You are previewing CCNP Quick Reference Sheets Bundle: Exams 642-901, 642-812, 642-845, 642-825.
O'Reilly logo
CCNP Quick Reference Sheets Bundle: Exams 642-901, 642-812, 642-845, 642-825

Book Description

CCNP Quick Reference Sheets Bundle (Digital Short Cut)

Brent Stewart, Denise Donohue, Jay Swan

ISBN: 1-58705-327-6

As a final exam preparation tool, the four CCNP Quick Reference Sheets included in this value-priced bundle provide a concise review of all objectives on all four of the new CCNP exams (BSCI 642-901, BCMSN 642-812, ISCW 642-825, and ONT 642-845). These digital Short Cuts provide you with detailed, graphical-based information, highlighting only the key topics in cram-style format.

With these documents as your guide, you will review key concepts required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network. These fact-filled Quick Reference Sheets allow you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts.

Table of Contents:

1.      CCNP BSCI Quick Reference Sheets

2.      CCNP BCMSN Quick Reference Sheets

3.      CCNP ONT Quick Reference Sheets

4.      CCNP ISCW Quick Reference Sheets

Brent Stewart, CCNP, CCDP, MCSE, is a network administrator for CommScope and a certified Cisco Systems instructor. He participated in the development of BSCI and has seperately developed trainingmaterial for ICND, BSCI, BCMSN, BCRAN, and CIT. Brent lives in Hickory, NC, with his wife, Karen and children, Benjamin, Kaitlyn, Madelyn, and William.

Denise Donohue, CCIE No. 9566, is manager of solutions engineering for ePlus Technology in Maryland. She is responsible for designing and implementing data and VoIP networks, supporting companies based in the National Capital region. Prior to this role, she was a systems engineer for the data consulting arm of SBC/AT&T. Denise was a Cisco instructor and course director for Global Knowledge and did network consulting for many years. Her CCIE is in Routing and Switching.  

Jay Swan is a senior network engineer for the Southern Ute Indian Tribe Growth Fund in Ignacio, CO. Prior to this position, he was a Cisco instructor and course director for Global Knowledge. Jay has also worked in IT in the higher education and service provider fields. He holds CCNP® and CCSP® certifications.

