Network Configuration Flashcards

1
Q

What are the layers in the Cisco Hierarchical Network Design?

A

Core, distribution, and access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Core

A

Aggregates distribution switches in very large campus LANs, providing high forwarding rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distribution

A
  • Provides an aggregation point for access switches
  • Forwards frames between switches
  • Does not directly connect to end users
  • Provides redundancy and interconnectivity with minimal cabling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access

A
  • Provides a connection point for end user devices
  • Does not normally forward frames between two other switches
  • Controls user and workgroup access to intranet work resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Switch OS

A

Internetwork Operating System (IOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are popular methods of accessing Cisco IOS command line interface (CLI)?

A

Console, Telnet, SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CLI Password Security

A
  • Telnet/SSH are not disabled by default
  • All methods password capable
  • Console (line console 0)
  • Telnet/SSH - line vty 0 15
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the switches memory types?

A
  • Read Only Memory (ROM)
  • Flash memory
  • Nonvolatile Ram (NVRAM)
  • RAM: Dynamic Random Access Memory (DRAM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where are configurations stored?

A
  • Startup-config - NVRAM
  • Running-config - RAM
  • Initial configuration (Setup mode)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cisco Discovery Protocol (CDP)

A
  • Discovers information about neighboring Cisco devices
  • “show cdp neighbors”
  • Enabled by default
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Slide 19

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VLAN

A
  • Advantages include segmentation, flexibility, security
  • Equals broadcast domain, subnet, logical network, local area network
  • In order to have inter VLAN communications a router is required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is used to connect two switches together?

A

A trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VLAN Operation

A
  • VLANs can span multiple switches
  • Trunk carry traffic for multiple switches
  • Trunks use special encapsulation to distinguish between multiple VLANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two different types of VLAN membership?

A

Port driven and MAC address driven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISL Encapsulation

A

ISL trunks enable VLANs across a backbone, completely encapsulates the frame between a 26 byte header and a 4 byte trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.1Q

A

Frame tagging, a 4 byte tag is added to the original header including VLAN ID information, after the tag is inserted the frame check sequence (FCS) is recalculated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VLAN Frame Identification

A
  • Developed for multi VLAN, inter switch communications
  • Places a unique identifier in header of each frame
  • Functions at layer 2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ISL vs 802.1Q

A
  • Both encapsulate VLAN traffic
  • Max VLANs (ISL=1000, 802.1Q=4096)
  • Spanning tree (ISL=per VLAN, 802.1Q=one on native VLAN for all VLANs in the network (Mono Spanning Tree))
  • Support (ISL=Cisco proprietary, 802.1Q=IEEE open standard)
  • Makes use of native VLAN (ISL=no, 802.1Q=yes)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Trunk Modes of Operation

A

Trunk, access, dynamic desirable, dynamic auto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Trunk mode of operation

A

Permanent trunking mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Access mode of operation

A

Permanent non-trunking mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dynamic Desirable mode of operation

A

Makes the port actively try to convert the link to a trunk link (port becomes a trunk if the neighboring port is set to trunk, desirable, or auto mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dynamic Auto mode of operation

A

Makes the port willing to become to a trunk link (port becomes a trunk port if the neighboring port is set to on or desirable))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Nonegotiate

A

Puts the trunk into permanent trunking mode, prevents the port from generating DTP frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

EtherChannel

A

Parallel links act as one, doubled bandwidth, multiple parallel segments, reduces convergence occurrences, both links have to fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

VTP Protocol Features

A
  • Messaging system that advertises VLAN configuration informationto maintain VLAN configuration consistency throughout a domain
  • Send advertisements on trunk ports only
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Slide 44

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Slide 45

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

VTP Operation

A
  • VTP advertisements are sent as multicast frames
  • VTP servers and clients are synchronized to the latest revision number
  • VTP advertisements are sent every 5 minutes or when there’s a change
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the requirements for VTP to function?

A
  • Links operate as ISL or 802.1Q
  • VTP domain name matches
  • VTP password matches (if set)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Storing VLAN configuration

A
  • vlan.dat in flash memory
  • delete flash:vlan.dat (clean config)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

VTP Pruning

A

Increase available bandwidth by reducing unnecessary traffic flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the purpose of Spanning Tree Protocol?

