CCDE v3 Practice Lab
CCDE v3 Practice Lab
Cisco Press
CCDE v3 Practice Labs: Preparing for the Cisco
Certified Design Expert Lab Exam
Martin J. Duggan
Copyright© 2023 Cisco Systems, Inc.
Cisco Press logo is a trademark of Cisco Systems, Inc.
Published by:
Cisco Press
All rights reserved. This publication is protected by copyright, and
permission must be obtained from the publisher prior to any prohibited
reproduction, storage in a retrieval system, or transmission in any form or
by any means, electronic, mechanical, photocopying, recording, or likewise.
For information regarding permissions, request forms, and the appropriate
contacts within the Pearson Education Global Rights & Permissions
Department, please visit www.pearson.com/permissions.
No patent liability is assumed with respect to the use of the information
contained herein. Although every precaution has been taken in the
preparation of this book, the publisher and author assume no responsibility
for errors or omissions. Nor is any liability assumed for damages resulting
from the use of the information contained herein.
ScoutAutomatedPrintCode
Library of Congress Control Number: 2022908151
ISBN-13: 978-0-13-749985-4
ISBN-10: 0-13-749985-X
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service
marks have been appropriately capitalized. Cisco Press or Cisco Systems,
Inc., cannot attest to the accuracy of this information. Use of a term in this
book should not be regarded as affecting the validity of any trademark or
service mark.
Special Sales
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover
designs; and content particular to your business, training goals, marketing
focus, or branding interests), please contact our corporate sales department
at [email protected] or (800) 382-3419.
For government sales inquiries, please contact
[email protected].
For questions about sales outside the U.S., please contact
[email protected].
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest
quality and value. Each book is crafted with care and precision, undergoing
rigorous development that involves the unique expertise of members from
the professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any
comments regarding how we could improve the quality of this book, or
otherwise alter it to better suit your needs, you can contact us through email
at [email protected]. Please make sure to include the book title and
ISBN in your message.
We greatly appreciate your assistance.
Editor-in-Chief: Mark Taub
Alliances Manager, Cisco Press: Arezou Gol
Director, ITP Product Management: Brett Bartow
Executive Editor: Nancy Davis
Managing Editor: Sandra Schroeder
Development Editor: Christopher A. Cleveland
Project Editor: Mandie Frank
Copy Editor: Bart Reed
Technical Editor: Daniel Dib
Editorial Assistant: Cindy Teeters
Designer: Chuti Prasertsith
Composition: codeMantra
Indexer: Timothy Wright
Proofreader: Barbara Mack
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers,
and fax numbers are listed on the Cisco Website at
www.cisco.com/go/offices.
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco
Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco
WebEx, DCE, and Welcome to the Human Network are trademarks;
Changing the Way We Work, Live, Play, and Learn and Cisco Store are
service marks; and Access Registrar, Aironet, AsyncOS, Bringing the
Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP,
CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco
IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems
logo, Cisco Unity, Collaboration Without Limitation, EtherFast,
EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare,
GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study,
IronPort, the IronPort logo, LightStream, Linksys, MediaTone,
MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking
Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect,
ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The
Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the
WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its
affiliates in the United States and certain other countries.
Jake, my favorite son, you are a joy to spend time with. I love that you are
so interested in my books, and I think it’s about time we wrote one together.
It could be epic Lego builds, electric motorbike mayhem, karate for kids, or
a gastro cookbook. I will let you choose, and we can have a lot of fun with
the research!
Anna, my favorite daughter, you are the real architect of the family. I can’t
believe you are almost finished with your degree. It has been a journey, and
I’m so proud you have persevered and have done so well. You are an
amazing young lady and will be offered some incredible opportunities, so I
can’t wait to see how your career develops and your life unfolds. It’s going
to be great, and you fully deserve it.
I am blessed to have the three of you. When I’m on a mountain and I see
you all hurtling through the snow under full control (Jake, semi-controlled),
I am definitely in my happy place!
Charlotte, you’ve got some work to do on the skiing front, but you’re
perfect in every other way. I love the time we get together, whether it’s the
school run, having a coffee, cycling, or being my favorite co-pilot. I’m a
happy and lucky man.
Mum and Dad, thanks for being there and for everything you do for our
family.
Acknowledgments
I’d like to express my gratitude to the team at Cisco Press, especially Nancy
Davis and Chris Cleveland, who have turned a vision into something real.
They will either be taking the CCDE lab or a long holiday after this project.
Thanks also to the technical reviewer, Daniel Dib. I was so fortunate to get
you involved in this project and really value your contribution. It brought
back memories of our original CCDE study group, our journey towards
CCDE, and the CCIE lab content creation week in Brussels.
Russ White, Bruce Pinsky, and the original CCDE creators, thank you for
producing an incredibly valuable certification. The design community has
grown considerably because of your baby.
Elaine Lopes and Mark Holm, thank you for keeping the CCDE
challenging, real world, current, and achievable. It’s simply the best
certification track a candidate could wish to pursue.
Mark Holm, I am also grateful for the Foreword you kindly provided.
Contents at a Glance
Foreword
Introduction: A License to Design
Chapter 1 CCDE Practice Lab 1: Jacobs
Chapter 2 CCDE Practice Lab 2: Squid Energy
Chapter 3 CCDE Practice Lab 3: Bank of Jersey
Index
Reader Services
Register your copy at www.ciscopress.com/title/ISBN for convenient
access to downloads, updates, and corrections as they become available. To
start the registration process, go to www.ciscopress.com/register and log in
or create an account*. Enter the product ISBN 9780137499854 and click
Submit. When the process is complete, you will find any available bonus
content under Registered Products.
*Be sure to check the box that you would like to hear from us to receive
exclusive discounts on future editions of this product.
Contents
Foreword
Introduction: A License to Design
Chapter 1 CCDE Practice Lab 1: Jacobs
Practice Lab Navigation
Practice Lab
Document 1: Background Information
Document 2: Network Background
WAN Documentation
Jacobs DC Network
DCI
Toolmate DC Network
Document 3: Utilization Statistics
Document 4: Additional Notes
Lab Questions
Question 1
Question 2
Email #1
Question 3
Question 4
Email #2
Question 5
Email #3
Question 6
Email #4
Question 7
Question 8
Email #5
Question 9
Question 10
Question 11
Email #6
Question 12
Question 13
Email #7
Question 14
Email #8
Question 15
Question 16
Question 17
Email #9
Question 18
Email #10
Question 19
Email #11
Question 20
Email #12
Question 21
Email #13
Question 22
Question 23
Email #14
Question 24
Practice Lab 1 Debrief
Question 1
Question 2
Email #1
Question 3
Question 4
Email #2
Question 5
Email #3
Question 6
Email #4
Question 7
Question 8
Email #5
Question 9
Question 10
Question 11
Email #6
Question 12
Question 13
Email #7
Question 14
Email #8
Question 15
Question 16
Question 17
Email #9
Question 18
Email #10
Question 19
Email #11
Question 20
Email #12
Question 21
Email #13
Question 22
Question 23
Email #14
Question 24
Summary
Chapter 2 CCDE Practice Lab 2: Squid Energy
Practice Lab Navigation
Practice Lab
Document 1: Company Background Information
Document 2: UK Power Background Information
Document 3: Squid Network Background Information
Document 4: Relevant Background Information
Email #1
Lab Questions
Question 1
Question 2
Email #2
Question 3
Email #3
Question 4
Question 5
Email #4
Question 6
Question 7
Question 8
Email #5
Question 9
Email #6
Question 10
Email #7
Question 11
Question 12
Question 13
Email #8
Question 14
Question 15
Question 16
Email #9
Question 17
Question 18
Email #10
Question 19
Email #11
Question 20
Question 21
Email #12
Question 22
Email #13
Question 23
Email #14
Question 24
Question 25
Email #15
Question 26
Practice Lab 2 Debrief
Question 1
Question 2
Email #2
Question 3
Email #3
Question 4
Question 5
Email #4
Question 6
Question 7
Question 8
Email #5
Question 9
Email #6
Question 10
Email #7
Question 11
Question 12
Question 13
Email #8
Question 14
Question 15
Question 16
Email #9
Question 17
Question 18
Email #10
Question 19
Email #11
Question 20
Question 21
Email #12
Question 22
Email #13
Question 23
Email #14
Question 24
Question 25
Email #15
Question 26
Summary
Chapter 3 CCDE Practice Lab 3: Bank of Jersey
Practice Lab Navigation
Practice Lab
Document 1: Company Background Information
Document 2: Network Information
BankExt Network
BankDMZ Network
Banknet DC Network
Banknet WAN
Branches and Campus Locations
Network Management
Document 3: Relevant Information
Email #1
Lab Questions
Question 1
Email #2
Question 2
Email #3
Question 3
Question 3.1
Email #4
Question 4
Email #5
Question 5
Question 5.1
Question 5.2
Question 5.3
Question 5.4
Email #6
Question 6
Email #7
Question 7
Question 8
Email #8
Question 9
Question 10
Email #10
Question 11
Question 11.1
Question 11.2
Question 12
Email #11
Question 13
Question 13.1
Question 13.2
Email #12
Question 14
Email #13
Question 15
Email #14
Question 16
Email #15
Question 17
Question 18
Email #16
Question 19
Email #17
Question 20
Question 21
Question 22
Question 23
Question 24
Email #18
Question 25
Question 26
Question 27
Practice Lab 3 Debrief
Question 1
Email #2
Question 2
Email #3
Question 3
Question 3.1
Email #4
Question 4
Email #5
Question 5
Question 5.1
Question 5.2
Question 5.3
Question 5.4
Email #6
Question 6
Email #7
Question 7
Question 8
Email #8
Question 9
Question 10
Email #10
Question 11
Question 11.1
Question 11.2
Question 12
Email #11
Question 13
Question 13.1
Question 13.2
Email #12
Question 14
Email #13
Question 15
Email #14
Question 16
Email #15
Question 17
Question 18
Email #16
Question 19
Email #17
Question 20
Question 21
Question 22
Question 23
Question 24
Email #18
Question 25
Question 26
Question 27
Summary
Index
Foreword
The CCDE certification is regarded by many as the pinnacle of Cisco career
certifications—a certification that many long-standing networking
professionals who want to transition to an architectural role choose to
pursue. Working on the border between the business and the network is an
area that requires a different mindset than what is seen with typical
networking-oriented certifications. On one side, you need to be well-versed
in the many technologies found in networks, knowing what each technology
can provide the business, either from a technical or business aspect. On the
other side, you must also be able to determine what the business expects
from the technical solution. Your task is essentially to translate all the stated
requirements and constraints—whether they are of a technical, financial, or
business-oriented nature—into a solution that meets them.
The CCDE Practical Exam is designed to mimic real life, so you are also
likely to be asked to justify and/or explain the decisions you make, just like
it often happens in real-life design situations. Design is not an exact science
—often there are many ways to achieve the goals, and some proposed
solutions may be more optimal than others. This is where you as a CCDE
can make a difference.
Preparing for the CCDE Practical Exam is a daunting task that requires
real-life job experience and study efforts. Just as important is adopting the
required mindset and getting used to working under pressure. During the
exam you will be faced with multiple scenarios, each of which you are
expected to finish within a finite time limit. You will have to read the
provided resources (diagrams, background information, strategies, emails
asking for advice, etc.), analyze the current environment, and figure out
what the goals are. All of this will provide you with the information
required to be able to answer the questions. In doing this, it is important to
keep time management in mind, as you must complete any given scenario
within the time limit. One of the best ways to do this is through practice,
practice, and practice. This is where this book comes into play; it is
designed to allow you to get experience working your way through exam-
like scenarios.
As you work through the practice scenarios, it is important to be honest
with yourself. Maybe you found that you lacked a bit of knowledge in
certain areas, or that you could improve on your speed. Include these
aspects in your self-evaluation after each practice scenario to get an idea of
where you are.
I wish you the best of luck in pursuing your CCDE certification!
Mark Holm
CCDE Exam Program Manager
CCIE #34763 (EI, DC, SP)
CCDE #20160020
Introduction: A License to Design
Design methodology isn’t just focused on technology; an architect or
designer also needs to focus on business priorities to bring true value to a
solution. A design is often a compromise and has multiple constraints that
are outside of the domain or scope of influence of an IT organization. To
successfully deliver true value, a Cisco Certified Design Expert (CCDE)
can be relied upon to assist organizations in seeing the bigger picture and
interface between technical and business domains with their wealth of
technical expertise and business acumen. Cisco’s CCDE certification has
recently been updated to v3 to enhance the skillset of expert-level designers
and architects to ensure the technical solutions businesses demand are able
to meet the business and technical requirements in this increasingly
complex world in which we live. The CCDE certification has been running
since 2007 with a steadily growing niche community.
In comparison, the CCIE certification has been running since 1993, with
numbers now being issued beginning from upward of #60,000. Reading
between the lines, does this mean the CCDE certification is not as desirable
or is considerably harder to achieve than the CCIE? Fortunately, the answer
is “no” on both counts. It is a highly desirable vendor-agnostic (up to v3)
certification, and candidates who are not dedicated to network design find it
challenging to demonstrate that they possess the qualities that the
certification stipulates in order to be successful. CCIE exams are mature
and very specific within each track. You are openly informed which
equipment and code you will be presented with and have a wealth of
training material available to purchase with very specific blueprints to
follow. The exam questions are also well-defined, and you have the ability
to double-check your practical tasks to validate your success as you
progress through the exam (configure X in order to achieve Y, and so on).
In contrast, the CCDE certification tests candidates on their experience to
prove their status and validate their technical and business experience. It’s
real world (what technology should customer X choose in order to satisfy
requirement Y?). Passing the certification isn’t a case of studying
technology or “labbing out” how protocols interact. I generally explain to
candidates that in order to be successful in the CCDE lab, you actually need
to be operating as a CCDE in your role on a day-to-day basis already. You
just need to convince the Cisco testing engine. You’ve typically already
achieved a CCIE certification to cover the technical aspects you will find in
the CCDE lab, and your technical and business engagement experience in
your design role is really what is going to differentiate you in the lab exam
to be successful.
One of the biggest problems in achieving a Cisco expert-level certification
is not knowing what you don’t know, so these labs are going to be the
turning point in your preparation and will coach you in exam technique as
well as design methodology. The labs presented in this book will help you
focus on the “why,” as opposed to the “how,” which you may be more used
to. This is absolutely crucial for the certification. Also, this is a first-class
certification, and you have never seen anything like it previously, which is a
credit to the creators. It was developed by the likes of Russ White and
Bruce Pinsky, who have both been role models in my career and
certification quest. Both are gurus, and having met them a number of times,
I can tell you they are very nice chaps to boot.
The certification was developed as it became more and more apparent to the
folks at Cisco that, even though they had been fundamental in assisting
TAC by creating the CCIE program in order to implement and troubleshoot
networks successfully, they actually didn’t have an expert level of designers
to ensure that networks were designed correctly from the outset. Can a
network scale? Where is the fault domain? Is modularity required? If these
design fundamentals are achieved from the offset, then the concept of
firefighting shouldn’t exist, and your IT team can be more productive while
your customers will be content with stability and a network that can scale or
divest without damaging the underlying business.
You need to effectively be “T” shaped in order to be successful with the
CCDE certification. By this I mean, ideally, you should be operating
currently as an IT architect and have a wide breadth of IT knowledge
horizontally (high level and broad, covering many disciplines and fields,
including business acumen) and depth of knowledge vertically (low level
and specialized in a particular field; Layer 3 is a must). This is opposed to
an IT specialist (think CCIE), who would typically be “I” shaped and
primarily have the vertical knowledge and be an expert in his or her own
field while lacking broader, wider knowledge.
A question that is posed to the CCDE community regularly is, Do I need to
be a CCIE in order to become a CCDE? The answer that is generally given
is “yes and no,” or as Cisco prefers to say, “it depends.” Having a CCIE is
an advantage but entering the exam with a CCIE mindset is not going to
help you attain the CCDE certification. You may focus too closely on small
issues (sweating the small stuff) and miss the bigger picture of what is
being requested from you. The previous CCDE certification track owner
Elaine Lopes summed this up nicely by saying, “don’t bring a knife to a gun
fight!” Bring the right expertise and mindset to the exam, and you have a
far higher chance of being successful. Achieving the CCDE certification is
really about proving you have had the experience and possess the
knowledge, experience, and intelligence to operate effectively with multiple
business and technical constraints. Everyone I have met who has been
working toward or who has passed the CCDE tells me they have grown
considerably in their journey toward attaining the CCDE. Pass or fail, you
are definitely going to learn new skills, grow your network, and enhance
your career. Cisco states the following: “Unlike the CCIE, which focuses on
low-level network design and implementation, the CCDE validates your
ability to work in the world of key stakeholders. Your CCDE certification
proves your proficiency in the art of soliciting and documenting true
requirements and then translating them into a high-level design for a
complete solution that delights your stakeholders. The result? The business
gets solutions that meet their requirements, fit their budget and schedule,
and address today’s needs with a view to the future. You get all the glory.
The CCDE enables you to design for the changing needs of a complex
world.”
Exam Technique
It took me a while to realize this, but I discovered I couldn’t guarantee I
would pass the exam based purely on my technical ability, business
acumen, and experience. I have been fortunate enough to work in both
service provider and enterprise fields in multiple disciplines, but the lab
exam is intense, and it takes some strategy to guarantee success. Here are
some pointers I learned from my journey that will help you:
There will be a four-hour countdown timer leading up to the lunch
break, and another one after lunch. You have two scenarios in the
morning and two in the afternoon. There are progress bars for each
scenario showing you, as a percentage, how far through the scenario
you are. Aim to allocate two hours for each scenario, but don’t get
preoccupied by the time. It’s going to take approximately 15 minutes
at the beginning of each scenario to read the background information
and make any relevant notes that could affect your design decisions.
Therefore, it might look like you are running behind initially. You
could go over a little in your first scenario in the morning or after
lunch if it is particularly challenging, but it’s a risky strategy.
You can highlight information in the background information/exhibits
using different colors. This can be very useful to highlight specific
constraints or information that will undoubtedly influence a design
decision. Using different colors for different subject areas can be
advantageous and speed up locating the information when required.
Use the labs in this book to practice pulling out relevant information
and have a scheme in mind if you plan to use the highlighter in the
exam; maybe use blue for constraints, red for security requirements, or
whatever allows you to go back and find relevant information
efficiently.
You will be supplied with plastic sheets on which to make notes
during the exam. If you don’t want to search through documents for
valuable information, you may prefer to simply write down relevant
facts and have them immediately at hand without searching through
multiple documents and rereading highlighted text, for example.
These notes can be hard to read though and put back into context, and
they will take valuable time to actually write, so really try to limit the
information you jot down here. The same is true for the notepad
available within the desktop you are using.
As in many Cisco exams, you can’t go back in terms of questions (you
can check exhibits and emails as often as you like, though). You may
be presented with some information that states a customer made a
specific design decision as a level set that may then influence an
earlier decision you made. Don’t worry if the decision didn’t match
your choice, as you may have made the right choice even if the
customer went in another direction. Just carry on with the next
question.
You will get bombarded with new information, such as exhibits and
emails. This can be hard to keep track of, but you need to read this
information, as it is crucial and will affect your design decision. Make
sure you don’t have any exhibits minimized at the risk of not seeing
the contents.
Stay connected to the scenario; it will shift in direction and
technology, but you need to stay engaged and look at the bigger
picture rather than answer each question in a solitary manner.
Remember, it’s the same fictitious company going through a series of
design challenges over a period of time.
If you feel you don’t have sufficient information to answer a question,
you need to go back and look at your background
information/exhibits. This is definitely not a guessing game; you are
making informed decisions and not assumptions.
Best practice is useful, but there may be a reason why you would do
something differently in the exam. Have best practice in mind, but
don’t let it completely influence your design decision.
You may be asked to fill in tables with missing information. These can
be quite daunting. Just make sure you only fill in columns that are
actually required. The instructions should be quite clear.
You may be asked how you would implement a solution or migrate to
a new one. If so, there will likely be multiple steps involved that you
are required to place into a specific order. These can be seen as the
hardest questions due to the number of variables, but typically there is
only one way or a limited number of ways you can achieve the correct
order, so practice in these labs and think about how you have
delivered projects as part of your role. When you break it down to its
simplest form, just be sure you don’t add a step that “breaks
something before it makes something”!
There is a comment button, and all comments are read by the team.
The clock is still ticking, though, so you need to decide how important
your comment is going to be. Exams are very well written and
verified, so it is very unlikely you will spot an error. However, if you
are confident you have seen an issue, it’s worth making a quick
comment.
Take a break between each scenario, unless you are seriously behind.
You need to reset and tackle the next scenario as a completely new
exam with a clear head.
Consider wearing noise suppressing headphones if your testing center
has them available so you are not interrupted and can focus.
Russ White advises to focus on the “why” rather than “how.”
If you go into the exam and tackle it as a CCIE, you will be leaving as
a CCIE.
Prerequisites
There are no formal prerequisites for taking the CCDE, but you should have
a thorough understanding of the exam topics before taking the exam.
CCDE candidates are recommended to have five to seven years of
experience with designing and architecting network solutions, as well as
engaging in other related activities, such as pre-sales work.
You will need to pass the 400-007 CCDE written exam prior to attempting
the CCDE lab exam. The written exam validates High-Level Design (HLD)
aspects as well as business requirements within the context of enterprise
network architecture. The exam is a two-hour, multiple-choice test with 90
to 110 questions that focus on core enterprise network architecture HLD
aspects. The exam serves as a prerequisite for the CCDE practical exam and
will continue to be available as a means of recertifying your expert-level
and lower certifications. The exam is closed book, and no outside reference
materials are allowed.
1.1 Ethernet
1.2 CWDM/DWDM
1.3 Frame relay (migration only)
1.4 Cellular and broadband (as transport methods)
1.5 Wireless
1.6 Physical mediums, such as fiber and copper
2.0 Layer 2 Control Plane
3.1 Overlay
3.1.a Management plane
3.1.b Control plane
3.1.c Data plane (such as VXLAN, MPLS)
3.1.d Segmentation
3.1.e Policy
3.1.e.i Security
3.1.e.ii Topologies
3.1.e.iii Data center interconnect
3.1.e.iv Multiple site strategy
3.1.e.v Service insertion
3.2 Virtual Networking
4.0 Automation
5.1 Storage
5.1.a Physical topology
5.1.b QoS requirements
5.1.c FC and FCoE
5.1.c.i Zoning
5.1.c.ii Trunking
5.1.c.iii Link aggregation
5.1.c.iv Load balancing
5.1.d iSCSI
5.1.d.i Authentication
5.1.d.ii Multipathing
5.2 Application delivery
5.2.a Load balancer deployment modes
5.3 Compute
5.3.a UCS blade integration
5.3.b UCS rack server integration
5.3.c HyperFlex integration
5.4 Compute connectivity
5.4.a SAN/LAN uplinks
5.4.b Port modes
1.0 Security
Final Advice
I attended the CCDE Cisco Live Tectorial in Berlin prior to my success and
booked one-on-one time with Elaine Lopes and Yuri Lukin, who were
heading up the CCDE certification team at that time. The whole team was
really accessible, and they were very keen to offer help and advice. This
was invaluable for me—and a turning point. I learned not to be too hasty in
my decisions and not to answer the questions based on the facts in front of
me but to scan the documents when something wasn’t clear. I was missing
clues and needed to be neater in marking what was really important. My
technical ability was at the correct level, however. The distracters in the
questions are so well thought out that you really have to fully absorb the
scenario and the requirements presented within it to be successful.
Possibly the most useful resource for me was being part of a study group
that my friends Daniel Dib and Kim Pedersen started. We pretty much had
the dream team in our study group. We were blessed with the presence of
Russ White, the “daddy” of the CCDE exam, and I was able to ask him
questions around the logic of OSPF ABR placement from one of his books,
as it was puzzling me. He even gave me some brilliant last-minute advice:
“read the question,” he said! It proved to be simple and sound advice, which
made me laugh at the time. I made sure I did read each question, at least
twice. I had even filled in a table with multiple answers when I remembered
the advice and read the question again and found I only needed to check
one box on one column, but actually had completed two (thanks Russ!).
If you are more than an hour away from the test center, booking a hotel for
the night before would be a smart move. You don’t need the stress of
travelling far on the same day. By taking the labs in this book and working
through the debrief material, you will be in a far better position and won’t
have any surprises on the day.
The practical exam is very tough, but it is fair and achievable. This is what
makes it so desirable. If it is your goal or ambition to become CCDE
certified, you are very likely to reach it. If you are thinking, “I’ll give it a
shot, as I’ve been in the industry for 10 years and design on a daily basis,”
then don’t be surprised if you don’t get your number immediately. Just
remember that if you don’t pass on your first or second or even third
attempt, you haven’t actually failed. You will only have failed if you give
up. The exam has to beat you every time, but you only have to beat it once
to get your number. It has also occurred to me that if you can’t explain a
technology or how a solution functions or scales to a friend who isn’t
necessarily even technical, then you don’t actually know that technology.
It’s a case of turning your weaknesses into your strengths. For instance, if
you are a guru with IS-IS but have no real-world experience of how EIGRP
may perform better in certain topologies, it’s time to get the books out or
speak to your study group. Be prepared for give and take from your group.
Play devil’s advocate to question others and offer to run a study session for
your group in your area of expertise. The sum of your group’s expertise will
be invaluable. Even if you don’t get your number, you will grow from the
experience.
The exam itself is quite simply a credit to its creators. Most people don’t
realize the effort that goes into keeping the scenarios realistic, fresh, and
protected. The team behind it is brilliant. The distracters are just so good—
sometimes you see five correct answers in front of you, but only one will be
appropriate to the customer and the scenario, even if not your favorite.
Therefore, you just need to connect the dots and find the important
requirements that, when matched with your knowledge and experience, will
take you to the correct answer.
Put the books down for a few days prior to the exam. Spend time with your
loved ones and be energized for the exam. Take your full break on the
testing day, and pace your time. The exam status bar you will see
throughout your scenarios is actually your friend, not your enemy.
You are going to need some endurance to complete four scenarios in a day.
Practice with as many labs as you can as if you were taking your CCIE lab.
I like to cycle, and I found I could clear my head and be energized for a
long study session after a ride. I certainly couldn’t run an eight-hour study
session, but I could easily manage four two-hour ones.
Use the following advice as you work through the labs presented in this
book and your real exam, and you should have a good chance of gaining
your number. Good luck!
Read the question.
Connect with the scenario.
Take time to analyze the existing environment.
Look for missing information.
Know what information you already have.
Don’t only base your answer on best practices.
Do not make assumptions.
Only make fact-based decisions.
Work on your weaker technology areas.
Maintain a high-level approach.
Think as a network architect/designer, not as a CCIE.
Focus on the “why”!
Chapter 1
Practice Lab
During this practice lab, you are the network architect for Jacobs.
WAN Documentation
The WAN consists of four separate MPLS provider networks, and each
supplies a fully managed Layer 3 MPLS service, including CE routers, as
shown in the figure and described in the list that follows.
1. The Jacobs L3 MPLS VPN network is provided by Bluesky and
Taco for resilient Jacobs store connections into the Jacobs DC. The
connections from each provider into the Jacobs DC are via 10Gbps
metro Ethernet connections to each provider with line rate capacity
available. The Bluesky network operates as a primary MPLS link and
the Taco network as a standby MPLS link due to costing arrangements
with the providers. Jacobs stores access the MPLS networks using
default static routing pointing to the VRRP gateway with the primary
MPLS network of Bluesky. VRRP tracking is used, which decrements
priority in the event of uplink failure for stores, so the Taco CE router
is only used in the event of a Bluesky uplink circuit failure. Within the
CE router configuration, each Jacobs store uses the same BGP AS of
64555 for configuration ease, and AS override is used on each
provider. Store prefixes are statically redistributed into BGP by the
local CE routers. iBGP is used between providers on the store site to
allow connectivity between providers during failure conditions. The
central DC Jacobs site uses a BGP AS of 64556 and iBGP between
provider CE routers, with mutual redistribution of BGP from the
MPLS network to LAN-based OSPF with metrics to ensure the
Bluesky MPLS network is used as a primary connection. The Taco
MPLS connection is used only in the event of a failure of Bluesky
MPLS network connectivity within the DC or within one of the stores.
The Layer 3 MPLS network is a full mesh configuration with store-to-
store communication enabled by default, which provides optimal
routing for VoIP telephony requirements. The MPLS networks are
implicitly open without firewalls within Jacobs stores or DC. Each
Jacobs store connects to each service provider using a 10Mbps circuit
with full line rate available when required and basic QoS enabled to
prioritize VoIP traffic over and above application traffic in a four-class
QoS policy.
2. The Toolmate L3 MPLS VPN network is provided by Lotnet. Stores
are dual-homed into the Toolmate MPLS network for access to the
central DC and for store-to-store connectivity. The CE router
connections into the DC are via 10Gbps metro Ethernet connections to
each CE with a CIR of 6Gbps available on each circuit. The CE
routers load-share connections for egress and ingress traffic into and
out of the DC by use of BGP metric manipulation. The central DC
Toolmate site uses a BGP AS of 64600 and iBGP between provider
CE routers, with mutual redistribution of BGP from the MPLS
network to LAN-based BGP with equal-cost routing configured to
facilitate load sharing over both CE router links. The Layer 3 MPLS
network is a full mesh configuration with store-to-store
communication enabled by default, which provides optimal routing for
VoIP telephony requirements. The MPLS network is also implicitly
open without firewalls within the Toolmate stores or DC. Each
Toolmate store connects to the service provider using dual 10Mbps
circuits with a 5Mbps CIR and QoS enabled to prioritize VoIP traffic
over and above application traffic in a six-class QoS policy. Stores use
dual equal-cost static routes pointing to each MPLS CE router. Store
prefixes are statically redistributed into BGP by the local CE routers.
3. The independent store L3 MPLS VPN network is provided by
Annet. Stores are single-homed to the Layer 3 MPLS hub and spoke
network. Independent stores connect to the service provider using a
10Mbps Ethernet circuit with full line rate available with no QoS.
Stores use the CE router as a default gateway for the single local LAN
VLAN, and store prefixes are statically redistributed into BGP by the
local CE router. The CE router connection into the Jacobs DC is via a
single 10Gbps metro Ethernet connection, with a CIR of 5Gbps
available on the circuit. The central DC Jacobs site uses a BGP AS of
64700 with redistribution of BGP from the MPLS network to the LAN
and a summary route containing Jacobs DC reachable prefixes
configured within the MPLS network to steer all DC-destined traffic
toward the central DC and a shared services segment protected via a
firewall. Internet-destined traffic is not serviced over the Annet MPLS
network due to no available default route being present. Store-to-store
communication is blocked over the hub-and-spoke network in
conjunction with policy-based routing forwarding all traffic received at
the DC toward the local firewall for policy decision.
Jacobs DC Network
The Jacobs DC is composed of a collapsed core architecture with 10Gbps
core switches and full Layer 3 access layer running OSPF in Area 0. The
WAN core is assigned Area 1 and is used as a connectivity zone for
communication to the WAN and Internet. The WAN core is composed of
dual 48-port 10/100/1Gbps switches with 6x 10Gbps uplinks configured in
a stack forming a single logical switch. An outer and inner DMZ is formed
of a firewall sandwich with dual vendor firewalls in two separate Layer 2
networks formed from dual 48-port 10/100/1Gbps Layer 2 stacked switches
with 6x 10Gbps uplinks. The DMZ inner switches and firewalls host
multiple load-balanced DMZ segments for publicly reachable web services
for Jacobs’ online retail and tool hire presence. The DMZ outer switches
host the Internet CE connectivity and VPN services for B2B connections,
which provide the online payment systems.
Firewalls (deployed in routed mode) are configured in a local cluster
(active/active) with an LACP EtherChannel between them and the stacked
switches on either side of the firewalls. A physical state and synch cable is
used between firewalls for state and failover for the firewalls, which are
located in the same physical network rack.
All internal applications are hosted from within the DC on Layer 3 access
model 1Gbps/10Gbps switches with varying port counts, which advertise
local switch prefixes using OSPF. Current port utilization is 1460 (65% of
total capacity). The main business application is a typical three-tier service
called “Jaystore,” which synchronizes product availability with a web
frontend from a database within the DC location for online and store
purchases. The application was created over 10 years ago by developers
within a LAN environment and, as such, does not function well when
latency exceeds 20ms between the client and headend infrastructure for
internal Jacobs users within the stores. Due to this issue, the network team
included the TCP application in a mission-critical QoS class over the WAN
for mitigation, which functions well.
