640-605 Remote Access 2.0 考试大纲
★Exam Description The Remote Access exam (RMTAC 640-605) is one exam within two different series of exams required to achieve either CCNP or CCDP Routing and Switching certification. ★Exam Topics The following topics are general guidelin
★Exam Description
The Remote Access exam (RMTAC 640-605) is one exam within two different series of exams required to achieve either CCNP or CCDP Routing and Switching certification.
★Exam Topics
The following topics are general guidelines for the content likely to be included on the Remote Access exam. However, other related topics may also appear on any specific delivery of the exam.
■.Cisco Remote Access Networks Introduction
* Specify and /or identify the Cisco products that best meet the WAN connection requirements for permanent or dialup access connections
■.Selecting CISCO Products for Remote Connections
* Explain and/or identify the advantages and disadvantages of WAN connection types
* Select the appropriate WAN connection types that address specific site connection considerations.
* Select Cisco equipment that will suit the specific needs of a WAN topology
■.Assembling and Cabling the WAN Components
* Identify the components and connections necessary to allow WAN connections like Frame Relay, and ISDN PRI from the central site to a branch office.
* Identify the components and connections necessary to allow WAN connections like Frame Relay, and ISDN BRI from a branch office to the central site
* Identify the components and connections necessary to allow a WAN connections like ISDN BRI from a telecommuter site to the central site
■.Configuring Asynchronous Connections to a Central Site with Modems
* Specify the commands and procedures necessary to configure an access server for modem connectivity so telecommuters can access the central site.
* Specify the commands and procedures to configure the central site for dial out connections.
* Specify the commands used to reverse Telnet to the modem and configure the modem for basic asynchronous operations.
* Specify the commands and procedures used to set up the modem autoconfiguration feature.
■.Configuring PPP and Controlling Network Access with PAP and CHAP
* Specify the commands and syntax used to configure a PPP connection between the central site and a branch office
* Specify the commands and syntax to configure PAP or CHAP authentication to allow access to a secure site.
* Configure Multilink PPP to increase the data throughput.
* Specify the commands used to verify proper PPP configuration and troubleshoot an incorrect PPP configuration.
* Accessing the Central Site with Windows 95
* Specify the commands and procedures to configure a PC to complete a dialup call to the central site router through the traditional telephone network.
■.Using ISDN and DDR Technologies to Enhance Remote Connectivity
* Identify when to use ISDN BRI and PRI services and select the service that best suits a set of given requirements.
* Identify the Q.921 and Q.931 signaling and call setup sequences.
* Specify the commands used to configure ISDN BRI and PRI
* Specify the commands used to configure DDR
■.Optimizing the use of DDR Interfaces
* Specify or select appropriate dialup capabilities to place a call.
* Specify the commands and procedures to configure rotary groups and dialer profiles
* Specify the commands used to verify proper dialer profile or rotary group configuration and troubleshoot an incorrect configuration.
■.Using X.25 for Remote Access
* Specify the commands and procedures to configure an X.25 WAN connection between the central office and branch office
* Specify proper X.121 addresses and the commands used to assign them to router interfaces
* Specify the commands and procedures used to verify proper X.25 configuration and troubleshoot incorrect X.25 configuration
■.Establishing a Dedicated Frame Relay Connection and Control Traffic Flow
* Specify the commands and procedures used to configure a Frame Relay WAN connection between the central office and branch office
* Specify the commands to configure subinterfaces on virtual interfaces to solve split horizon problems.
* Specify the commands used to configure Frame Relay traffic shaping.
* Specify the commands and procedures used to verify proper Frame Relay configuration and troubleshoot an incorrect configuration
■.Enabling a Backup to the Permanent Connection
* Specify the procedure and commands used to configure a backup connection that activates upon primary line failure.
* Specify the procedure and commands used to configure a backup connection to activate when the primary line reaches a specified threshold.
* Specify the procedure and commands used to configure a dialer to function as backup to the primary interface.
■.Managing Network Performance with Queuing and Compression
* Determine why queuing is enabled, identify alternative queuing protocols that Cisco products support, and determine the best queuing method to implement.
* Specify the commands to configure weighted-fair, priority and custom queuing
* Specify the commands and procedures used to verify proper queuing configuration and troubleshoot incorrect configuration
* Specify the commands and procedures used to effectively select and implement compression
■.Scaling IP Addresses with Network Address Translation
* Describe how NAT and PAT operate.
* Specify the commands and procedures to configure NAT and PAT to allow reuse of registered IP addresses in a private network.
* Verify proper configuration of NAT and PAT with available Cisco verification commands.
■.Using AAA to Scale Access Control in an Expanding Network
* Specify, recognize or describe the security features of CiscoSecure and the operation of a CiscoSecure server.
* Specify the commands and procedures used to configure a router to access a CiscoSecure server and to use AAA.
* Specify the commands used to configure AAA on a router to control access from remote access clients.
【责编:admin】

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The advantage of multithreading is that it can improve performance and resource utilization, especially for processing large amounts of data or performing time-consuming operations. It allows multiple tasks to be performed simultaneously, improving efficiency. However, too many threads can lead to performance degradation, so you need to carefully select the number of threads based on the number of CPU cores and task characteristics. In addition, multi-threaded programming involves challenges such as deadlock and race conditions, which need to be solved using synchronization mechanisms, and requires solid knowledge of concurrent programming, weighing the pros and cons and using them with caution.

SQL IF statements are used to conditionally execute SQL statements, with the syntax as: IF (condition) THEN {statement} ELSE {statement} END IF;. The condition can be any valid SQL expression, and if the condition is true, execute the THEN clause; if the condition is false, execute the ELSE clause. IF statements can be nested, allowing for more complex conditional checks.

The main reasons why you cannot log in to MySQL as root are permission problems, configuration file errors, password inconsistent, socket file problems, or firewall interception. The solution includes: check whether the bind-address parameter in the configuration file is configured correctly. Check whether the root user permissions have been modified or deleted and reset. Verify that the password is accurate, including case and special characters. Check socket file permission settings and paths. Check that the firewall blocks connections to the MySQL server.

How to avoid the third-party interface returning 403 error in the Node environment. When calling the third-party website interface using Node.js, you sometimes encounter the problem of returning 403 error. �...

Methods to solve the cross-domain problem of Vue Axios include: Configuring the CORS header on the server side using the Axios proxy using JSONP using WebSocket using the CORS plug-in

Get ComponentVerify in EasyWechat5.5...

How to configure Zend in Apache? The steps to configure Zend Framework in an Apache Web Server are as follows: Install Zend Framework and extract it into the Web Server directory. Create a .htaccess file. Create the Zend application directory and add the index.php file. Configure the Zend application (application.ini). Restart the Apache Web server.

This article will explain how to improve website performance by analyzing Apache logs under the Debian system. 1. Log Analysis Basics Apache log records the detailed information of all HTTP requests, including IP address, timestamp, request URL, HTTP method and response code. In Debian systems, these logs are usually located in the /var/log/apache2/access.log and /var/log/apache2/error.log directories. Understanding the log structure is the first step in effective analysis. 2. Log analysis tool You can use a variety of tools to analyze Apache logs: Command line tools: grep, awk, sed and other command line tools.
