CCNP Routing & Switching – ROUTE

Implementing Cisco IP Routing (ROUTE)

Exam Number 300-101 ROUTE
Associated Certifications CCNP Routing and Switching
CCDP
Duration 120 minutes (45-65 questions)
Available Languages English, Japanese
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

 

Implementing Cisco IP Routing (ROUTE 300-101) is a qualifying exam for the Cisco CCNP Routing and Switching and CCDP certifications. The ROUTE 300-101 exam certifies the routing knowledge and skills of successful candidates. They are certified in using advanced IP addressing and routing in implementing scalable and highly secure Cisco routers that are connected to LANs, WANs, and IPv6.

The exam also covers the configuration of highly secure routing solutions to support branch offices and mobile workers.

Review the exam topics

 

 

[mpc_tabs preset=”mpc_preset_1″ tabs_position=”left” active_tab=”0″ decor_line=”true” decor_color=”#5e5e5e” decor_size=”2″ decor_gap=”5″ font_preset=”mpc_preset_1″ font_color=”#888888″ font_size=”15″ font_line_height=”1.75″ font_transform=”none” font_align=”left” content_padding_divider=”true” content_padding_css=”padding-right:10px;padding-left:20px;” padding_divider=”true” margin_divider=”true” margin_css=”margin-right:20px;margin-left:20px;” mpc_button__preset=”mpc_preset_48″ mpc_button__font_preset=”mpc_preset_20″ mpc_button__font_color=”#ffffff” mpc_button__font_size=”12″ mpc_button__font_transform=”uppercase” mpc_button__background_color=”#555555″ mpc_button__border_css=”border-width:2px;border-color:#555555;border-style:solid;border-radius:3px;” mpc_button__padding_divider=”true” mpc_button__padding_css=”padding-top:9px;padding-right:18px;padding-bottom:9px;padding-left:18px;” mpc_button__hover_font_color=”#555555″ mpc_button__hover_icon_color=”#f3f3f3″ mpc_button__hover_background_color=”#f3f3f3″ mpc_button__hover_background_effect=”expand-diagonal_left” mpc_button__hover_background_offset=”110″ mpc_button__hover_border_css=”border-color:#f3f3f3;border-style:solid;border-radius:5px;” button_margin_divider=”true” button_margin_css=”margin-top:5px;margin-right:15px;margin-bottom:15px;”][mpc_tab title=”Chapter I” tab_id=”1530158992-1-68″]

Chapter I. Basic Network and Routing Concepts

[Online Course] 1. Differentiating Routing Protocols

    1. Differentiating Routing Protocols 

        1.1 Enterprise Network Infrastructure

        1.2 Role of Dynamic Routing Protocols

        1.3 Choosing a of Dynamic Routing Protocols

        1.4 IGP versus EGP

        1.5 Types of Routing Protocols

        1.6 Convergence

        1.7 Route Summarization

        1.8 Route Protocol Scalability

 

    2. Understanding Network Technologies

        2.1 Traffic Types

        2.2 IPv6 Address Types

        2.3 ICMPv6 Neighbor Discovery

        2.4 Network Types

        2.5 NBMA Networks

        2.6 Routing Over the Internet

    3. Connecting Remote Locations with Headquarters

        3.1 Principles of Static Routing

        3.2 Configuring an IPv4 Static Route

        3.3 Configuring a Static Default Route

        3.4 Basic PPP Overview

        3.5 PPP Authentication Overview

        3.6 PPPoE

        3.7 Basic Frame Relay Overview

        3.8 VPN Connectivity Overview

        3.9 MPLS-based VPNs

        3.10 Tunneling VPNs

        3.11 Hybrid VPNs

        3.13 Routing Across MPLS VPNs

        3.14 Routing Over GRE Tunnel

        3.15 Dynamic Multipoint Virtual Private Network

        3.16 Multipoint GRE

        3.17 NHRP

        3.18 IPsec

    4. Routing and TCP/IP Operations

        4.1 MSS, Fragmentation, and PMTUD

        4.2 IPv4 Fragmentation and PMTUD

        4.3 Bandwidth Delay Product

        4.4 TCP Starvation

        4.5 Latency

        4.6 ICMP Redirect

    5. Implementing RIPng

        5.1 RIP Overview

        5.2 RIPv2 Overview

        5.3 Configuring RIPng

        5.4 Basic RIPng Configuration

        5.5 Propagating a Default Route

        5.6 Investigating the RIPng Database

[/mpc_tab][mpc_tab title=”Chapter II” tab_id=”1530158992-2-69″]

Chapter II. EIGRP Implementation

    1. Establishing EIGRP Neighbor Relationships

        1.1 EIGRP Features

        1.2 EIGRP Features

        1.3 EIGRP Operation Overview

        1.4 Configuring and Verifying Basic EIGRP for IPv4

        1.5 Manipulating EIGRP Timers

        1.6 EIGRP Neighbor Relationship over Frame Relay

        1.7 Establishing EIGRP over Layer 3 MPLS VPN

        1.8 Establishing EIGRP over Layer 2 MPLS VPN

    2. Building the EIGRP Topology Table

        2.1 Building and Examining the EIGRP Topology Table

        2.2 Choosing the Best Path

        2.3 Exchange of Routing Knowledge in EIGRP

        2.4 EIGRP Metric

        2.5 EIGRP Metric Calculation

        2.6 EIGRP Wide Metrics

        2.7 EIGRP Metric Calculation Example

        2.8 EIGRP Metric Calculation Example

        2.9 EIGRP Path Calculation Example

    3. Optimizing EIGRP Behavior

        3.1 EIGRP Queries

        3.2 EIGRP Stub Routers

        3.3 Configuring EIGRP Stub Routing

        3.4 EIGRP Stub Options

        3.5 Stuck in Active

        3.6 Reducing Query Scope by Using Summary Routes

        3.7 Configuring EIGRP Summarization

        3.8 Determining the Summary Route

        3.9 Obtaining Default Route

        3.10 Load Balancing with EIGRP

        3.11 Configuring EIGRP Load Balancing

        3.12 EIGRP Load Balancing

        3.13 EIGRP Load Balancing Across Unequal-Metric Paths

    4. Configuring EIGRP for IPv6

        4.1 Overview of EIGRP for IPv6

        4.2 Configuring and Verifying EIGRP for IPv6

        4.3 EIGRP for IPv6 Configuration

        4.4 Determining the IPv6 Summary Route

    5. Named EIGRP Configuration

        5.1 Introduction to Named EIGRP Configuration

        5.2 Configuring Named EIGRP

        5.3 Address Families

        5.4 EIGRP for IPv4 Address Family

        5.5 EIGRP for IPv6 Address Family

        5.6 Named EIGRP Configuration Modes

        5.7 Classic Versus Named EIGRP Configuration

[/mpc_tab][mpc_tab title=”Chapter III” tab_id=”1530159625951-2-0″]

Chapter III. OSPF Implementation

    1. Establishing OSPF Neighbor Relationships

        1.1 OSPF Features

        1.2 OSPF Operation Overview

        1.3 Hierarchical Structure of OSPF

        1.4 Design Restrictions of OSPF

        1.5 OSPF Message Types

        1.6 Basic OSPF Configuration

        1.7 Optimizing OSPF Adjacency Behavior

        1.8 Using OSPF Priority in the DR/BDR Election

        1.9 OSPF Behavior in NBMA Hub-and-Spoke Topology

        1.10 The Importance of MTU

        1.11 Manipulating OSPF Timers

        1.12 OSPF Neighbor Relationship over Point-to-Point Links

        1.13 OSPF Neighbor Relationship over Layer 3 MPLS VPN

        1.14 OSPF Neighbor Relationship over Layer 2 MPLS VPN

        1.15 OSPF Neighbor States

        1.16 OSPF Network Types

        1.17 Configuring Passive Interfaces

    2. Building the Link-State Database

        2.1 OSPF LSA Types

        2.2 Examining the OSPF Link-State Database

        2.3 OSPF Link-State Database

        2.4 OSPF Type 2 Network LSA

        2.5 OSPF Type 3 Summary LSA

        2.6 OSPF Type 4 ASBR Summary LSA

        2.7 OSPF Type 5 External LSA

        2.8 Periodic OSPF Database Changes

        2.9 Exchanging and Synchronizing LSDBs

        2.10 Synchronizing the LSDB on Multiaccess Networks

        2.11 Running the SPF Algorithm

        2.12 Configuring OSPF Path Selection

        2.13 OSPF Path Selection

        2.14 OSPF Best Path Calculation

        2.15 Default OSPF Costs

        2.16 Calculating the Cost of Intra-Area Routes

        2.17 Calculating the Cost of Interarea Routes

        2.18 Selecting Between Intra-Area and Interarea Routes

    3. Optimizing OSPF Behavior

        3.1 OSPF Route Summarization

        3.2 Benefits of Route Summarization

        3.3 Configuring OSPF Route Summarization

        3.4 Summarization on ABRs

        3.5 Summarization on ASBRs

        3.6 OSPF Virtual Links

        3.7 Configuring OSPF Virtual Links

        3.8 Configuring OSPF Stub Areas

        3.9 OSPF Stub Areas

        3.10 OSPF Totally Stubby Areas

        3.11 Cost of the Default Route in a Stub Area

        3.12 The default-information originate Command

        3.13 Other Stubby Area Types

    4. OSPFv3

        4.1 Configuring OSPFv3

        4.2 Implementing OSPFv3

        4.3 OSPFv3 for IPv4 and IPv6

        4.4 Configuring Advanced OSPFv3

        4.5 OSPFv3 Caveats

[/mpc_tab][mpc_tab title=”Chapter IV” tab_id=”1530159627094-3-5″]

Chapter IV. Manipulating Routing Updates

    1. Using Multiple IP Routing Protocols on a Network

        1.1 Why Run Multiple Routing Protocols?

        1.2 Running Multiple Routing Protocols

        1.3 Administrative Distance

        1.4 Multiple Routing Protocols Solutions

    2. Implementing Route Redistribution

        2.1 Defining Route Redistribution

        2.2 Planning to Redistribute Routes

        2.3 Redistributing Routes

        2.4 Seed Metrics

        2.5 Default Seed Metrics

        2.6 Configuring and Verifying Basic Redistribution in IPv4 and IPv6

        2.7 Redistributing OSPFv2 Routes into the EIGRP Routing Domain

        2.8 Redistributing OSPFv3 Routes into the EIGRP for IPv6 Routing Domain

        2.9 Redistributing EIGRP Routes into the OSPFv2 Routing Domain

        2.10 Redistributing EIGRP for IPv6 Routes into the OSPFv3 Routing Domain

        2.11 Types of Redistribution Techniques

        2.12 One-Point Redistribution

        2.13 Multipoint Redistribution

        2.14 Redistribution Problems

        2.15 Preventing Routing Loops in a Redistribution Environment

        2.16 Verifying Redistribution Operation

    3. Controlling Routing Update Traffic

        3.1 Why Filter Routes?

        3.2 Route Filtering Methods

        3.3 Using Distribute Lists

        3.4 Distribute List and ACL Example

        3.5 Using Prefix Lists

        3.6 Prefix List Characteristics

        3.7 Configuring Prefix Lists

        3.8 Distribute List and Prefix List Example

        3.9 Prefix List Examples

        3.10 Verifying Prefix Lists

        3.11 Manipulating Redistribution Using ACLs, Prefix Lists, and Distribute Lists

        3.12 Using Route Maps

        3.13 Understanding Route Maps

        3.14 Route Map Applications

        3.15 Configuring Route Maps

        3.16 Route Map Match and Set Statements

        3.17 Configuring Route Redistribution Using Route Maps

        3.18 Using Route Maps with Redistribution

        3.19 Manipulating Redistribution Using Route Maps

        3.20 Mutual Redistribution without Route Filtering

        3.21 Mutual Redistribution with Route Maps

        3.22 Change Administrative Distance to Enable Optimal Routing

        3.23 Manipulating Redistribution Using Route Tagging

        3.24 Caveats of Redistribution

[/mpc_tab][mpc_tab title=”Chapter V” tab_id=”1530159628226-4-8″]

