DMVPN Phase 3 Dual Hub | FREE CCIE Practice Lab

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
now i can't explain why i think vpns are the coolest things since sliced bread but i've just always thought that as a network engineer vpns are just the coolest thing that you can do and dmvpn is no exception to the rule i love dmvpn but the thing with dmvpn is there's just a lot of commands to memorize now somehow in this video i remembered them but i may not remember them on the day that it comes to actually do the lab exam so my encouragement to you is if you go through this practice exam if you're following along this is one of those videos where you probably want to repeat the task a few times so that you get the muscle memory of typing those commands down and that way you don't get into a lab exam situation and forget one particular command that brings the whole thing to life or something like that also pay attention to the show commands at the very end because they're going to be very important in the lab exam which they've identified as actually a troubleshooting portion of the exam they give you a working dmvpn you have to figure out why it's not so in this video we're going to deploy a dual hub phase 3 dmvpn and then check out how it's working with some show commands at the end let's get going all right what's up everybody we're bringing it back again and carrying on with this ccie practice lab thing that we're doing here here's the thing now we're going to tackle dm vpn and here's really the thing about dmvpn if if you're if you're not doing dmvpn every day it's really easy to forget all these commands so there's there's decent chance i may forget some of these commands along the way especially uh if we start tackling crypto and ikev2 i also want to say this about dmvpn when it comes to dmvpn especially on the ccie lab exam the action verb in the blueprint is troubleshoot it's not configured but i feel pretty strongly that if you can configure it you'll be able to troubleshoot it better beyond that when you deploy this thing from scratch you have the opportunity to intentionally break something along the way and see what it does see how it behaves and then troubleshoot that do some show commands and see what it looks like when things go wrong because you know what you know how to configure it correctly so i'm going to intentionally forget authentication or intentionally put you know the nhs server in the wrong place or something like that so that that's my intention here with this when we're going to go through this task so let's let's take a look at the task first we'll bring up dmvpn and here we go so customer 2 this is the green site where we had all of that mpls layer 3 vpn fun customer 2 has decided to migrate off of mpls layer 3 vpn and into dmvpn co-figure um step 1 delete any relevant mpls layer 3 vpn configs on the customer 2 edges restoring all connectivity on their land side no vrfs should remain if they are present okay so we're going to delete the vrfs we'll probably have to reassign the ip addresses on those interfaces and we'll have to reconfigure eigrp on the lan side because eigrp was all in named mode and in the vrf configuration so that's going to be step one step two create a dual hub dmvpn over the internet links okay so all sites should operate in the same eigrp autonomous system asn 50 and exchange routes via dmvpn okay so we may end up having to delete the land side or reconfigure the land side anyways everywhere throughout the land if we didn't use asn 50. i think we did over on sites one and two but not on sites three and four so we'll have to look into that um confirm that each site can reach each other's each reach another site's wan link okay so we need to have like a default route that sends it to the internet and the internet should have exchanged those routes via bgp we configured all that already in the first step uh so we just need a default route towards the internet there site three and four over here on the right hand side are gonna be your hubs that's r11 and r13 sites one and two should be spokes tunnel ip address uh should be 192.168.43 so we've got a subnet there dmvpn should be phase three so we need redirect and shortcut nhrp should use authentication with a password okay ip and hrp authentication and then ike v2 should be leveraged to secure tunnels so my plan of attack here because i know i'm going to slip up on ikev2 i mean it's ikv2k then ike v2 profile then ipsec transform set with mode of transport i got to remember that and then you create the ipsec profile where you do set ipsec transform set and set ikev2 profile or something like that there's a set command we're going to use question mark to figure it out so i'm going to save crypto for last um and just make sure that we can bring the dmvpn up so let's just bring up our wan routers in this case uh this is gonna be r7 and our nine in fact here let's do a split screen let's get that going i left twitter open it's too happy talking about stuff on twitter if you don't follow me on twitter i you know shameless promotion here um i'm active on twitter we can chat so hit me up data underscore knocks our 10 and r12 so first things first we got to get rid of all of these vrf's so let's do we're getting rid of the mpls layer 3 vpn all of these were configured on e0 for mpls layer 3 vpn so let's do show run interface e00 okay interface ethernet e0 no vrf forwarding actually config