fbpx

Job Guaranteed Courses

Why Octa Networks

2 OCTA CCIE's

as Mentors

8+ YEARS

of Delivering Inovative Training

85% Students

Get Placed Without Appearing CCIE Lab

90% CCIE

Students Passed in First Attempt

500+ HOURS

of CCIE Rack Access

100K+

Candidates Trained

Photo Gallery

What student say about Octa Networks

Best place to learn and practice the networking technology. Thank you Mr. Sancchit Puri for your detailed explanation and guidance.
Ahamed Rizam
Best place for networking courses with qualified teachers...
Farhan Qureshi
octa networks are experts in networking and every one can learn networking easily by their wonderful teaching
Jawahar Annadhurai
Very good place to learn, convinent ours that fits your work Schedule, Sanchit is one of awesome Instructure I am taking class with, we are not just taking online class just to sit and watch, we actually interact and share Ideas in the class
Omar Monads
One of my friends recommended about this to me and unfortunately I ignored him for few months. Later I agreed him joined their classes. Since then I was blaming myself for not joining before. They are excellent in technology classes. They have students worldwide . If you want to get your #CCIE_Digit this is the right place for sure. When it comes to RnS classes, Sancchit Puri, You are the best!!!
Ravindu Yasanga
I am pursuing CCNA from Octa Networks. I'm having a very good experience here.As the staff is very friendly in class.And the thing i like the most here is, everything taught in class is also practiced in lab and professor's are very experienced.
Talib Ansari
Octa network is such great place . To hole world global training Centre . I such a trainer is Jagdish Rathore sir provide training CCNA. / CCNP/ CCIE tramendous.. there his mind set .it's great mentor , trainer , motivations .he is practically Person. Repeated every dout particular topic Clear
Ajay Bhalla
If any one ask me about cisco CCNA and CCNP training then I would definitely recommend about octa networks as it’s a great experience of mine learning here.
Ishwari Mhatre
nice place to learn and sir is very friendly with all. Best place to learn
Michael Aldo
The way teaching is excellent u can teach any one in this world even you have more patience
Paramsukhdev Rayjada
Best place to learn networks, with experienced and friendly faculty. supportive staff members. beautiful ambience. Thanks #octanetworks.
Rehana Sarvaiya

