ࡱ> ~}a n*bjbj[[ Dx9bE\9bE\"W++d9d9d9d9d9x9x9x989<9x9FN:;(;;;<<<mFoFoFoFoFoFoF$D,MEE8,Md9=E<<A<<<<<FF"A<<<F<<<<,M<<<<<<<<<+> *8: CCDE Study Guide First Edition Copyright 2016 Pearson Education, Inc. ISBN-10: 1-58714-461-1 ISBN-13: 978-1-58714-461-5 Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it. When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing. First Printing: October 2015 Corrections for April 18, 2016 PgError First PrintingCorrection313Chapter 6, Table 6-8, Sixth Row Down, removeDuplicate Row, Remove Flow-based load balancing (CE-PE) row317Chapter 6, First Paragraph, Second Sentence Reads: Therefore, the scalability and stability factors of its control plane are a primary factor for the P business to succeed.Should read: Therefore, the scalability and stability factors of its control plane are a primary factor for the SP business to succeed. 488Chapter 10, First Paragraph, Second Sentence Reads: Ideally, the implementation should follow an implantation plan that specifies what the services are, and the futures that need to be enabled before proceeding with any step.Should read: Ideally, the implementation should follow an implantation plan that specifies what the services are, and the features that need to be enabled before proceeding with any step.509Chapter 10, Last Paragraph - Embedded RP, Last Sentence Reads: The IPv6 Embedded-RP technique offers network designers a simple solution to facilitate interdomain and intradomain communication for IPv6 Any-Source Multicas ASM applications without MSDP.Should read: The IPv6 Embedded-RP technique offers network designers a simple solution to facilitate interdomain and intradomain communication for IPv6 Any-Source Multicast ASM applications without MSDP.550Chapter 10, Third Paragraph, First Sentence Reads: This section covers the different security aspects that network designers need to consider when planning, designing, or optimizing IP networks to a achieve a self-healing, secure network infrastructures that can mitigateShould read: This section covers the different security aspects that network designers need to consider when planning, designing, or optimizing IP networks to achieve a self-healing, secure network infrastructures that can mitigate555Chapter 10, First Paragraph, Third Sentence Reads: For example, in Figure 10.47, a firewall is there are multiple specialized security nodes such as web application firewall data loss prevention and IPS.Should read: For example, in Figure 10.47, a firewall