Apr
17

As many of you hopefully already know, the CCIE Routing & Switching certification blueprint is changing from version 4 to version 5 on June 3rd 2014. As this date quickly approaches, and as the last of the v4 lab seats are fully booked, it’s time to start planning your attack on the RSv5 blueprint.

While Cisco’s official blueprint for v5 is now more detailed that it has ever been in the past, it still lacks some details in certain areas, for example “Implement, optimize and troubleshoot filtering with any routing protocol.” Additionally it would be difficult to use Cisco’s blueprint for a study plan as it stands in its current linear format. For example “Layer 3 multicast” is listed before “Fundamental routing concepts”, which from a learning perspective doesn’t make sense, because you must understand unicast routing fully before you learn multicast routing. To help remedy this we’ve re-ordered and expanded Cisco’s blueprint into INE’s RSv5 Expanded Blueprint, which you can find below after the jump.

Our CCIE RSv5 Expanded Blueprint is meant to be used as a checklist that you can use as you go through your preparation. This way when you’re finally ready to attempt the lab exam, you can be assured that you’ve at least heard of all the topics in the scope, regardless of how obscure some of them might be. Additionally note that some topics listed below might appear only on the written exam and not the lab exam, such as MPLS Layer 2 VPNs or RIPng, but are still included in our content and the outline below.

The below outline will continue to be updated, so check back periodically during your preparation to see changes, adds, and removes.  Good luck in your studies!

INE’s CCIE RSv5 Expanded Blueprint

Release Notes

Note: Topics in strikethrough have been removed.
Topics with * are covered in the Written Exam only.

Edit 2014-04-21 – Removed the following topics:

  • 802.1q Tunneling
  • Flex Links
  • Router IP Traffic Export (RITE)

Edit 2014-04-21 – Marked the following topics as Written Exam Only:

  • Performance Routing (PfR) *
  • IPv6 Tunneling *
  • RIPng *
  • IS-IS *
  • AToM *
  • L2TPV3 *
  • VPLS *
  • GETVPN *
  • IPv6 Multicast Routing *
  • Layer 2 QoS *
  • 802.1x *
  • AAA with TACACS+ and RADIUS *