Success Stories


MUHAMMAD WALI BUTT #56587 Collab
BALAMURUGAN SINGARAM #29992 Collab
RAVI SHARMA #59514 Collab
YASODA VENKATA PALACHULLA #59580 Collab
SANUP NAARYAN #59658 Collab
PARTHEEBAN KERUL R #59661 Collab
RAJ SINGH #59656 Collab
AKHILESH KUMAR PANDEY #59680 Collab
MOHAMMED RAZIL C M #59358 Collab
SUKANTA PANDA #59347 Collab
SUJESH PS #59311 Collab
RAJA RAHAMAN #59294 Collab
SAMRESH MAHATO #59267 Collab
PRAMODH SAMPANGI #59192 Collab
ABDUL JASEEM V P #59174 Collab
SYED WALI QUADRI #59146 Collab
SIVARAJ RAJENDRAN #59076 Collab
RAHEEL ZUBAIR #59073 Collab
SUBHAN ZAHEER #59065 Collab
ANIL SEQUEIRA #59035 Collab
ABHISHEK CHAMBIAL #58921 Collab
ANIL KUMAR SINGH #58941 Collab
EDISON ABAD #56343 Collab
PRATYUSH MADHAV #58877 Collab
NABEEL ASGHAR #58860 Collab
VINEET KAUR #58724 Collab
ELAD SANANES #58690 Collab
GYAN PRAKASH #24657 Collab
DHAVAL SHETH #58662 Collab
CARLOS CHINCHILLA B #58295 Collab
STEVEN FONSECA VALVERDE #57656 Collab
DAVIDE MARAZZA #57550 Collab
EDWARD JADOOPAT #57840 Collab
SYED AMIR NAVEEDUDDIN #58001 Collab
DHEERAJ YADAV #58034 Collab
FRANKLIN GONZLEZ SEVILLANO #58007 Collab
GUNDARS DUBULTS #58218 Collab
BILGE GOKOZAN #58272 Collab
THEMBA TSHABALALA #59222 Collab
GEOVANI GONCALVES #59074 Collab
AZAMAT AMIRAKULOV #61645 Collab
THABISO KUTAMA#61960 Collab
ANSAR JAVAID #59465 Security
BALAMURUGAN SINGARAM #29992 Security
B PRASANNA KANNAPPAN #58753 Security
HAIYU DONG #54467 Security
JIMMY SANTOSO #23847 Security
ISHU GOYAL #56833 Security
SHRIKANT SINGH #60091 Security
UMESH KUMAR #46723 Security
MOHAMMAD ISHAQ #60156 Security
ASIF JAVED #60272 Security
EUGINE VIVIEN DSYLVA #60284 Security
PRATIK MOHITE #60337 Security
NAVEEN KUMAR SHIVANNA #60339 Security
SHINU KURUVILA #60352 Security
SATHISH PICHAI #23349 Security
ABHILASH O PILLAI #53367 Security
JORGE DIARTE GUARDADO #43966 Security
AMRIT VARSHA #60436 Security
RAJUL PARIKH #55951 Security
PRANAV PRADIP MHATRE #60982 Security
MOHAMMED NABEEL SALIM #60555 Security
VIJAY DHONDE #60559 Security
FAREED ROSHAN #43589 Security
P MOHAMMED MUDASSIR #60646 Security
WAHEEDULLAH BAHADURI #60650 Security
DEEPANKAR MITRA #60752 Security
PRABHAGARAN M #60831 Security
WINSTON THOMAS #17692 Security
MD MAHMUDUR RAHMAN #59338 Security
SHINE CC#61293 Security
ARVIND KUMAR JORIA#61299 Security
SHRIKANT S JADHAV#61301 Security
JAYKUMAR DESAI#61308 Security
SAJID KHAN#61154 Security
AHMED OMAR#61321 Security
BONIFACE A ANTONY#47306 Security
MANSOOR K M#53128 Security
MUHAMMED SAMEER K N#61384 Security
SHIREEB PALIYATH#61372 Security
KALPAK ATTARDE#61666 Security
PIYUSH SAINI#61705 Security
VAIBHAV AGRAWAL#61744 Security
ABHISHEK SURESH #61847 Security
RAHUL MUNDHE #61837 Security
ADEEL SHAHZAD #61786 Security
AKABAR SHAIK #38104 Security
HAIYU DONG #54467 SP
RAVIKUMAR KANANI #45472 SP
OLADELE THEOPHILUS SULE #55779 SP
SHAKEIL CHANDLER #58601 SP
OSCAR SUAZO SANTOS #60772 SP
MUNEEB AHMED SIDDIQUI #60811 SP
ALEXIS CEDENO #60892 SP
SHAMBHU KUMAR#61082 SP
PALANIAPPAN #61066 SP
AKHEEL KAPOOR #61021 SP
ANAND PALEJA #61169 SP
SAJID GUL AMBER KHAN #61154 SP
PRASSANA KANNAPPAN#58753 SP
SAURABH THOTE #61287 SP
SHAMEEL UMMER #35351 SP
GEORGE WHITE #25579 SP
GODDAY ORHUEBOR #61333 SP
AMIR ABDELWAHAB#34733 SP
VINGENT GONSALVEES#61394 SP
DEEPAK MONDKAR #61667 SP
RITESH LAGORI #61650 SP
RUSHIKESH JAGDALE #49883 SP
SHAFIUL ALAM #61470 SP
SEAN JAMES GEALON #47762 sp
EL AYACHI HADEK #19579 sp
LEONARD BABI #61883 sp
HAIYU DONG #54467 RNS
MOHAMMED NOUR IDRESS #60462 RNS
SARINDA SUPUN SENADHEERA #60548 RNS
ABDUL AZEEZ AHAMED RIZAM #60576 RNS
ASIM ULLAH #60850 RNS
MOHAMED ALHENAWAY #60453 RNS
BIBIN THOPPIL GEORGE #61004 RNS
AHMAD ALJARAH #61139 RNS
KALPESH MODI #61511 RNS
SHARUKH KHAN #61674 RNS
MUHAMMAD RIZWAN I H #61857 RNS
AHMED MAHER HARRAS #21121 Wireless
RANDALL GREER #42829 Wireless
KRISHAN KUMAR #51349 Wireless
HAIYU DONG #54467 Wireless
CSABA TOTH #59885 Wireless
JAGANMOHAN CHOWDAM #60051 Wireless
CHUNG CHING HAUNG #53892 Wireless
B PRASANNA KANNAPPAN #58753 Wireless
VIBHOR SAHNI #60168 Wireless
DIEGO HUERTAS MARQUEZ #60171 Wireless
BALAMURUGAN SINGARAM #29992 Wireless
Alberto MARTINS TANAKA #60465 Wireless
MUSTEHSAN MAHMOOD #60556 Wireless
CHINMAY MARATHE #60584 Wireless
JORGE CUSCO ESPINOSA #47758 Wireless
MOHAMMAD FERDAUSH MIAH #60639 Wireless
ROSALIA ALHOURANI #60647 Wireless
GOPAL GUPTA #60703 Wireless
MARKO SVETEC #60740 Wireless
SALMAN DHUNNA #49906 Wireless
RAVI KUMAR DUBEY #60753 Wireless
DINESH BASAM #52018 Wireless
KALYAN SANNEDHI #60966 Wireless
NABEEL ARSHAD #60890 Wireless
SEITAROU YAMASHITA #61036 Wireless
MUHAMMAD NAZIM #43836 Wireless
CHALERMPON UHNLEELAPHAN #61022 Wireless
VINOD JADHAV #60274 Wireless
MD ADNAN SIDDIQUI #61200 Wireless
JOYAL JOHN PETER #61214 Wireless
MINH DANG QUANG #11897 Wireless
ATISH KUMAR PRUSTY #61282 Wireless
RAM KRISHNAMOORTHY #61953 Wireless
SAGAR SAXENA #59527 DC
ANKUR KUMAR #59614 DC
JARAR MOULA #40653 DC
HAIYU DONG #54467 DC
RAJESH KUMAR #45524 DC
KSHITIJ KUMAR PURWAR #59677 DC
NARESH ANJARA #59710 DC
THIAGARAJAN G #59786 DC
MOHAMMAD SAAD FAHEEM #59846 DC
B PRASANNA KANNAPPAN #58753 DC
BALAMURUGAN SINGARAM #29992 DC

