Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL



The Cisco Certified Network Professional (CCNP®) Routing and Switching certification validates knowledge and skills required to install, configure and troubleshoot converged local and wide area networks with 100 to 500 or more nodes. With a CCNP Routing and Switching certification, a network professional demonstrates the knowledge and skills required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network.

The CCNP Quick Reference was written to help you prepare for the three exams in the CCNP Routing and Switching certification. Some readers tell us that they use this book before beginning their exam preparation, to find which areas they are weak in. This helps target their studying. Others use it after studying or taking the course as a concise learning resource during their final preparation for the exam.

This book will also help once your exams are over, when you need a quick answer about a technology, or a reminder about configuration steps.

Who Should Read This Book?

Current and aspiring network engineers will find this book useful in two ways. First, those preparing for the CCNP Routing and Switching certification will appreciate the targeted review of exam topics. It will help them understand the technologies, not just memorize questions. This will lead to success on the exam and improved on-the-job performance. Secondly, the book serves as a reference for those not pursuing the certification. Its short descriptions and many examples come in handy when you need a fast answer to a question, or to configure something quickly. It deserves a place on every network engineer’s bookshelf.

How This Book Is Organized

The book is organized by exam, and in the order that most people take the exams. ROUTE is first, followed by SWITCH, and then TSHOOT. The topics within each exam section coorespond with those on the exam blueprint. This edition as a whole include more emphasis on planning and verifying network changes than the previous edition. There is more information on troubleshooting commands throughout the entire book, in addition to the TSHOOT section. Following is a description for each section.


Chapter 1: Planning for Complex Networks

This chapter describes some different design models in use, provides an overview of routing protocols, and introduces methods of implementation planning.

Chapter 2: EIGRP

This chapter provides an in-depth description of EIGRP operation and configuration, including neighbor establishment and route exchange. It covers using EIGRP with Frame Relay, Ethernet over MPLS (EoMPLS) and Layer 3 MPLS VPNs. It also includes planning an EIGRP implementation, ways to optimize EIGRP, and securing EIGRP through authentication.

Chapter 3: OSPF

Chapter 3 describes OSPF’s structure and operation. It covers OSPF design requirements, neighbor establishment, and LSA information. The configuration portion provides implementation planning, as well as OSPF configuration for LANs and WANs (including MPLS WANs.) The chapter additionally covers optimizing and securing OSPF.

Chapter 4: Optimizing Routing

This chapter examines various methods of controlling routing updates, such as route maps, prefix lists, and distribute lists. It describes how to configure route maps, and how to use them for policy-based routing, controlling route redistribution, and tagging routes. Route redistribution planning and isses are described, redistribution configuration is demonstrated.

Chapter 5: Path Control

Chapter 5 covers some additional ways to control the path that traffic takes. These include offset-lists, IP SLA, policy-based routing, Optimized Edge Routing, and VRFs. IP SLA tracking is shown along with route maps to provide backup routes when using policy-based routing.

Chapter 6: BGP and Internet Connectivity

Whether or not to use BGP is the first topic discussed in Chapter 6. Different types of ISP connections are covered. The chapter gives an overview of BGP operation and basic configuration. BGP path selection is covered, along with ways to influence the path selection and ways to filter routes. Additionally, ways to verify BGP operation are shown.

Chapter 7: Branch Office Connectivity

Chapter 7 considers branch office routing design and implementation. This includes a description of DSL with PPPoA, and IPsec VPNs. Dynamic routing over various types of tunnels is covered, and a GRE tunnel configuration is shown. The chapter ends with a look at EIGRP load sharing.

Chapter 8: Mobile Worker Connectivity

Chapter 8 covers the network changes necessary to allow mobile workers to connect to the corporate network. The services needed to enabled this are discussed, including NAT, DHCP, firewalling, VPNs, and routing.