t interface ethernet e0 no vrf forwarding land ip address 192 169 uh then it's going to be from there on us to figure it out okay i'm just going to give myself this to show and show run interface ethernet e0 that way i can just do this super quickly but first oh i didn't like that no because i apparently grabbed the show command okay 192.689.169.477.255.255.255.0 okay um now let's do do show run type section eigrp okay big t uh no i'm already in the router eigrp ccie we are gonna do no just get rid of this entire address family from the land side and we really need to get rid of this entire address family for the land side too don't we okay and now we are going to go into a dress family ipv4 unicast autonomous system 50 and we're going to recreate what we had here there we go and let's do no router we had bgp in here too didn't we do show run interface not interface section bgp and we're going to do no router bgp 65 okay so if i do show iprout what do i have nothing okay do show run section eigrp let's make sure everything's looking kosher here um also have to get rid of the vrf on the lan side too okay something to keep in mind um do show run interface ethernet zero two um interface ethernet zero two no vrf forwarding lan set the ip address back right there the rgrp adjacency came up um probably messed up my multicast section two uh you know is that do i really want to mess with fixing multicast right now um i mean there's not much to fix here ippim rp address mikey pim rp i must have had debug on look at all that oh not pin pim pimp okay so anyways at this point now if i do show iprout yep i see all these routes uh these are still external because they're being learned over mpls on the other side so now we need to jump over to r9 and we're going to break that connection so enable let's just grab this real quick um 29.9 255 255 255.00 interface ethernet 0 r7 had a lot of stuff in the vrs weight didn't they they did 2 3 and 1 0. forgot one thing do show run interface ethernet zero three yep and ethernet one slash zero yeah i remembered this one had multiple interfaces so we need to fix each of these ethernet zero three no vr forwarding lan set the ip address back this is why my pim adjacencies didn't come up and interface ethernet one zero no novira forwarding lan ip address here okay now do show ip route looking a lot better okay um great now we can go over here to r9 we fixed interface ethernet 0 zero now we got a fixed interface ethernet zero two do show run interface ethernet zero two interface ethernet zero two no vrf forwarding lan reset the ip address uh just check the pin one more time i don't know if i actually fix pim here yeah i didn't even do anything with pim here i didn't even set the vrf on this one so it probably means i did the multicast section wrong on r9 but that's okay we were undoing it anyways um so now if i do do show iprout no adjacency is up between e02 and e0 do show run interface ethernet zero two oh because we're gonna fix eigrp do show run section eigrp no router eigrp ccie no address family this one this one there we go and no i like that you can click three times in secure crt and it copies the whole line it would make me so happy if we could use like a secure crt like tool in the ccie exam i mean you know secure crt runs on linux i have it on my ubuntu machine and i can even get even g to launch insecure crt from my linux machine it's so nice address family ipv4 unicast autonomous system 50 we're going to re-put 50 in here so let's just copy and paste all this paste here um you know i'm going to fix this redistribute statement here no oop hey no there we go let's get rid of bgp entirely no router bgp oop what's x out of this exit exit exit no router bgp awesome cool um just curious just out of curiosity do show ipm route not exactly what i was hoping for but not the end of the world either um okay let's fix r10 enable okay nope 103 10 255 255 255. that's zero um also remember we're changing this one to let's do do show run section eigrp yeah we're changing the autonomous system on this one it doesn't even look like i'm running an autonomous system on the land side anyway so it doesn't matter okay i guess when i was doing all that vrf stuff i just skipped r10 am i even looking at the right router no i am on the wrong router i should be on r11 not 10. man about to blow some stuff up wow the attention to details y'all i am it's a good thing you know i'm going through all this stuff right now because it's like man if you were to roll into the exam without that with this level of focus just missing the obvious things it would not be pretty do show run and if this is one where i have the switches so i've got e03 and e02 let's look at e02 first interface e zero two you know vrf forwarding land grab the ip address again one two three boop and interface ethernet e03 no vrf forwarding lan oh did i forget to do show run what have i done i think it's i think it's 244 we're gonna find out um let's see what the uh swish on the inside of that had there's some free video games there you all want to play some free video games that was e03 right i think it's 244 yeah we're good okay cool cool cool cool okay all right um so let's get rid of switch three we don't need it anymore we're back on our 11 and we are looking at do show run section eigrp and we're going to delete all this stuff router eigrp ccie no address family win no address family land address family ipv4 