158720181xxj(cisco)

  • Uploaded by: kyawmyohlaing
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View 158720181xxj(cisco) as PDF for free.

More details

  • Words: 1,915
  • Pages: 20
APPENDIX

J

Memory Tables Chapter 1 Table 1-2

ISL and 802.1Q Compared

Function

ISL

802.1Q

Defined by Inserts another 4-byte header instead of completely encapsulating the original frame Supports normal-range (1–1005) and extended-range (1006–4094) VLANs Allows multiple spanning trees Uses a native VLAN Table 1-3

VTP Features

Function

Only sends VTP messages out ISL or 802.1Q trunks Supports CLI configuration of VLANs Can use normal-range VLANs (1–1005) Can use extended-range VLANs (1006–4095) Synchronizes (updates) its own config database when receiving VTP messages with a higher revision number Creates and sends periodic VTP updates every 5 minutes Does not process received VTP updates, but does forward received VTP updates out other trunks Places the VLAN ID, VLAN name, and VTP configuration into the running-config file Places the VLAN ID, VLAN name, and VTP configuration into the vlan.dat file in flash

Server

Client

Transparent

3

Appendix J: Memory Tables

Chapter 1 lists a configuration checklist for configuring VLANs and assigning the VLANs to interfaces. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter. Step 1 To configure a new VLAN, follow these steps: a. b. (Optional) Step 2 To configure a VLAN for each access interface, follow these steps: a. b. c. (Optional) Table 1-4

Trunking Administrative Mode Options with the switchport mode Command

Command Option

Description

access trunk dynamic desirable dynamic auto Table 1-5

Expected Trunking Operational Mode Based on the Configured Administrative Modes

Administrative Mode

Access

Dynamic Auto

Trunk

Dynamic Desirable

access dynamic auto trunk dynamic desirable Table 1-6 Device

Phone PC

Voice and Data VLAN Configuration Name of the VLAN

Configured With This Command

Chapter 2

Chapter 1 lists a configuration checklist for configuring VTP. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter. Step 1 Step 2 Step 3 (Optional) Step 4 (Optional) Step 5 (Optional) Step 6 Table 1-7

Where VTP Clients and Servers Store VLAN-Related Configuration

Configuration Commands

Where Stored

How to View

vtp domain vtp mode vtp password vtp pruning vlan vlan-id name vlan-name switchport access vlan vlan-id switchport voice vlan vlan-id

Chapter 2 Table 2-2

Three Classes of Problems Caused by Not Using STP in Redundant LANs

Problem

Description

Broadcast storms MAC table instability Multiple frame transmission Table 2-3

STP: Reasons for Forwarding or Blocking

Characterization of Port

All the root switch’s ports Each nonroot switch’s root port Each LAN’s designated port All other working ports

STP State

Description

4

5

Appendix J: Memory Tables

Table 2-4

Fields in the STP Hello BPDU

Field

Description

Root bridge ID Sender’s bridge ID Cost to reach root Timer values on the root switch Table 2-6

Default Port Costs According to IEEE

Ethernet Speed

Original IEEE Cost

Revised IEEE Cost

10 Mbps 100 Mbps 1 Gbps 10 Gbps Table 2-7

STP Timers

Timer

Description

Default Value

Hello Max Age Forward Delay Table 2-8

IEEE 802.1D Spanning-Tree States

State

Blocking Listening Learning Forwarding Disabled

Forwards Data Frames?

Learns MACs Based on Received Frames?

Transitory or Stable State?

Chapter 2

RSTP and STP Port States

Table 2-9

Operational State

STP State (802.1d)

Enabled

Blocking

Enabled

Listening

Enabled

Learning

Enabled

Forwarding

Disabled

Disabled

RSTP State (802.1w)

Forwards Data Frames in This State?

RSTP and STP Port Roles

Table 2-10 RSTP Role

STP Role

Definition

Root port Designated port Alternate port Backup port Disabled Table 2-11

Option

Comparing Three Options for Multiple Spanning Trees Supports STP

Supports RSTP

Configuration Effort

Only One Instance Required for Each Redundant Path

PVST+ PVRST MIST Table 2-12

STP Defaults and Configuration Options

Setting

Bridge ID Interface cost PortFast BPDU Guard

Default

Command(s) to Change Default

6

7

Appendix J: Memory Tables

Chapter 3 Table 3-2

LAN Switch Interface Status Codes

Line Status

Protocol Status

admin. down

down

down

down

up

down

down

down (err-disabled)

