memory tablesptgmedia.pearsoncmg.com/images/9781587201813/... · table 12-4 likely reasons for...
Post on 27-Jan-2021
2 Views
Preview:
TRANSCRIPT
-
A
P
P
E
N
D
I
X
J
Memory Tables
Chapter 1Table 1-2 ISL and 802.1Q Compared
Function ISL 802.1Q
Defined by
Inserts another 4-byte header instead of completely encapsulating the original frame
Supports normal-range (1–1005) and extended-range (1006–4094) VLANs
Allows multiple spanning trees
Uses a native VLAN
Table 1-3 VTP Features
Function Server Client Transparent
Only sends VTP messages out ISL or 802.1Q trunks
Supports CLI configuration of VLANs
Can use normal-range VLANs (1–1005)
Can use extended-range VLANs (1006–4095)
Synchronizes (updates) its own config database when receiving VTP messages with a higher revision number
Creates and sends periodic VTP updates every 5 minutes
Does not process received VTP updates, but does forward received VTP updates out other trunks
Places the VLAN ID, VLAN name, and VTP configuration into the running-config file
Places the VLAN ID, VLAN name, and VTP configuration into the vlan.dat file in flash
-
3 Appendix J: Memory Tables
Chapter 1 lists a configuration checklist for configuring VLANs and assigning the VLANs to interfaces. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter.
Step 1 To configure a new VLAN, follow these steps:
a.
b. (Optional)
Step 2 To configure a VLAN for each access interface, follow these steps:
a.
b.
c. (Optional)
Table 1-4 Trunking Administrative Mode Options with the switchport mode Command
Command Option Description
access
trunk
dynamic desirable
dynamic auto
Table 1-5 Expected Trunking Operational Mode Based on the Configured Administrative Modes
Administrative Mode Access Dynamic Auto Trunk Dynamic Desirable
access
dynamic auto
trunk
dynamic desirable
Table 1-6 Voice and Data VLAN Configuration
Device Name of the VLAN Configured With This Command
Phone
PC
-
Chapter 2 4
Chapter 1 lists a configuration checklist for configuring VTP. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter.
Step 1
Step 2
Step 3 (Optional)
Step 4 (Optional)
Step 5 (Optional)
Step 6
Chapter 2
Table 1-7 Where VTP Clients and Servers Store VLAN-Related Configuration
Configuration Commands Where Stored How to View
vtp domain
vtp mode
vtp password
vtp pruning
vlan vlan-id
name vlan-name
switchport access vlan vlan-id
switchport voice vlan vlan-id
Table 2-2 Three Classes of Problems Caused by Not Using STP in Redundant LANs
Problem Description
Broadcast storms
MAC table instability
Multiple frame transmission
Table 2-3 STP: Reasons for Forwarding or Blocking
Characterization of Port STP State Description
All the root switch’s ports
Each nonroot switch’s root port
Each LAN’s designated port
All other working ports
-
5 Appendix J: Memory Tables
Table 2-4 Fields in the STP Hello BPDU
Field Description
Root bridge ID
Sender’s bridge ID
Cost to reach root
Timer values on the root switch
Table 2-6 Default Port Costs According to IEEE
Ethernet Speed Original IEEE Cost Revised IEEE Cost
10 Mbps
100 Mbps
1 Gbps
10 Gbps
Table 2-7 STP Timers
Timer Description Default Value
Hello
Max Age
Forward Delay
Table 2-8 IEEE 802.1D Spanning-Tree States
State Forwards Data Frames?Learns MACs Based on Received Frames?
Transitory or Stable State?
Blocking
Listening
Learning
Forwarding
Disabled
-
Chapter 2 6
Table 2-9 RSTP and STP Port States
Operational StateSTP State (802.1d)
RSTP State (802.1w) Forwards Data Frames in This State?
