I will be reviewing each one of these topics and highlighting the topics in RED once complete. This should help identify any missing pieces.
1.0 | Implementing Layer 2 Technologies Configuring and Troubleshooting Layer 2 Technologies |
1.01 | Frame Relay |
1.01.1 | Frame Relay Multipoint Links on a Physical Interface Using Inverse ARP |
1.01.2 | Frame Relay Multipoint Links on a Physical Interface Without Using Inverse ARP |
1.01.3. | Frame Relay Multipoint Link on a Subinterface Using Inverse ARP |
1.01.4. | Frame Relay Multipoint Link on a Subinterface Without Using Inverse ARP |
1.01.5. | Frame Relay Point-to-Point Subinterfaces |
1.01.6. | PVC with a Multipoint Interface on One Side and a Subinterface on the Other Side |
1.01.7. | Authentication on a Frame Relay Link Using PPP |
1.2 | Catalyst Configuration |
1.2.01. | Trunks Using an Industry-Standard Encapsulation |
1.2.02. | Trunks Using a Cisco Proprietary Encapsulation |
1.2.03. | Creating, Deleting, and Editing VLANs |
1.2.04. | VTP in Client/Server Mode |
1.2.05. | VTP in Transparent Mode |
1.2.06. | VTP Authentication |
1.2.07. | VTP Pruning |
1.2.08. | Controlling VLANs That Cross a Trunk |
1.2.09. | Optimizing STP by STP Timers |
1.2.10. | PortFast |
1.2.11. | Loop Guard |
1.2.12. | BPDU Guard |
1.2.13. | BPDU Filters |
1.2.14. | UplinkFast |
1.2.15. | BackboneFast |
1.2.16. | MSTP |
1.2.17. | Selecting the Root Bridge for VLANs in a PVST Environment |
1.2.18. | Selecting the Root Bridge for an MST Instance in an MST Environment |
1.2.19. | Setting the Port Priority to Designate the Forwarding Ports |
1.2.20. | EtherChannel Using an Industry-Standard Protocol |
1.2.21. | EtherChannel Using a Cisco Proprietary Protocol |
1.2.22. | Disabling Protocols on the EtherChannel |
1.2.23. | Load-Balancing Type on the EtherChannel |
1.2.24. | SNMP Management on the Switch |
1.2.25. | Telnet and SSH Management on the Switch |
1.2.26. | Controlling Inbound and Outbound Telnet on the Switch |
1.2.27. | Regular and Smart Macros |
1.2.28. | Switch Banners |
1.2.29. | UDLD |
1.2.30. | Switch Virtual Interfaces (SVIs) for IP Routing |
1.2.31. | Router on a Stick |
1.2.32. | SPAN |
1.2.33. | RSPAN |
1.2.34. | IP Routing on the Switch Using RIPv2, EIGRP, OSPF, and BGP |
1.2.35. | IP Phones to Connect to the Catalyst Switch |
1.2.36. | Dot1q Tunneling |
1.3 | Other Layer 2 Technologies |
1.3.1. | HDLC |
1.3.2. | PPP |
1.3.3. | PPP over Ethernet |
2.0 | Implementing IPv4 Configuring and Troubleshooting IPv4 |
2.1. | IPv4 Addressing |
2.1.1. | IPv4 Addressing |
2.1.2. | IPv4 Subnetting |
2.1.3. | IPv4 VLSM |
2.2. | OSPFv2 |
2.2.01. | OSPF on a Broadcast Multicast Access Network (Ethernet) |
2.2.02. | OSPF over a Frame Relay Multipoint Network by Changing Network Types |
2.2.03. | OSPF over a Frame Relay Multipoint Network by Using the neighbor Command |
2.2.04. | OSPF over a Frame Relay Point-to-Point Network |
2.2.05. | Virtual Links |
2.2.06. | Stub Areas |
2.2.07. | Totally Stubby Areas |
2.2.08. | NSSA Areas |
2.2.09. | NSSA and Stub Areas |
2.2.10. | NSSA and Totally Stubby Areas |
2.3. | EIGRP |
2.3.1. | Basic EIGRP |
2.3.2. | Passive Interfaces |
2.3.3. | EIGRP Stub on Routers and Switches |
2.3.4. | EIGRP Update—Bandwidth Control |
2.3.5. | Changing the Administrative Distance of EIGRP |
2.3.6. | Unequal-Cost Load Balancing for EIGRP |
