Topic Comparison – CCNP v5 and v6

Route Vs BSCI

Route 642-902

Implement an EIGRP based solution, given a network design and a set of
requirements
• Determine network resources needed for implementing EIGRP on a network
• Create an EIGRP implementation plan
• Create an EIGRP verification plan
• Configure EIGRP routing
• Verify EIGRP solution was implemented properly using show and debug commands
• Document results of EIGRP implementation and verification

Implement a multi-area OSPF Network, given a network design and a set of requirements
• Determine network resources needed for implementing OSPF on a network
• Create an OSPF implementation plan
• Create an OSPF verification plan
• Configure OSPF routing
• Verify OSPF solution was implemented properly using show and debug commands
• Document results of OSPF implementation and verification plan

Implement an eBGP based solution, given a network design and a set of
requirements
• Determine network resources needed for implementing eBGP on a network
• Create an eBGP implementation plan
• Create an eBGP verification plan
• Configure eBGP routing
• Verify eBGP solution was implemented properly using show and debug commands
• Document results of eBGP implementation and verification plan

Implement an IPv6 based solution, given a network design and a set of
requirements
• Determine network resources needed for implementing IPv6 on a network
• Create an IPv6 implementation plan
• Create an IPv6 verification plan
• Configure IPv6 routing
• Configure IPv6 interoperation with IPv4
• Verify IPv6 solution was implemented properly using show and debug commands
• Document results of IPv6 implementation and verification plan

Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements
• Create a redistribution implementation plan based upon the results of the redistribution analysis
• Create a redistribution verification plan
• Configure a redistribution solution
• Verify that a redistribution was implemented
• Document results of a redistribution implementation and verification plan
• Identify the differences between implementing an IPv4 and IPv6 redistribution solution

Implement Layer 3 Path Control Solution
• Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis
• Create a Layer 3 path control verification plan
• Configure Layer 3 path control
• Verify that a Layer 3 path control was implemented
• Document results of a Layer 3 path control implementation and verification plan
• Implement basic teleworker and branch services
• Describe broadband technologies
• Configure basic broadband connections
• Describe basic VPN technologies
• Configure GRE
• Describe branch access technologies

BSCI 642-901

Implement EIGRP operations
• Explain the functions and operations of EIGRP (e.g., DUAL).
• Configure EIGRP routing. (e.g., Stub Routing, authentication, etc.)
• Verify or troubleshoot EIGRP routing configurations.

Implement multiarea OSPF operations
• Explain the functions and operations of multiarea OSPF.
• Configure multiarea OSPF routing. (e.g., Stub, NSSA, authentication, etc.)
• Verify or troubleshoot multiarea OSPF routing configurations.

Describe integrated IS-IS
• Describe the features and benefits of integrated IS-IS.
• Configure and verify integrated IS-IS.

Implement Cisco IOS routing features
• Describe, configure or verify route redistribution between IP routing IGPs. (e.g., route-maps, default routes, etc.)
• Describe, configure or verify route filtering (i.e., distribute-lists and passive interfaces).
• Describe and configure DHCP services (e.g., Server, Client, IP helper address, etc.).

Implement BGP for enterprise ISP connectivity
• Describe the functions and operations of BGP.
• Configure or verify BGP operation in a non-transit AS (e.g., authentication).
• Configure BGP path selection. (i.e., Local Preference, AS Path, Weight or MED
attributes).

Implement multicast forwarding
• Describe IP Multicast (e.g., Layer-3 to Layer-2 mapping, IGMP, etc.).
• Describe, configure, or verify IP multicast routing (i.e., PIM Sparse-Dense Mode).

Implement IPv6
• Describe IPv6 addressing operations.
• Describe IPv6 interoperation with IPv4.
• Describe, configure or verify OSPF routing with IPv6 addressing.

