Exam Number 644-906 IMTXR
Associated Certifications Cisco IOS XR Specialist
Duration 75 minutes (55-65 questions)
Available Languages English
Register Pearson VUE
The 644-906 Implementing and Maintaining Cisco Technologies Using IOS XR exam is associated with the Cisco IOS XR Specialist certification. This exam tests a candidate's knowledge of implementing, verification testing, and maintaining Cisco core and edge technologies, using the IOS XR based router platforms, which include the CRS, ASR 9000, and the XR12000 routers.
The 644-906 Implementing and Maintaining Cisco Technologies Using IOS XR (IMTXR) exam is associated with the Cisco IOS XR Specialist certification.This exam tests a candidate's knowledge of implementing, verification testing, and maintaining Cisco core and edge technologies, using the Cisco IOS XR-based router platforms, which include the CRS, ASR 9000, and the XR12000 routers. Candidates can prepare for this exam by taking the IMTXR Implementing and Maintaining Cisco Technologies using IOS XR course.
The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on the specific delivery of the exam in order to better reflect the contents of the exam and for clarity purposes. The guidelines below may change at any time without notice.
1.0 Platform 21%
1.1 Power
Recommend PDU as a function of facility
Install appropriate PDU for chassis
Monitor system power level
Show power alarm values
1.2 Environmental
Recommend environmental levels for system installation
Verify system-detected environment is within tolerance levels
Show environmental alarm values
Clear environmental alarm
Gather system envinronmental output
Recommend rack space requirements
Use proper grounding for installation
Describe CRS air-flow
Describe Cisco ASR 9000 air flow
1.3 Physical Architecture
Identify CRS switch fabric
Identfy components of CRS fabric
Identify MSC
Identify PLIM
Identify RP CRS/ASR9000
Identify management interface
Identify cable management
Differentiate between single and multi-chassis
Identify ASR9000 line cards
Identify ASR9000 RSP
Identify ASR9000 PDU
Identify ASR9000 SIP-700/SPA
Identify CRS SIP/SPA
Identify CRS chassis
Identify ASR9000 chassis
Describe ASR9000 fabric
1.4 Inventory
Show card status via show platform
Show cards via show diags
Show inventory of the system
Differentiate between admin versus executive plane for show platform
1.5 Environmental (Merge?)
Show power usage
Show fan status
Diff between admin vs exec plane for show platform
1.6 Firmware
Undertanding what is a FPD.PIE
Configure Auto FPD
Understand what is Parallel FPD
Upgrade FPD and ROMMONUpgrade
Understand FPD versus ROMMON
Upgrading FPDs and ROMMONs
Showing current FPD version information
2.0 Operating System 19%
2.1 Install
Add a PIEs or SMUs
Using TFTP, FTP, USB thumbdrive, and hard drive as the source
With Activate flag
Using Source flag
Using TAR file
2.2 Licensing
Activate PIEs or SMUs
Initial or recovery software installation
ROMMON Variables
Turboboot Mini.VM file
Deactivate PIEs or SMUs
Remove inactive packages, PIEs, or SMUs
Committing the Installation Path
Check which packages are active
Check which packages are committed
Check installation log
See what install requests are currently active
Understanding security certificate in PIEs and SMUs
2.3 Packages
Understanding types of packages
Mini.PIE
Mini.VM
Optional PIEs
SMUs
Unstanding IOS-XR versioning and installation restrictions
Understand P versus PX images and the hardware they support
2.4 Two-Stage Commit
Understand what is Active Config
Understand what is Target Config
Understand when is a Syntax Check done
Understand when is a Semantic Check done
Going back to a previous configuration
Showing configuration IDs and labels
Show configuration history
Loading configuration
Committing the configuration
Atomic versus best effort
With labels and comments
Replacing the configuration
Using the commit confirm feature
Show Config Fail
Configure interfaces before the physical interface is available
2.5 Configuration Planes
Understand what configuration is in the Admin plane