Chapter V. Path Control Implementation

    1. Using Cisco Express Forwarding Switching

        1.1 Control and Data Plane

        1.2 Cisco Switching Mechanisms

        1.3 Process and Fast Switching

        1.4 Cisco Express Forwarding

        1.5 Analyzing Cisco Express Forwarding

        1.6 Verify the Content of the CEF Tables

        1.7 Enable and Disable CEF by Interface and Globally

    2. Understanding Path Control

        2.1 The Need for Path Control

        2.2 Implementing Path Control Using Policy-Based Routing

        2.3 PBR Features

        2.4 Steps for Configuring PBR

        2.5 Configuring PBR

        2.6 Verifying PBR

        2.7 Configuring PBR Example

        2.8 Implementing Path Control Using Cisco IOS IP SLAs

        2.9 PBR and IP SLA

        2.10 IP SLA Features

        2.11 Steps for Configuring IP SLAs

        2.12 Verifying Path Control Using IOS IP SLAs

        2.13 Configuring IP SLA Example

        2.14 Configuring PBR and IP SLA Example

[/mpc_tab][mpc_tab title=”Chapter VI” tab_id=”1530163309543-5-10″]

Chapter VI. Enterprise Internet Connectivity

    1. Planning Enterprise Internet Connectivity

        1.1 Connecting Enterprise Networks to an ISP

        1.2 Enterprise Connectivity Requirements

        1.3 ISP Redundancy

        1.4 Public IP Address Assignment

        1.5 The Internet Assigned Numbers Authority

        1.6 Regional Internet Registries

        1.7 Public IP Address Space

        1.8 Autonomous System Numbers

    2. Establishing Single-Homed IPv4 Internet Connectivity

        2.1 Configuring a Provider-Assigned IPv4 Address

        2.2 DHCP Operation

        2.3 Obtaining a Provider-Assigned IPv4 Address with DHCP

        2.4 Configuring a Router as a DHCP Server and DHCP Relay Agent

        2.5 NAT

        2.6 Configuring Static NAT

        2.7 Configuring Dynamic NAT

        2.8 Configuring PAT

        2.9 Limitations of NAT

        2.10 NAT Virtual Interface

        2.11 Configuring NAT Virtual Interface

        2.12 Verifying NAT Virtual Interface

    3. Establishing Single-Homed IPv6 Internet Connectivity

        3.1 Obtaining a Provider-Assigned IPv6 Address

        3.2 Manual Assignment

        3.3 Configuring Basic IPv6 Internet Connectivity

        3.4 Stateless Address Autoconfiguration

        3.5 DHCPv6 Operation

        3.6 Stateless DCHPv6

        3.7 Stateful DHCPv6

        3.8 DHCPv6 Prefix Delegation

        3.9 NAT for IPv6

        3.10 NAT64

        3.11 NPTv6

        3.12 IPv6 ACLs

        3.13 IPv6 ACL Characteristics

        3.14 Configuring IPv6 ACLs

        3.15 Securing IPv6 Internet Connectivity

    4. Improving Internet Connectivity Resilience

        4.1 Drawbacks of a Single-Homed Internet Connectivity

        4.2 Dual-Homed Internet Connectivity

        4.3 Dual-Homed Connectivity Options

        4.4 Configuring Best Path for Dual-Homed Internet Connectivity

        4.5 Multihomed Internet Connectivity

[/mpc_tab][mpc_tab title=”Chapter VII” tab_id=”1530163723275-6-8″]

