24 June 19
Cisco CCNA Updates: Comparing The Current & New Exams
Posted byKeith Bogart
This chart compares the current CCNA exams to the upcoming new exams that Cisco will release on February 24, 2020.
Note: A blue cell indicates a topic unique to that exam. You can find a list of resources to prepare you for these changes, here.
CCNA 200-125 topics | CCNA 200-301 topics |
1.1 Compare and contrast OSI and TCP/IP models | |
1.2 Compare and contrast TCP and UDP protocols | 1.5 Compare TCP to UDP |
1.3 Describe the impact of infrastructure components in an enterprise network | 1.1 Explain the role and function of network components |
1.3.a Firewalls | 1.1.c Next-generation firewalls and IPS |
1.3.b Access points | 1.1.d Access points |
1.3.c Wireless controllers | 1.1.e Controllers (Cisco DNA Center and WLC) |
|
1.1.a Routers |
1.1.b L2 and L3 switches | |
1.1.f Endpoints | |
1.1.g Servers | |
1.4 Describe the effects of cloud resources on enterprise network architecture | 1.2 Describe characteristics of network topology architectures |
1.4.a Traffic path to internal and external cloud services | 1.2.f On-premises and cloud |
1.4.b Virtual services |
|
1.4.c Basic virtual network infrastructure | |
1.12 Explain virtualization fundamentals (virtual machines) | |
1.5 Compare and contrast collapsed core and three-tier architectures | 1.2 Describe characteristics of network topology architectures 1.2.a 2 tier 1.2.b 3 tier |
1.6 Compare and contrast network topologies |
|
1.6.a Star | |
1.6.b Mesh | |
1.6.c Hybrid | |
|
1.2 Describe characteristics of network topology architectures |
1.2.c Spine-leaf | |
1.2.e Small office/home office (SOHO) | |
1.7 Select the appropriate cabling type based on implementation requirements | 1.3 Compare physical interface and cabling types 1.3.a Single-mode fiber, multimode fiber, copper 1.3.b Connections (Ethernet shared media and point-to-point) |
1.3.c Concepts of PoE | |
1.8 Apply troubleshooting methodologies to resolve problems |
|
1.8.a Perform and document fault isolation | |
1.8.b Resolve or escalate | |
1.8.c Verify and monitor resolution | |
1.9 Configure, verify, and troubleshoot IPv4 addressing and subnetting | 1.6 Configure and verify IPv4 addressing and subnetting |
1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux) | |
1.10 Compare and contrast IPv4 address types |
|
1.10.a Unicast | |
1.10.b Broadcast | |
1.10.c Multicast | |
1.11 Describe the need for private IPv4 addressing | 1.7 Describe the need for private IPv4 addressing |
1.12 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment | |
1.13 Configure, verify, and troubleshoot IPv6 addressing | 1.8 Configure and verify IPv6 addressing and prefix |
1.14 Configure and verify IPv6 Stateless Address Auto Configuration | |
1.15 Compare and contrast IPv6 address types | 1.9 Compare IPv6 address types |
1.15.a Global unicast | 1.9.a Global unicast |
1.15.b Unique local | 1.9.b Unique local |
1.15.c Link local | 1.9.c Link local |
1.15.d Multicast | 1.9.e Multicast |
1.15.e Modified EUI 64 | 1.9.f Modified EUI 64 |
1.15.f Autoconfiguration | |
1.15.g Anycast | 1.9.d Anycast |
|
1.11 Describe wireless principles |
1.11.a Nonoverlapping Wi-Fi channels | |
1.11.b SSID | |
1.11.c RF | |
1.11.d Encryption | |
2.1 Describe and verify switching concepts | 1.13 Describe switching concepts |
2.1.a MAC learning and aging | 1.13.a MAC learning and aging |
2.1.b Frame switching | 1.13.b Frame switching |
2.1.c Frame flooding | 1.13.c Frame flooding |
2.1.d MAC address table | 1.13.d MAC address table |
2.2 Interpret Ethernet frame format | |
2.3 Troubleshoot interface and cable issues (collisions, errors, duplex, speed) | 1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed) |
2.4 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches | 2.1 Configure and verify VLANs (normal range) spanning multiple switches |
2.4.a Access ports (data and voice) | 2.1.a Access ports (data and voice) |
2.4.b Default VLAN | 2.1.b Default VLAN |
2.5 Configure, verify, and troubleshoot interswitch connectivity | 2.2 Configure and verify interswitch connectivity |
2.5.a Trunk ports | 2.2.a Trunk ports |
2.5.b Add and remove VLANs on a trunk | |
2.5.c DTP, VTP (v1&v2), and 802.1Q | 2.2.b 802.1Q |
2.5.d Native VLAN | 2.2.c Native VLAN |
