The CCIE R&S Program has now been replaced by the CCIE Enterprise Infrastructure Certification and Training. This is the latest certification track to join the brigade of Cisco’s routine up gradation.
Cisco confirmed the revision of the current version (v5) to Enterprise and announced the new blueprint in the first week of December. In alignment with the current industry trends and job roles, the old version has been revamped with the addition of new study materials and changes have been incorporated in both training and the exams (written & Lab).
This is the highest level of Certification from Cisco. It authenticates one’s in depth understanding and expertise on Cisco products and solutions. Besides being one of the most prestigious and highly paid certification in IT Industry, it validates the skills required of expert-level network engineers to plan, operate and troubleshoot complex, converged network infrastructure. CCIE candidates are deployed for the most technically challenging network assignments.
CCIE Enterprise Infrastructure(v1.0)
Exam Topics –Practical Exam
Exam Description:The Cisco CCIE Enterprise Infrastructure (v1.0) Practica lExam is an 8-hour long, hands-on exam that requires an examinee to plan, design, deploy, operate, and optimize dual stack solutions (IPv4 and IPv6) for complex enterprise networks. Examinees are expected to program and automate the network within their exam, as per exam topics below. The topics given below are general guidelines for the content likely to be included on the exam. Your knowledge, skills and abilities on these topics will be tested throughout the entire network life-cycle, unless explicitly specified otherwise within this document.
Content:
- Network Infrastructure (30%).
- 1 Switched campus.
- 1.a Switch administration.
- 1.ai Managing MAC address table.
- 1.aii Errdisable recovery.
- 1.aiii L2 MTU.
- 1.b Layer 2 protocols.
- 1.bi CDP, LLDP.
- 1.bii UDLD.
- 1.c VLAN technologies.
- 1.ci Access ports.
- 1.cii Trunk ports (802.1Q).
- 1.ciii Native VLAN.
- 1.civ Manual VLAN pruning.
- 1.cv VLAN database.
- 1.cvi Normal range and extended range VLANs.
- 1.cvii Voice VLAN.
- 1.cviii VTP.
- 1.d EtherChannel.
- 1.diL ACP, static.
- 1.dii Layer 2, Layer
- 1.diii Load balancing
- 1.div EtherChannel Misconfiguration Guard.
- 1.e SpanningTreeProtocol.
- 1.ei PVST+, Rapid PVST+, MST.
- 1.eii Switch priority, port priority, path cost, STP timers.
- 1.eiii PortFast, BPDU Guard, BPDU Filter.
- 1.eiv Loop Guard, Root Guard.
- 2 Routing Concepts
- 2.a Administrative distance.
- 2.b VRF-lite.
- 2.c Static routing
- 2.d PolicyBased Routing.
- 2.e VRF-aware routing with any routing protocol.
- 2.f Route filteringwith any routing protocol.
- 2.g Manual summarization with any routing protocol.
- 2.h Redistribution between any pair of routing protocols.
- 2.i Routing protocol authentication.
- 2.j Bidirectional Forwarding Detection.
- 3 EIGRP
- 3.a Adjacencies.
- 3.b Best path selection.
- 3.bi RD, FD, FC, successor, feasible successor.
- 3.bii Classic Metricsand Wide Metrics.
- 3.c Operations.
- 3.ci General operations.
- 3.cii Topology table.
- 3.ciii Packet types.
- 3.civ Stuck In Active.
- 3.cv Graceful shutdown.
- 3.d EIGRP loadbalancing.
- 3.di Equal-cost.
- 3.dii Unequal-cost1.
- 3.diii Add-path.
- 3.e EIGRP Named Mode.
- 3.f Optimization, convergence and scalability.
- 3.fi Fast convergence requirements.
- 3.fii Query propagation boundaries.
- 3.fiii IP FRR (single hop).
- 3.fiv Leak-map with summary routes.
- 3.fv EIGRP stub with leak map
- 4 OSPF (v2 and v3)
- 4.a Adjacencies.
- 4.b Network types, area types.
- 4.c Path preference.
- 4.d Operations.
- 4.di General operations.
- 4.dii Graceful shutdown.
- 4.diii GTSM (Generic TTL Security Mechanism).
- 4.e Optimization, convergence and scalability.
- 4.ei Metrics.
- 4.eii LSA throttling, SPF tuning, fast hello.
- 4.eiii LSA propagation control (area types).
- 4.eiv Stub router.
- 4.ev Loop-free alternate.
- 4.evi Prefix suppression.
- 5 BGP.
- 5.a IBGP and EBGP peer relationships.
- 5.ai Peer-group/update-group, template.
- 5.aii Active, passive.
- 5.aiii Timers.
- 5.aiv Dynamic neighbors.
- 5.av 4-byteAS numbers.
- 5.avi Private AS.
- 5.b Path selection.
- 5.bi Attributes.
- 5.bii Best path selection algorithm.
- 5.biii Loadbalancing.
- 5.c Routing policies.
- 5.ci Attribute manipulation.
- 5.cii Conditional advertisement.
- 5.ciii Outbound Route Filtering.
- 5.civ Standard and extended communities.
- 5.cv Multi-homing.
- 5.d AS path manipulations.
- 5.di local-AS, allowas-in, remove-private-as.
- 5.dii Prepend1.
- 5.diii Regexp.
- 5.e Convergence and scalability.
- 5.ei Route reflector.
