The road maybe painful, But I won`t quit… I will definitely get my master degree together with CCIE R&S  🙂

So these are the subjects I must deal with  (so many~)

source from: http://blog.ine.com/2014/04/17/ines-ccie-rsv5-expanded-blueprint/

RSv5 Expanded Blueprint

  • 1. LAN Switching
      • 1.1. VLANs & Trunking
        • 1.1.1. Standard VLANs
        • 1.1.2. Extended VLANs
        • 1.1.3. VLAN Database
        • 1.1.4. Access Ports
        • 1.1.5. 802.1q Trunk Ports
        • 1.1.6. 802.1q Native VLAN
        • 1.1.7. Dynamic Trunking Protocol (DTP)
        • 1.1.8. Trunking Allowed List
      • 1.2. VTP
        • 1.2.1. VTP Version 1, 2, & 3
        • 1.2.2. VTP Authentication
        • 1.2.3. VTP Pruning
        • 1.2.4. VTP Prune Eligible List
        • 1.2.5. VTPv3 & Private VLANs
      • 1.3. EtherChannels
        • 1.3.1. Static Layer 2 EtherChannels
        • 1.3.2. PAgP
        • 1.3.3. LACP
        • 1.3.4. Layer 3 EtherChannel
        • 1.3.5. EtherChannel Load Balancing
        • 1.3.6. EtherChannel Protocol Limiting
        • 1.3.7. EtherChannel Misconfig Guard
      • 1.4. Spanning-Tree Protocol
        • 1.4.1. PVST+
          • 1.4.1.1. STP Root Bridge Election
          • 1.4.1.2. STP Path Selection with Port Cost
          • 1.4.1.3. STP Path Selection with Port Priority
          • 1.4.1.4. STP Convergence Timers
        • 1.4.2. Optional STP Features
          • 1.4.2.1. PortFast
          • 1.4.2.2. UplinkFast
          • 1.4.2.3. BackboneFast
          • 1.4.2.4. BPDU Guard
          • 1.4.2.5. BPDU Filter
          • 1.4.2.6. Root Guard
        • 1.4.3. Rapid-PVST+
          • 1.4.3.1. RSTP Convergence Optimizations
          • 1.4.3.2. Edge Ports
        • 1.4.4. Multiple STP
          • 1.4.4.1. MST Root Bridge Election
          • 1.4.4.2. MST Path Selection with Port Cost
          • 1.4.4.3. MST Path Selection with Port Priority
          • 1.4.4.4. MST and CST/PVST+ Interoperability
          • 1.4.4.5. Multi-Region MST
    • 1.5. 802.1q Tunneling
    • 1.5.1. L2 Protocol Tunneling
    • 1.5.2. Layer 2 MTU
        • 1.5.3. EtherChannel over 802.1q Tunneling
    • 1.6. Miscellaneous
        • 1.6.1. CDP
        • 1.6.2. LLDP
        • 1.6.3. UDLD
        • 1.6.4. CAM Aging Time
        • 1.6.5. SPAN
        • 1.6.6. RSPAN
        • 1.6.7. ERSPAN
        • 1.6.8. Flex Links
      • 1.6.9. Fallback Bridging
      • 1.6.10. Voice VLANs
      • 1.6.11. Smartport Macros
  • 2. Layer 2 WAN Circuits
    • 2.1. HDLC
    • 2.2. PPP
    • 2.3. PPP Authentication
    • 2.4. PPP Multilink
    • 2.5. PPPoE
  • 3. IP Routing
    • 3.1. Protocol Independent IPv4 Routing
      • 3.1.1. IPv4 Addressing
      • 3.1.2. IPv4 ARP
      • 3.1.3. Longest Match Routing
      • 3.1.4. Administrative Distance
      • 3.1.5. Static Routing
      • 3.1.6. Route Recursion
      • 3.1.7. Egress Interface vs. Next Hop Static Routing
      • 3.1.8. Default Routing
      • 3.1.9. CEF
      • 3.1.10. Floating Static Routes
      • 3.1.11. Backup Interface
      • 3.1.12. IP Service Level Agreement
      • 3.1.13. Enhanced Object Tracking
      • 3.1.14. Policy Routing
      • 3.1.15. Policy Routing and IP SLA
      • 3.1.16. Local Policy Routing
      • 3.1.17. GRE Tunnels
