0% found this document useful (0 votes)
74 views

Prop Logic

The document outlines topics related to networking fundamentals including network models, protocols, infrastructure components, network architectures, topologies, cabling, addressing, routing, switching, WAN technologies, infrastructure services, security, and management. Specific topics covered include configuring and troubleshooting IPv4 and IPv6 addressing, routing protocols, VLANs, switching technologies, infrastructure services like DNS, DHCP, NAT and QoS.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views

Prop Logic

The document outlines topics related to networking fundamentals including network models, protocols, infrastructure components, network architectures, topologies, cabling, addressing, routing, switching, WAN technologies, infrastructure services, security, and management. Specific topics covered include configuring and troubleshooting IPv4 and IPv6 addressing, routing protocols, VLANs, switching technologies, infrastructure services like DNS, DHCP, NAT and QoS.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

NETWORK FUNDAMENTALS 1.

9 Configure, verify, and troubleshoot IPv4


addressing and subnetting
1.1 Compare and contrast OSI and TCP/IP
models 1.10 Compare and contrast IPv4 address
types
1.2 Compare and contrast TCP and UDP
protocols  1.10.a Unicast
 1.10.b Broadcast
1.3 Describe the impact of infrastructure  1.10.c Multicast
components in an enterprise network
1.11 Describe the need for private IPv4
 1.3.a Firewalls addressing
 1.3.b Access points
 1.3.c Wireless controllers 1.12 Identify the appropriate IPv6
addressing scheme to satisfy addressing
1.4 Describe the effects of cloud resources requirements in a LAN/WAN environment
on enterprise network architecture
1.13 Configure, verify, and troubleshoot
 1.4.a Traffic path to internal and IPv6 addressing
external cloud services
 1.4.b Virtual services 1.14 Configure and verify IPv6 Stateless
 1.4.c Basic virtual network Address Auto Configuration
infrastructure
1.15 Compare and contrast IPv6 address
1.5 Compare and contrast collapsed core and types
three-tier architectures
 1.15.a Global unicast
1.6 Compare and contrast network  1.15.b Unique local
topologies  1.15.c Link local
 1.15.d Multicast
 1.6.a Star  1.15.e Modified EUI 64
 1.6.b Mesh  1.15.f Autoconfiguration
 1.6.c Hybrid  1.15.g Anycast

1.7 Select the appropriate cabling type based


on implementation requirements

1.8 Apply troubleshooting methodologies to


resolve problems

 1.8.a Perform and document fault


isolation
 1.8.b Resolve or escalate
 1.8.c Verify and monitor resolution
LAN Switching Technologies  2.8.a Cisco Discovery Protocol
 2.8.b LLDP
2.1 Describe and verify switching concepts
2.9 Configure, verify, and troubleshoot
 2.1.a MAC learning and aging (Layer 2/Layer 3) EtherChannel
 2.1.b Frame switching
 2.1.c Frame flooding  2.9.a Static
 2.1.d MAC address table  2.9.b PAGP
 2.9.c LACP
2.2 Interpret Ethernet frame format
2.10 Describe the benefits of switch stacking
2.3 Troubleshoot interface and cable issues and chassis aggregation
(collisions, errors, duplex, speed)

2.4 Configure, verify, and troubleshoot


VLANs (normal/extended range) spanning
multiple switches

 2.4.a Access ports (data and voice)


 2.4.b Default VLAN

2.5 Configure, verify, and troubleshoot


interswitch connectivity

 2.5.a Trunk ports


 2.5.b Add and remove VLANs on a
trunk
 2.5.c DTP, VTP (v1&v2), and
802.1Q
 2.5.d Native VLAN

2.6 Configure, verify, and troubleshoot STP


protocols

 2.6.a STP mode (PVST+ and


RPVST+)
 2.6.b STP root bridge selection

2.7 Configure, verify and troubleshoot STP


related optional features

 2.7.a PortFast
 2.7.b BPDU guard

2.8 Configure and verify Layer 2 protocols


Routing Technologies  3.8.b Network route
 3.8.c Host route
3.1 Describe the routing concepts  3.8.d Floating static

 3.1.a Packet handling along the path 3.9 Configure, verify, and troubleshoot
through a network single area and multi-area OSPFv2 for IPv4
 3.1.b Forwarding decision based on (excluding authentication, filtering, manual
route lookup summarization, redistribution, stub, virtual-
 3.1.c Frame rewrite link, and LSAs)

3.2 Interpret the components of a routing 3.10 Configure, verify, and troubleshoot
table single area and multi-area OSPFv3 for IPv6
(excluding authentication, filtering, manual
 3.2.a Prefix summarization, redistribution, stub, virtual-
 3.2.b Network mask link, and LSAs)
 3.2.c Next hop
 3.2.d Routing protocol code 3.11 Configure, verify, and troubleshoot
 3.2.e Administrative distance EIGRP for IPv4 (excluding authentication,
 3.2.f Metric filtering, manual summarization,
 3.2.g Gateway of last resort redistribution, stub)

