|
Certkingdom's preparation material includes the most excellent features, prepared by the same dedicated experts who have come together to offer an integrated solution. We provide the most excellent and simple method to pass your certification exams on the first attempt "GUARANTEED"
Whether you want to improve your skills, expertise or career growth, with Certkingdom's training and certification resources help you achieve your goals. Our exams files feature hands-on tasks and real-world scenarios; in just a matter of days, you'll be more productive and embracing new technology standards. Our online resources and events enable you to focus on learning just what you want on your timeframe. You get access to every exams files and there continuously update our study materials; these exam updates are supplied free of charge to our valued customers. Get the best 600-211 exam Training; as you study from our exam-files "Best Materials Great Results"
600-211 Exam + Online / Offline and Android Testing Engine & 4500+ other exams included
$50 - $25 (you save $25)
Buy Now
600-211 SPCDMA
Implementing Cisco Service Provider Mobility CDMA Networks (SPCDMA)
Exam Number 600-211 SPCDMA
Associated Certifications Cisco Service Provider Mobility CDMA to LTE Specialist
This exam tests a candidate's knowledge of the skills required to understand and implement technologies, components, architecture fundamentals and products that are found in Code Division Multiple Access (CDMA) packet core networks. The exam includes information on 3GPP2 standardized technologies that are implemented on the Packet Data Serving Node (PDSN) and the Home Agent (HA), as well as, PDSN and HA interaction with authentication, charging, and billing components. This exam also includes configuration details of how the PDSN and HA components, as well as, the HRPD Serving Gateway (HSGW) are implemented on the Cisco ASR 5000 Series system. This exam is a requirement in order to attain the Cisco Service Provider Mobility CDMA to LTE Specialist certification.
The exam is closed book and no outside reference materials are allowed. The following topics are general guidelines for the content that is likely to be included on the practical exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the following guidelines may change at any time without notice.
4% 1.0 CDMA
1.1 Identify key functions of CDMA and basic understanding of architecture and interfaces
1.2 Describe the attach procedure and call flow (north- and southbound APIs, GUI interface, CLI)
9% 2.0 MIP/Proxy MIP/Simple IP
2.1 Simple IP
2.1.a Describe Simple IP protocol and interfaces
2.2 Mobile IP
2.2.a Describe Mobile IP protocol and interfaces
2.2.b Describe Mobile IP registration/registration revocation
2.2.c Describe MIPv4 in foreign agent mode
2.3 Proxy MIP
2.3.a Describe proxy MIPv6 protocol and interfaces
2.3.b Describe dual stack mobile IPv6 protocol and interfaces
2.3.c Describe integration with LTE networks
11% 3.0 Diameter (MPC centric)
3.1 Define and understand diameter base protocol
3.2 Understand transport layer functionality of diameter protocol
3.3 Understand and implement diameter routing agents
3.4 Understand diameter peer discoveryUnderstand diameter peer discovery
3.5 Understanding diameter message processing
3.6 Understanding diameter error handling mechanism
3.7 Describe and understand diameter re-authorization procedure
3.8 Describe and understand DCCA model
12% 4.0 Tunneling Protocols
4.1 Basics of tunneling and encryption
4.1.a Identify application of tunneling in wireless data networks
4.2 Generic Routing Encapsulation (GRE)
4.2.a Identify applications of GRE in wireless data networks
4.2.b Configure GRE tunnels
4.2.c Troubleshoot GRE tunnels
4.3 Network troubleshooting
4.3.a Identify applications of l2TP in wireless data networks
4.3.b Describe LNS selection and load balancing
4.3.c Describe L2TP over IPSec
4.3.d Configuring L2TP tunnels
4.3.e Troubleshoot L2TP tunnels
4.4 Network virtualization
4.4.a Configure IPSec tunnels on the GGSN
4.4.b Identify applications of IPSec tunnels as applied to mobile wireless networks
