CCIE Routing and Switching Written Exam v5.0 (400-101)

 Network Principles – 10 %

  • 1.1 Network theory
  • 1.1.a Describe basic architecture differences between IOS and IOS XE
  • 1.1.a (i) Control plane and Forwarding plane
  • 1.1.a (ii) Impact to troubleshooting and performances
  • 1.1.a (iii) Excluding specific platform’s architecture
  • 1.1 Identify Cisco express forwarding concepts
  • 1.1.b (i) RIB, FIB, LFIB, Adjacency table
  • 1.1.b (ii) Load balancing Hash
  • 1.1.b (iii) Polarization concept and avoidance
  • 1.1 Explain general network challenges
  • 1.1.c (i) Unicast flooding
  • 1.1.c (ii) Out of order packets
  • 1.1.c (iii) Asymmetric routing
  • 1.1.c (iv) Impact of micro burst
  • 1.1 Explain IP operations
  • 1.1.d (i) ICMP unreachable, redirect
  • 1.1.d (ii) IPv4 options, IPv6 extension headers
  • 1.1.d (iii) IPv4 and IPv6 fragmentation
  • 1.1.d (iv) TTL
  • 1.1.d (v) IP MTU
  • 1.1 Explain TCP operations
  • 1.1.e (i) IPv4 and IPv6 PMTU
  • 1.1.e (ii) MSS
  • 1.1.e (iii) Latency
  • 1.1.e (iv) Windowing
  • 1.1.e (v) Bandwidth delay product
  • 1.1.e (vi) Global synchronization
  • 1.1.e (vii) Options
  • 1.1 Explain UDP operations
  • 1.1.f (i) Starvation
  • 1.1.f (ii) Latency
  • 1.1.f (iii) RTP/RTCP concepts
  • 1.2 Network implementation and operation
  • 1.2.a Evaluate proposed changes to a network
  • 1.2.a (i) Changes to routing protocol parameters
  • 1.2.a (ii) Migrate parts of a network to IPv6
  • 1.2.a (iii) Routing protocol migration
  • 1.2.a (iv) Adding multicast support
  • 1.2.a (v) Migrate spanning tree protocol
  • 1.2.a (vi) Evaluate impact of new traffic on existing QoS design
  • 1.3 Network troubleshooting
  • 1.3.a Use IOS troubleshooting tools
  • 1.3.a (i) debug, conditional debug
  • 1.3.a (ii) ping, traceroute with extended options
  • 1.3.a (iii) Embedded packet capture
  • 1.3.a (iv) Performance monitor
  • 1.3 Apply troubleshooting methodologies
  • 1.3.b (i) Diagnose the root cause of networking issue  
  • 1.3.b (ii) Design and implement valid solutions according to constraints
  • 1.3.b (iii) Verify and monitor resolution
  • 1.3 Interpret packet capture
  • 1.3.c (i) Using Wireshark trace analyzer
  • 1.3.c (ii) Using IOS embedded packet capture

Layer 2 Technologies – 15 %

  • 2.1 LAN switching technologies
  • 2.1.a Implement and troubleshoot switch administration
  • 2.1.a (i) Managing MAC address table
  • 2.1.a (ii) errdisable recovery
  • 2.1.a (iii) L2 MTU
  • 2.1 Implement and troubleshoot layer 2 protocols
  • 2.1.b (i) CDP, LLDP
  • 2.1.b (ii) UDLD
  • 2.1 Implement and troubleshoot VLAN
  • 2.1.c (i) Access ports
  • 2.1.c (ii) VLAN database
  • 2.1.c (iii) Normal, extended VLAN, voice VLAN
  • 2.1 Implement and troubleshoot trunking
  • 2.1.d (i) VTPv1, VTPv2, VTPv3, VTP pruning
  • 2.1.d (ii) dot1Q
  • 2.1.d (iii) Native VLAN
  • 2.1.d (iv) Manual pruning
  • 2.1 Implement and troubleshoot EtherChannel
  • 2.1.e (i) LACP, PAgP, manual
  • 2.1.e (ii) Layer 2, layer 3
  • 2.1.e (iii) Load-balancing
  • 2.1.e (iv) Etherchannel misconfiguration guard
  • 2.1 Implement and troubleshoot spanning-tree
  • 2.1.f (i) PVST +  RPVST + MST
  • 2.1.f (ii) Switch priority, port priority, path cost, STP timers
  • 2.1.f (iii) port fast, BPDUguard, BPDUfilter
  • 2.1.f (iv) loopguard, rootguard
  • 2.1 Implement and troubleshoot other LAN switching technologies
  • 2.1.g (i) SPAN, RSPAN, ERSPAN
  • 2.1 Describe chassis virtualization and aggregation technologies
  • 2.1.h (i) Multichassis
  • 2.1.h (ii) VSS concepts
  • 2.1.h (iii) Alternative to STP
  • 2.1.h (iv) Stackwise
  • 2.1.h (v) Excluding specific platform implementation
  • 2.1 Describe spanning-tree concepts
  • 2.1.i (i) Compatibility between MST and RSTP
  • 2.1.i (ii) STP dispute, STP bridge assurance
  • 2.2 Layer 2 multicast
  • 2.2.a Implement and troubleshoot IGMP
  • 2.2.a (i) IGMPv1, IGMPv2, IGMPv3
  • 2.2.a (ii) IGMP snooping
  • 2.2.a (iii) IGMP querier
  • 2.2.a (iv) IGMP filter
  • 2.2.a (v) IGMP proxy
  • 2.2.b Explain MLD
  • 2.2.c Explain PIM snooping
  • 2.3 Layer 2 WAN circuit technologies
  • 2.3.a Implement and troubleshoot HDLC
  • 2.3.b Implement and troubleshoot PPP
  • 2.3.b (i) Authentication (PAP, CHAP)
  • 2.3.b (ii) PPPoE
  • 2.3.b (iii) MLPPP
  • 2.3 Describe WAN rate-based ethernet circuits
  • 2.3.c (i) Metro and WAN Ethernet topologies
  • 2.3.c (ii) Use of rate-limited WAN ethernet services

