设为首页收藏本站language 语言切换
查看: 3763|回复: 21
收起左侧

[其他] CCIE Enterprise LAB 考试大纲

[复制链接]
 成长值: 64630
发表于 2020-2-27 10:56:50 | 显示全部楼层 |阅读模式
CCIE Enterprise Infrastructure Exam Topics - Practical Exam
9 [2 Y, K* t" r8 A+ ?! q! zExam Description
5 x' R; p& e0 M8 w# z& z( Q, B5 a  H7 ~7 E( \( C  f! X2 a& C  j
The Cisco CCIE Enterprise Infrastructure (v1.0) Practical Exam is an eight-hour, hands-on exam that requires a candidate to plan, design, deploy, operate, and optimize dual stack solutions (IPv4 and IPv6) for complex enterprise networks.
# q+ {# N6 @  U1 q1 A" N# e
0 J- _, x% |5 b8 ICandidates are expected to program and automate the network within their exam, as per exam topics below.% U& a' b- A" o( X
0 P7 r) O* j+ A3 H4 V
The following topics are general guidelines for the content likely to be included on the exam. Your knowledge, skills and abilities on these topics will be tested throughout the entire network lifecycle, unless explicitly specified otherwise within this document.
6 Z3 [6 B2 b. ?+ N2 V" X) L
( Z9 w' Z( ]0 F0 E! y( [
3 Q, P; z) [# ]5 L6 b. r第一部分  network infrastructure    30%
$ f, H, m4 @! n1.1 Switched campus% ~7 [" c  f9 h/ @1 H2 O
1.1.a Switch administration
& J# h; P" H* Y& [1.1.a i Managing MAC address table3 k& Z! M; C5 H, M, D2 h2 _2 p
1.1.a ii Errdisable recovery' t. |" I, O0 j0 `/ _* C
1.1.a iii L2 MTU8 ^0 ~- c0 z: ?7 |- Y2 ^8 q+ p! D
1.1.b Layer 2 protocols
/ X$ e/ A3 P7 I' E0 ?4 R1.1.b i CDP, LLDP
. C* n# R  X9 z& W2 ]$ `1.1.b ii UDLD
2 U) U" e& a  S! A: {3 X: a+ u1.1.c VLAN technologies1 |- B, l. K1 c9 w  B  e
1.1.c i Access ports
" D4 u  \- T5 u; ]4 [- A1.1.c ii Trunk ports (802.1Q), H7 p& H6 [! s1 a4 {  m9 g3 L
1.1.c iii Native VLAN. Q1 E  v7 K; ~! D! z$ p$ h8 v, Q
1.1.c iv Manual VLAN pruning& F& ]: m# P+ y+ G4 @
1.1.c v VLAN database
9 s) T6 D; x7 L$ c* k, k6 |1.1.c vi Normal range and extended range VLANs
) Z, q. d+ e( k7 I1.1.c vii Voice VLAN
- v( I9 {* t" Q1.1.c viii VTP7 s" V: j0 O  P- ^5 d# k3 B5 P
1.1.d EtherChannel
" @2 v6 f+ H& E1.1.d i LACP, static  l! @6 p9 K6 z! W  u, R4 f
1.1.d ii Layer 2, Layer 3
5 ?: X# r7 O% V6 a1.1.d iii Load balancing9 p  s6 F! w- X6 i& K
1.1.d iv EtherChannel Misconfiguration Guard
- @4 V9 g6 G+ E2 `5 g$ [8 H2 t1.1.e Spanning- Tree Protocol5 w  _: O( g9 v+ a( i' K% T
1.1.e i PVST+, Rapid PVST+, MST4 u/ W1 e/ a& l- t. r
1.1.e ii Switch priority, port priority, path cost, STP timers8 I7 C3 s" l5 ~
1.1.e iii PortFast, BPDU Guard, BPDU Filter
