• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/321

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

321 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
Cisco 2960 Switches
2960 switches are marketed as low-cost closet switches for enterprise. They are normally access switches.
SYST LED
Implies the overall system status:

Green - the switch is powered and operational
Amber - the switch's POST process failed, and the IOS did not load
RPS LED

(Redundant Power Supply)
Indicates the status of extra (redundant) power supply
STAT LED

(Status)
If on (green), implies that each port LED implies that port's status
DUPLX LED

(Duplex)
If on (green), each port LED implies that port's duplex (on/green is full; off means half)
SPEED LED
If on (green), each port LED implies the speed of that port, as follows:

- off means 10 Mbps
- solid green means 100 Mbps
- flashing green means 1 Gbps
POST
Power On-Self Test -

Tests the hardware in the device. Loaded from ROM
Does a switch need an IP address for Telnet to work?
Yes. It has to be able to send and receive packets.
SSH
Secure Shell. Similar to Telnet, but the packets are encrypted, so it is more secure.

SSH uses public key cryptography to exchange a shard session key. SSH requires at least a password and username.
Port number for SSH
Port 23.
How many Telnet (or SSH) sessions can a switch support?
16. They are numbered VTY 0 - 15
VTY
Virtual Terminal Lines. Used for telnet or SSH sessions.
User EXEC Mode
Allows a user to look access some basic information, but not change the device's operating parameters.

Designated by a ">" at the command prompt.
Privileged EXEC mode

(Enable Mode)
Allows a user to view more advanced information, and allows the execution of more advanced commands.

Designated by a "#" at the command prompt.
Configuration mode
Configuration mode accepts configuration commands and is used to determine the operation of the device.

From configuration mode, a user can also enter interface configuration modes and control the operation of specific interfaces.

This mode is designated by "DeviceName(Config)"
RAM

(DRAM)
Random Access Memory (or dynamic Access Memory).

Used to store the active configuration and tables during device operation. Data in RAM is not maintained when the device is powered off.
ROM
Read-Only Memory. Static memory that cannot be changed without replacing the physical chips.

ROM stores the POST, Bootstrap, and Diagnostic programs.
Flash Memory
Flash Memory is re-writable ROM. It is used to store the IOS images - but can store other types of files or backups as well. Does not lose its information if the switch loses power or is reloaded.
NVRAM
Nonvolatile RAM. Sores the initial or startup configuration file that is used when the device is first powered on. Does not lose its information if the device loses power or is reloaded.
COPY Commands
The Copy command is used to replace the file in one location with one from another. The copy command always replaces the existing file when the file is copied into NVRAM or into a TFTP server.

copy {tftp | running-config | startup-config} {tftp | running-config | startup-config}

The SOURCE is the first parameter and the DESTINATION is the second parameter.
Can users telnet into a switch or router to preform initial configuration?
No. The device requires a VTY password for telnet or SSH to function.
What ctrl key will take you all the way from config mode to enable mode?
Ctrl + Z
What does a device require to allow SSH connections?
SSH requires that a username and password both be set
How are SSH user authenticated?
There are two ways SSH is authenticated. The first is to have the username and password configured on the device.

The second is to use an AAA Server (Authentication, Authorization, and Accounting)
AAA Server
Authentication, Authorization, and Accounting Server.

Used to authenticated SSH Connections to devices. It is an external server.
Command for the switch to support both Telnet and SSH
transport input telnet ssh

(default omits the ssh)
Command to generate matched encryption keys

(used for SSH)
crypto key generate rsa
Once SSH has been configured on a device, a SSH session can immediately begin?

(True or False)
False. Once the SSH is configured on the device, both clients need a copy of the encryption key.
What is the command to view a generated public key?

(SSH Encryption)
show crypto key mypubkey rsa
Each SSH client needs a cipy of the this key, either by adding this key to the SSH client's configuration beforehand, or letting the switch send this public key to the client when the SSH client first connects to the switch.
What is the command to disable Telnet access?

(and only allow SSH)
transport input ssh

When the Telnet component is left out of the command, it is disabled.
What is the command to enable encryption on ALL usernames and passwords on a device?
service password-encryption

With this command, all current usernames and passwords are encrypted, along with all future ones.
This covers the console and VTY passwords.

The passwords are encrypted until the no service password-encryption command is used, at which point existing password remain encrypted, but future passwords will be in clear text
MD5

(Message Digest 5)
MD5 is the mathematical formula the IOS uses to hide the 'enable secret' password.

MD5 is not actually encryption, rather a type of encoding. It is more secure than other types of encryption used to protect passwords on a device.
History Buffer
Stores the last commands issued. Users can cycle through the commands using the up arrow.

'show history' will show you the stored commands
Default Port Settings for Switches
Switches are shipped with ports enabled by default (no shutdown), and set for autonegotiation for ports that operate at multiple speeds. It also auto negotiations whether to go full or half duplex.
Where is a Switch's IP Address Configured
Switches have their IP addresses configured on the VLAN 1 interface.
What is the command to find an IP address when using DHCP on a switch?
'show dhcp lease'

This does not work on all switches, as some older models do not support DHCP.
What can switches do if they detect an inappropriate device attempting to send frames through the device?
When an inappropriate device attempts to send frames to the switch interface, the switch can issue informational messages, discard frames, from that device, or even discard frames from all devices by effective shutting down the interface.
What is the command to turn a switch port into an access port?
'switchport mode access'

Entered in the interface configuration. Means that the port is only able to access the VLAN, and will not be able to server as a trunking port.
What is the command to enable port security?
'switchport port-security'

This command can limit the number of MAC addresses that are allowed to access a switch.
What is the command to limit the number of MAC addresses that are allowed to access a switch port?
'switchport port-security maximum ###number###'

This tells the switch the maximum number of MAC addresses that are allowed to access the port. The default is one MAC address.

This is important so that an attacker cannot unplug a switch from the network, and gain access to the network.
What is the command to instruct the port what action to take when it receives a frame from an unauthorized MAC address?
'switchport port-security violation {protect | restrict | shutdown}'

The default action is to shutdown the port.
What is the command to specify what MAC addresses are allowed to access a port?
'switchport port-security mac-address ###'

This command can be issues multiple time to add a multiple allowed MAC addresses.
What is the command to instruct a switch to learn the MAC address of the device connected to it, and only allow that device to access the switch?
'switchport port-security mac-address sticky'

This tells the switch to learn the MAC address of currently connected devices, and use those addresses to secure access to the port. In other words, the first MAC address heard "sticks" to the configuration so the engineer does not have to know the MAC address of the device connected to the interface ahead of time.
Port security can be assigned regardless of the switchport mode assigned to the interface.

