دوره جامع روتینگ و سویچینگ سیسکو از CCNA R&S تا CCIE R&S

مروری بر دوره

دوره Cisco Routing and Switching Pack یک پکیج کامل در حوزه زیرساخت تجهیزات سیسکو می باشد. حضور تجهیزات سیسکو در زیر ساخت های اکثر سازمان ها و شرکت ها، این فرصت را پیش روی متخصصین این حوزه قرار خواهد داد تا با کسب دانش و تخصص در این حوزه از فرصت های شغلی خوبی بهره مند شوند. طراحی این دوره به گونه ای صورتی انجام شده است تا دانشجویان ضمن یادگیری اصول اولیه کار با تجهیزات روتینگ و سوییچینگ سیسکو دوره CCNA Routing and Switching به مرور وارد دوره های تخصصی CCNP Routing and Switching شده و به صورت جامع و حرفه ای با مهارت های کار با روترها و سوییچ های سیسکو بر طبق آخرین سیلابس سیسکو آشنا شوند. از مهمترین جذابیت های این دوره ارائه فیلم جلسات آموزشی به همراه جزوات فارسی به دانشجویان خواهد بود.

.

سرفصل ها

CCNA 200-125

 

1.1 Compare and contrast OSI and TCP/IP models

1.2 Compare and contrast TCP and UDP protocols

1.3 Describe the impact of infrastructure components in an enterprise network

  • 1.3.a Firewalls
  • 1.3.b Access points
  • 1.3.c Wireless controllers

1.4 Describe the effects of cloud resources on enterprise network architecture

  • 1.4.a Traffic path to internal and external cloud services
  • 1.4.b Virtual services
  • 1.4.c Basic virtual network infrastructure

1.5 Compare and contrast collapsed core and three-tier architectures

1.6 Compare and contrast network topologies

  • 1.6.a Star
  • 1.6.b Mesh
  • 1.6.c Hybrid

1.7 Select the appropriate cabling type based on implementation requirements

1.8 Apply troubleshooting methodologies to resolve problems

  • 1.8.a Perform and document fault isolation
  • 1.8.b Resolve or escalate
  • 1.8.c Verify and monitor resolution

1.9 Configure, verify, and troubleshoot IPv4 addressing and subnetting

1.10 Compare and contrast IPv4 address types

  • 1.10.a Unicast
  • 1.10.b Broadcast
  • 1.10.c Multicast

1.11 Describe the need for private IPv4 addressing

1.12 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment

1.13 Configure, verify, and troubleshoot IPv6 addressing

1.14 Configure and verify IPv6 Stateless Address Auto Configuration

1.15 Compare and contrast IPv6 address types

  • 1.15.a Global unicast
  • 1.15.b Unique local
  • 1.15.c Link local
  • 1.15.d Multicast
  • 1.15.e Modified EUI 64
  • 1.15.f Autoconfiguration
  • 1.15.g Anycast

 

4.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication

4.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication

4.3 Configure, verify, and troubleshoot GRE tunnel connectivity

4.4 Describe WAN topology options

  • 4.4.a Point-to-point
  • 4.4.b Hub and spoke
  • 4.4.c Full mesh
  • 4.4.d Single vs dual-homed

4.5 Describe WAN access connectivity options

  • 4.5.a MPLS
  • 4.5.b Metro Ethernet
  • 4.5.c Broadband PPPoE
  • 4.5.d Internet VPN (DMVPN, site-to-site VPN, client VPN)

4.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)

4.7 Describe basic QoS concepts

  • 4.7.a Marking
  • 4.7.b Device trust
  • 4.7.c Prioritization
    • 4.7.c. [i] Voice
    • 4.7.c. [ii] Video
    • 4.7.c. [iii] Data
  • 4.7.d Shaping
  • 4.7.e Policing
  • 4.7.f Congestion management

 

300-101 Routing

1.1 Identify Cisco Express Forwarding concepts

  • 1.1.a FIB
  • 1.1.b Adjacency table

1.2 Explain general network challenges

  • 1.2.a Unicast
  • 1.2.b Out-of-order packets
  • 1.2.c Asymmetric routing

1.3 Describe IP operations

  • 1.3.a ICMP Unreachable and Redirects
  • 1.3.b IPv4 and IPv6 fragmentation
  • 1.3.c TTL

1.4 Explain TCP operations

  • 1.4.a IPv4 and IPv6 (P)MTU
  • 1.4.b MSS
  • 1.4.c Latency
  • 1.4.d Windowing
  • 1.4.e Bandwidth-delay product
  • 1.4.f Global synchronization

1.5 Describe UDP operations

  • 1.5.a Starvation
  • 1.5.b Latency

1.6 Recognize proposed changes to the network

  • 1.6.a Changes to routing protocol parameters
  • 1.6.b Migrate parts of the network to IPv6
  • 1.6.c Routing protocol migration

