1. SP architecture concepts 13
1.1 IPv6 13
1.1.1 Definitions 13
1.1.2 Neighbor Discovery details 16
1.2 Broadband Aggregation (BBA) 41
1.2.1 PPP over Ethernet (PPPoE) technology 42
1.2.2 Multi-service PPPoE and LAC/LNS architecture 70
1.3 MEF Ethernet Services Definitions (MEF 6.2) 93
1.4 Platform Architecture 94
1.4.1 Route-Switch Processor (RSP) and Route Processor (RP) 94
1.4.2 Line cards (LC) 95
1.4.3 Switching fabric / backplane and forwarding model 95
1.4.4 Multicast forwarding and hierarchical replication 96
1.4.5 Satellite operations (remote linecards) 96
3.1 WAN technologies 96
3.1.1 Packet over SONET/SDH 96
3.1.2 T1/E1 and T3/E3 97
3.1.3 Dense Wavelength Division Multiplexing (DWDM) 98
3.2 IP connectivity to the customer 99
3.2.1 Digital Subscriber Line (DSL) 99
3.2.2 Cable Internet 99
3.2.3 Wireline 99
4. Virtualization concepts 100
4.1 SVR vs. HVR 100
4.2 Network Functions Virtualization (NFV) 101
4.3 Software Defined Networking (SDN) 101
5. Mobility concepts 102
5.1 LTE 102
5.2 Backhaul 104
6. Describe BGP path attributes 105
7. Describe MPLS forwarding and control plane mechanisms 107
7.1 Label Distribution Protocol (LDP) 107
7.2 Static label bindings 166
7.3 MPLS IP and MTU minor options 170
8. Describe MPLS advanced features 200
8.1 Segment Routing 200
8.2 Generalized MPLS (GMPLS) 212
8.3 MPLS Transport Profile (MPLS-TP) 213
8.4 Inter-AS MPLS 235
8.4.1 Option A (Back to back VRF exchange) 258
8.4.1.1 L3VPN 258
8.4.1.2 L2VPN 286
8.4.1.3 MVPN – GRE (Profile 0) and mLDP (Profile 1) 292
8.4.1.4 MPLS TE 310
8.4.1.5 Confederation variation 314
8.4.1.6 Carrier Supporting Carrier (CSC) variation 325
8.4.2 Option B (ASBR VPNv4/v6 eBGP) 331
8.4.2.1 L3VPN 333
8.4.2.2 L2VPN 368
8.4.2.3 mVPN – GRE (Profile 0) 379
8.4.2.4 MVPN – mLDP (Profile 17) 404
8.4.2.5 MPLS TE 413
8.4.2.6 Confederation variation 427
8.4.3 Option C (ASBR eBGP + Label, RR VPNv4 eBGP) 452
8.4.3.1 L3VPN 453
8.4.3.2 L2VPN 501
8.4.3.3 MVPN – GRE (Profile 0) 512
8.4.3.4 MVPN – mLDP (Profile 17) 519
8.4.3.5 MPLS TE 536
8.4.3.6 Confederation variation 563
8.4.4 Option AB Inter-AS hybrid (AKA Option D) 581
8.4.4.1 L3VPN 581
8.4.4.2 L2VPN 613
8.4.4.3 MVPN – GRE (Profile 0) and mLDP (Profile 1) 615
8.4.4.4 MPLS TE 623
8.4.5 Confederation variation 627
9. Describe multicast P2MP TE 627
10. Describe EVPN (EVPN and PBB-EVPN) 627
10.1 EVPN 630
10.2 PBB-EVPN 630
11. Describe IEEE 802.1ad (QinQ), IEEE 802.1ah (Mac-in-Mac), and ITU G.8032 (REP) 646
11.1 802.1ad QinQ 646
11.2 802.1ah MAC in MAC (Provider Backbone Bridges) 648
11.3 Ethernet Ring loop-prevention 648
11.3.1 Cisco Resilient Ethernet Protocol (REP) 648
11.3.2 ITU G.8032 675
12. Describe broadband forum TR-101 VLAN paradigms (N:1 and 1:1) 675
13. Describe QoS link fragmentation (LFI), cRTP, and RTP 685
14. Describe Multichassis/Clustering High Availability (HA) 694
14.1 High Availability (HA) Demonstration (NSF/NSR/GR) 696
14.1.1 IS-IS NSF and NSR 702
14.1.2 OSPFv2 NSF and NSR 707
14.1.3 OSPFv3 GR and NSR 710
14.1.4 BGP GR and NSR 712
14.1.5 LDP GR and NSR 720
14.1.6 RSVP-TE GR 726
14.1.7 EIGRP NSF 734
15. Describe Layer 1 failure detection 737
16. Describe BGPsec 740
