February 8, 2016 by James

CCIE v5 Tracker

 

1. LAN Switching


☐ 1.1. VLANs & Trunking
☐ 1.1.1. Standard VLANs
☐ 1.1.2. Extended VLANs
☐ 1.1.3. VLAN Database
☐ 1.1.4. Access Ports
☐ 1.1.5. 802.1q Trunk Ports
☐ 1.1.6. 802.1q Native VLAN
☐ 1.1.7. Dynamic Trunking Protocol (DTP)
☐ 1.1.8. Trunking Allowed List
☐ 1.2. VTP
☐ 1.2.1. VTP Version 1, 2, & 3
☐ 1.2.2. VTP Authentication
☐ 1.2.3. VTP Pruning
☐ 1.2.4. VTP Prune Eligible List
☐ 1.2.5. VTPv3 & Private VLANs
☐ 1.3. EtherChannels
☐ 1.3.1. Static Layer 2 EtherChannels
☐ 1.3.2. PAgP
☐ 1.3.3. LACP
☐ 1.3.4. Layer 3 EtherChannel
☐ 1.3.5. EtherChannel Load Balancing
☐ 1.3.6. EtherChannel Protocol Limiting
☐ 1.3.7. EtherChannel Misconfig Guard
☐ 1.4. Spanning-Tree Protocol
☐ 1.4.1. PVST+
☐ 1.4.1.1. STP Root Bridge Election
☐ 1.4.1.2. STP Path Selection with Port Cost
☐ 1.4.1.3. STP Path Selection with Port Priority
☐ 1.4.1.4. STP Convergence Timers
☐ 1.4.2. Optional STP Features
☐ 1.4.2.1. PortFast
☐ 1.4.2.2. UplinkFast
☐ 1.4.2.3. BackboneFast
☐ 1.4.2.4. BPDU Guard
☐ 1.4.2.5. BPDU Filter
☐ 1.4.2.6. Root Guard
☐ 1.4.3. Rapid-PVST+
☐ 1.4.3.1. RSTP Convergence Optimizations
☐ 1.4.3.2. Edge Ports
☐ 1.4.4. Multiple STP
☐ 1.4.4.1. MST Root Bridge Election
☐ 1.4.4.2. MST Path Selection with Port Cost
☐ 1.4.4.3. MST Path Selection with Port Priority
☐ 1.4.4.4. MST and CST/PVST+ Interoperability
☐ 1.4.4.5. Multi-Region MST
1.5. 802.1q Tunneling
☐ 1.5.1. L2 Protocol Tunneling
☐ 1.5.2. Layer 2 MTU
1.5.3. EtherChannel over 802.1q Tunneling
☐ 1.6. Miscellaneous
☐ 1.6.1. CDP
☐ 1.6.2. LLDP
☐ 1.6.3. UDLD
☐ 1.6.4. CAM Aging Time
☐ 1.6.5. SPAN
☐ 1.6.6. RSPAN
☐ 1.6.7. ERSPAN
1.6.8. Flex Links
☐ 1.6.9. Fallback Bridging
☐ 1.6.10. Voice VLANs
☐ 1.6.11. Smartport Macros

 

 2. Layer 2 WAN Circuits

 

☐2.1. HDLC
☐ 2.2. PPP
☐ 2.3. PPP Authentication
☐ 2.4. PPP Multilink
☐ 2.5. PPPoE


3. IP Routing

 

☐ 3.1.  Protocol Independent IPv4 Routing

☐ 3.1.1. IPv4 Addressing
☐ 3.1.2. IPv4 ARP
☐ 3.1.3. Longest Match Routing
☐ 3.1.4. Administrative Distance
☐ 3.1.5. Static Routing
☐ 3.1.6. Route Recursion
☐ 3.1.7. Egress Interface vs. Next Hop Static Routing
☐ 3.1.8. Default Routing
☐ 3.1.9. CEF
☐ 3.1.10. Floating Static Routes
☐ 3.1.11. Backup Interface
☐ 3.1.12. IP Service Level Agreement
☐ 3.1.13. Enhanced Object Tracking
☐ 3.1.14. Policy Routing
☐ 3.1.15. Policy Routing and IP SLA
☐ 3.1.16. Local Policy Routing
☐ 3.1.17. GRE Tunnels
☐ 3.1.18. IP in IP Tunnels
☐ 3.1.19. Tunnels & Recursive Routing Errors

