Skip navigation
Cisco Learning Home > Certifications > CCIE Wireless > Syllabus > Documents

_Communities

Up to Documents in Syllabus

This is an archived version of the document. The current version can be viewed here.

Currently Being Moderated

CCIE Wireless - Written Exam Blueprint ver1.0

VERSION 7 
Created on: Nov 18, 2008 12:53 PM by Adrie: Certifications Community Mgr. - Last Modified:  Nov 20, 2008 10:22 AM by Adrie: Certifications Community Mgr.

CCIE Wireless Written Exam Blueprint The comprehensive CCIE Wireless written exam (#350-050) has 100 multiple-choice questions and is two hours in duration. The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please note, however, that other relevant or related topic areas may also appear. h3. Exam Sections and Sub-task Objectives || 1.00 || Plan WLAN installation: || | 1.01 | Gather the customer requirements for the wireless LAN; provide the expertise necessary to help translate organizational needs into plausible services such as: WLAN (client access, guest access), mobility, security, location (RFID), bridging, Voice, indoor and outdoor network, a wireless network protection system monitoring, wireless mesh, autonomous AP, LWAP. For example: Usage models, user expectations, capacity requirements, high availability. | | 1.02 | Determine the security policies and the constraints. Examples include government, corporate use, universities, health care with HIPPA, and retail with PCI; differentiate the access requirements for private versus open access. | | 1.03 | Identify the information required of the customer to make solution and design recommendations. For example: Based upon the customer requirements, list the questions needed to design the appropriate solution. | | 1.04 | Identify the ambiguity and/or information gaps in network specifications. For example: Given the customer requirements and knowledge of the current network, fill the gaps prohibiting the design. | | 1.05 | Evaluate environmental characteristics to establish the need for a preliminary site survey. For example: Blueprints, anecdotal description of site, on-site inspection. NOTE: Account for common environments such as: hospitals, manufacturing, office, education campuses. | | 1.06 | Define tasks for preliminary site survey; specify the information that must be gathered; use tools to analyze the existing 802.11 and non 802.11 environment such as: Digital camera, RF spectrum analyzer, Cisco Spectrum Expert (Cognio), WCS. Use WCS for prediction modeling. | | 1.07 | Modify proposed solutions based on the regulatory environment. Requires working knowledge of government regulations such as FAA, FCC, ad hoc customer regulations, regulatory domains, regulatory audiences, customer security policy. | | 1.08 | Evaluate the network architecture for: | | 1.08 | (a) Existing Network. | | 1.08 | -i-Layer architecture point of view, Layer 2 VLAN assignment Layer 3 routing, Firewall placement in the network hierarchy. | | 1.08 | -ii- Application point of view, for example DHCP, DNS, NAT/PAT, authentication services (LDAP, AD) | | 1.08 | -iii- Client types, such as Windows, MAC O/S. | | 1.08 | -iv- Existing RF channel use. | | 1.08 | (b) Consider implications of a multi-vendor environment. | | 1.08 | -i- Coexistence with existing wireless infrastructure. | | 1.08 | -ii- Replace other vendor infrastructure (Forklift cutover) | | 1.08 | (c) Consider implications of integration into Greenfield wireless LAN implementations. | | 1.08 | (d) WAN connectivity | || 2.00 || Conduct the site survey to determine access point placement and outside noise, and interference. || || 3.00 || Design WLAN installations: || | 3.01 | Specify the AP quantity and placement based upon the site survey and customer requirements, includes AP type and antenna type. | | 3.02 | Recommend autonomous or unified deployment model. | | 3.03 | If unified deployment model is chosen, then recommend controller design, which includes model, quantity, location, etc. | | 3.04 | Identify the wireless features needed to implement the design. (AP groups, L2/L3 roaming, H-REAP, VoWLAN, AAA override, etc. | | 3.05 | Taking into consideration the requirements, design the wireless topology--including VLANs, DHCP, SSIDs, IP addressing, mobility groups. | | 3.06 | Draft an RF operational model that includes: | | 3.06 | (a) Radio resource management (Auto-RF, manual, hybrid, TPC and DCA) | | 3.06 | (b) Channel use (Radar, other non-WiFi interference) | | 3.06 | (c) Power level, overlap (varies depending on supported applications) | | 3.07 | Draft WLAN Security policies | | 3.07 | (a) Design traffic restrictions for L2 filters (802.11 association filters); L3/L4 filters (ACL) - per user, per interface, per SSID; Management access restrictions; peer-to-peer blocking | | 3.07 | -i- Layer 2/3 security | | 3.07 | -ii- WPS, MFP, NAC | | 3.08 | Specify the server infrastructure needed to provide the required services. | | 3.09 | Determine the feasibility of carrying LWAPP over WAN. End to end delay less than 100ms. | | 3.10 | Determine hardware and software provisioning requirements for the supporting network infrastructure. | | 3.11 | Determine client provisioning given client hardware and software requirements. | | 3.12 | Use wireless network design tools. | | 3.13 | Draft a design that includes deliverables such as: detailed or high level annotated topology diagram, internal estimates for each site- BOMs for a wireless LAN. | || 4.00 || Implement WLAN installations: || | 4.01 | Implement the WLAN in stages including: Priming and system testing access points; Setting appropriate configuration parameters | | 4.02 | Verify the infrastructure applications are configured to support the WLAN, such as: Authentication services (Radius, TACACS+, CA, Database and Client effects authentication types); NTP; DHCP (Option 43, 150); DNS (LWAPP controller); Clients | | 4.03 | Configure the existing network infrastructure and verify that is ready for: VLANS; Multicast; QoS; Routing; Switch port configurations “trunk vs access”; Port access through Firewalls (guest access, anchor controllers) | | 4.04 | For a unified wireless architecture deploy: AP and antennas; WLC without WCS; WCS; Implement Layer 2 and Layer 3 security policies; AP and WLC configurations (auto-provisioning); location (location server, WCS Maps, location calibration) | | 4.05 | For an autonomous wireless architecture deploy: AP and antennas;Wireless Distribution Systems (WDS); Bridges (Point-to-Point, Point-to-Multi-Point); Work-group bridges | | 4.06 | Implement WLAN Security policies | | 4.06 | (a) Traffic restrictions: | | 4.06 | -i- L2 filters (802.11 association filters) | | 4.06 | -ii- L3/L4 filters (ACL) - per user, per interface, per SSID | | 4.06 | -iii- Management access restrictions | | 4.06 | -iv- Peer-to-peer blocking | | 4.06 | (b) layer 2/3 security | | 4.06 | (c) WPS,MFP | | 4.07 | Verify WLAN operation: Client; Location; Voice; Roaming; Post deployment site survey; Network High Availability; Auto-RF | || 5.00 || Operate WLAN installations: || | 5.01 | Determine key performance indicators (kpi) baseline WLAN operational characteristics such as: See Col G | | 5.02 | Collect baseline WLAN operational characteristics using network analysis tools such as: IXIA Chariot, IPERF as examples, SNMP-based tools, WCS | | 5.03 | Establish fault management policy and procedures for indicators that should be routinely monitored. (Establish Alert Profiles; Noise, Channel Utilization, Interference and Load) | | 5.04 | Monitor for faults. | | 5.04 | (a) Actively monitor changes based on thresholds (proactive) | | 5.04 | -i- SNMP polling | | 5.04 | (b) Receive alarms and wait until notification. (reactive) | | 5.04 | -i- SNMP traps, syslog messages, WCS notifications | | 5.05 | Monitor performance trends for: Capacity planning; Error rates, Number of clients associated with an AP, AP loading, Threshold figures (1% packet loss for Voice), reference 802.11t; End-to-end traffic flows | | 5.06 | Monitor WLAN Security policies. | | 5.06 | (a) Traffic restrictions: | | 5.06 | -i- L2 filters (802.11 association filters) | | 5.06 | -ii- L3/L4 filters (ACL) - per user, per interface, per SSID | | 5.06 | -iii- Management access restrictions | | 5.06 | -iv- Peer-to-peer blocking | | 5.06 | (b) layer 2/3 security | | 5.06 | (c) WPS | | 5.07 | Monitor RF environments using: Cisco Spectrum Expert (cognio); AP infrastructures | | 5.08 | Correlate events, alarms and alerts | || 6.00 || Troubleshoot WLAN issues: || | 6.01 | Use the standard troubleshooting method to solve problems. | | 6.02 | Check and validate: | | 6.02 | (a) Client Devices | | 6.02 | -i- Interpret and analyze client side logs. | | 6.02 | -ii- Validate client connectivity/troubleshoot client via WCS. | | 6.02 | -iii- Interpret and analyze wireless traces. | | 6.02 | -iv- Client wireless drivers and supplicant software. | | 6.02 | (b) Network infrastructure. | | 6.02 | -i- Check and validate current channel/power settings | | 6.02 | -ii- Validate security events with WCS | | 6.02 | -iii- Validate location information in WCS | | 6.02 | -iv- Validate trap generation, notifications in WCS | | 6.03 | Analyze the collected information on the RF environment using client-side information (ADU), AP-side information (through WLC or WCS) and spectral analyzers (Cisco Spectrum Expert). | | 6.04 | Upon resolution of problem, verify baseline functionality has been restored | || 7.00 || Troubleshoot WLAN issues. || | 7.01 | DNS | | 7.02 | DHCP | | 7.03 | Syslog | | 7.04 | AAA | | 7.05 | WCS + SNMP | | 7.06 | NTP | || 8.00 || Configure network infratucture to support WLANs || | 8.01 | Catalyst configuration (VLANs, VTP, STP, Trunk, Portchannel,..) | | 8.02 | Configure network connectivity in WLC | | 8.03 | Configure network connectivity in LAP (local mode, hreap + local switching) | | 8.04 | Configure network connectivity in AP (multiple vlans, vs single vlan) | | 8.05 | Configure client to connect/authenticate to SSIDs | | 8.06 | Configure QoS to support voice services over the switching infrastructure  | || 9.00 || Autonomous || | 9.01 | Configure WDS | | 9.02 | Configure local radius | | 9.03 | Configure SSID/MBSSID as needed: | | 9.03 | -i- Security policies | | 9.03 | -ii- Bridging groups | | 9.04 | Configure radio roles | | 9.05 | Configure antenna settings | | 9.06 | Configure association filters | | 9.07 | Configure ACL to control management access | | 9.08 | Configure MFP | | 9.09 | Configure multicast settings | | 9.10 | Configure QoS settings: | | 9.10 | -i- Voice/Video | | 9.10 | -ii- EDCA | | 9.11 | Configure peer to peer blocking | | 9.11 | Configure support for 7920/7921 deployments | || 10.00 || Unified Controllers/AP || | 10.01 | Configure Interface settings | | 10.02 | Configure mobility groups | | 10.03 | Configure WLANs | | 10.04 | Configure multicast settings | | 10.05 | Configure management | | 10.06 | Configure ACL (CPU, Interface) | | 10.07 | Configure peer to peer blocking | | 10.08 | Configure Security | | 10.08 | -i- WPS settings | | 10.08 | -ii- MFP/AP authentication | | 10.08 | -iii- AP authorization | | 10.09 | Configure QoS settings (type of QOS?): | | 10.09 | -i- Voice/Video | | 10.09 | -ii- EDCA | | 10.09 | -iii- per Network settings | | 10.10 | Configure local EAP authentication (against local user list, and external LDAP) | | 10.11 | Configure Webauth | | 10.12 | Local DHCP services for clients | | 10.13 | Configure controller redundancy/fallback | | 10.14 | Configure priming methods | | 10.15 | Configure AutoRF to adapt to site requirements | | 10.16 | Configure support for 7920/7921 deployments | || 11.00 || Unified WCS/Location || | 11.01 | Add/Configure controllers to WCS | | 11.02 | Prepare building/floor map | | 11.03 | Create floor coverage proposal | | 11.04 | Add/Configure location server | | 11.05 | Tune location services given needs (tag tracking, notifications, timers) | | 11.06 | Audit voice deployment | << END >> <br />

Comments (2)