RE: Question about the DOC CD

From: Antonio Soares (amsoares@netcabo.pt)
Date: Fri May 04 2007 - 13:24:04 ART


Hello Anthony,

Thank you very much for sharing this detailed blueprint. It will be very
usefull. After failing my 1st attempt in Set06, i found that one of the
biggest mistakes i made was not taking detailed notes of all i did during my
preparation. Something you learn and master in the early stage of your
preparation is easily forgotten. This is a very long journey and there is so
much to learn and master. So follow this advice and use Anthony's detailed
blueprint as a starting document.

Regards,
Antonio

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
anthony.sequeira@thomson.com
Sent: sexta-feira, 4 de Maio de 2007 15:41
To: JBiggs@usaid.gov; ccielab@groupstudy.com
Subject: RE: Question about the DOC CD

As of a year ago - here was my Expanded Blueprint as I called it. Please
keep in mind that this document might be a bit stale - but back then - this
was the stuff I tried to know cold - and I got real good with the DocCD for
everything else....

I. Bridging and Switching
A. Frame relay
I. Hub and Spoke using Point-to-Point
II. Hub and Spoke using Multipoint
III. SVC
IV. PPP over Frame
V. End to End Keepalives
VI. Broadcast Queue
VII. Load Interval
VIII. Point-to-Multipoint Wireless
B. PPP
I. Authentication
I. PAP
II. CHAP
II. No Peer Neighbor-Route
III. Link Quality Monitoring
IV. RFC 1663 (PPP Reliable Transmission)
V. PPP Half-Bridging
VI. PPP/MLP MRRU Negotiation
C. Bridging
I. Transparent Bridging
II. IRB
I. Used for same subnet in different VLANs
D. Catalyst configuration: VLANs, VTP, STP, trunk, management,
features, advanced configuration, Layer 3
I. Administering
I. MAC address aging time
II. MAC address notification traps
III. Unicast MAC address filtering
IV. Optimizing System Resources (SDM)
II. Smartports Macros
III. SPAN
IV. RSPAN
V. Flow Control
VI. Fallback Bridging
I. Aging Time
II. Filtering by Specific MAC Address
III. Adjusting STP Parameters
VII. Interface Range Macro
VIII. STP
I. Port Cost versus Port Priority
II. Timers
III. PortFast, UplinkFast, BackboneFast
IV. BPDU Guard and BPDU Filtering
V. Guards
I. EtherChannel Guard
II. Root Guard
III. Loop Guard
VI. Load sharing using STP
VII. STP Modes
I. PVST
II. MST
III. Rapid-PVST
VIII. Root and Secondary root switches
IX. VTP
I. VTP Modes
II. VTP Version 2
III. VTP Pruning
X. Trunks
I. Static Config
II. Allowed VLAN
III. Block DTP (Nonegotiate)
IV. Block VTP (TRANS Mode)
V. Router on a Stick
VI. Pruning
VII. Native VLAN
XI. Extended-Range VLAN with Internal VLAN ID
XII. Voice VLAN
XIII. EtherChannel
I. Layer 2 EtherChannel
II. Layer 3 EtherChannel
III. Load Balancing
IV. PAgP Learn Method and Priority
V. LACP Port Priority and System Priority
XIV. UDLD
II. IP IGP Routing
A. OSPF
I. NBMA Configs
I. Timer Manipulation Through Network Type
II. Demand Circuit
III. Passive Interface
IV. Authentication
I. Link versus Area
II. MD5 versus Clear
III. Link-Local Signaling
V. Summarization
I. Area Range
II. Summary Address
I. Make a Type-1
VI. Area Transit Capability
VII. Inbound Route Filtering
I. Limiting Number of OSPF Redistributed Routes
VIII. auto-cost reference-bandwidth
IX. Stub areas
X. Stub Router Advertisement
XI. Unicasting hellos
I. Nonbroadcast network type with neighbor
II. Support for Fast Hello Packets
XII. Cost Manipulation
I. IP OSPF COST
II. Bandwidth Manipulation
III. SPF Throttling
IV. Incremental SPF
