24.5.10
Knowledgenet 642-611 MPLS with elabs and study guide
The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.
* Explain basic core MPLS technology and concepts
* Explain the function of MPLS Labels and Label Stack
* Identify MPLS Applications
MPLS Operation
* Describe the characteristics and behaviors of Label Distribution in Frame-mode MPLS
* Explain Convergence in Frame-mode MPLS
* Describe the characteristics and behaviors of Label Distribution over LC-ATM Interfaces and VC Merge
* Describe the features of MPLS Label Allocation, Distribution, and Retention Modes
* Explain the process of LDP Neighbor Discovery
Frame-Mode/Cell-Mode MPLS Implementation, Configuration and Troubleshooting
* Identify the functions of CEF Switching
* Explain and configure Frame-mode MPLS on Cisco IOS platforms
* Monitor MPLS on Cisco IOS platforms - Frame-mode interfaces
* Troubleshoot Frame-Mode MPLS configurations on Cisco IOS Platforms
* Explain and configure Label-Controlled ATM MPLS
* Explain and configure LC-ATM MPLS over ATM Virtual Path
* Monitor LC-ATM MPLS on Cisco IOS platforms
MPLS Virtual Private Networks Technology
* Describe the characteristics and functions of Virtual Private Networks
* Describe Overlay and Peer-to-Peer VPNs
* Explain Major VPN Categorization
* Describe MPLS VPN Architecture
* Describe the MPLS VPN Routing Model
* Explain the process of MPLS VPN Packet Forwarding
MPLS VPN Implementation, Configuration and Troubleshooting
* Explain MPLS VPN Mechanisms supported on Cisco Platforms
* Configure VRF tables
* Configure MP-BGP Session between PE routers
* Configure Small Scale Routing Protocols
* Monitor MPLS VPN Operation
* Configure OSPF as the Routing Protocol
* Configure BGP as the Routing Protocol
* Troubleshoot basic MPLS VPN configuration errors
Complex MPLS VPNs
* Describe the advanced VRF Import/Export Features
* Explain the characteristics of Overlapping VPNs
* Explain the features of Central Services VPNs
* Describe Managed CE Router Service
Internet Access from a MPLS VPN
* Explain VPN Internet Access Topologies
* Describe VPN Internet Access Implementation Methods
* Describe the methods to Separate Internet Access from VPN Service
* Internet Access Backbone as a Separate VPN
For more information and download links check out comments
Internetwork Expert Open Series Lectures MPLS Troubleshooting
This release describes how to troubleshoot Multiprotocol Label Switching (MPLS).
check out comments for more.
8.2.10
Hot News:
CCNP TSHOOT 642-832 Official Certification Guide has been released today! for more information check out this link below....:
http://www.ciscopress.com/bookstore/product.asp?isbn=1587058448
26.1.10
CCNP Certification
Career Certifications & Paths
CCNP
CCNP Certification
Cisco Certified Network Professional (CCNP®) validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions. The CCNP certification is appropriate for those with at least one year of networking experience who are ready to advance their skills and work independently on complex network solutions. Those who achieve CCNP have demonstrated the skills required in enterprise roles such as network technician, support engineer, systems engineer or network engineer.
Find out more about changes to CCNP certification announced on January 25, 2010 and use our CCNP exam combination tool to show which additional exams are required, based on the exams you've already passed.
Partners: Log in for Partner E-Learning Connection (PEC) learning map
CCNP Prerequisites | |
---|---|
Valid CCNA certification or any CCIE Certification can act as a pre-requisite. | |
Until July 31, 2010 candidates have four different paths to CCNP certification: Path 1: Candidates already in the process of certifying may use their passing scores on ISCW and ONT. This path is not recommended for candidates who have not yet attempted ISCW or ONT. | |
CCNP Exams & Recommended Training | |
Required Exam(s) | Recommended Training |
642-901 BSCI
Last day to test: July 31, 2010 | Building Scalable Cisco Internetworks (BSCI) |
OR | |
642-902 ROUTE
Available March 10, 2010 | Implementing Cisco IP Routing (ROUTE) |
642-812 BCMSN
Last day to test: July 31, 2010 | Building Cisco Multilayer Switched Networks (BCMSN) |
OR | |
642-813 SWITCH
Available March 10, 2010 | Implementing Cisco IP Switched Networks (SWITCH) |
642-825 ISCW
Last day to test: July 31, 2010 | Implementing Secure Converged Wide Area Networks (ISCW) |
642-845 ONT
Last day to test: July 31, 2010 | Optimizing Converged Cisco Networks (ONT) |
OR | |
Path 2: Same as Path 1, except that the single COMP exam is used instead of the individual BSCI and BCMSN. Again, this path is not recommended for candidates who have not yet attempted ISCW or ONT. | |
Required Exam(s) | Recommended Training |
642-892 Composite
Last day to test: July 31, 2010 | Building Scalable Cisco Internetworks (BSCI)
Building Cisco Multilayer Switched Networks (BCMSN) |
642-825 ISCW
Last day to test: July 31, 2010 | Implementing Secure Converged Wide Area Networks (ISCW) |
642-845 ONT
Last day to test: July 31, 2010 | Optimizing Converged Cisco Networks (ONT) |
OR | |
Path 3: Candidates substitute the new TSHOOT exam (or TSHOOT beta exam) for ISCW and ONT, passing three exams to complete CCNP certification. This is the recommended path for candidates who have not yet taken the ISCW or ONT courses or exams and will become the only available path after July 31,2010. | |
Required Exam(s) | Recommended Training |
642-901 BSCI
Last day to test: July 31, 2010 | Building Scalable Cisco Internetworks (BSCI) |
OR | |
642-902 ROUTE
Available March 10, 2010 | Implementing Cisco IP Routing (ROUTE) |
642-812 BCMSN
Last day to test: July 31, 2010 | Building Cisco Multilayer Switched Networks (BCMSN) |
OR | |
642-813 SWITCH
Available March 10, 2010 | Implementing Cisco IP Switched Networks (SWITCH) |
643-832 TSHOOT BETA
Available: February 16-March 26, 2010 | Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) |
OR | |
642-832 TSHOOT
Available: April 30, 2010 | |
OR | |
Path 4: This is the recommended path for candidates who have passed the COMP exam but not ISCW or ONT. This path can also be used by candidates who will be ready to take (and pass) the COMP exam before July 31, 2010. Please note that candidates who fail an exam attempt must wait five (5) calendar days, beginning the day after the failed attempt, before they may retest for the same exam. | |
Required Exam(s) | Recommended Training |
642-892 Composite
Last day to test: July 31, 2010 | Building Scalable Cisco Internetworks (BSCI)
Building Cisco Multilayer Switched Networks (BCMSN) |
643-832 TSHOOT BETA
Available: February 16-March 26, 2010 | Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) |
OR | |
642-832 TSHOOT
Available: April 30, 2010 |
CCNP Recertification | |
---|---|
Cisco professional level certifications (CCDA, CCNP, CCDP, CCSP, CCVP, and CCIP) are valid for three years. To recertify, pass any 642 exam that is part of the professional level curriculum or any CCIE/CCDE written exam before the certification expiration date. Achieving or recertifying any of the certifications above automatically extends your active Associate and Professional level certification(s) up to the point of expiration of the last certification achieved. For more information, access the Cisco About Recertification page. | |
| |
|
MSTP - Features and characteristics
Where to Use MST
This diagram shows a common design that features access Switch A with 1000 VLANs redundantly connected to two distribution Switches, D1 and D2. In this setup, users connect to Switch A, and the network administrator typically seeks to achieve load balancing on the access switch Uplinks based on even or odd VLANs, or any other scheme deemed appropriate.
These sections are example cases where different types of STP are used on this setup:
PVST+ Case
In a Cisco Per-VLAN Spanning Tree (PVST+) environment, the spanning tree parameters are tuned so that half of the VLANs forward on each Uplink trunk. In order to easily achieved this, elect Bridge D1 to be the root for VLANs 501 through 1000, and Bridge D2 to be the root for VLANs 1 through 500. These statements are true for this configuration:
-
In this case, optimum load balancing results.
-
One spanning tree instance for each VLAN is maintained, which means 1000 instances for only two different final logical topologies. This considerably wastes CPU cycles for all of the switches in the network (in addition to the bandwidth used for each instance to send its own Bridge Protocol Data Units (BPDUs)).
Standard 802.1q Case
The original IEEE 802.1q standard defines much more than simply trunking. This standard defines a Common Spanning Tree (CST) that only assumes one spanning tree instance for the entire bridged network, regardless of the number of VLANs. If the CST is applied to the topology of this diagram, the result resembles the diagram shown here:
In a network running the CST, these statements are true:
MST Case
MSTs (IEEE 802.1s) combine the best aspects from both the PVST+ and the 802.1q. The idea is that several VLANs can be mapped to a reduced number of spanning tree instances because most networks do not need more than a few logical topologies. In the topology described in the first diagram, there are only two different final logical topologies, so only two spanning tree instances are really necessary. There is no need to run 1000 instances. If you map half of the 1000 VLANs to a different spanning tree instance, as shown in this diagram, these statements are true:
-
The desired load balancing scheme can still be achieved, because half of the VLANs follow one separate instance.
