This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
certification:tech:network:cisco:ccie:ccie-rsv5:lab:lab [2019/08/13 11:52] wnoguchi |
certification:tech:network:cisco:ccie:ccie-rsv5:lab:lab [2019/11/30 10:54] (current) wnoguchi |
||
---|---|---|---|
Line 6: | Line 6: | ||
* [[https://docs.google.com/spreadsheets/d/17vC3hDuv84u0v4b9recBasNDm655KNIX2tZK5PyGGyU/edit#gid=570151342|CCIE_R&S_CertificationPlan - Google Sheets]] | * [[https://docs.google.com/spreadsheets/d/17vC3hDuv84u0v4b9recBasNDm655KNIX2tZK5PyGGyU/edit#gid=570151342|CCIE_R&S_CertificationPlan - Google Sheets]] | ||
- | ===== 1.0 Layer 2 Technologies ===== | + | * 1.0 Layer 2 Technologies |
- | + | * 1.1 LAN switching technologies | |
- | ==== 1.1 LAN switching technologies ==== | + | * 1.1.a Implement and troubleshoot switch administration |
- | + | * 1.1.a [i] Managing MAC address table | |
- | - TODO | + | * 1.1.a [ii] errdisable recovery |
- | + | * 1.1.a [iii] L2 MTU | |
- | ==== 1.2 Layer 2 Multicast ==== | + | * 1.1.b Implement and troubleshoot layer 2 protocols |
- | + | * 1.1.b [i] CDP, LLDP | |
- | - TODO | + | * 1.1.b [ii] UDLD |
- | + | * 1.1.c Implement and troubleshoot VLAN | |
- | ==== 1.3 Layer 2 WAN circuit technologies ==== | + | * 1.1.c [i] access ports |
- | + | * 1.1.c [ii] VLAN database | |
- | - TODO | + | * 1.1.c [iii] normal, extended VLAN, voice VLAN |
- | + | * 1.1.d Implement and troubleshoot trunking | |
- | ==== 1.4 Troubleshooting layer 2 technologies ==== | + | * 1.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning |
- | + | * 1.1.d [ii] dot1Q | |
- | ===== 2.0 Layer 3 Technologies ===== | + | * 1.1.d [iii] Native VLAN |
- | + | * 1.1.d [iv] Manual pruning | |
- | ==== 2.1 Addressing technologies ==== | + | * 1.1.e Implement and troubleshoot etherchannel |
- | + | * 1.1.e [i] LACP, PAgP, manual | |
- | - TODO | + | * 1.1.e [ii] layer 2, layer 3 |
- | + | * 1.1.e [iii] load-balancing | |
- | ==== 2.2 Layer 3 Multicast ==== | + | * 1.1.e [iv] etherchannel misconfiguration guard |
- | + | * 1.1.f Implement and troubleshoot spanning-tree | |
- | - TODO | + | * 1.1.f [i] PVST+/RPVST+/MST |
- | + | * 1.1.f [ii] switch priority, port priority, path cost, STP timers | |
- | ==== 2.3 Fundamental routing concepts ==== | + | * 1.1.f [iii] port fast, BPDUguard, BPDUfilter |
- | + | * 1.1.f [iv] loopguard, rootguard | |
- | - TODO | + | * 1.1.g Implement and troubleshoot other LAN switching technologies |
- | + | * 1.1.g [i] SPAN, RSPAN, ERSPAN | |
- | ==== 2.4 RIP v2 ==== | + | * [[tech:network:cisco:span-rspan:span-rspan]] |
- | + | * 1.2 Layer 2 Multicast | |
- | - TODO | + | * 1.2.a Implement and troubleshoot IGMP |
- | + | * 1.2.a [I] IGMPv1, IGMPv2, IGMPv3 | |
- | ==== 2.5 EIGRP [for IPv4 and IPv6] ==== | + | * 1.2.a [ii] IGMP snooping |
- | + | * 1.2.a [iii] IGMP querier | |
- | - TODO | + | * 1.2.a [iv] IGMP filter |
- | + | * 1.2.a [v] IGMP proxy | |
