6.4 IPv4 Routing Overview Flashcards

1
Q

What layer of the OSI model does ping work on

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does ping work exactly

A

by sending an ICMP echo request packet to a remote host. The source address of the echo request packet is the IP address of the interface from which the packet is sent. An echo reply response from the target device verifies that the host can communicate with the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When you use ping what is the output

A

reports success or failure, together with round-trip statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a successful ping test result to

A

A successful ping test verifies Network layer connectivity between devices as well as the TCP/IP configuration of all devices in the path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an advantage of the ping command

A

it allows you to test communication near the source of the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What level in the CISCO CLI does the extended ping command work on

A

Only the privileged exec command cli

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the traceroute command work in CISCO CLI

A

traceroute sends successive ICMP messages to an unreachable port address at a remote host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

While using the traceroute command what does a time exceeded error indicate?

A

A time exceeded error indicates that a server along the route has seen the packet and discarded it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe IP configuration errors

A

Not having the IP address, the subnet mask, DNS server addresses, or the default gateway address set correctly on your network host will interfere with communication with the default gateway router. You can check the configuration of your network host using the ipconfig command on a Windows system or the ifconfig command on a Linux machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe mismatched subnet masks

A

The subnet masks on the router should line up with the subnet mask on the host. If the IP address used by the PC is not on the same subnet as the router interface, outbound traffic will work fine, but inbound traffic from the router to the workstation will not work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe DNS configuration errors

A

If a network host is configured with the wrong IP address for the DNS server, any network process that requires name resolution will fail. Just like hosts, the router can be configured with the IP addresses of several DNS servers so it can resolve hostnames into IP addresses. Just as with network hosts, name resolution will fail if the router is configured with the wrong DNS server address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe DHCP relay issues

A

DHCP relay issues occur when the DHCP server is on a different network segment than the system trying to obtain an address. To get around this issue, you can configure the router with a helper IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe LAN interface issues

A
An unplugged network cable
A defective network cable
A shutdown interface
A speed mismatch
An administrative shutdown
The protocol status is in err-disabled mode because of port security settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Overlapping routes

A

This occurs where a destination address in a packet that the router receives matches more than one of the routes that are within that router’s routing table. This could be caused by poor network design, route summarization, or incorrect static routes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe ACL issues

A

If access control lists (ACLs) are not configured correctly, they can impact legitimate traffic that should be passing between routers. If you suspect ACLs are incorrectly limiting traffic between routers, there are a couple of things you can keep in mind. First of all, remember that the first rule in the ACL that matches a packet will be the rule that’s applied to that packet.
Any remaining rules in the ACL will not be applied to that packet. They will be ignored. Also, remember that the last rule in an ACL is an implicit deny. If none of the rules you’ve configured in the ACL match a given packet, then that packet is going to be dropped by default. Also, ACLs are bidirectional. You must determine which rules are applied in which direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly