Kurssit

Insoft on palvellut IT-yhteisöä Ciscon virallisella koulutustarjonnalla vuodesta 2010. Tältä sivulta löydät kaikki olennaiset tiedot Ciscon koulutuksesta.

Katso lisää

Cisco Learning Credits

Cisco opintopisteet (CLC) ovat suoraan Ciscon kanssa lunastettuja prepaid-koulutusseteleitä, jotka helpottavat menestyksen suunnittelua ostaessasi Ciscon tuotteita ja palveluita.

Katso lisää

Cisco Continuing Education

Cisco täydennyskoulutusohjelma tarjoaa kaikille aktiivisille sertifioinnin haltijoille joustavia vaihtoehtoja uudelleensertifiointiin suorittamalla erilaisia kelvollisia koulutuskohteita.

Katso lisää

Cisco Digital Learning

Sertifioidut työntekijät ovat ARVOSTETTUJA omaisuuseriä. Tutustu Ciscon valtuutettuun digitaaliseen oppimiskirjastoon ja kouluta itseäsi tallennettujen istuntojen avulla.

Katso lisää

Cisco Business Enablement

Cisco Business Enablement Partner Program keskittyy Cisco Channel Partnersin ja asiakkaiden liiketoimintataitojen terävöittämiseen.

Katso lisää

Kurssit

Insoft Services on auktorisoitu Fortinet-kouluttaja useassa Euroopan maassa.

Katso lisää

ATC Status

Tarkista ATC-tilamme valituissa Euroopan maissa.

Katso lisää

Kurssit

Insoft Services tarjoaa Microsoftille EMEAR-koulutusta. Tarjoamme Microsoftin teknistä koulutusta ja sertifiointikursseja, joita johtavat maailmanluokan ohjaajat.

Katso lisää

Kurssit

Extreme Networks Technical Trainingin kehitys tarjoaa kattavan progressiivisen polun associate-akkreditoinnista ammatilliseen akkreditointiin.

Katso lisää

ATP-akkreditointi

Valtuutettuna koulutuskumppanina (ATP) Insoft Services varmistaa, että saat korkeimman saatavilla olevan koulutuksen.

Katso lisää

 

Maailmassa, jossa teknologiat kehittyvät nopeasti, jokainen yritys - yritys - tarvitsee kumppanin, johon luottaa ja luottaa verkkoinfrastruktuurinsa sujuvaan ja turvalliseen toimintaan.

Katso lisää

 

Missiomme: Tarjota asiantunteva joukko moderneja ja huippuluokan verkkoautomaatiotaitoja markkinoille asiantuntijapalvelujen avulla.

Katso lisää

 

Maailmassa, jossa teknologiat kehittyvät nopeasti, jokainen yritys - yritys - tarvitsee kumppanin, johon luottaa ja luottaa verkkoinfrastruktuurinsa sujuvaan ja turvalliseen toimintaan.

Katso lisää

 

Maailmassa, jossa teknologiat kehittyvät nopeasti, jokainen yritys - yritys - tarvitsee kumppanin, johon luottaa ja luottaa verkkoinfrastruktuurinsa sujuvaan ja turvalliseen toimintaan.

Katso lisää

 

Maailmassa, jossa teknologiat kehittyvät nopeasti, jokainen yritys - yritys - tarvitsee kumppanin, johon luottaa ja luottaa verkkoinfrastruktuurinsa sujuvaan ja turvalliseen toimintaan.

Katso lisää

 

Maailmassa, jossa teknologiat kehittyvät nopeasti, jokainen yritys - yritys - tarvitsee kumppanin, johon luottaa ja luottaa verkkoinfrastruktuurinsa sujuvaan ja turvalliseen toimintaan.

Katso lisää

 

Autamme organisaatioita ottamaan käyttöön Software-Defined Networking (SDN) -ratkaisuja, kuten Cisco DNA:ta.Lisäksi tiimillämme on laaja kokemus Cisco DNA Centerin integroinnista kolmannen osapuolen järjestelmiin.

Katso lisää

 

Maailmassa, jossa teknologiat kehittyvät nopeasti, jokainen yritys - yritys - tarvitsee kumppanin, johon luottaa ja luottaa verkkoinfrastruktuurinsa sujuvaan ja turvalliseen toimintaan.

Katso lisää

Tiimimme

Koulutusvalikoimaamme kuuluu laaja valikoima IT-koulutusta IP-palveluntarjoajilta, mukaan lukien Cisco, Extreme Networks, Fortinet, Microsoft, muutamia mainitakseni, EMEA-alueella.

Katso lisää

Extreme Access Wireless WiNG

Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tietosuojalauseke ja yksityisyys

Suostun vastaanottamaan sähköpostiviestejä ja/tai puheluita Insoft Services Oy: n tuotteista ja palveluista.
Hyväksyn, että tietojani kerätään ja käsitellään Insoft Servicesin tietosuojakäytännössä kuvatulla tavalla.

Close

Extreme Access Wireless WiNG

VARAA NYT
Extreme Access Wireless WiNG
Kesto
4 päivää
Toimitus
(Online ja paikan päällä)
Hinta
Hinta pyydettäessä

In the Extreme Access Wireless WiNG (EACW) course, students will learn methods to properly configure and manage their Extreme Wireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real-world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.