-
The CPU is spared because only two instances are computed.
From a technical standpoint, MST is the best solution. From an end-user's perspective, the main drawbacks associated with a migration to MST are:
-
The protocol is more complex than the usual spanning tree and requires additional training of the staff.
-
Interaction with legacy bridges can be a challenge. For more information refer, to the Interaction Between MST Regions and the Outside World section of this document.
MST Region
As previously mentioned, the main enhancement introduced by MST is that several VLANs can be mapped to a single spanning tree instance. This raises the problem of how to determine which VLAN is to be associated with which instance. More precisely, how to tag BPDUs so that the receiving devices can identify the instances and the VLANs to which each device applies.
The issue is irrelevant in the case of the 802.1q standard, where all instances are mapped to a unique instance. In the PVST+ implementation, the association is as follows:
-
Different VLANs carry the BPDUs for their respective instance (one BPDU per VLAN).
The Cisco MISTP sent a BPDU for each instance, including a list of VLANs that the BPDU was responsible for, in order to solve this problem. If by error, two switches were misconfigured and had a different range of VLANs associated to the same instance, it was difficult for the protocol to recover properly from this situation.
The IEEE 802.1s committee adopted a much easier and simpler approach that introduced MST regions. Think of a region as the equivalent of Border Gateway Protocol (BGP) Autonomous Systems, which is a group of switches placed under a common administration.
MST Configuration and MST Region
Each switch running MST in the network has a single MST configuration that consists of these three attributes:
-
An alphanumeric configuration name (32 bytes)
-
A configuration revision number (two bytes)
-
A 4096-element table that associates each of the potential 4096 VLANs supported on the chassis to a given instance
In order to be part of a common MST region, a group of switches must share the same configuration attributes. It is up to the network administrator to properly propagate the configuration throughout the region. Currently, this step is only possible by the means of the command line interface (CLI) or through Simple Network Management Protocol (SNMP). Other methods can be envisioned, as the IEEE specification does not explicitly mention how to accomplish that step.
Note: If for any reason two switches differ on one or more configuration attribute, the switches are part of different regions. For more information refer to the Region Boundary section of this document.
In order to ensure consistent VLAN-to-instance mapping, it is necessary for the protocol to be able to exactly identify the boundaries of the regions. For that purpose, the characteristics of the region are included in the BPDUs. The exact VLANs-to-instance mapping is not propagated in the BPDU, because the switches only need to know whether they are in the same region as a neighbor. Therefore, only a digest of the VLANs-to-instance mapping table is sent, along with the revision number and the name. Once a switch receives a BPDU, the switch extracts the digest (a numerical value derived from the VLAN-to-instance mapping table through a mathematical function) and compares this digest with its own computed digest. If the digests differ, the port on which the BPDU was received is at the boundary of a region. In generic terms, a port is at the boundary of a region if the designated bridge on its segment is in a different region or if it receives legacy 802.1d BPDUs. In this diagram, the port on B1 is at the boundary of region A, whereas the ports on B2 and B3 are internal to region B: According to the IEEE 802.1s specification, an MST bridge must be able to handle at least these two instances: One Internal Spanning Tree (IST) One or more Multiple Spanning Tree Instance(s) (MSTIs) The terminology continues to evolve, as 802.1s is actually in a pre-standard phase. It is likely these names will change in the final release of 802.1s. The Cisco implementation supports 16 instances: one IST (instance 0) and 15 MSTIs. In order to clearly understand the role of the IST instance, remember that MST originates from the IEEE. Therefore, MST must be able to interact with 802.1q-based networks, because 802.1q is another IEEE standard. For 802.1q, a bridged network only implements a single spanning tree (CST). The IST instance is simply an RSTP instance that extends the CST inside the MST region. The IST instance receives and sends BPDUs to the CST. The IST can represent the entire MST region as a CST virtual bridge to the outside world. These are two functionally equivalent diagrams. Notice the location of the different blocked ports. In a typically bridged network, you expect to see a blocked port between Switches M and B. Instead of blocking on D, you expect to have the second loop broken by a blocked port somewhere in the middle of the MST region. However, due to the IST, the entire region appears as one virtual bridge that runs a single spanning tree (CST). This makes it possible to understand that the virtual bridge blocks an alternate port on B. Also, that virtual bridge is on the C to D segment and leads Switch D to block its port. The exact mechanism that makes the region appear as one virtual CST bridge is beyond the scope of this document, but is amply described in the IEEE 802.1s specification. However, if you keep this virtual bridge property of the MST region in mind, the interaction with the outside world is much easier to understand. The MSTIs are simple RSTP instances that only exist inside a region. These instances run the RSTP automatically by default, without any extra configuration work. Unlike the IST, MSTIs never interact with the outside of the region. Remember that MST only runs one spanning tree outside of the region, so except for the IST instance, regular instances inside of the region have no outside counterpart. Additionally, MSTIs do not send BPDUs outside a region, only the IST does. MSTIs do not send independent individual BPDUs. Inside the MST region, bridges exchange MST BPDUs that can be seen as normal RSTP BPDUs for the IST while containing additional information for each MSTI. This diagram shows a BPDU exchange between Switches A and B inside an MST region. Each switch only sends one BPDU, but each includes one MRecord per MSTI present on the ports. Note: In this diagram, notice that the first information field carried by an MST BPDU contains data about the IST. This implies that the IST (instance 0) is always present everywhere inside an MST region. However, the network administrator does not have to map VLANs onto instance 0, and therefore this is not a source of concern. Unlike regular converged spanning tree topology, both ends of a link can send and receive BPDUs simultaneously. This is because, as shown in this diagram, each bridge can be designated for one or more instances and needs to transmit BPDUs. As soon as a single MST instance is designated on a port, a BPDU that contains the information for all instances (IST+ MSTIs) is to be sent. The diagram shown here demonstrates MST BDPUs sent inside and outside of an MST region: The MRecord contains enough information (mostly root bridge and sender bridge priority parameters) for the corresponding instance to calculate its final topology. The MRecord does not need any timer-related parameters such as hello time, forward delay, and max age that are typically found in a regular IEEE 802.1d or 802.1q CST BPDU. The only instance in the MST region to use these parameters is the IST; the hello time determines how frequently BPDUs are sent, and the forward delay parameter is mainly used when rapid transition is not possible (remember that rapid transitions do not occur on shared links). As MSTIs depend on the IST to transmit their information, MSTIs do not need those timers. The independence between instance and VLAN is a new concept that implies you must carefully plan your configuration. The IST Instance is Active on All Ports, Whether Trunk or Access section illustrates some common pitfalls and how to avoid them. This diagram shows Switches A and B connected with access ports each located in different VLANs. VLAN 10 and VLAN 20 are mapped to different instances. VLAN 10 is mapped to instance 0, while VLAN 20 is mapped to instance 1.MST Instances
IST Instances
MSTIs
Common Misconfigurations
IST Instance is Active on All Ports, Whether Trunk or Access
How is that possible in such a simple topology, with no apparent loop?
This diagram shows the logical topology of the IST instance:
Two VLANs Mapped to the Same Instance Block the Same Ports
Remember that VLAN no longer means spanning tree instance. The topology is determined by the instance, regardless of the VLANs mapped to it. This diagram shows a problem that is a variant of the one discussed in the IST Instance is Active on All Ports, Whether Trunk or Access section:
Suppose that VLANs 10 and 20 are both mapped to the same instance (instance 1). The network administrator wants to manually prune VLAN 10 on one Uplink and VLAN 20 on the other in order to restrict traffic on the Uplink trunks from Switch A to distribution Switches D1 and D2 (an attempt to achieve a topology as described in the previous diagram). Shortly after this is completed, the network administrator notices that users in VLAN 20 have lost connectivity to the network.
This is a typical misconfiguration problem. VLANs 10 and 20 are both mapped to instance 1, which means there is only one logical topology for both VLANs. Load-sharing cannot be achieved, as shown here:
Because of the manual pruning, VLAN 20 is only allowed on the blocked port, which explains the loss of connectivity. In order to achieve load balancing, the network administrator must map VLAN 10 and 20 to two different instances.
A simple rule to follow to steer clear of this problem is to never manually prune VLANs off a trunk. If you decide to remove some VLANs off a trunk, remove all the VLANs mapped to a given instance together. Never remove an individual VLAN from a trunk and not remove all the VLANs that are mapped to the same instance.
Interaction Between the MST Region and the Outside World
With a migration to an MST network, the administrator is likely to have to deal with interoperability issues between MST and legacy protocols. MST seamlessly interoperates with standard 802.1q CST networks; however, only a handful of networks are based on the 802.1q standard because of its single spanning tree restriction. Cisco released PVST+ at the same time as support for 802.1q was announced. Cisco also provides an efficient yet simple compatibility mechanism between MST and PVST+. This mechanism is explained later in this document.