(True or false)
False. In order for switchport port-security options to be assigned, the port must be in access mode.

You must first enter the 'switchport mode access' command.
What command must be entered to allow port security to be active on a port?
'switchport port-security' is required to enable port security on an interface.
What state is a port placed in when an interface has been disabled due to port security?
When a port is disabled for security reasons, it is placed in a secure-shutdown state.

Once it is placed in secure-shutdown state, the interface must be shutdown and brought back up manually in order for the port to be accessible again.
What can the port-security configuration tell the ports to do if there is a violation?
There are three options for port security when it detects a violation:

1. The interface can be placed into a 'protect' state, where it discards the offending traffic.
2. The interface can be placed into a 'restrict' state where it discards the offending traffic, and sends log and SNMP trap message to the network management station.
3. The interface can be placed in 'shutdown' status where the first two options are implemented, but the port is also shutdown.
What does the port-security violation PROTECT do?
The 'protect' switchport port-security parameter tells the switch to discard offending traffic when a switch receives frames for a disallowed device.
What does the port-security violation RESTRICT do?
The 'restrict switchport port-security parameter tells the switch to discard the offending traffic when a switch receives a frame from an unauthorized source. In addition, it generates log files, and sends a SNMP trap message to the network management station.
What does the port-security violation SHUTDOWN do?
The 'shutdown' switchport port-security parameter tells the switch to shutdown when it receives inappropriate frames from non-allowed MAC addresses. It also sends a SNMP trap message to the network management station.

The shutdown state is referred to as err-disabled (error disabled). In order restore operation to the switch, the port must be shutdown, and then have the 'no shutdown' command issued.
What is the default VLAN assignment for switchports?
By default, all switchports are assigned to VLAN 1. VLAN 1 cannot be disabled.
What is the command to enter configuration range for multiple interfaces at once?
'interface range ###'

For example 'interface range f0/1 - 15' would enter a configuration mode that would simultaneously issue commands for interfaces F0/1 through F0/15.
What does the 'login' command do in the console or vty configuration modes?
It means that a user will be prompted to enter a password when they enter the console or vty.
What does the 'password' command do?
The 'password' command configures a password a user must enter to gain access to the console or vty. These passwords are stored as plain text by default, although there are options for them to be encrypted.

In order for the password prompt to execute, you must also issue the 'login' command.
What does the 'login local' command do?
It is used in console and vty configuration mode. It tells the IOS to prompt for a username and password, to be checked against locally configured 'username' global configuration commands on this switch or router.
What does the 'username ### password ###' command do?
It is a global command, that defines one of possibly multiple usernames and associated passwords, used for user authentication. Used when the 'login local' line configuration command has been used.
What does the protocol status in the interface status mean?

(example 'F0/0 is up *line protocol is up* ')
The protocol status is the second status code in the interface output. It generally refers to the Layer 2 status.

It is always down if the line status is down. If the line status is up, a protocol status of down usually is caused by mismatched data link layer configuration.
What does the line status mean in the interface status output?

(example 'F0/0 *is up*, line protocol is up')
The line status is the first status code in the interface information output. It refers to the Layer 1 status.

For example, if a cable is hooked up and the device is powered on.
What does 'Administratively down, down' mean in the interface status?
The interface has a 'shutdown' command configured on it.
What does 'down, down' mean in the interface status?
The interface has a 'no shutdown' command configured, but the physical layer has a problem.

For example, no cable has been attached to the interface, or with Ethernet, the switch interface on the other end of the cable is shut down, or the switch is powered off.
What does 'up, down' mean in the interface status?
Almost always refers to data link layer problems, most often configuration problems.

For example, serial links have this combination when one router was configured to use PPP, and the other defaults to use HDLC.
What does the 'up, up' interface status output mean?
That the interface is functioning properly.
Clocking
Clocking is the process by which routers physically slave themselves to the speed dictated by the CSU/DSU.

The CSU/DSU knows the speed, and sends the clock pulses over the cable to the router, and the router reacts to the clocking signal. In effect, the CSU/DSU tells the router when to send the next bit over the cable, and when to receive the next bit, with the touter just blindly reacting to the CSU/DSU for the timing.
When should the 'clock rate' command be used?
The clock rate command is used in lab or experimental setting. The serial connections are normally between two routers, with one of the acting as the CSU/DSU. These "back to back WAN connections" need one of the devices to supply the clock rate.

This is rarely used in production settings.
Clock rate ##speed##
The 'clock rate ##speed## ' command is used to set the rate (in bits per second) on the the router that is functioning as the DCE device.

If the device does not have a DCE cable connected to it, and you issue the clock rate command, the IOS will reject the command. There is no error message, it just ignores the input.
'Show Controllers' command
The 'show controllers' command list many lines of information per interface, or for one interface, for the hardware controller of the interface. On serial interfaces, this command identifies the cable as either a DCE or DTE cable.
What does the 'bandwidth ##speed## ' command do?
The 'bandwidth ##speed## ' command tells the IOS the speed of the link, in kilobits per second, regardless of whether the router is supplying clocking.

However, this command does no change the actual speed. Instead, the router uses it documentation, and in calculations related to routing, such as EIGRP or OSPF.
The bandwidth command must be set on each interface so that the router knows the interface's speed.

(True or false)
False. The 'bandwidth' command has nothing to do with the actual speed of the interface. It tells the router instead what to think the speed of the interface is (for use in routing protocols).

If no 'bandwidth' command is set, then the router will use a default value.
What is the purpose of the Router's Auxiliary (AUX) Port?
The AUX port is used for remote configuration, usually with a modem.
ROM Monitor

(ROMMON)
ROMMON is a diagnostic mode. It loads from ROM and is designed for disaster recovery when the IOS cannot be located.
Configuration Register
The configuration register is a special 16-bit number that can be set on any Cisco router. The configuration register's bits control different settings for some low level operating characteristics of the router.
What does the 'config-register' global configuration command do?
The config-register global config command is used to set the configuration register value, which tells the router which IOS image to load. This command automatically saves the command, you do not need to save the running-config into the startup-config.

