SlideShare a Scribd company logo
1 of 19
HSRP
The virtual MAC addressof HSRP version1 is 0000.0C07.ACxx, where xxisthe HSRPgroup number
inhexadecimal basedonthe respective interface.HSRPversion2usesa virtual MACaddressof
0000.0C9F.FXXX. Virtual MACaddresscan be configured manually.
HSRP version1hellopacketsare sentto multicastaddress224.0.0.2 while HSRPversion2hello
packetsare sentto multicastaddress224.0.0.102. CurrentlyHSRPv1isthe defaultversionwhen
runningHSRPon Ciscodevices.
Hellotime =3 sec
Holdtime = 10 sec
HSRP consistsof 5 states:
State Description
Initial
Thisis the beginningstate.ItindicatesHSRPisnotrunning.It happenswhenthe
configurationchangesorthe interface isfirstturnedon
Listen
The router knowsbothIPand MAC addressof the virtual routerbutit isnot the active or
standbyrouter.For example,if there are 3 routersinHSRP group,the routerwhichis notin
active or standbystate will remaininlistenstate.
Speak
The router sendsperiodicHSRPhellosand participatesinthe electionof the active or
standbyrouter.
Standby
In thisstate,the routermonitorshellosfromthe active routeranditwill take the active
state whenthe currentactive routerfails(nopacketsheardfromactive router)
Active
The router forwardspacketsthatare sentto the HSRP group.The routeralsosends
periodichellomessages
Please notice thatnotall routersina HSRPgroup go throughall statesabove.Ina HSRP group,only
one routerreachesactive state and one routerreachesstandbystate.Otherrouterswill stopat
listenstate.
+ The group numbersof HSRPversion1 range from 0 to 255. HSRPdoessupportgroup numberof 0
(we docheck itand infact, it isthe defaultgroupnumberif youdon’tentergroupnumberinthe
configuration) soHSRPversion1supportsupto 256 groupnumbers.HSRPversion2 supports4096
groupnumbers.
WithHSRP, twoor more devicessupportavirtual routerwithafictitiousMACaddressandunique IP
address.There are twoversionof HSRP.
+ WithHSRP version1,the virtual router’sMAC addressis0000.0c07.ACxx , inwhichxx isthe HSRP
group.
+ WithHSRP version2,the virtual MAC addressif 0000.0C9F.Fxxx,in whichxxx isthe HSRPgroup.
Note:Anothercase isHSRP forIPv6, inwhichthe MAC addressrange from 0005.73A0.0000 through
0005.73A0.0FFF.
GLBP
Whenthe routersare configuredtoa GLBP group,theyfirstelectone gatewaytobe the Active
Virtual Gateway(AVG) forthatgroup.The electionisbasedonthe priorityof eachgateway (highest
prioritywins).If all of themhave the same prioritythenthe gatewaywiththe highestreal IPaddress
becomesthe AVG.The AVG,inturn, assignsa virtual MACaddressto eachmemberof the GLBP
group.Each gatewaywhichisassignedavirtual MAC addressiscalledActive Virtual Forwarder
(AVF).A GLBP group onlyhasa maximumof fourAVFs.If there are more than 4 gatewaysina GLBP
groupthenthe restwill become StandbyVirtual Forwarder(SVF) whichwill take the place of aAVF
incase of failure.The virtual MACaddressinGLBPis 0007.b400.xxyy where xx isthe GLBP group
numberandyy isthe differentnumberof eachgateway(01, 02, 03…).
To detect a gateway failure, GLBP members communicate between each other through hello
messages sent every 3 seconds to the multicast address 224.0.0.102, User Datagram Protocol
(UDP) port 3222.
GLBP supports up to 1024 virtual routers (GLBP groups) per physical interface of a router.
Load balancing algorithm
GLBP load sharing is done in one of three ways:
Round-robin load-balancing algorithm: Each router MAC is used sequentially to respond
to ARP requests. This is the default load balancing mode in GLBP and is suitable for any
number of end hosts.
Weighted load-balancing algorithm: Traffic is balanced proportional to a configured
weight. Each GLBP router in the group will advertise its weighting and assignment; the AVG
will act based on that value. For example, if there are two routers in a group and R1 has
double the forwarding capacity of router B, the weighting value of router A should be
configured to be double the amount of R2.
Host-dependent load-balancing algorithm: A given host always uses the same router.
VRRP
Object tracking is the process of tracking the state of a configured object and uses that state
to determine the priority of the VRRP router in a VRRP group. Unlike HSRP which can track
interface status directly, VRRP can only track interface status through a tracked object.
SNMP
SNMP is an application-layer protocol that provides a message format for communication
between SNMP managers and agents. SNMP provides a standardized framework and a
common language used for the monitoring and management of devices in a network.
The SNMP framework has three parts:
+ An SNMP manager
+ An SNMP agent
+ A Management Information Base (MIB)
The SNMP manager is the system used to control and monitor the activities of network hosts
using SNMP. The most common managing system is called a Network Management System
(NMS). The term NMS can be applied to either a dedicated device used for network
management, or the applications used on such a device. A variety of network management
applications are available for use with SNMP. These features range from simple command-
line applications to feature-rich graphical user interfaces (such as the CiscoWorks2000 line of
products).
The SNMP agent is the software component within the managed device that maintains the
data for the device and reports these data, as needed, to managing systems. The agent and
MIB reside on the routing device (router, access server, or switch). To enable the SNMP
agent on a Cisco routing device, you must define the relationship between the manager and
the agent.
The Management Information Base (MIB) is a virtual information storage area for network
management information, which consists of collections of managed objects.
A TRAP is a SNMP message sent from one application to another (which is typically on a
remote host). Their purpose is merely to notify the other application that something has
happened, has been noticed, etc. The big problem with TRAPs is that they’re
unacknowledged so you don’t actually know if the remote application received your oh-so-
important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM,
which is nothing more than an acknowledged TRAP.
Cisco IOS software supports the following versions of SNMP:
+ SNMPv1 – The Simple Network Management Protocol: A Full Internet Standard, defined
in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and
RFC 1098.) Security is based on community strings.
+ SNMPv2c – The community-string based Administrative Framework for SNMPv2.
SNMPv2c (the “c” stands for “community”) is an Experimental Internet Protocol defined in
RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and
data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of
SNMPv1.
+ SNMPv3 – Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol
defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination
of authenticating and encrypting packets over the network. The security features provided in
SNMPv3 are as follows:
– Message integrity: Ensuring that a packet has not been tampered with in transit.
– Authentication: Determining that the message is from a valid source.
– Encryption: Scrambling the contents of a packet prevent it from being learned by an
unauthorized source.
SNMPv1/v2 can neither authenticate the source of a management message nor provide
encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP
network management functions. It is also possible for nonauthorized users to eavesdrop on
management information as it passes from managed systems to the management system.
Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a
read-only capability, reducing their utility to that of a network monitor; no network control
applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3
was issued as a set of Proposed Standards in January 1998.
The two additional messages are added in SNMP2 (compared to SNMPv1)
GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large
chunks of data. GetBulkRequest allows an agent to respond with as much information as will
fit in the response PDU. Agents that cannot provide values for all variables in a list will send
partial information.
InformRequest The InformRequest message allows NMS stations to share trap information.
(Traps are issued by SNMP agents when a device change occurs.) InformRequest messages
are generally used between NMS stations, not between NMS stations and agents.
NETFLOW
NetFlow traditionally enables several key customer applications including:
+ Network Monitoring – NetFlow data enables extensive near real time network monitoring
capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns
associated with individual routers and switches as well as on a network-wide basis (providing