Our Technical Team

Blogs

  • Routing & Switching

    string(3767) "

    Access Lists

    An access lists is essentially a list of conditions that categorize packets, and they really come in handy when you need to exercise control over network traffic. Access-lists are one of the most common and an easiest-to-understand use of access list is to filter unwanted packets when implementing security policies. You can set them up to make very specific decisions about regulating traffic patterns so that they’ll allow only certain host to access web resources on the internet while restricting others. With the right combination of access list, network managers arm themselves with the power to enforce nearly any security policy they can invent.

    Access lists statements

    If a given condition is met, then a given action is taken. If the specific condition is not met, nothing happens and the next statement is evaluated. Access lists statement are basically packets filters that packets are compared against, categorized by, and acted upon accordingly. Once the lists are built, they can be applied to either inbound or out bound traffic on any interface. Applying an ACL cause the router to analyze every packet crossing that interface in the specified direction and take the appropriate action.

    There are three important rules that a packet follow when it’s being compared with an access list:

    • The packet is always compared with each line of the ACL in sequential order it will always started with the first statement of the ACL, moves on to 2 statement, then 3rd statement, and so on.
    • The packet is compared with statement of the access list until a match is made. Once it matches the condition on a statement of the access list, the packet is acted upon and no further comparisons take place.
    • There is an implicit “deny” at the end of each access list, this means that if a packet doesn’t match any condition on any of the statements in the access list, the packet will be discarded.