is there are multiple specialized security nodes such as web application firewall, data loss prevention and IPS. Corrections for April 4, 2016 PgError First PrintingCorrection6Chapter 1, Second Box from Right under Business Drivers and Requirements Reads: Strategic Business Trends Merger, Accusation, DivestShould read: Strategic Business Trends Merger, Acquisition, Divest Corrections for March 18, 2016 PgError First PrintingCorrection283Chapter 6, Layer 2 MPLS VPN (L2VPN), Second Bullet, Last Sentence Reads: Also, with todays flexible Ethernet nodes, an access port upgrade from 1G to 10G can be as simple as port shortest path first [SFP] replacement.Should read: Also, with todays flexible Ethernet nodes, an access port upgrade from 1G to 10G can be as simple as small form-factor pluggable [SFP] replacement. Corrections for January 15, 2016 PgError First PrintingCorrection81Chapter 2, First Paragraph, Last Sentence Reads: This is in addition to the extra cost and delay that will from the traffic having to traverse multiple international links.Should read: This is in addition to the extra cost and delay that will incur from the traffic having to traverse multiple international links. Corrections for December 2, 2015 PgErrorCorrection50Chapter 2, Table 2-3, Advertised Route Column for Not so stubby (NSSA) Reads: All routes with the ability to inject/originate external routing information (type 7 LSA)Should read: All routes except type 5 LSA, with the ability to inject/originate external routing information (type 7 LSA)50Chapter 2, Figure 2-15, Upper Left Reads: Area 5 StuddyShould read: Area 5 Stubby76Chapter 2, Figure 2-38, Region 1, Left Lower Network IP Reads: 172.2.0.0/24Should read: 172.1.1.0/24 Corrections for November 16, 2015 PgErrorCorrection268Chapter 6, First Paragraph, Fourth Sentence Reads: For instance, if the CE side is configured with a different OSPF process ID than the PE side, traffic between the data center and the HQ will always prefer the backdoor link, as shown in Figure 6-22.Should read: For instance, if the PEs are configured with a different OSPF process IDs, traffic between the data center and the HQ will always prefer the backdoor link, as shown in Figure 6-22.268Chapter 6, Figure 6-22, Left Side, Under OSPF Process ID Mismatch, Remove Dash Line Arrow Pointing to: OSPF Process ID: 1 Advertise OSPF prefixes LSA Type 1 and Type 2 268Chapter 6, Figure 6-22, Right Side, Next to the PE-3 Icon add: OSPF Process ID:3269Chapter 6, First