Layer 2 + Layer 3 Flashcards
records the source MAC address, port & VLAN, and timestamp of each received frame. The maximum default time an entry will be kept on the table is 300 seconds.
CAM Table
a specialized CAM designed for rapid table lookups. provides three results: 0, 1, and “don’t care.” is most useful for building tables for searching on longest matches such as IP routing tables organized by IP prefixes.
TCAM
is where all IP Routing information is stored. It is not specific to any routing protocol, rather a repository where all the routing protocols place all of their routes.
Routing Information Base
refers to the process by which the router’s CPU or processor is directly involved in the forwarding decision.
Process Switching
It is actually a reactive cache-based IP forwarding mechanism i.e. the address lookup uses a route cache to find the IP next-hop, outgoing interface, and outbound layer-2 header. Destination addresses are stored in the high-speed cache to expedite forwardin
Fast Switching
switching is a proprietary form of scalable switching intended to tackle the problems associated with demand caching. the information which is conventionally stored in a route cache is split up over several data structures.
Cisco Express Forwarding (CEF)
is a technology with which we can create separate virtual routers on a physical route. With these separate virtual routers, we can use router interfaces, routing and forwarding tables isolated with this.
Virtual Routing and Forwarding (VRF)
provides a virtual point-to-point private connection and encapsulates and forwards packets over an IP-based network
GRE (Generic Routing Encapsulation)
occurs when the router learns the destination IP address for the tunnel interface through the tunnel itself. It removes the previous entry for the tunnel destination IP address from the routing table, making the tunnel’s destination inaccessible
Recursive Routing
IP Sec Components
Authentication
Integrity
Confidentiality
a key management protocol standard that is used in conjunction with the IP Security (IPSec) standard. IPSec is a feature that provides robust authentication and encryption of IP packets.
IKE (Internet Key Exchange)
is a trunking protocol that is developed and proprietary to Cisco which is used to automatically negotiate trunks between Cisco switche
DTP (Dynamic Trunking Protocol)
DTP Modes
auto - passively waits
desirable - initiate trunking
nonegotiate - off
in networking is an IEEE standard and a part of the IEEE 802.3ad specification that allows you to combine multiple network connections or physical links in our network devices to form a single logical link and enable load balancing in our interfaces.
Link Aggregation Control Protocol (LACP)
LACP Configurations Mode
Active
Passive