Table of Contents

  1. Copyright
  2. CCNP BSCI Quick Reference Sheets: Exam 642-901
    1. 1. The Evolving Network Model
      1. The Hierarchical Design Model
        1. Problems with the Hierarchical Design Model
      2. Enterprise Composite Network Model
      3. SONA and IIN
      4. IP Routing Protocols
        1. Administrative Distance
        2. Building the Routing Table
        3. Comparing Routing Protocols
    2. 2. EIGRP
      1. EIGRP Overview
      2. EIGRP Messages
        1. Packet Types
        2. Neighbor Discovery and Route Exchange
      3. EIGRP Route Selection
        1. EIGRP Metric
        2. Diffusing Update Algorithm (DUAL)
        3. Route Selection Example
      4. Basic EIGRP Configuration
        1. Creating an EIGRP Default Route
        2. Troubleshooting EIGRP
      5. Advanced EIGRP Configuration
        1. Summarization
        2. Load Balancing
        3. WAN Bandwidth
        4. EIGRP Authentication
      6. EIGRP Scalability
    3. 3. OSPF
      1. OSPF Overview
        1. OSPF Network Structure
        2. OSPF Metric
      2. LSAs
        1. LSDB Overload Protection
        2. LSA Types
      3. OSPF Operation
        1. OSPF Packets
        2. OSPF Neighbor Relationships
        3. Establishing Neighbors and Exchanging Routes
      4. Basic OSPF Configuration
        1. Router ID
        2. Troubleshooting OSPF
      5. OSPF Network Types
        1. Designated Routers
        2. Nonbroadcast Multiaccess (NBMA) Networks
      6. Advanced OSPF Configuration
        1. OSPF Summarization
        2. Creating a Default Route
        3. Stub and Not-So-Stubby Areas
        4. Configuring Virtual Links
      7. Configuring OSPF Authentication
    4. 4. IS-IS
      1. IS-IS Overview
        1. Types of IS-IS Routers
        2. NSAP Address Structure
        3. Adjacency Formation in IS-IS
        4. IS-IS Network Types
      2. Configuring IS-IS
      3. Verifying and Troubleshooting IS-IS
    5. 5. Optimizing Routing
      1. Using Multiple Routing Protocols
        1. Configuring Route Redistribution
        2. Seed Metric
      2. Tools for Controlling/Preventing Routing Updates
        1. Passive Interface
        2. Distribute Lists
        3. Route Maps
        4. Route Map Syntax
        5. Match and Set Conditions
        6. Manipulating Administrative Distance
      3. DHCP
        1. Configuring DHCP
        2. DHCP Relay Agent
    6. 6. BGP
      1. BGP Overview
        1. Multihoming
        2. BGP Databases
        3. BGP Message Types
        4. Internal and External BGP
        5. BGP Next Hop Selection
        6. BGP Next Hop on a Multiaccess Network
        7. BGP Synchronization Rule
      2. Configuring BGP
        1. The BGP Network Command
        2. BGP Peering
        3. BGP Peering States
      3. BGP Path Selection
        1. BGP Attributes
        2. Influencing BGP Path Selection
        3. BGP Path Selection Criteria
        4. BGP Authentication
    7. 7. IP Multicast
      1. Multicast MAC Address
      2. Multicast IP Addresses
      3. Multicast Distribution Trees
      4. Reverse Path Forwarding
      5. Protocol Independent Multicast (PIM)
        1. PIM Dense Mode
        2. PIM Sparse Mode
        3. PIM Sparse-Dense Mode
        4. Configuring Multicast Routing and PIM
        5. Auto-RP
        6. PIM Version 2
      6. IGMP
        1. IGMP Version 1
        2. IGMP Version 2
        3. IGMP Version 3
        4. CGMP
        5. IGMP Snooping
      7. Verifying Multicast Routing
    8. 8. IPv6 Introduction
      1. IPv6 Routing Prefix
        1. IPv6 Interface ID
      2. Simplified Presentation of IPv6 Address
      3. IPv6 Header
      4. Advanced Features
        1. Specifying Destinations
        2. Specifying Sources
        3. Renumbering
        4. Mobility
      5. IPv6 Routing
        1. Static Routing
        2. RIPng for IPv6
        3. EIGRP
        4. MP-BGP for IPv6
        5. OSPFv3
          1. OSPFv3 LSAs
          2. Configuration
        6. Troubleshooting
      6. Integrating IPv4 and IPv6
        1. NAT-PT, ALG, and BIA/BIS
    9. Appendix
  3. CCNP BCMSN Quick Reference Sheets: Exam 642-812
    1. 1. The Evolving Network Model
      1. The Hierarchical Design Model
      2. Problems with the Hierarchical Design Model
      3. Enterprise Composite Network Model
      4. SONA and IIN
    2. 2. VLAN Implementation
      1. What Is a VLAN?
      2. Best Practices
      3. Creating a VLAN in Global Config Mode
      4. Creating a VLAN in Database Mode
      5. Assigning Ports to VLANs
      6. Verifying VLAN Configuration
      7. Troubleshooting VLAN Issues
      8. VLAN Trunking
      9. Configuring a Trunk Link
      10. Native VLAN with 802.1Q
      11. VLAN Mapping
      12. VLANs Allowed on the Trunk
      13. Verifying a Trunk Link
      14. 802.1Q Tunnels
      15. Layer 2 Protocol Tunneling (GBPT)
      16. Troubleshooting Trunking
      17. VLAN Trunking Protocol (VTP)
      18. VTP Switch Roles
      19. VTP Pruning
      20. Configuring VTP
      21. Verifying and Monitoring VTP
      22. Troubleshooting VTP
      23. Adding a New Switch to a VTP Domain
    3. 3. Spanning Tree
      1. Understanding the Spanning Tree Protocol
      2. Spanning Tree Election Criteria
      3. The STP Election
        1. Root Bridge Election
        2. Root Port Election
      4. Designated Port Election
      5. Bridge Protocol Data Units (BPDUs)
      6. BPDU Fields
      7. Spanning Tree Port States
      8. Designing for Spanning Tree
      9. Spanning Tree and PVST
      10. Configuring Spanning Tree
      11. Spanning Tree Enhancements
      12. Portfast
      13. UplinkFast
      14. BackboneFast
      15. Rapid Spanning Tree (RSTP)
      16. RSTP Port Roles
      17. BPDU Differences in RSTP
      18. RSTP Fast Convergence
      19. Multiple Spanning Tree (MST)
      20. EtherChannels
      21. Configuring an EtherChannel
      22. Verifying an EtherChannel
      23. Additional Spanning Tree Features
      24. BPDU Guard
      25. BPDU Filtering
      26. Root Guard
      27. Unidirectional Link Detection (UDLD)
      28. Loop Guard
      29. Troubleshooting STP
      30. Identifying a Bridging Loop
      31. What to Use Where
    4. 4. InterVLAN Routing
      1. InterVLAN Routing Using Multilayer Switches
      2. InterVLAN Routing
      3. Multilayer Switching
        1. Understanding the Switching Process
        2. Understanding the Switching Table
        3. Understanding Switch Forwarding Architectures
      4. Multilayer Switching
        1. ARP Throttling
        2. Configuring and Troubleshooting CEF
    5. 5. Layer 3 Redundancy
      1. Hot Standby Router Protocol (HSRP)
        1. HSRP States
        2. Configuring HSRP
      2. Virtual Router Redundancy Protocol (VRRP)
      3. GLBP
    6. 6. Using Wireless LANs
      1. Wireless LAN Overview
        1. Characteristics of Wireless LANs
        2. WLAN Topologies
      2. WLAN Standards
        1. 802.11b Standard
        2. 802.11a Standard
        3. 802.11g Standard
      3. Wireless Security
        1. WPA/WPA2 Authentication
      4. Cisco Wireless Network Components
        1. Cisco Unified Wireless Network
        2. Autonomous APs
        3. Lightweight Access Points
        4. Wireless LAN Antennas
          1. Gain
          2. Directionality
          3. Multipath Distortion
          4. EIRP
        5. Power over Ethernet (PoE) Switches
      5. Configuring Wireless LAN Devices
        1. Configuring Autonomous Access Points
        2. Configuring a WLAN Controller
    7. 7. VoIP in a Campus Network
      1. Preparing the Network for VoIP
        1. Network and Bandwidth Considerations
        2. Auxiliary (or Voice) VLANs
      2. QoS for VoIP
        1. QoS Actions
        2. DSCP Values
        3. Trust Boundaries
      3. Configuring VoIP Support on a Switch
        1. Manual Configuration
        2. Using AutoQoS
    8. 8. Campus Network Security
      1. MAC Address Flooding
        1. Port Security
        2. Port-Based Authentication
      2. VLAN-Based Attacks
        1. Switch Spoofing
        2. 802.1Q Double-Tagging