aggregate traffic or application based views) to provide proactive problem detection, efficient
troubleshooting, and rapid problem resolution.
+ Application Monitoring and Profiling – NetFlow data enables network managers to gain
a detailed, time-based, view of application usage over the network. This information is used
to plan, understand new services, and allocate network and application resources (e.g. Web
server sizing and VoIP deployment) to responsively meet customer demands.
+ User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed
understanding of customer/user utilization of network and application resources. This
information may then be utilized to efficiently plan and allocate access, backbone and
application resources as well as to detect and resolve potential security and policy violations.
+ Network Planning – NetFlow can be used to capture data over a long period of time
producing the opportunity to track and anticipate network growth and plan upgrades to
increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow
services data optimizes network planning including peering, backbone upgrade planning, and
routing policy planning. NetFlow helps to minimize the total cost of network operations
while maximizing network performance, capacity, and reliability. NetFlow detects unwanted
WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of
new network applications. NetFlow will give you valuable information to reduce the cost of
operating your network.
+ Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in
real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in
NetFlow data. The data is also a valuable forensic tool to understand and replay the history of
security incidents.
+ Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes
details such as IP addresses, packet and byte counts, timestamps, type-of-service and
application ports, etc.) for highly flexible and detailed resource utilization accounting.
Service providers may utilize the information for billing based on time-of-day, bandwidth
usage, application usage, quality of service, etc. Enterprise customers may utilize the
information for departmental charge-back or cost allocation for resource utilization.
What isan IPFlow?
Each packet thatis forwardedwithinarouterorswitchis examinedforaset of IP packetattributes.
These attributesare the IPpacketidentityorfingerprintof the packetanddetermine if the packetis
unique orsimilartootherpackets.
Traditionally,anIPFlowisbasedon a setof 5 andup to 7 IP packetattributes.
IP PacketattributesusedbyNetFlow:
+ IP source address
+ IP destinationaddress
+ Source port
+ Destinationport
+ Layer 3 protocol type
+ Classof Service
+ Routeror switchinterface
Flowmonitorsare the Flexible NetFlowcomponentthatisappliedtointerfacestoperformnetwork
trafficmonitoring.Flowmonitorsconsist of arecordand a cache. You add the recordto the flow
monitorafteryoucreate the flowmonitor.The flow monitorcache isautomaticallycreatedatthe
time the flowmonitorisappliedtothe firstinterface.Flow dataiscollectedfromthe networktraffic
duringthe monitoringprocessbasedonthe keyandnonkeyfieldsinthe record,whichisconfigured
for the flowmonitorandstoredinthe flow monitorcache.
For example,the followingexample createsaflow monitornamedFLOW-MONITOR-1andenters
Flexible NetFlowflow monitorconfigurationmode:
Router(config)#flowmonitorFLOW-MONITOR-1
Router(config-flow-monitor)#
etFlowfacilitatessolutionstomanycommonproblemsencounteredbyITprofessionals.
+ Analyze newapplicationsand theirnetwork impact
IdentifynewapplicationnetworkloadssuchasVoIPorremote site additions.
+ Reductionin peak WANtraffic
Use NetFlowstatisticstomeasure WAN trafficimprovementfromapplication-policychanges;
understandwhoisutilizingthe networkandthe networktoptalkers.
+ Troubleshootingandunderstandingnetwork pain points
Diagnose slownetworkperformance,bandwidthhogsandbandwidthutilizationquicklywith
commandline interface orreportingtools.
+ DetectionofunauthorizedWAN traffic
Avoidcostlyupgradesbyidentifyingthe applicationscausingcongestion.
+ Securityand anomaly detection
NetFlowcanbe usedforanomalydetectionandwormdiagnosisalongwithapplicationssuchas
CiscoCS-Mars.
+ ValidationofQoS parameters
Confirmthatappropriate bandwidthhasbeenallocatedtoeachClassof Service (CoS) andthatno
CoS isover- or under-subscribed.
SYSLOG
By default, switches send the output from system messages and debug privileged EXEC
commands to a logging process. The logging process controls the distribution of logging
messages to various destinations, such as the logging buffer (on RAM), terminal lines
(console terminal), or a UNIX syslog server, depending on your configuration. The process
also sends messages to the console.
Note: Syslog messages can be written to a file in Flash memory although it is not a popular
place to use. We can configure this feature with the command logging file flash:filename.
The Message Logging is divided into 8 levels as listed below:
Level Keyword Description
0 emergencies System is unusable
1 alerts Immediate action is needed
2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant, conditions exist
6 informational Informational messages
7 debugging Debugging messages
The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level
with the “logging console level” command, that level and all the higher levels will be
displayed. For example, by using the “logging console warnings” command, all the logging
of emergencies, alerts, critical, errors, warnings will be displayed.
ETHER CHANNEL
EtherChannel Load-Balancing
EtherChannel load-balances traffic among port members of the same channel. Load balancing
between member interface is based on:
+ Source MAC address
+ Destination MAC address
+ Source IP Address
+ Destination IP Address
+ Combinations of the four
Note: Some old switch/router flatforms do not support all the load-balancing methods above.
To configure load-distribution method, use the command port-channel load-balance under
global configuration mode. For example to load-balance based on destination MAC use the
command:
Router(config)#port-channel load-balance dst-mac
BASIC QUESTIONS
ModernEthernetnetworksbuiltwithswitchesandfull-duplex connectionsnolongerutilize
CSMA/CD.CSMA/CD isonlyusedinobsolete sharedmediaEthernet (whichusesrepeaterorhub).
The followinglocationscanbe configuredasa source forthe IOSimage:
+ Flash(the defaultlocation)
+ TFTP server
+ ROM(usedif noothersource isfound)
When you turn the router on, it runs through the following boot process.
The Power-On Self Test (POST) checks the router’s hardware. When the POST completes
successfully, the System OK LED indicator comes on.
The router checks the configuration register to identify where to load the IOS image from. A
setting of 0×2102 means that the router will use information in the startup-config file to
locate the IOS image. If the startup-config file is missing or does not specify a location, it
will check the following locations for the IOS image:
1. Flash (the default location)
2. TFTP server
3. ROM (used if no other source is found)
The router loads the configuration file into RAM (which configures the router).
CISCO BOOT SECQUENCE
In some seriesof routers,the RAMinformationisdisplayedby2parameters(inthiscase
60416K/5120K). The firstparameterindicateshow muchRAMis inthe routerwhile the second
parameter(5120K) indicateshowmuchDRAMisbeingusedforPacketmemory.
SWITCHING
Microsegmentationisanetworkdesign(functionality) whereeachworkstation ordevice ona
networkgetsitsowndedicatedsegment(collisiondomain) to the switch.Eachnetworkdevice gets
the full bandwidthof the segmentanddoesnothave toshare the segmentwithotherdevices.
Microsegmentationreducesandcaneveneliminate collisions because eachsegmentisitsown
collisiondomain ->.
Note:Microsegmentationdecreasesthe numberof collisions butitincreasesthe numberof collision
domains.
TRUNKING
The showvlan commandonlydisplaysaccessports, the trunkportsare notshownin thiscommand
(we can use the “showinterface trunk”commandto see trunkedports)
STP
SpanningTree Protocol convergence (Layer2convergence) happenswhenbridgesandswitches
have transitionedtoeitherthe forwarding orblockingstate.Whenlayer2isconverged,rootbridge
iselectedandall portroles(Root,DesignatedandNon-Designated) inall switchesare selected.
RSTP
There are only three port states left in RSTP that correspond to the three possible operational
states. The 802.1D disabled, blocking, and listening states are merged into the 802.1w
discarding state.
* Discarding – the port does not forward frames, process received frames, or learn MAC
