Archive for November, 2009
INE is thrilled to thank another valuable member of our hugely popular Online Community (IEOC.COM). This week it is Ivan Krimmel. You all know Ivan by his awesome screen name and avatar, NTllect. Ivan has selected to receive 150 rack rental tokens from Graded Labs. Congratulations Ivan. Enjoy your studies and thanks so much for all of the excellent work in the forum.
Ivan was introduced to Networking back in 2005, when he first saw several NT servers connected in a small LAN via a hub. This was in a local Microsoft CTEC. He was really excited by the potential that a network can bring to any enterprise. Ivan decided to start the MCSE track and in a half year of study, he was certified. While learning himself, he discovered that a good way to study something is to teach someone else. This is how Ivan became an MCT at a local Microsoft CTEC.
I blogged a couple weeks ago about having all of the Volume I and II workbooks finished and shipping the week of the 23rd of November. Well it’s the week of the 23rd of November and the Volume I and II workbooks for ALL CCIE tracks are finished and shipping!
The CCIE R&S Dynamips workbook update is currently in the works but I can’t give you a definite date but it should be ready by the end of January at the latest. We will be making minor optimizations to the standard R&S Volume II workbook starting next week and once those are finished we will switch over to update the Dynamips workbook. If you purchase the standard R&S Volume II workbook you will automatically get access to the Dynamips workbook once it’s released.
A CCSP, CCNA Security, CCNA Voice, CCNA Wireless and two CCNA products will be announced in the next couple weeks on our website. The CCNA products will start becoming available around the first week of January and the others starting in late January. In addition to these new products we will announcing many more by the end of the year so stay tuned!
For Part 2 of this series, click here.
The following questions will be added to the Core Knowledge Simulation engine. Answers will be provided in the comments section.
Implement Identity Management
Refer to the diagram. The software running on the PC performs what role? Continue Reading
I know I haven’t been posting each of the updates here, and I probably should be in order to keep people informed….
Anyway… Greetings from the sunny Carribbean! Excellent weather, but REALLY slow Internet, so nothing too fancy coming out of me this week!
We currently have 23 modules done in the Routing and Switching Audio bootcamp giving well over 18 hours (and growing quickly) of useful information. I have completed the IPv4 section of the blueprint up through (and including) PfR/OER and Redistribution. Since everything coming next is miscellaneous or pseudo-independent information, I’m relatively up for suggestions on the most-wanted information to come next!
Left to my own devices, I decided that MPLS and MPLS-VPNs will be the next set of information to come given the novelty of the technology and fear it strikes into many people’s hearts! (Completely needless as I’ll get to show you how simple things can be!) But after that topic is done, I’d love to hear people’s opinions about what should come next!
Back to pretending to be on holiday so that I don’t figure out who to “vote off the islands” due to slow connections. Expect more updates soon!
In the meantime, check out http://members.internetworkexpert.com/courses/iebc-rs-aud/ or your Members account where all of the current updates can be found!
We are excited to announce that our CCIE Voice Volume II Workbook is now complete! The workbook contains 10 detailed full scale labs designed to test your abilities to configure and troubleshoot a full scale CCIE Voice Topology. Each lab contains challenging tasks along with a detailed solutions guide to walk you through each scenario. This workbook, along with our CCIE Voice Volume I Workbook will provide both the foundation and refinement on the critical theory, technologies, and lab strategy necessary to become a Voice CCIE.
In addition, our CCIE and CCVP Advanced Technology Class On Demands are beginning to release this week. Each COD includes both theory and hands on configuration based on the technologies covered in each blueprint. Videos are starting to be posted to members accounts, with additional segments being posted throughout the week. To find out more information about the products, click here: CCIE Voice ATC and CCVP ATC. Samples from each class will be posted tomorrow morning, so check back soon!
If you have any questions, please contact me at firstname.lastname@example.org, and good luck with your Voice studies!
Some time ago I mentioned that it is possible to configure a functional GET VPN scenario using just two routers. Normally, GET VPN requires a dedicated Key Server, which does not participate is user traffic encryption and only distributes keying information and encryption policies. All other routers – group members – register to the Key Server. A router could not register to itself when configured as a key server and group member simultaneously. However, there is a Key Server redundancy feature known as KOOP Key Servers that allows for two servers to synchronize the keying information and the group member to register to the redundant key servers.
Relying upon this feature, we may take two routers and configure them both in a KOOP key server pair. At the same time, every router is configured as a Group Member registering to another router. Since the keying information is being kept in sync, both routers will be able to properly exchange encrypted GET VPN traffic. Now, for the practical implementation we chose two directly connected routers: R4 and R5. GET VPN is supposed to encrypt traffic sent off respective VLAN4 and VLAN5 interfaces of these routers destined to the multicast groups in range 184.108.40.206/8. The IP addresses for VLAN4 and VLAN5 subnets are 173.X.4.0/24 and 173.X.5.0/24. Here is how we configure R4 for Key Server functionality. Notice the redundancy configuration using R5 as the peer.
Every once in a while I come across a tip that is so exciting I want to share it with the world. I was recently going through one of the many posts I read, and saw the answer to a question that I have been wondering about for many years. Awesome job to Steve Shaw who came up with this. Here is the scenario. Continue Reading
The new and improved Core Knowledge Simulation will be released in December 2009! Here are some more new questions you will find in the database.
1.00 Implement Layer 2 Technologies
You configured your switch (SWA) with the command spanning-tree vlan 26 root primary and you have confirmed the switch is the root bridge for VLAN 26. Later, another switch is introduced (SWB) that has a priority value for VLAN 26 set at 8192. What happens to the root bridge?
2.50 Implement IPv4 Enhanced Interior Gateway Routing Protocol (EIGRP)
What type of EIGRP route from the topology table can be used for load balancing through the use of the variance command?
2.60 Implement IPv4 Border Gateway Protocol (BGP)
Which open standard BGP attribute is used first in the BGP Best Path selection algorithm?
5.00 Implement IP Multicast
What device is used to dynamically announce the RP address to all routers in a PIM version 1 environment?
The CCNP Workbook accompanying the CCNP Bootcamp Class-on-Demand has been updated. Current customers can access the new updates by visiting the IE Member’s Site. The workbook now includes the following topics:
OSPF FA Overview
This post is dedicated to one “esoteric” OSPF external route filtering method based on hiding OSPF Forwarding Address. Recall the meaning of OSPF FA. This is a special field used on OSPF type 5 and 7 LSAs to convey the information of the “external route source”. The purpose of FA is to optimize forwarding in situations where the external route source is connected to a shared segment. Here is an example: