You are previewing CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2, Fifth Edition.
O'Reilly logo
CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2, Fifth Edition

Book Description

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2, Fifth Edition from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Expert instructors Narbik Kocharians and Terry Vinson share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This second of two volumes covers IP BGP routing, quality of service (QoS), wide area networks, IP multicast, network security, and Multiprotocol Label Switching (MPLS) topics.

This complete study package includes
-- A test-preparation routine proven to help you pass the exams
-- Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section
-- Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
-- The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
-- A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
-- Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.

The official study guide helps you master topics on the CCIE Routing and Switching v5.0 exams, including:
-- BGP operations and routing policies
-- QoS
-- WANs
-- IP Multicast
-- Device and network security and tunneling technologies
-- MPLS


CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2, Fifth Edition is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

The print edition of the CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2, Fifth Edition contains more than 200 practice exam questions.

Also available from Cisco Press for Cisco CCIE R&S v5.0 study is the CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2 Premium Edition eBook and Practice Test, Fifth Edition. This digital-only certification preparation product combines an eBook with enhanced Pearson IT Certification Practice Test.

This integrated learning package:
-- Allows you to focus on individual topic areas or take complete, timed exams
-- Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
-- Provides additional unique sets of exam-realistic practice questions
-- Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

This print book includes a 70% discount offer off the list price of the CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2 Premium Edition eBook and Practice Test, Fifth Edition to help enhance your exam preparation experience.




