blog
    Cisco CCNA Updates: Compa ...
    24 June 19

    Cisco CCNA Updates: Comparing The Current & New Exams

    Posted byKeith Bogart
    facebooktwitterlinkedin
    news-featured

    This chart compares the current CCNA exams to the upcoming new exams that Cisco will release on February 24, 2020. 

    Note: A blue cell indicates a topic unique to that exam. You can find a list of resources to prepare you for these changes, here

     

    CCNA 200-125 topics CCNA 200-301 topics
    1.1 Compare and contrast OSI and TCP/IP models  
    1.2 Compare and contrast TCP and UDP protocols 1.5 Compare TCP to UDP
    1.3 Describe the impact of infrastructure components in an enterprise network 1.1 Explain the role and function of network components
    1.3.a Firewalls 1.1.c Next-generation firewalls and IPS
    1.3.b Access points 1.1.d Access points
    1.3.c Wireless controllers 1.1.e Controllers (Cisco DNA Center and WLC)
     
    1.1.a Routers
    1.1.b L2 and L3 switches
    1.1.f Endpoints
    1.1.g Servers
    1.4 Describe the effects of cloud resources on enterprise network architecture 1.2 Describe characteristics of network topology architectures
    1.4.a Traffic path to internal and external cloud services 1.2.f On-premises and cloud
    1.4.b Virtual services
     
    1.4.c Basic virtual network infrastructure
      1.12 Explain virtualization fundamentals (virtual machines)
    1.5 Compare and contrast collapsed core and three-tier architectures 1.2 Describe characteristics of network topology architectures
    1.2.a 2 tier
    1.2.b 3 tier
    1.6 Compare and contrast network topologies
     
    1.6.a Star
    1.6.b Mesh
    1.6.c Hybrid
     
    1.2 Describe characteristics of network topology architectures
    1.2.c Spine-leaf
    1.2.e Small office/home office (SOHO)
    1.7 Select the appropriate cabling type based on implementation requirements 1.3 Compare physical interface and cabling types
    1.3.a Single-mode fiber, multimode fiber, copper
    1.3.b Connections (Ethernet shared media and point-to-point)
      1.3.c Concepts of PoE
    1.8 Apply troubleshooting methodologies to resolve problems
     
    1.8.a Perform and document fault isolation
    1.8.b Resolve or escalate
    1.8.c Verify and monitor resolution
    1.9 Configure, verify, and troubleshoot IPv4 addressing and subnetting 1.6 Configure and verify IPv4 addressing and subnetting
      1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
    1.10 Compare and contrast IPv4 address types
     
    1.10.a Unicast
    1.10.b Broadcast
    1.10.c Multicast
    1.11 Describe the need for private IPv4 addressing 1.7 Describe the need for private IPv4 addressing
    1.12 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment  
    1.13 Configure, verify, and troubleshoot IPv6 addressing 1.8 Configure and verify IPv6 addressing and prefix
    1.14 Configure and verify IPv6 Stateless Address Auto Configuration  
    1.15 Compare and contrast IPv6 address types 1.9 Compare IPv6 address types
    1.15.a Global unicast 1.9.a Global unicast
    1.15.b Unique local 1.9.b Unique local
    1.15.c Link local 1.9.c Link local
    1.15.d Multicast 1.9.e Multicast
    1.15.e Modified EUI 64 1.9.f Modified EUI 64
    1.15.f Autoconfiguration  
    1.15.g Anycast 1.9.d Anycast
     
    1.11 Describe wireless principles
    1.11.a Nonoverlapping Wi-Fi channels
    1.11.b SSID
    1.11.c RF
    1.11.d Encryption
    2.1 Describe and verify switching concepts 1.13 Describe switching concepts
    2.1.a MAC learning and aging 1.13.a MAC learning and aging
    2.1.b Frame switching 1.13.b Frame switching
    2.1.c Frame flooding 1.13.c Frame flooding
    2.1.d MAC address table 1.13.d MAC address table
    2.2 Interpret Ethernet frame format  
    2.3 Troubleshoot interface and cable issues (collisions, errors, duplex, speed) 1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
    2.4 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches 2.1 Configure and verify VLANs (normal range) spanning multiple switches
    2.4.a Access ports (data and voice) 2.1.a Access ports (data and voice)
    2.4.b Default VLAN 2.1.b Default VLAN
    2.5 Configure, verify, and troubleshoot interswitch connectivity 2.2 Configure and verify interswitch connectivity
    2.5.a Trunk ports 2.2.a Trunk ports
    2.5.b Add and remove VLANs on a trunk  
    2.5.c DTP, VTP (v1&v2), and 802.1Q 2.2.b 802.1Q
    2.5.d Native VLAN 2.2.c Native VLAN
    2.6 Configure, verify, and troubleshoot STP protocols 2.5 Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
    2.6.a STP mode (PVST+ and RPVST+)  
    2.6.b STP root bridge selection 2.5.a Root port, root bridge (primary/secondary), and other port names
      2.5.b Port states (forwarding/blocking)
    2.7 Configure, verify and troubleshoot STP related optional features  
    2.7.a PortFast 2.5.c PortFast benefits
    2.7.b BPDU guard  
    2.8 Configure and verify Layer 2 protocols 2.3 Configure and verify Layer 2 discovery protocols
    2.8.a Cisco Discovery Protocol ---Cisco Discovery Protocol
    2.8.b LLDP ---LLDP
    2.9 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel 2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
    2.9.a Static
     