 

2.1 Configure and verify PPP

  • 2.1.a Authentication (PAP, CHAP)
  • 2.1.b PPPoE (client side only)

2.2 Explain Frame Relay

  • 2.2.a Operations
  • 2.2.b Point-to-point
  • 2.2.c Multipoint

3.1 Identify, configure, and verify IPv4 addressing and subnetting

  • 3.1.a Address types (Unicast, broadcast, multicast, and VLSM)
  • 3.1.b ARP
  • 3.1.c DHCP relay and server
  • 3.1.d DHCP protocol operations

3.2 Identify IPv6 addressing and subnetting

  • 3.2.a Unicast
  • 3.2.b EUI-64
  • 3.2.c ND, RS/RA
  • 3.2.d Autoconfig (SLAAC)
  • 3.2.e DHCP relay and server
  • 3.2.f DHCP protocol operations

3.3 Configure and verify static routing

3.4 Configure and verify default routing

3.5 Evaluate routing protocol types

  • 3.5.a Distance vector
  • 3.5.b Link state
  • 3.5.c Path vector

3.6 Describe administrative distance

3.7 Troubleshoot passive interfaces

3.8 Configure and verify VRF lite

3.9 Configure and verify filtering with any protocol

3.10 Configure and verify redistribution between any routing protocols or routing sources

3.11 Configure and verify manual and autosummarization with any routing protocol

3.12 Configure and verify policy-based routing

3.13 Identify suboptimal routing

3.14 Explain ROUTE maps

3.15 Configure and verify loop prevention mechanisms

  • 3.15.a Route tagging and filtering
  • 3.15.b Split-horizon
  • 3.15.c Route poisoning

3.16 Configure and verify RIPv2

3.17 Describe RIPng

3.18 Describe EIGRP packet types

3.19 Configure and verify EIGRP neighbor relationship and authentication

3.20 Configure and verify EIGRP stubs

3.21 Configure and verify EIGRP load balancing

  • 3.21.a Equal cost
  • 3.21.b Unequal cost

3.22 Describe and optimize EIGRP metrics

3.23 Configure and verify EIGRP for IPv6

3.24 Describe OSPF packet types

3.25 Configure and verify OSPF neighbor relationship and authentication

3.26 Configure and verify network types, area types, and router types

  • 3.26.a Point-to-point, multipoint, broadcast, nonbroadcast
  • 3.26.b LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
  • 3.26.c Internal router, backbone router, ABR, ASBR
  • 3.26.d Virtual link

3.27 Configure and verify OSPF path preference

3.28 Configure and verify OSPF operations

3.29 Configure and verify OSPF for IPv6

3.30 Describe, configure, and verify BGP peer relationships and authentication

  • 3.30.a Peer group
  • 3.30.b Active, passive
  • 3.30.c States and timers

3.31 Configure and verify eBGP (IPv4 and IPv6 address families)

  • 3.31.a eBGP
  • 3.31.b 4-byte AS number
  • 3.31.c Private AS

3.32 Explain BGP attributes and best-path selection

 

4.1 Configure and verify GRE

4.2 Describe DMVPN (single hub)

4.3 Describe Easy Virtual Networking (EVN)

 

5.1 Describe IOS AAA using local database

5.2 Describe device security using IOS AAA with TACACS+ and RADIUS

  • 5.2.a AAA with TACACS+ and RADIUS
  • 5.2.b Local privilege authorization fallback

5.3 Configure and verify device access control

  • 5.3.a Lines (VTY, AUX, console)
  • 5.3.b Management plane protection
  • 5.3.c Password encryption

5.4 Configure and verify router security features

  • 5.4.a IPv4 access control lists (standard, extended, time-based)
  • 5.4.b IPv6 traffic filter
  • 5.4.c Unicast reverse path forwarding

 

6.1 Configure and verify device management

  • 6.1.a Console and VTY
  • 6.1.b Telnet, HTTP, HTTPS, SSH, SCP
  • 6.1.c (T)FTP

6.2 Configure and verify SNMP

  • 6.2.a v2
  • 6.2.b v3

6.3 Configure and verify logging

  • 6.3.a Local logging, syslog, debugs, conditional debugs
  • 6.3.b Timestamps

6.4 Configure and verify Network Time Protocol (NTP)

  • 6.4.a NTP master, client, version 3, version 4
  • 6.4.b NTP authentication

6.5 Configure and verify IPv4 and IPv6 DHCP

  • 6.5.a DHCP client, IOS DHCP server, DHCP relay
  • 6.5.b DHCP options (describe)

