Oh... and pass the lab. I like adding people on our Success page :-)

--
Marko Milivojevic - CCIE #18427
Senior Technical Instructor - IPexpert

FREE CCIE training: http://bit.ly/vLecture

Mailto: [email protected]
Telephone: +1.810.326.1444
Web: http://www.ipexpert.com/

On Tue, Sep 28, 2010 at 17:12, Jason Maynard <[email protected]> wrote:
> Thanks Marko!
>
>
> -----Original Message-----
> From: Marko Milivojevic [mailto:[email protected]]
> Sent: September-28-10 1:10 PM
> To: Jason Maynard
> Cc: Tyson Scott; CCIE OSL
> Subject: Re: [OSL | CCIE_RS] VOL1-LAB31-
>
> I think you can safely skip L2VPN stuff. Be aware of it, where you can
> read about it, but I highly doubt it's going to be extremely important
> on the lab day.
>
> --
> Marko Milivojevic - CCIE #18427
> Senior Technical Instructor - IPexpert
>
> FREE CCIE training: http://bit.ly/vLecture
>
> Mailto: [email protected]
> Telephone: +1.810.326.1444
> Web: http://www.ipexpert.com/
>
> On Tue, Sep 28, 2010 at 07:20, Jason Maynard <[email protected]> wrote:
>> Hi Tyson,
>>
>>
>>
>> I am scheduled for the LAB on Friday
>>
>>
>>
>> I have done all the LABs from volume 3 and just looking at some individual
>> technologies that I may not have spent a whole lot of time on.
>>
>>
>>
>> I am comfortable with QnQ, L2 Tunnelling and PPPoE, I was wondering whether
>> this lab was more focused on SP as opposed to the RS due to the context of
>> “layer 2 VPN”
>>
>>
>>
>> Thanks for the feedback
>>
>>
>>
>>
>>
>>
>>
>> From: Tyson Scott [mailto:[email protected]]
>> Sent: September-27-10 11:59 PM
>>
>> To: 'Jason Maynard'; 'CCIE OSL'
>> Subject: RE: [OSL | CCIE_RS] VOL1-LAB31-
>>
>>
>>
>> Jason,
>>
>>
>>
>> What do you mean by only one week left?  Before the test?  If that is the
>> case move forward to Volume 3 and start working on the labs in there and get
>> as much as you can done before the test.
>>
>>
>>
>> If that isn't the case.
>>
>>
>>
>> QnQ you should know, PPPoE you should know, L2 Protocol Tunneling you should
>> know.
>>
>>
>>
>> FRoL2TPv3 you may not need to know but it is so simple I say why not since
>> you should do to the rest anyways.
>>
>>
>>
>> Regards,
>>
>>
>>
>> Tyson Scott - CCIE #13513 R&S, Security, and SP
>>
>> Managing Partner / Sr. Instructor - IPexpert, Inc.
>>
>> Mailto: [email protected]
>>
>> Telephone: +1.810.326.1444, ext. 208
>>
>> Live Assistance, Please visit: www.ipexpert.com/chat
>>
>> eFax: +1.810.454.0130
>>
>>
>>
>> IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
>> Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
>> CCIE (R&S, Voice, Security & Service Provider) certification(s) with
>> training locations throughout the United States, Europe, South Asia and
>> Australia. Be sure to visit our online communities at
>> www.ipexpert.com/communities and our public website at www.ipexpert.com
>>
>>
>>
>> From: [email protected]
>> [mailto:[email protected]] On Behalf Of Jason Maynard
>> Sent: Monday, September 27, 2010 8:25 PM
>> To: 'Jason Maynard'; 'CCIE OSL'
>> Subject: Re: [OSL | CCIE_RS] VOL1-LAB31-
>>
>>
>>
>> Looking for some advise
>>
>>
>>
>> Thanks Guys!
>>
>>
>>
>> From: [email protected]
>> [mailto:[email protected]] On Behalf Of Jason Maynard
>> Sent: September-27-10 10:45 AM
>> To: 'CCIE OSL'
>> Subject: [OSL | CCIE_RS] VOL1-LAB31-
>>
>>
>>
>> Just curious, is this lab worth focusing on and would this be considered R&S
>> or more SP
>>
>>
>>
>> LAB 31 – Layer 2 VPN
>>
>> FRoL2TPv3
>>
>> FRoL2TPv3
>>
>> QnQ (within the context of VPN)
>>
>> Layer2 protocol tunnelling (within the context of VPN)
>>
>> PPPOE (within the context of VPN)
>>
>>
>>
>> Last week of studying so I do not want to focus on things that are not %100
>> relevant
>>
>>
>>
>> Thanks
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>>
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to