I will be reviewing each one of these topics and highlighting the topics in RED once complete. This should help identify any missing pieces.
| 1.0 | Implementing Layer 2 Technologies Configuring and Troubleshooting Layer 2 Technologies  | 
| 1.01 | Frame Relay | 
| 1.01.1 | Frame Relay Multipoint Links on a Physical Interface Using Inverse ARP | 
| 1.01.2 | Frame Relay Multipoint Links on a Physical Interface Without Using Inverse ARP | 
| 1.01.3. | Frame Relay Multipoint Link on a Subinterface Using Inverse ARP | 
| 1.01.4. | Frame Relay Multipoint Link on a Subinterface Without Using Inverse ARP | 
| 1.01.5. | Frame Relay Point-to-Point Subinterfaces | 
| 1.01.6. | PVC with a Multipoint Interface on One Side and a Subinterface on the Other Side | 
| 1.01.7. | Authentication on a Frame Relay Link Using PPP | 
| 1.2 | Catalyst Configuration | 
| 1.2.01. | Trunks Using an Industry-Standard Encapsulation | 
| 1.2.02. | Trunks Using a Cisco Proprietary Encapsulation | 
| 1.2.03. | Creating, Deleting, and Editing VLANs | 
| 1.2.04. | VTP in Client/Server Mode | 
| 1.2.05. | VTP in Transparent Mode | 
| 1.2.06. | VTP Authentication | 
| 1.2.07. | VTP Pruning | 
| 1.2.08. | Controlling VLANs That Cross a Trunk | 
| 1.2.09. | Optimizing STP by STP Timers | 
| 1.2.10. | PortFast | 
| 1.2.11. | Loop Guard | 
| 1.2.12. | BPDU Guard | 
| 1.2.13. | BPDU Filters | 
| 1.2.14. | UplinkFast | 
| 1.2.15. | BackboneFast | 
| 1.2.16. | MSTP | 
| 1.2.17. | Selecting the Root Bridge for VLANs in a PVST Environment | 
| 1.2.18. | Selecting the Root Bridge for an MST Instance in an MST Environment | 
| 1.2.19. | Setting the Port Priority to Designate the Forwarding Ports | 
| 1.2.20. | EtherChannel Using an Industry-Standard Protocol | 
| 1.2.21. | EtherChannel Using a Cisco Proprietary Protocol | 
| 1.2.22. | Disabling Protocols on the EtherChannel | 
| 1.2.23. | Load-Balancing Type on the EtherChannel | 
| 1.2.24. | SNMP Management on the Switch | 
| 1.2.25. | Telnet and SSH Management on the Switch | 
| 1.2.26. | Controlling Inbound and Outbound Telnet on the Switch | 
| 1.2.27. | Regular and Smart Macros | 
| 1.2.28. | Switch Banners | 
| 1.2.29. | UDLD | 
| 1.2.30. | Switch Virtual Interfaces (SVIs) for IP Routing | 
| 1.2.31. | Router on a Stick | 
| 1.2.32. | SPAN | 
| 1.2.33. | RSPAN | 
| 1.2.34. | IP Routing on the Switch Using RIPv2, EIGRP, OSPF, and BGP | 
| 1.2.35. | IP Phones to Connect to the Catalyst Switch | 
| 1.2.36. | Dot1q Tunneling | 
| 1.3 | Other Layer 2 Technologies | 
| 1.3.1. | HDLC | 
| 1.3.2. | PPP | 
| 1.3.3. | PPP over Ethernet | 
| 2.0 | Implementing IPv4 Configuring and Troubleshooting IPv4  | 
| 2.1. | IPv4 Addressing | 
| 2.1.1. | IPv4 Addressing | 
| 2.1.2. | IPv4 Subnetting | 
| 2.1.3. | IPv4 VLSM | 
| 2.2. | OSPFv2 | 
| 2.2.01. | OSPF on a Broadcast Multicast Access Network (Ethernet) | 