      • 3.1.18. IP in IP Tunnels
      • 3.1.19. Tunnels & Recursive Routing Errors
      • 3.1.20. On Demand Routing
      • 3.1.21. VRF Lite
      • 3.1.22. Bidirectional Forwarding Detection
      • 3.1.23. Performance Routing (PfR) *
    • 3.2. Protocol Independent IPv6 Routing
      • 3.2.1. IPv6 Link-Local Addressing
      • 3.2.2. IPv6 Unique Local Addressing
      • 3.2.3. IPv6 Global Aggregatable Addressing
      • 3.2.4. IPv6 EUI-64 Addressing
      • 3.2.5. IPv6 Auto-Configuration / SLAAC
      • 3.2.6. IPv6 Global Prefix
      • 3.2.7. IPv6 Redistribution
      • 3.2.8. IPv6 Filtering
      • 3.2.9. IPv6 NAT-PT
      • 3.2.10. IPv6 MP-BGP
      • 3.2.11. IPv6 Tunneling *
      • 3.2.12. Automatic 6to4 Tunneling*
      • 3.2.13. ISATAP Tunneling *
    • 3.3. Common Dynamic Routing Features
      • 3.3.1. Distance Vector vs. Link State vs. Path Vector routing protocols
      • 3.3.2. Passive Interfaces
      • 3.3.3. Routing Protocol Authentication
      • 3.3.4. Route Filtering
      • 3.3.5. Auto Summarization
      • 3.3.6. Manual Summarization
      • 3.3.7. Route Redistribution
        • 3.3.7.1. Prefix Filtering with Route Tagging
        • 3.3.7.2. Prefix Filtering with Manual Lists
        • 3.3.7.3. Prefix Filtering with Administrative Distance
        • 3.3.7.4. Administrative Distance Based Loops
        • 3.3.7.5. Metric Based Loops
    • 3.4. RIP
      • 3.4.1. RIPv2
        • 3.4.1.1. Initialization
          • 3.4.1.1.1. Enabling RIPv2
          • 3.4.1.1.2. RIP Send and Receive Versions
          • 3.4.1.1.3. Split Horizon
          • 3.4.1.1.4. RIPv2 Unicast Updates
          • 3.4.1.1.5. RIPv2 Broadcast Updates
          • 3.4.1.1.6. RIPv2 Source Validation
        • 3.4.1.2. Path Selection
          • 3.4.1.2.1. Offset List
        • 3.4.1.3. Summarization
          • 3.4.1.3.1. Auto-Summary
          • 3.4.1.3.2. Manual Summarization
        • 3.4.1.4. Authentication
          • 3.4.1.4.1. Clear Text
          • 3.4.1.4.2. MD5
        • 3.4.1.5. Convergence Optimization & Scalability
          • 3.4.1.5.1. RIPv2 Convergence Timers
          • 3.4.1.5.2. RIPv2 Triggered Updates
        • 3.4.1.6. Filtering
          • 3.4.1.6.1. Filtering with Passive Interface
          • 3.4.1.6.2. Filtering with Prefix-Lists
          • 3.4.1.6.3. Filtering with Standard Access-Lists
          • 3.4.1.6.4. Filtering with Extended Access-Lists
          • 3.4.1.6.5. Filtering with Offset Lists
          • 3.4.1.6.6. Filtering with Administrative Distance
          • 3.4.1.6.7. Filtering with Per Neighbor AD
        • 3.4.1.7. Default Routing
          • 3.4.1.7.1. RIPv2 Default Routing
          • 3.4.1.7.2. RIPv2 Conditional Default Routing
          • 3.4.1.7.3. RIPv2 Reliable Conditional Default Routing
      • 3.4.2. RIPng *
        • 3.4.2.1. RIPng Overview *
    • 3.5. EIGRP
      • 3.5.1. Initialization
        • 3.5.1.1. Network Statement
        • 3.5.1.2. Multicast vs. Unicast Updates
        • 3.5.1.3. EIGRP Named Mode
        • 3.5.1.4. EIGRP Multi AF Mode
        • 3.5.1.5. EIGRP Split Horizon
        • 3.5.1.6. EIGRP Next-Hop Processing
      • 3.5.2. Path Selection
        • 3.5.2.1. Feasibility Condition
        • 3.5.2.2. Modifying EIGRP Vector Attributes