V. LSA Throttling
VI. LSA Overload Protection
XIII. Loopback Adverting
I. Network Type P2P
II. Area Range
III. Redistribute
XIV. Time Manipulation (Packet pacing?)
I. Retransmission Limit
XV. OSPF ABR Type 3 LSA Filtering
XVI. Forwarding Address Suppression in Translated Type-5 LSAs
XVII. NSF Awareness
B. EIGRP
I. Authentication
II. Summarization
I. Floating summary routes
III. Composite metric manipulation
I. Applying offsets to Routing Metrics
IV. Adjusting timers
V. Neighbor command
VI. Network command with 0.0.0.0 Wildcard Mask
VII. Percentage of link bandwidth used (bandwidth-percent)
VIII. EIGRP Stub
IX. Distribute List
X. Route-Map Support
XI. SNMP Support
XII. Offset List
XIII. EIGRP Prefix Limit
XIV. Passive Interface
XV. NSF Awareness
C. RIPv2
I. Authentication
II. Offset List
III. Distribute List
I. Gateway option
IV. Adjusting Timers
I. Interpacket Delay
V. Disabling Validation of Source IP Addresses
VI. Split Horizon and secondary interfaces
VII. Summarization
VIII. Default Information Originate
IX. Unicast routing updates
I. Passive Interface/Neighbor
X. Passive Interface
XI. Triggered updates on WAN
D. IPv6
I. Introduction to IPv6
II. IPv6 Addressing
III. IPv6 Tunneling
IV. EIGRP for IPv6
V. RIP for IPv6
I. Enabling IPv6 RIP
I. Over broadcast
II. Over NBMA
II. Split Horizon
III. Customizing IPv6 RIP
IV. Redistributing Routes into an IPv6 RIP routing process
V. Configuring Tags
VI. Filtering IPv6 RIP updates
VI. OSPF for IPv6
I. Enabling OSPF on an interface
II. Defining an OSPF IPv6 area range
III. Authentication on an Interface
IV. Authentication in an OSPF area
V. Configuring NBMA interfaces
VII. Multiprotocol BGP for IPv6
VIII. IPv6 ICMP
E. Optimized Edge Routing
I. Configuring Prefix Learning
II. Configuring Active Probing
III. Configuring Traceroute reporting
IV. Configuring Prefix and exit link policies
V. Configuring Cost-Based Optimization
VI. Configuring Resolve Policies
VII. Configuring IOS OER Modes of Operation
F. GRE
I. IPv4 Tunnel
I. Configuring basic GRE
II. IPv6 Tunnels
I. Configuring GRE/IPv6 Tunnel
II. Manual IPv6 Tunnel
III. Configuring 6to4 Tunnel
IV. Configuring IPv4-Compatible IPv6 Tunnels
G. ODR
I. Enabling ODR
II. Filtering ODR information
III. Redistributing ODR Information
IV. Reconfiguring CDP or ODR Timers
H. Filtering, redistribution, summarization and other advanced
features
I. Policy-Based Routing
I. PBR Recursive Next Hop
II. PBR Support for Multiple Tracking Options
II. /31 Mask
III. Administrative Distance Manipulation
IV. Redistribution
I. Default Metric
II. Setting Parameters with Route Map
I. Metric
II. Metric Type
III. Tagging During Redistribution
III. BGP
A. IBGP
I. Synchronization
II. Confederation
III. Route-Reflection
IV. Non-BGP Speaker in Transit Path
I. Tunnel
II. Redistribute into IGP
III. Static route
IV. Default route
V. Policy Route
B. EBGP
I. Multihop
C. Filtering, redistribution, summarization, synchronization,
attributes and other advanced features
I. Authentication
II. BGP Router ID
III. Advertising Prefixes
I. Redistribution
II. Network Statement
III. Max-Prefix Limit
IV. Next Hop Self
V. Load Balancing
I. BGP Load balancing
II. Multipath load sharing
I. iBGP Multpath Load Sharing
II. eBGP Multipath Load Sharing
III. BGP Link Bandwidth
VI. Path Manipulation
I. Local Pref
II. Weight
III. MED
IV. AS-PATH
VII. BGP Cost Community
VIII. Regex Engine Performance Enhancement
IX. Local-AS
I. Hide Local-AS
X. Summarization
I. Suppress Map