Chapter 9: IPv6 Introduction

This rather in-depth introduction to IPv6 covers the IPv6 address format, ways for hosts to acquire their addresses, and IPv6 routing for RIP, EIGRP, OSPF, and BGP. It also includes strategies for integrating IPv4 and IPv6 such as various types of tunnels. IPv6 operation over various types of links is additionally covered.


Chapter 1: Campus Network Design

Chapter 1 covers design considerations for small, medium, and large campuses, and Data Centers. It describes the Service-Oriented Network Architecture (SONA) and how it applies to campus design. The PPDIOO model is shown as a way to plan network implementations.

Chapter 2: VLAN Implementation

This chapter gives an overview of VLANs, then describes VLAN design and implementation planning. It covers trunking,VTP,and EtherChannel including best practices, configuration, and troubleshooting.

Chapter 3: Spanning Tree

Chapter 3 goes into detail on Spanning-Tree, Rapid Spanning-Tree, and Multiple Spanning Tree. It covers spanning-tree tuning mechanisms such as UDLD, loop guard, backbonefast, and BPDUguard. It also includes troubleshooting Spanning-Tree and Spanning-Tree best practices.

Chapter 4: InterVLAN Routing

Routing between VLANs using a router and using a multilayer switched are both covered in Chapter 4. This chapter additionally describes switch forwarding architectures and goes into detail on CEF operation and configuration.

Chapter 5: Implementing High Availability

This chapter describes the components of high availability - redundancy, technology, people, processes, and tools. It goes into depth on achieving network resiliency through correct network design. It also describes the role that network management tools Syslog, SNMP, and IP SLA play in a highly available network.

Chapter 6: First Hop Redundancy

Chapter 6 looks at HSRP, VRRP, and GLBP. It describes their operation, the differences between them, how to configure them, and how to tune them, It covers best practices planning and implementation.

Chapter 7: Campus Network Security

This chapter is concerned with ways that the LAN might be attacked and its security compromised. It covers four types of attacks: MAC address attacks, VLAN-based attacks, spoofing attacks, and attacks against the switch itself. Prevention techniques are shown for each type of attack.

Chapter 8: Voice and Video in a Campus Network

Chapter 8 describes how to prepare a network for voice over IP and video over IP. It covers the components needed such as a PoE switch, and the QoS requirements of voice and video. The chapter also shows how to configure a switch to support VoIP, including AutoQoS configuration.

Chapter 9: Wireless LANs in a Campus Network

This chapter describes how to integrate wireless into the LAN. It provides an overview of wireless operation and components, and describes how introducing wireless impacts the LAN traffic. The chapter also discusses how to plan a wireless implementation and shows how to configure your switches when connecting to access points or controllers.


Chapter 1: Maintainance

This chapter provides descriptions of tasks commonly used to maintain performance and prepare for problems, such as documentation and scheduled preventative maintenance. This chapter also describes some IOS tools - such as archiving, logging, and configuration rollback - that are valuable in this process.

Chapter 2: Troubleshooting Methodology

This chapter focuses on minimizing time-to-repair. This chapter focuses on the techniques that can be applied to minimize downtime. The scientific method is suggested as a model for troubleshooting.

Chapter 3: Troubleshooting Tools

Cisco IOS has a number of ways to extract data about the state of the machine. This chapter discusses IOS output filtering and redirection, network probing commands, and hardware diagnostics.

Chapter 4: Troubleshooting Switches

Ethernet is ubiquitous in campus networks and data centers. More and more services are traveling on Ethernet, such as storage, virtualization, and telephony. This chapter describes troubleshooting the critical pieces: Spanning Tree, VLANs, InterVLaN routing, and gateway redundancy.

Chapter 5: Troubleshooting Routers

This chapter covers troubleshooting link layer connectivity, OSPF, EIGRP, and BGP routing protocols, and router performance.

Chapter 6: Troubleshooting Security Features

Security is a pervasive element of networks. Routers are both potential targets for attacks and platforms that can offer security services. This chapter describes troubleshooting security features.

  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint