CCNP ENCOR v8 Chapter & Final Exam Design Documents

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 19

Chapter / Title

Section
1 Packet Forwarding
1.1
1.2
2 Spanning Tree Protocol
2.1

2.2
3 Advanced Spanning Tree
3.1
3.2
4 Multiple Spanning Tree Protocol
4.1
5 VLAN Trunks and EtherChannel Bundles
5.1
5.2
5.3
Chapter Group Exam - L2 Redundancy
6 IP Routing Essentials

6.1

6.2
6.3
6.4
7 EIGRP
7.1
7.2
7.3

7.4

Chapter Group Exam - Routing Essentials and


EIGRP
8 OSPF
8.1
8.2
8.3
8.4
9 Advanced OSPF
9.1
9.2
9.3
9.4
9.5
9.6
10 OSPFv3
10.1
10.2
10.3
Chapter Group Exam - OSPF
11 BGP
11.1
11.2
11.3
11.4
12 Advanced BGP
12.1
12.2

12.3
12.4

12.5
12.6
Chapter Group Exam - BGP
13 Multicast

13.1
13.2

13.3

13.4

13.5

14 QoS
14.1
14.2
14.3

14.4
14.5

Chapter Group Exam - Multicast and QoS


15 IP Services

15.1
15.2
15.3

16 Overlay Tunnels

16.1
16.2
16.3

16.4

Chapter Group Exam - IP Services and VPNs


17 Wireless Signals and Modulation

17.1
17.2
17.3

17.4
17.5
18 Wireless ArchitectureInfrastructure

18.1
18.2
18.3
19 Understanding Wireless Roaming and Location Ser

19.1

19.2
19.3

Chapter Group Exam - Wireless Essentials


20 Wireless SecurityAuthenticating Wireless Clients

20.1

20.2

20.3

20.4

21 Wireless TroubleshootingTroubleshooting Wireless


21.1
21.2
Chapter Group Exam - Wireless Security and
Connectivity
22 Enterprise Network Architecture
22.1

22.2

23 FabricSDN Technologies
23.1

23.2
23.3
23.4
23.5
23.6

24 Network Assurance

24.1
24.2
24.3
24.4

24.5
24.6

24.7

24.8
Chapter Group Exam - Network Design and
Monitoring
25 Secure Access Control
25.1

25.2

25.3
26 Network Device Access Control and Infrastructure

26.1

26.2

26.3
26.4

26.5

26.6

Chapter Group Exam - Access Control and


Infrastructure Security
27 Virtualization

27.1
27.2

28 Foundational Network Programmability Concepts

28.1
28.2
28.3

28.4
28.5
28.6
28.7
28.8

28.9

28.10
29 Introduction to Automation Tools
29.1

29.2

Chapter Group Exam - Virtulization, Automation,


and Programmability
Learning Objective Section

Compare hardware and software switching mechanisms. 6 of 6


Explain how L2 and L3 devices forward traffic.
Explain the process of hardware and software Cisco Express Forwarding.
Configure spanning tree protocol in a switched environment. 6 of 7
Explain the purpose of the spanning tree protocol in a switched LAN
environment with redundant inter-switch links.
Explain how Rapid PVST+ operates.
Configure STP with protection mechanisms. 6 of 6
Explain how to modify the root bridge to control the topology.
Configure BPDU Guard and LoopGuard to protect an STP installation.
Configure multiple versions of the spanning tree protocol. 6 of 7
Configure multiple versions of the spanning tree protocol.
Troubleshoot EtherChannel on switched networks. 6 of 12
Troubleshoot VLAN and trunk configurations in a switched network.
Configure Dynamic Trunking Protocol (DTP).
Configure EtherChannel.

Configure routers using different algorithms to determine the best path. 14 of 14

Compare algorithms used by different routing protocols to forward packets.

Explain how routers determine the best path.


Configure static, default, and floating static routes.
Describe virtual routing and forwarding (VRF).
Configure EIGRP to improve network performance. 14 of 14
Describe the basic features of EIGRP.
Describe the algorithm used by EIGRP to determine the best path.
Explain how different types of packets are used to establish and maintain an
EIGRP neighbor relationship.
Configure EIGRP autosummarization.

Configure OSPF to improve network performance. 9 of 9


Explain the features and characteristics of the OSPF routing protocol.
Configure single-area OSPFv2 in a point-to-point network.
Configure OSPF to propagate a default route.
Configure OSPF to improve network performance.
Use advanced OSPF features to optimize network performance. 11 of 14
Explain why multiarea OSPF is used.
Explain how multiarea OSPFv2 uses link state advertisements.
Explain how to connect discontiguous areas in OSPFv2.
Explain how OSPF determines the best path.
Configure summarization between OSPF areas.
Explain how to filter routes in OSPFv2 to improve performance.
Implement single-area OSPFv3. 10 of 11
Compare the characteristics and operations of OSPFv2 to OSPFv3.
Configure single-area OSPFv3.
Explain how IPv4 traffic is supported in OSPFv3.

