• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back

Location of the Cisco IOS




IOS stored in Flash



IOS copied from flash to volatile RAM - where it runs during normal operation

Access Methods (Telnet, SSH & Console)




Allows configuration commands to be entered (Console)



Content is sent in clear text (Telnet)



Use to keep user ID, passwords & session content encrypted (SSH)

Purpose of Converging Networks



The purpose of a converged network infrastructure:



reduces the cost of deploying and maintaining the communication infrastructure

Hot Keys and Shortcuts



Ctrl-z : Exits config mode & returns to privileged EXEC


Ctrl-shift-6 : Allows the user to interrupt an IOS process such as ping or trace route


Ctrl-c : Aborts the current command & exits the config mode


Tab : Completes the remainder of a partially typed command or keyword

Device Names





Contain no spaces



Be less than 64 characters in length

Securing User EXEC Access




Console port must be secured



Vty lines allow access to a Cisco Device via telnet

Configuration Files




Startup config is removed using the erase startup-config command



The configuration file saved in NVRAM will be loaded when the device is restarted

Configuring a Switch



IP address - together with a subnet mask, uniquely identifies end device on internetwork



Subnet mask - determines which part of a larger network is used by an IP address



Interface Vlan1 - allows remote management of a layer 2 switch



No shutdown - administratively enables the interface

Test the Loopback Address on an End Device




Pinging the local host confirms that TCP is installed & working on the local network adapter

Protocol Data Units (PDUs)




A PDU is a general term used to describe a piece of data at any layer of a networking modes



1. Frame Header 2. Network Header 3. Transport Header 4. Data 5. Frame Trailer

Network Addresses & Data Link addresses




Network Address ( Unique host address at the Network or Internet layer )


-These addresses are also known as logical addresses



Data Link Address


-Destination data link or MAC address


-Used by NICs to decide whether to accept a frame



ARP (Address Resolution Protocol) uses a broadcast to discover the AMC or Data Link address of a host given its IP address

Intermediary devices interconnect end devices




Functions:


-Regenerate and retransmit data signals


- Apply security settings (Permit or Deny) to control the flow of data


-Notify other devices when errors occur

Providing (QoS)




The network provides the ability to prioritize traffic. It can provide predictable levels of service to different traffic types.



Time-sensitive communication -increase priority for services like telephony


High importance to organization - increase priority for production control or business financial transaction of data


Non time-sensitive communication - decrease priority for web page retrieval or email

Default Gateway



What would be the effect of a default gateway being incorrectly configured on a host?



-The computers can converse with other computers on the local network, but are unable to with computers on remote networks.

Connecting Remote Users




-DSL (Digital Subscriber Line) : Internet through phone line. Highspeed, always on, splits your access line into three signals: phone, upload data, download data



-Dialup : Internet over analog voice line, extremely slow (low bandwidth)



-Satelite : Can be used anywhere but requires clear line of sight



-Cable : High speed, always on uses a coaxial cable as a medium to bring data and TV

Physical Layer Protocols & Services




The purpose of the Physical layer is to convert a frame into a series of electrical optical or microwave signals that represents the bits in each frame

Throughput




Actual measured rate of data transfer




These factors include:


1. the amount of traffic


2. type of traffic


3. The number and type of network devices that the data is crossing

Twisted pair




Unshielded twisted pair reduces outside interference & crosstalk because of the twisting of the wires

CSMA/CA




1. Used in 802.11 wireless



2. more overhead



3. collisions exist

Auto-MDIX




A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured



1. The link between the two will work at the fastest speed supported by both sides


2.The link will work as full-duplex


3.The Auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable

Router Packet Forwarding Decision




The main purpose of routing process is to select the best path that are used to direct traffic to their final destination networks


Introducing TCP




Transmission Control Protocol (TCP)



-Reliable delivery - detection of out of order and missing packets and the retransmitting of lost or corrupt data

IPv4 Packet Header




The value in the Source & Destination field in an IPv4 header will stay the same during its transmission. The other options might change

Network Address Translation (NAT)




Technology which provides a solution to IPv4 address depletion by allowing multiple devices to share on public IP address

Router Memory




Memory | Volatile/Non-Volatile |Stores



1. RAM | Volatile | running config file, running IOS



2. ROM | Non-Volatile | Limited IOS



3. NVRAM | Non-Volatile | startup config file



4. Flash | Non-Volatile | IOS

Router Bootup Process




1.Flash


2.TFTP CISCO IOS


3.ROM



4.NVRAM


5.TFTP Server Config File


6.Console



Datagram Reassembly




UDP, no failure messages or retransmissions are required


Public and Private IPv4 Addresses




Private address blocks are :



-Hosts that do not require access to the Internet can use private addresses


-10.0.0.0 - 10.255.255.255


-172.16.0.0 - 172.31.255.255


-192.168.0.0 - 192.168.255.255

ICMPv4 and ICMPv6 Messages




The purpose of ICMP messages is to provide feedback about issues that are related to the proccessing of IP packets

Basic Security of Wireless




-Change default values (password)



-Disable SSID broadcasting



-Configure Encryption using WPA (WPA2 Prefered, Enhanced Security)

Remote Network Routing




If there are two or more possible routes to the same destination, metric is used to decide which route appears on the routing table. The lower the metric, the better the route


Basic Security of Wireless




Wired Equivalency Protocol (WEP) : Every wireless device allowed to access the network must have the same WEP entered which makes it easily compromised


Wi-Fi Protected Access (WPA) : also uses encryption keys from 64 bits up to 256 bits. New keys are generated each time a connection is established with the AP


IPv6 Router




-ipv6 unicast-routing (enables ipv6 routing)



-When the ipv6 unicast-routing command is implemented on a router, it enables the router as an IPv6 router

Assigned IPv6 Multicast Addresses



Multicast address can only be destination addresses and not source addresses



Two common IPv6 assigned multicast groups include:


-FF02::1 All-nodes multicast group


all IPv6-enabled nodes (devices) on a local-link join



-FF02::2 All-routers multicast group

Traceroute (tracert)




Routers drop traceroute packets if TTL field reaches 0

The data link layer is the only OSI layer broken into two sublayers



LLC identifies the network layer encapsulated in the frame and allows multiple layer 3 protocols to use the same interface and media

Frame Check Sequence




FCS : Support frame error detection which determines if errors occurred in transmission or reception

MAC Sublayer




Provides three primary functions:



1. Frame delimiting


2. Addressing


3. Error Detection

Layer 2 vs Layer 3 Switching




A layer 3 can use both MAC and IP addresses to make forwarding decisions!



An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2

DHCP Operation




1. The destination IP address is 255.255.255.255


2. The message comes from a client needing an IP address


3. All devices receive the message but, only a DHCP server replies

Authentication, Authorization & Accounting




Authentication - Users and administrators must prove their identity



Authorization - network security authorization controls which resources the user can access and which operations the user is allowed to perform



Accounting - measures the resources a user consumes during access



Block Unauthorized Access




login block-for 120 attempts 3 within 60



This command would help mitigate brute-force password attacks against the router.

Backup and Restore using TFTP




Configuration files can be stored on a Trivial File Transfer Protocol (TFTP) server



copy startup-config tftp : save the configuration startup-config to a tftp server

Situations for Media (Cables)




Copper Cables : Desktop PCs, Horizontal cabling structure



Fiber Optic : Long-haul networks, backbone cabling



Wireless : Guest access, waiting rooms

Router bootup process




Stage 1 : Perform the POST


Stage 2 : Load the bootstrap program


Stage 3 : Locate and load the cisco IOS


Stage 4 : Locate and load the config file

Cisco | Networking Academy