unicast autonomous system 50. let's just grab the network statements here that's the only thing i need and we now do have to fix the switches i deleted i closed those console sessions out but we need to fix them both okay let me just set this back ooh oh what about oh man that was really messed up here we go uh okay cool so now we've got switch 30 here show run section eigrp cool nothing too bad here no router eigrp 60 router eigrp 50. just grab that network statement same thing with switch 32 i bet so run section eigrp big t no router eigrp 60 router eigrp 50. grab that network statement dual adjacency is up so i see my two adjacencies are up here do show iprout cool beans cool beans look i already have a little static route here for my default route i don't think i have a default route anywhere else but maybe there but that's okay as long as the default route is there we can get via the tunnel and that is cool all right r12 um if i kind of thumb this over a little bit so you can see man i did it again odd numbers are for customer two not even others okay let's grab my little quick start okay um ipad 135 13 255 255 255.0 uh interface ethernet e02 do show run interface ethernet e02 no vrf forwarding land grab the ip address statement do show run section eigrp router eigrp ccie no let's grab the address family delete that no grab the other address family delete that address family ipv4 unicast autonomous system 50. and just grab the two network statements right here cool i feel like a neighbor adjacency should have come up already but it is not coming up already because it's not autonomous system 50 on this side either is it let's go over to r17 we got a lot of stuff to fix there's a few routers over here show run section eigrp router eigrp ccie no address family address family ipv4 unicast autonomous system 50. grab it all okay okay my adjacency came up over there but it killed my adjacencies down here right yep big t router eigrp ccie no grab the address family address family ipv4 unicast autonomous system 50. grab my network statements and lastly r40 run section t router eigrp ccie no grab the address family paste address family ipv4 unicast autonomous system 50 and my network statements all right so now our 13. if i do show ip route we should have some eigrp these are the ones that we leaked out of that stub those were the loopbacks and that is perfectly good to go for me all right so uh step one is done delete all relevant mpls layer three vpa so no vrs remain i mean the vrs are still in the config but they're not on the interface so i'm fine with that all right create a dual hub dmvp in solution all sites should operate in eeigrp asn 50 done in exchange routes via dmvpn that will be done confirm that each site can reach each other's wan link okay so now we need to get the default routes to go out via the lan link so show iprout so the wan the internet links are 192.168. uh so if i do um an ip route this is gonna be zero zero zero zero zero zero one nine two one six 168 i see my link is seven because i'm our router seven uh the local octet is going to be seven the remote octet should always be one but we can confirm that by looking at the isp config real quick enable show ip route show ip interface brief yeah so 7.1 and 6.1 so this is good okay close that one out just to leave so there's not any confusion so uh we now have an ipa on our r7 let's do two show ip route on r9 okay already in there i figure out zero zero zero one two three four one nine two one six eight nine dot one eleven should be kind of the same treatment but we already have this default route here exit exit ip route 0 000 0 1 2 3 4 192 168.13.1 okay okay 192.168.7.7 crossed not gonna make it okay why not why not why aren't you making it there let's take a look so it's going to go out 13 into isp 300 isp 300 needs to have a route so ip route towards 192.1687. it does via 3440 which means i'm pretty sure that's this guy here show ipv route via 143.143143 which is here and then it's locally connected why did it die because there's no 13. is isp 300 not advertising r13 that's a problem pgp ipv4 even guess show bgp ipv4 i got a feeling that we didn't advertise our local networks that's not good y'all do show run section bgp sure didn't okay router bgp 300 address family ipv4 unicast network 192.168.13.0 mask 255.255.255.0 now i see 7 9 and 11 already in the routing table so i'm not terribly concerned there um so now when i look on unicast well well that'll do it i don't have an ip address there interface ethernet zero three okay so if you address even the best fall down sometime temptation was to do copy run start there but i didn't i did not no copyright start and 13 is there now and from our 13 come on go the distance go the distance yes first one lost to arp can we ping 9.9 yep can we ping 11.11 round trip um so that means the internet backbone officially works now how did i just manage to pick the one router where i forgot to assign an ip address okay so there step two is now done for our dmvpn configuration we haven't even done a dmvpn configuration yet uh and i've lost the lab tasks so let's just bring them back up okay uh let's slide things over make it look pretty that's good site three and four should be hubs site three and four are 11 and 13. and i want this tunnel interface to be sourced from my wan interface it tells us down there in step 5 what the ip address should be so now this is the part where you have