CCIE RS v5 Segmented Study Plan

Hey guys,

 

In watching Brian's CCIE Preparation and Overview videos, he stressed very well the concept of getting the basics down, and then coming back to the advanced topics later. 

Since I'm just starting my CCIE journey, I very much liked this approach as it bodes well for such a large study scope and also goes along with the concept of spaced repetition in that we learn something, then come back to it slightly later will help solidify it in our minds and truly memorize something long term. 

In addition, it seems only logical to create a solid foundation and then build all of the optional things on top of it. 

With that said, I came up with a mock draft of the core CCIE RS v5 topics and a study plan that incorporates Brian's techniques. I used the INE CCIE RS v5 Expanded Blueprint as the guideline. I really like that Brian put this in an order that is logical to study, so I segmented this plan into what I believe are 'basics' and then 'advanced' features that I will come back to after I have the basics down. 

Here is what I came up with, and I am totally open to suggestions from those of you who have been through/are going through study currently.

I only performed this for the very core technologies (LAN Switching and IP Routing) and if I find this works well for me I'll incorporate it into the other sections as well (Security, QoS, Services, Multicast, etc.)

Study Plan Part 1 (All of L2 technology and L3 basics--neighborship, databases, best path algorithms, summarization, default-routing, etc.)

  • 1. LAN
    Switching
    • 1.1. VLANs
      & Trunking
      • 1.1.1.
        Standard VLANs
      • 1.1.2.
        Extended VLANs
      • 1.1.3. VLAN
        Database
      • 1.1.4.
        Access Ports
      • 1.1.5.
        802.1q Trunk Ports
      • 1.1.6.
        802.1q Native VLAN
      • 1.1.7.
        Dynamic Trunking Protocol (DTP)
      • 1.1.8.
        Trunking Allowed List
    • 1.2. VTP
      • 1.2.1. VTP
        Version 1, 2, & 3
      • 1.2.2. VTP
        Authentication
      • 1.2.3. VTP
        Pruning
      • 1.2.4. VTP
        Prune Eligible List
      • 1.2.5. VTPv3
        & Private VLANs
    • 1.3.
      EtherChannels
      • 1.3.1.
        Static Layer 2 EtherChannels
      • 1.3.2. PAgP
      • 1.3.3. LACP
      • 1.3.4. Layer
        3 EtherChannel
      • 1.3.5.
        EtherChannel Load Balancing
      • 1.3.6.
        EtherChannel Protocol Limiting
      • 1.3.7.
        EtherChannel Misconfig Guard
    • 1.4.
      Spanning-Tree Protocol
      • 1.4.1. PVST+
        • 1.4.1.1.
          STP Root Bridge Election
        • 1.4.1.2.
          STP Path Selection with Port Cost
        • 1.4.1.3.
          STP Path Selection with Port Priority
        • 1.4.1.4.
          STP Convergence Timers
      • 1.4.2.
        Optional STP Features
        • 1.4.2.1.
          PortFast
        • 1.4.2.2.
          UplinkFast
        • 1.4.2.3.
          BackboneFast
        • 1.4.2.4.
          BPDU Guard
        • 1.4.2.5.
          BPDU Filter
        • 1.4.2.6.
          Root Guard
      • 1.4.3.
        Rapid-PVST+
        • 1.4.3.1.
          RSTP Convergence Optimizations
        • 1.4.3.2.
          Edge Ports
      • 1.4.4.
        Multiple STP
        • 1.4.4.1.
          MST Root Bridge Election
        • 1.4.4.2.
          MST Path Selection with Port Cost
        • 1.4.4.3.
          MST Path Selection with Port Priority
        • 1.4.4.4.
          MST and CST/PVST+ Interoperability
        • 1.4.4.5.
          Multi-Region MST
    • 1.6.
      Miscellaneous
      • 1.6.1. CDP
      • 1.6.2. LLDP
      • 1.6.3. UDLD
      • 1.6.4. CAM
        Aging Time
      • 1.6.5. SPAN
      • 1.6.6. RSPAN
      • 1.6.7.
        ERSPAN
      • 1.6.8. Flex
        Links
      • 1.6.9.
        Fallback Bridging
      • 1.6.10.
        Voice VLANs
      • 1.6.11.
        Smartport Macros
  • 2. Layer 2 WAN
    Circuits
    • 2.1. HDLC
    • 2.2. PPP
    • 2.3. PPP
      Authentication
    • 2.4. PPP
      Multilink
    • 2.5. PPPoE

