Sei sulla pagina 1di 21

CCIE Routing and Switching

1.0 Implementing Layer 2 Technologies - Configuring and Troubleshooting L


1.1 Frame Relay
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.2 Catalyst Configuration
1.2.01
1.2.02
1.2.03
1.2.04
1.2.05
1.2.06
1.2.07
1.2.08
1.2.09
1.2.10
1.2.11
1.2.12
1.2.13
1.2.14
1.2.15
1.2.16
1.2.17
1.2.18
1.2.19
1.2.20
1.2.21
1.2.22
1.2.23
1.2.24
1.2.25
1.2.26
1.2.27
1.2.28
1.2.29
1.2.30
1.2.31
1.2.32
1.2.33
1.2.34
1.2.35
1.2.36
1.3 Other Layer 2 Technologies
1.3.1
1.3.2
1.3.3
2.0 Implementing IPv4 - Configuring and Troubleshooting IPv4
2.1 IPv4
2.1.1
2.1.2
2.1.3
2.2 OSPF
2.2.01
2.2.02
2.2.03
2.2.04
2.2.05
2.2.06
2.2.07
2.2.08
2.2.09
2.2.10
2.3 EIGRP
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.4 Filtering, Redistribution, and Summarization
2.4.01
2.4.02
2.4.03
2.4.04
2.4.05
2.4.06
2.4.07
2.4.08
2.4.09
2.4.10
2.4.11
2.4.12
2.4.13
2.4.14
2.4.15
2.5 IBGP
2.5.1
2.5.2
2.5.3
2.5.4
2.5.5
2.6 EBGP
2.6.1
2.6.2
2.7 BGP Advanced Features
2.7.01
2.7.02
2.7.03
2.7.04
2.7.05
2.7.06
2.7.07
2.7.08
2.7.09
2.7.10
2.7.11
2.7.12
2.7.13
2.7.14
2.7.15
2.7.16
2.7.17
2.7.18
2.7.19
2.7.20
2.8 Performance Routing (PfR) and Cisco Optimized Edge Routing (OER)
3.0 Implementing IPv6 - Configuring and Troubleshooting IPv6
3.1 IPv6
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9
4.0 Implementing MPLS - Configuring and Troubleshooting MPLS
4.1 MPLS Unicast Routing
4.1.1
4.1.2
4.2 MPLS VPN
4.2.1
4.2.2
4.2.3
4.2.4
4.2.5
4.3 VRF-Lite
4.3.1
5.0 Implementing IP Multicast - Configuring and Troubleshooting IP Multica
5.1 PIM and Bidirectional PIM
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
5.1.7
5.2 MSDP
5.2.1
5.2.2
5.3 Multicast Tools
5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
5.4 IPv6 Multicast
5.4.1
5.4.2
6.0 Implementing Network Security - Configuring and Troubleshooting Netw
6.1 AAA and Security Server Protocols
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.2 Access Lists
6.2.1
6.2.2
6.2.3
6.2.4
6.3 Routing Protocol Security
6.3.1
6.3.2
6.3.3
6.3.4
6.3.5
6.4 Catalyst Security
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.4.9
6.5 Cisco IOS and Zone-Based Firewalls
6.5.1
6.5.2
6.5.3
6.5.4
6.6 NAT
6.6.1
6.6.2
6.6.3
6.6.4
6.6.5
6.7 Other Security Features
6.7.1
6.7.2
6.7.3
6.7.4
6.7.5
6.7.6
6.7.7
6.7.8
7.0 Implementing Network Services - Configuring and Troubleshooting Netw
7.1 DHCP
7.1.1
7.1.2
7.1.3
7.2 HSRP
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
7.3 IP Services
7.3.1
7.3.2
7.3.3
7.3.4
7.3.5
7.4 System Management
7.4.1
7.4.2
7.4.3
7.4.4
7.4.5
7.5 NTP
7.5.1
7.5.2
7.5.3
8.0 Implementing QoS - Configuring and Troubleshooting QoS
8.1 Classification
8.1.1
8.1.2
8.1.3
8.2 Congestion Management and Congestion Avoidance
8.2.1
8.2.2
8.2.3
8.2.4
8.2.5
8.3 Policing and Shaping
8.3.1
8.3.2
8.3.3
8.4 Link Efficiency Mechanisms
8.4.1
8.4.2
8.5 Modular QoS CLI
8.5.1
8.5.2
8.5.3
8.5.4
8.5.5
8.5.6
8.5.7
8.5.8
8.6 Catalyst QoS
8.6.1
9.0 Troubleshooting a Network - Troubleshooting Network-Wide Connectivit
9.1 Troubleshooting Layer 2 Problems
9.1.1
9.1.2
9.2 Troubleshooting Layer 3 Problems
9.2.1
9.2.2
9.2.3
9.3 Troubleshooting Application Problems
9.3.1
9.4 Troubleshooting Network Services
9.4.1
9.4.2
9.4.3
9.4.4
9.5 Troubleshooting Security Services
9.5.1
9.5.2
9.5.3
10.0 Optimizing a Network - Configuring and Troubleshooting Optimization of a Netw
10.1 Logging In
10.1.1
10.1.2
10.2 SNMP
10.2.1
10.2.2
10.3 RMON
10.3.1
10.4 Accounting
10.4.1
10.5 SLA
10.5.1
10.6 Implementing Network Services on the Routers
10.6.1
10.6.2
10.6.3
10.6.4
10.6.5
10.6.6
10.6.7
CCIE Routing and Switching