, L3 V; z2 Q: [* r1.1.e iv Loop Guard, Root Guard( j) H* p3 N3 @( b0 k% B
1.2 Routing Concepts* a- a* k# [0 D% C3 }( T
1.2.a Administrative distance
' f& u1 F/ L0 B# Q) W: E1.2.b VRF-lite
7 H/ w4 t- K8 B; w2 k: O7 f' ~, C1.2.c Static routing1 }$ F% B1 g' `& B
1.2.d Policy Based Routing. \$ ~6 [  r1 @% l: W. d* B' W
1.2.e VRF aware routing with any routing protocol
- q6 @0 z% ^+ }8 \# T3 }) @1.2.f Route filtering with any routing protocol5 o$ f) X* S+ ]9 n, i9 g! `
1.2.g Manual summarization with any routing protocol2 g# h6 k2 p1 x' `* f
1.2.h Redistribution between any pair of routing protocols
; l6 E, S0 j& z# K# g5 E! h; K- ~1.2.i Routing protocol authentication
9 U) j8 p& \( I- ]# ^6 N) ?1.2.j Bidirectional Forwarding Detection" N0 b" k5 X; y" d
1.3 EIGRP
$ M% {, `# H3 Y, S; Y; x# y2 K1.3.a Adjacencies* P! d: U( g" m: x7 `& u
1.3.b Best path selection
% u9 w& W. k5 i1 Y' [  F2 L$ A1.3.b i RD, FD, FC, successor, feasible successor+ q) g! X, j! [( f: n
1.3.b ii Classic Metrics and Wide Metrics
) u: r6 M9 o9 s" Z; S1.3.c Operations
" |4 u4 I$ N# d* \# {0 }1.3.c i General operations
) h" G7 G1 I+ C  ~1.3.c ii Topology table* w( d! x; W& _; e6 |
1.3.c iii Packet types7 K3 O* g2 K! z
1.3.c iv Stuck In Active8 ?/ Q3 B0 P. h% L7 \0 ~
1.3.c v Graceful shutdown
9 }" G! a4 b' u( q9 Q1.3.d EIGRP load-balancing5 {& m( u9 Y& t- o
1.3.d i Equal-cost5 O' F$ T* e% k' U
1.3.d ii Unequal-cost
7 V0 P- c, R# c3 K# G4 G2 e1.3.d iii Add-path* d; b! k+ J8 B/ ~
1.3.e EIGRP Named Mode
3 c  J+ x- C% S) X% z1.3.f Optimization, convergence and scalability6 E& A6 k5 l# t1 G9 B- |
1.3.f i Fast convergence requirements" `2 P6 A' M( E) t
1.3.f ii Query propagation boundaries
% h6 {; [, |3 @1.3.f iii IP FRR (single hop)
- P( G) S( r, C( B; `( |8 @1.3.f iv Leak-map with summary routes  y- V; b3 K. A5 u
1.3.f v EIGRP stub with leak map. ~& U( Z6 J- I2 w! Q
1.4 OSPF (v2 and v3)
# p, h' N  R7 g$ |& L1.4.a Adjacencies  i2 W* t: X5 q* T- P3 f8 p( ~
1.4.b Network types, area types
6 |: ~1 B3 K' G  a% F/ T1.4.c Path preference
2 P) T7 S4 X9 d3 }9 [9 Q1.4.d Operations
9 L5 f5 }8 f3 }5 i  O1.4.d i General operations7 c) X. [6 A! m$ }8 g  D1 A. n
1.4.d ii Graceful shutdown
' K( f6 X4 r& q* Q1.4.d iii GTSM (Generic TTL Security Mechanism). |! p0 q1 a  Z' k4 N0 t1 s. w1 n
1.4.e Optimization, convergence and scalability4 r, [* @6 t3 {# T
1.4.e i Metrics
3 ?& k6 U, v  ~3 S( K/ c8 A' N1.4.e ii LSA throttling, SPF tuning, fast hello
3 ?. v, n# y/ ?! q# R7 u; }! P1.4.e iii LSA propagation control (area types)