Enabled Blocking
Enabled Listening
Enabled Learning
Enabled Forwarding
Disabled Disabled
Table 2-10 RSTP and STP Port Roles
RSTP Role STP Role Definition
Root port
Designated port
Alternate port
Backup port
Disabled
Table 2-11 Comparing Three Options for Multiple Spanning Trees
OptionSupports STP
Supports RSTP Configuration Effort
Only One Instance Required for Each Redundant Path
PVST+
PVRST
MIST
Table 2-12 STP Defaults and Configuration Options
Setting Default Command(s) to Change Default
Bridge ID
Interface cost
PortFast
BPDU Guard
-
7 Appendix J: Memory Tables
Chapter 3Table 3-2 LAN Switch Interface Status Codes
Line Status Protocol Status Interface Status Typical Root Cause
admin. down down
down down
up down
down down (err-disabled)
up up
Table 3-3 10BASE-T and 100BASE-Tx Pin Pairs Used
Devices That Transmit on 1,2and Receive on 3,6
Devices That Transmit on 3,6and Receive on 1,2
Table 3-4 Port Security Behavior Based on Violation Mode
Violation Mode
Discards Offending Traffic
Discards All Traffic After Violation Occurs
Violation Results in err-disabled Interface State
Counters Increment for Each New Violation
shutdown
restrict
protect
Table 3-5 Commands That Can Find Access Ports and VLANs
EXEC Command Description
Lists each VLAN and all interfaces assigned to that VLAN, but does not include trunks
Identifies an interface’s access VLAN, voice VLAN, and the administrative (configured) mode and operational mode (access or trunking)
Lists MAC table entries: MAC addresses with associated interfaces and VLANs
-
Chapter 5 8
Chapter 4Chapter 4 lists a summary of a host’s routing logic, with two main branches in what the host decides to do. As much as you can, complete the description of each step.
1.
a.
b.
Chapter 4 lists a summary of a router’s routing logic, with two main branches in what the host decides to do. As much as you can, complete the description of each step.
1.
2.
3.
4.
5.
6.
Chapter 5
Table 4-2 Comparing the Use of the Terms Classless and Classful
As Applied To Classful Classless
Addresses
Routing protocols
Routing (forwarding)
Table 5-2 Classless and Classful Interior IP Routing Protocols
Routing Protocol
Is It Classless?
Sends Mask in Updates
Supports VLSM
Supports Manual Route Summarization
RIP-1
IGRP
RIP-2
EIGRP
OSPF
-
9 Appendix J: Memory Tables
Chapter 5 lists a five-step process for finding summary routes. As much as you can, complete the step list.
Step 1
Step 2
Step 3
Step 4
Step 5
Chapter 6
Table 5-5 Autosummarization Support and Defaults
Routing Protocol Classless?
Supports Autosummarization?
Defaults to Use Autosummarization?1
Can Disable Autosummarization?
RIP-1
RIP-2
EIGRP
OSPF
Table 6-3 Standard and Extended IP Access Lists: Matching
Type of Access List What Can Be Matched
Both standard and extended ACLs
Only extended ACLs
-
Chapter 7 10
Chapter 7
Table 6-5 Popular Applications and Their Well-Known Port Numbers
Port Number(s) Protocol ApplicationApplication Name Keyword in access-list Command Syntax
20
21
22
23
25
53
67, 68
69
80
110
161
443
16,384–32,767
Table 6-7 Operators Used When Matching Port Numbers
Operator in the access-list Command Meaning
eq
neq
lt
gt
range
Table 7-1 ICMP Message Types
Message Description
Destination Unreachable
Time Exceeded
Redirect
Echo Request, Echo Reply
-
11 Appendix J: Memory Tables
Table 7-2 ICMP Unreachable Codes
Unreachable Code When It Is Used What Typically Sends It
Network unreachable
Host unreachable
Can’t fragment
Protocol unreachable
Port unreachable
Table 7-3 Codes That the ping Command Receives in Response to Its ICMP Echo Request
ping Command Code Description
!
.
U
N
M
?
