APPENDIX
J
Memory Tables Chapter 1 Table 1-2
ISL and 802.1Q Compared
Function
ISL
802.1Q
Defined by Inserts another 4-byte header instead of completely encapsulating the original frame Supports normal-range (1–1005) and extended-range (1006–4094) VLANs Allows multiple spanning trees Uses a native VLAN Table 1-3
VTP Features
Function
Only sends VTP messages out ISL or 802.1Q trunks Supports CLI configuration of VLANs Can use normal-range VLANs (1–1005) Can use extended-range VLANs (1006–4095) Synchronizes (updates) its own config database when receiving VTP messages with a higher revision number Creates and sends periodic VTP updates every 5 minutes Does not process received VTP updates, but does forward received VTP updates out other trunks Places the VLAN ID, VLAN name, and VTP configuration into the running-config file Places the VLAN ID, VLAN name, and VTP configuration into the vlan.dat file in flash
Server
Client
Transparent
3
Appendix J: Memory Tables
Chapter 1 lists a configuration checklist for configuring VLANs and assigning the VLANs to interfaces. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter. Step 1 To configure a new VLAN, follow these steps: a. b. (Optional) Step 2 To configure a VLAN for each access interface, follow these steps: a. b. c. (Optional) Table 1-4
Trunking Administrative Mode Options with the switchport mode Command
Command Option
Description
access trunk dynamic desirable dynamic auto Table 1-5
Expected Trunking Operational Mode Based on the Configured Administrative Modes
Administrative Mode
Access
Dynamic Auto
Trunk
Dynamic Desirable
access dynamic auto trunk dynamic desirable Table 1-6 Device
Phone PC
Voice and Data VLAN Configuration Name of the VLAN
Configured With This Command
Chapter 2
Chapter 1 lists a configuration checklist for configuring VTP. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter. Step 1 Step 2 Step 3 (Optional) Step 4 (Optional) Step 5 (Optional) Step 6 Table 1-7
Where VTP Clients and Servers Store VLAN-Related Configuration
Configuration Commands
Where Stored
How to View
vtp domain vtp mode vtp password vtp pruning vlan vlan-id name vlan-name switchport access vlan vlan-id switchport voice vlan vlan-id
Chapter 2 Table 2-2
Three Classes of Problems Caused by Not Using STP in Redundant LANs
Problem
Description
Broadcast storms MAC table instability Multiple frame transmission Table 2-3
STP: Reasons for Forwarding or Blocking
Characterization of Port
All the root switch’s ports Each nonroot switch’s root port Each LAN’s designated port All other working ports
STP State
Description
4
5
Appendix J: Memory Tables
Table 2-4
Fields in the STP Hello BPDU
Field
Description
Root bridge ID Sender’s bridge ID Cost to reach root Timer values on the root switch Table 2-6
Default Port Costs According to IEEE
Ethernet Speed
Original IEEE Cost
Revised IEEE Cost
10 Mbps 100 Mbps 1 Gbps 10 Gbps Table 2-7
STP Timers
Timer
Description
Default Value
Hello Max Age Forward Delay Table 2-8
IEEE 802.1D Spanning-Tree States
State
Blocking Listening Learning Forwarding Disabled
Forwards Data Frames?
Learns MACs Based on Received Frames?
Transitory or Stable State?
Chapter 2
RSTP and STP Port States
Table 2-9
Operational State
STP State (802.1d)
Enabled
Blocking
Enabled
Listening
Enabled
Learning
Enabled
Forwarding
Disabled
Disabled
RSTP State (802.1w)
Forwards Data Frames in This State?
