User Tools

Site Tools


certification:tech:network:cisco:ccie:ccie-rsv5:written:written

CCIE Routing and Switching v5.1 Written Exam

Abstract

  • 1.0 Network Principles
    • 1.1 Network theory
      • 1.1.a Describe basic software architecture differences between IOS and IOS XE
        • 1.1.a [i] Control plane and Forwarding plane
        • 1.1.a [ii] Impact to troubleshooting and performances
        • 1.1.a [iii] Excluding specific platform's architecture
      • 1.1.b Identify Cisco express forwarding concepts
        • 1.1.b [i] RIB, FIB, LFIB, Adjacency table
        • 1.1.b [ii] Load balancing Hash
        • 1.1.b [iii] Polarization concept and avoidance
      • 1.1.c Explain general network challenges
        • 1.1.c [i] Unicast flooding
        • 1.1.c [ii] Out of order packets
        • 1.1.c [iii] Asymmetric routing
        • 1.1.c [iv] Impact of micro burst
      • 1.1.d Explain IP operations
        • 1.1.d [i] ICMP unreachable, redirect
        • 1.1.d [ii] IPv4 options, IPv6 extension headers
        • 1.1.d [iii] IPv4 and IPv6 fragmentation
        • 1.1.d [iv] TTL
        • 1.1.d [v] IP MTU
      • 1.1.e Explain TCP operations
        • 1.1.e [i] IPv4 and IPv6 PMTU
        • 1.1.e [ii] MSS
        • 1.1.e [iii] Latency
        • 1.1.e [iv] Windowing
        • 1.1.e [v] Bandwidth delay product
        • 1.1.e [vi] Global synchronization
        • 1.1.e [vii] Options
      • 1.1.f Explain UDP operations
        • 1.1.f [i] Starvation
        • 1.1.f [ii] Latency
        • 1.1.f [iii] RTP/RTCP concepts
    • 1.2 Network implementation and operation
      • 1.2.a Evaluate proposed changes to a network
        • 1.2.a [i] Changes to routing protocol parameters
        • 1.2.a [ii] Migrate parts of a network to IPv6
        • 1.2.a [iii] Routing protocol migration
        • 1.2.a [iv] Adding multicast support
        • 1.2.a [v] Migrate spanning tree protocol
        • 1.2.a [vi] Evaluate impact of new traffic on existing QoS design
    • 1.3 Network troubleshooting
      • 1.3.a Use IOS troubleshooting tools
        • 1.3.a [i] debug, conditional debug
        • 1.3.a [ii] ping, traceroute with extended options
        • 1.3.a [iii] Embedded packet capture
        • 1.3.a [iv] Performance monitor
      • 1.3.b Apply troubleshooting methodologies
        • 1.3.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause]
        • 1.3.b [ii] Design and implement valid solutions according to constraints
        • 1.3.b [iii] Verify and monitor resolution
      • 1.3.c Interpret packet capture
        • 1.3.c [i] Using Wireshark trace analyzer
        • 1.3.c [ii] Using IOS embedded packet capture
  • 2.0 Layer 2 Technologies
    • 2.1 LAN switching technologies
      • 2.1.a Implement and troubleshoot switch administration
        • 2.1.a [i] Managing MAC address table
        • 2.1.a [ii] errdisable recovery
        • 2.1.a [iii] L2 MTU
      • 2.1.b Implement and troubleshoot layer 2 protocols
        • 2.1.b [i] CDP, LLDP
        • 2.1.b [ii] UDLD
      • 2.1.c Implement and troubleshoot VLAN
        • 2.1.c [i] Access ports
        • 2.1.c [ii] VLAN database
        • 2.1.c [iii] Normal, extended VLAN, voice VLAN
      • 2.1.d Implement and troubleshoot trunking
        • 2.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning
        • 2.1.d [ii] dot1Q