6.6 Configure and verify IPv4 Network Address Translation (NAT)

  • 6.6.a Static NAT, dynamic NAT, PAT

6.7 Describe IPv6 NAT

  • 6.7.a NAT64
  • 6.7.b NPTv6

6.8 Describe SLA architecture

6.9 Configure and verify IP SLA

  • 6.9.a ICMP

6.10 Configure and verify tracking objects

  • 6.10.a Tracking objects
  • 6.10.b Tracking different entities (for example, interfaces, IPSLA results)

6.11 Configure and verify Cisco NetFlow

  • 6.11.a NetFlow v5, v9
  • 6.11.b Local retrieval
  • 6.11.c Export (configuration only)

 

300-115 Switch

1.1 Configure and verify switch administration

  • 1.1.a SDM templates
  • 1.1.b Managing MAC address table
  • 1.1.c Troubleshoot Err-disable recovery

1.2 Configure and verify Layer 2 protocols

  • 1.2.a CDP, LLDP
  • 1.2.b UDLD

1.3 Configure and verify VLANs

  • 1.3.a Access ports
  • 1.3.b VLAN database
  • 1.3.c Normal, extended VLAN, voice VLAN

1.4 Configure and verify trunking

  • 1.4.a VTPv1, VTPv2, VTPv3, VTP pruning
  • 1.4.b dot1Q
  • 1.4.c Native VLAN
  • 1.4.d Manual pruning

1.5 Configure and verify EtherChannels

  • 1.5.a LACP, PAgP, manual
  • 1.5.b Layer 2, Layer 3
  • 1.5.c Load balancing
  • 1.5.d EtherChannel misconfiguration guard

1.6 Configure and verify spanning tree

  • 1.6.a PVST+, RPVST+, MST
  • 1.6.b Switch priority, port priority, path cost, STP timers
  • 1.6.c PortFast, BPDUguard, BPDUfilter
  • 1.6.d Loopguard and Rootguard

1.7 Configure and verify other LAN switching technologies

  • 1.7.a SPAN, RSPAN

1.8 Describe chassis virtualization and aggregation technologies

  • 1.8.a Stackwise

 

2.1 Configure and verify switch security features

  • 2.1.a DHCP snooping
  • 2.1.b IP Source Guard
  • 2.1.c Dynamic ARP inspection
  • 2.1.d Port security
  • 2.1.e Private VLAN
  • 2.1.f Storm control

2.2 Describe device security using Cisco IOS AAA with TACACS+ and RADIUS

  • 2.2.a AAA with TACACS+ and RADIUS
  • 2.2.b Local privilege authorization fallback

 

3.1 Configure and verify first-hop redundancy protocols

  • 3.1.a HSRP
  • 3.1.b VRRP
  • 3.1.c GLBP

 

300-135 T-SHOOT

1.1 Use Cisco IOS troubleshooting tools

  • 1.1.a Debug, conditional debug
  • 1.1.b Ping and trace route with extended options

1.2 Apply troubleshooting methodologies

  • 1.2.a Diagnose the root cause of networking issues (analyze symptoms, identify and describe root cause)
  • 1.2.b Design and implement valid solutions
  • 1.2.c Verify and monitor resolution

 

2.1 Troubleshoot switch administration

  • 2.1.a SDM templates
  • 2.1.b Managing MAC address table
  • 2.1.c Troubleshoot Err-disable recovery

2.2 Troubleshoot Layer 2 protocols

  • 2.2.a CDP, LLDP
  • 2.2.b UDLD

2.3 Troubleshoot VLANs

  • 2.3.a Access ports
  • 2.3.b VLAN database
  • 2.3.c Normal, extended VLAN, voice VLAN

2.4 Troubleshoot trunking

  • 2.4.a VTPv1, VTPv2, VTPv3, VTP pruning
  • 2.4.b dot1Q
  • 2.4.c Native VLAN
  • 2.4.d Manual pruning

2.5 Troubleshoot EtherChannels

  • 2.5.a LACP, PAgP, manual
  • 2.5.b Layer 2, Layer 3
  • 2.5.c Load balancing
  • 2.5.d EtherChannel misconfiguration guard

2.6 Troubleshoot spanning tree

  • 2.6.a PVST+, RPVST +, MST
  • 2.6.b Switch priority, port priority, path cost, STP timers
  • 2.6.c PortFast, BPDUguard, BPDUfilter
  • 2.6.d Loopguard, Rootguard

2.7 Troubleshoot other LAN switching technologies

  • 2.7.a SPAN, RSPAN

2.8 Troubleshoot chassis virtualization and aggregation technologies

  • 2.8.a Stackwise

 

3.1 Troubleshoot IPv4 addressing and subnetting

  • 3.1.a Address types (Unicast, broadcast, multicast, and VLSM)
  • 3.1.b ARP
  • 3.1.c DHCP relay and server
  • 3.1.d DHCP protocol operations