RSTP and STP Port Roles
Table 2-10 RSTP Role
STP Role
Definition
Root port Designated port Alternate port Backup port Disabled Table 2-11
Option
Comparing Three Options for Multiple Spanning Trees Supports STP
Supports RSTP
Configuration Effort
Only One Instance Required for Each Redundant Path
PVST+ PVRST MIST Table 2-12
STP Defaults and Configuration Options
Setting
Bridge ID Interface cost PortFast BPDU Guard
Default
Command(s) to Change Default
6
7
Appendix J: Memory Tables
Chapter 3 Table 3-2
LAN Switch Interface Status Codes
Line Status
Protocol Status
admin. down
down
down
down
up
down
down
down (err-disabled)
up
up
Table 3-3
Violation Mode
Typical Root Cause
10BASE-T and 100BASE-Tx Pin Pairs Used
Devices That Transmit on 1,2 and Receive on 3,6
Table 3-4
Interface Status
Devices That Transmit on 3,6 and Receive on 1,2
Port Security Behavior Based on Violation Mode
Discards Offending Traffic
Discards All Traffic After Violation Occurs
Violation Results in err-disabled Interface State
Counters Increment for Each New Violation
shutdown restrict protect Table 3-5
Commands That Can Find Access Ports and VLANs
EXEC Command
Description
Lists each VLAN and all interfaces assigned to that VLAN, but does not include trunks Identifies an interface’s access VLAN, voice VLAN, and the administrative (configured) mode and operational mode (access or trunking) Lists MAC table entries: MAC addresses with associated interfaces and VLANs
Chapter 5
Chapter 4 Chapter 4 lists a summary of a host’s routing logic, with two main branches in what the host decides to do. As much as you can, complete the description of each step. 1. a. b.
Chapter 4 lists a summary of a router’s routing logic, with two main branches in what the host decides to do. As much as you can, complete the description of each step. 1. 2. 3. 4. 5. 6. Table 4-2
Comparing the Use of the Terms Classless and Classful
As Applied To
Classful
Classless
Addresses Routing protocols Routing (forwarding)
Chapter 5 Table 5-2 Routing Protocol
RIP-1 IGRP RIP-2 EIGRP OSPF
Classless and Classful Interior IP Routing Protocols Is It Classless?
Sends Mask in Updates
Supports VLSM
Supports Manual Route Summarization
8
9
Appendix J: Memory Tables
Chapter 5 lists a five-step process for finding summary routes. As much as you can, complete the step list. Step 1 Step 2 Step 3 Step 4 Step 5 Table 5-5 Routing Protocol
Autosummarization Support and Defaults Classless?
Supports Autosummarization?
Defaults to Use Autosummarization?1
RIP-1 RIP-2 EIGRP OSPF
Chapter 6 Table 6-3
Standard and Extended IP Access Lists: Matching
Type of Access List
Both standard and extended ACLs
Only extended ACLs
What Can Be Matched
Can Disable Autosummarization?
Chapter 7
Table 6-5
Popular Applications and Their Well-Known Port Numbers
Port Number(s)
Protocol
Application
Application Name Keyword in access-list Command Syntax
20 21 22 23 25 53 67, 68 69 80 110 161 443 16,384–32,767 Table 6-7
Operators Used When Matching Port Numbers
Operator in the access-list Command
eq neq lt gt range
Chapter 7 Table 7-1
ICMP Message Types
Message
Destination Unreachable Time Exceeded Redirect
Echo Request, Echo Reply
Description
Meaning
10
11
Appendix J: Memory Tables
Table 7-2
ICMP Unreachable Codes
Unreachable Code
When It Is Used
What Typically Sends It
Network unreachable Host unreachable
Can’t fragment
Protocol unreachable
Port unreachable
Table 7-3
Codes That the ping Command Receives in Response to Its ICMP Echo Request
ping Command Code
! . U N M ?
Description
Chapter 8
Chapter 8 Table 8-2
IP IGP Metrics
IGP
Metric
Description
RIP-1, RIP-2 OSPF EIGRP Table 8-3
Interior IP Routing Protocols Compared
Feature
RIP-1
RIP-2
EIGRP
OSPF
IS-IS
Classless
No
Yes
Supports VLSM
No
Yes
Sends mask in update
No
Yes
Distance vector
Yes
No
Link-state
No
Yes
Supports autosummarization
No
Yes
Yes
No
No
Supports manual summarization
No
Yes
Yes
Yes
Yes
Proprietary
No
No
Routing updates are sent to a multicast IP address
No
—
Supports authentication
No
Yes
Convergence
Slow
Fast
12
13
Appendix J: Memory Tables
Table 8-4
Comparing Features of IGPs: RIP-2, EIGRP, and OSPF
Features
RIP-2
OSPF
Metric Sends periodic updates Full or partial routing updates Where updates are sent Metric considered to be "infinite" Supports unequal-cost load balancing
Table 8-5
Default Administrative Distances
Route Type