The first property of an MST region is that at the boundary ports no MSTI BPDUs are sent out, only IST BPDUs are. Internal instances (MSTIs) always automatically follow the IST topology at boundary ports, as shown in this diagram:
In this diagram, assume VLANs 10 through 50 are mapped to the green instance, which is an internal instance (MSTI) only. The red links represent the IST, and therefore also represent the CST. VLANs 10 through 50 are allowed everywhere in the topology. BPDUs for the green instance are not sent out of the MST region. This does not mean that there is a loop in VLANs 10 through 50. MSTIs follow the IST at the boundary ports, and the boundary port on Switch B also blocks traffic for the green instance.
Switches that run MST are able to automatically detect PVST+ neighbors at boundaries. These switches are able to detect that multiple BPDUs are received on different VLANs of a trunk port for the instance.
This diagram shows an interoperability issue. An MST region only interacts with one spanning tree (the CST) outside of the region. However, PVST+ bridges run one Spanning Tree Algorithm (STA) per VLAN, and as a result, send one BPDU on each VLAN every two seconds. The boundary MST bridge does not expect to receive that many BPDUs. The MST bridge either expects to receive one or to send one, depending on whether the bridge is the root of the CST or not.
Cisco developed a mechanism to address the problem shown in this diagram. A possibility could have consisted of tunneling the extra BPDUs sent by the PVST+ bridges across the MST region. However, this solution has proven to be too complex and potentially dangerous when first implemented in the MISTP. A simpler approach was created. The MST region replicates the IST BPDU on all the VLANs to simulate a PVST+ neighbor. This solution implies a few constraints that are discussed in this document.
Recommended Configuration
As the MST region now replicates the IST BPDUs on every VLAN at the boundary, each PVST+ instance hears a BPDU from the IST root (this implies the root is located inside the MST region). It is recommended that the IST root have a higher priority than any other bridge in the network so that the IST root becomes the root for all of the different PVST+ instances, as shown in this diagram:
In this diagram, Switch C is a PVST+ redundantly connected to an MST region. The IST root is the root for all PVST+ instances that exist on Switch C. As a result, Switch C blocks one of its Uplinks in order to prevent loops. In this particular case, interaction between PVST+ and the MST region is optimal because:
-
Switch C's Uplink ports' costs can be tuned to achieve load balancing of the different VLANs across the Uplinks' ports (because Switch C runs one spanning tree per VLAN, this switch is able to chose which Uplink port blocks on a per-VLAN basis).
-
UplinkFast can be used on Switch C to achieve fast convergence in case of an Uplink failure.
Alternate Configuration (Not Recommended)
Another possibility is to have the IST region be the root for absolutely no PVST+ instance. This means that all PVST+ instances have a better root than the IST instance, as shown in this diagram:
This case corresponds to a PVST+ core and an MST access or distribution layer, a rather infrequent scenario. If you establish the root bridge outside the region, there are these drawbacks as compared to the previously recommended configuration:
-
An MST region only runs one spanning tree instance that interacts with the outside world. This basically means that a boundary port can only be blocking or forwarding for all VLANs. In other terms, there is no load balancing possible between the region's two Uplinks that lead to Switch C. The Uplink on Switch B for the instance will be blocking for all VLANs while Switch A will be forwarding for all VLANs.
-
This configuration still allows for fast convergence inside the region. If the Uplink on Switch A fails, a fast switchover to an Uplink on a different switch needs to be achieved. While the way the IST behaves inside the region in order to have the whole MST region resemble a CST bridge was not discussed in detail, you can imagine that a switchover across a region is never as efficient as a switchover on a single bridge.
Invalid Configuration
While the PVST+ emulation mechanism provides easy and seamless interoperability between MST and PVST+, this mechanism implies that any configuration other than the two previously mentioned is invalid. These are the basic rules that must be followed to get a successful MST and PVST+ interaction:
-
If the MST bridge is the root, this bridge must be the root for all VLANs.
-
If the PVST+ bridge is the root, this bridge must be the root for all VLANs (including the CST, which always runs on VLAN 1, regardless of the native VLAN, when the CST runs PVST+).
-
The simulation fails and produces an error message if the MST bridge is the root for the CST, while the PVST+ bridge is the root for one or more other VLANs. A failed simulation puts the boundary port in root inconsistent mode.
In this diagram, Bridge A in the MST region is the root for all three PVST+ instances except one (the red VLAN). Bridge C is the root of the red VLAN. Suppose that the loop created on the red VLAN, where Bridge C is the root, becomes blocked by Bridge B. This means that Bridge B is designated for all VLANs except the red one. An MST region is not able to do that. A boundary port can only be blocking or forwarding for all VLANs because the MST region is only running one spanning tree with the outside world. Thus, when Bridge B detects a better BPDU on its boundary port, the bridge invokes the BPDU guard to block this port. The port is placed in the root inconsistent mode. The exact same mechanism also leads Bridge A to block its boundary port. Connectivity is lost; however, a loop-free topology is preserved even in the presence of such a misconfiguration.
Note: As soon as a boundary port produces a root inconsistent error, investigate whether a PVST+ bridge has attempted to become the root for some VLANs.
Migration Strategy
The first step in the migration to 802.1s/w is to properly identify point-to-point and edge ports. Ensure all switch-to-switch links, on which a rapid transition is desired, are full-duplex. Edge ports are defined through the PortFast feature. Carefully decide how many instances are needed in the switched network, and keep in mind that an instance translates to a logical topology. Decide what VLANs to map onto those instances, and carefully select a root and a back-up root for each instance. Choose a configuration name and a revision number that will be common to all switches in the network. Cisco recommends that you place as many switches as possible into a single region; it is not advantageous to segment a network into separate regions. Avoid mapping any VLANs onto instance 0. Migrate the core first. Change the STP type to MST, and work your way down to the access switches. MST can interact with legacy bridges running PVST+ on a per-port basis, so it is not a problem to mix both types of bridges if interactions are clearly understood. Always try to keep the root of the CST and IST inside the region. If you interact with a PVST+ bridge through a trunk, ensure the MST bridge is the root for all VLANs allowed on that trunk.
For sample configurations, refer to:
-
Configuration Example to Migrate the Spanning Tree from PVST+ to MST
-
Spanning Tree from PVST+ to Rapid-PVST Migration Configuration Example
Conclusion
Switched networks must fulfill stringent robustness, resiliency, and high-availability requirements. With growing technologies such as Voice over IP (VoIP) and Video over IP, fast convergence around link or component failures is no longer a desirable characteristic: fast convergence is a must. However, until recently, redundant switched networks had to rely on the relatively sluggish 802.1d STP to achieve those goals. This often turned out to be the network administrator's most challenging task. The only way to get a few seconds off the protocol was to tune the protocol timers, but often at the detriment of the network's health. Cisco has released many 802.1d STP augmentations such as UplinkFast, BackboneFast and PortFast, features that paved the way toward faster spanning tree convergence. Cisco also answered large Layer 2 (L2)-based networks' scalability issues with the development of the MISTP. The IEEE recently decided to incorporate most of these concepts into two standards: 802.1w (RSTP) and 802.1s (MST). With the implementation of these new protocols, convergence times in the low hundreds of milliseconds can be expected while scaling to thousands of VLANs. Cisco remains the leader in the industry and offers these two protocols along with proprietary augmentations in order to facilitate the migration of and interoperability with legacy bridges.
26.11.09
CCNA Lan switching ---- Final exam
Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. The show ip interface brief is issued on Router1 and the show interfaces trunk command is issued on the Switch1 to verify the current status. The administrator applies the additional configuration shown in the exhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be applied
to the switch?
Switch(config)# interface vlan 1
Switch(config-if)# ip address 10.1.1.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254
Switch(config)# interface vlan 1
Switch(config-if)# ip address 10.1.50.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.50.254
Switch(config)# interface vlan 10
Switch(config-if)# ip address 10.1.10.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254
==> Switch(config)# interface vlan 10
Switch(config-if)# ip address 10.1.1.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254
Switch(config)# interface vlan 50
Switch(config-if)# ip address 10.1.10.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254
2
Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?
802.1Q encapsulation prepends a 4-byte tag field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.
==> 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.
802.1Q encapsulation prepends an 802.1p field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.
802.1Q encapsulation inserts an 802.1p field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.
3
What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
==> All VLANs will be allowed across the trunk.
Only VLAN 1 will be allowed across the trunk.
Only the native VLAN will be allowed across the trunk.
The switches will negotiate via VTP which VLANs to allow across the trunk.
4
Which parameter is used to uniquely identify one wireless network from another?
==> SSID
OFDM
WEP
DSSS
5
Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?
SW1 port F0/1 transitions to the learning state.
==> SW1 port F0/1 can generate a temporary loop.
SW1 port F0/1 becomes a non-designated port.
SW1 port F0/2 no longer passes BPDUs to SW4.
6
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?
QoS
routing
==> trunking
VPN
7
Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)
==> S1 Gi0/1 becomes a root port.
S2 Gi0/2 becomes a non-designated port.
S3 Gi0/1 becomes a non-designated port.
S4 Gi0/1 becomes a root port.
==> S4 Gi0/2 becomes a designated port.
8
Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)
This switch shows no configuration revision errors.
This switch has established two-way communication with the neighboring devices.
==> This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.
This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.
==> This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.
9
Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?
==> S1 port Fa0/11 is in the wrong VLAN.
R1 does not have an active routing protocol.
The IP address of computer 1 is in the wrong logical network.