/ b6 y  A6 \1 K5 H8 ?1.4.e iv Stub router
( d5 @& y8 L9 h" E- }- R' Z1.4.e v Loop-free alternate& f7 `0 ^* ~1 q2 r- K: w
1.4.e vi Prefix suppression
( K; e$ a" z" h. I7 [1.5 BGP. a9 N. m" k( L% _
1.5.a IBGP and EBGP peer relationships/ E( V7 d: {1 t
1.5.a i Peer-group/update-group, template
3 h" l1 v8 I  w- L! C# i1.5.a ii Active, passive/ Z% H1 {: u1 |1 o; |' N
1.5.a iii Timers. h* c3 W+ D+ I/ @- j
1.5.a iv Dynamic neighbors
: b/ F$ x! q" d1.5.a v 4-bytes AS numbers0 A" C9 P; U0 H" j8 w. B
1.5.a vi Private AS( I2 s# A/ U7 m  y2 |/ \
1.5.b Path selection5 e2 H3 y0 |( q5 L8 t4 ^
1.5.b i Attributes
5 v" d* q) r; R5 s4 l, ]" ?+ o1.5.b ii Best path selection algorithm
. {  K+ I, b: d" l6 g( h1.5.b iii Load-balancing
; n5 R$ G5 }& B- X# ]& b7 j1.5.c Routing policies+ i! I/ h5 q* \. ]' l0 P) N* g
1.5.c i Attribute manipulation( A0 O; g( {  j! a) p' f
1.5.c ii Conditional advertisement
& }% u; L" v7 T' p. w3 D1.5.c iii Outbound Route Filtering) K) v$ E5 G; s  l" T& }
1.5.c iv Standard and extended communities7 R( G5 [1 l- H2 f" T) e- `" _" D! t
1.5.c v Multi-homing
: `- k; G$ f  X2 @; `1.5.d AS path manipulations
4 R& W. F' N8 A1 f6 b0 @1.5.d i local-AS, allowas-in, remove-private-as; Z2 m8 D* d1 O( O/ c, D5 R  ?' A
1.5.d ii Prepend
5 c/ ]( u0 h2 P! L4 `5 X1.5.d iii Regexp
  k( @" Y5 Q  {% S$ X1.5.e Convergence and scalability$ K" }% J  D) B, v; z# p1 p8 g
1.5.e i Route reflector
* n$ q2 I. |7 R( V1.5.e ii Aggregation, as-set
% @# O: P- J1 T2 g. K1.5.f Other BGP features/ G& M/ p; B( j0 I4 m3 o
1.5.f i Multipath, add-path8 V6 c/ I+ J+ B2 P6 d) z6 u+ o/ K. K
1.5.f ii Soft reconfiguration, Route Refresh
* f3 F* W+ ~7 ~% X7 C7 ?1.6 Multicast  N8 Q) n8 h/ B9 D( A4 p9 h
1.6.a Layer 2 multicast
% Q5 y8 B1 F8 J& O& l# G2 L1.6.a i IGMPv2, IGMPv3
/ X3 G' w4 ^! e2 R, P9 R7 _9 Y1.6.a ii IGMP Snooping, PIM Snooping
& a9 f' q# x" }+ b' k6 E( R- \1.6.a iii IGMP Querier" K" k/ ^" q: g% I) v! i2 r: E
1.6.a iv IGMP Filter
7 |% J9 P" A% c4 L0 e1.6.a v MLD
3 S  N& Q% y2 C8 G1.6.b Reverse path forwarding check
! l4 q$ \! A9 s  S2 p: l1.6.c PIM
3 \: N4 }  Z& S) z* n4 N1.6.c i Sparse Mode
! i, j5 w, r6 W' i1 l1.6.c ii Static RP, BSR, AutoRP3 H6 T' z; w+ c
1.6.c iii Group to RP Mapping- R) F0 s1 O+ b' m
1.6.c iv Bidirectional PIM
: m; B1 G- D8 A9 M5 k8 R* I$ E1.6.c v Source-Specific Multicast1 J% ^0 C6 U3 t8 H) k/ r, x
1.6.c vi Multicast boundary, RP announcement filter) w. M" n4 l8 N. d" M
1.6.c vii PIMv6 Anycast RP
+ P/ O+ T* O6 q# T4 \  [! ]1.6.c viii IPv4 Anycast RP using MSDP