Paragraph, First and Second Sentences Reads: This issue can be avoided by considering a single (matching) OSPF process ID between the CEs and the PEs. Nevertheless, practically speaking, this option can add operational complexity from the service provider point of view.Should read: This issue can be avoided by considering a single (matching) OSPF process ID among the ingress and egress PEs. Nevertheless, practically speaking, this option can add a significant operational complexity in large scale networks with large number of remote sites. Corrections for October 15, 2015 PgErrorCorrection50 thru 51Chapter 2, Last Paragraph, Third Sentence Reads: In this design model, the border area that interconnects the campus or data center network with the WAN or internet edge devices can be deployed as totally NSSA.Should read: In this design model, the border area that interconnects the campus or data center network with the WAN or internet edge devices can be deployed as NSSA.51Chapter 2, Figure 2-16, Right Side Label Reads: OSPF Totally NSSA AreaShould read: OSPF NSSA Area51Chapter 2, Figure 2-16 Caption Reads: Figure 2-16 OSPF Totally NSSAShould read: Figure 2-16 OSPF NSSA Area487 thru 488Chapter 10, Table 10-5, Remove Second Sentence of (Mechanism) MPLS: 6PE, Column Design Concern May introduce scalability limitation because a separate Routing Information Base (RIB) and Forwarding Information Base (FIB) is required per customerMove Sentence to (Mechanism) MPLS: 6VPE, Design Concern as First Sentence in Column May introduce scalability limitation because a separate Routing Information Base (RIB) and Forwarding Information Base (FIB) is required per customer.521Chapter 10, QoS Design Consideration, First Paragraph, Last Sentence Reads: (See Table 2-1, Chapter 2, Enterprise Layer 2 and Layer 3 Design, for an example of the various applications of todays converged networks.)Should read: (See Table Enterprise Application Requirements, Page 32.)580Appendix: References Add New References 134. Secure Extension of L3 VPNs over IP-Based Wide Area Networks,  HYPERLINK "http://www.cisco.com" http://www.cisco.com 135. IPv6 planning, Deployment, troubleshooting,  HYPERLINK "http://www.ciscolive.com" http://www.ciscolive.com 136. IPv6 Design and Transition mechanisms,  HYPERLINK "http://www.ciscolive.com" http://www.ciscolive.com 137. Advanced mVPN Deployment Models,  HYPERLINK "http://www.ciscolive.com" http://www.ciscolive.com 138. Deploying IP/MPLS VPN,  HYPERLINK "http://www.ciscolive.com" http://www.ciscolive.com 