Router interface Fa0/0 has the wrong trunk encapsulation type configured.
10
Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?
Allow all VLANs on the trunk link.
Remove the native VLAN from the trunk.
Include a router or switch with Layer 3 capabilities.
==> Configure the same native VLAN on both ends of the trunk.
11
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?
Configure VLANs with different VLAN IDs on switch SW2.
==> Reconfigure the trunk port on switch SW2 with static trunk configuration.
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.
12
What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?
A new RSA key pair is created.
The switch defaults to allowing Telnet connections only.
The switch is no longer able to make SSH connections as an SSH client.
==> The switch allows remote connections only after a new RSA key pair is generated.
13
Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?
==> forward the frame out all interfaces except Interface3
add station 00-00-3D-1F-11-05 to Interface2 in the forwarding table
forward the frame out Interface3
discard the frame
forward the frame out all interfaces
forward the frame out Interface2
14
Which two statements describe Spanning Tree Protocol? (Choose two.)
==> It eliminates Layer 2 loops in network topologies.
It eliminates the need for redundant physical paths in network topologies.
==> It can only be used in networks in which Layer 2 switching is in use.
It can only be used in networks where both routers and switches are used together.
It can only be used in networks where routers are installed.
15
Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host?
192.168.1.11 /28
==> 192.168.1.22 /28
192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28
16
Refer to the exhibit. How does SW1 manage traffic coming from Host A?
SW1 drops the traffic because it is untagged.
==> SW1 leaves the traffic untagged and forwards it over the trunk.
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.
17
Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)
A new VLAN can be added to Switch1 and that information will be added only to Switch2.
==> A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4
==> An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.
A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.
A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.
18
Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast?
computer B
computer B and Router1
==> computer C and Router1
computer B, computer D, computer E and Router1
computer B, computer C, computer D, computer E and Router1
computer A, computer B, computer C, computer D, computer E and Router1
19
Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections fail. What is the most likely cause of this problem?
The SSH version number is wrong.
SSH has been configured on the wrong line.
Telnet and SSH cannot be configured simultaneously.
==> The transport input command is configured incorrectly.
20
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A
Cat-B
==> Cat-C
Cat-D
21
Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLANs will be pruned from switch SW3?
==> VLAN 10 and VLAN 20
VLAN 1, VLAN 10, and VLAN 20
VLAN 1, VLAN 1002 through 1005
VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 1005
22
Refer to the exhibit. What does STATIC indicate in the output that is shown?
The switch will not allow any other device to connect to port Fa0/15.
==> Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15.
This entry will be removed and refreshed every 300 seconds to keep it in the table.
The switch learned this MAC address from the source address in a frame received on Fa0/15.
When processing a frame, the switch does not have to perform a lookup to determine the final destination port.
29.10.09
vmware 7.0 final
Most Advanced Virtualization Platform
VMware Workstation provides the most dependable, high performing, and secure virtual machine platform. It offers the broadest host and guest operating system support, the richest user experience, and the most comprehensive feature set.
Run More Operating Systems
With support for over 200 operating systems including Windows 7, Windows Server 2008 R2 and over 20 other versions of Windows, along with Redhat, Ubuntu, OpenSuse and 26 additional versions of Linux. VMware Workstation delivers the broadest guest platform support for running multiple operating systems at the same time on your PC.
Indispensable Tool for Professionals
Automate and streamline tasks to save time and improve productivity. Run applications in Linux, Windows, and more at the same time on the same PC with no rebooting. Evaluate and test new operating systems, applications and patches in an isolated environment. Demonstrate complex software applications on a single laptop in a repeatable, reliable manner. Rich integration with Visual Studio, Eclipse, and the SpringSource Tool Suite make it incredibly easy to debug applications on multiple platforms.
Enjoy!
15.10.09
Cisco 7200 IOS 12.4-13b
Router 7200 general features
Protect your investments and meet new and future network needs with the modular Cisco 7200 Series, which supports a wide range of density, performance, and service requirements.
The industry’s most widely deployed universal services aggregation router for enterprise and service provider edge applications, the Cisco 7200 Series offers:
- Exceptional price/performance: The new NPE-G2 Network Processing Engine aggregates services at up to 2 Mpps
- A wide range of connectivity options and numerous features including serviceability and manageability
- Increased VPN performance with the new VPN Services Adapter
- Increased scalability and flexibility with the new Port Adapter Jacket Card
Benefits:
- WAN edge: Award-winning quality of service (QoS) feature performance
- Broadband aggregation: Up to 16,000 PPP sessions per chassis
- Multiprotocol Label Switching (MPLS): Leading choice for provider-edge deployment
- IP Security (IPsec) VPN: Scalable to 5000 tunnels per chassis
- High-end customer premises equipment (CPE)
- IP-to-IP gateway support: Provides a network-to-network interface point for signaling interworking (H.323, SIP), media interworking, address and port translations (privacy and topology hiding), billing and CDR normalization, and bandwidth management (QoS marking using TOS)
- Voice, video, and data integration: TDM-enabled VXR chassis and voice port adapters
- Modular design: 3RU footprint with broad range of flexible, modular interfaces (from DS0 to OC-3)
- Flexibility: Support for Fast Ethernet, Gigabit Ethernet, Packet over SONET and more
11.10.09
Looking for cisco Documents
All cisco docs collected till now:
Cisco.Building.Cisco.Multilayer.Switched.Networks.BCMSN.Student.Guide.V3.0.Vol.1.rar=5144086
Cisco.Building.Cisco.Multilayer.Switched.Networks.BCMSN.Student.Guide.V3.0.Vol.2.rar=8785552
Cisco.Building.Cisco.Multilayer.Switched.Networks.BCMSN.Student.Guide.V3.0.Volume.1.and.2.rar=13930151
