• CCIE RS lab topology
    SPOTO Club
    2024-01-18
    The CCIE Routing and Switching (R&S) Lab Exam is an 8-hour, hands-on examination that tests a candidate's ability to configure and troubleshoot complex networks according to given specifications. In this CCIE R&S lab exam, troubleshooting skills are paramount, as candidates must diagnose and resolve various issues presented during the exam. Candidates are responsible for configuring not only end-user systems but also all devices within the network. CCIE R&S Lab Exam Format The 8-hour lab exam consists of three modules that must be completed in the following progression: Module 1: Troubleshooting The Troubleshooting module presents independent incidents that require resolution. The topology used in this module differs from the ones used in the Configuration module. This module lasts 2 hours, but candidates can borrow up to 30 minutes from the Configuration module if needed. Conversely, any unused time from the Troubleshooting module is added to the Configuration module's time, ensuring a total lab exam time of 8 hours. Module 2: Diagnostic The new Diagnostic module focuses on the skills required to properly diagnose network issues without direct access to devices. Candidates are provided with documentation representing a realistic scenario, simulating a network engineer's investigation process. The objective of this module is to assess the following skills: - Analyzing - Correlating: Discerning multiple sources of documentation, such as email threads, console outputs, logs, network topology diagrams, and traffic captures. These activities are part of overall troubleshooting skills but are evaluated separately due to the different format of the items compared to the Troubleshooting module, where candidates troubleshoot and resolve issues on actual devices. Module 3: Configuration The Configuration module presents a setup similar to an actual production network with various security components providing multiple layers of security at different points. While primarily based on virtual instances of Cisco appliances, candidates may also work with physical devices. At the beginning of the module, candidates are given full visibility of the entire module and can choose to resolve items in the presented sequence or in a preferred logical order. To gain more insights and prepare effectively for the CCIE R&S Lab Exam, consider joining a reputable training provider like SPOTO, which offers comprehensive CCIE training and resources.
  • CCIE RS lab topology
    SPOTO Club
    2024-01-18
    Before we move on what would be there in the Layer 2 of CCIE Routing and Switching Lab Exam, let’s first have a brief overview of what is CCIE R&S. CCIE Routing and Switching: CCIE Routing and Switching certification are designed specifically for the network managers, senior network engineers, professionals, as well as architects who would be considered as responsible for implementing and troubleshooting today’s multifaceted congregated networks in enterprise networking environments. This expert-level certification recognizes that the course taker has acquired the knowledge and experience in network infrastructure technologies. CCIE Routing and Switching are going to validate the technical expertise which would be required for the candidates to implement and troubleshoot complex networks and would help them to improve network uptime, which would again increase user productivity as well as provides business agility. CCIE R&S Certification could quite be gruesome to obtain, but if you have the help of some good training providers like the SPOTO, you could ease up your study part, by their study dumps. Now, let’s discuss the CCIE R&S Lab Exam: CCIE R&S Lab Exam The CCIE R&S lab exam would be about eight-hour. This exam is considered to be hands-on exam which would be requiring the candidates to configure and troubleshoot a series of complex networks which would be given specifications. Knowledge of troubleshooting would play an important role here and candidates would be expected to diagnose and provide a solution to the issues as part of their CCIE R&S lab exam. You wouldn’t be just configuring end-user systems but would be also considered to be responsible for all devices that would be residing in the network. Below mentioned are the details included in the Layer 2: 1.1 LAN switching technologies    1.1.a Implement and troubleshoot switch administration 1.a [i] Managing MAC address table 1.a [ii] errdisable recovery 1.a [iii] L2 MTU    1.1.b Implement and troubleshoot layer 2 protocols 1.b [i] CDP, LLDP 1.b [ii] UDLD    1.1.c Implement and troubleshoot VLAN 1.c [i] access ports 1.c [ii] VLAN database 1.c [iii] normal, extended VLAN, voice VLAN    1.1.d Implement and troubleshoot trunking 1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning 1.d [ii] dot1Q 1.d [iii] Native VLAN 1.d [iv] Manual pruning    1.1.e Implement and troubleshoot etherchannel 1.e [i] LACP, PAgP, manual 1.e [ii] layer 2, layer 3 1.e [iii] load-balancing 1.e [iv] etherchannel misconfiguration guard    1.1.f Implement and troubleshoot spanning-tree 1.f [i] PVST+/RPVST+/MST 1.f [ii] switching priority, port priority, path cost, STP timers 1.f [iii] port fast, BPDUguard, BPDUfilter 1.f [iv] loopguard, rootguard    1.1.g Implementing and troubleshooting other LAN switching technologies 1.g [i] SPAN, RSPAN, ERSPAN 1.2 Layer 2 Multicast    1.2.a Implement and troubleshoot IGMP 2.a [I] IGMPv1, IGMPv2, IGMPv3 2.a [ii] IGMP snooping 2.a [iii] IGMP querier 2.a [iv] IGMP filter 2.a [v] IGMP proxy 1.3 Layer 2 WAN circuit technologies    1.3.a Implement and troubleshoot HDLC    1.3.b Implement and troubleshoot PPP 3.b [i] authentication [PAP, CHAP] 3.b [ii] PPPoE 3.b [iii] MLPPP 1.4 Troubleshooting layer 2 technologies    1.4.a Use IOS troubleshooting tools 4.a [i] debug, conditional debug 4.a [ii] ping, traceroute with extended options 4.a [iii] Embedded packet capture    1.4.b Apply troubleshooting methodologies 4.b [i] Diagnosing the root cause of networking issue [analyze symptoms, identify and describe root cause] 4.b [ii] Designing and implementing valid solutions as per the constraints 4.b [iii] Verify and monitor resolution    1.4.c Interpret packet capture 4.c [i] Using wireshark trace analyzer 4.c [ii] Using IOS embedded packet capture If you wish to pursue the CCIE R&S Certification and are still confused about where to gain the knowledge and how you must check out the courses offered by the SPOTO.
  • CCIE RS lab topology
    SPOTO Club
    2024-01-17
    Talking about worldwide recognition as well as career importance, CCIE R&S have always been to the top of that list, and this has been swirling in the IT industry for years. This prestige certification would be from Cisco could be likened to a Ph.D. degree because of its vital value that would be turning an administrator in the senior network into a gem in the company. Being an administrator in the senior network is seriously a tough job; you would be making sure that the network system is on its peak condition each and every single day. Even a minimal lapse could take a toll on the business of the multinational companies. CCIE R&S Lab Exam isn’t easy to crack out, but if you wish to do it so, you need to join the courses offered by the SPOTO. Since Feb, 24, 2020. CCIE R&S has changed to CCIE EI. Check out new CCIE Enterprise Infrastructure Certification & Online Training Why take the CCIE R&S Lab Exam? The lab exam polishes your practical skills Adding up to its reputation as a tough certification exam, the CCIE Routing, and Switching requires the completion of its strenuous yet beneficial CCIE R&S lab exam. The lab exam, which would be consisting of an 8-hour grueling, hands-on test, gives you the taste of the real world. Sometimes, written exams are not enough to equip you with the skills needed when you work for an organization. Practical application of knowledge is the best way to validate your skills, and this is made possible by the CCIE R&S lab exam. With this type of test, professionals such as senior network administrators are given the chance so as to construct and troubleshoot a series of complicated networks, following a certain requirement. Moreover, the exam allows applicants to configure network devices such as hubs and the like so that their technical skills will be polished. It is being offered by the IT organizations which are world-recognized To start, CCIE R&S is one of the many credible certifications offered by Cisco a globally acknowledged IT leader that exists to create notably important tools and infrastructure products to help IT professionals and businesses. With such recognition, people who are furnished with this certification can assure that their work is also top-notch. It cultivates leadership management As an administrator in the senior network, you would be expected to know everything and all the in-betweens. Efficient leadership skills, however, may not be that easy to gain, especially if you just are just furnished with a job title. Now, here comes the importance of clearing the CCIE R&S certification. Accordingly, having an expert-level certification like R&S under your belt gives the notion that you are a credible and effective leader. Through this, members under your team will follow the standards set by the company and trail behind your rules so that everything will fall according to its perfect place. With that, the company will be on the right track, and so as your professional career. It rewards a competitive salary rate Let’s talk practically. Acquiring a good salary rate would be inspiring you to work harder, correct? With CCIE R&S, you would be rewarded with a highly competitive remuneration that will surely make you do your daily tasks efficiently and effectively. Most CCIE R&S certified professionals that would be paid from $60,000 to $168,000, which would make it as one of the highest-paid IT jobs in the world. Conclusion Clearly, the CCIE R&S benefits are not just limited to employment perks and earning potentials but also to your professional career in the long run. So, if you want something that will support you every step of the way, then no other expert-level certification can give you what CCIE R&S can provide. So, if you wish to have all these perks, you could do it by joining the prep courses offered by the SPOTO. if you want to know the CCIE RS Lab certification exam, and you can join our WhatsApp Studygroup Read more: What is CCIE Lab, and which would be the best website to prepare for it? How should I study for the CCIE lab exam? How much does the CCIE lab exam cost? Breaking News! CCIE Lab Exam Reopen in Sep.1-Join SPOTO Lab Pre-sale Now How hard is the CCIE lab?