3.2 Troubleshoot IPv6 addressing and subnetting

  • 3.2.a Unicast
  • 3.2.b EUI-64
  • 3.2.c ND, RS/RA
  • 3.2.d Autoconfig (SLAAC)
  • 3.2.e DHCP relay and server
  • 3.2.f DHCP protocol operations

3.3 Troubleshoot static routing

3.4 Troubleshoot default routing

3.5 Troubleshoot administrative distance

3.6 Troubleshoot passive interfaces

3.7 Troubleshoot VRF lite

3.8 Troubleshoot filtering with any protocol

3.9 Troubleshoot between any routing protocols or routing sources

3.10 Troubleshoot manual and autosummarization with any routing protocol

3.11 Troubleshoot policy-based routing

3.12 Troubleshoot suboptimal routing

3.13 Troubleshoot loop prevention mechanisms

  • 3.13.a Route tagging, filtering
  • 3.13.b Split-horizon
  • 3.13.c Route poisoning

3.14 Troubleshoot RIPv2

3.15 Troubleshoot EIGRP neighbor relationship and authentication

3.16 Troubleshoot loop free path selection

  • 3.16.a RD, FD, FC, successor, feasible successor

3.17 Troubleshoot EIGPR operations

  • 3.17.a Stuck in active

3.18 Troubleshoot EIGRP stubs

3.19 Troubleshoot EIGRP load balancing

  • 3.19.a Equal cost
  • 3.19.b Unequal cost

3.20 Troubleshoot EIGRP metrics

3.21 Troubleshoot EIGRP for IPv6

3.22 Troubleshoot OSPF neighbor relationship and authentication

3.23 Troubleshoot network types, area types, and router types

  • 3.23.a Point-to-point, multipoint, broadcast, nonbroadcast
  • 3.23.b LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
  • 3.23.c Internal router, backbone router, ABR, ASBR
  • 3.23.d Virtual link

3.24 Troubleshoot OSPF path preference

3.25 Troubleshoot OSPF operations

3.26 Troubleshoot OSPF for IPv6

3.27 Troubleshoot BGP peer relationships and authentication

  • 3.27.a Peer group
  • 3.27.b Active, passive
  • 3.27.c States and timers

3.28 Troubleshoot eBGP

  • 3.28.a eBGP
  • 3.28.b 4-byte AS number
  • 3.28.c Private AS

 

4.1 Troubleshoot GRE

5.1 Troubleshoot IOS AAA using local database

5.2 Troubleshoot device access control

  • 5.2.a Lines (VTY, AUX, console)
  • 5.2.b Management plane protection
  • 5.2.c Password encryption

5.3 Troubleshoot router security features

  • 5.3.a IPv4 access control lists (standard, extended, time-based)
  • 5.3.b IPv6 traffic filter
  • 5.3.c Unicast reverse path forwarding

 

6.1 Troubleshoot device management

  • 6.1.a Console and VTY
  • 6.1.b Telnet, HTTP, HTTPS, SSH, SCP
  • 6.1.c (T) FTP

6.2 Troubleshoot SNMP

  • 6.2.a v2
  • 6.2.b v3

6.3 Troubleshoot logging

  • 6.3.a Local logging, syslog, debugs, conditional debugs
  • 6.3.b Timestamps

6.4 Troubleshoot Network Time Protocol(NTP)

  • 6.4.a NTP master, client, version 3, version 4
  • 6.4.b NTP authentication

6.5 Troubleshoot IPv4 and IPv6 DHCP

  • 6.5.a DHCP client, IOS DHCP server, DHCP relay
  • 6.5.b DHCP options (describe)

6.6 Troubleshoot IPv4 Network Address Translation (NAT)

  • 6.6.a Static NAT, Dynamic NAT, PAT

6.7 Troubleshoot SLA architecture

6.8 Troubleshoot tracking objects

  • 6.8.a Tracking objects
    • 6.8.b Tracking different entities (for example, interfaces, IPSLA results)

 

CCIE Routing and Switching

1.1 LAN switching technologies

  • 1.1.a Implement and troubleshoot switch administration                  
    • 1.1.a [i] Managing MAC address table
    • 1.1.a [ii] errdisable recovery
    • 1.1.a [iii] L2 MTU
  • 1.1.b Implement and troubleshoot layer 2 protocols                  
    • 1.1.b [i] CDP, LLDP
    • 1.1.b [ii] UDLD
  • 1.1.c Implement and troubleshoot VLAN                  
    • 1.1.c [i] access ports
    • 1.1.c [ii] VLAN database
    • 1.1.c [iii] normal, extended VLAN, voice VLAN
  • 1.1.d Implement and troubleshoot trunking                  
    • 1.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning
    • 1.1.d [ii] dot1Q
    • 1.1.d [iii] Native VLAN
    • 1.1.d [iv] Manual pruning
  • 1.1.e Implement and troubleshoot etherchannel                  
    • 1.1.e [i] LACP, PAgP, manual
    • 1.1.e [ii] layer 2, layer 3
    • 1.1.e [iii] load-balancing
    • 1.1.e [iv] etherchannel misconfiguration guard
  • 1.1.f Implement and troubleshoot spanning-tree                  
    • 1.1.f [i] PVST+/RPVST+/MST
    • 1.1.f [ii] switch priority, port priority, path cost, STP timers
    • 1.1.f [iii] port fast, BPDUguard, BPDUfilter
    • 1.1.f [iv] loopguard, rootguard
  • 1.1.g Implement and troubleshoot other LAN switching technologies                  
    • 1.1.g [i] SPAN, RSPAN, ERSPAN