| 2.2.02. | OSPF over a Frame Relay Multipoint Network by Changing Network Types | 
| 2.2.03. | OSPF over a Frame Relay Multipoint Network by Using the neighbor Command | 
| 2.2.04. | OSPF over a Frame Relay Point-to-Point Network | 
| 2.2.05. | Virtual Links | 
| 2.2.06. | Stub Areas | 
| 2.2.07. | Totally Stubby Areas | 
| 2.2.08. | NSSA Areas | 
| 2.2.09. | NSSA and Stub Areas | 
| 2.2.10. | NSSA and Totally Stubby Areas | 
| 2.3. | EIGRP | 
| 2.3.1. | Basic EIGRP | 
| 2.3.2. | Passive Interfaces | 
| 2.3.3. | EIGRP Stub on Routers and Switches | 
| 2.3.4. | EIGRP Update—Bandwidth Control | 
| 2.3.5. | Changing the Administrative Distance of EIGRP | 
| 2.3.6. | Unequal-Cost Load Balancing for EIGRP | 
| 2.4. | Filtering, Redistribution, and Summarization | 
| 2.4.01. | Route Filtering for OSPF Within the Area Using a Distribute List with an ACL and Prefix Lists | 
| 2.4.02. | Route Filtering for OSPF Between Areas | 
| 2.4.03. | Summarization of OSPF Routes Between Areas | 
| 2.4.04. | Summarization of External Routers Within OSPF | 
| 2.4.05. | Filtering with a Distribute List Using an ACL and Prefix Lists | 
| 2.4.06. | Using Advanced ACLs and a Prefix List for Filtering Routes | 
| 2.4.07. | Summarizing Routes with EIGRP | 
| 2.4.08. | Route Summarization for RIP | 
| 2.4.09. | Redistribution Between OSPF and EIGRP | 
| 2.4.10. | Redistribution Between RIP and EIGRP | 
| 2.4.11. | Redistribution of Directly Connected Routes | 
| 2.4.12. | Redistribution of Static Routes | 
| 2.4.13. | Redistribution with Filtering Using ACLs and Prefix Lists | 
| 2.4.14. | Redistribution with Filtering Using Route Tagging | 
| 2.5. | IBGP | 
| 2.5.1. | IBGP Peering | 
| 2.5.2. | Advertising Routes in BGP | 
| 2.5.3. | Next-Hop Attribute | 
| 2.5.4. | Route Reflectors | 
| 2.5.5. | Redundancy by Neighbor Relationships Based on Loopbacks | 
| 2.6. | EBGP | 
| 2.6.1. | EBGP Peering | 
| 2.6.2. | EBGP Peering Based on Loopbacks | 
| 2.7. | BGP Advanced Features | 
| 2.7.01. | Filtering Using ACLs | 
| 2.7.02. | Filtering Using Prefix Lists | 
| 2.7.03. | Filtering Using AS Path Filters | 
| 2.7.04. | Redistributing Connected Routes into BGP | 
| 2.7.05. | Redistributing Dynamic Routing Protocols into BGP | 
| 2.7.06. | BGP Aggregation | 
| 2.7.07. | BGP Aggregation with the Summary Only Parameter | 
| 2.7.08. | BGP Aggregation with Suppress Maps | 
| 2.7.09. | BGP Aggregation with Unsuppress Maps | 
| 2.7.10. | BGP Best-Path Selection – Weight | 
| 2.7.11. | BGP Best-Path Selection – Local Preference | 
| 2.7.12. | BGP Best-Path Selection – MED | 
| 2.7.13. | BGP Communities – No-Export | 
| 2.7.14. | BGP Communities – No-Advertise | 
| 2.7.15. | BGP Confederation | 
| 2.7.16. | BGP Local AS | 
| 2.7.17. | Working with Private AS Numbers | 
| 2.7.18. | Route Dampening | 
| 2.7.19. | Conditional Advertising | 
| 2.7.20. | Peer Groups | 