139. Scaling BGP,  HYPERLINK "http://www.ciscolive.com" http://www.ciscolive.com 140. Financial Services Design for High Availability,  HYPERLINK "http://www.cisco.com" http://www.cisco.com 141. E-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN,  HYPERLINK "http://www.cisco.com" http://www.cisco.com 142. Deploying MPLS-based Layer 2 Virtual Private Networks,  HYPERLINK "http://www.ciscolive.com" http://www.ciscolive.com This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.     MACGLOBL.DOT  DATE \l 4/18/2016 TIME 3:01 PM Updated 04/18/2016  01BHIPR_`giz{ ǵzodYdQYFQz>zhySOJQJhRwh0OJQJh0OJQJhRwh1 OJQJhRwhhN5OJQJhRwhRwOJQJhhN5OJQJh{OJQJ hBhB#h{hB5CJOJQJ^JaJ#h{hY35CJOJQJ^JaJ#h{h{5CJOJQJ^JaJ&h{hY30Jz5CJOJQJ\aJ&h{h{0Jz5CJOJQJ\aJ h0Jz5CJOJQJ\aJ I{4   # $Ifgd :$If]:gd  p@@gd $ p@@a$gd0o$a$o$a$gd0n$a$gdB$a$gd- # ' ( T U tuCZ#$(DEEF$%ںںںƺ|q|hP56OJQJhr56OJQJhq56OJQJhaPpOJQJhh 'OJQJh '6OJQJh 'h '6OJQJh 'OJQJhhhOJQJh5OJQJhOJQJh56OJQJhaPp56OJQJhhN5OJQJ*# $ ( U e wfYYY $Ifgd :$If]:gdkd$$IflFv2r0 3    4 layt E R S wfYYYYYY $Ifgd :$If]:gdkd$$IflFv2r0 3    4 layt  twudWWWWWW $Ifgd :$If]:gdkd,$$IflFv2r0 3    4 layt tuyvDwfYYYYYYY $Ifgd :$If]:gdkd$$IflFv2r0 3    4 layt DEIu|ZghiwfYYLYYY $Ifgd ' $Ifgd :$If]:gdkdX$$IflFv2r0 3    4 laytiEFJv}%&jYL $IfgdaPp :$If]:gdkd$$IflFv2r0 3    4 layt $Ifgd&j`VE8 $Ifgd0 :$If]:gd0  p@@gdr  p@@gdqkd$$IflFv2r0 3    4 layt $IfgdaPp  ')*JK_bƽƲƲƲ٧umdmh}lS5OJQJh}lSOJQJh}lS56OJQJhqhqOJQJhq5OJQJhqOJQJhq56OJQJhaPp56OJQJhk-hk-OJQJhk-5OJQJhk-OJQJhk-56OJQJhr56OJQJhrhrOJQJhr5OJQJhrOJQJ" SZmtjYIII $ $Ifa$gdr :$If]:gd0kd$$IflFv2r0 3    4 layt0 $Ifgd0ZP  p@@gdk-kd$$IflFv2r0 3    4 layt0 $Ifgd0 $ $Ifa$gdr biOkdF$$IflFv2r0 3    4 layt$ $Ifgd$ :$If]:gd$  p@@gdk-  ]SSB :$If]:gdl  p@@gdqkd$$IflFv2r0 3    4 layt$ $Ifgdk- $Ifgd$jY :$If]:gdlkdr$$IflFv2r0 3    4 laytl $Ifgdl ()*KNT_j``OBB $Ifgd}lS :$If]:gd}lS  p@@gd}lSkd$$IflFv2r0 3    4 laytl $Ifgdq_`c wfYYYYYY $Ifgd}lS :$If]:gd}lSkd$$IflFv2r0 3    4 layt}lSbc  IJKLmnDFIJNPtĹthY$356OJQJhhN556OJQJh^lhOJQJhOJQJh^lh^lOJQJh^l5OJQJh^lOJQJh^l56OJQJhaPp56OJQJh}lS56OJQJh}lSh5OJQJh5OJQJh}lSOJQJh}lSh}lSOJQJ+wfYYYYYYYY $Ifgd}lS :$If]:gd}lSkd4$$IflFv2r0 3    4 layt}lS !.;<IwfYYYYYY $Ifgd}lS :$If]:gd}lSkd$$IflFv2r0 3    4 layt}lSIJKnqwwmm\OO $Ifgd `[ :$If]:gd `[  p@@gd^lkd` $$IflFv2r0 3    4 layt}lSEwfYYYYYY $Ifgd `[ :$If]:gd `[kd $$IflFv2r0 3    4 layt `[EFJwfYJJJJY $Ifgd^l $Ifgd `[ :$If]:gd `[kd $$IflFv2r0 3    4 layt `[;ANOjY :$If]:gd `[kd" $$IflFv2r0 3    4 layt `[ $Ifgd `[OPTtwfYYLYYY $Ifgd^l $Ifgd `[ :$If]:gd `[kd $$IflFv2r0 3    4 layt `[wppbUK $If $IfgdY3 :$If]: p@@kdN $$IflFv2r0 3    4 layt `[ F!H!