The command is entered in hex, so a sample command would be 'config-register 0x2100'.
What is the default configuration register setting on most Cisco routers?
The default configuration register setting is hexadecimal 2102.

In hex, 0x2102.
What is the configuration register setting for ROMMON OS?
The configuration register value for ROMMON is 2100.

In hex, 0x2100.
What is the command to view a router's routing table?
The command to view the routing table is 'show ip route'
What does "C" stand for in the 'show ip route' output?
The "C" stands for "Connected." This means a network is directly connected to the router.
What does the 'terminal ip netmask-format decimal' EXEC command do?
The 'terminal ip netmask-format decimal' EXEC command changes the format of the format of the subnet masks displayed in 'show' commands.
How does a router issue a 'ping' command?
The router pings a destination by sending five "ICMP echo request" packets.

When the destination receives the packet, if it is able to respond, it will do so with a "ICMP echo reply."
ICMP echo request
The type of packet sent to a destination with the 'ping' command
ICMP echo reply
The type of packet returned from the destination of a ping back to the source
What does "....." mean when pinging a destination?
"....." means that the destination was not reachable. A " . " means failure of a ping. The attempt is considered a failure if a response is not received in 2 seconds.
What does "!!!!!" mean when pinging a destination?
"!!!!!" means that the ping was successful in communicating with the destination. " ! " means a ping is successful.
What does "S" mean in the show ip route output?
"S" means that a route is statically configured.
Once a route is statically given, it is automatically added to the routing table?

(True or False)
False. For the route to be added to the routing table, the outgoing interface implied by the next-hop route IP address must be in an "up and up" state.
What is the command to add a static route?
To add a static route, you need to be in the configure terminal mode. The command is 'ip route ##destination network## ##subnet mask## ##next hop address or exit interface## '
When configuring a static route, you can specify an exit interface instead of a next hop address.

(True or False)
True. You can configure all traffic for a specific network to leave via a designated interface instead of a next-hop address.
What is the purpose of the extended 'ping' command?
The extended 'ping' command allows the route to more closely resemble a 'ping' issued by end users on other machines. With the extended ping, you can change the apparent source IP address used for the ICMP echo request sent by the command.

In a real network, when a ping from a router works, but a ping from a host does not, the extended ping could help you re-create the problem without needing to work with the end user on the phone.

The extended ping source source address can only be an interface on the router.
What is a default route?
The default route is a route that matches all networks. It is used when there is no clear path to a network, and is known as the "route of last resort."

The default route typically has an address of 0.0.0.0 0.0.0.0 so it matches all networks.

The default route is identified in the routing table with an * .
What is RIP?
RIP is a distance vector protocol that measures various routes in the metric of hope counts. RIP continually sends out routing updates every 30 seconds by default.

Each router receives updates on the paths through the network, and selects the best one based on the distance in hops to each destination.
Interior Gateway Protocol (IGP)
An Interior Gateway Protocol (IGP) is a routing protocol that was designed and intended for use inside a single autonomous system.
Exterior Gateway Protocol (EGP)
An Exterior Gateway Protocol (EGP) is a routing protocol that was designed and intended for use between different autonomous systems.
Autonomous System
An Autonomous System is an internetwork under the administrative control of a single organization.
Border Gateway Protocol (BGP)
A Border Gateway Protocol (BGP) is used to exchange routers between routers in different autonomous systems, and is the only EGP widely used today.
Autonomous System Number (ASN)
An Autonomous System Number (ASN) is the number assigned to each autonomous system. It is assigned by ICANN.

Each organization needs a unique ASN so BGPs can ensure that packets do not loop around the global internet by making sure that packets do not pass through the same autonomous system twice.
Metrics
Routing protocols must have some way to decide which route is best when a router learns of multiple routes to reach a subnet. The metric give numeric value to each route. The lower the metric, the better the route.
Routers preform best by having the largest number of routes in a routing table, so they can pick the best one.

(True or False)
False. Router preform best with smaller routing tables. Only the best routes are added to a table.
Why is Route Summarization important?
Route Summarization helps to shorten the routing table while retaining all the needed routes in the network.
Why is Manual Summarization generally better than autosummarization?
Manual Summarization give the network engineer a great deal of control and flexibility, allowing the engineer to choose what summary routes to advertise, instead of just being able to summarize with a classful network.
Classful Routing Protocols
Classful Routing Protocols must consider class rules. They do not support VLSM or Manual Route summarization.

They do not send subnet masks in their routing updates.
Classless Routing Protocols
Classless Routing Protocols do not need to consider class rules. They do support VLSM, and manual route summarization. They send subnet mask information in their routing updates.
Convergence
Convergence refers to the overall process that occurs with routing protocols when something changes in a network topology. Convergence is used by routing protocols to recognize the changes, to figure out the new best routes to each subnet, and to change all the router's routing tables.
RIP-1 is a classless protocol?

(True or False)
False. RIP-1 is a classful protocol.
RIP-1 supports VLSM?

(True or False)
False. RIP-1 is a classful protocol that does not support VLSM.
RIP-1 sends its mask in update?

(True or False)
False. RIP-1 is a classful protocol, so the mask is unneeded.
RIP-1 is a distance vector protocol?

(True or False)
True. RIP-1 is a distance routing protocol that uses hop count as the metric.
RIP-1 is a link-state protocol?

(True or False)
False. RIP-1 is a distance vector protocol.
RIP-1 does not support autosummarization?


(True or False)
False. RIP-1 does support autosummarization.
RIP-1 supports manual summarization?

(True or False)
False. RIP-1 does not support manual route summarization.
RIP-1 is a proprietary Cisco protocol?
False. RIP-1 is not Cisco proprietary.
RIP-1 sends routing updates to a multicast IP address?

(True or False)
False. RIP-1 does not send routing updates to a multicast IP address.
RIP-1 supports authentication.

(True or False)
False. RIP-1 does not support authentication.
RIP-1 has fast convergence.

(True or False)
False. RIP-1 is slow at converging networks.
RIP-2 is a classless routing protocol.

(True or False)
True. RIP-2 is a classless routing protocol.
RIP-2 supports VLSM.

