CCIE R/S 4.X Expanded Study Blueprint

1.00    Implement Layer 2 Technologies

(a) 802.1d
(b) 802.1w
(c) 802.1s
(o) UDLD
(d) VTP Authentication
(e) VTP Versions
(f) Regular Macros
(g) Smart Macros
(h) SNMP
(i) Telnet and Telnet Controls
(j) SSH
(k) Banners
(l) Switch Virtual Interfaces (SVIs)
(m) 3560s and VoIP Phone Support
(n) SDM
(e) ISL
(f) 802.1Q
(g) Manual EtherChannel
(h) PaGP
(i) LACP
(j) Load Balancing Manipulation in EtherChannel
(k) QinQ Tunneling
(b) CHAP
(c) PAP
(d) PPP AAA Authentiation
(g) PPP Reliable Transmission
(h) PPP Half Bridging
(i) MLP

2.00    Implement IPv4

2.10    Implement IP version   4 (IPv4) addressing, subnetting, and variable-length subnet masking (VLSM)
(a) Calculating the Optimum Summary Address
(b) Binary Math Manipulation
(1) Matching multiple networks with a single access list line
(2) Matching odd or even subnets with a single access list line
(d) /31 Mask
2.20    Implement IPv4   tunneling and Generic Routing Encapsulation (GRE)
(a) Recursive Routing Issue
2.30    Implement IPv4 RIP version 2 (RIPv2)
(a) Authentication
(b) Offset List
(c) Distribute List
(1) Gateway Option
(d) Timer Manipulation
(e) Disabling Validation of Source IP Addresses
(f) Split Horizon and Secondary IP Addresses
(g) Summarization
(h) Default Information Originate
(i) Unicast Routing Updates
(j) Passive Interface
(k) Triggered Updates on WAN link
2.40    Implement IPv4 Open Shortest Path First (OSPF)
(a) Standard OSPF areas
(b) Stub area
(c) Totally stubby area
(d)  Not-so-stubby-area (NSSA)
(e) Totally NSSA
(f) Link-state advertisement (LSA) types
(g) Adjacency on a point-to-point and on a multi-access network
(1) OSPF Network Types
(h) OSPF graceful restart
(i) Demand Circuit
(j) Authentication – methods of configuration and authentication types
(k) Summarization
(l) Area Transit Capabilities
(m) Inbound Route Filtering
(n) Auto Cost Reference Bandwidth
(o) Unicasting Hello Packets
(p) Cost Manipulation
(1) ip ospf cost
(2) Bandwidth Manipulation
(3) SPF Throttling
(4) Incremental SPF
(5) LSA Throttling
(6) LSA Overhead Protection
(q) Loopback Advertising (Natural Mask)
(1) Network Type (P2P)
(2) Area Range
(3) Redistribution
(r) Timer Manipulation
(s) OSPF ABR Type 3 LSA Filtering
(t) Forwarding Address Suppression in Translated Type-5 LSAs
(u) Router ID
2.50    Implement IPv4 Enhanced Interior Gateway Routing Protocol (EIGRP)
(a) Best path
(b) Loop-free paths
(c) EIGRP operations when alternate loop-free paths are available, and when they are not available
(d) EIGRP queries
(e) Manual summarization and autosummarization
(f) EIGRP stubs
(g) Authentication
(h) Composite Metric Manipulation
(i) Applying Offsets to Metrics
(j) Adjusting Timers
(k) Unicasting updates
(l) Use of the 0.0.0.0 in the network command
(m) Manipulate the Bandwidth used by EIGRP
(n) Distribute lists
(o) Route Map Support
(p) SNMP Support
(q) EIGRP Prefix Limit
(r) Passive Interface
(s) NSF Awareness
(t) Router ID
2.60    Implement IPv4 Border Gateway Protocol (BGP)
(a) iBGP
(1) Synchronization
(2) Confederation
(3) Route-Reflection
(4) Non-BGP Speaker in Transit Path
(a) Tunnel
(b) Redistribute
(c) Static route
(d) Default route
(e) Policy route
(5) Peer Groups
(b) eBGP
(1) Multihop
(2) Next Hop Issues
(c) Filtering, redistribution, summarization, attributes and other advanced features
(1) Authentication
(2) Router ID
(3) Prefix Advertisement
(4) Automatic Summarization
(5) Manual Summarization including suppression techniques
(6) Maximum Prefix Limit
(7) Load Balancing
(8) Path Manipulation
(a) Local Pref
(b) MED
(c) AS PATH
(d) Weight
(9) BGP Communities
(10) Regex Engine Performance Enhancement
(11) Hide Local AS
(12) Conditional Route Advertisement
(13) Remove Private AS
(14) AS PATH Filtering
(15) BGP Policy Accounting
(16) NSF Awareness
(17) Support for TTL Security Check
(18) Support for Fast Peering Session Deactivation
(19) Support for Next-Hop Address Tracking
2.70    Implement policy routing
(a) PBR Support for Multiple Tracking Options
(b) PBR Recursive Next Hop
2.80    Implement Performance Routing (PfR) and Cisco Optimized Edge Routing (OER)
(a) Profile Phase
(b) Measure Phase
(c) Apply Policy Phase
(d) Control Phase
(e) Verify Phase
2.90    Implement filtering, route redistribution, summarization, attributes, and other advanced features
(a) Administrative Distance Manipulation
(b) Redistribution
(1) Default Seed Metric
(2) Setting parameters with a Route Map
3.00 On Demand Routing (ODR)

