HCIA~HCIP personal notes index

HCIA~HCIE Personal Notes Index

HCIA part (2022.11.27~2022.12.19)

1.0.0 Huawei equipment telnet and ssh configuration
1.1.0 Huawei equipment FTP server
2.0.0 Differences and working methods of Ethernet CSMA-CD and CSMA-CA
2.1.0 Ethernet Ethernet frame format and packet fragmentation
2.10. 0 Ethernet Traditional STP Spanning Tree (Introduction, Working Mode)
2.10.1 Ethernet Traditional STP Spanning Tree (STP BPDU, STP Port Status, STP Working Process)
2.10.2 Ethernet Traditional STP Spanning Tree (STP Temporary Loop, STP BPDU forwarding process, root bridge failure case)
2.11.0 Ethernet RSTP rapid spanning tree (introduction, RSTP and STP, RSTP BPDU, RSTP port status, PA mechanism of RSTP working process)
2.12.0 Ethernet MSTP multi-instance spanning tree (Introduction, MSTP and RSTP, STP connection, MSTP BPDU format, introduction to MSTP key terms)
2.13.0 Ethernet STP, RSTP, MSTP configuration, spanning tree security operation
2.14.0 Ethernet DHCP (Introduction, DHCP working principle, lease 2.14.1
Ethernet DHCP (8 types of DHCP messages, DHCP configuration, DHCP relay)
2.2.0 Data transmission process between Ethernet network equipment and terminal equipment in Ethernet
2.3.0 Ethernet ARP frame and ARP working process
2.4.0 Ethernet collision domain and broadcast domain
2.5.0 Ethernet dod, TCP-IP, OSI model
2.6.0 Ethernet Ethernet address (MAC address)
2.7.0 Ethernet TCP protocol (three-way handshake, four second wave)
2.7.1 Ethernet TCP protocol (data interaction process, window mechanism)
2.7.2 Ethernet TCP protocol (state machine change after TCP message interaction)
2.7.3 Ethernet TCP protocol (when packet loss occurs during TCP interaction) Solution mechanism - list part)
2.8.1 Ethernet VLAN (introduction, MAC address table and VLAN)
2.8.2 Ethernet VLAN (VLAN data frame format, switch interface type)
2.8.3 Ethernet VLAN (VLAN division method)
2.8. 4 Ethernet VLAN (single-arm routing and the VlanIF interface of the three-layer switch)
2.9.0 Ethernet network high availability (link aggregation, LACP mode, static manual mode)
2.9.1 Ethernet network high availability (stacking and clustering) 【无真机实验暂未发布文章】
3.0 .0 IPv4 ACL list (introduction, ACL classification, ACL configuration, wildcard)
3.1.0 Wide area network (introduction, PPP, PAP, CHAP, PPPOE)
4.0.0 Routing classification (IGP and EGP, direct connection, static, dynamic) and Routing Table Introduction
4.1.0 Routing NAT (Introduction, Static NAT, Dynamic NAT, NATServer, NAPT, Easy-ip, NAT Address Mapping Table) 4.2.0
Routing OSPF (Introduction, OSPF and Static, OSPF Area Concept, OSPF Routing Synonym)
4.2.1 Routing OSPF (OSPF common 4 network types, OSPF header information)
4.2.2 Routing OSPF (OSPF 5 types of messages, 8 state machines, formation of neighbors and adjacencies)
4.2.3 Routing OSPF (OSPF three Zhang table, association between LSA-LSDB-SPF-routing table, 8 necessary conditions for OSPF establishment)
4.2.4 Routing OSPF (OSPF router-id, OSPF basic configuration)

HCIP section

1.0.0 Introduction of routing OSPF LSA, detailed introduction of types 1~7 LSA
1.1.0 Introduction of routing OSPF special area, Stub, Totally Stub, NSSA Totally NSSA
1.2.0 Routing OSPF optimization (FA address, routing summary, routing filtering, area authentication , interface authentication)

2.0.0 ISIS introduction, NSAP and NET address, Router-Id converted to NET address
2.1.0 ISIS router level level-1, level-2, level-1-2, message format
2.2.0 ISIS 4 kinds of messages Type IIH, LSP, CSNP, PSNP, neighbor establishment process, interactive LSP process
2.3.0 Introduction to ISIS basic commands and query commands, ISIS and OSPF, DU bit function, OL bit function, Tag marking function, route penetration and route import features , LSDB alias, internal and external route priority.
2.4.0 ISIS and OSPF dual-point bidirectional introduction and configuration, problems existing in dual-point bidirectional

3.0.0 The routing policy router-policy of the routing tool, the difference between the acl list and the ip-prefix prefix list, and the filter list filter-policy 3.1.0 How to use the routing policy
to solve the suboptimal path and loop caused by ISIS and OSPF dual-point bidirectional Hidden dangers
3.1.1 Two-point two-way ISIS and OSPF, OSPF and OSPF, ISIS and ISIS environments are solved by routing strategies (1tag, 2tag, 4tag introduction and configuration)

3.2.0 Routing tool policy-based-routing, MQC modular Qos command line, MQC three axes flow classification, flow behavior, flow policy
4.0.0 BGP background, reasons for using BGP, introduction to BGP
4.1.0 BGP 5 4.2.0 Introduction of ten
BGP path attributes and their modification methods
4.3.0 BGP eleven routing principles and precautions for BGP route transfer
4.4.0 Detailed Explanation of BGP Route Reflector, Introduction and Experiment of RR Reflection Cluster and RR Anti-ring Mechanism

The latest update time: 2023.6.10, some articles could not be accessed normally due to the expiration of vip - it has been repaired.

おすすめ

転載: blog.csdn.net/qq_45443704/article/details/128616234