Configure eBGP in a single-homed remote access network. 15 of 15


Describe basic BGP features.
Configure an eBGP branch connection.
Configure summarization in BGP to improve performance.
Configure BGP to support and summarize IPv6 traffic.
Explain how advanced BGP features improve performance. 15 of 16
Explain how BGP multihoming to ISPs provides resilient internet service.
Explain how ACLs and prefix matching assist in fine tuning the BGP routing
process.
Explain the purpose of Route-maps in BGP.
Explain how BGP uses route filtering and manipulation to improve
performance.
Explain the function and purpose of BGP communities.
Explain the processes used by BGP for path selection.

Explain the concepts and protocols that are required to understand multicast 14 of 15
operation.
Describe the overall concepts and need for multicasting.
Describe the address scopes used by multicast to operate at layer 2 and layer
3.
Explain how IGMP v2 and IGMP v3 allow multicast groups to start receiving
multicast traffic.
Explain the concepts, operation and features of the multicast routing protocol
PIM.
Describe the purpose, function, and operation of a rendezvous point in the
multicast network.
Explain the mechanisms used by QoS to ensure transmission quality. 15 of 17
Explain how network transmission characteristics impact quality.
Describe the different QoS models.
Describe how QoS classifies and marks traffic based on conditioning policies.

Explain how policing and shaping algorithms affect excess IP traffic.


Explain how congestion management and avoidance tools are used to avoid
network congestion.

Configure IP services for managed networks that provide redundancy, address 15 of 18


translation and synchronization.
Implement NTP between an NTP client and NTP server.
Configure HSRP using Cisco IOS commands.
Configure NAT services on the edge router to provide IPv4 address scalability.

Configure overlay tunnels to secure site-to-site and remote access connectivity. 15 of 18

Configure a site-to-site GRE tunnel.


Explain how the IPsec framework is used to secure network traffic.
Explain how the routing architecture, LISP, addresses internet routing
scalability problems.
Explain how a virtual extensible local area network (VXLAN) scheme
addresses issues in traditional layer 2 networks.

Explain the theory of wireless signals and the methods used to carry data 10 of 11
wirelessly.
Describe the technology and characteristics of radio frequency signals (RF).
Explain methods used to carry data over an RF signal.
Identify the standards and methods used to maintain AP to client
compatibility.
Explain how to use multiple radio components to scale performance.
Explain techniques used to maximize AP to client throughput.
Select appropriate wireless topologies and antennas to allow APs to pair with 10 of 11
WLCs in an enterprise network.
Compare how APs operate in autonomous and lightweight mode.
Explain how lightweight APs pair with WLCs.
Select appropriate antennas for APs based on requirements.
Explain how to configure a wireless network to support and manage wireless 10 of 11
roaming.
Explain how mobile clients roam between autonomous APs and
intracontrollers.
Explain L2 and L3 roaming strategies.
Describe techniques and business rationale for locating devices in a wireless
network.

Compare different methods to authenticate wireless clients before gaining 15 of 18


access to the wireless network.
Explain when wireless clients should access a network using open
authentication.
Explain how to configure secure wireless connections on a WLAN using
authentication with a pre-shared key.
Explain how to configure secure wireless connections on a WLAN using
authentication with EAP.
Explain how to configure secure wireless connections on a WLAN using
authentication with WebAuth.
Troubleshoot wireless connectivity issues using tools and strategies. 15 of 15
Troubleshoot connectivity issues with a single wireless client.
Explain how to troubleshoot connectivity issues at the AP.

Explain the characteristics of scalable network architectures. 10 of 11


Describe the three layers of a hierarchical network and how they are used in
network design.
Explain how enterprise campus architectures can be used to scale from a
small environment to a large campus-size network.
Explain how fabric networks allow traditional networks to be more 10 of 11
manageable, flexible, secure, and scalable.
Explain how SD-Access is effective for configuration and maintenance in
growing and ever-changing networks.
Describe the two main components of SD-Access.
Explain the functions of the four layers of SD-Access architecture.
Describe the benefits of utilizing an SD-WAN.
Describe Cisco's current solutions for SD-WAN.
Explain how the SD-WAN Cloud ONRamp solution addresses optimal cloud
SaaS application access and IaaS connectivity.
Troubleshoot an enterprise network using common tools and techniques. 10 of 16

Configure NetFlow to monitor traffic in a business network.


Explain the features and characteristics of SPAN.
Troubleshoot common and advanced network problems.
Explain how to configure SPAN to capture packets on local switch ports.

Compare the use of local SPAN and RSPAN.


Explain how to configure ERSPAN to monitor traffic in one area of the
network and route the SPAN traffic to a traffic analyzer in another area of the
network.

Use an ICMP echo-based IP SLA to troubleshoot network connectivity issues.

Explain how Cisco DNA center enable intent-based networking.

Compare secure solutions for different places in the network (PINs). 15 of 16


Describe Cisco SAFE, a security architectural framework, that helps design
secure solutions for PINs.
Explain how to design endpoint security that will detect the rapidly evolving
threats to organizations.
Compare current and next generation network access control technologies.
Configure network access control using tools and features that provide device 15 of 16
and infrastructure security.
Verify the functionality of a configured ACL in relation to the network
topology.
Explain techniques that secure and control access to VTY lines on network
devices.
Configure access control using the local database and AAA server.
Explain how to configure zone-based firewalls to provide stateful network
security.
Configure ACLs with CoPP policies that protect the CPU from unexpected
extreme rates of traffic.
Configure network devices with device hardening features to mitigate
security threats.