 

  • 3. IP Routing
    • 3.1. Protocol
      Independent IPv4 Routing
      • 3.1.1. IPv4
        Addressing
      • 3.1.2. IPv4
        ARP
      • 3.1.3.
        Longest Match Routing
      • 3.1.4.
        Administrative Distance
      • 3.1.5.
        Static Routing
      • 3.1.6. Route
        Recursion
      • 3.1.7.
        Egress Interface vs. Next Hop Static Routing
      • 3.1.8.
        Default Routing
      • 3.1.9. CEF
      • 3.1.10.
        Floating Static Routes
      • 3.1.11.
        Backup Interface
      • 3.1.12. IP
        Service Level Agreement
      • 3.1.13.
        Enhanced Object Tracking
      • 3.1.14.
        Policy Routing
      • 3.1.15.
        Policy Routing and IP SLA
      • 3.1.16.
        Local Policy Routing

3.2.
Protocol Independent IPv6 Routing

  • 3.2.1. IPv6
    Link-Local Addressing
  • 3.2.2. IPv6
    Unique Local Addressing
  • 3.2.3. IPv6
    Global Aggregatable Addressing
  • 3.2.4. IPv6
    EUI-64 Addressing
  • 3.2.5. IPv6
    Auto-Configuration / SLAAC
  • 3.2.6. IPv6
    Global Prefix
  • 3.2.7. IPv6
    Redistribution
  • 3.2.8. IPv6
    Filtering
  • 3.2.9. IPv6
    NAT-PT
  • 3.3. Common
    Dynamic Routing Features
    • 3.3.1.
      Distance Vector vs. Link State vs. Path Vector routing protocols
    • 3.3.2.
      Passive Interfaces
    • 3.3.3.
      Routing Protocol Authentication
    • 3.3.4. Route
      Filtering
    • 3.3.5. Auto
      Summarization
    • 3.3.6. Manual
      Summarization
    • 3.3.7. Route
      Redistribution
      • 3.3.7.1.
        Prefix Filtering with Route Tagging
      • 3.3.7.2.
        Prefix Filtering with Manual Lists
      • 3.3.7.3.
        Prefix Filtering with Administrative Distance
      • 3.3.7.4.
        Administrative Distance Based Loops
      • 3.3.7.5.
        Metric Based Loops

3.4.
RIP

  • 3.4.1. RIPv2
    • 3.4.1.1.
      Initialization
      • 3.4.1.1.1.
        Enabling RIPv2
      • 3.4.1.1.2.
        RIP Send and Receive Versions
      • 3.4.1.1.3.
        Split Horizon
      • 3.4.1.1.4.
        RIPv2 Unicast Updates
      • 3.4.1.1.5.
        RIPv2 Broadcast Updates
      • 3.4.1.1.6.
        RIPv2 Source Validation
    • 3.4.1.2. Path
      Selection
      • 3.4.1.2.1.
        Offset List
    • 3.4.1.3.
      Summarization
      • 3.4.1.3.1.
        Auto-Summary
      • 3.4.1.3.2.
        Manual Summarization
    • 3.4.1.4.
      Authentication
      • 3.4.1.4.1.
        Clear Text
      • 3.4.1.4.2.
        MD5
    • 3.4.1.7.
      Default Routing
      • 3.4.1.7.1.
        RIPv2 Default Routing
      • 3.4.1.7.2.
        RIPv2 Conditional Default Routing
      • 3.4.1.7.3.
        RIPv2 Reliable Conditional Default Routing
  • 3.4.2. RIPng *
    • 3.4.2.1.
      RIPng Overview *