1.2 Layer 2 Multicast

  

  • 1.2.a Implement and troubleshoot IGMP                         
    • 1.2.a [I] IGMPv1, IGMPv2, IGMPv3
    • 1.2.a [ii] IGMP snooping
    • 1.2.a [iii] IGMP querier
    • 1.2.a [iv] IGMP filter
    • 1.2.a [v] IGMP proxy

1.3 Layer 2 WAN circuit technologies

  

  • 1.3.a Implement and troubleshoot HDLC
  • 1.3.b Implement and troubleshoot PPP                
    • 1.3.b [i] authentication [PAP, CHAP]
    • 1.3.b [ii] PPPoE
    • 1.3.b [iii] MLPPP

1.4 Troubleshooting layer 2 technologies

  

  • 1.4.a Use IOS troubleshooting tools                  
    • 1.4.a [i] debug, conditional debug
    • 1.4.a [ii] ping, traceroute with extended options
    • 1.4.a [iii] Embedded packet capture
  • 1.4.b Apply troubleshooting methodologies                  
    • 1.4.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause]
    • 1.4.b [ii] Design and implement valid solutions according to constraints
    • 1.4.b [iii] Verify and monitor resolution
  • 1.4.c Interpret packet capture                  
    • 1.4.c [i] Using wireshark trace analyzer
    • 1.4.c [ii] Using IOS embedded packet capture

 

2.1 Addressing technologies

  

  • 2.1.a Identify, implement and troubleshoot IPv4 addressing and sub-netting                  
    • 2.1.a [i] Address types, VLSM
    • 2.1.a [ii] ARP
  • 2.1.b Identify, implement and troubleshoot IPv6 addressing and sub-netting                
    • 2.1.b [i] Unicast, multicast
    • 2.1.b [ii] EUI-64
    • 2.1.b [iii] ND, RS/RA
    • 2.1.b [iv] Autoconfig/SLAAC temporary addresses [RFC4941]
    • 2.1.b [v] Global prefix configuration feature

2.2 Layer 3 Multicast

  

  • 2.2.a Troubleshoot reverse path forwarding                  
    • 2.2.a [i] RPF failure
    • 2.2.a[ii] RPF failure with tunnel interface
  • 2.2.b Implement and troubleshoot IPv4 protocol independent multicast                  
    • 2.2.b [i] PIM dense mode, sparse mode, sparse-dense mode
    • 2.2.b [ii] Static RP, auto-RP, BSR
    • 2.2.b [iii] Bidirectional PIM
    • 2.2.b [iv] Source-specific multicast
    • 2.2.b [v] Group to RP mapping
    • 2.2.b [vi] Multicast boundary
  • 2.2.c Implement and troubleshoot multicast source discovery protocol                
    • 2.2.c.[i] Intra-domain MSDP [anycast RP]
    • 2.2.c.[ii] SA filter

2.3 Fundamental routing concepts

  

  • 2.3.a Implement and troubleshoot static routing
  • 2.3.b Implement and troubleshoot default routing
  • 2.3.c Compare routing protocol types                  
    • 2.3.c [i] distance vector
    • 2.3.c [ii] link state
    • 2.3.c [iii] path vector
  • 2.3.d Implement, optimize and troubleshoot administrative distance
  • 2.3.e Implement and troubleshoot passive interface
  • 2.3.f Implement and troubleshoot VRF lite
  • 2.3.g Implement, optimize and troubleshoot filtering with any routing protocol
  • 2.3.h Implement, optimize and troubleshoot redistribution between any routing protocol
  • 2.3.i Implement, optimize and troubleshoot manual and auto summarization with any routing protocol
  • 2.3.j Implement, optimize and troubleshoot policy-based routing
  • 2.3.k Identify and troubleshoot sub-optimal routing
  • 2.3.l Implement and troubleshoot bidirectional forwarding detection
  • 2.3.m Implement and troubleshoot loop prevention mechanisms                  
    • 2.3.m [i] Route tagging, filtering
    • 2.3.m [ii] Split horizon
    • 2.3.m [iii] Route poisoning
  • 2.3.n Implement and troubleshoot routing protocol authentication                         
    • 2.3.n [i] MD5
    • 2.3.n [ii] key-chain
    • 2.3.n [iii] EIGRP HMAC SHA2-256bit
    • 2.3.n [iv] OSPFv2 SHA1-196bit
    • 2.3.n [v] OSPFv3 IPsec authentication

