Home > Store

CCIE Routing and Switching v5.0 Official Cert Guide, Vol 2 Premium Edition eBook/Practice Test, 5th Edition

Register your product to gain access to bonus material or receive a coupon.

CCIE Routing and Switching v5.0 Official Cert Guide, Vol 2 Premium Edition eBook/Practice Test, 5th Edition

Premium Edition eBook

  • Your Price: $63.99
  • List Price: $79.99
  • About Premium Edition eBooks
  • The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice tests.

    Your purchase will deliver:

    • Link to download the Pearson Test Prep exam engine
    • Access code for question database
    • eBook in the following formats, accessible from your Account page after purchase:

    EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    PDF The popular standard, which reproduces the look and layout of the printed page.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    eBook FAQ

    eBook Download Instructions


  • Copyright 2015
  • Edition: 5th
  • Premium Edition eBook
  • ISBN-10: 0-13-359105-0
  • ISBN-13: 978-0-13-359105-7

CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2, Premium Edition eBook and Practice Test, Fifth Edition

The exciting new CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2, Premium Edition eBook and Practice Test, Fifth Edition is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items:

--The CCIE Routing and Switching v5.0 Premium Edition Practice Test, including 400 practice exam questions and enhanced practice test features
--PDF and EPUB formats of the CCIE Routing and Switching v5.0 Volume 2, Fifth Edition from Cisco Press, which are accessible via your PC, tablet, and smartphone

About the Premium Edition Practice Test

This Premium Edition contains an enhanced version of the Pearson IT Certification Practice Test (PCPT) software with 400 practice test questions. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package

--Enables you to focus on individual topic areas or take complete, timed exams
--Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
--Provides unique sets of exam-realistic practice questions
--Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Pearson IT Certification Practice Test minimum system requirements:
Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8.1 (desktop UI only); Microsoft .NET Framework 4.5 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB disc space plus 50 MB for each downloaded practice exam
About the Premium Edition eBook

CCIE Routing and Switching v5.0 Official Cert Guide, Volume 2, Fifth Edition from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Expert instructors Narbik Kocharians and Terry Vinson share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This second of two volumes covers IP BGP routing, quality of service (QoS), wide area networks, IP multicast, network security, and Multiprotocol Label Switching (MPLS) topics.

This complete study package includes

--A test-preparation routine proven to help you pass the exams
--"Do I Know This Already?" quizzes, which enable you to decide how much time you need to spend on each section
--Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
--The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
--A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
--Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.

The official study guide helps you master topics on the CCIE Routing and Switching v5.0 exams, including
--BGP operations and routing policies
--IP Multicast
--Device and network security and tunneling technologies