Table of Contents

  1. About This eBook
  2. Title Page
  3. Copyright Page
  4. About the Authors
  5. About the Technical Reviewers
  6. Dedications
  7. Acknowledgments
  8. Contents at a Glance
  9. Contents
  10. Icons Used in This Book
  11. Command Syntax Conventions
  12. Introduction
    1. Why Should I Take the CCIE Routing and Switching Written Exam?
    2. CCIE Routing and Switching Written Exam 400-101
    3. About the CCIE Routing and Switching v5.0 Official Cert Exam Guide, Volume 2, Fifth Edition
    4. Book Organization
    5. Book Features
  13. Part I: IP BGP Routing
    1. Chapter 1. Fundamentals of BGP Operations
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Building BGP Neighbor Relationships
          1. Internal BGP Neighbors
          2. External BGP Neighbors
          3. Checks Before Becoming BGP Neighbors
          4. BGP Messages and Neighbor States
            1. BGP Message Types
            2. Purposefully Resetting BGP Peer Connections
        2. Building the BGP Table
          1. Injecting Routes/Prefixes into the BGP Table
            1. BGP network Command
            2. Redistributing from an IGP, Static, or Connected Route
            3. Impact of Auto-Summary on Redistributed Routes and the network Command
            4. Manual Summaries and the AS_PATH Path Attribute
            5. Adding Default Routes to BGP
            6. ORIGIN Path Attribute
            7. Advertising BGP Routes to Neighbors
            8. BGP Update Message
            9. Determining the Contents of Updates
            10. Example: Impact of the Decision Process and NEXT_HOP on BGP Updates
            11. Summary of Rules for Routes Advertised in BGP Updates
        3. Building the IP Routing Table
          1. Adding eBGP Routes to the IP Routing Table
          2. Backdoor Routes
          3. Adding iBGP Routes to the IP Routing Table
            1. Using Sync and Redistributing Routes
            2. Disabling Sync and Using BGP on All Routers in an AS
            3. Confederations
            4. Configuring Confederations
            5. Route Reflectors
        4. Multiprotocol BGP
          1. Configuration of Multiprotocol BGP
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
    2. Chapter 2. BGP Routing Policies
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Route Filtering and Route Summarization
          1. Filtering BGP Updates Based on NLRI
            1. Route Map Rules for NLRI Filtering
            2. Soft Reconfiguration
            3. Comparing BGP Prefix Lists, Distribute Lists, and Route Maps
          2. Filtering Subnets of a Summary Using the aggregate-address Command
          3. Filtering BGP Updates by Matching the AS_PATH PA
            1. The BGP AS_PATH and AS_PATH Segment Types
            2. Using Regular Expressions to Match AS_PATH
            3. Example: Matching AS_PATHs Using AS_PATH Filters
            4. Matching AS_SET and AS_CONFED_SEQ
        2. BGP Path Attributes and the BGP Decision Process
          1. Generic Terms and Characteristics of BGP PAs
          2. The BGP Decision Process
            1. Clarifications of the BGP Decision Process
            2. Three Final Tiebreaker Steps in the BGP Decision Process
            3. Adding Multiple BGP Routes to the IP Routing Table
            4. Mnemonics for Memorizing the Decision Process
        3. Configuring BGP Policies
          1. Background: BGP PAs and Features Used by Routing Policies
          2. Step 1: NEXT_HOP Reachable
          3. Step 2: Administrative Weight
          4. Step 3: Highest Local Preference (LOCAL_PREF)
          5. Step 4: Choose Between Locally Injected Routes Based on ORIGIN PA
          6. Step 5: Shortest AS_PATH
            1. Removing Private ASNs
            2. AS_PATH Prepending and Route Aggregation
          7. Step 6: Best ORIGIN PA
          8. Step 7: Smallest Multi-Exit Discriminator
            1. Configuring MED: Single Adjacent AS
            2. Configuring MED: Multiple Adjacent Autonomous Systems
            3. The Scope of MED
          9. Step 8: Prefer Neighbor Type eBGP over iBGP
          10. Step 9: Smallest IGP Metric to the NEXT_HOP
          11. The maximum-paths Command and BGP Decision Process Tiebreakers
          12. Step 10: Lowest BGP Router ID of Advertising Router (with One Exception)
          13. Step 11: Lowest Neighbor ID
            1. The BGP maximum-paths Command
        4. BGP Communities
          1. Matching COMMUNITY with Community Lists
          2. Removing COMMUNITY Values
          3. Filtering NLRIs Using Special COMMUNITY Values
        5. Fast Convergence Enhancements
          1. Fast External Neighbor Loss Detection
          2. Internal Neighbor Loss Detection
          3. EBGP Fast Session Deactivation
