memory tablesptgmedia.pearsoncmg.com/images/9781587201813/... · table 12-4 likely reasons for...

20

Upload: others

Post on 27-Jan-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

  • A

    P

    P

    E

    N

    D

    I

    X

    J

    Memory Tables

    Chapter 1Table 1-2 ISL and 802.1Q Compared

    Function ISL 802.1Q

    Defined by

    Inserts another 4-byte header instead of completely encapsulating the original frame

    Supports normal-range (1–1005) and extended-range (1006–4094) VLANs

    Allows multiple spanning trees

    Uses a native VLAN

    Table 1-3 VTP Features

    Function Server Client Transparent

    Only sends VTP messages out ISL or 802.1Q trunks

    Supports CLI configuration of VLANs

    Can use normal-range VLANs (1–1005)

    Can use extended-range VLANs (1006–4095)

    Synchronizes (updates) its own config database when receiving VTP messages with a higher revision number

    Creates and sends periodic VTP updates every 5 minutes

    Does not process received VTP updates, but does forward received VTP updates out other trunks

    Places the VLAN ID, VLAN name, and VTP configuration into the running-config file

    Places the VLAN ID, VLAN name, and VTP configuration into the vlan.dat file in flash

  • 3 Appendix J: Memory Tables

    Chapter 1 lists a configuration checklist for configuring VLANs and assigning the VLANs to interfaces. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter.

    Step 1 To configure a new VLAN, follow these steps:

    a.

    b. (Optional)

    Step 2 To configure a VLAN for each access interface, follow these steps:

    a.

    b.

    c. (Optional)

    Table 1-4 Trunking Administrative Mode Options with the switchport mode Command

    Command Option Description

    access

    trunk

    dynamic desirable

    dynamic auto

    Table 1-5 Expected Trunking Operational Mode Based on the Configured Administrative Modes

    Administrative Mode Access Dynamic Auto Trunk Dynamic Desirable

    access

    dynamic auto

    trunk

    dynamic desirable

    Table 1-6 Voice and Data VLAN Configuration

    Device Name of the VLAN Configured With This Command

    Phone

    PC

  • Chapter 2 4

    Chapter 1 lists a configuration checklist for configuring VTP. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter.

    Step 1

    Step 2

    Step 3 (Optional)

    Step 4 (Optional)

    Step 5 (Optional)

    Step 6

    Chapter 2

    Table 1-7 Where VTP Clients and Servers Store VLAN-Related Configuration

    Configuration Commands Where Stored How to View

    vtp domain

    vtp mode

    vtp password

    vtp pruning

    vlan vlan-id

    name vlan-name

    switchport access vlan vlan-id

    switchport voice vlan vlan-id

    Table 2-2 Three Classes of Problems Caused by Not Using STP in Redundant LANs

    Problem Description

    Broadcast storms

    MAC table instability

    Multiple frame transmission

    Table 2-3 STP: Reasons for Forwarding or Blocking

    Characterization of Port STP State Description

    All the root switch’s ports

    Each nonroot switch’s root port

    Each LAN’s designated port

    All other working ports

  • 5 Appendix J: Memory Tables

    Table 2-4 Fields in the STP Hello BPDU

    Field Description

    Root bridge ID

    Sender’s bridge ID

    Cost to reach root

    Timer values on the root switch

    Table 2-6 Default Port Costs According to IEEE

    Ethernet Speed Original IEEE Cost Revised IEEE Cost

    10 Mbps

    100 Mbps

    1 Gbps

    10 Gbps

    Table 2-7 STP Timers

    Timer Description Default Value

    Hello

    Max Age

    Forward Delay

    Table 2-8 IEEE 802.1D Spanning-Tree States

    State Forwards Data Frames?Learns MACs Based on Received Frames?

    Transitory or Stable State?

    Blocking

    Listening

    Learning

    Forwarding

    Disabled

  • Chapter 2 6

    Table 2-9 RSTP and STP Port States

    Operational StateSTP State (802.1d)

    RSTP State (802.1w) Forwards Data Frames in This State?

    Enabled Blocking

    Enabled Listening

    Enabled Learning

    Enabled Forwarding

    Disabled Disabled

    Table 2-10 RSTP and STP Port Roles

    RSTP Role STP Role Definition

    Root port

    Designated port

    Alternate port

    Backup port

    Disabled

    Table 2-11 Comparing Three Options for Multiple Spanning Trees

    OptionSupports STP

    Supports RSTP Configuration Effort

    Only One Instance Required for Each Redundant Path

    PVST+

    PVRST

    MIST

    Table 2-12 STP Defaults and Configuration Options

    Setting Default Command(s) to Change Default

    Bridge ID

    Interface cost

    PortFast

    BPDU Guard

  • 7 Appendix J: Memory Tables

    Chapter 3Table 3-2 LAN Switch Interface Status Codes

    Line Status Protocol Status Interface Status Typical Root Cause

    admin. down down

    down down

    up down

    down down (err-disabled)