Internet connectivity is provided by a single ISP (Britnet) from dual 1Gbps
links in an active/standby arrangement running iBGP between ISP CE
managed routers. Jacobs’ external firewalls point to a VRRP address on the
ISP CE routers, which receive identical partial routing via BGP from
central Britnet ISP routers. Provider-assigned public IP addressing is used
for external hosting using a Britnet registered /24 prefix, which is further
subnetted to provide DMZ segmentation for public-facing Jacobs’ services
and NAT ranges for employee Internet access via a central proxy server
within the DMZ.
DCI
A dual 1Gbps Layer 3 DCI link is provisioned between the Jacobs and
Toolmate DCs using OSPF peering between the firewalls within Jacobs to
Toolmate edge routers within the Toolmate DC. Prefixes from each DC
network are advertised over the DCI, allowing machine-to-machine
communication to enable Toolmate stores and online systems to broker
sales for Jacobs’ products and services (which is seen as crucial to the
Jacobs business model) as well as access for Toolmate staff to Jacobs’
intranet and HR systems and VoIP connectivity for Toolmate telephony
systems to a Jacobs call manager by firewall policy. OSPF to EIGRP
mutual redistribution is configured on the Toolmate DCI routers. System
access to the Jacobs DC over the DCI links requires firewall changes on the
Jacobs DC firewalls, which terminate the inter-DCI links. Changes require
approval from Jacobs and Toolmate change management systems, which is
proving to be inefficient and incurs delay for approval and manual
implementation out of hours, unless an emergency change procedure is
invoked to provide in-hours short notice changes. The firewalls are
approaching end of life and are close to capacity in terms of CPU
utilization. The following figure shows the Jacobs DC network.
Toolmate DC Network
The Toolmate DC is composed of a collapsed core architecture with dual
48x 1/10Gbps switches configured in a stack, forming a single logical
switch and full Layer 3 access layer running EIGRP over dual 10Gbps
ECMP uplinks. Access switches are chassis-based modular 10/100/1Gbps
switches with dual supervisors and dual PSUs, with a total current port
count of 1280 (78% utilization).
A DMZ is formed of a firewall sandwich with dual vendor firewalls
(deployed in routed mode) in a single Layer 2 network formed from dual
48-port 10/100/1Gbps Layer 2 switches with 6x 10Gbps uplinks connected
to each other using a 2x 10Gbps Etherchannel trunk. The DMZ hosts a
single non-load-balanced DMZ segment for publicly reachable web
services for Toolmate’s online store presence and tool hire. The red zone
outer switches host the Internet CE connectivity and VPN services for B2B
connections, which provide online payment systems. Firewalls are
configured in an active/standby arrangement with a physical proprietary
cable between firewalls for synchronization, state, and failover.
Internet connectivity is provided by a single ISP (JAnet) from dual 1Gbps
links in an active/standby arrangement running iBGP between ISP CE
managed routers. Toolmate’s external firewalls point to a VRRP address on
the ISP CE routers, which receive identical default routes (0/0) via BGP
from central JAnet ISP routers. Legacy provider-independent public IP
addressing migrated from a previous ISP is used for external hosting using
a /25 prefix, which is subnetted to provide DMZ segmentation for public-
facing Toolmate services and NAT ranges for employee Internet access via
the external firewall. A default route is advertised throughout the DC and
WAN for external traffic to be routed via the external firewall in the
absence of a proxy server for Internet traffic. The following figure
illustrates the Toolmate DC network.
Document 3: Utilization Statistics
The figures that follow provide the WAN and Internet utilization statistics.
Document 4: Additional Notes
There has been a recent pilot for Office 365 SaaS within the public cloud
via a cloud provider (Cloudcom) reachable over the DC Internet connection
for various Jacobs stores participating in a trial. Early indications are that
the service has suffered intermittent delays and that user experience was not
positive.
Due to a historical issue with a virtualized infrastructure device with RCA
analysis citing vendor code interoperability failure that resulted in a high
profile outage, Jacobs Security policy (which covers all zones of the
network and store entities) now dictates that functionality of infrastructure
devices should be limited to a single defined function and that separate
functionality must be provisioned through separate physical infrastructure
devices.
Lab Questions
Question 1
Which are the main issues facing Jacobs currently? (Choose two.)
a. Business continuity
b. An excessive number of network providers
c. Multiple single points of failure for independent stores
d. Lack of VoIP system access for independent stores
e. No integration of Toolmate and independent store IT systems
Question 2
Which of the following changes to the network could improve the
scalability of the overall networks and reduce management overhead for the
network teams? (Choose one.)
Email #1
From: James Medina
Hi.
Our contract with the MPLS provider for the individual stores (Annet)
is up for renewal. Turns out they have uplifted their prices by 28% for
continuity of service due to a requirement to upgrade their network.
We’re not impressed, as it means we are effectively paying for the
upgrade if we want to keep things simple and stay with them. Annet
has stated they can maintain previous pricing if we migrated to a more
cost-effective VPLS service using all the same equipment as is
currently onsite in the stores (all the CE edge routers), as this will
mean there is then no need to refresh the CE equipment. They can
perform the change in a single evening for all stores at the same time,
as they can script it so downtime should be minimal, and, as
mentioned, the price will be the same as now, which I guess is a
bonus. How does this sound? Is there an alternative technical solution
you can think of to provide connectivity into the network? We only
need a single connection for independent stores into the Jacobs DC, as
they have their own internal system and just need a link into us for
pricing changes and tool hire ordering, which they can always do by
phone if there is a WAN outage. We’d rather minimize changes either
in the store and centrally within the DC, but it’s challenging to justify
a 28% uplift without any gain or saving any pain. I made contact with
Bluesky and Taco (the WAN providers for the Jacobs store MPLS
networks), and they are both keen to win this business if we decide
not to renew with Annet. We have a couple of months before the
contract renews, so there’s a limited amount of time to respond.
Rgds,
James Medina
Network Manager
Jacobs
Question 3
What is the optimal approach to the suggested MPLS changes for
independent stores? (Choose one.)
a. Migrate the independent stores into one of the Jacobs MPLS network
providers (Bluesky or Taco).
b. Provide an SD-WAN solution using Internet circuits at independent
store locations to reach the Jacobs DC.
c. Use 4G LTE/5G transport.
d. Migrate to the VPLS service with the same MPLS provider.
e. Plan to pay the uplift to maintain continuity while researching
alternative solutions in parallel.
Question 4
Jacobs believes migrating the independent stores to the Jacobs dedicated
Bluesky MPLS network would be a good option to avoid an immediate
uplift in pricing, which would drive future integration and provide cost
leverage with its primary MPLS provider. If this direction is taken, which of
the following would be the optimal option to provide connectivity into the
Jacobs DC for the independent stores from the Bluesky MPLS network?
(Choose one.)
Email #2
I’ve been discussing the MPLS network issue with the CTO, and this
has prompted a bigger question around finally providing integration.
We both don’t believe we should continue as is, and it’s time to bring
some innovation into the business and reduce our capex and some of
the complexities of running multiple providers. The CTO believes we
should be running an Internet-only VPN WAN and completely
remove the overhead of MPLS running our own managed overlay
networks on the Internet circuits. He stated we could reduce our
Internet circuits to a single circuit in each DC (Jacobs and Toolmate)
on the back of this so that the DCs can back each other up in the event
of a failure and each store can have dual Internet circuits, so no single
points of failure. I’m not convinced we should do this in one fell
swoop and believe we are better off running a traditional hybrid SD-
WAN type of network with a mix of connectivity. I’ve been reading
up on the subject and it seems we could have the best of both worlds
if we followed this path. I need your help to decide how we should
progress. I’ve also looked into Internet-only circuits, and in some of
the remote parts of the UK, the providers we contacted have latency
calculators that are showing approximately 100ms latency from stores
to the London DCs, so I figure we are still OK for VoIP for their
ADSL circuits. The CTO has secured a budget to provide the
integration/consolidation, but we need to work out the best approach
for the business.
Rgds,
James Medina
Network Manager
Jacobs
Question 5
If Jacobs were to follow the CTO’s instructions for a self-managed Internet-
only VPN WAN solution based on the supplied information, which of the
following solutions would you recommend to Jacobs to consolidate
connectivity for all of the stores into the Jacobs and Toolmate DCs?
(Choose one.)
Email #3
From: James Medina
Hi.
We’re looking into industry trends, and we’re aware that there is a
movement from network topology toward an application services
topology. Network changes are taking too long for simple items such
as bandwidth and QoS changes, so we’re thinking we should
definitely be moving toward some kind of hybrid WAN or SD-WAN
solution. Can you have a look into this and let us know your
thoughts? We could, as previously discussed, use the Internet as
transport for stores in conjunction with MPLS or just use Internet
only, as we have central Internet connections in the Jacobs and
Toolmate DCs. From what I can gather, we would have the option to
steer our traffic over specific links on an application basis. This would
be fundamental to us, and we’d need the ability to be able to do this
effectively in real time without raising changes for new profiles or
applications as we bring them online with our providers.
Rgds,
James Medina
Network Manager
Jacobs
Question 6
If Jacobs did move to an SD-WAN type of solution with a combination of
MPLS and Internet circuits per store for Jacobs and Toolmate stores and
Internet-only circuits for independent stores, what would be a major
benefit? (Choose one.)
Email #4
2. All stores use DIA for Internet access rather than breaking out via
the central DCs.
Rgds,
James Medina
Network Manager
Jacobs
Question 7
If Jacobs moved to an SD-WAN solution for all store access, as detailed in
the fourth email, could it, with confidence, make a design decision to
remove the second ISP circuits at each DC and reduce speeds on the
individual Internet circuits in the DCs by having stores use Direct Internet
Access with a view reducing existing central Internet utilization and saving
central ISP costs? (Choose one.)
a. Yes
b. No
Question 8
If Jacobs were to move to an SD-WAN solution, as detailed in the fourth
email, with each Jacobs and Toolmate store using one MPLS link and one
Internet circuit, or a single Internet circuit in independent stores for WAN
connectivity, which of the following areas should take priority from a
security perspective? (Choose one.)
Email #5
Hi.
I’ve been in touch with the Bluesky MPLS provider to discuss our
strategy, and they offer a fully managed SD-WAN service and even a
co-managed SD-WAN service. It’s something we hadn’t considered,
as I had assumed we’d just self-manage if we went down the SD-
WAN route, and I guess MPLS companies are keen to retain as much
business as possible if it ultimately means loss of MPLS circuits. I
need your help to ascertain the management direction we should take.
Rgds,
James Medina
Network Manager
Jacobs
Question 9
Jacobs is now considering raising an RFP (Request for Proposal) to their
existing MPLS providers to bid for a fully managed SD-WAN solution that
the company can use for consolidated store access to the DCs. Complete the
following table to aid its decision-making process for a fully managed
service versus a DIY in-house self-managed SD-WAN solution by the
network team. Insert a check in the Solution Type option that provides the
most benefit to Jacobs (would be most optimal) for each Function topic.
Question 10
Which of the following SD-WAN solution types would be most suitable for
Jacobs? (Choose one.)
Question 11
As Jacobs fully investigates SD-WAN with a view of provisioning a self-
managed solution, it requires additional information on SD-WAN functions
and associated “planes” to gain a better understanding of SD-WAN
functionality. Check the boxes for the corresponding SD-WAN plane per
function in the following table to assist in the company’s understanding.
Function Plane
Email #6
Hi.
I’ve had the team research what technologies we can use for our
connectivity to stores for SD-WAN. We have all of the following
technologies available to us (varying bandwidths to suit and varying
prices) for all of our store locations. Have a think about which may be
better suited to our solution, as our infrastructure will natively support
all of them!
4G/LTE
5G
MPLS circuits
Rgds,
James Medina
Network Manager
Jacobs
Question 12
Which SD-WAN underlay technology would you recommend for the store
locations? (Choose two.)
a. 4G/LTE
b. 5G
c. Internet access circuits/ADSL/SDSL
d. MPLS circuits (primary site access)
e. MPLS circuits (secondary site access)
Question 13
If Jacobs went ahead with an SD-WAN solution, which of the following
items would the company need to address prior to using Internet
connectivity as one path for stores to access the central resources in the
Jacobs and Toolmate DCs? (Choose one.)
Email #7
From: James Medina
Hi.
James Medina
Network Manager
Jacobs
Question 14
As Jacobs is intending to use SD-WAN edge routers with 5G Internet
connections at stores providing Internet access to create the SD-WAN
network, should the company also provide firewalls at each store location
for protecting the SD-WAN edge routers and store LAN connected to the
Internet? (Choose one.)
Email #8
From: James Medina
Hi.
If you can start designing the overall SD-WAN solution, that would
be great.
Rgds,
James Medina
Network Manager
Jacobs
Question 15
If Jacobs proceeds with the SD-WAN design detailed within the following
figure, can the company decommission the existing central Internet access
at the Toolmate DC and use a 10Gbps resilient Jacobs DC Internet
connection as a secondary SD-WAN termination path for Toolmate stores in
the event of an MPLS failure in the Lotnet network? (Choose one.)
a. Yes (if the DCI firewall is configured to permit access).
b. No.
Question 16
Jacobs has decided to upgrade ISP connectivity in each DC to dual 10Gbps
active/standby connections. Complete the design provided in the following
figure for the headend SD-WAN edge router(s) placement in the Jacobs DC
when the dual headend MPLS connections will be reduced to one (the
Toolmate DC will be identical but with a different MPLS provider). Add as
many SD-WAN edge routers (which have 4x 10Gbps interfaces) and
associated Ethernet connections (all connections are 10Gbps and all
existing infrastructure supports 10Gbps and has a minimum of 2x 10Gbps
additional port capacity per device) as required to implement a fully
resilient SD-WAN headend. You may also remove existing Ethernet
connections if required.
Note
The Toolmate DC would be similar, but with a different single MPLS
provider. However, this question focuses only on the Jacobs DC
element.
Question 17
Which of the following SD-WAN designs would you recommend for a
Jacobs store. (Choose one.)
a.
b.
c.
d.
Email #9
Hi.
I’m a little wary of routing loops when we’re setting up the SD-WAN
network with its inbuilt routing protocol of OMP and whatever
protocol we use our side on the DC LAN. I could use a breakdown on
how you believe we can work around any potential loop with various
protocols. The scenario I’m thinking of is when we have a store prefix
coming in of, say, “A,” as per the diagram, and this advertisement is
received on the Internet SD-WAN edge router and MPLS SD-WAN
edge router in one of our DCs. The edge routers will need to be
running a routing protocol back to the DC LAN, so I want to make
sure the SD-WAN edge routers don’t end up forwarding traffic for
prefix “A” toward each other via the local DC LAN, rather than direct
over the SD-WAN overlay network to the store.
Rgds,
James Medina
Network Manager
Jacobs
Question 18
Complete the following table to assist Jacobs in understanding which loop
mitigation techniques could be used in conjunction with associated dynamic
routing protocol configured between SD-WAN edge routers to the DC
LAN. Insert an “X” under Mitigation Technique per routing protocol, where
appropriate.
EIGRP
OSPF
BGP
OMP
Email #10
Hi.
Rgds,
James Medina
Network Manager
Jacobs
Question 19
Jacobs requires each store to have an SD-WAN path to each DC to aid
convergence in the event of a failure condition. The company has selected
eBGP to be used between the DC LAN networks in the Jacobs and
Toolmate DCs and locally attached SD-WAN edge routers for the SD-WAN
network to advertise DC prefixes and SD-WAN store networks. iBGP will
also be used between Jacobs and Toolmate DC LAN networks over the
existing DCI to provide a backup path for a Jacobs SD-WAN-enabled store
via the Toolmate DC, and vice versa. How should the BGP AS number
(ASN) associated to the edge routers be configured within each DC?
(Choose one.)
a. The BGP ASN associated to the SD-WAN edge routers should be the
same in each of the DCs.
b. The BGP ASN associated to the SD-WAN edge routers should be
different in each of the DCs.
Email #11
Hi.
Thanks for the design of the SD-WAN edge routers in the stores and
central DCs. We obviously need some controllers to enable the SD-
WAN functionality on top of that infrastructure element, so we need
to work out where these will be placed for reachability by the SD-
WAN edge routers. The information I have back from the vendor we
have selected is as follows. We will need redundant controllers in
each of the following planes:
Rgds,
James Medina
Network Manager
Jacobs
Question 20
Where is the optimal hosting location for the iManage, iOrch, and iCon
controllers for Jacobs? (Choose one.)
Email #12
From: James Medina
Hi.
I need your help with planning the migration to SD-WAN, which I’ve
had drawn up below based on your input. Please have a think about
the best way to bring the service online!
Rgds,
James Medina
Network Manager
Jacobs
Question 21
In order to board the new SD-WAN solution and migrate traffic over it for
Jacobs, Toolmate, and independent stores’ connectivity, arrange the
following migration activities in the required sequence. The business has
declared it wants to minimize any associated downtime and ensure the
service is functioning correctly prior to migrating any Jacobs or Toolmate
store to the SD-WAN network.
Email #13
Hi.
Thanks for the migration assistance. Not one store noticed any
downtime! I’ve been asking around the stores and initial feedback is
very positive, considering we are now actually using the Internet
paths as well as MPLS for all our WAN traffic. I have had a couple of
comments in reference to the Jaystore application being less
responsive and some clipping on voice calls, though. As you know,
we had QoS on the MPLS links with four classes. I think in the
pressure of delivering the connectivity, we may have missed the QoS
element on the 5G links. I’m going to need your assistance to make
sure we improve the quality.
Rgds,
James Medina
Network Manager
Jacobs
Question 22
How can Jacobs rectify the quality issues reported post-migration? (Choose
one.)
Question 23
Jacobs is considering Cloud onRamp for SaaS now that it has an
operational SD-WAN network. What would be a benefit if the company
takes this approach? (Choose one.)
Email #14
Subject: Jimmy’s
Hi.
Rgds,
James Medina
Network Manager
Jacobs
Question 24
In order to provide the Jimmy’s connectivity through a Jacobs store, which
of the following options would be most suitable for communication?
(Choose one.)
Question 1
Which are the main issues facing Jacobs currently? (Choose two.)
Requirements/constraints from supplied documentation:
A dual 1Gbps Layer 3 DCI link is provisioned between the Jacobs and
Toolmate DCs using OSPF peering between the firewalls within Jacobs to
Toolmate edge routers within the Toolmate DC. Prefixes from each DC
network are advertised over the DCI, allowing machine-to-machine
communication to enable Toolmate stores and online systems to broker
sales for Jacobs products and services (which is seen as crucial to the
Jacobs business model), access for Toolmate staff to Jacobs intranet and HR
systems, and VoIP connectivity for Toolmate telephony systems to a Jacobs
call manager by firewall policy.
Independent stores are provisioned without resilience, as they use their own
local payment systems and telephony systems and can suffer outages to the
Jacobs DC for up to six business hours without significant impact to
business. Due to the way the independent store central MPLS connection is
terminated in the Jacobs DC, the stores are only able to access a limited
number of shared services, which are segmented from the Jacobs DC by use
of a firewall.
Changes require approval from Jacobs and Toolmate change management
systems, which is proving to be inefficient and incurs delay for approval
and manual implementation out of hours unless an emergency change
procedure is invoked to provide in-hours short-notice changes. The
firewalls are approaching end of life and are close to capacity in terms of
CPU utilization.
There is a current drive to rationalize and integrate the existing networks,
reduce cost, and provide simplification across the compute and network
infrastructure.
a. Business continuity
This is correct. There is no DR or standby facility for any part of the
network; if the single Jacobs DC fails or becomes isolated, the
company’s IT would cease to function. You are informed that access
from the Toolmate DC to the Jacobs DC is seen as crucial. Should the
Toolmate DC or independent shared services zone fail within the
Jacobs DC, just these areas/zones would be affected. However, if the
DCIs, DCI firewalls, or entire Jacobs DC suffer a brownout, the
Toolmate division would be just as much affected as central Jacobs.
Jacobs overall would definitely benefit from some form of DR or
resilience between zones/entities to provide business continuity.
b. Excessive number of network providers
This is incorrect. While this could be an issue in terms of management
and complexity, there is no evidence to suggest it is a significant
technical or business issue currently.
c. Multiple single points of failure for independent stores
This is incorrect. While there are multiple single points of failure for
connectivity into the Jacobs DC and services, this is not a serious
issue, as you are informed that independent stores can function without
access for a period of time due to their own independent systems and
telephony.
d. Lack of VoIP system access for independent stores
This is incorrect. While Jacobs and Toolmate stores use a central
Jacobs VoIP system, there is no stated requirement for independent
stores to use VoIP at this point in time.
e. No integration of Toolmate and independent store IT systems
This is correct. Systems and networks are not fully integrated. It would
be beneficial to integrate the systems and rationalize WAN access to
provide resilience between DCs and remove the administrative burden
of the firewall change policy and end-of-life DCI firewalls for
Toolmate access to Jacobs services, for example.
If you have answered this question correctly, you have scored one point.
Question 2
Which of the following changes to the network could improve the
scalability of the overall networks and reduce management overhead for the
network teams? (Choose one.)
Requirements/constraints from supplied documentation:
Changes require approval from Jacobs and Toolmate change management
systems, which is proving to be inefficient and incurs delay for approval
and manual implementation out of hours unless an emergency change
procedure is invoked to provide in-hours short-notice changes. The
firewalls are approaching end of life and are close to capacity in terms of
CPU utilization.
If you have answered this question correctly, you have scored one point.
Email #1
Hi.
Our contract with the MPLS provider for the individual stores (Annet)
is up for renewal. Turns out they have uplifted their prices by 28% for
continuity of service due to a requirement to upgrade their network.
We’re not impressed, as it means we are effectively paying for the
upgrade if we want to keep things simple and stay with them. Annet
has stated they can maintain previous pricing if we migrated to a more
cost-effective VPLS service using all the same equipment as is
currently onsite in the stores (all the CE edge routers), as this will
mean there is then no need to refresh the CE equipment. They can
perform the change in a single evening for all stores at the same time,
as they can script it so downtime should be minimal, and, as
mentioned, the price will be the same as now, which I guess is a
bonus. How does this sound? Is there an alternative technical solution
you can think of to provide connectivity into the network? We only
need a single connection for independent stores into the Jacobs DC, as
they have their own internal system and just need a link into us for
pricing changes and tool hire ordering, which they can always do by
phone if there is a WAN outage. We’d rather minimize changes either
in the store and centrally within the DC, but it’s challenging to justify
a 28% uplift without any gain or saving any pain. I made contact with
Bluesky and Taco (the WAN providers for the Jacobs store MPLS
networks), and they are both keen to win this business if we decide
not to renew with Annet. We have a couple of months before the
contract renews, so there’s a limited amount of time to respond.
Rgds,
James Medina
Network Manager
Jacobs
Question 3
What is the optimal approach to the suggested MPLS changes for
independent stores? (Choose one.)
Requirements/constraints from supplied documentation:
Independent stores are provisioned without resilience, as they use their own
local payment systems and telephony systems and can suffer outages to the
Jacobs DC for up to six business hours without significant impact to
business.
We only need a single connection for independent stores into the Jacobs
DC, as they have their own internal system and just need a link into us for
pricing changes and tool hire ordering, which they can always do by phone
if there is a WAN outage. We’d rather minimize changes either in the store
and centrally within the DC, but it’s challenging to justify a 28% uplift
without any gain or saving any pain. I made contact with Bluesky and Taco
WAN providers for the Jacobs store MPLS networks, and they are both
keen to win this business from Annet if we decide not to renew with Annet.
Independent-store-to-independent-store communication is blocked over the
MPLS network by use of a hub-and-spoke MPLS network and policy-based
routing on the central DC CE router to ensure all traffic is forwarded to the
DC firewall for policy. The following figures show the utilization statistics.
a. Migrate the independent stores into one of the Jacobs MPLS network
providers (Bluesky or Taco).
This is incorrect. This could be a reasonable option, but it would
require new MPLS tail circuits for independent stores to the new WAN
provider (Bluesky or Taco) and additional service costs from the
selected Jacobs WAN provider. You should be able to determine from
utilization statistics that the combined traffic flow of independent
stores and Jacobs MPLS stores’ MPLS traffic would actually exceed
the 10Gbps MPLS circuit provisioned within the central Jacobs DC. A
new MPLS tail circuit would be required within the DC to
accommodate combined traffic requirements. The solution would
typically require an additional VPN within the existing MPLS network
and separation of the new and existing VPN, as it connects into the
Jacobs DC WAN core. You don’t have the information to state that this
would be more cost effective; as such, you would be making
assumptions based on costs and data, so technically this could be a
good option. However, realistically, there are too many unknowns in
terms of cost, capacity, and delivery timings for this to be a valid
option. The customer has stated they want to minimize change, and
this solution would be a major project with each of the independent
stores requiring migration of service to the new MPLS network and
disruption within the Jacobs DC to terminate the required new
connectivity as well as incorporating the existing policy-based routing
complexity setup for the independent stores, so in reality this answer
can fairly simply be ruled out.
b. Provide an SD-WAN solution using Internet circuits at independent
store locations to reach the Jacobs DC.
This is a suboptimal answer. This could be a good option, as in general
costs would be favorable circuit-wise if Internet connectivity was
provided, and it would likely be provisioned fairly quickly, but it
would be a major project to deploy SD-WAN technology to the total
number of stores and within the central DC. Also, the customer does
not want to make significant changes. These reasons aside, you should
be able to tell from the utilization statistics that the DC Internet
connection at Jacobs is running close to saturation, and this solution
would clearly require additional capacity on this central link to
terminate the SD-WAN Internet-based connections from the stores,
thus rendering this option unfeasible at this point in time.
c. Use 4G LTE/5G transport.
This is incorrect. 4G LTE or 5G in itself as a transport mechanism
wouldn’t connect the independent stores to the Jacobs DC. This
technology would need to be combined with an SD-WAN-type
solution to tie it together.
d. Migrate to the VPLS service with the same MPLS provider.
This is a suboptimal answer. This would create significant change,
which would by default actually break the connectivity. Each
independent store uses the CE MPLS router as the default gateway for
its connected VLAN. In order for the migration to be successful, there
would need to be some dynamic or static routing configured between
all locations to reach store networks and the Jacobs DC, as the routing
would no longer be provided by the MPLS network. Imagine all of the
stores effectively connecting to each other on the same VLAN in the
center of the WAN. This wouldn’t scale with dynamic routing
adjacencies, so static routes would need to be configured at a
minimum from the store to reach the DC within the VPLS connection.
There is also an issue, as you have been informed, that store-to-store
communication is currently being blocked by policy-based routing at
the central DC. This would be more complex to manage in a VPLS
solution. Technically, it would be achievable, but it is disruptive, and it
isn’t the most elegant of solutions. Also, it requires a fair amount of
change, which the customer is reluctant to perform. If you did select
this option, give yourself half a point. The question has been designed
to ensure you are able to fully evaluate the options and associated
implications.
e. Plan to pay the uplift to maintain continuity while researching
alternative solutions in parallel.
This is the optimum answer based on the information you have
available up to this point. Clearly, no changes would be required,
which saves the pain the customer has referenced. Also, some time
would be available to research alternatives, as opposed to diving
headfirst into some unknown costs/challenges of SD-WAN or new
MPLS connectivity. Sometimes maintaining the status quo is an
acceptable option.
If you have answered this question correctly, you have scored one point.
Question 4
Jacobs believes migrating the independent stores to the Jacobs’ dedicated
Bluesky MPLS network would be a good option to avoid an immediate
uplift in pricing, which would drive future integration and provide cost
leverage with its primary MPLS provider. If this direction is taken, which of
the following would be the optimal option to provide connectivity into the
Jacobs DC for the independent stores from the Bluesky MPLS network?
(Choose one.)
Requirements/constraints from supplied documentation:
Independent-store-to-independent-store communication is blocked over the
MPLS network by use of a hub-and-spoke MPLS network and policy-based
routing on the central DC CE router to ensure all traffic is forwarded to the
DC firewall for policy. The following figures show utilization of Jacobs’
Bluesky DC MPLS CE and Jacobs’ Annet DC MPLS CE links,
respectively.
a. Provision a new, separate L3 MPLS VPN within the existing Jacobs
Bluesky MPLS network that breaks out into separate VRFs in the DC
provisioned on the existing MPLS CE and circuit into the Jacobs DC.
This is incorrect. Some form of separation would, however, be
required between the two networks as a matter of principle. The
separate VPN would be a good option, but the overall solution isn’t
possible due to DC capacity issues on the existing Bluesky CE circuit.
By checking the existing capacity statistics on the Bluesky MPLS DC
connectivity, you should notice that the link is close to capacity.
Should a new VPN be created for the independent stores, there would
be contention issues on the central DC Bluesky MPLS link into
Jacobs.
b. Terminate the independent stores into the existing Jacobs Bluesky
MPLS VPN and provide access to Jacobs’ DC resources for the
independent stores via an ACL on the headend MPLS CE.
This is incorrect. By default, this would allow independent stores
Layer 3 access to the Jacobs stores on the MPLS network, which is
fully meshed. Also, a stateless ACL wouldn’t be the correct security
feature to use on the headend CE, even if the MPLS network was set
up in a hub-and-spoke configuration over MPLS for the independent
stores. The current solution forces all traffic received at the headend
into the Jacobs firewall for policy, but this solution does not reflect
this. As detailed in the explanation for Answer A, there is also no
capacity available for this solution.
c. Provide a new Bluesky MPLS headend CE router connecting, back to
back, to the existing Bluesky headend MPLS CE router in the Jacobs
DC for a new, separate hub-and-spoke MPLS VPN containing the
independent stores.
This is incorrect. This solution would typically also require a new
circuit into the MPLS provider to function, but there is no detail of a
new circuit within the option, and the existing capacity of the existing
solution would not allow the scale required to also provide
connectivity for the independent stores.
d. Provision a new, separate L3 MPLS VPN for independent stores
within the Bluesky MPLS WAN on a new central tail circuit into the
DC that breaks out into separate VRF in the existing DC CE router.
This is the optimum answer. There isn’t sufficient capacity on the
existing Bluesky central DC circuit to provide connectivity for the
independent stores, and clearly separation would be required between
the two networks so that the independent networks couldn’t just join
the Jacobs store MPLS VPN. The additional VPN could be terminated
within the DC on a separate VRF on the CE router or VLAN within
the Jacobs DC to provide separation and connectivity to the existing
firewall used for the independent stores’ policy. The question is really
ensuring you are analyzing all of the data you have available, in that
the independent stores are currently using more combined bandwidth
centrally than is available on the existing Bluesky tail circuit to the DC
paired with the separation required for independent stores.
If you have answered this question correctly, you have scored one point.
Email #2
From: James Medina
Hi.
I’ve been discussing the MPLS network issue with the CTO, and this
has prompted a bigger question around finally providing integration.
We both don’t believe we should continue as is, and it’s time to bring
some innovation into the business and reduce our capex and some of
the complexities of running multiple providers. The CTO believes we
should be running an Internet-only VPN WAN and completely
remove the overhead of MPLS running our own managed overlay
networks on the Internet circuits. He stated we could reduce our
Internet circuits to a single circuit in each DC (Jacobs and Toolmate)
on the back of this so that the DCs can back each other up in the event
of a failure and each store can have dual Internet circuits, so no single
points of failure. I’m not convinced we should do this in one fell
swoop and believe we are better off running a traditional hybrid SD-
WAN type of network with a mix of connectivity. I’ve been reading
up on the subject and it seems we could have the best of both worlds
if we followed this path. I need your help to decide how we should
progress. I’ve also looked into Internet-only circuits, and in some of
the remote parts of the UK, the providers we contacted have latency
calculators that are showing approximately 100ms latency from stores
to the London DCs, so I figure we are still OK for VoIP for their
ADSL circuits. The CTO has secured a budget to provide the
integration/consolidation, but we need to work out the best approach
for the business.
Rgds,
James Medina
Network Manager
Jacobs
Question 5
If Jacobs were to follow the CTO’s instructions for a self-managed Internet-
only VPN WAN solution based on the supplied information, which of the
following solutions would you recommend to Jacobs to consolidate
connectivity for all of the stores into the Jacobs and Toolmate DCs?
(Choose one.)
Requirements/constraints from supplied documentation:
The CTO believes we should be running an Internet-only VPN WAN and
completely remove the overhead of MPLS running our own managed
overlay networks on the Internet circuits. He stated we could reduce our
Internet circuits to a single circuit in each DC (Jacobs and Toolmate) on the
back of this so that the DCs can back each other up in the event of a failure
and each store can have dual Internet circuits, so no single points of failure.