 Layer 3 Technologies – 40 %

  • 3.1 Addressing technologies
  • 3.1.a Identify, implement and troubleshoot IPv4 addressing and subnetting
  • 3.1.a (i) Address types, VLSM
  • 3.1.a (ii) ARP
  • 3.1.b Identify, implement and troubleshoot IPv6 addressing and subnetting
  • 3.1.b (i) Unicast, multicast
  • 3.1.b (ii) EUI-64
  • 3.1.b (iii) ND, RS/RA
  • 3.1.b (iv) Autoconfig/SLAAC, temporary addresses (RFC4941)
  • 3.1.b (v) Global prefix configuration feature
  • 3.1.b (vi) DHCP protocol operations
  • 3.1.b (vii) SLAAC/DHCPv6 interaction
  • 3.1.b (viii) Stateful, stateless DHCPv6
  • 3.1.b (ix) DHCPv6 prefix delegation
  • 3.2 Layer 3 multicast
  • 3.2.a Troubleshoot reverse path forwarding
  • 3.2.a (i) RPF failure
  • 3.2.a (ii) RPF failure with tunnel interface
  • 3.2.b Implement and troubleshoot IPv4 protocol independent multicast
  • 3.2.b (i) PIM dense mode, sparse mode, sparse-dense mode
  • 3.2.b (ii) Static RP, auto-RP, BSR
  • 3.2.b (iii) BiDirectional PIM
  • 3.2.b (iv) Source-specific multicast
  • 3.2.b (v) Group to RP mapping
  • 3.2.b (vi) Multicast boundary
  • 3.2.c Implement and troubleshoot multicast source discovery protocol
  • 3.2.c (i) Intra-domain MSDP (anycast RP)
  • 3.2.c (ii) SA filter
  • 3.2.d Describe IPv6 multicast
  • 3.2.d (i) IPv6 multicast addresses
  • 3.2.d (ii) PIMv6
  • 3.3 Fundamental routing concepts
  • 3.3.a Implement and troubleshoot static routing
  • 3.3.b Implement and troubleshoot default routing
  • 3.3.c Compare routing protocol types
  • 3.3.c (i) Distance vector
  • 3.3.c (ii) Link state
  • 3.3.c (iii) Path vector
  • 3.3.d Implement, optimize and troubleshoot administrative distance
  • 3.3.e Implement and troubleshoot passive interface
  • 3.3.f Implement and troubleshoot VRF lite
  • 3.3.g Implement, optimize and troubleshoot filtering with routing protocols
  • 3.3.h Implement, optimize and troubleshoot redistribution and routing
  • 3.3.i Implement, optimize and troubleshoot manual summarization
  • 3.3.j Implement, optimize and troubleshoot policy-based routing
  • 3.3.k Identify and troubleshoot sub-optimal routing
  • 3.3.l Implement and troubleshoot bidirectional forwarding detection
  • 3.3.m Implement and troubleshoot loop prevention mechanisms
  • 3.3.m (i) Route tagging, filtering
  • 3.3.m (ii) Split horizon
  • 3.3.m (iii) Route poisoning
  • 3.3.n Implement and troubleshoot routing protocol authentication
  • 3.3.n (i) MD5
  • 3.3.n (ii) Key-chain
  • 3.3.n (iii) EIGRP HMAC SHA2-256bit
  • 3.3.n (iv) OSPFv2 SHA1-196bit
  • 3.3.n (v) OSPFv3 IPsec authentication
  • 3.4 RIP (v2 and v6)
  • 3.4.a Implement and troubleshoot RIPv2
  • 3.4.b Describe RIPv6 (RIPng)
  • 3.5 EIGRP (for IPv4 and IPv6)
  • 3.5.a Describe packet types
  • 3.5.a (i) Packet types (hello, query, update, and such)
  • 3.5.a (ii) Route types (internal, external)
  • 3.5.b Implement and troubleshoot neighbor relationship
  • 3.5.b (i) Multicast, unicast EIGRP peering
  • 3.5.b (ii) OTP point-to-point peering
  • 3.5.b (iii) OTP route-reflector peering
  • 3.5.b (iv) OTP multiple service providers scenario
  • 3.5.c Implement and troubleshoot loop free path selection
  • 3.5.c (i) RD, FD, FC, successor, feasible successor
  • 3.5.c (ii) Classic metric
  • 3.5.c (iii) Wide metric
  • 3.5.d Implement and troubleshoot operations
  • 3.5.d (i) General operations
  • 3.5.d (ii) Topology table, update, query, active, passive
  • 3.5.d (iii) Stuck in active
  • 3.5.d (iv) Graceful shutdown
  • 3.5.e Implement and troubleshoot EIGRP stub
  • 3.5.e (i) Stub