    2.9.b PAGP
    2.9.c LACP
    2.10 Describe the benefits of switch stacking and chassis aggregation
     
    2.6 Compare Cisco Wireless Architectures and AP modes
    2.7 Describe physical infrastructure connections of WLAN components (AP,WLC, access/trunk ports, and LAG)
    2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP,HTTPS, console, and TACACS+/RADIUS)
    2.9 Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
    5.9 Describe wireless security protocols (WPA, WPA2, and WPA3)
    5.10 Configure WLAN using WPA2 PSK using the GUI
    3.1 Describe the routing concepts 3.2 Determine how a router makes a forwarding decision by default
    3.1.a Packet handling along the path through a network  
    3.1.b Forwarding decision based on route lookup 3.2.a Longest match
    3.1.c Frame rewrite  
    3.2 Interpret the components of a routing table 3.1 Interpret the components of routing table
    3.2.a Prefix 3.1.b Prefix
    3.2.b Network mask 3.1.c Network mask
    3.2.c Next hop 3.1.d Next hop
    3.2.d Routing protocol code 3.1.a Routing protocol code
    3.2.e Administrative distance 3.1.e Administrative distance
    3.2.f Metric 3.1.f Metric
    3.2.g Gateway of last resort 3.1.g Gateway of last resort
    3.3 Describe how a routing table is populated by different routing information sources 3.2 Determine how a router makes a forwarding decision by default
    3.3.a Admin distance 3.2.b Administrative distance
      3.2.c Routing protocol metric
    3.4 Configure, verify, and troubleshoot inter-VLAN routing
     
    3.4.a Router on a stick
    3.4.b SVI
    3.5 Compare and contrast static routing and dynamic routing
    3.6 Compare and contrast distance vector and link state routing protocols
    3.7 Compare and contrast interior and exterior routing protocols
    3.8 Configure, verify, and troubleshoot IPv4 and IPv6 static routing 3.3 Configure and verify IPv4 and IPv6 static routing
    3.8.a Default route 3.3.a Default route
    3.8.b Network route 3.3.b Network route
    3.8.c Host route 3.3.c Host route
    3.8.d Floating static 3.3.d Floating static
    3.9 Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) 3.4 Configure and verify single area OSPFv2
    3.4.a Neighbor adjacencies
    3.4.b Point-to-point
    3.4.c Broadcast (DR/BDR selection)
    3.4.d Router ID
    3.10 Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
     
    3.11 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)
    3.12 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)
    3.13 Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution)
    3.14 Troubleshoot basic Layer 3 end-to-end connectivity issues
    4.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication
    4.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication
    4.3 Configure, verify, and troubleshoot GRE tunnel connectivity
    4.4 Describe WAN topology options 1.2 Describe characteristics of network topology architectures
    1.2.d WAN
    4.4.a Point-to-point
     
    4.4.b Hub and spoke
    4.4.c Full mesh
    4.4.d Single vs dual-homed
    4.5 Describe WAN access connectivity options
    4.5.a MPLS
    4.5.b Metro Ethernet
    4.5.c Broadband PPPoE
    4.5.d Internet VPN (DMVPN, site-to-site VPN, client VPN)
    4.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)
    4.7 Describe basic QoS concepts 4.7 Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
    4.7.a Marking
     