RSv5 Expanded Blueprint

  • 1. LAN Switching
      • 1.1. VLANs & Trunking
        • 1.1.1. Standard VLANs
        • 1.1.2. Extended VLANs
        • 1.1.3. VLAN Database
        • 1.1.4. Access Ports
        • 1.1.5. 802.1q Trunk Ports
        • 1.1.6. 802.1q Native VLAN
        • 1.1.7. Dynamic Trunking Protocol (DTP)
        • 1.1.8. Trunking Allowed List
      • 1.2. VTP
        • 1.2.1. VTP Version 1, 2, & 3
        • 1.2.2. VTP Authentication
        • 1.2.3. VTP Pruning
        • 1.2.4. VTP Prune Eligible List
        • 1.2.5. VTPv3 & Private VLANs
      • 1.3. EtherChannels
        • 1.3.1. Static Layer 2 EtherChannels
        • 1.3.2. PAgP
        • 1.3.3. LACP
        • 1.3.4. Layer 3 EtherChannel
        • 1.3.5. EtherChannel Load Balancing
        • 1.3.6. EtherChannel Protocol Limiting
        • 1.3.7. EtherChannel Misconfig Guard
      • 1.4. Spanning-Tree Protocol
        • 1.4.1. PVST+
          • 1.4.1.1. STP Root Bridge Election
          • 1.4.1.2. STP Path Selection with Port Cost
          • 1.4.1.3. STP Path Selection with Port Priority
          • 1.4.1.4. STP Convergence Timers
        • 1.4.2. Optional STP Features
          • 1.4.2.1. PortFast
          • 1.4.2.2. UplinkFast
          • 1.4.2.3. BackboneFast
          • 1.4.2.4. BPDU Guard
          • 1.4.2.5. BPDU Filter
          • 1.4.2.6. Root Guard
        • 1.4.3. Rapid-PVST+
          • 1.4.3.1. RSTP Convergence Optimizations
          • 1.4.3.2. Edge Ports
        • 1.4.4. Multiple STP
          • 1.4.4.1. MST Root Bridge Election
          • 1.4.4.2. MST Path Selection with Port Cost
          • 1.4.4.3. MST Path Selection with Port Priority
          • 1.4.4.4. MST and CST/PVST+ Interoperability
          • 1.4.4.5. Multi-Region MST
    • 1.5. 802.1q Tunneling
        • 1.5.1. L2 Protocol Tunneling
        • 1.5.2. Layer 2 MTU
        • 1.5.3. EtherChannel over 802.1q Tunneling
    • 1.6. Miscellaneous
        • 1.6.1. CDP
        • 1.6.2. LLDP
        • 1.6.3. UDLD
        • 1.6.4. CAM Aging Time
        • 1.6.5. SPAN
        • 1.6.6. RSPAN
        • 1.6.7. ERSPAN
        • 1.6.8. Flex Links
      • 1.6.9. Fallback Bridging
      • 1.6.10. Voice VLANs
      • 1.6.11. Smartport Macros
  • 2. Layer 2 WAN Circuits
    • 2.1. HDLC
    • 2.2. PPP
    • 2.3. PPP Authentication
    • 2.4. PPP Multilink
    • 2.5. PPPoE
  • 3. IP Routing
    • 3.1. Protocol Independent IPv4 Routing
      • 3.1.1. IPv4 Addressing
      • 3.1.2. IPv4 ARP
      • 3.1.3. Longest Match Routing
      • 3.1.4. Administrative Distance
      • 3.1.5. Static Routing
      • 3.1.6. Route Recursion
      • 3.1.7. Egress Interface vs. Next Hop Static Routing
      • 3.1.8. Default Routing
      • 3.1.9. CEF
      • 3.1.10. Floating Static Routes
      • 3.1.11. Backup Interface
      • 3.1.12. IP Service Level Agreement
      • 3.1.13. Enhanced Object Tracking
      • 3.1.14. Policy Routing
      • 3.1.15. Policy Routing and IP SLA
      • 3.1.16. Local Policy Routing
      • 3.1.17. GRE Tunnels
      • 3.1.18. IP in IP Tunnels
      • 3.1.19. Tunnels & Recursive Routing Errors
      • 3.1.20. On Demand Routing
      • 3.1.21. VRF Lite
      • 3.1.22. Bidirectional Forwarding Detection
      • 3.1.23. Performance Routing (PfR) *
    • 3.2. Protocol Independent IPv6 Routing
      • 3.2.1. IPv6 Link-Local Addressing
      • 3.2.2. IPv6 Unique Local Addressing
      • 3.2.3. IPv6 Global Aggregatable Addressing
      • 3.2.4. IPv6 EUI-64 Addressing
      • 3.2.5. IPv6 Auto-Configuration / SLAAC
      • 3.2.6. IPv6 Global Prefix
      • 3.2.7. IPv6 Redistribution
      • 3.2.8. IPv6 Filtering
      • 3.2.9. IPv6 NAT-PT
      • 3.2.10. IPv6 MP-BGP
      • 3.2.11. IPv6 Tunneling *
      • 3.2.12. Automatic 6to4 Tunneling*
      • 3.2.13. ISATAP Tunneling *
    • 3.3. Common Dynamic Routing Features
      • 3.3.1. Distance Vector vs. Link State vs. Path Vector routing protocols
      • 3.3.2. Passive Interfaces
      • 3.3.3. Routing Protocol Authentication
      • 3.3.4. Route Filtering
      • 3.3.5. Auto Summarization
      • 3.3.6. Manual Summarization
      • 3.3.7. Route Redistribution
        • 3.3.7.1. Prefix Filtering with Route Tagging
        • 3.3.7.2. Prefix Filtering with Manual Lists
        • 3.3.7.3. Prefix Filtering with Administrative Distance