to start thinking okay what are my configuration steps for d and vpn again interface tunnel let's say zero that's fine with me uh tunnel source is going to be what is my total source for 192.168. e01 e01 uh ip address is going to be 192.168.43 let's call two five this 11 five five dot zero just beca just out of habit i say no shut every time um tunnel mode is multi-point gre gre multi-point um what else do we need to do here uh ipnhrp we're going to map multicast dynamic we had authentication requirements right authentication was going to be data knocks we said this is going to be phase three so that's ipnhrp redirect we also know that with hubs that and we're going to be running eigrp so we need no ips split horizon nope this is named configuration mode named uh ccie so we have to set that under the the address interface configuration under the address family okay just for fun do show run interface tunnel zero what am i missing i'm missing a lot um okay so we're missing the nhrp network id we're missing tunnel protection which we're gonna do later um eigrp split horizon we don't need to do next stop self or no next top self because this is phase three that's kind of the cool thing about phase three uh mtu the pmtu 1400 and iptcp adjust mss 1360 question mark i think it's 1360. okay do show run interface tunnel zero um it didn't even take my map multicast dynamic command i guess because i don't need it i guess that's the default on total mode gre multipoint okay ip and hrp let's bring it to life network id is what turns it on network id1 how about that you can also do like a tunnel key if you really want to you know it's fine you can do that um i don't think we need to and i said i was going to save krypto for the last right i did um so let's bring up our 13 now okay nope you take t interface tunnel 0. you can almost copy and paste what we just did didn't couldn't we let's take a look outside of the ip address all this stuff is gold so let's just do that so we're in interface tunnel zero yep paste ip address 192 168 43.13 255 255 255.0 no shut just out of habit um now let's bring up our spokes that's r7 interface tunnel zero i'm gonna face tunnel one face tunnel two there we go interface tumble to do the trick um let's just take a look at some of the things that i just done here that i know we're gonna do so since this is phase three i'm going to use multi-point i'm not going to use redirect i'm going to use shortcut so let me copy some of the things down that i want i want mtu and authentication i want ipnhrp shortcut i want these items here but now i have to do ipnhrp nhs and that's where i'm going to stop so that i can configure this on the now okay so here's the thing with the ip and hrp nhs if you watch like 90 of training out there they're going to do ipn hrp nhs then on the next line they're going to do ip and hrp map then on the next line they're going to do ipg hrp map multicast and here's you can do it all on one line see check this out so if i do ipnhrp nhs and i set my first server to be 192.168.4313 the next option is nbma what's the mbma address of it and we're going to say 192.168.13.13 and then multicast you can do it all on one line do i even have yeah i can even do the priority here too so since this is phase three we have to specify who's going to be our primary hub and in what cluster so i can set priority here to 1 in cluster 1 press enter now if i press up i can rerun this command for the other hub which is going to be 11 who's located at 11 11 and set the priority to what have i done okay try it again we'll set the nh the secondary nhs server to be 11 the nbma address to 11 and 11 the priority here is two so now if i do do show ip do show run interface tunnel zero let's look uh instead it did something else do show run interface tunnel zero why is that show run interface tunnel zero oh interface tunnel this is like tunnel two right yeah i don't know why i kept doing uh copy run start on me there okay so uh we got no ip address no ip redirects oh we need to set an ip address interface tunnel 2 ip address 192 168 43. 7 255 255 255.0 i've got authentication i need to the network id ip nhrp network id let's call it one i think i forgot that on r13 yeah ipnhrp network id one and i did run that here right yeah so now do [Music] show run interface tunnel two okay let's do now to show dmvpn hey look at that i now have two uh peers set up in the upstate so that's awesome do show run interface tunnel zero dang it i did it again okay so let's do this let's grab this i'm just going to copy this is for the spoke config so i'm going to paste it down here we're going to change the addresses for router 9. i think that's the only thing i need to change here for router 9. copy this over here to router interface config t interface tunnel i'm going to set this to 1 because i know pim is running over here we'll change these configs tunnel mode is up do show being vpn there we go two in the upstate do show ipnhrp look at that so cool so cool makes me so happy what does the hub think about it do show dm vpn showing in the upstate on the hub uh so now what we could do is we could bring eigrp into the mix then bring up ike v2 and the ipsec tunnels on it uh and as we bring the ipsec tunnels out we can see them you know the tunnels are going to flap because they're going to go down and then they're going back back up or whatever so let's do this first too we need to set on the hubs the