- | ==== 2.6 OSPF [v2 and v3] ==== | + | * 1.3 Layer 2 WAN circuit technologies |
- | + | * 1.3.a Implement and troubleshoot HDLC | |
- | - TODO | + | * 1.3.b Implement and troubleshoot PPP |
- | + | * 1.3.b [i] authentication [PAP, CHAP] | |
- | ==== 2.7 BGP ==== | + | * 1.3.b [ii] PPPoE |
- | + | * 1.3.b [iii] MLPPP | |
- | - TODO | + | * 1.4 Troubleshooting layer 2 technologies |
- | + | * 1.4.a Use IOS troubleshooting tools | |
- | ==== 2.8 Troubleshooting layer 3 technologies ==== | + | * 1.4.a [i] debug, conditional debug |
- | + | * 1.4.a [ii] ping, traceroute with extended options | |
- | - TODO | + | * 1.4.a [iii] Embedded packet capture |
- | + | * 1.4.b Apply troubleshooting methodologies | |
- | ===== 3.0 VPN Technologies ===== | + | * 1.4.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause] |
- | + | * 1.4.b [ii] Design and implement valid solutions according to constraints | |
- | ==== 3.1 Tunneling ==== | + | * 1.4.b [iii] Verify and monitor resolution |
- | + | * 1.4.c Interpret packet capture | |
- | - TODO | + | * 1.4.c [i] Using wireshark trace analyzer |
- | + | * 1.4.c [ii] Using IOS embedded packet capture | |
- | ==== 3.2 Encryption ==== | + | * 2.0 Layer 3 Technologies |
- | + | * 2.1 Addressing technologies | |
- | - TODO | + | * 2.1.a Identify, implement and troubleshoot IPv4 addressing and sub-netting |
- | + | * 2.1.a [i] Address types, VLSM | |
- | ==== 3.3 Troubleshooting VPN technologies ==== | + | * 2.1.a [ii] ARP |
- | + | * 2.1.b Identify, implement and troubleshoot IPv6 addressing and sub-netting | |
- | - TODO | + | * 2.1.b [i] Unicast, multicast |
- | + | * 2.1.b [ii] EUI-64 | |
- | ===== 4.0 Infrastructure Security ===== | + | * 2.1.b [iii] ND, RS/RA |
- | + | * 2.1.b [iv] Autoconfig/SLAAC temporary addresses [RFC4941] | |
- | ==== 4.1 Device security ==== | + | * 2.1.b [v] Global prefix configuration feature |
- | + | * 2.2 Layer 3 Multicast | |
- | - [[tech:network:cisco:radius:radius]] | + | * 2.2.a Troubleshoot reverse path forwarding |
- | - [[tech:network:cisco:tacacs+:tacacs+]] | + | * 2.2.a [i] RPF failure |
- | + | * 2.2.a[ii] RPF failure with tunnel interface | |
- | ==== 4.2 Network security ==== | + | * 2.2.b Implement and troubleshoot IPv4 protocol independent multicast |
- | + | * 2.2.b [i] PIM dense mode, sparse mode, sparse-dense mode | |
- | - [[tech:network:cisco:stormcontrol:stormcontrol]] | + | * 2.2.b [ii] Static RP, auto-RP, BSR |
- | - [[tech:network:cisco:pvlan:pvlan]] | + | * 2.2.b [iii] Bidirectional PIM |
- | + | * 2.2.b [iv] Source-specific multicast | |
- | ==== 4.3 Troubleshooting infrastructure security ==== | + | * 2.2.b [v] Group to RP mapping |
- | + | * 2.2.b [vi] Multicast boundary | |
- | - TODO | + | * 2.2.c Implement and troubleshoot multicast source discovery protocol |
- | + | * 2.2.c.[i] Intra-domain MSDP [anycast RP] | |
- | ===== 5.0 Infrastructure Services ===== | + | * 2.2.c.[ii] SA filter |
- | + | * 2.3 Fundamental routing concepts | |