☐ 3.1.20. On Demand Routing

☐ 3.1.21. VRF Lite
☐ 3.1.22. Bidirectional Forwarding Detection
☐ 3.1.23. Performance Routing (PfR) *
☐ 3.2. Protocol Independent IPv6 Routing
☐ 3.2.1. IPv6 Link-Local Addressing
☐ 3.2.2. IPv6 Unique Local Addressing
☐ 3.2.3. IPv6 Global Aggregatable Addressing
☐ 3.2.4. IPv6 EUI-64 Addressing
☐ 3.2.5. IPv6 Auto-Configuration / SLAAC
☐ 3.2.6. IPv6 Global Prefix
☐ 3.2.7. IPv6 Redistribution
☐ 3.2.8. IPv6 Filtering
☐ 3.2.9. IPv6 NAT-PT
☐ 3.2.10. IPv6 MP-BGP
☐ 3.2.11. IPv6 Tunneling *
☐ 3.2.12. Automatic 6to4 Tunneling*
☐ 3.2.13. ISATAP Tunneling *
☐ 3.3. Common Dynamic Routing Features
☐ 3.3.1. Distance Vector vs. Link State vs. Path Vector routing protocols
☐ 3.3.2. Passive Interfaces
☐ 3.3.3. Routing Protocol Authentication
☐ 3.3.4. Route Filtering
☐ 3.3.5. Auto Summarization
☐ 3.3.6. Manual Summarization
☐ 3.3.7. Route Redistribution
☐ 3.3.7.1. Prefix Filtering with Route Tagging
☐ 3.3.7.2. Prefix Filtering with Manual Lists
☐ 3.3.7.3. Prefix Filtering with Administrative Distance
☐ 3.3.7.4. Administrative Distance Based Loops
☐ 3.3.7.5. Metric Based Loops
☐ 3.4. RIP
☐ 3.4.1. RIPv2
☐ 3.4.1.1. Initialization
☐ 3.4.1.1.1. Enabling RIPv2
☐ 3.4.1.1.2. RIP Send and Receive Versions
☐ 3.4.1.1.3. Split Horizon
☐ 3.4.1.1.4. RIPv2 Unicast Updates
☐ 3.4.1.1.5. RIPv2 Broadcast Updates
☐ 3.4.1.1.6. RIPv2 Source Validation
☐ 3.4.1.2. Path Selection
☐ 3.4.1.2.1. Offset List
☐ 3.4.1.3. Summarization
☐ 3.4.1.3.1. Auto-Summary
☐ 3.4.1.3.2. Manual Summarization
☐ 3.4.1.4. Authentication
☐ 3.4.1.4.1. Clear Text
☐ 3.4.1.4.2. MD5
☐ 3.4.1.5. Convergence Optimization & Scalability
☐ 3.4.1.5.1. RIPv2 Convergence Timers
☐ 3.4.1.5.2. RIPv2 Triggered Updates
☐ 3.4.1.6. Filtering
☐ 3.4.1.6.1. Filtering with Passive Interface
☐ 3.4.1.6.2. Filtering with Prefix-Lists
☐ 3.4.1.6.3. Filtering with Standard Access-Lists
☐ 3.4.1.6.4. Filtering with Extended Access-Lists
☐ 3.4.1.6.5. Filtering with Offset Lists
☐ 3.4.1.6.6. Filtering with Administrative Distance
☐ 3.4.1.6.7. Filtering with Per Neighbor AD
☐ 3.4.1.7. Default Routing
☐ 3.4.1.7.1. RIPv2 Default Routing
☐ 3.4.1.7.2. RIPv2 Conditional Default Routing
☐ 3.4.1.7.3. RIPv2 Reliable Conditional Default Routing
☐ 3.4.2. RIPng *
☐ 3.4.2.1. RIPng Overview *
☐ 3.5. EIGRP
☐ 3.5.1. Initialization
☐ 3.5.1.1. Network Statement
☐ 3.5.1.2. Multicast vs. Unicast Updates
☐ 3.5.1.3. EIGRP Named Mode
☐ 3.5.1.4. EIGRP Multi AF Mode
☐ 3.5.1.5. EIGRP Split Horizon
☐ 3.5.1.6. EIGRP Next-Hop Processing
☐ 3.5.2. Path Selection
☐ 3.5.2.1. Feasibility Condition
☐ 3.5.2.2. Modifying EIGRP Vector Attributes
☐ 3.5.2.3. Classic Metric
☐ 3.5.2.4. Wide Metric
☐ 3.5.2.5. Metric Weights
☐ 3.5.2.6. Equal Cost Load Balancing
☐ 3.5.2.7. Unequal Cost Load Balancing
☐ 3.5.2.8. EIGRP Add-Path
☐ 3.5.3. Summarization
☐ 3.5.3.1. Auto-Summary
☐ 3.5.3.2. Manual Summarization
☐ 3.5.3.3. Summarization with Default Routing
☐ 3.5.3.4. Summarization with Leak Map
☐ 3.5.3.5. Summary Metric
☐ 3.5.4. Authentication
☐ 3.5.4.1. MD5
☐ 3.5.4.2. HMAC SHA2-256bit
☐ 3.5.4.3. Automatic key rollover
☐ 3.5.5. Convergence Optimization & Scalability
☐ 3.5.5.1. EIGRP Convergence Timers
☐ 3.5.5.2. EIGRP Query Scoping with Summarization
☐ 3.5.5.3. EIGRP Query Scoping with Stub Routing
☐ 3.5.5.4. Stub Routing with Leak Map
☐ 3.5.5.5. Bandwidth Pacing