addresses – but it does listen for BPDUs (like the STP blocking state)
* Learning – receives and transmits BPDUs and learns MAC addresses but does not yet
forward frames (same as STP).
* Forwarding – receives and sends data, normal operation, learns MAC address, receives
and transmits BPDUs (same as STP).
STP State (802.1d) RSTP State (802.1w)
Blocking Discarding
Listening Discarding
Learning Learning
Forwarding Forwarding
Disabled Discarding
Although the learning state is also used in RSTP but it only takes place for a short time as
compared to STP. RSTP converges with all ports either in forwarding state or discarding
state.
RSTP Quick Summary:
RSTP provides faster convergence than 802.1D STP when topology changes occur.
* RSTP defines three port states: discarding, learning, and forwarding.
* RSTP defines five port roles: root, designated, alternate, backup, and disabled.
NAT
NAT terms:
* Inside local address – The IP address assigned to a host on the inside network. The address
is usually not an IP address assigned by the Internet Network Information Center (InterNIC)
or service provider. This address is likely to be an RFC 1918 private address.
* Inside global address – A legitimate IP address assigned by the InterNIC or service
provider that represents one or more inside local IP addresses to the outside world.
* Outside local address – The IP address of an outside host as it is known to the hosts on the
inside network.
* Outside global address – The IP address assigned to a host on the outside network. The
owner of the host assigns this address.
VLAN
Whena switchcannot finda destinationMACaddresslistedonitsMACAddressTable,itwill flooda
frame to everysingle portexceptthe one itcame infrom – thisframe iscalledunknownunicast
frame.It’sa broadcast mac addressFF:FF:FF:FF:FF:FF
FRAME RELAY
The PVC STATUS displays the status of the PVC. The DCE device creates and sends the
report to the DTE devices. There are 4 statuses:
+ ACTIVE: the PVC is operational and can transmit data
+ INACTIVE: the connection from the local router to the switch is working, but the
connection to the remote router is not available
+ DELETED: the PVC is not present and no LMI information is being received from the
Frame Relay switch
+ STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled
(by using the “no keepalive” command). This status is rarely seen so it is ignored in some
books.
In general, BECN is used on frames traveling away from the congested area to warn source
devices that congestion has occurred on that path while FECN is used to alert receiving
devices if the frame experiences congestion.
BECN also informs the transmitting devices to slow down the traffic a bit until the network
returns to normal state.
IP ROUTING
Whenthere ismore than one way to reacha destination,itwill choosethe bestone basedona
couple of things.First,itwill choose the route thathasthe longestmatch;meaningthe most specific
route.So,in thiscase the /24 routeswill be chosenoverthe /16 routes.Next,fromall the /24 routes
it will choose the one withthe lowestadministrative distance.Directlyconnectedroutes have anAD
of 1 so thiswill be the route chosen.
Routers treatment with incoming packet
Whereasswitchescanonlyexamineandforwardpacketsbasedonthe contentsof the MAC header,
routerscan lookfurtherintothe packetto discoverthe networkforwhicha packetis destined.
Routersmake forwardingdecisionsbasedonthe packet'snetwork-layerheader(such asan IPX
headeror IPheader).These network-layerheaders containsource anddestination network
addresses.Local devicesaddresspacketstothe router'sMAC addressinthe MAC header.After
receivingthe packets,the routermustperformthe followingsteps:
1. Checkthe incomingpacketforcorruption, andremove the MAC header. The routerchecks the
packetfor MAC-layererrors.The routerthenstripsoff the MAC headerandexaminesthe network-
layerheadertodetermine whattodowith the packet.
2. Examine the age of the packet.The router mustensure thatthe packethas not come too far to be
forwarded.Forexample,IPXheaderscontainahopcount.By default,15 hopsisthe maximum
numberof hops(or routers) thata packetcan cross. If a packet hasa hopcount of 15, the router
discardsthe packet.IP headerscontainaTime to Live (TTL) value.Unlike the IPXhopcount, which
incrementsasthe packetisforwardedthrougheachrouter, the IP TTL value decrementsas the IP
packetis forwardedthrougheachrouter.If an IPpackethas a TTL value of 1, the routerdiscardsthe
packet.A routercannotdecrementthe TTL value to 1 and thenforwardthe packet.
3. Determine the route tothe destination.Routersmaintainaroutingtable thatlistsavailable
networks,the directiontothe desirednetwork(theoutgoinginterfacenumber),andthe distance to
those networks.Afterdeterminingwhichdirectiontoforwardthe packet,the routermustbuilda
newheader.(If youwantto readthe IProutingtablesona Windows95/98 workstation,type ROUTE
PRINTin the DOS box.)
4. Buildthe newMAC headerandforwardthe packet.Finally,the routerbuildsanew MACheader
for the packet.The MAC headerincludesthe router'sMACaddressandthe final destination's MAC
addressor the MAC addressof the nextrouterin the path.
Syntax fordefaultroute is:
iproute <Remote_Network><Netmask><Next_Hop_Address>.
DHCP
An addressconflictoccurswhentwohostsuse the same IP address.Duringaddressassignment,
DHCP checksfor conflictsusingpingandgratuitousARP.If a conflictisdetected,the addressis
removedfromthe pool.The addresswill notbe assigneduntil the administratorresolvesthe
conflict.
OSPF
In ospf these entries must match on neighboring routers:
- Hello and dead intervals
– Area ID (Area 0 in this case)
– Authentication password
– Stub area flag
EIGRP
The followinginformationmustbe matched soas to create neighborhood. EIGRProutersto
establish,mustmatchthe followinginformation:
1. AS Number;
2. K value.
TROUBLESHOOTING
From the output we see the Serial0/0 of RouterA is in “status up/protocol down” state which
indicates a Layer 2 problem so the problem can be:
+ Keepalives mismatch
+ Encapsulation mismatch
+ Clocking problem
IPv6
Below is the list of common kinds of IPv6 addresses:
Loopback address ::1
Link-local address FE80::/10
Site-local address FEC0::/10
Global address 2000::/3
Multicast address FF00::/8
Question 5
What is SNMPv3 authentication protocol?
Answer: HMAC-MD5 or HMAC-SHA (Maybe either of them will appear in the exam)
Question 1
Etherchannel question: You are given sw1 and sw2. The output of show etherchannel
summary and show interface fa0/1. What is the cause of the problem? in exhibit, switch a
cable is 100mb/s speed and b is 10mb/s. If you can look very carefully, there is speed
mismatched to cause that problem. I selected “speed mismatch”
Question 2
Q2 (Etherchannel Questions that goes like this)
Refer to the exhibit. Etherchannel has been configured on Switch1 as shown.
Switch1# conf t
Switch1(config)# interface range gigabitethernet 1/1
Switch1(config)# Channel-group 5 Mode “AUTO”
Switch1#
Switch1(config)# interface range gigabitethernet 1/2
Switch1(config)# Channel-group 5 Mode “AUTO”
Which is the correct command set to configure etherchannel on Switch2?
A.
Switch2# configure terminal
Switch2(config)# interface range gigabitethernet3/1 -2
Switch2(config-if)# channel-group 5 mode auto
B.
Switch2# configure terminal
Switch2(config)# interface range gigabitethemet3/1 -2
Switch2(config-if)# channel-group 5 mode passive
C.
Switch2# configure terminal
Switch2(config)# interface range gigabitethernet3/1 -2
Switch2(config-if)# channel-group 5 mode desirable
D.
Switch2# configure terminal
Switch2(config)# interface range gigabitethernet3/1 -2
Switch2(config-if)# channel-group 5 mode ACTIVE
Answer: C
Good resource:
http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_13_ea1/c
onfiguration/guide/swethchl.html#wp1028480
Question 3
Which OSPF command turn OSPF on all interfaces of a router?
Answer: network 0.0.0.0 255.255.255.255
Question 4
Network admin creates a layer 3 Etherchannel, bounding 4 interfaces into channel group 1.
On what interface is the IP address configured?
A. the port-channel 1 interface
B. the highest number member interface
C. all member interfaces
D. the lowest number member interface
Answer: A
Question 5
3. What is the authentication type of SNMPv2?
Answer: Community string
Question 6
What parameters can be different on ports with an Etherchannel?
A. speed
B. trunk encapsulation
C. DTP negotiation setting
D. duplex
Answer: C
Question 7
Which is true about OSPF router-id? (Choose two)
A. It is used for type 1 router LSA
B. Highest IP address of the loopback is used
C. router-id needs to be matched on ospf neighbors
D. router-id is 16 bit
Answer: A B
www.9tut.com
CCNA DUPMS