        • 2.1.d [iii] Native VLAN
        • 2.1.d [iv] Manual pruning
      • 2.1.e Implement and troubleshoot EtherChannel
        • 2.1.e [i] LACP, PAgP, manual
        • 2.1.e [ii] Layer 2, layer 3
        • 2.1.e [iii] Load-balancing
        • 2.1.e [iv] Etherchannel misconfiguration guard
      • 2.1.f Implement and troubleshoot spanning-tree
        • 2.1.f [i] PVST+/RPVST+/MST
        • 2.1.f [ii] Switch priority, port priority, path cost, STP timers
        • 2.1.f [iii] port fast, BPDUguard, BPDUfilter
        • 2.1.f [iv] loopguard, rootguard
      • 2.1.g Implement and troubleshoot other LAN switching technologies
      • 2.1.h Describe chassis virtualization and aggregation technologies
        • 2.1.h [i] Multichassis
        • 2.1.h [ii] VSS concepts
        • 2.1.h [iii] Alternative to STP
        • 2.1.h [iv] Stackwise
        • 2.1.h [v] Excluding specific platform implementation
      • 2.1.i Describe spanning-tree concepts
        • 2.1.i [i] Compatibility between MST and RSTP
        • 2.1.i [ii] STP dispute, STP bridge assurance
    • 2.2 Layer 2 multicast
      • 2.2.a Implement and troubleshoot IGMP
        • 2.2.a [i] IGMPv1, IGMPv2, IGMPv3
        • 2.2.a [ii] IGMP snooping
        • 2.2.a [iii] IGMP querier
        • 2.2.a [iv] IGMP filter
        • 2.2.a [v] IGMP proxy
      • 2.2.b Explain MLD
      • 2.2.c Explain PIM snooping
    • 2.3 Layer 2 WAN circuit technologies
      • 2.3.a Implement and troubleshoot HDLC
      • 2.3.b Implement and troubleshoot PPP
        • 2.3.b [i] Authentication [PAP, CHAP]
        • 2.3.b [ii] PPPoE
        • 2.3.b [iii] MLPPP
      • 2.3.c Describe WAN rate-based ethernet circuits
        • 2.3.c [i] Metro and WAN Ethernet topologies
        • 2.3.c [ii] Use of rate-limited WAN ethernet services
  • 3.0 Layer 3 Technologies
    • 3.1 Addressing technologies
    • 3.2 Layer 3 multicast
      • 3.2.a Troubleshoot reverse path forwarding
        • 3.2.a [i] RPF failure
        • 3.2.a [ii] RPF failure with tunnel interface
      • 3.2.b Implement and troubleshoot IPv4 protocol independent multicast
        • 3.2.b [i] PIM dense mode, sparse mode, sparse-dense mode
        • 3.2.b [ii] Static RP, auto-RP, BSR
        • 3.2.b [iii] BiDirectional PIM
        • 3.2.b [iv] Source-specific multicast
        • 3.2.b [v] Group to RP mapping
        • 3.2.b [vi] Multicast boundary
      • 3.2.c Implement and troubleshoot multicast source discovery protocol
        • 3.2.c [i] Intra-domain MSDP [anycast RP]
        • 3.2.c [ii] SA filter
      • 3.2.d Describe IPv6 multicast
        • 3.2.d [i] IPv6 multicast addresses
        • 3.2.d [ii] PIMv6
    • 3.3 Fundamental routing concepts
      • 3.3.a Implement and troubleshoot static routing
      • 3.3.b Implement and troubleshoot default routing
      • 3.3.c Compare routing protocol types
        • 3.3.c [i] Distance vector
        • 3.3.c [ii] Link state
        • 3.3.c [iii] Path vector
      • 3.3.d Implement, optimize and troubleshoot administrative distance
      • 3.3.e Implement and troubleshoot passive interface
      • 3.3.f Implement and troubleshoot VRF lite
      • 3.3.g Implement, optimize and troubleshoot filtering with any routing protocol
      • 3.3.h Implement, optimize and troubleshoot redistribution between any routing protocol
      • 3.3.i Implement, optimize and troubleshoot manual and auto summarization with any routing protocol