☐ 3.5.5.6. IP FRR
☐ 3.5.5.7. Graceful Restart & NSF
☐ 3.5.6. Filtering
☐ 3.5.6.1. Filtering with Passive Interface
☐ 3.5.6.2. Filtering with Prefix-Lists
☐ 3.5.6.3. Filtering with Standard Access-Lists
☐ 3.5.6.4. Filtering with Extended Access-Lists
☐ 3.5.6.5. Filtering with Offset Lists
☐ 3.5.6.6. Filtering with Administrative Distance
☐ 3.5.6.7. Filtering with Per Neighbor AD
☐ 3.5.6.8. Filtering with Route Maps
☐ 3.5.6.9. Per Neighbor Prefix Limit
☐ 3.5.6.10. Redistribution Prefix Limit
☐ 3.5.7. Miscellaneous EIGRP
☐ 3.5.7.1. EIGRP Default Network
☐ 3.5.7.2. EIGRP Default Metric
☐ 3.5.7.3. EIGRP Neighbor Logging
☐ 3.5.7.4. EIGRP Router-ID
☐ 3.5.7.5. EIGRP Maximum Hops
☐ 3.5.7.6. no next-hop-self no-ecmp-mode
☐ 3.5.7.7. EIGRP Route Tag Enhancements
☐ 3.5.8. EIGRPv6
☐ 3.5.8.1. Enabling EIGRPv6
☐ 3.5.8.2. EIGRPv6 Split Horizon
☐ 3.5.8.3. EIGRPv6 Next-Hop Processing
☐ 3.5.8.4. EIGRPv6 Authentication
☐ 3.5.8.5. EIGRPv6 Metric Manipulation
☐ 3.5.8.6. EIGRPv6 Default Routing
☐ 3.5.8.7. EIGRPv6 Summarization
☐ 3.5.8.8. EIGRPv6 Prefix Filtering
☐ 3.5.8.9. EIGRPv6 Stub Routing
☐ 3.5.8.10. EIGRPv6 Link Bandwidth
☐ 3.5.8.11. EIGRPv6 Timers
☐ 3.5.8.12. EIGRP IPv6 VRF Lite
☐ 3.5.8.13. EIGRP Over The Top
☐ 3.6. OSPF
☐ 3.6.1. Initialization
☐ 3.6.1.1. Network Statement
☐ 3.6.1.2. Interface Statement
☐ 3.6.2. Network Types
☐ 3.6.2.1. Broadcast
☐ 3.6.2.2. Non-Broadcast
☐ 3.6.2.3. OSPF DR/BDR Election Manipulation
☐ 3.6.2.4. Point-to-Point
☐ 3.6.2.5. Point-to-Multipoint
☐ 3.6.2.6. Point-to-Multipoint Non-Broadcast
☐ 3.6.2.7. Loopback
☐ 3.6.2.8. LSA Types
☐ 3.6.2.9. OSPF Next-Hop Processing
☐ 3.6.2.10. Unicast vs. Multicast Hellos
☐ 3.6.3. Path Selection
☐ 3.6.3.1. Auto-Cost
☐ 3.6.3.2. Cost
☐ 3.6.3.3. Bandwidth
☐ 3.6.3.4. Per-Neighbor Cost
☐ 3.6.3.5. Non-Backbone Transit Areas
☐ 3.6.3.6. Virtual-Links
☐ 3.6.4. Authentication
☐ 3.6.4.1. Area
☐ 3.6.4.2. Interface level
☐ 3.6.4.3. Clear Text
☐ 3.6.4.4. MD5
☐ 3.6.4.5. Null
☐ 3.6.4.6. MD5 with Multiple Keys
☐ 3.6.4.7. SHA1-196
☐ 3.6.4.8. Virtual link
☐ 3.6.5. Summarization
☐ 3.6.5.1. Internal Summarization
☐ 3.6.5.2. External Summarization
☐ 3.6.5.3. Path Selection with Summarization
☐ 3.6.5.4. Summarization and Discard Routes
☐ 3.6.6. Stub Areas
☐ 3.6.6.1. Stub Areas
☐ 3.6.6.2. Totally Stubby Areas
☐ 3.6.6.3. Not-So-Stubby Areas
☐ 3.6.6.4. Not-So-Stubby Areas and Default Routing
☐ 3.6.6.5. Not-So-Totally-Stubby Areas
☐ 3.6.6.6. Stub Areas with Multiple Exit Points
☐ 3.6.6.7. NSSA Type-7 to Type-5 Translator Election
☐ 3.6.6.8. NSSA Redistribution Filtering
☐ 3.6.7. Filtering
☐ 3.6.7.1. Filtering with Distribute-Lists
☐ 3.6.7.2. Filtering with Administrative Distance
☐ 3.6.7.3. Filtering with Route-Maps
☐ 3.6.7.4. Filtering with Summarization
☐ 3.6.7.5. LSA Type-3 Filtering
☐ 3.6.7.6. Forwarding Address Suppression
☐ 3.6.7.7. NSSA ABR External Prefix Filtering
☐ 3.6.7.8. Database Filtering
☐ 3.6.8. Default Routing
☐ 3.6.8.1. Default Routing
☐ 3.6.8.2. Conditional Default Routing
☐ 3.6.8.3. Reliable Conditional Default Routing
☐ 3.6.8.4. Default Cost
☐ 3.6.9. Convergence Optimization & Scalability
☐ 3.6.9.1. Interface Timers
☐ 3.6.9.2. Fast Hellos
☐ 3.6.9.3. LSA & SPF Throttling
☐ 3.6.9.4. LSA & SPF Pacing
☐ 3.6.9.5. Single Hop LFA / IP FRR
☐ 3.6.9.6. Multihop LFA
☐ 3.6.9.7. Stub Router Advertisement