- | ==== 5.1 System management ==== | + | * 2.3.a Implement and troubleshoot static routing |
- | + | * 2.3.b Implement and troubleshoot default routing | |
- | - TODO | + | * 2.3.c Compare routing protocol types |
- | + | * 2.3.c [i] distance vector | |
- | ==== 5.2 Quality of service ==== | + | * 2.3.c [ii] link state |
- | + | * 2.3.c [iii] path vector | |
- | - TODO | + | * 2.3.d Implement, optimize and troubleshoot administrative distance |
- | + | * 2.3.e Implement and troubleshoot passive interface | |
- | ==== 5.3 Network services ==== | + | * 2.3.f Implement and troubleshoot VRF lite |
- | + | * 2.3.g Implement, optimize and troubleshoot filtering with any routing protocol | |
- | - TODO | + | * 2.3.h Implement, optimize and troubleshoot redistribution between any routing protocol |
- | + | * 2.3.i Implement, optimize and troubleshoot manual and auto summarization with any routing protocol | |
- | ==== 5.4 Network optimization ==== | + | * 2.3.j Implement, optimize and troubleshoot policy-based routing |
- | + | * 2.3.k Identify and troubleshoot sub-optimal routing | |
- | - TODO | + | * 2.3.l Implement and troubleshoot bidirectional forwarding detection |
- | + | * 2.3.m Implement and troubleshoot loop prevention mechanisms | |
- | ==== 5.5 Troubleshooting infrastructure services ==== | + | * 2.3.m [i] Route tagging, filtering |
- | + | * 2.3.m [ii] Split horizon | |
- | - TODO | + | * 2.3.m [iii] Route poisoning |
+ | * 2.3.n Implement and troubleshoot routing protocol authentication | ||
+ | * 2.3.n [i] MD5 | ||
+ | * 2.3.n [ii] key-chain | ||
+ | * 2.3.n [iii] EIGRP HMAC SHA2-256bit | ||
+ | * 2.3.n [iv] OSPFv2 SHA1-196bit | ||
+ | * 2.3.n [v] OSPFv3 IPsec authentication | ||
+ | * 2.4 RIP v2 | ||
+ | * 2.4.a Implement and troubleshoot RIPv2 | ||
+ | * 2.5 [[tech:network:cisco:eigrp:eigrp|EIGRP [for IPv4 and IPv6]]] | ||
+ | * 2.5.a Describe packet types | ||
+ | * 2.5.a [i] Packet types [hello, query, update, and such] | ||
+ | * 2.5.a [ii] Route types [internal, external] | ||
+ | * 2.5.b Implement and troubleshoot neighbor relationship | ||
+ | * 2.5.b [i] Multicast, unicast EIGRP peering | ||
+ | * 2.5.c Implement and Troubleshoot Loop free path selection | ||
+ | * 2.5.c [i] RD, FD, FC, successor, feasible successor | ||
+ | * 2.5.c [ii] Classic metric | ||
+ | * 2.5.c [iii] Wide metric | ||
+ | * 2.5.d Implement and troubleshoot operations | ||
+ | * 2.5.d [i] General operations | ||
+ | * 2.5.d [ii] Topology table, update, query, active, passive | ||
+ | * 2.5.d [iii] Stuck in active | ||
+ | * 2.5.d [iv] Graceful shutdown | ||
+ | * 2.5.e Implement and troubleshoot EIGRP stub | ||
+ | * 2.5.e [i] stub | ||
+ | * 2.5.e [ii] leak-map | ||
+ | * 2.5.f Implement and troubleshoot load-balancing | ||
+ | * 2.5.f [i] equal-cost | ||
+ | * 2.5.f [ii] unequal-cost | ||
+ | * 2.5.f [iii] add-path | ||
+ | * 2.5.g Implement EIGRP [multi-address] named mode | ||
+ | * 2.5.g [i] Types of families | ||
