Exam Sections and Sub-task Objectives

1.00 1.10 Implement Layer 2 √ Technologies Implement Spanning Tree Protocol (STP) (a) 802.1d (b) 802.1w (c) 801.1s (d) Loop guard (e) Root guard (f) Bridge protocol data unit (BPDU) guard (g) Storm control (h) Unicast flooding (i) Port roles, failure propagation, and loop guard operation Implement VLAN and VLAN Trunking Protocol (VTP) Implement trunk and trunk protocols, EtherChannel, and load-balance Implement Ethernet technologies (a) Speed and duplex (b) Ethernet, Fast Ethernet, and Gigabit Ethernet (c) PPP over Ethernet (PPPoE) Implement Switched Port Analyzer (SPAN), Remote Switched Port Analyzer (RSPAN), and flow control Implement Frame Relay (a) Local Management Interface (LMI)


1.30 1.40



50 (b) Traffic shaping (c) Full mesh (d) Hub and spoke (e) Discard eligible (DE) Implement HighLevel Data Link Control (HDLC) and PPP Implement IPv4 Implement IP version 4 (IPv4) addressing. and variable-length subnet masking (VLSM) Implement IPv4 tunneling and Generic Routing Encapsulation (GRE) Implement IPv4 RIP version 2 (RIPv2) Implement IPv4 Open Shortest Path First (OSPF) (a) Standard OSPF areas (b) Stub area (c) Totally stubby area (d) Not-so-stubbyarea (NSSA) (e) Totally NSSA (f) Link-state advertisement (LSA) types (g) Adjacency on a point-to-point and on a multi-access network (h) OSPF graceful restart Implement IPv4 Enhanced Interior .00 2.20 2.10 2. subnetting.30 2.40 2.1.70 2.

90 3.10 3. synchronization. and other advanced features Implement IPv6 Implement IP version 6 (IPv6) addressing and different addressing types Implement IPv6 neighbor discovery .20 Gateway Routing Protocol (EIGRP) (a) Best path (b) Loop-free paths (c) EIGRP operations when alternate loopfree paths are available.60 2.00 3.2. attributes.70 2.80 2. summarization. route redistribution. and when they are not available (d) EIGRP queries (e) Manual summarization and autosummarization (f) EIGRP stubs Implement IPv4 Border Gateway Protocol (BGP) (a) Next hop (b) Peering (c) Internal BorderGateway Protocol (IBGP) and External Border Gateway Protocol (EBGP) Implement policy routing Implement Performance Routing (PfR) and Cisco Optimized Edge Routing (OER) Implement filtering.

70 4.20 5. and customer edge (CE) routers Implement virtual routing and forwarding (VRF) and Multi-VRF Customer Edge (VRF-Lite) Implement IP Multicast Implement Protocol Independent Multicast (PIM) sparse mode Implement Multicast Source Discovery Protocol (MSDP) Implement interdomain multicast routing Implement PIM AutoRendezvous Point (Auto-RP).20 4.60 3.10 5.40 Implement basic IPv6 functionality protocols Implement tunneling techniques Implement OSPF version 3 (OSPFv3) Implement EIGRP version 6 (EIGRPv6) Implement filtering and route redistribution Implement MPLS Layer 3 VPNs Implement Multiprotocol Label Switching (MPLS) Implement Layer 3 virtual private networks (VPNs) on provider edge (PE). provider (P). unicast rendezvous point .10 4.00 4.30 3.30 5.00 5.40 3.30 5.50 3.3.

08 6.05 6.03 6.1x Implement NAT Implement routing protocol .07 6.5. only the client-side (IOS) is configured) Implement Control Plane Policing (CoPP) Implement Cisco IOS Firewall Implement Cisco IOS Intrusion Prevention System (IPS) Implement Secure Shell (SSH) Implement 802.02 6. and bootstrap router (BSR) Implementmulticast tools.04 6. and related multicast protocols.00 6. authorization.11 6.60 6. and accounting (AAA) (configuring the AAA server is not required. and source-specific multicast Implement IPv6 multicast. features.09 6.10 6.50 5. PIM.06 6.12 (RP). such as Multicast Listener Discovery (MLD) Implement Network Security Implement access lists Implement Zone Based Firewall Implement Unicast Reverse Path Forwarding (uRPF) Implement IP Source Guard Implement authentication.01 6.

30 7.00 7. modified deficit round robin (MDRR).14 7.13 6.10 7.40 7. and low latency queuing (LLQ) (c) Classification (d) Policing (e) Shaping (f) Marking (g) Weighted random early detection (WRED) and random early detection (RED) .00 8.6.50 7.20 7.60 8.10 authentication Implement device access control Implement security features Implement Network Services Implement Hot Standby Router Protocol (HSRP) Implement Gateway Load Balancing Protocol (GLBP) Implement Virtual Router Redundancy Protocol (VRRP) Implement Network Time Protocol (NTP) Implement DHCP Implement Web Cache Communication Protocol (WCCP) Implement Quality of Service (QoS) Implement Modular QoS CLI (MQC) (a) Network-Based Application Recognition (NBAR) (b) Class-based weighted fair queuing (CBWFQ).

05 (h) Compression Implement Layer 2 QoS: weighted round robin (WRR). shaped round robin (SRR).50 8.30 8.03 10.20 8.10 9.00 10.40 8.50 10.00 9.8.40 9. RSPAN.04 10.01 10. and router IP traffic export (RITE) Implement Simple .20 9.02 10.60 9.30 9. and policies Implement link fragmentation and interleaving (LFI) for Frame Relay Implement generic traffic shaping Implement Resource Reservation Protocol (RSVP) Implement Cisco AutoQoS Troubleshoot a Network Troubleshoot complex Layer 2 network issues Troubleshoot complex Layer 3 network issues Troubleshoot a network in response to application problems Troubleshoot network services Troubleshoot network security Optimize the Network Implement syslog and local logging Implement IP Service Level Agreement SLA Implement NetFlow Implement SPAN.

01 11.09 10.06 10.07 10.12 10.08 10.00 11.02 Network Management Protocol (SNMP) Implement Cisco IOS Embedded Event Manager (EEM) Implement Remote Monitoring (RMON) Implement FTP Implement TFTP Implement TFTP server on router Implement Secure Copy Protocol (SCP) Implement HTTP and HTTPS Implement Telnet Evaluate proposed changes to a Network Evaluate interoperability of proposed technologies against deployed technologies (a) Changes to routing protocol parameters (b) Migrate parts of a network to IPv6 (c) Routing Protocol migration (d) Adding multicast support (e) Migrate spanning tree protocol (f) Evaluate impact of new traffic on existing QoS design Determine operational impact of proposed changes to an existing network (a) Downtime of .10 10.10.11 10.13 11.

11.03 network or portions of network (b) Performance degradation (c) Introducing security breaches Suggest Alternative solutions when incompatible changes are proposed to an existing network (a) Hardware/Software upgrades (b) Topology shifts (c) Reconfigurations .

Sign up to vote on this title
UsefulNot useful