☐ 3.6.9.8. Demand Circuit
☐ 3.6.9.9. Flooding Reduction
☐ 3.6.9.10. Transit Prefix Filtering
☐ 3.6.9.11. Resource Limiting
☐ 3.6.9.12. Graceful Restart & NSF
☐ 3.6.9.13. Incremental SPF
☐ 3.6.10. Miscellaneous OSPF Features
☐ 3.6.11. OSPFv3
☐ 3.6.11.1. LSA Types
☐ 3.6.11.2. OSPFv3
☐ 3.6.11.3. OSPFv3 Network Types
☐ 3.6.11.4. OSPFv3 Prefix Suppression
☐ 3.6.11.5. OSPFv3 Virtual Links
☐ 3.6.11.6. OSPFv3 Summarization
☐ 3.6.11.7. OSPFv3 IPsec Authentication
☐ 3.6.11.8. OSPFv3 Multi AF Mode
☐ 3.6.11.9. TTL Security
☐ 3.7. BGP
☐ 3.7.1. Establishing Peerings
☐ 3.7.1.1. iBGP Peerings
☐ 3.7.1.2. EBGP Peerings
☐ 3.7.1.3. Update Source Modification
☐ 3.7.1.4. Multihop EBGP Peerings
☐ 3.7.1.5. Neighbor Disable-Connected-Check
☐ 3.7.1.6. Authentication
☐ 3.7.1.7. TTL Security
☐ 3.7.1.8. BGP Peer Groups
☐ 3.7.1.9. 4 Byte ASNs
☐ 3.7.1.10. Active vs. Passive Peers
☐ 3.7.1.11. Path MTU Discovery
☐ 3.7.1.12. Multi Session TCP Transport per AF
☐ 3.7.1.13. Dynamic BGP Peering
☐ 3.7.2. iBGP Scaling
☐ 3.7.2.1. Route Reflectors
☐ 3.7.2.2. Route Reflector Clusters
☐ 3.7.2.3. Confederations
☐ 3.7.3. BGP Next Hop Processing
☐ 3.7.3.1. Next-Hop-Self
☐ 3.7.3.2. Manual Next-Hop Modification
☐ 3.7.3.3. Third Party Next Hop
☐ 3.7.3.4. Next Hop Tracking
☐ 3.7.3.5. Conditional Next Hop Tracking
☐ 3.7.3.6. BGP Next-Hop Trigger Delay
☐ 3.7.4. BGP NLRI Origination
☐ 3.7.4.1. Network Statement
☐ 3.7.4.2. Redistribution
☐ 3.7.4.3. BGP Redistribute Internal
☐ 3.7.4.4. Conditional Advertisement
☐ 3.7.4.5. Conditional Route Injection
☐ 3.7.5. BGP Bestpath Selection
☐ 3.7.5.1. Weight
☐ 3.7.5.2. Local Preference
☐ 3.7.5.3. AS-Path Prepending
☐ 3.7.5.4. Origin
☐ 3.7.5.5. MED
☐ 3.7.5.6. Always Compare MED
☐ 3.7.5.7. Deterministic MED
☐ 3.7.5.8. AS-Path Ignore
☐ 3.7.5.9. Router-IDs
☐ 3.7.5.10. DMZ Link Bandwidth
☐ 3.7.5.11. Maximum AS Limit
☐ 3.7.5.12. Multipath
☐ 3.7.6. BGP Aggregation
☐ 3.7.6.1. BGP Auto-Summary
☐ 3.7.6.2. Aggregation
☐ 3.7.6.3. Summary Only
☐ 3.7.6.4. Suppress Map
☐ 3.7.6.5. Unsuppress Map
☐ 3.7.6.6. AS-Set
☐ 3.7.6.7. Attribute-Map
☐ 3.7.6.8. Advertise Map
☐ 3.7.7. BGP Communities
☐ 3.7.7.1. Standard
☐ 3.7.7.2. Extended
☐ 3.7.7.3. No-Advertise
☐ 3.7.7.4. No-Export
☐ 3.7.7.5. Local-AS
☐ 3.7.7.6. Deleting
☐ 3.7.8. Filtering
☐ 3.7.8.1. Prefix-Lists
☐ 3.7.8.2. Standard Access-Lists Task
☐ 3.7.8.3. Extended Access-Lists
☐ 3.7.8.4. Maximum Prefix
☐ 3.7.8.5. BGP Regular Expressions
☐ 3.7.8.6. Outbound Route Filtering (ORF)
☐ 3.7.8.7. Soft Reconfiguration Inbound
☐ 3.7.9. AS-Path Manipulation
☐ 3.7.9.1. Local AS
☐ 3.7.9.2. Local AS Replace-AS/Dual-AS
☐ 3.7.9.3. Remove Private AS
☐ 3.7.9.4. Allow AS In
☐ 3.7.9.5. AS Override
☐ 3.7.10. BGP Convergence Optimization
☐ 3.7.10.1. BGP Timers Tuning
☐ 3.7.10.2. BGP Fast Fallover
☐ 3.7.10.3. BGP Prefix Independent Convergence (PIC)
☐ 3.7.10.4. BGP Dampening
☐ 3.7.10.5. BGP Dampening with Route-Map
☐ 3.7.10.6. BGP Add Path
☐ 3.7.11. BGP Default Routing
☐ 3.7.12. IPv6 BGP
☐ 3.7.13. Misc BGP
☐ 3.7.13.1. iBGP Synchronization
☐ 3.7.13.2. BGP over GRE
☐ 3.7.13.3. BGP Backdoor
☐ 3.8. Route Redistribution
☐ 3.8.1. Metric Based Loops
☐ 3.8.2. Administrative Distance Based Loops
☐ 3.8.3. Route Tag Filtering
☐ 3.8.4. IP Route Profile
☐ 3.8.5. Debug IP Routing
☐ 3.9. Miscellaneous Routing Features
☐ 3.10. IS-IS *