  • CCIE RS lab topology
    SPOTO Club
    2024-01-17
    If you’re searching for a safe, powerful, tech-savvy internet solution, you may have discovered both VPN and MPLS technology. VPN stands for Virtual Private Network, while MPLS stands for Multi-Protocol Label Switching. What's more, MPLS and VPN are two parts of the CCIE RS Lab certification exam, and you must master two technologies so as to pass the exam. These are two different systems for keeping you more anonymous and secure online, as well as improving connection speeds. Since both types of networks are quite complicated, it can be difficult to understand exactly how they work or what distinguishes them from each other. If you want to figure out if you should get an MPLS or a VPN, you need to know which system will keep you safest and provide the best service. Fortunately, our experts are here to help you sort out this issue and find out whether MPLS or VPN technology is right for your needs. What Is the Difference Between MPLS and Internet? There are a few key differences between the way an MPLS and standard internet protocols work. To understand these differences, you first need to know about packets. When you send and receive information online, it comes and goes in packets. These segments of information travel throughout various entry and exit points to transmit and receive data. Usually, these packets must go through multiple layers to access the internet. They start on computers (Layer One), move onto networks (such as LAN – Local Area Networks, or WAN – Wide Area Networks, which would be Layer Two), and then go onto the internet. Once they’re on the internet, they typically move through several more layers before finally reaching their destination. While packets move throughout Layer Two of this system, they travel from router to router (or between similar devices). In order to get from place to place correctly, each router looks up the IP (Internet Protocol) address for the next router the packet needs to travel to. The router then sends the packet there, where the next router looks up the next IP address, and so on, until the packet reaches its target. Each router performs this process independently of the others. The midpoint routers between the computer and the packet’s destination are called “next-hops,” since the information goes there next, bouncing along on its journey. Looking up IP addresses is done on Layer Three of the internet, beyond computers (Layer One) and networks (Layer Two). The process of looking up these IP addresses can take some time for routers. As the data bounces from one router to the next, the lag time required to retrieve the IP addresses can add up. Plus, perhaps more importantly, using this conventional IP routing system may not be anonymous, leaving your data open to breaches and hacks. Hackers, targeted advertisers, governmental agencies, and more prying eyes could spy on your own personal IP address during this process. Multi-Protocol Label Switching (MPLS) changes the way packets travel. Instead of hopping from one router to the next, a packet leaves a computer, and then the very first router conducts just a single lookup to find the end router. This router then creates a list of directions for the packet so it knows which routers to bounce between, labels it with these guidelines, and sends it on its way. From there, it goes from router to router as it normally would, but because the directions are already laid out, none of the subsequent routers need to look up or calculate any IP addresses. When the packet reaches the end of the line, the last router removes the packet and delivers it as usual. MPLS labeling is similar to a physical map or GPS directions for your car. It tells the packets exactly where to go in advance, which speeds up the network and minimizes potentially insecure IP lookups. Because the packet is labeled between its transmission from the network (Layer Two) to the internet (Layer Three), MPLS is sometimes called a “layer 2.5 networking protocol.” MPLS does have some notable limitations, however. Since each router will not use IP protocols to calculate its packets’ next stops, MPLS systems must be configured with a clear LSP, or label-switched path, from router to router to router to destination. MPLS also