2.4 RIP v2

  

  • 2.4.a Implement and troubleshoot RIPv2

2.5 EIGRP [for IPv4 and IPv6]

  

  • 2.5.a Describe packet types                  
    • 2.5.a [i] Packet types [hello, query, update, and such]
    • 2.5.a [ii] Route types [internal, external]
  • 2.5.b Implement and troubleshoot neighbor relationship                  
    • 2.5.b [i] Multicast, unicast EIGRP peering
  • 2.5.c Implement and Troubleshoot Loop free path selection                  
    • 2.5.c [i] RD, FD, FC, successor, feasible successor
    • 2.5.c [ii] Classic metric
    • 2.5.c [iii] Wide metric
  • 2.5.d Implement and troubleshoot operations                  
    • 2.5.d [i] General operations
    • 2.5.d [ii] Topology table, update, query, active, passive
    • 2.5.d [iii] Stuck in active
    • 2.5.d [iv] Graceful shutdown
  • 2.5.e Implement and troubleshoot EIGRP stub                  
    • 2.5.e [i] stub
    • 2.5.e [ii] leak-map
  • 2.5.f Implement and troubleshoot load-balancing                  
    • 2.5.f [i] equal-cost
    • 2.5.f [ii] unequal-cost
    • 2.5.f [iii] add-path
  • 2.5.g Implement EIGRP [multi-address] named mode                  
    • 2.5.g [i] Types of families
    • 2.5.g [ii] IPv4 address-family
    • 2.5.g [iii] IPv6 address-family
  • 2.5.h Implement, troubleshoot and optimize EIGRP convergence and scalability                
    • 2.5.h [i] Describe fast convergence requirements
    • 2.5.h [ii] Control query boundaries
    • 2.5.h [iii] IP FRR/fast reroute [single hop]
    • 2.5.h [iv] Summary leak-map
    • 2.5.h [v] Summary metric

2.6 OSPF [v2 and v3]

  

  • 2.6.a Describe packet types                  
    • 2.6.a [i] LSA types [1, 2, 3, 4, 5, 7, 9]
    • 2.6.a [ii] Route types [N1, N2, E1, E2]
  • 2.6.b Implement and troubleshoot neighbor relationship
  • 2.6.c Implement and troubleshoot OSPFv3 address-family support                  
    • 2.6.c [i] IPv4 address-family
    • 2.6.c [ii] IPv6 address-family
  • 2.6.d Implement and troubleshoot network types, area types and router types                  
    • 2.6.d [i] Point-to-point, multipoint, broadcast, non-broadcast
    • 2.6.d [ii] LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
    • 2.6.d [iii] Internal router, ABR, ASBR
    • 2.6.d [iv] Virtual link
  • 2.6.e Implement and troubleshoot path preference
  • 2.6.f Implement and troubleshoot operations                  
    • 2.6.f [i] General operations
    • 2.6.f [ii] Graceful shutdown
    • 2.6.f [iii] GTSM [generic TTL security mechanism]
  • 2.6.g Implement, troubleshoot and optimize OSPF convergence and scalability                
    • 2.6.g [i] Metrics
    • 2.6.g [ii] LSA throttling, SPF tuning, fast hello
    • 2.6.g [iii] LSA propagation control [area types, ISPF]
    • 2.6.g [iv] IP FR/fast reroute [single hop]
    • 2.6.g [v] LFA/loop-free alternative [multi hop]
    • 2.6.g [vi] OSPFv3 prefix suppression

2.7 BGP

  

  • 2.7.a Describe, implement and troubleshoot peer relationships                  
    • 2.7.a [i] Peer-group, template
    • 2.7.a [ii] Active, passive
    • 2.7.a [iii] States, timers
    • 2.7.a [iv] Dynamic neighbors
  • 2.7.b Implement and troubleshoot IBGP and EBGP                  
    • 2.7.b [i] EBGP, IBGP
    • 2.7.b [ii] 4 bytes AS number
    • 2.7.b [iii] Private AS
  • 2.7.c Explain attributes and best-path selection
  • 2.7.d Implement, optimize and troubleshoot routing policies                  
    • 2.7.d [i] Attribute manipulation
    • 2.7.d [ii] Conditional advertisement
    • 2.7.d [iii] Outbound route filtering
    • 2.7.d [iv] Communities, extended communities
    • 2.7.d [v] Multi-homing
  • 2.7.e Implement and troubleshoot scalability                  
    • 2.7.e [i] Route-reflector, cluster
    • 2.7.e [ii] Confederations
    • 2.7.e [iii] Aggregation, AS set
  • 2.7.f Implement and troubleshoot multi-protocol BGP                  
    • 2.7.f [i] IPv4, IPv6, VPN address-family
  • 2.7.g Implement and troubleshoot AS path manipulations                  
    • 2.7.g [i] Local AS, allow AS in, remove private AS
    • 2.7.g [ii] Prepend
    • 2.7.g [iii] Regexp
  • 2.7.h Implement and Troubleshoot Other Features                
    • 2.7.h [i] Multipath
    • 2.7.h [ii] BGP synchronization
    • 2.7.h [iii] Soft reconfiguration, route refresh