 4. VPN


☐ 4.1. MPLS
☐ 4.1.1. VRF Lite
☐ 4.1.2. MPLS LDP
☐ 4.1.3. MPLS Ping
☐ 4.1.4. MPLS Traceroute
☐ 4.1.5. MPLS Label Filtering
☐ 4.1.6. MP-BGP VPNv4
☐ 4.1.7. MP-BGP Prefix Filtering
☐ 4.1.8. PE-CE Routing with RIP
☐ 4.1.9. PE-CE Routing with OSPF
☐ 4.1.10. OSPF Sham-Link
☐ 4.1.11. PE-CE Routing with EIGRP
☐ 4.1.12. EIGRP Site-of-Origin
☐ 4.1.13. PE-CE Routing with BGP
☐ 4.1.14. BGP SoO Attribute
☐ 4.1.15. Internet Access
☐ 4.1.16. Route Leaking
☐ 4.1.17. MPLS VPN Performance Tuning
☐ 4.1.18. AToM *
☐ 4.1.19. L2TPV3 *
☐ 4.1.20. VPLS *
☐ 4.2. IPsec LAN-to-LAN
☐ 4.2.1. ISAKMP Policies
☐ 4.2.2. PSK Authentication
☐ 4.2.3. Static Crypto Maps
☐ 4.2.4. IPsec over GRE
☐ 4.2.5. Static VTI
☐ 4.2.6. GETVPN *
☐ 4.3. DMVPN
☐ 4.3.1. Single Hub
☐ 4.3.2. NHRP
☐ 4.3.3. DMVPN Phase 1, 2, & 3
☐ 4.3.4. QoS Profiles
☐ 4.3.5. QoS Pre-Classify