4.4.c Describe IPSec for IPv6
4.4.d Troubleshoot IPSec
4.5 Automation/orchestration
4.5.a Describe MPLS over BGP in mobile packet core networks
4.5.b Configure MPLS over BGP
4.5.c Troubleshoot MPLS over BGP
11% 5.0 Home Agent (3G CDMA)
5.1 Network functions HA
5.1.a Describe the HA architecture and interfaces
5.1.b Describe the IPv4 and IPv6 address allocation to UE
5.1.c Explain the basic functions of EVDO-RevA QoS
5.2 Authentication and Authorization
5.2.a Configure and implement Radius Authentication and Authorization
5.3 Accounting and Charging
5.3.a Configure and implement Radius Accounting
5.3.b Configure and implement Online charging (OCS) via Gy interface
5.3.c Configure and implement Offline charging (OFCS) via Rf/Ga interface
5.3.d Configure and implement the Enhanced Charging Service
5.3.e Configure and implement EDR / UDR
5.3.f Configure and implement Policy and Charging Control via Gx interface
5.4 Change management
5.4.a Configure and implement various tunneling GRE, IP-in-IP, IPSec
13% 6.0 PDSN/Foreign Agent (3G CDMA node)
6.1 Network functions PDSN
6.1.a Describe the PDSN architecture and interfaces
6.1.b Describe IPv4 address allocation to UE for Simple IP
6.1.c Configure SIP/PMIP/MIP
6.2 Authentication and Authorization
6.2.a Configure and implement Radius Authentication and Authorization
6.3 Accounting and Charging
6.3.a Configure and implement Radius Accounting
6.3.b Configure and implement the Enhanced Charging Service
6.3.c Configure and implement EDR/UDR
6.4 Configure and implement RP interfaces to RNC/PCF
20% 7.0 HSGW (4G EHRPD node)
7.1 Network functions HSGW
7.1.a Basic understanding of HSGW architecture and interfaces
7.1.b Basic understanding of HSGW's call flows MIP/PMIP/QoS
7.1.c Basic understanding of MAG service on HSGW
7.1.d Basic understanding of LMA service on PGW
7.1.e Basic understanding of PGW selection
7.1.f Optimized and non-optimized handover between 3GPP and non-3GPP
7.2 Authentication and Authorization
7.2.a Configure and implement STa Diameter Authentication and Authorization
7.3 Accounting and Charging
7.3.a Configure and implement Online charging (OCS) via Gy interface
7.3.b Configure and implement Offline charging (OFCS)
7.4 Policy
7.4.a Configure and implement Policy via Gxa interface
7.5 Radio Network Interface
7.5.a Configure and implement RP interfaces to eRNC
20% 8.0 Inline Services
8.1 Packet Inspection
8.1.a Explain common L7 applications
8.1.b Describe Packet processing by the traffic inspection engine
8.1.c Describe and Configuration of rules to be used for traffic inspection
8.1.d Describe and Configuration of the charging rules
8.1.e Configure charging policies
8.1.f Design and Configuration of rulebases, and designs the priorities for the rules and their corresponding charging policies
8.1.g Describe Handling of VOIP traffic
8.1.h Configure post processing rules
8.1.i Troubleshoot Packet Inspection
8.2 P2P Detection
8.2.a Configure the rules for the various P2P applications
8.2.b Describe mechanism of updating the software to detect newer P2P applications
8.3 Content Filtering
8.3.a Describe the various Content Filtering mechanisms available
8.3.b Describe ICAP protocol
8.3.c Configure content filtering
8.3.d Troubleshoot content filtering
8.4 Firewall Policies
8.4.a Describe the Basics of stateful attacks
8.4.b Configure access rules
8.4.c Troubleshoot firewall policies
8.5 NAT
8.5.a Configure NAT IP Pools, and Port Chunk Groups to be used
8.5.b Configure the NAT accounting records
8.5.c Troubleshoot NAT
8.6 Event Based Charging
8.6.a Configure Event Data Records (EDRs)
8.6.b Configuration flow based charging records (Enhanced GCDR Records)
8.6.c Describe report generation using EDRs for different types
8.7 Fraud Detection
8.7.a Describe DNS Snooping
8.7.b Explain the various mechanisms available for detection of tethered traffic
8.7.c Describe updating the database for the list of known tethered devices
8.7.d Configure fraud detection
8.7.e Troubleshoot fraud detection
8.8 HTTP Header Enrichment
8.8.a Describe HTTP Header Enrichment
8.8.b Configure HTTP Header Enrichment
8.8.c Troubleshoot HTTP Header Enrichment