17. Describe backscatter traceback 740
18. Describe lawful-intercept 740
19. Describe BGP Flowspec 740
20. Describe DDoS mitigation techniques 740
21. Describe network event and fault management 741
22. Describe performance management and capacity procedures 741
23. Describe maintenance and operational procedures 744
24. Describe the network inventory management process 745
25. Describe network change, implementation, and rollback 745
25.1 Processes and best practices 745
25.2 NETCONF and YANG 747
26. Describe the incident management process based on the ITILv3 framework 750
27. Describe, implement, and troubleshoot advanced BGP features 751
27.1 Additional Paths (add-path) and Prefix Independent Convergence (PIC) 751
27.2 BGP RT-filter unicast / IPv4 RT-filter feature 818
27.3 BGP RR-group and Selective RT Retention 823
27.4 Accumulated IGP attribute 841
27.4.1 Basic AIGP 841
27.4.2 AIGP with cost-communities and BGP confederations 847
27.5 Cost-Community / Point Of Insertion (POI) 850
27.6 DMZ Link Bandwidth 865
27.7 BGP Multicast VPN (MVPN) Theory 881
27.8 BGP Link State AF and Path Computation Element (PCE) 884
28. Describe, implement, and troubleshoot MVPN 890
28.1 Profile 0: Default MDT − GRE − PIM C−mcast Signaling (Traditional Draft-Rosen) 891
28.1.1 PIM-ASM in the core 893
28.1.2 PIM-SSM in the core 905
28.1.3 PIM-Bidir in the core 915
28.2 Profile 1: Default MDT − MLDP MP2MP − PIM C−mcast Signaling (Basic mLDP) 924
28.3 Profile 3: Default MDT − GRE − BGP−AD − PIM C−mcast Signaling 951
28.4 Profile 6: VRF MLDP − In−band Signaling 960
28.5 Profile 7: Global MLDP In−band Signaling 969
28.6 Profile 8: Global Static − P2MP−TE 980
28.7 Profile 9: Default MDT − MLDP − MP2MP − BGP−AD − PIM C−mcast Signaling 987
28.8 Profile 10: VRF Static – P2MP TE - BGP−AD 993
28.9 Profile 11: Default MDT − GRE − BGP−AD − BGP C−mcast Signaling 1000
28.10 Profile 12: Default MDT − MLDP − P2MP − BGP−AD − BGP C−mcast Signaling 1011
28.11 Profile 13: Default MDT − MLDP − MP2MP − BGP−AD − BGP C−mcast Signaling 1030
28.12 Profile 14: Partitioned MDT – MLDP P2MP – BGP-AD – BGP C-mcast signaling 1061
28.13 Profile 17: Default MDT – MLDP P2MP – BGP-AD – PIM C-mcast signaling 1080
29. Describe and optimize multicast scale and performance 1094
29.1 Inter-AS Multicast and Multicast Source Discovery Protocol (MSDP) 1094
29.2 Multicast Only Fast Re-Reroute (MoFRR) 1158
29.3 Protecting mLDP LSPs with Fast Re-Reoute (FRR) 1173
29.4 MVPN Extranet 1178
29.4.1 PIM/GRE 1179
29.4.2 mLDP 1205
30. Describe, implement, and troubleshoot MPLS QoS models and related features 1233
30.1 Uniform 1234
30.2 Short pipe 1237
30.3 Pipe (AKA long pipe) 1238
30.4 QoS Policy Propagation through BGP (QPPB) 1240
30.5 QoS specifics on IOS XRv 1246
30.6 Network Based Application Recognition (NBAR) summary and configurations 1251
30.6.1 NBAR Custom Protocols 1253
30.6.2 NBAR Attributes 1258
30.6.3 NBAR Attributes with HTTP 1262
30.6.4 NBAR Protocol-ID 1267
30.6.5 NBAR Protocol Discovery 1268
31. Describe, implement, and troubleshoot MPLS TE / QoS mechanisms 1270
31.1 MPLS RSVP-TE (General) 1270
