
0 e' c% ^$ B' V9 a0 O& ]. H思科数据中心基础架构故障排除(DCIT)
& G4 } e9 T K3 i
6 w+ Z; d4 F% h1 u* v5 }6 V- e( ^: H考试说明:思科数据中心基础架构故障排除(DCIT)考试(300-180)考试时间为90分钟,60-70道考题。思科数据中心基础架构故障排除(DCIT)考试(300-180)是CCNP数据中心认证考试中的其中一门考试,检验考生是否具备思科数据中心基础设施,包括数据网络协议,网络虚拟化和自动化,以应用为中心的基础设施(ACI),存储网络,计算机平台,管理及操作等。思科数据中心基础架构故障排除v6(DCIT)将帮助考生准备认证考试,内容与考试主题相适应。
" }( B- J$ C" A6 W* o
: h' U& i9 ?2 C' T下列信息为您提供了思科数据中心基础架构故障排除(DCIT)考试(300-180)所含的大纲。然而,在特定的考试方式中还可能出现其他的相关要点。为更好地反映考试内容并以清晰起见,下列大纲可能随时更改,且不作通知。
$ k+ [& z) `2 P5 U - U+ p/ t; X5 J) S
; D9 O; \6 [% A- g# B L! n1 T M% g
1.0 Troubleshooting Data Network Protocols6 Y) H% T- s- L3 n) f3 U+ }
1.1 Troubleshoot data center protocols; b) e4 c& l4 k$ n( z: b
1.1.a VPC( Q, }/ d" O2 l) v# D6 q8 \ Z
1.1.b Fabric path
. ~# p+ ?6 B3 d! F. U* Y1.1.b (i) Segment ID
# J" K( a5 p: `9 h& b% u1.1.b (ii) Distributed gateway, anycast HSRP7 D. m2 j7 m/ i
1.1.b (iii) MBGP- c; E! R4 T R9 M5 Y
1.1.b (iv) vPC+
6 K% a- v, v9 g- N1.1.c VXLAN
N5 ]" C: Y! b/ R% `& H1.1.c (i) Distributed gateway
* g. \, x* s9 @% y1 }1.1.c (ii) MBGP EVPN7 ?' H! c* x. z6 T
1.1.c (iii) VPC
0 `7 p1 n5 d* U. q0 t( D- j1.1.d OTV
6 Y" r# X% ^8 Q+ p1.1.e LISP$ y2 }1 O6 a2 z6 @9 {0 f6 t. A9 j# z" `' O
1.2 Troubleshoot routing protocols
9 u8 N2 `) }5 n, Q, M$ V1.2.a OSPFv2, OSPFv3* }3 l! m' ]! R% k. o
1.2.b 1S-lS
* L' f. U9 o/ N1.2.c PIM6 u I% l7 }' l& ~
1.2.d FHRP
& I9 x& L: l$ K$ D1.2.d (i) HSRP
- Y' }* Q8 g1 A |1 T5 B0 R! V* R1.2.d (ii) VRRP
* m; n, |7 u, K( M7 H) V u9 V6 S1.3 Troubleshoot switching protocols
0 Z, f$ U( B% h1.3.a STP
6 u: G" X. g! d6 ~( w1.3.b LACP/port channel
6 f7 v0 l% e: w5 a b1 U1.3.c FEX, VNTAG+ x j1 h" g/ _# D! U( {; U& q
2.0 Troubleshooting Network Virtualization and Automation' p' [3 Q; [! ]0 A
2.1 Troubleshoot logical device separation
1 n: D5 l" E ^9 X$ a1 z I- B2.1.a VDC
" k( m5 o6 g" I w2.1.b VRF) u! M+ v" h, [: Q1 a5 e# ^, L, J$ a
2.2 Troubleshoot virtual switching technologies1 j# n. f! y/ P5 i! N" Z" O
2.3 Troubleshoot configuration profiles; c0 r+ z+ n+ \
2.3.a Auto-config# ~9 l2 L$ a- M- z8 n# p
2.3.b Port profiles
6 C O5 W& d) T/ _- r2.3.c Configuration synchronization
( d% g, @2 `, R6 B3.0 Troubleshooting Application Centric Infrastructure
7 O3 W. N; V5 |3.1 Troubleshoot fabric discovery process