Understand what configuration is in the Exec plane
Understand differences between owner and non-owner SDR in access to Admin plane and Exec plane
Understand the default VRF
2.6 Task-Based Authorization
Assigning user privilege to root-system
Assigning user privilege to root-lr
Assigning user privilege to cisco-support
Understand between admin user versus exec username
Understanding how task based authorization work
2.7 Process
How to perform process restart
How to check processes like state, no. of restarts, job id, pid, tid
Show where certain processes are running
How to find a blocked process
Check how much CPU a process is using
2.8 LPTS
Understand what LPTS is
Understand about LPTS Policer
How to use Show LPTS Commands
Show policer values and drop counts in LPTS
2.9 Memory
How to look at the memory utilization on the route processor
How to look at the memory utilization on the line card
Understand protected memory space versus shared memory and which area uses it
Check how much memory a process is using
2.10 Support
How to use Show Tech Support commands
Core file configuration locatioin including hard drive and FTP
Debug commands and with ACL filtering
Locate core files and moving them to a server
2.11 Parser (interacting with)
Using the parser with pipe, include, exclude, begin, regex
2.12 EEM
Base assumption of EEM knowledge - understand what is possible and not possible
3.0 Control Plane 21%
3.1 Configuring OSPF
Configure interfaces to be part of the backbone area
Configure additional interfaces to be part of non-backbone area
Configure non-default metric on some interfaces
Configure neighbor logging so adjacency changes can be monitored
3.2 Verify OSPF
Determine status of OSPF interfaces
Determine status of neighbors
Display OSPF database and determine which links are present
3.3 Configure ISIS
Configure the ISIS NET
Enable ISIS for ipv4 unicast routing
Configure interfaces for ISIS routing
Enable ISIS for ipv6 unicast routing
Enable some but not all of the ipv4 enabled interfaces for ipv6 routing
3.4 Verify ISIS
Determine status if interfaces configured for ISIS
Determine the status of the routing adjacencies
Display the ipv4 unicast route table
Turn and debugging for ISIS adjacencies and explain the information shown
Display the topologies for IPv4 and IPv6. Why are they different?
3.5 Add Static Routes
Configure static routes for IPv4 unicast in the global table
Configure static routes in for IPv4 unicast in two different VRFs
3.6 Configure BGP
Configure an autonomous system number for BGP to use
Configure BGP to support IPv4 routing
Configure BGP to support IPv6 routing
Configure iBGP neighbors with the typical configuration to use loopback addresses for peering:
Use neighbor-groups for identical configuration sections on multiple peers
Configure one iBGP neighbor to exchange both IPv4 and IPv6 prefixes over an IPv4 session
Configure one iBGP neighbor as an IPv6-only neighbor with IPv6 peer addresses
Configure eBGP neighbors for IPv4 routing
Configure a simple pass_all policy for those eBGP neighbors
Add VPNv4 capability to one iBGP peer
Add two VRFs into BGP and redistribute static routes into BGP for VPNv4
Configure one iBGP peer to support 6PE type functionality by adding address-familiy IPv6 labeled-unicast
3.7 Verify BGP
Display the peer summary status for IPv4 and IPv6
Display the IPv4 BGP table
Display a specific entry and explain AS path and next-hop information
Determine how much memory the BGP process uses
3.8 Understanding RPL Concepts
Configure RPL
Define an AS-set for use in RPL
Create a route policy that checks for an AS from the AS-set and adds a community for matching routes
Create a route-policy that uses an inline prefix-set and changes the local preference when a match is found
Create a route policy that adds a community where the community is used as a parameter when the policy is called
3.9 Verify RPL
Verify that communities are added as expected
Execute a show bgp… command using a route-policy to modify the output. Compare to regular show command.
