate solutions including Cisco Identity Services Engine (ISE) and Cisco DNA Center, in the context of Cisco SDA based network services
- Networking Field Engineers will learn how to use Cisco DNA Center functionality to implement, track and manage network infrastructure for SDA based network services
Related Careers:
- IT management
- IT Solution Architects
- IT and Network Security Architects
- IT Operation Engineers
- Networking Admin and Operations roles
- Networking Field Engineers
What You Need to Know Before Taking the Cisco Software-Defined Access Skills Class
To get the most out of this training course, we recommend that candidates have experience implementing LAN networks across enterprises and some knowledge of Enterprise routing connectivity. A basic understanding of Enterprise switching and wireless connectivity will enhance your understanding of the course material.
You should also have experience with Enterprise routing connectivity, knowledge of Authentication, Authorization, and Accounting (AAA) workflows and processes.
Finally, candidates would benefit from experience coding in Python or RestAPI.
Skills and Concepts You Will I Learn in this Cisco Software-Defined Access Class
Skills and Concepts:
Cisco's Software-Defined Access Introduction
- Understanding Cisco Intent-Based Networking and Software Designed Access Use Cases
- An introduction to Cisco DNA Center
- Overview, benefits, and key concepts of SD-Access
- Main Components of SD-Access
- Center Automation with Cisco DNA
- Traffic Analysis using Cisco StealthWatch
- DNA Center Assurance
- Cisco ISE (Policy)
Cisco DNA-Center deployment and setup
- Center Appliances
- Center Deployment Models
- Cisco DNA installation procedure
- Cisco DNA setup and configuration
- Navigation via GUI
SDA - Design
- SDA network design options
- Designing sites in SDA
- Sites and Enterprise Hierarchy creation
- General Network Settings configuration
- Network Device Profiles
- How to load maps into the graphical user interface
- SNMP
- Managing IP Addresses
- Syslog
- Managing Software Images
- AAA
- IP address pools
- Image management
- Guest and Enterprise SSIDs creation
- SDA network profiles
- Authentication templates
SDA - Policy
- 2-level Hierarchy (Macro Level: Virtual Network and Micro Level: Scalable Group)
- Policy: Policy in SD-Access - Access Policy (Authentication and Authorization) - Access Control Policy - Application Policy - Extending Policy across domains - Preserving Group Metadata across Campus, WAN, and DC - Enforcing policy in Firewall domains - Cross-Domain Policies
SDA - Provision
- Templates (Templates for day 0 - Templates for day N operations)
- IP Transits: o Connecting Fabric Sites to the external network - Creating the IP Transit - Considerations for an SD-Access Border Node Design - BGP Hand-Off Between Border and Fusion
- Fabric Domains (Understanding Fabric Domains and Sites - Using Default LAN Fabric Domain - Creating Additional Fabric Domains and Sites)
- Adding Nodes: o Adding Fabric Edge Nodes - Adding Control Plane Nodes - Adding Border Nodes
SDA - Assurance
- Introduction to DNA Assurance
- Cisco DNA Center Assurance
- Proactive troubleshooting using Sensors
- Client Health & Client 360
- Application Health & Application 360
- Network Health & Device 360
- Cisco SD- Application Visibility Control (AVC) on DNA-Center
Cisco SD-Access Distributed Campus Design
- Cisco Software-Defined Access Distributed Campus Design introduction
- Fabric Domain vs. Fabric Site
- SD-Access Transits (SD-Access Transit - IP-Based Transit - SD-WAN Transit)
- How to implement the Cisco Distributed Campus with Software-Defined Access Transit: Site considerations - Internet connectivity considerations - Segmentation considerations - Role of a Cisco Transit Control Plane
- Cisco SD-Access Fabric in a Box: The need for FiaB - Deploying the FiaB
Cisco SD-Access Brownfield Migration
- Cisco SD-Access Migration Tools and Strategies
- Two Basic Approaches: Parallel Deployment Approach - Incremental Deployment Approach
- How to integrate with existing Cisco ISE in the network – Things to watch out for!
- How to choose the appropriate Fusion Device (Existing Core as Fusion - Firewall as Fusion)
- Learning when you require the SD-Access Layer-2 Border?: L2 Border – Understanding the requirement - Designing and Configuring the L2 Border - L2 Border – Not a permanent solution
Use Case Examples for Cisco DNA Center Automation
- DAY0: Onboarding new devices using Zero-Touch Deployment
- DAY1: Configurations using Templates
- DAYN: Security Advisories based on Machine Reasoning Engine
- DAYN: Simplified Software Management based on Golden Images
- DAYN: Defective Device Replacement - RMA
3rd Party Integrations
- ServiceNow: Integration - Management
- InfoBlox IPAM: Integration - Management
Specific Use Cases
- Use Case: STACK LAN Automation
- Use Case: Silent Hosts
- Use Case: Wake on LAN
- Use Case: The need for L2 flooding
- Use Case: Multicast in the SD-Access Fabric
Cisco SD-Access Multi-Domain Integrations
- Cisco SD-Access to ACI Integrations: Policy Plane Integration - Data Plane Integration
- Cisco SD-Access to Cisco SD-WAN Integrations: o What is possible today? SD-WAN Transit setup - The one-box solution - The two-box solution
Troubleshooting
- Fabric
- Layer 3 forwarding
- Layer 2 forwarding
- Multicast Forwarding
- Security in the Fabric
- Troubleshooting Multi-Site Deployments
Lab Descriptions:
- SDA Fundamentals
- Using the DNAC Discovery Tool
- Using the DNAC Inventory Tool
- ISE and DNAC Integration
- Using the DNAC Design Application
- Using the DNAC Policy Application
- Fabric Provisioning
- Wired and Wireless Host and Access Point Onboarding Configuration
- Configuring External Connectivity Using Fusion Router
- Configuring Cisco ISE Policies for User Onboarding
- Onboarding and Provisioning Access Points
- Fabric and Segmentation Verification
- Layer-2 Border Fundamentals
- How to configure a Layer-2 Border, Extending the Same IP Pool
- Software-Defined Access Anycast Gateway - Transitioning the Traditional User
- Testing IP Connectivity between Software- Defined Access User and Traditional User
- Introduction to Software-Defined Access Distributed Campus
- Configuring a Software-Defined Access - Transit and the Transit Control Plane (TCP)
- Designing a Second Fabric Site
- Fabric in a Box (Deploying a Second Fabric Site)
- Using LAN Automation to deploy a New Fabric Edge
- Automate Network Devices Using Day-N Template
- Add as Edge Node to Fabric Site-2
- Host Onboarding at Fabric Site-2
- Using the Software Defined Access - Transit to connect two Fabric Sites
- Testing IP Connectivity and Micro-Segmentation between Fabric Site-1 and Fabric Site-2