        • 3.3.7.4. Administrative Distance Based Loops
        • 3.3.7.5. Metric Based Loops
    • 3.4. RIP
      • 3.4.1. RIPv2
        • 3.4.1.1. Initialization
          • 3.4.1.1.1. Enabling RIPv2
          • 3.4.1.1.2. RIP Send and Receive Versions
          • 3.4.1.1.3. Split Horizon
          • 3.4.1.1.4. RIPv2 Unicast Updates
          • 3.4.1.1.5. RIPv2 Broadcast Updates
          • 3.4.1.1.6. RIPv2 Source Validation
        • 3.4.1.2. Path Selection
          • 3.4.1.2.1. Offset List
        • 3.4.1.3. Summarization
          • 3.4.1.3.1. Auto-Summary
          • 3.4.1.3.2. Manual Summarization
        • 3.4.1.4. Authentication
          • 3.4.1.4.1. Clear Text
          • 3.4.1.4.2. MD5
        • 3.4.1.5. Convergence Optimization & Scalability
          • 3.4.1.5.1. RIPv2 Convergence Timers
          • 3.4.1.5.2. RIPv2 Triggered Updates
        • 3.4.1.6. Filtering
          • 3.4.1.6.1. Filtering with Passive Interface
          • 3.4.1.6.2. Filtering with Prefix-Lists
          • 3.4.1.6.3. Filtering with Standard Access-Lists
          • 3.4.1.6.4. Filtering with Extended Access-Lists
          • 3.4.1.6.5. Filtering with Offset Lists
          • 3.4.1.6.6. Filtering with Administrative Distance
          • 3.4.1.6.7. Filtering with Per Neighbor AD
        • 3.4.1.7. Default Routing
          • 3.4.1.7.1. RIPv2 Default Routing
          • 3.4.1.7.2. RIPv2 Conditional Default Routing
          • 3.4.1.7.3. RIPv2 Reliable Conditional Default Routing
      • 3.4.2. RIPng *
        • 3.4.2.1. RIPng Overview *
    • 3.5. EIGRP
      • 3.5.1. Initialization
        • 3.5.1.1. Network Statement
        • 3.5.1.2. Multicast vs. Unicast Updates
        • 3.5.1.3. EIGRP Named Mode
        • 3.5.1.4. EIGRP Multi AF Mode
        • 3.5.1.5. EIGRP Split Horizon
        • 3.5.1.6. EIGRP Next-Hop Processing
      • 3.5.2. Path Selection
        • 3.5.2.1. Feasibility Condition
        • 3.5.2.2. Modifying EIGRP Vector Attributes
        • 3.5.2.3. Classic Metric
        • 3.5.2.4. Wide Metric
        • 3.5.2.5. Metric Weights
        • 3.5.2.6. Equal Cost Load Balancing
        • 3.5.2.7. Unequal Cost Load Balancing
        • 3.5.2.8. EIGRP Add-Path
      • 3.5.3. Summarization
        • 3.5.3.1. Auto-Summary
        • 3.5.3.2. Manual Summarization
        • 3.5.3.3. Summarization with Default Routing
        • 3.5.3.4. Summarization with Leak Map
        • 3.5.3.5. Summary Metric
      • 3.5.4. Authentication
        • 3.5.4.1. MD5
        • 3.5.4.2. HMAC SHA2-256bit
        • 3.5.4.3. Automatic key rollover
      • 3.5.5. Convergence Optimization & Scalability
        • 3.5.5.1. EIGRP Convergence Timers
        • 3.5.5.2. EIGRP Query Scoping with Summarization
        • 3.5.5.3. EIGRP Query Scoping with Stub Routing
        • 3.5.5.4. Stub Routing with Leak Map
        • 3.5.5.5. Bandwidth Pacing
        • 3.5.5.6. IP FRR
        • 3.5.5.7. Graceful Restart & NSF
      • 3.5.6. Filtering
        • 3.5.6.1. Filtering with Passive Interface
        • 3.5.6.2. Filtering with Prefix-Lists
        • 3.5.6.3. Filtering with Standard Access-Lists
        • 3.5.6.4. Filtering with Extended Access-Lists
        • 3.5.6.5. Filtering with Offset Lists
        • 3.5.6.6. Filtering with Administrative Distance
        • 3.5.6.7. Filtering with Per Neighbor AD
        • 3.5.6.8. Filtering with Route Maps
        • 3.5.6.9. Per Neighbor Prefix Limit
        • 3.5.6.10. Redistribution Prefix Limit
      • 3.5.7. Miscellaneous EIGRP
        • 3.5.7.1. EIGRP Default Network
        • 3.5.7.2. EIGRP Default Metric
        • 3.5.7.3. EIGRP Neighbor Logging
        • 3.5.7.4. EIGRP Router-ID
        • 3.5.7.5. EIGRP Maximum Hops
        • 3.5.7.6. no next-hop-self no-ecmp-mode
        • 3.5.7.7. EIGRP Route Tag Enhancements
      • 3.5.8. EIGRPv6
        • 3.5.8.1. Enabling EIGRPv6
        • 3.5.8.2. EIGRPv6 Split Horizon
        • 3.5.8.3. EIGRPv6 Next-Hop Processing
        • 3.5.8.4. EIGRPv6 Authentication
        • 3.5.8.5. EIGRPv6 Metric Manipulation
        • 3.5.8.6. EIGRPv6 Default Routing
        • 3.5.8.7. EIGRPv6 Summarization
        • 3.5.8.8. EIGRPv6 Prefix Filtering
        • 3.5.8.9. EIGRPv6 Stub Routing
        • 3.5.8.10. EIGRPv6 Link Bandwidth
        • 3.5.8.11. EIGRPv6 Timers
        • 3.5.8.12. EIGRP IPv6 VRF Lite
