Initial configuration , very basic with no MPLS, connectivity only to directly connected interfaces.R1R2R3R4! ! ! interface Loopback0 ip address 22.214.171.124 255.255.255.255 ! interface FastEthernet0/0 ip address 10.0.31.1 255.255.255.0 duplex auto speed auto ! ! ! interface Loopback0 ip address 126.96.36.199 255.255.255.255 ! interface FastEthernet0/0 ip address 10.0.42.2 255.255.255.0 duplex auto speed auto ! ! ! interface Loopback0 ip address 188.8.131.52 255.255.255.255 no clns route-cache ! interface FastEthernet0/0 ip address 10.0.31.3 255.255.255.0 duplex auto speed auto no clns route-cache ! interface Serial1/0 ip address 10.0.43.3 255.255.255.0 serial restart-delay 0 no clns route-cache ! ! ! interface Loopback0 ip address 184.108.40.206 255.255.255.255 no clns route-cache ! interface FastEthernet0/0 ip address 10.0.42.4 255.255.255.0 duplex auto speed auto ! interface Serial1/0 ip address 10.0.43.4 255.255.255.0 serial restart-delay 0 no clns route-cache ! adding to the following configuration MPLS labels we will start wi…
Change have arrived and like with other professional certification there is almost a standard time before certification gets its update, with most anywhere it is between 3 - 4 years, CISSP is no different and since last update was on 2015 the change is arriving here as well.
For the people that wish to see the official existing and new outline
I have decided to write this post as the new out line is more of a list of Domain and Sections within the domain without hint or indication to what was modified actually and I could not find anyone else that done that comparison, I had to take the task and do the comparison, please be advised that I have done it for my own "pleasure" so apologies if I missed something :-)
Lets start with the obvious change: CISSP
- Before Apr 2018CISSP
- from Apr 20181.
Security and Risk Management16%15%2.
Communications and Network Security12%14%5.
Identity and Access Management13%13%6.
Maximum routes under customer vrf, if the service provider had unlimited resources he would not have needed that! however normally resources are limited and expensive, and Service provider would like to make money from his available resources. maximum routes configured under VRF provide a mean of controlling PE local resource and abuse avoidance from the CE side.I have vrf called DC_EXTRANET, you can see that I have 16 routes, I have configured
10 maximum routes under that vrf however I did not want to be aggressive so I have set the
warning only option.
See that immediately I get a notice that I have more routes then the maximum, however no action
is taken other then alerting and sending a syslog.
PE_ashdod_otherisp.n(config-vrf)# maximum routes 10 warning-only
% The current number of routes in the routing table is equal to, or exceeds the configured warning limit
*Nov 26 20:39:41.175: %IPRT-3-ROUTELIMITWARNING: IP routing table limit warning - DC_…