3.5.
EIGRP

  • 3.5.1.
    Initialization
    • 3.5.1.1.
      Network Statement
    • 3.5.1.2.
      Multicast vs. Unicast Updates
    • 3.5.1.3.
      EIGRP Named Mode
    • 3.5.1.4.
      EIGRP Multi AF Mode
    • 3.5.1.5.
      EIGRP Split Horizon
    • 3.5.1.6.
      EIGRP Next-Hop Processing
  • 3.5.2. Path
    Selection
    • 3.5.2.1.
      Feasibility Condition
    • 3.5.2.2.
      Modifying EIGRP Vector Attributes
    • 3.5.2.3.
      Classic Metric
    • 3.5.2.4. Wide
      Metric
    • 3.5.2.5.
      Metric Weights
    • 3.5.2.6.
      Equal Cost Load Balancing
    • 3.5.2.7.
      Unequal Cost Load Balancing
    • 3.5.2.8.
      EIGRP Add-Path
  • 3.5.3.
    Summarization
    • 3.5.3.1.
      Auto-Summary
    • 3.5.3.2.
      Manual Summarization
    • 3.5.3.3.
      Summarization with Default Routing
    • 3.5.3.4.
      Summarization with Leak Map
    • 3.5.3.5.
      Summary Metric
  • 3.5.4.
    Authentication
    • 3.5.4.1. MD5
    • 3.5.4.2. HMAC
      SHA2-256bit
    • 3.5.4.3.
      Automatic key rollover
  • 3.5.7.
    Miscellaneous EIGRP
    • 3.5.7.1.
      EIGRP Default Network
    • 3.5.7.2.
      EIGRP Default Metric
    • 3.5.7.3.
      EIGRP Neighbor Logging
    • 3.5.7.4.
      EIGRP Router-ID

 

3.5.8.
EIGRPv6

  • 3.5.8.1.
    Enabling EIGRPv6
  • 3.5.8.2.
    EIGRPv6 Split Horizon
  • 3.5.8.3.
    EIGRPv6 Next-Hop Processing
  • 3.5.8.4.
    EIGRPv6 Authentication
  • 3.5.8.5.
    EIGRPv6 Metric Manipulation
  • 3.5.8.6.
    EIGRPv6 Default Routing
  • 3.5.8.7.
    EIGRPv6 Summarization

3.6.
OSPF

  • 3.6.1.
    Initialization
    • 3.6.1.1.
      Network Statement
    • 3.6.1.2.
      Interface Statement
  • 3.6.2. Network
    Types
    • 3.6.2.1.
      Broadcast
    • 3.6.2.2.
      Non-Broadcast
    • 3.6.2.3. OSPF
      DR/BDR Election Manipulation
    • 3.6.2.4.
      Point-to-Point
    • 3.6.2.5.
      Point-to-Multipoint
    • 3.6.2.6.
      Point-to-Multipoint Non-Broadcast
    • 3.6.2.7.
      Loopback
    • 3.6.2.8. LSA
      Types
    • 3.6.2.9. OSPF
      Next-Hop Processing
    • 3.6.2.10.
      Unicast vs. Multicast Hellos
  • 3.6.3. Path
    Selection
    • 3.6.3.1.
      Auto-Cost
    • 3.6.3.2. Cost
    • 3.6.3.3.
      Bandwidth
    • 3.6.3.4.
      Per-Neighbor Cost
    • 3.6.3.5.
      Non-Backbone Transit Areas
    • 3.6.3.6.
      Virtual-Links
  • 3.6.4.
    Authentication
    • 3.6.4.1. Area
    • 3.6.4.2.
      Interface level
    • 3.6.4.3.
      Clear Text
    • 3.6.4.4. MD5
    • 3.6.4.5. Null
    • 3.6.4.6. MD5
      with Multiple Keys
    • 3.6.4.7.
      SHA1-196
    • 3.6.4.8.
      Virtual link
  • 3.6.5.
    Summarization
    • 3.6.5.1.
      Internal Summarization
    • 3.6.5.2.
      External Summarization
    • 3.6.5.3. Path
      Selection with Summarization
    • 3.6.5.4.
      Summarization and Discard Routes
  • 3.6.6. Stub
    Areas
    • 3.6.6.1. Stub
      Areas
    • 3.6.6.2.
      Totally Stubby Areas
    • 3.6.6.3.
      Not-So-Stubby Areas
    • 3.6.6.4.
      Not-So-Stubby Areas and Default Routing
    • 3.6.6.5.
      Not-So-Totally-Stubby Areas
    • 3.6.6.6. Stub
      Areas with Multiple Exit Points
    • 3.6.6.7. NSSA
      Type-7 to Type-5 Translator Election
    • 3.6.6.8. NSSA
      Redistribution Filtering
  • 3.6.8. Default
    Routing
    • 3.6.8.1.
      Default Routing
    • 3.6.8.2.
      Conditional Default Routing
    • 3.6.8.3.
      Reliable Conditional Default Routing
    • 3.6.8.4.
      Default Cost
  • 3.6.11. OSPFv3
    • 3.6.11.1. LSA
      Types
    • 3.6.11.2.
      OSPFv3
    • 3.6.11.3.
      OSPFv3 Network Types
    • 3.6.11.4.
      OSPFv3 Prefix Suppression
    • 3.6.11.5.
      OSPFv3 Virtual Links
    • 3.6.11.6.
      OSPFv3 Summarization