        3. VACLs
        4. Private VLANs
      3. Spoof Attacks
        1. DHCP Spoofing
        2. ARP Spoofing
      4. Securing Spanning Tree
        1. BPDU Guard
        2. BPDU Filtering
        3. Root Guard
      5. Prevent Spanning Tree Loops
        1. Unidirectional Link Detection (UDLD)
        2. Loop Guard
      6. Securing Your Switch
    9. Appendix
  4. CCNP ONT Quick Reference Sheets: Exam 642-845
    1. 1. Network Architecture
      1. SONA and IIN
      2. Network Models
        1. Hierarchical Design Model
      3. Enterprise Composite Network Model
    2. 2. Cisco VoIP
      1. Introduction
        1. Transmission
      2. Packetization
      3. Transmitting
      4. Bandwidth Requirements
        1. A Worksheet for Calculating VoIP Bandwidth
        2. An Example for G.711, No Compression over Ethernet, 20 ms Samples
      5. Implementing IP Telephony
        1. Configuring Cisco Routers to Support VoIP
    3. 3. QoS Overview
      1. Bandwidth
      2. Delay and Jitter
      3. Packet Loss Issues
      4. Defining QOS Requirements for Network Traffic
      5. QOS Models
        1. Best Effort
        2. IntServ
        3. DiffServ
      6. QoS Implementation Methods
        1. Legacy CLI
        2. MQC
          1. MQC Configuration
          2. Verifying QoS Configuration
        3. AutoQoS
        4. SDM QoS Wizard
      7. QoS Methods Comparison
    4. 4. QoS Details
      1. Classification and Marking
        1. Using NBAR for Classifying Traffic
        2. Marking at Layer 2
        3. Marking at Layer 3
          1. Default PHB
          2. Assured Forwarding and Class Selector PHB
          3. DiffServ Expedited Forwarding PHB
        4. Classifying and Marking in a VoIP Network
      2. Queuing Overview
        1. Hardware Queue
        2. Software Queue
      3. Legacy Queuing Techniques
        1. FIFO Queuing
        2. Priority Queuing
        3. Round Robin Queuing
        4. Weighted Fair Queuing
          1. Configuring WFQ
      4. CBWFQ and LLQ
        1. CBWFQ
        2. LLQ
      5. Congestion Avoidance
      6. Traffic Policing and Shaping
        1. Traffic Policing
        2. Traffic Shaping
      7. Link Efficiency Mechanisms
        1. Compression
        2. Link Fragmentation and Interleave (LFI)
      8. QoS with VPNs
        1. GRE Tunnels
        2. IPSec Tunnels
      9. Enterprise-Wide QoS Deployment
        1. SLA
        2. Enterprise QoS
        3. CoPP
    5. 5. AutoQoS
      1. AutoQoS for Switches
      2. AutoQos for Routers
      3. AutoQoS Restrictions and Caveats
      4. Tuning AutoQoS
        1. AutoQoS Classes
        2. AutoQoS and Changing Network Conditions
        3. Manually Tuning AutoQoS Configurations
    6. 6. Wireless Scalability
      1. WLAN QoS
      2. LWAP
      3. 802.1x and WLAN Security
      4. Configuring WLAN Security on Controller
      5. WLAN Management
    7. Appendix
  5. CCNP ISCW Quick Reference Sheets
    1. 1. Network Conceptual Models
      1. Intelligent Information Network
      2. Service-Oriented Network Architecture
      3. Cisco Enterprise Architecture
    2. 2. Providing SOHO/Teleworker Connectivity
      1. Broadband Cable
        1. Cable Components
        2. Cable Standards
        3. Provisioning the Cable Modem
      2. Digital Subscriber Line
        1. Types of DSL
        2. ADSL
          1. Carrierless Amplitude and Phase Line Coding
          2. Discrete Multi-Tone Line Coding
        3. Layer 2 over DSL
          1. PPPoE
          2. PPPoA
      3. Configuring DSL CPE
        1. Configuring PPPoE CPE
        2. Configuring PPPoA CPE
        3. Troubleshooting ADSL
          1. Troubleshooting ADSL at Layer 1
          2. Troubleshooting ADSL at Layer 2
    3. 3. Frame Mode MPLS
      1. Cisco Express Forwarding
      2. MPLS Routers
      3. MPLS Labels
        1. Label Distribution and Label Tables
        2. Penultimate Hop Popping
      4. Configuring Frame Mode MPLS
        1. Enabling CEF
        2. Enabling MPLS
        3. Increasing the MTU Size
      5. MPLS VPNs