        • 3.5.8.13. EIGRP Over The Top
    • 3.6. OSPF
      • 3.6.1. Initialization
        • 3.6.1.1. Network Statement
        • 3.6.1.2. Interface Statement
      • 3.6.2. Network Types
        • 3.6.2.1. Broadcast
        • 3.6.2.2. Non-Broadcast
        • 3.6.2.3. OSPF DR/BDR Election Manipulation
        • 3.6.2.4. Point-to-Point
        • 3.6.2.5. Point-to-Multipoint
        • 3.6.2.6. Point-to-Multipoint Non-Broadcast
        • 3.6.2.7. Loopback
        • 3.6.2.8. LSA Types
        • 3.6.2.9. OSPF Next-Hop Processing
        • 3.6.2.10. Unicast vs. Multicast Hellos
      • 3.6.3. Path Selection
        • 3.6.3.1. Auto-Cost
        • 3.6.3.2. Cost
        • 3.6.3.3. Bandwidth
        • 3.6.3.4. Per-Neighbor Cost
        • 3.6.3.5. Non-Backbone Transit Areas
        • 3.6.3.6. Virtual-Links
      • 3.6.4. Authentication
        • 3.6.4.1. Area
        • 3.6.4.2. Interface level
        • 3.6.4.3. Clear Text
        • 3.6.4.4. MD5
        • 3.6.4.5. Null
        • 3.6.4.6. MD5 with Multiple Keys
        • 3.6.4.7. SHA1-196
        • 3.6.4.8. Virtual link
      • 3.6.5. Summarization
        • 3.6.5.1. Internal Summarization
        • 3.6.5.2. External Summarization
        • 3.6.5.3. Path Selection with Summarization
        • 3.6.5.4. Summarization and Discard Routes
      • 3.6.6. Stub Areas
        • 3.6.6.1. Stub Areas
        • 3.6.6.2. Totally Stubby Areas
        • 3.6.6.3. Not-So-Stubby Areas
        • 3.6.6.4. Not-So-Stubby Areas and Default Routing
        • 3.6.6.5. Not-So-Totally-Stubby Areas
        • 3.6.6.6. Stub Areas with Multiple Exit Points
        • 3.6.6.7. NSSA Type-7 to Type-5 Translator Election
        • 3.6.6.8. NSSA Redistribution Filtering
      • 3.6.7. Filtering
        • 3.6.7.1. Filtering with Distribute-Lists
        • 3.6.7.2. Filtering with Administrative Distance
        • 3.6.7.3. Filtering with Route-Maps
        • 3.6.7.4. Filtering with Summarization
        • 3.6.7.5. LSA Type-3 Filtering
        • 3.6.7.6. Forwarding Address Suppression
        • 3.6.7.7. NSSA ABR External Prefix Filtering
        • 3.6.7.8. Database Filtering
      • 3.6.8. Default Routing
        • 3.6.8.1. Default Routing
        • 3.6.8.2. Conditional Default Routing
        • 3.6.8.3. Reliable Conditional Default Routing
        • 3.6.8.4. Default Cost
      • 3.6.9. Convergence Optimization & Scalability
        • 3.6.9.1. Interface Timers
        • 3.6.9.2. Fast Hellos
        • 3.6.9.3. LSA & SPF Throttling
        • 3.6.9.4. LSA & SPF Pacing
        • 3.6.9.5. Single Hop LFA / IP FRR
        • 3.6.9.6. Multihop LFA
        • 3.6.9.7. Stub Router Advertisement
        • 3.6.9.8. Demand Circuit
        • 3.6.9.9. Flooding Reduction
        • 3.6.9.10. Transit Prefix Filtering
        • 3.6.9.11. Resource Limiting
        • 3.6.9.12. Graceful Restart & NSF
        • 3.6.9.13. Incremental SPF
      • 3.6.10. Miscellaneous OSPF Features
      • 3.6.11. OSPFv3
        • 3.6.11.1. LSA Types
        • 3.6.11.2. OSPFv3
        • 3.6.11.3. OSPFv3 Network Types
        • 3.6.11.4. OSPFv3 Prefix Suppression
        • 3.6.11.5. OSPFv3 Virtual Links
        • 3.6.11.6. OSPFv3 Summarization
        • 3.6.11.7. OSPFv3 IPsec Authentication
        • 3.6.11.8. OSPFv3 Multi AF Mode
        • 3.6.11.9. TTL Security
    • 3.7. BGP
      • 3.7.1. Establishing Peerings
        • 3.7.1.1. iBGP Peerings
        • 3.7.1.2. EBGP Peerings
        • 3.7.1.3. Update Source Modification
        • 3.7.1.4. Multihop EBGP Peerings
        • 3.7.1.5. Neighbor Disable-Connected-Check
        • 3.7.1.6. Authentication
        • 3.7.1.7. TTL Security
        • 3.7.1.8. BGP Peer Groups
        • 3.7.1.9. 4 Byte ASNs
        • 3.7.1.10. Active vs. Passive Peers
        • 3.7.1.11. Path MTU Discovery
        • 3.7.1.12. Multi Session TCP Transport per AF
        • 3.7.1.13. Dynamic BGP Peering
      • 3.7.2. iBGP Scaling
        • 3.7.2.1. Route Reflectors
        • 3.7.2.2. Route Reflector Clusters
        • 3.7.2.3. Confederations
      • 3.7.3. BGP Next Hop Processing
        • 3.7.3.1. Next-Hop-Self
        • 3.7.3.2. Manual Next-Hop Modification
        • 3.7.3.3. Third Party Next Hop
        • 3.7.3.4. Next Hop Tracking
        • 3.7.3.5. Conditional Next Hop Tracking
        • 3.7.3.6. BGP Next-Hop Trigger Delay
      • 3.7.4. BGP NLRI Origination
        • 3.7.4.1. Network Statement
        • 3.7.4.2. Redistribution
        • 3.7.4.3. BGP Redistribute Internal
        • 3.7.4.4. Conditional Advertisement
        • 3.7.4.5. Conditional Route Injection
      • 3.7.5. BGP Bestpath Selection
        • 3.7.5.1. Weight
        • 3.7.5.2. Local Preference
        • 3.7.5.3. AS-Path Prepending
        • 3.7.5.4. Origin
        • 3.7.5.5. MED
        • 3.7.5.6. Always Compare MED
        • 3.7.5.7. Deterministic MED
        • 3.7.5.8. AS-Path Ignore
        • 3.7.5.9. Router-IDs
        • 3.7.5.10. DMZ Link Bandwidth
        • 3.7.5.11. Maximum AS Limit
        • 3.7.5.12. Multipath
      • 3.7.6. BGP Aggregation
        • 3.7.6.1. BGP Auto-Summary
        • 3.7.6.2. Aggregation
        • 3.7.6.3. Summary Only
        • 3.7.6.4. Suppress Map
        • 3.7.6.5. Unsuppress Map
        • 3.7.6.6. AS-Set
        • 3.7.6.7. Attribute-Map
        • 3.7.6.8. Advertise Map
      • 3.7.7. BGP Communities
        • 3.7.7.1. Standard
        • 3.7.7.2. Extended
        • 3.7.7.3. No-Advertise
        • 3.7.7.4. No-Export
        • 3.7.7.5. Local-AS
        • 3.7.7.6. Deleting
      • 3.7.8. Filtering
        • 3.7.8.1. Prefix-Lists
        • 3.7.8.2. Standard Access-Lists Task
        • 3.7.8.3. Extended Access-Lists
        • 3.7.8.4. Maximum Prefix
        • 3.7.8.5. BGP Regular Expressions
        • 3.7.8.6. Outbound Route Filtering (ORF)
        • 3.7.8.7. Soft Reconfiguration Inbound
      • 3.7.9. AS-Path Manipulation
        • 3.7.9.1. Local AS
        • 3.7.9.2. Local AS Replace-AS/Dual-AS
        • 3.7.9.3. Remove Private AS
        • 3.7.9.4. Allow AS In
        • 3.7.9.5. AS Override
      • 3.7.10. BGP Convergence Optimization
        • 3.7.10.1. BGP Timers Tuning
        • 3.7.10.2. BGP Fast Fallover
        • 3.7.10.3. BGP Prefix Independent Convergence (PIC)
        • 3.7.10.4. BGP Dampening
        • 3.7.10.5. BGP Dampening with Route-Map
        • 3.7.10.6. BGP Add Path
      • 3.7.11. BGP Default Routing
      • 3.7.12. IPv6 BGP
      • 3.7.13. Misc BGP
        • 3.7.13.1. iBGP Synchronization
        • 3.7.13.2. BGP over GRE
        • 3.7.13.3. BGP Backdoor
    • 3.8. Route Redistribution
      • 3.8.1. Metric Based Loops
      • 3.8.2. Administrative Distance Based Loops
      • 3.8.3. Route Tag Filtering
      • 3.8.4. IP Route Profile
      • 3.8.5. Debug IP Routing
    • 3.9. Miscellaneous Routing Features
    • 3.10. IS-IS *
  • 4. VPN
    • 4.1. MPLS
      • 4.1.1. VRF Lite
      • 4.1.2. MPLS LDP
      • 4.1.3. MPLS Ping
      • 4.1.4. MPLS Traceroute
      • 4.1.5. MPLS Label Filtering
      • 4.1.6. MP-BGP VPNv4
      • 4.1.7. MP-BGP Prefix Filtering
      • 4.1.8. PE-CE Routing with RIP
      • 4.1.9. PE-CE Routing with OSPF
      • 4.1.10. OSPF Sham-Link
      • 4.1.11. PE-CE Routing with EIGRP
      • 4.1.12. EIGRP Site-of-Origin
      • 4.1.13. PE-CE Routing with BGP
      • 4.1.14. BGP SoO Attribute
      • 4.1.15. Internet Access
      • 4.1.16. Route Leaking
      • 4.1.17. MPLS VPN Performance Tuning
      • 4.1.18. AToM *
      • 4.1.19. L2TPV3 *
      • 4.1.20. VPLS *
    • 4.2. IPsec LAN-to-LAN
      • 4.2.1. ISAKMP Policies
      • 4.2.2. PSK Authentication
      • 4.2.3. Static Crypto Maps
      • 4.2.4. IPsec over GRE
      • 4.2.5. Static VTI
      • 4.2.6. GETVPN *
    • 4.3. DMVPN
      • 4.3.1. Single Hub
      • 4.3.2. NHRP
      • 4.3.3. DMVPN Phase 1, 2, & 3
      • 4.3.4. QoS Profiles
      • 4.3.5. QoS Pre-Classify
  • 5. Multicast
    • 5.1. Layer 2 Multicast
      • 5.1.1. IGMPv1, IGMPv2, IGMPv3
      • 5.1.2. IGMP Snooping
      • 5.1.3. IGMP Querier Election
      • 5.1.4. IGMP Filtering
      • 5.1.5. IGMP Proxy
      • 5.1.6. IGMP Timers
      • 5.1.7. Multicast VLAN Registration
      • 5.1.8. IGMP Profiles
    • 5.2. IPv4 Multicast Routing
      • 5.2.1. PIM Dense Mode
      • 5.2.2. PIM Sparse Mode
      • 5.2.3. PIM Sparse Dense Mode
      • 5.2.4. Static RP
      • 5.2.5. Auto-RP
        • 5.2.5.1. Auto-RP
        • 5.2.5.2. Sparse Dense Mode
        • 5.2.5.3. Auto-RP Listener
        • 5.2.5.4. Multiple Candidate RPs
        • 5.2.5.5. Filtering Candidate RPs
        • 5.2.5.6. RP & MA placement problems
      • 5.2.6. Bootstrap Router
        • 5.2.6.1. BSR