requires an LSR, or label-switch router. This device decodes the label on the packet to direct it properly. Ultimately, for MPLS to work, the entire router configuration has to be set up in a very particular way. It works best on internal systems, like home LANs (Local Area Networks) or business networks in a single office. Supporting wider, broader, international MPLS would take a lot more equipment and expertise, making it somewhat expensive. Essentially, an MPLS setup needs its own unique network of routers and methods for them to communicate with each other. VPNs Explained If you want to compare MPLS with VPNs, you’ll also need to know how VPNs work and what they do. As we mentioned above, VPN stands for Virtual Private Network. This system changes the way packets travel to and from the internet in two distinct ways. First of all, data sent through a VPN is protected through a process called VPN tunneling. Packets of information that travel through a VPN are disconnected from other internet traffic – they travel in virtual tunnels. This process is called encapsulation, which separates VPN packets from others moving on the same network. As part of tunneling, data relayed through a VPN is also encrypted, so it’s wrapped in layers of code, which can then be decoded when it arrives to its destination. Different VPNs use different types of encoding protocols, such as PPTP, L2TP, SSTP, IKEv2, and OpenVPN. These all help protect your information and keep you anonymous online. Secondly, a VPN routes the data it transmits through its own servers before this information reaches the rest of the internet. This makes it look as if your internet activity is coming from the VPN’s servers rather than your own, which can both safeguard your privacy and allow you to access geoblocked content, such as Netflix or HBO. You get to choose which IP address you want your data to appear to come from. When you use a VPN, all your ISP (Internet Service Provider) knows is that you’ve connected to a VPN. This configuration makes it much harder for anyone to track or steal your data. Some VPN providers even have a no-logs policy, which means even they don’t store your data. (We’ll discuss how that works later in this article). VPNs also help enhance Tor and torrenting functionality. Many VPN providers set up their networks specifically to optimize these types of internet activities. For more information, check out our list of the best VPNs for torrents in 2019. In short, a VPN offers a set of servers in different locations that you can route your internet traffic through, which helps hide your IP address. They also create special tunnels for your packets to travel through and encrypt your data, making it much harder for anyone to hack or spy on you. What Is the Difference Between MPLS and VPN? Both MPLS and VPN systems are designed to alter the way you connect to the internet and help you maintain your privacy online. The primary difference between the two is how they go about that. As we’ve explained above, MPLS provides a labeled map for your packets of data, allowing them to travel more quickly and privately between routers, since it eliminates the need for multiple IP lookups. In contrast, a VPN uses IP lookups, but it protects your personal information by sending it through a virtual tunnel, encrypting it, and routing it through a VPN server before it reaches its destination. Is MPLS Faster Than VPN? Whether or not MPLS is faster than VPN depends largely on the particular factors of each, so there is no clear, consistent answer to this question. However, there are certain trends. Conventionally, MPLS is designed more for speed than a VPN is. The labeling function in MPLS could theoretically speed up an internet connection, since each individual router does not need to perform an IP lookup. In addition, MPLS networks may be smaller and more contained than VPNs’, which could also speed them up in comparison. However, since regular internet speeds have been getting faster and faster, and since bandwidth is getting less expensive to purchase, MPLS may no longer offer any significant speed advantage. Furthermore, some information technology professionals argue that labeling cannot really offer notable speed increases. They claim that MPLS adds a layer of complexity through labeling and requires the same types of lookups as traditional internet protocols, just in advance. In contrast, VPNs may slow down internet traffic slightly, since every packet has to be encrypted and routed through an additional VPN server before it reaches its end point. However, even despite these additional steps, some VPNs actually still speed up traffic. This is because ISPs often “throttle” traffic, meaning that they intentionally slow down certain types of activities, such as torrenting. When you use a VPN, all an ISP can see is that you’re using one, so they can’t lower your speeds. In this way, using a VPN can improve your internet security, unblock geo-restricted content, and boost