644-906 IMTXR Implementing and Maintaining Cisco Technologies Using IOS XR


644-906 IMTXR Implementing and Maintaining Cisco Technologies Using IOS XR

$108.00 $58.00

Product Description

Exam Number/Code: 644-906

Exam Name: Implementing and Maintaining Cisco Technologies Using IOS XR

Questions and Answers: 77 Q&As

Version: PDF

Sample: 644-906 IMTXR Free Online Test

Purchase this product now and earn 58 Points!


Exam Number 644-906 IMTXR
Associated Certifications Cisco IOS XR Specialist
Duration 90 minutes (65-75 questions)
Available Languages English
Register Pearson VUE

The 644-906 Implementing and Maintaining Cisco Technologies Using IOS XR exam is associated with the Cisco IOS XR Specialist certification. This exam tests a candidate’s knowledge of implementing, verification testing, and maintaining Cisco core and edge technologies, using the IOS XR based router platforms, which include the CRS, ASR 9000, and the XR12000 routers.


21% 1.0 Platform

1.1 Power
1.1.a Recommend PDU as a function of facility
1.1.b Install appropriate PDU for chassis
1.1.c Monitor system power level
1.1.d Show power alarm values
1.2 Environmental
1.2.a Recommend environmental levels for system installation
1.2.b Verify system-detected environment is within tolerance levels
1.2.c Show environmental alarm values
1.2.d Clear environmental alarm
1.2.e Gather system environmental output
1.2.f Recommend rack space requirements
1.2.g Use proper grounding for installation
1.2.h Describe CRS air-flow
1.2.i Describe ASR9000 air-flow
1.3 Physical Architecture
1.3.a Identify CRS switch fabric
1.3.b Identify components of CRS fabric
1.3.c Identify MSC
1.3.d Identify PLIM
1.3.e Identify RP CRS/ASR9000
1.3.f Identify management interface
1.3.g Identify cable management
1.3.h Differentiate between single and multi-chassis
1.3.i Identify ASR9000 line cards
1.3.j Identify ASR9000 RSP
1.3.k Identify ASR9000 PDU
1.3.l Identify ASR9000 SIP-700/SPA
1.3.m Identify CRS SIP/SPA
1.3.n Identify CRS chassis
1.3.o Identify ASR9000 chassis
1.3.p Describe ASR9000 fabric
1.4 Inventory
1.4.a Show card status via show platform
1.4.b Show cards via show diagrams
1.4.c Show inventory of the system
1.4.d Difference between admin versus exec plane for show platform
1.5 Environmental
1.5.a Show power usage
1.5.b Show fan status
1.5.c Difference between admin versus exec plane for show platform
1.6 Firmware
1.6.a Understanding what is a FPD.PIE
1.6.b Configure Auto FPD
1.6.c Understand what is Parallel FPD
1.6.d Upgrade FPD and ROMMON Upgrade
1.6.e Understand FPD versus ROMMON
1.6.f Upgrading FPDs and ROMMONs
1.6.g Showing current FPD version information

19% 2.0 Operating System

2.1 Install
2.1.a Using TFTP, FTP, USB thumb drive, and hard drive as the source
2.1.b With activate flag
2.1.c Using source flag
2.1.d Using TAR file
2.2 Licensing
2.2.a Activate PIEs or SMUs
2.2.b Initial or recovery software installation (ROMMON variables)
2.2.c Initial or recovery software installation (Turboboot Mini.VM file)
2.2.d Deactivate PIEs or SMUs
2.2.e Remove inactive packages, PIEs, or SMUs
2.2.f Committing the installation path
2.2.g Check which packages are active
2.2.h Check which packages are committed
2.2.i Check installation log
2.2.j See what install requests are currently active
2.2.k Understanding security certificate in PIEs and SMUs
2.3 Packages
2.3.a Understanding types of packages (Mini.PIE)
2.3.b Understanding types of packages (Mini.VM)
2.3.c Understanding types of packages (optional PIEs)
2.3.d Understanding types of packages (SMUs)
2.3.e Understand IOS-XR versioning and installation restrictions
2.3.f Understand P versus PX images and the hardware they support
2.4 Two-stage commit
2.4.a Understand what is active config
2.4.b Understand what is target config
2.4.c Understand when a syntax check is done
2.4.d Understand when a semantic check is done
2.4.e Going back to a previous configuration
2.4.f Showing configuration IDs and labels
2.4.g Show configuration history
2.4.h Loading configuration
2.4.i Committing the configuration (atomic versus best effort)
2.4.j Committing the configuration (with labels and comments)
2.4.k Committing the configuration (replacing the configuration)
2.4.l Committing the configuration (using the commit confirm feature)
2.4.m Committing the configuration (show config fail)
2.4.n Configure interfaces before the physical interface is available)
2.5 Configuration planes
2.5.a Understand what configuration is in the Admin plane
2.5.b Understand what configuration is in the Exec plane
2.5.c Understand differences between owner and non-owner SDR in access to Admin plane and Exec plane
2.5.d Understand the default VRF
2.6 Task-based authorization
2.6.a Assigning user privilege to root-system
2.6.b Assigning user privilege to root-lr
2.6.c Assigning user privilege to cisco-support
2.6.d Understand between admin user versus exec username
2.6.e Understanding how task-based authorization work
2.7 Process
2.7.a How to perform process restart
2.7.b How to check processes like state, number of restarts, job id, pid, tid
2.7.c Show where certain processes are running
2.7.d How to find a blocked process
2.7.e Check how much CPU a process is using
2.8 LPTS
2.8.a Understand what is LPTS
2.8.b Understand about LPTS policer
2.8.c How to use Show LPTS commands
2.8.d Show policer values and drop counts in LPTS
2.9 Memory
2.9.a How to look at the memory utilization on the route processor
2.9.b How to look at the memory utilization on the line card
2.9.c Understand protected memory space versus shared memory and which area uses it
2.9.d Check how much memory a process is using
2.10 Support
2.10.a How to use Show Tech Support commands
2.10.b Core file configuration location including hard drive and FTP
2.10.c Debug commands with ACL filtering
2.10.d Locate core files and moving them to a server
2.11 Parser
2.11.a Using the parser with pipe, include, exclude, begin, regex
2.12 EEM
2.12.a Base assumption of EEM knowledge – understand what is possible/not possible

