IT Certification and Career Paths

644-906 IMTXR

Implementing and Maintaining Cisco Technologies Using IOS XR

Exam Number 644-906 IMTXR
Associated Certifications Cisco IOS XR Specialist
Duration 90 minutes (65-75 questions)
Available Languages English
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

The 644-906 Implementing and Maintaining Cisco Technologies Using IOS XR exam is associated with the Cisco IOS XR Specialist certification. This exam tests a candidate's knowledge of implementing, verification testing, and maintaining Cisco core and edge technologies, using the IOS XR based router platforms, which include the CRS, ASR 9000, and the XR12000 routers. Candidates can prepare for this exam by taking the IMTXR Implementing and Maintaining Cisco Technologies using IOS XR course.

The exam is closed book and no outside reference materials are allowed. The following topics are general guidelines for the content that is likely to be included on the practical exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the following guidelines may change at any time without notice.

  • 21%     1.0   Platform

      • 1.1   Power
        • 1.1.a   Recommend PDU as a function of facility
        • 1.1.b   Install appropriate PDU for chassis
        • 1.1.c   Monitor system power level
        • 1.1.d   Show power alarm values
      • 1.2   Environmental
        • 1.2.a   Recommend environmental levels for system installation
        • 1.2.b   Verify system-detected environment is within tolerance levels
        • 1.2.c   Show environmental alarm values
        • 1.2.d   Clear environmental alarm
        • 1.2.e   Gather system environmental output
        • 1.2.f    Recommend rack space requirements
        • 1.2.g   Use proper grounding for installation
        • 1.2.h   Describe CRS air-flow
        • 1.2.i    Describe ASR9000 air-flow
      • 1.3   Physical Architecture
        • 1.3.a   Identify CRS switch fabric
        • 1.3.b   Identify components of CRS fabric
        • 1.3.c   Identify MSC
        • 1.3.d   Identify PLIM
        • 1.3.e   Identify RP CRS/ASR9000
        • 1.3.f    Identify management interface
        • 1.3.g   Identify cable management
        • 1.3.h   Differentiate between single and multi-chassis
        • 1.3.i    Identify ASR9000 line cards
        • 1.3.j    Identify ASR9000 RSP
        • 1.3.k   Identify ASR9000 PDU
        • 1.3.l    Identify ASR9000 SIP-700/SPA
        • 1.3.m   Identify CRS SIP/SPA
        • 1.3.n   Identify CRS chassis
        • 1.3.o   Identify ASR9000 chassis
        • 1.3.p   Describe ASR9000 fabric
      • 1.4   Inventory
        • 1.4.a   Show card status via show platform
        • 1.4.b   Show cards via show diagrams
        • 1.4.c   Show inventory of the system
        • 1.4.d   Difference between admin versus exec plane for show
      • 1.5   Environmental
        • 1.5.a   Show power usage
        • 1.5.b   Show fan status
        • 1.5.c   Difference between admin versus exec plane for show
      • 1.6   Firmware
        • 1.6.a   Understanding what is a FPD.PIE
        • 1.6.b   Configure Auto FPD
        • 1.6.c   Understand what is Parallel FPD
        • 1.6.d   Upgrade FPD and ROMMON Upgrade
        • 1.6.e   Understand FPD versus ROMMON
        • 1.6.f    Upgrading FPDs and ROMMONs
        • 1.6.g   Showing current FPD version information
  • 19%     2.0   Operating System