    up up

    Table 3-3 10BASE-T and 100BASE-Tx Pin Pairs Used

    Devices That Transmit on 1,2and Receive on 3,6

    Devices That Transmit on 3,6and Receive on 1,2

    Table 3-4 Port Security Behavior Based on Violation Mode

    Violation Mode

    Discards Offending Traffic

    Discards All Traffic After Violation Occurs

    Violation Results in err-disabled Interface State

    Counters Increment for Each New Violation

    shutdown

    restrict

    protect

    Table 3-5 Commands That Can Find Access Ports and VLANs

    EXEC Command Description

    Lists each VLAN and all interfaces assigned to that VLAN, but does not include trunks

    Identifies an interface’s access VLAN, voice VLAN, and the administrative (configured) mode and operational mode (access or trunking)

    Lists MAC table entries: MAC addresses with associated interfaces and VLANs

  • Chapter 5 8

    Chapter 4Chapter 4 lists a summary of a host’s routing logic, with two main branches in what the host decides to do. As much as you can, complete the description of each step.

    1.

    a.

    b.

    Chapter 4 lists a summary of a router’s routing logic, with two main branches in what the host decides to do. As much as you can, complete the description of each step.

    1.

    2.

    3.

    4.

    5.

    6.

    Chapter 5

    Table 4-2 Comparing the Use of the Terms Classless and Classful

    As Applied To Classful Classless

    Addresses

    Routing protocols

    Routing (forwarding)

    Table 5-2 Classless and Classful Interior IP Routing Protocols

    Routing Protocol

    Is It Classless?

    Sends Mask in Updates

    Supports VLSM

    Supports Manual Route Summarization

    RIP-1

    IGRP

    RIP-2

    EIGRP

    OSPF

  • 9 Appendix J: Memory Tables

    Chapter 5 lists a five-step process for finding summary routes. As much as you can, complete the step list.

    Step 1

    Step 2

    Step 3

    Step 4

    Step 5

    Chapter 6

    Table 5-5 Autosummarization Support and Defaults

    Routing Protocol Classless?

    Supports Autosummarization?

    Defaults to Use Autosummarization?1

    Can Disable Autosummarization?

    RIP-1

    RIP-2

    EIGRP

    OSPF

    Table 6-3 Standard and Extended IP Access Lists: Matching

    Type of Access List What Can Be Matched

    Both standard and extended ACLs

    Only extended ACLs

  • Chapter 7 10

    Chapter 7

    Table 6-5 Popular Applications and Their Well-Known Port Numbers

    Port Number(s) Protocol ApplicationApplication Name Keyword in access-list Command Syntax

    20

    21

    22

    23

    25

    53

    67, 68

    69

    80

    110

    161

    443

    16,384–32,767

    Table 6-7 Operators Used When Matching Port Numbers

    Operator in the access-list Command Meaning

    eq

    neq

    lt

    gt

    range

    Table 7-1 ICMP Message Types

    Message Description

    Destination Unreachable

    Time Exceeded

    Redirect

    Echo Request, Echo Reply

  • 11 Appendix J: Memory Tables

    Table 7-2 ICMP Unreachable Codes

    Unreachable Code When It Is Used What Typically Sends It

    Network unreachable

    Host unreachable

    Can’t fragment

    Protocol unreachable

    Port unreachable

    Table 7-3 Codes That the ping Command Receives in Response to Its ICMP Echo Request

    ping Command Code Description

    !

    .

    U

    N

    M

    ?

  • Chapter 8 12

    Chapter 8Table 8-2 IP IGP Metrics

    IGP Metric Description

    RIP-1, RIP-2

    OSPF

    EIGRP

    Table 8-3 Interior IP Routing Protocols Compared

    Feature RIP-1 RIP-2 EIGRP OSPF IS-IS

    Classless No Yes

    Supports VLSM No Yes

    Sends mask in update No Yes

    Distance vector Yes No

    Link-state No Yes

    Supports autosummarization No Yes Yes No No

    Supports manual summarization No Yes Yes Yes Yes

    Proprietary No No

    Routing updates are sent to a multicast IP address No —

    Supports authentication No Yes

    Convergence Slow Fast

  • 13 Appendix J: Memory Tables

    Table 8-4 Comparing Features of IGPs: RIP-2, EIGRP, and OSPF

    Features RIP-2 OSPF EIGRP

    Metric

    Sends periodic updates

    Full or partial routing updates

    Where updates are sent

    Metric considered to be "infinite"

    Supports unequal-cost load balancing

    Table 8-5 Default Administrative Distances

    Route Type Administrative Distance

    Connected

    Static

    BGP (external routes)

    EIGRP (internal routes)

    IGRP

    OSPF

    IS-IS

    RIP

    EIGRP (external routes)

    BGP (internal routes)

