CCNP BCMSN Exam Cram 2 (Exam Cram 642-811)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

sample tests  2nd  3rd 

    answer keys  2nd 

scalability

    MANs (metropolitan area networks)

        Ethernet considerations 

    unicasting and 

security

    Catalyst switches

        802.1X authentication  2nd  3rd  4th 

        AAA  2nd 

        components  2nd 

        configuring  2nd 

        configuring AAA accounting  2nd  3rd 

        configuring AAA authentication  2nd  3rd 

        configuring AAA authorization  2nd 

        enabling AAA  2nd  3rd 

        port security  2nd  3rd  4th  5th 

    VACLs 

        activating  2nd 

        configuring  2nd 

segments (networks)

    designated ports and switches 

serialization (IP telephopny) 

Server Farm module 

    campus intranets  2nd 

Server Load Balancing.   [See SLB]

service level (MANs)

    Ethernet considerations 

service password-encryption command

    switch configuration 

Service Provider Edge module 

services

    Catalyst switch security 

SEs (Supervisor Engines)

    Catalyst switches 

        Route Processor Redundancy 

        Route Processor Redundancy events  2nd 

        Route Processor Redundancy features 

        Route Processor Redundancy Plus  2nd 

        Route Processor Redundancy Plus configuration  2nd  3rd 

        Route Processor Redundancy Plus guidelines  2nd  3rd 

set spantree bpdu-skewing command 

SFM (Switch Fabric Module)

    configuring  2nd 

    features  2nd  3rd 

shaping traffic 

shared access (access layer) 

shared distribution trees

    multicasts  2nd 

shared environments

    unicast packets 

Shared Spanning Tree.   [See PVST]

show commands

    switches

        troubleshooting 

show interface switchport command

    trunk configuration 

show interface trunk command

    trunk configuration 

show interfaces command 

show ip pim interface command 

show ip pim neighbor command 

show ip protocols command 

show ip route command 

show mac-address-table command 

show module command

    NAM (Network Analysis Module) 

show port security command 

show power command 

show redundancy command 

show running-config interface command 

    FastPort configuration 

    trunk configuration 

show spanning tree command 

show spanning-tree summary command

    BPDU Guard 

    FastPort configuration 

show vlan command 

SLB (Server Load Balancing)  2nd 

    configuring  2nd  3rd  4th 

    operation of  2nd 

SNMP

    Catalyst switch security 

    NAM (Network Analysis Module)

        configuration commands 

snmp commands

    NAM (Network Analysis Module) 

SONET

    Ethernet over  2nd  3rd 

    redundancy mechanism 

SONET (Synchronous Optical Network) 

source filtering (IGMPv3 multicasting) 

source-based distribution trees

    multicasts  2nd 

source-specific addresses

    multicasting 

SPAN (Switched Port Analyzer)  2nd 

    configuration verification  2nd 

    configuring  2nd  3rd  4th 

    types 

Spanning Tree Protocol.   [See STP]

spanning-tree portfast command 

spanning-tree uplinkfast command 

sparse mode protocols

    multicast routing  2nd 

speaking state (HSRP state) 

SRM (Single Router Mode)

    redundancy  2nd 

        advantages 

        configuring  2nd 

        operation of  2nd 

        overview  2nd 

SSH

    Catalyst switch security 

standby command 

standby RP (HSRP)

    role of 

standby state (HSRP state) 

static VLANs  2nd 

sticky learning

    port security 

STP

    Catalyst switch security 

    configuring 

        enabling/disabling  2nd 

        path selection  2nd 

        port cost  2nd  3rd 

        port priority 

        root switch selection  2nd  3rd 

        verification  2nd 

    MANs (metropolitan area networks)  2nd  3rd  4th 

STP (Spanning Tree Protocol)

    advantages 

    BackboneFast feature  2nd  3rd  4th 

        enabling 

        nonconnected interfaces 

    BDPU (Bridge Protocol Data Unit) and  2nd 

    BPDU skewing  2nd 

    convergence time 

    CST and  2nd 

    features 

    Loop Guard  2nd 

        compared to UDLD  2nd 

    MST and  2nd  3rd 

    network topology changes

        preventing staggered convergence 

    operation

        bridging loops 

        designated port and switch resolution  2nd 

        overview 

        port states  2nd  3rd 

        root port selection  2nd 

        root switch election  2nd 

    overview  2nd 

    PortFast feature 

        BPDU filtering  2nd 

        BPDU Guard 

        configuring  2nd 

        operation  2nd 

    PVST  2nd 

    PVST+ 

    RootGuard  2nd  3rd  4th 

    switches

        disabling loops 

    timer values 

    timers

        changing values  2nd 

    troubleshooting

        steps to take  2nd 

        types of problems  2nd 

    types of 

    UDLD (Unidirectional Link Detection)  2nd  3rd  4th 

    UplinkFast feature  2nd  3rd  4th 

strategies

    test-taking  2nd  3rd 

        question handling  2nd  3rd 

subinterfaces

    creating  2nd 

SVI interfaces 

switch interface

    internal PRs

        routing configuration  2nd  3rd  4th 

        types  2nd  3rd 

switched access (access layer) 

switched environments

    unicast packets 

switched networks

    Layer 2

        VLANs 

Switched Port Analyzer.   [See SPAN]

switches

    advantages of 

    BackboneFast (STP)  2nd  3rd  4th 

        enabling 

        nonconnected interfaces 

    BDPUs and STP  2nd 

    CAM tables

        automatically updating  2nd 

    campus intranets  2nd  3rd  4th  5th 

    Catalyst

        802.1X authentication  2nd  3rd  4th 

        AAA  2nd 

        configuring AAA accounting  2nd  3rd 

        configuring AAA authentication  2nd  3rd 

        configuring AAA authorization  2nd 

        debug commands  2nd 

        enabling AAA  2nd  3rd 

        NAM (Network Analysis Module)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 

        port security  2nd  3rd  4th  5th 

        powering IP telephony 

        redundancy capabilities of  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 

        security components  2nd 

        security setup  2nd 

        SPAN (Switched Port Analyzer)  2nd  3rd  4th  5th  6th  7th 

    CLI (command-line interface)

        CatOS compared to IOS  2nd  3rd  4th 

        configuration  2nd 

        converting CatOS to IOS  2nd  3rd 

        sample configuration  2nd  3rd  4th 

        viewing configuration files  2nd 

    CST (Common Spanning Tree)  2nd 

    designated port and switch resolution  2nd 

    forwarding and filtering frames  2nd 

    identifiers 

    IP addresses

        assigning to 

    Layer 2 redundancy  2nd 

    MANs (metropolitan area networks)

        list of Cisco solutions  2nd 

    MST (Multiple Spanning Tree)

        IST and  2nd  3rd  4th 

    multicasting 

        CGMP traffic control protocol  2nd  3rd 

        IGPM snooping 

        traffic control methods  2nd 

    multilayer

        campus intranets 

    PVST  2nd 

    PVST+ 

    root

        election by STP  2nd 

        timer control by 

    root port selection  2nd 

    RSTP behavior in an STP network 

    SFM

        configuring  2nd 

        features  2nd  3rd 

    STP

        bridging loops 

        configuring 

        enabling/disabling  2nd 

        path selection  2nd 

        port cost  2nd  3rd 

        port priority 

        root switch selection  2nd  3rd 

        verification  2nd 

    STP (Spanning Tree Protocol)

        overview  2nd 

    TCNs (topology change notifications) 

    transparent

        loop elimination 

    troubleshooting  2nd  3rd 

    UDLD (Unidirectional Link Detection)  2nd  3rd  4th 

    UplinkFast (STP) 

    VLANs

        adding  2nd  3rd 

switches.   [See also transparent bridges]

switching

    architecture 

        centralized  2nd 

        distributed  2nd 

        NetFlow switching  2nd 

        processor and ASIC switching  2nd 

        route caching 

        topology-based  2nd 

    Layer 2

        principles of operation 

    MLS

        CEF 

        CEF configuration  2nd 

        CEF example  2nd 

        CEF limitations  2nd 

        CEF load balancing  2nd 

        CEF operation  2nd  3rd 

        CEF tables  2nd  3rd 

        CEF troubleshooting  2nd 

        CEF verfication  2nd  3rd  4th 

        principles of operation  2nd 

        rewriting frame and packet contents  2nd 

        TCAM tables  2nd  3rd 

        traffic handling  2nd 

switchport access vlan command 

switchport mode access command 

switchport native command 

switchport trunk allowed command 

switchport trunk encapsulation command 

Категории