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
  14. Part II: QoS
    1. Chapter 3. Classification and Marking
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Fields That Can Be Marked for QoS Purposes
          1. IP Precedence and DSCP Compared
          2. DSCP Settings and Terminology
            1. Class Selector PHB and DSCP Values
            2. Assured Forwarding PHB and DSCP Values
            3. Expedited Forwarding PHB and DSCP Values
          3. Non-IP Header Marking Fields
            1. Ethernet LAN Class of Service
            2. WAN Marking Fields
            3. Locations for Marking and Matching
        2. Cisco Modular QoS CLI
          1. Mechanics of MQC
          2. Classification Using Class Maps
            1. Using Multiple match Commands
            2. Classification Using NBAR
        3. Classification and Marking Tools
          1. Class-Based Marking (CB Marking) Configuration
            1. CB Marking Example
            2. CB Marking of CoS and DSCP
            3. Network-Based Application Recognition
          2. CB Marking Design Choices
          3. Marking Using Policers
          4. QoS Pre-Classification
          5. Policy Routing for Marking
        4. AutoQoS
          1. AutoQoS for VoIP
            1. AutoQoS VoIP on Switches
            2. AutoQoS VoIP on Routers
            3. Verifying AutoQoS VoIP
          2. AutoQoS for the Enterprise
            1. Discovering Traffic for AutoQoS Enterprise
            2. Generating the AutoQoS Configuration
            3. Verifying AutoQoS for the Enterprise
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
    2. Chapter 4. Congestion Management and Avoidance
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Cisco Router Queuing Concepts
          1. Software Queues and Hardware Queues
          2. Queuing on Interfaces Versus Subinterfaces and Virtual Circuits
          3. Comparing Queuing Tools
        2. Queuing Tools: CBWFQ and LLQ
          1. CBWFQ Basic Features and Configuration
          2. Defining and Limiting CBWFQ Bandwidth
          3. Low-Latency Queuing
          4. Defining and Limiting LLQ Bandwidth
          5. LLQ with More Than One Priority Queue
          6. Miscellaneous CBWFQ/LLQ Topics
          7. Queuing Summary
        3. Weighted Random Early Detection
          1. How WRED Weights Packets
          2. WRED Configuration
        4. Modified Deficit Round-Robin
        5. LAN Switch Congestion Management and Avoidance
          1. Cisco Switch Ingress Queuing
            1. Creating a Priority Queue
            2. Cisco 3560 Congestion Avoidance
          2. Cisco 3560 Switch Egress Queuing
        6. Resource Reservation Protocol (RSVP)
          1. RSVP Process Overview
          2. Configuring RSVP
          3. Using RSVP for Voice Calls
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
    3. Chapter 5. Shaping, Policing, and Link Fragmentation
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Traffic-Shaping Concepts
          1. Shaping Terminology
          2. Shaping with an Excess Burst
          3. Underlying Mechanics of Shaping
        2. Generic Traffic Shaping
        3. Class-Based Shaping
          1. Tuning Shaping for Voice Using LLQ and a Small Tc
          2. Configuring Shaping by Bandwidth Percent
          3. CB Shaping to a Peak Rate
          4. Adaptive Shaping
        4. Policing Concepts and Configuration
          1. CB Policing Concepts
            1. Single-Rate, Two-Color Policing (One Bucket)
            2. Single-Rate, Three-Color Policer (Two Buckets)
            3. Two-Rate, Three-Color Policer (Two Buckets)
          2. Class-Based Policing Configuration
            1. Single-Rate, Three-Color Policing of All Traffic
            2. Policing a Subset of the Traffic
            3. CB Policing Defaults for Bc and Be
            4. Configuring Dual-Rate Policing
            5. Multi-Action Policing
            6. Policing by Percentage
          3. Committed Access Rate
        5. Hierarchical Queuing Framework (HQF)
          1. Flow-Based Fair-Queuing Support in Class-Default
          2. Default Queuing Implementation for Class-Default
          3. Class-Default and Bandwidth
          4. Default Queuing Implementation for Shape Class
          5. Policy Map and Interface Bandwidth
          6. Per-Flow Queue Limit in Fair Queue
          7. Oversubscription Support for Multiple Policies on Logical Interfaces
          8. Shaping on a GRE Tunnel
          9. Nested Policy and Reference Bandwidth for Child-Policy
          10. Handling Traffic Congestion on an Interface Configured with Policy Map
        6. QoS Troubleshooting and Commands
          1. Troubleshooting Slow Application Response