      • 2.1   Install
        • 2.1.a   Using TFTP, FTP, USB thumb drive, and hard drive as the
        • 2.1.b   With activate flag
        • 2.1.c   Using source flag
        • 2.1.d   Using TAR file
      • 2.2   Licensing
        • 2.2.a   Activate PIEs or SMUs
        • 2.2.b   Initial or recovery software installation (ROMMON variables)
        • 2.2.c   Initial or recovery software installation (Turboboot
                      Mini.VM file)
        • 2.2.d   Deactivate PIEs or SMUs
        • 2.2.e   Remove inactive packages, PIEs, or SMUs
        • 2.2.f    Committing the installation path
        • 2.2.g   Check which packages are active
        • 2.2.h   Check which packages are committed
        • 2.2.i    Check installation log
        • 2.2.j    See what install requests are currently active
        • 2.2.k   Understanding security certificate in PIEs and SMUs
      • 2.3   Packages
        • 2.3.a   Understanding types of packages (Mini.PIE)
        • 2.3.b   Understanding types of packages (Mini.VM)
        • 2.3.c   Understanding types of packages (optional PIEs)
        • 2.3.d   Understanding types of packages (SMUs)
        • 2.3.e   Understand IOS-XR versioning and installation restrictions
        • 2.3.f    Understand P versus PX images and the hardware they
      • 2.4   Two-stage commit
        • 2.4.a   Understand what is active config
        • 2.4.b   Understand what is target config
        • 2.4.c   Understand when a syntax check is done
        • 2.4.d   Understand when a semantic check is done
        • 2.4.e   Going back to a previous configuration
        • 2.4.f    Showing configuration IDs and labels
        • 2.4.g   Show configuration history
        • 2.4.h   Loading configuration
        • 2.4.i    Committing the configuration (atomic versus best effort)
        • 2.4.j    Committing the configuration (with labels and comments)
        • 2.4.k   Committing the configuration (replacing the configuration)
        • 2.4.l    Committing the configuration (using the commit confirm
        • 2.4.m   Committing the configuration (show config fail)
        • 2.4.n   Configure interfaces before the physical interface is
      • 2.5   Configuration planes
        • 2.5.a   Understand what configuration is in the Admin plane
        • 2.5.b   Understand what configuration is in the Exec plane
        • 2.5.c   Understand differences between owner and non-owner
                      SDR in access to Admin plane and Exec plane
        • 2.5.d   Understand the default VRF
      • 2.6   Task-based authorization
        • 2.6.a   Assigning user privilege to root-system
        • 2.6.b   Assigning user privilege to root-lr
        • 2.6.c   Assigning user privilege to cisco-support
        • 2.6.d   Understand between admin user versus exec username
        • 2.6.e   Understanding how task-based authorization work
      • 2.7   Process
        • 2.7.a   How to perform process restart
        • 2.7.b   How to check processes like state, number of restarts,
                      job id, pid, tid
        • 2.7.c   Show where certain processes are running
        • 2.7.d   How to find a blocked process
        • 2.7.e   Check how much CPU a process is using
      • 2.8   LPTS
        • 2.8.a   Understand what is LPTS
        • 2.8.b   Understand about LPTS policer
        • 2.8.c   How to use Show LPTS commands
        • 2.8.d   Show policer values and drop counts in LPTS
      • 2.9   Memory
        • 2.9.a   How to look at the memory utilization on the route processor
        • 2.9.b   How to look at the memory utilization on the line card
        • 2.9.c   Understand protected memory space versus shared
                      memory and which area uses it
        • 2.9.d   Check how much memory a process is using
      • 2.10   Support
        • 2.10.a   How to use Show Tech Support commands
        • 2.10.b   Core file configuration location including hard drive and
        • 2.10.c   Debug commands with ACL filtering
        • 2.10.d   Locate core files and moving them to a server
      • 2.11   Parser
        • 2.11.a   Using the parser with pipe, include, exclude, begin, regex
      • 2.12   EEM
        • 2.12.a   Base assumption of EEM knowledge - understand what is
                         possible/not possible
  • 21%     3.0   Control Plane