(True or False)
True. RIP-2 is a classless routing protocol, so it does support VLSM.
RIP-2 sends masks in its updates.

(True or False)
True. RIP-2 does send masks in its updates.
RIP-2 is a distance vector protocol.

(True or False)
True. RIP-2 is a distance vector protocol. It uses hop-count as the metric to decide the best routes.
RIP-2 is a link-state protocol.

(True or False)
False. RIP-2 is a distance vector protocol.
RIP-2 supports autosummarization.

(True or False)
True. RIP-2 does support autosummarization.
RIP-2 supports manual route summarization.

(True or False)
True. RIP-2 does support manual summarization.
RIP-2 is a proprietary Cisco protocol.

(True or False)
False. RIP-2 is not proprietary.
RIP-2 sends its routing updates to a multicast IP address.

(True or False)
True. RIP-2 does send its routing updates to a multicast IP address.
RIP-2 supports authentication.

(True or False)
True. RIP-2 does support authentication.
RIP-2 is a fast converging protocol.

(True or False)
False. RIP-2 converges very slowly. This is a major downside of the protocol.
EIGRP is a classless protocol.

(True or False)
True. EIGRP is a classless protocol.
EIGRP supports VLSM.

(True or False)
True. EIGRP does support VLSM.
EIGRP sends its mask in its updates.

(True or False)
True. EIGRP does send its mask in updates.
EIGRP is a distance vector protocol.

(True or False)
False. (Sort of). EIGRP is a hybrid protocol, that does consider distance, but not as its sole consideration.

EIGRP also has link-state characteristics. EIGRP is often referred to as an Advanced Distance Vector protocol.
EIGRP is a Link-State routing protocol.

(True or False)
False. (Sort of). EIGRP is a hybrid protocol, that does have some link state elements, but also elements of a distance vector protocol.

EIGRP is often referred to as an Advanced Distance Vector protocol.
EIGRP supports autosummarization.

(True or False)
True. EIGRP does support autosummarization.
EIGRP supports manual summarization.

(True or False)
True. EIGRP does support manual route summarization.
EIGRP is a Cisco proprietary protocol.

(True or False)
True. EIGRP is a Cisco proprietary protocol.
EIGRP sends routing updates to a multicast IP address.

(True or False)
True. EIGRP does send its routing updates to a multicast IP address.
EIGRP supports authentication.

(True or False)
True. EIGRP does support authentication.
EIGRP is a very slow converging protocol.

(True or False)
False. EIGRP is a very fast converging protocol.
OSPF is a classless routing protocol.

(True or False)
True. OSPF is a classless routing protocol.
OSPF supports VLSM.

(True or False)
True. As a classless protocol, OSPF does support VLSM.
OSPF sends mask in updates.

(True or False)
True. As a classless protocol, OSPF does send masks in their updates.
OSPF is a distance vector protocol.

(True or False)
False. OSPF is a link-state protocol.
OSPF is a link-state protocol.

(True or False)
True. OSPF is a link-state protocol.
OSPF supports autosummarization.

(True or False)
False. OSPF does not support autosummarization.
OSPF supports manual summarization.

(True or False)
True. OSPF does support manual summarization.
OSPF is a Cisco proprietary protocol.

(True or False)
False. OSPF is not proprietary.
OSPF sends routing updates to a multicast IP address.

(True or False)
True. OSPF does send its updates to a multicast IP address.
OSPF does support authentication.

(True or False)
True. OSPF does support authentication.
OSPF is a fast converging protocol.

(True or False)
True. OSPF is a fast converging protocol.
IS-IS is a classless protocol.

(True or False)
True. IS-IS is a classless routing protocol.
IS-IS supports VLSM.

(True or False)
True. IS-IS does support VLSM.
IS-IS sends mask in update.

(True or False)
True. IS-IS does send its mask in update.
IS-IS is a distance vector protocol.

(True or False)
False. IS-IS is a link-state protocol.
IS-IS is a link-state protocol.

(True or False)
True. IS-IS is a link-state protocol.
IS-IS supports autosummarization.

(True or False)
False. IS-IS does not support autosummarization.
IS-IS supports manual summarization.

(True or False)
True. IS-IS does support manual summarization.
IS-IS is a proprietary Cisco protocol.

(True or False)
False. IS-IS is not a proprietary protocol.
IS-IS sends updates to a multicast IP address.

(True or False)
Not Applicable to IS-IS.
IS-IS supports authentication.

(True or False)
True. IS-IS does support authentication.
IS-IS is a fast converging protocol.

(True or False)
True. IS-IS is a fast converging protocol.
RIP sends multicast routing updates to which reserved IP multicast IP address?
RIP sends multicast routing updates to multicast IP address 224.0.0.9.
What is the terminal configuration command to enter RIP configuration mode?
'R(config)# router rip' will enter router configuration for RIP.
What is the command for a router to use the RIP-2 protocol?
In router rip configuration, use the 'version 2' command.

R(config)#router rip
R(config-router)# version 2
RIP can be configured on only some of the interfaces assigned to a single network.

(True or False)
False. There is no way to configure RIP to only work on some interfaces within the same network.

It is however possible to set an interface to be passive so that it stops the sending out RIP updates on the interface.
What is the command to stop an interface from sending out RIP updates?
'passive-interface ## ' will set the interface into passive mode, which will stop it from sending out any RIP updates.
RIP will only store routes for a classful network.

(True or False)
True. RIP will accept commands for other networks, but will actually store the routes for the single classful network.

Example: the command 'network 10.1.2.3' would be accepted by the router, but the network 10.0.0.0 would actually be stored.
What is the command to tell RIP which networks to advertise?
'R(config-router)# network 10.0.0.0'
What is the command to view the RIP routes in the routing table?
'show ip route rip'
What is the command to view the router's IP protocols?
'show ip protocols'
What is the administrative distance?
When a router has more than one possible route to a destination, it use the administrative distance to judge how "good" a route is.

The better the route is, the lower its AD. The routes with the lowest AD are the ones that are added to the routing table.
What is the administrative distance for connected routes?
Connected routes have an administrative distance on 0
What is the administrative distance for static routes?
Static routes have an administrative distance of 1.
What is the administrative distance for EIGRP.
EIGRP has an administrative distances of 90.
What is the administrative distance for IGRP?
IGRP has an administrative distance of 100
What is the administrative distance for OSPF?
OSPF has an administrative distance of 110.
What is the administrative distance for IS-IS?
IS-IS has an administrative distance of 115.
What is the administrative distance for RIP?
RIP has an administrative distance of 120.
Backup Static Route
A backup static route is a defined route, but is intended to be a backup route. However, as a static route, its administrative distance would be lower than all routing protocol routes.