II. Unsuppress Map
XI. Well-known Communities
XII. Conditional Route Advertisement
XIII. Remove Private AS
XIV. AS-PATH Filtering
XV. BGP Policy Accounting
I. Output Interface Accounting
XVI. NSF Awareness
XVII. Support for TTL Security Check
XVIII. Support for Fast Peering Session Deactivation
XIX. Support for Next-Hop Address Tracking
IV. IP and IOS Features
A. IP addressing
B. Switching Paths
I. Process switching
II. Fast Switching
III. Netflow switching
IV. CEF switching
C. TCP
I. Performance Parameters
II. Window Scaling
III. Explicit Congestion Notification
IV. Keepalive Packet Service
D. Interface Hold-Queue Limits
E. Configuring Loopback detection
F. DHCP
I. Different Subnet Mask than Interface
II. Multiple Default Gateways
III. DHCP Snooping (on 3550)
IV. DHCP Relay and Option 82
V. Reforwarding Policy
VI. IP Source Guard
VII. DHCP for IPv6
G. HSRP
I. Interface Tracking
II. Multiple Groups
III. Authentication and Timers
H. VRRP
I. Object Tracking
II. MD5 Authentication
I. GLBP
I. MD5 Authentication
II. Text Authentication
III. Weighting values and object tracking
J. Enhanced Object Tracking
I. Tracking Line-Protocol State
II. Tracking IP-Routing State
III. Tracking IP-Reachablility
IV. Tracking Threshold of IP-Route Metrics
V. Configuring Track Lists
K. IP services
I. IP Event Dampening
II. WCCP
I. Excluding Traffic from Redirection
II. Using Access-lists for a Service Group
III. Setting a Password for a router and cache engine
IV. Outbound ACL Check
V. Increased Services
III. IP Accounting
IV. DRP Server Agent
V. TFTP Server
VI. FTP Connections
VII. RARP Server
VIII. Auto Install
L. IOS user interfaces
I. HTTP
I. HTTP Authentication
II. Filtering access to HTTP Server
III. Changing HTTP server port number
IV. Downloading/Uploading files via HTTP/HTTPS
II. Using rsh and rcp
M. System management
I. Logging
I. Timestamps
II. Sequence numbers
III. History
IV. XML formatted System Logging Messages
II. Compressing the configuration file
III. Disabling the parser cache
IV. Reallocating processor and I/O memory
V. Embedded Resource Manager
N. NAT
I. NAT Inside
II. NAT Outside
I. Configuring overlapping networks to communicate
III. NAT Timeouts
IV. NAT Virtual Interface
V. Overload Interface Outbound To Hide Internal Details
VI. TCP load balancing
VII. Using route-maps for NAT decisions
VIII. Limiting number of concurrent NAT operations
O. NHRP
I. Configuring NHRP authentication
II. Using GRE for multipoint operation
P. NTP
I. Master with Authentication
II. NTP Server
III. Authentication
IV. NTP Peer
Q. SNMP
I. Configuring Interface Index Persistence
II. CPU and Memory Threshold Notification
III. Event Tracing
R. Telnet
I. Establishing Terminal Session Limits
II. Displaying Line Connection Information
III. Chunk-size
IV. Assign IP address to service provided on a TCP port
V. Busy-message
VI. Vacant-message
VII. Telnet message on successful connection
VIII. Refuse-message
IX. Suppressing onscreen messages during Telnet connections (ip
telnet quiet)
X. Saving Local Settings Between Sessions
XI. Defining Escape character and other key sequences
XII. Setting terminal screen length and width
XIII. Enable session locking
XIV. Configuring Banners using tokens
XV. Login Enhancements (block-for, quite-mode, delay, etc.)
XVI. Hiding Telnet Addresses
S. RMON
T. IP Accounting
I. Tracking IP Precedence
U. Mobile IP
V. IP Multicast
A. PIM, bi-directional PIM
I. Static RP Config
II. AUTO-RP
I. RP-Announce-Filter