I’ve also looked into Internet-only circuits, and in some of the remote parts
of the UK, the providers we contacted have latency calculators that are
showing approximately 100ms latency from stores to the London DCs, so I
figure we are still OK for VoIP for their ADSL circuits.
a. GETVPN solution with a facility for stores to terminate VPNs in either
DC should one DC Internet connection fail
This is incorrect. GETVPN would be suitable for an MPLS-only WAN
with private IP addressing, but the feature is not compatible with the
Internet circuits due to an incompatibility with NAT. GETVPN
maintains address preservation between inner and outer IP headers,
and this is not feasible with the NAT required over the Internet—an
easy one to rule out.
b. Phase 3 DMVPN multi-VRF (Jacobs VRF, Toolmate VRF,
independent store VRF) solution with a facility for stores to terminate
VPNs in either DC should one DC Internet connection fail
This is the optimal answer from the available options at this point in
time. A DMVPN network would function well over the Internet with a
minimum of three VRFs required, based on the existing DC setup for
Jacobs, Toolmate, and independent stores. As there would only be a
single Internet circuit within each of the Jacobs and Toolmate DCs, the
Jacobs stores would need a secure way to access their home DC if their
associated Internet circuit failed within the Jacobs DC, and vice versa
for Toolmate branches. The DCI link would need to be configured for
connectivity for the stores in the event of an Internet failure within one
of the DCs (post-termination on the DC with functioning Internet
access). Existing VoIP calls between stores in each network would
continue to function with the stipulated 100ms latency, as these would
utilize spoke-to-spoke tunnels over DMVPN Phase 3. If the calls had
to route via the hub in the DC, the latency would increase to 200ms,
which would border on being unacceptable for VoIP quality, with the
industry standard latency maximum recognized as being 150ms.
c. Phase 3 DMVPN single-VRF solution with a facility for stores to
terminate VPNs in either DC should one DC Internet connection fail
This is incorrect. A single VRF solution wouldn’t provide any
separation or segmentation between the separate entities natively and
would be highly complex to administer. This solution would require a
hub-and-spoke deployment denying spoke-to-spoke communication,
with all traffic routed to central firewall for policy decisions. VoIP
quality between stores would also be unacceptable with the latency
into and out of the DC for store-to-store communications.
d. Phase 1 DMVPN multi-VRF (Jacobs VRF, Toolmate VRF,
independent store VRF) solution with a facility for stores to terminate
VPNs in either DC should one DC Internet connection fail
This is incorrect. A multi-VRF DMVPN solution would function well,
as detailed in Answer A, but DMVPN Phase 1 means no dynamic
spoke-to-spoke tunnels. Also, communication via the DMVPN hub
would be required, which then doubles the latency of VoIP calls to an
unacceptable level.
e. Hub-and-spoke IPsec VPN (Jacobs VPN, Toolmate VPN, independent
store VPN), GRE tunnels with IGP, with a facility for stores to
terminate VPNs in either DC should one DC Internet connection fail
This is a suboptimal answer. The solution would function, but there are
negative aspects associated with it. Primarily, VoIP quality would be
degraded, as store-to-store calls would need to traverse the DC
location and incur additional latency. Secondly, significant
management overhead is involved in the configuration and
management of the IPsec peers due to the sheer number of stores, and
the headend routers would also have to be specified appropriately to
accommodate the number of dynamic routing neighbors and to process
the IPsec traffic. Scalability would be questionable with this solution.
f. Hub-and-spoke IPsec VPN (Jacobs VPN, Toolmate VPN, independent
store VPN), static routing with a facility for stores to terminate VPNs
in either DC should one DC Internet connection fail
This is a suboptimal answer for the reasons detailed in the explanation
for Answer D. Scalability would be improved, however, due to not
having to maintain dynamic routing adjacencies over the IPsec
connections and because of simplification due to static routing.
If you have answered this question correctly, you have scored one point.
Email #3
Hi.
We’re looking into industry trends, and we’re aware that there is a
movement from network topology toward an application services
topology. Network changes are taking too long for simple items such
as bandwidth and QoS changes, so we’re thinking we should
definitely be moving toward some kind of hybrid WAN or SD-WAN
solution. Can you have a look into this and let us know your
thoughts? We could, as previously discussed, use the Internet as
transport for stores in conjunction with MPLS or just use Internet
only, as we have central Internet connections in the Jacobs and
Toolmate DCs. From what I can gather, we would have the option to
steer our traffic over specific links on an application basis. This would
be fundamental to us, and we’d need the ability to be able to do this
effectively in real time without raising changes for new profiles or
applications as we bring them online with our providers.
Rgds,
James Medina
Network Manager
Jacobs
Question 6
If Jacobs did move to an SD-WAN type of solution with a combination of
MPLS and Internet circuits per store for Jacobs and Toolmate stores and
Internet-only circuits for independent stores, what would be a major
benefit? (Choose one.)
Requirements/constraints from supplied documentation: N/A
If you have answered this question correctly, you have scored one point.
Email #4
Hi.
2. All stores use DIA for Internet access rather than breaking out via
the central DCs.
Rgds,
James Medina
Network Manager
Jacobs
Question 7
If Jacobs moves to an SD-WAN solution for all store access, as detailed in
the fourth email, could it, with confidence, make a design decision to
remove the second ISP circuits at each DC and reduce speeds on the
individual Internet circuits in the DCs by having stores use Direct Internet
Access with a view toward reducing existing central Internet utilization and
saving central ISP costs? (Choose one.)
Requirements/constraints from supplied documentation:
1. Broadband ADSL type Internet access provisioned in each store site
(independent, Jacobs, and Toolmate), sized accordingly.
2. All stores use DIA for Internet access rather than breaking out via the
central DCs.
3. Annet MPLS network decommissioned for independent stores. These
stores could then use SD-WAN Internet to access the Jacobs DC.
4. Taconet MPLS network decommissioned for Jacobs stores. These
stores could then use an Internet SD-WAN solution and existing
Bluesky MPLS network to access the Jacobs and Toolmate DCs
(Jacobs stores could access their DC via Toolmate Internet connection
if there is an MPLS and Internet failure within the Jacobs DC by
traversing the DCI from Toolmate).
5. Lotnet second circuit MPLS network decommissioned for Toolmate
stores. These stores could then use an SD-WAN solution for Internet
access and existing first Lotnet MPLS network to access the Toolmate
and Jacobs DCs (Toolmate stores could access their DC via the Jacobs
DC Internet connection if there is an MPLS and Internet failure within
the Toolmate DC by traversing the DCI from Jacobs).
If you have answered this question correctly, you have scored one point.
Question 8
If Jacobs were to move to an SD-WAN solution as detailed in the fourth
email, with each Jacobs and Toolmate store using one MPLS link and one
Internet circuit, or a single Internet circuit in independent stores for WAN
connectivity, which of the following areas should take priority from a
security perspective? (Choose one.)
Requirements/constraints from supplied documentation:
Provider-assigned public IP addressing is used for external hosting using a
Britnet registered /24 prefix, which is further subnetted to provide DMZ
segmentation for public-facing Jacobs services and NAT ranges for
employee Internet access via a central proxy server within the DMZ.
a. Direct Internet Access from stores
This is the optimal answer. You are informed that Jacobs stores
currently use a proxy server for Internet access, where policy would
typically be applied for users accessing the Internet. If the stores
accessed the Internet directly from local circuits, policy would need to
be defined and applied locally within the store; otherwise, Jacobs
would be introducing significant risk to its IT environment.
b. Encryption ciphers of Internet access circuits
This is a suboptimal answer. Encryption ciphers would in reality be an
implementation item; the Internet connections would of course require
encryption, but the exact details are not “key” at this point in time
from a security perspective.
c. PKI infrastructure
This is a suboptimal answer. The PKI infrastructure is effectively an
implementation item. CA authority, digital certificates, and such will
of course be required, but the exact details are not “key” at this point in
time from a security perspective.
d. DDoS protection for DCs
This is incorrect. The DC Internet connections are not new. Jacobs and
Toolmate DCs already have an online presence for online retailing; as
such, any requirements for DDoS protection wouldn’t necessarily
change as part of this new solution.
If you have answered this question correctly, you have scored one point.
Email #5
From: James Medina
Hi.
I’ve been in touch with the Bluesky MPLS provider to discuss our
strategy, and they offer a fully managed SD-WAN service and even a
co-managed SD-WAN service. It’s something we hadn’t considered,
as I had assumed we’d just self-manage if we went down the SD-
WAN route, and I guess MPLS companies are keen to retain as much
business as possible if it ultimately means loss of MPLS circuits. I
need your help to ascertain the management direction we should take.
Rgds,
James Medina
Network Manager
Jacobs
Question 9
Jacobs is now considering raising an RFP (Request for Proposal) to their
existing MPLS providers to bid for a fully managed SD-WAN solution that
the company can use for consolidated store access to the DCs. Complete the
following table to aid its decision-making process for a fully managed
service versus a DIY in-house self-managed SD-WAN solution by the
network team. Insert a check in the Solution Type option that provides the
most benefit to Jacobs (would be most optimal) for each Function topic.
Question 10
Which of the following SD-WAN solution types would be most suitable for
Jacobs? (Choose one.)
Requirements/constraints from supplied documentation:
From what I can gather, we would have the option to steer our traffic over
specific links on an application basis. This would be fundamental to us, and
we’d need the ability to be able to do this effectively in real time without
raising changes for new profiles or applications as we bring them online
with our providers.
Network changes are taking too long for simple items such as bandwidth
changes. We’re thinking we should definitely be moving toward some kind
of hybrid WAN solution.
If you have answered this question correctly, you have scored one point.
Question 11
As Jacobs fully investigates SD-WAN with a view of provisioning a self-
managed solution, it requires additional information on SD-WAN functions
and associated “planes” to gain a better understanding of SD-WAN
functionality. Check the boxes for the corresponding SD-WAN plane per
function in the following table to assist in the company’s understanding.
Function Plane
Email #6
Hi.
I’ve had the team research what technologies we can use for our
connectivity to stores for SD-WAN. We have all of the following
technologies available to us (varying bandwidths to suit and varying
prices) for all of our store locations. Have a think about which may be
better suited to our solution, as our infrastructure will natively support
all of them!
4G/LTE
5G
MPLS circuits
Rgds,
James Medina
Network Manager
Jacobs
Question 12
Which SD-WAN underlay technology would you recommend for the store
locations? (Choose two.)
Requirements/constraints from supplied documentation:
Jaystore syncs product availability from a database within the DC location
for online purchases and store purchases. The application was developed
over 10 years ago and by developers within a LAN environment. As such, it
does not function well when latency exceeds 20ms between the client and
headend infrastructure. Due to this issue, the network team included the
TCP application into a mission-critical QoS class over the WAN for
mitigation.
a. 4G/LTE
This is incorrect. You were told from previous information that an
Internet circuit will be required; however, if 5G is available, there
would need to be a convincing reason why you would consider
4G/LTE instead of 5G. Also, this technology is likely to provide a
latency of over 50ms, which exceeds the 20ms requirement for the
Jaystore application.
b. 5G
This is correct. You were told from previous information that an
Internet circuit will be required, and 5G is optimal (in comparison
to Answers A and C). It’s well known that this technology is likely
to provide a low latency of approximately 10ms, which would
mitigate the known Jaystore application latency requirement.
c. Internet access circuits/ADSL/SDSL
This is a suboptimal answer. You were told from previous
information that an Internet circuit will be required; however, in
comparison to 5G (Answer B), ADSL/SDSL would be less
favorable. Making a choice between the two at this level without
having cost or speed requirements factored into the question is
difficult, but you should have determined that 5G can offer
everything that ADSL/SDSL circuits can offer in terms of speed,
along with the lower latency characteristics, which suit the Jaystore
application latency requirement. ADSL/SDSL latency
characteristics, on the other hand, would be variable.
d. MPLS circuits (primary site access)
This is correct. The MPLS circuits are functioning already. You
would typically maintain one circuit as part of the SD-WAN
deployment, as the customer has previously mentioned within
emails.
e. MPLS circuits (secondary site access)
This is incorrect. The whole vision/intent of the SD-WAN solution
was to move away from dual MPLS circuits. A primary MPLS
circuit is appropriate, but a secondary MPLS circuit would defeat
the objective of the project and offer no advantages.
If you answered this question correctly, you have scored one point. If you
selected Answer C instead of B in conjunction with D, then award yourself
half a point. If you have been following the scenario, the fourth email
details the vision for the circuits. You really just needed to determine which
Internet access method is most suitable based on the Jaystore requirement.
Question 13
If Jacobs went ahead with an SD-WAN solution, which of the following
items would the company need to address prior to using Internet
connectivity as one path for stores to access the central resources in the
Jacobs and Toolmate DCs? (Choose one.)
Requirements/constraints from supplied documentation:
The following figures illustrate the Jacobs and Toolmate ISP utilization
statistics.
a. Upgrade the performance of Internet-facing firewalls in each DC.
This is a suboptimal answer, as there is no evidence to suggest the
Internet firewalls would require a performance or even throughput
upgrade. External firewalls in an SD-WAN solution would typically
pass VPN traffic onto SD-WAN edge routers, as opposed to
terminating the SD-WAN VPN traffic, where additional performance
might be required to perform this functionality.
b. Allow SD-WAN flows through Internet-facing firewalls at the DCs.
This is incorrect. Flows would require enabling, but this would be an
implementation task at the time of deployment. The question is really
trying to see if you are looking at this from a design perspective and
something that could make or break the deployment, as opposed to an
implementation task.
c. Upgrade Internet access circuits to 10Gbps in the DCs.
This is correct. Current ISP usage at the Jacobs and Toolmate DCs is
close to the maximum available 1Gbps. The existing circuits could not
accommodate additional traffic migrated from legacy MPLS
connections.
d. Decide if static routing or a dynamic protocol should be used for
routing over the SD-WAN Internet-based tunnels.
This is incorrect. A routing protocol would be required (typically
OMP), but this would be an implementation task at the time of
deployment. The question is really trying to see if you are looking at
this from a design perspective, as per the explanation in Answer B.
If you answered this question correctly, you have scored one point.
Email #7
Hi.
Rgds,
James Medina
Network Manager
Jacobs
Question 14
As Jacobs is intending to use SD-WAN edge routers with 5G Internet
connections at stores providing Internet access to create the SD-WAN
network, should the company also provide firewalls at each store location
for protecting the SD-WAN edge routers and store LAN connected to the
Internet? (Choose one.)
Requirements / constraints from supplied documentation:
I’ve found some competitively priced SD-WAN store-sized edge routers we
can connect to 5G Internet services via an optional 5G card. For PCI
compliance, they have their own full security stack, which includes VRFs,
L7 firewall, IPS/IDS, protection, and URL filtering, with EIGRP and BGP
LAN–side and OMP WAN–side routing. They come with dual copper
Ethernet connections for access or trunking connectivity, which we can use
to connect into our store network switches.
Due to a historical issue with a virtualized infrastructure device with RCA
analysis citing vendor code interoperability failure that resulted in a high-
profile outage, Jacobs security policy (which covers all zones of the
network and store entities) now dictates that functionality of infrastructure
devices should be limited to a single defined function and that separate
functionality must be provisioned through separate physical infrastructure
devices.
Also, as each store will have an Internet access circuit locally, we can use
this for DIA from the store and not require anywhere near as much Internet
bandwidth, as we should no longer need to break out centrally to the
Internet. This is what I’m thinking:
All stores use DIA for Internet access rather than breaking out via the DCs.
If you have answered this question correctly, you have scored one point.
Email #8
From: James Medina
Hi.
If you can start designing the overall SD-WAN solution, that would
be great.
Rgds,
James Medina
Network Manager
Jacobs
Question 15
If Jacobs proceeds with the SD-WAN design detailed within the following
figure, can the company decommission the existing central Internet access
at the Toolmate DC and use a 10Gbps resilient Jacobs DC Internet
connection as a secondary SD-WAN termination path for Toolmate stores in
the event of an MPLS failure in the Lotnet network? (Choose one.)
Requirements/constraints from supplied documentation:
In terms of underlay, I’d like to keep one MPLS circuit where we have dual
MPLS circuits, and we can replace the second MPLS circuit with Internet
access. Where we have only one MPLS circuit currently for independent
stores, we can replace this with an Internet circuit.
The DMZ hosts a single non-load-balanced DMZ segment for publicly
reachable web services for the Toolmate online presence. The red zone
outer switches host the Internet CE connectivity and VPN services for B2B
connections, which provide the online payment systems.
I’m going to look at upgrading the Jacobs ISP link to a resilient 10Gbps
solution. I’m wondering if we can remove the Toolmate ISP link if we can
do this.
Question 16
Jacobs has decided to upgrade ISP connectivity in each DC to dual 10Gbps
active/standby connections. Complete the design illustrated in the following
figure for the headend SD-WAN edge router(s) placement in the Jacobs DC
when the dual headend MPLS connections will be reduced to one (the
Toolmate DC will be identical, with a different MPLS provider). Add as
many SD-WAN edge routers (which have 4x 10Gbps interfaces) and
associated Ethernet connections (all connections are 10Gbps and all
existing infrastructure supports 10Gbps and has a minimum of 2x 10Gbps
additional port capacity per device) as required to implement a fully
resilient SD-WAN headend. You may also remove existing Ethernet
connections, if required.
Question 17
Which of the following SD-WAN designs would you recommend for a
Jacobs store? (Choose one.)
In terms of underlay, I’d like to keep one MPLS circuit where we have dual
MPLS circuits, and we can replace the second MPLS circuit with Internet
access. Where we have only one MPLS circuit currently for independent
stores, we can replace this with an Internet circuit.
The security policy that dictates that functionality of infrastructure devices
should be limited to a single defined function and separate functionality
must be provisioned through separate physical infrastructure devices is
going to add significant cost to this project. I’m going to request an
exception through security so we can use edge routers’ native security
functionality and negate the requirement for store firewalls. Let’s progress
with the design on the assumption the exception will be approved.
I’ve found some competitively priced SD-WAN store-sized edge routers we
can connect to 5G Internet services via an optional 5G card. For PCI
compliance, they have their own full security stack, which includes VRFs,
L7 firewall, IPS/IDS, protection, and URL filtering with EIGRP and BGP
LAN–side and OMP WAN–side routing. They come with dual copper
Ethernet connections for access or trunking connectivity, which we can use
to connect into our store network switches.
Jacobs stores access the MPLS networks using default static routing
pointing to the VRRP gateway with the primary MPLS network of Bluesky.
a.
This is incorrect. Dual SD-WAN edge routers connected to each of the
Layer 2 switches in the store provide resilience. SD-WAN edge routers
connect to a common VLAN linking them to the LAN, and VRRP is
used from the LAN to the SD-WAN edge routers with a Layer 3 point-
to-point link between edge routers, which can be used to route between
SD-WAN routers for specific failure conditions and application routing
policies. The solution, however, wouldn’t function because the switch
to SD-WAN edge router connections would need to be EtherChannels
to operate correctly in this scenario. (The switch side is acceptable to
leave without channeling and have STP block links. The SD-WAN
edge router side, however, would not function because a physical
interface could not be assigned to the same IP subnet or VLAN
without channeling enabled—the diagram would have shown the links
joined as an EtherChannel if channeling was part of the design.) Be
wary of making a simple error if you were drawn to this option. Be
sure to take the time to evaluate options for sound, networking
practices.
b.
d.
This is incorrect. A single SD-WAN edge router connects to one of the
Layer 2 switches in the store, creating a single point of failure. The
SD-WAN edge router connects to a single transport media, and VRRP
is used from the store to direct traffic to the SD-WAN edge or MPLS
CE router over a common VLAN with a Layer 3 point-to-point link
between the SD-WAN edge router and MPLS CE router, which can be
used to route for specific failure conditions. The solution would
function correctly, but there is a single point of failure with a single
SD-WAN edge router in the store location.
If you answered this question correctly, you have scored one point. If you
selected Answer B, award yourself half a point.
Email #9
From: James Medina
Hi.
I’m a little wary of routing loops when we’re setting up the SD-WAN
network with its inbuilt routing protocol of OMP and whatever
protocol we use our side on the DC LAN. I could use a breakdown on
how you believe we can work around any potential loop with various
protocols. The scenario I’m thinking of is when we have a store prefix
coming in of, say, “A,” as per the diagram, and this advertisement is
received on the Internet SD-WAN edge router and MPLS SD-WAN
edge router in one of our DCs. The edge routers will need to be
running a routing protocol back to the DC LAN, so I want to make
sure the SD-WAN edge routers don’t end up forwarding traffic for
prefix “A” toward each other via the local DC LAN, rather than direct
over the SD-WAN overlay network to the store.
Rgds,
James Medina
Network Manager
Jacobs
Question 18
Complete the following table to assist Jacobs in understanding which loop
mitigation techniques could be used in conjunction with the associated
dynamic routing protocol configured between SD-WAN edge routers to the
DC LAN. Insert an “X” under Mitigation Technique per routing protocol,
where appropriate.
Requirements/constraints from supplied documentation: None. General
routing/SD-WAN routing knowledge.
EIGRP X
OSPF X
BGP X
OMP
Email #10
Rgds,
James Medina
Network Manager
Jacobs
Question 19
Jacobs requires each store to have an SD-WAN path to each DC to aid
convergence in the event of a failure condition. The company has selected
eBGP to be used between the DC LAN networks in the Jacobs and
Toolmate DCs and locally attached SD-WAN edge routers for the SD-WAN
network to advertise DC prefixes and SD-WAN store networks. iBGP will
also be used between Jacobs and Toolmate DC LAN networks over the
existing DCI to provide a backup path for a Jacobs SD-WAN-enabled store
via the Toolmate DC, and vice versa. How should the BGP AS number
(ASN) associated to the edge routers be configured within each DC?
(Choose one.)
Requirements/constraints from supplied documentation:
Jacobs has selected eBGP to be used between the DC LAN networks in the
Jacobs and Toolmate DCs and locally attached SD-WAN edge routers for
the SD-WAN network to advertise DC prefixes and SD-WAN store
networks. iBGP will also be used between the Jacobs and Toolmate DC
LAN networks over the existing DCI to provide a backup path for a Jacobs
SD-WAN-enabled store via the Toolmate DC, and vice versa.
a. The BGP ASN associated to the SD-WAN edge routers should be the
same in each of the DCs.
This is correct. A routing loop could be present due to a DCI link
between DCs with iBGP routing configured over the DCI. A prefix
received from a store would be received in each DC and advertised
between DCs over the DCI. Use of the same ASN will ensure that
learning of identical prefixes on SD-WAN edge routers is avoided due
to the AS-PATH attribute blocking prefixes with identical AS sources
by the remote DC toward the LAN and across the DCI.
b. The BGP ASN associated to the SD-WAN edge routers should be
different in each of the DCs.
This is incorrect. A routing loop could be present due to a DCI link
between DCs with iBGP routing configured over the DCI. If the ASNs
are different, BGP’s own loop-avoidance mechanism of the same ASN
being dropped wouldn’t be engaged, and DCs may use the DCI link to
forward traffic to a remote store rather than directly via the local SD-
WAN edge routers under normal (non-failure) operation.
If you have answered this question correctly, you have scored one point.
Email #11
From: James Medina
Hi.
Thanks for the design of the SD-WAN edge routers in the stores and
central DCs. We obviously need some controllers to enable the SD-
WAN functionality on top of that infrastructure element, so we need
to work out where these will be placed for reachability by the SD-
WAN edge routers. The information I have back from the vendor we
have selected is as follows. We will need redundant controllers in
each of the following planes:
Rgds,
James Medina
Network Manager
Jacobs
Question 20
Where is the optimal hosting location for the iManage, iOrch, and iCon
controllers for Jacobs? (Choose one.)
Requirements/constraints from supplied documentation:
All controllers can be appliances in the DC or virtual instances in the cloud;
both options use a proprietary active/standby resilience method that requires
Layer 2 between controllers (physical or logical VLAN for appliances and
just a VLAN for the cloud instances) and provide a single frontend IPv4
address regardless of the use of physical appliances or a cloud-based
service. The vendor has offered to provide the service of all three
controllers within their public cloud offering hosted in France, with resilient
service in the USA, and they deal with all resiliency, backups, DR, and
required certificates between controllers and SD-WAN edge routers that
communicate with the controllers. The fully managed cloud offering just
requires Internet access from edge routers (direct for stores or central for
the DC) and works out to be the same price as the purchase of the
appliances for one complete set of resilient controllers if we host ourselves
over a five-year contract, which is our normal refresh period for
infrastructure.
If you have answered this question correctly, you have scored one point.
Email #12
From: James Medina
Hi.
I need your help with planning the migration to SD-WAN, which I’ve
had drawn up below based on your input. Please have a think about
the best way to bring the service online!
Rgds,
James Medina
Network Manager
Jacobs
Question 21
In order to board the new SD-WAN solution and migrate traffic over it for
Jacobs, Toolmate, and independent stores’ connectivity, arrange the
following migration activities in the required sequence. The business has
declared it wants to minimize any associated downtime and ensure the
service is functioning correctly prior to migrating any Jacobs or Toolmate
store to the SD-WAN network.
Requirements/constraints from supplied documentation:
The business has declared it wants to minimize any associated downtime
and ensure the service is functioning correctly prior to migrating any Jacobs
or Toolmate store to the SD-WAN network.
The migration steps have been simplified for the scenario and omit specific
boarding and testing phases but cover the associated tasks at a high level.
There are obviously numerous steps involved in an SD-WAN migration,
and it can be quite daunting when you see the number of tasks laid out in
front of you, but you don’t actually need to be an SD-WAN expert or even
have experience with the technology to sequence the steps correctly in this
lab, as this is primarily a routing scenario. Any specific SD-WAN
technology could be dealt with as a “black box,” such as OMP for example,
but it’s still plain routing. The methodology of these implementation- or
migration-type questions is simply “make before you break” so that you
don’t cause any unnecessary outage, and if any tasks will take time, such as
ordering circuits or hardware, then they obviously need to be completed
prior to other tasks.
a. Order 5G Internet connections for stores. Store SD-WAN edge routers
and SD-WAN edge routers for DC locations.
Clearly this has to be the first step, as it can be initiated without the
need for any change to the network and will take time. There would be
hundreds of circuit and hardware orders for this project. Jacobs might
wish it had signed up for a fully managed solution at this point in time!
b. Configure DC firewalls for SD-WAN control plane flows to cloud
service and SD-WAN edge router to SD-WAN network data plane
flows and enable cloud controller service with configuration templates
for all connectivity.
The SD-WAN edge routers within the DC will need to communicate
with the cloud controllers and are situated behind firewalls in the DMZ
environment within Jacobs and Toolmate, so these flows will need to
be permitted. The cloud controllers will need to be configured to set up
site IDs, TLOCs, and all of the SD-WAN specifics to bring up secure
tunnels between edge routers in the stores and DC locations. It makes
sense to have the controllers and environment ready prior to installing
any SD-WAN edge routers, so this step is preferable sequenced prior
to Step C but can in reality be sequenced after it.
c. Connect SD-WAN edge routers to DC networks and configure eBGP
between SD-WAN edge routers and the DC LAN to advertise DC
LAN networks to SD-WAN. Configure DCI firewalls to allow an SD-
WAN store resilience routing path between DCs and inter-DC iBGP
peering.
Once the edge routers are physically installed within the DC,
effectively in parallel to the existing infrastructure (there would be no
associated downtime), they will initiate communication to the cloud
controllers, so the controllers need to be accessible and configured
appropriately. BGP can be enabled between the local DC LAN and
SD-WAN edge routers to advertise the DC LAN prefixes (at this point
in time, it would be simply sharing the DC prefixes with the SD-WAN
network and there would of course be no store prefixes being
discovered). The DCI firewalls between Jacobs and Toolmate require
configuration to allow inter-DC peering and traffic flow between DCs
should there be an issue in one DC, and SD-WAN traffic can then
traverse the DCI link for resilience.
d. Configure iBGP between Jacobs and Toolmate DCs to advertise SD-
WAN store prefixes for a backup routing path and redistribute SD-
WAN OMP to BGP and BGP to SD-WAN OMP.
This step should be completed after Step C; otherwise, the peering
would fail.
e. Connect the independent store SD-WAN edge router with a 5G card to
the local LAN, and for stores with dual MPLS routers, connect the first
SD-WAN edge router with a 5G card to the LAN (low VRRP priority
set with existing MPLS routers).
This step should be completed after Step D and prior to Step F. This
wouldn’t incur any downtime, as this connection would be in parallel
to existing connectivity. The Jacobs and Toolmate stores with dual
MPLS routers in a VRRP configuration would have the new Internet-
facing SD-WAN edge router as a third router within the VRRP group
with a low priority assigned, so it wouldn’t become the primary
gateway and blackhole traffic.
f. Configure SD-WAN control-plane tunnels for Internet paths.
This step has to happen after Step E because tunnels would be
configured and the control plane would be established, ready for the
data-plane traffic when required.
g. Migrate independent stores’ data plane to SD-WAN by repointing local
LAN gateway to the SD-WAN edge router and modify BGP metrics in
DC locations.
This step cannot happen until Step F has been completed. The brief is
that the service should be proved prior to Jacobs or Toolmate stores
being migrated, so the logical response to this is to migrate the
independent stores first. You were previously informed that these
stores can actually tolerate downtime for a short period, and they of
course only had a single MPLS link previously. Migration would
involve steering traffic on the store LAN to the SD-WAN edge router,
which is up and running at this point in time, so downtime would be
minimal.
h. Shut down independent store MPLS links.
This step cannot happen until the independent stores have been
migrated onto the SD-WAN path over Internet connections in Step G.
This step could be delayed toward the end of the migration, so it is
acceptable at any point past Step G.
i. Redirect Jacobs/Toolmate store traffic to Internet SD-WAN path on the
current dual MPLS sites (adjust VRRP on store sites and modify BGP
metrics in DC locations).
This step cannot happen until the independent stores have been
migrated (and tested) onto the SD-WAN network in Step G and after
the SD-WAN Internet-facing edge routers have been installed in
Jacobs/Toolmate stores in Step E and the control plane enabled in Step
F.
j. Implement the second SD-WAN edge router on dual MPLS store sites
behind the MPLS circuit / CE router being retained. Configure SD-
WAN tunnels for MPLS paths.
This step cannot be completed prior to Step I; otherwise, there would
be a single point of failure with a single MPLS connection available
for the duration of the change (as this change requires disconnecting
one MPLS CE router from the LAN and inserting the SD-WAN edge
router in between). The Internet SD-WAN path implemented in Step I
is functioning at this point, so there would be dual routes available to
the store. This is the “make before you break” methodology.
k. Shut down the dual MPLS store (Jacobs/Toolmate) MPLS link that
will no longer be required.
This step cannot be completed prior to Step J when the SD-WAN
network is functioning with an Internet and MPLS path; otherwise,
there would be a single point of failure.
l. Decommission the secondary MPLS circuits for Jacobs/Toolmate and
the single MPLS circuit within independent stores.
This is clearly the final step in the migration path and may typically
only be actioned after a suitable duration of stability on the new SD-
WAN network.
If you have answered this correctly, you have scored three points—you
earned them! Partial scoring is available for this question. Steps B and C
could also be swapped sequence-wise for a full score.
Email #13
Hi.
Thanks for the migration assistance. Not one store noticed any
downtime! I’ve been asking around the stores and initial feedback is
very positive, considering we are now actually using the Internet
paths as well as MPLS for all our WAN traffic. I have had a couple of
comments in reference to the Jaystore application being less
responsive and some clipping on voice calls, though. As you know,
we had QoS on the MPLS links with four classes. I think in the
pressure of delivering the connectivity, we may have missed the QoS
element on the 5G links. I’m going to need your assistance to make
sure we improve the quality.
Rgds,
James Medina
Network Manager
Jacobs
Question 22
How can Jacobs rectify the quality issues reported post-migration? (Choose
one.)
Requirements/constraints from supplied documentation:
We are now actually using the Internet paths as well as MPLS for all of our
WAN traffic. I have had a couple of comments in reference to the Jaystore
application being less responsive and some clipping on voice calls, though.
As you know, we had QoS on the MPLS links with four classes, and I think
in the pressure of delivering the connectivity, we may have missed the QoS
element on the 5G links
The main application is Jaystore, which syncs product availability from a
database within the DC location for online purchases and store purchases.
The application was developed over 10 years ago by developers within a
LAN environment and as such does not function well when latency exceeds
20ms between the client and headend infrastructure. Due to this issue, the
network team included the TCP application into a mission-critical QoS
class over the WAN for mitigation.