Sample Content

Table of Contents

Introduction xxvii
Part I IP BGP Routing
Chapter 1 Fundamentals of BGP Operations 3
“Do I Know This Already?” Quiz 3
Foundation Topics 8
Building BGP Neighbor Relationships 9
    Internal BGP Neighbors 10
    External BGP Neighbors 13
    Checks Before Becoming BGP Neighbors 14
    BGP Messages and Neighbor States 15
        BGP Message Types 16
        Purposefully Resetting BGP Peer Connections 16
Building the BGP Table 18
    Injecting Routes/Prefixes into the BGP Table 18
        BGP network Command 18
        Redistributing from an IGP, Static, or Connected Route 21
        Impact of Auto-Summary on Redistributed Routes and the network Command 23
        Manual Summaries and the AS_PATH Path Attribute 25
        Adding Default Routes to BGP 29
        ORIGIN Path Attribute 30
        Advertising BGP Routes to Neighbors 31
        BGP Update Message 31
        Determining the Contents of Updates 32
        Example: Impact of the Decision Process and NEXT_HOP on BGP Updates 34
        Summary of Rules for Routes Advertised in BGP Updates 40
Building the IP Routing Table 40
    Adding eBGP Routes to the IP Routing Table 40
    Backdoor Routes 41
    Adding iBGP Routes to the IP Routing Table 42
        Using Sync and Redistributing Routes 44
        Disabling Sync and Using BGP on All Routers in an AS 46
        Confederations 47
        Configuring Confederations 49
        Route Reflectors 52
Multiprotocol BGP 57
    Configuration of Multiprotocol BGP 58
Foundation Summary 63
Memory Builders 66
    Fill In Key Tables from Memory 66
    Definitions 67
    Further Reading 67
Chapter 2 BGP Routing Policies 69
“Do I Know This Already?” Quiz 69
Foundation Topics 75
Route Filtering and Route Summarization 75
    Filtering BGP Updates Based on NLRI 76
        Route Map Rules for NLRI Filtering 79
        Soft Reconfiguration 79
        Comparing BGP Prefix Lists, Distribute Lists, and Route Maps 80
    Filtering Subnets of a Summary Using the aggregate-address Command 81
    Filtering BGP Updates by Matching the AS_PATH PA 82
        The BGP AS_PATH and AS_PATH Segment Types 82
        Using Regular Expressions to Match AS_PATH 84
        Example: Matching AS_PATHs Using AS_PATH Filters 87
        Matching AS_SET and AS_CONFED_SEQ 91
BGP Path Attributes and the BGP Decision Process 93
    Generic Terms and Characteristics of BGP PAs 93
    The BGP Decision Process 95
        Clarifications of the BGP Decision Process 96
        Three Final Tiebreaker Steps in the BGP Decision Process 96
        Adding Multiple BGP Routes to the IP Routing Table 97
        Mnemonics for Memorizing the Decision Process 98
Configuring BGP Policies 99
    Background: BGP PAs and Features Used by Routing Policies 99
    Step 1: NEXT_HOP Reachable 101
    Step 2: Administrative Weight 101
    Step 3: Highest Local Preference (LOCAL_PREF) 104
    Step 4: Choose Between Locally Injected Routes Based on ORIGIN PA 107
    Step 5: Shortest AS_PATH 107
        Removing Private ASNs 108
        AS_PATH Prepending and Route Aggregation 109
    Step 6: Best ORIGIN PA 112
    Step 7: Smallest Multi-Exit Discriminator 112
        Configuring MED: Single Adjacent AS 114
        Configuring MED: Multiple Adjacent Autonomous Systems 115
        The Scope of MED 115
    Step 8: Prefer Neighbor Type eBGP over iBGP 116
    Step 9: Smallest IGP Metric to the NEXT_HOP 116
    The maximum-paths Command and BGP Decision Process Tiebreakers 116
    Step 10: Lowest BGP Router ID of Advertising Router (with One Exception) 117
    Step 11: Lowest Neighbor ID 117
        The BGP maximum-paths Command 118
BGP Communities 119
    Matching COMMUNITY with Community Lists 123
    Removing COMMUNITY Values 124
    Filtering NLRIs Using Special COMMUNITY Values 125
Fast Convergence Enhancements 126
    Fast External Neighbor Loss Detection 127
    Internal Neighbor Loss Detection 127