31.1.1 TE Topology (TED) construction and RSVP-TE signaling 1270
31.1.2 TE attributes 1297
31.1.3 Directing traffic into TE tunnels and tunnel stitching 1338
31.2 TE Fast-ReRoute (FRR) and rapid provisioning 1363
31.2.1 Link (NHOP), Node (NNHOP), and Path protection – Manual 1363
31.2.2 Automatic tunnels (with OSPF) 1401
31.3 CBTS (IOS) and PBTS (XR) 1451
31.4 DiffServ-aware Traffic Engineering (DS-TE) 1469
31.4.1 Pre-standard Model 1470
31.4.2 IETF Russian Dolls Model (RDM) 1490
31.4.3 IETF Maximum Allocation Model (MAM) 1500
31.4.4 Per-VRF TE techniques 1507
32. Describe, implement, and troubleshoot E-LAN and E-TREE (extended to general L2VPN) 1540
32.1 MPLS encapsulated L2VPN 1540
32.1.1 Static configuration 1540
32.1.1.1 E-LINE (VPWS) 1540
32.1.1.2 Advanced PW features (CW, Status, etc) 1562
32.1.1.3 E-LAN and E-TREE (VPLS) 1574
32.1.1.4 Multisegment PW (MS-PW) switching 1598
32.1.1.5 EVC rewrite operations 1622
32.1.2 BGP auto-discovery for VPWS/VPLS 1632
32.1.2.1 LDP signaling 1633
32.1.2.2 BGP signaling 1648
32.1.3 Hierarchical VPLS (H-VPLS) 1664
32.1.3.1 MPLS in the Access Network 1664
32.1.3.2 QinQ in the Access Network 1681
32.2 IP encapsulated L2VPN 1688
32.2.1 E-LINE with L2TP 1688
32.2.2 E-LAN and E-TREE using OTV 1714
33. Describe, implement, and troubleshoot Unified MPLS and CSC 1731
33.1 Carrier Supporting Carrier (CSC) 1731
33.1.1 L3VPN 1739
33.1.2 L2VPN 1750
33.1.3 MVPN (Profile 0 with SSM) 1759
33.1.4 TE and TE-FRR 1768
33.2 Unified (seamless) MPLS 1780
33.2.1 IS-IS 1787
33.2.1.1 L3VPN 1797
33.2.1.2 L2VPN 1812
33.2.1.3 MVPN (mLDP profiles 1 and 17) 1816
33.2.1.4 Inter-area TE and TE-FRR 1824
33.2.2 OSPF (summarized) 1840
33.2.2.1 L3VPN 1843
33.2.2.2 L2VPN 1850
33.2.2.3 MVPN (mLDP profiles 1 and 17) 1856
33.2.2.4 MPLS TE and TE-FRR 1859
34. Describe, implement, and troubleshoot LISP 1870
35. Describe, implement, and troubleshoot GRE and mGRE-based VPN 1902
35.1 P2P GRE tunneling and GRE features 1902
35.2 Dynamic Multipoint VPN (DMVPN) basics 1916
35.2.1 Phase 1 1918
35.2.2 Phase 2 1938
35.2.3 Phase 3 1948
35.3 mGRE-based L3VPN 1964
36. Describe, implement, and troubleshoot IPv6 transition mechanisms 1976
36.1 NAT44 and NAT444 1976
36.2 NAT64 and NAT464 1995
36.3 Dual stack lite (DS-lite) 2035
36.4 IPv6 tunneling over IPv4 networks 2037
36.4.1 GRE / Manual IPv6 tunnels 2038
36.4.2 6to4 automatic tunnels 2041
36.4.3 6 Rapid Deployment (6RD) 2045
36.4.4 Intra-Site Automatic tunnel Addressing Protocol (ISATAP) 2052
36.5 IPv4/IPv6 Internet Access over MPLS using NAT44 2055
37. Describe, implement, and troubleshoot end-to-end fast convergence 2092
37.1 Loop Free Alternate (LFA) for IPv4 2092
37.1.1 OSPFv2 2092
37.1.1.1 Direct LFA 2092
37.1.1.2 Remote LFA 2106
37.1.2 IS-IS 2121
37.1.2.1 Direct LFA 2121
37.1.2.2 Remote LFA 2127
37.1.3 EIGRP 2131
37.2 Loop Free Alternate (LFA) for IPv6 (XR Only) 2136
37.2.1 OSPFv3 2136
37.2.1.1 Direct LFA 2136
37.2.1.2 Remote LFA 2140
37.2.2 IS-IS 2140
37.2.2.1 Direct LFA 2140
37.2.2.2 Remote LFA 2144
37.3 Convergence optimizations for BGP 2148
37.4 Convergence optimizations for IGPs 2174
37.4.1 IS-IS 2175
37.4.2 OSPFv2 and OSPFv3 2181
38. Describe, implement, and troubleshoot multi-VRF CE and advanced VRF techniques 2194
38.1 Multi-VRF CE (VRF-Lite) 2195
38.1.1 Basic VRF-Lite 2195
38.1.2 OSPF and sham-links 2198
38.1.3 EIGRP and Site-of-Origin (SoO) 2233
38.1.4 IS-IS 2262
38.1.5 BGP and Site-of-Origin (SoO) 2266
38.1.6 Static routing 2289
38.1.7 RIP 2293
38.2 VRF label modes 2300
38.3 VRF selection for traffic leaking 2314
38.4 VRF route leaking 2318
38.5 L3VPN import/export maps 2338
38.6 Half-Duplex VRF (HDVRF) 2350
38.7 BGP Local Convergence (VRF Local Protection) 2363
39. Describe, implement, and troubleshoot Layer 2 failure detection 2377
39.1 Link Aggregation Control Protocol (LACP) 2377
39.2 Uni-Directional Link Detection (UDLD) 2388
40. Describe, implement, and troubleshoot Layer 3 failure detection 2396
40.1 Individual Protocol Hello packets 2396
40.2 Bidirectional Forwarding Detection (BFD) 2415
41. Describe, implement, and troubleshoot control plane protection techniques 2444
41.1 Control Plane Policing (CPP) in XE and Local Packet Transport Services (LPTS) in XR 2444
42. Describe, implement, and troubleshoot logging and SNMP security 2461
42.1 Logging 2461
42.2 SNMP security 2461
43. Describe, implement, and troubleshoot timing 2461
43.1 Network Time Protocol (NTP) 2462
43.2 1588v2 (Precision Time Protocol(PTP)) 2480
43.3 Synchronous Ethernet (SyncE) 2482
44. Describe, implement, and troubleshoot SNMP traps, RMON, EEM, and EPC 2483
44.1 SNMP traps 2484
44.2 Remote Monitor (RMON) in XE and logging correlation in XR 2490
44.3 Embedded Event Manager (EEM) 2503
44.4 Embedded Packet Capture (EPC) 2512
45. Describe, implement, and troubleshoot port mirroring protocols 2522
45.1 Switch port analyzer (SPAN) 2522
45.2 Remote SPAN (RSPAN) 2527
45.3 Encapsulated RSPAN (ERSPAN) 2530
46. Describe, implement, and troubleshoot Netflow and IPFIX 2534
46.1 Flexible Netflow (FNF) 2536
46.2 IPFIX 2547
47. Describe, implement, and troubleshoot IP SLA 2549
47.1 Basic IP SLA probes, responders, features, and configurations 2549
47.2 UDP-jitter and VOIP codec probes 2560
47.3 Advanced ICMP probes 2566
47.4 MPLS probes 2573
47.5 Ethernet probes including ITU-T Y.1731 Basics and Performing Monitoring (PM) 2577
47.6 Miscellaneous probes 2603
47.7 Aggregated statistics, history, group scheduling, and miscellaneous features 2610
47.8 Enhanced Object Tracking (EOT) 2622
47.9 IPv6 SLA 2637
47.10 IOS-XR IP SLA and EOT 2643
48. Describe, implement, and troubleshoot MPLS OAM and Ethernet OAM 2667
48.1 MPLS ping, MPLS traceroute, and VCCV 2667
48.2 MPLS LSP Monitor (MPLSLM) / LSP Health Monitor 2690
48.3 Ethernet Management Tools (CFM, OAM, and E-LMI) 2703
48.3.1 Connectivity Fault Management (CFM) (802.3ag) 2703
48.3.2 Ethernet OAM (IEEE 802.3ah) 2733
48.3.3 Ethernet Local Management Interface (E-LMI) (MEF.16) 2748
48.3.4 Ethernet CFM, OAM, E-LMI, and Y.1731 on CSR1000v (Comprehensive) 2766
49. Service Provider security best practices (Comprehensive) 2794
49.1 Control plane security best practices 2795
49.2 Management plane security best practices 2831
49.3 Data plane security best practices 2862
49.4 Advanced security techniques and features 2889