More Related Content

What's hot

Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPVIJAY SHARMA
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layerVikram Nandini
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp windowpriya Nithya
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct doxBaig Mirza
 

What's hot (19)

Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDP
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
Unit 3
Unit 3Unit 3
Unit 3
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
sigtran
sigtransigtran
sigtran
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp window
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
 

Viewers also liked

Useful linux-commands
Useful linux-commandsUseful linux-commands
Useful linux-commandsHimani Singh
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANsCCNAResources
 
Jeremy CCNA Notes
Jeremy CCNA NotesJeremy CCNA Notes
Jeremy CCNA NotesKashif Khan
 
Information System Security
Information System SecurityInformation System Security
Information System SecurityNovizul Evendi
 
Red hat enterprise_linux-5.5-technical_notes-en-us
Red hat enterprise_linux-5.5-technical_notes-en-usRed hat enterprise_linux-5.5-technical_notes-en-us
Red hat enterprise_linux-5.5-technical_notes-en-usDuong Hieu
 
Ibm lotus connections 3.0 lab excercises workbook 2011
Ibm lotus connections 3.0 lab excercises workbook 2011Ibm lotus connections 3.0 lab excercises workbook 2011
Ibm lotus connections 3.0 lab excercises workbook 2011Friedel Jonker
 
Linux School: Advanced Administration for IBM Software
Linux School: Advanced Administration for IBM SoftwareLinux School: Advanced Administration for IBM Software
Linux School: Advanced Administration for IBM SoftwareBill Malchisky Jr.
 