    Type of access list (ACL)

    1. Standard access lists    these access list use only source IP address in an IP packet as the condition test. All decisions are made based on the source IP address. This means that standard ACLs basically permit or deny an entire suite of protocols. They do not distinguished between any of the many type of IP traffic such as web, telnet, UDP and so on.
    2. Extended access lists extended ACLs can evaluate many of the other fields in the layer 3 and layer 4 headers of an IP packet. They can evaluate source and destination IP addresses, the protocol field in the network layer header, and the port number at the transport layer header. This gives extended ACLs the ability to make much more granular decisions when controlling traffic.
    3. Named access lists name access list are either standard or extended and not actually a district type. To use ACLs as a packet filter, you need to apply it to an interface on the router which you wanted the traffic filtered. And you’ve got to specify which direction of traffic you want the ACLs applied to. You must you different ACLs for inbound and outbound traffic on a single interface :
    • Inbound ACLs: when an access lists is applied to inbound packet on an interface, those packets are processed through the access list before being routed to the outbound interface. Any packets that are denied won’t be routed.
    • Outbound ACLs when an access list is applied to outbound packets on an interface, packets are routed to the outbound interface and then processed through the access list before being queued.
    "

    Access Lists

    Access Lists An access lists is essentially a list of conditions that categorize packets, and they really come in handy when you need to exercise con...

    2019-05-17 14:47:35

    OCTA NETWORKS

  • COLLABORATION

    string(2787) "
    CCIE Collaboration v2.0 Lab was announced by Cisco in Jan 2018 and went live on July 23, 2018. From then it’s been a difficult road for anyone attempting the CCIE Collaboration Lab Exam anywhere in the world. This year, Octa Networks have become successful in cracking the CCIE Collaboration Lab Exam. On 27th March 2019, we had our 1st student “Azamat Amirakulov #61645” clear his CCIE Lab and he is the first person from Russia to pass CCIE Collaboration v2.0 Lab. We were ecstatic about it but we did not make it public because we wanted to make sure it was not a one-off case. In April, we had our 2nd student attempt the lab who wish to stay anonymous and the result was again a success. But again, we did not make it public to make sure it was not an isolated case. Finally, today, we are thrilled to announce that our 3rd student “Thabiso Kutama #61960” has successfully passed CCIE Collaboration v2.0 Lab who is also the first person from South Africa to pass the CCIE Collaboration v2.0 Lab. Currently, there are less than 10 CCIE Collaboration v2.0 Lab Certified in the world and Octa Networks takes pride to have 3 students in that list. This is what they have to say about our Training:

    #1 Azamat Amirakulov

    #2 Thabiso Kutama

     

    Do you want to be amongst the first few CCIE Collaborates in the world ?

    "

    Back to Back CCIE Collaboration v2.0 Lab Success Stories

    CCIE Collaboration v2.0 Lab was announced by Cisco in Jan 2018 and went live on July 23, 2018. From then it’s been a difficult road for anyone ...