2.8 Troubleshooting layer 3 technologies

  

  • 2.8.a Use IOS troubleshooting tools                  
    • 2.8.a [i] debug, conditional debug
    • 2.8.a [ii] ping, traceroute with extended options
    • 2.8.a [iii] Embedded packet capture
  • 2.8.b Apply troubleshooting methodologies                  
    • 2.8.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause]
    • 2.8.b [ii] Design and implement valid solutions according to constraints
    • 2.8.b [iii] Verify and monitor resolution
  • 2.8.c Interpret packet capture                  
    • 2.8.c [i] Using wireshark trace analyzer
    • 2.8.c [ii] Using IOS embedded packet capture

 

3.1 Tunneling

  

  • 3.1.a Implement and troubleshoot MPLS operations                  
    • 3.1.a [i] Label stack, LSR, LSP
    • 3.1.a [ii] LDP
    • 3.1.a [iii] MPLS ping, MPLS traceroute
  • 3.1.b Implement and troubleshoot basic MPLS L3VPN                  
    • 3.1.b [i] L3VPN, CE, PE, P
    • 3.1.b [ii] Extranet [route leaking]
  • 3.1.c Implement and troubleshoot encapsulation                  
    • 3.1.c [i] GRE
    • 3.1.c [ii] Dynamic GRE
  • 3.1.d Implement and troubleshoot DMVPN [single hub]                  
    • 3.1.d [i] NHRP
    • 3.1.d [ii] DMVPN with IPsec using preshared key
    • 3.1.d [iii] QoS profile
    • 3.1.d [iv] Pre-classify

3.2 Encryption

  

  • 3.2.a Implement and troubleshoot IPsec with preshared key                             
    • 3.2.a [i] IPv4 site to IPv4 site
    • 3.2.a [ii] IPv6 in IPv4 tunnels
    • 3.2.a [iii] Virtual tunneling interface [VTI]

3.3 Troubleshooting VPN technologies

  

  • 3.3.a Use IOS troubleshooting tools                  
    • 3.3.a [i] debug, conditional debug
    • 3.3.a [ii] ping, traceroute with extended options
    • 3.3.a [iii] Embedded packet capture
  • 3.3.b Apply troubleshooting methodologies                  
    • 3.3.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause]
    • 3.3.b [ii] Design and implement valid solutions according to constraints
    • 3.3.b [iii] Verify and monitor resolution
  • 3.3.c Interpret packet capture                  
    • 3.3.c [i] Using wireshark trace analyzer
    • 3.3.c [ii] Using IOS embedded packet capture

 

4.1 Device security

  

  • 4.1.a Implement and troubleshoot IOS AAA using local database
  • 4.1.b Implement and troubleshoot device access control                  
    • 4.1.b [i] Lines [VTY, AUX, console]
    • 4.1.b [ii] SNMP
    • 4.1.b [iii] Management plane protection
    • 4.1.b [iv] Password encryption
  • 4.1.c Implement and troubleshoot control plane policing

4.2 Network security

  

  • 4.2.a Implement and troubleshoot switch security features                  
    • 4.2.a [i] VACL, PACL
    • 4.2.a [ii] Stormcontrol
    • 4.2.a [iii] DHCP snooping
    • 4.2.a [iv] IP source-guard
    • 4.2.a [v] Dynamic ARP inspection
    • 4.2.a [vi] Port-security
    • 4.2.a [vii] Private VLAN
  • 4.2.b Implement and troubleshoot router security features                  
    • 4.2.b [i] IPv4 access control lists [standard, extended, time-based]
    • 4.2.b [ii] IPv6 traffic filter
    • 4.2.b [iii] Unicast reverse path forwarding
  • 4.2.c Implement and troubleshoot IPv6 first hop security                         
    • 4.2.c [i] RA guard
    • 4.2.c [ii] DHCP guard
    • 4.2.c [iii] Binding table
    • 4.2.c [iv] Device tracking
    • 4.2.c [v] ND inspection/snooping
    • 4.2.c [vi] Source guard
    • 4.2.c [vii] PACL

4.3 Troubleshooting infrastructure security

  