A
  • Preventing loops while providing path redundancy
  • Prevent broadcast storms
  • Eliminate MAC table instability
  • Eliminate multiple frame transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Slide 53

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How Spanning Tree Works

A

Criteria to choose whether to forward:
- Elect a root bridge (all working interfaces are forwarding)
- Elect a root port for non root bridges (one per device, lowest cost back to root bridge)
- Elect a designated port for each network segment (lowest cost back to root bridge)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What do switches exchange for STP?

A

Switches exchange configuration messages called Bridge Protocol Data Units (three types: configuration BPDU, Topology Change Notification (TCN), Topology Change Acknowledgement (TCA))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

BPDU Bridge ID

A
  • Unique identifier
  • Bridge priority (2 bytes) and bridge MAC address (6 bytes)
  • IEEE 802.1d default bridge priority is 32768 (midrange value)
  • Root bridge has the lowest bridge priority (if bridge priority is the same lowest MAC address wins)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Electing a Root Bridge

A
  • Only one bridge designated as root bridge in a given network
  • On the root bridge, all ports are designated ports
  • Designated ports are normally in the forwarding state
  • When in the forwarding state, a port can send and receive user traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Non Root Bridge (Spanning Tree Operations)

A
  • One root port
  • Root port - lowest cost path from the non root bridge to the root bridge
  • Root ports are in a forwarding state
  • STP cost path is an accumulated cost calculated based on bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Designated Port (Spanning Tree Operations)

A
  • One per segment
  • On bridge with lowest cost path to root
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are non designated ports set to?

A

Forwarding state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

When in Spanning Tree would a port not forward traffic?

A

When it’s set to a blocking state to break the loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

STP Port States

A
  • Blocking
  • Listening
  • Learning
  • Forwarding
  • Disabled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Normal switch operations (STP states)

A

Forwarding or blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Change in network topology detected (20 sec) (STP states)

A

Listening (15 sec)
- Interface does not forward frames
- Inactive MAC address entries removed from CAM table (inactive MAC addresses potential cause of loops)

Learning (15 sec)
- Interface does not forward frames
- Switch starts learning new MAC addresses to update its CAM table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Convergence

A

Time to complete STP after topology change, all switches have transitioned to either forwarding or blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How long does 802.1d (STP) take to converge?

A

50 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How long does 802.1w (RSTP) take to converge?

A

Less than 10 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Slide 66-67

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

BPDU Guard

A
  • Prevents switch operation on specified port
  • Configured on access or unused/disabled ports
  • Port goes into err-disabled mode when BPDUs detected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Root Guard

A
  • Allows switch operation on specified port
  • Ignores superior BPDU Hello messages (prevents rogue bridges from taking over)
53
Q

Rapid STP (RSTP)

A

STP similarities:
- Elects root switch
- Elects root port on non root switches
- Elects designated ports per LAN segment
- Places each port in forwarding/discarding state
- In RSTP blocking is called discarding
STP differences:
- Slide 70

54
Q

What improvements did RSTP bring to STP?

A
  • MaxAge 6 seconds vs 20 in STP
  • Eliminates forward delay (default was 15 sec for listening/learning)
  • Listening state removed, learning state time reduced
  • Convergence times <10 sec
55
Q

Slide 72

A
56
Q

Slide 73

A
57
Q

Inter VLAN Routing

A
  • VLANs inhibit communication between VLANs
  • Packets sent to a default router
  • Multiple VLANs interfacing with a single route processor require multiple connections or VLAN trunking
58
Q

What must be done if there are not enough physical ports on a router for the required number of VLANs?

A

A physical interface must be divided into multiple sub-interfaces

59
Q

What devices were traditionally used for routing?

A

A physical high end router connected by multiple connections such as an ISL trunk

60
Q

What device is used for routing now?

A

A multilayer switch which integrates layer 2 and layer 3 functionality in a single device

61
Q

What does a default gateway facilitate?

A

Inter VLAN communication

62
Q

Routers

A
  • Internetworking devices that work at layer 3
  • Understand and use logical addresses (ip addresses)
  • Keep table of information about networks
  • Can make path determinations
  • Don’t normally forward broadcasts
  • Can support multiple layer 3 protocols at the same time
63
Q

External routers with an interface per VLAN

A

Very expensive in large networks w/ a lot of VLANs, rack, power and environmental limitations

64
Q

DHCP Relay Agent

A

Client server application to forward broadcast requests, IP helper address

65
Q

Router on a Stick

A

Single router w/ one interface, performs ISL or 802.1q trunking, uses sub-interfaces, sub-interfaces assigned to VLANs via encapsulation

66
Q

What are the two main types of layer 3 interfaces?