HTML5 Hacking - Yahoo! Open Hack Day
HTML5 Hacking - Yahoo! Open Hack DayHTML5 Hacking - Yahoo! Open Hack Day
HTML5 Hacking - Yahoo! Open Hack DayTed Drake
 
sharepoint 2007 presentation in crcis
sharepoint 2007 presentation in crcis sharepoint 2007 presentation in crcis
sharepoint 2007 presentation in crcis saber tabatabaee
 
Ibm big dataandanalytics_28433_archposter_wht_mar_2014_v4
Ibm big dataandanalytics_28433_archposter_wht_mar_2014_v4Ibm big dataandanalytics_28433_archposter_wht_mar_2014_v4
Ibm big dataandanalytics_28433_archposter_wht_mar_2014_v4Friedel Jonker
 
What Is Tcp Ip
What Is Tcp IpWhat Is Tcp Ip
What Is Tcp Iptmavroidis
 

Viewers also liked (20)

Useful linux-commands
Useful linux-commandsUseful linux-commands
Useful linux-commands
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANs
 
Jeremy CCNA Notes
Jeremy CCNA NotesJeremy CCNA Notes
Jeremy CCNA Notes
 
Notes for LX0-101 Linux
Notes for LX0-101 Linux Notes for LX0-101 Linux
Notes for LX0-101 Linux
 
Information System Security
Information System SecurityInformation System Security
Information System Security
 
Hacking Challenges
Hacking ChallengesHacking Challenges
Hacking Challenges
 
linux+ learnkey DVD 2
linux+ learnkey DVD 2 linux+ learnkey DVD 2
linux+ learnkey DVD 2
 
Linux & Open Source
Linux & Open SourceLinux & Open Source
Linux & Open Source
 
Red hat enterprise_linux-5.5-technical_notes-en-us
Red hat enterprise_linux-5.5-technical_notes-en-usRed hat enterprise_linux-5.5-technical_notes-en-us
Red hat enterprise_linux-5.5-technical_notes-en-us
 
Hacking lab
Hacking labHacking lab
Hacking lab
 
How to use Big Data
How to use Big DataHow to use Big Data
How to use Big Data
 
Ibm lotus connections 3.0 lab excercises workbook 2011
Ibm lotus connections 3.0 lab excercises workbook 2011Ibm lotus connections 3.0 lab excercises workbook 2011
Ibm lotus connections 3.0 lab excercises workbook 2011
 
Virtual hacking Modul
Virtual hacking ModulVirtual hacking Modul
Virtual hacking Modul
 
E-commerce
E-commerceE-commerce
E-commerce
 
Linux School: Advanced Administration for IBM Software
Linux School: Advanced Administration for IBM SoftwareLinux School: Advanced Administration for IBM Software
Linux School: Advanced Administration for IBM Software
 
HTML5 Hacking - Yahoo! Open Hack Day
HTML5 Hacking - Yahoo! Open Hack DayHTML5 Hacking - Yahoo! Open Hack Day
HTML5 Hacking - Yahoo! Open Hack Day
 
sharepoint 2007 presentation in crcis
sharepoint 2007 presentation in crcis sharepoint 2007 presentation in crcis
sharepoint 2007 presentation in crcis
 
Ibm big dataandanalytics_28433_archposter_wht_mar_2014_v4
Ibm big dataandanalytics_28433_archposter_wht_mar_2014_v4Ibm big dataandanalytics_28433_archposter_wht_mar_2014_v4
Ibm big dataandanalytics_28433_archposter_wht_mar_2014_v4
 
Hacking education
Hacking educationHacking education
Hacking education
 
What Is Tcp Ip
What Is Tcp IpWhat Is Tcp Ip
What Is Tcp Ip
 

Similar to Ccna notes

Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibilityHamdamboy (함담보이)
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7jignash
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docxUsamaAliLone3
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
CCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokCCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokAhmed Gad
 
Snmp vulnerability assessment
Snmp vulnerability assessmentSnmp vulnerability assessment
Snmp vulnerability assessmentSupriya G
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNidescitation
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)Krishan Pareek
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
Network Management Security NS8
Network Management Security NS8Network Management Security NS8
Network Management Security NS8koolkampus
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 
Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515IJRAT
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 

Similar to Ccna notes (20)

Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibility
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
snmp
snmpsnmp
snmp
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
CCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokCCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the Netwok
 
Snmp vulnerability assessment
Snmp vulnerability assessmentSnmp vulnerability assessment
Snmp vulnerability assessment
 
ROUTING
ROUTINGROUTING
ROUTING
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSN
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Network Management Security NS8
Network Management Security NS8Network Management Security NS8
Network Management Security NS8
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Ccna notes