| 3.0 | Implementing IPv6 Configuring and Troubleshooting IPv6  | 
| 3.1. | IPv6 | 
| 3.1.1. | IPv6 Addresses | 
| 3.1.2. | OSPFv3 | 
| 3.1.3. | EIGRPv6 | 
| 3.1.4. | IPv6 Tunneling | 
| 3.1.5. | IPv6 on a Frame Relay Network – Multipoint | 
| 3.1.6. | IPv6 on a Frame Relay Network – Point-to-Point | 
| 3.1.7. | Route Filtering with a Distribute List Using an ACL and Prefix Lists | 
| 3.1.8. | Route Redistribution Between OSPFv3 and EIGRPv6 | 
| 4.0 | Implementing MPLS Configuring and Troubleshooting MPLS  | 
| 4.1. | MPLS Unicast Routing | 
| 4.1.1. | MPLS Unicast Routing Using LDP | 
| 4.1.2. | Controlling Label Distribution | 
| 4.2. | MPLS VPN | 
| 4.2.1. | MPLS VPN Using Static Routing Between PE-CE | 
| 4.2.2. | MPLS VPN Using EIGRP as the PE-CE Routing Protocol | 
| 4.2.3. | MPLS VPN Using OSPF as the PE-CE Routing Protocol | 
| 4.2.4. | MPLS VPN Using EBGP as the PE-CE Routing Protocol | 
| 4.2.5. | Controlling Route Propagation Using the Route Target with Import and Export Maps | 
| 4.3. | VRF-Lite | 
| 4.3.1. | VRFs at the Customer Sites Using VRF-Lite | 
| 5.0 | Implementing IP Multicast Configuring and Troubleshooting IP Multicast  | 
| 5.1. | PIM and Bidirectional PIM | 
| 5.1.1. | PIM Dense Mode | 
| 5.1.2. | PIM on an NMBA Network | 
| 5.1.3. | PIM Sparse Mode – Static Rendezvous Point | 
| 5.1.4. | PIM Sparse Mode – Multiple Static Rendezvous Points | 
| 5.1.5. | PIM Sparse Mode – Auto Rendezvous Point | 
| 5.1.6. | PIM Sparse Mode with Multiple Rendezvous Points Using the Auto Rendezvous Point | 
| 5.1.7. | Bidirectional PIM | 
| 5.2. | MSDP | 
| 5.2.1. | MSDP | 
| 5.2.2. | MSDP to an Anycast Rendezvous Point | 
| 5.3. | Multicast Tools | 
| 5.3.1. | Multicast Rate Limiting | 
| 5.3.2. | IGMP Filtering on the Switch | 
| 5.3.3. | Use of the Switch to Block Multicast Traffic | 
| 5.3.4. | Multicasting Through a GRE Tunnel | 
| 5.3.5. | Multicast Helper Address | 
| 5.4. | IPv6 Multicast | 
| 5.4.1. | IPv6 Multicast Routing Using PIM | 
| 5.4.2. | IPv6 Multicast Listener Discovery (MLD) Protocol | 
| 6.0 | Implementing Network Security Configuring and Troubleshooting Network Security  | 
| 6.1. | AAA and Security Server Protocols | 
| 6.1.1. | Use of a Router to Authenticate Against a AAA Server Using TACACS+ | 
| 6.1.2. | Use of a Router to Authenticate Against a AAA Server Using RADIUS | 
| 6.1.3. | Local Privilege Authorization | 
| 6.1.4. | Accounting to a AAA Server Using TACACS+ | 
| 6.1.5. | Accounting to a AAA Server Using RADIUS | 
| 6.2. | Access Lists | 
| 6.2.1. | Standard Access Lists | 
| 6.2.2. | Extended Access Lists | 
| 6.2.3. | Time-Based Access Lists | 
| 6.2.4. | Reflexive Access Lists | 
| 6.3. | Routing Protocol Security | 
| 6.3.1. | Routing Protocol Authentication for EIGRP | 
| 6.3.2. | Routing Protocol Authentication for OSPF – Area-Wide | 
| 6.3.3. | Routing Protocol Authentication for OSPF – Interface-Specific | 