Control plane: This will be provided by a product called iCon. It provides
all data and routing plane policies to the edge routers, including application-
aware routing policies, if required.
If you have answered this question correctly, you have scored one point.
Question 23
Jacobs is considering Cloud onRamp for SaaS now that it has an
operational SD-WAN network. What would be a benefit if the company
takes this approach? (Choose one.)
Requirements/constraints from supplied documentation:
There has been a recent pilot for Office 365 SaaS within the public cloud
via a cloud provider (Cloudcom) reachable over the DC Internet connection
for various Jacobs stores participating in a trial. Early indications are that
the service has suffered intermittent delays and the user experience was not
positive.
If you have answered this question correctly, you have scored one point. If
you selected Answer A, award yourself half a point.
Email #14
Subject: Jimmy’s
Hi.
Rgds,
James Medina
Network Manager
Jacobs
Question 24
In order to provide the Jimmy’s connectivity through a Jacobs store, which
of the following options would be most suitable for communication?
(Choose one.)
Requirements/constraints from supplied documentation:
I’ve found some competitively priced SD-WAN store-sized edge routers we
can connect to 5G Internet services via an optional 5G card. For PCI
compliance, they have their own full security stack, which includes VRFs,
L7 firewall, IPS/IDS, protection, and URL filtering with EIGRP and BGP
LAN–side and OMP WAN–side routing. They come with dual copper
Ethernet connections for access or trunking connectivity, which we can use
to connect into our store network switches.
We need to come up with a solution that keeps our internal security team
happy.
If you have answered this question correctly, you have scored one point.
Summary
Glad it’s over or are you hungry for more? This was an introduction into
your V3 lab for content, complexity, and volume—we can call it the
warmup for this book. Although it’s primarily based on SD-WAN, you can
see that you don’t need to be an expert in this field. As long as you have an
understanding of the technology as outlined in the V3 blueprint, you should
be able to rely on your routing knowledge to be successful in this lab. You
were spared some of the complexity of TLOCs and colors as well as VPN0s
and VPN1s, and this should allow you to treat a specific technology as a
“black box” if you are not an expert in that field. If you haven’t worked on
an SD-WAN design previously, hopefully you have gained some further
insight and can research specific areas that may need strengthening.
Accurate scoring of the lab isn’t crucial, and neither is completing the lab
strictly within two hours. The important factors are that you just
experienced the level of complexity you will meet in the real exam and that
you have benefited from the exercise of determining the correct answers
based on the stipulated requirements. You should realize that being
successful in the CCDE exam isn’t solely about best practice or industry
trends; it’s about connecting with the scenario and following it as well as
answering the design-related questions based on the constraints and
requirements provided to you within the background information,
documents, and specific questions. If you found it too hard to select the
optimum answer, you likely missed a constraint or requirement and can use
this lab as practice to determine which information is worth making a note
of and developing a skill to analyze design requirements to aid your design
decisions.
If you do want to score yourself, a maximum of 30.5 points were available
in this lab. If you scored over 21 points (approximately 70%), you have a
very good chance of being successful on your CCDE exam.
Chapter 2
Practice Lab
During this practice lab, you are the network architect for Squid Energy.
Email #1
Hi.
Welcome aboard. We’re really glad to have you join us for a six-month
assignment. You came highly recommended, and we’re keen to get you
to work on our latest initiative. As you well know, we’ve been having
difficulty with our meter reading and billing, and we have to cut costs
to reduce overall opex yet improve the service we deliver to our
customers. The government has recently introduced a generous grant to
the tune of £50 per end consumer to entice a move away from legacy
meters and be more aware of energy use and costs. We have conducted
some research with our existing customer base and have found there is
a reluctance to make the change, as it will involve cutting power
briefly. The consumers are slow to realize that they can actually
achieve some cost savings and reduce carbon footprints by being more
aware of their energy use. In summary, we believe we can only make
them switch and make the meter rollout viable if we offer a £10 credit
to their account, so we really only have £40 per customer to play with.
I’ll worry about the overall finance element, but you do need to keep
this in mind as you don’t have an open checkbook available. If you can
save money where possible, then please do. You can probably guess it’s
not just a case of getting our field engineers to swap meters over; we
need to create the infrastructure behind the meters to collate the data
and use it for billing and make it available for consumers. This is
where you come in. We would be the first to tell you that our own
network is pretty basic, and I would imagine not fit to start hosting the
service, which is going to need to scale to a couple of million meters (if
our marketing team has done its homework correctly) over the next
five years. We have to assume we will migrate our current base of
300K customers gradually onto the smart meter program and grow
from there. We have a lot of work to do in terms of how we deliver
this, but I need you to start some architectural thinking around how this
would all work. I don’t know if these meters will connect back to us
over a private WAN or the Internet, so at this phase I want to keep my
options open and make sure we can support private and public
addressing if need be. I’ve attached a high-level specification of a
smart meter we think will be suitable versus a more expensive one. The
price is right at £20 a unit, and the other one has some additional
features at £28 a unit. I’ll let you do the math in terms of the numbers
we are talking about! Both communicate to a basic display in the home
to show current usage over a HAN (home area network) connection,
which is built into each device and included in the unit price. We want
to start the ordering process for a pilot ASAP, so please take a look at
the options we have.
Rgds,
Mich Fara-
Day
CTO Squid
Energy
Lab Questions
Question 1
Which smart meter would you recommend to Squid to supply to end
consumers? (Choose one.)
a. IPv4
b. IPv6
Email #2
Hi.
Thanks for selecting the Zenith smart meter. Our CFO wasn’t really
pleased we had to go with this one, but I explained we needed IPv6
support to make this scale. We’re going to have to get these meters to
communicate to our central DC facility over some form of WAN from
a consumer’s home location, which can be quite rural. I need you to
come up with a recommendation of how we should achieve this. The
facts I can gather from the meter company are as follows:
Typical IP packet size: 1000 bytes (includes IPsec overhead if used)
IP protocol: UDP
WAN charges are relatively low with the cellular 2/3/4/5G network,
ranging from 2G being the lowest cost to 5G being the highest cost.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 3
Based on the information supplied to date, which WAN technology would be
most suitable for the meter rollout for Squid? (Choose one.)
a. 2G
b. 3G
c. 4G
d. 5G
e. Wireless mesh
Email #3
Hi.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 4
Which network APN mode should be selected for the 4G SIM network from
Jaketel for the smart meter WAN network that will provide communications
from the meters to a central location? (Choose one.)
a. Public APN
b. Private APN
Question 5
Which type of IPv6 address assignment would you recommend for smart
meters within the Jaketel APN? (Choose one.)
Email #4
Hi.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 6
Which IPv6 address type should be used for the smart meter that would
provide as minimal administrative overhead as possible? (Choose one.)
Question 7
Squid has chosen to use Global Unicast Addressing (GUA) because it didn’t
want the meters to provision their own IPv6 addresses and needed to route to
them from their DC location. Which address allocation mode should be used
for the smart meter IPv6 addressing? (Choose one.)
a. Manual configuration
b. Stateless autoconfiguration
c. Stateful autoconfiguration
Question 8
If Squid has decided to use stateful autoconfiguration with DHCPv6 servers
based in Jaketel APNs, how long would you recommend the lease be set for?
(Choose one.)
a. One day
b. One week
c. One month
d. One year
Email #5
Hi.
Thanks for the info on addressing. We’ve evaluated your responses and
decided to run with PI GUAs issued by DHCPv6. If we need to run
with other providers, it will provide some additional flexibility. I need
to request a block of addresses from Jaketel, which I guess goes to
RIPE on our behalf on the PI side, so I could use your help in
requesting a large enough block. This is what we’ve determined so far:
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 9
Which size IPv6 prefix should be requested from RIPE for Squid’s smart
meter roll out? (Choose one.)
a. /24
b. /32
c. /40
d. /48
e. /60
Email #6
Hi.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 10
Design the WAN connectivity in order to provide IPv6 connectivity from the
smart meters back to the co-located environment. Your design should use
single infrastructure devices and connections at this point in time; resilience
can be addressed at a later stage. Add the required infrastructure devices, as
shown in the following diagram key, as required, and use 10Gbps Ethernet
connections or IPsec tunnels. Any infrastructure device placed within the
MPLS network can be assumed to have a 10Gbps direct connection to the
MPLS network without the need to specifically add it within the diagram.
Email #7
From: Mich Fara-Day
Hi.
Thanks for your help in the overall WAN design. We’re going for the
design outlined below. We can work out the resilience at a later date.
We’ll just double up on infrastructure and connectivity to ensure we
have no single points of failure. The VPN routers placed within the
APN regions terminate the IPsec VPN connections from the smart
meters from their local APN, and then each region VPN router has L3
MPLS VPN connectivity through the central 6PE to the co-lo edge
router to the central firewall. The firewall has an IPsec VPN
connection to each region’s VPN router, so all traffic is encrypted end-
to-end and the IPS/IDS appliance is able to monitor all flows. We
decided not to run the IPsec VPN tunnels direct from the meters to the
firewall, as this approach didn’t scale as well.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 11
As detailed in the email, Squid chose to run IPsec VPN connections from the
smart meters to the region/APN edge VPN routers. How would you
recommend the IPsec authentication be deployed for meters to VPN routers
for maximum security and minimal administrative overhead? (Choose one.)
Question 12
As detailed in the email, Squid has chosen to run IPsec VPN connections
from the region/APN edge VPN routers to the co-lo firewall to aggregate and
encrypt meter traffic flowing into the co-lo. How would you recommend
IPsec be deployed for VPN routers to the firewall for the five IPsec tunnels
with maximum security and minimal administrative overhead? (Choose one.)
Question 13
Squid has decided to implement certificates with a PKI infrastructure with a
root CA in order for the smart meters to be authenticated and encrypt traffic.
Which is the optimal method of provisioning the required certificates onto
the smart meters?
a. SCEP
b. Embedded meter self-signed certificate
c. CMP
d. EST
Email #8
Hi.
Thanks for your help with the security side, I’m going to get our
security guys to fully design the PKI. It has occurred to me we don’t
have any routing defined for the WAN-to-co-lo design. I initially
thought we’d just run static routes, but I’d rather run a dynamic routing
protocol to provide additional flexibility and resilience as we scale out
and add multiple routing devices to remove existing single points of
failure. I was going to ask you to evaluate a bunch of protocols, but I’m
going to save you the bother, as our team members only have
experience with OSPF. It’s going to be too much of a learning curve for
them to learn a new protocol, so we’ll just bump up their knowledge
from V2 to V3 to accommodate the IPv6. I did ask them if we needed
to bother with areas for the routing, and their eyes glazed over, so this
one’s on you. Can you have a think and let us know which OSPF
design is going to be optimal for us? From the co-lo network we will
just have a default route pointing to the co-lo edge firewall to reach the
meters.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 14
Which of the following OSPF WAN designs would be most suitable for
Squid to provide dynamic routing from the regions into the co-lo
environment to discover IPv6 prefixes assigned to the smart meters? (Choose
one.)
a.
b.
c.
d.
e.
Question 15
If Squid decides to use separate OSPF areas per region, which area type
should these areas be set to? (Choose one.)
a. Normal area
b. Stub area
c. NSSA
d. Totally stubby area
Question 16
What would be a good design choice to enhance default OSPF stability,
efficiency, and convergence when Squid introduces future resilience and
deploys dual ABR routers connecting into multiple regions/APNs?
Email #9
Thanks for your help with the OSPF WAN design. We decided to go
with totally stubby areas and the topology outlined below. I was a little
confused with underlays and overlays but understand where the ABRs
are best positioned for us to scale.
We just received our prefix back from RIPE that Jaketel has passed
onto us. It got me thinking, what the hell happened to IPv5? Anyways,
here it is:
2022:ccde::/32
Jaketel advised that, with such a large prefix, we would benefit from
configuring summarization in the network—can you let me know how
we should do that?
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 17
Which of the following options provides optimal summarization for Squid
from each OSPF area detailed within the OSPF topology in the email?
(Choose one.)
Question 18
Squid has decided to summarize at the region level on the ABRs using /40
prefixes to cover all APNs and associated meter /64 prefixes with a single
summary statement per ABR for the entire region. Which of the following
ranges should be used for the five regions for the UK deployment of smart
meters? (Choose one.)
a.
Region 1 (OSPF area 1) – 2022:ccde::/40
Region 2 (OSPF area 2) – 2022:ccde:0100::/40
Region 3 (OSPF area 3) – 2022:ccde:0200::/40
Region 4 (OSPF area 4) – 2022:ccde:0300::/40
Region 5 (OSPF area 5) – 2022:ccde:0400::/40
b.
Region 1 (OSPF area 1) – 2022:ccde::/40
Region 2 (OSPF area 2) – 2022:ccde:0001::/40
Region 3 (OSPF area 3) – 2022:ccde:0002::/40
Region 4 (OSPF area 4) – 2022:ccde:0003::/40
Region 5 (OSPF area 5) – 2022:ccde:0004::/40
c.
Region 1 (OSPF area 1) – 2022:ccde:0001::/40
Region 2 (OSPF area 2) – 2022:ccde:0002::/40
Region 3 (OSPF area 3) – 2022:ccde:0003::/40
Region 4 (OSPF area 4) – 2022:ccde:0004::/40
Region 5 (OSPF area 5) – 2022:ccde:0005::/40
d.
Region 1 (OSPF area 1) – 2022:ccde::/40
Region 2 (OSPF area 2) – 2022:ccde:0000:0001:/40
Region 3 (OSPF area 3) – 2022:ccde:0000:0002:/40
Region 4 (OSPF area 4) – 2022:ccde:0000:0003:/40
Region 5 (OSPF area 5) – 2022:ccde:0000:0004:/40
Email #10
Hi.
So we’re looking good on the network; however, I’ve had the members
of the application team in a workshop this morning, and they have
explained to me that initially they believed the meters would be coming
back to a central server system called SMARTS that would
accommodate all the meters. We have planned sending their data every
five to ten mins, at random intervals. Bit of a curveball—they have
completed their own load testing in a lab environment and, when they
scale the figures up, they believe the system will be overloaded. They
have requested we provide some load balancing to spread the load to
five separate servers behind a frontend VIP address that we push to the
meters over an API through the encrypted links you have designed.
They stated we could still run a single non-load-balanced system, but
this would require serious upgrading of existing systems, and this
would incur a three-month delay and cost would be double that of an
appliance-based load-balanced solution with the additional lower spec
servers. It’s a little frustrating this late in the day to get this
requirement, as we don’t have the budget approved, and it will be
difficult to get the sign-off for additional spend. They have told me it’s
effectively a simplex traffic flow from the meter to the VIP of the
application, which registers power usage. Each data packet from the
meter apparently includes the unique meter reference (customer ID) and
required data in a UDP format that the application can then forward to
backend systems, which are used to generate customer invoices.
The app guys went through some eventualities if the meter fails or has
its IPv6 address changed for any reason, and apparently these are non-
issues, as the unique meter reference (customer ID) is associated with
the customer data and not the source IPv6 address. I’ve drawn up a
picture they made up on my whiteboard. (I would have just sent you a
photo of it, but as you know, app guys can’t draw anywhere near as
well as network guys.)
For your info, I’ve looked into the appliance-based load balancers the
app guys mentioned from a well-respected vendor. They can scale to
the number of required flows (they support stateful and non-stateful
flows, and all features you would expect from a high-end load
balancer). We are looking at and support IPv6. The resilience is stated
as active/standby, so when one fails, the other takes over, but I think it
could be better if we have to use them to have two VIPs that we push
out to meters. Kind of alternate APNs or regions for one VIP and the
other. This way, we could improve our scale and have the balancers
backing each other up, so one is active for one VIP and one for the
other while backing up each VIP. Alternatively, the switches in our DC
apparently can also provide a basic non-stateful load-balancing
mechanism called Traffic Scatter, providing frontend VIPs for L3 and
L4 traffic at wire rate and just sending out to servers at the backend
based on health/availability of the real server, as the dedicated load
balancers do. It looks like they can scale, provide a resilient VIP
service, and handle the numbers, and we don’t need any license
upgrade to enable this. It seems pretty basic in comparison, and they
state it supports the VIP frontend, but only Direct Server Return. I need
you to recommend which way to go, as this has to work Day 1, and we
have to accommodate this change as quickly as we can.
Thanks!
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 19
How can Squid accommodate the load-balancing requirement detailed in the
email? (Choose one.)
Email #11
From: Mich Fara-Day
Hi.
Thanks for the advice on the load balancing. Let’s hope the scatter
doesn’t shatter under load! While you’ve been busy on the network
design, I’ve had some questions come in from our engineering team
about how we should go about setting up the home area network
(HAN), which is associated to the smart meters. Obviously, we don’t
need to set up a network in every consumer’s home. This is just the
technology that the smart meter uses to communicate with a display
unit that gives a real-time reading of the power usage that can be
placed wherever the consumer chooses within their home. Apparently,
we have options in how to deploy this communications link, which just
piggybacks off the /64 IPv6 prefix the meter is assigned, so it’s quite
straightforward, I believe. (Famous last words!) We want to start a
pilot, so if you can assist with the HAN info, that would be great.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 20
Assist Squid in deciding which is the optimal technology to use for the HAN
between the smart meter and the display unit, which would be placed within
the consumer’s property to view real-time power usage provided by the
smart meter. Fill in the protocol from the following list to match the
associated distance for that protocol, as listed in the table.
Standard Zigbee 2.4GHz
Dual-band Zigbee 2.4GHz/868MHz
Bluetooth
Ethernet CAT5
2.4GHz Wi-Fi
Protocol Distance
100m
Less than 20m
Less than 10m
Less than 30m
50m
Question 21
Squid decided to implement a standard Zigbee service on the HAN network
for the pilot and encountered interference in all areas of the pilot location and
lower-than-expected range in areas of the pilot location that incorporated
thicker-than-average walls. It is now concerned this could be representative
of the user experience of the majority of consumers in the production rollout.
Which of the following changes would you recommend in order to improve
the HAN network usability while not introducing a management overhead on
the running of the service? (Choose one.)
Email #12
Subject: Implementation
Hi.
Thanks for the advice on the HAN. We will get the team to complete
the pilot on your recommendation of dual-band Zigbee. While the team
finishes up, I need you to help with an implementation plan to enable
our service. Let’s get the service up and running!
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 22
To assist Squid with delivery of its service, arrange the implementation tasks
in sequence order:
Enable PKI infrastructure and application load balancing within Squid
co-lo.
Install VPN edge routers in Jaketel regions and enable Jaketel MPLS
service between regions to central PE.
Order Jaketel APN service and 4G SIM cards for smart meters.
Install CE router for Jaketel MPLS service within the co-lo.
Board smart meters to Squid’s meter-reading application.
Install firewalls and IPS/IDS infrastructure devices within the co-lo.
Configure IPsec tunnels from firewalls to VPN routers.
Order MPLS connectivity from Jaketel to co-lo. Order smart
meters/VPN routers/firewalls and IPS/IDS and PKI infrastructure from
suppliers.
Configure the OSPF network from firewalls to region VPN router.
Email #13
Hi.
Thanks for your help. We’re finally live! I was expecting the directors
to be really excited this Monday morning, but they were fairly neutral
about the whole thing, as it has been an expensive project. It definitely
brought me down to earth after a long weekend, but we couldn’t have
done it without your help.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 23
Which would be the best process for migration of a customer switching
supplier and moving the smart meter away to a new supplier with minimal
effort for Squid? (Choose one.)
a. Have the new supplier’s onsite electrical engineer factory reset the
smart meter and install a new SIM card configured for new supplier at
time of cutover.
b. Apply a gateway between Squid’s co-lo and major supplier networks to
allow traffic to traverse between Squid and the new supplier’s network
for meter readings for migrated customers.
c. Mail out new 4G SIM cards for the consumer to swap over, which will
be configured to connect to the new provider’s smart meter network.
d. Provide Internet access to the Squid co-lo network or modify the private
APNs to public APNs with local Internet access so new suppliers can
route to the meters using the IPv6 globally unique addressing structure
configured on the meters for direct meter reading access over an API
call.
Email #14
From: Mich Fara-Day
Subject: EVs
Hi.
The new system is working really well. We’ve managed to free up our
field staff, etc., and automate a lot of deployment for consumers who
are keen to get a smart-metered service. The board believes we now
have the capacity to expand our offerings, so we’re setting up some
marketing to deploy our own EV charging points for vehicles at
consumer locations. We see two types of customers—one already has
the smart meter and we can offer incentives for them to buy a charging
point from us, and one who doesn’t use us as a supplier at all and we
set them up from scratch. Either way, we need to have an option to
connect each user type to our systems in the most cost effective
manner.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 24
Which of the following options provide optimal connectivity for the new EV
charging points to Squid’s central system for billing for each customer type?
(Choose two.)
Question 25
If Squid creates a service for public EV charging points in public locations
such as car parks and shopping malls, should the connectivity solution differ
from a new customer EV charging point for a consumer? (Choose one.)
Email #15
Subject: EVs
Hi.
Thanks for your feedback on public charging. While we weigh
everything, we are considering an option to allow users of public
charging points to use a “call home” feature on the charging point to
allow Squid help desk users to communicate directly with consumers
who have difficulty entering credit card details on the system or who
are having difficulty using charging apps compatible with the solution.
Our devops team believes it can create an app for a consumer that can
connect to the charger over Bluetooth and allow the user to talk directly
to the help desk over our secure WAN network (a form of push to talk).
This could be a great way to showcase our technology and innovation
and increase our UX and customer service reviews. Devops thinks it
can get a beta out in two weeks. We can modify a call center
application to accept voice if we need to quickly, so we’re keen to test
this on a pilot as soon as we have the beta. For the pilot, we will
connect the EV charger up identically as if it was a smart meter for a
new customer and perform our testing.
We appreciate all of your help on the design, and we can carry on with
the charging points when you move on!
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 26
How would you recommend Squid facilitate the voice connectivity
requirement for the pilot? (Choose one.)
a. Simply list a direct dial number and EV charging meter location code on
the charger for the consumer to dial in to the call center with their own
cell phone.
b. Set up a push-to-talk feature on the EV charger that piggybacks voice
on the 4G SIM card to route voice over the Jaketel cellular connection
as a normal cellular voice call, which is forwarded to the help desk.
c. Use a push-to-talk feature on the EV charger for a VoIP call that can be
routed over the existing data network connectivity to the call center
application within the Squid co-lo and prioritize voice traffic with
DSCP EF.
d. Use a push-to-talk feature on the EV charger for a VoIP call that can be
routed over the existing data network connectivity to the call center
application within the Squid DC network, without any form of voice
QoS.
Question 1
Which smart meter would you recommend to Squid to supply to end
consumers? (Choose one.)
Requirements/constraints from supplied documentation:
The service is going to need to scale to a couple of million meters if our
marketing team has done its homework correctly over the next five years. We
have to assume we will migrate our current base of 300K customers
gradually onto the smart meter program.
I don’t know if these will connect back to us over a private WAN or the
Internet, so at this phase I want to keep my options open and make sure we
can support private and public addressing if need be.
I’ll worry about the overall finance element, but you do need to keep this in
mind as you don’t have an open checkbook available. If you can save money
where possible, then please do.
The price is right at £20 a unit, and the other one has some additional
features at £28 a unit.
Both communicate to a basic display in the home to show current usage over
a home area network (HAN) connection that is built into each device, which
is included in the unit price.
We want to start the ordering process for a pilot ASAP, so please take a look
at them.
If you have answered this question correctly, you have scored one point.
Question 2
Which IP version should be deployed on the smart meters? (Choose one.)
Requirements/constraints from supplied documentation:
The service is going to need to scale to a couple of million meters over the
next five years if our marketing team has done its homework correctly. We
have to assume we will migrate our current base of 300K customers
gradually onto the smart meter program.
I don’t know if these will connect back to us over a private WAN or the
Internet, so at this phase I want to keep my options open and make sure we
can support private and public addressing if need be.
a. IPv4
This is incorrect. This question is really justification as to which meter
type you selected. You could have also had a question asking why you
selected this type of meter. Clearly IPv4 isn’t going to scale to the
requirement of two million devices if Squid wants to keep its options
open going forward with a solution that could connect over the Internet.
b. IPv6
This is correct. As detailed in the explanation to Answer C in Question
1, IPv6 is a classic use case for IoT, and this would scale to two million
publicly addressed devices.
If you have answered this question correctly, you have scored half a point.
Email #2
Thanks for selecting the Zenith smart meter. Our CFO wasn’t really
pleased we had to go with this one, but I explained we needed IPv6
support to make this scale. We’re going to have to get these meters to
communicate to our central DC facility over some form of WAN from
a consumer’s home location, which can be quite rural. I need you to
come up with a recommendation of how we should achieve this. The
facts I can gather from the meter company are as follows:
IP protocol: UDP
WAN charges are relatively low with the cellular 2/3/4/5G network,
ranging from 2G being the lowest cost to 5G being the highest cost.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 3
Based on the information supplied to date, which WAN technology would be
most suitable for the meter rollout for Squid? (Choose one.)
Requirements/constraints from supplied documentation:
We’re going to have to get these meters to communicate to a central facility
or regional facilities and back to a central location WAN side from a
customer’s home location, which can be quite rural.
Typical IP packet size: 1000 bytes (includes IPsec overhead if used)
IP protocol: UDP
Maximum packet per second rate (typically seen during firmware
upgrades): 100
Latency requirement normal operation: Sub 80ms
Power requirements: 10 watts
WAN charges are relatively low with the cellular 2/3/4/5G network, ranging
from 2G being the lowest cost to 5G being the highest cost.
I’ll worry about the overall finance element, but you do need to keep this in
mind, as you don’t have an open checkbook available. If you can save money
where possible, then please do.
a. 2G
This is incorrect. Aside from the fact that the 2G service is now
considered legacy, the data rate required from the meter would not be
possible. Taking the average packet size supplied (1000 bytes) with an
average of 100 pps, this equates to a required bit rate of 800Kbps. The
2G network is generally known to only deliver up to 100Kbps, so 2G
technology would not be suitable.
b. 3G
This is a suboptimal answer. 3G meets bandwidth requirements with a
range of 200Kbps–2Mbps but is known to have a latency of less than
100ms. It’s a little too close to the firm requirement of 80ms, so while it
might work in the majority of implementations, 4G (Answer C) is a
more reliable technology choice.
c. 4G
This is the optimal answer. 4G provides a bandwidth of 100Mbps–
1Gbps and approximately 50ms latency. It is technology that provides
wide coverage and will have a longer life cycle in comparison to 3G and
2G.
d. 5G
This is a suboptimal answer. The latency requirement and bandwidth do
not justify the additional expense, which you have been asked to
minimize. 5G would be a good technology choice for sub-10ms latency
and up to 1Gbps bandwidth requirements.
e. Wireless mesh
This is incorrect. You have not been provided with any information in
regard to a wireless mesh network. This would typically be more
expensive than a cellular option and is unlikely to provide coverage in
rural areas outside of cities. You would be making an assumption if you
selected this option, which is a classic error in tackling the lab exam.
If you have answered this question correctly, you have scored one point.
Email #3
From: Mich Fara-Day
Hi.
Rgds,
Mich Fara-Day
TO Squid Energy
Question 4
Which network APN mode should be selected for the 4G SIM network from
Jaketel for the smart meter WAN network that will provide communications
from the meters to a central location? (Choose one.)
Requirements/constraints from supplied documentation:
We’re going to have to get these meters to communicate to our central DC
facility over some form of WAN from a consumers’ home location, which
can be quite rural.
Jaketel stated it can configure multiple access point names (APNs) for us,
which is the equivalent of a data service. It can be either private without
access to the Internet or other Jaketel data subscribers or public with access
to the Internet and other Jaketel data subscribers. Cost-wise, the private APN
is marginally more expensive than the private. Jaketel also stated that in
terms of IP address we are good with IPv6—either fixed (static), DHCP-
based, or an SLAAC approach. The APNs Jaketel configures can fit into our
five area footprint (there will be multiple APNs per area to assist with scale),
and I’m told we can install our own equipment within Jaketel’s APNs to
backhaul each area’s traffic back to a central location.
Squid is also wary of a well-publicized cyberattack on Ukraine's power
network in 2015 and is adamant that it cannot find itself in that position.
a. Public APN
This is incorrect. Even though the public APN is marginally more cost
effective, you haven’t been informed of a requirement for the meters to
be accessible on the Internet at this point in the network. You have,
however, been informed of a historical cyberattack that Squid was
adamant it wants to avoid. Having a public APN means the security of
the overall system would be more complex and challenging in
comparison to a private APN, which would natively offer more security.
b. Private APN
This is correct. The private APN option is marginally more expensive,
but the additional security provided by not being accessible on the
Internet directly from this zone makes this a good design choice due to a
lack of requirements stating that Internet access is required at this point
in the network. Even if the private APN is provisioned, the meters could
still be accessible on the Internet if connectivity was provisioned from
the central DC location and Squid had a later requirement for this.
Provision of the private APN definitely reduces and helps mitigates the
attack vectors in play.
If you have answered this question correctly, you have scored one point.
Question 5
Which type of IPv6 address assignment would you recommend for smart
meters within the Jaketel APN? (Choose one.)
Requirements/constraints from supplied documentation:
Cost-wise, the private APN is marginally more expensive than the private.
Jaketel also stated that in terms of IP address we are good with IPv6—either
fixed (static), DHCP-based, or an SLAAC approach.
I’m happy enough with 94% coverage, and I’m sure we can even extend
some coverage in rural areas with additional antennas if really required, and
if we have to we can use a different supplier for the more complex installs,
but we don’t want to be seen to turn customers down.
If you have answered this question correctly, you have scored one point.
Email #4
Hi.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 6
Which IPv6 address type should be used for the smart meter that would
provide as minimal administrative overhead as possible? (Choose one.)
Requirements/constraints from supplied documentation:
We have to be able to route to the meters directly for software updates from
our central DC. All we need to do for ID is to be able to know which IPv6
address belongs to which customer at their physical address location. To do
this, we can allocate an IPv6 address prior to installation time before the
meter is shipped to the installers that we can allocate centrally, or I’m told we
can use DHCPv6 within each APN in Jaketel. When the meter has an IPv6
address and calls home, it registers its IPv6 address with the central
application with a site ID that references the customer address, so we’re
covered either way.
Would provide as minimal administrative overhead as possible.
If you have answered this question correctly, you have scored one point.
Question 7
Squid has chosen to use Global Unicast Addressing (GUA) because it didn’t
want the meters to provision their own IPv6 addresses and needed to route to
them from their DC location. Which address allocation mode should be used
for the smart meter IPv6 addressing? (Choose one.)
Requirements/constraints from supplied documentation:
All we need to do for ID is to be able to know which IPv6 address belongs to
which customer at their physical address location. To do this, we can allocate
an IPv6 address prior to installation time before the meter is shipped to the
installers that we can allocate centrally, or I’m told we can use DHCPv6
within each APN in Jaketel. When the meter calls home, it registers its IPv6
address with the central application with a site ID that references the
customer address, so we’re covered either way.
We’re also thinking of registering each meter on its own /64 segment to give
us some segmentation between devices and scale for the future. (Yeah I know
that’s a lot of scale!)
a. Manual configuration
This is incorrect. Clearly it’s possible to manually configure the meters
centrally and ship them out, but the logistics would not be efficient,
tying everything up. It’s far simpler to aim for a zero-touch deployment
model, allowing for any unconfigured meter to be shipped to site or
taken to site by an engineer. Similarly, the engineer deploying the meter
could enter an address at time of installation, but again more logistics to
line up, and this engineer would typically be an electrically trained
engineer versus an IT engineer, as he would have to deploy the meter in
line with the electrical supply being metered. If you did select this
answer, your punishment may be to configure the two million smart
meters yourself, just to gain a better understanding of the effort
involved.
b. Stateless autoconfiguration
This is incorrect. This would be SLAAC-based stateless
autoconfiguration based on RA advertisements, with a prefix being
issued by a router on the segment and then the meter provisioning its
own address matched with that prefix. The process would work, as it is
detailed that a user ID is matched to an IPv6 address, so Squid doesn’t
actually need to allocate exact host addressing, but Squid has also stated
it expects to use a /64 per smart meter. This would mean the company
needs a locally connected router to each /64 segment in order for the RA
to function. It seems a little farfetched for this to function correctly at
the scale being discussed (if all meters were provisioned within the
same or limited number of /64 segments, then this approach would work
well).
c. Stateful autoconfiguration
This is correct. Stateful autoconfiguration for IPv6 is DHCPv6 and
would be the optimal choice for provisioning addresses within an IoT
environment due to the sheer scale of hosts. In this scenario, the
DHCPv6 servers could reside within the service provider’s network or
back in Squid’s DC and reachable via DHCP relay from the cellular
APNs.