        • 3.5.2.3. Classic Metric
        • 3.5.2.4. Wide Metric
        • 3.5.2.5. Metric Weights
        • 3.5.2.6. Equal Cost Load Balancing
        • 3.5.2.7. Unequal Cost Load Balancing
        • 3.5.2.8. EIGRP Add-Path
      • 3.5.3. Summarization
        • 3.5.3.1. Auto-Summary
        • 3.5.3.2. Manual Summarization
        • 3.5.3.3. Summarization with Default Routing
        • 3.5.3.4. Summarization with Leak Map
        • 3.5.3.5. Summary Metric
      • 3.5.4. Authentication
        • 3.5.4.1. MD5
        • 3.5.4.2. HMAC SHA2-256bit
        • 3.5.4.3. Automatic key rollover
      • 3.5.5. Convergence Optimization & Scalability
        • 3.5.5.1. EIGRP Convergence Timers
        • 3.5.5.2. EIGRP Query Scoping with Summarization
        • 3.5.5.3. EIGRP Query Scoping with Stub Routing
        • 3.5.5.4. Stub Routing with Leak Map
        • 3.5.5.5. Bandwidth Pacing
        • 3.5.5.6. IP FRR
        • 3.5.5.7. Graceful Restart & NSF
      • 3.5.6. Filtering
        • 3.5.6.1. Filtering with Passive Interface
        • 3.5.6.2. Filtering with Prefix-Lists
        • 3.5.6.3. Filtering with Standard Access-Lists
        • 3.5.6.4. Filtering with Extended Access-Lists
        • 3.5.6.5. Filtering with Offset Lists
        • 3.5.6.6. Filtering with Administrative Distance
        • 3.5.6.7. Filtering with Per Neighbor AD
        • 3.5.6.8. Filtering with Route Maps
        • 3.5.6.9. Per Neighbor Prefix Limit
        • 3.5.6.10. Redistribution Prefix Limit
      • 3.5.7. Miscellaneous EIGRP
        • 3.5.7.1. EIGRP Default Network
        • 3.5.7.2. EIGRP Default Metric
        • 3.5.7.3. EIGRP Neighbor Logging
        • 3.5.7.4. EIGRP Router-ID
        • 3.5.7.5. EIGRP Maximum Hops
        • 3.5.7.6. no next-hop-self no-ecmp-mode
        • 3.5.7.7. EIGRP Route Tag Enhancements
      • 3.5.8. EIGRPv6
        • 3.5.8.1. Enabling EIGRPv6
        • 3.5.8.2. EIGRPv6 Split Horizon
        • 3.5.8.3. EIGRPv6 Next-Hop Processing
        • 3.5.8.4. EIGRPv6 Authentication
        • 3.5.8.5. EIGRPv6 Metric Manipulation
        • 3.5.8.6. EIGRPv6 Default Routing
        • 3.5.8.7. EIGRPv6 Summarization
        • 3.5.8.8. EIGRPv6 Prefix Filtering
        • 3.5.8.9. EIGRPv6 Stub Routing
        • 3.5.8.10. EIGRPv6 Link Bandwidth
        • 3.5.8.11. EIGRPv6 Timers
        • 3.5.8.12. EIGRP IPv6 VRF Lite
        • 3.5.8.13. EIGRP Over The Top
    • 3.6. OSPF
      • 3.6.1. Initialization
        • 3.6.1.1. Network Statement
        • 3.6.1.2. Interface Statement
      • 3.6.2. Network Types
        • 3.6.2.1. Broadcast
        • 3.6.2.2. Non-Broadcast
        • 3.6.2.3. OSPF DR/BDR Election Manipulation
        • 3.6.2.4. Point-to-Point
        • 3.6.2.5. Point-to-Multipoint
        • 3.6.2.6. Point-to-Multipoint Non-Broadcast
        • 3.6.2.7. Loopback
        • 3.6.2.8. LSA Types
        • 3.6.2.9. OSPF Next-Hop Processing
        • 3.6.2.10. Unicast vs. Multicast Hellos
      • 3.6.3. Path Selection
        • 3.6.3.1. Auto-Cost
        • 3.6.3.2. Cost
        • 3.6.3.3. Bandwidth
        • 3.6.3.4. Per-Neighbor Cost
        • 3.6.3.5. Non-Backbone Transit Areas
        • 3.6.3.6. Virtual-Links
      • 3.6.4. Authentication
        • 3.6.4.1. Area
        • 3.6.4.2. Interface level
        • 3.6.4.3. Clear Text
