Cisco Certified Internetwork Expert (CCIE) - Enterprise Infrastructure
1 Network Architecture and Design
1-1 Enterprise Network Design Principles
1-2 Network Segmentation and Micro-Segmentation
1-3 High Availability and Redundancy
1-4 Scalability and Performance Optimization
1-5 Network Automation and Programmability
1-6 Network Security Design
1-7 Network Management and Monitoring
2 IP Routing
2-1 IPv4 and IPv6 Addressing
2-2 Static Routing
2-3 Dynamic Routing Protocols (RIP, EIGRP, OSPF, IS-IS, BGP)
2-4 Route Redistribution and Filtering
2-5 Route Summarization and Aggregation
2-6 Policy-Based Routing (PBR)
2-7 Multi-Protocol Label Switching (MPLS)
2-8 IPv6 Routing Protocols (RIPng, EIGRP for IPv6, OSPFv3, IS-IS for IPv6, BGP4+)
2-9 IPv6 Transition Mechanisms (Dual Stack, Tunneling, NAT64DNS64)
3 LAN Switching
3-1 Ethernet Technologies
3-2 VLANs and Trunking
3-3 Spanning Tree Protocol (STP) and Variants (RSTP, MSTP)
3-4 EtherChannelLink Aggregation
3-5 Quality of Service (QoS) in LANs
3-6 Multicast in LANs
3-7 Wireless LANs (WLAN)
3-8 Network Access Control (NAC)
4 WAN Technologies
4-1 WAN Protocols and Technologies (PPP, HDLC, Frame Relay, ATM)
4-2 MPLS VPNs
4-3 VPN Technologies (IPsec, SSLTLS, DMVPN, FlexVPN)
4-4 WAN Optimization and Compression
4-5 WAN Security
4-6 Software-Defined WAN (SD-WAN)
5 Network Services
5-1 DNS and DHCP
5-2 Network Time Protocol (NTP)
5-3 Network File System (NFS) and Common Internet File System (CIFS)
5-4 Network Address Translation (NAT)
5-5 IP Multicast
5-6 Quality of Service (QoS)
5-7 Network Management Protocols (SNMP, NetFlow, sFlow)
5-8 Network Virtualization (VXLAN, NVGRE)
6 Security
6-1 Network Security Concepts
6-2 Firewall Technologies
6-3 Intrusion Detection and Prevention Systems (IDSIPS)
6-4 VPN Technologies (IPsec, SSLTLS)
6-5 Access Control Lists (ACLs)
6-6 Network Address Translation (NAT) and Port Address Translation (PAT)
6-7 Secure Shell (SSH) and Secure Copy (SCP)
6-8 Public Key Infrastructure (PKI)
6-9 Network Access Control (NAC)
6-10 Security Monitoring and Logging
7 Automation and Programmability
7-1 Network Programmability Concepts
7-2 RESTful APIs and NETCONFYANG
7-3 Python Scripting for Network Automation
7-4 Ansible for Network Automation
7-5 Cisco Model Driven Programmability (CLI, NETCONF, RESTCONF, gRPC)
7-6 Network Configuration Management (NCM)
7-7 Network Automation Tools (Cisco NSO, Ansible, Puppet, Chef)
7-8 Network Telemetry and Streaming Telemetry
8 Troubleshooting and Optimization
8-1 Network Troubleshooting Methodologies
8-2 Troubleshooting IP Routing Issues
8-3 Troubleshooting LAN Switching Issues
8-4 Troubleshooting WAN Connectivity Issues
8-5 Troubleshooting Network Services (DNS, DHCP, NTP)
8-6 Troubleshooting Network Security Issues
8-7 Performance Monitoring and Optimization
8-8 Network Traffic Analysis (Wireshark, tcpdump)
8-9 Network Change Management
9 Emerging Technologies
9-1 Software-Defined Networking (SDN)
9-2 Network Function Virtualization (NFV)
9-3 Intent-Based Networking (IBN)
9-4 5G Core Network
9-5 IoT Network Design and Management
9-6 Cloud Networking (AWS, Azure, Google Cloud)
9-7 Edge Computing
9-8 AI and Machine Learning in Networking
4-2 MPLS VPNs Explained

4-2 MPLS VPNs Explained

Key Concepts

MPLS (Multiprotocol Label Switching)

MPLS is a data-carrying mechanism that operates at a layer that is generally considered to lie between traditional definitions of Layer 2 (Data Link Layer) and Layer 3 (Network Layer). MPLS forwards packets based on short path labels rather than long network addresses, thus speeding up network traffic flow and making routing more efficient.

VPN (Virtual Private Network)

A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.

PE (Provider Edge) Routers

PE routers are the edge routers of the service provider's network that interface with the customer's CE routers. They are responsible for maintaining VPN-specific routing information and forwarding packets between different VPNs.

CE (Customer Edge) Routers

CE routers are the edge routers of the customer's network that interface with the service provider's PE routers. They are responsible for routing traffic within the customer's network and exchanging routing information with the PE routers.

VRF (Virtual Routing and Forwarding)

VRF is a technology that allows multiple instances of a routing table to exist in a router and work simultaneously. Each VRF instance can have its own routing table, independent of other VRF instances. This allows a single PE router to support multiple VPNs, each with its own routing and forwarding information.

LDP (Label Distribution Protocol)

LDP is a protocol used by MPLS-enabled routers to exchange label information. It allows routers to establish label-switched paths (LSPs) through the network. LDP is essential for the operation of MPLS VPNs, as it ensures that packets are correctly labeled and forwarded across the service provider's network.

BGP (Border Gateway Protocol)

BGP is an exterior gateway protocol used to exchange routing and reachability information among autonomous systems (AS) on the Internet. In the context of MPLS VPNs, BGP is used to distribute VPN routes between PE routers, ensuring that each VPN has the correct routing information to reach its destinations.

Examples and Analogies

Consider a large corporation with multiple branch offices. Each branch office has its own network (CE routers) and needs to communicate securely with the headquarters. The corporation hires a service provider to connect all branch offices using MPLS VPNs. The service provider's network (PE routers) acts as a secure tunnel, ensuring that data is transmitted efficiently and securely between the branch offices and the headquarters.

In this scenario, MPLS is like a high-speed expressway that allows data packets to travel quickly between different locations. VPNs are like secure tunnels built on this expressway, ensuring that data is protected from unauthorized access. PE routers are like toll booths at the entrance and exit of the expressway, managing the flow of traffic and ensuring that each branch office's data reaches the correct destination.

VRF is like having multiple lanes on the expressway, each dedicated to a specific branch office. This ensures that traffic from one branch office does not interfere with traffic from another. LDP is like the traffic signals that guide vehicles onto the correct lanes, while BGP is like the navigation system that ensures each vehicle reaches its final destination.