Network Node Manager (NNM) Advanced Business Administration (NNMABA) – Outline

Detailed Course Outline

Chapter 1: Course overview
  • Identify the content and objectives of the course.
  • Define the class schedule and class logistics.
  • Identify the related courses and next steps.
  • Discuss lab environment details.
Chapter 2: Introduction to NOM on OMT
  • Describe the concept of Network Operations Management (NOM)
  • Explain the operation of OPTIC data lake (ODL) and its role in NOM
  • Describe the concept of the Optic Management Toolkit and its role in the deployment of ODL and NOM
  • Explain the high-level architecture of NOM and its deployment modes
  • Describe how NOM can operate in the OpenText cloud
  • Explain the reporting capabilities of NOM and ODL working together
  • Describe the reporting technologies that can be used for dashboarding and reporting
Chapter 3: SNMP data collection
  • Explain the concepts of :
  • Quality of Service (QoS)
  • IP Service Level Agreements (IP SLAs)
  • Virtual Routing and Forwarding (VRF)
  • Describe the following NNMi intelligent Smart Plug-Ins (iSPIs):
  • 3a. Quality Assurance (QA) iSPI and Intelligent Response Agent (iRA)
  • 3b. Multiprotocol Label Switching (MPLS) iSPI
  • 3c. Traffic iSPI
  • 3d. IP Telephony (IPT) iSPI
  • 3e. Multicast iSPI
Chapter 4: Non-SNMP data collection

This chapter is comprised of the following sub-modules:

  • 4a. Custom Poller
    • Define a MIB expression
    • Configure a collection policy
    • Define a collection threshold
    • Export collected data to a CSV file
    • Define MIB expressions and collections using the CLI
  • 4b. Open Data Ingestion (ODI)
    • Describe the value proposition of ODI
    • Explain the process inserting data using ODI
    • Understand the concepts of Authentication, Data Set definition, and data insertion using the REST API
    • Explain how raw, aggregation and forecast data sets are created
    • Describe the licensing nuances of using ODI
  • 4c. Webhook
    • Explain the value of the Webhook mechanism and its purpose
    • Discuss the principles of operation of Webhook
    • Explain how Webhook works in an application failover or HA environment
    • Use the Webhook CLI commands
    • Understand the Webhook mapping rules
  • 4d. Telemetry
    • Explain the concept of telemetry
    • Describe the differences between MIN and YANG model
  • 4e. Deep Monitoring
    • Discuss the concept of Deep Monitoring as defined by OpenText
    • Explain the NNM use case for Wireless Deep Monitoring
    • Explain the NNM use case for Firewall Deep Monitoring
    • Discuss the licensing scheme for deep monitoring
Chapter 5: NOM and OPTIC Data Lake
  • Describe the main feature of Optic reporting
  • Enumerate the different types of reports and dashboards available in the NOM UI
  • Navigate the NOM UI
  • Describe some of the available stakeholder dashboards
  • Explain how to create a FLEX report
  • Describe how to navigate the Performance Troubleshooting console
  • Use the Performance Maps
Chapter 6: Overlay support
  • Explain the concept of an overlay
  • Describe the Cisco ACI overlay
  • Explain the Firewall virtual system overlay
  • Describe the SDWAN overlay support
Chapter 7: Application failover
  • Summarize the NNMi application failover functionality
  • Configure application failover
  • Use cluster administration commands
Chapter 8: NNM Global Network Management
  • List the functions and features of Global Network Management (GNM)
  • List the two main components of GNM
  • Analyze use case scenarios for GNM
  • Outline different deployment scenarios for GNM
  • List prerequisites for GNM deployment
  • Analyze GNM-iSPI relations
  • Identify high-level GNM architecture
  • Plan and configure GNM for NNM
Chapter 9: Network Edge Observer
  • Explain the value proposition and purpose of the Network Edge Observer (NEO)
  • Describe the configuration of NEO with NNM
  • Explain the similarities and differences between NEO, RNM and GNM
Chapter 10: Security and certificates
  • Explain the importance of secure communications
  • Discuss the basics of secure communications such as encryption, certificates, certificate authority (CA)
  • Explain what secure communications adds to NOM
  • Discuss where secure communications are used in NOM
Chapter 11: Integrating NNM, LDAP and NA
  • Describe the products that integrate with NNM
  • Discuss the integration of NNM with Network Automation (NA)
  • Integrate NNM with Lightweight Directory Access Protocol (LDAP)
Chapter 12: NOM REST API
  • Explain the APIs available with NNM
  • Describe the concept of a REST API
  • Explain the benefits of a REST API
  • Describe the flow of a REST API
  • Explain the details of a REST API request
  • Describe the NNM data model
Chapter 13: Managing virtualization
  • Identify the hypervisor (ESXi Server) hosting a Virtual Machine (VM)
  • Use a loom map to identify the hosting hypervisor's Network Interface Card (NIC) that the VM is connected
  • Use a wheel map to identify the hosting hypervisor's NIC to whom the VM is connected
Chapter 14: NNM licensing
  • Describe the NOM license structure across different capabilities
Chapter 15: Advanced protocols

This module is comprised of the following sub-modules:

  • 15a. IPv6
    • Specify the types of IPv6 addresses
    • Identify the notation used in writing IPv6 addresses
    • Describe how NNMi supports IPv6
    • Locate and manage IPv6 and IPv4 devices
    • List the prerequisites for deploying IPv6
  • 15b SNMPv3
    • List the components and architecture of SNMPv3
    • Analyze how SNMPv3 security works
    • List the general steps for configuring a network device for SNMPv3
    • Identify the main design goals for SNMPv3
    • Configure NNM to manage SNMPv3-enabled devices
Chapter 16: Advanced incident configuration
  • Define a node and interface group specific to trap handling
  • Use the following event correlation features:
  • Dampening
  • Payload filtering
  • Pairwise
  • Rate
  • Deduplication
  • Custom correlation
  • Causal rules
Chapter 17: Pseudo objects
  • Explain the concept of a pseudo object
  • Create pseudo nodes
  • Create pseudo interfaces
  • Create pseudo connections
  • Display a Layer 2 connectivity diagram with pseudo-objects
Chapter 18: Custom attributes
  • Add custom attributes to nodes
  • Add custom attributes to interfaces
  • Populate custom attributes from the CLI
Chapter 19: User interface customization
  • Create a menu
  • Create a menu item
  • Create a launch action
  • Create a line graph action