If you have answered this question correctly, you have scored one point.
Question 8
If Squid has decided to use stateful autoconfiguration with DHCPv6 servers
based in Jaketel APNs, how long would you recommend the lease be set for?
(Choose one.)
a. One day
This is incorrect. It’s a good choice for a hot desk or wireless network,
but a static meter would not need to refresh its lease on a daily basis.
There would be a great deal of unnecessary cumulative traffic generated
for a daily lease for all meters.
b. One week
This is incorrect. As per the explanation for Answer A, there is still little
benefit to be achieved by extending the lease period to one week.
c. One month
This is optimal. The previous answers are too short a lease period, and
Answer D (one year) is arguably too long.
d. One year
This is a suboptimal answer. A lease could actually extend to 135 years
on some systems, if required, but one year would generally be
considered too long a period, even for a static device that, in theory,
may need to change suppliers at some point.
If you have answered this question correctly, you have scored half a point.
Email #5
Hi.
Thanks for the info on addressing. We’ve evaluated your responses and
decided to run with PI GUAs issued by DHCPv6. If we need to run
with other providers, it will provide some additional flexibility. I need
to request a block of addresses from Jaketel, which I guess goes to
RIPE on our behalf on the PI side, so I could use your help in
requesting a large enough block. This is what we’ve determined so far:
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 9
Which size IPv6 prefix should be requested from RIPE for Squid’s smart
meter roll out? (Choose one.)
Requirements/constraints from supplied documentation:
a. /24
This is incorrect. See the explanation for Answer B for details.
b. /32
This is correct. Referring to the following figure, the allocation is
simpler if you work from right to left (host to network) of the 128-bit
block. You are informed the meters require a /64 prefix (it still sounds
absurd that a device or a VLAN can be allocated twice the size of the
entire IPv4 address space, but these are the requirements). You need
65,000x /64s per APN, so an APN will require an additional 16 bits,
which takes you to a /48 from the /64 starting point. You require 256
APNs per region, so this equates to a further 8 bits, taking you to a /40,
and 256 regions are required, so a final additional 8 bits is required,
taking you to a /32. This shouldn’t be a difficult question and doesn’t
require detailed knowledge of IPv6; however, it can be challenging and
easy to make an error if you are under a time constraint, so it’s well
worth practicing with address scheme scenarios prior to the CCDE lab
so you can tackle a question like this with ease should it arise.
c. /40
This is incorrect. See the explanation for Answer B for a detailed
explanation.
d. /48
This is incorrect. See the explanation for Answer B for a detailed
explanation.
e. /60
This is incorrect. See the explanation for Answer B for a detailed
explanation.
If you have answered this question correctly, you have scored one point.
Email #6
Hi.
Marketing worked out that we will need to scale to 400,000 customers
per region/area, which is formed with multiple APNs. Jaketel
apparently runs its own MPLS network also and has priced up a way of
backhauling aggregated APN traffic onto our central location.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 10
Design the WAN connectivity in order to provide IPv6 connectivity from the
smart meters back to the co-located environment. Your design should use
single infrastructure devices and connections at this point in time; resilience
can be addressed at a later stage. Add the required infrastructure devices, as
shown in the following diagram key, as required, and use 10Gbps Ethernet
connections or IPsec tunnels. Any infrastructure device placed within the
MPLS network can be assumed to have a 10Gbps direct connection to the
MPLS network without the need to specifically add it within the diagram.
Requirements/constraints from supplied documentation:
The APNs Jaketel configures can fit into our five area footprint (there will be
multiple APNs per area to assist with scale), and I’m told we can install our
own equipment within Jaketel’s APNs to backhaul each area’s traffic back to
a central location.
Marketing worked out that we will need to scale to 400,000 customers per
region/area, which is formed with multiple APNs. Jaketel apparently runs its
own MPLS network also and has priced up a way of backhauling aggregated
APN traffic onto our central location.
We have reserved some space in a co-lo in central London where I’d like you
to bring all the smart communication network back to.
I did read about an Internet-based attack in the Ukraine power network some
time ago, and that cannot be permitted here, so I’ll need you to make it as
secure as possible.
Therefore, everything should be encrypted outside of our own DC. I was
informed that we can use a DHCPv6 option in the offer to the smart meters
that gives the meters the ability to connect to a remote IPsec peer of our
choice that we configure on the DHCPv6 server. Hopefully, we can make use
of this feature. If you can absorb the information below and then get started
on a design, that will allow us to connect the smart meters to the cellular
network and then onto a DC, which is likely going to be a co-located area
where we can rent some rack space in London and where we will install the
associated compute environment.
Run an appliance-based IPS/IDS system that can monitor the traffic flow into
the co-lo before it reaches the compute environment to enhance security over
and above a perimeter firewall, which will also be required in front of the
connection to the meters.
As mentioned previously, Jaketel said we can connect our own infrastructure
devices within each region in order to connect back to a central location.
These devices will effectively have a logical connection into each APN
provisioned within that region. Jaketel is going to provide a Layer 3 MPLS
VPN for us to assist with backhauling WAN cellular traffic to the central
location, which will be our co-lo, and we can just connect up a local 10Gbps
fiber connection into our co-lo area, as a Jaketel PE is conveniently sited in
the same co-lo building.
In terms of infrastructure devices at our disposal, we have 10Gbps routers
with six interfaces and 10Gbps VPN routers with four interfaces. The VPN
routers are capable of terminating 500,000 VPNs connections, and we have
firewalls that are VPN compatible with 4x 10Gbps interfaces and can also
terminate up to 500,000 VPNs. The smart meters will connect to the Jaketel
APN on bootup thanks to their SIM card and a preconfigured APN on the
Jaketel side. Also, as mentioned, we can preload some configuration to point
to a remote VPN of our choice to make use of Jaketel’s IPsec feature using
DHCPv6 options. Oh, and the IPS/IDS device—due to the number of flows
that can go through it, the price is eye-watering. I need you to use as few of
these as possible, and they have 2x 10Gbps interfaces (an in and an out, so
they work in series). All routers and firewalls can run OSPF and BGP with
dual-stack IPv4 and IPv6, and we calculate the overall peak aggregate traffic
load into the co-lo would not exceed 6Gbps.
The following figure details the required WAN connectivity. The main
constraint is to use the minimal number of IPS/IDS devices, which really
shapes the design and can be achieved with a single IPS/IDS device
(remember you have not been asked to provide a resilient service at this point
in time). In order to use a single IPS/IDS device, a single firewall would be
required, as the IPS/IDS device only has a 10Gbps input and output. In order
to use a single firewall, the smart meters cannot terminate IPsec connections
directly to the firewall, as it can only accommodate 500,000 VPN
connections. The smart meters would need to connect to a VPN router within
the region/area of the APNs, which can accommodate up to 500,000 VPN
connections. This VPN router would terminate the IPsec sessions to the
meters and aggregate all of the meters’ traffic back to the co-lo over a single
IPsec VPN connection to a co-lo firewall, which is required to provide
perimeter security into the co-lo. The design is very simple, with the Jaketel
MPLS service providing connectivity between each region and the central
co-lo with hierarchy providing scale and modularity.
Alternative design options could use the perimeter firewall in the co-lo to
terminate IPsec VPN connections directly from the smart meters; however,
this would require multiple firewalls to scale, as each firewall is only capable
of terminating up to 500,000 VPN connections, and up to two million
connections could be required if 400,000 meters were connected in each
region/area. This would require four separate firewalls, which would then
require four IPS/IDS devices to connect to them, making the price
significantly higher than the design detailed previously. The design may offer
more overall throughput, but you are informed a maximum of 6Gbps is
required. Similarly, you could use 4x VPN routers in the co-lo to terminate
the IPsec connections direct from the meters if connectivity was provided
over the MPLS network, but this would also result in an increase in the
number of firewalls and IPS/IDS appliances.
This type of question can be extremely complex, as you need to fully
understand the requirements, and there are a huge number of variables in
play. It is really worth absorbing from the information provided what is
actually required, keeping the design as simple as possible, and using your
design skills to provide scale and hierarchy in such a large IoT deployment.
If you have answered this question correctly, you have scored three points.
Email #7
Hi.
Thanks for your help in the overall WAN design. We’re going for the
design outlined below. We can work out the resilience at a later date.
We’ll just double up on infrastructure and connectivity to ensure we
have no single points of failure. The VPN routers placed within the
APN regions terminate the IPsec VPN connections from the smart
meters from their local APN, and then each region VPN router has L3
MPLS VPN connectivity through the central 6PE to the co-lo edge
router to the central firewall. The firewall has an IPsec VPN
connection to each region’s VPN router, so all traffic is encrypted end-
to-end and the IPS/IDS appliance is able to monitor all flows. We
decided not to run the IPsec VPN tunnels direct from the meters to the
firewall, as this approach didn’t scale as well.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 11
As detailed in the email, Squid chose to run IPsec VPN connections from the
smart meters to the region/APN edge VPN routers. How would you
recommend the IPsec authentication be deployed for meters to VPN routers
for maximum security and minimal administrative overhead? (Choose one.)
Requirements/constraints from supplied documentation:
Maximum security and minimal administrative overhead.
If you have answered this question correctly, you have scored one point.
Question 12
As detailed in the email, Squid has chosen to run IPsec VPN connections
from the region/APN edge VPN routers to the co-lo firewall to aggregate and
encrypt meter traffic flowing into the co-lo. How would you recommend
IPsec be deployed for VPN routers to the firewall for the five IPsec tunnels
with maximum security and minimal administrative overhead? (Choose one.)
Requirements/constraints from supplied documentation:
Maximum security and minimal administrative overhead.
If you have answered this question correctly, you have scored one point.
Question 13
Squid has decided to implement certificates with a PKI infrastructure with a
root CA in order for the smart meters to be authenticated and encrypt traffic.
Which is the optimal method of provisioning the required certificates onto
the smart meters?
Requirements/constraints from supplied documentation:
Certificates with a PKI infrastructure with a root CA.
Maximum security and minimal administrative overhead.
No TLS support.
a. SCEP
This is the optimal answer. Simple Certificate Enrollment Protocol
(SCEP) can be used reliably with the PKI infrastructure that Squid is
investing in with a root CA to issue certificates to the smart meters.
b. Embedded meter self-signed certificate
This is incorrect. Self-signed certificates can be used in closed IoT
environments, but this would typically be a less secure approach in
comparison to Answer A.
c. CMP
This is incorrect. The main function of Certificate Management
Protocol (CMP) is certificate management in terms of revocation and
status.
d. EST
This is incorrect. EST uses TLS as the transport security layer for
certificate provision, and the smart meters do not natively support TLS.
If you have answered this question correctly, you have scored one point.
Email #8
Hi.
Thanks for your help with the security side, I’m going to get our
security guys to fully design the PKI. It has occurred to me we don’t
have any routing defined for the WAN-to-co-lo design. I initially
thought we’d just run static routes, but I’d rather run a dynamic routing
protocol to provide additional flexibility and resilience as we scale out
and add multiple routing devices to remove existing single points of
failure. I was going to ask you to evaluate a bunch of protocols, but I’m
going to save you the bother, as our team members only have
experience with OSPF. It’s going to be too much of a learning curve for
them to learn a new protocol, so we’ll just bump up their knowledge
from V2 to V3 to accommodate the IPv6. I did ask them if we needed
to bother with areas for the routing, and their eyes glazed over, so this
one’s on you. Can you have a think and let us know which OSPF
design is going to be optimal for us? From the co-lo network we will
just have a default route pointing to the co-lo edge firewall to reach the
meters.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 14
Which of the following OSPF WAN designs would be most suitable for
Squid to provide dynamic routing from the regions into the co-lo
environment to discover IPv6 prefixes assigned to the smart meters? (Choose
one.)
Requirements/constraints from supplied documentation:
I initially thought we’d just run static routes, but I’d rather run a dynamic
routing protocol to provide additional flexibility and resilience as we scale
out and add multiple routing devices to remove existing single points of
failure.
In terms of infrastructure devices at our disposal, we have 10Gbps routers
with six interfaces and 10Gbps VPN routers with four interfaces. The VPN
routers are capable of terminating 500,000 VPNs connections, and we have
firewalls that are VPN compatible with 4x 10Gbps interfaces and can also
terminate up to 500,000 VPNs.
All routers and firewalls can run OSPF and BGP with dual-stack IPv4 and
IPv6.
Provide dynamic routing from the regions into the co-lo environment to
discover IPv6 prefixes assigned to the smart meters.
From the co-lo network, we will just have a default route pointing to the co-
lo edge firewall to reach the meters.
a.
This is incorrect. This one can be ruled out quickly because Area 0 is
provisioned between the Jaketel 6PE and the router terminating the
connectivity into the co-lo. The overlay IPsec VPN traffic is running
through these underlay devices. As such, they wouldn’t have visibility
of the prefixes assigned to each region/APN. The underlay is purely
providing connectivity for the IPsec tunnels. OSPF terminates on the
edge router in the co-lo in this option and not the firewalls where the
IPsec VPN connectivity is provided from. As such, this has more use as
an underlay network design and would assist in dynamically learning
IPsec tunnel endpoints as opposed to IPv6 prefixes assigned to smart
meters in each region.
b.
This is incorrect. This can also quickly be ruled out because a single
Area 0 is provisioned throughout the entire network. This wouldn’t
facilitate summarization or scale. Similarly, the overlay IPsec VPN
traffic is running through the underlay infrastructure devices. As such,
they wouldn’t have visibility of IPv6 prefixes assigned to the meters in
each region, as OSPF terminates on the edge router in the co-lo and not
the firewall, which is the IPsec VPN tunnel endpoint.
c.
This is incorrect. Hierarchy has been introduced with separate areas per
region, but the overlay IPsec VPN traffic is running through the
underlay infrastructure devices. As such, they wouldn’t have visibility
of IPv6 prefixes assigned to the meters in each region, as OSPF
terminates on the edge router in the co-lo and not the firewall, which is
the IPsec VPN tunnel endpoint.
d.
This is the optimal answer. Because the overlay IPsec VPN tunnels
from the VPN edge routers in each region terminate on the co-lo
firewall, the OSPF network needs to follow this overlay model in order
to advertise the meter prefixes from each region. The OSPF areas
follow the regions, allowing for hierarchy and facilitating
summarization. The IPsec VPN region routers are a natural choice for
ABRs where the summarization of each region/APN can occur. The
underlay network wouldn’t actually necessarily be running OSPF in this
topology, and the co-lo firewall would simply need to be able to route to
IPsec VPN tunnel endpoints, which are the VPN edge routers in the
regions over the Jaketel MPLS network, which is effectively the
underlay in this topology.
e.
This is a suboptimal answer. This is very similar to Answer D in terms
of overlay, but the co-lo firewall is now the ABR. The design choice
here is, would you really want a firewall controlling the entire OSPF
network and be responsible for summarization into and out of area? If
the IPsec VPN tunnels terminated onto a high-powered router in the co-
lo instead of the firewall, this might be a good design choice in
comparison to Answer D.
Did this question really make you think about underlays and overlays and
evaluate optimal ABR placement? If it did or if it has stimulated further
research, then it has been a good exercise to go through to focus on the why,
which is so crucial in the CCDE. If you have answered this question
correctly, you have scored two points.
Question 15
If Squid decides to use separate OSPF areas per region, which area type
should these areas be set to? (Choose one.)
Requirements/constraints from supplied documentation: N/A
a. Normal area
This is incorrect. A normal area would be a good choice for an area with
multiple OSPF routers and flexibility for connectivity options going
forward, but from the information presented to date, each area will not
have any additional links to different networks and simply requires an
ABR to reach Area 0 and the Squid co-lo area. A normal area will also
have multiple LSAs propagated between the area and Area 0. As such,
without further measures such as summarization, there is a distinct
possibility that SPF (full or incremental) would be run more frequently
than required based on a change outside of the local area.
b. Stub area
This is a suboptimal answer. A stub area is a good starting point for an
area with no external connectivity and a ABR link into Area 0 with the
known default route propagated from the ABR into the stub area. Type
3 LSA routes are, however, generated into a stub area, which wouldn’t
necessarily be required in the Squid OSPF topology, so Answer D is a
better design choice here.
c. NSSA
This is incorrect. There is no requirement for redistribution from an
external routing protocol requiring ASBRs within Squid’s topology for
the regions/areas.
d. Totally stubby area
This is the optimal answer. As detailed in the explanation to Answer B,
a stub area suits this topology, but taking the default route concept one
stage further and removing any summary LSA Type 3s (as well as Type
5s) into the area provides an efficient OSPF network and will reduce the
SPF (full and partial) throughout the network by effectively reducing
the state in the topology. In other networks, totally stubby areas can
provide suboptimal routing to the ABR as a consequence of removing
the Type 3 LSAs, but this wouldn’t be an issue within Squid’s topology,
which would only really have a pair of ABRs in each region/area once
resiliency was introduced (as opposed to having 50 OSPF routers within
the area).
If you have answered this question correctly, you have scored one point. If
you selected Answer B, award yourself half a point.
Question 16
What would be a good design choice to enhance default OSPF stability,
efficiency, and convergence when Squid introduces future resilience and
deploys dual ABR routers connecting into multiple regions/APNs?
Requirements/constraints from supplied documentation:
Enhance default OSPF stability, efficiency and convergence.
It sounds obvious, but the key to answering this and every question in the
CCDE lab is a full understanding of the question. You are asked to enhance
default stability, efficiency, and convergence. This question, then, is really
about optimization of the OSPF network instead of asking how to purely
provide fast convergence, for example.
If you have answered this question correctly, you have scored one point.
Email #9
From: Mich Fara-Day
Hi.
Thanks for your help with the OSPF WAN design. We decided to go
with totally stubby areas and the topology outlined below. I was a little
confused with underlays and overlays but understand where the ABRs
are best positioned for us to scale.
We just received our prefix back from RIPE that Jaketel has passed
onto us. It got me thinking, what the hell happened to IPv5? Anyways,
here it is:
2022:ccde::/32
Jaketel advised that, with such a large prefix, we would benefit from
configuring summarization in the network—can you let me know how
we should do that?
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 17
Which of the following options provides optimal summarization for Squid
from each OSPF area detailed within the OSPF topology in the email?
(Choose one.)
Requirements/constraints from supplied documentation:
If you have answered this question correctly, you have scored one point. If
you selected Answer F, award yourself half a point.
Question 18
Squid has decided to summarize at the region level on the ABRs using /40
prefixes to cover all APNs and associated meter /64 prefixes with a single
summary statement per ABR for the entire region. Which of the following
ranges should be used for the five regions for the UK deployment of smart
meters? (Choose one.)
Requirements/constraints from supplied documentation:
We have five regions/areas, as you know, but we want to have the ability to
scale to 256 max if we expand into Europe in the future.
a.
Region 1 (OSPF area 1) – 2022:ccde::/40
Region 2 (OSPF area 2) – 2022:ccde:0100::/40
Region 3 (OSPF area 3) – 2022:ccde:0200::/40
Region 4 (OSPF area 4) – 2022:ccde:0300::/40
Region 5 (OSPF area 5) – 2022:ccde:0400::/40
This is correct. This is the optimal summarization, and you should see
that you can create up to 256 regions from this.
b.
Region 1 (OSPF area 1) – 2022:ccde::/40
Region 2 (OSPF area 2) – 2022:ccde:0001::/40
Region 3 (OSPF area 3) – 2022:ccde:0002::/40
Region 4 (OSPF area 4) – 2022:ccde:0003::/40
Region 5 (OSPF area 5) – 2022:ccde:0004::/40
This is incorrect. This is an example of /48 summarization and not /40.
c.
Region 1 (OSPF area 1) – 2022:ccde:0001::/40
Region 2 (OSPF area 2) – 2022:ccde:0002::/40
Region 3 (OSPF area 3) – 2022:ccde:0003::/40
Region 4 (OSPF area 4) – 2022:ccde:0004::/40
Region 5 (OSPF area 5) – 2022:ccde:0005::/40
This is incorrect. This is a further example of /48 summarization and not
/40. It does tie in nicely with the OSPF area numbers, though, so you
could end up being led to select this option if you’re under time
pressure.
d.
Region 1 (OSPF area 1) – 2022:ccde::/40
Region 2 (OSPF area 2) – 2022:ccde:0000:0001:/40
Region 3 (OSPF area 3) – 2022:ccde:0000:0002:/40
Region 4 (OSPF area 4) – 2022:ccde:0000:0003:/40
Region 5 (OSPF area 5) – 2022:ccde:0000:0004:/40
This is incorrect. This is an example of /64 summarization and not /40.
If you have answered this question correctly, you have scored one point.
Email #10
Hi.
So we’re looking good on the network; however, I’ve had the members
of the application team in a workshop this morning, and they have
explained to me that initially they believed the meters would be coming
back to a central server system called SMARTS that would
accommodate all the meters. We have planned sending their data every
five to ten mins, at random intervals. Bit of a curveball—they have
completed their own load testing in a lab environment and, when they
scale the figures up, they believe the system will be overloaded. They
have requested we provide some load balancing to spread the load to
five separate servers behind a frontend VIP address that we push to the
meters over an API through the encrypted links you have designed.
They stated we could still run a single non-load-balanced system, but
this would require serious upgrading of existing systems, and this
would incur a three-month delay and cost would be double that of an
appliance-based load-balanced solution with the additional lower spec
servers. It’s a little frustrating this late in the day to get this
requirement, as we don’t have the budget approved, and it will be
difficult to get the sign-off for additional spend. They have told me it’s
effectively a simplex traffic flow from the meter to the VIP of the
application, which registers power usage. Each data packet from the
meter apparently includes the unique meter reference (customer ID)
and required data in a UDP format that the application can then
forward to backend systems, which are used to generate customer
invoices.
The app guys went through some eventualities if the meter fails or has
its IPv6 address changed for any reason, and apparently these are non-
issues, as the unique meter reference (customer ID) is associated with
the customer data and not the source IPv6 address. I’ve drawn up a
picture they made up on my whiteboard. (I would have just sent you a
photo of it, but as you know, app guys can’t draw anywhere near as
well as network guys.)
For your info, I’ve looked into the appliance-based load balancers the
app guys mentioned from a well-respected vendor. They can scale to
the number of required flows (they support stateful and non-stateful
flows, and all features you would expect from a high-end load
balancer). We are looking at and support IPv6. The resilience is stated
as active/standby, so when one fails, the other takes over, but I think it
could be better if we have to use them to have two VIPs that we push
out to meters. Kind of alternate APNs or regions for one VIP and the
other. This way, we could improve our scale and have the balancers
backing each other up, so one is active for one VIP and one for the
other while backing up each VIP. Alternatively, the switches in our DC
apparently can also provide a basic non-stateful load-balancing
mechanism called Traffic Scatter, providing frontend VIPs for L3 and
L4 traffic at wire rate and just sending out to servers at the backend
based on health/availability of the real server, as the dedicated load
balancers do. It looks like they can scale, provide a resilient VIP
service, and handle the numbers, and we don’t need any license
upgrade to enable this. It seems pretty basic in comparison, and they
state it supports the VIP frontend, but only Direct Server Return. I need
you to recommend which way to go, as this has to work Day 1, and we
have to accommodate this change as quickly as we can.
Thanks!
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 19
How can Squid accommodate the load-balancing requirement detailed in the
email? (Choose one.)
Requirements/constraints from supplied documentation:
We have planned sending the meters’ data every five to ten mins, at random
intervals.
They have requested we provide some load balancing to spread the load to
five separate servers behind a frontend VIP address that we push to the
meters over an API through the encrypted links you have designed. They
stated we could still run a single non-load-balanced system, but this would
require serious upgrading of existing systems, and this would incur a three-
month delay and cost would be double that of an appliance-based load-
balanced solution with the additional lower spec servers.
We don’t have the budget approved, and it will be difficult to get the sign-off
for additional spend. They have told me it’s effectively a simplex traffic flow
from the meter to the VIP of the application, which registers power usage.
Each data packet from the meter apparently includes the unique meter
reference (customer ID) and required data in a UDP format that the
application can then forward to backend systems, which are used to generate
customer invoices.
The app guys went through some eventualities if the meter failed or has its
IPv6 address changed for any reason and apparently these are non-issues, as
the unique meter reference (customer ID) is associated with the customer
data and not the source IPv6 address.
I think it could be better if we have to use them to have two VIPs that we
push out to meters. Kind of alternate APNs or regions for one VIP and the
other, and this way we could improve our scale and have the balancers
backing each other up so one is active for one VIP and one for the other
while backing each VIP up.
Alternatively, the switches in our DC apparently can also provide a basic
non-stateful load-balancing mechanism called Traffic Scatter, providing
frontend VIPs for L3 and L4 traffic at wire rate and just sending out to
servers at the backend based on health/availability of the real server, as the
dedicated load balancers do. It looks like they can scale, provide a resilient
VIP service, and handle the numbers, and we don’t need any license upgrade
to enable it. It seems pretty basic in comparison, and they state it supports the
VIP frontend, but only Direct Server Return. I need you to recommend
which way to go, as this has to work Day 1, and we have to accommodate
this change as quickly as we can.
If you have answered this question correctly, you have scored one point.
Email #11
Hi.
Thanks for the advice on the load balancing. Let’s hope the scatter
doesn’t shatter under load! While you’ve been busy on the network
design, I’ve had some questions come in from our engineering team
about how we should go about setting up the home area network
(HAN), which is associated to the smart meters. Obviously, we don’t
need to set up a network in every consumer’s home. This is just the
technology that the smart meter uses to communicate with a display
unit that gives a real-time reading of the power usage that can be
placed wherever the consumer chooses within their home. Apparently,
we have options in how to deploy this communications link, which just
piggybacks off the /64 IPv6 prefix the meter is assigned, so it’s quite
straightforward, I believe. (Famous last words!) We want to start a
pilot, so if you can assist with the HAN info, that would be great.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 20
Assist Squid in deciding which is the optimal technology to use for the HAN
between the smart meter and the display unit, which would be placed within
the consumer’s property to view real-time power usage provided by the
smart meter. Fill in the protocol from the following list to match the
associated distance for that protocol, as listed in the table.
Standard Zigbee 2.4GHz
Dual-band Zigbee 2.4GHz/868MHz
Bluetooth
Ethernet CAT5
2.4GHz Wi-Fi
The protocols and associated distances are as follows:
Protocol Distance
If you have answered this question correctly, you have scored one point.
Question 21
Squid decided to implement a standard Zigbee service on the HAN network
for the pilot and encountered interference in all areas of the pilot location and
lower-than-expected range in areas of the pilot location that incorporated
thicker-than-average walls. It is now concerned this could be representative
of the user experience of the majority of consumers in the production rollout.
Which of the following changes would you recommend in order to improve
the HAN network usability while not introducing a management overhead on
the running of the service? (Choose one.)
Requirements/constraints from supplied documentation:
Squid decided to implement a standard Zigbee service on the HAN network
for the pilot and encountered interference in all areas of the pilot location and
lower-than-expected range in areas of the pilot location that incorporated
thicker-than-average walls.
Improve the HAN network usability while not introducing any management
overhead on the running of the service.
Feature Meter 2: Zenith V3
If you have answered this question correctly, you have scored one point.
Email #12
Subject: Implementation
Hi.
Thanks for the advice on the HAN. We will get the team to complete
the pilot on your recommendation of dual-band Zigbee. While the team
finishes up, I need you to help with an implementation plan to enable
our service. Let’s get the service up and running!
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 22
To assist Squid with delivery of its service, arrange the implementation tasks
in sequence order.
The correct order is as follows:
If you have answered this question correctly, you have scored 2 points.
Partial marks can be awarded for specific sequencing.
Email #13
From: Mich Fara-Day
Hi.
Thanks for your help. We’re finally live! I was expecting the directors
to be really excited this Monday morning, but they were fairly neutral
about the whole thing, as it has been an expensive project. It definitely
brought me down to earth after a long weekend, but we couldn’t have
done it without your help.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 23
Which would be the best process for migration of a customer switching
supplier and moving the smart meter away to a new supplier with minimal
effort for Squid? (Choose one.)
Requirements/constraints from supplied documentation:
Moving the smart meter away to a new supplier with minimal effort for
Squid.
I did read about an Internet-based attack in the Ukraine power network some
time ago, and that cannot be permitted here. I’ll need you to make it as
secure as possible; therefore, everything should be encrypted outside of our
own DC.
a. Have the new supplier’s onsite electrical engineer factory reset the
smart meter and install a new SIM card configured for new supplier at
time of cutover.
This is the optimal answer. Based on the alternatives, this requires the
minimal amount of effort on Squid’s part as it wouldn’t need to send out
an engineer and would simply need to offboard the customer on its
system. The new supplier would pick up the overhead and deal with the
commissioning of the meter onto its own network.
b. Apply a gateway between Squid’s co-lo and major supplier networks to
allow traffic to traverse between Squid and the new supplier’s network
for meter readings for migrated customers.
This is incorrect. If this was a separate enterprise that managed a single
country-wide smart meter network that then partnered with major
suppliers to access consumers’ meters, this approach would be feasible;
however, this is Squid’s own private WAN, and there would be
numerous security concerns with this approach.
c. Mail out new 4G SIM cards for the consumer to swap over, which will
be configured to connect to the new provider’s smart meter network.
This is incorrect—and Squid could end up with a lawsuit when the
consumer accidently electrocutes themselves!
d. Provide Internet access to the Squid co-lo network or modify the private
APNs to public APNs with local Internet access so new suppliers can
route to the meters using the IPv6 globally unique addressing structure
configured on the meters for direct meter reading access over an API
call.
This is incorrect. Squid requires everything outside of its co-lo to be
encrypted and does not want the meters to be visible on the Internet.
If you have answered this question correctly, you have scored one point.
Email #14
Subject: EVs
Hi.
The new system is working really well. We’ve managed to free up our
field staff, etc., and automate a lot of deployment for consumers who
are keen to get a smart-metered service. The board believes we now
have the capacity to expand our offerings, so we’re setting up some
marketing to deploy our own EV charging points for vehicles at
consumer locations. We see two types of customers—one already has
the smart meter, and we can offer incentives for them to buy a charging
point from us, and one who doesn’t use us as a supplier at all, and we
set them up from scratch. Either way, we need to have an option to
connect each user type to our systems in the most cost-effective
manner.
We envisage the EVs using the same application as the smart meters in
the co-lo with identical traffic flow and security requirements.
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 24
Which of the following options provide optimal connectivity for the new EV
charging points to Squid’s central system for billing for each customer type?
(Choose two.)
Requirements/constraints from supplied documentation:
We see two types of customers—one already has the smart meter, and we can
offer incentives for them to buy a charging point from us, and one that
doesn’t use us as a supplier at all, and we set them up from scratch. Either
way, we need to have an option to connect each user type to our systems in
the most cost-effective manner.
The EV charger points have the same specification as the Zenith V3 meters
we are using for WAN and HAN, and you should still have the specification
if you need any data.
We envisage the EVs to use the same application as the smart meters in the
co-lo with identical traffic flow and security requirements.
Smart meters use a form of unnumbered IPv6 addressing from their main /64
prefix over the APN, so we don’t need to worry about any prefixes for the
APN/WAN. The /64 prefix will also be used for the HAN for displays and
any other devices that require access to the meter or further connectivity to
our systems.
We will get the team to complete the pilot on your recommendation of dual-
band Zigbee.
Question 25
If Squid creates a service for public EV charging points in public locations
such as car parks and shopping malls, should the connectivity solution differ
from a new customer EV charging point for a consumer? (Choose one.)
Requirements/constraints from supplied documentation: N/A
If you have answered this question correctly, you have scored half a point.
Email #15
Subject: EVs
Hi.
We appreciate all of your help on the design, and we can carry on with
the charging points when you move on!
Rgds,
Mich Fara-Day
CTO Squid Energy
Question 26
How would you recommend Squid facilitate the voice connectivity
requirement for the pilot? (Choose one.)
Requirements/constraints from supplied documentation:
A company called Jaketel offers 4G coverage to 94% of the UK and can
provide us with data-only SIMs that we can fit into the smart meters we
deploy.
Our devops team believes it can create an app for a consumer that can
connect to the charger over Bluetooth and allow the user to talk directly to
the help desk over our secure WAN network (a form of push to talk). This
could be a great way to showcase our technology and innovation and
increase our UX and customer service reviews.
Devops thinks it can get a beta out in two weeks. We can modify a call center
application to accept voice if we need to quickly, so we’re keen to test this on
a pilot as soon as we have the beta.