your speeds. Of course, not all VPNs improve connection speeds, so a given VPN may be slower than an MPLS. However, in this case, an MPLS system’s speeds probably just barely outpace a VPN’s. The difference may not even be noticeable. Regardless, many users find that it’s worth slightly slower speeds to enjoy the many advantages of VPNs over MPLS and other systems. For users who want to enjoy blazing speeds and all the benefits of VPNs, we recommend ExpressVPN. Is MPLS More Secure Than VPN? One of the primary goals of both MPLS and VPN systems is safety, but which system is actually more secure? MPLS is by definition a private network, with its own infrastructure and routing protocols. Internet traffic moves through it according to its labeling system, only interacting with the traditional internet framework at its edges. Since it reduces the number of individual IP lookups necessary to go online, MPLS may be less vulnerable to certain types of hacking. However, if part of the equipment for MPLS wasn’t set up properly, especially at the “edges” of the network where routers do perform IP lookups, your data could be at risk. Furthermore, since MPLS traffic is not encrypted, if someone did find their way into the private network, users’ privacy might be at stake. All it would take is one untrustworthy person or one particularly skilled cybercriminal to break through MPLS security. Once the hacker got in, he or she would be able to view all of your passwords, bank data, and any other sensitive information, since it isn’t encrypted. Some MPLS providers add on encryption and/or other security protocols to keep your data safer, but this is not necessarily the default. The safety of your data might depend on the additional (and likely more expensive) features that your particular provider offers. In contrast, VPNs use several layers of defense to protect your private information. Since your data is routed through VPN servers in remote locations through virtual tunnels, it would be difficult for a hacker to get to it. However, even if a cybercriminal did break into your VPN, he or she wouldn’t be able to make sense of your data, since it’s encrypted. In addition, some VPN companies provide additional layers of security for their users. For example, many VPN companies boost their security by implementing no-logs policies. Basically, even though hackers, government agencies, and other prying eyes usually can’t access your data when using a VPN, the company that provides the VPN might be able to. This could put your data at risk if the government or any other outside entity ever pressured the VPN to share its users’ information and activity. Hackers who got into the VPN’s central servers and databases might also be able to view data stored there. Logs of your information could also interfere with your privacy and safety if the VPN company itself decided to use your data in an unsavory way, such as selling it. VPN providers that have committed to no-logs policies promise that they will not store user data. This means that even if the government comes knocking, a hacker gets into one of their databases, or someone untrustworthy at the VPN company wants to sell your data, your information simply isn’t there to be exploited. If you want an all-around excellent VPN with an outstanding no-logs policy, we advise you to try NordVPN. It’s the top VPN on our site for a reason. NordVPN does not monitor, retain, or store any of its user logs or data. Other companies build a kill switch into their VPNs to keep users safer. This feature automatically disconnects from the internet if your VPN loses connection, preventing your real IP address from ever being revealed. If you’re looking for a great multi-device, high-speed-streaming VPN with a kill switch, we suggest you try CyberGhost VPN. When it comes to security, VPNs are typically safer and more private than MPLS systems. While MPLS systems are private, your data could be extremely vulnerable if they were ever hacked, since they don’t typically include encryption. Even beyond standard VPN encryption, tunneling, and routing protocols, many add on extra defenses, just to keep your data as safe as possible. MPLS vs. VPN Costs You probably don’t want to spend more than absolutely you need to for a secure, fast, reliable connection. When it comes to price, MPLS systems usually cost much more than VPNs. Both services require purchasing and maintaining sophisticated equipment, providing customer support as needed, and other valid costs, which can affect their prices. However, while the costs of other types of internet infrastructure and features have generally come down, MPLS has only slightly decreased in price over time. MPLS is priced by Mbps (megabits per second) per month and can be on the expensive side. Meanwhile, VPNs are usually much more budget friendly, and some are even free (although we’d caution you to carefully select a free VPN from our list and look out for any hidden costs associated with this type of