    2019-05-09 16:09:45

    OCTA NETWORKS

  • Routing & Switching

    string(7652) "IS-IS Standards History
    • ISO 10589 specifies OSI IS-IS routing protocol for CLNS traffic
    • Tag/Length/Value (TLV) options to enhance the protocol A Link State protocol with a 2 level
    • RFC 1195 added IP support
    • IS-IS runs on top of the Data Link Layer
    • Requires CLNP to be configured
    • RFC5308 adds IPv6 address family support to IS-IS
    • RFC5I20 defines Multi-Topology concept for IS-IS
    • Permits IPv4 and IPv6 topologies which are not identical
    Terminology
    • AIT: Authority and Format Identifier (the first octet of all OSI NSAP addresses—identifies format of the rest of the address)
    • CLNP: Connection-Less Network Protocol (ISO 8473—the OSI connectionless network layer protocol—very similar to IP)
    • ES: End System (the OSI term for a host)
    • IS; Intermediate System(the OSI term for a router)
    • ES-IS :End System to Intermediate System routing exchange protocol
    • (ISO 9542—OSI protocol between routers and end systems)
    • IS-IS : Intermediate System to Intermediate System routing exchange protocol (the ISO protocol for routing within a single routing domain)
    • IS-IS Hello :A Hello packet (defined by the IS-IS protocol)
    • LSP: Link State Packet (a type of packet used by the IS-IS protocol)
    • TLV: Type Length Value
    ISIS features
    • Open standard (OSI)
    • First developed by DEC and It was standardized by the ISO in 1992 communication between network devices which are termed Intermediate Systems by the ISO.
    • Link-state routing protocol
    • Classless
    • VLSM and Manual summary
    • Work on SPF or Dijkstra algonthm
    • Incremental / trigger updates
    • Updates are send as unicast /multicast (Layer 2)
    • Metric= default (Cisco)
    • Administrative distance = 115
    • It is used by large ISP
    • Protocol independent i.e. Support IP, IPX. hippie Talk
    Integrated or Dual IS-IS
    • Originally IS-IS was ECP for OSI layer, later developed to support TCP/IP called as DUAL IS-IS
      • Dual IS-IS works with this change features:
      • Function similar as any other IGP routing protocol
      • Fast convergence ( default hello = 10 sec . dead timer = 3 times of hello)
      • Stable
      • Make efficient use of bandwidth, memory &CPU resources
    METRIC in ISIS
    • Cisco supports only default metric
    • e. Metric= 10 on any type of interface ( ex : serial/Ethemet/fastethemet/gigethemet)
    • Narrow metrics
    • Max value on interface can be 64 (6bit) and 1024 (10bit) per path in routing table
    • Other venders support different types of metrics (default, delay, expense, error)
    IS IS Levels
    • ISIS has a 2 layer hierarchy
    • Level-2 (the backbone)
    • Level- 1 (the areas)
    • IS-IS support three type of router levels
    1. Level- 1 (LI) router (intra-area routing)
    2. Level-2 (L2) router (inter-area routing)
    3. Level-1-2 (L1L2) router (intra and inter-area routing)
    • Manually Need to define IS-type
    • Default is level 1 /Level 2
    Level 1 Router
    • Establishes neighbor ship with only LI and Ll/12 routers
    • It acts like OSPF internal router (totally stub)
    • Has the Level 1 LSDB with all routing information for the area
    • It has a default route pointing towards nearest L1/L2 router
    • LI should be continuous within a area.
    Level 2 Router
    • Establishes neighbor ship with only L2 and L1/L2 routers
    • It act like OSPF Backbone router
    • Has a Level 2 LSDB with all information about inter-area routing
    • L2 should be continuous within a domain with other L2 orLl/L2 router
    Level 1/Level 2 Routers
    • Establishes neighbor ship with all LI , L2 and Ll/L2 routers
    • It act like OSPF ABR
    • Has two LSDBs:
    • Level 1 for the intra-area routing
    • Level 2 for file inter-area routing
    • if the router has adjacencies to other areas, lt will inform the Level 1 routers (intra-area) it is a potential exit point for the area
    • L1/L2 should be continuous within a domain with other L2 or Ll/L2 router
    Backbone & Areas
    • ISIS does not have a backbone area as such (like OSPF)
    • Instead the backbone is the contiguous collection of Level-2/ or Level 1-2 capable routers
    • ISIS area borders are on links, not routers
    • Each router is identified with Network Entity Title (NET)
    • NET is an NSAP where the n-selector is 0
     Backbone must be L2 contiguous  EXAMPLE-1 EXAMPLE-2 An Addressing Example Identifying Systems in IS-IS
    • The area address uniquely identifies the routing area and the System ID identifies each node
    • All routers within an area must use the same area address
    • An ES maybe adjacent to a level-1 router only if they both share a common area address
    • Area address is used in level-2 routing
    • System ID maybe the MAC address (CLNS) or IP address of an interface (IP world)
    • System ID used in level-1 routing and has to be unique within an area (and of same length)
    • System ID has to be unique within level-2 routers that form routing domain
    • General recommendation: domain-wide unique System ID
    AREA COMPARISION OF OSPF with ISIS ISIS PDU ISIS PDU is directly encapsulated in to data-link header. There is no CLNP or IP header.
    1. Hello
    2. LSP
    3. CSNP
    4. PSNP
     OSPF and ISIS Similarities
    • Both use the same method of topology abstraction
    • Both use [ practically}the same flooding algorithm
    • Both use [practically] the same Dijkstra algorithm
    • Both provide IP routing information
    OSPF and ISIS Major differences
    • History
    • Transport protocol
    • PDU format
    • Details of hierarchical routing
     "

    Intermediate System - Intermediate System (IS-IS) Protocol

    IS-IS Standards History ISO 10589 specifies OSI IS-IS routing protocol for CLNS traffic Tag/Length/Value (TLV) options to enhance the protocol...

    2019-02-23 12:46:40

    OCTA NETWORKS

Request a call back