4 V9 I d' h* }, P: X3.2 Troubleshoot VMM domain integration% S9 M) T- X3 y" K, z1 a
3.3 Troubleshoot tenant-based policies% C& [1 X) l$ s1 ^
3.3.a EPGs
. N6 F6 B5 V! `( v* e1 X. R3.3.a (i) Pathing
- A" A9 F( b7 Y5 C+ |6 I1 t7 l3 O3.3.a (ii) Domains. O/ D* D2 q( f/ e/ S
3.3.b Contracts
" X- `/ W6 v6 t0 R5 U3.3.b (i) Consumer* N8 u, l5 |3 }( g7 f9 z
3.3.b (ii) Providers2 {6 P" k% b/ j" @$ a1 P
3.3.b (iii) Inter-tenant
$ r! A, l: Y2 y+ Z W3.3.c Private networks' G2 V. D5 O2 K
3.3.c (i) Enforced/unenforced) Q4 S; g, S/ r, S
3.3.d Bridge domains+ P8 L% Q+ f% a v* s8 |
3.3.d (i) Unknown unicast settings4 I7 W2 w7 J8 j$ {7 N
3.3.d (ii) ARP settings
4 u/ f9 n/ N) F. o2 q4 d" }3 r' M: J4 x0 Z& z3.3.d (iii) Unicast routing
, w4 L' C. }& q$ \! Y3.4 Troubleshoot external network integration3 Z! L8 Q" k/ O2 @
3.4.a External bridge network
4 x: W: Y: U( S4 Y" ?0 W4 p9 ~- i3.4.b External routed network
' q) [: [" u4 K+ a! }9 M3.5 Troubleshoot packet flow
# V! l! s# f' L% j9 b: o3.5.a Unicast5 Y) B0 x" ^+ t
3.5.b Multicast
$ R, y l/ R4 @/ t* @3.5.c Broadcast
& Z) {# B, _3 |7 J3.5.d Endpoint database# `2 B9 Z+ @! p$ Q9 G, }
3.6 Troubleshoot security domains and role mapping, p, W( u" B, C+ s# l
3.6.a AAA2 v# |, s7 m4 [8 N+ M
3.6.b RBAC
+ }8 `3 P0 ^2 b, o3 A6 U3 v4.0 Troubleshooting Data Center Storage
; @6 K% S% P$ c: g8 e4.1 Troubleshoot Fibre Channel
- D$ z2 y- j% w) l8 d2 ^( v4.1.a Switched fabric initialization/ C& b: c, x; p/ R2 K% q' c W Q
4.1.b Fibre Channel buffer credit starvation
# B: i [- a: X& k5 g2 y% v; |4.1.c FCID% u+ F. f/ r3 Z$ X
4.2 Troubleshoot Fibre Channel protocol services
0 [7 W B; R7 }4.2.a Zoning# W" v2 z w: X5 q: R
4.2.b FCNS
! P* h, s( j3 {( ^0 ], N4.2.c VSAN
8 t9 u: E7 {% O4.2.d FSPF, _" X0 ^1 [2 _2 m. Y" @' P0 U
4.3 Troubleshoot FCoE
- g& E# h. r- d4.3.a Storage VDC
! G! W c9 i2 }4.3.b FIP
* b: ~- R1 U' M; a7 O6 y4.3.c FCoE topologies1 F& R; j, s, G3 D, W: j" _) w* H3 X
4.3.d DCB
" I* v% \, h, n* P4.4 Troubleshoot boot from SAN, Z6 c$ Z* B9 p. {. e) Z+ ^
4.4.a FCoE / Fibre Channel) C' |) Z7 X) E
4.4.b iSCSI+ ]3 w. m6 b) D1 E
4.4.c Multipath
" R; {' i0 |( p6 U" ~& ?0 G4.5 Troubleshoot FCoE/FC interface parameters: G1 X9 L" h* K% L0 ^8 Z( M
4.5.a Dedicated and shared mode
; Z) J9 P" U K* C4.5.b Port types0 R0 g, ~6 h ]8 b