A

Routed ports and switch virtual interfaces (SVI)

67
Q

Switch Virtual Interface

A
  • A virtual port, it exists only in software on a multilayer switch
  • Is the layrer 3 presence of a VLAN
  • Allows inter VLAN routing
  • The layer 2 VLAN must exist for this function
68
Q

Hot Standby Router Protocol (HSRP)

A
  • Supports non-disruptive failover of IP traffic
  • Routers work in concert to present illusion of a single virtual router to hosts on the LAN (known as HSRP/standby group with one router set as the active)
  • One router, known as the active, forwards packets
  • Another router is elected as the standby router to take over if the active fails
69
Q

Which router in the HSRP group will become that active router?

A

The one with the highest HSRP priority number

70
Q

What does the active router in HSRP respond to ARP requests with?

A

The MAC address of the virtual router

71
Q

How long should the hold timer be in HSRP?

A

At least three times the value of the hello timer

72
Q

DHCP Relay

A
  • Used within a centralized DHCP server with many subnets
  • Without DHCP relay DHCP requests from hosts will never leave the local LAN subnet
  • Turns broadcast packets into unicast packets and forwards it on
73
Q

Port Security

A

Configure a switchport to limited MAC addresses (done only on static access or static trunk, not dynamic)

74
Q

Static Port Security

A

For when MAC addresses are know and don’t often change. Configured by administrator and stored in running-config

75
Q

Dynamic Port Security

A

For when hosts are constantly changing, limits the number of hosts per port. Learned from traffic, not stored in running config.

76
Q

Sticky Port Security

A

Allows multiple hosts to be dynamically learned at once. Saving the MAC addresses to the running-config essentially makes them static.

77
Q

What are the different types of switchport security violations?

A

Protected, Restricted, Shutdown

78
Q

Switchport Security - Protected

A

Known MAC addresses are allowed to continue sending traffic. No notifications.

79
Q

Switchport Security - Restricted

A

Known MAC addresses are allowed to continue sending traffic. Same as Protected but notification sent (SNMP), violation counter incremented

80
Q

Switchport Security - Shutdown

A

Default mode. Notification sent. Interface shutdown.

81
Q

Secure Shell

A
  • Encrypts terminal traffic
  • Prevents disclosure of passwords
  • Guarantees identity of device and remote user
  • Keeps remote sessions private from other network users
  • Up to 2048 bit cyphers and RSA encryption
82
Q

AAA

A

The mechanism Cisco recommends for remote administration, authentication, authorization, and accounting

83
Q

What are the two methods of AAA?

A

RADIUS and TACACS+

84
Q

Routed Port

A
  • Uses the no switchport command to configure a physical switch port as a routed port
  • Used in conjuction with SVIs
  • Configured to act like a port on a traditional router
  • Used for point to point connectivity
85
Q

What does a router need to do to successfully route?

A
  • Know the destination address
  • Identify the sources it can learn from
  • Discover possible routes
  • Select the best route
  • Maintain and verify routing information
86
Q

What are the general types of routing?

A

Static and dynamic

87
Q

Static Routing

A
  • Manually configured by the administrator
  • Simplest form of routing as long as network is small
  • Extremely complex and not feasible for large networks
  • Unable to adapt to topology changes
  • Hub and spoke design
  • Classful and classless
88
Q

Static routes must be configured in both directions? (True/False)

A

True

89
Q

Dynamic Routing

A
  • Used to exchange routing information between routers
  • Purpose includes: discovery of remote networks, maintaining up-to-date routing information, choosing best path to destination networks, ability to find new best path if needed, can be simple of complex
  • Have ability to load balance between multiple paths
  • Administrator determines interfaces and networks
90
Q

Slide 140

A
91
Q

How does dynamic routing work?

A
  • The router sends and receives routing messages on its interfaces
  • The router shares routing messages and routing information with other routers that are using the same routing protocol
  • Routers exchange routing information to learn about remote networks
  • When a router detects a topology change the routing protocol can advertise this change to other routers
92
Q

What are the characteristics routing protocols can be categorized by?