Chapter VII. BGP Implementation

    1. BGP Terminology, Concepts, and Operation

        1.1 BGP Use Between Autonomous Systems

        1.2 Comparison with Other Scalable Routing Protocols

        1.3 BGP Path Vector Characteristics

        1.4 BGP Characteristics

        1.5 BGP Tables

        1.6 BGP Message Types

        1.7 Open and Keepalive Messages

        1.8 Update Messages

        1.9 Notification Messages

        1.10 When to Use BGP

        1.11 When Not to Use BGP

    2. Implementing Basic BGP

        2.1 BGP Neighbor Relationships

        2.2 External BGP Neighbors

        2.3 Internal BGP Neighbors

        2.4 iBGP on All Routers in a Transit Path

        2.5 Basic BGP Configuration Requirements

        2.6 Entering BGP Configuration Mode

        2.7 Defining BGP Neighbors and Activating BGP Sessions

        2.8 Basic BGP Configuration and Verification

        2.9 Configuring and Verifying an eBGP Session

        2.10 Configuring and Verifying an iBGP Session

        2.11 Advertising Networks in BGP and Verifying That They Are Propagated

        2.12 Using the Next-Hop-Self Feature

        2.13 Understanding and Troubleshooting BGP Neighbor States

        2.14 BGP Session Resilience

        2.15 Sourcing BGP from Loopback Address

        2.16 eBGP Multihop

        2.17 Resetting BGP Sessions

    3. BGP Attributes and the Path-Selection Process

        3.1 BGP Path Selection

        3.2 BGP Path-Selection Process

        3.3 The Path-Selection Decision Process with a Multihomed Connection

        3.4 BGP Attributes

        3.5 Well-Known Attributes

        3.6 Optional Attributes

        3.7 Defined BGP Attributes

        3.8 The AS-Path Attribute

        3.9 The Next-Hop Attribute

        3.10 The Origin Attribute

        3.11 The Local-Preference Attribute

        3.12 The Community Attribute

        3.13 The MED Attribute

        3.14 The Weight Attribute (Cisco Only)

        3.15 Changing the Weight for All Updates from a Neighbor

        3.16 Changing the Weight Using Route Maps

        3.17 Influencing BGP Path Selection

        3.18 Changing the Weight

        3.19 Changing Local Preference

        3.20 Setting the AS-Path

    4. Controlling BGP Routing Updates

        4.1 Filtering BGP Routing Updates

        4.2 BGP Filtering Using Prefix Lists

        4.3 BGP Filtering Using AS-Path Access Lists

        4.4 BGP Filtering Using Route Maps

        4.5 Filtering Order

        4.6 Clearing the BGP Session

        4.7 BGP Peer Groups

        4.8 Peer Group Operation

        4.9 Peer Group Configuration

        4.10 Peer Group Configuration Example

    5. Implementing BGP for IPv6 Internet Connectivity

        5.1 MP-BGP Support for IPv6

        5.2 Exchanging IPv6 Routes over an IPv4 Session

        5.3 Exchanging IPv6 Routes over an IPv6 Session

        5.4 BGP for IPv6 Configuration and Verification

        5.5 Initial State of Routers

        5.6 Enable eBGP IPv6 Route Exchange

        5.7 Enable iBGP IPv6 Route Exchange

        5.8 Comparing IPv4 to Dual (IPv4/IPv6) BGP Transport

        5.9 BGP Filtering Mechanisms for IPv6

        5.10 IPv6 Prefix List Filtering

        5.11 IPv6 Path Selection with BGP Local Preference

[/mpc_tab][mpc_tab title=”Chapter VIII” tab_id=”1530164119765-7-4″]