      • 3.3.j Implement, optimize and troubleshoot policy-based routing
      • 3.3.k Identify and troubleshoot sub-optimal routing
      • 3.3.l Implement and troubleshoot bidirectional forwarding detection
      • 3.3.m Implement and troubleshoot loop prevention mechanisms
        • 3.3.m [i] Route tagging, filtering
        • 3.3.m [ii] Split horizon
        • 3.3.m [iii] Route poisoning
      • 3.3.n Implement and troubleshoot routing protocol authentication
        • 3.3.n [i] MD5
        • 3.3.n [ii] Key-chain
        • 3.3.n [iii] EIGRP HMAC SHA2-256bit
        • 3.3.n [iv] OSPFv2 SHA1-196bit
        • 3.3.n [v] OSPFv3 IPsec authentication
    • 3.4 RIP [v2 and v6]
      • 3.5.a Describe packet types
        • 3.5.a [i] Packet types [hello, query, update, and such]
        • 3.5.a [ii] Route types [internal, external]
      • 3.5.b Implement and troubleshoot neighbor relationship
        • 3.5.b [i] Multicast, unicast EIGRP peering
        • 3.5.b [ii] OTP point-to-point peering
        • 3.5.b [iii] OTP route-reflector peering
        • 3.5.b [iv] OTP multiple service providers scenario
      • 3.5.c Implement and troubleshoot loop free path selection
        • 3.5.c [i] RD, FD, FC, successor, feasible successor
        • 3.5.c [ii] Classic metric
        • 3.5.c [iii] Wide metric
      • 3.5.d Implement and troubleshoot operations
        • 3.5.d [i] General operations
        • 3.5.d [ii] Topology table, update, query, active, passive
        • 3.5.d [iii] Stuck in active
        • 3.5.d [iv] Graceful shutdown
      • 3.5.e Implement and troubleshoot EIGRP stub
        • 3.5.e [i] Stub
        • 3.5.e [ii] Leak-map
      • 3.5.f Implement and troubleshoot load-balancing
        • 3.5.f [i] equal-cost
        • 3.5.f [ii] unequal-cost
        • 3.5.f [iii] add-path
      • 3.5.g Implement EIGRP [multi-address] named mode
        • 3.5.g [i] Types of families
        • 3.5.g [ii] IPv4 address-family
        • 3.5.g [iii] IPv6 address-family
      • 3.5.h Implement, troubleshoot and optimize EIGRP convergence and scalability
        • 3.5.h [i] Describe fast convergence requirements
        • 3.5.h [ii] Control query boundaries
        • 3.5.h [iii] IP FRR/fast reroute [single hop]
        • 3.5.8 [iv] Summary leak-map
        • 3.5.h [v] Summary metric
    • 3.6 OSPF [v2 and v3]
      • 3.6.a Describe packet types
        • 3.6.a [i] LSA yypes [1, 2, 3, 4, 5, 7, 9]
        • 3.6.a [ii] Route types [N1, N2, E1, E2]
      • 3.6.b Implement and troubleshoot neighbor relationship
      • 3.6.c Implement and troubleshoot OSPFv3 address-family support
        • 3.6.c [i] IPv4 address-family
        • 3.6.c [ii] IPv6 address-family
      • 3.6.d Implement and troubleshoot network types, area types and router types
        • 3.6.d [i] Point-to-point, multipoint, broadcast, non-broadcast
        • 3.6.d [ii] LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
        • 3.6.d [iii] Internal router, ABR, ASBR
        • 3.6.d [iv] Virtual link
      • 3.6.e Implement and troubleshoot path preference
      • 3.6.f Implement and troubleshoot operations
        • 3.6.f [i] General operations
        • 3.6.f [ii] Graceful shutdown
        • 3.6.f [iii] GTSM [Generic TTL Security Mechanism]
      • 3.6.g Implement, troubleshoot and optimize OSPF convergence and scalability