        • 3.6.4.4. MD5
        • 3.6.4.5. Null
        • 3.6.4.6. MD5 with Multiple Keys
        • 3.6.4.7. SHA1-196
        • 3.6.4.8. Virtual link
      • 3.6.5. Summarization
        • 3.6.5.1. Internal Summarization
        • 3.6.5.2. External Summarization
        • 3.6.5.3. Path Selection with Summarization
        • 3.6.5.4. Summarization and Discard Routes
      • 3.6.6. Stub Areas
        • 3.6.6.1. Stub Areas
        • 3.6.6.2. Totally Stubby Areas
        • 3.6.6.3. Not-So-Stubby Areas
        • 3.6.6.4. Not-So-Stubby Areas and Default Routing
        • 3.6.6.5. Not-So-Totally-Stubby Areas
        • 3.6.6.6. Stub Areas with Multiple Exit Points
        • 3.6.6.7. NSSA Type-7 to Type-5 Translator Election
        • 3.6.6.8. NSSA Redistribution Filtering
      • 3.6.7. Filtering
        • 3.6.7.1. Filtering with Distribute-Lists
        • 3.6.7.2. Filtering with Administrative Distance
        • 3.6.7.3. Filtering with Route-Maps
        • 3.6.7.4. Filtering with Summarization
        • 3.6.7.5. LSA Type-3 Filtering
        • 3.6.7.6. Forwarding Address Suppression
        • 3.6.7.7. NSSA ABR External Prefix Filtering
        • 3.6.7.8. Database Filtering
      • 3.6.8. Default Routing
        • 3.6.8.1. Default Routing
        • 3.6.8.2. Conditional Default Routing
        • 3.6.8.3. Reliable Conditional Default Routing
        • 3.6.8.4. Default Cost
      • 3.6.9. Convergence Optimization & Scalability
        • 3.6.9.1. Interface Timers
        • 3.6.9.2. Fast Hellos
        • 3.6.9.3. LSA & SPF Throttling
        • 3.6.9.4. LSA & SPF Pacing
        • 3.6.9.5. Single Hop LFA / IP FRR
        • 3.6.9.6. Multihop LFA
        • 3.6.9.7. Stub Router Advertisement
        • 3.6.9.8. Demand Circuit
        • 3.6.9.9. Flooding Reduction
        • 3.6.9.10. Transit Prefix Filtering
        • 3.6.9.11. Resource Limiting
        • 3.6.9.12. Graceful Restart & NSF
        • 3.6.9.13. Incremental SPF
      • 3.6.10. Miscellaneous OSPF Features
      • 3.6.11. OSPFv3
        • 3.6.11.1. LSA Types
        • 3.6.11.2. OSPFv3
        • 3.6.11.3. OSPFv3 Network Types
        • 3.6.11.4. OSPFv3 Prefix Suppression
        • 3.6.11.5. OSPFv3 Virtual Links
        • 3.6.11.6. OSPFv3 Summarization
        • 3.6.11.7. OSPFv3 IPsec Authentication
        • 3.6.11.8. OSPFv3 Multi AF Mode
        • 3.6.11.9. TTL Security
    • 3.7. BGP
      • 3.7.1. Establishing Peerings
        • 3.7.1.1. iBGP Peerings
        • 3.7.1.2. EBGP Peerings
        • 3.7.1.3. Update Source Modification
        • 3.7.1.4. Multihop EBGP Peerings
        • 3.7.1.5. Neighbor Disable-Connected-Check
        • 3.7.1.6. Authentication
        • 3.7.1.7. TTL Security
        • 3.7.1.8. BGP Peer Groups
        • 3.7.1.9. 4 Byte ASNs
        • 3.7.1.10. Active vs. Passive Peers
        • 3.7.1.11. Path MTU Discovery
        • 3.7.1.12. Multi Session TCP Transport per AF
        • 3.7.1.13. Dynamic BGP Peering
      • 3.7.2. iBGP Scaling
        • 3.7.2.1. Route Reflectors
        • 3.7.2.2. Route Reflector Clusters
        • 3.7.2.3. Confederations
      • 3.7.3. BGP Next Hop Processing
        • 3.7.3.1. Next-Hop-Self
        • 3.7.3.2. Manual Next-Hop Modification
        • 3.7.3.3. Third Party Next Hop
        • 3.7.3.4. Next Hop Tracking
        • 3.7.3.5. Conditional Next Hop Tracking
        • 3.7.3.6. BGP Next-Hop Trigger Delay
      • 3.7.4. BGP NLRI Origination
        • 3.7.4.1. Network Statement
        • 3.7.4.2. Redistribution
        • 3.7.4.3. BGP Redistribute Internal
        • 3.7.4.4. Conditional Advertisement
        • 3.7.4.5. Conditional Route Injection
      • 3.7.5. BGP Bestpath Selection
        • 3.7.5.1. Weight
        • 3.7.5.2. Local Preference
        • 3.7.5.3. AS-Path Prepending
        • 3.7.5.4. Origin
        • 3.7.5.5. MED
        • 3.7.5.6. Always Compare MED
        • 3.7.5.7. Deterministic MED
        • 3.7.5.8. AS-Path Ignore
        • 3.7.5.9. Router-IDs
        • 3.7.5.10. DMZ Link Bandwidth
        • 3.7.5.11. Maximum AS Limit
        • 3.7.5.12. Multipath
      • 3.7.6. BGP Aggregation
        • 3.7.6.1. BGP Auto-Summary
        • 3.7.6.2. Aggregation
        • 3.7.6.3. Summary Only
        • 3.7.6.4. Suppress Map
        • 3.7.6.5. Unsuppress Map
        • 3.7.6.6. AS-Set
        • 3.7.6.7. Attribute-Map
        • 3.7.6.8. Advertise Map
      • 3.7.7. BGP Communities
        • 3.7.7.1. Standard
        • 3.7.7.2. Extended
        • 3.7.7.3. No-Advertise
        • 3.7.7.4. No-Export
        • 3.7.7.5. Local-AS
        • 3.7.7.6. Deleting
      • 3.7.8. Filtering
        • 3.7.8.1. Prefix-Lists
        • 3.7.8.2. Standard Access-Lists Task
        • 3.7.8.3. Extended Access-Lists
        • 3.7.8.4. Maximum Prefix
        • 3.7.8.5. BGP Regular Expressions
        • 3.7.8.6. Outbound Route Filtering (ORF)
        • 3.7.8.7. Soft Reconfiguration Inbound
      • 3.7.9. AS-Path Manipulation
        • 3.7.9.1. Local AS
        • 3.7.9.2. Local AS Replace-AS/Dual-AS
        • 3.7.9.3. Remove Private AS
        • 3.7.9.4. Allow AS In
        • 3.7.9.5. AS Override
      • 3.7.10. BGP Convergence Optimization
        • 3.7.10.1. BGP Timers Tuning
        • 3.7.10.2. BGP Fast Fallover
        • 3.7.10.3. BGP Prefix Independent Convergence (PIC)
        • 3.7.10.4. BGP Dampening
        • 3.7.10.5. BGP Dampening with Route-Map
        • 3.7.10.6. BGP Add Path
      • 3.7.11. BGP Default Routing
      • 3.7.12. IPv6 BGP
      • 3.7.13. Misc BGP
        • 3.7.13.1. iBGP Synchronization
        • 3.7.13.2. BGP over GRE
        • 3.7.13.3. BGP Backdoor
    • 3.8. Route Redistribution
      • 3.8.1. Metric Based Loops
      • 3.8.2. Administrative Distance Based Loops
      • 3.8.3. Route Tag Filtering
      • 3.8.4. IP Route Profile
      • 3.8.5. Debug IP Routing
    • 3.9. Miscellaneous Routing Features
    • 3.10. IS-IS *
  • 4. VPN
    • 4.1. MPLS
      • 4.1.1. VRF Lite
      • 4.1.2. MPLS LDP
      • 4.1.3. MPLS Ping
      • 4.1.4. MPLS Traceroute
      • 4.1.5. MPLS Label Filtering
      • 4.1.6. MP-BGP VPNv4
      • 4.1.7. MP-BGP Prefix Filtering
      • 4.1.8. PE-CE Routing with RIP
      • 4.1.9. PE-CE Routing with OSPF
      • 4.1.10. OSPF Sham-Link
      • 4.1.11. PE-CE Routing with EIGRP
      • 4.1.12. EIGRP Site-of-Origin
      • 4.1.13. PE-CE Routing with BGP
      • 4.1.14. BGP SoO Attribute
      • 4.1.15. Internet Access
      • 4.1.16. Route Leaking
      • 4.1.17. MPLS VPN Performance Tuning
      • 4.1.18. AToM *
      • 4.1.19. L2TPV3 *
      • 4.1.20. VPLS *