service). Of course, the particular costs of any given MPLS or VPN depend on a variety of factors, such as their specific features, location, size, and more. Generally speaking, however, when it comes to price, VPNs are clearly superior to MPLS systems. If you’re looking for an extremely affordable VPN that still offers the standard features you need, we recommend you take a look at our list of the best cheap VPN providers. These VPN provide you with excellent security, speed and streaming media at a reasonable price. When MPLS and VPN Meet. Although MPLS and VPN are often competitors, they can also be combined. The cloud version of MPLS labeling can be integrated with VPN systems. This could produce an even stronger, safer system. Since it can often lead to better bandwidth and faster speeds, an MPLS VPN hybrid may be best for large businesses or individuals who need to perform bandwidth-heavy activities with minimal delays. For example, companies that regularly run VoIP and video conferencing apps may benefit from MPLS VPN. However, as with traditional MPLS, MPLS VPNs can be much more expensive than a typical VPN. These systems can be especially costly if they need to transmit information across large distances, as is often the purpose of VPNs (unblocking geo-restricted content, sharing files between international offices, etc.). For these reasons, we recommend looking into an MPLS VPN if: You’re willing to pay additional fees for more bandwidth. Your network is local rather than international. It’s crucial that you experience little or no delays. about cisco certification lookup click there
  • CCIE RS lab topology
    SPOTO Club
    2024-01-16
    Before we discuss the BGP MPLS design of the CCIE R / Sexperimental exam, let undefined first look at the BGP / MPLS roles and responsibilities that network professionals will perform. Roles and responsibilities of BGP / MPLS network professionals: today, almost every service provider around the world uses BGP and MPLS deployment throughout the cloud to provide and manage millions of network infrastructure and better service availability and performance for customers. MPLS is especially suitable for operator networks and commercial wide area networks. BGP and MPLS deployment will ensure perfect connectivity and day-to-day activities in the multi-protocol network infrastructure, as well as maintain excellent communication service methods without any obstacles, as both are publicly considered standard technologies. In addition, if you want to gain the right knowledge, you should join the courses offered by SPOTO to enhance your knowledge. BGP or MPLS network professionals are required to have a medium to a high level of understanding of the network infrastructure of an enterprise or operator. Their role is usually 24 × 7 to support network services and planned and unplanned shifts. Now, here are some questions about BGP and MPLS, which will be raised to candidates in interviews. Q: what is MPLS? A: this question is one of the most common questions that will be asked during MPLS interviews, so candidates must prepare the question before they face the interview. First, you need to start with an introduction to MPLS. Multi-protocol label switching (MPLS) provides a mechanism for packet processing based on a label. It will be seen as a data forwarding service that will provide high-end network communication from one network node to the next based on tags rather than routing table lookups. Routing table lookups for each packet slow communication, but MPLS uses LFIB or forwarding tables to process tags from one node to another. The main benefits of using MPLS are QoS integration: support for multi-level QoS, to manage delay, jitter and packet loss of various types of traffic, such as voice, video, batch file transfer, e-mail, etc. Fast convergence: switching on the basis of tags do not need to look for routing tables. Provides scalability for IP VPN. MPLS TE is used to realize low network congestion. Reliable and safe. Q: name the BGP path property to control incoming and outgoing traffic? A: BGP may have multiple paths attributes that affect traffic. In the most common practice, we use AS-Path pre-hanging and MED (also known as multi-exit discriminator) to handle incoming traffic. Moreover, in order to affect outgoing traffic, weight and local preferences, it will be the best choice. Q: what should we do if my BGP neighbor is idle or active? A. If you think that the BGP peer is idle, it may be due to a physical connection failure, or the neighbor AS cannot define the neighbor correctly. In connection state, BGP will try to establish a TCP session with port number 179; if it cannot establish a connection, it may enter an active state, where it will try to establish a TCP connection again. Here are some questions that can be asked in the CCIE R / S laboratory exams for BGP and MPLS. To gain full access to content, join the course provided by SPOTO. They are the best when learning to dump for CISCO.