 5. Multicast


☐ 5.1. Layer 2 Multicast
☐ 5.1.1. IGMPv1, IGMPv2, IGMPv3
☐ 5.1.2. IGMP Snooping
☐ 5.1.3. IGMP Querier Election
☐ 5.1.4. IGMP Filtering
☐ 5.1.5. IGMP Proxy
☐ 5.1.6. IGMP Timers
☐ 5.1.7. Multicast VLAN Registration
☐ 5.1.8. IGMP Profiles
☐ 5.2. IPv4 Multicast Routing
☐ 5.2.1. PIM Dense Mode
☐ 5.2.2. PIM Sparse Mode
☐ 5.2.3. PIM Sparse Dense Mode
☐ 5.2.4. Static RP
☐ 5.2.5. Auto-RP
☐ 5.2.5.1. Auto-RP
☐ 5.2.5.2. Sparse Dense Mode
☐ 5.2.5.3. Auto-RP Listener
☐ 5.2.5.4. Multiple Candidate RPs
☐ 5.2.5.5. Filtering Candidate RPs
☐ 5.2.5.6. RP & MA placement problems
☐ 5.2.6. Bootstrap Router
☐ 5.2.6.1. BSR
☐ 5.2.6.2. Multiple RP Candidates
☐ 5.2.6.3. Multiple BSR Candidates
☐ 5.2.7. Source Specific Multicast
☐ 5.2.8. Bidirectional PIM
☐ 5.2.9. Group to RP Mapping
☐ 5.2.10. Anycast RP
☐ 5.2.11. MSDP
☐ 5.2.12. MSDP SA Filtering
☐ 5.2.13. Multicast TTL Scoping
☐ 5.2.14. Auto-RP & BSR Boundary Filtering
☐ 5.2.15. PIM Accept Register Filtering
☐ 5.2.16. PIM Accept RP Filtering
☐ 5.2.17. RPF Failure
☐ 5.2.18. Registration Failure
☐ 5.2.19. PIM DR Election
☐ 5.2.20. PIM DF Election
☐ 5.2.21. PIM Assert
☐ 5.2.22. Static Multicast Routes
☐ 5.2.23. Multicast BGP
☐ 5.2.24. PIM NBMA Mode
☐ 5.2.25. Multicast over GRE
☐ 5.2.26. Stub Multicast Routing
☐ 5.2.27. Multicast Helper Map
☐ 5.2.28. Multicast Rate Limiting
☐ 5.2.29. Multicast BGP
☐ 5.3. IPv6 Multicast Routing *
☐ 5.3.1. IPv6 PIM and MLD *
☐ 5.3.2. IPv6 PIM BSR *
☐ 5.3.3. IPv6 Embedded RP *
☐ 5.3.4. IPv6 SSM *


 6. QoS

 


☐ 6.1. Hold-Queue and Tx-Ring
☐ 6.2. Weighted Fair Queuing (WFQ)
☐ 6.3. Selective Packet Discard
☐ 6.4. Payload Compression on Serial Links
☐ 6.5. Generic TCP/UDP Header Compression
☐ 6.6. MLP Link Fragmentation and Interleaving
☐ 6.7. MQC Classification and Marking
☐ 6.8. MQC Bandwidth Reservations and CBWFQ
☐ 6.9. MQC Bandwidth Percent
☐ 6.10. MQC LLQ and Remaining Bandwidth Reservations
☐ 6.11. MQC WRED
☐ 6.12. MQC Dynamic Flows and WRED
☐ 6.13. MQC WRED with ECN
☐ 6.14. MQC Class-Based Generic Traffic Shaping
☐ 6.15. MQC Class-Based GTS and CBWFQ
☐ 6.16. MQC Single-Rate Three-Color Policer
☐ 6.17. MQC Hierarchical Policers
☐ 6.18. MQC Two-Rate Three-Color Policer
☐ 6.19. MQC Peak Shaping
☐ 6.20. MQC Percent-Based Policing
☐ 6.21. MQC Header Compression
☐ 6.22. Voice Adaptive Traffic Shaping
☐ 6.23. Voice Adaptive Fragmentation
☐ 6.24. Advanced HTTP Classification with NBAR
☐ 6.22. Layer 2 QoS *