III. BSR
IV. Neighbor Filter
V. NBMA Mode
VI. Static Mroutes
VII. Tunnel in Hub and Spoke Configuration
B. MSDP (MSDP is tested heavily in the Service Provider. Is it
testing in R&S?)
C. IGMP
I. IGMP Access Groups
II. IGMP Version
III. Join Group
IV. Static Group
V. Immediate Leave
VI. IGMP Snooping and MVR (cat 3550)
VII. Timers
D. Multicast tools, source specific multicast
I. Multicast Helper
II. Multicast Rate Limiting
III. TTL Threshold
IV. IP Multicast Boundary
V. SPT Threshold
VI. Stub IP Multicast Routing
VII. sdr Listener support
VIII. Load splitting multicast traffic
E. PGM
F. DVMRP
G. Anycast
VI. QoS
A. Quality of service solutions
B. Classification and Marking
I. Using MQC
I. Using NBAR
II. Using PBR
III. Using CAR
IV. QoS Policy Propagation via BGP
V. DE
I. DE List
II. MQC
VI. 3550 - Classifying Traffic on a Per-Port Per-VLAN Basis by Using
Class Maps
C. Congestion management, congestion avoidance
I. Legacy Congestion Management (WFQ, CQ, PQ)
II. LLQ
III. CBWFQ
IV. WRED
V. 3550 - Expedite Queue
D. Policing and shaping
I. 3550 Policing
II. Policing with MQC
I. Two-Rate Policer
II. Percentage-based Policing and Shaping
III. Unconditional Packet Discard
IV. Control Plane Policing
V. Shaping with MQC
VI. CAR
VII. Generic Traffic Shaping
VIII. FRTS
E. Signaling
I. RSVP
F. Link efficiency mechanisms
I. MultiLink PPP (MLP)
I. MPL Interleaving and Queuing
II. Multiclass Multilink PPP
II. FRF.12
III. FTF.16
IV. Compressed Real-Time Protocol
V. Compression - STAC versus PREDICTOR
VII. Security
A. AAA
I. 802.1x
I. Enabling 802.1x Authentication
II. Periodic Reauthentication
III. Quiet Period
IV. Host mode
V. Guest VLAN
VI. Accounting
B. Traffic filtering and firewalls
I. Lock and Key (Dynamic Access Lists)
II. Reflexive Access Lists
III. TCP Intercept
C. Access lists
I. Time-Based Access Lists
II. Log-Input Option
III. Block RFC 1918
IV. RFC 2827 Filtering
V. Block Loopback Address Space
VI. VLAN Maps
VII. MAC Access Lists
D. Routing protocols security, catalyst security
I. NO SERVICE PASSWORD-RECOVERY
II. Port-Based Traffic Control
I. Storm Control
II. Protected Ports
III. Port Blocking
IV. Port Security
III. Dynamic Arp Inspection (DAI)
E. Other security features
I. Unicast Reverse Path Forwarding
I. Access-list option allows you to forward traffic still - but log
it
II. Privilege Levels
III. Cisco IOS Resilient Configuration
IV. Image Verification
V. IP Source Tracker
VI. IP Traffic Export
VII. Role-Based CLI Access

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Biggs, Jeff(M/IRM/TSI:SRA)
Sent: Friday, May 04, 2007 10:24 AM
To: ccielab@groupstudy.com
Subject: Question about the DOC CD

I have been going over the DOC's page but I am wondering if I am wasting
time on things I don't need to be looking at. I have taken the LAB twice
and know pretty much that all is fair game. Obviously you need to look at
the Cisco IOS Software site with all the information and the Catalyst
switches site, but I am wondering if I am missing something or looking at
something I should worry about.

I guess what I am asking is does anyone have a specific group of topics that
they cover front to back, such as what I listed above and other than the
obvious (routing/switching/specialties), or is it hit and miss?

Jeffrey Biggs

Sr. Network Engineer

M/CIO/BIE

CCNP, CCDA

240-646-5003

jbiggs@usaid.gov <mailto:jbiggs@usaid.gov>



This archive was generated by hypermail 2.1.4 : Fri Jun 01 2007 - 06:55:20 ART