5 c$ B* V8 W' {; E" q- K1.6.c ix Multicast multipath
7 H# l/ i, O4 J6 D; z' W) W: ^2 [$ J
第二部分  software defined infrastructure     25%
6 y8 ^! j4 d; p4 I2 d/ ?3 a2 z/ J2.1 Cisco SD Access: i7 l" E0 D1 o9 N3 J; i
2.1.a Design a Cisco SD Access solution
2 u/ N* R9 X( y; i5 n! K0 H0 O2.1.a i Underlay network (IS-IS, manual/PnP)" }. K. j; `( y1 U9 |( j/ e
2.1.a ii Overlay fabric design (LISP, VXLAN, Cisco TrustSec)( e" E, k5 z5 C" D# L" m. O
2.1.a iii Fabric domains (single-site and multi-site using SD-WAN transit)5 Q2 ^3 ?& ~: M9 V( n3 n/ D
2.1.b Cisco SD Access deployment# c. |3 D2 @* h+ U+ [
2.1.b i Cisco DNA Center device discovery and device management4 l. l9 s: P/ h& }8 p9 S5 i: Q$ ~
2.1.b ii Add fabric node devices to an existing fabric
2 O5 g( {* B7 _7 F9 j# x0 V/ b2.1.b iii Host onboarding (wired endpoints only). V! r& `3 c  B2 a3 c6 v% k
2.1.b iv Fabric border handoff
( Z* n3 s; x& t) A8 U, z2.1.c Segmentation% R0 x7 e7 _1 v9 x+ c. K! ~$ }
2.1.c i Macro-level segmentation using VNs
- x$ Z+ |5 [- E6 g- K5 p2.1.c ii Micro-level segmentation using SGTs (using Cisco ISE)1 I, W  |+ Y, x/ q) p( Z
2.1.d Assurance; B" E5 B% a6 S7 b0 L1 x3 m) T
2.1.d i Network and client health (360)
% }5 V% N4 e2 V3 m2.1.d ii Monitoring and troubleshooting
6 v7 V2 L8 R) g$ e( t) r: G2.2 Cisco SD-WAN6 O( R, j+ [' ?: F, F! s
2.2.a Design a Cisco SD-WAN solution
* v0 y9 f* x- y+ G2.2.a i Orchestration plane (vBond, NAT)
2 L  _8 [7 F! D2 @2.2.a ii Management plane (vManage)& Q% @4 C! w5 d, r) B3 x3 h
2.2.a iii Control plane (vSmart, OMP)
. w$ c2 Z# O% U2.2.a iv Data plane (vEdge/cEdge)3 I8 \! ?7 O5 K3 i- d- Q7 f
2.2.b WAN edge deployment; u) J/ k; R  @, M9 a$ S
2.2.b i Onboarding new edge routers
8 p- I3 O" X9 C* q# @) Q# i2.2.b ii Orchestration with zero-touch provisioning/Plug-And-Play+ d2 R1 a7 J6 ]* M: D# R1 f
2.2.b iii OMP
3 @& N' V7 T+ O2.2.b iv TLOC; S9 I, S, J8 t
2.2.c Configuration templates
1 K8 h# e: G2 u& y) A# n2.2.d Localized policies (only QoS)
. b! k* `7 r1 K' H( x" x2.2.e Centralized policies0 A7 Q% l5 W5 j2 `1 D+ E
2.2.e i Application Aware Routing+ F* t3 j5 h7 v7 O
2.2.e ii Topologies
9 C0 d  n4 K. Q3 e4 I$ G
6 @& J: r; L% U3 @( ?第三部分  transport technologies and solutions   15%
1 t8 \6 i' O, m3.1 MPLS
4 M% |" M" b9 n: t( B% ~8 k5 B3.1.a Operations
2 l8 @4 O$ j. W- e3.1.a i Label stack, LSR, LSP" `7 v1 o( b9 v( C+ ], ]- J
3.1.a ii LDP
  |% I  a! _* _3 ^0 e3.1.a iii MPLS ping, MPLS traceroute
& S; @1 x: G+ C3 q# G3.1.b L3VPN/ @3 Y, R! j$ E