1.0 Implementing Layer 2 Technologies - Configuring and Troubleshooting Layer 2 Technologies
1.1 Frame Relay
Frame Relay Multipoint Links on a Physical Interface Using Inverse ARP
Frame Relay Multipoint Links on a Physical Interface Without Using Inverse ARP
Frame Relay Multipoint Link on a Subinterface Using Inverse ARP
Frame Relay Multipoint Link on a Subinterface Without Using Inverse ARP
Frame Relay Point-to-Point Subinterfaces
PVC with a Multipoint Interface on One Side and a Subinterface on the Other Side
Authentication on a Frame Relay Link Using PPP
1.2 Catalyst Configuration
Trunks Using an Industry-Standard Encapsulation
Trunks Using a Cisco Proprietary Encapsulation
Creating, Deleting, and Editing VLANs
VTP in Client/Server Mode
VTP in Transparent Mode
VTP Authentication
VTP Pruning
Controlling VLANs That Cross a Trunk
Optimizing STP by STP Timers
PortFast
Loop Guard
BPDU Guard
BPDU Filters
UplinkFast
BackboneFast
MSTP
Selecting the Root Bridge for VLANs in a PVST Environment
Selecting the Root Bridge for an MST Instance in an MST Environment
Setting the Port Priority to Designate the Forwarding Ports
EtherChannel Using an Industry-Standard Protocol
EtherChannel Using a Cisco Proprietary Protocol
Disabling Protocols on the EtherChannel
Load-Balancing Type on the EtherChannel
SNMP Management on the Switch
Telnet and SSH Management on the Switch
Controlling Inbound and Outbound Telnet on the Switch
Regular and Smart Macros
Switch Banners
UDLD
Switch Virtual Interfaces (SVIs) for IP Routing
Router on a Stick
SPAN
RSPAN
IP Routing on the Switch Using RIPv2, EIGRP, OSPF, and BGP
IP Phones to Connect to the Catalyst Switch
Dot1q Tunneling
1.3 Other Layer 2 Technologies
HDLC
PPP
PPP over Ethernet
2.0 Implementing IPv4 - Configuring and Troubleshooting IPv4
2.1 IPv4
IPv4 Addressing
IPv4 Subnetting
IPv4 VLSM
2.2 OSPF
OSPF on a Broadcast Multicast Access Network (Ethernet)
OSPF over a Frame Relay Multipoint Network by Changing Network Types
OSPF over a Frame Relay Multipoint Network by Using the neighbor Command
OSPF over a Frame Relay Point-to-Point Network
Virtual Links
Stub Areas
Totally Stubby Areas
NSSA Areas
NSSA and Stub Areas
NSSA and Totally Stubby Areas
2.3 EIGRP
Basic EIGRP
Passive Interfaces
EIGRP Stub on Routers and Switches
EIGRP Update—Bandwidth Control
Changing the Administrative Distance of EIGRP
Unequal-Cost Load Balancing for EIGRP
2.4 Filtering, Redistribution, and Summarization
Route Filtering for OSPF Within the Area Using a Distribute List with an ACL and Prefix
Route Filtering for OSPF Between Areas
Summarization of OSPF Routes Between Areas
Summarization of External Routers Within OSPF
Filtering with a Distribute List Using an ACL and Prefix Lists
Using Advanced ACLs and a Prefix List for Filtering Routes
Summarizing Routes with EIGRP
Route Summarization for RIP
Redistribution Between OSPF and EIGRP
Redistribution Between RIP and EIGRP
Redistribution Between RIP and OSPF
Redistribution of Directly Connected Routes
Redistribution of Static Routes
Redistribution with Filtering Using ACLs and Prefix Lists
Redistribution with Filtering Using Route Tagging
2.5 IBGP
IBGP Peering
Advertising Routes in BGP
Next-Hop Attribute
Route Reflectors
Redundancy by Neighbor Relationships Based on Loopbacks
2.6 EBGP
EBGP Peering
EBGP Peering Based on Loopbacks
2.7 BGP Advanced Features
Filtering Using ACLs
Filtering Using Prefix Lists
Filtering Using AS Path Filters
Redistributing Connected Routes into BGP
Redistributing Dynamic Routing Protocols into BGP
BGP Aggregation
BGP Aggregation with the Summary Only Parameter
BGP Aggregation with Suppress Maps
BGP Aggregation with Unsuppress Maps
BGP Best-Path Selection – Weight
BGP Best-Path Selection – Local Preference
BGP Best-Path Selection – MED
BGP Communities – No-Export
BGP Communities – No-Advertise
BGP Confederation
BGP Local AS
Working with Private AS Numbers
Route Dampening
Conditional Advertising
Peer Groups
2.8 Performance Routing (PfR) and Cisco Optimized Edge Routing (OER)
3.0 Implementing IPv6 - Configuring and Troubleshooting IPv6
3.1 IPv6
IPv6 Addresses
RIPng
OSPFv3
EIGRPv6
IPv6 Tunneling
IPv6 on a Frame Relay Network – Multipoint
IPv6 on a Frame Relay Network – Point-to-Point
Route Filtering with a Distribute List Using an ACL and Prefix Lists
Route Redistribution Between OSPFv3 and EIGRPv6
4.0 Implementing MPLS - Configuring and Troubleshooting MPLS
4.1 MPLS Unicast Routing
MPLS Unicast Routing Using LDP
Controlling Label Distribution
4.2 MPLS VPN
MPLS VPN Using Static Routing Between PE-CE
MPLS VPN Using EIGRP as the PE-CE Routing Protocol
MPLS VPN Using OSPF as the PE-CE Routing Protocol
MPLS VPN Using EBGP as the PE-CE Routing Protocol
Controlling Route Propagation Using the Route Target with Import and Export Maps
4.3 VRF-Lite
VRFs at the Customer Sites Using VRF-Lite
5.0 Implementing IP Multicast - Configuring and Troubleshooting IP Multicast
5.1 PIM and Bidirectional PIM
PIM Dense Mode
PIM on an NMBA Network
PIM Sparse Mode – Static Rendezvous Point
PIM Sparse Mode – Multiple Static Rendezvous Points
PIM Sparse Mode – Auto Rendezvous Point
PIM Sparse Mode with Multiple Rendezvous Points Using the Auto Rendezvous Point
Bidirectional PIM
5.2 MSDP
MSDP
MSDP to an Anycast Rendezvous Point
5.3 Multicast Tools
Multicast Rate Limiting
IGMP Filtering on the Switch
Use of the Switch to Block Multicast Traffic
Multicasting Through a GRE Tunnel
Multicast Helper Address
5.4 IPv6 Multicast
IPv6 Multicast Routing Using PIM
IPv6 Multicast Listener Discovery (MLD) Protocol
6.0 Implementing Network Security - Configuring and Troubleshooting Network Security
6.1 AAA and Security Server Protocols
Use of a Router to Authenticate Against a AAA Server Using TACACS+
Use of a Router to Authenticate Against a AAA Server Using RADIUS
Local Privilege Authorization
Accounting to a AAA Server Using TACACS+
Accounting to a AAA Server Using RADIUS
6.2 Access Lists
Standard Access Lists
Extended Access Lists
Time-Based Access Lists
Reflexive Access Lists
6.3 Routing Protocol Security
Routing Protocol Authentication for EIGRP
Routing Protocol Authentication for OSPF – Area-Wide
Routing Protocol Authentication for OSPF – Interface-Specific
Routing Protocol Authentication for OSPF Virtual Links
Routing Protocol Authentication for BGP
6.4 Catalyst Security
Storm Control
Switch Port Security
Dot1x Authentication
Dot1x Authentication for VLAN Assignment
VLAN Access Maps
DHCP Snooping
DAI
IP Source Guard
Private VLANs
6.5 Cisco IOS and Zone-Based Firewalls
Basic Cisco IOS Firewall
DoS Protection on a Cisco IOS Firewall
Basic Zone-Based Firewall
Zone-Based Firewall with Deep Packet Inspection
6.6 NAT
Dynamic NAT
PAT
Static NAT
Static PAT
Policy-Based NAT
6.7 Other Security Features
Configuring the TCP Intercept Feature
Configuring Blocking of Fragment Attacks
Configuring Switch Security Features
Configuring Antispoofing Using an ACL
Configuring Antispoofing Using uRPF
SSH on Routers and Switches
Cisco IOS IPS
Controlling Telnet and SSH Access to the Router and Switch
7.0 Implementing Network Services - Configuring and Troubleshooting Network Services
7.1 DHCP
Configuring DHCP on a Cisco IOS Router
Configuring DHCP on a Switch