| 6.3.4. | Routing Protocol Authentication for OSPF Virtual Links | 
| 6.3.5. | Routing Protocol Authentication for BGP | 
| 6.4. | Catalyst Security | 
| 6.4.1. | Storm Control | 
| 6.4.2. | Switch Port Security | 
| 6.4.3. | Dot1x Authentication | 
| 6.4.4. | Dot1x Authentication for VLAN Assignment | 
| 6.4.5. | VLAN Access Maps | 
| 6.4.6. | DHCP Snooping | 
| 6.4.7. | DAI | 
| 6.4.8. | IP Source Guard | 
| 6.4.9. | Private VLANs | 
| 6.5. | Cisco IOS and Zone-Based Firewalls | 
| 6.5.1. | Basic Cisco IOS Firewall | 
| 6.5.2. | DoS Protection on a Cisco IOS Firewall | 
| 6.5.3. | Basic Zone-Based Firewall | 
| 6.5.4. | Zone-Based Firewall with Deep Packet Inspection | 
| 6.6. | NAT | 
| 6.6.1. | Dynamic NAT | 
| 6.6.2. | PAT | 
| 6.6.3. | Static NAT | 
| 6.6.4. | Static PAT | 
| 6.6.5. | Policy-Based NAT | 
| 6.7. | Other Security Features | 
| 6.7.1. | Configuring the TCP Intercept Feature | 
| 6.7.2. | Configuring Blocking of Fragment Attacks | 
| 6.7.3. | Configuring Switch Security Features | 
| 6.7.4. | Configuring Antispoofing Using an ACL | 
| 6.7.5. | Configuring Antispoofing Using uRPF | 
| 6.7.6. | SSH on Routers and Switches | 
| 6.7.7. | Cisco IOS IPS | 
| 6.7.8. | Controlling Telnet and SSH Access to the Router and Switch | 
| 7.0 | Implementing Network Services Configuring and Troubleshooting Network Services  | 
| 7.1. | DHCP | 
| 7.1.1. | Configuring DHCP on a Cisco IOS Router | 
| 7.1.2. | Configuring DHCP on a Switch | 
| 7.1.3. | Using a Router and a Switch to Act as a DHCP Relay Agent (Helper Address) | 
| 7.2. | HSRP | 
| 7.2.1. | HSRP Between Two Routers | 
| 7.2.2. | Pre-empt for HSRP | 
| 7.2.3. | Authentication for HSRP | 
| 7.2.4. | VRRP | 
| 7.2.5. | GLBP | 
| 7.3. | IP Services | 
| 7.3.1. | Use of the Router for WCCP | 
| 7.3.2. | Use of the Router to Generate an Exception Dump Using TFTP | 
| 7.3.3. | Use of the Router to Generate an Exception Dump Using FTP | 
| 7.3.4. | Use of the Router to Generate an Exception Dump Using RCP | 
| 7.3.5. | Broadcast Forwarding for Protocols | 
| 7.4. | System Management | 
| 7.4.1. | Telnet Management on the Router and Switch | 
| 7.4.2. | SSH Management on the Router and Switch | 
| 7.4.3. | Disabling Telnet and the SSH Client on the Switch | 
| 7.4.4. | HTTP Management on the Router and Switch | 
| 7.4.5. | Controlling HTTP Management on the Router and Switch | 
| 7.5. | NTP | 
| 7.5.1. | NTP Using the NTP Master and NTP Server Commands | 
| 7.5.2. | NTP Without Using the NTP Server | 
| 7.5.3. | NTP Using NTP Broadcast Commands | 
| 8.0 | Implementing QoS Configuring and Troubleshooting QoS  | 
| 8.1. | Classification | 
| 8.1.1. | Marking Using DSCP | 
| 8.1.2. | Marking Using IP Precedence | 
| 8.1.3. | Marking Using CoS | 
| 8.2. | Congestion Management and Congestion Avoidance | 
| 8.2.1. | Priority Queuing | 
| 8.2.2. | Custom Queuing | 