    EBGP Fast Session Deactivation 128
Foundation Summary 129
Memory Builders 132
    Fill In Key Tables from Memory 133
    Definitions 133
    Further Reading 133
Part II QoS
Chapter 3
Classification and Marking 135
“Do I Know This Already?” Quiz 135
Foundation Topics 139
Fields That Can Be Marked for QoS Purposes 139
    IP Precedence and DSCP Compared 139
    DSCP Settings and Terminology 140
        Class Selector PHB and DSCP Values 140
        Assured Forwarding PHB and DSCP Values 141
        Expedited Forwarding PHB and DSCP Values 142
    Non-IP Header Marking Fields 143
        Ethernet LAN Class of Service 143
        WAN Marking Fields 143
        Locations for Marking and Matching 144
Cisco Modular QoS CLI 145
    Mechanics of MQC 145
    Classification Using Class Maps 146
        Using Multiple match Commands 147
        Classification Using NBAR 149
Classification and Marking Tools 149
    Class-Based Marking (CB Marking) Configuration 150
        CB Marking Example 151
        CB Marking of CoS and DSCP 155
        Network-Based Application Recognition 156
    CB Marking Design Choices 158
    Marking Using Policers 158
    QoS Pre-Classification 159
    Policy Routing for Marking 160
AutoQoS 160
    AutoQoS for VoIP 161
        AutoQoS VoIP on Switches 161
        AutoQoS VoIP on Routers 162
        Verifying AutoQoS VoIP 163
    AutoQoS for the Enterprise 163
        Discovering Traffic for AutoQoS Enterprise 163
        Generating the AutoQoS Configuration 164
        Verifying AutoQoS for the Enterprise 164
Foundation Summary 165
Memory Builders 167
    Fill In Key Tables from Memory 167
    Definitions 167
    Further Reading 168
Chapter 4 Congestion Management and Avoidance 171
“Do I Know This Already?” Quiz 171
Foundation Topics 175
Cisco Router Queuing Concepts 175
    Software Queues and Hardware Queues 175
    Queuing on Interfaces Versus Subinterfaces and Virtual Circuits 176
    Comparing Queuing Tools 176
Queuing Tools: CBWFQ and LLQ 177
    CBWFQ Basic Features and Configuration 178
    Defining and Limiting CBWFQ Bandwidth 180
    Low-Latency Queuing 182
    Defining and Limiting LLQ Bandwidth 184
    LLQ with More Than One Priority Queue 185
    Miscellaneous CBWFQ/LLQ Topics 186
    Queuing Summary 186
Weighted Random Early Detection 187
    How WRED Weights Packets 188
    WRED Configuration 189
Modified Deficit Round-Robin 190
LAN Switch Congestion Management and Avoidance 193
    Cisco Switch Ingress Queuing 193
        Creating a Priority Queue 193
        Cisco 3560 Congestion Avoidance 195
    Cisco 3560 Switch Egress Queuing 197
Resource Reservation Protocol (RSVP) 199
    RSVP Process Overview 200
    Configuring RSVP 201
    Using RSVP for Voice Calls 203
Foundation Summary 205
Memory Builders 205
    Fill In Key Tables from Memory 205
    Definitions 205
    Further Reading 205
Chapter 5 Shaping, Policing, and Link Fragmentation 207
“Do I Know This Already?” Quiz 207
Foundation Topics 211
Traffic-Shaping Concepts 211
    Shaping Terminology 211
    Shaping with an Excess Burst 213
    Underlying Mechanics of Shaping 213
Generic Traffic Shaping 214
Class-Based Shaping 216
    Tuning Shaping for Voice Using LLQ and a Small Tc 218
    Configuring Shaping by Bandwidth Percent 221
    CB Shaping to a Peak Rate 222
    Adaptive Shaping 222
Policing Concepts and Configuration 222
    CB Policing Concepts 222
        Single-Rate, Two-Color Policing (One Bucket) 223
        Single-Rate, Three-Color Policer (Two Buckets) 224
        Two-Rate, Three-Color Policer (Two Buckets) 225
    Class-Based Policing Configuration 227
        Single-Rate, Three-Color Policing of All Traffic 227
        Policing a Subset of the Traffic 228
        CB Policing Defaults for Bc and Be 229
        Configuring Dual-Rate Policing 229
        Multi-Action Policing 229
        Policing by Percentage 230
    Committed Access Rate 231
Hierarchical Queuing Framework (HQF) 233