        1. Handling Customer Routes
        2. Route Distinguishers
        3. Route Targets
    4. 4. IPsec
      1. IPsec Headers
        1. Authentication Header
        2. Encapsulating Security Payload
          1. IPsec Modes
      2. Authentication Methods
      3. Encryption Methods
        1. Symmetric Key Algorithms
        2. Asymmetric Key Algorithm
        3. Diffie-Hellman Key Exchange
      4. Key Management
      5. Establishing an IPsec VPN
      6. Configuring a Site-to-Site VPN Using Cisco IOS Commands
        1. Configuring an ISAKMP Policy
      7. Configuring an IPsec Transform Set
        1. Configuring a Crypto ACL
        2. Configuring a Crypto Map
        3. Applying the Crypto Map to an Interface
        4. Configuring an Optional Interface Access List
      8. Configuring a Site-to-Site VPN Using SDM
      9. Monitoring and Troubleshooting IPsec VPNs
      10. Using GRE with IPsec
      11. Configuring a GRE Tunnel Using Cisco IOS Commands
        1. Configuring a GRE over IPsec Tunnel Using the SDM
      12. High-Availability VPNs
        1. Detecting a Failure Using DPD
        2. Detecting a Failure Using HSRP
        3. Using IPsec Stateful Failover
        4. Using an IPsec Tunnel as a Backup WAN Link
      13. Cisco Easy VPN
        1. Establishing an Easy VPN IPsec Session
        2. Using SDM to Configure the Easy VPN Server
      14. Configuring the Cisco VPN Client
    5. 5. Cisco Device Hardening
      1. Mitigating Network Attacks
        1. Cisco Self-Defending Network
        2. Types of Network Attacks
        3. Mitigating Reconnaissance Attacks
        4. Mitigating Access Attacks
        5. Mitigating Denial-of-Service Attacks
      2. Disabling Unused Cisco Router Network Services and Interfaces
        1. Unused Router Interfaces
        2. Vulnerable Router Services
        3. Hardening with AutoSecure
        4. Configuring AutoSecure
        5. Security Device Manager
      3. Securing Cisco Router Installations and Administrative Access
        1. Password-Creation Rules
        2. Types of Router Passwords
        3. Password-Length Enforcement
        4. Password Encryption
        5. Enhanced Username Password Security
        6. Password Example
        7. Securing ROMMON
        8. Rate-Limiting Authentication Attempts
        9. Setting Timeouts
      4. Privilege Levels
      5. Configuring Banner Messages
      6. Role-Based CLI
      7. Cisco IOS Resilient Configuration
      8. Mitigating Threats and Attacks with Access Lists
        1. ACL Review
        2. Mitigating Spoofed Addresses (Inbound)
        3. Mitigating Spoofed Addresses (Outbound)
        4. Mitigating SYN Attacks
          1. Using the established Keyword in ACLs
          2. Using TCP Intercept
          3. ACL Caveats
      9. Securing Management and Reporting Features
        1. Types of Management Traffic
        2. Configuring Secure Shell
        3. Configuring Syslog
        4. Simple Network Management Protocol
        5. Network Time Protocol
      10. Configuring AAA on Cisco Routers
        1. AAA Services
        2. Router Access Modes
        3. Configuring AAA
        4. Configuring CLI Authentication on a Cisco Router
        5. Configuring Authorization
        6. Configuring Accounting
        7. Troubleshooting AAA
    6. 6. Cisco IOS Threat Defenses
      1. DMZ Design Review
      2. Firewall Technologies
      3. Cisco IOS Firewall
        1. TCP Handling in the Cisco IOS Firewall
        2. UDP Handling in the Cisco IOS Firewall
        3. Alerts and Audit Trails
        4. Cisco IOS Authentication Proxy
      4. Configuring Cisco IOS Firewalls
        1. Defining External and Internal Interfaces
        2. Configuring Access Lists on the Interfaces
        3. Defining Inspection Rules
        4. Applying Inspection Rules to Interfaces
        5. Verifying Inspection
      5. Introducing Cisco IOS IPS
        1. Defining IDS/IPS Terms
        2. Cisco IOS IPS Signatures
        3. Cisco IOS IPS Alarms
        4. Configuring Cisco IOS IPS
    7. Appendix