If you have answered this question correctly, you have scored one point.
Summary
Although this lab is primarily based on IoT, you can see that you don’t
actually need to be an expert in this field, as long as you have an
understanding of the technology as outlined in the V3 Blueprint. You should
be able to rely on your routing and core subject knowledge to be successful
in this lab. IoT is fairly complex and covers a huge area of connectivity
requirements, with scale and security at the forefront, so it’s an ideal scenario
for CCDE practice.
If you haven’t worked on an IoT design previously, then hopefully you have
gained some further insight and can research specific areas that may need
strengthening. As per other labs it is crucial to connect with the scenario and
get into the flow of it in order to be successful. If you do want to score
yourself, there was a maximum of 28.5 points available in this lab. If you
scored over 20 points (approx. 70%), you have a very good chance of being
successful in your CCDE exam.
Chapter 3
Practice Lab
During this practice lab, you are the network architect for the Bank of
Jersey.
BankExt Network
The external network is composed of a public-facing network, where ISP
routers and third-party connection routers that provide market feeds and
B2B connectivity are sited. Switches in the network are purely Layer 2 and
propagate the local VLANs between DC locations, providing an
active/standby facility for firewalls using VRRP and external routing to
third parties using HSRP. Firewall state and high-availability VLANs are
propagated between locations using non-IP-addressed VLANs. Third-party
and B2B routing is static from the firewall to the HSRP addresses of
routers, and multiple IPsec VPNs terminate on the external-facing firewalls
for B2B connections over the Internet.
The following table details the VLANs in use within the BankExt network.
VLAN ID Description
20 Third-party connectivity
21 ISP connectivity (public range)
22 External firewall state
23 External firewall HA
24 External management
The primary location for all devices on the BankExt network is the St
Helier DC. In the event of a firewall failure in the St Helier location, the
backup stateful firewall takes over service in the Priory Inn DC, the ISP
routers and third-party routers for services such as SWIFT and Reuters
remain active in St Helier, and cross-site routing is maintained until the
firewall can be restored. If the entire St Helier site fails, all services
dynamically fail over to the Priory Inn location. VLANs are trunked to the
BankExt firewalls over EtherChannels. 802.1w STP is utilized on the Layer
2 1Gbps links between DC locations in a default configuration to ensure a
loop-free topology between locations.
The uplink to the ISP from the BankExt network is 2Gbps from each
location within an EtherChannel configuration. For egress traffic from the
Bank, a default route is used within the network to point to the HSRP
address of the ISP routers with the HSRP active ISP router sited in St
Helier. For ingress traffic to the Bank, the ISP uses AS Path pre-pending on
the Priory Inn router to ensure all traffic is routed by default toward St
Helier from the Internet.
Security policy dictates that external connections are permitted only to flow
into or through the BankExt network to the BankDMZ network and not into
the Banknet network.
BankDMZ Network
Switches within the BankDMZ network are purely Layer 2 and propagate
the local VLANs between DC locations, providing an active/standby
facility. A firewall sandwich topology is created within the BankDMZ
network with different vendor firewalls from the BankExt network, but
providing the same VRRP and state failover characteristics. A Remote
Access Services (RAS) VPN concentrator is terminated in a dedicated
VLAN for employee remote access within the zone. The BankDMZ
network hosts public-facing production and non-production services in a
mix of load-balanced and non-load-balanced services from load balancers
that are also located within the BankDMZ network. Dedicated VLANs
provide frontend VIP connectivity for the load-balanced services. Backend
VLANs provide direct server access for non-load-balanced services and
connectivity for the backend servers for the load-balanced services within
the network. VLANs are trunked to the BankDMZ firewalls over
EtherChannels. 802.1w STP is utilized on the Layer 2 1Gbps links between
locations in a default configuration to ensure a loop-free topology between
sites.
The following table outlines the VLANs in use within the BankDMZ
network.
VLAN ID Description
12 RAS VPN
13–20 Public production services – VIP frontend
21–30 Public production services – server VLANs
31–38 Public non-production services – VIP frontend
39–50 Public non-production services – server VLANs
99 DMZ firewall state
100 DMZ firewall HA
101 DMZ management
Banknet DC Network
The internal DC network and DCI are primarily Layer 2 with Multi Chassis
EtherChannel (MEC) technology upgraded from a legacy spanning tree
topology. Services are spanned at Layer 2 between DCs, providing the
facility for VM migration and dynamic failover of service. The DC LANs
are connected over a 20Gbps DCI MEC between the core switches. The
core switches provide Layer 2 aggregation for server and user access within
each DC and all Layer 3 HSRP gateway access between locations. Multi-
area OSPF is used to route between DCs over the DCI for nonspanned
VLANs and to provide a backup between locations in the event of a WAN
failure at either DC location.
There are approximately 200 VLANs in use within the DCs, with the
majority of VLANs spanned between locations, with a limited number of
local VLANs in each DC.
Synchronous data replication is used for the Bank’s mainframe systems
running active in St Helier and standby in Priory Inn, connected to a
separate SAN, which requires 2ms (millisecond) or less RTT for successful
write replication using FCoIP over the Banknet network between systems in
each DC.
The compute environment is primarily VM, with a large number of legacy
bare-metal servers present. IP voice call managers and appliance-based load
balancers connect directly into the core network switches.
The following figure outlines the DC networks.
Banknet WAN
The internal WAN network is provided by Jerseytel, with a single Layer 3
MPLS VPN connecting all branch and campus locations to the DC
locations. Jerseytel individual CE routers connect to each DC LAN side
using dual 1Gbps interfaces connected in an EtherChannel, providing
2Gbps to the DC at each location and 1Gbps uplink to the Jerseytel
network. DC prefixes are advertised to the MPLS network using eBGP
from each DC, with MED values set to ensure the MPLS network sends all
traffic to the DC prefixes via the active St Helier DC location. Traffic
egressing each DC from spanned VLANs to the WAN uses the St Helier
WAN connection due to St Helier being the HSRP active location for the
spanned VLANs. Remote branch and campus locations are dual-homed to
the MPLS WAN, with connection speeds varying depending on the size and
requirements of each location. All links are configured for load sharing.
QoS is configured on the network with four classes for voice traffic,
mission-critical applications, transactional data, and a default class.
The WAN provides access for the Guernsey head office in St Andrew,
which acts as hub site for Guernsey traffic with dual-routed submarine
circuits to Jersey.
The following figure illustrates the WAN network.
Network Management
All management tools that access the infrastructure are sited in a separate
Ethernet out-of-band management network that spans both DCs. Firewalls
are used between the tools VLAN and multiple VLANs that connect to the
management ports of infrastructure. The firewall connects to the production
Banknet network in order to provide access to remote WAN locations. The
Bank has a policy that only management tool hosts can connect to the
infrastructure based on IP address and specific management protocols.
Email #1
As you would have seen, we have had the findings published from the
UK consultants. The CTO was expecting some issues but wasn’t
prepared for the number of issues we ultimately need to address. I’ve
just had a one-to-one with him, and his main focus will be on
providing business continuity successfully following the
recommendations in order to build an architecture capable of
delivering our new initiative of the new online account initiative,
which we are going to call “Channel.” Ultimately, it appears we are
going to require a new DC location and will mean moving away from
the existing facility in Priory Inn (we may be able to use a separate
new enhanced facility in the Priory Inn area, however) while we
maintain a presence in St Helier. I need you to help recommend the
best possible new location. You’ll find below some locations that the
CTO has been investigating with associated costs. We appreciate that
this is going to be a large investment and that our existing technology
is unlikely to be fit for this purpose, so we will also look at providing
a new DCI network between locations as well as a new DC LAN in
each location. The CTO has advised we should be looking to provide
double the previous bandwidth between locations for our Banknet
network, which includes the replication of systems. So the A end
location can remain at the St Helier DC, and we’re going to continue
to use synchronous replication for our systems and main banking
application. The CEO has insisted we use Jerseytel for connectivity
(I’m pretty sure he plays golf with the Jerseytel CEO and he banks
with us). We were advised we would need a minimum of two
diversely routed circuits to ensure there are no single points of failure
(all circuits will be “wires/fiber only” without SP infrastructure with
exception to MPLS circuits, and these will be provided with a
managed CPE device). So, to reiterate, this is purely for Banknet.
We’ll sort out the BankExt and BankDMZ networks once we
determine the best course of action for Banknet.
Tim Jacobson
Network Manager
Bank of Jersey
Lab Questions
Question 1
Which circuit type and new DC location provides the most suitable option
for the Bank, with minimal cost for the new DC location? (Choose one
option from A–D for the circuit type and one option from E–G for
location.)
Email #2
Subject: New DC
Hi.
Thanks for your recommendation. The CTO has investigated the
options and looked at your findings and has a preference for Guernsey
using 100Gbps circuits, but the hosting company in Portsmouth has
offered us a great incentive to use its location going forward. This,
paired with the enhanced geographical separation it offers, makes it
look like an attractive option. The hosting company has said it can
light up additional channels really quickly if we go with its DWDM
option, providing us with what we need for Day 1 and future scale.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 2
Are there any potential issues with using Portsmouth as a location for the
backup DC? (Choose one.)
Email #3
From: Tim Jacobson
Subject: New DC
Hi.
Tim Jacobson
Network Manager
Bank of Jersey
Question 3
Based on the new information supplied for the DWDM circuits, is there any
risk associated with the Portsmouth location being selected as a standby DC
location for the Bank of Jersey? (Choose one.)
a. Yes
b. No
Question 3.1
If you answered Yes to Question 3, what is the potential issue with
Portsmouth as a location? (Choose one.)
Email #4
Hi.
Good spot on the potential replication issue on the B route to
Portsmouth. That route worked out to be 280 km, and using a rough
calculation of 1ms per 100 km for a round trip, we would have been
just over our limit for the replication application. I’ve taken your
information to the CTO and had a session with him. We were lucky
enough to be able to get the CEO on a video session, and the new
direction is to revert to Guernsey as a location and use dual 100Gbps
links as they offer great performance and scale. He’s going to clear it
with the banking regulators and provide some of the information
about our actual physical location in Guernsey being high enough
above sea level to not be a risk of flooding, etc., and ensure we have
sufficient geographical separation for business continuity. The circuits
are more expensive, but the CEO is comfortable we can secure the
budget based on the additional scale and performance that they
provide.
License upgrade Gold: Stacking capability and QoS for £5K per
switch
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 4
In order to address the bandwidth limitation in the BankExt and BankDMZ
network, which is the optimal option? (Choose one.)
Email #5
Hi.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 5
In order to address the third-party router issue for routers connecting to
VLAN2 in the BankExt network, what would a prerequisite be in order to
mitigate further attacks? (Choose one.)
Question 5.1
If you selected Answer A in Question 5, please validate you answer.
(Choose one.)
Question 5.2
If you selected Answer B in Question 5, please validate you answer.
(Choose one.)
Question 5.3
If you selected Answer C in Question 5, please validate you answer.
(Choose one.)
Email #6
Hi.
Thanks for sorting out the issues. So, since we have decided on
Guernsey as our new secondary DC location, we have ordered dual
100Gbps circuits from St Helier, which will be delivered with
complete resilience. With all of the work going on, we’ve completely
neglected the fact up to now that we should also provision dual
circuits for our BankExt network and BankDMZ network. The costs
are actually looking very prohibitive to provision an additional four
circuits, so I’d like you to investigate alternative options so we can
run all networks over the dual 100Gbps circuits. There will be a huge
amount of capacity with the new circuits and the potential to save a
significant amount of shareholders’ funds if we can offer separation in
a way that will keep the regulators happy.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 6
Complete the following table to assist the Bank of Jersey with its
assessment of potential technologies to provide separation and connectivity
of cross-site BankExt, BankDMZ, and Banknet networks over the dual
100Gbps DCI links being provisioned between St Helier and Guernsey
DCs. Place an X in each cell if the technology per row offers the features
detailed in the columns.
Email #7
From: Tim Jacobson
Hi.
Thanks for the info. I’ve had time to go through this, but I need you to
recommend the right technology for separation of networks that
provides us the flexibility to run an additional DC in conjunction to St
Helier and Guernsey if we need to in the future. I don’t know right
now if we want to—I just don’t want to limit ourselves to having to
change the technology if we do decide to at a later date. The
technology would need to provide separation of all of our networks
combined on one effective network and should be compatible with
what technology we use to actually provision ports in each network. I
need you to be confident the technology can also limit our failure
domain to a single DC if we have any Layer 2 type issues, even
though we still need to propagate Layer 2 between DCs. As
mentioned, we have a preference for separation without having to buy
additional circuits for BankExt and BankDMZ DCIs. (I’ve sounded
out Security, and they aren’t too happy. However, if we can prove
physical and logical separation, they said we are compliant with the
security policy.)
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 7
Which of the following technologies is best suited to provide connectivity
between St Helier and the new DC location in Guernsey for the Bank based
on its requirements for new networks and use of dual 100Gbps circuits?
(Choose one.)
a. QinQ
b. H-VPLS
c. VXLAN EVPN multipod
d. VXLAN EVPN multisite
Question 8
Bank of Jersey decided to run VXLAN EVPN multisite technology to
provide flexibility for the future and to run multiple network overlay
instances over a Layer 3 fabric. What is a recommended approach for the
deployment to provide separation of legacy network zones to meet the
Security department’s requirement? (Choose one.)
Email #8
Hi.
We will need some border leaf switches dedicated for services for
each zone, such as load balancers and zone firewalls. The DCI links
can be terminated on border leaf switches also. Border leaf switches
can be 48x 10Gbps leaf switches that we purpose as border leafs—I
will need you to determine which license is required for them.
All leaf switch options come with six uplink ports onboard and just
require the necessary optics purchased to enable the ports (as per the
spine ports, they will operate at 40Gbps or 100Gbps, depending on
which optics are inserted).
Optics: 40Gbps optics are £1.5K and 100Gbps optics are £2K.
OSPF
IS-IS
MP-BGP
VXLAN
EVPN multipod
EVPN multisite
vPC (multi-chassis EtherChannel)
MACSEC
IPsec
GETVPN
GRE
Multicast
OSPF
IS-IS
MP-BGP
VXLAN
EVPN multipod
EVPN multisite
MACSEC
IPsec
GETVPN
GRE
Multicast
Here are the latest computer hardware device counts required for Day
1 (per DC):
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 9
Draw out the physical topology of the required EVPN VXLAN network
infrastructure for one DC to consolidate the BankExt, BankDMZ, and
Banknet networks to support Day 1 services in the most cost-effective
manner. Use as many leaf switches, border leaf switches, and spine
switches as necessary, based on the requirements provided, and select the
most appropriate optic speed and count.
Question 10
The VXLAN design was submitted to an Architectural Review Board
within the bank, and a comment was documented that suggested super-
spines would be required within the design in order to provision the
BankExt, BankDMZ, and Banknet networks over the same fabric. What
would your response be to the comment? (Choose one.)
Email #10
Hi.
Thanks for the design. I’ve got one of the guys to document it. He
initially thought we could reduce leaf count by consolidating some of
the BankExt and BankDMZ ports into the same device and allocate
ports per VRF, but I told him Security requested physical and logical
separation. We can obviously do this if we use distinct switch pairs
per environment for physical separation and use the underlay fabric
for the logical separation and tunnel VXLAN over the top per
environment. The vPC fabric peering enabled by purchase of the Gold
license has saved a good sum and reduced the optic and fiber patch
requirements between leaf switch pairs considerably in order to
provision server resiliency per leaf switch pair. I hadn’t realized
initially we would need a set of border leaf switches per
environment/network zone, but it makes sense if we apply services for
each zone such as firewalls or load balancers on a single pair of
border leaf switches, then we wouldn’t meet our security requirement
of providing physical separation between network zones. It seemed to
make sense to connect the DCI links into the Banknet border leaf
switches, as we have the majority of services running on this network,
and this does ensure logical separation between zones, as it’s all
VXLAN overlay by the time traffic flows over the DCI links.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 11
If the Bank of Jersey’s Security department changed policy and decided to
permit BankExt networks and BankDMZ to share the same physical leaf
switches and then applied configuration mitigation for Layer 2 security to
block access between networks, is there a further issue that would need to
be rectified for this change in policy? (Choose one.)
a. Yes
b. No
Question 11.1
If you chose Yes for Question 11, please validate your answer. (Choose
one.)
Question 11.2
If you chose No for Question 11, please validate your answer. (Choose
one.)
Question 12
Complete the following table to assist Bank of Jersey engineers in creating
VNIs for the BankExt, BankDMZ, and Banknet networks. Create any
VNID using seven digits, with the last four digits used for VLAN numbers.
Email #11
From: Tim Jacobson
Hi.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 13
Do you have sufficient information to make a design decision for multi-
destination BUM traffic forwarding to run using multicast or ingress
replication for the new network? (Choose one.)
a. Yes
b. No
Question 13.1
If you answered Yes for Question 13, which replication mode would you
select for multi-destination BUM traffic? (Choose one.)
a. Ingress replication
b. Multicast replication in the underlay
Question 13.2
If you answered No for Question 13, what further information do you
require? (Choose one.)
a. Additional leaf switch CPU utilization for predicted traffic baseline for
ingress replication
b. Which multicast modes are possible for multicast forwarding in the
underlay
Email #12
From: Tim Jacobson
Hi.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 14
The Bank has decided to implement multicast replication for BUM traffic
based on a clear CPU reduction in comparison to ingress replication rather
than request a design recommendation. When it comes to implementation,
however, what would be a benefit of using BiDir as opposed to ASM for
the underlay multicast protocol to transport BUM traffic between VTEPs
across each DC? (Choose one.)
Email #13
Hi.
We’ve almost fallen down the same hole as before in the legacy
network, providing the Banknet as a single network with production
and pre-production services as called out by the consultants. I need
you to work out how we can provide a pre-production environment
within Banknet that can communicate without any policy control to
the production environment within Banknet, typically within the same
VLAN. Unfortunately, due to legacy reasons, we have some prod and
pre-prod compute services running on the same VLANs, and the
server guys are telling me it would take six months to re-address and
make the required application changes, and that’s too long. We want
to offer the best possible protection between environments, so a Layer
2 type STP issue or broadcast issue in pre-prod can’t affect prod.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 15
How can Banknet production and pre-production compute services be
provisioned on the new network, providing mitigation from Layer 2
broadcast type events in either network propagating into each other?
(Choose one.)
Email #14
Subject: Implementation
Hi.
Thanks for the info. We will create some compute PODs with separate
production and pre-production PODs with our leaf pairs. It should
look like this:
By the way, Jerseytel has informed us the DCI circuits are now in
place. Apparently, it was a simple job of splicing in a few locations,
as it had fiber in the ground and between Jersey and Guernsey Islands
already. We are all tested, error free, and latency is good, so we will
have no issues with our replication. We need you to plan the
migration of services to the new DC while we wait for the network
infrastructure to be delivered from the UK. Internet and WAN circuits
have been ordered for the new DC and will be here in time for
migration. (We don’t need new circuits for St Helier. We can just re-
patch these from legacy to new networks at time of migration.)
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 16
Place the following implementation/migration steps in order to allow the
Bank of Jersey to migrate to the new network infrastructure (not all steps
are required).
Configure VLAN translation for overlapping VLANs on each network
on leaf switches.
Connect Layer 2 trunk from legacy Banknet network to new Banknet
border leaf switches in St Helier, connect Layer 2 trunk from legacy
BankDMZ network to new BankDMZ border leaf switches in St
Helier, and connect Layer 2 trunk from legacy BankExt network to
new BankExt border leaf switches in St Helier.
Shut down Internet/WAN circuit(s) in Priory Inn.
Enable new Internet/WAN circuit(s) in new Guernsey DC and migrate
St Helier Internet/WAN circuit(s) in St Helier.
Connect Layer 3 routing links from legacy Banknet network to new
Banknet border leaf switches in St Helier.
Install spine switches in each DC.
Enable Anycast gateways in VXLAN for Banknet VLANs.
Install leaf switches in each DC and configure separate VRFs for
BankExt, BankDMZ, and Banknet networks within VXLAN.
Migrate inner and outer FWs and RAS infrastructure to VXLAN
network on appropriate border leaf switch.
Shut down HSRP gateways in the legacy Banknet network for each
VLAN.
Install border leaf switches and enable DCI circuits in each DC, and
test between DCs on the Banknet border leaf switches.
Migrate physical compute environment from St Helier and Priory Inn
to new DCs.
Email #15
Hi.
The migration went really well. I got our guys to script the larger
number of VLANs we migrated in Banknet in terms of shutting down
and re-enabling the Layer 3 side, and we literally had a 1 second blip
per VLAN. The users didn’t even notice, and we had no related
tickets, which was great news. However, good news is usually
accompanied with bad, unfortunately. We’ve had the regulators in
post-migration, and we walked them through the new design and what
we have accomplished. While their overall impression was positive in
regard to the new network and improvements to our business
continuity, they have made the following comments:
Please ensure you are compliant with point number 1 within four
weeks and have a plan in place for points 2 and 3, as legislation could
change with short notice.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 17
The financial regulator has stated that all of the Banknet network-specific
switches that serve the production environment should be placed into a
protective caged environment to ensure they are protected from
unauthorized access. Highlight on the supplied network diagram where the
cage should extend to.
Question 18
If the Bank of Jersey were to encrypt traffic over the DCI links, which
technology would you recommend that would be compatible with OSPF if
this IGP was used in the underlay fabric? (Choose one.)
a. GETVPN
b. IPsec
c. MACSEC
d. GRE/IPsec
Email #16
Subject: Perimeter FW
Hi.
So, as you are aware, the auditors have raised a concern that the
Banknet network is implicitly open once you are connected to the
WAN, and they are recommending we place perimeter protection
around our applications in the DCs. Ideally, I would like to add a
firewall in each branch location, but unfortunately that isn’t going to
happen. We can get budget for DC/WAN perimeter firewalls (I want
to do this with the minimal number possible, as they are expensive)
because we want to future-proof it by investing in firewalls with a
next-generation feature set. The firewalls we want to use have 10Gbps
throughput, so they are fine for the WAN, which connects at 10Gbps
into the service provider’s network. The firewalls need a dedicated
Layer 2 connection between them for state and high availability. They
need to support transparent and Layer 3 routed mode. For high
availability, they need to support active/standby, where in the event of
a failure, the standby device takes over the active IP address and only
the active IP address is configured on each firewall. In terms of
routing, they can run static routing, OSPF, or iBGP, which is great, as
we need the solution to still allow for the dynamic routing from the
WAN into the DC. In terms of current setup, we have dual P2P /30
links (on contiguous prefixes) between the WAN CE on each site to
the border leafs and eBGP between the borders and the MPLS CEs.
I’m told all devices support L2 EtherChannel, and as you know, we
can run vPC multi-chassis EtherChannel on the borders if required at
L2, but they don’t support L3 EtherChannel. In the event of a failure
scenario (which could mean failing over between DCs due to a
firewall or WAN failure), we need existing sessions to be maintained.
We don’t have a clue at this point what we should be setting the rule
base to initially, so this is more of a tick-in-the-box exercise, and we
will come back to define policy once we are able to monitor and
baseline flows using some tooling. We can add different prefixes if
required into the topology over and above the existing /30s in use, and
I have a preference for simplicity with minimal change to the existing
environment.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 19
Which of the following designs would be optimal for the Bank to control
north/south flows into the DCs for Banknet services from the WAN?
(Choose one.)
Email #17
Hi.
Just when I thought our guys were gaining confidence with the new
network, we’ve had a serious issue. They were making a change on
the production network last night, migrating some of the servers
responsible for the applications serving the ATM cash machines from
the legacy network, and they ended up causing an outage in the entire
ATM network. We had some unhappy customers who were unable to
withdraw cash, but the damage was limited due to being an early
morning change and backing it out quickly when they realized what
had happened. The RCA shows some changes missed out on the
border leaf switches and some configuration not being accepted
correctly. I went through the detail and couldn’t believe the amount of
configuration required for the actual change for VXLAN parameters.
The guys apparently scripted it due to the size and complexity and
ended up creating the issue themselves! We simply cannot find
ourselves in this position again. I have read that the infrastructure is
compatible with network programmability, and I’d like you to look
into how we can set up some automation to eliminate human error and
introduce efficiencies. We can also enable the telemetry functionality
that they have and move away from SNMP possibly. I have a couple
of developers I can bring in from the dark side (application
developers), when required, who can code. They can work with the
network team to define what is required, so maybe we can start our
own devops team if this works out. I’ve got Yin and Yang stuck in my
head for some reason after my first conversation with the developers
—can you believe one of them is called Jason! Anyway, have a think
and let me know how you believe we should begin.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 20
In order to initiate automation, the developers need to know which
individual YANG model to use for the new infrastructure. Which of the
following models would be optimal? (Choose one.)
a. Native
b. OpenConfig
c. IETF
d. Mix of models
Question 21
In order to deploy the automation, the developers have recommended an
OpenDaylight platform to use as a resilient SDN controller and portal for
network programmability of the VXLAN infrastructure within the
management network. Complete the following table in order that a project
task list can be generated to deliver automation for the network
infrastructure.
OpenDa Spin Leaf DC1 DC2 Manageme
ylight e Swit Manage Manage nt Network
Controll Switc ches ment ment Firewall
er hes Networ Networ
k k
Task Required Check the box below if the task is required on the
devices/locations above.
Enable
Netconf/Restconf.
Question 22
The Bank of Jersey wants to simplify multiple/recurring API calls from the
SDN controller to individual devices for configuration and management
purposes while keeping the required authentication as simple and secure as
possible. Which authentication method should the Bank choose? (Choose
one.)
a. Basic Authentication (native)
b. API Key – String
c. API Key – Request Header
d. API Key – Cookie
e. Custom token
Question 23
The Bank is wary of atomicity, if one or both of the OpenDaylight
controllers fail within the production network. If the controllers fail (under
steady state operation and not while performing configuration actions), then
which of the following should be viewed as the “source of truth” for the
valid configuration of an infrastructure device? (Choose one.)
Question 24
The Bank wants to leverage the new infrastructure’s model driven telemetry
(MDT) capability. If an existing network management tooling application
was limited to XML encoding only and not HTTP for MDT support, which
of the following would be compatible on the network infrastructure?
(Choose one.)
a. Dial-out telemetry
b. Dial-in telemetry
c. NetFlow
d. IPFIX
Email #18
Hi.
The automation looks really promising. I have our guys working with
the developers to automate some of the scripted tasks they complete
on a daily basis and provide a new methodology for troubleshooting.
Our guys are learning about Python, and the developers are learning
about network operations and configurations, so it really looks
mutually beneficial to the teams. The new network is functioning
well, and it has allowed us to upgrade our backend compute systems.
We’ve met our obligations with the financial regulators and rectified
the majority of previous issues identified by the consultants.
Yesterday I had a long workshop with the CTO and IT department
heads. We’ve been discussing how we are going to host the new
Channel account the CEO is so keen to launch. I had originally
thought we would spin up the service in each DC on the new network
now that we’re ready, but we’ve been discussing cloud and how that
may be beneficial depending on if Channel takes off and we struggle
to scale the service or if it fails and we have to write off any
associated expenditure wasted for running it on-premises. We
managed to get a cloud architect from a well-respected cloud provider
in the UK (Cloudhop) on a video link for a couple of hours in the
afternoon to go over some options, which proved to be really useful.
So I need your help to aid the decision-making process to determine if
we do go in this direction. From the output of the day, we’ve put
together some information that should help. The CTO stated we have
a secured budget of £625K for 12 months of opex for the project, and
we have sufficient network firewall and compute infrastructure after
the recent upgrade if we need to stand up any services on the premises
to support a cloud-based frontend or a complete on-premises hosting
without any cloud. Additional capex might not be feasible to aid the
project.
Cloud charges are estimated at £50K per month for private cloud for
IaaS network and compute resources and a direct-connect circuit back
to each one of our DCs (primary link to St Helier and a backup link to
Guernsey). There is a 60% discount available if we wanted to run the
service in a public cloud; data transiting the cloud is subject to Direct
Connect charges listed below.
Cloudhop has stated its private cloud option is its most secure option,
with public cloud offering strong levels of security. Packet-scrubbing
services prior to entry for DDoS mitigation are offered only with the
private cloud option. Cloudhop can run IPsec encryption on the
virtual routers and normal routing such as eBGP and even VXLAN
multisite to emulate a VTEP, providing Layer EVPN Type 5 routing.
RFC1918 addressing can be used on either cloud type. Both cloud
offerings include Internet ingress and egress charges, but Direct
Connect prices apply to any traffic that is required to be sent back into
Banknet from Cloudhop’s premises. Internet access speeds and
services can be upgraded instantly for the private cloud offering via a
portal and within two weeks for the public cloud offering via an
online request system.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 25
Complete the following table to allow the Bank to select the optimum
hosting method for the Channel system. (Check all required items.)
Question 26
The Bank of Jersey decided to use a hybrid cloud model for Channel with
the web frontend in a private cloud and the database within a dedicated
Channel VRF within the DC VXLAN network in St Helier. Complete the
illustrated design that follows by inserting the correct device icons into each
environment to show where the individual devices/functionality should be
provisioned for Channel, including where the application servers should be
sited (redundancy is not required within the design at this point for the sake
of clarity, but do show where load balancers / application delivery
controllers would be required).
Question 27
The Bank of Jersey approved the hybrid cloud design illustrated in the
diagram that follows to support Channel. Complete the table to assist in the
implementation of the networking functionality in order to host the web
frontend within the Cloudhop private cloud and application server and
database functionality within the DC on-premises Channel VRF.
Mark within the table which feature is required for each device/area of the
network.
Question 1
Which circuit type and new DC location provides the most suitable option
for the Bank, with minimal cost for the new DC location? (Choose one
option from A–D for the circuit type and one option from E–G for
location.)
Requirements/constraints from supplied documentation:
The CTO has advised we should be looking to provide double the previous
bandwidth at a minimum between locations.
The DC LANs are connected over a 20Gbps DCI MEC between the core
switches.
An end location remains at St Helier DC, and we’re going to continue to
use synchronous replication for our systems and main banking application.
The existing business continuity plan does not cover natural events such as
flooding, changing weather patterns, unprecedented seismic events, and
extreme flooding due to rising sea levels.
Synchronous data replication is used for the Bank’s mainframe systems
running active in St Helier and standby in Priory Inn connected to a
separate SAN, which requires 2ms (millisecond) or less RTT for successful
write replication using FCoIP over the Banknet network between systems in
each DC.
As detailed within the email, the DC location and circuit information is
based purely on the Banknet network at this point in time, and BankExt and
BankDMZ connectivity will be addressed subsequently. Current Banknet
DCI connectivity is formed from dual 10Gbps links, and the CTO has
requested double the previous bandwidth, so you will need at least 40Gbps
made up from multiple 10Gbps circuits or single 40/100Gbps circuits.
Synchronous replication will continue to be used, so the latency of fiber
runs to the Portsmouth location is definitely worth consideration. The
industry recognized rule of thumb is 1ms latency for 100 km round trip time
(RTT). (Technology evolves rapidly but there isn’t a great deal that can be
enhanced with the speed of light at this point in time.) As such, at an
approximate 170 km distance away, the Portsmouth location is within
tolerance levels for the customer’s application, which is stated as being
2ms. You may be tempted to dive in and start calculating costs, but this
would take some unnecessary time and wouldn’t actually provide you with
a clear answer initially. Questions like this that have some cost element are
generally worth starting by ruling out some distractors prior to any
calculation, so it’s worth narrowing down the options at this point based on
best practice and the supplied constraints/requirements.
Award yourself two points (one point per correct answer). If you selected
suboptimal locations with associated speeds, then award yourself half a
point per answer.
Email #2
Subject: New DC
Hi.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 2
Are there any potential issues with using Portsmouth as a location for the
backup DC? (Choose one.)
Requirements/constraints from supplied documentation:
None specifically. This is a best practice/industry standard practice item.
If you have answered this question correctly, you have scored one point.
Email #3
Subject: New DC
Hi.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 3
Based on the new information supplied for the DWDM circuits, is there any
risk associated with the Portsmouth location being selected as a standby DC
location for the Bank of Jersey? (Choose one.)
Requirements/constraints from supplied documentation:
We’re going to continue to use synchronous replication for our systems and
main banking application.
Synchronous data replication is used for the Bank’s mainframe systems
running active in St Helier and standby in Priory Inn connected to a
separate SAN, which requires 2ms (millisecond) or less RTT for successful
write replication using FCoIP over the Banknet network between systems in
each DC.