Connected Static BGP (external routes) EIGRP (internal routes) IGRP OSPF IS-IS RIP EIGRP (external routes) BGP (internal routes) Unusable
Administrative Distance
EIGRP
Chapter 11
Chapter 10 Table 10-2
EIGRP Features Compared to OSPF
Feature
EIGRP
OSPF
Converges quickly Built-in loop prevention Sends partial routing updates, advertising only new or changed information Classless; therefore, supports manual summarization and VLSM Allows manual summarization at any router Sends routing information using IP multicast on LANs Uses the concept of a designated router on a LAN Flexible network design with no need to create areas Supports both equal-metric and unequal-metric load balancing Robust metric based on bandwidth and delay Can advertise IP, IPX, and AppleTalk routes Public standard
Chapter 11 Table 11-2
Neighbor Requirements for EIGRP and OSPF
Requirement
Interfaces must be in an up/up state Interfaces must be in the same subnet Must pass neighbor authentication (if configured) Must use the same ASN/process-ID on the router configuration command Hello and hold/dead timers must match IP MTU must match Router IDs must be unique K-values must match Must be in the same area
EIGRP
OSPF
14
15
Appendix J: Memory Tables
Chapter 12 Table 12-2
PPP LCP Features
Function
LCP Feature
Looped link detection
Magic number
Error detection
Link Quality Monitoring (LQM)
Multilink support
Multilink PPP
Authentication
PAP and CHAP
Table 12-4
Description
Likely Reasons for Data-Link Problems on Serial Links
Line Status
Protocol Status
Up
Down (stable) on both ends
Likely Reason
or Down (stable) on one end, flapping between up and down on the other Up
Down on one end, up on the other
Up
Down (stable) on both ends
Table 12-5
Summary of Symptoms for Mismatched Subnets on Serial Links
Symptoms When IP Addresses on a Serial Link Are in Different Subnets
Does a ping of the other router’s serial IP address work? Can routing protocols exchange routes over the link?
HDLC
PPP
Chapter 13
Chapter 13 Table 13-2
Frame Relay Terms and Concepts
Term
Description
Virtual circuit (VC)
Permanent virtual circuit (PVC) Switched virtual circuit (SVC)
Data terminal equipment (DTE)
Data communications equipment (DCE)
Access link Access rate (AR) Committed Information Rate (CIR) Data-link connection identifier (DLCI) Nonbroadcast multiaccess (NBMA) Local Management Interface (LMI)
Table 13-4
Frame Relay LMI Types
Name
Document
Cisco
Proprietary
ANSI
T1.617 Annex D
ITU
Q.933 Annex A
IOS LMI-Type Parameter
16
17
Appendix J: Memory Tables
Chapter 14 Table 14-4
PVC Status Values
Status
Active
Inactive
Deleted
Static
The PVC is defined to the Frame Relay network The router will attempt to send frames on a VC in this state
Chapter 15 Table 15-3
Comparing VPN Encryption Algorithms
Encryption Algorithm
Key Length (Bits)
Comments
Data Encryption Standard (DES) Triple DES (3DES) Advanced Encryption Standard (AES) Table 15-6
Summary of Functions Supported by ESP and AH
Feature
Supported by ESP?
Supported by AH?
Authentication Message integrity Encryption Antireplay
Chapter 17 Table 17-4
Example IPv6 Prefixes and Their Meanings
Term
Registry prefix ISP prefix Site prefix Subnet prefix
Assignment
Example from Chapter 17
Chapter 17
Details of the RS/RA Process
Table 17-5 Message
RS
RA
Multicast destination Meaning of multicast address
IPv6 Address Configuration Options
Table 17-6
Static or Dynamic
Option
Portion Configured or Learned
Static Static Dynamic Dynamic Table 17-7
Comparison of Stateless and Stateful DHCPv6 Services
Feature
Stateful DHCP
Stateless DHCP
Remembers IPv6 address (state information) of clients that make requests Assigns IPv6 address to client Supplies useful information, like DNS server IP addresses Is most useful in conjunction with stateless autoconfiguration Table 17-9
Common Link Local Multicast Addresses
Type of Address
Purpose
Global unicast
Unicast packets sent through the public Internet
Unique local
Unicast packets inside one organization
Link Local
Packets sent in the local subnet
Multicast (link local scope)
Multicasts that stay on the local subnet
Prefix
Easily Seen Hex Prefix(es)
18
19
Appendix J: Memory Tables
Chapter 17 lists a configuration checklist for configuring IPv6. As much as you can, complete the checklist. The following list shows the same step numbers/letters as used in the chapter. Step 1 Step 2 Step 3 Step 4