 

 7. Security


☐ 7.1. Layer 2 Security
☐ 7.1.1. Port Protection
☐ 7.1.2. Private VLANs
☐ 7.1.3. Port Based ACLs
☐ 7.1.4. VLAN ACLs for IP Traffic
☐ 7.1.5. VLAN ACLs for Non-IP Traffic
☐ 7.1.6. Storm Control
☐ 7.1.7. Port Security
☐ 7.1.8. HSRP and Port-Security
☐ 7.1.9. ErrDisable Recovery
☐ 7.1.10. DHCP Snooping
☐ 7.1.11. DHCP Snooping and the Information Option
☐ 7.1.12. Dynamic ARP Inspection
☐ 7.1.13. IP Source Guard
☐ 7.1.14. 802.1x *
☐ 7.2. Management Plane Security
☐ 7.2.1. AAA Authentication Lists
☐ 7.2.2. AAA Exec Authorization
☐ 7.2.3. AAA Local Command Authorization
☐ 7.2.4. Controlling Terminal Line Access
☐ 7.2.5. IOS Login Enhancements
☐ 7.2.6. IOS Resilient Configuration
☐ 7.2.7. Role-Based CLI
☐ 7.2.8. AAA with TACACS+ and RADIUS *
☐ 7.3. Control Plane Security
☐ 7.3.1. Controlling the ICMP Messages Rate
☐ 7.3.2. Control Plane Policing
☐ 7.3.3. Control Plane Protection (CPPr)
☐ 7.3.4. Control Plane Host
☐ 7.4. Data Plane Security
☐ 7.4.1. Traffic Filtering Using Standard Access-Lists
☐ 7.4.2. Traffic Filtering Using Extended Access-Lists
☐ 7.4.3. Traffic Filtering Using Reflexive Access-Lists
☐ 7.4.4. IPv6 Traffic Filter
☐ 7.4.5. Filtering Fragmented Packets
☐ 7.4.6. Filtering Packets with Dynamic Access-Lists
☐ 7.4.7. Filtering Traffic with Time-Based Access Lists
☐ 7.4.8. Traffic Filtering with Policy-Based Routing
☐ 7.4.9. Preventing Packet Spoofing with uRPF
☐ 7.4.10. Using NBAR for Content-Based Filtering
☐ 7.4.11. TCP Intercept
☐ 7.4.12. TCP Intercept Watch Mode
☐ 7.4.13. Packet Logging with Access-Lists
☐ 7.4.14. IP Source Tracker
7.4.15. Router IP Traffic Export (RITE)
☐ 7.4.16. IOS ACL Selective IP Option Drop
☐ 7.4.17. Flexible Packet Matching
☐ 7.4.18. IPv6 First Hop Security
☐ 7.4.18.1. RA guard
☐ 7.4.18.2. DHCP guard
☐ 7.4.18.3. Binding table
☐ 7.4.18.4. Device tracking
☐ 7.4.18.5. ND inspection/snooping
☐ 7.4.18.6. Source guard
☐ 7.4.18.7. PACL


 8. System Management


☐ 8.1. Device Management
☐ 8.1.1. Console
☐ 8.1.2. Telnet
☐ 8.1.2.1. Telnet Service Options
☐ 8.1.3. SSH
☐ 8.1.4. Terminal Line Settings
☐ 8.1.5. HTTP Server and Client
☐ 8.1.6. FTP Server and Client
☐ 8.1.7. TFTP Server and Client
☐ 8.1.8. SNMP
☐ 8.1.8.1. SNMPv2 Server
☐ 8.1.8.2. SNMPv2c Access Control
☐ 8.1.8.3. SNMP Traps and Informs
☐ 8.1.8.4. CPU and Memory Thresholds
☐ 8.1.8.5. SNMPv3
☐ 8.1.8.6. SNMP MAC Address Notifications
☐ 8.1.8.7. SNMP Notifications of Syslog Messages
☐ 8.2. Logging
☐ 8.2.1. System Message Logging
☐ 8.2.2. Syslog Logging
☐ 8.2.3. Logging Counting and Timestamps
☐ 8.2.4. Logging to Flash Memory
☐ 8.2.5. Configuration Change Notification and Logging
☐ 8.2.6. Configuration Archive and Rollback
☐ 8.2.7. Logging with Access-Lists
☐ 8.3. NTP
☐ 8.3.1. NTP
☐ 8.3.2. NTP Authentication
☐ 8.3.3. NTP Access Control
☐ 8.3.4. NTP Version 3 & 4
☐ 8.4. EEM
☐ 8.4.1. KRON Command Schedule
☐ 8.4.2. EEM Scripting: Interface Events
☐ 8.4.3. EEM Scripting: Syslog Events
☐ 8.4.4. EEM Scripting: CLI Events
☐ 8.4.5. EEM Scripting: Periodic Scheduling
☐ 8.4.6. EEM Scripting: Advanced Features
☐ 8.4.7. EEM Applets
☐ 8.5. Miscellaneous System Management
☐ 8.5.1. Auto-Install over LAN Interfaces using DHCP
☐ 8.5.2. Auto-Install over LAN Interfaces Using RARP
☐ 8.5.3. IOS Menus
☐ 8.5.4. IOS Banners
☐ 8.5.5. Exec Aliases
☐ 8.5.6. TCP Keepalives
☐ 8.5.7. Generating Exception Core Dumps
☐ 8.5.8. Conditional Debugging
☐ 8.5.9. Tuning Packet Buffers
☐ 8.5.10. CDP
☐ 8.5.11. Remote Shell