Explain the purpose and characteristics of network and server virtualization. 10 of 11

Describe the virtualization of network devices and services.


Explain how the Network Functions Virtualization (NFV) architectural
framework decouples network functions from hardware-based appliances.
Explain common network programmability concepts and programmatic 10 of 11
methods of management.
Explain the pros and cons of using the CLI to manage devices on a network.
Explain how APIs enable computer to computer communications.
Describe tools and resources related to using APIs and REST functions.

Compare JSON and XML data formats.


Explain how Cisco DNA center enable intent-based networking.
Compare the use of vManage APIs to Cisco DNA Center APIs.
Describe data models and tools used in a programmatic approach.
Explain how DevNet encourages communities of network programmers.

Explain how GitHub tracks changes in your files and facilitates collaboration
and code sharing.
Use Python to access and manipulate values in lists and dictionaries.
Explain the benefits and operation of various automation tools. 9 of 12
Explain how the Embedded Event Manager is used to automate configuration,
troubleshooting, and data collection.
Compare the configuration management tools Puppet, Chef, Ansible, and
SaltStack.
Templates Total Items

1 of 10 7

31
1 of 10 15

1 of 10 15

30
9

11

10
30
1 of 10 16

15

31
1 of 10 15

15

30
15

15
30
10

10

10

30
15

15

30

10

10
1 of 10 11

31

15

15

30

10
10

1 of 10 10

30
Chapter Title

1 Packet Forwarding

2 Spanning Tree Protocol


3 Advanced Spanning Tree

4 Multiple Spanning Tree Protocol

5 VLAN Trunks and EtherChannel Bundles

6 IP Routing Essentials

7 EIGRP
8 OSPF

9 Advanced OSPF
10 OSPFv3

11 BGP

12 Advanced BGP

13 Multicast

14 QoS

15 IP Services

16 Overlay Tunnels

17 Wireless Signals and Modulation

18 Wireless ArchitectureInfrastructure
Understanding Wireless Roaming and
19 Location Services

Wireless SecurityAuthenticating Wireless


20 Clients

Wireless TroubleshootingTroubleshooting
21 Wireless Connectivity
22 Enterprise Network Architecture

23 FabricSDN Technologies

24 Network Assurance

25 Secure Access Control

Network Device Access Control and


26 Infrastructure Security

27 Virtualization

Foundational Network Programmability


28 Concepts

29 Introduction to Automation Tools


Learning Objective Section Template Total Items
Compare hardware and software switching mechanisms. 2 of 5 2

Configure spanning tree protocol in a switched 2 of 3 2


environment.
Configure STP with protection mechanisms. 2 of 5 2
Configure multiple versions of the spanning tree 2 of 5 2
protocol.
Troubleshoot EtherChannel on switched networks. 2 of 5 2

Configure routers using different algorithms to 2 of 5 2


determine the best path.
Configure EIGRP to improve network performance. 2 of 5 2

Implement multiarea OSPFv2. 2 of 4 2


Use advanced OSPF features to optimize network 2 of 5 1 of 10 3
performance.
Implement single-area OSPFv3. 2 of 5 2
Configure eBGP in a single-homed remote access 2 of 5 2
network.
Explain how advanced BGP features improve 2 of 5 2
performance.
Explain the concepts and protocols that are required to 2 of 5 2
understand multicast operation.
Explain the mechanisms used by QoS to ensure 2 of 5 2
transmission quality.
Configure IP services for managed networks that provide 2 of 5 2
redundancy, address translation and synchronization.

Configure overlay tunnels to secure site-to-site and 2 of 5 2


remote access connectivity.
Explain the theory of wireless signals and the methods 2 of 5 2
used to carry data wirelessly.
Select appropriate wireless topologies and antennas to 2 of 5 2
allow APs to pair with WLCs in an enterprise network.

Explain how to configure a wireless network to support 2 of 5 2


and manage wireless roaming.
Compare different methods to authenticate wireless 2 of 4 2
clients before gaining access to the wireless network.

Troubleshoot wireless connectivity issues using tools 2 of 6 2


and strategies.
Explain the characteristics of scalable network 2 of 5 2
architectures.
Explain how fabric networks allow traditional networks 2 of 5 2
to be more manageable, flexible, secure, and scalable.

Troubleshoot an enterprise network using common 2 of 5 2


tools and techniques.
Compare secure solutions for different places in the 2 of 5 1 of 10 3
network (PINs).
Configure network access control using tools and 2 of 5 2
features that provide device and infrastructure security.

Explain the purpose and characteristics of network and 2 of 5 2


server virtualization.
Explain common network programmability concepts and 2 of 5 2
programmatic methods of management.

Explain the benefits and operation of various 2 of 6 2


automation tools.
Total 60

You might also like