Cisco.Building.Scalable.Cisco.Internetworks.BSCI.Student.Guide.v3.0.vol.1.rar=5966498
Cisco.Building.Scalable.Cisco.Internetworks.BSCI.Student.Guide.v3.0.vol.2.rar=5796489
Cisco.Building.Scalable.Cisco.Internetworks.BSCI.Student.Guide.v3.0.Volume.1.and.2.rar=11763707
Cisco.Implementing.Secure.Converged.Wide.Area.Networks.ISCW.Student.Guide.v1.0.Vol1.rar=8441604
Cisco.Implementing.Secure.Converged.Wide.Area.Networks.ISCW.Student.Guide.v1.0.Vol2.rar=4522781
Cisco.Implementing.Secure.Converged.Wide.Area.Networks.ISCW.Student.Guide.Volume.1.and.Volume.2.rar=12964557
Cisco.Networking.Academy.Program.Full.rar=246299633
Cisco.Networking.Academy.Program.IP.Telephone.v1.0.rar=13636309
Cisco.Optimizing.Converged.Cisco.Networks.ONT.Student.Guide.v1.0.vol.1.rar=8595964Cisco.Optimizing.Converged.Cisco.Networks.ONT.Student.Guide.v1.0.vol.2.rar=2934136
Cisco.Optimizing.Converged.Cisco.Networks.ONT.Student.Guide.v1.0.Volume.1.and.2.rar=11529868
Cisco.OSPF.Design.Rv.1.1.rar=381872
Cisco.Press.2000.Voice.over.IP.Fundamentals.rar=4029458
Cisco.Press.802.11.Wireless.LAN.Fundamentals.chm=4179276
Cisco.Press.802.11.Wireless.Network.Site.Surveying.and.Installation.chm=17686775
Cisco.Press.ACS.User.Guide.V4.0.rar=4347365
Cisco.Press.Advanced.BGP.and.Troubleshooting.rar=998797
Cisco.Press.Advanced.Host.Intrusion.Prevention.with.CSA.rar=26123748
Cisco.Press.Advanced.IP.EIGRP.Troubleshooting.rar=836269
Cisco.Press.Advanced.MPLS.Design.and.Implementation.rar=7588998
Cisco.Press.Advanced.Optical.Technology.Concepts.rar=1185921
Cisco.Press.Aironet.Wireless.LAN.Fundamentals.AWLF.3.1.rar=6466179
Cisco.Press.Application.Acceleration.and.WAN.Optimization.Fundamentals.chm=7432582
Cisco.Press.ASA.All.in.One.Firewall.IPS.and.VPN.Adaptive.Security.Appliance.chm=21424088
Cisco.Press.ASA.and.PIX.Firewall.Handbook.chm=21415641
Cisco.Press.Authorized.Self.Study.Guide.Cisco.IP.Telephony.CIPT.2nd.Ed.chm=31513597
Cisco.Press.Authorized.Self.Study.Guide.Cisco.Voice.over.IP.CVoice.2nd.Ed.chm=10566546
Cisco.Press.Authorized.Self.Study.Guide.Cisco.Voice.over.IP.CVOICE.chm=10566546
Cisco.Press.BCMSN.2.1.rar=11773148
Cisco.Press.BCMSN.Official.Exam.642.812.Certification.Guide.4th.Ed.CD.rar=27741417
Cisco.Press.BCMSN.Official.Exam.642.812.Certification.Guide.4th.Ed.rar=6981403
Cisco.Press.BCRAN.2.1.rar=14554539
Cisco.Press.BGP.4.Command.and.Configuration.Handbook.chm=1698673
Cisco.Press.BGP.Commands.rar=346650
Cisco.Press.Build.the.Best.Data.Center.Facility.for.Your.Business.chm=4497811
Cisco.Press.Building.MPLS.Based.Broadband.Access.VPNs.chm=5945723
Cisco.Press.Building.Multiservice.Transport.Networks.chm=19412854
Cisco.Press.Building.Resilient.IP.Networks.chm=3917202
Cisco.Press.Business.Case.for.Network.Security.chm=4930328
Cisco.Press.CallManager.Fundamentals.A.Cisco.AVVID.Solution.2nd.Ed.chm=11368060
Cisco.Press.Campus.Network.Design.Fundamentals.chm=3609030
Cisco.Press.Campus.Network.Design.Fundamentals.rar=3325560
Cisco.Press.CANAC.Implementing.Cisco.NAC.Appliance.Lab.Guide.Ver.2.1.rar=690392
Cisco.Press.CANAC.Implementing.Cisco.NAC.Appliance.Student.Guide.Ver.2.1.Vol.1.rar=9491463
Cisco.Press.CANAC.Implementing.Cisco.NAC.Appliance.Student.Guide.Ver.2.1.Vol.2.rar=739797
Cisco.Press.Catalyst.LAN.Switching.HTML.rar=8792279
Cisco.Press.Catalyst.QoS.in.Campus.Networks.chm=2406995
Cisco.Press.CCDA Official.Exam.Certification.Guide.3rd.Ed.rar=5923650
Cisco.Press.CCDA.Exam.Certification.Guide.rar=3826342
Cisco.Press.CCDA.Official.Exam.Certification.Guide.3rd.Ed.chm=7803790
Cisco.Press.CCDA.Quick.Reference.Sheets.rar=941014
Cisco.Press.CCIE.Advanced.MPLS.Design.rar=7589029
Cisco.Press.CCIE.Practical.Studies.Security.rar=13352458
Cisco.Press.CCIE.Practical.Studies.Volume.I.chm=7416812
Cisco.Press.CCIE.Practical.Studies.Volume.I.rar=7453619
Cisco.Press.CCIE.Practical.Studies.Volume.II.rar=13434711
Cisco.Press.CCIE.Preparing.For.The.CCIE.Routing.and.Switching.Lab.2.1.Student.Guide.1.rar=6979885
Cisco.Press.CCIE.Professional.Development.Advanced.IP.Network.Design.rar=4259492
Cisco.Press.CCIE.Professional.Development.Cisco.LAN.Switching.rar=7483229
Cisco.Press.CCIE.Professional.Development.Inside.Cisco.IOS.Software.Architecture.rar=2478935
Cisco.Press.CCIE.Professional.Development.Large.Scale.IP.Network.Solutions.rar=6614657
Cisco.Press.CCIE.Professional.Development.Network.Security.Principles.and.Practices.chm=5083273
Cisco.Press.CCIE.Professional.Development.OSPF.Command.and.Configuration.Handbook.chm=1943313
Cisco.Press.CCIE.Professional.Development.Routing.and.Switching.Exam.Certification.Guide.2nd.Ed.rar=4003777
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.1.2nd.Ed.chm=9809942
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.2.chm=6948813
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.2.rar=88311172
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.I.chm=7789497
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.I.rar=11749573
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.II.chm=6948813
Cisco.Press.CCIE.Professional.Development.Series.Network.Security.Technologies.and.Solutions.chm=27270040
Cisco.Press.CCIE.Professional.Development.Troubleshooting.IP.Routing.Protocols.chm=10003351
Cisco.Press.CCIE.Professional.Development.Troubleshooting.IP.Routing.Protocols.rar=9261161
Cisco.Press.CCIE.Professional.Development.Troubleshooting.Remote.Access.Networks.rar=8910796
Cisco.Press.CCIE.Routing.and.Switching.Certification.Guide.rar=8858815
Cisco.Press.CCIE.Routing.and.Switching.Exam.Certification.Guide.rar=9547146
Cisco.Press.CCIE.Routing.and.Switching.Official.Exam.Certification.Guide.2nd.Ed.rar=4249436
Cisco.Press.CCIE.Routing.And.Switching.Official.Exam.Certification.Guide.3nd.Ed.rar=8253347
Cisco.Press.CCIE.Routing.and.Switching.Practice.Labs.chm=3209868
Cisco.Press.CCIE.Routing.TCP.IP.Volume.One.rar=11750598
Cisco.Press.CCIE.Routing.TCP.IP.Volume.Two.rar=88311149
Cisco.Press.CCIE.Security.Exam.Certification.Guide.rar=7781476
Cisco.Press.CCIE.Security.Exam.Certification.Guide.V2.0.rar=8401397
Cisco.Press.CCIE.Security.Practice.Labs.chm=4758838
Cisco.Press.CCIE.Security.Practice.Labs.rar=10704904
Cisco.Press.CCIE.Self.Study.CCIE.Practical.Studies.Volume.I.rar=7477055
Cisco.Press.CCIE.Self.Study.CCIE.Practical.Studies.Volume.II.rar=14929136
Cisco.Press.CCIE.Self.Study.CCIE.Security.Exam.Certification.Guide.CD.rar=17977865
Cisco.Press.CCIE.Self.Study.CCIE.Security.Exam.Certification.Guide.rar=6583621
Cisco.Press.CCIE.Self.Study.CCIE.Security.Practice.Labs.chm=4758838
Cisco.Press.CCIE.Self.Study.Practical.Studies.Secturity.ISO=22036480
Cisco.Press.CCIP.MPLS.and.VPN.Architectures.rar=6433469
Cisco.Press.CCNA.3.Companion.Guide.Switching.Basics.and.Intermediate.Routing.rar=50394134
Cisco.Press.CCNA.640.607.rar=6705838
Cisco.Press.CCNA.Exam.640.507.Certification.Guide.rar=4625109
Cisco.Press.CCNA.ICND.2004.rar=8782091
Cisco.Press.CCNA.ICND.Certification.Guide.rar=4960998
Cisco.Press.CCNA.ICND.Certification.Guide.zip=11245257
Cisco.Press.CCNA.INTRO.Exam.Certification.Guide.rar=5300432
Cisco.Press.CCNA.INTRO.Exam.Certification.Guide.zip=8268196
Cisco.Press.CCNA.Portable.Command.Guide.2nd.Ed.rar=4527777
Cisco.Press.CCNA.Portable.Command.Guide.chm=1348155
Cisco.Press.CCNA.Practical.Studies.chm=2661136
Cisco.Press.CCNA.Security.640.553.IINS.Official.Exam.Cert.Guide.rar=31225321
Cisco.Press.CCNA.Security.Official.Exam.Certification.Guide.Exam.640.553.rar=13779329
Cisco.Press.CCNA.Voice.Official.Exam.Certification.Guide.640.460.rar=25810441
Cisco.Press.CCNA.Wireless.Official.Exam.Certification.Guide.IUWNE.640.721.rar=12486798
Cisco.Press.CCNP BSCI Quick Reference Sheets_ Exam 642-901.rar=9234316
Cisco.Press.CCNP.640.503.Routing.Exam.Certification.Guide.rar=4204955
Cisco.Press.CCNP.BCMSN.Exam.Certification.Guide.2nd.CD.rar=25075383
Cisco.Press.CCNP.BCMSN.Exam.Certification.Guide.2nd.Ed.zip=28176304
Cisco.Press.CCNP.BCMSN.Exam.Certification.Guide.Exam.642-811.3rd.Ed.chm=2886232
Cisco.Press.CCNP.BCMSN.Official.Exam.Certification.Guide.4th.Ed.rar=6981776
Cisco.Press.CCNP.BCMSN.Official.Exam.Certification.Guide.642.812.4th.Ed.rar=7209897
Cisco.Press.CCNP.BCMSN.Portable.Command.Guide.rar=3786293
Cisco.Press.CCNP.BCMSN.Quick.Reference.Sheets.rar=1791321
Cisco.Press.CCNP.BCMSN.Self.Study.1st.Ed.rar=5840149
Cisco.Press.CCNP.BCRAN.Exam.Certification.Guide.2nd.CD.rar=25298866
Cisco.Press.CCNP.BCRAN.Exam.Certification.Guide.2nd.Ed.zip=25686173
Cisco.Press.CCNP.BCRAN.Self.Study.2nd.Ed.rar=6121866
Cisco.Press.CCNP.BSCI.Exam.Certification.Guide.3rd.CD.rar=36363535
Cisco.Press.CCNP.BSCI.Exam.Certification.Guide.3rd.Ed.chm=4169068
Cisco.Press.CCNP.BSCI.Exam.Certification.Guide.3rd.Ed.zip=36907287
Cisco.Press.CCNP.BSCI.Official.Exam.Certification.Guide.4th.Ed.chm=7099562
Cisco.Press.CCNP.BSCI.Portable.Command.Guide.642.901.rar=1208578
Cisco.Press.CCNP.BSCI.Quick.Reference.Sheets.rar=1703456
Cisco.Press.CCNP.BSCI.Self.Study.3rd.Ed.rar=11238075
Cisco.Press.CCNP.BSCI.v5.Student.Lab.Manual.rar=5651965
Cisco.Press.CCNP.Building.Scalable.Internetworks.BSCI.642.901.v5.0.Student.Lab.Manual.rar=2903970
Cisco.Press.CCNP.CIT.Exam.Certification.Guide.2nd.CD.rar=23351768
Cisco.Press.CCNP.CIT.Exam.Certification.Guide.2nd.Ed.zip=23774742
Cisco.Press.CCNP.CIT.Self.Study.2nd.Ed.rar=5015442
Cisco.Press.CCNP.ISCW.Official.Exam.Certification.Guide.rar=15552756
Cisco.Press.CCNP.ISCW.Portable.Command.Guide.rar=5381323
Cisco.Press.CCNP.ISCW.Quick.Reference.Sheets.rar=32262874
Cisco.Press.CCNP.ONT.Official.Exam.Certification.Guide.rar=10009642
Cisco.Press.CCNP.ONT.Portable.Command.Guide.chm=14603841
Cisco.Press.CCNP.ONT.Quick.Reference.Sheets.642.845.rar=1460781
Cisco.Press.CCNP.ONT.Quick.Reference.Sheets.rar=1548703
Cisco.Press.CCNP.Practical.Studies.Remote.Access.rar=5760204
Cisco.Press.CCNP.Practical.Studies.Routing.rar=2538306
Cisco.Press.CCNP.Practical.Studies.Routing.zip=2554536
Cisco.Press.CCNP.Practical.Studies.Troubleshooting.rar=13017973
Cisco.Press.CCNP.Quick.Reference.Jun.2008.rar=3371007
Cisco.Press.CCNP.Quick.Reference.rar=2234378
Cisco.Press.CCNP.Remote.Access.Exam.Certification.Guide.rar=7817676
Cisco.Press.CCNP.Routing.Exam.Certification.Guide.Appendix.rar=265616
Cisco.Press.CCNP.Routing.Exam.Certification.Guide.pdf.rar=5618453
Cisco.Press.CCNP.Routing.Exam.Certification.Guide.rar=4246253
Cisco.Press.CCNP.Self.Study.BCMSN.Official.Exam.Certification.Guide.642.812.4th.Ed.rar=7113268
Cisco.Press.CCNP.Self.Study.Certification.Library.3rd.Ed.rar=129685757
Cisco.Press.CCNP.Support.Exam.Certification.Guide.rar=3809656
Cisco.Press.CCNP.Switching.Exam.Certification.Guide.rar=2618796
Cisco.Press.CCSP.642.502.SNRS.Exam.Certification.Guide.chm=10421940
Cisco.Press.CCSP.642.502.SNRS.Exam.Certification.Guide.rar=14594928
Cisco.Press.CCSP.642.532.IPS.Exam.Certification.Guide.chm=12927447
Cisco.Press.CCSP.642.541.CSI.Exam.Certification.Guide.rar=3976116
Cisco.Press.CCSP.Cisco.Secure.PIX.Firewall.Advanced.Exam.Certification.Guide.2nd.Ed.chm=12030216
Cisco.Press.CCSP.Cisco.Secure.PIX.Firewall.Advanced.Exam.Certification.Guide.CD.rar=25298035
Cisco.Press.CCSP.Cisco.Secure.PIX.Firewall.Advanced.Exam.Certification.Guide.rar=8158618
Cisco.Press.CCSP.Cisco.Secure.PIX.Firewall.Advanced.Exam.Certification.Guide.zip=27431155
Cisco.Press.CCSP.Cisco.Secure.VPN.Exam.Certification.Guide.CD.rar=21774855
Cisco.Press.CCSP.Cisco.Secure.VPN.Exam.Certification.Guide.rar=16537689
Cisco.Press.CCSP.Cisco.Secure.VPN.Exam.Certification.Guide.zip=24641986
Cisco.Press.CCSP.CSI.Exam.Cert.Guide.rar=3976094
Cisco.Press.CCSP.CSI.Exam.Certification.Guide.2nd.Ed.chm=7465727
Cisco.Press.CCSP.CSI.Exam.Certification.Guide.rar=3976103
Cisco.Press.CCSP.CSI.Exam.Certification.Guide.zip=5723593
Cisco.Press.CCSP.Flash.Cards.and.Exam.Practice.Pack.bin=49606032
Cisco.Press.CCSP.Flash.Cards.And.Exam.Practice.Pack.chm=4700071
Cisco.Press.CCSP.IPS.Exam.Certification.Guide.rar=15796463
Cisco.Press.CCSP.SECUR.Exam.Certification.Guide.rar=5045436
Cisco.Press.CCSP.Secure.Exam.Certification.Guide.rar=5070123
Cisco.Press.CCSP.Secure.Exam.Certification.Guide.zip=7291677
Cisco.Press.CCSP.Self.Study.CCSP.CSI.Exam.Certification.Guide.2nd.Ed.chm=7465727
Cisco.Press.CCSP.SNPA.Exam.Certification.Guide.3rd.Ed.rar=4515058
Cisco.Press.CCSP.SNPA.Official.Exam.Certification.Guide.3rd.Ed.rar=5515080
Cisco.Press.CCSP.SNRS.Exam.Certification.Guide.rar=14335756
Cisco.Press.CCSP.SNRS.Quick.Reference.Sheets.rar=1130109
Cisco.Press.Cisco.802.11.Wireless.Networking.Quick.Reference.chm=4804836
Cisco.Press.Cisco.Access.Control.Security.AAA.Administration.Services.chm=16294845
Cisco.Press.Cisco.Access.Control.Security.AAA.Administration.Services.rar=15721702
Cisco.Press.Cisco.AS5.00.Case.Study.for.Basic.IP.Modem.Services.rar=973445
Cisco.Press.Cisco.ASA.all.In.One.Firewall.IPs.And.VPN.Adaptive.Security.Appliance.chm=21424088
Cisco.Press.Cisco.ASA.and.PIX.Firewall.Handbook.chm=21415641
Cisco.Press.Cisco.ASA.PIX.and.FWSM.Handbook.2nd.Ed.rar=7869602
Cisco.Press.Cisco.ASA.PIX.and.FWSM.Handbook.2nd.Edition.Aug.2007.rar=7870701
Cisco.Press.Cisco.AVVID.Network.Infrastructure.Enterprise.Wireless.LAN.Deisgn.rar=1435189
Cisco.Press.Cisco.BGP.4.Command.and.Configuration.Handbook.CCIE.Professional.Development.chm=1698673
Cisco.Press.Cisco.BGP.4.Command.and.Configuration.Handbook.CCIE.Professional.Development_.rar=2023290
Cisco.press.Cisco.BGP.4.Command.and.Configuration.Handbook.rar=49386274
Cisco.Press.Cisco.CallManager.Best.Practices.A.Cisco.AVVID.Solution.chm=7980653
Cisco.Press.Cisco.CallManager.Fundamentals.2nd.Ed.chm=11368060
Cisco.Press.Cisco.CallManager.Fundamentals.A.Cisco.AVVID.Solution.2nd.Ed.chm=11368060
Cisco.Press.Cisco.Catalyst.2950.Desktop.Switch.Software.Configuration.Guide.rar=3630886
Cisco.Press.Cisco.Catalyst.QoS.Quality.of.Service.in.Campus.Networks.rar=5414214
Cisco.Press.Cisco.CCNA.640.607.Flash.Card.Pratice.Kit.zip=51277711
Cisco.Press.Cisco.CCNP.Remote.Access.Exam.Certification.Guide.640.505.rar=7740230
Cisco.Press.Cisco.DQOS.Exam.Certification.Guide.rar=6590562