 

3.7.
BGP

  • 3.7.1.
    Establishing Peerings
    • 3.7.1.1. iBGP
      Peerings
    • 3.7.1.2. EBGP
      Peerings
    • 3.7.1.3.
      Update Source Modification
    • 3.7.1.4.
      Multihop EBGP Peerings
    • 3.7.1.5.
      Neighbor Disable-Connected-Check
    • 3.7.1.6.
      Authentication
    • 3.7.1.7. TTL
      Security
    • 3.7.1.8. BGP
      Peer Groups
    • 3.7.1.9. 4
      Byte ASNs
    • 3.7.1.10.
      Active vs. Passive Peers
    • 3.7.1.11.
      Path MTU Discovery
    • 3.7.1.12.
      Multi Session TCP Transport per AF
    • 3.7.1.13.
      Dynamic BGP Peering
  • 3.7.2. iBGP
    Scaling
    • 3.7.2.1.
      Route Reflectors
    • 3.7.2.2.
      Route Reflector Clusters
    • 3.7.2.3.
      Confederations
  • 3.7.3. BGP
    Next Hop Processing
    • 3.7.3.1.
      Next-Hop-Self
    • 3.7.3.2.
      Manual Next-Hop Modification
    • 3.7.3.3.
      Third Party Next Hop
    • 3.7.3.4. Next
      Hop Tracking
    • 3.7.3.5.
      Conditional Next Hop Tracking
    • 3.7.3.6. BGP
      Next-Hop Trigger Delay
  • 3.7.4. BGP
    NLRI Origination
    • 3.7.4.1.
      Network Statement
    • 3.7.4.2.
      Redistribution
    • 3.7.4.3. BGP
      Redistribute Internal
    • 3.7.4.4.
      Conditional Advertisement
    • 3.7.4.5.
      Conditional Route Injection
  • 3.7.5. BGP
    Bestpath Selection
    • 3.7.5.1.
      Weight
    • 3.7.5.2.
      Local Preference
    • 3.7.5.3.
      AS-Path Prepending
    • 3.7.5.4.
      Origin
    • 3.7.5.5. MED
    • 3.7.5.6.
      Always Compare MED
    • 3.7.5.7.
      Deterministic MED
    • 3.7.5.8.
      AS-Path Ignore
    • 3.7.5.9.
      Router-IDs
    • 3.7.5.10. DMZ
      Link Bandwidth
    • 3.7.5.11.
      Maximum AS Limit
    • 3.7.5.12.
      Multipath

3.7.11. BGP Default Routing



























  • 3.8. Route
    Redistribution
    • 3.8.1. Metric
      Based Loops
    • 3.8.2.
      Administrative Distance Based Loops
    • 3.8.3. Route
      Tag Filtering
    • 3.8.4. IP
      Route Profile
    • 3.8.5. Debug
      IP Routing

------

------

------

-

-

-

-

-

-

-

-

-

-

-

-

------

------

------


Study Plan Part 2 (Advanced Technologies, Filtering, Convergence Optimization, Optional Features)