3.10 MPLS LDP
Configure router to run LDP
Configure router to log neighbor events
Enable LDP on interfaces
Execute show command to verify status of LDP neighbors
3.11 MPLS TE
Configure OSPF to support traffic engineering extensions
Enable RSVP on interfaces
Create an MPLS TE tunnel with two different path options:
First path explicit
Second path dynamic
3.12 Execute Show Command to Determine Tunnel Status at Tunnel Head
Execute show command to determine tunnel midpoints traversing the router
3.13 Configure IP Multicast
Configure PIM-SM, PIM-SSM, PIM-SSM range
Configure static-RP, Auto-RP, and BSR for PIM-SM
Confiigure Multicast NSF
Configure Multicast VPN
Configure MSDP for interconnecting PIM-SM domains
Configure MoFRR
Configure P2MP-TE for IP Multicast
4.0 Data Plane 20%
4.1 General Forwarding
Understand and monitor interface counters
Clear interface counters
Modify interface counter load interval
Understand the flow of packets through a router
Describe the difference in processing of transit packets versus locally destined packets
Understand the information stored in a forwarding table entry
Troubleshoot packet drops
4.2 Access Control Lists (ACLs)
Implement ACLs to filter traffic on an interface
Monitor ACL counters
Modify an existing applied ACL
Apply ACLs in debug commands
Resequence an ACL
4.3 Quality of Service (QoS)
Implement a basic Quality of Service configuration
Monitor Quality of Service statistics and behaviors
Modify an existing QoS configuration
What is the difference with QoS on IOS XR
4.4 NetFlow
Describe NetFlow capabilities in IOS XR
Implement NetFlow packet sampling
Verify record export
Monitor the NetFlow cache
4.5 Unicast Reverse Path Forwarding (uRPF)
Implement uRPF on an interface
Verify uRPF behavior
4.6 Interface IP addresses
Configure IPv4 addresses on an interface
Configure IPv6 addresses on an interface
Resolve duplicate IP subnets configured on the router
4.7 IP Multicast
Describe Multicast forwarding on XR platforms (egress and fabric replication, etc.)
Monitor IP Multicast traffic
Troubleshoot IP Multicast (RPF, mrib, mfib, olist, etc.)
5.0 Management Plane 19%
5.1 Implementing SNMP on Cisco IOS-XR
Configuring SNMP (v1, v2c, v3) - Does everyone use SNMPv3?
Configuring SNMP trap notifications
Configuring SNMP views, SDRowner and Lrowner
Configuring SNMP ifIndex persistence
Verify SNMP configuration - e.g. using snmpget or snmpwalk
5.2 Implementing Logging Services on Cisco IOS-XR
Configuring logging buffer
Configuring syslog server host as logging destination
Configuring terminals for logging display (term mon)
Configuring logging facility
Configuring local logging device and archiving
Monitoring logging buffer and filtering messages
5.3 Implementing Physical and Virtual Terminals
Configuring line templates, vty pools
Configuring exec timeout
Securing vty line and vty access
Verify vty access-group configuration
5.4 Implementing SSH Access on Cisco IOS-XR
Configuring SSH server (including crypto key generation)
SSH client usage
Verify SSH configuration
5.5 Implementing Telnet Access on Cisco IOS-XR
Configuring telnet server on IOS-XR
5.6 Implementing XML Management on Cisco IOS-XR
Describe XML management on IOS-XR
Configuring XML agent on IOS-XR
Configuring VRF access for XML agent on IOS-XR
5.7 Implementing TACACS+ Authentication, Authorization and Accounting
Configuring AAA Authentication - Using TACACS+ and local as fallback
Confguring AAA Command Authorization - Using TACACS+ and local as fallback
Configuring AAA Command Accounting
Implementing TACACS+ - Assigning task groups and privileges
Verify AAA permissions upon command failure (i.e. debug aaa)
5.8 Configuring CDP on Cisco IOS-XR
Enable CDP on IOS-XR
Monitor CDP neighbors and parameters
5.9 Implementing Management Plane Protection (MPP) on Cisco IOS-XR
Configuring MPP to restrict access from specific IP Addresses and protocols
Configuring MPP to restrict access for out-of-band interface
5.10 Implementing NTP on Cisco IOS-XR
Configuring NTP server
Configuring NTP peer
Securing NTP configurations (NTP access groups)
Verifying NTP status
5.11 Implementing SDRs on IOS-XR
Understand SDR
Describe DSC
Assigning SDR access priviledges
Creating SDRs, adding nodes to non-owner SDRs
Creating username and passwords for non-owner SDRs
Rebooting non-owner SDRs
5.12 Chassis and Hardware Management
Displaying installed modules, status of modules
Displaying environmental status (fan, power, etc)
Enabling and disabling power to a specific line card or module
Reloading line card or module
Displaying chassis and module serial numbers
Reloading RP
Reloading entire chassis
Troubleshoot reason why PLIM/MSC is not booting up
5.13 Implementing EEM on Cisco IOS-XR
QUESTION 1
What is the maximum long-term normal operating temperature of the Cisco CRS-1, ASR 9000
Series Routers, and XR 12000 Series Routers?
A. 40C (104F)
B. 50C (122F)
C. 55C (131F)
D. 65C (149F)
Answer: A
Explanation:
QUESTION 2
The Cisco CRS 16-Slot Line Card Chassis Site Planning Guide suggests having 48 inches of
clearance behind the chassis. What would definitely happen to the system if there were only 28
inches of clearance behind the Cisco CRS 16-Slot Line Card Chassis?
A. The system would overheat due to inadequate airflow.
B. The fabric card could not be exchanged if one failed.
C. The modular services card (MSC) could not be exchanged if one failed.
D. The fan tray could not be exchanged if one failed.
Answer: D
Explanation:
QUESTION 3
How many planes are there in the Cisco CRS-3 switch fabric?
A. 1
B. 3
C. 7
D. 8
Answer: D
Explanation:
QUESTION 4
What is the cell size of the cells that traverse the switch fabric on the Cisco CRS-3?
A. 128 bytes
B. 136 bytes
C. 144 bytes
D. 200 bytes
E. 288 bytes
Answer: B
Explanation:
QUESTION 5
Where are client interfaces terminated on the Cisco CRS-3?
A. the modular services card
B. the physical layer interface module(s)
C. the switch fabric interface terminator
D. the Service Processor 40
E. the Service Processor 140
Answer: B
Explanation:
Associated Certifications Cisco IOS XR Specialist
Duration 75 minutes (55-65 questions)
Available Languages English
Register Pearson VUE
The 644-906 Implementing and Maintaining Cisco Technologies Using IOS XR exam is associated with the Cisco IOS XR Specialist certification. This exam tests a candidate's knowledge of implementing, verification testing, and maintaining Cisco core and edge technologies, using the IOS XR based router platforms, which include the CRS, ASR 9000, and the XR12000 routers.
The 644-906 Implementing and Maintaining Cisco Technologies Using IOS XR (IMTXR) exam is associated with the Cisco IOS XR Specialist certification.This exam tests a candidate's knowledge of implementing, verification testing, and maintaining Cisco core and edge technologies, using the Cisco IOS XR-based router platforms, which include the CRS, ASR 9000, and the XR12000 routers. Candidates can prepare for this exam by taking the IMTXR Implementing and Maintaining Cisco Technologies using IOS XR course.
The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on the specific delivery of the exam in order to better reflect the contents of the exam and for clarity purposes. The guidelines below may change at any time without notice.