- 5.eii Aggregation, as-set.
- 5.f Other BGP features.
- 5.fi Multipath, add-path.
- 5.fii Soft reconfiguration, Route Refresh
- 6 Multicast
- 6.a Layer 2 multicast1.
- 6.ai IGMPv2, IGMPv3.
- 6.aii IGMP Snooping, PIM Snooping.
- 6.aiii IGMP Querier
- 6.aiv IGMP Filter.
- 6.av MLD1.
- 6.b Reverse path forwarding check.
- 6.c PIM.
- 6.ci Sparse Mode.
- 6.cii Static RP, BSR, AutoRP.
- 6.ciii Group to RP Mapping.
- 6.civ Bidirectional PIM.
- 6.cv Source-Specific Multicast.
- 6.cvi Multicast boundary, RP announcement filter.
- 6.cvii PIMv6 Anycast RP.
- 6.cviii IPv4 Anycast RP using MSDP.
- 6.cix Multicast multipath.
- Software Defined Infrastructure (25%)
- 1 Cisco SD Access.
- 1.a Design a Cisco SD Access solution.
- 1.ai Underlay network (IS-IS, manual/PnP).
- 1.aii Overlay fabric design (LISP, VXLAN, Cisco TrustSec)
- 1.aiii Fabric domains (single-site and multi-siteusing SD-WAN transit).
- 1.b Cisco SD Access deployment.
- 1.bi Cisco DNA Center device discovery and device management
- 1.bii Add fabricnode devices to an existing fabric.
- 1.biii Host onboarding (wired endpoints only)
- 1.biv Fabric border handoff
- 1.c Segmentation.
- 1.c i Macro-level segmentation using VNs.
- 1.cii Micro-level segmentation using SGTs (using Cisco ISE)
- 1.d Assurance
- 1.d i Network and client health (360).
- 1.dii Monitoring and troubleshooting
- 2 Cisco SD-WAN
- 2.a Design a Cisco SD-WAN solution
- 2.aii Management plane (vManage)
- 2.aiii Control plane (vSmart, OMP)
- 2.aiv Data plane (vEdge/cEdge)
- 2.b WAN edge deployment
- 2.bi Onboarding new edge routers
- 2.bii Orchestration with zero-touch provisioning/Plug-And-Play
- 2.biii OMP2.2.b ivTLOC
- 2.c Configuration templates
- 2.d Localized policies (only QoS)
- 2.e Centralized policies
- 2.ei Application Aware Routing
- 2.eii Topologies
-
- Transport Technologies and Solutions (15%)
- 1 MPLS
- 1.a Operations
- 1.ai Label stack, LSR, LSP
- 1.aii LDP.
- 1.aiii MPLS ping, MPLS traceroute
- 1.b L3VPN3.
- 1.bi PE-CE routing
- 1.bii MP-BGP VPNv4/VPNv6.
- 1.biii Extranet (route leaking)3.2DMVPN.
- 2.a Troubleshoot DMVPN Phase3 with dual-hub
- 2.ai NHRP
- 2.aii IPsec/IKEv2 using pre-sharedkey
- 2.aiii Per-Tunnel QoS
- 2.b Identify usecases for FlexVPN
- 2.bi Site-to-site, Server, Client, Spoke-to-Spoke
- 2.bii IPsec/IKEv2 using pre-sharedkey
- 2.biii MPLS over FlexVPN
- Infrastructure Security and Services (15%)
-
- 1. Device Security on Cisco IOS XE
- 1.a Control plane policing and protection
- 1.b AAA4.
- 2 Network Security.
- 2.a Switch security features 2.ai VACL, PACL
- 2.aii Storm control 2.aiii DHCP Snooping, DHCP option 82
- 2.aiv IP Source Guard.
- 2.av Dynamic ARP Inspection.
- 2.avi PortSecurity
- 2.avii Private VLAN
- 2.b Router security features.
- 2.bi IPv6 Traffic Filters.
- 2.bii IPv4 Access Control Lists.
- 2.biii Unicast Reverse Path Forwarding.
- 2.c IPv6 infrastructure securityfeatures.
- 2.ci RA Guard4.
- 2.cii DHCP Guard.
- 2.ciii Binding table.
- 2.civ Device tracking.
- 2.cv ND Inspection/Snooping.
- 2.cvi Source Guard.
- 2.d IEEE 802.1X Port-Based Authentication.
- 2.di Device roles, port states.
- 2.dii Authentication process.
- 2.diii Host modes.
- 3. System Management.
- 3.a Device management.
- 3.ai Console and VTY.
- 3.aii SSH, SCP4.
- 3.aiii RESTCONF, NETCONF.
- 3.b SNMP4.
- 3.bi v2c.
- 3.bii v3.
- 3.c Logging.
- 3.ci Local logging, syslog, debugs, conditional debugs.
- 3.cii Timestamps.
- 4. Quality of Service.
- 4.a End to end L3 QoS using MQC.
- 4.ai DiffServ.
- 4.aii CoS and DSCP Mapping.
- 4.aiii Classification.
- 4.aiv Network Based Application Recognition (NBAR).
- 4.av Marking using IP Precedence, DSCP, CoS4.
- 4.avi Policing, shaping 4.avii Congestion management and avoidance.
- 4.aviiiHQoS, Sub-rate Ethernet Link.
- 5. Network Services.
- 5.a FirstHop Redundancy Protocols.
- And more.