  • 3. IP Routing
    • 3.1. Advanced
      Protocol Independent IPv4 Routing
      • 3.1.17. GRE
        Tunnels
      • 3.1.18. IP
        in IP Tunnels
      • 3.1.19.
        Tunnels & Recursive Routing Errors
      • 3.1.20. On
        Demand Routing
      • 3.1.21. VRF
        Lite
      • 3.1.22.
        Bidirectional Forwarding Detection
      • 3.1.23.
        Performance Routing (PfR) *
    • 3.2. Advanced
      Protocol Independent IPv6 Routing
      • 3.2.10. IPv6
        MP-BGP
      • 3.2.11. IPv6
        Tunneling *
      • 3.2.12.
        Automatic 6to4 Tunneling*
      • 3.2.13.
        ISATAP Tunneling *
  • 3.4. RIP
    • 3.4.1.
      Advanced RIPv2
    • 3.4.1.5.
      Convergence Optimization & Scalability
      • 3.4.1.5.1.
        RIPv2 Convergence Timers
      • 3.4.1.5.2.
        RIPv2 Triggered Updates
    • 3.4.1.6.
      Filtering
      • 3.4.1.6.1.
        Filtering with Passive Interface
      • 3.4.1.6.2.
        Filtering with Prefix-Lists
      • 3.4.1.6.3.
        Filtering with Standard Access-Lists
      • 3.4.1.6.4.
        Filtering with Extended Access-Lists
      • 3.4.1.6.5.
        Filtering with Offset Lists
      • 3.4.1.6.6.
        Filtering with Administrative Distance
      • 3.4.1.6.7.
        Filtering with Per Neighbor AD
  • 3.5.  EIGRP
    • 3.5.5.
      Convergence Optimization & Scalability
      • 3.5.5.1.
        EIGRP Convergence Timers
      • 3.5.5.2.
        EIGRP Query Scoping with Summarization
      • 3.5.5.3.
        EIGRP Query Scoping with Stub Routing
      • 3.5.5.4.
        Stub Routing with Leak Map
      • 3.5.5.5.
        Bandwidth Pacing
      • 3.5.5.6. IP
        FRR
      • 3.5.5.7.
        Graceful Restart & NSF
    • 3.5.6.
      Filtering
      • 3.5.6.1.
        Filtering with Passive Interface
      • 3.5.6.2.
        Filtering with Prefix-Lists
      • 3.5.6.3.
        Filtering with Standard Access-Lists
      • 3.5.6.4.
        Filtering with Extended Access-Lists
      • 3.5.6.5.
        Filtering with Offset Lists
      • 3.5.6.6.
        Filtering with Administrative Distance
      • 3.5.6.7.
        Filtering with Per Neighbor AD
      • 3.5.6.8.
        Filtering with Route Maps
      • 3.5.6.9. Per
        Neighbor Prefix Limit
      • 3.5.6.10.
        Redistribution Prefix Limit
    • 3.5.7.
      Miscellaneous EIGRP
      • 3.5.7.5.
        EIGRP Maximum Hops
      • 3.5.7.6. no
        next-hop-self no-ecmp-mode
      • 3.5.7.7.
        EIGRP Route Tag Enhancements
    • 3.5.8. EIGRPv6
      • 3.5.8.8.
        EIGRPv6 Prefix Filtering
      • 3.5.8.9.
        EIGRPv6 Stub Routing
      • 3.5.8.10.
        EIGRPv6 Link Bandwidth
      • 3.5.8.11.
        EIGRPv6 Timers
      • 3.5.8.12.
        EIGRP IPv6 VRF Lite
      • 3.5.8.13.
        EIGRP Over The Top
  • 3.6. OSPF
    • 3.6.7.
      Filtering
      • 3.6.7.1.
        Filtering with Distribute-Lists
      • 3.6.7.2.
        Filtering with Administrative Distance
      • 3.6.7.3.
        Filtering with Route-Maps
      • 3.6.7.4.
        Filtering with Summarization
      • 3.6.7.5. LSA
        Type-3 Filtering
      • 3.6.7.6.
        Forwarding Address Suppression
      • 3.6.7.7.
        NSSA ABR External Prefix Filtering
      • 3.6.7.8.
        Database Filtering
    • 3.6.9.
      Convergence Optimization & Scalability
      • 3.6.9.1.
        Interface Timers
      • 3.6.9.2.
        Fast Hellos
      • 3.6.9.3. LSA
        & SPF Throttling
      • 3.6.9.4. LSA
        & SPF Pacing
      • 3.6.9.5.
        Single Hop LFA / IP FRR
      • 3.6.9.6.
        Multihop LFA
      • 3.6.9.7.
        Stub Router Advertisement
      • 3.6.9.8.
        Demand Circuit
      • 3.6.9.9.
        Flooding Reduction
      • 3.6.9.10.
        Transit Prefix Filtering
      • 3.6.9.11.
        Resource Limiting
      • 3.6.9.12.
        Graceful Restart & NSF
      • 3.6.9.13.
        Incremental SPF
    • 3.6.10.
      Miscellaneous OSPF Features
    • 3.6.11. OSPFv3
      • 3.6.11.7.
        OSPFv3 IPsec Authentication
      • 3.6.11.8.
        OSPFv3 Multi AF Mode
      • 3.6.11.9.
        TTL Security

3.7.
BGP

  • 3.7.6. BGP
    Aggregation
    • 3.7.6.1. BGP
      Auto-Summary
    • 3.7.6.2.
      Aggregation
    • 3.7.6.3.
      Summary Only
    • 3.7.6.4.
      Suppress Map
    • 3.7.6.5.
      Unsuppress Map
    • 3.7.6.6.
      AS-Set
    • 3.7.6.7.
      Attribute-Map
    • 3.7.6.8.
      Advertise Map
  • 3.7.7. BGP
    Communities
    • 3.7.7.1.
      Standard
    • 3.7.7.2.
      Extended
    • 3.7.7.3.
      No-Advertise
    • 3.7.7.4.
      No-Export
    • 3.7.7.5.
      Local-AS
    • 3.7.7.6.
      Deleting
  • 3.7.8.
    Filtering
    • 3.7.8.1.
      Prefix-Lists
    • 3.7.8.2.
      Standard Access-Lists Task
    • 3.7.8.3.
      Extended Access-Lists
    • 3.7.8.4.
      Maximum Prefix
    • 3.7.8.5. BGP
      Regular Expressions
    • 3.7.8.6.
      Outbound Route Filtering (ORF)
    • 3.7.8.7. Soft
      Reconfiguration Inbound
  • 3.7.9. AS-Path
    Manipulation
    • 3.7.9.1.
      Local AS
    • 3.7.9.2.
      Local AS Replace-AS/Dual-AS
    • 3.7.9.3.
      Remove Private AS
    • 3.7.9.4.
      Allow AS In
    • 3.7.9.5. AS
      Override
  • 3.7.10. BGP
    Convergence Optimization
    • 3.7.10.1. BGP
      Timers Tuning
    • 3.7.10.2. BGP
      Fast Fallover
    • 3.7.10.3. BGP
      Prefix Independent Convergence (PIC)
    • 3.7.10.4. BGP
      Dampening
    • 3.7.10.5. BGP
      Dampening with Route-Map
    • 3.7.10.6. BGP
      Add Path
  • 3.7.12. IPv6
    BGP
  • 3.7.13. Misc
    BGP
    • 3.7.13.1.
      iBGP Synchronization
    • 3.7.13.2. BGP
      over GRE
    • 3.7.13.3. BGP
      Backdoor

Comments

  • This is for the lab and the written. Per Brian's recommendation, I will not really be studying specifically for the written aside from studying the written only topics. 

     

    My plan is to do the following:

    1. Read Cisco/vendor independent books on the technology topic
    2. Review CCNP/CCIE ATC Videos on the topic
    3. Lab the topic
    4. Review practice test questions on the topic
    5. Repeat where necessary

    Also, there is a guide on how long to study, if I remember correctly, it was a 48 week program, 3 days per week, 4 hours per day. 




    Personally, I do better with 2 hours per day, so that's what I'm sticking with. 


Sign In or Register to comment.