      • 3.1   Configuring OSPF
        • 3.1.a Configure interfaces to be part of the backbone area
        • 3.1.b   Configure additional interfaces to be part of non-backbone
        • 3.1.c   Configure non-default metric on some interfaces
        • 3.1.d   Configure neighbor logging so adjacency changes can be
      • 3.2   Verify OSPF
        • 3.2.a   Determine status of OSPF interfaces
        • 3.2.b   Determine status of neighbors
        • 3.2.c   Display OSPF database and determine which links are
      • 3.3   Configuring ISIS
        • 3.3.a   Configure the ISIS NET
        • 3.3.b   Enable ISIS for IPv4 unicast routing
        • 3.3.c   Configure interfaces for ISIS routing
        • 3.3.d   Enable ISIS for IPv6 unicast routing
        • 3.3.e   Enable some but not all of the IPv4 enabled interfaces for
                      IPv6 routing
      • 3.4   Verify ISIS
        • 3.4.a   Determine status if interfaces are configured for ISIS
        • 3.4.b   Determine the status of the routing adjacencies
        • 3.4.c   Display the IPv4 unicast route table
        • 3.4.d   Turn and debugging for ISIS adjacencies and explain the
                      information shown
        • 3.4.e   Display the topologies for IPv4 and IPv6. Why are they
      • 3.5   Add static routes
        • 3.5.a   Configure static routes for IPv4 unicast in the global table
        • 3.5.b   Configure static routes in for IPv4 unicast in two different
      • 3.6   Configure BGP
        • 3.6.a   Configure an autonomous system number for BGP to use
        • 3.6.b   Configure BGP to support IPv4 routing
        • 3.6.c   Configure BGP to support IPv6 routing
        • 3.6.d   Configure iBGP neighbors with the typical configuration to
                      use loopback addresses for peering
        • 3.6.e   Use neighbor-groups for identical configuration sections
                      on multiple peers
        • 3.6.f    Configure one iBGP neighbor to exchange both IPv4 and
                      IPv6 prefixes over an IPv4 session
        • 3.6.g   Configure one iBGP neighbor as an IPv6-only neighbor
                      with IPv6 peer addresses
        • 3.6.h   Configure eBGP neighbors for IPv4 routing
        • 3.6.i    Configure a simple pass_all policy for those eBGP neighbors
        • 3.6.j    Add VPNv4 capability to one iBGP peer
        • 3.6.k   Add two VRFs into BGP and redistribute static routes into
                      BGP for VPNv4
        • 3.6.l    Configure one iBGP peer to support 6PE type functionality
                      by adding address-family IPv6 labeled-unicast
      • 3.7   Verify BGP
        • 3.7.a   Display the peer summary status for IPv4 and IPv6
        • 3.7.b   Display the IPv4 BGP table
        • 3.7.c   Display a specific entry and explain AS path and next-hop
        • 3.7.d   Determine how much memory the BGP process uses
      • 3.8   Understanding RPL concepts
        • 3.8.a   Configure RPL
        • 3.8.b   Define an AS-set for use in RPL
        • 3.8.c   Create a route policy that checks for an AS from the AS-set
                      and adds a community for matching routes
        • 3.8.d   Create a route-policy that uses an inline prefix-set and
                      changes the local preference when a match is found
        • 3.8.e   Create a route policy that adds a community where the
                      community is used as a parameter when the policy is called
      • 3.9   Verify RPL
        • 3.9.a   Verify that communities are added as expected
        • 3.9.b   Execute a show bgp … command using a route-policy to
                      modify the output. Compare to regular show command
      • 3.10   MPLS LDP
        • 3.10.a   Configure router to run LDP
        • 3.10.b   Configure router to log neighbor events
        • 3.10.c   Enable LDP on interfaces
        • 3.10.d   Execute show command to verify status of LDP neighbors
      • 3.11   MPLS TE
        • 3.11.a   Configure OSPF to support traffic engineering extensions
        • 3.11.b   Enable RSVP on interfaces
        • 3.11.c   Create an MPLS TE tunnel with two different path option:
        • 3.11.d   First path explicit
        • 3.11.e   Second path dynamic
      • 3.12   Execute show command to determine tunnel status at tunnel head
        • 3.12.a   Execute show command to determine tunnel midpoints
                         traversing the router
      • 3.13   Configure IP multicast
        • 3.13.a   Configure PIM-SM, PIM-SSM, PIM-SSM range
        • 3.13.b   Configure static-RP, Auto-RP and BSR for PIM-SM
        • 3.13.c   Configure Multicast NSF
        • 3.13.d   Configure Multicast VPN
        • 3.13.e   Configure MSDP for interconnecting PIM-SM domains
        • 3.13.f    Configure MoFRR
        • 3.13.g   Configure P2MP-TE for IP Multicast
  • 20%     4.0   Data Plane

      • 4.1   General forwarding
        • 4.1.a   Understand and monitor interface counters
        • 4.1.b   Clear interface counters
        • 4.1.c   Modify interface counter load interval
        • 4.1.d   Understand the flow of packets through a router
        • 4.1.e   Describe the difference in processing of transit packets
                      vs. locally destined packets
        • 4.1.f    Understand the information stored in a forwarding table entry
        • 4.1.g   Troubleshoot packet drops
      • 4.2   ACL
        • 4.2.a   Implement ACLs to filter traffic on an interface
        • 4.2.b   Monitor ACL counters
        • 4.2.c   Modify an existing applied ACL
        • 4.2.d   Apply ACLs in debug commands
        • 4.2.e   Re-sequence an ACL
      • 4.3   QoS
        • 4.3.a   Implement a basic Quality of Service (QoS) configuration
        • 4.3.b   Monitor QoS statistics and behaviors
        • 4.3.c   Modify an existing QoS configuration
        • 4.3.d   What is the difference with QoS on IOS XR
      • 4.4   Netflow
        • 4.4.a   Describe NetFlow capabilities in IOS XR
        • 4.4.b   Implement NetFlow packet sampling
        • 4.4.c   Verify record export
        • 4.4.d   Monitor the NetFlow cache
      • 4.5   Unicast Reverse Path Forwarding (uRPF)
        • 4.5.a   Implement uRPF on an interface
        • 4.5.b   Verify uRPF behavior
      • 4.6   Interface IP address
        • 4.6.a   Configure IPv4 addresses on an interface
        • 4.6.b   Configure IPv6 addresses on an interface
        • 4.6.c   Resolve duplicate IP subnets configured on the router
      • 4.7   IP Multicast
        • 4.7.a   Describe multicast forwarding on XR platforms (egress/fabric
                      replication, etc.)
        • 4.7.b   Monitor IP multicast traffic
        • 4.7.c   Troubleshoot IP multicast (RPF, mrib, mfib, olist, etc.)
  • 19%     5.0   Management Plane

      • 5.1   Implementing SNMP on IOS-XR
        • 5.1.a   Configuring SNMP (v1/v2c/v3) - Does everyone use SNMPv3?
        • 5.1.b   Configuring SNMP trap notifications
        • 5.1.c   Configuring SNMP views, SDRowner/Lrowner
        • 5.1.d   Configuring SNMP ifIndex persistence
        • 5.1.e   Verify SNMP Configuration; e.g., using snmpget/snmpwalk
      • 5.2   Implementing logging services on IOS-XR
        • 5.2.a   Configuring logging buffer
        • 5.2.b   Configuring syslog server host as logging destination
        • 5.2.c   Configuring terminals for logging display (term mon)
        • 5.2.d   Configuring logging facility
        • 5.2.e   Configuring local logging device/archiving
        • 5.2.f    Monitoring logging buffer and filtering messages
      • 5.3   Implementing physical and virtual terminals
        • 5.3.a   Configuring line templates, vty pools
        • 5.3.b   Configuring exec timeout
        • 5.3.c   Securing vty line and vty access
        • 5.3.d   Verify vty access-group configuration
      • 5.4   Implementing SSH Access on IOS-XR
        • 5.4.a   Configuring ssh server (including crypto key generation)
        • 5.4.b   ssh client usage
        • 5.4.c   Verify ssh configuration
      • 5.5   Implementing telnet access on IOS-XR
        • 5.5.a   Configuring telnet server on IOS-XR
      • 5.6   Implementing XML management on IOS-XR
        • 5.6.a   Describe XML management on IOS-XR
        • 5.6.b   Configuring XML agent on IOS-XR
        • 5.6.c   Configuring VRF access for XML agent on IOS-XR
      • 5.7   Implementing TACACS+ authentication, authorization and
        • 5.7.a   Configuring AAA authentication - using TACACS+ and local
                      as fallback
        • 5.7.b   Configuring AAA command authorization - Using TACACS+
                      and local as fallback
        • 5.7.c   Configuring AAA command accounting
        • 5.7.d   Implementing TACACS+ - assigning tasks groups and
        • 5.7.e   Verify AAA permissions upon command failure (i.e.,
                      debug aaa)
      • 5.8   Configuring CDP on IOS-XR
        • 5.8.a   Enable CDP on IOS-XR
        • 5.8.b   Monitor CDP neighbors and parameters
      • 5.9   Implementing Management Plane Protection (MPP) on IOS-XR
        • 5.9.a   Configuring MPP to restrict access from specific IP
        • 5.9.b   Configuring MPP to restrict access for out-of-band interface
      • 5.10   Implementing NTP on IOS-XR
        • 5.10.a   Configuring NTP server
        • 5.10.b   Configuring NTP peer
        • 5.10.c   Securing NTP configurations (NTP access groups)
        • 5.10.d   Verifying NTP status
      • 5.11   Implementing SDRs on IOS-XR
        • 5.11.a   Understand SDR
        • 5.11.b   Describe DSC
        • 5.11.c   Assigning SDR access privileges
        • 5.11.d   Creating SDRs, adding nodes to non-owner SDRs
        • 5.11.e   Creating username and passwords for non-owner SDRs
        • 5.11.f    Rebooting non-owner SDRs
      • 5.12   Chassis/hardware management
        • 5.12.a   Displaying installed modules, status of modules
        • 5.12.b   Displaying environmental status (fan, power, etc.)
        • 5.12.c   Enabling/disabling power to specific linecard/module
        • 5.12.d   Reloading linecard/module
        • 5.12.e   Displaying chassis and module serial numbers
        • 5.12.f    Reloading RP
        • 5.12.g   Reloading entire chassis
        • 5.12.h   Troubleshoot reason why PLIM/MSC is not booting up
      • 5.13   Implementing EEM on IOS-XR
  • The following course is the recommended training for this exam.

    • Implementing and Maintaining Cisco Technologies Using IOS XR (IMTXR)

    Courses listed are offered by Cisco Learning Partners-the only authorized source for Cisco IT training delivered exclusively by Certified Cisco Instructors. Check the List of Learning Partners for a Cisco Learning Partner nearest you

    A variety of Cisco Press titles may be available for this exam. These titles can be purchased through the Cisco Marketplace Bookstore, directly from Cisco Press.

          Register at Pearson VUE      

    Cisco Learning Network

    Get valuable IT training resources for all Cisco certifications. Access study tools, CCNA practice tests, IT salaries, and find IT jobs.

    Go Now

    Cisco Training Tools

    Use the following tools to assist in your certification journey.

    Cisco Learning Locator Self Assessment Tool Certification Tracking System Certifications & Communities Online Support

    Cisco Learning Labs

    Get hands-on routing / switching lab experience using Cisco IOS on UNIX.

    Learn More