    4.7.b Device trust
    4.7.c Prioritization
    4.7.c. [i] Voice
    4.7.c. [ii] Video
    4.7.c. [iii] Data
    4.7.d Shaping
    4.7.e Policing
    4.7.f Congestion management
    5.1 Describe DNS lookup operation 4.3 Explain the role of DHCP and DNS within the network
    5.2 Troubleshoot client connectivity issues involving DNS  
    5.3 Configure and verify DHCP on a router (excluding static reservations) 4.3 Explain the role of DHCP and DNS within the network
    5.3.a Server  
    5.3.b Relay 4.6 Configure and verify DHCP client and relay
    5.3.c Client
     
    5.3.d TFTP, DNS, and gateway options
    5.4 Troubleshoot client- and router-based DHCP connectivity issues
    5.5 Configure, verify, and troubleshoot basic HSRP 3.5 Describe the purpose of first hop redundancy protocol
    5.5.a Priority
     
    5.5.b Preemption
    5.5.c Version
    5.6 Configure, verify, and troubleshoot inside source NAT 4.1 Configure and verify inside source NAT using static and pools
    5.6.a Static
     
    5.6.b Pool
    5.6.c PAT
    5.7 Configure and verify NTP operating in a client/server mode 4.2 Configure and verify NTP operating in a client and server mode
     
     
    5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
    5.2 Describe security program elements (user awareness, training, and physical access control)
    5.4 Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
    5.5 Describe remote access and site-to-site VPNs
    6.1 Configure, verify, and troubleshoot port security 5.7 Configure Layer 2 security features (...and port security)
    6.1.a Static
     
    6.1.b Dynamic
    6.1.c Sticky
    6.1.d Max MAC addresses
    6.1.e Violation actions
    6.1.f Err-disable recovery
    6.2 Describe common access layer threat mitigation techniques
    6.2.a 802.1x
    6.2.b DHCP snooping 5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
    6.2.c Nondefault native VLAN  
    6.3 Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering 5.6 Configure and verify access control lists
    6.3.a Standard
     
    6.3.b Extended
    6.3.c Named
    6.4 Verify ACLs using the APIC-EM Path Trace ACL analysis tool
    6.5 Configure, verify, and troubleshoot basic device hardening 5.3 Configure device access control using local passwords
    6.5.a Local authentication
     
    6.5.b Secure password
    6.5.c Access to device
    6.5.c. [i] Source address
    6.5.c. [ii] Telnet/SSH 4.8 Configure network devices for remote access using SSH
    6.5.d Login banner  
    6.6 Describe device security using AAA with TACACS+ and RADIUS 5.8 Differentiate authentication, authorization, and accounting concepts
       
    7.1 Configure and verify device-monitoring protocols 4.4 Explain the function of SNMP in network operations
    7.1.a SNMPv2
     
    7.1.b SNMPv3
    7.1.c Syslog 4.5 Describe the use of syslog features including facilities and levels
    7.2 Troubleshoot network connectivity issues using ICMP echo-based IP SLA
     
    7.3 Configure and verify device management
    7.3.a Backup and restore device configuration
    7.3.b Using Cisco Discovery Protocol or LLDP for device discovery 2.3 Configure and verify Layer 2 discovery protocols
    ---Cisco Discovery Protocol
    7.3.c Licensing
     
    7.3.d Logging
    7.3.e Timezone
    7.3.f Loopback
    7.4 Configure and verify initial device configuration
    7.5 Perform device maintenance
    7.5.a Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify) 4.9 Describe the capabilities and function of TFTP/FTP in the network
    7.5.b Password recovery and configuration register
     
    7.5.c File system management
    7.6 Use Cisco IOS tools to troubleshoot and resolve problems
    7.6.a Ping and traceroute with extended option
    7.6.b Terminal monitor
    7.6.c Log events
    7.6.d Local SPAN
    7.7 Describe network programmability in enterprise network architecture 6.1 Explain how automation impacts network management
    7.7.a Function of a controller 6.2 Compare traditional networks with controller-based networking
    7.7.b Separation of control plane and data plane 6.3 Describe controller-based and software defined architectures (overlay, underlay, and fabric)
    6.3.a Separation of control plane and data plane
    7.7.c Northbound and southbound APIs 6.3.b North-bound and south-bound APIs
     
    6.4 Compare traditional campus device management with Cisco DNA Center enabled device management
    6.5 Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
    6.6 Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible

    6.7 Interpret JSON encoded data

     

    Hey! Don’t miss anything - subscribe to our newsletter!

    © 2022 INE. All Rights Reserved. All logos, trademarks and registered trademarks are the property of their respective owners.
    instagram Logofacebook Logotwitter Logolinkedin Logoyoutube Logo