Chapter VIII. Routers and Routing Protocol Hardening

    1. Securing the Management Plane on Cisco Routers

        1.1 Securing the Management Plane

        1.2 Router Security Policy

        1.3 Encrypted Passwords

        1.4 Use Strong Passwords

        1.5 Encrypting Passwords

        1.6 Authentication, Authorization, Accounting

        1.7 RADIUS and TACACS+ Overview

        1.8 Enabling AAA and Local Authentication

        1.9 Enabling AAA RADIUS Authentication with Local User for Backup

        1.10 Enabling AAA TACACS+ Authentication with Local User for Backup

        1.11 Configuring Authorization and Accounting

        1.12 Limitations of TACACS+ and RADIUS

        1.13 Use SSH Instead of Telnet

        1.14 Securing Access to the Infrastructure Using Router ACLs

        1.15 Implement Unicast Reverse Path Forwarding

        1.16 uRPF in an Enterprise Network

        1.17 uRPF Examples

        1.18 Enabling uRPF

        1.19 Implement Logging

        1.20 Implementing Network Time Protocol

        1.21 NTP Modes

        1.22 Enabling NTP

        1.23 Securing NTP

        1.24 NTP Versions

        1.25 NTP in IPv6 Environment

        1.26 Simple NTP

        1.27 Implementing SNMP

        1.28 SNMPv3

        1.29 Enabling SNMPv3

        1.30 Verifying SNMPv3

        1.31 Configuration Backups

        1.32 The archive Command

        1.33 Using SCP

        1.34 Enabling SCP on a Router

        1.35 Disabling Unused Services

        1.36 Conditional Debugging

        1.37 Enabling Conditional Debugging

    2. Routing Protocol Authentication Options

        2.1 The Purpose of Routing Protocol Authentication

        2.2 Plain-Text Authentication

        2.3 Hashing Authentication

        2.4 Time-Based Key Chains

        2.5 Key Chain Specifics

        2.6 Authentication Options with Different Routing Protocols

    3. Configuring EIGRP Authentication

        3.1 EIGRP Authentication Configuration Checklist

        3.2 Configuring EIGRP Authentication

        3.3 Configure EIGRP MD5 Authentication Mode

        3.4 Configure EIGRP Key-Based Routing Authentication

        3.5 Configuring EIGRP for IPv6 Authentication

        3.6 Configure EIGRP for IPv6 MD5 Authentication Mode

        3.7 Configuring Named EIGRP Authentication

    4. Configuring OSPF Authentication

        4.1 OSPF Authentication

        4.2 OSPF MD5 Authentication

        4.3 Configure OSPF MD5 Authentication

        4.4 Configure OSPF MD5 Authentication on Interfaces

        4.5 Configure OSPF MD5 Authentication in an Area

        4.6 OSPFv2 Cryptographic Authentication

        4.7 Configuring OSPFv2 Cryptographic Authentication

        4.8 Configure OSPFv2 Cryptographic Authentication Example

        4.9 OSPFv3 Authentication

        4.10 Configuring OSPFv3 Authentication

        4.11 Configuring OSPFv3 Authentication on an Interface Example

        4.12 Configuring OSPFv3 Authentication in an Area Example

    5. Configuring BGP Authentication

        5.1 BGP Authentication Configuration Checklist

        5.2 BGP Authentication Configuration

        5.3 BGP for IPv6 Authentication Configuration

    6. Implementing VRF-Lite

        6.1 VRF and VRF-Lite

        6.2 Enabling VRF

    7. Easy Virtual Network

[/mpc_tab][/mpc_tabs]

IT Best-Path

IT Best-Path 사이트는 IT 엔지니어분들에게
기술에 대하여 온라인으로 학습할 수 있도록
유·무료 교육자료를 제공하는 사이트입니다.

지엔컨설팅(주) | 대표이사 이경태

서울특별시 동작구 동작대로 149, 2층
TEL. 070-7633-4466
FAX. 070-8270-4466
E-mail. master@itbestpath.com

사업자등록정보

사업자등록번호: 105-87-27154
통신판매업신고: 2009-서울동작-0235
학원설립·운영등록번호: 제2639호
개인정보관리책임자: 이경태

top
Copyright© IT BEST-PATH. All Rights Reserved.

로그인

회원가입

계정 생성하기
X