up

up

Table 3-3

Violation Mode

Typical Root Cause

10BASE-T and 100BASE-Tx Pin Pairs Used

Devices That Transmit on 1,2 and Receive on 3,6

Table 3-4

Interface Status

Devices That Transmit on 3,6 and Receive on 1,2

Port Security Behavior Based on Violation Mode

Discards Offending Traffic

Discards All Traffic After Violation Occurs

Violation Results in err-disabled Interface State

Counters Increment for Each New Violation

shutdown restrict protect Table 3-5

Commands That Can Find Access Ports and VLANs

EXEC Command

Description

Lists each VLAN and all interfaces assigned to that VLAN, but does not include trunks Identifies an interface’s access VLAN, voice VLAN, and the administrative (configured) mode and operational mode (access or trunking) Lists MAC table entries: MAC addresses with associated interfaces and VLANs

Chapter 5

Chapter 4 Chapter 4 lists a summary of a host’s routing logic, with two main branches in what the host decides to do. As much as you can, complete the description of each step. 1. a. b.

Chapter 4 lists a summary of a router’s routing logic, with two main branches in what the host decides to do. As much as you can, complete the description of each step. 1. 2. 3. 4. 5. 6. Table 4-2

Comparing the Use of the Terms Classless and Classful

As Applied To

Classful

Classless

Addresses Routing protocols Routing (forwarding)

Chapter 5 Table 5-2 Routing Protocol

RIP-1 IGRP RIP-2 EIGRP OSPF

Classless and Classful Interior IP Routing Protocols Is It Classless?

Sends Mask in Updates

Supports VLSM

Supports Manual Route Summarization

8

9

Appendix J: Memory Tables

Chapter 5 lists a five-step process for finding summary routes. As much as you can, complete the step list. Step 1 Step 2 Step 3 Step 4 Step 5 Table 5-5 Routing Protocol

Autosummarization Support and Defaults Classless?

Supports Autosummarization?

Defaults to Use Autosummarization?1

RIP-1 RIP-2 EIGRP OSPF

Chapter 6 Table 6-3

Standard and Extended IP Access Lists: Matching

Type of Access List

Both standard and extended ACLs

Only extended ACLs

What Can Be Matched

Can Disable Autosummarization?

Chapter 7

Table 6-5

Popular Applications and Their Well-Known Port Numbers

Port Number(s)

Protocol

Application

Application Name Keyword in access-list Command Syntax

20 21 22 23 25 53 67, 68 69 80 110 161 443 16,384–32,767 Table 6-7

Operators Used When Matching Port Numbers

Operator in the access-list Command

eq neq lt gt range

Chapter 7 Table 7-1

ICMP Message Types

Message

Destination Unreachable Time Exceeded Redirect

Echo Request, Echo Reply

Description

Meaning

10

11

Appendix J: Memory Tables

Table 7-2

ICMP Unreachable Codes

Unreachable Code

When It Is Used

What Typically Sends It

Network unreachable Host unreachable

Can’t fragment

Protocol unreachable

Port unreachable

Table 7-3

Codes That the ping Command Receives in Response to Its ICMP Echo Request

ping Command Code

! . U N M ?

Description

Chapter 8

Chapter 8 Table 8-2

IP IGP Metrics

IGP

Metric

Description

RIP-1, RIP-2 OSPF EIGRP Table 8-3

Interior IP Routing Protocols Compared

Feature

RIP-1

RIP-2

EIGRP

OSPF

IS-IS

Classless

No

Yes

Supports VLSM

No

Yes

Sends mask in update

No

Yes

Distance vector

Yes

No

Link-state

No

Yes

Supports autosummarization

No

Yes

Yes

No

No

Supports manual summarization

No

Yes

Yes

Yes

Yes

Proprietary

No

No

Routing updates are sent to a multicast IP address

No



Supports authentication

No

Yes

Convergence

Slow

Fast

12

13

Appendix J: Memory Tables

Table 8-4

Comparing Features of IGPs: RIP-2, EIGRP, and OSPF

Features

RIP-2

OSPF

Metric Sends periodic updates Full or partial routing updates Where updates are sent Metric considered to be "infinite" Supports unequal-cost load balancing

Table 8-5

Default Administrative Distances

Route Type

Connected Static BGP (external routes) EIGRP (internal routes) IGRP OSPF IS-IS RIP EIGRP (external routes) BGP (internal routes) Unusable