+ | * 2.5.g [ii] IPv4 address-family | ||
+ | * 2.5.g [iii] IPv6 address-family | ||
+ | * 2.5.h Implement, troubleshoot and optimize EIGRP convergence and scalability | ||
+ | * 2.5.h [i] Describe fast convergence requirements | ||
+ | * 2.5.h [ii] Control query boundaries | ||
+ | * 2.5.h [iii] IP FRR/fast reroute [single hop] | ||
+ | * 2.5.h [iv] Summary leak-map | ||
+ | * 2.5.h [v] Summary metric | ||
+ | * 2.6 OSPF [v2 and v3] | ||
+ | * 2.6.a Describe packet types | ||
+ | * 2.6.a [i] LSA types [1, 2, 3, 4, 5, 7, 9] | ||
+ | * 2.6.a [ii] Route types [N1, N2, E1, E2] | ||
+ | * 2.6.b Implement and troubleshoot neighbor relationship | ||
+ | * 2.6.c Implement and troubleshoot OSPFv3 address-family support | ||
+ | * 2.6.c [i] IPv4 address-family | ||
+ | * 2.6.c [ii] IPv6 address-family | ||
+ | * 2.6.d Implement and troubleshoot network types, area types and router types | ||
+ | * 2.6.d [i] Point-to-point, multipoint, broadcast, non-broadcast | ||
+ | * 2.6.d [ii] LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub | ||
+ | * 2.6.d [iii] Internal router, ABR, ASBR | ||
+ | * 2.6.d [iv] Virtual link | ||
+ | * 2.6.e Implement and troubleshoot path preference | ||
+ | * 2.6.f Implement and troubleshoot operations | ||
+ | * 2.6.f [i] General operations | ||
+ | * 2.6.f [ii] Graceful shutdown | ||
+ | * 2.6.f [iii] GTSM [generic TTL security mechanism] | ||
+ | * 2.6.g Implement, troubleshoot and optimize OSPF convergence and scalability | ||
+ | * 2.6.g [i] Metrics | ||
+ | * 2.6.g [ii] LSA throttling, SPF tuning, fast hello | ||
+ | * 2.6.g [iii] LSA propagation control [area types, ISPF] | ||
+ | * 2.6.g [iv] IP FR/fast reroute [single hop] | ||
+ | * 2.6.g [v] LFA/loop-free alternative [multi hop] | ||
+ | * 2.6.g [vi] OSPFv3 prefix suppression | ||
+ | * 2.7 BGP | ||
+ | * 2.7.a Describe, implement and troubleshoot peer relationships | ||
+ | * 2.7.a [i] Peer-group, template | ||
+ | * 2.7.a [ii] Active, passive | ||
+ | * 2.7.a [iii] States, timers | ||
+ | * 2.7.a [iv] Dynamic neighbors | ||
+ | * 2.7.b Implement and troubleshoot IBGP and EBGP | ||
+ | * 2.7.b [i] EBGP, IBGP | ||
+ | * 2.7.b [ii] 4 bytes AS number | ||
+ | * 2.7.b [iii] Private AS | ||
+ | * 2.7.c Explain attributes and best-path selection | ||
+ | * 2.7.d Implement, optimize and troubleshoot routing policies | ||
+ | * 2.7.d [i] Attribute manipulation | ||
+ | * 2.7.d [ii] Conditional advertisement | ||
+ | * 2.7.d [iii] Outbound route filtering | ||
+ | * 2.7.d [iv] Communities, extended communities | ||
+ | * 2.7.d [v] Multi-homing | ||
+ | * 2.7.e Implement and troubleshoot scalability | ||
+ | * 2.7.e [i] Route-reflector, cluster | ||
+ | * 2.7.e [ii] Confederations | ||
+ | * 2.7.e [iii] Aggregation, AS set | ||
+ | * 2.7.f Implement and troubleshoot multi-protocol BGP | ||
+ | * 2.7.f [i] IPv4, IPv6, VPN address-family | ||
+ | * 2.7.g Implement and troubleshoot AS path manipulations | ||