        • 3.6.g [i] Metrics
        • 3.6.g [ii] LSA throttling, SPF tuning, fast hello
        • 3.6.g [iii] LSA propagation control [area types, ISPF]
        • 3.6.g [iv] IP FRR/fast reroute [single hop]
        • 3.6.g [v] LFA/loop-free alternative [multi hop]
        • 3.6.g [vi] OSPFv3 prefix suppression
    • 3.7 BGP
    • 3.8 ISIS [for IPv4 and IPv6]
      • 3.8.a Describe basic ISIS network
        • 3.8.a [i] Single area, single topology
      • 3.8.b Describe neighbor relationship
      • 3.8.c Describe network types, levels and router types
        • 3.8.c [i] NSAP addressing
        • 3.8.c [ii] Point-to-point, broadcast
      • 3.8.d Describe operations
      • 3.8.e Describe optimization features
        • 3.8.e [i] Metrics, wide metric
  • 4.0 VPN Technologies
    • 4.1 Tunneling
      • 4.1.a Implement and troubleshoot MPLS operations
        • 4.1.a [i] Label stack, LSR, LSP
        • 4.1.a [ii] LDP
        • 4.1.a [iii] MPLS ping, MPLS traceroute
      • 4.1.b Implement and troubleshoot basic MPLS L3VPN
        • 4.1.b [i] L3VPN, CE, PE, P
        • 4.1.b [ii] Extranet [route leaking]
      • 4.1.c Implement and troubleshoot encapsulation
        • 4.1.c [i] GRE
        • 4.1.c [ii] Dynamic GRE
        • 4.1.c [iii] LISP encapsulation principles supporting EIGRP OTP
      • 4.1.d Implement and troubleshoot DMVPN [single hub]
        • 4.1.d [i] NHRP
        • 4.1.d [ii] DMVPN with IPsec using preshared key
        • 4.1.d [iii] QoS profile
        • 4.1.d [iv] Pre-classify
      • 4.1.e Describe IPv6 tunneling techniques
        • 4.1.e [i] 6in4, 6to4
        • 4.1.e [ii] ISATAP
        • 4.1.e [iii] 6RD
        • 4.1.e [iv] 6PE/6VPE
      • 4.1.g Describe basic layer 2 VPN —wireline
        • 4.1.g [i] L2TPv3 general principals
        • 4.1.g [ii] ATOM general principals
      • 4.1.h Describe basic L2VPN — LAN services
        • 4.1.h [i] MPLS-VPLS general principals
        • 4.1.h [ii] OTV general principals
    • 4.2 Encryption
      • 4.2.a Implement and troubleshoot IPsec with preshared key
        • 4.2.a [i] IPv4 site to IPv4 site
        • 4.2.a [ii] IPv6 in IPv4 tunnels
        • 4.2.a [iii] Virtual tunneling Interface [VTI]
      • 4.2.b Describe GET VPN
  • 5.0 Infrastructure Security
  • 6.0 Infrastructure Services
    • 6.1 System management
      • 6.1.a Implement and troubleshoot device management
        • 6.1.a [i] Console and VTY
        • 6.1.a [ii] telnet, HTTP, HTTPS, SSH, SCP
        • 6.1.a [iii] [T]FTP
      • 6.1.b Implement and troubleshoot SNMP
        • 6.1.b [i] v2c, v3
      • 6.1.c Implement and troubleshoot logging
        • 6.1.c [i] Local logging, syslog, debug, conditional debug
        • 6.1.c [ii] Timestamp
    • 6.2 Quality of service
      • 6.2.a Implement and troubleshoot end-to-end QoS
        • 6.2.a [i] CoS and DSCP mapping
      • 6.2.b Implement, optimize and troubleshoot QoS using MQC
        • 6.2.b [i] Classification
        • 6.2.b [ii] Network based application recognition [NBAR]
        • 6.2.b [iii] Marking using IP precedence, DSCP, CoS, ECN
        • 6.2.b [iv] Policing, shaping
        • 6.2.b [v] Congestion management [queuing]
        • 6.2.b [vi] HQoS, sub-rate ethernet link
        • 6.2.b [vii] Congestion avoidance [WRED]
      • 6.2.c Describe layer 2 QoS
