Blog
CCIE R&S 400-101 V5.1 WRITTEN EXAM ESSENTIALS – NETWORK PRINCIPLES
- July 6, 2016
- Posted by: Paul Adam
- Category: CCIE Routing and Switching 400-101 V5.1
In a series of blog posts, I will go over each of the Cisco’s official blueprint sections for CCIE R&S 400-101 V5.1 written exam and call out the very essential topics and knowledge base that are must-know for passing the exam. Please note that all of our CCIE Written Exam Cert Study Guides include similar exam essentials at the end of each chapter to reinforce key concepts for our readers.
I hope that you find them useful!
- There are two common approaches for migrating between routing protocols, namely using administrative distance (AD) and using redistribution with a moving boundary
- Spanning Tree Protocol (STP) was originally, standardized as IEEE 802.1D most recently in 802.1d-1998, but deprecated as of 802.1d-2004 in favor of Rapid Spanning Tree Protocol (RSTP)
- IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w
- When you migrate from PVST to RPVST, port status cycles through block and learning before moving to forwarding
- When you enable MST, it also enables RSTP
- Spanning Tree must use MST mode on EVC ports.
- LACP and PAGP are supported on EVC ports.
- Ports with different spanning-tree path costs can form an EtherChannel if they are otherwise compatible configured. Setting different spanning-tree path costs does not, by itself, make ports incompatible for the formation of an EtherChannel.
Leave a Reply Cancel reply
0 (0) Today, we live in a world where there is nothing, and I mean nothing, off the limits for cyberattacks and particularly ransomware attacks. Our hospitals, our universities, oil pipelines, and now even our meat is under cyberattack. The cyberattack that flattened the IT operations at JBS Foods over the weekend turns out was […]
0 (0) Ransomware has been a growing menace for years, but there has been a marked increase, during the recent months, in sophistication and level of innovation in this portion of the cybercrime underbelly. If you didn’t know, cybercrime comes in many different types, such as email and internet fraud, identity theft, financial theft like […]
0 (0) It’s time to check your Pulse. I mean your Pulse Connect Secure VPN appliance. Hackers have been exploiting several previously known and one zero-day vulnerabilities affecting Pulse Connect Secure aka PCS VPN appliances. They are targeting defense, government, and financial organizations around the world. According to FireEye, several threat actors have been exploiting […]
5 (1) OK, we now have another supply chain attack that could become the next big hack. When April fools’ jokes were being published online, one company known as Codecov discovered something that was far from a joke. So, who is Codecov? Codecov is one of the many DevOps tools out there. It provides hosted […]
5 (1) So, what is Ethical Hacking? Well, it is hacking ethically. OK, that was not helpful. There are two types of hacking, white hat hacking, black hat hacking. They use similar tools and have similar goals, so then what is the difference. Well, there is one big difference and that has to do with […]