Network Configuration Flashcards
What are the layers in the Cisco Hierarchical Network Design?
Core, distribution, and access
Core
Aggregates distribution switches in very large campus LANs, providing high forwarding rates
Distribution
- Provides an aggregation point for access switches
- Forwards frames between switches
- Does not directly connect to end users
- Provides redundancy and interconnectivity with minimal cabling
Access
- Provides a connection point for end user devices
- Does not normally forward frames between two other switches
- Controls user and workgroup access to intranet work resources
Switch OS
Internetwork Operating System (IOS)
What are popular methods of accessing Cisco IOS command line interface (CLI)?
Console, Telnet, SSH
CLI Password Security
- Telnet/SSH are not disabled by default
- All methods password capable
- Console (line console 0)
- Telnet/SSH - line vty 0 15
What are the switches memory types?
- Read Only Memory (ROM)
- Flash memory
- Nonvolatile Ram (NVRAM)
- RAM: Dynamic Random Access Memory (DRAM)
Where are configurations stored?
- Startup-config - NVRAM
- Running-config - RAM
- Initial configuration (Setup mode)
Cisco Discovery Protocol (CDP)
- Discovers information about neighboring Cisco devices
- “show cdp neighbors”
- Enabled by default
Slide 19
VLAN
- Advantages include segmentation, flexibility, security
- Equals broadcast domain, subnet, logical network, local area network
- In order to have inter VLAN communications a router is required
What is used to connect two switches together?
A trunk
VLAN Operation
- VLANs can span multiple switches
- Trunk carry traffic for multiple switches
- Trunks use special encapsulation to distinguish between multiple VLANs
What are the two different types of VLAN membership?
Port driven and MAC address driven
ISL Encapsulation
ISL trunks enable VLANs across a backbone, completely encapsulates the frame between a 26 byte header and a 4 byte trailer
802.1Q
Frame tagging, a 4 byte tag is added to the original header including VLAN ID information, after the tag is inserted the frame check sequence (FCS) is recalculated
VLAN Frame Identification
- Developed for multi VLAN, inter switch communications
- Places a unique identifier in header of each frame
- Functions at layer 2
ISL vs 802.1Q
- Both encapsulate VLAN traffic
- Max VLANs (ISL=1000, 802.1Q=4096)
- Spanning tree (ISL=per VLAN, 802.1Q=one on native VLAN for all VLANs in the network (Mono Spanning Tree))
- Support (ISL=Cisco proprietary, 802.1Q=IEEE open standard)
- Makes use of native VLAN (ISL=no, 802.1Q=yes)
Trunk Modes of Operation
Trunk, access, dynamic desirable, dynamic auto
Trunk mode of operation
Permanent trunking mode
Access mode of operation
Permanent non-trunking mode
Dynamic Desirable mode of operation
Makes the port actively try to convert the link to a trunk link (port becomes a trunk if the neighboring port is set to trunk, desirable, or auto mode)
Dynamic Auto mode of operation
Makes the port willing to become to a trunk link (port becomes a trunk port if the neighboring port is set to on or desirable))
Nonegotiate
Puts the trunk into permanent trunking mode, prevents the port from generating DTP frames
EtherChannel
Parallel links act as one, doubled bandwidth, multiple parallel segments, reduces convergence occurrences, both links have to fail
VTP Protocol Features
- Messaging system that advertises VLAN configuration informationto maintain VLAN configuration consistency throughout a domain
- Send advertisements on trunk ports only
Slide 44
Slide 45
VTP Operation
- VTP advertisements are sent as multicast frames
- VTP servers and clients are synchronized to the latest revision number
- VTP advertisements are sent every 5 minutes or when there’s a change
What are the requirements for VTP to function?
- Links operate as ISL or 802.1Q
- VTP domain name matches
- VTP password matches (if set)
Storing VLAN configuration
- vlan.dat in flash memory
- delete flash:vlan.dat (clean config)
VTP Pruning
Increase available bandwidth by reducing unnecessary traffic flow
What is the purpose of Spanning Tree Protocol?
- Preventing loops while providing path redundancy
- Prevent broadcast storms
- Eliminate MAC table instability
- Eliminate multiple frame transmission
Slide 53
How Spanning Tree Works
Criteria to choose whether to forward:
- Elect a root bridge (all working interfaces are forwarding)
- Elect a root port for non root bridges (one per device, lowest cost back to root bridge)
- Elect a designated port for each network segment (lowest cost back to root bridge)
What do switches exchange for STP?
Switches exchange configuration messages called Bridge Protocol Data Units (three types: configuration BPDU, Topology Change Notification (TCN), Topology Change Acknowledgement (TCA))
BPDU Bridge ID
- Unique identifier
- Bridge priority (2 bytes) and bridge MAC address (6 bytes)
- IEEE 802.1d default bridge priority is 32768 (midrange value)
- Root bridge has the lowest bridge priority (if bridge priority is the same lowest MAC address wins)
Electing a Root Bridge
- Only one bridge designated as root bridge in a given network
- On the root bridge, all ports are designated ports
- Designated ports are normally in the forwarding state
- When in the forwarding state, a port can send and receive user traffic
Non Root Bridge (Spanning Tree Operations)
- One root port
- Root port - lowest cost path from the non root bridge to the root bridge
- Root ports are in a forwarding state
- STP cost path is an accumulated cost calculated based on bandwidth
Designated Port (Spanning Tree Operations)
- One per segment
- On bridge with lowest cost path to root
What are non designated ports set to?
Forwarding state
When in Spanning Tree would a port not forward traffic?
When it’s set to a blocking state to break the loop
STP Port States
- Blocking
- Listening
- Learning
- Forwarding
- Disabled
Normal switch operations (STP states)
Forwarding or blocking
Change in network topology detected (20 sec) (STP states)
Listening (15 sec)
- Interface does not forward frames
- Inactive MAC address entries removed from CAM table (inactive MAC addresses potential cause of loops)
Learning (15 sec)
- Interface does not forward frames
- Switch starts learning new MAC addresses to update its CAM table
Convergence
Time to complete STP after topology change, all switches have transitioned to either forwarding or blocking
How long does 802.1d (STP) take to converge?
50 seconds
How long does 802.1w (RSTP) take to converge?
Less than 10 seconds
Slide 66-67
BPDU Guard
- Prevents switch operation on specified port
- Configured on access or unused/disabled ports
- Port goes into err-disabled mode when BPDUs detected