  • 4.3.a Use IOS troubleshooting tools                  
    • 4.3.a [i] debug, conditional debug
    • 4.3.a [ii] ping, traceroute with extended options
    • 4.3.a [iii] Embedded packet capture
    • 4.3.b Apply troubleshooting methodologies
    • 4.3.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause]
    • 4.3.b [ii] Design and implement valid solutions according to constraints
    • 4.3.b [iii] Verify and monitor resolution
  • 4.3.c Interpret packet capture                  
    • 4.3.c [i] Using wireshark trace analyzer
    • 4.3.c [ii] Using IOS embedded packet capture

 

5.1 System management

  

  • 5.1.a Implement and troubleshoot device management                  
    • 5.1.a [i] Console and VTY
    • 5.1.a [ii] telnet, HTTP, HTTPS, SSH, SCP
    • 5.1.a [iii] [T]FTP
  • 5.1.b Implement and troubleshoot SNMP                  
    • 5.1.b [i] v2c, v3
  • 5.1.c Implement and troubleshoot logging                           
    • 5.1.c [i] Local logging, syslog, debug, conditional debug
    • 5.1.c [ii] Timestamp

5.2 Quality of service

  

  • 5.2.a Implement and troubleshoot end to end QoS                  
    • 5.2.a [i] CoS and DSCP mapping
  • 5.2.b Implement, optimize and troubleshoot QoS using MQC                         
    • 5.2.b [i] Classification
    • 5.2.b [ii] Network based application recognition [NBAR]
    • 5.2.b [iii] Marking using IP precedence, DSCP, CoS, ECN
    • 5.2.b [iv] Policing, shaping
    • 5.2.b [v] Congestion management [queuing]
    • 5.2.b [vi] HQoS, sub-rate ethernet link
    • 5.2.b [vii] Congestion avoidance [WRED]

5.3 Network services

  

  • 5.3.a Implement and troubleshoot first-hop redundancy protocols                  
    • 5.3.a [i] HSRP, GLBP, VRRP
    • 5.3.a [ii] Redundancy using IPv6 RS/RA
  • 5.3.b Implement and troubleshoot network time protocol                  
    • 5.3.b [i] NTP master, client, version 3, version 4
    • 5.3.b [ii] NTP authentication
  • 5.3.c Implement and troubleshoot IPv4 and IPv6 DHCP                  
    • 5.3.c [i] DHCP client, IOS DHCP server, DHCP relay
    • 5.3.c [ii] DHCP options
    • 5.3.c [iii] DHCP protocol operations
    • 5.3.c [iv] SLAAC/DHCPv6 interaction
    • 5.3.c [v] Stateful, stateless DHCPv6
    • 5.3.c [vi] DHCPv6 prefix delegation
  • 5.3.d Implement and troubleshoot IPv4 network address translation                
    • 5.3.d [i] Static NAT, dynamic NAT, policy-based NAT, PAT
    • 5.3.d [ii] NAT ALG

5.4 Network optimization

  

  • 5.4.a Implement and troubleshoot IP SLA                  
    • 5.4.a [i] ICMP, UDP, jitter, VoIP
  • 5.4.b Implement and troubleshoot tracking object                  
    • 5.4.b [i] Tracking object, tracking list
    • 5.4.b [ii] Tracking different entities [e.g. interfaces, routes, IPSLA, and such]
  • 5.4.c Implement and troubleshoot netflow                
    • 5.4.c [i] Netflow v5, v9
    • 5.4.c [ii] Local retrieval
    • 5.4.c [iii] Export [configuration only]
    • 5.4.d Implement and troubleshoot embedded event manager
    • 5.4.d [i] EEM policy using applet

5.5 Troubleshooting infrastructure services

  

  • 5.5.a Use IOS troubleshooting tools                  
    • 5.5.a [i] debug, conditional debug
    • 5.5.a [ii] ping, traceroute with extended options
    • 5.5.a [iii] Embedded packet capture
  • 5.5.b Apply troubleshooting methodologies                  
    • 5.5.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause]
    • 5.5.b [ii] Design and implement valid solutions according to constraints
    • 5.5.b [iii] Verify and monitor resolution
  • 5.5.c Interpret packet capture        
    • 5.5.c [i] Using wireshark trace analyzer
    • 5.5.c [ii] Using IOS embedded packet capture

مخاطبان دوره

  • افراد علاقه مند به کار در حوزه شبکه و تجهیزات سیسکو

پیش نیازها

  • دوره Network+

تقویم دوره

در حال حاضر تقویمی برای این دوره تعریف نشده است.

نظرات

به عنوان اولین نفر، نظر خود را بنویسید!

متن ساده

  • تگ‌های HTML مجاز نیستند.
  • خطوط و پاراگراف‌ها بطور خودکار اعمال می‌شوند.
  • Web page addresses and email addresses turn into links automatically.