3.3 Describe how a routing table is 3.12 Configure, verify, and troubleshoot
populated by different routing information EIGRP for IPv6 (excluding authentication,
sources filtering, manual summarization,
redistribution, stub)
 3.3.a Admin distance
3.13 Configure, verify, and troubleshoot
3.4 Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication,
inter-VLAN routing filtering, manual summarization,
redistribution)
 3.4.a Router on a stick
 3.4.b SVI 3.14 Troubleshoot basic Layer 3 end-to-end
connectivity issues
3.5 Compare and contrast static routing and
dynamic routing

3.6 Compare and contrast distance vector


and link state routing protocols

3.7 Compare and contrast interior and


exterior routing protocols

3.8 Configure, verify, and troubleshoot IPv4


and IPv6 static routing

 3.8.a Default route


WAN Technologies Infrastructure Services

Configure and verify PPP and MLPPP on 5.1 Describe DNS lookup operation
WAN interfaces using local authentication
5.2 Troubleshoot client connectivity issues
4.2 Configure, verify, and troubleshoot involving DNS
PPPoE client-side interfaces using local
authentication 5.3 Configure and verify DHCP on a router
(excluding static reservations)
4.3 Configure, verify, and troubleshoot GRE
tunnel connectivity  5.3.a Server
 5.3.b Relay
4.4 Describe WAN topology options  5.3.c Client
 5.3.d TFTP, DNS, and gateway
 4.4.a Point-to-point options
 4.4.b Hub and spoke
 4.4.c Full mesh 5.4 Troubleshoot client- and router-based
 4.4.d Single vs dual-homed DHCP connectivity issues

4.5 Describe WAN access connectivity 5.5 Configure, verify, and troubleshoot basic
options HSRP

 4.5.a MPLS  5.5.a Priority


 4.5.b Metro Ethernet  5.5.b Preemption
 4.5.c Broadband PPPoE  5.5.c Version
 4.5.d Internet VPN (DMVPN, site-
to-site VPN, client VPN) 5.6 Configure, verify, and troubleshoot
inside source NAT
4.6 Configure and verify single-homed
branch connectivity using eBGP IPv4  5.6.a Static
(limited to peering and route advertisement  5.6.b Pool
using Network command only)  5.6.c PAT

4.7 Describe basic QoS concepts 5.7 Configure and verify NTP operating in a
client/server mode
 4.7.a Marking
 4.7.b Device trust
 4.7.c Prioritization
o 4.7.c. [i] Voice
o 4.7.c. [ii] Video
o 4.7.c. [iii] Data
 4.7.d Shaping
 4.7.e Policing
 4.7.f Congestion management
Infrastructure Security Infrastructure Management

6.1 Configure, verify, and troubleshoot port 7.1 Configure and verify device-monitoring
security protocols

 6.1.a Static  7.1.a SNMPv2


 7.1.b SNMPv3
 6.1.b Dynamic
 7.1.c Syslog
 6.1.c Sticky
 6.1.d Max MAC addresses
7.2 Troubleshoot network connectivity issues
 6.1.e Violation actions using ICMP echo-based IP SLA
 6.1.f Err-disable recovery
7.3 Configure and verify device management
6.2 Describe common access layer threat
mitigation techniques  7.3.a Backup and restore device
configuration
 6.2.a 802.1x  7.3.b Using Cisco Discovery Protocol or
 6.2.b DHCP snooping LLDP for device discovery
 6.2.c Nondefault native VLAN  7.3.c Licensing
 7.3.d Logging
6.3 Configure, verify, and troubleshoot IPv4  7.3.e Timezone
 7.3.f Loopback
and IPv6 access list for traffic filtering
7.4 Configure and verify initial device
 6.3.a Standard
configuration
 6.3.b Extended 7.5 Perform device maintenance
 6.3.c Named
 7.5.a Cisco IOS upgrades and recovery
6.4 Verify ACLs using the APIC-EM Path (SCP, FTP, TFTP, and MD5 verify)
Trace ACL analysis tool  7.5.b Password recovery and
configuration register
6.5 Configure, verify, and troubleshoot basic  7.5.c File system management
device hardening
7.6 Use Cisco IOS tools to troubleshoot and
 6.5.a Local authentication resolve problems
 6.5.b Secure password
 6.5.c Access to device  7.6.a Ping and traceroute with extended
o 6.5.c. [i] Source address
option
 7.6.b Terminal monitor
o 6.5.c. [ii] Telnet/SSH
 7.6.c Log events
 6.5.d Login banner  7.6.d Local SPAN

6.6 Describe device security using AAA 7.7 Describe network programmability in
with TACACS+ and RADIUS enterprise network architecture

 7.7.a Function of a controller


 7.7.b Separation of control plane and
data plane
 7.7.c Northbound and southbound APIs

You might also like