In these situations, you can configure the AD to be higher than the routes from the routing protocols, so that they will be a backup, and only be used in the routes from the protocols go down.
What is the command to have the router generate timestamps?
'service timestamps' global configuration
What happens when an IP destination matches more than one route in a routing table?
When a destination IP address matches more than one route in a routing table, the router chooses the most direct route.

It looks for the route that has the longest prefix, which it determines is the most direct route.
What is the command to view detailed information on the route a packet will travel to a specific IP address?
'show ip route ##ip address## ' will show the route a packet will take from the router to the specified IP address.

The output will shot how the route was learned, the distance, and metric. It will show when the route was last broadcast, and interface on which the packet will leave.
What information does a host learn through DHCP?
Using DHCP a host will learn:
- the host IP address
- the associated subnet mask
- the IP address of the default gateway
- the IP address of the DNS server
What is the command to enter a sub-interface on a router to configure a router to work with VLANs?
To enter a sub-interface, you type the interface name and number, and then a decimal followed by the number of the vlan.

For example: Fa0/1.2 to configure Fa0/1 to work with VLAN 2.
Routing Protocol
A routing protocol is a set of messages, rules, and algorithms used by routers for the overall purpose of learning routes.

Each router chooses the best route to each subnet (path selection) and finally places those best routes in its IP routing table.
Routed Protocol
A routed protocol refers to a protocol that defines packet structure and logical addressing, allowing routers to forward or route the packets.

IP is an example of a routed protocol.
Routing protocol algorithms
The term routing protocol algorithms refers to the logic and processes used by different routing protocols to learn all routes, choose the best route to each subnet, and converge in reaction to changes in the internetwork.
OSPF is much easier to deploy than RIP.

(True or false)
False. OSPF requires more planning, especially in medium to large networks.
What metric does OSPF use?
OSPF uses Cost as its metric, which is the sum of all interface cost settings for all links in a route, with the cost defaulting to be based on interface bandwidth.
How does EIGRP find a metric?
The EIGRP metric is a calculated based on the route's slowest link and the cumulative delay associated with each interface in the route.
You can change the speed of an interface by using the 'bandwidth' command.

(True or false)
False. The bandwidth command does not change the actual physical speed of the interface. It just tells the IOS what speed to assume the interface is using.
How often does RIP-2 send periodic updates (by default)?
RIP-2 sends out its periodic updates every 30 seconds by default.
RIP-2 sends out full routing updates.

(True or false)
True. RIP-2 sends out full updates.
OSPF sends out periodic updates.

(True or false)
False. OSPF does not send out periodic updates.
EIGRP sends out periodic updates.

(True or false)
False. EIGRP does not send out periodic updates.
Which routing protocol supports unequal-cost load balancing?
EIGRP supports unequal-cost load balancing.
What is the administrative distance for BGP (external routes)?
The administrative distance for BGP (for external routes) is 20.
Through its periodic updates, RIP learns everything about the networks it communicates with.

(True or false)
False. A RIP only knows the measure of distance (the metric), and the next-hop router and outgoing interface to use for that route (a vector, or direction).
Routing Loops
Routing Loops occur when the routers forward packets such that the same single packet ends up back at the same routers repeatedly, wasting bandwidth and never delivering the packet.
Route Poisoning
When a route fails, distance vector routing protocols risk causing routing loops until every router in the internetwork believes and knows that the original route has failed.

Route poisoning refers to the practice of advertising a route, but with a special metric value called infinity. Simply put, routers consider routes advertised with an infinite metric to have failed.
What does it mean when a route has a value of infinity?
When a route has a value of infinity, it means that the route has failed.

Each protocol has a different value for infinity.
What value does RIP use for infinity, to signal that a route is down?
RIP uses the value 16 as infinity to signal that a route is down.
Counting to Infinity Process with RIP
Distance vector protocols experience a problem called counting to infinity. This happens when a route fails, and is marked as a bad route, but the routers keep advertising routes back to each other, and they keep being updated.

Eventually, they will all get the bad route as marked as infinite, but it can take several minutes. During that time, network performance can be severely degraded, and users might think the network went down.
Split Horizon
In routing updates sent out interface X, do not include routing information about routes that refer to interface X as the outgoing interface.

More simply, split horizon means what when router 1 learns a route from router 2, 1 has no need to advertise that same route back to the router 2.
How do RIP protocols attack the counting to infinity problem?
Distance vector protocols attack the counting to infinity problem by ensuring that every router learns that the route has failed, through every means possible, as quickly as possible. It does this by using triggered updates, and poison reverse.
Triggered update
When a route fails, distance vectors do not wait for the next periodic update, instead they send an immediate triggered update listing the poisoned route.
Poison reverse
With distance vectors, when learning of a failed route, they suspend split horizon rules for that route and advertise a poisoned route.
Holddown Process
Holddown prevent the looping and counting to infinity problem in distance vectors. The holddown process tells a router to ignore new information about the failed route for a time period called the holddown time, as counted using the holddown timer.

After hearing a poisoned route, it starts a holddown timer for that one route. Until the timer expires, it does not believe any other routing information about the failed route, because believing that information may cause a routing look.

However, information learned from the neighbor that originally advertised the working rotue can be believed before the holddown timer expires.
What does OSPF stand for?
OSPF stands for Open Shortest Path First.
What is the LSDB?
LSDB stands for Link State Database. This is stored in RAM, and contains information about every device in the internetwork.

The LSDB contains information about not only the up and working routes and interfaces and links, but all routers and interfaces and links, even if the interfaces are down.
What is a LSA?
LSA stands for Link State Advertisements. Routers send out updates containing information about the routers and the links (subnets) attached to the routers.
Router LSA
The Router LSA includes a number to identify the router (router ID), the router's interface IP addresses and masks, the state (up or down) of each interface, and the cost (metric) associated with the interface.
Link LSA
The Link LSA identifies each link (subnet) and the routers that are attached to that link. It also identifies the link's state (up or down).
Routers flood LSAs to every device on the network (with OSPF).

(True or false)
False. The router first asks its neighbor if already knows about the LSA. If it does, it responds, and the LSA will not be sent.
OSPF floods LSAs every 30 seconds (by default).

(True or false)
False. OSPF floods LSA every 30 minutes by default.
If the LSA changes, the router immediately floods the changed LSA.

(True or false)
True. If links go down, or LSAs otherwise change, then the router immediately floods out the new LSAs.
Dijkstra SPF (shortest path first)
Dijkstra SPF is an algorithm that defines how a router should process the LSDB, with each router considering itself to be the starting point for the route. Each router uses itself as the starting point because each router needs to put routes in its own routing table.

The SPF algorithm calculates all the possible routes to reach a subnet, and the cumulative metric for each entire route, for each possible destination subnet. In short, each router must view itself as the starting point, and each subnet as the destination, and use the SPF algorithm to look at the LSDB road map to find and pick the best route to each subnet.
How does SPF find the best route in OSPF?
The SPF algorithm adds the cost associated with each link between itself and the destination subnet over each possible route.

The costs used by the algorithm can be calculated, or entered manually on each router.
What happens in OSPF when a link goes down?
When a link goes down in OSPF, LSAs are immediately flooded out that reflect the current state of the internetwork. New routes are calculated based on the new information, and replace the down routes with new ones.
Link-State Protocols consume much less CPU and RAM than Distance Vector protocols.

(True or false)
False. Link-state protocols use more processing power, but with proper planning this disadvantage can be reduced.
OSPF Neighbor
An OSPF neighbor is a router that connects to the same date link with which the first router can and should exchange routing information using OSPF.
What is the command to view OSPF neighbors?
'show ip ospf neighbor' will show the neighbor table
What is the command to see the OSPF LSDB?
'show ip ospf database' will display the LSDB
OSPF Hello Process
The OSPF Hello process defines how neighbors can be dynamically discovered, which means that new routers can be added to a network without requiring every router to be reconfigured.

To discover other OSPF speaking routers, a router sends multicast OSPF Hello packets to each interface and hopes to receive OSPF hello packets from other routers connected to those interfaces.
What information is in the OSPF Hello message?
OSPF Hello messages list each router's Router ID (RID), which serves as each router's unique name or identifier for OSPF.

The Hello message includes the sending router's RID, Area ID, Hello interval, dead interval, router priority, the RID of the designated router, the RID of the backup designated router, and a list of neighbors that the sending router already knows about on the subnet,

The Hello message follows the IP packet header, with IP packet protocol type 89.
OSPF Router ID (RID)
OSPF needs to uniquely identify each router, so OSPF uses a concept called the OSPF router ID (RID).

RIDs are 32-bit numbers written in dotted decimal, so using an IP address is a convenient way to find a default RID. Or the RID can be directly configured.
What multicast IP address is used for OSPF broadcasts?
224.0.0.5 is the multicast ip address intended for all OSPF speaking routers.
How does OSPF know two way communication has been established with a neighbor?
During the Hello process, routers exchange information about the neighbors each router already knows about. Once a router sees its own RID in a received Hello, the router believes that two way communication has been established with that neighbor.

Once a two-way state has been established, more detailed information, such as LSAs ca be exchanged.
What can stop routers on the same subnet from becoming neighbors in OSPF?
Routers on the same subnet must agree about several of the parameters exchanged in the Hello; otherwise, the routers simply do not become neighbors.

These parameters include:
-subnet mask used on the subnet
-subnet number (as derived using the subnet mask and each router's interface IP address)
-Hello interval
-Dead interval
-OSPF area ID
-Must pass authentication checks (if used)
-Value of the stub area flag

If any one of these parameters differs, the routers do not become neighbors.
OSPF Hello interval
OSPF routers send Hello messages every Hello Interval. This lets its neighbors know that the router is still up. If the router fails to issue a Hello message within a set amount of time (Dead Interval), its neighbors will assume it is down and reconverge the network.

The default Hello Interval for Ethernet is 10 seconds.
OSPF Dead Interval
The Dead Interval is the time defined so that if a router no longer hears a Hello from a neighbor, the router believes the neighbor is no longer reachable, and the router reacts and reconverges the network.

In Ethernet, the default Dead Interval is 4 times the Hello Interval (or 40 seconds).
What does OSPF Neighbor States refer to?
An OSPF neighbor state is the router's perception of how much work has been completed in the normal processes done by two neighboring routers.
OSPF Init State
OSPF Init state means that the neighbor relationship is being initialized.
What does OSPF "seen [null]" mean?
OSPF "seen [null]" means that the router has not yet seen any approved potential neighbors.
An OSPF Router only has limited information about the network, mainly limited to the next hop addresses.

(True or False)
False. An OSPF LSDB has information on the entire network. Each router exchange the contents of their LSDBs until each router has an exact copy.
All OSPF internetworks must have both a DR and BDR.

(True or False)
False. The routers must decide if they should directly exchange the topology information directly, of if they should learn it indirectly.

A DR is not required on Point to Point subnetworks.
OSPF Designated Router (DR)
OSPF can have Designated Router (DR) that is responsible to making sure all device have a copy of the network topology. To minimize traffic, the devices will elect one router to be responsible for sending the information out, so that each device does not duplicate the effort.
OSPF Backup Designated Router (BDR)
The Backup Designated Router (BDR) is the router designated as the backup in case the DR goes down. If it does, the BDR takes over as DR.
Point to Point OSPF network
OSPF Point to Point networks are between two router on a subnet.
Broadcast OSPF network
An OSPF Broadcast network is for use on data links that support broadcast frames, such as LANs.
How is the DR selected in OSPF?
When a DR is needed in OSPF, the routers on the network hold an election. The router with the highest OSPF Priority Setting becomes the DR.

If there are two devices with the same OSPF priority setting, then the device with the highest RID wins. The second highest device becomes the BDR.
In OSPF, when a new device is connected that has a higher OSPF priority setting than the current DR, it automatically becomes the new DR.

(True or False)
False. Once the DR is elected, a new device with a higher value will not supersede it.
OSPF Full Neighbor State

(Fully Adjacent)
The OSPF Full Neighbor state means that both routers know the exact same LSDB details, and are fully adjacent.
How often are LSAs reflooded in an OSPF network?