Using a Router and a Switch to Act as a DHCP Relay Agent (Helper Address)
7.2 HSRP
HSRP Between Two Routers
Pre-empt for HSRP
Authentication for HSRP
VRRP
GLBP
7.3 IP Services
Use of the Router for WCCP
Use of the Router to Generate an Exception Dump Using TFTP
Use of the Router to Generate an Exception Dump Using FTP
Use of the Router to Generate an Exception Dump Using RCP
Broadcast Forwarding for Protocols
7.4 System Management
Telnet Management on the Router and Switch
SSH Management on the Router and Switch
Disabling Telnet and the SSH Client on the Switch
HTTP Management on the Router and Switch
Controlling HTTP Management on the Router and Switch
7.5 NTP
NTP Using the NTP Master and NTP Server Commands
NTP Without Using the NTP Server
NTP Using NTP Broadcast Commands
8.0 Implementing QoS - Configuring and Troubleshooting QoS
8.1 Classification
Marking Using DSCP
Marking Using IP Precedence
Marking Using CoS
8.2 Congestion Management and Congestion Avoidance
Priority Queuing
Custom Queuing
Weighted Fair Queuing
WRED
RSVP
8.3 Policing and Shaping
CAR Using Rate Limiting Under the Interface
Frame Relay Traffic Shaping Using Map Classes
Discard Eligible List
8.4 Link Efficiency Mechanisms
Compression
Link Fragmentation and Interleaving (LFI) for Frame Relay
8.5 Modular QoS CLI
Policing
Class-Based Weighted Fair Queuing (CB-WFQ)
Low Latency Queuing (LLQ)
Shaping Using MQC
Random Early Detection Using MQC
WRED Using MQC
Using NBAR for QoS
Discard Eligible Marking Using MQC
8.6 Catalyst QoS
SRR on the Catalyst Switch
9.0 Troubleshooting a Network - Troubleshooting Network-Wide Connectivity Issues
9.1 Troubleshooting Layer 2 Problems
Troubleshooting Catalyst Switch Network Issues
Troubleshooting Frame Relay Network Issues
9.2 Troubleshooting Layer 3 Problems
Troubleshooting IP Addressing Network Issues
Troubleshooting Routing Protocol Network Issues
Troubleshooting Routing Protocol Loop Issues
9.3 Troubleshooting Application Problems
Determining Which Aspects of the Network to Troubleshoot to Determine Network
9.4 Troubleshooting Network Services
Troubleshooting Misconfigured NTP Setup
Troubleshooting Misconfigured DHCP Setup
Troubleshooting Misconfigured Telnet and SSH Setup
Troubleshooting Misconfigured SNMP Setup
9.5 Troubleshooting Security Services
Troubleshooting Misconfigured ACLs
Troubleshooting Misconfigured NAT
Troubleshooting Misconfigured AAA Services
10.0 Optimizing a Network - Configuring and Troubleshooting Optimization of a Network
10.1 Logging In
Logging into a Remote Syslog Server
Logging into the Internal Buffer
10.2 SNMP
Use of a Router to Communicate to an SNMP Management Station
Use of a Router to Generate SNMP Traps
10.3 RMON
Use of a Router to Generate SNMP Traps Using RMON
10.4 Accounting
IP Accounting
10.5 SLA
IP SLA
10.6 Implementing Network Services on the Routers
Use of a Router as an FTP Server
Use of a Router as a TFTP Server
Cisco IOS Embedded Event Manager
NetFlow
HTTP and HTTPS on a Router
Telnet on a Router
Implementing Secure Copy Protocol (SCP) on a Router
Rating
Technologies

3
3
3
3
3
3
3

3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3

3
3
3

3
3
3

3
3
3
3
3
3
3
3
3
3

3
3
3
3
3
3

3
3
3
3
3
3
3
3
3
3
3
3
3
3
3

3
3
3
3
3

3
3

3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3

3
3
3
3
3
3
3
3
3

3
3

3
3
3
3
3

3
3
3
3
3
3
3

3
3

3
3
3
3
3

3
3
curity

3
3
3
3
3

3
3
3
3

3
3
3
3
3

3
3
3
3
3
3
3
3
3

3
3
3
3

3
3
3
3
3

3
3
3
3
3
3
3
3
ervices

3
3
3

3
3
3
3
3

3
3
3
3
3

3
3
3
3
3

3
3
3

3
3
3

3
3
3
3
3

3
3
3

3
3

3
3
3
3
3
3
3
3

3
es

3
3

3
3
3

3
3
3
3
3

3
3
3

3
3

3
3

3
3
3
3
3
3
3

Potrebbero piacerti anche