 9. Network Services


☐ 9.1. Object Tracking
☐ 9.1.1. IP SLA
☐ 9.1.2. Enhanced Object Tracking
☐ 9.1.3. Tracking Lists
☐ 9.2. First Hop Redundancy Protocols
☐ 9.2.1. HSRP
☐ 9.2.2. VRRP
☐ 9.2.3. GLBP
☐ 9.2.4. Router Redundancy and Object Tracking
☐ 9.2.5. IPv6 RS & RA Redundancy
☐ 9.3. DHCP
☐ 9.3.1. DHCP Server
☐ 9.3.2. DHCP Client
☐ 9.3.3. DHCP Relay
☐ 9.3.4. DHCP Host Pools
☐ 9.3.5. DHCP On-Demand Pool
☐ 9.3.6. DHCP Proxy
☐ 9.3.7. DHCP Information Option
☐ 9.3.8. DHCP Authorized ARP
☐ 9.3.9. SLAAC/DHCPv6 interaction
☐ 9.3.10. Stateful & Stateless DHCPv6
☐ 9.3.11. DHCPv6 prefix delegation
☐ 9.4. DNS
☐ 9.4.1. IOS Authoritative DNS Server
☐ 9.4.2. IOS Caching DNS Server
☐ 9.4.3. IOS DNS Spoofing
☐ 9.5. NAT
☐ 9.5.1. Basic NAT
☐ 9.5.2. NAT Overload
☐ 9.5.3. NAT with Route Maps
☐ 9.5.4. Static NAT
☐ 9.5.5. Static PAT
☐ 9.5.6. Static NAT and IP Aliasing
☐ 9.5.7. Static Policy NAT
☐ 9.5.8. NAT with Overlapping Subnets
☐ 9.5.9. TCP Load Distribution with NAT
☐ 9.5.10. Stateful NAT with HSRP
☐ 9.5.11. Stateful NAT with Primary/Backup
☐ 9.5.12. NAT Virtual Interface
☐ 9.5.13. NAT Default Interface
☐ 9.5.14. Reversible NAT
☐ 9.5.15. Static Extendable NAT
☐ 9.5.16. NAT ALG
☐ 9.6. Traffic Accounting
☐ 9.6.1. IP Precedence Accounting
☐ 9.6.2. IP Output Packet Accounting
☐ 9.6.3. IP Access Violation Accounting
☐ 9.6.4. MAC Address Accounting
☐ 9.7. NetFlow
☐ 9.7.1. Netflow v5 & v9
☐ 9.7.2. Netflow Ingress and Egress
☐ 9.7.3. Netflow Top Talkers
☐ 9.7.4. Netflow Aggregation Cache
☐ 9.7.5. Netflow Random Sampling
☐ 9.7.6. Netflow Input Filters
☐ 9.7.7. Netflow Export
☐ 9.8. Miscellaneous Network Services
☐ 9.8.1. Proxy ARP
☐ 9.8.2. IRDP
☐ 9.8.3. Router ICMP Settings
☐ 9.8.3.1. TCP Optimization
☐ 9.8.4. IOS Small Services and Finger
☐ 9.8.5. Directed Broadcasts and UDP Forwarding
☐ 9.8.6. NBAR Protocol Discovery
☐ 9.8.7. IP Event Dampening
☐ 9.8.8. Conditional Debugging
☐ 9.8.9. Embedded Packet Capture
☐ 9.8.10. Interpreting Packet Captures