CCIE Cisco Certified Internet work Expert

Cisco CCIE Certification Training Classes Courses Institutes in Nagpur Maharashtra India CCIE Institutes CCIE Training

Atlanta Computer Institute Nagpur conducts Cisco certification Training for CCIE Cisco Certified Internetwork Expert for all students of any field who wants to make a career in Networking universities in India . For Batches CCIE contact Atlanta Computer Institute Nagpur Centers.

 CCIE R & S - CCIE R & S V4

CCIE Routing & Switching Lab Exam Topics v4.0 (Blueprint)

The following topics are general guidelines for the content likely to be included on the lab exam of CCIE. However, other related topics may also appear on any specific delivery of the CCIE exam. In order to better reflect the contents of the CCIE exam and for clarity purposes, the guidelines below may change at any time without notice.

Exam Sections and Sub-task Objectives

1.00 Implement Layer 2 Technologies 

1.10 Implement Spanning Tree Protocol (STP) 

(a) 802.1d 

(b) 802.1w 

(c) 801.1s 

(d) Loop guard 

(e) Root guard 

(f) Bridge protocol data unit (BPDU) guard 

(g) Storm control 

(h) Unicast flooding 

(i) Port roles, failure propagation, and loop guard operation 

1.20 Implement VLAN and VLAN Trunking Protocol (VTP)

1.30 Implement trunk and trunk protocols, EtherChannel, and load-balance

1.40 Implement Ethernet technologies

(a) Speed and duplex

(b) Ethernet, Fast Ethernet, and Gigabit Ethernet

(c) PPP over Ethernet (PPPoE) 

1.50 Implement Switched Port Analyzer (SPAN), Remote Switched Port Analyzer (RSPAN), and flow control 

1.60 Implement Frame Relay 

(a) Local Management Interface (LMI)

(b) Traffic shaping 

(c) Full mesh

(d) Hub and spoke 

(d) Discard eligible (DE) 

1.70 Implement High-Level Data Link Control (HDLC) and PPP 

2.00 Implement IPv4

2.10 Implement IP version 4 (IPv4) addressing, subnetting, and variable-length subnet masking (VLSM) 

2.20 Implement IPv4 tunneling and Generic Routing Encapsulation (GRE) 

2.30 Implement IPv4 RIP version 2 (RIPv2) 

2.40 Implement IPv4 Open Shortest Path First (OSPF) 

(a) Standard OSPF areas 

(b) Stub area 

(c) Totally stubby area 

(d) Not-so-stubby-area (NSSA) 

(e) Totally NSSA

(f) Link-state advertisement (LSA) types

(g) Adjacency on a point-to-point and on a multi-access network

(h) OSPF graceful restart 

2.50 Implement IPv4 Enhanced Interior Gateway Routing Protocol (EIGRP)

(a) Best path 

(b) Loop-free paths 

(c) EIGRP operations when alternate loop-free paths are available, and when they are 

not available 

(d) EIGRP queries 

(e) Manual summarization and autosummarization

(e) EIGRP stubs 

 

 

2.60 Implement IPv4 Border Gateway Protocol (BGP) 

(a) Next hop

(b) Peering

(c) Internal Border Gateway Protocol (IBGP) and External Border Gateway Protocol 

(EBGP) 

2.70 Implement policy routing 

2.80 Implement Performance Routing (PfR) and Cisco Optimized Edge Routing (OER) 

2.90 Implement filtering, route redistribution, summarization, synchronization, attributes, and other advanced features

3.00 Implement IPv6 

3.10 Implement IP version 6 (IPv6) addressing and different addressing types

3.20 Implement IPv6 neighbor discovery 

3.30 Implement basic IPv6 functionality protocols 

3.40 Implement tunneling techniques 

3.50 Implement OSPF version 3 (OSPFv3)

3.60 Implement EIGRP version 6 (EIGRPv6) 

3.70 Implement filtering and route redistribution 

4.00 Implement MPLS Layer 3 VPNs 

4.10 Implement Multiprotocol Label Switching (MPLS) 

4.20 Implement Layer 3 virtual private networks (VPNs) on provider edge (PE), provider (P), and customer edge (CE) routers

4.30 Implement virtual routing and forwarding (VRF) and Multi-VRF Customer Edge (VRF-Lite) 

5.00 Implement IP Multicast 

5.10 Implement Protocol Independent Multicast (PIM) sparse mode 

5.20 Implement Multicast Source Discovery Protocol (MSDP) 

5.30 Implement interdomain multicast routing 

5.40 Implement PIM Auto-Rendezvous Point (Auto-RP), unicast rendezvous point (RP), and bootstrap router (BSR) 

5.50 Implement multicast tools, features, and source-specific multicast 

5.60 Implement IPv6 multicast, PIM, and related multicast protocols, such as Multicast Listener Discovery (MLD) 

6.00 Implement Network Security 

6.01 Implement access lists 

6.02 Implement Zone Based Firewall 

6.03 Implement Unicast Reverse Path Forwarding (uRPF) 

6.04 Implement IP Source Guard 

6.05 Implement authentication, authorization, and accounting (AAA) (configuring the AAA server is not required, only the client-side (IOS) is configured) 

6.06 Implement Control Plane Policing (CoPP) 

6.07 Implement Cisco IOS Firewall 

6.08 Implement Cisco IOS Intrusion Prevention System (IPS) 

6.09 Implement Secure Shell (SSH) 

6.10 Implement 802.1x 

6.11 Implement NAT

6.12 Implement routing protocol authentication 

6.13 Implement device access control 

6.14 Implement security features 

7.00 Implement Network Services 

7.10 Implement Hot Standby Router Protocol (HSRP) 

7.20 Implement Gateway Load Balancing Protocol (GLBP) 

7.30 Implement Virtual Router Redundancy Protocol (VRRP) 

7.40 Implement Network Time Protocol (NTP) 

7.50 Implement DHCP 

7.60 Implement Web Cache Communication Protocol (WCCP) 

8.00 Implement Quality of Service (QoS) 

8.10 Implement Modular QoS CLI (MQC) 

(a) Network-Based Application Recognition (NBAR) 

(b) Class-based weighted fair queuing (CBWFQ), modified deficit round robin (MDRR,)

and low latency queuing (LLQ)

(c) Classification 

(d) Policing 

(e) Shaping

(e) Marking 

(e) Weighted random early detection (WRED) and random early detection (RED) 

(e) Compression 

8.20 Implement Layer 2 QoS: weighted round robin (WRR), shaped round robin (SRR), and policies 

8.30 Implement link fragmentation and interleaving (LFI) for Frame Relay 

8.40 Implement generic traffic shaping 

8.50 Implement Resource Reservation Protocol (RSVP) 

8.60 Implement Cisco AutoQoS 

9.00 Troubleshoot a Network 

9.10 Troubleshoot complex Layer 2 network issues 

9.20 Troubleshoot complex Layer 3 network issues 

9.30 Troubleshoot a network in response to application problems 

9.40 Troubleshoot network services 

9.50 Troubleshoot network security 

10.00 Optimize the Network 

10.01 Implement syslog and local logging 

10.02 Implement IP Service Level Agreement SLA 

10.03 Implement NetFlow 

10.04 Implement SPAN, RSPAN, and router IP traffic export (RITE) 

10.05 Implement Simple Network Management Protocol (SNMP) 

10.06 Implement Cisco IOS Embedded Event Manager (EEM) 

10.07 Implement Remote Monitoring (RMON)

10.08 Implement FTP 

10.09 Implement TFTP 

10.10 Implement TFTP server on router 

10.11 Implement Secure Copy Protocol (SCP) 

10.12 Implement HTTP and HTTPS 

10.13 Implement Telnet 

CCIE Routing & Switching Lab Exam Topics v4.0 (Blueprint)

CCIE Security Lab Version 3

An Expert level Certification is not a bad think to have in these times when anyone with anything to do with Security finds himself being flooded by offers. So the question is whether you would be able to measure up to the gigantic challenge which Cisco through at you in the form of CCIE Security.