        • 5.2.6.2. Multiple RP Candidates
        • 5.2.6.3. Multiple BSR Candidates
      • 5.2.7. Source Specific Multicast
      • 5.2.8. Bidirectional PIM
      • 5.2.9. Group to RP Mapping
      • 5.2.10. Anycast RP
      • 5.2.11. MSDP
      • 5.2.12. MSDP SA Filtering
      • 5.2.13. Multicast TTL Scoping
      • 5.2.14. Auto-RP & BSR Boundary Filtering
      • 5.2.15. PIM Accept Register Filtering
      • 5.2.16. PIM Accept RP Filtering
      • 5.2.17. RPF Failure
      • 5.2.18. Registration Failure
      • 5.2.19. PIM DR Election
      • 5.2.20. PIM DF Election
      • 5.2.21. PIM Assert
      • 5.2.22. Static Multicast Routes
      • 5.2.23. Multicast BGP
      • 5.2.24. PIM NBMA Mode
      • 5.2.25. Multicast over GRE
      • 5.2.26. Stub Multicast Routing
      • 5.2.27. Multicast Helper Map
      • 5.2.28. Multicast Rate Limiting
      • 5.2.29. Multicast BGP
    • 5.3. IPv6 Multicast Routing *
      • 5.3.1. IPv6 PIM and MLD *
      • 5.3.2. IPv6 PIM BSR *
      • 5.3.3. IPv6 Embedded RP *
      • 5.3.4. IPv6 SSM *
  • 6. QoS
    • 6.1. Hold-Queue and Tx-Ring
    • 6.2. Weighted Fair Queuing (WFQ)
    • 6.3. Selective Packet Discard
    • 6.4. Payload Compression on Serial Links
    • 6.5. Generic TCP/UDP Header Compression
    • 6.6. MLP Link Fragmentation and Interleaving
    • 6.7. MQC Classification and Marking
    • 6.8. MQC Bandwidth Reservations and CBWFQ
    • 6.9. MQC Bandwidth Percent
    • 6.10. MQC LLQ and Remaining Bandwidth Reservations
    • 6.11. MQC WRED
    • 6.12. MQC Dynamic Flows and WRED
    • 6.13. MQC WRED with ECN
    • 6.14. MQC Class-Based Generic Traffic Shaping
    • 6.15. MQC Class-Based GTS and CBWFQ
    • 6.16. MQC Single-Rate Three-Color Policer
    • 6.17. MQC Hierarchical Policers
    • 6.18. MQC Two-Rate Three-Color Policer
    • 6.19. MQC Peak Shaping
    • 6.20. MQC Percent-Based Policing
    • 6.21. MQC Header Compression
    • 6.22. Voice Adaptive Traffic Shaping
    • 6.23. Voice Adaptive Fragmentation
    • 6.24. Advanced HTTP Classification with NBAR
    • 6.22. Layer 2 QoS *
  • 7. Security
    • 7.1. Layer 2 Security
      • 7.1.1. Port Protection
      • 7.1.2. Private VLANs
      • 7.1.3. Port Based ACLs
      • 7.1.4. VLAN ACLs for IP Traffic
      • 7.1.5. VLAN ACLs for Non-IP Traffic
      • 7.1.6. Storm Control
      • 7.1.7. Port Security
      • 7.1.8. HSRP and Port-Security
      • 7.1.9. ErrDisable Recovery
      • 7.1.10. DHCP Snooping
      • 7.1.11. DHCP Snooping and the Information Option
      • 7.1.12. Dynamic ARP Inspection
      • 7.1.13. IP Source Guard
      • 7.1.14. 802.1x *
    • 7.2. Management Plane Security
      • 7.2.1. AAA Authentication Lists
      • 7.2.2. AAA Exec Authorization
      • 7.2.3. AAA Local Command Authorization
      • 7.2.4. Controlling Terminal Line Access
      • 7.2.5. IOS Login Enhancements
      • 7.2.6. IOS Resilient Configuration
      • 7.2.7. Role-Based CLI
      • 7.2.8. AAA with TACACS+ and RADIUS *
    • 7.3. Control Plane Security
      • 7.3.1. Controlling the ICMP Messages Rate
      • 7.3.2. Control Plane Policing
      • 7.3.3. Control Plane Protection (CPPr)
      • 7.3.4. Control Plane Host
    • 7.4. Data Plane Security
        • 7.4.1. Traffic Filtering Using Standard Access-Lists
        • 7.4.2. Traffic Filtering Using Extended Access-Lists
        • 7.4.3. Traffic Filtering Using Reflexive Access-Lists
        • 7.4.4. IPv6 Traffic Filter
        • 7.4.5. Filtering Fragmented Packets
        • 7.4.6. Filtering Packets with Dynamic Access-Lists
        • 7.4.7. Filtering Traffic with Time-Based Access Lists
        • 7.4.8. Traffic Filtering with Policy-Based Routing
        • 7.4.9. Preventing Packet Spoofing with uRPF
        • 7.4.10. Using NBAR for Content-Based Filtering
        • 7.4.11. TCP Intercept
        • 7.4.12. TCP Intercept Watch Mode
        • 7.4.13. Packet Logging with Access-Lists
        • 7.4.14. IP Source Tracker
        • 7.4.15. Router IP Traffic Export (RITE)
      • 7.4.16. IOS ACL Selective IP Option Drop
      • 7.4.17. Flexible Packet Matching
      • 7.4.18. IPv6 First Hop Security
        • 7.4.18.1. RA guard
        • 7.4.18.2. DHCP guard
        • 7.4.18.3. Binding table
        • 7.4.18.4. Device tracking
        • 7.4.18.5. ND inspection/snooping