4.5.c Port channels, ISL/ u8 k) g' a% t: D% h+ e% D
4.6 Troubleshoot SAN technologies& _& H9 G$ S+ o- x
4.6.a Fabric redundancy
# ^/ g; ~; L" W; r# {0 u/ f& h. [4.6.b NPV, NPIV, FCF2 e; W/ W _$ I0 \% n
5.0 Troubleshooting Data Center Compute Platforms- o, d/ V/ i/ j3 ^& X- z
5.1 Troubleshoot Cisco computing platforms9 I, |* u# j% |' R8 D$ g
5.1.a Stand-alone computing
9 x0 A1 f5 T q* c3 f, @2 O5.1.b Chassis/blade$ J& I b+ G: ~0 F5 y
5.1.c Modular / server cartridges
0 x% C" |* W, R- |& M4 D# j+ C+ T. {5.1.d Server integration4 K* n: @" \/ h# R
5.2 Troubleshoot hardware interoperability2 J$ _* a# H# Y- H" q2 D' l
5.2.a Converged Network Adapters / port expanders
3 W) l3 D, L; o" w. f' h5.2.b Firmware' Z3 S. v4 t9 Y) R* O2 e
5.2.c I/O modules / FEX) V; L4 Q8 W3 a4 M A" @4 o& b4 z
5.2.d Fabric interconnects
( c2 `- _: c& _: f* z5.3 Troubleshoot packet flow from server to the fabric
! d) A0 j, A. ?0 ~5.4 Troubleshoot server abstraction technologies
! [9 ~0 y# n+ R+ k9 c5.4.a Service profiles
6 s5 K" [2 i. w# t4 H& [5.4.a (i) Pools
8 c5 B* A; W0 G. D" v5.4.a (ii) Policies
: Q# d& [7 n3 Q8 ~2 d- K) _5.4.a (ii) 1 Connectivity
- I8 l" a) g0 v) h4 N! U5.4.a (ii) 2 Placement policy( j7 i Y# C/ S# q5 l% u
5.4.a (ii) 3 Remote boot policies
3 e! b7 r. Q, e a2 o s/ c3 s6.0 Troubleshooting Data Center Management and Operations. @1 b: K( \1 g2 x6 R' j
6.1 Troubleshoot firmware upgrades, packages, and interoperability5 O- x7 P3 m) g: K" B5 L* A; k+ ?
6.2 Troubleshoot integration of centralized management
* T; q9 ]4 v" @9 E( U U: L6.3 Troubleshooting data center LAN and SAN security
5 Y3 F- i6 |; B, u6 P6.3.a Troubleshoot fabric binding and port security( K2 [+ z' y" a1 e- I
6.3.b Troubleshoot AAA and RBAC
9 H2 k, S d6 X* k1 v; b) R6.3.c Troubleshoot first-hop security2 J& o8 q2 u, V$ d* `
6.3.c (i) Dynamic ARP inspection9 g \: k3 l) A | }7 E; I
6.3.c (ii) DHCP snooping; [$ c, r D/ |: v1 P" d
6.3.c (iii) Unicast RPF( x1 S0 T7 y6 D4 a6 n
6.3.c (iv) MACsec
8 c: y3 `$ I4 ?8 q6.3.c (v) Port security! a; e, ^6 `1 L! s# j
6.3.d Troubleshoot CoPP5 q2 m! z5 r& n! [2 l
6.3.e Troubleshoot ACL& l9 p" q$ D* R* r
6.4 Troubleshoot data center compute security
4 M' `& }7 N! ]% F8 F/ j6.4.a Troubleshoot AAA and RBAC
. j" g6 U- l/ O' l1 x2 x6.4.b Troubleshoot key management |
|