 

New Version of CCIE will introduce many exciting new technologies like Cisco Get VPN, VTI, Zone-based Firewall, advance inspection, EZVPN enhancement, Anyconnet VPN, Advance DMVPN and many more. You will have to content with Cisco ASA IOS 8.x IPS 4200 version 6.x, ISR Routers and 3560 switches.

 

CCIE Security Pre-Qualification

Security arguably is the toughest track and we want to ensure that you are ready for the challenge. Candidates are expected to have prior exposure to security related technologies Like Firewall, IPSec VPN, Sensors basic knowhow of Core Routing and Switching certifications likes CCSP is preferred.

 

All the Security candidates will appear for a two hour "Pre-labs" so real evaluation is possible. Please bear in mind that "Pre-Labs" will not be CCIE level they will be far simpler. Our CCIE Lab training design is based on assumption that Candidates have already acquired necessary Level of Practical exposure expected at this level and they will measure just that.

• CCIE Security Lab Gear

• Two ASA 5510 Security Plus, IOS 8.04

• IPS 4215 with 6.0 IOS

• Four 1841 ISR Routers with 12.4T IOS

• Two 2811 ISR Router with 12.4T IOS

• Two 3560 Multilayer Switch with Advanceipservice12.2

IMPLEMENT SECURE NsETWORKS USING CISCO ASA FIREWALLS: 

• Perform basic firewall initialization.

• Configure device management.

• Configure address translation (nat,global,static)

• Configure ACLS.

• Configure IP routing

• Configure object groups

• Configure VLANs

• Configure filtering

• Configure failover

• Configure Layer 2 Transparent Firewall

• Configure security contexts (virtual firewall)

• Configure Modular Policy Framework

• Configure Application-Aware inspection

• Configure high availability solutions

• Configure QoS policies.

IMPLEMENT SECURE NETWORKS USING CISCO IOS FIREWALLS:

• Configure CBAC

• Configure Zone-Based Firewall

• Configure Audit

• Configure Auth Proxy

• Configure PAM

• Configure access control

• Configure performance tuning

• Configure advanced IOS Firewall features

IMPLEMENT SECURE NETWORKD USING CISCO VPN SOLUTIONS:

• Configure IPsec LAN-to-LAN ( IOS/ASA)

• Configure SSL VPN (IOS/ASA)

• Configure Dynamic Multipoint VPN (DMVPN)

• Configure group Encrypted Transport (GET)VPN

• Configure Easy VPN (IOS/ASA)

• Configure CA ( PKI)

• Configure Remote Access VPN

• Configure Cisco Unity Client

• Configure Clientless WebVPN

• Configure Any connect VPN

• Configure XAuth, Split-Tunnel, RRI, NAT-T

• Configure High Availability

• Configure QoS for VPN

• Configure GRE, mGRE

• Configure L2TP

• Configure advanced Cisco VPN features.

CONFIGURE CISCO IPS TO MITIGATE NETWORK THREATS:

• Configure IPS 4200Series Sensor Appliance

• Initialize the Sensor Appliance

• Configure Sensor Appliance management

• Configure Virtual Sensors on the sensor Appliance

• Configure security policies

• Configure promiscuous and inline monitoring on the sensor Appliancee

• Configure and tune signatures on the sensor Appliance

• Configure custom signatures on the sensor Appliance

• Configure blocking on the Sensor Appliance

• Configure TCP resets on the Sensor Appliance

• Configure rate limiting on the sensor Appliance

• Configure signature engines on the Sensor Appliance

• Use IDM to configure the Sensor Appliance

• Configure event action on the Sensor Appliance

• Configure event monitoring on the Sensor Appliance

• Configure advanced features on the Sensor Appliance

• Configure and tune Cisco IOS IPS

• Configure SPAN & RSPAN on Cisco switches.