          2. Troubleshooting Voice and Video Problems
          3. Other QoS Troubleshooting Tips
          4. Approaches to Resolving QoS Issues
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
  15. Part III: Wide-Area Networks
    1. Chapter 6. Wide-Area Networks
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Layer 2 Protocols
          1. HDLC
          2. Point-to-Point Protocol
            1. PPP Link Control Protocol
            2. Basic LCP/PPP Configuration
            3. Multilink PPP
            4. MLP Link Fragmentation and Interleaving
            5. PPP Compression
            6. PPP Layer 2 Payload Compression
            7. Header Compression
          3. PPPoE
            1. Server Configuration
            2. Client Configuration
            3. Authentication
        2. Ethernet WAN
          1. VPLS
          2. Metro-Ethernet
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
        2. Further Reading
  16. Part IV: IP Multicast
    1. Chapter 7. Introduction to IP Multicasting
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Why Do You Need Multicasting?
          1. Problems with Unicast and Broadcast Methods
          2. How Multicasting Provides a Scalable and Manageable Solution
        2. Multicast IP Addresses
          1. Multicast Address Range and Structure
          2. Well-Known Multicast Addresses
            1. Multicast Addresses for Permanent Groups
            2. Multicast Addresses for Source-Specific Multicast Applications and Protocols
            3. Multicast Addresses for GLOP Addressing
            4. Multicast Addresses for Private Multicast Domains
          3. Multicast Addresses for Transient Groups
          4. Summary of Multicast Address Ranges
          5. Mapping IP Multicast Addresses to MAC Addresses
        3. Managing Distribution of Multicast Traffic with IGMP
          1. Joining a Group
          2. Internet Group Management Protocol
          3. IGMP Version 2
            1. IGMPv2 Host Membership Query Functions
            2. IGMPv2 Host Membership Report Functions
            3. IGMPv2 Solicited Host Membership Report
            4. IGMPv2 Unsolicited Host Membership Report
            5. IGMPv2 Leave Group and Group-Specific Query Messages
            6. IGMPv2 Querier
          4. IGMPv2 Timers
          5. IGMP Version 3
        4. IGMPv1 and IGMPv2 Interoperability
          1. IGMPv2 Host and IGMPv1 Routers
          2. IGMPv1 Host and IGMPv2 Routers
        5. Comparison of IGMPv1, IGMPv2, and IGMPv3
        6. LAN Multicast Optimizations
          1. Cisco Group Management Protocol
          2. IGMP Snooping
          3. Router-Port Group Management Protocol
          4. IGMP Filtering
          5. IGMP Proxy
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
        2. References in This Chapter
    2. Chapter 8. IP Multicast Routing
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Multicast Routing Basics
          1. Overview of Multicast Routing Protocols
            1. Multicast Forwarding Using Dense Mode
            2. Reverse Path Forwarding Check
            3. Multicast Forwarding Using Sparse Mode
          2. Multicast Scoping
            1. TTL Scoping
            2. Administrative Scoping
        2. Dense-Mode Routing Protocols
          1. Operation of Protocol Independent Multicast Dense Mode
            1. Forming PIM Adjacencies Using PIM Hello Messages
            2. Source-Based Distribution Trees
            3. Prune Message
            4. PIM-DM: Reacting to a Failed Link
            5. Rules for Pruning
            6. Steady-State Operation and the State Refresh Message
            7. Graft Message
          2. LAN-Specific Issues with PIM-DM and PIM-SM
            1. Prune Override
            2. Assert Message
            3. Designated Router
            4. Summary of PIM-DM Messages
          3. Distance Vector Multicast Routing Protocol
          4. Multicast Open Shortest Path First
        3. Sparse-Mode Routing Protocols
          1. Operation of Protocol Independent Multicast Sparse Mode
            1. Similarities Between PIM-DM and PIM-SM
            2. Sources Sending Packets to the Rendezvous Point
            3. Joining the Shared Tree
            4. Completion of the Source Registration Process
            5. Shared Distribution Tree
            6. Steady-State Operation by Continuing to Send Joins
            7. Examining the RP’s Multicast Routing Table
            8. Shortest-Path Tree Switchover
            9. Pruning from the Shared Tree
          2. Dynamically Finding RPs and Using Redundant RPs
            1. Dynamically Finding the RP Using Auto-RP
            2. Dynamically Finding the RP Using BSR
            3. Anycast RP with MSDP
            4. Interdomain Multicast Routing with MSDP