This is a validate-type question. When presented with this type of question,
you will then be asked to validate your answer in a subsequent question. If
you select the incorrect answer initially, you will not be able to score points
for that question.
a. Yes
This is the correct answer. This reasoning is provided in the
explanation for Question 3.1.
b. No
This is the incorrect answer. The reasoning is provided in the
explanation for Question 3.2.
Question 3.1
If you answered Yes to Question 3, then what is the potential issue with
Portsmouth as a location?
This does sound plausible, but typically load sharing would see an
individual flow sent over a single circuit/channel and subsequent flows
over a different circuit/channel. If per-packet load sharing was
configured, then potentially there could be a problem, but generally it’s
the upper layers that put the stream together if packets arrive out of
sequence. There isn’t sufficient information supplied to state that this
would actually be an issue, so in this case, you would be making an
assumption. If you find yourself making assumptions during the exam,
it’s time to step back and further analyze the information you have
been presented to ensure you haven’t missed something.
Email #4
From: Tim Jacobson
Hi.
License upgrade Gold: Stacking capability and QoS for £5K per
switch
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 4
In order to address the bandwidth limitation in the BankExt and BankDMZ
network, which is the optimal option? (Choose one.)
Requirements/constraints from supplied documentation:
We need to find a way to increase bandwidth between locations, as STP is
blocking one of our cross-site links within each network. We can invest, if
required, but we just don’t expect to be in that location for more than eight
months, but we will need to get the available 2Gbps between sites for each
network.
We can enable some other features by upgrading the licenses or look at new
switches and circuits if we absolutely have to.
VLANs are trunked to the BankExt firewalls over EtherChannels. 802.1w
STP is utilized on the Layer 2 1Gbps links between DC locations in a
default configuration to ensure a loop-free topology between locations.
VLANs are trunked to the BankDMZ firewalls over EtherChannels. 802.1w
STP is utilized on the Layer 2 1Gbps links between locations in a default
configuration to ensure a loop-free topology between sites.
Services are spanned at Layer 2 in all zones, allowing VM migration and
dynamic failover of services with a policy of no single points of failure
within the network infrastructure.
Email #5
From: Tim Jacobson
Hi.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 5
In order to address the third-party router issue for routers connecting to
VLAN2 in the BankExt network, what would a prerequisite be in order to
mitigate further attacks? (Choose one.)
Requirements/constraints from supplied documentation:
Investigation on their side suggests it was the subject of an attack from an
address that isn’t within our DC ranges. I can only assume it originated
from one of the other third-party connections.
They have had to apply an infrastructure ACL as a countermeasure but are
insisting we need to protect them also.
You need to come up with an easy-to-manage solution to help. The network
team doesn’t have time to make small adjustments every time a third party
wants to make changes.
License Bronze: Voice VLANs, PVLANs, evaluation license free for 12
months
Switches in the network are purely Layer 2 and propagate the local VLANs
between DC locations.
Question 5.1
This is a validation of your understanding of Question 5, and you will only
score a point if you correctly validate your answer. In the exam, you would
simply be presented with one question dependent on your answer to the
original question.
If you selected Answer A in Question 5, please validate you answer.
(Choose one.)
Question 5.2
If you selected Answer B in Question 5, please validate you answer.
(Choose one.)
Zero points.
Question 5.3
If you selected Answer C in Question 5, please validate you answer.
(Choose one.)
Zero points.
Question 5.4
If you selected Answer D in Question 5, validate you answer. (Choose one.)
Zero points.
Email #6
Hi.
Thanks for sorting out the issues. So, since we have decided on
Guernsey as our new secondary DC location, we have ordered dual
100Gbps circuits from St Helier, which will be delivered with
complete resilience. With all of the work going on, we’ve completely
neglected the fact up to now that we should also provision dual
circuits for our BankExt network and BankDMZ network. The costs
are actually looking very prohibitive to provision an additional four
circuits, so I’d like you to investigate alternative options so we can
run all networks over the dual 100Gbps circuits. There will be a huge
amount of capacity with the new circuits and the potential to save a
significant amount of shareholders’ funds if we can offer separation in
a way that will keep the regulators happy.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 6
Complete the following table to assist the Bank of Jersey with its
assessment of potential technologies to provide separation and connectivity
of cross-site BankExt, BankDMZ, and Banknet networks over the dual
100Gbps DCI links being provisioned between St Helier and Guernsey
DCs. Place an X in each cell if the technology per row offers the features
detailed in the columns.
This is seen as one of the harder question types in the exam by candidates,
and it can be quite daunting to face with so many questions in effect. In
reality, this is just a case of breaking up the overall question into line items
and working your way through them independently. The question doesn’t
have specific constraints or requirements, so you will be relying purely on
your technical knowledge to complete this one. You will definitely receive
partial credit as it would be unrealistic to expect candidates to answer each
item correctly. The technologies can be summarized as follows:
QinQ: Double-tagging of VLANs for scale and separation. A single
VLAN could be allocated for each network in the Bank, and the
separate VLANs in each network could be double-tagged with their
respective carrier VLAN. Layer 2 separation between networks would
be achieved, but the technology would rely on a Layer 2 trunk
between locations with STP, which wouldn’t offer Layer 3 VRF-type
separation between networks, and additional technology or
infrastructure would be required for this. The technology scales
significantly and operates on a point-to-point and point-to-multipoint
basis.
VXLAN EVPN multipod: Layer 2 overlay on top of a Layer 3
underlay fabric using MAC in UDP encapsulation. The technology
scales significantly and removes the knowledge that the phone will at
some point ring at 3 a.m. with an STP disaster, as there is no longer a
reliance on STP to extend Layer 2 between DCs. Layer 2 can be
transported efficiently (including VLAN overlaps) with VNIs, and
Layer 3 separation between networks can be provided by VRF in a
similar function to Layer 3 MPLS VPNs with route distinguishers.
Multipod can be seen as the same network/fabric, even when deployed
between two data centers with separate IGP areas and BGP
autonomous systems with MP-BGP (as the VXLAN tunnel is end-to-
end between VTEPs). Multipod is in effect a single overlay and
control plane with single underlay—single replication domain for
BUM and single VNI admin domain. As such, multipod would not be
suitable for more than two physical locations.
VXLAN EVPN multisite: Similar to VXLAN multipod, but with
additional separation between locations. The VXLAN tunnel is
terminated and reestablished between locations in a form of VXLAN
stitching, which provides the capability to run VXLAN between more
than two physical locations with multiple overlay domains, multiple
overlay control-plane domains, multiple underlay domains, multiple
replication domains for BUM, and multiple VNI admin domains.
VRFs and 802.1Q (VRF Lite): This would typically involve a Layer 2
trunk link, with each network’s VLANs propagated over the trunk
using 802.1Q between locations with a Layer 3 device assigning
VLANs to VRFs. It would provide the Layer 2 and 3 separation and
scales with the required manual intervention, but it wouldn’t be the
most flexible technology for use between more than two locations.
MPLS Layer 3: MPLS Layer 3 is not going to be able to transport
Layer 2 without additional protocols, but it will provide the Layer 3
separation between networks with multi-VRF technology.
H-VPLS: Hierarchical VPLS provides the Layer 2 separation between
networks over an MPLS network and overcomes the scale limitation
associated with VPLS by use of LDP signaling in the control plane.
As this is a point-to-multipoint technology, it would be suitable for
more than two locations to propagate Layer 2.
Award yourself half a point per correct row of answers, with a maximum
score of three points overall for this question.
Email #7
Thanks for the info. I’ve had time to go through this, but I need you to
recommend the right technology for separation of networks that
provides us the flexibility to run an additional DC in conjunction to St
Helier and Guernsey if we need to in the future. I don’t know right
now if we want to—I just don’t want to limit ourselves to having to
change the technology if we do decide to at a later date. The
technology would need to provide separation of all of our networks
combined on one effective network and should be compatible with
what technology we use to actually provision ports in each network. I
need you to be confident the technology can also limit our failure
domain to a single DC if we have any Layer 2 type issues, even
though we still need to propagate Layer 2 between DCs. As
mentioned, we have a preference for separation without having to buy
additional circuits for BankExt and BankDMZ DCIs. (I’ve sounded
out Security, and they aren’t too happy. However, if we can prove
physical and logical separation, they said we are compliant with the
security policy.)
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 7
Which of the following technologies is best suited to provide connectivity
between St Helier and the new DC location in Guernsey for the Bank based
on its requirements for new networks and use of dual 100Gbps circuits?
(Choose one.)
Requirements/constraints from supplied documentation:
I need you to recommend the right technology for separation of networks
that provides us the flexibility to run an additional DC in conjunction to St
Helier and Guernsey if we need to in the future. I don’t know right now if
we want to, I just don’t want to limit ourselves to having to change the
technology if we do decide to at a later date. The technology would need to
provide separation of all of our networks combined on one effective
network and should be compatible with what technology we use to actually
provision ports in each network. I need you to be confident the technology
can also limit our failure domain to a single DC if we have any Layer 2 type
issues even though we still need to propagate Layer 2 between DCs. We
have a preference for separation without having to buy additional circuits
for BankExt and BankDMZ DCIs. (I’ve sounded out Security, and they
aren’t too happy. However, if we can prove physical and logical separation,
they said we are compliant with the security policy.)
I’d like you to investigate alternative options so we can run all networks
over the dual 100Gbps circuits. There will be a huge amount of capacity
with the new circuits and the potential to save a significant amount of
shareholders’ funds if we can offer separation in a way that will keep the
regulators happy.
a. QinQ
This is incorrect. As previously detailed, QinQ would provide the
Layer 2 separation, but it would still require a legacy trunked network
with associated STP risks between DCs, and without any Layer 3
facility or separation, it would typically only be possible between two
locations. Additional technology/infrastructure would also likely be
required for the provisioning of each network.
b. H-VPLS
This is incorrect. As previously detailed, H-VPLS would provide the
Layer 2 separation, but it wouldn’t provide the Layer 3 facility or
separation without additional MPLS configuration. The technology
could be used between more than two locations, but additional
technology/infrastructure would likely be required for the provisioning
of each network.
c. VXLAN EVPN Multipod
This is a suboptimal answer. VXLAN EVPN multipod would provide
the Layer 2 separation and full Layer 3 capabilities within separate
VRFs, but it would only be suitable for a dual-DC topology. The
technology facilitates deployment of leaf switches, which could be
used to create the different network zones. If you selected this option,
award yourself half a point.
d. VXLAN EVPN Multisite
This is the optimal answer. VXLAN EVPN multisite would provide
the Layer 2 separation and full Layer 3 capabilities within separate
VRFs between dual DCs and would be suitable if an additional DC is
required in the future. The technology facilitates deployment of leaf
switches, which could be used to create the different network zones. It
would be a good design decision to use a multisite configuration from
Day 1 to provide additional flexibility and separation between DCs,
from a minimal configuration overhead perspective, in comparison to
multipod, even in a dual-site deployment.
Question 8
Bank of Jersey decided to run VXLAN EVPN multisite technology to
provide flexibility for the future and to run multiple network overlay
instances over a Layer 3 fabric. What is a recommended approach for the
deployment to provide separation of legacy network zones to meet the
Security department’s requirement? (Choose one.)
Requirements/constraints from supplied documentation:
I’ve sounded out Security, and they aren’t too happy. However, if we can
prove physical and logical separation, they said we are compliant with the
security policy.
a. Provision of separate spines and leaf switches per network zone
This is incorrect. This is effectively a complete network, and
combining all three networks would therefore require three sets of
spines and leafs in each DC. Similarly, it would be complex to share
the dual 100Gbps circuits between each network in this architecture.
b. Provision of separate underlay fabric per network zone
This is incorrect. The underlay fabric can be shared between networks.
Having separate underlays would be the same as per the explanation
for Answer A.
c. Provision of separate overlay per network zone
This is a suboptimal answer. Separate overlays are required per
network zone for logical separation, with each network defining a VRF
within VXLAN. However, this doesn’t address the physical separation
requirement, as detailed in the explanation for Answer D. If you
selected this option, award yourself half a point.
d. Provision of separate overlay and leaf switches per network zone
This is the optimal answer. Separate overlays are required, as detailed
in the explanation for Answer C, but also having separate leaf switches
provides the physical separation that Security requires. Having
separate leaf switches would ensure patching issues or deliberate
connectivity into specific network zones could be mitigated to the
same extent as within the legacy network.
Email #8
From: Tim Jacobson
Hi.
We will need some border leaf switches dedicated for services for
each zone, such as load balancers and zone firewalls. The DCI links
can be terminated on border leaf switches also. Border leaf switches
can be 48x 10Gbps leaf switches that we purpose as border leafs—I
will need you to determine which license is required for them.
All leaf switch options come with six uplink ports onboard and just
require the necessary optics purchased to enable the ports (as per the
spine ports, they will operate at 40Gbps or 100Gbps, depending on
which optics are inserted).
Optics: 40Gbps optics are £1.5K and 100Gbps optics are £2K.
OSPF
IS-IS
MP-BGP
VXLAN
EVPN multipod
EVPN multisite
MACSEC
IPsec
GETVPN
GRE
Multicast
OSPF
IS-IS
MP-BGP
VXLAN
EVPN multipod
EVPN multisite
IPsec
GETVPN
GRE
Multicast
Streaming telemetry
Here are the latest computer hardware device counts required for Day
1 (per DC):
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 9
Draw out the physical topology of the required EVPN VXLAN network
infrastructure for one DC to consolidate the BankExt, BankDMZ, and
Banknet networks to support Day 1 services in the most cost-effective
manner. Use as many leaf switches, border leaf switches, and spine
switches as necessary, based on the requirements provided, and select the
most appropriate optic speed and count.
Requirements/constraints from supplied documentation:
We will want to run vPC (multi-chassis EtherChannel) as each of our
servers will be dual homed and we have no plans for running multicast in
the overlay.
Keep costs as low as possible. 100Gbps optics, for example, are running at
£2000 vs. £1500 for 40Gbps each.
I definitely want the fabric to be non-blocking for the uplinks for the 1Gbps
leafs, even if we have a spine switch failure, for example.
Spines can support 40Gbps or 100Gbps, depending on the optics purchased.
We will need some border leaf switches dedicated for services for each
zone, such as load balancers and zone firewalls. The DCI links can be
terminated on border leaf switches also. Border leaf switches can be 48x
10Gbps leaf switches that we purpose as border leafs. I will need you to
determine which license is required for them.
All leaf switch options come with six uplink ports onboard and just require
the necessary optics purchased to enable the ports (as per the spine ports,
they will operate at 40Gbps or 100Gbps, depending on which optics are
inserted).
I’ve sounded out Security, and they aren’t too happy. However, if we can
prove physical and logical separation, then they said we are compliant with
the security policy.
Services are spanned at Layer 2 in all zones, allowing VM migration and
dynamic failover of services with a policy of no single points of failure
within the network infrastructure.
The most important information you have to begin the design is knowing
that you need to create a leaf/spine architecture (with Layer 3 fabric) and
that you will need to provide logical and physical separation of the three
networks. In order to achieve this, you will simply need separate VRFs
within the VXLAN network at the time of configuration for logical
separation and separate leaf switches per network zone for physical
separation that can share the same underlay and spine but not border leaf
switches, as services such as environment firewalls and load balancers
would connect into each zone (if all three zones share a single set of border
leaf switches, then the physical separation requirement would not be met
per network zone). Border leaf switches would need to be deployed in pairs
to provide a resilient method of connecting services to ensure there is no
single point of failure. Therefore, three sets of border leaf switches will be
required, and there is a decision to be made as to which set should contain
the physical DCI circuits. In theory, they could go into any zone set, as the
DCI links would form part of the underlay, but it makes more sense to
deploy them into the Banknet set of border leaf switches, as this zone has
the majority of connectivity and traffic (this doesn’t breach the physical
separation requirement, as BankDMZ traffic flowing over the DCI links, for
example, would be logical connectivity as opposed to physical). Another
crucial point is that vPCs (multi-chassis EtherChannels) are required to
support dual-homing of each server. This fundamentally means (and easily
overlooked in the pressure of the exam) that the compute port count should
be doubled, and each server should be dual-homed to different leaf switches
to adhere to the requirement of no single points of failure (you were
provided with server count as oppose to overall port count). vPC in a leaf
switch typically translates to the switches being deployed in pairs, with
some form of vPC peer link between them. Normally, this would be a
physical vPC peer-link connection, which would allow traffic received on
one leaf/VTEP to be sent to the adjacent leaf/VTEP for further forwarding
to local connections for that leaf/VTEP. This would mean additional optics
(two) per leaf switch to connect to an adjacent leaf for resilience of the peer
link. The astute reader may have noticed that the Gold license option for the
leaf switches enables a vPC fabric peering feature. This would mean that
vPC peer-link capability could be offered across the fabric, a recent neat
innovation that would allow you to save the two optics required between
leaf switches. If you didn’t pick up on this, don’t be dismayed, as it is a
fairly recent feature. However, it should hopefully point out the need to be
aware of innovations in the industry. You are told that cost-effectiveness is
important, so you only really need to work out if investing in the Gold
license will reduce the overall costs, and which optics to choose. Both
licenses provide the basic features required for Day 1 service. When you
work out how many leaf switches are required per DC (20), you will see
that you can actually reduce the optic count by 40 (spines wouldn’t require
any vPC peer links between them). If you enable vPC fabric peering with
the Gold license (20 switches × 2 optics = 40 optics; 40 optics × £2K =
£80K saved), 20 switches with the Gold license equates to an additional
£40K cost, so you would actually save £40K based on the use of 100Gbps
optics in the fabric by running the Gold license on all leaf switches. Why
were costs calculated using 100Gbps optics? Well, you are informed that a
non-blocking architecture is required for the 1Gbps leaf switches, even if a
spine switch fails. This means that if you are running a 40Gbps optic to a
single spine (in the event of one spine failing), then you could be
oversubscribed if the switch is fully loaded and all ports are running at
maximum speed (48 ports). Running 4x 40Gbps to a leaf from a spine
wouldn’t be cost-effective, as 100Gbps optics are more cost-effective and
the spine would only support 12 leaf switches in this case, so additional
spines would also be required, pushing the cost further northward
unnecessarily.
You might be tempted to collapse some of the BankDMZ and BankExt
functionality into the same leaf switches. Technically, you could make it
work, but you have a security dictate stating physical separation is required,
and there are some overlapping VLAN numbers between zones, so this
should quickly point to the fact that separate switches are required per zone.
Based on the supplied server information, the following switches will be
required.
Here are the latest computer hardware device counts required for Day 1 (per
DC):
So this covers the leafs; there will also be two spines in total (per DC) and
two border leafs per actual network/zone. A total of 82x 100Gbps optics
will be required per DC (two per leaf and border leaf switch to cover the
switches themselves and the same number of optics required in the
connecting spine switches). The following figure details the resulting
design. Partial scoring would be available if you did not create an identical
design.
Question 10
The VXLAN design was submitted to an Architectural Review Board
within the bank, and a comment was documented that suggested super-
spines would be required within the design in order to provision the
BankExt, BankDMZ, and Banknet networks over the same fabric. What
would your response be to the comment? (Choose one.)
Requirements/constraints from supplied documentation:
None specifically. This is a general industry best practice item.
Occasionally, you might be fortunate enough to be presented with a simple
question that can take seconds to answer. This will do wonders for your
motivation, especially if you have just spent 20 minutes on the previous
question!
Email #10
Thanks for the design. I’ve got one of the guys to document it. He
initially thought we could reduce leaf count by consolidating some of
the BankExt and BankDMZ ports into the same device and allocate
ports per VRF, but I told him Security requested physical and logical
separation. We can obviously do this if we use distinct switch pairs
per environment for physical separation and use the underlay fabric
for the logical separation and tunnel VXLAN over the top per
environment. The vPC fabric peering enabled by purchase of the Gold
license has saved a good sum and reduced the optic and fiber patch
requirements between leaf switch pairs considerably in order to
provision server resiliency per leaf switch pair. I hadn’t realized
initially we would need a set of border leaf switches per
environment/network zone, but it makes sense if we apply services for
each zone such as firewalls or load balancers on a single pair of
border leaf switches, then we wouldn’t meet our security requirement
of providing physical separation between network zones. It seemed to
make sense to connect the DCI links into the Banknet border leaf
switches, as we have the majority of services running on this network,
and this does ensure logical separation between zones, as it’s all
VXLAN overlay by the time traffic flows over the DCI links.
We will connect up the management ports on all of the new switches,
which have a dedicated management VRF, and drop these into our
dedicated management network that the team has already built out
using legacy infrastructure.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 11
If the Bank of Jersey’s Security department changed policy and decided to
permit BankExt networks and BankDMZ to share the same physical leaf
switches and then applied configuration mitigation for Layer 2 security to
block access between networks, is there a further issue that would need to
be rectified for this change in policy? (Choose one.)
Requirements/constraints from supplied documentation:
The following VLANs are in use in the BankExt network:
VLAN ID Description
20 Third-party connectivity
21 ISP connectivity (public range)
22 External firewall state
23 External firewall HA
24 External management
VLAN ID Description
12 RAS VPN
13–20 Public production services – VIP frontend
21–30 Public production services – server VLANs
31–38 Public non-production services VIP frontend
39–50 Public non-production services server VLANs
99 DMZ firewall state
100 DMZ firewall HA
101 DMZ management
a. Yes
This is the correct answer. See the answer to Question 11.1.
b. No
This is incorrect. See the answer to Question 11.2.
Question 11.1
If you chose Yes for Question 11, please validate your answer. (Choose
one.)
Question 11.2
If you chose No for Question 11, please validate your answer. (Choose
one.)
Zero points.
Question 12
Complete the following table to assist Bank of Jersey engineers in creating
VNIs for the BankExt, BankDMZ, and Banknet networks. Create any
VNID using seven digits, with the last four digits used for VLAN numbers.
Requirements/constraints from supplied documentation:
Create any necessary VNID using seven digits, with the last four digits used
for VLAN numbers.
Obviously, there are multiple options available in creating the VNIs. The
question is just seeking validation of VNI allocation understanding for
overlapping VLANs. The question requires that the last four digits be used
for the VLAN ID, so the first three digits must therefore be used for the
VRF. The example shows a VRF ID of 100 for the BankExt network, 101
for the BankDMZ network, and 102 for the Banknet network—this means
the VLAN IDs can be used within the VNI without fear of overlapping. As
long as your answer has a unique VRF prior to the VLAN ID for each
network, you have answered the question correctly.
If you answered this question correctly, you scored one point.
Email #11
Hi.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 13
Do you have sufficient information to make a design decision for multi-
destination BUM traffic forwarding to run using multicast or ingress
replication for the new network? (Choose one.)
Requirements/constraints from supplied documentation:
None. This question is just checking if you are “connected” to the scenario
and to ask for information that you don’t have and to not ask for
information you already have at your disposal.
a. Yes
This is incorrect. You would be making an assumption as opposed to
an informed decision. You don’t have sufficient information, as the
appropriate mode would be dependent on the hardware performance.
b. No
Question 13.1
If you answered Yes for Question 13, which replication mode would you
select for multi-destination BUM traffic? (Choose one.)
a. Ingress replication
Possibly. This mode is definitely simpler to implement than multicast
in the underlay, but there could be a premium to pay in terms of CPU
hit; regardless, there is no correct answer to this question.
b. Multicast replication in the underlay
Multicast is generally the most efficient method for forwarding multi-
destination BUM traffic, but it can be more complex to implement and
troubleshoot than ingress replication; regardless, there is no correct
answer to this question.
Zero points.
Question 13.2
If you answered No for Question 13, what further information do you
require? (Choose one.)
a. Additional leaf switch CPU utilization for predicted traffic baseline for
ingress replication
This is the correct answer. It’s important to know if headend
replication is feasible under normal operation. This mode of
replication for multi-destination BUM traffic in a VXLAN network
does simplify things considerably within the underlay in comparison to
multicast (especially between multiple DCs), but it can come at a CPU
utilization cost, depending on the hardware in use and levels of BUM
traffic. If you are going to make a design decision, it needs to be an
informed one with additional information regarding the hardware
performance implications of both modes.
b. Which multicast modes are possible for multicast forwarding in the
underlay
This is incorrect. Multicast is generally the most efficient method for
forwarding multi-destination BUM traffic, but knowing which
multicast protocol mode can be used for the BUM traffic replication in
the underlay is more of an implementation decision.
Email #12
Hi.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 14
The Bank has decided to implement multicast replication for BUM traffic
based on a clear CPU reduction in comparison to ingress replication rather
than request a design recommendation. When it comes to implementation,
however, what would be a benefit of using BiDir as opposed to ASM for
the underlay multicast protocol to transport BUM traffic between VTEPs
across each DC? (Choose one.)
Requirements/constraints from supplied documentation:
None. This question is just checking multicast knowledge, as a similar
question could come up within any of the four labs presented within the
exam.
Email #13
Hi.
We’ve almost fallen down the same hole as before in the legacy
network, providing the Banknet as a single network with production
and pre-production services as called out by the consultants. I need
you to work out how we can provide a pre-production environment
within Banknet that can communicate without any policy control to
the production environment within Banknet, typically within the same
VLAN. Unfortunately, due to legacy reasons, we have some prod and
pre-prod compute services running on the same VLANs, and the
server guys are telling me it would take six months to re-address and
make the required application changes, and that’s too long. We want
to offer the best possible protection between environments, so a Layer
2 type STP issue or broadcast issue in pre-prod can’t affect prod.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 15
How can Banknet production and pre-production compute services be
provisioned on the new network, providing mitigation from Layer 2
broadcast type events in either network propagating into each other?
(Choose one.)
Requirements/constraints from supplied documentation:
I need you to work out how we can provide a pre-production environment
within Banknet that can communicate without any policy control to the
production environment within Banknet, typically within the same VLAN.
Unfortunately, due to legacy reasons, we have some prod and pre-prod
compute services running on the same VLANs, and the server guys are
telling me it would take six months to readdress and make the required
application changes, and that’s too long. We want to offer the best possible
protection between environments so a Layer 2 type STP issue or broadcast
issue in pre-prod can’t affect prod.
There is no dedicated test or pre-production network facility. There is a risk
to the production network by implementing services without testing them in
isolation prior to delivery.
Email #14
From: Tim Jacobson
Subject: Implementation
Hi.
Thanks for the info. We will create some compute PODs with separate
production and pre-production PODs with our leaf pairs. It should
look like this:
By the way, Jerseytel has informed us the DCI circuits are now in
place. Apparently, it was a simple job of splicing in a few locations,
as it had fiber in the ground and between Jersey and Guernsey Islands
already. We are all tested, error free, and latency is good, so we will
have no issues with our replication. We need you to plan the
migration of services to the new DC while we wait for the network
infrastructure to be delivered from the UK. Internet and WAN circuits
have been ordered for the new DC and will be here in time for
migration. (We don’t need new circuits for St Helier. We can just re-
patch these from legacy to new networks at time of migration.)
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 16
Place the following implementation/migration steps in order to allow the
Bank of Jersey to migrate to the new network infrastructure (not all steps
are required).
Requirements/constraints from supplied documentation:
Internet and WAN circuits have been ordered for the new DC and will
be here in time for migration. (We don’t need new circuits for St
Helier; we can just repatch these from legacy to new networks at the
time of migration.)
Configure VLAN translation for overlapping VLANs on each network
on leaf switches.
Connect Layer 2 trunk from legacy Banknet network to new Banknet
border leaf switches in St Helier, connect Layer 2 trunk from legacy
BankDMZ network to new BankDMZ border leaf switches in St
Helier, and connect Layer 2 trunk from legacy BankExt network to
new BankExt border leaf switches in St Helier.
Shut down Internet/WAN circuit(s) in Priory Inn.
Enable new Internet/WAN circuit(s) in new Guernsey DC and migrate
St Helier Internet/WAN circuit(s) in St Helier.
Connect Layer 3 routing links from legacy Banknet network to new
Banknet border leaf switches in St Helier.
Install spine switches in each DC.
Enable Anycast gateways in VXLAN for Banknet VLANs.
Install leaf switches in each DC and configure separate VRFs for
BankExt, BankDMZ, and Banknet networks within VXLAN.
Migrate inner and outer FWs and RAS infrastructure to VXLAN
network on appropriate border leaf switch.
Shut down HSRP gateways in the legacy Banknet network for each
VLAN.
Install border leaf switches and enable DCI circuits in each DC, and
test between DCs on the Banknet border leaf switches.
Migrate physical compute environment from St Helier and Priory Inn
to new DCs.
This is arguably the hardest question type on the exam. Ask a group of 10
architects the same question and you are likely to get 20 different answers!
The simplest way to deal with these questions is to ensure you “make
before you break” and that you can leave a period of time, where possible,
between steps without an outage of some sort (potentially days or a week,
for example). If you can achieve this, you are likely to have achieved the
correct sequence. There will, however, always be some steps that cause an
outage during a migration, and you just need to sequence steps
appropriately to minimize this.
Here is the correct sequence and rationale:
Hi.
The migration went really well. I got our guys to script the larger
number of VLANs we migrated in Banknet in terms of shutting down
and re-enabling the Layer 3 side, and we literally had a 1 second blip
per VLAN. The users didn’t even notice, and we had no related
tickets, which was great news. However, good news is usually
accompanied with bad, unfortunately. We’ve had the regulators in
post-migration, and we walked them through the new design and what
we have accomplished. While their overall impression was positive in
regard to the new network and improvements to our business
continuity, they have made the following comments:
Please ensure you are compliant with point number 1 within four
weeks and have a plan in place for points 2 and 3, as legislation could
change with short notice.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 17
The financial regulator has stated that all of the Banknet network-specific
switches that serve the production environment should be placed into a
protective caged environment to ensure they are protected from
unauthorized access. Highlight on the supplied network diagram where the
cage should extend to.
Requirements/constraints from supplied documentation:
The infrastructure that connects to the production compute environment is
not physically protected. We need a cage around it to ensure that nobody
who has access to the DC in general can, without restriction, connect
devices to the production switches and potentially compromise service.
So the only real question to consider here is, do you include spine and DCI
links on the Banknet border leaf switches as well as the production-specific
Banknet leaf switches? My take on this is usually, “when there is a doubt,
there is no doubt.” Therefore, it would be safer, in this case, to include the
spines and border leaf switches within the cage as if they were unprotected.
Somebody could, in theory, access the devices and monitor VXLAN-
encapsulated traffic from the production pods via onboard tools or
connected sniffers/TAPs or connect into leaf/spine links or DCI circuits. If
you only included the production pods within the caged environment, award
yourself half a point.
If you answered this question correctly, as illustrated in the following
figure, you scored one point.
Question 18
If the Bank of Jersey were to encrypt traffic over the DCI links, which
technology would you recommend that would be compatible with OSPF if
this IGP was used in the underlay fabric? (Choose one.)
Requirements/constraints from supplied documentation:
Although not a current legality, we would expect you to encrypt DCI traffic
leaving your premises.
We will need to resolve these matters. For point 2, we are OK on the WAN,
as all WAN traffic into the DC uses HTTPS or traffic encrypted at the
application layer, but we do know the DCI link will carry some unencrypted
traffic.
Silver Leaf License Features
MACSEC
IPsec
GETVPN
GRE
Gold Leaf License Features
MACSEC
IPsec
GETVPN
GRE
a. GETVPN
This is incorrect. This technology would be better suited to the WAN
and would be fully compatible with OSPF. However, there is no
requirement to provide encryption within the WAN, as you are
informed the protocols traversing the WAN are already encrypted at
the application layer.
b. IPsec
This is incorrect. IPsec on its own would not function with OSPF on
the DCI links within the underlay.
c. MACSEC
This is correct. MACSEC would be well-suited to this requirement
over the DCI links, and due to operating at Layer 2, there would be no
compatibility issues with OSPF. Typically deployed in hardware,
MACSEC will not have a CPU implication and can generally run at
line rate (if there were some limitations with this feature or one in the
lab exam, you would be provided with corresponding data).
d. GRE/IPsec
This is a suboptimal answer. While GRE with IPsec would provide
encryption that is compatible with OSPF on the DCI underlay links, it
would not be as efficient or as simple to deploy as MACSEC. In
addition to configuration complexity, there would typically be a
performance limitation of throughput or additional CPU hit to run
IPsec, which should be considered (unless information has been
provided that the feature is deployed in hardware without CPU
increase or throughput degradation). You would ultimately be making
an assumption if you had assumed that IPsec was available within
hardware.
Email #16
Subject: Perimeter FW
Hi.