| 8.2.3. | Weighted Fair Queuing | 
| 8.2.4. | WRED | 
| 8.2.5. | RSVP | 
| 8.3. | Policing and Shaping | 
| 8.3.1. | CAR Using Rate Limiting Under the Interface | 
| 8.3.2. | Frame Relay Traffic Shaping Using Map Classes | 
| 8.3.3. | Discard Eligible List | 
| 8.4. | Link Efficiency Mechanisms | 
| 8.4.1. | Compression | 
| 8.4.2. | Link Fragmentation and Interleaving (LFI) for Frame Relay | 
| 8.5. | Modular QoS CLI | 
| 8.5.1. | Policing | 
| 8.5.2. | Class-Based Weighted Fair Queuing (CB-WFQ) | 
| 8.5.3. | Low Latency Queuing (LLQ) | 
| 8.5.4. | Shaping Using MQC | 
| 8.5.5. | Random Early Detection Using MQC | 
| 8.5.6. | WRED Using MQC | 
| 8.5.7. | Using NBAR for QoS | 
| 8.5.8. | Discard Eligible Marking Using MQC | 
| 8.6. | Catalyst QoS | 
| 8.6.1. | WRR on the Catalyst Switch | 
| 9.0 | Troubleshooting a Network Troubleshooting Network-Wide Connectivity Issues  | 
| 9.1. | Troubleshooting Layer 2 Problems | 
| 9.1.1. | Troubleshooting Catalyst Switch Network Issues | 
| 9.1.2. | Troubleshooting Frame Relay Network Issues | 
| 9.2. | Troubleshooting Layer 3 Problems | 
| 9.2.1. | Troubleshooting IP Addressing Network Issues | 
| 9.2.2. | Troubleshooting Routing Protocol Network Issues | 
| 9.2.3. | Troubleshooting Routing Protocol Loop Issues | 
| 9.3. | Troubleshooting Application Problems | 
| 9.3.1. | Determining Which Aspects of the Network to Troubleshoot to Determine Network Functionality (Given a Set of Symptoms) | 
| 9.4. | Troubleshooting Network Services | 
| 9.4.1. | Troubleshooting Misconfigured NTP Setup | 
| 9.4.2. | Troubleshooting Misconfigured DHCP Setup | 
| 9.4.3. | Troubleshooting Misconfigured Telnet and SSH Setup | 
| 9.4.4. | Troubleshooting Misconfigured SNMP Setup | 
| 9.5. | Troubleshooting Security Services | 
| 9.5.1. | Troubleshooting Misconfigured ACLs | 
| 9.5.2. | Troubleshooting Misconfigured NAT | 
| 9.5.3. | Troubleshooting Misconfigured AAA Services | 
| 10.0 | Optimizing a Network Configuring and Troubleshooting Optimization of a Network  | 
| 10.1. | Logging In | 
| 10.1.1. | Logging into a Remote Syslog Server | 
| 10.1.2. | Logging into the Internal Buffer | 
| 10.2. | SNMP | 
| 10.2.1. | Use of a Router to Communicate to an SNMP Management Station | 
| 10.2.2. | Use of a Router to Generate SNMP Traps | 
| 10.3. | RMON | 
| 10.3.1. | Use of a Router to Generate SNMP Traps Using RMON | 
| 10.4. | Accounting | 
| 10.4.1. | IP Accounting | 
| 10.5. | SLA | 
| 10.5.1. | IP SLA | 
| 10.6. | Implementing Network Services on the Routers | 
| 10.6.1. | Use of a Router as an FTP Server | 
| 10.6.2. | Use of a Router as a TFTP Server | 
| 10.6.3. | Cisco IOS Embedded Event Manager | 
| 10.6.4. | NetFlow | 
| 10.6.5. | HTTP and HTTPS on a Router | 
| 10.6.6. | Telnet on a Router | 
| 10.6.7. | Implementing Secure Copy Protocol (SCP) on a Router | 





0 comments:
Post a Comment