        • 7.4.18.6. Source guard
        • 7.4.18.7. PACL
  • 8. System Management
    • 8.1. Device Management
      • 8.1.1. Console
      • 8.1.2. Telnet
        • 8.1.2.1. Telnet Service Options
      • 8.1.3. SSH
      • 8.1.4. Terminal Line Settings
      • 8.1.5. HTTP Server and Client
      • 8.1.6. FTP Server and Client
      • 8.1.7. TFTP Server and Client
      • 8.1.8. SNMP
        • 8.1.8.1. SNMPv2 Server
        • 8.1.8.2. SNMPv2c Access Control
        • 8.1.8.3. SNMP Traps and Informs
        • 8.1.8.4. CPU and Memory Thresholds
        • 8.1.8.5. SNMPv3
        • 8.1.8.6. SNMP MAC Address Notifications
        • 8.1.8.7. SNMP Notifications of Syslog Messages
    • 8.2. Logging
      • 8.2.1. System Message Logging
      • 8.2.2. Syslog Logging
      • 8.2.3. Logging Counting and Timestamps
      • 8.2.4. Logging to Flash Memory
      • 8.2.5. Configuration Change Notification and Logging
      • 8.2.6. Configuration Archive and Rollback
      • 8.2.7. Logging with Access-Lists
    • 8.3. NTP
      • 8.3.1. NTP
      • 8.3.2. NTP Authentication
      • 8.3.3. NTP Access Control
      • 8.3.4. NTP Version 3 & 4
    • 8.4. EEM
      • 8.4.1. KRON Command Schedule
      • 8.4.2. EEM Scripting: Interface Events
      • 8.4.3. EEM Scripting: Syslog Events
      • 8.4.4. EEM Scripting: CLI Events
      • 8.4.5. EEM Scripting: Periodic Scheduling
      • 8.4.6. EEM Scripting: Advanced Features
      • 8.4.7. EEM Applets
    • 8.5. Miscellaneous System Management
      • 8.5.1. Auto-Install over LAN Interfaces using DHCP
      • 8.5.2. Auto-Install over LAN Interfaces Using RARP
      • 8.5.3. IOS Menus
      • 8.5.4. IOS Banners
      • 8.5.5. Exec Aliases
      • 8.5.6. TCP Keepalives
      • 8.5.7. Generating Exception Core Dumps
      • 8.5.8. Conditional Debugging
      • 8.5.9. Tuning Packet Buffers
      • 8.5.10. CDP
      • 8.5.11. Remote Shell
  • 9. Network Services
    • 9.1. Object Tracking
      • 9.1.1. IP SLA
      • 9.1.2. Enhanced Object Tracking
      • 9.1.3. Tracking Lists
    • 9.2. First Hop Redundancy Protocols
      • 9.2.1. HSRP
      • 9.2.2. VRRP
      • 9.2.3. GLBP
      • 9.2.4. Router Redundancy and Object Tracking
      • 9.2.5. IPv6 RS & RA Redundancy
    • 9.3. DHCP
      • 9.3.1. DHCP Server
      • 9.3.2. DHCP Client
      • 9.3.3. DHCP Relay
      • 9.3.4. DHCP Host Pools
      • 9.3.5. DHCP On-Demand Pool
      • 9.3.6. DHCP Proxy
      • 9.3.7. DHCP Information Option
      • 9.3.8. DHCP Authorized ARP
      • 9.3.9. SLAAC/DHCPv6 interaction
      • 9.3.10. Stateful & Stateless DHCPv6
      • 9.3.11. DHCPv6 prefix delegation
    • 9.4. DNS
      • 9.4.1. IOS Authoritative DNS Server
      • 9.4.2. IOS Caching DNS Server
      • 9.4.3. IOS DNS Spoofing
    • 9.5. NAT
      • 9.5.1. Basic NAT
      • 9.5.2. NAT Overload
      • 9.5.3. NAT with Route Maps
      • 9.5.4. Static NAT
      • 9.5.5. Static PAT
      • 9.5.6. Static NAT and IP Aliasing
      • 9.5.7. Static Policy NAT
      • 9.5.8. NAT with Overlapping Subnets
      • 9.5.9. TCP Load Distribution with NAT
      • 9.5.10. Stateful NAT with HSRP
      • 9.5.11. Stateful NAT with Primary/Backup
      • 9.5.12. NAT Virtual Interface
      • 9.5.13. NAT Default Interface
      • 9.5.14. Reversible NAT
      • 9.5.15. Static Extendable NAT
      • 9.5.16. NAT ALG
    • 9.6. Traffic Accounting
      • 9.6.1. IP Precedence Accounting
      • 9.6.2. IP Output Packet Accounting
      • 9.6.3. IP Access Violation Accounting
      • 9.6.4. MAC Address Accounting
    • 9.7. NetFlow
      • 9.7.1. Netflow v5 & v9
      • 9.7.2. Netflow Ingress and Egress
      • 9.7.3. Netflow Top Talkers
      • 9.7.4. Netflow Aggregation Cache
      • 9.7.5. Netflow Random Sampling
      • 9.7.6. Netflow Input Filters
      • 9.7.7. Netflow Export
    • 9.8. Miscellaneous Network Services
      • 9.8.1. Proxy ARP
      • 9.8.2. IRDP
      • 9.8.3. Router ICMP Settings
        • 9.8.3.1. TCP Optimization
      • 9.8.4. IOS Small Services and Finger
      • 9.8.5. Directed Broadcasts and UDP Forwarding
      • 9.8.6. NBAR Protocol Discovery
      • 9.8.7. IP Event Dampening
      • 9.8.8. Conditional Debugging
      • 9.8.9. Embedded Packet Capture
      • 9.8.10. Interpreting Packet Captures
About Brian McGahan, CCIE #8593, CCDE #2013::13:

