Jump to content

Merlz

Members
  • Posts

    20
  • Joined

  • Last visited

1 Follower

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Merlz's Achievements

Enthusiast

Enthusiast (6/14)

  • One Year In
  • Dedicated
  • Collaborator
  • One Month Later
  • Conversation Starter

Recent Badges

54

Reputation

  1. Hi Guys. I have created a group,, I have sent to your inboxes,, I am targeting August,, I failed long time ago,, this will be my second attempt. You can share the group link,, but not to vendors selling their material,, just individuals who are in advanced stages of preparations. Could have shared link here, but I don't want to violate rules of this forum.
  2. Hi Guys. We used to have a Telegram group before, I am talking 2021. If there is already such a group. Kindly add me,, my Exam is in August. If there is no group, will form it before the end of the week.
  3. Engagements have slowed down drastically from this platform. Where are the Exam takers at? Would like to start constructive discussions towards the exam. I have several months before the date.
  4. Its currently hard like rock to find any workbook from 2022. And on Linkedin we don't get to see any congratulatory messages. I failed mine last year November, hoping to attempt again this year,, was here hoping to see some activity, but it's very quiet, no active discussions.
  5. @walid4800 what are all these URLs for? Was here looking for CCIE EI related discussions.
  6. Better create the group and share the link here,, As I think there is no publicly accessible group
  7. 8. Verify that host11 and host12 can ping 2001:db8:14::1 located at the IaaS site. It is permitted to modify one existing configuration command on one of the SP routers to meet this requirement Hi Loki from Asgard,, With regards to fixing the mask from .254 to .255 for IaaS connectivity. That sentence allows you to fix that mask on the loopback
  8. Hi Glavin, Apologies, where can I suitably post a question like this without generating a Warning? I wan't guys to discuss it.
  9. Hi All. I am not convinced by the network design and solution for the question I will post below. The peering of the DC switches with vEdges doesn't make sense to me. The vEdges have VNP0 (that peers with vlan 4000 on DC Switches) then Service VPN 999 (That pairs with vlan 3999). The SDWAN VPNs are VRF level and I would expect that separation to be maintained until there is explicit route-leaking between the VRFs,, but then on the switches there are SVIs in the same ospf routing processes and area. That causes inter-vlan routing and the two VRFs are combined and traffic would go from VPN0 to VPN999 without going through the vEdges. That confuses me,, if there is anyone who is equally concerned or has a better explanation of what the design is attempting to achieve can help. ==================================================================================================== 1.7 : OSPFv2 in DC Configure devices in the DC according to these requirements: · Switches sw201 and sw202 must establish a stable OSPF adjacency in the FULL state with vedge21 and vedge22 on interface Vlan3999. Any configuration changes and corrections necessary to meet this requirement may be performed only on the switches, and any mismatched parameters causing the issue must be changed to exactly match the configuration of the vEdges. · All OSPF speakers in the DC running Cisco IOS and IOS-XE software must be configured to keep the number of advertised internal routes to an absolute minimum while not impacting the reachability of the services. This included the reachability of ISE,DNA center,vManage,vBond and vSmart on their internal (in Band Connectivty) addresses, as well as any existing and future devices in VLAN 4000 and sw201 and sw202. The configuration of this requirement must be completed exclusively within the “router ospf” and “interface vlan” contexts without causing any impact to existing OSPF adjacencies. · Router r24 must advertise two prefixes, 10.6.0.0/15 and 10.200.0.0/24, as Type-5 LSAs in OSPFv2 to provide HQ and DC with the reachability to the DMVPN tunnel and branches #3 and #4. The configuration of this requirement must be completed exclusively within the “router ospf” context. · Any route from the 10.2.0.0/16 range that keeps being advertised in OSPF must continue being advertised as an intra-area route. · It is not allowed to modify existing areas to accomplish this entire task. ================================================================================================
  10. I am also preparing about a month remaining,, make a Telegram group and we will join for discussions
  11. Create a Telegram group where people can join and deliberate on it, you can count me in.
  12. I have it booked for Mid November,, if you get hold of a study group, please share with me on my inbox,, Regards Merlz
  13. Does this study group even exist? if it does, you can share the link guys so that we're able to collaborate and mix ideas.
  14. Hi guys, I am expecting to attempt in November, intensely focusing on the Automation questions and SDN, I haven't seen questions on FlexiVPN,, in fact I haven't seen anything about design and I am worried the questions flying around are not complete and we're likely to be surprised. I am also keen on joining any group of people that are at advanced preparation stages.
×
×
  • Create New...