So, as you are aware, the auditors have raised a concern that the
Banknet network is implicitly open once you are connected to the
WAN, and they are recommending we place perimeter protection
around our applications in the DCs. Ideally, I would like to add a
firewall in each branch location, but unfortunately that isn’t going to
happen. We can get budget for DC/WAN perimeter firewalls (I want
to do this with the minimal number possible, as they are expensive)
because we want to future-proof it by investing in firewalls with a
next-generation feature set. The firewalls we want to use have 10Gbps
throughput, so they are fine for the WAN, which connects at 10Gbps
into the service provider’s network. The firewalls need a dedicated
Layer 2 connection between them for state and high availability. They
need to support transparent and Layer 3 routed mode. For high
availability, they need to support active/standby, where in the event of
a failure, the standby device takes over the active IP address and only
the active IP address is configured on each firewall. In terms of
routing, they can run static routing, OSPF, or iBGP, which is great, as
we need the solution to still allow for the dynamic routing from the
WAN into the DC. In terms of current setup, we have dual P2P /30
links (on contiguous prefixes) between the WAN CE on each site to
the border leafs and eBGP between the borders and the MPLS CEs.
I’m told all devices support L2 EtherChannel, and as you know, we
can run vPC multi-chassis EtherChannel on the borders if required at
L2, but they don’t support L3 EtherChannel. In the event of a failure
scenario (which could mean failing over between DCs due to a
firewall or WAN failure), we need existing sessions to be maintained.
We don’t have a clue at this point what we should be setting the rule
base to initially, so this is more of a tick-in-the-box exercise, and we
will come back to define policy once we are able to monitor and
baseline flows using some tooling. We can add different prefixes if
required into the topology over and above the existing /30s in use, and
I have a preference for simplicity with minimal change to the existing
environment.
Tim Jacobson
Network Manager
Bank of Jersey
Question 19
Which of the following designs would be optimal for the Bank to control
north/south flows into the DCs for Banknet services from the WAN?
(Choose one.)
Requirements/constraints from supplied documentation:
They are recommending we place perimeter protection around our
applications in the DCs.
The firewalls we want to use have 10Gbps throughput, so they are fine for
the WAN, which connects at 10Gbps.
The firewalls need a dedicated Layer 2 connection between them for state
and high availability. They need to support transparent and Layer 3 routed
mode. For high availability, they need to support active/standby, where in
the event of a failure, the standby device takes over the active IP address
and only the active IP address is configured on each firewall. In terms of
routing, they can run static routing, OSPF, or iBGP, which is great, as we
need the solution to still allow for the dynamic routing from the WAN into
the DC. In terms of current setup, we have dual P2P /30 links (on
contiguous prefixes) between the WAN CE on each site to the border leafs
and eBGP between the borders and the MPLS CEs.
I’m told all devices support L2 EtherChannel, and as you know we can run
vPC multi-chassis EtherChannel on the borders if required at L2, but they
don’t support L3 EtherChannel.
In the event of a failure scenario (which could mean failing over between
DCs due to a firewall or WAN failure), we need existing sessions to be
maintained.
We can add different prefixes if required into the topology over and above
the existing /30s in use, and I have a preference for simplicity with minimal
change to the existing environment.
Email #17
Hi.
Just when I thought our guys were gaining confidence with the new
network, we’ve had a serious issue. They were making a change on
the production network last night, migrating some of the servers
responsible for the applications serving the ATM cash machines from
the legacy network, and they ended up causing an outage in the entire
ATM network. We had some unhappy customers who were unable to
withdraw cash, but the damage was limited due to being an early
morning change and backing it out quickly when they realized what
had happened. The RCA shows some changes missed out on the
border leaf switches and some configuration not being accepted
correctly. I went through the detail and couldn’t believe the amount of
configuration required for the actual change for VXLAN parameters.
The guys apparently scripted it due to the size and complexity and
ended up creating the issue themselves! We simply cannot find
ourselves in this position again. I have read that the infrastructure is
compatible with network programmability, and I’d like you to look
into how we can set up some automation to eliminate human error and
introduce efficiencies. We can also enable the telemetry functionality
that they have and move away from SNMP possibly. I have a couple
of developers I can bring in from the dark side (application
developers), when required, who can code. They can work with the
network team to define what is required, so maybe we can start our
own devops team if this works out. I’ve got Yin and Yang stuck in my
head for some reason after my first conversation with the developers
—can you believe one of them is called Jason! Anyway, have a think
and let me know how you believe we should begin.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 20
In order to initiate automation, the developers need to know which
individual YANG model to use for the new infrastructure. Which of the
following models would be optimal? (Choose one.)
Requirements/constraints from supplied documentation:
Spines can support 40Gbps or 100Gbps on each port, depending on optics
purchased. The spines are actually from a different vendor than the leafs, as
they were significantly cheaper than the leaf vendor’s spines, but they are
compatible. They don’t have a license option and seem to come with an
enterprise edition as standard that covers every feature listed on each
license type for the leafs.
Silver Leaf License Features (included in switch purchase price):
Automation suite (OpenConfig, IETF, native)
Gold Leaf License Features (additional £2K per switch): Automation
suite (OpenConfig, IETF, native)
a. Native
This is incorrect. You were informed that the spines and leaf switches
are from different vendors, and an individual YANG model is required.
As such, native would actually require two individual models (one set
up for spines and one for leafs).
b. OpenConfig
This is the optimal answer. It really is down to IETF or OpenConfig,
given the constraints of not being able to use native or a mix of
models. However, OpenConfig models are typically more
comprehensive than IETF.
c. IETF
This is a suboptimal answer. IETF would definitely work, but IETF
models are generally less comprehensive than OpenConfig models.
Award yourself a point if you selected this answer, as it is complex to
differentiate between IETF and OpenConfig in this particular case.
d. Mix of models
This is incorrect. The requirements state an individual model. A mix of
models (say, native and OpenConfig) can function, and some
deployments use them, but this is typically for different features, and
unnecessary complexity can be introduced.
Typically, it’s considered good practice to begin with non-native
models when looking for interoperability and flexibility, but native
could be a good choice if there are some features that hadn’t been
adopted by OpenConfig or IETF when required.
Question 21
In order to deploy the automation, the developers have recommended an
OpenDaylight platform to use as a resilient SDN controller and portal for
network programmability of the VXLAN infrastructure within the
management network. Complete the following table in order that a project
task list can be generated to deliver automation for the network
infrastructure.
Requirements/constraints from supplied documentation:
We will connect up the management ports on all of the new switches, which
have a dedicated management VRF, and drop these into our dedicated
management network.
Network management: All management tools that access the infrastructure
are sited in a separate Ethernet out-of-band management network that spans
both DCs. Firewalls are used between the tools VLAN and multiple
VLANs that connect to the management ports of infrastructure. The firewall
connects to the production Banknet network in order to provide access to
remote WAN sited locations. The Bank has a policy that only management
tool hosts can connect to the infrastructure based on IP address and specific
management protocols.
Resilient SDN controller and portal for network programmability of the
VXLAN infrastructure within the management network.
OpenDay Spi Leaf DC1 DC2 Managemen
light ne Swit Manage Manage t Network
Controlle Sw ches ment ment Firewall
r itc Network Network
hes
Task Required Check the box below if the task is required on the
devices/locations above.
Enable X X — — —
X
Netconf/Restconf.
Question 22
The Bank of Jersey wants to simplify multiple/recurring API calls from the
SDN controller to individual devices for configuration and management
purposes while keeping the required authentication as simple and secure as
possible. Which authentication method should the Bank choose? (Choose
one.)
Requirements/constraints from supplied documentation:
Multiple/recurring API calls from the SDN controller to individual devices
should be simple and as secure as possible.
Question 23
The Bank is wary of atomicity, if one or both of the OpenDaylight
controllers fail within the production network. If the controllers fail (under
steady state operation and not while performing configuration actions), then
which of the following should be viewed as the “source of truth” for the
valid configuration of an infrastructure device? (Choose one.)
Requirements/constraints from supplied documentation: None. This is an
industry best-knowledge/best-practice item.
Question 24
The Bank wants to leverage the new infrastructure’s model driven telemetry
(MDT) capability. If an existing network management tooling application
was limited to XML encoding only and not HTTP for MDT support, which
of the following would be compatible on the network infrastructure?
(Choose one.)
Requirements/constraints from supplied documentation:
The existing network management tooling application was limited to XML
encoding only and not HTTP for MDT support.
a. Dial-out telemetry
This is incorrect. Dial-out telemetry involves the infrastructure device
initiating a session to a destination network management device based
on a subscription. This approach is not compatible with XML and uses
HTTP encoding.
b. Dial-in telemetry
This is correct. XML is compatible with dial-in telemetry, which is
where a management system polls an infrastructure device
dynamically (similar to SNMP polling to gather statistics).
c. NetFlow
This is incorrect. NetFlow, although considered a form of legacy
telemetry, would not be compatible with HTTP, and it uses UDP.
d. IPFIX
This is incorrect. IPFIX, although considered a form of legacy
telemetry, would not be considered compatible with HTTP, and it uses
UDP.
Email #18
Hi.
The automation looks really promising. I have our guys working with
the developers to automate some of the scripted tasks they complete
on a daily basis and provide a new methodology for troubleshooting.
Our guys are learning about Python, and the developers are learning
about network operations and configurations, so it really looks
mutually beneficial to the teams. The new network is functioning
well, and it has allowed us to upgrade our backend compute systems.
We’ve met our obligations with the financial regulators and rectified
the majority of previous issues identified by the consultants.
Cloud charges are estimated at £50K per month for private cloud for
IaaS network and compute resources and a direct-connect circuit back
to each one of our DCs (primary link to St Helier and a backup link to
Guernsey). There is a 60% discount available if we wanted to run the
service in a public cloud; data transiting the cloud is subject to Direct
Connect charges listed below.
Cloudhop has stated its private cloud option is its most secure option,
with public cloud offering strong levels of security. Packet-scrubbing
services prior to entry for DDoS mitigation are offered only with the
private cloud option. Cloudhop can run IPsec encryption on the
virtual routers and normal routing such as eBGP and even VXLAN
multisite to emulate a VTEP, providing Layer EVPN Type 5 routing.
RFC1918 addressing can be used on either cloud type. Both cloud
offerings include Internet ingress and egress charges, but Direct
Connect prices apply to any traffic that is required to be sent back into
Banknet from Cloudhop’s premises. Internet access speeds and
services can be upgraded instantly for the private cloud offering via a
portal and within two weeks for the public cloud offering via an
online request system.
Rgds,
Tim Jacobson
Network Manager
Bank of Jersey
Question 25
Complete the following table to allow the Bank to select the optimum
hosting method for the Channel system. (Check all required items.)
Requirements/constraints from supplied documentation:
No packet scrubbing is employed on ISP connections. One previous DDoS
outage could have been averted.
The service must be highly available, as it’s a direct reflection on the Bank,
and we cannot allow any of the service to be compromised due to being
accessible over the Internet.
We will need to be able to upgrade available Internet access bandwidth
within the space of a couple of days to be able to adjust to the demands of
the system.
Cloudhop has stated its private cloud option is its most secure option, with
public cloud offering strong levels of security. Packet-scrubbing services
prior to entry for DDoS mitigation are only offered with the private cloud
option.
Cloudhop can run IPsec encryption on the virtual routers and normal
routing such as eBGP and even VXLAN multisite to emulate a VTEP
providing Layer EVPN Type 5 routing. RFC1918 addressing can be used
on either cloud type. Both cloud offerings include Internet ingress and
egress charges, but Direct Connect prices apply to any traffic that is
required to be sent back into Banknet from Cloudhop’s premises. Internet
access speeds and services can be upgraded instantly for the private cloud
offering.
We’ve worked with marketing and calculated that for Day 1 service, we
wouldn’t expect any more than 1 million transactions per day, so let’s base
this as a worst case, but we need the ability to scale communications and
compute to grow if this figure is exceeded dynamically, regardless of how
the service is provisioned.
Cloud charges are estimated at £50K per month for private cloud for IaaS
network and compute resources and a Direct Connect circuit back to each
one of our DCs (primary link to St Helier and a backup link to Guernsey).
There is a 60% discount available if we wanted to run the service in a
public cloud. Data transiting the cloud is subject to Direct Connect charges.
If we do go with cloud, we can host the entire system (web frontend,
application servers, and database) in the cloud, or if we did host some of the
service on the premises, we would need a firewall for access into DC
services, and we can provide any on-premises compute equipment into a
dedicated Channel VRF to host the services. Any link from the cloud would
need to be encrypted into our DC(s), and Cloudhop only supports Direct
Connect or exchange connections.
Each transaction is estimated to use approximately 10KB of data, and we
want to be able to run at the 1000 transaction-per-second level.
Internet access speeds and services can be upgraded instantly for the private
cloud offering via a portal and within two weeks for the public cloud
offering via an online request system.
Both cloud offerings include Internet ingress and egress charges, but Direct
Connect prices apply to any traffic that is required to be sent back into
Banknet from Cloudhop’s premises.
The latency between the application servers and database should be <=1ms
to provide the best CX journey.
Question Options
(place an X
in the
appropriate
cell per
question)
Which is the most On-prem On- Public Private Hybrid (private
suitable hosting Jersey DC prem cloud cloud all Cloudhop web
platform/location Guer all services frontend +
for Channel? (Base nsey services (Cloudh Banknet on-
your selection DC (Cloudh op) prem database)
on a combination of op)
cost and technical
feasibility.)
— — — X —
This question requires some basic math and will test your understanding of
the information provided to you in regard to how the application functions.
You are informed that each transaction uses 10KB, and they want to run at
up to 1000 transactions per second, so this is simply 10KB × 1000, which
equates to 10,000,000, or 10MB. To then calculate the bandwidth required,
you would convert the bytes to bits to provide a bps speed (10M × 8 =
80Mbps). The Direct Connect link connecting the cloud provider to the
Bank would therefore need to be, at a minimum, 80Mbps if the systems
were separated between environments.
If you answered this correctly, you scored half a point.
This is just ensuring you are closely following the scenario in that if the
entire service was being run in the cloud, there isn’t a specific minimum
bandwidth requirement, or indeed even a real need for a Direct Connect
circuit between the cloud provider and the Bank. As such, the optimal
answer here is 0Mbps.
If you answered this correctly, you scored half a point.
Question 26
The Bank of Jersey decided to use a hybrid cloud model for Channel with
the web frontend in a private cloud and the database within a dedicated
Channel VRF within the DC VXLAN network in St Helier. Complete the
illustrated design that follows by inserting the correct device icons into each
environment to show where the individual devices/functionality should be
provisioned for Channel, including where the application servers should be
sited (redundancy is not required within the design at this point for the sake
of clarity, but do show where load balancers / application delivery
controllers would be required).
Requirements/constraints from supplied documentation:
The application developers have stated the Channel service will be a typical
load-balanced web frontend protected via a firewall that is accessible from
lightweight Channel apps (typically via a customer’s smartphone) over the
Internet. The web frontend communicates with the application via load
balancers. The application then communicates directly with a database. The
web frontend just needs to be accessible for Internet clients so it can be
hosted in the cloud or in the BankDMZ network, and the middleware with
the application and database can be either on-premises in Banknet or hosted
in the cloud.
The latency between the application servers and database should be <=1ms
to provide the best CX journey.
If we do go with cloud, we can host the entire system (web frontend,
application servers, and database) in the cloud, or if we did host some of the
service on the premises, we would need a firewall for access into DC
services, and we can provide any on-premises compute equipment into a
dedicated Channel VRF to host the service.
Any link from the cloud would need to be encrypted into Banknet, and
Cloudhop supports Direct Connect or exchange connections.
So the optimal hosting location appeared to be private cloud from
Cloudhop, but a customer decision was made to host the backend of the
Channel system within the Bank’s own network. You are informed that the
Channel service will be a typical load-balanced web frontend protected via
a firewall that’s accessible over the Internet and that the web frontend will
be provisioned in the cloud. As such, you will need an Internet connection,
firewall, and ADC/load balancer deployed for a web frontend service
provisioned in the cloud. You are informed that the database will reside in a
dedicated Channel VRF in the VXLAN network in the DC, so you need to
make a design decision as to where the application servers need to be sited.
There is a requirement that the latency between the application servers and
database should be <=1ms to provide the best CX journey. Because the
cloud provider is in the UK, you should realize that in order to meet the
latency requirement, the servers should be sited alongside the database
within the Channel VRF (distances were provided in earlier maps). The
communication between the web frontend servers and application servers
requires ADCs/load balancers, and the link between the cloud provider and
Bank of Jersey (the Direct Connect link) will require a virtual router
between the cloud and the border leaf VTEP in St Helier with an encrypted
link running over the Direct Connect circuit, which can be terminated either
on the border leaf or on-premises firewall. A firewall is required within the
Bank of Jersey’s DC (from the requirement “if we did host some of the
service on the premises, we would need a firewall for access into DC
services”). This would connect either directly into the Direct Connect
circuit or into the border leaf on the outside in one VRF, and the inside
interface of the firewall would be part of the isolated Channel VRF and
could then be used as the default gateway service for the application servers
and database required for Channel.
This is a question that some will find complex due to the variables in play.
You would really need to determine from the information provided that the
Internet connections are load balanced to a web frontend, which then
communicates with the application servers via load balancers. The
application then communicates directly with a database. You are told where
the web fronted and database need to reside, so a design decision is required
for the application servers and then some basic networking between the
environments. This is simple when you have time, but under the pressure of
the exam it can become challenging. If you found yourself making
assumptions as to which device went where or what devices to use in the
design, you must have missed a constraint or requirement, as you will not
be forced to make assumptions in the lab exam.
If your design reflects what’s shown within the debrief for Question 27,
award yourself two points. There would be partial scoring in the lab exam.
Placing the application servers with the database would be the most
significant item to achieve a score.
Question 27
The Bank of Jersey approved the hybrid cloud design illustrated in the
diagram that follows to support Channel. Complete the table to assist in the
implementation of the networking functionality in order to host the web
frontend within the Cloudhop private cloud and application server and
database functionality within the DC on-premises Channel VRF.
Mark within the table which feature is required for each device/area of the
network.
Requirements/constraints from supplied documentation:
Cloudhop can run IPsec encryption on the virtual routers and normal
routing such as eBGP and even VXLAN multisite to emulate a VTEP,
providing Layer EVPN Type 5 routing. RFC1918 addressing can be used
on either cloud type.
OSPF wouldn’t be the protocol of choice for advertising the prefixes used
to host the application and database servers. There are no specific
requirements to extend the VXLAN multisite capability toward the cloud
provider (even though this is possible), so you certainly wouldn’t extend the
underlay peering used to advertise the Bank’s VTEPs unless you were
running VXLAN toward the cloud provider. If OSPF was to be used to
advertise the prefixes between environments, a separate instance within an
overlay VRF would be used, as opposed to the underlay OSPF process,
which would be reserved for the Bank’s fabric.
If you have marked this row correctly, you scored a quarter point.
NAT isn’t required for the on-premises infrastructures. You were informed
the cloud provider supports RFC1918 addressing, so the traffic inbound
from customers would target a public IP address hosted within Cloudhop
and then be directed toward the RFC1918-addressed destinations within the
Bank’s isolated on-premises VRF for the application and database servers.
A default route within the isolated VRF and Bank firewall would direct
return traffic toward Cloudhop.
If you have marked this row correctly, you scored a quarter point.
Typically, you would enable jumbo frames on your underlay fabric to cater
for additional VXLAN encapsulation overhead, but there is encryption
overhead on the link between Cloudhop and the Bank on the Direct
Connect link due to the requirements of traffic being encrypted. As such,
enabling jumbo support on this link would be beneficial to avoid any
fragmentation issues. The feature would need to be enabled on the interface
of each connecting router and is also marked on the Direct Connect link for
clarity, but you would still score a point if you have only selected the
Banknet Border Leafs and Cloudhop Router.
If you have marked this row correctly, you scored a quarter point.
MACSEC isn’t supported on the Cloudhop router, so this feature would not
be enabled.
If you have marked this row correctly, you scored a quarter point.
This isn’t required. You would just be providing routing information in how
to route to the application and database VLANs. If you did want to extend
the VLANs, you would need EVPN Type 2 routes over VXLAN multisite
to achieve this, which the cloud provider does not support (it does support
Type 5 routes, however, which would allow you to run multisite and route
prefixes using VXLAN if you needed to). At the time of writing, cloud
providers do not support the extension of Layer 2 networks into their
environment using VXLAN.
If you have marked this row correctly, you scored a quarter point.
This would be required only within the Channel VRF and on the border leaf
and VTEPs within the DCs.
If you have marked this row correctly, you scored a quarter point.
Summary
This was a fast-paced scenario that incorporated some recent DC and cloud
technology trends and innovations. It’s unlikely you would be able to study
for everything that came up during this lab, so if you have identified some
weaker areas, don’t be disheartened. Instead, discuss these areas with
colleagues or your study group to gain an insight into rationale or specific
technology that they might have more experience with than yourself. If you
found the lab straightforward, then congratulations, as it was arguably more
challenging than any scenario you might be presented with during your real
exam.
Accurate scoring of the lab isn’t crucial; neither is completing the lab
strictly within two hours. The important factors are that you just
experienced the level of complexity you will meet in the real exam, and you
have benefited from the exercise of determining the correct answers based
on the stipulated requirements. You should realize being successful in the
CCDE exam isn’t solely about best practice or industry trends; it’s about
connecting with the scenario and following it, and answering the design-
related question based on the constraints and requirements provided to you
within the background information, documents, and specific questions. If
you found it too hard to select the optimum answer, you likely missed a
constraint or requirement and can use this lab as practice to determine
which information is worth making a note of and developing a skill to
analyze design requirements to aid your design decisions.
If you do want to score yourself, a maximum of 39 points were available in
this lab. If you scored over 28 points (approximately 70%), you have a very
good chance of being successful on your CCDE exam.
Index
Numerics
5G, 84–85, 92
802.1Q, 321
A
APNs (access point names), 176
application load balancing, Squid Energy, 154, 209–212
ASNs, 99
authentication
Bank of Jersey, 367
smart meter, 194–195
automation, 288, 289, 290, 294, 363, 365–366, 370
B
backup DC, Bank of Jersey, 304–305
bandwidth, increasing, 310–312
Bank of Jersey
authentication, 367
automation, 365–366, 370
bandwidth, increasing between locations, 310–312
BankDMZ network, 233–234
BankExt network, 232–233
Banknet WAN, 235–236
pre-production environment, 279, 346–348
securing the production environment, 354–356
branches and campus locations, 236
circuit type, selecting, 301–303
cloud technology, 294–296, 379–382
design considerations, 377–378
hosting options, 370–376
company background information, 230–231
DC, 231, 243, 245, 248–249
backup, 304–305
legacy issues, 248–249, 251, 308–309
separation technology, 257, 259, 319, 320–321, 322
standby, 306–308
DCI traffic encryption, 357–358
firewalls, 286, 288, 359–362
MDT (model driven telemetry) and, 369–370
migration, 283, 349–353
multi-destination BUM traffic, 273
multi-destination replication mode, 277
network information, 231–232
network management, 236
overlapping VLANs, 336–337
separation of networks, 323–324
third-party routers, 313–319
VNIs, 272, 339–340
VXLAN EVPN multisite, 262–264, 326–328
BUM traffic, 340–344
leaf/spine architecture, 329–332
security and, 325
super spines, 333–334
BankDMZ network, 233–234, 339–340
BankExt network, 232–233, 339–340
Banknet network, 234–235
pre-production environment, 279, 346–348
securing the production environment, 354–356
BGP
ASNs, 99
loop mitigation, 97
BiDir, 345
branch locations, Bank of Jersey, 236
C
campus locations, Bank of Jersey, 236
cellular connectivity, Squid Energy, 175
certificates, smart meter authentication, 194–195
circuit type, selecting, 301–303
Cloud onRamp for SaaS, 111
cloud technology, Bank of Jersey, 294–296, 379–382
design considerations, 377–378
hosting options, 370–376
connectivity, 113–114
consolidating, 65–66
EV charging points and, 222–226
controllers, placement within SD-WAN, 42–102
D
DC
Bank of Jersey, 231, 243
legacy issues, 248–249, 251, 308–309
separation technology, 257, 259, 319, 320–321, 322
Banknet, 234–235
Jacobs, 6
connecting independent stores to, 61–64
consolidating connectivity into, 65–66
Toolmate, 8–9
DCI link, Jacobs, 7
dynamic routing, Squid Energy, 142, 195–200
E
edge routers
ASNs, 99
SD-WAN, 89–91
EIGRP, loop mitigation, 97
encryption, 357–358
F
firewall(s)
Bank of Jersey, 286, 288, 359–362
Jacobs DC, 6
SD-WAN and, 84–85
G-H
HAN (home area network)
protocols, 158, 213–214
Zigbee, 159–160, 215–216
headend, 89–91
H-VPLS (Hierarchical VPLS), 321
I
independent stores
connectivity to Jacobs DC, 61–64
MPLS provider networks, 5–6
optimal approach to MPLS changes, 57–60
WAN networks, 3–4
Internet, SD-WAN and, 81–83, 87–88
IPv6 addressing, smart meters, 129, 133–134, 177–178, 179, 180–181,
182–183, 184–186
ISP, SD-WAN and, 70–71
J
Jacobs, 55
background information, 2
Cloud onRamp for SaaS, 111
DC network, 6, 65–66
independent stores
connectivity into Jacobs DC, 61–64
MPLS provider networks, 5–6
optimal approach to MPLS changes, 57–60
WAN networks, 3–4
Internet and WAN utilization statistics, 9–11
Jimmy’s connectivity, 113–114
main issues facing, 53–54
MPLS provider networks, 4–5
practice lab questions, 12–51
scalability, improving, 55
SD-WAN
benefits of, 68–69, 74–75
BGP ASNs, 99
controller placement, 42–102
design considerations, 92–95
firewalls and, 84–85
headend, 89–91
Internet connectivity and, 81–83, 87–88
ISP costs and, 70–71
loop mitigation, 38–97
migration, 44–107
planes, 77–78
post-migration quality issues, 47–110
security and, 72–73
selecting type of, 76
underlay technology, 79–80
Toolmate
MPLS provider network, 5
WAN network, 3
WAN networks, 3
Jacobs stores, 3
MPLS provider networks, 4–6
Toolmate stores, 3
Jersey, 230. See also Bank of Jersey
K-L
latency, 301
leaf/spine architecture, EVPN VXLAN network, 329–332
load balancing, Squid Energy, 154, 209–212
loop mitigation, SD-WAN, 38–97
M
MDT (model driven telemetry), 369–370
migration
Bank of Jersey, 283, 349–353
SD-WAN, 44–110
Squid Energy, 220
MPLS
optimal approach for independent stores, 57–60
provider networks
independent store, 5–6
Jacobs, 4–5
Toolmate, 5
multicast, BiDir, 345
N-O
Office 365 SaaS, 11, 111
OMP, loop mitigation, 97
OpenDaylight, 365–366, 368
OSPF, 150–151
area type, selecting, 201
loop mitigation, 97
optimization, 202–203
summarization, 205–208
overlapping VLANs, 336–337
P
practice labs
Bank of Jersey
authentication, 367
automation, 365–366
backup DC, 304–305
bandwidth, 310–312
BankDMZ network, 233–234
BankExt network, 232–233
Banknet DC network, 234–235
Banknet WAN, 235–236, 279
branches and campus locations, 236
circuit type, selecting, 301–303
cloud hosting options, 370–376
cloud technology, 294–296, 379–382
company background information, 230–231
DC, 231, 243, 245, 248–249, 251, 257, 259
DCI traffic encryption, 357–358
firewalls, 286, 288, 359–362
MDT (model driven telemetry) and, 369–370
migration, 283, 349–353
multi-destination BUM traffic, 273
multi-destination replication mode, 277
network management, 236
overlapping VLANs, 336–337
resiliency, 237–238
separation of networks, 323–324
standby DC, 306–309
third-party routers, 313–319
VNIs, 272
VNIs, creating, 339–340
VXLAN EVPN multisite, 262–264, 326–328, 329–332, 340–344
Jacobs. See also Jacobs
background information, 2
Cloud onRamp for SaaS, 111
consolidating connectivity into DCs, 65–66
DC network, 6–9
improving scalability, 55
Jimmy’s connectivity, 113–114
main issues facing, 53–54
navigation, 1
network background, 3–4
optimal approach to MPLS changes for independent stores, 57–60
post-migration quality issues, 47–110
questions, 12–51
SD-WAN, benefits of, 68–69, 74–75
SD-WAN, controller placment, 42–102
SD-WAN, design considerations, 92–95
SD-WAN, firewalls and, 84–85
SD-WAN, headend, 89–91
SD-WAN, Internet and, 81–83, 87–88
SD-WAN, ISP costs and, 70–71
SD-WAN, loop mitigation and, 38–97
SD-WAN, migration, 44–107
SD-WAN, planes, 77–78
SD-WAN, security and, 72–73
SD-WAN, selecting type of, 76
SD-WAN, underlay technology, 79–80
WAN and Internet utilization statistics, 9–11
WAN documentation, 3–6
Squid Energy
APNs (access point names), 176
application load balancing, 154, 209–212
background information, 119–121
cellular connectivity, 126, 175
dynamic routing, 142, 195–200
EV charging points, 167–168, 222–226
HAN (home area network), 157, 213–214, 215–216
implementation plan, 218–219
IPv6 addressing, 129, 133–134, 177–178, 179, 180–181, 182–183,
184–186
migration, 220
network background information, 118–119
OSPF, 150–151, 201, 202–203, 205–208
smart meters, 124–125, 162–164, 169–170, 171, 172–175, 194–195
WAN to central location design, 135, 186–191
WAN to Co-lo design, 138, 191–193
Zigbee service, 159–160
production environment, securing, 354–356
Q-R
QinQ, 320–321
resilience
Bank of Jersey, 237–238
SD-WAN, 89–91
S
scalability, Jacobs, 55
SD-WAN
benefits of, 68–69, 74–75
BGP ASNs, 99
controller placement, 42–102
design considerations, 92–95
firewalls and, 84–85
headend, 89–91
Internet connectivity and, 81–83, 87–88
ISP costs and, 70–71
loop mitigation, 38–97
migration, 44–107
planes, 77–78
post-migration quality issues, 47–110
security and, 72–73, 92
selecting type of, 76
underlay technology, 79–80
security
production environment and, 354–356
SD-WAN and, 72–73, 92
VXLAN EVPN multisite and, 325
separation of networks, Bank of Jersey, 257, 259, 319, 320–321, 322,
323–324
smart meters, 159–160, 169–170
APNs (access point names), 176
certificates, 194–195
IP addressing, 124–125, 171
IPv6 addressing, 177–178, 179, 180–181
DHCPv6 and, 182–183
prefix length, 184–186
migration, 220
WAN technology, 173–175
Zenith, 172
Squid Energy
application load balancing, 154, 209–212
background information, 119–121
cellular connectivity, 126, 175
company background information, 116–117
dynamic routing, 142
EV charging points, 167–168
“call home” feature, 225–226
connectivity, 222–225
HAN (home area network), 157
protocols, 158, 213–214
Zigbee, 159–160, 215–216
implementation plan, 218–219
IPv6 addressing, 129, 133–134
migration, 220
network background information, 118–119
OSPF, 150–151
area type, 201
optimization, 202–203
summarization, 205–208
smart meters, 159–160, 169–170
APNs (access point names), 176
certificates, 194–195
IP addressing, 124–125, 171
IPv6 addressing, 177–178, 179, 180–181, 182–183, 184–186
WAN technology, 173–175
Zenith, 172
WAN to central location design, 135, 186–191
WAN to Co-lo design, 138, 191–193
standby DC, Bank of Jersey, 306–308
summarization, OSPF, 205–208
T
third-party routers, 313–319
Toolmate
DC, 8–9
MPLS provider network, 5
MPLS VPN network, 5
network background, 3
WAN network, 3
U-V
UK. See also Bank of Jersey, power generation and distribution, 117–
118
underlay technology, 79–80
VLANs
BankDMZ network, 234
overlapping, 336–337
VNIs, creating, 339–340
voice connectivity, EV charging points, 225–226
VRFs, 321
VXLAN EVPN
leaf/spine architecture, 329–332
multipod, 321
multisite, 262–264, 321, 326–328
BUM traffic, 340–344
security and, 325
super spines, 333–334
W
WAN networks, Jacobs
independent stores, 3–4
Jacobs stores, 3
MPLS provider networks, 4–6
Toolmate stores, 3
X-Y-Z
YANG model, 364
Zenith smart meters, WAN options, 172
Zigbee, 159–160, 215–216