Brian McGahan was one of the youngest engineers in the world to obtain the CCIE, having achieved his first CCIE in Routing & Switching at the age of 20 in 2002. Brian has been teaching and developing CCIE training courses for over 10 years, and has assisted thousands of engineers in obtaining their CCIE certification. When not teaching or developing new products Brian consults with large ISPs and enterprise customers in the midwest region of the United States.

Find all posts by Brian McGahan, CCIE #8593, CCDE #2013::13 | Visit Website


You can leave a response, or trackback from your own site.

45 Responses to “INE’s CCIE RSv5 Expanded Blueprint”

 
  1. Brain Fan says:

    This is great news Brain (sir) . Can you also release 6 months study plan similar to one for ccie voice ?

  2. Safo says:

    Thank you Brian.
    Excellent.

  3. Slinger says:

    Thanks really appreciated! Can’t wait for the release of your v5 materials. When are they coming out??

  4. Gil says:

    Hi Brian,

    thanks for the detail view on blueprint version 5. I’m currently study for version 5 and when I read through it’s still a long way. By the way, do you have already a date for an update for WB1 and especially WB2 for the R&S track?

    Thanks and happy easter,
    Gilbert

  5. Gabriel says:

    Hi Brian,

    Many thanks for such an exctensive list. Great quality in delivery as always.

    I know you’ve been stressed out a lot with questions about when everything related with v5 will be released so I’ll dare to ask what are the perspectives for a practice equipment? Will it be hardware based, will it be virtual or will it be both?

    I’m just interested into what to add to my existing v4 rack in such a way to support 15.3M&T, add routers and switches or invest in server side?

    Thanks,

    Gabriel

    • Our equipment will be both hardware and virtual. If you already have your own equipment then I would just upgrade to whatever the highest release that your boxes support. Buying hardware that will run new trains of 15.x won’t be feasible for most people because you also have to get the enterprise license; base ip won’t cut it. If you want to go virtual you can run 15.x on 7200s in GNS3, or find the IOU/IOL images which will run in GNS3. You can also run CSR1000v which supports that latest code trains, but takes more server resources. If you want more specifics make a post on the IEOC hardware forum at http://ieoc.com/forums/394.aspx and send me an email with the link to your post and we can discuss in more details there.

  6. Derick says:

    Thanks Brian. Greatly appreciated.

  7. Sagar says:

    Thanks really appreciated!

  8. Omer Shtivi says:

    Hi Brian,
    Thank you for providing a study plan, it’s helps alot.

    In your other post you mentioned that L2 Protocol Tunneling was removed:
    http://blog.ine.com/2013/12/03/ccie-rs-version-5-updates-now-official/

    But here in your study guide you have it on the list.
    So I’m a little bit confuse, do I need to know L2 tunneling for the LAB exam?

  9. Ashenafi says:

    Printed! Perfect to follow study with. Thank you Brian.

  10. sheraz says:

    Brain any idea about ATC for V5?

  11. Great blueprint! The official way (presented at CiscoLive Milan 2014) to become a CCIE is:

    “Know what you don’t know!”

    I kind of like that statement.

    Good “luck” to all of you.

    /JZ

  12. Behzad says:

    Hi Brain. I would like to thank you for the awesome v5 blueprint. I just want to mention that IPSec have some sort of difficulties for transporting the routing protocols’ messages.

  13. Yasir says:

    I have been waiting for this since long time, thanks for this update., now i am quite eager to look at how the new workbooks looks like. Dying to see them as I want to write the lab exam as early as July 2014.

    Thanks a lot

    Yasir

  14. Giovanni says:

    Hi Brian
    Great post as always!!!
    The Atc will should be 83 hours long this time!!!!
    The Last Atc v4 was simply amazing!!!!
    :)

  15. Adeboye says:

    As always, the best in the industry, almost can’t wait for the version 5 workbooks / materials

    Team INE

  16. Hassan Besher says:

    I think IPv6 Tunneling needs to be removed because i believe it’s one of the topics that moved from the Lab to the Written.

  17. mr says:

    Hey Brian,

    First of all, thanks very much for this update.

    In your blog post “CCIE R&S Version 5 Updates Now Official” on Dec. 3, you also listed the topics that were completely removed. Two of such topics have managed to make it to this V5 blueprint too, which are Flexlinks and Layer 2 Protocol Tunneling. Could you please elaborate a little?

    Thanks.

  18. Casper says:

    Hi

    Any idea when a topology for the V5 lab will be available?

  19. James says:

    Hi,
    Any idea about the reading book list for the written and the lab exam?

    James

  20. Waleed Khan says:

    I kind of like it, removing the complexity which is coming which is not, now a days watching v4 INE ADVANCED TECHNOLOGIES ON DEMAND 4.5. Thank you.

  21. Harry says:

    Hi Brian,

    Thanks for the great list. Just a few comments/questions:

    Multicast BGP appears in both 5.2.23 and 5.2.29
    CDP appears in both 1.6.1 and 8.5.10
    Should TCP Optimization (9.8.3.1) really be under Router ICMP Settings (9.8.3)?
    Perhaps IRDP (9.8.2) should be under First Hop Redundancy Protocols (9.2)?
    Perhaps remove “Task” in “Standard Access-Lists Task” (3.7.8.2)

    Some items that I think might be missing:

    HQoS
    BGP Peer Template
    PIM snooping (written)
    IOS and IOS XE software architecture differences (written)

    Also, for my understanding, is Flexible NetFlow not included in v5 blueprint?

    Best regards,

    Harry

  22. simon says:

    Brian in IPV6 FHS for lab exam , do we need to study SeND ?
    i guess its not required .

  23. Henry says:

    Can someone please advise me if this list is updated to the latest V5 changes.

 

Leave a Reply

Categories

CCIE Bloggers