2.6 Configure, verify, and troubleshoot STP protocols | 2.5 Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations |
2.6.a STP mode (PVST+ and RPVST+) | |
2.6.b STP root bridge selection | 2.5.a Root port, root bridge (primary/secondary), and other port names |
2.5.b Port states (forwarding/blocking) | |
2.7 Configure, verify and troubleshoot STP related optional features | |
2.7.a PortFast | 2.5.c PortFast benefits |
2.7.b BPDU guard | |
2.8 Configure and verify Layer 2 protocols | 2.3 Configure and verify Layer 2 discovery protocols |
2.8.a Cisco Discovery Protocol | ---Cisco Discovery Protocol |
2.8.b LLDP | ---LLDP |
2.9 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel | 2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP) |
2.9.a Static |
|
2.9.b PAGP | |
2.9.c LACP | |
2.10 Describe the benefits of switch stacking and chassis aggregation | |
|
2.6 Compare Cisco Wireless Architectures and AP modes |
2.7 Describe physical infrastructure connections of WLAN components (AP,WLC, access/trunk ports, and LAG) | |
2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP,HTTPS, console, and TACACS+/RADIUS) | |
2.9 Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings | |
5.9 Describe wireless security protocols (WPA, WPA2, and WPA3) | |
5.10 Configure WLAN using WPA2 PSK using the GUI | |
3.1 Describe the routing concepts | 3.2 Determine how a router makes a forwarding decision by default |
3.1.a Packet handling along the path through a network | |
3.1.b Forwarding decision based on route lookup | 3.2.a Longest match |
3.1.c Frame rewrite | |
3.2 Interpret the components of a routing table | 3.1 Interpret the components of routing table |
3.2.a Prefix | 3.1.b Prefix |
3.2.b Network mask | 3.1.c Network mask |
3.2.c Next hop | 3.1.d Next hop |
3.2.d Routing protocol code | 3.1.a Routing protocol code |
3.2.e Administrative distance | 3.1.e Administrative distance |
3.2.f Metric | 3.1.f Metric |
3.2.g Gateway of last resort | 3.1.g Gateway of last resort |
3.3 Describe how a routing table is populated by different routing information sources | 3.2 Determine how a router makes a forwarding decision by default |
3.3.a Admin distance | 3.2.b Administrative distance |
3.2.c Routing protocol metric | |
3.4 Configure, verify, and troubleshoot inter-VLAN routing |
|
3.4.a Router on a stick | |
3.4.b SVI | |
3.5 Compare and contrast static routing and dynamic routing | |
3.6 Compare and contrast distance vector and link state routing protocols | |
3.7 Compare and contrast interior and exterior routing protocols | |
3.8 Configure, verify, and troubleshoot IPv4 and IPv6 static routing | 3.3 Configure and verify IPv4 and IPv6 static routing |
3.8.a Default route | 3.3.a Default route |
3.8.b Network route | 3.3.b Network route |
3.8.c Host route | 3.3.c Host route |
3.8.d Floating static | 3.3.d Floating static |
3.9 Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) | 3.4 Configure and verify single area OSPFv2 3.4.a Neighbor adjacencies 3.4.b Point-to-point 3.4.c Broadcast (DR/BDR selection) 3.4.d Router ID |
3.10 Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) |
|
3.11 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub) | |
3.12 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub) | |
3.13 Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution) | |
3.14 Troubleshoot basic Layer 3 end-to-end connectivity issues | |
4.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication | |
4.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication | |
4.3 Configure, verify, and troubleshoot GRE tunnel connectivity | |
4.4 Describe WAN topology options | 1.2 Describe characteristics of network topology architectures 1.2.d WAN |
4.4.a Point-to-point |
|
4.4.b Hub and spoke | |
4.4.c Full mesh | |
4.4.d Single vs dual-homed | |
4.5 Describe WAN access connectivity options | |
4.5.a MPLS | |
4.5.b Metro Ethernet | |
4.5.c Broadband PPPoE | |
4.5.d Internet VPN (DMVPN, site-to-site VPN, client VPN) | |
4.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only) | |
4.7 Describe basic QoS concepts | 4.7 Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping |
4.7.a Marking |
|
4.7.b Device trust | |
4.7.c Prioritization | |
4.7.c. [i] Voice | |
4.7.c. [ii] Video | |
4.7.c. [iii] Data | |
4.7.d Shaping | |
4.7.e Policing | |
4.7.f Congestion management | |
5.1 Describe DNS lookup operation | 4.3 Explain the role of DHCP and DNS within the network |
5.2 Troubleshoot client connectivity issues involving DNS | |
5.3 Configure and verify DHCP on a router (excluding static reservations) | 4.3 Explain the role of DHCP and DNS within the network |
5.3.a Server | |
5.3.b Relay | 4.6 Configure and verify DHCP client and relay |
5.3.c Client |
|
5.3.d TFTP, DNS, and gateway options | |
5.4 Troubleshoot client- and router-based DHCP connectivity issues | |
5.5 Configure, verify, and troubleshoot basic HSRP | 3.5 Describe the purpose of first hop redundancy protocol |
5.5.a Priority |
|
5.5.b Preemption | |
5.5.c Version | |
5.6 Configure, verify, and troubleshoot inside source NAT | 4.1 Configure and verify inside source NAT using static and pools |
5.6.a Static |
|
5.6.b Pool | |
5.6.c PAT | |
5.7 Configure and verify NTP operating in a client/server mode | 4.2 Configure and verify NTP operating in a client and server mode |
|
|
5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques) | |
5.2 Describe security program elements (user awareness, training, and physical access control) | |
5.4 Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics) | |
5.5 Describe remote access and site-to-site VPNs | |
6.1 Configure, verify, and troubleshoot port security | 5.7 Configure Layer 2 security features (...and port security) |
6.1.a Static |
|
6.1.b Dynamic | |
6.1.c Sticky | |
6.1.d Max MAC addresses | |
6.1.e Violation actions | |
6.1.f Err-disable recovery | |
6.2 Describe common access layer threat mitigation techniques | |
6.2.a 802.1x | |
6.2.b DHCP snooping | 5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security) |
6.2.c Nondefault native VLAN | |
6.3 Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering | 5.6 Configure and verify access control lists |
6.3.a Standard |
|
6.3.b Extended | |
6.3.c Named | |
6.4 Verify ACLs using the APIC-EM Path Trace ACL analysis tool | |
6.5 Configure, verify, and troubleshoot basic device hardening | 5.3 Configure device access control using local passwords |
6.5.a Local authentication |
|
6.5.b Secure password | |
6.5.c Access to device | |
6.5.c. [i] Source address | |
6.5.c. [ii] Telnet/SSH | 4.8 Configure network devices for remote access using SSH |
6.5.d Login banner | |
6.6 Describe device security using AAA with TACACS+ and RADIUS | 5.8 Differentiate authentication, authorization, and accounting concepts |
7.1 Configure and verify device-monitoring protocols | 4.4 Explain the function of SNMP in network operations |
7.1.a SNMPv2 |
|
7.1.b SNMPv3 | |
7.1.c Syslog | 4.5 Describe the use of syslog features including facilities and levels |
7.2 Troubleshoot network connectivity issues using ICMP echo-based IP SLA |
|
7.3 Configure and verify device management | |
7.3.a Backup and restore device configuration | |
7.3.b Using Cisco Discovery Protocol or LLDP for device discovery | 2.3 Configure and verify Layer 2 discovery protocols ---Cisco Discovery Protocol |
7.3.c Licensing |
|
7.3.d Logging | |
7.3.e Timezone | |
7.3.f Loopback | |
7.4 Configure and verify initial device configuration | |
7.5 Perform device maintenance | |
7.5.a Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify) | 4.9 Describe the capabilities and function of TFTP/FTP in the network |
7.5.b Password recovery and configuration register |
|
7.5.c File system management | |
7.6 Use Cisco IOS tools to troubleshoot and resolve problems | |
7.6.a Ping and traceroute with extended option | |
7.6.b Terminal monitor | |
7.6.c Log events | |
7.6.d Local SPAN | |
7.7 Describe network programmability in enterprise network architecture | 6.1 Explain how automation impacts network management |
7.7.a Function of a controller | 6.2 Compare traditional networks with controller-based networking |
7.7.b Separation of control plane and data plane | 6.3 Describe controller-based and software defined architectures (overlay, underlay, and fabric) 6.3.a Separation of control plane and data plane |
7.7.c Northbound and southbound APIs | 6.3.b North-bound and south-bound APIs |
|
6.4 Compare traditional campus device management with Cisco DNA Center enabled device management |
6.5 Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding) | |
6.6 Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible | |
6.7 Interpret JSON encoded data
|