21% 3.0 Control Plane

3.1 Configuring OSPF
3.1.a Configure interfaces to be part of the backbone area
3.1.b Configure additional interfaces to be part of non-backbone area
3.1.c Configure non-default metric on some interfaces
3.1.d Configure neighbor logging so adjacency changes can be monitored
3.2 Verify OSPF
3.2.a Determine status of OSPF interfaces
3.2.b Determine status of neighbors
3.2.c Display OSPF database and determine which links are present
3.3 Configuring ISIS
3.3.a Configure the ISIS NET
3.3.b Enable ISIS for IPv4 unicast routing
3.3.c Configure interfaces for ISIS routing
3.3.d Enable ISIS for IPv6 unicast routing
3.3.e Enable some but not all of the IPv4 enabled interfaces for IPv6 routing
3.4 Verify ISIS
3.4.a Determine status if interfaces are configured for ISIS
3.4.b Determine the status of the routing adjacencies
3.4.c Display the IPv4 unicast route table
3.4.d Turn and debugging for ISIS adjacencies and explain the information shown
3.4.e Display the topologies for IPv4 and IPv6. Why are they different?
3.5 Add static routes
3.5.a Configure static routes for IPv4 unicast in the global table
3.5.b Configure static routes in for IPv4 unicast in two different VRFs
3.6 Configure BGP
3.6.a Configure an autonomous system number for BGP to use
3.6.b Configure BGP to support IPv4 routing
3.6.c Configure BGP to support IPv6 routing
3.6.d Configure iBGP neighbors with the typical configuration to use loopback addresses for peering
3.6.e Use neighbor-groups for identical configuration sections on multiple peers
3.6.f Configure one iBGP neighbor to exchange both IPv4 and IPv6 prefixes over an IPv4 session
3.6.g Configure one iBGP neighbor as an IPv6-only neighbor with IPv6 peer addresses
3.6.h Configure eBGP neighbors for IPv4 routing
3.6.i Configure a simple pass_all policy for those eBGP neighbors
3.6.j Add VPNv4 capability to one iBGP peer
3.6.k Add two VRFs into BGP and redistribute static routes into BGP for VPNv4
3.6.l Configure one iBGP peer to support 6PE type functionality by adding address-family IPv6 labeled-unicast
3.7 Verify BGP
3.7.a Display the peer summary status for IPv4 and IPv6
3.7.b Display the IPv4 BGP table
3.7.c Display a specific entry and explain AS path and next-hop information
3.7.d Determine how much memory the BGP process uses
3.8 Understanding RPL concepts
3.8.a Configure RPL
3.8.b Define an AS-set for use in RPL
3.8.c Create a route policy that checks for an AS from the AS-set and adds a community for matching routes
3.8.d Create a route-policy that uses an inline prefix-set and changes the local preference when a match is found
3.8.e Create a route policy that adds a community where the community is used as a parameter when the policy is called
3.9 Verify RPL
3.9.a Verify that communities are added as expected
3.9.b Execute a show bgp … command using a route-policy to modify the output. Compare to regular show command
3.10.a Configure router to run LDP
3.10.b Configure router to log neighbor events
3.10.c Enable LDP on interfaces
3.10.d Execute show command to verify status of LDP neighbors
3.11 MPLS TE
3.11.a Configure OSPF to support traffic engineering extensions
3.11.b Enable RSVP on interfaces
3.11.c Create an MPLS TE tunnel with two different path option:
3.11.d First path explicit
3.11.e Second path dynamic
3.12 Execute show command to determine tunnel status at tunnel head
3.12.a Execute show command to determine tunnel midpoints traversing the router
3.13 Configure IP multicast
3.13.a Configure PIM-SM, PIM-SSM, PIM-SSM range
3.13.b Configure static-RP, Auto-RP and BSR for PIM-SM
3.13.c Configure Multicast NSF
3.13.d Configure Multicast VPN
3.13.e Configure MSDP for interconnecting PIM-SM domains
3.13.f Configure MoFRR
3.13.g Configure P2MP-TE for IP Multicast

20% 4.0 Data Plane

4.1 General forwarding
4.1.a Understand and monitor interface counters
4.1.b Clear interface counters
4.1.c Modify interface counter load interval
4.1.d Understand the flow of packets through a router
4.1.e Describe the difference in processing of transit packets vs. locally destined packets
4.1.f Understand the information stored in a forwarding table entry
4.1.g Troubleshoot packet drops
4.2 ACL
4.2.a Implement ACLs to filter traffic on an interface
4.2.b Monitor ACL counters
4.2.c Modify an existing applied ACL
4.2.d Apply ACLs in debug commands
4.2.e Re-sequence an ACL
4.3 QoS
4.3.a Implement a basic Quality of Service (QoS) configuration
4.3.b Monitor QoS statistics and behaviors
4.3.c Modify an existing QoS configuration
4.3.d What is the difference with QoS on IOS XR
4.4 Netflow
4.4.a Describe NetFlow capabilities in IOS XR
4.4.b Implement NetFlow packet sampling
4.4.c Verify record export
4.4.d Monitor the NetFlow cache
4.5 Unicast Reverse Path Forwarding (uRPF)
4.5.a Implement uRPF on an interface
4.5.b Verify uRPF behavior
4.6 Interface IP address
4.6.a Configure IPv4 addresses on an interface
4.6.b Configure IPv6 addresses on an interface
4.6.c Resolve duplicate IP subnets configured on the router
4.7 IP Multicast
4.7.a Describe multicast forwarding on XR platforms (egress/fabric replication, etc.)
4.7.b Monitor IP multicast traffic
4.7.c Troubleshoot IP multicast (RPF, mrib, mfib, olist, etc.)