 

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Wireless implementation
  • Take the ExtremeWiNG Specialist certification exam

Solution Overview

  • WiNG features
  • ExtremeWireless WiNG APs
  • T5 Private Broadband Network solution
  • ExtremeWireless WiNG licenses

Configuration Model

  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration using these components and within configuration management tasks
  • Base MAC Address

Initial Configuration

  • Initial device setup
  • Admin user roles
  • Configure management access settings via Management Policy

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links
  • Best practices and common mistakes for MiNT links

AP Adoption

  • Finding a Controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption
  • Best practices and common mistakes for device adoption

Virtual Controller

  • New enhancements from WiNG 5.9

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

Supported Deployments and Provisioning

  • New Virtual Controller features
  • Reference designs for the single and central site/multi-site deployments
  • Scalability considerations
  • General best practices, trends and common design mistakes
  • Correct design and proper configuration

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

Wireless LANs

  • WLAN Configuration
  • WLAN Forwarding Modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy and Server pools and proxies
  • QoS Policies and Mappings

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
  • Other advanced WLAN features

Integrated Services

  • Integrated Services such as:
    • DHCP services provided by the controllers and APs
    • Radius server(s) and services
    • Role-Based Access Control (RBAC)
    • IPsec VPN
    • Providing visibility to manage these applications

Captive Portal

  • Captive Portal and associated features such as
    • 3 hotspot deployment options and defining policies
    • Authentication methods used to verify user registrations
    • Enforcing authentication methods
    • User and Device Registration and notification methods (email, SMS and SMS via SMTP)

Mesh Features

  • MeshConnex technology vs legacy mesh
  • Self-Healing and Self-Forming MeshConnex mesh
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex mesh

Security Features – Distributed Wireless Protections

  • Stateful L2+ Distributed Firewall features
    • IP/MAC conflict detection
    • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control

Variations of Wireless IPS (WIPS) such as

    • Rogue Detection
    • Logging and Reporting

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote Syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Debug using events

Common Mistakes

  • Identify Problems with:
    • Standalone deployment scaling and RF Domains
    • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
    • Clustering configurations for centralized controller and site controllers
    • Extended VLANs
    • Firewall policy inclusions

NSight

  • Using NSight in the Network
  • Using NSight for Monitoring and Troubleshooting

Extreme Guest

  • Extreme Guest Features
  • Troubleshooting Extreme Guest

This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.

Before attending the Extreme Access Wireless WiNG course, students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.

In the Extreme Access Wireless WiNG (EACW) course, students will learn methods to properly configure and manage their Extreme Wireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real-world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.

 

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Wireless implementation
  • Take the ExtremeWiNG Specialist certification exam

Solution Overview

  • WiNG features
  • ExtremeWireless WiNG APs
  • T5 Private Broadband Network solution
  • ExtremeWireless WiNG licenses

Configuration Model

  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration using these components and within configuration management tasks
  • Base MAC Address

Initial Configuration

  • Initial device setup
  • Admin user roles
  • Configure management access settings via Management Policy

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links
  • Best practices and common mistakes for MiNT links

AP Adoption

  • Finding a Controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption
  • Best practices and common mistakes for device adoption

Virtual Controller

  • New enhancements from WiNG 5.9

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

Supported Deployments and Provisioning

  • New Virtual Controller features
  • Reference designs for the single and central site/multi-site deployments
  • Scalability considerations
  • General best practices, trends and common design mistakes
  • Correct design and proper configuration

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

Wireless LANs

  • WLAN Configuration
  • WLAN Forwarding Modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy and Server pools and proxies
  • QoS Policies and Mappings

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
  • Other advanced WLAN features

Integrated Services

  • Integrated Services such as:
    • DHCP services provided by the controllers and APs
    • Radius server(s) and services
    • Role-Based Access Control (RBAC)
    • IPsec VPN
    • Providing visibility to manage these applications

Captive Portal

  • Captive Portal and associated features such as
    • 3 hotspot deployment options and defining policies
    • Authentication methods used to verify user registrations
    • Enforcing authentication methods
    • User and Device Registration and notification methods (email, SMS and SMS via SMTP)

Mesh Features

  • MeshConnex technology vs legacy mesh
  • Self-Healing and Self-Forming MeshConnex mesh
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex mesh

Security Features – Distributed Wireless Protections

  • Stateful L2+ Distributed Firewall features
    • IP/MAC conflict detection
    • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control

Variations of Wireless IPS (WIPS) such as

    • Rogue Detection
    • Logging and Reporting

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote Syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Debug using events

Common Mistakes

  • Identify Problems with:
    • Standalone deployment scaling and RF Domains
    • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
    • Clustering configurations for centralized controller and site controllers
    • Extended VLANs
    • Firewall policy inclusions

NSight

  • Using NSight in the Network
  • Using NSight for Monitoring and Troubleshooting

Extreme Guest

  • Extreme Guest Features
  • Troubleshooting Extreme Guest

This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.

Before attending the Extreme Access Wireless WiNG course, students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.

    Kurssiaikataulu
  • ` Dec 9 - Dec 12, 2024
  • ` Jan 6 - Jan 9, 2025
  • ` Feb 3 - Feb 6, 2025
  • ` Mar 3 - Mar 6, 2025
  • ` Mar 31 - Apr 3, 2025
  • ` Apr 28 - May 1, 2025