+ | * 2.7.g [i] Local AS, allow AS in, remove private AS | ||
+ | * 2.7.g [ii] Prepend | ||
+ | * 2.7.g [iii] Regexp | ||
+ | * 2.7.h Implement and Troubleshoot Other Features | ||
+ | * 2.7.h [i] Multipath | ||
+ | * 2.7.h [ii] BGP synchronization | ||
+ | * 2.7.h [iii] Soft reconfiguration, route refresh | ||
+ | * 2.8 Troubleshooting layer 3 technologies | ||
+ | * 2.8.a Use IOS troubleshooting tools | ||
+ | * 2.8.a [i] debug, conditional debug | ||
+ | * 2.8.a [ii] ping, traceroute with extended options | ||
+ | * 2.8.a [iii] Embedded packet capture | ||
+ | * 2.8.b Apply troubleshooting methodologies | ||
+ | * 2.8.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause] | ||
+ | * 2.8.b [ii] Design and implement valid solutions according to constraints | ||
+ | * 2.8.b [iii] Verify and monitor resolution | ||
+ | * 2.8.c Interpret packet capture | ||
+ | * 2.8.c [i] Using wireshark trace analyzer | ||
+ | * 2.8.c [ii] Using IOS embedded packet capture | ||
+ | * 3.0 VPN Technologies | ||
+ | * 3.1 Tunneling | ||
+ | * 3.1.a Implement and troubleshoot MPLS operations | ||
+ | * 3.1.a [i] Label stack, LSR, LSP | ||
+ | * 3.1.a [ii] LDP | ||
+ | * 3.1.a [iii] MPLS ping, MPLS traceroute | ||
+ | * 3.1.b Implement and troubleshoot basic MPLS L3VPN | ||
+ | * 3.1.b [i] L3VPN, CE, PE, P | ||
+ | * 3.1.b [ii] Extranet [route leaking] | ||
+ | * 3.1.c Implement and troubleshoot encapsulation | ||
+ | * 3.1.c [i] GRE | ||
+ | * 3.1.c [ii] Dynamic GRE | ||
+ | * 3.1.d Implement and troubleshoot DMVPN [single hub] | ||
+ | * 3.1.d [i] NHRP | ||
+ | * 3.1.d [ii] DMVPN with IPsec using preshared key | ||
+ | * 3.1.d [iii] QoS profile | ||
+ | * 3.1.d [iv] Pre-classify | ||
+ | * 3.2 Encryption | ||
+ | * 3.2.a Implement and troubleshoot IPsec with preshared key | ||
+ | * 3.2.a [i] IPv4 site to IPv4 site | ||
+ | * 3.2.a [ii] IPv6 in IPv4 tunnels | ||
+ | * 3.2.a [iii] Virtual tunneling interface [VTI] | ||
+ | * 3.3 Troubleshooting VPN technologies | ||
+ | * 3.3.a Use IOS troubleshooting tools | ||
+ | * 3.3.a [i] debug, conditional debug | ||
+ | * 3.3.a [ii] ping, traceroute with extended options | ||
+ | * 3.3.a [iii] Embedded packet capture | ||
+ | * 3.3.b Apply troubleshooting methodologies | ||
+ | * 3.3.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause] | ||
+ | * 3.3.b [ii] Design and implement valid solutions according to constraints | ||
+ | * 3.3.b [iii] Verify and monitor resolution | ||
+ | * 3.3.c Interpret packet capture | ||
+ | * 3.3.c [i] Using wireshark trace analyzer | ||
+ | * 3.3.c [ii] Using IOS embedded packet capture | ||
+ | * 4.0 Infrastructure Security | ||
+ | * 4.1 Device security | ||
+ | * [[tech:network:cisco:snmp:snmp]] | ||
+ | * [[tech:network:cisco:snmp:snmpv3:snmpv3]] | ||
+ | * [[tech:network:cisco:radius:radius]] | ||
+ | * [[tech:network:cisco:tacacs+:tacacs+]] | ||
+ | * 4.1.a Implement and troubleshoot IOS AAA using local database | ||
+ | * 4.1.b Implement and troubleshoot device access control | ||
+ | * 4.1.b [i] Lines [VTY, AUX, console] | ||
+ | * 4.1.b [ii] SNMP | ||
+ | * 4.1.b [iii] Management plane protection | ||
+ | * 4.1.b [iv] Password encryption | ||
+ | * 4.1.c Implement and troubleshoot control plane policing | ||
+ | * 4.2 Network security | ||
+ | * [[tech:network:cisco:acl:catalyst-acl-racl-vacl-pacl:catalyst-acl-racl-vacl-pacl]] | ||
+ | * [[tech:network:cisco:acl:vacl:vacl]] | ||
+ | * [[tech:network:cisco:acl:pacl:pacl]] | ||
+ | * [[tech:network:cisco:dhcp-snooping:dhcp-snooping]] | ||
+ | * [[tech:network:cisco:ip-source-guard:ip-source-guard]] | ||
+ | * [[tech:network:cisco:dynamic-arp-inspection:dynamic-arp-inspection]] | ||
+ | * [[tech:network:cisco:stormcontrol:stormcontrol]] | ||
+ | * [[tech:network:cisco:pvlan:pvlan]] | ||
+ | * 4.2.a Implement and troubleshoot switch security features | ||
+ | * 4.2.a [i] VACL, PACL | ||
+ | * 4.2.a [ii] Stormcontrol | ||
+ | * 4.2.a [iii] DHCP snooping | ||
+ | * 4.2.a [iv] IP source-guard | ||
+ | * 4.2.a [v] Dynamic ARP inspection | ||
+ | * 4.2.a [vi] Port-security | ||
+ | * 4.2.a [vii] Private VLAN | ||
+ | * 4.2.b Implement and troubleshoot router security features | ||
+ | * 4.2.b [i] IPv4 access control lists [standard, extended, time-based] | ||
+ | * 4.2.b [ii] IPv6 traffic filter | ||
+ | * 4.2.b [iii] Unicast reverse path forwarding | ||
+ | * 4.2.c Implement and troubleshoot IPv6 first hop security | ||
+ | * 4.2.c [i] RA guard | ||
+ | * 4.2.c [ii] DHCP guard | ||
+ | * 4.2.c [iii] Binding table | ||
+ | * 4.2.c [iv] Device tracking | ||
+ | * 4.2.c [v] ND inspection/snooping | ||
+ | * 4.2.c [vi] Source guard | ||
+ | * 4.2.c [vii] PACL | ||
+ | * 4.3 Troubleshooting infrastructure security | ||
+ | * 4.3.a Use IOS troubleshooting tools | ||
+ | * 4.3.a [i] debug, conditional debug | ||
+ | * 4.3.a [ii] ping, traceroute with extended options | ||
+ | * 4.3.a [iii] Embedded packet capture | ||
+ | * 4.3.b Apply troubleshooting methodologies | ||
+ | * 4.3.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause] | ||
+ | * 4.3.b [ii] Design and implement valid solutions according to constraints | ||
+ | * 4.3.b [iii] Verify and monitor resolution | ||
+ | * 4.3.c Interpret packet capture | ||
+ | * 4.3.c [i] Using wireshark trace analyzer | ||
+ | * 4.3.c [ii] Using IOS embedded packet capture | ||
+ | * 5.0 Infrastructure Services | ||
+ | * 5.1 System management | ||
+ | * [[tech:network:cisco:snmp:snmp]] | ||
+ | * [[tech:network:cisco:snmp:snmpv3:snmpv3]] | ||
+ | * [[tech:network:cisco:clock:clock]] | ||
+ | * 5.1.a Implement and troubleshoot device management | ||
+ | * 5.1.a [i] Console and VTY | ||
+ | * 5.1.a [ii] telnet, HTTP, HTTPS, SSH, SCP | ||
+ | * 5.1.a [iii] [T]FTP | ||
+ | * 5.1.b Implement and troubleshoot SNMP | ||
+ | * 5.1.b [i] v2c, v3 | ||
+ | * 5.1.c Implement and troubleshoot logging | ||
+ | * 5.1.c [i] Local logging, syslog, debug, conditional debug | ||