3.00    Implement IPv6

3.10    Implement IP version 6 (IPv6) addressing and different addressing types
(a) Global Unicast
(b) Link Local
(c) Multicast
(d) Anycast
(e) Site Local
(f) Unique Local Address
3.20    Implement IPv6  neighbor discovery
(a) Router Discovery
(b) Prefix Discovery
(c) Parameter Discovery
(d) Address Autoconfiguration
3.30    Implement basic IPv6 functionality protocols
(a) ICMP version 6
3.40    Implement tunneling and transition techniques
(a) Manual
(b) GRE/IPV4
(c) 6to4
(d) ISATAP
(e) NAT-PT
3.50    Implement OSPF version 3 (OSPFv3)
(a) Special Area Types
(b) Summarization
3.60    Implement EIGRP version 6 (EIGRPv6)
(a) Summarization
3.70    Implement filtering and route redistribution
3.80 Implement RIPng

4.00    Implement MPLS Layer 3 VPNs

4.10    Implement Multiprotocol Label Switching (MPLS)
(a) MPLS LDP
(b) MPLS Label Filtering
4.20    Implement Layer 3 virtual private networks (VPNs) on provider edge (PE), provider (P), and customer edge (CE) routers
(a) PE-CE Routing with RIP
(b) PE-CE Routing with EIGRP
(c) PE-CE Routing with OSPF
(d) PE-CE Routing with BGP
(e) OSPF Sham Link
(f) EIGRP SOO and Cost Community
(g) BGP SOO
(h) BGP AS Override
(i) Internet Access
4.30    Implement virtual routing and forwarding (VRF) and Multi-VRF Customer Edge (VRF-Lite)
(a) VRF-Lite
(b) MP-BGP VPNv4
(c) MP-BGP Prefix Filtering

5.00    Implement IP Multicast

5.10    Implement Protocol Independent Multicast (PIM) sparse mode
(a) Source-based Trees
(b) Shared Trees
(c) Bidirectional PIM
5.20    Implement Multicast Source Discovery Protocol (MSDP)
(a) Authentication
(b) SA Message Limiting
(c) Timer Adjustments
(d) MSDP Compliance with IETF RFC 3618
(e) Filtering and TTL Thresholds
(f) Monitoring MSDP with SNMP
5.30    Implement interdomain multicast routing
5.40    Implement PIM Auto-Rendezvous Point (Auto-RP), unicast rendezvous point (RP), and bootstrap router (BSR)
(a) Auto-RP
(1) ip pim autorp listener
(2) Static mapping of Auto-RP groups
(3) PIM Sparse-Dense Mode
(4) IP Multicast Boundary
(b) Static RP Assignment
(c) BSR
(1) BSR Border Interface
5.50    Implement multicast tools, features, and source-specific multicast
(a) RPF
(b) RPF Check
(c) SSM
(d) Multicast Helper
(e) Multicast Rate Limiting
(f) Stub IP Multicast Routing
(g) sdr Listener Support
(h) Load Splitting Multicast Traffic
(i) Multicast Routing Monitor
(j) Multicast Heartbeat
(k) Anycast
5.60    Implement IPv6 multicast, PIM, and related multicast protocols, such as Multicast Listener Discovery (MLD)
(a) IPv6 Multicast Addressing
(b) MLD