Cisco.Press.Cisco.Express.Forwarding.chm=5152013
Cisco.Press.Cisco.Express.Forwarding.rar=2734820
Cisco.Press.Cisco.Field.Manual.Catalyst.Switch.Configuration.chm=1455664
Cisco.Press.Cisco.Frame.Relay.Solutions.Guide.chm=4619867
Cisco.Press.Cisco.IP.Communications.Express.Callmanager.Express.with.Cisco.Unity.Express.2005.chm=35716612
Cisco.Press.Cisco.IP.Telephony.Network.Design.Guide.rar=4409217
Cisco.Press.Cisco.IP.Telephony.Planning.Design.Implementation.Operation.and.Optimization.chm=16130828
Cisco.Press.Cisco.IP.Telephony.Volume.1.CIPT1.Student.Guide.V4.1.rar=1380412
Cisco.Press.Cisco.ISP.Essentials.rar=2427322
Cisco.Press.Cisco.LAN.Switching.1st.Ed.rar=7475720
Cisco.Press.Cisco.LAN.Switching.Fundamentals.chm=4404599
Cisco.Press.Cisco.Lan.Switching.rar=11117814
Cisco.Press.Cisco.Multiservice.Switching.Networks.chm=3482909
Cisco.Press.Cisco.NAC.Appliance.Enforcing.Host.Security.with.Clean.Access.rar=37765526
Cisco.Press.Cisco.Nac.Appliance.rar=22362897
Cisco.Press.Cisco.Network.Admission.Control.Volume.2.NAC.Deployment.and.Troubleshooting.rar=11133386
Cisco.Press.Cisco.Network.Admission.Control.Volume.II.rar=11136425
Cisco.Press.Cisco.Network.Design.Solutions.for.Small.Medium.Businesses.chm=1609675
Cisco.Press.Cisco.Network.Security.Troubleshooting.Handbook.chm=12187567
Cisco.Press.Cisco.Networking.Simplified.2nd.Ed.rar=13980881
Cisco.Press.Cisco.OSPF.Command.and.Configuration.Handbook.CCIE.Professional.Development.rar=4122595
Cisco.Press.Cisco.Router.Firewall.Security.chm=6076961
Cisco.Press.Cisco.Router.Firewall.Security.rar=15022793
Cisco.Press.Cisco.Secure.Firewall.Services.Module.FWSM.rar=2030199
Cisco.Press.Cisco.Secure.Internet.Security.Solutions.rar=6352352
Cisco.Press.Cisco.Secure.Virtual.Private.Networks.Ver.4.7.Full.NFW.D.rar=19810718
Cisco.Press.Cisco.Security.Agent.chm=26980719
Cisco.Press.Cisco.Security.Appliance.Command.Line.Configuration.Guide.For.the.Cisco.ASA.5500.Series.and.Cisco.PIX.500.Series.rar=7302901
Cisco.Press.Cisco.Threat.Control.Multilanguage.v2007.rar=253138802
Cisco.Press.Cisco.Unity.Fundamentals.chm=7704697
Cisco.Press.Cisco.Voice.over.IP.CVOICE.3rd.Ed.rar=6595537
Cisco.Press.Comparing.Designing.and.Deploying.VPNs.chm=41464852
Cisco.Press.Configuring.BGP.StudentGuide.v.3.2.Vol.1.rar=3244311
Cisco.Press.Configuring.BGP.StudentGuide.v.3.2.Vol.2.rar=3976987
Cisco.Press.Configuring.Callmanager.and.Unity.a.Step.by.Step.Guide.2005.chm=32856846
Cisco.Press.Configuring.Callmanager.and.Unity.a.Step.by.Step.Guide.chm=32856846
Cisco.Press.Configuring.IPSec.Between.PIX.and.Cisco.VPN.Client.Using.Smartcard.Certificates.rar=621471
Cisco.Press.Content.Networking.Fundamentals.chm=15497591
Cisco.Press.CSPFA.Cisco.Secure.PIX.Firewall.Advanced.Student.Guide.v1.01.rar=3704988
Cisco.Press.Data.Center.Design.and.Implementation.rar=704141
Cisco.Press.Definitive.MPLS.Network.Designs.chm=20624697
Cisco.Press.Deploying.Cisco.Wide.Area.Application.Services.chm=13078244
Cisco.Press.Deploying.IP.v6.Networks.chm=9805967
Cisco.Press.Deploying.IPv6.Networks.chm=9805967
Cisco.Press.Deploying.License.Free.Wireless.Wide.Area.Networks.rar=4307690
Cisco.Press.Deploying.Voice.over.Wireless.LANs.chm=2236909
Cisco.Press.Designing.ATM.MPLS.Networks.rar=1147507
Cisco.Press.Designing.for.Cisco.Internetwork.Solutions.2nd.Ed.rar=6543878
Cisco.Press.Designing.for.Cisco.Internetwork.Solutions.DESGN.Exam.640.863.2nd.Ed.rar=7449500
Cisco.Press.Designing.Network.Security.rar=726168
Cisco.Press.Designing.Perimeter.Security.rar=4876024
Cisco.Press.Designing.VPN.Security.rar=7497632
Cisco.Press.Designing.VPN.Security.V1.0.rar=7497648
Cisco.Press.DQOS.Exam.Certification.Guide.rar=6345980
Cisco.Press.Enabling.Enterprise.Miltihoming.with.Cisco.IOS.Network.Address.Translation.rar=365430
Cisco.Press.End.to.End.Network.Security.Defense.in.Depth.rar=17292788
Cisco.Press.End.to.End.Network.Security.rar=11599079
Cisco.Press.End.to.End.QoS.Network.Design.Quality.of.Service.in.LANs.WANs.and.VPNs.chm=14253141
Cisco.Press.Enhanced.ip.services.for.cisco.networks.rar=42447679
Cisco.Press.Fault.Tolerant.IP.and.MPLS.Networks.chm=7859131
Cisco.Press.Fax.Modem.and.Text.for.IP.Telephony.rar=5049026
Cisco.Press.Firewall.Fundamentals.chm=10542083
Cisco.Press.Firewall.Fundamentals.rar=4101046
Cisco.Press.First.Mile.Access.Networks.and.Enabling.Technologies.chm=2330742
Cisco.Press.Frame.Relay.Solutions.Guide.chm=4619867
Cisco.Press.Global.IPv6.Strategies.for.Business.Analysis.to.Operatonal.Planning.rar=2101590
Cisco.Press.Global.IPv6.Strategies.From.Business.Analysis.to.Operational.Planning.rar=2105274
Cisco.Press.Home.Network.Security.Simplified.chm=14844984
Cisco.Press.iExec.Enterprise.Essentials.Companion.Guide.rar=2436530
Cisco.Press.IGRP.Commands.rar=33481
Cisco.Press.Implementing.Cisco.Unified.Communications.Manager.Part.1.CIPT1.rar=15310121
Cisco.Press.Implementing.MPLS.Student.Guide.v2.0.rar=11279066
Cisco.Press.Inside.Cisco.IOS.Software.Architecture.rar=2469047
Cisco.Press.Integrated.Cisco.and.Unix.Network.Architectures.chm=4804211
Cisco.Press.Interconnecting.Cisco.Network.Devices.Part.1.ICND1.2nd.Ed.rar=4487998
Cisco.Press.Interconnecting.Cisco.Network.Devices.Part.2.ICND2.3rd.Ed.rar=2307605
Cisco.Press.Interdomain.Multicast.Solutions.Guide.chm=2257955
Cisco.Press.Internet.Phone.Services.Simplified.chm=4950370
Cisco.press.Internet.Routing.Architectures.2nd.Ed.rar=4677257
Cisco.Press.Internet.Routing.Architectures.2nd.rar=4526048
Cisco.Press.Internet.Routing.Architectures.rar=4274639
Cisco.Press.Internetwork.Design.Guide.rar=3058176
Cisco.Press.Internetwork.Troubleshooting.Guide.rar=2455950
Cisco.Press.Internetworking.Basics.iso=150054912
Cisco.Press.Internetworking.Case.Studies.rar=1083287
Cisco.Press.Internetworking.Design.Guide.rar=2159346
Cisco.Press.Internetworking.Technologies.Handbook.4th.Ed.rar=14031243
Cisco.Press.Internetworking.Technology.Overview.rar=2491043
Cisco.Press.Internetworking.Terms.and.Acronyms.rar=1160237
Cisco.Press.Internetworking.Troubleshooting.Handbook.rar=1092805
Cisco.Press.Intrusion.Detection.Planning.Guide.rar=159493
Cisco.Press.Intrusion.Prevention.Fundamentals.chm=2211497
Cisco.Press.IOS.Reference.Guide.rar=365400
Cisco.Press.IOS.Software.Quality.of.Service.Solutions.rar=321418
Cisco.Press.IP.Enhanced.EIGRP.Commands.rar=146619
Cisco.Press.IP.Routing.Fundamentals.rar=1377226
Cisco.Press.IP.Services.Commands.rar=308798
Cisco.Press.IP.Telephony.CIPT.Authorized.Self.Study.Guide.2nd.Ed.chm=31513597
Cisco.Press.IP.Telephony.Unveiled.2004.rar=4664645
Cisco.Press.IPSec.VPN.Design.chm=9303240
Cisco.Press.IS.IS.Network.Design.Solutions.chm=3171278
Cisco.Press.IT.Essentials.PC.Hardware.and.Software.Companion.Guide.3rd.Ed.rar=26346358
Cisco.Press.IT.Essentials.PC.Hardware.and.Software.Labs.and.Study.Guide.3rd.Ed.rar=10774266
Cisco.Press.LAN.Switch.Security.rar=2781837
Cisco.Press.LAN.Switching.First.Step.chm=5544743
Cisco.Press.LAN.Switching.Fundamentals.chm=4404599
Cisco.Press.Layer.2.VPN.Architectures.chm=8323657
Cisco.Press.Metro.Ethernet.rar=3677271
Cisco.Press.MPLS.and.Next.Generation.Networks.chm=8128465
Cisco.Press.MPLS.and.Next.Generation.Networks.rar=4124934
Cisco.Press.MPLS.and.VPN.Architectures.chm=4245655
Cisco.Press.MPLS.and.VPN.Architectures.Volume.2.rar=5608522
Cisco.Press.MPLS.and.VPN.Architectures.Volume.I.chm=4245655
Cisco.Press.MPLS.and.VPN.Architectures.Volume.II.rar=5609203
Cisco.Press.MPLS.Configuration.on.Cisco.IOS.Software.chm=35355109
Cisco.Press.MPLS.Fundamentals.rar=3421271
Cisco.Press.MPLS.Implementing.Cisco.MPLS.v.2.1.Vol.1.rar=4453804
Cisco.Press.MPLS.Implementing.Cisco.MPLS.v.2.1.Vol.2.rar=4200010
Cisco.Press.MPLS.VPN.Security.chm=5545963
Cisco.Press.NAC.Appliance.Enforcing.Host.Security.with.Clean.Access.rar=22358420
Cisco.Press.Network.Consultants.Handbook.rar=7259758
Cisco.Press.Network.Management.Accounting.and.Performance.Strategies.chm=10698721
Cisco.Press.Network.Management.chm=10698721
Cisco.Press.Network.Management.Fundamentals.rar=4627086
Cisco.Press.Network.Security.Architectures.chm=5129082
Cisco.Press.Network.Security.Architectures.rar=12124518
Cisco.Press.Network.Security.Fundamentals.chm=19370935
Cisco.Press.Network.Security.Principles.and.Practices.chm=5083273
Cisco.Press.Network.Security.rar=10605247
Cisco.Press.Network.Security.Technologies.and.Solutions.chm=27270040
Cisco.Press.Network.Security.Troubleshooting.Handbook.chm=12187567
Cisco.Press.Network.Virtualization.chm=8448488
Cisco.Press.Next.Generation.Network.Services.chm=8505354
Cisco.Press.Optical.Network.Design.and.Implementation.chm=21848517
Cisco.Press.Optimal.Routing.Design.chm=6680531
Cisco.Press.Optimizing.Applications.on.Cisco.Networks.chm=3945735
Cisco.Press.OSPF.Command.and.Configuration.Handbook.chm=1943313
Cisco.Press.OSPF.Commands.rar=224876
Cisco.Press.OSPF.Network.Design.Solutions.2nd.Ed.rar=9860311
Cisco.Press.OSPF.Network.Design.Solutions.chm=7067224
Cisco.Press.Overview.of.Access.VPNs.and.Tunneling.Technologies.rar=503367
Cisco.Press.Overview.of.Token.Ring.Switching.rar=464647
Cisco.Press.PacketCable.Implementation.chm=60650041
Cisco.Press.Packetized.Voice.and.Data.Integration.rar=2208538
Cisco.Press.Penetration.Testing.and.Network.Defense.chm=15336025
Cisco.Press.Penetration.Testing.Network.Defense.chm=15330169
Cisco.Press.Performance.and.Fault.Management.chm=1987858
Cisco.Press.Practical.Service.Level.Management.Delivering.High.Quality.Web.Based.Services.chm=1245201
Cisco.Press.Practical.Study.Remote.Access.chm=2590549
Cisco.Press.QoS.for.IP.MPLS.Networks.chm=4385790
Cisco.Press.QOS.Implementing.Cisco.QoS.StudentGuide.v.2.2.Vol.I.II.rar=10803302
Cisco.Press.Router.Firewall.Security.chm=6076961
Cisco.Press.Router.Security.Strategies.Securing.IP.Network.Traffic.Planes.rar=2755799
Cisco.Press.Routing.and.Switching.rar=31715916
Cisco.Press.Routing.first.step.chm=5319301
Cisco.Press.Routing.TCP.IP. Volume.1.rar=11750587
Cisco.Press.Routing.TCP.IP. Volume.2.rar=88311138
Cisco.Press.Routing.TCP.IP.Vol.1.2nd.Ed.chm=9809942
Cisco.Press.Routing.TCP.IP.Volume.1.2nd.Ed.chm=9809942
Cisco.Press.Routing.TCP.IP.Volume.I.CCIE.Professional.Development.rar=11750621
Cisco.Press.Routing.TCP.IP.Volume.II.CCIE.Professional.Development.rar=6466853
Cisco.Press.SCND.StudentGuide.v.2.0.Vol.1.rar=6292020
Cisco.Press.SCND.StudentGuide.v.2.0.Vol.2.rar=5752305
Cisco.Press.Securing.Hosts.Using.CSA.StudentGuide.v.2.0.rar=6672783
Cisco.Press.Securing.Your.Business.with.Cisco.ASA.and.PIX.Firewalls.chm=4978423
Cisco.Press.Security.Monitoring.with.Cisco.Security.MARS.rar=19267527
Cisco.Press.Security.Threat.Mitigation.and.Response.chm=8926575
Cisco.Press.Security.Threat.Mitigation.And.Response.Understanding.Cisco.Security.Mars.chm=8926575
Cisco.Press.Selecting.MPLS.VPN.Services.chm=6688189
Cisco.Press.Self.Defending.Networks.The.Next.Generation.of.Network.Security.chm=17110639
Cisco.Press.Self.Defending.Networks.The.Next.Generation.of.Network.Security.rar=58260870
Cisco.Press.Self.Study.CCSP.Cisco.Secure.VPN.Exam.Certification.Guide.rar=14876350
Cisco.Press.SNA.Frame.Relay.rar=122015
Cisco.Press.SNA.Over.FrameRelay.rar=121979
Cisco.Press.SNPA.v.4.0.Vol.1.rar=9638712
Cisco.Press.SNRS.LabGuide.v2.0.rar=1264975
Cisco.Press.SNRS.StudentGuide.v2.0.Vol.1.rar=4088798
Cisco.Press.SNRS.StudentGuide.v2.0.Vol.2.rar=3883485
Cisco.Press.SNRS.StudentGuide.v2.0.Vol.3.rar=1532163
Cisco.Press.SSL.Remote.Access.VPNs.rar=12160514
Cisco.Press.Storage.Networking.Fundamentals.chm=10807182
Cisco.Press.Storage.Networking.Protocol.Fundamentals.chm=7025388
Cisco.Press.Student.Guide.Configuring.BGP.on.Cisco.Routers.Student.Guide.vol.1.and.vol.2.Ver.3.rar=8709860
Cisco.Press.TCP.IP.First.Step.chm=7670621
Cisco.Press.Telecommunications.Technologies.Reference.rar=3159580
Cisco.Press.The.Business.Case.for.E-Learning.chm=966492
Cisco.Press.The.Business.Case.for.Enterprise.Class.Wireless.Lans.chm=2490570
Cisco.Press.The.Business.Case.For.Network.Security.Advocacy.Governance. and.ROI.chm=4930328
Cisco.Press.The.Business.Case.for.Storage.Networks.chm=1273268
Cisco.Press.The.Complete.Cisco.VPN.Configuration.Guide.chm=15135724
Cisco.Press.The.Complete.Cisco.VPN.Configuration.Guide.rar=35006318
Cisco.Press.The.Definitive.BGP.Resource.Internet.Routing.Architectures.2nd.Edition.rar=4539291
Cisco.Press.The.Road.to.IP.Telephony.How.Cisco.Systems.Migrated.from.PBX.to.IP.Telephony.chm=2655032
Cisco.Press.Top.Down.Network.Design.2nd.Ed.chm=3000181
Cisco.Press.Top.Down.Network.Design.2nd.Ed.rar=5886345
Cisco.Press.Traffic.Engineering.with.MPLS.rar=4262483
Cisco.Press.Troubleshooting.IP.Routing.Protocols.CCIE.Professional.Development.chm=10003351
Cisco.Press.Troubleshooting.IP.Routing.Protocols.CCIE.Professional.Development.rar=15300246
Cisco.Press.Troubleshooting.Remote.Access.Networks.chm=3595286
Cisco.Press.Troubleshooting.Remote.Access.Networks.rar=6073238
Cisco.Press.Understanding.Cisco.Security.MARS.chm=8926575
Cisco.Press.User.Guide.for.Cisco.Security.MARS.rar=4673822
Cisco.Press.Voice.and.Video.Conferencing.Fundamentals.rar=4513962
Cisco.Press.Voice.Gateways.and.Gatekeepers.chm=9043008
Cisco.Press.Voice.Over.IP.First-Step.chm=4032822
Cisco.Press.Voice.Over.IP.Fundamentals.2nd.Ed.chm=4646834
Cisco.Press.Voice.over.IP.Fundamentals.rar=3972801
Cisco.Press.WAN.Quick.Start.Self.Paced.Course.Preparation.Guide.rar=1174927
Cisco.Press.Wi.Fi.Hotspots.chm=9144688
Cisco.Press.Wireless.LAN.Security.chm=6058499
Cisco.Press.Wireless.Networks.First.Step.chm=1224399
Cisco.Securing.Hosts.Using.Cisco.Security.Agent.HIPS.Student.Guide.V2.0.rar=6672794
Cisco.Security.Appliance.Command.Line.Configuration.Guide.For.the.Cisco.ASA.5500.Series.and.Cisco.PIX.500.Series.rar=7302889
Cisco.Unified.Communications.System.Engineer.UCSE.Student.Guide.V1.3.rar=6167298
Cisco.Voice.Student.Handbook.v1.0.rar=17889807
CNAP.CCNP.Semester.1.Advanced.Routing.3.0.rar=25295980
CNAP.CCNP.Semester.2.Remote.Access.3.0.rar=30484213
CNAP.CCNP.Semester.3.Switching.3.0.rar=23787707
CNAP.CCNP.Semester.4.Support.3.0.rar=26148118
Check comments, Enjoy!!!