  • 1. HSRP The virtual MAC addressof HSRP version1 is 0000.0C07.ACxx, where xxisthe HSRPgroup number inhexadecimal basedonthe respective interface.HSRPversion2usesa virtual MACaddressof 0000.0C9F.FXXX. Virtual MACaddresscan be configured manually. HSRP version1hellopacketsare sentto multicastaddress224.0.0.2 while HSRPversion2hello packetsare sentto multicastaddress224.0.0.102. CurrentlyHSRPv1isthe defaultversionwhen runningHSRPon Ciscodevices. Hellotime =3 sec Holdtime = 10 sec HSRP consistsof 5 states: State Description Initial Thisis the beginningstate.ItindicatesHSRPisnotrunning.It happenswhenthe configurationchangesorthe interface isfirstturnedon Listen The router knowsbothIPand MAC addressof the virtual routerbutit isnot the active or standbyrouter.For example,if there are 3 routersinHSRP group,the routerwhichis notin active or standbystate will remaininlistenstate. Speak The router sendsperiodicHSRPhellosand participatesinthe electionof the active or standbyrouter. Standby In thisstate,the routermonitorshellosfromthe active routeranditwill take the active state whenthe currentactive routerfails(nopacketsheardfromactive router) Active The router forwardspacketsthatare sentto the HSRP group.The routeralsosends periodichellomessages Please notice thatnotall routersina HSRPgroup go throughall statesabove.Ina HSRP group,only one routerreachesactive state and one routerreachesstandbystate.Otherrouterswill stopat listenstate. + The group numbersof HSRPversion1 range from 0 to 255. HSRPdoessupportgroup numberof 0 (we docheck itand infact, it isthe defaultgroupnumberif youdon’tentergroupnumberinthe configuration) soHSRPversion1supportsupto 256 groupnumbers.HSRPversion2 supports4096 groupnumbers. WithHSRP, twoor more devicessupportavirtual routerwithafictitiousMACaddressandunique IP address.There are twoversionof HSRP. + WithHSRP version1,the virtual router’sMAC addressis0000.0c07.ACxx , inwhichxx isthe HSRP group. + WithHSRP version2,the virtual MAC addressif 0000.0C9F.Fxxx,in whichxxx isthe HSRPgroup. Note:Anothercase isHSRP forIPv6, inwhichthe MAC addressrange from 0005.73A0.0000 through 0005.73A0.0FFF.
  • 2. GLBP Whenthe routersare configuredtoa GLBP group,theyfirstelectone gatewaytobe the Active Virtual Gateway(AVG) forthatgroup.The electionisbasedonthe priorityof eachgateway (highest prioritywins).If all of themhave the same prioritythenthe gatewaywiththe highestreal IPaddress becomesthe AVG.The AVG,inturn, assignsa virtual MACaddressto eachmemberof the GLBP group.Each gatewaywhichisassignedavirtual MAC addressiscalledActive Virtual Forwarder (AVF).A GLBP group onlyhasa maximumof fourAVFs.If there are more than 4 gatewaysina GLBP groupthenthe restwill become StandbyVirtual Forwarder(SVF) whichwill take the place of aAVF incase of failure.The virtual MACaddressinGLBPis 0007.b400.xxyy where xx isthe GLBP group numberandyy isthe differentnumberof eachgateway(01, 02, 03…). To detect a gateway failure, GLBP members communicate between each other through hello messages sent every 3 seconds to the multicast address 224.0.0.102, User Datagram Protocol (UDP) port 3222. GLBP supports up to 1024 virtual routers (GLBP groups) per physical interface of a router. Load balancing algorithm GLBP load sharing is done in one of three ways: Round-robin load-balancing algorithm: Each router MAC is used sequentially to respond to ARP requests. This is the default load balancing mode in GLBP and is suitable for any number of end hosts. Weighted load-balancing algorithm: Traffic is balanced proportional to a configured weight. Each GLBP router in the group will advertise its weighting and assignment; the AVG will act based on that value. For example, if there are two routers in a group and R1 has double the forwarding capacity of router B, the weighting value of router A should be configured to be double the amount of R2. Host-dependent load-balancing algorithm: A given host always uses the same router. VRRP Object tracking is the process of tracking the state of a configured object and uses that state to determine the priority of the VRRP router in a VRRP group. Unlike HSRP which can track interface status directly, VRRP can only track interface status through a tracked object. SNMP SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network. The SNMP framework has three parts:
  • 3. + An SNMP manager + An SNMP agent + A Management Information Base (MIB) The SNMP manager is the system used to control and monitor the activities of network hosts using SNMP. The most common managing system is called a Network Management System (NMS). The term NMS can be applied to either a dedicated device used for network management, or the applications used on such a device. A variety of network management applications are available for use with SNMP. These features range from simple command- line applications to feature-rich graphical user interfaces (such as the CiscoWorks2000 line of products). The SNMP agent is the software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. The agent and MIB reside on the routing device (router, access server, or switch). To enable the SNMP agent on a Cisco routing device, you must define the relationship between the manager and the agent. The Management Information Base (MIB) is a virtual information storage area for network management information, which consists of collections of managed objects. A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their purpose is merely to notify the other application that something has happened, has been noticed, etc. The big problem with TRAPs is that they’re unacknowledged so you don’t actually know if the remote application received your oh-so- important message to it. SNMPv2 PDUs fixed this by introducing the notion of an INFORM, which is nothing more than an acknowledged TRAP. Cisco IOS software supports the following versions of SNMP: + SNMPv1 – The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based on community strings. + SNMPv2c – The community-string based Administrative Framework for SNMPv2. SNMPv2c (the “c” stands for “community”) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and uses the community-based security model of SNMPv1. + SNMPv3 – Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating and encrypting packets over the network. The security features provided in SNMPv3 are as follows:
  • 4. – Message integrity: Ensuring that a packet has not been tampered with in transit. – Authentication: Determining that the message is from a valid source. – Encryption: Scrambling the contents of a packet prevent it from being learned by an unauthorized source. SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. The two additional messages are added in SNMP2 (compared to SNMPv1) GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide values for all variables in a list will send partial information. InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. NETFLOW NetFlow traditionally enables several key customer applications including: + Network Monitoring – NetFlow data enables extensive near real time network monitoring capabilities. Flow-based analysis techniques may be utilized to visualize traffic patterns associated with individual routers and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution. + Application Monitoring and Profiling – NetFlow data enables network managers to gain a detailed, time-based, view of application usage over the network. This information is used to plan, understand new services, and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively meet customer demands. + User Monitoring and Profiling – NetFlow data enables network engineers to gain detailed understanding of customer/user utilization of network and application resources. This information may then be utilized to efficiently plan and allocate access, backbone and application resources as well as to detect and resolve potential security and policy violations.