19% 5.0 Management Plane

5.1 Implementing SNMP on IOS-XR
5.1.a Configuring SNMP (v1/v2c/v3) – Does everyone use SNMPv3?
5.1.b Configuring SNMP trap notifications
5.1.c Configuring SNMP views, SDRowner/Lrowner
5.1.d Configuring SNMP ifIndex persistence
5.1.e Verify SNMP Configuration; e.g., using snmpget/snmpwalk
5.2 Implementing logging services on IOS-XR
5.2.a Configuring logging buffer
5.2.b Configuring syslog server host as logging destination
5.2.c Configuring terminals for logging display (term mon)
5.2.d Configuring logging facility
5.2.e Configuring local logging device/archiving
5.2.f Monitoring logging buffer and filtering messages
5.3 Implementing physical and virtual terminals
5.3.a Configuring line templates, vty pools
5.3.b Configuring exec timeout
5.3.c Securing vty line and vty access
5.3.d Verify vty access-group configuration
5.4 Implementing SSH Access on IOS-XR
5.4.a Configuring ssh server (including crypto key generation)
5.4.b ssh client usage
5.4.c Verify ssh configuration
5.5 Implementing telnet access on IOS-XR
5.5.a Configuring telnet server on IOS-XR
5.6 Implementing XML management on IOS-XR
5.6.a Describe XML management on IOS-XR
5.6.b Configuring XML agent on IOS-XR
5.6.c Configuring VRF access for XML agent on IOS-XR
5.7 Implementing TACACS+ authentication, authorization and accounting
5.7.a Configuring AAA authentication – using TACACS+ and local as fallback
5.7.b Configuring AAA command authorization – Using TACACS+ and local as fallback
5.7.c Configuring AAA command accounting
5.7.d Implementing TACACS+ – assigning tasks groups and privileges
5.7.e Verify AAA permissions upon command failure (i.e., debug aaa)
5.8 Configuring CDP on IOS-XR
5.8.a Enable CDP on IOS-XR
5.8.b Monitor CDP neighbors and parameters
5.9 Implementing Management Plane Protection (MPP) on IOS-XR
5.9.a Configuring MPP to restrict access from specific IP
5.9.b Configuring MPP to restrict access for out-of-band interface
5.10 Implementing NTP on IOS-XR
5.10.a Configuring NTP server
5.10.b Configuring NTP peer
5.10.c Securing NTP configurations (NTP access groups)
5.10.d Verifying NTP status
5.11 Implementing SDRs on IOS-XR
5.11.a Understand SDR
5.11.b Describe DSC
5.11.c Assigning SDR access privileges
5.11.d Creating SDRs, adding nodes to non-owner SDRs
5.11.e Creating username and passwords for non-owner SDRs
5.11.f Rebooting non-owner SDRs
5.12 Chassis/hardware management
5.12.a Displaying installed modules, status of modules
5.12.b Displaying environmental status (fan, power, etc.)
5.12.c Enabling/disabling power to specific linecard/module
5.12.d Reloading linecard/module
5.12.e Displaying chassis and module serial numbers
5.12.f Reloading RP
5.12.g Reloading entire chassis
5.12.h Troubleshoot reason why PLIM/MSC is not booting up
5.13 Implementing EEM on IOS-XR



成为第一个评论 “644-906 IMTXR Implementing and Maintaining Cisco Technologies Using IOS XR” 的人

has been added to your cart: