设为首页 收藏本站
查看: 1044|回复: 0

The CCIE lab checklist

[复制链接]

尚未签到

发表于 2015-5-25 13:42:13 | 显示全部楼层 |阅读模式
  Bring different color pens and high-lighter ( I don't think proctor care about them)
  #1 Spend a few minute to understand the point distribution between Core requirement (L2, IGP, BGP, ISDN) and non-core ( IOS, Service, Security, Mcast)
  #2 Spend a few minute to understand the topology.
Figure out core network, stub network, BB
  #3 Enter Alias command to notepad and copy paste all router.
One of my favorite Aliases are
"show run | b Se"
  #3 Attack F/R ( targetting 10~15 min)
Configure Router by router not interface by interface Always 1) enc frame-remay 2) no frame inverse 3) no shut Check if spoke to spoke connectivity is required by checking Core IGP section.
ping from spoke to spoke if possible.  not hub to spoke.
  If PPP over FR, then always create VT first, user/password
  #4 Attack CAT ( 15~20 min)
4-1 Read task and make VLAN table like below
VL   Router       CAT1   CAT2         Router   VL
10    R1 f0/0------f0/1       f0/2 ---------f0/0 R2   10
20    R3 f0/1------f0/3       f0/4 ---------f0/0 R4    30
40    R5 f0/0 ------f0/5
40    R6 f0/1-------f0/6
                        f0/23---f0/23
                        f0/24---f0/24
                        vl 10    vl40
                   client vtp   server vtp
4-2 configure CAT1 and CAT2 and validate
4-3 Read  task once again and make sure nothing missed
4-4 ping vlan by vlan.  Select only one device and ping all other on a specific vlan.
    No need to ping from multiple interface on a same vlan.
    Don't wait for Arp resolution!
If PPP over ATM, then always create VT or dialer interface first, then user/password
  #5 Attack ATM ( I can't spend time if I screwed config. 5~15min ) Quickly decide PVC vs SVC
5-1 If SVC, then decide "CLIP" or "SVC nsap"
Put "pvc 0/16 ilmi and pvc 0/5 qsaal " and "show atm ilmi-status" to vaildate nsap address.
5-1-1 if CLIP, then decide "arp-server self" or "arp-server nsap"
And then decide physical or sub
5-1-2 if SVC nsap, decide physical or logical
5-2 if PVC, then decide "pvc vci/vpi" or map-list/map-group
5-3 after 5-1 or 5-2 done, figure our nsap or vci/vpi.  Pay attention nssp is HEX!
5-4 ping and validate
  L2 is over between 30~50 min ( Worst case = 60 min)
  #6 Attack OSPF
6-1 Draw a diagram to configure OSPF router by router not area by area.( 10 min) Check if there are authentication stub or nssa.
virtual link
Make a note on redistribute, summary, area-range.
Pay attention DR/BDR, OPSF network type
  6-2
Configure OSPF router by router based on drawing in Black w/ green high-lighter( 10~30 min)
6-2-1  Always configure Inteface first for  1)OPSF network type based on DR/BDR, hello interval, etc 2) Authentication, 3) priority 4) Loop interface ospf network type.
6-2-2 configure OSPF process in order of 1) router-id, 2) network ( copy past from interface address), 3) neighbor command
6-2-3 Validate everything is working ( 5 min)
  6-3 Do redistribute, summary, area range ( 5 min)
  6-4 avoid any engagement with giant beasts. But make a note.
  OSPF is from 25 ~ 45 Min ( total 55 ~1:45)
  7 Attack RIP( 20~30 min)
   It is very tricky!
7-1 add RIP topology into OPSF drawing in blue ( 2 min).
7-2 Make sure active/passive interface
     Pay attention of rip update method ( M/B/U) and version, authentication
     Never assume it is always V2!, no auto-summary, mcast, etc
     This selection can be applied to each direction of interface.
7-3 Configure router by router( 5 min) per drawing
7-4 valiadte ( 3 min)
7-5 Spend enough time to be absolutely correct on route-filter,
summary, etc ( 5   min)
7-6 If mutual-redistribution is required, make sure multi-exit point ot single-exit point.  Don't fotget metric.
If it is multi-exit point, write down "rip subnets" on notepad and do the following( 5 min)
  7-6-1 "redistribute ospf" under "router rip"
##### Protect Rip routes reentering from OSPF ############ "Deny rip routes and permit all" route-map for "redistribute ospf" to rip Don't wait after "clear ip route * " is issued if I am not "idiot!"
  7-6-2 "redistribute rip subnets" under "router ospf"