  • CCIE RS lab topology
    SPOTO Club
    2024-01-16
    Introduction The Intermediate System-to-Intermediate System (IS-IS) Routing Protocol is a versatile and robust routing protocol suitable for both IP and CLNP applications. In the IP world, it has emerged as the only practical alternative to the Open Shortest Path First Protocol for Interior Gateway Protocol (IGP) applications in Internet Service Provider (ISP) networks. IS-IS is the IGP of choice in most tier one ISP environments and its significance certainly explains why it features in the CCIE Routing and Switching, as well as the CCIE IT recertification exams. Despite the importance of IS-IS in IP networking, it has received little coverage in the technical press and networking literature. You could gain more information about the same if you join the Lab Courses, offered by the SPOTO. Most of the users, as well as networking professionals, would be relying on scanty literature and the configuration manuals from Cisco and other major router vendors to boost their knowledge on IS-IS. Many routing protocol texts from Cisco Press cover IS-IS in sections, yet OSPF is covered in many book titles. This first book title on IS-IS breaks the tradition of inadequate IS-IS coverage by focusing primarily on IS-IS. IS-IS Network Design Solutions would be following the much-cherished Cisco Press approach of combining theory and practice within the setup of the Cisco Routing environment. The text would also be including an elaborate comparison with its competitor, OSPF. Interior gateway protocols such as Intermediate System-to-Intermediate System (IS-IS) are used in conjunction with the Border Gateway Protocol (BGP) to provide robust, resilient performance and intelligent routing capabilities required in large-scale and complex internetworking environments. In spite of the popularity of the IS-IS protocol, however, networking professionals have depended on router configuration manuals, protocol specifications, IETF RFCs, and drafts. Mastering IS-IS, regardless of its simplicity, has been a daunting task for many. IS-IS Network Design Solutions would be providing the first comprehensive coverage available on the IS-IS protocol. Professionals of all levels in the Networking Field now would be having a single source for all the information that would be needed to become true experts on the ISIS protocol, particularly for IP routing applications. You are also going to be learning about the origins of the IS-IS protocol and the fundamental underlying concepts and later on move to complex protocol mechanisms involving building, maintaining, as well as dissemination of the information found in the IS-IS database on a router. Objectives The overall objective of this book is to bring comprehensive knowledge about the IS-IS routing protocol to the IP networking professional at any career level. Like most IP routing protocols, IS-IS is still evolving with various enhancements still being discussed and formalized within the IETF. This book builds a bridge between the original IS-IS protocol, which is specified for routing of ISO connectionless network protocol (CLNP), as well as all recent IP related enhancements. Its practical slant, which exploits the ubiquitous Cisco IOS environment, is designed to provide you hands-on experience for usage and configuration of the IS-IS protocol. In the grand scheme, the material presented must be provided to you with the necessary advanced skills for understanding, designing, and application of IS-IS as an IGP in IP environments. Now, all these objectives couldn’t be achieved only through the theoretical knowledge, you would also be needed to go through the hands-on lab practice, which you could achieve through the CCIE Lab Preparation Courses, which would be offered by the SPOTO. It would be considered as the one-stop destination for all the Cisco related Certification. So, join the SPOTO and gain the knowledge as well as hands-on practice to clear your CCIE Lab Exam.