{!!!!!!!!!!!""""!"""#"y""##$#)#2#n#x#$$;%<%o%ƻܯܣܯܣђth{h;p\OJQJh{hC3OJQJh;p\OJQJhC3OJQJh{6OJQJh{h{6OJQJh{h{5OJQJhC3hC3OJQJhC3h{OJQJh{h{OJQJh{OJQJhhN55OJQJhhN5OJQJh{56OJQJ) wi\\OEE $If $Ifgd{ $IfgdY3 :$If]:kd $$IflFv2r0 3    4 laytY3 G!H!K!t!{!!!!m_RRR $IfgdY3 :$If]:kdz $$IflFv2r0 3    4 laytY3 $If!!!!!!!""""jY :$If]:gd{kd$$IflFv2r0 3    4 laytY3 $Ifgd{ ""#"0""%#y#z#$wfYYLLY $Ifgd{ $IfgdC3 :$If]:gd{kd$$IflFv2r0 3    4 laytY3$$$[$b$$$$wfYYL?? $Ifgd{ $Ifgd;p\ $IfgdC3 :$If]:gd{kd<$$IflFv2r0 3    4 laytY3$;%<%@%U%V%i%%jYLL?? $Ifgd{ $IfgdC3 :$If]:gd{kd$$IflFv2r0 3    4 laytY3 $Ifgd;p\o%%%%%%%%%%&&&C&D&\&]&d&&&&&&&&&&&&''6'7'>'S'V'W'}'~''''''''''''#(&('(3(G(I(J(^(_(f((((((((((()׾׾׾׾׾׾׳׾׳׾hzhzOJQJhzhz6OJQJhYhz0JOJQJhzOJQJjhzOJQJUh;p\OJQJh;p\h;p\6OJQJF%^&&8'''`((\)])^)][ kdh$$IflFv2 $0 3    4 laytz $Ifgdz $Ifgd{ )))A)B)Z)[)\)])^)******* *"*/*0*:*;*D*F*L*M*T*U*W*^*i*k*l*m*n*ļh '5CJOJQJaJh-h '5CJOJQJaJh 'mHnHujh 'Uh 'hg~jhg~UhhN5OJQJh ,OJQJh{h;p\OJQJhYhz0JOJQJjhzOJQJUhzOJQJ#^)*******!*"*/*V*W*k*l*m*n*v$a$gd- $a$gdyB0@P0:p-= /!"#$%: Dp$$If!vh#v#vr#v:V l0 355r54yt$$If!vh#v#vr#v:V l0 355r54yt$$If!vh#v#vr#v:V l0 355r54yt$$If!vh#v#vr#v:V l0 355r54yt$$If!vh#v#vr#v:V l0 355r54yt$$If!vh#v#vr#v:V l0 355r54yt$$If!vh#v#vr#v:V l0 355r54yt$$If!vh#v#vr#v:V l0 355r54yt0$$If!vh#v#vr#v:V l0 355r54yt0$$If!vh#v#vr#v:V l0 355r54yt$$$If!vh#v#vr#v:V l0 355r54yt$$$If!vh#v#vr#v:V l0 355r54ytl$$If!vh#v#vr#v:V l0 355r54ytl$$If!vh#v#vr#v:V l0 355r54yt}lS$$If!vh#v#vr#v:V l0 355r54yt}lS$$If!vh#v#vr#v:V l0 355r54yt}lS$$If!vh#v#vr#v:V l0 355r54yt}lS$$If!vh#v#vr#v:V l0 355r54yt `[$$If!vh#v#vr#v:V l0 355r54yt `[$$If!vh#v#vr#v:V l0 355r54yt `[$$If!vh#v#vr#v:V l0 355r54yt `[$$If!vh#v#vr#v:V l0 355r54yt `[$$If!vh#v#vr#v:V l0 355r54ytY3$$If!vh#v#vr#v:V l0 355r54ytY3$$If!vh#v#vr#v:V l0 355r54ytY3$$If!vh#v#vr#v:V l0 355r54ytY3$$If!vh#v#vr#v:V l0 355r54ytY3$$If!vh#v#vr#v:V l0 355r54ytY3$$If!vh#v#v #v$:V l0 355 5$4ytz {s2&6FVfv2(&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ OJPJQJ_HmH nHsH tHN`N Normald CJOJPJQJ_HmH sH tH ZZ Rw Heading 1$<@&5CJ KH OJQJ\^JaJ BB  Heading 4$<@&56DA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List J/J FT d CJOJPJQJ_HmH sH tH / QQTd$d%d&d'dNOPQ#5CJOJPJQJ_HmH sH tH N/N HC d#5CJOJPJQJ_HmH sH tH 0U`!0 Hyperlink>*B*@V 1@ FollowedHyperlink>*B* R/BR ITd` CJOJPJQJ_HmH sH tH f/Rf BL'  d^` CJOJPJQJ_HmH sH tH f/bf BX'  d^` CJOJPJQJ_HmH sH tH f/rf NL'  d^` CJOJPJQJ_HmH sH tH f/f NX'  d^` CJOJPJQJ_HmH sH tH ^/^ UC d^#6CJOJPJQJ_HmH sH tH Z/Z UL d^ CJOJPJQJ_HmH sH tH Z/Z UX d^ CJOJPJQJ_HmH sH tH N/N TN d#5CJOJPJQJ_HmH sH tH NoN TH d#6CJOJPJQJ_HmH sH tH T/T TS$da$#6CJOJPJQJ_HmH sH tH V/V TC @d#5CJOJPJQJ_HmH sH tH RoR TB @dx CJOJPJQJ_HmH sH tH R/R TX! @d CJOJPJQJ_HmH sH tH N/"N LH "d#6CJOJPJQJ_HmH sH tH V/2V C1#d]#>*CJOJPJQJ_HmH sH tH R/BR C2$d]#>*CJOJPJQJ_HmH sH tH V/RV CX%d]#>*CJOJPJQJ_HmH sH tH Z/bZ MN&d]^ CJOJPJQJ_HmH sH tH d/rd SH"'$``d]`^`a$#6CJOJPJQJ_HmH sH tH Z/Z SB(``d]`^` CJOJPJQJ_HmH sH tH Z/Z NO)``d]`^` CJOJPJQJ_HmH sH tH Z/Z TI*``d]`^` CJOJPJQJ_HmH sH tH Z/Z CA+``d]`^` CJOJPJQJ_HmH sH tH ^/^ EH,$d^a$&56CJOJPJQJ_HmH sH tH Z/Z ET- d^ CJOJPJQJ_HmH sH tH Z/Z EX. d^ CJOJPJQJ_HmH sH tH N/N FC /d#6CJOJPJQJ_HmH sH tH N/N FN 0d#5CJOJPJQJ_HmH sH tH L/L M01 1d CJOJPJQJ_HmH sH tH L/"L M02 2d CJOJPJQJ_HmH sH tH L/2L M03 3d CJOJPJQJ_HmH sH tH L/BL M04 4d CJOJPJQJ_HmH sH tH L/RL M05 5d CJOJPJQJ_HmH sH tH L/bL M06 6d CJOJPJQJ_HmH sH tH L/rL M07 7d CJOJPJQJ_HmH sH tH T/T PD8d&56CJOJPJQJ_HmH sH tH j/j ENL*9 @@@d^` CJOJPJQJ_HmH sH tH j/j ENX*: @@@d^` CJOJPJQJ_HmH sH tH N/N HA ;d#5CJOJPJQJ_HmH sH tH N/N HB <d#5CJOJPJQJ_HmH sH tH N/N HD =d#5CJOJPJQJ_HmH sH tH N/N HE >d#5CJOJPJQJ_HmH sH tH N/N HF ?d#5CJOJPJQJ_HmH sH tH N/N HG @d#5CJOJPJQJ_HmH sH tH h/h EL*A @@@d^` CJOJPJQJ_HmH sH tH `/"` LC1Bd]^#>*CJOJPJQJ_HmH sH tH \/2\ LC2Cd]^#>*CJOJPJQJ_HmH sH tH `/B` LCXDd]^#>*CJOJPJQJ_HmH sH tH R/RR TRE @dx CJOJPJQJ_HmH sH tH N/bN AU Fd#6CJOJPJQJ_HmH sH tH d/rd MH"G$d]^a$#6CJOJPJQJ_HmH sH tH L/L M08 Hd CJOJPJQJ_HmH sH tH \/\ CLTI``d]`^` CJOJPJQJ_HmH sH tH `/` FTNJ``d]`^`#6CJOJPJQJ_HmH sH tH P/P BTSUB Kd CJOJPJQJ_HmH sH tH V/V LXLd]#>*CJOJPJQJ_HmH sH tH \/\ NOXM``d]`^` CJOJPJQJ_HmH sH tH \/\ TIXN``d]`^` CJOJPJQJ_HmH sH tH \/\ CAXO``d]`^` CJOJPJQJ_HmH sH tH \/\ SBXP``d]`^` CJOJPJQJ_HmH sH tH N/N BT Qd#5CJOJPJQJ_HmH sH tH L/"L M09 Rd CJOJPJQJ_HmH sH tH L/2L M10 Sd CJOJPJQJ_HmH sH tH L/BL M11 Td CJOJPJQJ_HmH sH tH L/RL M12 Ud CJOJPJQJ_HmH sH tH L/bL M13 Vd CJOJPJQJ_HmH sH tH L/rL M14 Wd CJOJPJQJ_HmH sH tH L/L M15 Xd CJOJPJQJ_HmH sH tH f/f CSH"Y$d]^a$#6CJOJPJQJ_HmH sH tH X/X CHDZ@d^@#5CJOJPJQJ_HmH sH tH X/X CHE[@d^@#5CJOJPJQJ_HmH sH tH T/T CFT\@d^@ CJOJPJQJ_HmH sH tH h/h CBL'] `0p`d^p`` CJOJPJQJ_HmH sH tH h/h CBX'^ `0p`d^p`` CJOJPJQJ_HmH sH tH h/h CNL'_ `0p`d^p`` CJOJPJQJ_HmH sH tH h/h CNX'` `0p`d^p`` CJOJPJQJ_HmH sH tH X/X CTHa@d^@#5CJOJPJQJ_HmH sH tH `/"` CTCb @d^@#5CJOJPJQJ_HmH sH tH \/2\ CTBc @d^@ CJOJPJQJ_HmH sH tH \/B\ CTXd @d^@ CJOJPJQJ_HmH sH tH N/RN EDTN ed