6.00    Implement Network   Security

6.01    Implement access lists
(a) Time-based Access Lists
(b) Log
(c) Log-input
(d) Block RFC 1918
(e) RFC 3330 Filtering
(f) VLAN Access Maps (VACLs)
(g) MAC Access Lists
6.04    Implement IP Source Guard
6.05    Implement AAA
(a) Client Side in IOS
6.06    Implement Control Plane Policing (CoPP)
6.07    Implement Cisco IOS Firewall
6.08    Implement Cisco IOS Intrusion Prevention System (IPS)
6.09    Implement Secure Shell (SSH)
6.10    Implement 802.1x
(a) Reauthentication
(b) Quiet Period
(c) Host Mode
(d) Guest VLAN
(e) Accounting
6.11    Implement NAT
6.12    Implement routing protocol authentication (see earlier blueprint sections)
6.13    Implement device access control
(a) Privilege Levels
(b) Command Line Views
6.14    Implement security features
(a) Private VLANs
(b) IOS Resilient Configuration
(c) Image Verification
(d) IP Source Tracker
(e) IP Traffic Export
(f) Dynamic ARP Inspection
(g) NO SERVICE PASSWORD-RECOVERY
(h) Switchport Traffic Controls
(a) Storm Control
(b) Protected Ports
(c) Port Blocking
(d) Port Security

7.00    Implement Network   Services

7.10    Implement Hot Standby Router Protocol (HSRP)
7.20    Implement Gateway Load Balancing Protocol (GLBP)
7.30    Implement Virtual Router Redundancy Protocol (VRRP)
7.40    Implement Network Time Protocol (NTP)
7.50    Implement DHCP
7.60    Implement Web Cache Communication Protocol (WCCP)
7.70   Implement DNS
7.80   Implement TCP Options

8.00    Implement Quality of   Service (QoS)

8.10    Implement Modular QoS CLI (MQC)
(a) Network-Based Application Recognition (NBAR)
(b) Class-based weighted fair queuing (CBWFQ)
(c) low latency queuing (LLQ)
(d) Classification
(e) Policing
(f) Shaping
(g) Marking
(1) CoS
(2) DE
(3) Experimental Bits
(4) IP Precedence
(5) DSCP
(h) Weighted random early detection (WRED)
(i) Compression
(1) RTP Header Compression
(2) TCP Header Compression
(3) Class-Based Header Compression Methods
(j) Legacy QoS
(1) CQ
(2) PQ
(3) FRTS
(4) CAR
8.20    Implement Layer 2 QoS
(a) shaped round robin (SRR)
(b) policies
8.30    Implement link fragmentation and interleaving (LFI) for Frame Relay
8.40    Implement generic traffic shaping
8.50    Implement Resource Reservation Protocol (RSVP)
8.60    Implement Cisco AutoQoS
(a) Requirements
(b) VoIP
(c) AutoQoS for Enterprise

9.00    Troubleshoot a Network

9.10    Troubleshoot complex Layer 2 network issues
9.20    Troubleshoot complex Layer 3 network issues
9.30    Troubleshoot a network in response to application problems
9.40    Troubleshoot network services
9.50    Troubleshoot network security

10.00    Optimize the Network

10.01    Implement syslog and local logging
10.02    Implement IP Service Level Agreement SLA
10.03    Implement NetFlow
10.04    Implement SPAN, RSPAN, and router IP traffic export (RITE)
(a) SPAN
(b) RSPAN
(c) Router IP Traffic Export
(1) Configure IP Traffic Export
(2) Configure IP Traffic Capture
(3) Filter with ACLs
(4) Filter with Sampling
(5) Capture Bidirectional Traffic
10.05    Implement Simple Network Management Protocol (SNMP)
(a) Version 2
(b) Version 3
10.06    Implement Cisco IOS Embedded Event Manager (EEM)
10.07    Implement Remote Monitoring (RMON)
10.08    Implement FTP
10.09    Implement TFTP
10.10    Implement TFTP server on router
10.11    Implement Secure Copy Protocol (SCP)
10.12    Implement HTTP and   HTTPS
10.13    Implement Telnet
(a) Access-Class
(b) Session Lmits
(c) Busy, Vacant, Refuse, and Custom Messaging
(d) Onscreen Message Suppression
(e) Hiding Telnet Addresses
(f) Login Enhancements

0 comments:

About US

Network Bulls is Best Institute for Cisco CCNA, CCNA Security, CCNA Voice, CCNP, CCNP Security, CCNP Voice, CCIP, CCIE RS, CCIE Security Version 4 and CCIE Voice Certification courses in India. Network Bulls is a complete Cisco Certification Training and Course Coaching Institute in Gurgaon/Delhi NCR region in India. Network Bulls has Biggest Cisco Training labs in India. Network Bulls offers all Cisco courses on Real Cisco Devices. Network Bulls has Biggest Team of CCIE Trainers in North India, with more than 90% of passing rate in First Attempt for CCIE Security Version 4 candidates.
  • Biggest Cisco Training Labs in India
  • More than 90% Passing Rate in First Attempt
  • CCIE Certified Trainers for All courses
  • 24x7 Lab Facility
  • 100% Job Guaranteed Courses
  • Awarded as Best Network Security Institute in 2011 by Times
  • Only Institute in India, to provide CCIE Security Version 4.0 Training
  • CCIE Security Version 4 Training available
  • Latest equipments available for CCIE Security Version 4

Network Bulls Institute Gurgaon

Network Bulls Institute in Gurgaon is one of the best Cisco Certifications Training Centers in India. Network Bulls has Biggest Networking Training and Networking courses labs in North India. Network Bulls is offering Cisco Training courses on real Cisco Routers and Switches. Labs of Network Bulls Institute are 24x7 Available. There are many coaching Centers in Delhi, Gurgaon, Chandigarh, Jaipur, Surat, Mumbai, Bangalore, Hyderabad and Chennai, who are offering Cisco courses, but very few institutes out of that big list are offering Cisco Networking Training on real Cisco devices, with Live Projects. Network Bulls is not just an institute. Network Bulls is a Networking and Network Security Training and consultancy company, which is offering Cisco certifications Training as well support too. NB is awarded in January 2012, by Times, as Best Network Security and Cisco Training Institute for the year 2011. Network Bulls is also offering Summer Training in Gurgaon and Delhi. Network Bulls has collaboration with IT companies, from which Network Bulls is offering Networking courses in Summer Training and Industrial Training of Btech BE BCA MCA students on real Live projects. Job Oriented Training and Industrial Training on Live projects is also offered by network bulls in Gurgaon and Delhi NCR region. Network Bulls is also providing Cisco Networking Trainings to Corporates of Delhi, Gurgaon, bangalore, Jaipur, Nigeria, Chandigarh, Mohali, Haryana, Punjab, Bhiwani, Ambala, Chennai, Hyderabad.
Cisco Certification Exams are also conducted by Network Bulls in its Gurgaon Branch.
Network Bulls don't provide any Cisco CCNA, CCNP simulations for practice. They Provide High End Trainings on Real topologies for high tech troubleshooting on real Networks. There is a list of Top and best Training Institutes in India, which are providing CCNA and CCNP courses, but NB has a different image from market. Many students has given me their feedbacks and reviews about Network bulls Institute, but there were no complaints about any fraud from this institute. Network Bulls is such a wonderful place to get trained from Industry expert Trainers, under guidance of CCIE Certified Engineers.

About Blog

This Blog Contains Links shared by sites: Cisco Guides, Dumps collection, Exam collection, Career Cert, Ketam Mehta, GodsComp.co.cc.

NB

NB
Cisco Networking Certifications Training

Cisco Training in Delhi

ccna training in gurgaon. ccnp course institute in gurgaon, ccie coaching and bootcamp training near gurgaon and delhi. best institute of ccna course in delhi gurgaon india. network bulls provides ccna,ccnp,ccsp,ccie course training in gurgaon, new delhi and india. ccsp training new delhi, ccie security bootcamp in delhi.

Testimonials : Network Bulls

My Name is Rohit Sharma and i Have done CCNA and CCNP Training in Gurgaon Center of Network Bulls and it was a great experience for me to study in Network Bulls.

Cisco Networking Certifications

Myself Komal Verma and i took CCSP Training from Network Bulls in Gurgaon. The day i joined Network Bulls, the day i get addicted with Networking Technologies and I thank Mr. Vikas Sheokand for this wonderful session of Networking. :)
I must say that Network Bulls is Best Institute of CCNA CCNP CCSP CCIE Course Training in Gurgaon, New Delhi and in India too.
Komal Verma

About a wonderfull CCIE Training Institute in Gurgaon

I am Kiran shah from New Delhi. I have recently completed my CCNA CCNP & CCIE Training in Gurgaon from Network Bulls and i recommend Network Bulls for Cisco Training in India.

Kiran Shah

Cisco Coaching and Learning Center

Disclaimer: This site does not store any files on its server. I only index and link to content provided by other sites. If you see any file on server that is against copy right you can inform me at (sidd12341 [at] gmail.com). I will delete that materials within two days. This Website is not official Website of any Institute like INE, Network Bulls, IP Expert. Thanks

CCIE Security Version 4

Cisco Finally updated CCIE Security Lab exam blueprint. WSA Ironport and ISE devices are added in CCIE Security Version 4 Lab Exam Syllabus Blueprint. In Updated CCIE Security Version 4 Syllabus blueprint, new technologies like Mobile Security, VoIP Security and IPV6 Security along with Network Security, are added. As in CCIE Security Version 3 blueprint, Cisco had focused on Network Security only, but now as per market demand, Cisco is looking forward to produce Internet gear Security Engineer, not only Network Security engineers.
In CCIE Security Version 4 Bluerpint, Lab Exam is going to be more interested than before. What is Difference in CCIE Security Version 3 and Version 4? Just go through the CCIE Security Version 4 Lab Equipment and Lab Exam Syllabus Blueprints and find out!