            5. Summary: Finding the RP
          3. Bidirectional PIM
          4. Comparison of PIM-DM and PIM-SM
          5. Source-Specific Multicast
        4. Implementing IPv6 Multicast PIM
          1. Designated Priority Manipulation
          2. PIM6 Hello Interval
          3. IPv6 Sparse-Mode Multicast
          4. IPv6 Static RP
          5. IPv6 BSR
          6. Multicast Listener Discovery (MLD)
          7. Embedded RP
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
  17. Part V: Security
    1. Chapter 9. Device and Network Security
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Router and Switch Device Security
          1. Simple Password Protection for the CLI
            1. Better Protection of Enable and Username Passwords
            2. Using Secure Shell Protocol
          2. User Mode and Privileged Mode AAA Authentication
            1. Using a Default Set of Authentication Methods
            2. Using Multiple Authentication Methods
            3. Groups of AAA Servers
            4. Overriding the Defaults for Login Security
          3. PPP Security
        2. Layer 2 Security
          1. Switch Security Best Practices for Unused and User Ports
            1. Port Security
            2. Dynamic ARP Inspection
            3. DHCP Snooping
            4. IP Source Guard
            5. 802.1X Authentication Using EAP
            6. Storm Control
          2. General Layer 2 Security Recommendations
        3. Layer 3 Security
          1. IP Access Control List Review
            1. ACL Rule Summary
            2. Wildcard Masks
          2. General Layer 3 Security Considerations
            1. Smurf Attacks, Directed Broadcasts, and RPF Checks
            2. Inappropriate IP Addresses
            3. TCP SYN Flood, the Established Bit, and TCP Intercept
          3. Classic Cisco IOS Firewall
            1. TCP Versus UDP with CBAC
            2. Cisco IOS Firewall Protocol Support
            3. Cisco IOS Firewall Caveats
            4. Cisco IOS Firewall Configuration Steps
          4. Cisco IOS Zone-Based Firewall
          5. Control-Plane Policing
            1. Preparing for CoPP Implementation
            2. Implementing CoPP
          6. Dynamic Multipoint VPN
            1. Step 1: Basic Configuration of IP Addresses
            2. Step 2: GRE Multipoint Tunnel Configuration on All Routers (for Spoke-to-Spoke Connectivity)
            3. Step 3: Configure IPsec to Encrypt mGRE Tunnels
            4. Step 4: DMVPN Routing Configuration
        4. IPv6 First Hop Security
          1. First Hop Security for IPv6
          2. Link Operations
            1. End Node Security Enforcement
            2. First Hop Switch Security Enforcement
            3. Last Router Security Enforcement
          3. ICMPv6 and Neighbor Discovery Protocol
            1. Secure Neighbor Discovery (SeND)
            2. Securing at the First Hop
          4. RA Guard
          5. DHCPv6 Guard
            1. DHCPv6 Guard and the Binding Database
          6. IPv6 Device Tracking
          7. IPv6 Neighbor Discovery Inspection
          8. IPv6 Source Guard
          9. Port Access Control Lists (PACL)
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
    2. Chapter 10. Tunneling Technologies
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. GRE Tunnels
          1. Dynamic Multipoint VPN Tunnels
            1. DMVPN Operation
            2. DMVPN Components
            3. DMVPN Operation
          2. IPv6 Tunneling and Related Techniques
            1. Tunneling Overview
            2. Manually Configured Tunnels
            3. Automatic IPv4-Compatible Tunnels
            4. IPv6-over-IPv4 GRE Tunnels
            5. Automatic 6to4 Tunnels
            6. ISATAP Tunnels
            7. SLAAC and DHCPv6
            8. NAT-PT
            9. NAT ALG
            10. NAT64
          3. Layer 2 VPNs
            1. Tagged Mode
            2. Raw Mode
            3. Layer 2 Tunneling Protocol (L2TPv3)
            4. AToM (Any Transport over MPLS)
            5. Virtual Private LAN Services (VPLS)
            6. Overlay Transport Virtualization (OTV)
          4. GET VPN
      3. Foundation Summary
        1. Memory Builders
          1. Definitions
  18. Part VI: Multiprotocol Label Switching (MPLS)
    1. Chapter 11. Multiprotocol Label Switching
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. MPLS Unicast IP Forwarding
          1. MPLS IP Forwarding: Data Plane
            1. CEF Review
            2. Overview of MPLS Unicast IP Forwarding
            3. MPLS Forwarding Using the FIB and LFIB
            4. The MPLS Header and Label
            5. The MPLS TTL Field and MPLS TTL Propagation
          2. MPLS IP Forwarding: Control Plane