2.4. | Filtering, Redistribution, and Summarization |
2.4.01. | Route Filtering for OSPF Within the Area Using a Distribute List with an ACL and Prefix Lists |
2.4.02. | Route Filtering for OSPF Between Areas |
2.4.03. | Summarization of OSPF Routes Between Areas |
2.4.04. | Summarization of External Routers Within OSPF |
2.4.05. | Filtering with a Distribute List Using an ACL and Prefix Lists |
2.4.06. | Using Advanced ACLs and a Prefix List for Filtering Routes |
2.4.07. | Summarizing Routes with EIGRP |
2.4.08. | Route Summarization for RIP |
2.4.09. | Redistribution Between OSPF and EIGRP |
2.4.10. | Redistribution Between RIP and EIGRP |
2.4.11. | Redistribution of Directly Connected Routes |
2.4.12. | Redistribution of Static Routes |
2.4.13. | Redistribution with Filtering Using ACLs and Prefix Lists |
2.4.14. | Redistribution with Filtering Using Route Tagging |
2.5. | IBGP |
2.5.1. | IBGP Peering |
2.5.2. | Advertising Routes in BGP |
2.5.3. | Next-Hop Attribute |
2.5.4. | Route Reflectors |
2.5.5. | Redundancy by Neighbor Relationships Based on Loopbacks |
2.6. | EBGP |
2.6.1. | EBGP Peering |
2.6.2. | EBGP Peering Based on Loopbacks |
2.7. | BGP Advanced Features |
2.7.01. | Filtering Using ACLs |
2.7.02. | Filtering Using Prefix Lists |
2.7.03. | Filtering Using AS Path Filters |
2.7.04. | Redistributing Connected Routes into BGP |
2.7.05. | Redistributing Dynamic Routing Protocols into BGP |
2.7.06. | BGP Aggregation |
2.7.07. | BGP Aggregation with the Summary Only Parameter |
2.7.08. | BGP Aggregation with Suppress Maps |
2.7.09. | BGP Aggregation with Unsuppress Maps |
2.7.10. | BGP Best-Path Selection – Weight |
2.7.11. | BGP Best-Path Selection – Local Preference |
2.7.12. | BGP Best-Path Selection – MED |
2.7.13. | BGP Communities – No-Export |
2.7.14. | BGP Communities – No-Advertise |
2.7.15. | BGP Confederation |
2.7.16. | BGP Local AS |
2.7.17. | Working with Private AS Numbers |
2.7.18. | Route Dampening |
2.7.19. | Conditional Advertising |
2.7.20. | Peer Groups |
3.0 | Implementing IPv6 Configuring and Troubleshooting IPv6 |
3.1. | IPv6 |
3.1.1. | IPv6 Addresses |
3.1.2. | OSPFv3 |
3.1.3. | EIGRPv6 |
3.1.4. | IPv6 Tunneling |
3.1.5. | IPv6 on a Frame Relay Network – Multipoint |
3.1.6. | IPv6 on a Frame Relay Network – Point-to-Point |
3.1.7. | Route Filtering with a Distribute List Using an ACL and Prefix Lists |
3.1.8. | Route Redistribution Between OSPFv3 and EIGRPv6 |
4.0 | Implementing MPLS Configuring and Troubleshooting MPLS |
4.1. | MPLS Unicast Routing |
4.1.1. | MPLS Unicast Routing Using LDP |
4.1.2. | Controlling Label Distribution |
4.2. | MPLS VPN |
4.2.1. | MPLS VPN Using Static Routing Between PE-CE |
4.2.2. | MPLS VPN Using EIGRP as the PE-CE Routing Protocol |
4.2.3. | MPLS VPN Using OSPF as the PE-CE Routing Protocol |
4.2.4. | MPLS VPN Using EBGP as the PE-CE Routing Protocol |
4.2.5. | Controlling Route Propagation Using the Route Target with Import and Export Maps |
4.3. | VRF-Lite |
4.3.1. | VRFs at the Customer Sites Using VRF-Lite |
5.0 | Implementing IP Multicast Configuring and Troubleshooting IP Multicast |
5.1. | PIM and Bidirectional PIM |
5.1.1. | PIM Dense Mode |
5.1.2. | PIM on an NMBA Network |
5.1.3. | PIM Sparse Mode – Static Rendezvous Point |
5.1.4. | PIM Sparse Mode – Multiple Static Rendezvous Points |
5.1.5. | PIM Sparse Mode – Auto Rendezvous Point |
