Advanced IPv4 Addressing Concepts Flashcards

1
Q

What are the three part structure of an IP address?

A

network, subnet, host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the prefix value /24 calculated?

A

network bits + subnet bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to find the mask range?

A

The range is between: Network bits + Subnet bits(with minimum subnet value) AND Network Bits + Subnet bits(with minimum host bit requirement).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three best mask criteria that engineers will choose from?

A

Highest Subnet bits, highest host bits or the increase both the numbers of supported subnets and hosts(middle).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to find the magic number for which the subnet ID will use?

A

256-interesting octet number=interval range:
ie. 255.255.224.0 would have magic number of 256-224=32. Subnet ID will be 255.255.32.0, 255.255.64,0, 255.255.96.0 and goes on to 255.255.224.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to find your broadcast subnet?

A

When adding the magic number to the network ID so that interesting octet reaches 256, then the previous number is the broadcast subnet. Or the value of the octet(256-magic number).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

With subnet bits more than 8, we will have an interesting octet and a _______ octet

A

just-left

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to find subnet IDs that has more than 8 subnet bits?

A

Find the subnet in the fourth octet with the magic number, when it reaches the broadcast number, add 1 to the just-left octet and restart the adding of the magic number until just left reaches 255. Or if having more than 16 bits, add on to the next octet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we define VLSM

A

Variable Length Subnet Mask is defined when a same classful network uses different subnet mask(different prefixes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to identify overlaps in VLSM?

A

Identify the subnet ID and subnet broadcast address for the given subnets; compare the range of all and identify the range of addresses that are overlapping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of summary route?

A

To minimize memory use of routing table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the formula to calculate the best summary route for a given list of subnets?

A
  1. List all subordinate subnets in decimal from low to high along with their broadcast subnet address.
  2. Identify the lowest subordinate subnet and the highest subnet broadcast address.
  3. identify prefix: pick the shortest prefix length mask of all the subordinate subnet and then subtract 1.
  4. Calculate a new potential summary subnet/mask with matching broadcast address based on the lowest subordinate subnet ID from the original list and the current prefix length.
    a. if the calculate range of address includes the entire range from step 2, you have found the best summary route.
    b. If not, subtract 1 from the prefix length used in the most recent calculation and repeat step 4.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the ACL and its major function?

A

Access Control Lists has many features, one of them is to filter(deny) or let through(permit) IP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four types of IP ACL?

A

Standard Numbered
Standard Named
Extended Numbered
Extended Named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is first-match logic for all IP ACL types?

A

When fist logic on the list(going in order) is met, it will stop processing the ACL function list and go with that logic’s outcome(either deny or permit). It will ignore the rest of the list that follows. IF there is no match for any logics on the list, the packet will be denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does ACL uses wild card mask?

A

MC mask uses decimal 0 when router must compare the octet as normal; it uses 255 for router to ignore that octet, considering it already matched.

17
Q

What is the CLI syntax for permitting all address with first single octet 10?

A

access-list 1 permit 10.0.0.0 0.255.255.255

18
Q

When the Wild Card Mask has 255, what syntax do we use for that octet in IP address?

A

0.

19
Q

How to find the right wildcard mask to match a subnet?

A

Use the subnet number as the source value in the access list command; use a wildcard mask found by subtracting the subnet mask from 255.255.255.255:

ie. if 172.16.8.0 255.255.252.0 is the subnet, then the command for the right WC mask would be:
access-list 1 permit 172.16.8.0 0.0.3.255

20
Q

How to configure an ACL to permit all packet? When do we use it?

A

access-list 1 permit any; use when you want the default setting to permit(default is to deny) all packet after the ACL processed.

21
Q

What is the format of a ACL command in CLI?

A

access-list (access-list-number) {deny | permit} (source) [source-wildcard mask]

22
Q

What are the steps when implementing a Standard IP ACL

A
  1. Plan the location(router and interface) and direction on that interface. *place near to the destination of the packet. direction should match the packet from source-to-destination direction.
  2. Configure one or more access-list command, be mindful of the default deny and first-match logic.
  3. Enable the ACL on the chosen router interface, in the correct direction, using the “ip access-group number {in | out} interface subcommand.