    • 4.2. IPsec LAN-to-LAN
      • 4.2.1. ISAKMP Policies
      • 4.2.2. PSK Authentication
      • 4.2.3. Static Crypto Maps
      • 4.2.4. IPsec over GRE
      • 4.2.5. Static VTI
      • 4.2.6. GETVPN *
    • 4.3. DMVPN
      • 4.3.1. Single Hub
      • 4.3.2. NHRP
      • 4.3.3. DMVPN Phase 1, 2, & 3
      • 4.3.4. QoS Profiles
      • 4.3.5. QoS Pre-Classify
  • 5. Multicast
    • 5.1. Layer 2 Multicast
      • 5.1.1. IGMPv1, IGMPv2, IGMPv3
      • 5.1.2. IGMP Snooping
      • 5.1.3. IGMP Querier Election
      • 5.1.4. IGMP Filtering
      • 5.1.5. IGMP Proxy
      • 5.1.6. IGMP Timers
      • 5.1.7. Multicast VLAN Registration
      • 5.1.8. IGMP Profiles
    • 5.2. IPv4 Multicast Routing
      • 5.2.1. PIM Dense Mode
      • 5.2.2. PIM Sparse Mode
      • 5.2.3. PIM Sparse Dense Mode
      • 5.2.4. Static RP
      • 5.2.5. Auto-RP
        • 5.2.5.1. Auto-RP
        • 5.2.5.2. Sparse Dense Mode
        • 5.2.5.3. Auto-RP Listener
        • 5.2.5.4. Multiple Candidate RPs
        • 5.2.5.5. Filtering Candidate RPs
        • 5.2.5.6. RP & MA placement problems
      • 5.2.6. Bootstrap Router
        • 5.2.6.1. BSR
        • 5.2.6.2. Multiple RP Candidates
        • 5.2.6.3. Multiple BSR Candidates
      • 5.2.7. Source Specific Multicast
      • 5.2.8. Bidirectional PIM
      • 5.2.9. Group to RP Mapping
      • 5.2.10. Anycast RP
      • 5.2.11. MSDP
      • 5.2.12. MSDP SA Filtering
      • 5.2.13. Multicast TTL Scoping
      • 5.2.14. Auto-RP & BSR Boundary Filtering
      • 5.2.15. PIM Accept Register Filtering
      • 5.2.16. PIM Accept RP Filtering
      • 5.2.17. RPF Failure
      • 5.2.18. Registration Failure
      • 5.2.19. PIM DR Election
      • 5.2.20. PIM DF Election
      • 5.2.21. PIM Assert
      • 5.2.22. Static Multicast Routes
      • 5.2.23. Multicast BGP
      • 5.2.24. PIM NBMA Mode
      • 5.2.25. Multicast over GRE
      • 5.2.26. Stub Multicast Routing
      • 5.2.27. Multicast Helper Map
      • 5.2.28. Multicast Rate Limiting
      • 5.2.29. Multicast BGP
    • 5.3. IPv6 Multicast Routing *
      • 5.3.1. IPv6 PIM and MLD *
      • 5.3.2. IPv6 PIM BSR *
      • 5.3.3. IPv6 Embedded RP *
      • 5.3.4. IPv6 SSM *
  • 6. QoS
    • 6.1. Hold-Queue and Tx-Ring
    • 6.2. Weighted Fair Queuing (WFQ)
    • 6.3. Selective Packet Discard
    • 6.4. Payload Compression on Serial Links
    • 6.5. Generic TCP/UDP Header Compression
    • 6.6. MLP Link Fragmentation and Interleaving
    • 6.7. MQC Classification and Marking
    • 6.8. MQC Bandwidth Reservations and CBWFQ
    • 6.9. MQC Bandwidth Percent
    • 6.10. MQC LLQ and Remaining Bandwidth Reservations
    • 6.11. MQC WRED
    • 6.12. MQC Dynamic Flows and WRED
    • 6.13. MQC WRED with ECN
    • 6.14. MQC Class-Based Generic Traffic Shaping
    • 6.15. MQC Class-Based GTS and CBWFQ
    • 6.16. MQC Single-Rate Three-Color Policer
    • 6.17. MQC Hierarchical Policers
    • 6.18. MQC Two-Rate Three-Color Policer
    • 6.19. MQC Peak Shaping
    • 6.20. MQC Percent-Based Policing
    • 6.21. MQC Header Compression
    • 6.22. Voice Adaptive Traffic Shaping
    • 6.23. Voice Adaptive Fragmentation
    • 6.24. Advanced HTTP Classification with NBAR
    • 6.22. Layer 2 QoS *
  • 7. Security
    • 7.1. Layer 2 Security