3.1.b i PE-CE routing
9 |5 G. F! K# C. X& V- H9 N3.1.b ii MP-BGP VPNv4/VPNv6
3 d1 a# ?: ?3 R0 j8 C3.1.b iii Extranet (route leaking)
" H4 x; H. w! A5 h/ _; b0 v7 ?6 t3 ^3.2 DMVPN& c. T- W  f% Y) \1 m5 p
3.2.a Troubleshoot DMVPN Phase 3 with dual-hub" A; `* Z9 Z6 ]
3.2.a i NHRP3 ]& L( z1 m5 }- T5 A! U. Y5 W$ x
3.2.a ii IPsec/IKEv2 using pre-shared key" ~. O0 u' a: _- P. ~  ~: M
3.2.a iii Per-Tunnel QoS* u* f. W$ N9 C3 Y
3.2.b Identify use-cases for FlexVPN
* V: h3 z3 n. d4 T( N" r3.2.b i Site-to-site, Server, Client, Spoke-to-Spoke/ ~) t; ?  b; S0 g! `9 T1 I* |) [1 r/ K
3.2.b ii IPsec/IKEv2 using pre-shared key
4 T5 J+ X1 t1 k8 l) ?3.2.b iii MPLS over FlexVPN
; q9 A# Q- I9 k4 L; A: a5 F
2 R* z, M6 n3 b# S9 e6 q第四部分  infrastructrue security and sevices       15%6 R. X2 F) Q1 _& B5 H$ {8 ?
4.1 Device Security on Cisco IOS XE
! C+ N! r; C' I) @4.1.a Control plane policing and p rotection
, J1 c+ z4 N3 |' ~6 H4.1.b AAA1 Q" J( ]' d6 {
4.2 Network Security) M/ _  f- {8 f5 T4 c- C6 Y
4.2.a Switch security features
. U6 ?6 B0 [$ S$ X$ Y  r* r/ n4.2.a i VACL, PACL% m" h" }' f' C
4.2.a ii Storm control6 Q/ b& @6 R  }7 ]; y
4.2.a iii DHCP Snooping, DHCP option 823 l4 }8 ?% i" @8 s% \
4.2.a iv IP Source Guard1 E: v: ?, b3 k6 s* t4 b
4.2.a v Dynamic ARP Inspection
7 N* I6 C8 X" q- d( r1 I4.2.a vi Port Security1 ?% k  `; F' Q- J# e
4.2.a vii Private VLAN5 Q  |& q0 _/ a' U/ I6 K
4.2.b Router security features
  o" m% m* j& ?4.2.b i IPv6 Traffic Filters
% n* S# R( T; s# t4.2.b ii IPv4 Access Control Lists& ?5 C9 }$ H5 V) B. `3 \
4.2.b iii Unicast Reverse Path Forwarding& l4 n  M! Q( L( S, X) k) C' w1 n" x3 x
4.2.c IPv6 infrastructure security features
2 M0 P# I& L8 v+ Q. _) ]9 f4.2.c i RA Guard" |4 Z( ~2 Z! d, ]
4.2.c ii DHCP Guard/ R) Y' I0 |! g( a* D% J; I% f
4.2.c iii Binding table
2 n$ H* s) U5 n4.2.c iv Device tracking
! g" F6 f2 b# N! Q0 q4.2.c v ND Inspection/Snooping
2 g' Z5 {" `, @) K% d4.2.c vi Source Guard
0 _( t! z- {& u  u% Z4.2.d IEEE 802.1X Port-Based Authentication" m; l7 X2 R  x* f4 @  {
4.2.d i Device roles, port states
1 u- F! w; G" A% Z) c& m4.2.d ii Authentication process8 L  n- J; R" G0 z, f/ O. h
4.2.d iii Host modes( D& b+ ~$ u. S1 i, m) H# B7 y& |
4.3 System Management3 C& K& q- j' h' t3 ^3 m
4.3.a Device management
" H3 U. k- h% E. C; c" X& f- U4 n* X4.3.a i Console and VTY& y$ R: L5 G2 S  v$ U9 N
4.3.a ii SSH, SCP0 T) X( p& [+ v% F
4.3.a iii RESTCONF, NETCONF
( g! H" C% U: p# h' p8 g# D; m4.3.b SNMP