        • 6.2.c [i] Queuing, scheduling
        • 6.2.c [ii] Classification, marking
    • 6.3 Network services
      • 6.3.a Implement and troubleshoot first-hop redundancy protocols
      • 6.3.b Implement and troubleshoot network time protocol
        • 6.3.b [i] NTP master, client, version 3, version 4
        • 6.3.b [ii] NTP Authentication
      • 6.3.c Implement and troubleshoot IPv4 and IPv6 DHCP
        • 6.3.c [i] DHCP client, IOS DHCP server, DHCP relay
        • 6.3.c [ii] DHCP options
        • 6.3.c [iii] DHCP protocol operations
        • 6.3.c [iv] SLAAC/DHCPv6 interaction
        • 6.3.c [v] Stateful, stateless DHCPv6
        • 6.3.c [vi] DHCPv6 prefix delegation
      • 6.3.d Implement and troubleshoot IPv4 network address translation
      • 6.3.e Describe IPv6 network address translation
        • 6.3.e [i] NAT64
        • 6.3.e [ii] NPTv6
    • 6.4 Network optimization
      • 6.4.a Implement and troubleshoot IP SLA
      • 6.4.b Implement and troubleshoot tracking object
        • 6.4.b [i] Tracking object, tracking list
        • 6.4.b [ii] Tracking different entities [e.g. interfaces, routes, IPSLA, and such]
      • 6.4.c Implement and troubleshoot netflow
        • 6.4.c [i] Netflow v5, v9
        • 6.4.c [ii] Local retrieval
        • 6.4.c [iii] Export [configuration only]
      • 6.4.d Implement and troubleshoot embedded event manager
        • 6.4.d [i] EEM policy using applet
        • 6.4.e Identify performance routing [PfR]
        • 6.4.e [i] Basic load balancing
        • 6.4.e [ii] Voice optimization
  • 7.0 Evolving Technologies v1.1
    • 7.1 Cloud
      • 7.1.a Compare and contrast public, private, hybrid, and multicloud design considerations
        • 7.1.a [i] Infrastructure, platform, and software as a service (XaaS)
        • 7.1.a [ii] Performance, scalability, and high availability
        • 7.1.a [iii] Security implications, compliance, and policy
        • 7.1.a [iv] Workload migration
      • 7.1.b Describe cloud infrastructure and operations
        • 7.1.b [i] Compute virtualization (containers and virtual machines)
        • 7.1.b [ii] Connectivity (virtual switches, SD-WAN and SD-Access)
        • 7.1.b [iii] Virtualization functions (NFVi, VNF, and L4/L6)
        • 7.1.b [iv] Automation and orchestration tools (CloudCenter, DNA-center, and Kubernetes)
    • 7.2 Network programmability (SDN)
      • 7.2.a Describe architectural and operational considerations for a programmable network
        • 7.2.a [i] Data models and structures (YANG, JSON and XML)
        • 7.2.a [i] Device programmability (gRPC, NETCONF and RESTCONF)
        • 7.2.a [ii] Controller based network design (policy driven configuration and northbound/ southbound APIs)
        • 7.2.a [iii] Configuration management tools (agent and agentless) and version control systems (Git and SVN)
    • 7.3 Internet of things (IoT)
      • 7.3.a Describe architectural framework and deployment considerations for IoT
        • 7.3.a [i] IoT technology stack (IoT Network Hierarchy, data acquisition and flow)
        • 7.3.a [ii] IoT standards and protocols (characteristics within IT and OT environment)
        • 7.3.a [iii] IoT security (network segmentation, device profiling, and secure remote)
certification/tech/network/cisco/ccie/ccie-rsv5/written/written.txt · Last modified: 2019/12/16 18:05 by wnoguchi