Welcome to CCNA 200-301
On February 24, 2020, it will no longer be possible to pass the CCNA 200-125, as it will be replaced by the CCNA 200-301 !!!
Why 301? Because we're going from CCNAv2 to CCNAv3! So we have big changes:
– The CCNA is 25% less dense than its predecessor.
– The ICND1, INCD2 and CCENT levels have been removed.
– Only one possible review: CCNA 200-301
– The official certification guides are in the form of two large books. (Like ICND1 and 2)
– The RIP and Frame-Relay are officially more on the program.
– Appearance of WIFI (in large quantities)
Several CCNA certifications have also disappeared:
– CCNA Cloud
– CCNA Collaboration
– CCNA Datacenter
– CCNA Industrial
– CCNA Routing and switching
– CCNA Security
– CCNA Security Provider
The new certification scheme is as follows:
The NACC 200-301 training program
I / The Basics – 20%
1.1 / Explaining the role and functions of the following network equipment:
– Level 2 and 3 Switch.
– Next-generation firewalls and IPS
– Wi-Fi hotspots
– Controllers (Cisco DNA Center and WLC)
– Termianux equipment (PC, IP Phone, etc. ..)
1.2 / Describe the characteristics of network topology architectures:
– 2 third
– 3 third
– Small office/home office (SOHO)
– On-premises and cloud
1.3 / Compare physical interfaces and the following types of cables:
– Single-mode and multi-mode fibers, copper
– Connections (Ethernet shared media and point-to-point)
– Concepts of PoE
– Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
1.4 / Know how to compare TCP and UDP
1.5 / Set up and check IPv4 addressing and subnetting
1.6 / Describe why we use private IPv4 addresses
1.7 / Set up and check the IPv6 address as well as the prefix.
1.8 / Compare different types of IPv6 address:
– Global unicast
– Unique local
– Local Link
– Modified EUI 64
1.9 / Know how to check the IP settings of the following devices: Windows, Mac OS and Linux
1.10 / Describe the different principles of WiFi connections:
– Nonoverlapping Wi-Fi channels
1.11 / Explaining the fundamentals of machine virtualization
1.12 / Describe how a switch works:
– MAC learning and aging
– Frame switching
– Frame flooding
– MAC address table
II / Switching – 20%
2.1 / Know how to set up a VLAN architecture.
2.2 / Set up and check an interswitch connection (Trunk, 802.1Q, Native VLAN)
2.3 / Set up and check CDP and LLDP protocols
2.4 / Set up and check (level 2 and 3) etherChannel (LACP)
2.5 / The Spanning-tree protocol
2.6 / Compare Cisco wireless architectures and AP modes
2.7 / Describe the physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports and LAG)
2.8 / Describe AP and WLC Management Access Connections (Telnet, SSH, HTTP, HTTPS, console and TACACS – / RADIUS)
2.9 / Set up components of a wireless LAN access for customer connectivity using a graphical interface only, such as WLAN creation, security settings, QoS profiles and advanced WLAN settings.
III / Routing – 25%
3.1 / Understanding how a routing table works (Routing protocol code, Prefix, Network mask, Next hop, Administrative distance, Metric, Gateway of last resort)
3.2 / Explain ingeter makes a default decision to route a package (Longest match, Administrative distance, Routing protocol metric)
3.4 / Set up and check an OSPF v2 architecture (with a single area)
3.5 / Describe the basic principles of FHRP (first hop redundancy protocol)
IV / IP Services – 10%
4.1 / Set up and check the NAT.
4.2 / Set up and check how NTP works in client and server mode.
4.3 / Explain the role of DHCP and DNS in architecture.
4.4 / Explain the role of The SNMP in an architecture.
4.5 / Explain the characteristics of the syslog by including facilities and levels.
4.6 / Set up and check DHCP customer and relay
4.7 / Explain jump transfer behavior (PHB) for quality of service, such as classification, marking, queueing, congestion, regulation, fitness
4.8 / Set up network equipment for remote access via SSH
4.9 / Explain the role of TFTP/FTP in an architecture.
V / Security – 15%
5.1 / Define key security concepts (threats, vulnerabilities, exploits and mitigation techniques)
5.2 / Describe the elements of the security program (user awareness, training and physical access control)
5.3 / Set up secure access to equipment using local passwords.
5.4 / Describe security password policy elements, such as password management, complexity and password alternatives (multi-factor authentication, certificates and biometrics)
5.5 / Describe remote accesses and site-to-site VPNs.
5.6 / Set up and check ACLs (Access Control Lists)
5.7 / Set up Level 2 security options (DHCP snooping, dynamic ARP inspection, and port security)
5.8 / Differentiating the concepts of authentication, authorization, and accounting (AAA)
5.9 / Describe Wireless Security Protocols (WPA, WPA2, and WPA3)
5.10 / Set up WLAN with WPA2 PSK via GUI
VI / Automation and programmability – 10%
6.1 / Explain the impact of automation on network management
6.2 / Compare traditional networks to controller-based networks
6.3 / Describe the architectures defined by the controller and defined by software (overlay, underlay, and fabric)
– Separation of plane control and data plane
– North and south API
6.4 / Compare traditional campus device management with Cisco DNA Center-enabled device management
6.5 / Describe the characteristics of REST-based APIs (CRUD, HTTP verbs and data coding)
6.6 / Recognize the capabilities of Puppet, Chief and Ansible configuration management mechanisms
6.7 / Interpreting JSON coded data
To find out how:
Preparing for the exam
Sign up for an exam
I invite you to read my article CCNA/CCNP Working Method.
Hoping you enjoyed this article!
Don't hesitate to let me know!!