    Flow-Based Fair-Queuing Support in Class-Default 235
    Default Queuing Implementation for Class-Default 236
    Class-Default and Bandwidth 236
    Default Queuing Implementation for Shape Class 236
    Policy Map and Interface Bandwidth 236
    Per-Flow Queue Limit in Fair Queue 236
    Oversubscription Support for Multiple Policies on Logical Interfaces 236
    Shaping on a GRE Tunnel 237
    Nested Policy and Reference Bandwidth for Child-Policy 237
    Handling Traffic Congestion on an Interface Configured with Policy Map 237
QoS Troubleshooting and Commands 237
    Troubleshooting Slow Application Response 238
    Troubleshooting Voice and Video Problems 239
    Other QoS Troubleshooting Tips 240
    Approaches to Resolving QoS Issues 240
Foundation Summary 242
Memory Builders 243
    Fill In Key Tables from Memory 243
    Definitions 243
    Further Reading 243
Part III Wide-Area Networks
Chapter 6 Wide-Area Networks 245
“Do I Know This Already?” Quiz 245
Foundation Topics 247
Layer 2 Protocols 247
    HDLC 247
    Point-to-Point Protocol 249
        PPP Link Control Protocol 250
        Basic LCP/PPP Configuration 251
        Multilink PPP 252
        MLP Link Fragmentation and Interleaving 254
        PPP Compression 255
        PPP Layer 2 Payload Compression 256
        Header Compression 256
    PPPoE 257
        Server Configuration 258
        Client Configuration 259
        Authentication 260
Ethernet WAN 262
    VPLS 262
    Metro-Ethernet 263
Foundation Summary 264
Memory Builders 265
    Fill In Key Tables from Memory 265
    Definitions 265
    Further Reading 265
Part IV IP Multicast
Chapter 7 Introduction to IP Multicasting 267
“Do I Know This Already?” Quiz 267
Foundation Topics 270
Why Do You Need Multicasting? 270
    Problems with Unicast and Broadcast Methods 270
    How Multicasting Provides a Scalable and Manageable Solution 273
Multicast IP Addresses 276
    Multicast Address Range and Structure 276
    Well-Known Multicast Addresses 276
        Multicast Addresses for Permanent Groups 277
        Multicast Addresses for Source-Specific Multicast Applications and Protocols 278
        Multicast Addresses for GLOP Addressing 278
        Multicast Addresses for Private Multicast Domains 278
    Multicast Addresses for Transient Groups 278
    Summary of Multicast Address Ranges 279
    Mapping IP Multicast Addresses to MAC Addresses 280
Managing Distribution of Multicast Traffic with IGMP 281
    Joining a Group 282
    Internet Group Management Protocol 282
    IGMP Version 2 283
        IGMPv2 Host Membership Query Functions 285
        IGMPv2 Host Membership Report Functions 286
        IGMPv2 Solicited Host Membership Report 286
        IGMPv2 Unsolicited Host Membership Report 288
        IGMPv2 Leave Group and Group-Specific Query Messages 289
        IGMPv2 Querier 291
    IGMPv2 Timers 292
    IGMP Version 3 292
IGMPv1 and IGMPv2 Interoperability 294
    IGMPv2 Host and IGMPv1 Routers 294
    IGMPv1 Host and IGMPv2 Routers 294
Comparison of IGMPv1, IGMPv2, and IGMPv3 295
LAN Multicast Optimizations 296
    Cisco Group Management Protocol 296
    IGMP Snooping 303
    Router-Port Group Management Protocol 307
    IGMP Filtering 309
    IGMP Proxy 310
Foundation Summary 314
Memory Builders 314
    Fill In Key Tables from Memory 314
    Definitions 315
    Further Reading 315
References in This Chapter 315
Chapter 8 IP Multicast Routing 317
“Do I Know This Already?” Quiz 317
Foundation Topics 321
Multicast Routing Basics 321
    Overview of Multicast Routing Protocols 322
        Multicast Forwarding Using Dense Mode 322
        Reverse Path Forwarding Check 323
        Multicast Forwarding Using Sparse Mode 325
    Multicast Scoping 327
        TTL Scoping 327
        Administrative Scoping 328
Dense-Mode Routing Protocols 329
    Operation of Protocol Independent Multicast Dense Mode 329