Switch Vs BCMSN

Switch 642-813

Implement VLAN based solution, given a network design and a set of
requirements
• Determine network resources needed for implementing a VLAN based solution on a network
• Create a VLAN based implementation plan
• Create a VLAN based verification plan
• Configure switch-to-switch connectivity for the VLAN based solution
• Configure loop prevention for the VLAN based solution
• Configure Access Ports for the VLAN based solution
• erify the VLAN based solution was implemented properly using show and debug commands
• Document results of VLAN implementation and verification

Implement a Security Extension of a Layer 2 solution, given a network
design and a set of requirements
• Determine network resources needed for implementing a Security solution
• Create a implementation plan for the Security solution
• Create a verification plan for the Security solution
• Configure port security features
• Configure general switch security features
• Configure private VLANs Configure VACL and PACL
• Verify the Security based solution was implemented properly using show and debug commands
• Document results of Security implementation and verification

Implement Switch based Layer 3 services, given a network design and a
style="font-weight: bold;">set of requirements
• Determine network resources needed for implementing a Switch based Layer 3 solution
• Create an implementation plan for the Switch based Layer 3 solution
• Create a verification plan for the Switch based Layer 3 solution
• Configure routing interfaces Configure Layer 3 Security
• Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
• Document results of Switch based Layer 3 implementation and verification

Prepare infrastructure to support advanced services
• Implement a Wireless Extension of a Layer 2 solution
• Implement a VoIP support solution
• Implement video support solution

Implement High Availability, given a network design and a set of
requirements
• Determine network resources needed for implementing High Availability on a network
• Create a High Availability implementation plan
• Create a High Availability verification plan
• Implement first hop redundancy protocols
• Implement switch supervisor redundancy
• Verify High Availability solution was implemented properly using show and debug commands
• Document results of High Availability implementation and verification

BCMSN 642-812

Implement VLANs
• Explain the functions of VLANs in a hierarchical network.
• Configure VLANs (e.g., Native, Default, Static and Access).
• Explain and configure VLAN trunking (i.e., IEEE 802.1Q and ISL).
• Explain and configure VTP.
• Verify or troubleshoot VLAN configurations.

Conduct the operation of Spanning Tree protocols in a hierarchical
network
• Explain the functions and operations of the Spanning Tree protocols (i.e., RSTP,
PVRST, MISTP).
• Configure RSTP (PVRST) and MISTP.
• Describe and configure STP security mechanisms (i.e., BPDU Guard, BPDU
Filtering, Root Guard).
• Configure and Verify UDLD and Loop Guard.
• Verify or troubleshoot Spanning Tree protocol operations.
• Configure and verify link aggregation using PAgP or LACP.

Implement Inter-VLAN routing
• Explain and configure Inter-VLAN routing (i.e., SVI and routed ports).
• Explain and enable CEF operation.
• Verify or troubleshoot InterVLAN routing configurations.

Implement gateway redundancy technologies
• Explain the functions and operations of gateway redundancy protocols (i.e., HSRP,
VRRP, and GLBP).
• Configure HSRP, VRRP, and GLBP.
• Verify High Availability configurations.

Describe and configure wireless client access
• Describe the components and operations of WLAN topologies (i.e., AP and Bridge).
• Describe the features of Client Devices, Network Unification, and Mobility Platforms
(i.e., CCX, LWAPP).
• Configure a wireless client (i.e., ADU).

Describe and configure security features in a switched network
• Describe common Layer 2 network attacks (e.g., MAC Flooding, Rogue Devices,
VLAN Hopping, DHCP Spoofing, etc.)
• Explain and configure Port Security,802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI.
• Verify Catalyst switch (IOS-based) security configurations (i.e., Port Security,
802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI).

Configure support for voice
• Describe the characteristics of voice in the campus network.
• Describe the functions of Voice VLANs and trust boundaries.
• Configure and verify basic IP Phone support (i.e. Voice VLAN, Trust and CoS
options, AutoQoS for voice).