eigrp no ip split horizon command so router eigrp ccie uh address family ipv4 unicast autonomous system 50 af interface tunnel zero no split horizon same thing over here router eigrp ccie address family ipv4 unicast autonomous system 50 uh af interface tunnel zero no split horizon now i can exit out of af interface configuration mode and we can start advertising routes via two three two five five let's grab this eigrp over the tunnel boop r13 exit r9 router eigrp ccie address family ipv4 unicast autonomous system 50. oop oh so cool router eigrp ccie address family ipv4 unicast autonomous system 50. boop bring up three adjacencies period to 11 and 13 which are the hubs which is what i expect i don't expect an adjacency to come to a spoke yet until i try to reach it so if i do do show iprout look at all that end-to-end connectivity across the board oh this makes me just so stinking happy like i'm just out of curiosity now like if i look at r17 r17 i'm pretty sure we can figure it as a stub right enable and enable show ip route yeah it's still got some some good info coming in across the tunnels here um still learning the routes across the tunnels so theoretically i should have no problem pinging like r9s loopback from here ping 9.9.9 at nine source from my loopback of loopback zero did i just deploy dmvpn from memory uh let's just see if i can make it worse by adding crypto into the mix okay okay so this is gonna be a lot of context sensitive help crypto like v2 key profile no maybe keyring there it is crypto we do have to do a profile but you have to have a key ring first so i'm going to call this ike to key um we got to specify a peer we're going to give it the peer and name of any the address of the peer is going to be zero zero zero zero do i have to specify mask yep zero zero zero zero zero and the pre-shared key itself what do we want to call what do we have to say uh we can come up with our own key i'm just gonna use data knox because that's what was specified in step seven okay so now we have the key ring set up for ip2 let's exit out of the key ring crypto pike v2 profile and give it a name ike to prof how about that okay it even tells you what to do a local and remote authentication must be set and a match identity must be set as well so let's say match we're going to say identity right remote address zero zero zero zero zero zero zero zero so this means we're gonna set this to any remote address is allowed to connect inbound i'm just gonna set that because i didn't specify anything else um authentication local is pre-share key oh no we can just set it to be pre-share because we're going to specify a pre-share key okay authentication remote pre-share and then the actual pre-share key itself right keyring right there key ring is my local key ring of ike to key okay crypto now we have to do the ipsec tunnel the phase two stuff the ipsec transform set give it a name i'm going to call this transforms how about how about that uh the first thing we're going to do let's do shot 256 hmac shot 256 hmac and esp aes we have to specify the number of keys for aes how about 192 press enter tunnel mode oh mode transport okay so that should be my transform set the last thing is crypto ipsec profile and we'll just call this profile for short oh i'm glad they bought a dell r620 thanks for watching um you're watching me on a del r710 right now um cool so let's do that we're gonna set the transform set to be what do we call it transform and set the ikev2 profile to be ike to prof okay um do show run section crypto darn right i'm going to copy all that um and now the last but not least interface tunnel zero right because we're on this device interface tunnel two tunnel protection ipsec and then the profile name right which we called profile this will break the tunnel nope specify the word profile followed by profile so now let's do this r9 exit exit whoop let's do interface tunnel one tunnel protection ipsec profile profile exit exit paste in exit interface tunnel zero uh tunnel protection ipsec profile profile does this bring any adjacencies back up sure does exit exit interface nope gotta paste all the crypto exit interface tunnel zero tunnel protection ipsec profile profile come on bring me up to adjacency dm vpn is up and working this one feels good do show dm vpn so now the cool part show iprout let's bring it up so something to like uh you know honestly we would have learned r9 internally we wouldn't have learned it over the the tunnel yeah we did we learned it over um oh you know what that's something we forgot setting bandwidth and delay we're running eigrp on these tunnel interfaces um so it's probably got these like redonkulous metrics like let's see what are we learning from like across the way um like 17 yeah this is pretty pretty high metric let's let's do show ip eigrp topology for 17. seventeen seventeen seventeen slash thirty two do you have to specify the mask yeah two five five two five five two five five two five five yeah bandwidth is a kilobit okay so this is why you have to set bandwidth and delay on your tunnel interfaces otherwise the igrp is not really useful so let's go into interface tunnel two bandwidth uh what is it in kilobytes kilobits one two three one two three let's make a gig delay of two i don't know um r9 interface tunnel one bandwidth one two three one two three delay two are eleven i think we're already in there so how about bandwidth one two three one two