IMPLEMENT IDENTITY MANAGEMENT:

• Configure RADIUS and TACACS-security protocols

• Configure LDAP

• Configure Cisco Secure ACS

• Configure certificate -based authentication

• Configure proxy authentication

• Configure 802.1x

• Configure advanced identity management features

• Configure Cisco NAC Framework

IMPLEMENT CONTROL PLANE AND MANAGEMENT PLANE SECURITY:

• Implement routing plane security features ( protocol authentication .route filtering)

• Configure Control Plane Policing

• Configure CP protection and management protection

• Configure broadcast control and switch port security

• Configure additional CPU protection mechanisms (options drop, logging interval)

• Disable unnecessary services

• Control device access ( Telnet, HTTP, SSH, privilege levels)

• Configure SNMP , Syslog , AAA, NTP

• Configure service authentication (FTP,Telnet, HTTP, other)

• Configure RADIUS and TACACS + security protocols

• Configure device management and security

CONFIGURE ADVANCED SECURITY:

• Configure mitigation techniques to respond to network attacks.

• Configure packet marketing techniques

• Implement security RFCs (RFC1918/3330, RFC2827/3704)

• Configure Black Hole and sink hole solutions

• Configure RTBH filtering ( Remote Triggered Black Hole)

• Configure Traffic Filtering using Access-Lists

• Configure IOS NAT

• Configure TCP intercept

• Configure uRPF

• Configure CAR

• Configure NBAR

• Configure Net Flow

• Configure Anti-Spoofing solutions

• Configure policing

• Capture and utilize Traffic control and congestion Management

• Configure Cisco Catalyst advanced security features

IDENTITY AND MITIGATE NETWORK ATTACKS:

• Identify and protect against fragmentation attacks

• Identify and protect against malicious IP option usage

• Identify and protect against network reconnaissance attacks

• Identify and protect against IP spoofing attacks

• Identify and protect against MAC spoofing attacks

• Identify and protect against ARP spoofing attacks

• Identify and protect against Denial of service ( DoS ) attacks

• Identify and protect against Distributed Denial of service (DDoS) attacks

• Identify and protect against Man-in-the-Middle (MIM) attacks

• Identify and protect against port redirection attacks

• Identify and protect against DHCP attacks

• Identify and protect against DNS attacks

• Identify and protect against Smurf attacks

• Identify and protect against SYN attacks

• Identify and protect against MAC Flooding attacks

• Identify and protect against VLAN hopping attacks

• Identify and protect against various Layer2 and Layer3 attacks

 

 

 

 Our CCIE Lab.

Cisco Equipment for CCIE LAB                                        Qty

Cisco ISR Router  1841 with WIC-2T(6nos) flash 64 MB   ----- 9

Cisco  Switch 3750 24 port ------------- 1

Cisco Switch 3550 EMI  image layer 3 24 port ------------- 4

Cisco Terminal server 2511 with 16 octal cable----------- 1

Cisco 2621XM  used as framrelay switch with 4S NM and  WIC 2T ---- 1

24 U RACK----------- 1

Serial cables 10--------- 10

 BCA Bachelor Of Computer Application, BCCA, Bachelor of Commerce & Computer Application BE IT/CS, Information technology/Computer Science MCA, Master of Computer Application MCM, Master of Computer Management Diploma , Polytechnic Others,

Basic Programming

C / C++ ,

Testing

Software Testing,

Hardware & Networking

CCNA, CCNP CCIE MCSE, Hardware, Networking

Courses at Atlanta

New Batches start Every week On Mondays and Wednesdays.

New Batch Starting Date & Timing

Copyright © 2010-2023 All Right Reserved - Atlanta Computer Institute, Nagpur.