+ | * 5.1.c [ii] Timestamp | ||
+ | * 5.2 Quality of service | ||
+ | * 5.2.a Implement and troubleshoot end to end QoS | ||
+ | * 5.2.a [i] CoS and DSCP mapping | ||
+ | * 5.2.b Implement, optimize and troubleshoot QoS using MQC | ||
+ | * 5.2.b [i] Classification | ||
+ | * 5.2.b [ii] Network based application recognition [NBAR] | ||
+ | * 5.2.b [iii] Marking using IP precedence, DSCP, CoS, ECN | ||
+ | * 5.2.b [iv] Policing, shaping | ||
+ | * 5.2.b [v] Congestion management [queuing] | ||
+ | * 5.2.b [vi] HQoS, sub-rate ethernet link | ||
+ | * 5.2.b [vii] Congestion avoidance [WRED] | ||
+ | * 5.3 Network services | ||
+ | * 5.3.a Implement and troubleshoot first-hop redundancy protocols | ||
+ | * 5.3.a [i] HSRP, GLBP, VRRP | ||
+ | * 5.3.a [ii] Redundancy using IPv6 RS/RA | ||
+ | * 5.3.b Implement and troubleshoot network time protocol | ||
+ | * [[tech:network:cisco:clock:clock]] | ||
+ | * 5.3.b [i] NTP master, client, version 3, version 4 | ||
+ | * 5.3.b [ii] NTP authentication | ||
+ | * 5.3.c Implement and troubleshoot IPv4 and IPv6 DHCP | ||
+ | * 5.3.c [i] DHCP client, IOS DHCP server, DHCP relay | ||
+ | * 5.3.c [ii] DHCP options | ||
+ | * 5.3.c [iii] DHCP protocol operations | ||
+ | * 5.3.c [iv] SLAAC/DHCPv6 interaction | ||
+ | * 5.3.c [v] Stateful, stateless DHCPv6 | ||
+ | * 5.3.c [vi] DHCPv6 prefix delegation | ||
+ | * 5.3.d Implement and troubleshoot IPv4 network address translation | ||
+ | * 5.3.d [i] Static NAT, dynamic NAT, policy-based NAT, PAT | ||
+ | * 5.3.d [ii] NAT ALG | ||
+ | * 5.4 Network optimization | ||
+ | * 5.4.a Implement and troubleshoot IP SLA | ||
+ | * [[tech:network:cisco:ip-sla:ip-sla]] | ||
+ | * 5.4.a [i] ICMP, UDP, jitter, VoIP | ||
+ | * 5.4.b Implement and troubleshoot tracking object | ||
+ | * [[tech:network:cisco:ip-sla:ip-sla]] | ||
+ | * 5.4.b [i] Tracking object, tracking list | ||
+ | * 5.4.b [ii] Tracking different entities [e.g. interfaces, routes, IPSLA, and such] | ||
+ | * 5.4.c Implement and troubleshoot netflow | ||
+ | * 5.4.c [i] Netflow v5, v9 | ||
+ | * 5.4.c [ii] Local retrieval | ||
+ | * 5.4.c [iii] Export [configuration only] | ||
+ | * 5.4.d Implement and troubleshoot embedded event manager | ||
+ | * 5.4.d [i] EEM policy using applet | ||
+ | * 5.5 Troubleshooting infrastructure services | ||
+ | * 5.5.a Use IOS troubleshooting tools | ||
+ | * 5.5.a [i] debug, conditional debug | ||
+ | * 5.5.a [ii] ping, traceroute with extended options | ||
+ | * 5.5.a [iii] Embedded packet capture | ||
+ | * 5.5.b Apply troubleshooting methodologies | ||
+ | * 5.5.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause] | ||
+ | * 5.5.b [ii] Design and implement valid solutions according to constraints | ||
+ | * 5.5.b [iii] Verify and monitor resolution | ||
+ | * 5.5.c Interpret packet capture | ||
+ | * 5.5.c [i] Using wireshark trace analyzer | ||
+ | * 5.5.c [ii] Using IOS embedded packet capture | ||