        Forming PIM Adjacencies Using PIM Hello Messages 329
        Source-Based Distribution Trees 330
        Prune Message 331
        PIM-DM: Reacting to a Failed Link 333
        Rules for Pruning 335
        Steady-State Operation and the State Refresh Message 337
        Graft Message 339
    LAN-Specific Issues with PIM-DM and PIM-SM 340
        Prune Override 340
        Assert Message 341
        Designated Router 343
        Summary of PIM-DM Messages 343
    Distance Vector Multicast Routing Protocol 344
    Multicast Open Shortest Path First 344
Sparse-Mode Routing Protocols 345
    Operation of Protocol Independent Multicast Sparse Mode 345
        Similarities Between PIM-DM and PIM-SM 346
        Sources Sending Packets to the Rendezvous Point 346
        Joining the Shared Tree 348
        Completion of the Source Registration Process 350
        Shared Distribution Tree 352
        Steady-State Operation by Continuing to Send Joins 353
        Examining the RP’s Multicast Routing Table 354
        Shortest-Path Tree Switchover 355
        Pruning from the Shared Tree 357
    Dynamically Finding RPs and Using Redundant RPs 358
        Dynamically Finding the RP Using Auto-RP 359
        Dynamically Finding the RP Using BSR 363
        Anycast RP with MSDP 365
        Interdomain Multicast Routing with MSDP 367
        Summary: Finding the RP 369
    Bidirectional PIM 370
    Comparison of PIM-DM and PIM-SM 371
    Source-Specific Multicast 372
Implementing IPv6 Multicast PIM 373
    Designated Priority Manipulation 376
    PIM6 Hello Interval 377
    IPv6 Sparse-Mode Multicast 379
    IPv6 Static RP 379
    IPv6 BSR 381
    Multicast Listener Discovery (MLD) 385
    Embedded RP 389
Foundation Summary 393
Memory Builders 397
    Fill In Key Tables from Memory 397
    Definitions 397
    Further Reading 397
Part V Security
Chapter 9 Device and Network Security 399
“Do I Know This Already?” Quiz 399
Foundation Topics 403
Router and Switch Device Security 403
    Simple Password Protection for the CLI 403
        Better Protection of Enable and Username Passwords 405
        Using Secure Shell Protocol 405
    User Mode and Privileged Mode AAA Authentication 406
        Using a Default Set of Authentication Methods 407
        Using Multiple Authentication Methods 408
        Groups of AAA Servers 410
        Overriding the Defaults for Login Security 410
    PPP Security 411
Layer 2 Security 412
    Switch Security Best Practices for Unused and User Ports 413
        Port Security 413
        Dynamic ARP Inspection 417
        DHCP Snooping 420
        IP Source Guard 422
        802.1X Authentication Using EAP 423
        Storm Control 426
    General Layer 2 Security Recommendations 427
Layer 3 Security 429
    IP Access Control List Review 430
        ACL Rule Summary 431
        Wildcard Masks 433
    General Layer 3 Security Considerations 433
        Smurf Attacks, Directed Broadcasts, and RPF Checks 433
        Inappropriate IP Addresses 435
        TCP SYN Flood, the Established Bit, and TCP Intercept 436
    Classic Cisco IOS Firewall 438
        TCP Versus UDP with CBAC 439
        Cisco IOS Firewall Protocol Support 439
        Cisco IOS Firewall Caveats 440
        Cisco IOS Firewall Configuration Steps 440
    Cisco IOS Zone-Based Firewall 441
    Control-Plane Policing 446
        Preparing for CoPP Implementation 447
        Implementing CoPP 448
    Dynamic Multipoint VPN 451
        Step 1: Basic Configuration of IP Addresses 452
        Step 2: GRE Multipoint Tunnel Configuration on All Routers (for Spoke-to-Spoke Connectivity) 453
        Step 3: Configure IPsec to Encrypt mGRE Tunnels 457
        Step 4: DMVPN Routing Configuration 459
IPv6 First Hop Security 461
    First Hop Security for IPv6 461
    Link Operations 463
        End Node Security Enforcement 463
        First Hop Switch Security Enforcement 464
        Last Router Security Enforcement 464