1.0 Platform 21%
1.1 Power
Recommend PDU as a function of facility
Install appropriate PDU for chassis
Monitor system power level
Show power alarm values
1.2 Environmental
Recommend environmental levels for system installation
Verify system-detected environment is within tolerance levels
Show environmental alarm values
Clear environmental alarm
Gather system envinronmental output
Recommend rack space requirements
Use proper grounding for installation
Describe CRS air-flow
Describe Cisco ASR 9000 air flow
1.3 Physical Architecture
Identify CRS switch fabric
Identfy components of CRS fabric
Identify MSC
Identify PLIM
Identify RP CRS/ASR9000
Identify management interface
Identify cable management
Differentiate between single and multi-chassis
Identify ASR9000 line cards
Identify ASR9000 RSP
Identify ASR9000 PDU
Identify ASR9000 SIP-700/SPA
Identify CRS SIP/SPA
Identify CRS chassis
Identify ASR9000 chassis
Describe ASR9000 fabric
1.4 Inventory
Show card status via show platform
Show cards via show diags
Show inventory of the system
Differentiate between admin versus executive plane for show platform
1.5 Environmental (Merge?)
Show power usage
Show fan status
Diff between admin vs exec plane for show platform
1.6 Firmware
Undertanding what is a FPD.PIE
Configure Auto FPD
Understand what is Parallel FPD
Upgrade FPD and ROMMONUpgrade
Understand FPD versus ROMMON
Upgrading FPDs and ROMMONs
Showing current FPD version information
2.0 Operating System 19%
2.1 Install
Add a PIEs or SMUs
Using TFTP, FTP, USB thumbdrive, and hard drive as the source
With Activate flag
Using Source flag
Using TAR file
2.2 Licensing
Activate PIEs or SMUs
Initial or recovery software installation
ROMMON Variables
Turboboot Mini.VM file
Deactivate PIEs or SMUs
Remove inactive packages, PIEs, or SMUs
Committing the Installation Path
Check which packages are active
Check which packages are committed
Check installation log
See what install requests are currently active
Understanding security certificate in PIEs and SMUs
2.3 Packages
Understanding types of packages
Mini.PIE
Mini.VM
Optional PIEs
SMUs
Unstanding IOS-XR versioning and installation restrictions
Understand P versus PX images and the hardware they support
2.4 Two-Stage Commit
Understand what is Active Config
Understand what is Target Config
Understand when is a Syntax Check done
Understand when is a Semantic Check done
Going back to a previous configuration
Showing configuration IDs and labels
Show configuration history
Loading configuration
Committing the configuration
Atomic versus best effort
With labels and comments
Replacing the configuration
Using the commit confirm feature
Show Config Fail
Configure interfaces before the physical interface is available
2.5 Configuration Planes
Understand what configuration is in the Admin plane
Understand what configuration is in the Exec plane
Understand differences between owner and non-owner SDR in access to Admin plane and Exec plane
Understand the default VRF
2.6 Task-Based Authorization
Assigning user privilege to root-system
Assigning user privilege to root-lr
Assigning user privilege to cisco-support
Understand between admin user versus exec username
Understanding how task based authorization work
2.7 Process
How to perform process restart
How to check processes like state, no. of restarts, job id, pid, tid
Show where certain processes are running
How to find a blocked process
Check how much CPU a process is using
2.8 LPTS
Understand what LPTS is
Understand about LPTS Policer
How to use Show LPTS Commands
Show policer values and drop counts in LPTS
2.9 Memory
How to look at the memory utilization on the route processor
How to look at the memory utilization on the line card
Understand protected memory space versus shared memory and which area uses it
Check how much memory a process is using
2.10 Support
How to use Show Tech Support commands
Core file configuration locatioin including hard drive and FTP
Debug commands and with ACL filtering
Locate core files and moving them to a server
2.11 Parser (interacting with)
Using the parser with pipe, include, exclude, begin, regex
2.12 EEM
Base assumption of EEM knowledge - understand what is possible and not possible
3.0 Control Plane 21%
3.1 Configuring OSPF
Configure interfaces to be part of the backbone area
Configure additional interfaces to be part of non-backbone area
Configure non-default metric on some interfaces
Configure neighbor logging so adjacency changes can be monitored
3.2 Verify OSPF
Determine status of OSPF interfaces
Determine status of neighbors
Display OSPF database and determine which links are present
3.3 Configure ISIS
Configure the ISIS NET
Enable ISIS for ipv4 unicast routing
Configure interfaces for ISIS routing
Enable ISIS for ipv6 unicast routing
Enable some but not all of the ipv4 enabled interfaces for ipv6 routing
3.4 Verify ISIS
Determine status if interfaces configured for ISIS
Determine the status of the routing adjacencies
Display the ipv4 unicast route table
Turn and debugging for ISIS adjacencies and explain the information shown
Display the topologies for IPv4 and IPv6. Why are they different?