CJOJPJQJ_HmH sH tH L/bL ADD fd CJOJPJQJ_HmH sH tH P/rP PTTOC gd CJOJPJQJ_HmH sH tH P/P CTTOC hd CJOJPJQJ_HmH sH tH T/T TOCPART id CJOJPJQJ_HmH sH tH P/P TOCHB jd CJOJPJQJ_HmH sH tH P/P TOCHC kd CJOJPJQJ_HmH sH tH P/P TOCHD ld CJOJPJQJ_HmH sH tH R/R CRHC md#5CJOJPJQJ_HmH sH tH RoR CRHD nd#5CJOJPJQJ_HmH sH tH JoJ CR od CJOJPJQJ_HmH sH tH V/V CREDTI pd#5CJOJPJQJ_HmH sH tH R/R CREDNM qd CJOJPJQJ_HmH sH tH P/"P DED rd#6CJOJPJQJ_HmH sH tH  Q2 CLs"B" frttBZRB Plain Textud CJOJQJ4 @b4 Footer v !4r4 Header w !HH 1 Balloon TextxCJOJQJ^JaJH>H -Titley$da$5CJ$OJQJ\aJ(O( -ver12redPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VvnB`2ǃ,!"E3p#9GQd; H xuv 0F[,F᚜K sO'3w #vfSVbsؠyX p5veuw 1z@ l,i!b I jZ2|9L$Z15xl.(zm${d:\@'23œln$^-@^i?D&|#td!6lġB"&63yy@t!HjpU*yeXry3~{s:FXI O5Y[Y!}S˪.7bd|n]671. tn/w/+[t6}PsںsL. J;̊iN $AI)t2 Lmx:(}\-i*xQCJuWl'QyI@ھ m2DBAR4 w¢naQ`ԲɁ W=0#xBdT/.3-F>bYL%׭˓KK 6HhfPQ=h)GBms]_Ԡ'CZѨys v@c])h7Jهic?FS.NP$ e&\Ӏ+I "'%QÕ@c![paAV.9Hd<ӮHVX*%A{Yr Aբ pxSL9":3U5U NC(p%u@;[d`4)]t#9M4W=P5*f̰lk<_X-C wT%Ժ}B% Y,] A̠&oʰŨ; \lc`|,bUvPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!R%theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] n" x AAAVVVY bo%)n* (18:# tDi&_IEO !""$$%^)n*!"#$%&')*+,-./02345679;C\6V}& I ^ !A!Z!n"XXXXXXXXX$./6>Y @ @H 0(  0(  B S  ?NV KMnp"%"""""""!"""l"o"HR 1  i m  Q\~.=p!{!!!"""""""!"""l"o"333333333333333333I{(ERuyvEIZ g F J  % @  *c  !;<KLFJ;TtHK#0<@!!"""""""!"""U"W"j"l"o"|   KL""""""""""!"""_"i"l"o"r`s?2gh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHr`s         REK0A@T5T{) 1  'y$./B< ,t,0Y$3Y3hN5&Q>C^KlL}lS `[;p\2h^lR]oaPp wg~"zB]G0A P$*yS3RwC3hk-Qzl^'ifu:XFOl?q-]cr""@vn"@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial7. [ @Verdana3*Ax Times71 Courier?= *Cx Courier New5. .[`)Tahoma;WingdingsA$BCambria Math"qHhٓD'ٓD'k&==!24"" 3qHP ?02! xx WG4 System:Applications:Microsoft Office 2001:Templates:My Templates:Global_May_2002.dot(c)We Want to Hear from YouEnd UserEvans, Vanessa Oh+'0 ( H T ` lx(c)We Want to Hear from You End UserGlobal_May_2002.dotEvans, Vanessa2Microsoft Office Word@F#@&C@@՜.+,D՜.+,X hp  Pearson Education=" (c)We Want to Hear from You Title 8@ _PID_HLINKSA6Vhttp://www.ciscolive.com/Zhttp://www.cisco.com/Zhttp://www.cisco.com/Vhttp://www.ciscolive.com/V http://www.ciscolive.com/V http://www.ciscolive.com/Vhttp://www.ciscolive.com/Vhttp://www.ciscolive.com/Zhttp://www.cisco.com/  !"#$%&'()*+,-./0123456789:;<>?@ABCDEGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklnopqrstvwxyz{|Root Entry F0Data =1TableF