    ICMPv6 and Neighbor Discovery Protocol 464
        Secure Neighbor Discovery (SeND) 465
        Securing at the First Hop 466
    RA Guard 467
    DHCPv6 Guard 468
        DHCPv6 Guard and the Binding Database 469
    IPv6 Device Tracking 471
    IPv6 Neighbor Discovery Inspection 472
    IPv6 Source Guard 473
    Port Access Control Lists (PACL) 475
Foundation Summary 476
Memory Builders 480
    Fill In Key Tables from Memory 480
    Definitions 480
    Further Reading 480
Chapter 10 Tunneling Technologies 483
“Do I Know This Already?” Quiz 483
Foundation Topics 486
GRE Tunnels 486
    Dynamic Multipoint VPN Tunnels 487
        DMVPN Operation 488
        DMVPN Components 488
        DMVPN Operation 489
    IPv6 Tunneling and Related Techniques 495
        Tunneling Overview 496
        Manually Configured Tunnels 497
        Automatic IPv4-Compatible Tunnels 499
        IPv6-over-IPv4 GRE Tunnels 499
        Automatic 6to4 Tunnels 499
        ISATAP Tunnels 501
        SLAAC and DHCPv6 502
        NAT-PT 502
        NAT ALG 502
        NAT64 502
    Layer 2 VPNs 503
        Tagged Mode 503
        Raw Mode 503
        Layer 2 Tunneling Protocol (L2TPv3) 504
        AToM (Any Transport over MPLS) 504
        Virtual Private LAN Services (VPLS) 505
        Overlay Transport Virtualization (OTV) 506
    GET VPN 506
Foundation Summary 512
Memory Builders 512
    Definitions 512
Part VI Multiprotocol Label Switching (MPLS)
Chapter 11 Multiprotocol Label Switching 515
“Do I Know This Already?” Quiz 515
Foundation Topics 519
MPLS Unicast IP Forwarding 519
    MPLS IP Forwarding: Data Plane 520
        CEF Review 520
        Overview of MPLS Unicast IP Forwarding 521
        MPLS Forwarding Using the FIB and LFIB 522
        The MPLS Header and Label 524
        The MPLS TTL Field and MPLS TTL Propagation 524
    MPLS IP Forwarding: Control Plane 526
        MPLS LDP Basics 527
        The MPLS Label Information Base Feeding the FIB and LFIB 529
        Examples of FIB and LFIB Entries 532
        Label Distribution Protocol Reference 534
    The Problem: Duplicate Customer Address Ranges 535
    The Solution: MPLS VPNs 537
    MPLS VPN Control Plane 539
        Virtual Routing and Forwarding Tables 540
        MP-BGP and Route Distinguishers 541
        Route Targets 543
        Overlapping VPNs 545
    MPLS VPN Configuration 546
        Configuring the VRF and Associated Interfaces 548
        Configuring the IGP Between PE and CE 550
        Configuring Redistribution Between PE-CE IGP and MP-BGP 553
        Configuring MP-BGP Between PEs 555
    MPLS VPN Data Plane 558
        Building the (Inner) VPN Label 559
        Creating LFIB Entries to Forward Packets to the Egress PE 560
        Creating VRF FIB Entries for the Ingress PE 562
        Penultimate Hop Popping 564
Other MPLS Applications 565
Implement Multi-VRF Customer Edge (VRF Lite) 566
    VRF Lite, Without MPLS 566
    VRF Lite with MPLS 569
Foundation Summary 570
Memory Builders 570
    Fill In Key Tables from Memory 570
    Definitions 570
    Further Reading 570
Part VII Final Preparation

Chapter 12 Final Preparation 573
Tools for Final Preparation 573
Pearson Cert Practice Test Engine and Questions on the CD 573
    Install the Software from the CD 574
    Activate and Download the Practice Exam 574
    Activating Other Exams 575
    Premium Edition 575
The Cisco Learning Network 575
Memory Tables 575
Chapter-Ending Review Tools 576
Suggested Plan for Final Review/Study 576
Using the Exam Engine 576
Summary 577
Part VIII Appendixes
Appendix A Answers to the “Do I Know This Already?” Quizzes 579
Appendix B CCIE Exam Updates 583

Appendix C Decimal to Binary Conversion Table
Appendix D IP Addressing Practice
Appendix E Key Tables for CCIE Study
Appendix F Solutions for Key Tables for CCIE Study

9781587144912   TOC   10/22/2014



We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020