A

Purpose, operation, behavior

93
Q

What are the categories created by classifying routing protocols according to the purpose?

A

Interior gateway protocol and exterior gateway protocol

94
Q

What are the categories created by classifying routing protocols according to the operation?

A

Distance vector protocol, link-state protocol, path-vector protocol

95
Q

What are the categories created by classifying routing protocols according to the behavior?

A

Classful or classless

96
Q

Slide 143

A
97
Q

How do we define the difference between IGPs and EGPs

A

By autonomous system (a collection of routers under common administration)

98
Q

Distance Vector

A

Distance vector means that routes are advertised by providing a distance (how far to the destination network based on a metric) and a vector (the direction of the next hop-router or exit interface)

99
Q

What are the distance vector IPv4 IGPs?

A

RIPv1, RIPv2, IGRP, EIGRP

100
Q

Link State

A

Every node constructs a map of the connectivity of a network. Each node then independently calculates the next best logical path from it to every other destination. Each collection of best paths will become the routing table.

101
Q

When are link state protocols best?

A
  • The network design is hierarchical, usually in large networks
  • Fast convergence is crucial
  • The administrators have good knowledge of the implemented link-state routing protocol
102
Q

What are the link state IPv4 IGPs?

A

OSPF and IS-IS

103
Q

Path Vector

A

Essentially a distance vector protocol that doesn’t rely on the distance to destination to guarantee a loop-free path but instead relies on the analysis of the path itself

104
Q

What is the Border Gateway Protocol classified as?

A

Path vector protocol

105
Q

What is the biggest distinction between classful and classless routing protocols?

A

Classful routing protocols do not send subnet mask information in their routing updates

106
Q

What were the original IPv4 classful routing protocols?

A

RIPv1 and IGRP

107
Q

What are the limitations of RIPv1 and IGRP?

A

They cannot provide Variable Length Subnet Masks and Classless Inter-domain Routing

108
Q

Where can classful routing protocols cause problems?

A

In discontiguous networks

109
Q

What do classless routing protocols support?

A

VLSM, CIDR and discontiguous networks

110
Q

Administrative Distance

A

The feature that routers use in order to select the best path when two or more different routes to the same destination come from two different routing protocols

111
Q

What does administrative distance define?

A

The reliability of a routing protocol

112
Q

What do distance vector routing protocols share updates between?

A

Neighbors (routers that share a link and are configured to use the same routing protocol)

113
Q

What distance vector routing protocols send periodic updates?

A

RIPv1 and RIPv2

114
Q

Routing Information Protocol (RIP)

A
  • Uses the simplest routing metric (hop count)
  • Does not scale well to large networks
  • Susceptible to loops and the count to infinity problem
115
Q

How is the infinity problem solved?

A

Split Horizon (information about the routing for a particular packet is never sent back in the direction from which it was received)

116
Q

OSPF

A
  • Open Standard
  • Shortest Path First (SPF) algorithm
  • Link state routing protocol (vs distance vector)
117
Q

How is an OSPF routing table made?

A

LSAs are propagated rather than routing table updates. LSAs are flooded to the network and database is pieced together from the LSAs. Designated Router (DR) exchanges LSAs with routers (DROthers), backup DR (BDR) takes over if DR goes down

118
Q

What does EIGRP support?

A
  • Rapid convergence
  • Reduced bandwidth usage
  • Multiple network-layer protocols
119
Q

What are the types of EIGRP routes?

A
  • Successor (feasible or calculated distance/reported or advertised distance)
  • Feasible successor
  • Feasibility Condition
120
Q

Why would you use Access Lists?

A

To manage IP traffic as network access grows and filter packets as they pass through the network

121
Q

What can access lists control?

A

Packets moving through the network and VTY access to or from the router

122
Q

What types of access lists are there?

A

Standard and extended

123
Q

What are standard access lists?

A

They check the source address and generally permit or deny entire protocol suite

124
Q

What are extended access lists?

A

They check source and destination addresses and generally permit or deny specific protocols

125
Q

What number range are standard access lists?

A

1-99

126
Q

What number range are extended access lists?

A

100-199

127
Q

Key features of access lists

A
  • Implicit deny unless access list ends with allow any
  • The order of access list statements is crucial
128
Q
A