-
Chapter 8 12
Chapter 8Table 8-2 IP IGP Metrics
IGP Metric Description
RIP-1, RIP-2
OSPF
EIGRP
Table 8-3 Interior IP Routing Protocols Compared
Feature RIP-1 RIP-2 EIGRP OSPF IS-IS
Classless No Yes
Supports VLSM No Yes
Sends mask in update No Yes
Distance vector Yes No
Link-state No Yes
Supports autosummarization No Yes Yes No No
Supports manual summarization No Yes Yes Yes Yes
Proprietary No No
Routing updates are sent to a multicast IP address No —
Supports authentication No Yes
Convergence Slow Fast
-
13 Appendix J: Memory Tables
Table 8-4 Comparing Features of IGPs: RIP-2, EIGRP, and OSPF
Features RIP-2 OSPF EIGRP
Metric
Sends periodic updates
Full or partial routing updates
Where updates are sent
Metric considered to be "infinite"
Supports unequal-cost load balancing
Table 8-5 Default Administrative Distances
Route Type Administrative Distance
Connected
Static
BGP (external routes)
EIGRP (internal routes)
IGRP
OSPF
IS-IS
RIP
EIGRP (external routes)
BGP (internal routes)
Unusable
-
Chapter 11 14
Chapter 10
Chapter 11
Table 10-2 EIGRP Features Compared to OSPF
Feature EIGRP OSPF
Converges quickly
Built-in loop prevention
Sends partial routing updates, advertising only new or changed information
Classless; therefore, supports manual summarization and VLSM
Allows manual summarization at any router
Sends routing information using IP multicast on LANs
Uses the concept of a designated router on a LAN
Flexible network design with no need to create areas
Supports both equal-metric and unequal-metric load balancing
Robust metric based on bandwidth and delay
Can advertise IP, IPX, and AppleTalk routes
Public standard
Table 11-2 Neighbor Requirements for EIGRP and OSPF
Requirement EIGRP OSPF
Interfaces must be in an up/up state
Interfaces must be in the same subnet
Must pass neighbor authentication (if configured)
Must use the same ASN/process-ID on the router configuration command
Hello and hold/dead timers must match
IP MTU must match
Router IDs must be unique
K-values must match
Must be in the same area
-
15 Appendix J: Memory Tables
Chapter 12Table 12-2 PPP LCP Features
Function LCP Feature Description
Looped link detection Magic number
Error detection Link Quality Monitoring (LQM)
Multilink support Multilink PPP
Authentication PAP and CHAP
Table 12-4 Likely Reasons for Data-Link Problems on Serial Links
Line Status Protocol Status Likely Reason
Up Down (stable) on both ends
or
Down (stable) on one end, flapping between up and down on the other
Up Down on one end, up on the other
Up Down (stable) on both ends
Table 12-5 Summary of Symptoms for Mismatched Subnets on Serial Links
Symptoms When IP Addresses on a Serial Link Are in Different Subnets HDLC PPP
Does a ping of the other router’s serial IP address work?
Can routing protocols exchange routes over the link?
-
Chapter 13 16
Chapter 13Table 13-2 Frame Relay Terms and Concepts
Term Description
Virtual circuit (VC)
Permanent virtual circuit (PVC)
Switched virtual circuit (SVC)
Data terminal equipment (DTE)
Data communications equipment (DCE)
Access link
Access rate (AR)
Committed Information Rate (CIR)
Data-link connection identifier (DLCI)
Nonbroadcast multiaccess (NBMA)
Local Management Interface (LMI)
Table 13-4 Frame Relay LMI Types
Name Document IOS LMI-Type Parameter
Cisco Proprietary
ANSI T1.617 Annex D
ITU Q.933 Annex A
-
17 Appendix J: Memory Tables
Chapter 14
Chapter 15
Chapter 17
Table 14-4 PVC Status Values
Status Active Inactive Deleted Static
The PVC is defined to the Frame Relay network
The router will attempt to send frames on a VC in this state
Table 15-3 Comparing VPN Encryption Algorithms
Encryption Algorithm Key Length (Bits) Comments
Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)
Table 15-6 Summary of Functions Supported by ESP and AH
Feature Supported by ESP? Supported by AH?
Authentication
Message integrity
Encryption
Antireplay
Table 17-4 Example IPv6 Prefixes and Their Meanings
Term Assignment Example from Chapter 17
Registry prefix
ISP prefix
Site prefix
Subnet prefix
-
Chapter 17 18
Table 17-5 Details of the RS/RA Process
Message RS RA
Multicast destination
Meaning of multicast address
Table 17-6 IPv6 Address Configuration Options
Static or Dynamic Option Portion Configured or Learned
Static
Static
Dynamic
Dynamic
Table 17-7 Comparison of Stateless and Stateful DHCPv6 Services
Feature Stateful DHCP Stateless DHCP
Remembers IPv6 address (state information) of clients that make requests
Assigns IPv6 address to client
Supplies useful information, like DNS server IP addresses
Is most useful in conjunction with stateless autoconfiguration
Table 17-9 Common Link Local Multicast Addresses
Type of Address Purpose PrefixEasily Seen Hex Prefix(es)
Global unicast Unicast packets sent through the public Internet
Unique local Unicast packets inside one organization
Link Local Packets sent in the local subnet
Multicast (link local scope)
Multicasts that stay on the local subnet
-
19 Appendix J: Memory Tables
Chapter 17 lists a configuration checklist for configuring IPv6. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter.
Step 1
Step 2
Step 3
Step 4
-
Memory TablesChapter 1Chapter 2Chapter 3Chapter 4Chapter 5Chapter 6Chapter 7Chapter 8Chapter 10Chapter 11Chapter 12Chapter 13Chapter 14Chapter 15Chapter 17
top related