Вы находитесь на странице: 1из 5

IP Data- Level 2.

2
Assessment Name

Assessment Name and Level

Total No. of Questions

50

Total Marks

50

Pass Percentage

70 %

Duration of Assessment

1 hour 30 minutes

Topics

Topic Name
IP Addressing, Sub netting and VLSM
Advanced Switching - Trunking,802.1q and ISL

No. of questions
5

27

Advanced Switching - HSRP/VRRP/GLBP


Advanced Switching - Spanning Tree and Port-Security
Advanced Switching - VLAN and VTP
Advanced Switching - Port-Channels-LACP and PAgP
Routing Protocols

Cisco Wireless Network

Network Security (ACL)

ITIL

Total

50

IP Addressing, Subnetting and VLSM

IP Addresses and Subnet masks


IP Address classes and ranges
Subnetting and supernetting
VLSM IP addressing design to a network
DHCP and DNS
DHCP operations in routers and switches.

Advanced Switching - Trunking,802.1q and ISL


VLAN Trunking protocols ISL and 802.1Q
Routing Between VLANs
Configure and verify inter-VLAN routing in a Layer 2 topology using an external router, a switch
SVI, or a switch-routed interface
Configure both a switch and router to accommodate inter-VLAN packet transfer using an
external router
Layer 3 SVI
Commands used to configure an SVI
A routed port on a multilayer switch
Commands used to configure a routed port on a multilayer switch
Configure Layer 3 EtherChannel links
Configure inter-VLAN routing on a multilayer switch
Configure DHCP services on a Layer 3 switch
Deploying Multilayer Switching with Cisco Express Forwarding
Configure and verify inter-VLAN routing in a Layer 2 topology using multilayer switching with
Cisco Express Forwarding
Multilayer switching and how it differs when you are performing Layer 2 vs. Layer 3 switching
Packet and frame header rewriting performed by a multilayer switch
Layer 3 switch processing
Switching methods available on a Cisco switch
Configure Cisco Express Forwarding on a Cisco switch
Advanced Switching - HSRP/VRRP/GLBP

Configuring Layer 3 Redundancy with HSRP


Routing issues
Router redundancy process
Configure HSRP operations
Fine-tune and troubleshoot HSRP
Configuring Layer 3 Redundancy with VRRP and GLBP
VRRP operations process
Configure VRRP
GLBP operations process
Configure GLBP

Advanced Switching - Spanning Tree and Port-Security


Spanning Tree Protocol (STP) Enhancements

STP standards and operations


Implement and configure PVST,PVRST+ and MSTP
RSTP port roles
Verify RSTP configurations
Protect and optimize the operation of STP
Configure BPDUGuard, BPDUFilter, RootGuard, and LoopGuard
Configure UDLD to detect and shut down unidirectional links

Advanced Switching - VLAN and VTP

VLAN
Access VLAN and Voice VLAN
Normal VLAN and Extended VLAN
Static VLAN and Dynamic VLAN
VLAN Trunking
VLAN Trunking protocols ISL and 802.1Q
VTP, VTPv1 and VTPv2 advertisements
Native VLAN and VLAN filtering
VTP pruning
VTP Server, client and Transparent modes
VTP configurations and troubleshooting
Inter-VLAN routing and Switching
Routed ports
SVI interfaces
Layer-3 Switching

Advanced Switching - Port-Channels-LACP and PAgP


Link Aggregation with Ether-Channel
Benefits of Ether-Channel
Compare the PAgP and the LACP
Layer 2 Ether-Channel links and load balancing
Ether-channel configurations

Routing Protocols
EIGRP
EIGRP neighborship and EIGRP packets
EIGRP DUAL and metric calculation methods(K1,K2,K3,K4 and K5)
EIGRP AD,FD,Successor and Feasible Successor
EIGRP Redistribution and Summarisation
EIGRP Equal and un-equal cost load balancing
EIGRP Stuck-in-active
EIGRP Authentication
OSPF

OSPF Neighborship and OSPF packets

OSPF Network types and DR,BDR and DROTHER routers


OSPF areas Single and multiple
OSPF Redistribution and Summarisation
Configure OSPF routing
OSPF Routers - Internal, Backbone, ABR and ASBR
OSPF LSA types and OSPF areas stub filtering
OSPF virtual-links

Cisco Wireless Networks

Networking technologies used in wireless (SSID --> WLAN_ID --> Interface -- >VLAN, 802.1q
trunking)
Wireless topologies (IBSS, BSS, ESS, Point-to-Point, Point-to-Multipoint, basic Mesh, bridging)
802.11 authentication and encryption methods (Open, Shared, 802.1X, EAP, TKIP, AES)
Framework of wireless security and security components (authentication, encryption, MFP, IPS)
Authentication methods (Guest, PSK, 802.1X, WPA/WPA2 with EAP- TLS, EAP-FAST, PEAP, LEAP)
Describe and configure encryption methods (WPA/WPA2 with TKIP, AES)
Describe and configure the different sources of authentication (PSK, EAP-local or -external, Radius)
Configure authentication and encryption methods on a WLAN (WPA/WPA2 with PSK and 802.1x)
Implement wireless Guest networking

Network Security(ACL)

Access list types (Standard, Extended and Named)


Access List commands on cisco routers

References:

Microsoft Website: Introduction to TCP/IP


http://technet.microsoft.com/en-us/library/cc939986.aspx
Cisco Website:
http://www.cisco.com/cisco/web/psa/default.html?mode=tech&level0=268436015
Technology Topics(Basics):
Dial and Access
IP
LAN Switching
WAN
Etc
Skillport Resource for Wipro employees:
ICND1 and ICND2 courses
Abbreviations/Acronyms:
http://www.abbreviations.com/acronyms/TELECOM
http://www.abbreviations.com/acronyms/NETWORKING
Books:
Computer Networks Andrew Tanenbaum
Internetworking with TCP/IP Comer and Stevens
Any of CCNA (R&S) certification books
Disclaimer:
The above topics are provided for reference only. Other topics may appear from different sources such
as internal classroom trainings or the web.

Вам также может понравиться