(assuming the network is fully functioning, and using default settings)
LSAs are reflooded every 30 minutes by default. The timer is based on each LSA, so there is no single moment when OSPF sends a lot of messages to reflood all LSAs. Each LSA is reflooded by the router that created it.
How does OSPF choose the least cost route between two locations?
Each router uses SPF to analyse the database and select the best route. It chooses the best route based on the cost of the interface.

Each interface has an OSPF cost associated with it. The router looks at each possible route, adds up the costs on the interfaces out which packets would be forwarded on that route, and then picks the least cost route.
OSPF works well in all networks, regardless of size.

(True or False)
False. (sort of). In large networks, engineers need to think about and plan how to use several OSPF features that allow it to scale well.

Since SPF analyses all of the paths through the network, the sheer amount of processing required to run the complex SPF algorithm might cause convergence time to be slow and the routers might experience memory shortages in larger networks.
OSPF Areas
OSPF areas break up the network so that routers in one area know less topology information about the subnets in the other area - and they do not know about the routers in the other area at all. This saves processing and memory, so that each device does not need to calculate routes to every device, making it much more efficient in large network.
OSPF Area Border Router (ABR)
The Area Border Router (ABR) is on the border between two different areas. It has interfaces connected to the backbone area and to at least one other area.
OSPF Autonomous System Border Router (ASBR)
An OSPF Autonomous System Border Router that connects to routers that do not use OSPF for the purpose of exchanging external routes into and out of the OSPF domain.
OSPF Backbone Area
The OSPF Backbone Area is a special area to which all other areas must connect - Area 0.
OSPF Backbone Router
An OSPF Backbone Router is a router in one area, the backbone area.
OSPF Internal Router
An OSPF Internal Router is in a single nonbackbone area.
OSPF External Route
An OSPF external route is a route learned from outside of the OSPF domain and then advertised into the OSPF domain.
OSPF Intra-area Route
An OSPF Intra-Area Route is a route to a subnet inside the same area as the router.
OSPF Interarea Route
An OSPF Interarea Route is a route to a subnet in an area of which the router is not a part.
OSPF Autonomous System
An OSPF Autonomous System is a reference to a set of routers that use OSPF.
What are the key advantages to using OSPF Areas?
Using OSPF areas has many advantages:
- The smaller per area LSDB requires less memory
- The router requires fewer CPU cycles to process the smaller per area LSDB with the SPF algorithm, reducing CPU overhead and improving convergence time.
- The SPF algorithm has to be run on internal routers only when an LSA inside the area changes so routers have to run SPF less often.
- Less information must be advertised between areas, reducing bandwidth required to send LSAs.
- Manual summarization can only be configured on ABRs and ASBRs, so areas allow for smaller IP routing tables by allowing for the configuration of manual route summarization.
What is the command to enter the OSPF configuration mode?
The command to enter OSPF configuration mode is 'router ospf ##process id## '
What is the command to configure the OSPF Router ID?
The command to configure the OSPF Router ID is 'router-id ##id value## '
What is the command to configure a network in OSPF?
In the OSPF Router Configuration, the command to add a network is 'network ##ip address## ##wildcard-mask## area ##area id## '
What is the OSPF command to change the Hello or Dead intervals?
In OSPF, the command to change the Hello Interval is 'ip ospf hello-interval ##time## '.

The command to change the Dead Interval is 'ip ospf dead-interval ##time## '.
What is the OSPF Wildcard Mask?
The wildcard mask in the OSPF network command works like an ACL wildcard mask, but with the restriction that it must have only one string of consecutive binary 1s and 0s.

For example: 0.0.255.255
What does an "O" mean for an OSPF route in the 'show ip route' output?
With OSPF routes, an "O" next to the route means that it is intra-area.
What does an "IA" mean for an OSPF route in the 'show ip route' output?
With OSPF routes, an "IA" next to the route means it is an interarea (IA) route.
What is an OSPF loopback interface?
An OSPF loopback interface is a virtual interface that can be configured with the 'interface loopback ##interface-number## ' command.

Loopback interfaces do not rely on any hardware, these interfaces can be up/up whenever IOS is running, making them good interfaces on which to base an OSPF RID.
How is an OSPF Router ID (RID) chosen?
In choosing a RID, OSPF first looks to see if a RID has been configured. If so, then that is used.

Next, the router looks to see if a lookback address has been configured. If so, then the highest value is assigned as the RID.

Finally, a router will use the highest numeric IP address from all interfaces whose interface status code (first status code) is up.

The RID is selected by the router during initialized, which happens during the initial load of the IOS.
OSPF Null Authentication
OSPF Null Authentication means there is no authentication.

The command is 'ip ospf authentication null'.
OSPF Authentication

(Clear Text)
OSPF has basic authentication, which uses a simple text password.

The command for this is 'ip ospf authentication'.

The password is set with 'ip ospf authentication-key ##password## '.
OSPF MD5 Authentication
This OSPF Authentication protects the password with MD5, which is the preferred option.

The command is 'ip ospf authentication message-digest'.

The command to set the password is 'ip ospf message-digest-key ##key number## md5 ##key value## '.
What happens in OSPF when authentication is enabled?
In OSPF, when authentication is enabled, each router must pass the authentication process for every OSPF message with every neighboring router on that interface.
OSPF Load Balancing
When the metric is a tie, the router can put up to 16 different equal-cost routes in the routing table (the default is four different routes) based on the setting of the 'maximum- paths ##number## ' subcommand.