5.1.6. | PIM Sparse Mode with Multiple Rendezvous Points Using the Auto Rendezvous Point |
5.1.7. | Bidirectional PIM |
5.2. | MSDP |
5.2.1. | MSDP |
5.2.2. | MSDP to an Anycast Rendezvous Point |
5.3. | Multicast Tools |
5.3.1. | Multicast Rate Limiting |
5.3.2. | IGMP Filtering on the Switch |
5.3.3. | Use of the Switch to Block Multicast Traffic |
5.3.4. | Multicasting Through a GRE Tunnel |
5.3.5. | Multicast Helper Address |
5.4. | IPv6 Multicast |
5.4.1. | IPv6 Multicast Routing Using PIM |
5.4.2. | IPv6 Multicast Listener Discovery (MLD) Protocol |
6.0 | Implementing Network Security Configuring and Troubleshooting Network Security |
6.1. | AAA and Security Server Protocols |
6.1.1. | Use of a Router to Authenticate Against a AAA Server Using TACACS+ |
6.1.2. | Use of a Router to Authenticate Against a AAA Server Using RADIUS |
6.1.3. | Local Privilege Authorization |
6.1.4. | Accounting to a AAA Server Using TACACS+ |
6.1.5. | Accounting to a AAA Server Using RADIUS |
6.2. | Access Lists |
6.2.1. | Standard Access Lists |
6.2.2. | Extended Access Lists |
6.2.3. | Time-Based Access Lists |
6.2.4. | Reflexive Access Lists |
6.3. | Routing Protocol Security |
6.3.1. | Routing Protocol Authentication for EIGRP |
6.3.2. | Routing Protocol Authentication for OSPF – Area-Wide |
6.3.3. | Routing Protocol Authentication for OSPF – Interface-Specific |
6.3.4. | Routing Protocol Authentication for OSPF Virtual Links |
6.3.5. | Routing Protocol Authentication for BGP |
6.4. | Catalyst Security |
6.4.1. | Storm Control |
6.4.2. | Switch Port Security |
6.4.3. | Dot1x Authentication |
6.4.4. | Dot1x Authentication for VLAN Assignment |
6.4.5. | VLAN Access Maps |
6.4.6. | DHCP Snooping |
6.4.7. | DAI |
6.4.8. | IP Source Guard |
6.4.9. | Private VLANs |
6.5. | Cisco IOS and Zone-Based Firewalls |
6.5.1. | Basic Cisco IOS Firewall |
6.5.2. | DoS Protection on a Cisco IOS Firewall |
6.5.3. | Basic Zone-Based Firewall |
6.5.4. | Zone-Based Firewall with Deep Packet Inspection |
6.6. | NAT |
6.6.1. | Dynamic NAT |
6.6.2. | PAT |
6.6.3. | Static NAT |
6.6.4. | Static PAT |
6.6.5. | Policy-Based NAT |
6.7. | Other Security Features |
6.7.1. | Configuring the TCP Intercept Feature |
6.7.2. | Configuring Blocking of Fragment Attacks |
6.7.3. | Configuring Switch Security Features |
6.7.4. | Configuring Antispoofing Using an ACL |
6.7.5. | Configuring Antispoofing Using uRPF |
6.7.6. | SSH on Routers and Switches |
6.7.7. | Cisco IOS IPS |
6.7.8. | Controlling Telnet and SSH Access to the Router and Switch |
7.0 | Implementing Network Services Configuring and Troubleshooting Network Services |
7.1. | DHCP |
7.1.1. | Configuring DHCP on a Cisco IOS Router |
7.1.2. | Configuring DHCP on a Switch |
7.1.3. | Using a Router and a Switch to Act as a DHCP Relay Agent (Helper Address) |
7.2. | HSRP |
7.2.1. | HSRP Between Two Routers |
7.2.2. | Pre-empt for HSRP |
7.2.3. | Authentication for HSRP |
7.2.4. | VRRP |
7.2.5. | GLBP |
7.3. | IP Services |
7.3.1. | Use of the Router for WCCP |
7.3.2. | Use of the Router to Generate an Exception Dump Using TFTP |
7.3.3. | Use of the Router to Generate an Exception Dump Using FTP |
7.3.4. | Use of the Router to Generate an Exception Dump Using RCP |
7.3.5. | Broadcast Forwarding for Protocols |
7.4. | System Management |
7.4.1. | Telnet Management on the Router and Switch |
