Lesson 1SNMP deep dive: versions v1/v2c/v3, MIBs, OIDs, walk/get/bulk, traps an informsTek a deep dive into SNMP fi monitorin an limited control. Compare SNMP versions, understand MIBs an OIDs, use walk, get, an bulk operations, an configure traps an informs securely.
SNMP v1, v2c, and v3 security differencesMIB structure, OID naming, and browsingUsing get, get-next, walk, and bulkgetConfiguring traps and informs on devicesScaling SNMP polling and rate controlLesson 2Infrastructure automation tools: Ansible networking modules, module vs. connection plugins, idempotence an playbook patternsUnderstand how infrastructure automation tools manage network devices. Yuh will use Ansible networking modules an connection plugins, apply idempotent patterns, an structure playbooks fi safe, scalable configuration changes.
Network inventory and host variable designNetwork-specific connection plugins overviewIdempotent configuration patterns in playbooksValidating changes with check and diff modesError handling and rollback strategiesLesson 3Choosing protocols fi mixed-vendor environments: trade-offs (read-only vs config), security, performance, vendor supportLearn how fi choose management protocols in mixed-vendor networks. Compare read-only an configuration workflows, security models, performance impact, an vendor support fi design robust, maintainable automation strategies.
Read-only vs configuration change workflowsSecurity models and credential handlingLatency, throughput, and scaling considerationsVendor feature coverage and roadmap riskOperational standardization across vendorsLesson 4SSH fundamentals fi network devices: key-based auth, session management, command execution, terminal settingsReview SSH fundamentals as used by network devices. Learn key-based authentication, session lifecycle, command execution models, terminal settings, an security hardening practices fi automated access.
Key generation, storage, and rotationSSH ciphers, MACs, and protocol versionsInteractive shells vs exec channelsTerminal length, paging, and promptsJump hosts, bastions, and proxy commandsLesson 5REST APIs on network gear: common vendor endpoints, authentication (token, basic, OAuth), JSON/XML payloadsLearn how REST APIs are exposed on network devices. Yuh will examine common endpoints, authentication schemes, JSON or XML payload formats, versioning, an patterns fi safe, idempotent configuration changes.
Resource modeling for interfaces and VLANsToken, basic, and OAuth authenticationJSON request and response payload designError handling and HTTP status mappingAPI versioning and backward compatibilityLesson 6gNMI an streaming telemetry: subscription models, protobuf/JSON encodings, push vs pollDive into gNMI an streaming telemetry fi modern observability. Learn subscription models, protobuf an JSON encodings, push versus poll trade-offs, an how fi integrate telemetry streams into monitoring pipelines.
gNMI service model and RPC operationsOn-change, sample, and once subscriptionsProtobuf message schemas and toolingJSON encoding and translation to metricsScaling collectors and buffering strategiesLesson 7Network automation libraries: Netmiko, Paramiko, Napalm, PyATS/Genie — capabilities, drivers, limitationsExplore Python network automation libraries an dem trade-offs. Compare Netmiko, Paramiko, Napalm, an PyATS or Genie in terms a capabilities, drivers, abstractions, testing support, an operational limitations.
Paramiko SSH primitives and channelsNetmiko device drivers and send_commandNapalm getters and configuration mergePyATS and Genie parsing and testingLibrary selection and interoperabilityLesson 8Debugging an testing connections: connectivity checks, timeouts, retries, logging best practicesExplore practical techniques fi validating an troubleshooting network connections. Yuh will design connectivity checks, tune timeouts an retries, structure logs, an build repeatable test flows fi automated an manual operations.
Designing health and connectivity checksTimeout tuning and retry backoff strategiesStructured logging and correlation IDsCapturing and analyzing protocol tracesBuilding repeatable connection test playbooksLesson 9NETCONF an YANG: RPC model, capabilities, data modeling wid YANG, XML/JSON encodingsStudy NETCONF an YANG as core standards fi network programmability. Yuh will learn di RPC model, capability negotiation, YANG data modeling, an XML or JSON encodings used fi configuration an state management.
NETCONF sessions, locks, and RPC workflowCapability discovery and server feature setsYANG modules, trees, and data typesXML and JSON encodings for YANG dataModel-driven configuration workflowsLesson 10Vendor-specific programmatic interfaces: Cisco IOS-XE/IOS-XR/JunOS RESTCONF, Arista eAPI, Fortinet/Checkpoint APIsExamine vendor-specific APIs dat extend standard interfaces. Compare Cisco, Juniper, Arista, Fortinet, an Check Point offerings, focusing on authentication, data models, rate limits, an integration patterns.
Cisco IOS-XE and IOS-XR RESTCONF usageJunOS REST APIs and JSON data modelsArista eAPI transport and command formatsFortinet and Check Point firewall APIsHandling rate limits and vendor quirks