A router could load-balance the packets on a per-packet basic. Alternatively, the load balancing could be on a per-destination IP address basis.
Which commands display information about the Cisco IOS software version currently running?
- 'show running-config'
- 'show version'
- 'show flash'
How many simultaneous Telnet sessions does a Cisco router support by default?
5

A router supports five simultaneous Telnet sessions by default.
What is the command to replace an IOS Image?
'copy tftp flash'

This will copy an IOS image from a TFTP server into the device's flash
What is the command to backup the current IOS image?
'copy flash tftp'

This will copy the image from Flash, and back it up on a TFTP server
What is the syntax of a 'copy' command?
'copy ##source## ##destination## '
At the global configuration prompt, the administrator has just entered the following command on a router that has not been previously configured for RIP:

'RouterA(config)# router rip'

What state is the router now in after executing the command?
The router has entered router configuration mode but the RIP process has not started.
What is the command to set the default gateway on a Cisco switch?
'Switch(config)# ip default-gateway ##address## '
While working in setup mode, a configuration line is typed incorrectly? What can be done to exit setup mode, without executing or saving any of the mistakes you made?
Ctrl-C will exit setup mode without executing or saving any mistakes.
What does the command

'transport input ssh' do?
It configures a network device to use the SSH protocol on incoming communications.
With the use of different ports, some type of NAT maps multiple private IP addresses to a single registered IP address. Which form is it?
overloading
What is the command used on 2500 routers in the password recovery procedure to bypass the configuration in NVRAM, and boot from Flash?
o/r0x2142
If a host is forwarding a packet to a host on a different network for the first time, which destination MAC Address will be used in the ARP request.
ff-ff-ff-ff-ff-ff
What is the default encapsultion for serial interfaces on Cisco routers?
HDLC is the default configuration for serial devices on Cisco routers.
What technology would you use when a router connected to a LAN has only one WAN interface, but multiple virtual circuits are needed?
Frame Relay
What does RIP-2 use to prevent loops?
Split Horizon and Hold-down Timers
A router and a switch are connected, and a technician is working on a computer that is connected to the management console of the switch.

In order to configure the default gateway for the switch, the technicain needs to learn the IP address of the attached router interface.

Which IOS command will provide this information in the absence of Layer 3 connectivity?
'show cdp neighbors detail'
The protocol that provides the information displayed by the 'show cdp neighbors' command operates at which layer of the OSI model?
Data Link
What is the command to disable CDP on a single interface?
'no cdp enable'

From the interface configuration
What is the command to disable CDP on a device?
'no cdp run'

From the global configuration
What does "inside host" refer to with NAT?
Inside host refers to a host in the enterprise network.
What does "inside local" refer to with NAT?
Inside Local refers to an IP address in an IP header with that address representing a local host as the packet passes over the local enterprise network.
What does "inside global" refer to with NAT?
Inside Global refers to an IP address in an IP header, with that address representing a local host as the packet passes over the global internet.
What does "inside interface" refer to with NAT?
Inside Interface is the rotuer interface connected to the same LAN as the inside hosts.
What does "outside interface" refer to with NAT?
Outside Interface is the router interface connected to the internet.
What is PAT?
Port Address Translation.

PAT allows the local hosts to use private IP addresses while the access router uses a single public IP address. PAT take advantage fo the facet that server really does not care if it has one connection each to three different hosts or three connections to a single host IP address.

PAT translates the local hosts' private IP addresses to the one registered public IP address. The router keeps track of both the IP address and TCP or UDP port number.
What must be modified on a router do perform password recovery?
Configuration Register

and

NVRAM
When migrating from RIP-1 to RIP-2, what are the differences?
RIP-2 supports Authentication

RIP-2 is a classless protocol

RIP-2 also has the same maximum hop count
Which two fields in the interface output are useful for detecting Broadcast Storms?
'no buffer'

'ignored'
PPP is recommended for serial links between routers from different vendors?

(true or false)
True.

Cisco HDLC has a proprietary 'type' field.
Why is there a problem with serial links using HDLC with routers from different vendors?
Cisco HDLC has a proprietary 'Type' field.
In the 'show ip interface s0/0' command output, "Serial0/0 is up, line protocol is up" is displayed.

What does "line protocol is up" mean?
"line protocol is up" means that keepalives are being received on the interface.
What are three types of Flow Control?
- Windowing
- Buffering
- Congestion Avoidance
The 'setup' command from the privileged mode prompt will cause the device to enter setup mode?

(true or false)
True
If the DHCP settings have been changed on a DHCP server, and a host is no longer able to connect to a network, what should be done to correct the situation?
On the host, use the command 'ip config /release' and then 'renew' in the command prompt.
What command would you issue to end a VTY line session?
'exit'
What effect does it have on network performance when a switch stores an entire frame before forwarding it?
Filters all frame errors
Which signalling standard is in charge of maintaining the connection and maintaining status between the router and the local frame relay switch?
LMI
Which form of NAT uses different ports to map multiple private IP addresses to a single registered IP address?
Overloading
Flow control provides a means for a receiver to govern the amount of data sent by the sender.

(true or false)
True.
What is PAP?
PAP is the Password Authentication Protocol, and is used to authenticate WAN Serial links using PPP.
What type of port would you connect a cable with a DB-60 connector to?
Serial
What command would you issue to find out the type of cable attached to a S0/0 port on a router?
'show controllers s0/0'
A frame relay subinterface resolves NBMA split horizon issues.

(true or false)
True.
A frame relay subinterface maps one IP subnet per DLCI.

(true or false)
True.
In the show IP route output:

R 10.1.2.0 [120/1] via 10.1.128.252, 00:00:09, Serial0/0/1

What does "00:00:09" mean?
"00:00:09" is when the route was last seen with a RIP update.
A connection between a wireless access point (Ethernet Point) and a switch would need a crossover cable.

(True or false)
False. It would use a straight-through.
Switch VLAN Interfaces default to a 'shutdown' state.

(True or False)
True. VLAN Interfaces are set to 'shutdown' by default, so require a 'no shutdown' command.
What is the name of the Frame Relay field used to identify Frame Relay Virtual Circuits?
Data-link connection identifiers
Where is a DSLAM used, and for what purpose?
A DSLAM is used inside a Telco's CO to separate voice traffic from data traffic
What is the IEEE standard for the Media Access Control (MAC) sub-layer of Ethernet?
802.3
What is the IEEE standard for the Logical Link Control (LLC) sub-layer of Ethernet?
802.2
What is DLCI?
Data link connection identifier

It is used in Frame relay, and the WAN switch forwards the frame based on the DLCI, sending the frame the providers network until it gets to the remote-site router on the other side of the Frame Relay cloud.
What is 'store and forward' processing mean?
The switch waits to receive the entire frame before transmitting. Greatly reduces errors.
What is 'cut-through processing?
The switch sends the frame as it receives it, which reduces delay.
What is 'fragment-free' processing mean in switching?
The switch waits until it receives at least 64 bytes of data before transmitting. 64 bytes is the minimum it takes to ensure no collision occurred.