Administrative Distance

EIGRP

Chapter 11

Chapter 10 Table 10-2

EIGRP Features Compared to OSPF

Feature

EIGRP

OSPF

Converges quickly Built-in loop prevention Sends partial routing updates, advertising only new or changed information Classless; therefore, supports manual summarization and VLSM Allows manual summarization at any router Sends routing information using IP multicast on LANs Uses the concept of a designated router on a LAN Flexible network design with no need to create areas Supports both equal-metric and unequal-metric load balancing Robust metric based on bandwidth and delay Can advertise IP, IPX, and AppleTalk routes Public standard

Chapter 11 Table 11-2

Neighbor Requirements for EIGRP and OSPF

Requirement

Interfaces must be in an up/up state Interfaces must be in the same subnet Must pass neighbor authentication (if configured) Must use the same ASN/process-ID on the router configuration command Hello and hold/dead timers must match IP MTU must match Router IDs must be unique K-values must match Must be in the same area

EIGRP

OSPF

14

15

Appendix J: Memory Tables

Chapter 12 Table 12-2

PPP LCP Features

Function

LCP Feature

Looped link detection

Magic number

Error detection

Link Quality Monitoring (LQM)

Multilink support

Multilink PPP

Authentication

PAP and CHAP

Table 12-4

Description

Likely Reasons for Data-Link Problems on Serial Links

Line Status

Protocol Status

Up

Down (stable) on both ends

Likely Reason

or Down (stable) on one end, flapping between up and down on the other Up

Down on one end, up on the other

Up

Down (stable) on both ends

Table 12-5

Summary of Symptoms for Mismatched Subnets on Serial Links

Symptoms When IP Addresses on a Serial Link Are in Different Subnets

Does a ping of the other router’s serial IP address work? Can routing protocols exchange routes over the link?

HDLC

PPP

Chapter 13

Chapter 13 Table 13-2

Frame Relay Terms and Concepts

Term

Description

Virtual circuit (VC)

Permanent virtual circuit (PVC) Switched virtual circuit (SVC)

Data terminal equipment (DTE)

Data communications equipment (DCE)

Access link Access rate (AR) Committed Information Rate (CIR) Data-link connection identifier (DLCI) Nonbroadcast multiaccess (NBMA) Local Management Interface (LMI)

Table 13-4

Frame Relay LMI Types

Name

Document

Cisco

Proprietary

ANSI

T1.617 Annex D

ITU

Q.933 Annex A

IOS LMI-Type Parameter

16

17

Appendix J: Memory Tables

Chapter 14 Table 14-4

PVC Status Values

Status

Active

Inactive

Deleted

Static

The PVC is defined to the Frame Relay network The router will attempt to send frames on a VC in this state

Chapter 15 Table 15-3

Comparing VPN Encryption Algorithms

Encryption Algorithm

Key Length (Bits)

Comments

Data Encryption Standard (DES) Triple DES (3DES) Advanced Encryption Standard (AES) Table 15-6

Summary of Functions Supported by ESP and AH

Feature

Supported by ESP?

Supported by AH?

Authentication Message integrity Encryption Antireplay

Chapter 17 Table 17-4

Example IPv6 Prefixes and Their Meanings

Term

Registry prefix ISP prefix Site prefix Subnet prefix

Assignment

Example from Chapter 17

Chapter 17

Details of the RS/RA Process

Table 17-5 Message

RS

RA

Multicast destination Meaning of multicast address

IPv6 Address Configuration Options

Table 17-6

Static or Dynamic

Option

Portion Configured or Learned

Static Static Dynamic Dynamic Table 17-7

Comparison of Stateless and Stateful DHCPv6 Services

Feature

Stateful DHCP

Stateless DHCP

Remembers IPv6 address (state information) of clients that make requests Assigns IPv6 address to client Supplies useful information, like DNS server IP addresses Is most useful in conjunction with stateless autoconfiguration Table 17-9

Common Link Local Multicast Addresses

Type of Address

Purpose

Global unicast

Unicast packets sent through the public Internet

Unique local

Unicast packets inside one organization

Link Local

Packets sent in the local subnet

Multicast (link local scope)

Multicasts that stay on the local subnet

Prefix

Easily Seen Hex Prefix(es)

18

19

Appendix J: Memory Tables

Chapter 17 lists a configuration checklist for configuring IPv6. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter. Step 1 Step 2 Step 3 Step 4

More Documents from "kyawmyohlaing"