  • 3.5.e (ii) Leak-map
  • 3.5.f Implement and troubleshoot load-balancing
  • 3.5.f (i) equal-cost
  • 3.5.f (ii) unequal-cost
  • 3.5.f (iii) add-path
  • 3.5.g Implement EIGRP (multi-address) named mode
  • 3.5.g (i) Types of families
  • 3.5.g (ii) IPv4 address-family
  • 3.5.g (iii) IPv6 address-family
  • 3.5.h Implement, troubleshoot, optimize EIGRP convergence
  • 3.5.h (i) Describe fast convergence requirements
  • 3.5.h (ii) Control query boundaries
  • 3.5.h (iii) IP FRR/fast reroute (single hop)
  • 3.5.8 (iv) Summary leak-map
  • 3.5.h (v) Summary metric
  • 3.6 OSPF (v2 and v3)
  • 3.6.a Describe packet types
  • 3.6.a (i) LSA yypes (1, 2, 3, 4, 5, 7, 9)
  • 3.6.a (ii) Route types (N1, N2, E1, E2)
  • 3.6.b Implement and troubleshoot neighbor relationship
  • 3.6.c Implement and troubleshoot OSPFv3 address-family support
  • 3.6.c (i) IPv4 address-family
  • 3.6.c (ii) IPv6 address-family
  • 3.6.d Implement and troubleshoot network types, areas and router types
  • 3.6.d (i) Point-to-point, multipoint, broadcast, non-broadcast
  • 3.6.d (ii) LSA types, areas backbone, normal, transit, stub, totally stubby
  • 3.6.d (iii) Internal router, ABR, ASBR
  • 3.6.d (iv) Virtual link
  • 3.6.e Implement and troubleshoot path preference
  • 3.6.f Implement and troubleshoot operations
  • 3.6.f (i) General operations
  • 3.6.f (ii) Graceful shutdown
  • 3.6.f (iii) GTSM (Generic TTL Security Mechanism)
  • 3.6.g Implement, troubleshoot and optimize OSPF convergence
  • 3.6.g (i) Metrics
  • 3.6.g (ii) LSA throttling, SPF tuning, fast hello
  • 3.6.g (iii) LSA propagation control (area types, ISPF)
  • 3.6.g (iv) IP FRR/fast reroute (single hop)
  • 3.6.g (v) LFA/loop-free alternative (multi hop)
  • 3.6.g (vi) OSPFv3 prefix suppression
  • 3.7 BGP
  • 3.7.a Describe, implement and troubleshoot peer relationships
  • 3.7.a (i) Peer-group, template
  • 3.7.a (ii) Active, passive
  • 3.7.a (iii) States, timers
  • 3.7.a (iv) Dynamic neighbors
  • 3.7.b Implement and troubleshoot IBGP and EBGP
  • 3.7.b (i) EBGP, IBGP
  • 3.7.b (ii) 4 bytes AS number
  • 3.7.b (iii) Private AS
  • 3.7.c Explain attributes and best-path selection
  • 3.7.d Implement, optimize and troubleshoot routing policies
  • 3.7.d (i) Attribute manipulation
  • 3.7.d (ii) Conditional advertisement
  • 3.7.d (iii) Outbound route filtering
  • 3.7.d (iv) Communities, extended communities
  • 3.7.d (v) Multi-homing
  • 3.7.e Implement and troubleshoot scalability
  • 3.7.e (i) Route-reflector, cluster
  • 3.7.e (ii) Confederations
  • 3.7.e (iii) Aggregation, AS set
  • 3.7.f Implement and troubleshoot multiproctocol BGP
  • 3.7.f (i) IPv4, IPv6, VPN address-family
  • 3.7.g Implement and troubleshoot AS path manipulations
  • 3.7.g (i) Local AS, allow AS in, remove private AS
  • 3.7.g (ii) Prepend
  • 3.7.g (iii) Regexp
  • 3.7.h Implement and troubleshoot other features
  • 3.7.h (i) Multipath
  • 3.7.h (ii) BGP synchronization
  • 3.7.h (iii) Soft reconfiguration, route refresh
  • 3.7.i Describe BGP fast convergence features
  • 3.7.i (i) Prefix independent convergence
  • 3.7.i (ii) Add-path
  • 3.7.i (iii) Next-hop address tracking
  • 3.8 ISIS (for IPv4 and IPv6)
  • 3.8.a Describe basic ISIS network
  • 3.8.a (i) Single area, single topology
  • 3.8.b Describe neighbor relationship
  • 3.8.c Describe network types, levels and router types
  • 3.8.c (i) NSAP addressing
  • 3.8.c (ii) Point-to-point, broadcast
  • 3.8.d Describe operations
  • 3.8.e Describe optimization features
  • 3.8.e (i) Metrics, wide metric

