CCCE Study Guide

First Edition

Copyright © 2016 Pearson Education, Inc.

ISBN-10: 1-58714-461-1
ISBN-13: 978-1-58714-461-5

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.

When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing.

First Printing: October 2015

Corrections for October 15, 2015

Pg / Error / Correction
50 thru 51 / Chapter 2, Last Paragraph, Third Sentence
Reads:
In this design model, the border area that interconnects the campus or data center network with the WAN or internet edge devices can be deployed as totally NSSA. / Should read:
In this design model, the border area that interconnects the campus or data center network with the WAN or internet edge devices can be deployed as NSSA.
51 / Chapter 2, Figure 2-16, Right Side Label
Reads:
OSPF Totally NSSA Area / Should read:
OSPF NSSA Area
51 / Chapter 2, Figure 2-16 Caption
Reads:
Figure 2-16 OSPF Totally NSSA / Should read:
Figure 2-16 OSPF NSSA Area
487 thru 488 / Chapter 10, Table 10-5, Remove Second Sentence of (Mechanism) MPLS: 6PE, Column Design Concern
May introduce scalability limitation because a separate Routing Information Base (RIB) and Forwarding Information Base (FIB) is required per customer / Move Sentence to (Mechanism) MPLS: 6VPE, Design Concern as First Sentence in Column
May introduce scalability limitation because a separate Routing Information Base (RIB) and Forwarding Information Base (FIB) is required per customer.
521 / Chapter 10, QoS Design Consideration, First Paragraph, Last Sentence
Reads:
(See Table 2-1, Chapter 2, “Enterprise Layer 2 and Layer 3 Design”, for an example of the various applications of today’s converged networks.) / Should read:
(See Table “Enterprise Application Requirements”, Page 32.)
580 / Appendix: References / Add New References
134. “Secure Extension of L3 VPN’s over IP-Based Wide Area Networks”, http://www.cisco.com
135. “IPv6 planning, Deployment, troubleshooting”, http://www.ciscolive.com
136. “IPv6 Design and Transition mechanisms”, http://www.ciscolive.com
137. “Advanced mVPN Deployment Models”, http://www.ciscolive.com
138. “Deploying IP/MPLS VPN”, http://www.ciscolive.com
139. “Scaling BGP”, http://www.ciscolive.com
140. “Financial Services Design for High Availability”, http://www.cisco.com
141. “E-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN”, http://www.cisco.com
142. “Deploying MPLS-based Layer 2 Virtual Private Networks”, http://www.ciscolive.com

This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.

Updated 10/15/2015