4.NAT Server
5.Twice NAT
6.ALG
7.NAT Mapping
8.NAT Filtering
Device access control
IPsec
Traffic Suppression
Local Attack Defense
IP Address Anti-spoofing
ARP Security
DHCP Security
六、QoS
1.Classification
2.Traffic Policing
3.Traffic Shaping
4.Congestion Avoidance
5.Congestion Management
七、Network Management
1.Syslog
2.IP Service Level Agreement SLA
3.NetStream
4.NQA
5.SNMP
6.FTP
7.Telnet @欢迎关注:网络工程师阿龙
8.SSH
八、Feature
1.VRRP
2.VGMP
3.Interface Backup
4.NTP
5.DHCP
6.BFD
7.NSF/GR
8.NSR
九、SDN
1.Strategy of SDN/NFV
2.SDN architecture
3.VXLAN
4.EVPN
@欢迎关注:网络工程师阿龙
实验知识点
一、Layer 2 Technologies
STP
1.STP
2.RSTP
3.MSTP
4.Loop guard
5.Root guard
6.BPDU guard
7.TC-BPDU attack guard
VLAN
1.Access port
2.Trunk port
3.Hybrid port
4.QinQ
5.Vlan Aggregation
6.Mux VLAN
7.Voice VLAN
Transparent bridge
1.Local Bridging
2.Remote Bridging
3.Integrated Bridging and Routing
4.VLAN ID Transparent Transmission
Link Aggregation, Eth-Trunk and IP-Trunk, Load-balance, LACP
1.Link Aggregation
2.LACP
Ethernet technologies
1.Speed and duplex
2.Ethernet, Fast Ethernet, Gigabit Ethernet, 10GE, 40GE, 100GE
3.Auto MDI/MDIX
4.Auto negotiation
5.Storm control
6.Unicast flooding control
Smart link
DLDP
Switched Port Analyzer (port-mirroring)
CSS/iStack
HDLC/IP-Trunk and PPP/MP
PPPoE
二、IPv4/v6 Unicast
IPv4 addressing, subnet, and VLSM
IPv4 tunneling and GRE
IPv6 addressing
ICMPv6
IPv6 functionality protocols
Migration techniques
1.Tunnelling techniques
2.Translation techniques
IPv4/v6 OSPF
1.Standard OSPF areas
2.Stub area
3.Totally stubby area
4.NSSA
5.Totally NSSA
6.LSA types
7.Adjacency on a point-to-point and on a multi-access network
8.Virtual-Link