##### Protect OSPF external routes reentering from Rip ##### "Permit only rip routes" route-map for "redistribute rip subnets" to OSPF Don't wait after "clear ip route * " is issued if I am not "idiot!"
  7-6-3 distance 121 0.0.0.0 255.255.255.255 11 under "router OSPF"
##### Fix redistributing router's AD for Rip routes ##### distance 121 0.0.0.0 255.255.255.255 11 "access-list 11 permit rip routes"
I saw sometimes this takes quite a few second.  Don't do "clear ip OPSF" or I will end up spending more time just for watching.
  RIP is over 20 ~30 min( total 1:15 ~ 2:15)
  8 Attack EIGRP ( 20~30min)
8-1 add EIGRP topology into OPSF drawing in black w/o high lighter ( 2 min).
8-2 Determine non/passive/active-eigrp interface. Be open minded that BB can be  multicast/unicast. Load-balance, authentication, stub, summary address( 5 min )
8-3 Configure router by router( 5 min) per drawing
8-4 validate ( 5 min)
8-5 Spend enough time to be absolutely correct on route-filter,
summary, etc ( 5   min)
8-6 If mutual-redistribution is required, make sure multi-exit point ot single-exit point.
  If it is multi-exit point, write down "eigrp subnets" on notepad ( 5 min) 8-6-1"redistribute ospf" under "router eigrp"
#####Protect EIGRP external route reentering from OSPF ####### "Deny eigrp routes and permit all" route-map for "redistribute ospf" to eigrp Make sure metric is configured.
  8-6-2 "redistribute eigrp subnet" under "router ospf"
##### Protect OSPF external routes reentering from EIGRP "Only permit eigrp routes" route-map for "redistribute ospf" to eigrp Make sure metric is configured.
  8-6-3 distance 121 0.0.0.0 255.255.255.255 11 under "router OSPF"
##### Fix redistributing router's AD for eigrp external routes ##### distance 121 0.0.0.0 255.255.255.255 11 "access-list 11 permit eigrp routes"
I saw sometimes this takes quite a few second.  Don't do "clear ip OPSF" or I will end up spending more time just for watching.
Technically, only eigrp external route needs to be applied but eigrp route won't hurt and make it simple.
  EIGRP is over in 20~30 min (1:35 ~2:45 min)
  9.Attack ISIS ( 10 min)
9-1 add ISIS topology into OPSF drawing in black w/ purple high lighter ( 2 min).
9-2 determine area type, IS-type, authentication ( domain, area, interface level1-2).
     Make sure of correct value of NET ( it is Hex), summary address
9-3 Configure router by router.
9-4 I don't believe there will be multi-exit mutual redistribution on ISIS
    Make sure to redistribute connect network from ISIS to OSPF.
  ISIS is over in 10~15 min ( 1:45 ~3:00)
  10 Attack ISDN ( 15~30 min)
10-1 draw ISDN on a separate paper. ( 30 sec)
10-2 Determine single/both callers, authentication type( no auth/pap/chap), physical/dialer interface. PPP feature = multilink, callback,
10-3 Figure out back-up method ( floating static/OSPF demand/watch group/back-up interface/rip trriger/ snap-shot routing ) focus on how full reachability can be accomplished after F/R failed.  Make sure link is not flapping.
10-4 Determine if there is additional task for interesting traffic filtering.
10-5 configure ISDN router by router.
10-5-1 select switch type, spid and shut and no shut and show isdn status.
      make sure L2 is happy!  Also make a quick test call using both string " isdn test call interface bri0/0 "string" " and disconnect "
isdn test disconnect interface bri0/0 all"
10-5-2 validate the link
  ISDN is over in 15 ~30 min  ( 2:00 ~ 3:30)
  11 Golden Moment ( 5~30 min)
Check the Golden moment per NMC meaning the exciting moment when you get ping response from every router to every router.
Run tclsh script
"foreach addr {
1.1.1.1
...
}  { ping $ addr}"
Just copy past after tclsh ( it is really cool when you see pings go through from everywhere to everywhere).  To quit, juts type " tclq"
  11.1 when ping has no response, write down ip address and troubleshoot.
Drawing will be the excellent tool for troubleshooting Don't bother ISDN link yet.
  Full reachability is done in 5 ~30 min ( 2:05 ~4:00)
