CCDE Exam Blueprint v2

download CCDE Exam Blueprint v2

of 7

Transcript of CCDE Exam Blueprint v2

  • 8/9/2019 CCDE Exam Blueprint v2

    1/7

    CCDE Exam Blueprint v2.doc Cisco Systems, Inc. Page 1 of 7

    CCDEWritten Exam Blueprint

    The following blueprint provides general guidelines for the content to be included on theADVDESIGN beta exam.

    1. IP Routing

    a. Explain route aggregation concepts and techniques1. Purpose of route aggregation2. Scalability and fault isolation3. How to Aggregate

    b. Explain the theory and application of network topology abstraction and layering1. Layers and their purpose2. Core, aggregation, distribution, access3. Purpose of Link State Topology Summarization4. What is the purpose of LS topology summarization (not how it works)5. Use of Link State Topology Summarization6. Where and how to build a flooding domain border

    c. Explain the impact of fault isolation and resiliency on network design1. What is the impact of fault isolation on network reliability

    2. Separating rapid and/or massive changes from the remainder of the network, how to createfault isolation3. What is fate sharing, and what is it's impact4. What is the impact of redundancy on convergence times

    d. Explain metric based traffic flow and modification1. How to engineer metrics to modify traffic flow2. "MPLS vs. IGP Traffic Engineering

    a. Modifying IGP Metrics to Engineer Traffic Flow"i. Understanding Traffic Flow & Metricsii. Third Party Next Hopiii. Impact on redistribution design

    e. Explain fast convergence techniques and mechanisms1. Layer 2 Down Detection2. For all media types3. Fast hello timers4. OSPF, EIGRP, IS-IS, BGP5. Fast SPF Timers6. OSPF, IS-IS7. Recursion and Convergence8. Impact of Third Party Next Hop & BGP recursion

    f. Explain routing protocol operation1. Neighbor Relationships2. OSPF, EIGRP, IS-IS, BGP3. Determining Loop Free Paths4. OSPF, EIGRP, IS-IS, BGP, MPLS Constrained SPF5. General Operation6. OSPF, EIGRP, IS-IS, BGP; How each protocol operates

    7. Flooding Domains and Stubs8. OSPF/IS-IS flooding domains, EIGRP stubs9. iBGP Mesh10. Next hop mechanisms in BGP, RR's, etc.

    g. Select lower operational costs and complexity1. Route Filters2. Simple vs. complex3. General4. Redistribution5. Simple designs, tags, route filters, etc.

  • 8/9/2019 CCDE Exam Blueprint v2

    2/7

  • 8/9/2019 CCDE Exam Blueprint v2

    3/7

    CCDE Exam Blueprint v2.doc Cisco Systems, Inc. Page 3 of 7

    2. Tunnelinga. Explain how tunneling affects end service applications

    1. Identify and select tunneling technologies appropriate to meet network design objectives.2. Identify where and when tunneling parameters must be tuned to optimize the operation of end

    user applications3. Knowledge of issues related to Layer 2 tunneling: i.e. packet ordering, MTU, etc.4. What technologies support Layer 2 and Layer 3 tunneling: L2TPv3, GRE, ATOM, IPsec, etc.5. How to implement tunneling given a specific situation: i.e. tunneling Novel IPX over a Layer 3

    service provider core, etc

    6. Understanding of issues related to tunneling L3(IP) in L2(ATM, MPLS)b. Explain, recognize, and select tunneling techniques appropriate to the size and scale of the network

    requirements1. What is the impact of different tunneling technologies on scalability (Selection of a tunneling

    technology with scalability as a criteria)2. How scalability is affected based on type of tunnels (point-to-point, point-to-multipoint)

    c. Explain how L3 routing is affected by tunneling technologies and select L3 routing protocolsappropriate to implement tunneling and as passenger traffic in tunnels

    1. How L3 routing is overlaid on a given tunneling technologies2. What L3 Routing Protocol would suit a given tunneling technology, topology and scalability

    d. Explain, recognize, and select logical and physical topologies required to meet network designrequirements

    1. What are the best points/nodes in network to initiate and terminate tunnels

    2. Which model would fulfill the requirements (full mesh, partial mesh, hierarchical)e. Explain, recognize, and select methods for interconnecting tunneling environments across one ormore service provider networks

    1. Describe different inter-provider tunneling models (i.e. 2547, GRE, IPsec, etc.f. Explain, recognize, and select methods for steering traffic with tunnels and into tunnels

    1. Class Based Tunnel Selection2. Traffic Engineering

    g. Explain, recognize, and select methods for providing network failover and redundancy to meet networkavailability requirements

    1. Restoration vs. Protection (IGP Fast Convergence, FRR)2. Non-stop Forwarding vs. Restoration (at the IP routing layer)

    h. Explain, recognize, and select methods for interconnecting different types of attachment media ontunnel endpoints. Recognize and explain the differences in mapping different L2 technologies onto anL3 tunneling environment

    1. Interworking2. Mapping Layer 2 service onto Layer 3 at the edge

    i. Explain, recognize, and select methods to manage the size and scale of broadcast domains intunneled L2VPN environments

    1. VPLS scaling issues2. Spanning Tree issues3. Broadcast issues across various topologies

  • 8/9/2019 CCDE Exam Blueprint v2

    4/7

  • 8/9/2019 CCDE Exam Blueprint v2

    5/7

    CCDE Exam Blueprint v2.doc Cisco Systems, Inc. Page 5 of 7

    g. Explain QoS based routing (PBR)1. Situations where one has to pick one or two of the following to solve a problem (and

    understanding of the following)a. BGP QoS Propagationb. MTRc. OERd. PBRe. CBTS

  • 8/9/2019 CCDE Exam Blueprint v2

    6/7

    CCDE Exam Blueprint v2.doc Cisco Systems, Inc. Page 6 of 7

    4. Managementa. Analyze network conditions and behavior to determine potential degradation or failure conditions

    1. Recognize conditions from SHOW output for data plane, control plane, hardware, etc.2. Recognize conditions from DEBUG output for data plane, control plane, hardware, etc.3. Recognize conditions from network behaviors for data plane, control plane, hardware, etc.4. Recognize conditions from external monitoring and reporting systems

    b. Explain the operation and advantages of different management access mechanisms1. How to implement out of band access to all devices in a network2. What should be considered when defining secure access to routers

    3. Recognize when and where a design will result in failurec. Explain the operation and use of network management protocols

    1. Differences between the versions of SNMP2. Knowledge of puts, gets, operations (read, write)3. Use of SNMP in SLA management4. Identify when use of CMIP is appropriate5. Identify when use of TMN is appropriate

    d. Identify network management tools and their uses1. Recognize tools used for SLA management2. Identify use of Generic On-Line Diagnostics (GOLD)3. Identify and Classify tools for Event Management4. State rules for use of Syslog5. Knowledge of where to place Netflow Collectors

    6. Identify Services required for flow collection7. Recognize Port number for Netflow8. Identify services required for event correlation

    e. Identify auditable factors in a network.1. Identify auditable factors in a network

    f. Explain traffic management concepts and actions based on traffic statistics1. What is a traffic matrix2. When to upgrade a link or re-route traffic3. Interpretation of historical data to predict future growth and needs

    g. Recognize configuration management tools and best practices1. Recognize uses of templating tools2. Identify best practices for configuration management (i.e. logging config changes, auditing "as

    running" vs "as configured," consistent feature application, etc.)3. Describe role-based configuration access

  • 8/9/2019 CCDE Exam Blueprint v2

    7/7