7.4.2. | SSH Management on the Router and Switch |
7.4.3. | Disabling Telnet and the SSH Client on the Switch |
7.4.4. | HTTP Management on the Router and Switch |
7.4.5. | Controlling HTTP Management on the Router and Switch |
7.5. | NTP |
7.5.1. | NTP Using the NTP Master and NTP Server Commands |
7.5.2. | NTP Without Using the NTP Server |
7.5.3. | NTP Using NTP Broadcast Commands |
8.0 | Implementing QoS Configuring and Troubleshooting QoS |
8.1. | Classification |
8.1.1. | Marking Using DSCP |
8.1.2. | Marking Using IP Precedence |
8.1.3. | Marking Using CoS |
8.2. | Congestion Management and Congestion Avoidance |
8.2.1. | Priority Queuing |
8.2.2. | Custom Queuing |
8.2.3. | Weighted Fair Queuing |
8.2.4. | WRED |
8.2.5. | RSVP |
8.3. | Policing and Shaping |
8.3.1. | CAR Using Rate Limiting Under the Interface |
8.3.2. | Frame Relay Traffic Shaping Using Map Classes |
8.3.3. | Discard Eligible List |
8.4. | Link Efficiency Mechanisms |
8.4.1. | Compression |
8.4.2. | Link Fragmentation and Interleaving (LFI) for Frame Relay |
8.5. | Modular QoS CLI |
8.5.1. | Policing |
8.5.2. | Class-Based Weighted Fair Queuing (CB-WFQ) |
8.5.3. | Low Latency Queuing (LLQ) |
8.5.4. | Shaping Using MQC |
8.5.5. | Random Early Detection Using MQC |
8.5.6. | WRED Using MQC |
8.5.7. | Using NBAR for QoS |
8.5.8. | Discard Eligible Marking Using MQC |
8.6. | Catalyst QoS |
8.6.1. | WRR on the Catalyst Switch |
9.0 | Troubleshooting a Network Troubleshooting Network-Wide Connectivity Issues |
9.1. | Troubleshooting Layer 2 Problems |
9.1.1. | Troubleshooting Catalyst Switch Network Issues |
9.1.2. | Troubleshooting Frame Relay Network Issues |
9.2. | Troubleshooting Layer 3 Problems |
9.2.1. | Troubleshooting IP Addressing Network Issues |
9.2.2. | Troubleshooting Routing Protocol Network Issues |
9.2.3. | Troubleshooting Routing Protocol Loop Issues |
9.3. | Troubleshooting Application Problems |
9.3.1. | Determining Which Aspects of the Network to Troubleshoot to Determine Network Functionality (Given a Set of Symptoms) |
9.4. | Troubleshooting Network Services |
9.4.1. | Troubleshooting Misconfigured NTP Setup |
9.4.2. | Troubleshooting Misconfigured DHCP Setup |
9.4.3. | Troubleshooting Misconfigured Telnet and SSH Setup |
9.4.4. | Troubleshooting Misconfigured SNMP Setup |
9.5. | Troubleshooting Security Services |
9.5.1. | Troubleshooting Misconfigured ACLs |
9.5.2. | Troubleshooting Misconfigured NAT |
9.5.3. | Troubleshooting Misconfigured AAA Services |
10.0 | Optimizing a Network Configuring and Troubleshooting Optimization of a Network |
10.1. | Logging In |
10.1.1. | Logging into a Remote Syslog Server |
10.1.2. | Logging into the Internal Buffer |
10.2. | SNMP |
10.2.1. | Use of a Router to Communicate to an SNMP Management Station |
10.2.2. | Use of a Router to Generate SNMP Traps |
10.3. | RMON |
10.3.1. | Use of a Router to Generate SNMP Traps Using RMON |
10.4. | Accounting |
10.4.1. | IP Accounting |
10.5. | SLA |
10.5.1. | IP SLA |
10.6. | Implementing Network Services on the Routers |
10.6.1. | Use of a Router as an FTP Server |
10.6.2. | Use of a Router as a TFTP Server |
10.6.3. | Cisco IOS Embedded Event Manager |
10.6.4. | NetFlow |
10.6.5. | HTTP and HTTPS on a Router |
10.6.6. | Telnet on a Router |
10.6.7. | Implementing Secure Copy Protocol (SCP) on a Router |
0 comments:
Post a Comment