    Unusable

  • Chapter 11 14

    Chapter 10

    Chapter 11

    Table 10-2 EIGRP Features Compared to OSPF

    Feature EIGRP OSPF

    Converges quickly

    Built-in loop prevention

    Sends partial routing updates, advertising only new or changed information

    Classless; therefore, supports manual summarization and VLSM

    Allows manual summarization at any router

    Sends routing information using IP multicast on LANs

    Uses the concept of a designated router on a LAN

    Flexible network design with no need to create areas

    Supports both equal-metric and unequal-metric load balancing

    Robust metric based on bandwidth and delay

    Can advertise IP, IPX, and AppleTalk routes

    Public standard

    Table 11-2 Neighbor Requirements for EIGRP and OSPF

    Requirement EIGRP OSPF

    Interfaces must be in an up/up state

    Interfaces must be in the same subnet

    Must pass neighbor authentication (if configured)

    Must use the same ASN/process-ID on the router configuration command

    Hello and hold/dead timers must match

    IP MTU must match

    Router IDs must be unique

    K-values must match

    Must be in the same area

  • 15 Appendix J: Memory Tables

    Chapter 12Table 12-2 PPP LCP Features

    Function LCP Feature Description

    Looped link detection Magic number

    Error detection Link Quality Monitoring (LQM)

    Multilink support Multilink PPP

    Authentication PAP and CHAP

    Table 12-4 Likely Reasons for Data-Link Problems on Serial Links

    Line Status Protocol Status Likely Reason

    Up Down (stable) on both ends

    or

    Down (stable) on one end, flapping between up and down on the other

    Up Down on one end, up on the other

    Up Down (stable) on both ends

    Table 12-5 Summary of Symptoms for Mismatched Subnets on Serial Links

    Symptoms When IP Addresses on a Serial Link Are in Different Subnets HDLC PPP

    Does a ping of the other router’s serial IP address work?

    Can routing protocols exchange routes over the link?

  • Chapter 13 16

    Chapter 13Table 13-2 Frame Relay Terms and Concepts

    Term Description

    Virtual circuit (VC)

    Permanent virtual circuit (PVC)

    Switched virtual circuit (SVC)

    Data terminal equipment (DTE)

    Data communications equipment (DCE)

    Access link

    Access rate (AR)

    Committed Information Rate (CIR)

    Data-link connection identifier (DLCI)

    Nonbroadcast multiaccess (NBMA)

    Local Management Interface (LMI)

    Table 13-4 Frame Relay LMI Types

    Name Document IOS LMI-Type Parameter

    Cisco Proprietary

    ANSI T1.617 Annex D

    ITU Q.933 Annex A

  • 17 Appendix J: Memory Tables

    Chapter 14

    Chapter 15

    Chapter 17

    Table 14-4 PVC Status Values

    Status Active Inactive Deleted Static

    The PVC is defined to the Frame Relay network

    The router will attempt to send frames on a VC in this state

    Table 15-3 Comparing VPN Encryption Algorithms

    Encryption Algorithm Key Length (Bits) Comments

    Data Encryption Standard (DES)

    Triple DES (3DES)

    Advanced Encryption Standard (AES)

    Table 15-6 Summary of Functions Supported by ESP and AH

    Feature Supported by ESP? Supported by AH?

    Authentication

    Message integrity

    Encryption

    Antireplay

    Table 17-4 Example IPv6 Prefixes and Their Meanings

    Term Assignment Example from Chapter 17

    Registry prefix

    ISP prefix

    Site prefix

    Subnet prefix

  • Chapter 17 18

    Table 17-5 Details of the RS/RA Process

    Message RS RA

    Multicast destination

    Meaning of multicast address

    Table 17-6 IPv6 Address Configuration Options

    Static or Dynamic Option Portion Configured or Learned

    Static

    Static

    Dynamic

    Dynamic

    Table 17-7 Comparison of Stateless and Stateful DHCPv6 Services

    Feature Stateful DHCP Stateless DHCP

    Remembers IPv6 address (state information) of clients that make requests

    Assigns IPv6 address to client

    Supplies useful information, like DNS server IP addresses

    Is most useful in conjunction with stateless autoconfiguration

    Table 17-9 Common Link Local Multicast Addresses

    Type of Address Purpose PrefixEasily Seen Hex Prefix(es)

    Global unicast Unicast packets sent through the public Internet

    Unique local Unicast packets inside one organization

    Link Local Packets sent in the local subnet

    Multicast (link local scope)

    Multicasts that stay on the local subnet

  • 19 Appendix J: Memory Tables

    Chapter 17 lists a configuration checklist for configuring IPv6. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter.

    Step 1

    Step 2

    Step 3

    Step 4

  • Memory TablesChapter 1Chapter 2Chapter 3Chapter 4Chapter 5Chapter 6Chapter 7Chapter 8Chapter 10Chapter 11Chapter 12Chapter 13Chapter 14Chapter 15Chapter 17