            1. MPLS LDP Basics
            2. The MPLS Label Information Base Feeding the FIB and LFIB
            3. Examples of FIB and LFIB Entries
            4. Label Distribution Protocol Reference
        2. MPLS VPNs
          1. The Problem: Duplicate Customer Address Ranges
          2. The Solution: MPLS VPNs
          3. MPLS VPN Control Plane
            1. Virtual Routing and Forwarding Tables
            2. MP-BGP and Route Distinguishers
            3. Route Targets
            4. Overlapping VPNs
          4. MPLS VPN Configuration
            1. Configuring the VRF and Associated Interfaces
            2. Configuring the IGP Between PE and CE
            3. Configuring Redistribution Between PE-CE IGP and MP-BGP
            4. Configuring MP-BGP Between PEs
          5. MPLS VPN Data Plane
            1. Building the (Inner) VPN Label
            2. Creating LFIB Entries to Forward Packets to the Egress PE
            3. Creating VRF FIB Entries for the Ingress PE
            4. Penultimate Hop Popping
        3. Other MPLS Applications
        4. Implement Multi-VRF Customer Edge (VRF Lite)
          1. VRF Lite, Without MPLS
          2. VRF Lite with MPLS
      3. Foundation Summary
        1. Memory Builders
          1. Fill In Key Tables from Memory
          2. Definitions
          3. Further Reading
  19. Part VII: Final Preparation
    1. Chapter 12. Final Preparation
      1. Tools for Final Preparation
      2. Pearson Cert Practice Test Engine and Questions on the CD
        1. Install the Software from the CD
        2. Activate and Download the Practice Exam
        3. Activating Other Exams
        4. Premium Edition
      3. The Cisco Learning Network
      4. Memory Tables
      5. Chapter-Ending Review Tools
      6. Suggested Plan for Final Review/Study
      7. Using the Exam Engine
      8. Summary
  20. Part VIII: Appendixes
    1. Appendix A. Answers to the “Do I Know This Already?” Quizzes
      1. Chapter 1
      2. Chapter 2
      3. Chapter 3
      4. Chapter 4
      5. Chapter 5
      6. Chapter 6
      7. Chapter 7
      8. Chapter 8
      9. Chapter 9
      10. Chapter 10
      11. Chapter 11
    2. Appendix B. CCIE Exam Updates
  21. Index
  22. CD-Only
    1. Appendix C. Decimal to Binary Conversion Table
    2. Appendix D. IP Addressing Practice
      1. Subnetting Practice
      2. 25 Subnetting Questions
        1. Suggestions on How to Attack the Problem
        2. Question 1: Answer
        3. Question 2: Answer
        4. Question 3: Answer
        5. Question 4: Answer
        6. Question 5: Answer
        7. Question 6: Answer
        8. Question 7: Answer
        9. Question 8: Answer
        10. Question 9: Answer
        11. Question 10: Answer
        12. Question 11: Answer
        13. Question 12: Answer
        14. Question 13: Answer
        15. Question 14: Answer
        16. Question 15: Answer
        17. Question 16: Answer
        18. Question 17: Answer
        19. Question 18: Answer
        20. Question 19: Answer
        21. Question 20: Answer
        22. Question 21: Answer
        23. Question 22: Answer
        24. Question 23: Answer
        25. Question 24: Answer
        26. Question 25: Answer
      3. Discovering All Subnets When Using SLSM: 13 Questions
        1. Question 1: Answer
        2. Question 2: Answer
        3. Question 3: Answer
        4. Question 4: Answer
        5. Question 5: Answer
        6. Question 6: Answer
        7. Question 7: Answer
        8. Question 8: Answer
        9. Question 9: Answer
        10. Question 10: Answer
        11. Question 11: Answer
        12. Question 12: Answer
        13. Question 13: Answer
      4. Discovering the Smallest Inclusive Summary Route: 10 Questions
        1. Question 1: Answer
        2. Question 2: Answer
        3. Question 3: Answer
        4. Question 4: Answer
        5. Question 5: Answer
        6. Question 6: Answer
        7. Question 7: Answer
        8. Question 8: Answer
        9. Question 9: Answer
        10. Question 10: Answer
      5. Discovering the Smallest Exclusive Summary Routes: 5 Questions
        1. Question 1: Answer
        2. Question 2: Answer
        3. Question 3: Answer
        4. Question 4: Answer
        5. Question 5: Answer
    3. Appendix E. Key Tables for CCIE Study
      1. Chapter 1
      2. Chapter 2
      3. Chapter 3
      4. Chapter 4
      5. Chapter 5
      6. Chapter 6
      7. Chapter 7
      8. Chapter 8
      9. Chapter 9
      10. Chapter 11
    4. Appendix F. Solutions for Key Tables for CCIE Study
      1. Chapter 1
      2. Chapter 2
      3. Chapter 3
      4. Chapter 4
      5. Chapter 5
      6. Chapter 6
      7. Chapter 7
      8. Chapter 8
      9. Chapter 9
      10. Chapter 11
  23. Glossary