Course Summary
Topics We Will Be Covering in the WORKSHOP:
Please NOTE that once you enroll in the workshop, you will receive an automatic email with the link to register for the LIVE ZOOM!
Multi-Area OSPF Deep Dive
🔸 – Introduction & Workshop Objectives
•Brief overview of OSPF
•What you’ll walk away with: real-world skills for scalable routing and secure network design
🔸 – Multi-Area OSPF Theory
•Why use multiple OSPF areas?
•Area 0 (Backbone) and other areas – types and purposes.
•OSPF LSA types in multi-area setups
•Router types: ABR, ASBR, Internal, Backbone
🔸 – Configuration Lab (Live Walkthrough or Packet Tracer/GNS3/EVENG)
•Setup of 3 routers in at least 2 areas (Area 0 and Area 1)
•Assigning interfaces to OSPF areas
•Verifying LSDBs and routes
•Commands: "router ospf, network, area, show ip ospf, show ip route, debug ip ospf"
🔸 – Route Summarization & LSA Behavior
•Manual summarization at ABRs
•Impact on routing tables
•LSA propagation and filtering concepts
🔸 – Troubleshooting Multi-Area OSPF
•Common mistakes (missing area 0, misconfigured interfaces).
•Hands-on CLI troubleshooting
•Useful commands: "show ip ospf neighbor, show ip ospf interface, debug ip ospf events"
Named ACLs for Secure Network Access
🔸 – ACL Theory Refresher
•What are Access Control Lists (ACLs)?
•Standard vs Extended vs Named ACLs
•Use cases in secure network design (user segmentation, access control to devices/services)
🔸– Named ACL Syntax & Configuration
•Named ACL advantages
•Creating Named ACLs: ip access-list standard | extended NAME
•Applying ACLs to interfaces (inbound vs outbound)
•Permit vs deny logic. ip access-list extended SECURE-IN permit tcp 10.10.10.0 0.0.0.255 any eq 80 deny ip any any
•Apply with: interface g0/1, ip access-group SECURE-IN in
🔸 – Lab: Applying Named ACLs
•Scenario: Only specific subnets or hosts can access a server
•Block all other traffic
•Test connectivity before and after
🔸 – Combining OSPF and ACL Concepts
•Lab: Secure access to an OSPF-enabled router.
•Use ACL to prevent telnet or SSH access from unauthorized subnets
•Apply filtering to limit routing advertisements if applicable (advanced)
•Q&A
•Key takeaways
•Share a downloadable lab topology + configs
Want me to draft the lab topology and configs too? I got you!
This is a 3-Hour Workshop
This is a hands-on workshop and we will cover all of the above -
... & much more!
RECORDINGS WITH LIFETIME ACCESS WILL BE AVAILABLE