      • 7.1.1. Port Protection
      • 7.1.2. Private VLANs
      • 7.1.3. Port Based ACLs
      • 7.1.4. VLAN ACLs for IP Traffic
      • 7.1.5. VLAN ACLs for Non-IP Traffic
      • 7.1.6. Storm Control
      • 7.1.7. Port Security
      • 7.1.8. HSRP and Port-Security
      • 7.1.9. ErrDisable Recovery
      • 7.1.10. DHCP Snooping
      • 7.1.11. DHCP Snooping and the Information Option
      • 7.1.12. Dynamic ARP Inspection
      • 7.1.13. IP Source Guard
      • 7.1.14. 802.1x *
    • 7.2. Management Plane Security
      • 7.2.1. AAA Authentication Lists
      • 7.2.2. AAA Exec Authorization
      • 7.2.3. AAA Local Command Authorization
      • 7.2.4. Controlling Terminal Line Access
      • 7.2.5. IOS Login Enhancements
      • 7.2.6. IOS Resilient Configuration
      • 7.2.7. Role-Based CLI
      • 7.2.8. AAA with TACACS+ and RADIUS *
    • 7.3. Control Plane Security
      • 7.3.1. Controlling the ICMP Messages Rate
      • 7.3.2. Control Plane Policing
      • 7.3.3. Control Plane Protection (CPPr)
      • 7.3.4. Control Plane Host
    • 7.4. Data Plane Security
        • 7.4.1. Traffic Filtering Using Standard Access-Lists
        • 7.4.2. Traffic Filtering Using Extended Access-Lists
        • 7.4.3. Traffic Filtering Using Reflexive Access-Lists
        • 7.4.4. IPv6 Traffic Filter
        • 7.4.5. Filtering Fragmented Packets
        • 7.4.6. Filtering Packets with Dynamic Access-Lists
        • 7.4.7. Filtering Traffic with Time-Based Access Lists
        • 7.4.8. Traffic Filtering with Policy-Based Routing
        • 7.4.9. Preventing Packet Spoofing with uRPF
        • 7.4.10. Using NBAR for Content-Based Filtering
        • 7.4.11. TCP Intercept
        • 7.4.12. TCP Intercept Watch Mode
        • 7.4.13. Packet Logging with Access-Lists
        • 7.4.14. IP Source Tracker
        • 7.4.15. Router IP Traffic Export (RITE)
      • 7.4.16. IOS ACL Selective IP Option Drop
      • 7.4.17. Flexible Packet Matching
      • 7.4.18. IPv6 First Hop Security
        • 7.4.18.1. RA guard
        • 7.4.18.2. DHCP guard
        • 7.4.18.3. Binding table
        • 7.4.18.4. Device tracking
        • 7.4.18.5. ND inspection/snooping
        • 7.4.18.6. Source guard
        • 7.4.18.7. PACL
  • 8. System Management
    • 8.1. Device Management
      • 8.1.1. Console
      • 8.1.2. Telnet
        • 8.1.2.1. Telnet Service Options
      • 8.1.3. SSH
      • 8.1.4. Terminal Line Settings
      • 8.1.5. HTTP Server and Client
      • 8.1.6. FTP Server and Client
      • 8.1.7. TFTP Server and Client
      • 8.1.8. SNMP
        • 8.1.8.1. SNMPv2 Server
        • 8.1.8.2. SNMPv2c Access Control
        • 8.1.8.3. SNMP Traps and Informs
        • 8.1.8.4. CPU and Memory Thresholds
        • 8.1.8.5. SNMPv3
        • 8.1.8.6. SNMP MAC Address Notifications
        • 8.1.8.7. SNMP Notifications of Syslog Messages
    • 8.2. Logging
      • 8.2.1. System Message Logging
      • 8.2.2. Syslog Logging
      • 8.2.3. Logging Counting and Timestamps
      • 8.2.4. Logging to Flash Memory
      • 8.2.5. Configuration Change Notification and Logging
      • 8.2.6. Configuration Archive and Rollback
      • 8.2.7. Logging with Access-Lists
    • 8.3. NTP
      • 8.3.1. NTP
      • 8.3.2. NTP Authentication
      • 8.3.3. NTP Access Control
      • 8.3.4. NTP Version 3 & 4
    • 8.4. EEM
      • 8.4.1. KRON Command Schedule
      • 8.4.2. EEM Scripting: Interface Events
      • 8.4.3. EEM Scripting: Syslog Events
      • 8.4.4. EEM Scripting: CLI Events
      • 8.4.5. EEM Scripting: Periodic Scheduling
      • 8.4.6. EEM Scripting: Advanced Features
      • 8.4.7. EEM Applets
    • 8.5. Miscellaneous System Management
      • 8.5.1. Auto-Install over LAN Interfaces using DHCP
      • 8.5.2. Auto-Install over LAN Interfaces Using RARP
      • 8.5.3. IOS Menus
      • 8.5.4. IOS Banners
      • 8.5.5. Exec Aliases
      • 8.5.6. TCP Keepalives
      • 8.5.7. Generating Exception Core Dumps
      • 8.5.8. Conditional Debugging
      • 8.5.9. Tuning Packet Buffers
      • 8.5.10. CDP
      • 8.5.11. Remote Shell
  • 9. Network Services
    • 9.1. Object Tracking
      • 9.1.1. IP SLA
      • 9.1.2. Enhanced Object Tracking
      • 9.1.3. Tracking Lists
    • 9.2. First Hop Redundancy Protocols
      • 9.2.1. HSRP
      • 9.2.2. VRRP
      • 9.2.3. GLBP
      • 9.2.4. Router Redundancy and Object Tracking
      • 9.2.5. IPv6 RS & RA Redundancy
    • 9.3. DHCP
      • 9.3.1. DHCP Server
      • 9.3.2. DHCP Client
      • 9.3.3. DHCP Relay
      • 9.3.4. DHCP Host Pools
      • 9.3.5. DHCP On-Demand Pool
      • 9.3.6. DHCP Proxy
      • 9.3.7. DHCP Information Option
      • 9.3.8. DHCP Authorized ARP
      • 9.3.9. SLAAC/DHCPv6 interaction
      • 9.3.10. Stateful & Stateless DHCPv6
      • 9.3.11. DHCPv6 prefix delegation
    • 9.4. DNS
      • 9.4.1. IOS Authoritative DNS Server
      • 9.4.2. IOS Caching DNS Server
      • 9.4.3. IOS DNS Spoofing
    • 9.5. NAT
      • 9.5.1. Basic NAT
      • 9.5.2. NAT Overload
      • 9.5.3. NAT with Route Maps
      • 9.5.4. Static NAT
      • 9.5.5. Static PAT
      • 9.5.6. Static NAT and IP Aliasing
      • 9.5.7. Static Policy NAT
      • 9.5.8. NAT with Overlapping Subnets
      • 9.5.9. TCP Load Distribution with NAT
      • 9.5.10. Stateful NAT with HSRP
      • 9.5.11. Stateful NAT with Primary/Backup
      • 9.5.12. NAT Virtual Interface
      • 9.5.13. NAT Default Interface
      • 9.5.14. Reversible NAT
      • 9.5.15. Static Extendable NAT
      • 9.5.16. NAT ALG
    • 9.6. Traffic Accounting
      • 9.6.1. IP Precedence Accounting
      • 9.6.2. IP Output Packet Accounting
      • 9.6.3. IP Access Violation Accounting
      • 9.6.4. MAC Address Accounting
    • 9.7. NetFlow
      • 9.7.1. Netflow v5 & v9
      • 9.7.2. Netflow Ingress and Egress
      • 9.7.3. Netflow Top Talkers
      • 9.7.4. Netflow Aggregation Cache
      • 9.7.5. Netflow Random Sampling
      • 9.7.6. Netflow Input Filters
      • 9.7.7. Netflow Export
    • 9.8. Miscellaneous Network Services
      • 9.8.1. Proxy ARP
      • 9.8.2. IRDP
      • 9.8.3. Router ICMP Settings
        • 9.8.3.1. TCP Optimization
      • 9.8.4. IOS Small Services and Finger
      • 9.8.5. Directed Broadcasts and UDP Forwarding
      • 9.8.6. NBAR Protocol Discovery
      • 9.8.7. IP Event Dampening
      • 9.8.8. Conditional Debugging
      • 9.8.9. Embedded Packet Capture
      • 9.8.10. Interpreting Packet Captures

Dear god lend my your courage to stand up and fight =)

Advertisements