3.5 Add Static Routes
Configure static routes for IPv4 unicast in the global table
Configure static routes in for IPv4 unicast in two different VRFs
3.6 Configure BGP
Configure an autonomous system number for BGP to use
Configure BGP to support IPv4 routing
Configure BGP to support IPv6 routing
Configure iBGP neighbors with the typical configuration to use loopback addresses for peering:
Use neighbor-groups for identical configuration sections on multiple peers
Configure one iBGP neighbor to exchange both IPv4 and IPv6 prefixes over an IPv4 session
Configure one iBGP neighbor as an IPv6-only neighbor with IPv6 peer addresses
Configure eBGP neighbors for IPv4 routing
Configure a simple pass_all policy for those eBGP neighbors
Add VPNv4 capability to one iBGP peer
Add two VRFs into BGP and redistribute static routes into BGP for VPNv4
Configure one iBGP peer to support 6PE type functionality by adding address-familiy IPv6 labeled-unicast
3.7 Verify BGP
Display the peer summary status for IPv4 and IPv6
Display the IPv4 BGP table
Display a specific entry and explain AS path and next-hop information
Determine how much memory the BGP process uses
3.8 Understanding RPL Concepts
Configure RPL
Define an AS-set for use in RPL
Create a route policy that checks for an AS from the AS-set and adds a community for matching routes
Create a route-policy that uses an inline prefix-set and changes the local preference when a match is found
Create a route policy that adds a community where the community is used as a parameter when the policy is called
3.9 Verify RPL
Verify that communities are added as expected
Execute a show bgp… command using a route-policy to modify the output. Compare to regular show command.
3.10 MPLS LDP
Configure router to run LDP
Configure router to log neighbor events
Enable LDP on interfaces
Execute show command to verify status of LDP neighbors
3.11 MPLS TE
Configure OSPF to support traffic engineering extensions
Enable RSVP on interfaces
Create an MPLS TE tunnel with two different path options:
First path explicit
Second path dynamic
3.12 Execute Show Command to Determine Tunnel Status at Tunnel Head
Execute show command to determine tunnel midpoints traversing the router
3.13 Configure IP Multicast
Configure PIM-SM, PIM-SSM, PIM-SSM range
Configure static-RP, Auto-RP, and BSR for PIM-SM
Confiigure Multicast NSF
Configure Multicast VPN
Configure MSDP for interconnecting PIM-SM domains
Configure MoFRR
Configure P2MP-TE for IP Multicast
4.0 Data Plane 20%
4.1 General Forwarding
Understand and monitor interface counters
Clear interface counters
Modify interface counter load interval
Understand the flow of packets through a router
Describe the difference in processing of transit packets versus locally destined packets
Understand the information stored in a forwarding table entry
Troubleshoot packet drops
4.2 Access Control Lists (ACLs)
Implement ACLs to filter traffic on an interface
Monitor ACL counters
Modify an existing applied ACL
Apply ACLs in debug commands
Resequence an ACL
4.3 Quality of Service (QoS)
Implement a basic Quality of Service configuration
Monitor Quality of Service statistics and behaviors
Modify an existing QoS configuration
What is the difference with QoS on IOS XR
4.4 NetFlow
Describe NetFlow capabilities in IOS XR
Implement NetFlow packet sampling
Verify record export
Monitor the NetFlow cache
4.5 Unicast Reverse Path Forwarding (uRPF)
Implement uRPF on an interface
Verify uRPF behavior
4.6 Interface IP addresses
Configure IPv4 addresses on an interface
Configure IPv6 addresses on an interface
Resolve duplicate IP subnets configured on the router
4.7 IP Multicast
Describe Multicast forwarding on XR platforms (egress and fabric replication, etc.)
Monitor IP Multicast traffic
Troubleshoot IP Multicast (RPF, mrib, mfib, olist, etc.)
5.0 Management Plane 19%
5.1 Implementing SNMP on Cisco IOS-XR
Configuring SNMP (v1, v2c, v3) - Does everyone use SNMPv3?