three delay two lastly big t interface tunnel zero bandwidth one two three one two three delay two now i should expect my metrics to actually look a little bit better yeah metrics definitely look a little bit better which makes me happy that makes me really really happy i'm glad we did that okay so this should bring up dmvpn if i hadn't learned about all of these routes internally i mean we can do something like this watch this config t no exit let's go into r9 let's just kind of break it to see what it does interface ethernet 02 shut so now we're only going to learn routes over the dmvpn tunnel show ip route yep so now all of these routes come over the tunnel we can see i have two routes that are advertised to me uh one for thirteen one for eleven uh one for thirteen one for eleven one for thirteen one for eleven and so on and so on and so on uh which is cool notice here our seventh loopback is from thirteen and eleven uh first of all if there were multiple best paths there so like r13 is only allowed to advertise one path to me and r11 is only allowed basically to advertise one path to me but if it did have equal cost paths to that interface it could advertise both we would have to go into topology base and use the add paths command that is specifically i don't know if specifically but it's definitely 4d and vpn so that a hub router could advertise two paths if they're both the equal cost path uh to get across a tunnel somewhere so keep that in mind for the lab environment add paths is on the blueprint so r9 can only reach r7 over the tunnel now so if i do hang on let's do some fun traceroute seven seven seven seven if the trace route takes so long i wish there was a way i can make this go faster i i can't it's just or maybe i can i just don't know it i haven't googled it and i'm just patient enough to figure it out so okay so this is the big thing we see it goes to router 11 first and then i should expect it to go to router 7 then up to the loopback nope it also went to router 13. so went to both hubs um i guess because it saw like the opportunity to send equal cost multipaths so multiple pings packets are going across the tunnel oh okay invalid spi for destination that's that's funny okay but there it does make it to router seven right it's kind of jumbled but you can see 192.168.437 and then it makes it there so now let's do show ip route and we have the beautiful percent sign the beautiful percent sign right here tells me that this route has been overridden by nhrp and even though my next tops are 13 and 11 you can do show iprout in hrp and it shows you your real next stop isn't that fascinating it is an h symbol here for nhrp and now i see that my route for 192.16843.7 is directly connected uh via the tunnel which i think is is you know pretty neat um so any of these routes that are really like behind uh one of these other devices like um you know i don't know uh sure i think i hit that show ip output was too early like 17 is down here well 17 is going to go straight to a hub so it doesn't matter basically any of the routes that would be on the other side of r7 so this would probably be like 56 right here uh that would be the exact same thing let's also do show ip in hrp not show ip route in hrp now you can also see the 7777 prefix uh is via 192.168.43.7 and this is the router used rib for the next hop this is a really cool way to see what is really going on under the hood how do you reach all of these other devices and lastly of course there's show dmvpn um so now we're seeing of some cool things here uh i see my up status is here and yeah um the dt1 and the d2 here these are important we see that we dynamically learn them we have a route installed for it and we also have next top override here state is also important for troubleshooting if you're seeing like nhrp or something if it's not saying up if it's saying in hrp it means there's something wrong with your nhrp config um i think you can also do show dmvp in detail is that right detail yep and this is where you can actually see the crypto configuration that's in place um so that's you know always fun to dig into this and see um some actual statistics and packets uh if you're if you have a crypto configuration and you're not sure what could be wrong you want to check out the outbound sbi check out the transform set because the transform sets might not be matching either all right so that is dmvpn we did it somehow the different memory kind of had me i had to use contact sensor to help i didn't have to stop and google anything um so kind of proud of that one so there it is there's phase three dual hub dmvpn tested with next top override ah that feels good to be done with that one all right that's it thanks for stopping by y'all i'll see you in the next one
Info
Channel: Data Knox
Views: 1,113
Rating: 4.8888888 out of 5
Keywords: free ccie bootcamp, data knox ccie, ccie workbook, ccie practice lab, ccie practice exam, ccie practice, ccie enterprise infrastructure, ccie certification, ccie journey, ccie enterprise infrastructure lab, ccie routing and switching, ccie enterprise, ensdwi 300-415, ccie sd-access, ccie routing, ccie cbt nuggets, ccie bootcamp, ccie sd-wan, ccie automation, eve-ng lab, ccie eve-ng, ccie dmvpn, dmvpn phase 3, dual hub dmvpn, configure dmvpn, cisco dmvpn
Id: kOeoyvO9SGo
Channel Id: undefined
Length: 50min 52sec (3052 seconds)
Published: Mon Oct 12 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.