Contrail Networking for Service Providers (CNSP) – Outline

Detailed Course Outline

DAY 1
Chapter 1: Course Introduction
Chapter 2: Contrail Overview
  • Describe Contrail function and features
  • List contrail family of products
  • List Contrail supported orchestrators
Chapter 3: Contrail Architecture Basics
  • Identify the function of each of the main components of a Contrail cluster
  • Describe the protocols used for control, data, and analytics traffic
  • Explain how Contrail routes traffic using route targets
Chapter 4: Tungsten Fabric UI
  • Log in to the Tungsten Fabric UI
  • Acknowledge Alerts
  • Navigate the Monitor, Configure, and Settings workspaces
Chapter 5: Contrail Command UI
  • Demonstrate the basic functions of Contrail Command
Chapter 6: Verifying the Contrail Installation
  • Describe the Contrail Cluster Overview
  • Use the Contrail Web UI to view the cluster status
  • Use the command line to view the cluster status
  • View Contrail log files
  • Describe the Contrail Container Model
  • Start and Stop Contrail containers
DAY 2
Chapter 7: Configure Contrail IPAM and DNS
  • Configure Contrail IPAM
  • Configure Contrail DNS services
Chapter 8: Configuring Contrail Virtual Networks
  • Describe how a virtual network is implemented in Contrail
  • Describe the difference between an L2 and a routed virtual network
  • Describe how subnets are implemented in Contrail
  • Create a virtual network in Contrail
  • Describe the purpose of specifying host routes
  • Enable internetwork traffic
  • Describe how to implement distributed Source NAT for a virtual network
  • Configure virtual networks in a hub-and-spoke topology
  • Automate the creation of virtual networks
  • Verify functionality and troubleshoot virtual networks
Chapter 9: Creating Network Policies
  • Implement network policies and security groups
Chapter 10: Describing VM to BMS Bridging
  • Describe Contrail VM to BMS bridging
  • Implement a server instance
  • Implement virtual port groups
Chapter 11: Configuring a Contrail Fabric Gateway
  • Configure a physical gateway with Contrail Command
DAY 3
Chapter 12: Connecting to an External Router
  • Explain how virtual and physical networks can be connected
  • Use physical gateway devices with Contrail
  • Use simple virtual gateway
Chapter 13: Configuring Floating IP Addresses
  • Describe the purpose of a floating IP
  • Describe how Contrail implements a floating IP
  • Floating IP case study
  • Verify floating IP configuration function properly
  • Troubleshoot floating IPs
Chapter 14: Implement Contrail Network Services
  • Use BGP as a Service feature
  • Understand Graceful Restart Capabilities
  • Describe QoS support in Contrail
  • Understand Load Balancing as a Service
Chapter 15: Configure Contrail Service Chains
  • Describe service chaining within Contrail
  • Configure in-network service chains
  • Configure transparent service chains
  • Automate service deployment using Heat templates
DAY 4
Chapter 16: Configuring Network Address Translation
  • Configure Source NAT
  • Configure Distributed Source NAT
Chapter 17: Describe Service Chain Virtual Network Routing
  • Describe service chain virtual network routing
Chapter 18: Implementing Advanced Service Chains
  • Describe service chains with Docker containers
  • Describe physical network function integration
  • NFV for ISP Case Study
Chapter 19: Troubleshooting Service Chains
  • Describe service instance health checks
  • Troubleshooting service chains
DAY 5
Chapter 20: Implementing Contrail Security
  • Describe the need for Contrail security
  • Apply tags and labels to Contrail objects
  • Create and apply Contrail security policies
  • Visualize Contrail security traffic patterns with Contrail Insights
Chapter 21: Describing Contrail Insights
  • Describe the capabilities and architecture of
  • Contrail Insights
  • Describe Contrail Insights API
Chapter 22: Using Contrail Insights
  • Dashboard and Settings
  • Charts and Heat Maps
  • Plans and Reports
Chapter 23: Implementing Contrail Insights Alarms
  • Implement alarms
  • Implement composite alarms