Configuring SNMP trap notifications
Configuring SNMP views, SDRowner and Lrowner
Configuring SNMP ifIndex persistence
Verify SNMP configuration - e.g. using snmpget or snmpwalk
5.2 Implementing Logging Services on Cisco IOS-XR
Configuring logging buffer
Configuring syslog server host as logging destination
Configuring terminals for logging display (term mon)
Configuring logging facility
Configuring local logging device and archiving
Monitoring logging buffer and filtering messages
5.3 Implementing Physical and Virtual Terminals
Configuring line templates, vty pools
Configuring exec timeout
Securing vty line and vty access
Verify vty access-group configuration
5.4 Implementing SSH Access on Cisco IOS-XR
Configuring SSH server (including crypto key generation)
SSH client usage
Verify SSH configuration
5.5 Implementing Telnet Access on Cisco IOS-XR
Configuring telnet server on IOS-XR
5.6 Implementing XML Management on Cisco IOS-XR
Describe XML management on IOS-XR
Configuring XML agent on IOS-XR
Configuring VRF access for XML agent on IOS-XR
5.7 Implementing TACACS+ Authentication, Authorization and Accounting
Configuring AAA Authentication - Using TACACS+ and local as fallback
Confguring AAA Command Authorization - Using TACACS+ and local as fallback
Configuring AAA Command Accounting
Implementing TACACS+ - Assigning task groups and privileges
Verify AAA permissions upon command failure (i.e. debug aaa)
5.8 Configuring CDP on Cisco IOS-XR
Enable CDP on IOS-XR
Monitor CDP neighbors and parameters
5.9 Implementing Management Plane Protection (MPP) on Cisco IOS-XR
Configuring MPP to restrict access from specific IP Addresses and protocols
Configuring MPP to restrict access for out-of-band interface
5.10 Implementing NTP on Cisco IOS-XR
Configuring NTP server
Configuring NTP peer
Securing NTP configurations (NTP access groups)
Verifying NTP status
5.11 Implementing SDRs on IOS-XR
Understand SDR
Describe DSC
Assigning SDR access priviledges
Creating SDRs, adding nodes to non-owner SDRs
Creating username and passwords for non-owner SDRs
Rebooting non-owner SDRs
5.12 Chassis and Hardware Management
Displaying installed modules, status of modules
Displaying environmental status (fan, power, etc)
Enabling and disabling power to a specific line card or module
Reloading line card or module
Displaying chassis and module serial numbers
Reloading RP
Reloading entire chassis
Troubleshoot reason why PLIM/MSC is not booting up
5.13 Implementing EEM on Cisco IOS-XR
QUESTION 1
What is the maximum long-term normal operating temperature of the Cisco CRS-1, ASR 9000
Series Routers, and XR 12000 Series Routers?
A. 40C (104F)
B. 50C (122F)
C. 55C (131F)
D. 65C (149F)
Answer: A
Explanation:
QUESTION 2
The Cisco CRS 16-Slot Line Card Chassis Site Planning Guide suggests having 48 inches of
clearance behind the chassis. What would definitely happen to the system if there were only 28
inches of clearance behind the Cisco CRS 16-Slot Line Card Chassis?
A. The system would overheat due to inadequate airflow.
B. The fabric card could not be exchanged if one failed.
C. The modular services card (MSC) could not be exchanged if one failed.
D. The fan tray could not be exchanged if one failed.
Answer: D
Explanation:
QUESTION 3
How many planes are there in the Cisco CRS-3 switch fabric?
A. 1
B. 3
C. 7
D. 8
Answer: D
Explanation:
QUESTION 4
What is the cell size of the cells that traverse the switch fabric on the Cisco CRS-3?
A. 128 bytes
B. 136 bytes
C. 144 bytes
D. 200 bytes
E. 288 bytes
Answer: B
Explanation:
QUESTION 5
Where are client interfaces terminated on the Cisco CRS-3?
A. the modular services card
B. the physical layer interface module(s)
C. the switch fabric interface terminator
D. the Service Processor 40
E. the Service Processor 140
Answer: B
Explanation:
No comments:
Post a Comment