CCIE SP 400-201 V4.1 WRITTEN EXAM ESSENTIALS – Service Provider Architecture and Evolution
- June 14, 2016
- Posted by: Paul Adam
- Category: CCIE Service Provider 400-201 V4.1
In a series of blog posts, I will go over each of the Cisco’s official blueprint sections for CCIE SP 400-201 V4.1 written exam and call out the very essential topics and knowledge base that are must-know for passing the exam. Please note that all of our CCIE Written Exam Cert Study Guides include similar exam essentials at the end of each chapter to reinforce key concepts for our readers.
I hope that you find them useful!
- While a PE router maintains VPN routing information, it is only required to maintain VPN routes for those VPNs to which it is directly attached.
- P routers are only required to maintain routes to the provider’s PE routers; they are not required to maintain a specific VPN routing information for each customer site.
- The IOS-XR Microkernel is preemptive, and the scheduler is priority based
- The following are the main functions of IOS-XR system manager:
- Start processes during bootup or node reload
- Start processes during route processor (RP) failover
- Start processes in response to user configuration; for example, when a user configures an OSPF process using router ospf <process-name>, system manager starts a new OSPF process instance
- Act as a central repository for all process-related information
- Initiate disaster recovery based on the process health
- Invoke dumper to collect a core dump when a process terminates abnormally
- A Hardware-Isolated Virtual Router (HVR) has hardware-based resource isolation between routing entities, whereas a Software-Isolated Virtual Router (SVR) comprises software-based resource isolation between routing entities
- SDRs provide full isolation between virtualized routing instances through the use of Distributed Route Processors (DRPs) for extra control plane resources.
- A Split Brain is a condition where the inter rack links between the routers in a Cisco ASR 9000 Series nV Edge system fails and hence the nodes on both routers start to act as primary node.
- The IRL (Inter-Rack Link) connections are required for forwarded traffic going from one chassis out of interface on the other chassis part of the nV edge system.
- In existing cellular networks, RAN backhaul is defined as the connection between the radio at the cell site and the radio controller.
- Although a Layer 2 system is good for timing with Synchronous Ethernet (SyncE), a Layer 3 system affords significantly more options for timing, including the most-requested 1588v2.
0 (0) Today, we live in a world where there is nothing, and I mean nothing, off the limits for cyberattacks and particularly ransomware attacks. Our hospitals, our universities, oil pipelines, and now even our meat is under cyberattack. The cyberattack that flattened the IT operations at JBS Foods over the weekend turns out was […]
0 (0) Ransomware has been a growing menace for years, but there has been a marked increase, during the recent months, in sophistication and level of innovation in this portion of the cybercrime underbelly. If you didn’t know, cybercrime comes in many different types, such as email and internet fraud, identity theft, financial theft like […]
0 (0) It’s time to check your Pulse. I mean your Pulse Connect Secure VPN appliance. Hackers have been exploiting several previously known and one zero-day vulnerabilities affecting Pulse Connect Secure aka PCS VPN appliances. They are targeting defense, government, and financial organizations around the world. According to FireEye, several threat actors have been exploiting […]
5 (2) OK, we now have another supply chain attack that could become the next big hack. When April fools’ jokes were being published online, one company known as Codecov discovered something that was far from a joke. So, who is Codecov? Codecov is one of the many DevOps tools out there. It provides hosted […]
5 (1) So, what is Ethical Hacking? Well, it is hacking ethically. OK, that was not helpful. There are two types of hacking, white hat hacking, black hat hacking. They use similar tools and have similar goals, so then what is the difference. Well, there is one big difference and that has to do with […]
How useful was this post?