VPN Technologies – 15 %

  • 4.1 Tunneling
  • 4.1.a Implement and troubleshoot MPLS operations
  • 4.1.a (i) Label stack, LSR, LSP
  • 4.1.a (ii) LDP
  • 4.1.a (iii) MPLS ping, MPLS traceroute
  • 4.1.b Implement and troubleshoot basic MPLS L3VPN
  • 4.1.b (i) L3VPN, CE, PE, P
  • 4.1.b (ii) Extranet (route leaking)
  • 4.1.c Implement and troubleshoot encapsulation
  • 4.1.c (i) GRE
  • 4.1.c (ii) Dynamic GRE
  • 4.1.c (iii) LISP encapsulation principles supporting EIGRP OTP
  • 4.1.d Implement and troubleshoot DMVPN (single hub)
  • 4.1.d (i) NHRP
  • 4.1.d (ii) DMVPN with IPsec using preshared key
  • 4.1.d (iii) QoS profile
  • 4.1.d (iv) Pre-classify
  • 4.1.e Describe IPv6 tunneling techniques
  • 4.1.e (i) 6in4, 6to4
  • 4.1.e (ii) ISATAP
  • 4.1.e (iii) 6RD
  • 4.1.e (iv) 6PE/6VPE
  • 4.1.g Describe basic layer 2 VPN —wireline
  • 4.1.g (i) L2TPv3 general principals
  • 4.1.g (ii) ATOM general principals
  • 4.1.h Describe basic L2VPN — LAN services
  • 4.1.h (i) MPLS-VPLS general principals
  • 4.1.h (ii) OTV general principals
  • 4.2 Encryption
  • 4.2.a Implement and troubleshoot IPsec with preshared key
  • 4.2.a (i) IPv4 site to IPv4 site
  • 4.2.a (ii) IPv6 in IPv4 tunnels
  • 4.2.a (iii) Virtual tunneling Interface (VTI)
  • 4.2.b Describe GET VPN

 Infrastructure Security – 5 %

  • 5.1 Device security
  • 5.1.a Implement and troubleshoot IOS AAA using local database
  • 5.1.b Implement and troubleshoot device access control
  • 5.1.b (i) Lines (VTY, AUX, console)
  • 5.1.b (ii) SNMP
  • 5.1.b (iii) Management plane protection
  • 5.1.b (iv) Password encryption
  • 5.1.c Implement and troubleshoot control plane policing
  • 5.1.d Describe device security using IOS AAA with TACACS+ and RADIUS
  • 5.1.d (i) AAA with TACACS+ and RADIUS
  • 5.1.d (ii) Local privilege authorization fallback
  • 5.2 Network security
  • 5.2.a Implement and troubleshoot switch security features
  • 5.2.a (i) VACL, PACL
  • 5.2.a (ii) Stormcontrol
  • 5.2.a (iii) DHCP snooping
  • 5.2.a (iv) IP source-guard
  • 5.2.a (v) Dynamic ARP inspection
  • 5.2.a (vi) port-security
  • 5.2.a (vii) Private VLAN
  • 5.2.b Implement and troubleshoot router security features
  • 5.2.b (i) IPv4 access control lists (standard, extended, time-based)
  • 5.2.b (ii) IPv6 traffic filter
  • 5.2.b (iii) Unicast reverse path forwarding
  • 5.2.c Implement and troubleshoot IPv6 first hop security
  • 5.2.c (i) RA guard
  • 5.2.c (ii) DHCP guard
  • 5.2.c (iii) Binding table
  • 5.2.c (iv) Device tracking
  • 5.2.c (v) ND inspection/snooping
  • 5.2.c (vii) Source guard
  • 5.2.c (viii) PACL
  • 5.2.d Describe 802.1x
  • 5.2.d (i) 802.1x, EAP, RADIUS
  • 5.2.d (ii) MAC authentication bypass

 Infrastructure Services – 15 %

  • 6.1 System management
  • 6.1.a Implement and troubleshoot device management
  • 6.1.a (i) Console and VTY
  • 6.1.a (ii) telnet, HTTP, HTTPS, SSH, SCP
  • 6.1.a (iii) (T)FTP
  • 6.1.b Implement and troubleshoot SNMP
  • 6.1.b (i) v2c, v3
  • 6.1.c Implement and troubleshoot logging
  • 6.1.c (i) Local logging, syslog, debug, conditional debug
  • 6.1.c (ii) Timestamp
  • 6.2 Quality of service
  • 6.2.a Implement and troubleshoot end-to-end QoS
  • 6.2.a (i) CoS and DSCP mapping
  • 6.2.b Implement, optimize and troubleshoot QoS using MQC
  • 6.2.b (i) Classification
  • 6.2.b (ii) Network based application recognition (NBAR)
  • 6.2.b (iii) Marking using IP precedence, DSCP, CoS, ECN
  • 6.2.b (iv) Policing, shaping
  • 6.2.b (v) Congestion management (queuing)
  • 6.2.b (vi) HQoS, sub-rate ethernet link
  • 6.2.b (vii) Congestion avoidance (WRED)
  • 6.2.c Describe layer 2 QoS
  • 6.2.c (i) Queuing, scheduling
  • 6.2.c (ii) Classification, marking
  • 6.3 Network services
  • 6.3.a Implement and troubleshoot first-hop redundancy protocols
  • 6.3.a (i) HSRP, GLBP, VRRP
  • 6.3.a (ii) Redundancy using IPv6 RS/RA
  • 6.3.b Implement and troubleshoot network time protocol
  • 6.3.b (i) NTP master, client, version 3, version 4
  • 6.3.b (ii) NTP Authentication
  • 6.3.c Implement and troubleshoot IPv4 and IPv6 DHCP
  • 6.3.c (i) DHCP client, IOS DHCP server, DHCP relay
  • 6.3.c (ii) DHCP options
  • 6.3.c (iii) DHCP protocol operations
  • 6.3.c (iv) SLAAC/DHCPv6 interaction
  • 6.3.c (v) Stateful, stateless DHCPv6
  • 6.3.c (vi) DHCPv6 prefix delegation
  • 6.3.d Implement and troubleshoot IPv4 network address translation
  • 6.3.d (i) Static NAT, dynamic NAT, policy-based NAT, PAT
  • 6.3.d (ii) NAT ALG
  • 6.3.e Describe IPv6 network address translation
  • 6.3.e (i) NAT64
  • 6.3.e (ii) NPTv6
  • 6.4 Network optimization
  • 6.4.a Implement and troubleshoot IP SLA
  • 6.4.a (i) ICMP, UDP, Jitter, VoIP
  • 6.4.b Implement and troubleshoot tracking object
  • 6.4.b (i) Tracking object, tracking list
  • 6.4.b (ii) Track different entities (e.g. interfaces, routes, IPSLA, and such)
  • 6.4.c Implement and troubleshoot netflow
  • 6.4.c (i) Netflow v5, v9
  • 6.4.c (ii) Local retrieval
  • 6.4.c (iii) Export (configuration only)
  • 6.4.d Implement and troubleshoot embedded event manager
  • 6.4.d (i) EEM policy using applet
  • 6.4.e Identify performance routing (PfR)
  • 6.4.e (i) Basic load balancing
  • 6.4.e (ii) Voice optimization