! T) q0 F2 q7 f) ]4.3.b i v2c8 C' ^7 i$ K7 N8 G9 [/ W3 R1 Z
4.3.b ii v3) {1 P- A& ?4 H' [, d$ @  G; f
4.3.c Logging
- J7 A7 `, ?$ D$ Z4.3.c i Local logging, syslog, debugs, conditional debugs# [2 X2 n1 x3 L' ?* A( b
4.3.c ii Timestamps
" Y. X: v, M0 {6 |; A4.4 Quality of Service
, Z5 c, C" Q! D6 C" k7 F4.4.a End to end L3 QoS using MQC
! i9 z5 S! W: d* _& k. O7 ]4.4.a i DiffServ
4 u2 _. }4 T% k, \  E8 i# w4.4.a ii CoS and DSCP Mapping& z% d; x; T( `/ V0 {2 ]
4.4.a iii Classification2 I" H+ c  f3 R' ?2 e5 r
4.4.a iv Network Based Application Recognition (NBAR)
# s, p5 K3 t, u4.4.a v Marking using IP Precedence, DSCP, CoS& @; n& D& o4 |8 u4 n% r
4.4.a vi Policing, shaping
. L) |- P3 F$ ]% B4.4.a vii Congestion management and avoidance
7 n8 j5 _7 w! i: x6 C# P4.4.a viii HQoS, Sub-rate Ethernet Link, X3 h* G3 M+ h% b2 x( M
4.5 Network Services5 c* l) m; Q1 m1 \: k- z# d
4.5.a First-Hop Redundancy Protocols
8 I4 J$ a! I! h5 x' t4.5.a i HSRP, GLBP, VRRP; w& o0 |/ e" b3 n
4.5.a ii Redundancy using IPv6 RS/RA8 Y' a, V' ^1 `* F- O3 ~& s  C1 X+ ?
4.5.b Network Time Protocol
1 H+ g) O1 w& h4.5.b i Master, client. W! [  Z& \3 d3 B) U( Q
4.5.b ii Authentication
2 g% }9 @1 N" }% D4.5.c DHCP on Cisco IOS3 D8 E* x4 X& I% ^
4.5.c i Client, server, relay# G& j7 w; v* {" ~  M9 U7 r
4.5.c ii Options
& r0 Q. L! T# J$ C9 \( X7 p, T4.5.c iii SLAAC/DHCPv6 interaction1 p( j0 l5 a- L! w" Y5 F5 Q
4.5.c iv Stateful, stateless DHCPv6% [" n7 C, r7 b" @% m' Y" v+ R9 J
4.5.c v DHCPv6 Prefix Delegation
+ Y* Y( B5 t4 d) _2 q4.5.d IPv4 Network Address Translation4 B$ r( s* N, g( V. T( ]
4.5.d i Static NAT, PAT4 q( `0 G- w) n8 ]. q! ]/ F; G
4.5.d ii Dynamic NAT, PAT3 F& |: ^+ X$ h
4.5.d iii Policy-based NAT, PAT
3 {3 r5 W* g& I7 `8 w5 ^$ A4.5.d iv VRF aware NAT, PAT( n, ]! |& _$ B  O- f% G
4.5.d v IOS-XE VRF-Aware Software Infrastructure (VASI) NAT7 g1 k6 O/ i$ G8 G" S
4.6 Network optimization
6 k  \0 [4 T0 ^  D" f: E4.6.a IP SLA
0 o/ U8 n3 ]$ B3 O9 [4.6.a i ICMP probes* h7 n" P/ ?  |; F
4.6.a ii UDP probes8 F$ |! ^0 k! s; j" {' {
4.6.a iii TCP probes( F. C0 E% T( o: ]. Z; y
4.6.b Tracking object
0 }, s& Y1 H0 b) Z7 E4.6.c Flexible Netflow5 `3 F9 O; B3 Z' Y0 T) A- J
4.7 Network operations4 b9 z1 ~1 `" V. \; j: q
4.7.a Traffic capture, E, T  q. j: f% ~. j
4.7.a i SPAN% J- r( W5 J) V
4.7.a ii RSPAN
) j! v) x- C/ _6 Q, q7 ]4.7.a iii ERSPAN
- P; g' r9 F+ x+ g4 L! Y, w0 u" m4.7.a iv Embedded Packet Capture# _( E2 K: c  E* ~+ }+ X
4.7.b Cisco IOS-XE troubleshooting tools7 P& u: W) c+ }; y, J0 m