  12 Attack BGP( 20 ~40 min)
12.1 Drawing a BGP topology on a separate paper.( 3 min)
12.2 Determine RR or CON or both to do full-mesh iBGP.
      See if neighbor peer-group is required,
      decide ip address ot use bgp session.
12.3 Configure router by router not BGP session-by-session
      always put no sync and no auto-summary if allowed.
12-4 Spend enough time to be absolutely correct on route-filtering ( ACL, prefix-list, as-path filer), route-aggregate(w/ as-set, summary-only, supress-map, attribute-map, advertise-map), route-manipulation( w/as-prepending, med, local-pref, weight, next-hop, advertise-map/non/existing-map, orgin, community, etc ) route-dampening, etc.
12-5 vaildate config.  Don't just wait for route update afer "clear ip bgp *" if you want to pass. It would take longer than a minute !!
  BGP is over in 20 ~40 ( 2:25 ~ 4:40)  My target is before lunch!
  13 IPv6( 10 min)
13-1 draw a sipmple diagram ( 1 min)
13-2 Watch out link local address over FR multilink.
        SLA ID is 4th 16bit
        16bit:16bit:16bit:SLA ID(16 bit) : interface ID( 64 bits)
         site-local = FEC0::
         link-local = fe80::
13-3 Check a full reachability using tcl script or just manual ping depneding on the number router.
  IPv6 is over 10 min  ( total 2:35 ~ 4 :50)
  ################## Core routing is done #################### I should have at least 3 hours to go at least.
  Strategy will change depending how much time I have at this moment.
  14 I would do multicast first ( 15 min)
14-1 Mark a Mcast topology with red high lighter on OSPF drawing.
14-2 Determine mcast topology ( dense-mode, static RP pim sparse, Auto-rp/MA, pim V2 bsr,  Auto-rp/MA/MSDP).
14-3 Configure router-by-router
14-4 valildate it
14-5 If second part is difficult, skip by making a note.
  15 IOS/IP service
Be careful not to block or drop any IGP updates 15-1, just check quikcly and do easy one first.
15-2, skip difficult task by making a note
  16 QoS
Be careful not to block or drop any IGP updates
16-1 Draw a flow on paper instead of in brain.
16-2 Always determine classification method( ACL, NBAR) and direction.
16-3 Determine shaping vs policing
16-4 Consider all options for queuing( legacy custom/priority, bandwidth/priority, shape average/peak, FRTS/GTS)
16-5 consider all options for policing ( police, rate-limit, ip multicast rate-limit, aggregate police( 3550))
16-6 If frame-relay, don't forget adaptive-shaping.( becn, fecn, foresight)
16-7 Consider all droping mode (random detect, ecn, tail drop, marking, etc)
  17 Security
Be careful not to block or drop any IGP updates
17-1 Draw a flow on paper instead of in brain.
17-2 Consdier all options for classification std/ext/reflexive/dynamic ACL, IP insepct, tcp intercept unicast RFP, ip accouting output packet /access-violation/precedence,
  17-2 When configuring Switchport port-security mac-address, be careful to include vurtual and physical mac if HSRP is running.
  18 DLSW
18.1 Draw a qucik topology ( 1 min)
18.2 Decide method of DLSW TCP, fst, fr.( I think only TCP will show up)
      Peer on-demand( group/border)
      Dynamic peering ( dynamic)
      Loadbalance (round-robin, circuit-count),
      Back-up ( back-up peer or cost)
      DSLW use tcp 2065 and udp 2067
      NAT can affect DLSW ( higher ip DLSW peer drops)
18.3 decide type of filtering
18-3-1 Netbios name filter( netbios access-list host xyz permit zyx )
         Icanreach/icannotreach netbios-name /netbiosexclusive
  18-3-2 MAC address filer ( access-list 700-799,  mac-address conevrsion needed )
         Icanreach/icannotreach mac-address/mac-exclusive( address conversion)
  18-3-3 LSAP filter ( access-list 200-299 permit )
              SNA only "access-list 200 permit 0x0000 0x0d0d"
              SNA and Netbios " access-list 200 permit 0xf0f0 0x0101
         Icanreach/icannotreach saps
               icannotreach saps  f0  ( deny netbios)

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-70611-1-1.html 上篇帖子: CCIE路由实验(3) 下篇帖子: CCIE路由实验(7)
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表