4.7.b i Packet Trace
0 G* u9 S' J* f4 O7 a' ]# [- p4.7.b ii Conditional debugger (debug platform condition)
3 o% _4 T' Y  J7 p2 P! v
2 }( P! `3 \7 Y# g, ~8 W第五部分  infrastructure automation and programmability     15%
0 C' h/ r  W2 x& i% R5.1 Data encoding formats
* [% A) b" Q1 U5 ^1 \6 v; X; N5.1.a JSON
) Q% W3 ^$ E3 b" b( J9 w& O5.1.b XML
* H2 \4 k$ l% D& T. B9 a6 q5 J, t5.2 Automation and scripting
  t7 t5 k: Z; K$ ]' L3 `5.2.a EEM applets4 B7 T4 r9 w0 p9 V
5.2.b Guest shell5 m5 P. O' W0 b
5.2.b i Linux environment" o8 ?& ^- H# w. S$ E
5.2.b ii CLI Python module
& A8 ~3 _/ d5 O# ~5.2.b iii EEM Python module
4 a/ G% ~9 \. Z  J0 m5.3 Programmability+ c4 S  u# \$ |3 d( r. j0 G, }
5.3.a Interaction with vManage API! |+ P" n% \$ g; H) Q2 R
5.3.a i Python requests library and Postman
1 D6 J3 f% i; m- U3 e7 a5.3.a ii Monitoring endpoints' t! d2 ?, J4 _( I- s! I( F% d7 A# v
5.3.a iii Configuration endpoints  [( A% t8 t  m# ]& `2 Z5 y
5.3.b Interaction with Cisco DNA Center API6 w6 K& y: C4 d5 Z9 n1 @6 R
5.3.b i HTTP request (GET, PUT, POST) via Python requests library and Postman7 ?1 b( N, S3 L1 h( W! v& P
5.3.c Interaction with Cisco IOS XE API
. Z( ^/ f9 x$ u. m) D5.3.c i Via NETCONF/YANG using Python ncclient library
% k/ L; C! ?& i2 E5.3.c ii Via RESTCONF/YANG using Python requests library and Postman
" V& T9 e: X! A9 y  ], h) b- J$ F5.3.d Deploy and verify model-driven telemetry
" q7 A4 j; N- N- {0 Q( I, g3 K* L9 {5.3.d i Configure on-change subscription using gRPC
6 p4 ~. u$ a9 W; I; Y& R5 w2 B+ H4 t0 s7 u; p: W

: a- ?4 U2 N3 ]/ \4 W: U& L
发表于 2020-2-27 12:57:33 | 显示全部楼层
北京,香港的EI lab,五月中下旬已经开放位置了。
沙发 2020-2-27 12:57:33 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-1 00:55:49 | 显示全部楼层
可怕. 包山包海啊.
6# 2020-3-1 00:55:49 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-2 16:32:34 | 显示全部楼层
好东西谢谢楼主分享
10# 2020-3-2 16:32:34 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-4 14:58:48 | 显示全部楼层
CCIE Enterprise LAB 考试大纲
11# 2020-3-4 14:58:48 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-4 19:51:24 | 显示全部楼层
11111111111111
12# 2020-3-4 19:51:24 回复 收起回复
回复 支持 反对

使用道具 举报

 成长值: 64630
发表于 2020-3-5 10:49:28 | 显示全部楼层
这大纲这么多。。。不知道如何学习,特别是第二部分(SDN)和第五部分(编程)。。。
13# 2020-3-5 10:49:28 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-3-6 07:39:51 | 显示全部楼层
谢谢楼主分享
14# 2020-3-6 07:39:51 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-25 12:45 , Processed in 0.075633 second(s), 22 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表