  • 5. + Network Planning – NetFlow can be used to capture data over a long period of time producing the opportunity to track and anticipate network growth and plan upgrades to increase the number of routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of network operations while maximizing network performance, capacity, and reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new network applications. NetFlow will give you valuable information to reduce the cost of operating your network. + Security Analysis – NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time. Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is also a valuable forensic tool to understand and replay the history of security incidents. + Accounting/Billing – NetFlow data provides fine-grained metering (e.g. flow data includes details such as IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly flexible and detailed resource utilization accounting. Service providers may utilize the information for billing based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may utilize the information for departmental charge-back or cost allocation for resource utilization. What isan IPFlow? Each packet thatis forwardedwithinarouterorswitchis examinedforaset of IP packetattributes. These attributesare the IPpacketidentityorfingerprintof the packetanddetermine if the packetis unique orsimilartootherpackets. Traditionally,anIPFlowisbasedon a setof 5 andup to 7 IP packetattributes. IP PacketattributesusedbyNetFlow: + IP source address + IP destinationaddress + Source port + Destinationport + Layer 3 protocol type + Classof Service + Routeror switchinterface Flowmonitorsare the Flexible NetFlowcomponentthatisappliedtointerfacestoperformnetwork trafficmonitoring.Flowmonitorsconsist of arecordand a cache. You add the recordto the flow monitorafteryoucreate the flowmonitor.The flow monitorcache isautomaticallycreatedatthe time the flowmonitorisappliedtothe firstinterface.Flow dataiscollectedfromthe networktraffic duringthe monitoringprocessbasedonthe keyandnonkeyfieldsinthe record,whichisconfigured for the flowmonitorandstoredinthe flow monitorcache. For example,the followingexample createsaflow monitornamedFLOW-MONITOR-1andenters Flexible NetFlowflow monitorconfigurationmode:
  • 6. Router(config)#flowmonitorFLOW-MONITOR-1 Router(config-flow-monitor)# etFlowfacilitatessolutionstomanycommonproblemsencounteredbyITprofessionals. + Analyze newapplicationsand theirnetwork impact IdentifynewapplicationnetworkloadssuchasVoIPorremote site additions. + Reductionin peak WANtraffic Use NetFlowstatisticstomeasure WAN trafficimprovementfromapplication-policychanges; understandwhoisutilizingthe networkandthe networktoptalkers. + Troubleshootingandunderstandingnetwork pain points Diagnose slownetworkperformance,bandwidthhogsandbandwidthutilizationquicklywith commandline interface orreportingtools. + DetectionofunauthorizedWAN traffic Avoidcostlyupgradesbyidentifyingthe applicationscausingcongestion. + Securityand anomaly detection NetFlowcanbe usedforanomalydetectionandwormdiagnosisalongwithapplicationssuchas CiscoCS-Mars. + ValidationofQoS parameters Confirmthatappropriate bandwidthhasbeenallocatedtoeachClassof Service (CoS) andthatno CoS isover- or under-subscribed. SYSLOG By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server, depending on your configuration. The process also sends messages to the console. Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use. We can configure this feature with the command logging file flash:filename. The Message Logging is divided into 8 levels as listed below: Level Keyword Description 0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist 3 errors Error conditions exist
  • 7. 4 warnings Warning conditions exist 5 notification Normal, but significant, conditions exist 6 informational Informational messages 7 debugging Debugging messages The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be displayed. For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed. ETHER CHANNEL EtherChannel Load-Balancing EtherChannel load-balances traffic among port members of the same channel. Load balancing between member interface is based on: + Source MAC address + Destination MAC address + Source IP Address + Destination IP Address + Combinations of the four Note: Some old switch/router flatforms do not support all the load-balancing methods above. To configure load-distribution method, use the command port-channel load-balance under global configuration mode. For example to load-balance based on destination MAC use the command: Router(config)#port-channel load-balance dst-mac BASIC QUESTIONS ModernEthernetnetworksbuiltwithswitchesandfull-duplex connectionsnolongerutilize CSMA/CD.CSMA/CD isonlyusedinobsolete sharedmediaEthernet (whichusesrepeaterorhub). The followinglocationscanbe configuredasa source forthe IOSimage: + Flash(the defaultlocation)
  • 8. + TFTP server + ROM(usedif noothersource isfound) When you turn the router on, it runs through the following boot process. The Power-On Self Test (POST) checks the router’s hardware. When the POST completes successfully, the System OK LED indicator comes on. The router checks the configuration register to identify where to load the IOS image from. A setting of 0×2102 means that the router will use information in the startup-config file to locate the IOS image. If the startup-config file is missing or does not specify a location, it will check the following locations for the IOS image: 1. Flash (the default location) 2. TFTP server 3. ROM (used if no other source is found) The router loads the configuration file into RAM (which configures the router). CISCO BOOT SECQUENCE
  • 9. In some seriesof routers,the RAMinformationisdisplayedby2parameters(inthiscase 60416K/5120K). The firstparameterindicateshow muchRAMis inthe routerwhile the second parameter(5120K) indicateshowmuchDRAMisbeingusedforPacketmemory. SWITCHING Microsegmentationisanetworkdesign(functionality) whereeachworkstation ordevice ona networkgetsitsowndedicatedsegment(collisiondomain) to the switch.Eachnetworkdevice gets the full bandwidthof the segmentanddoesnothave toshare the segmentwithotherdevices. Microsegmentationreducesandcaneveneliminate collisions because eachsegmentisitsown collisiondomain ->. Note:Microsegmentationdecreasesthe numberof collisions butitincreasesthe numberof collision domains. TRUNKING The showvlan commandonlydisplaysaccessports, the trunkportsare notshownin thiscommand (we can use the “showinterface trunk”commandto see trunkedports) STP SpanningTree Protocol convergence (Layer2convergence) happenswhenbridgesandswitches have transitionedtoeitherthe forwarding orblockingstate.Whenlayer2isconverged,rootbridge iselectedandall portroles(Root,DesignatedandNon-Designated) inall switchesare selected. RSTP There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are merged into the 802.1w discarding state.
  • 10. * Discarding – the port does not forward frames, process received frames, or learn MAC addresses – but it does listen for BPDUs (like the STP blocking state) * Learning – receives and transmits BPDUs and learns MAC addresses but does not yet forward frames (same as STP). * Forwarding – receives and sends data, normal operation, learns MAC address, receives and transmits BPDUs (same as STP). STP State (802.1d) RSTP State (802.1w) Blocking Discarding Listening Discarding Learning Learning Forwarding Forwarding Disabled Discarding Although the learning state is also used in RSTP but it only takes place for a short time as compared to STP. RSTP converges with all ports either in forwarding state or discarding state. RSTP Quick Summary: RSTP provides faster convergence than 802.1D STP when topology changes occur. * RSTP defines three port states: discarding, learning, and forwarding. * RSTP defines five port roles: root, designated, alternate, backup, and disabled. NAT NAT terms: * Inside local address – The IP address assigned to a host on the inside network. The address is usually not an IP address assigned by the Internet Network Information Center (InterNIC) or service provider. This address is likely to be an RFC 1918 private address. * Inside global address – A legitimate IP address assigned by the InterNIC or service provider that represents one or more inside local IP addresses to the outside world. * Outside local address – The IP address of an outside host as it is known to the hosts on the inside network. * Outside global address – The IP address assigned to a host on the outside network. The owner of the host assigns this address.
  • 11. VLAN Whena switchcannot finda destinationMACaddresslistedonitsMACAddressTable,itwill flooda frame to everysingle portexceptthe one itcame infrom – thisframe iscalledunknownunicast frame.It’sa broadcast mac addressFF:FF:FF:FF:FF:FF FRAME RELAY The PVC STATUS displays the status of the PVC. The DCE device creates and sends the report to the DTE devices. There are 4 statuses: + ACTIVE: the PVC is operational and can transmit data + INACTIVE: the connection from the local router to the switch is working, but the connection to the remote router is not available + DELETED: the PVC is not present and no LMI information is being received from the Frame Relay switch + STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled (by using the “no keepalive” command). This status is rarely seen so it is ignored in some books. In general, BECN is used on frames traveling away from the congested area to warn source devices that congestion has occurred on that path while FECN is used to alert receiving devices if the frame experiences congestion.
  • 12. BECN also informs the transmitting devices to slow down the traffic a bit until the network returns to normal state. IP ROUTING Whenthere ismore than one way to reacha destination,itwill choosethe bestone basedona couple of things.First,itwill choose the route thathasthe longestmatch;meaningthe most specific route.So,in thiscase the /24 routeswill be chosenoverthe /16 routes.Next,fromall the /24 routes it will choose the one withthe lowestadministrative distance.Directlyconnectedroutes have anAD of 1 so thiswill be the route chosen. Routers treatment with incoming packet Whereasswitchescanonlyexamineandforwardpacketsbasedonthe contentsof the MAC header, routerscan lookfurtherintothe packetto discoverthe networkforwhicha packetis destined. Routersmake forwardingdecisionsbasedonthe packet'snetwork-layerheader(such asan IPX headeror IPheader).These network-layerheaders containsource anddestination network addresses.Local devicesaddresspacketstothe router'sMAC addressinthe MAC header.After receivingthe packets,the routermustperformthe followingsteps: 1. Checkthe incomingpacketforcorruption, andremove the MAC header. The routerchecks the packetfor MAC-layererrors.The routerthenstripsoff the MAC headerandexaminesthe network- layerheadertodetermine whattodowith the packet. 2. Examine the age of the packet.The router mustensure thatthe packethas not come too far to be forwarded.Forexample,IPXheaderscontainahopcount.By default,15 hopsisthe maximum numberof hops(or routers) thata packetcan cross. If a packet hasa hopcount of 15, the router discardsthe packet.IP headerscontainaTime to Live (TTL) value.Unlike the IPXhopcount, which incrementsasthe packetisforwardedthrougheachrouter, the IP TTL value decrementsas the IP packetis forwardedthrougheachrouter.If an IPpackethas a TTL value of 1, the routerdiscardsthe packet.A routercannotdecrementthe TTL value to 1 and thenforwardthe packet. 3. Determine the route tothe destination.Routersmaintainaroutingtable thatlistsavailable networks,the directiontothe desirednetwork(theoutgoinginterfacenumber),andthe distance to those networks.Afterdeterminingwhichdirectiontoforwardthe packet,the routermustbuilda newheader.(If youwantto readthe IProutingtablesona Windows95/98 workstation,type ROUTE PRINTin the DOS box.) 4. Buildthe newMAC headerandforwardthe packet.Finally,the routerbuildsanew MACheader for the packet.The MAC headerincludesthe router'sMACaddressandthe final destination's MAC addressor the MAC addressof the nextrouterin the path.
  • 13. Syntax fordefaultroute is: iproute <Remote_Network><Netmask><Next_Hop_Address>. DHCP An addressconflictoccurswhentwohostsuse the same IP address.Duringaddressassignment, DHCP checksfor conflictsusingpingandgratuitousARP.If a conflictisdetected,the addressis removedfromthe pool.The addresswill notbe assigneduntil the administratorresolvesthe conflict. OSPF In ospf these entries must match on neighboring routers: - Hello and dead intervals – Area ID (Area 0 in this case) – Authentication password – Stub area flag
  • 14. EIGRP The followinginformationmustbe matched soas to create neighborhood. EIGRProutersto establish,mustmatchthe followinginformation: 1. AS Number; 2. K value. TROUBLESHOOTING From the output we see the Serial0/0 of RouterA is in “status up/protocol down” state which indicates a Layer 2 problem so the problem can be: + Keepalives mismatch + Encapsulation mismatch + Clocking problem IPv6 Below is the list of common kinds of IPv6 addresses: Loopback address ::1 Link-local address FE80::/10 Site-local address FEC0::/10 Global address 2000::/3 Multicast address FF00::/8
  • 15.
  • 16. Question 5 What is SNMPv3 authentication protocol? Answer: HMAC-MD5 or HMAC-SHA (Maybe either of them will appear in the exam) Question 1 Etherchannel question: You are given sw1 and sw2. The output of show etherchannel summary and show interface fa0/1. What is the cause of the problem? in exhibit, switch a cable is 100mb/s speed and b is 10mb/s. If you can look very carefully, there is speed mismatched to cause that problem. I selected “speed mismatch” Question 2 Q2 (Etherchannel Questions that goes like this) Refer to the exhibit. Etherchannel has been configured on Switch1 as shown. Switch1# conf t Switch1(config)# interface range gigabitethernet 1/1 Switch1(config)# Channel-group 5 Mode “AUTO” Switch1# Switch1(config)# interface range gigabitethernet 1/2 Switch1(config)# Channel-group 5 Mode “AUTO” Which is the correct command set to configure etherchannel on Switch2? A. Switch2# configure terminal Switch2(config)# interface range gigabitethernet3/1 -2 Switch2(config-if)# channel-group 5 mode auto B. Switch2# configure terminal Switch2(config)# interface range gigabitethemet3/1 -2 Switch2(config-if)# channel-group 5 mode passive C. Switch2# configure terminal
  • 17. Switch2(config)# interface range gigabitethernet3/1 -2 Switch2(config-if)# channel-group 5 mode desirable D. Switch2# configure terminal Switch2(config)# interface range gigabitethernet3/1 -2 Switch2(config-if)# channel-group 5 mode ACTIVE Answer: C Good resource: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_13_ea1/c onfiguration/guide/swethchl.html#wp1028480 Question 3 Which OSPF command turn OSPF on all interfaces of a router? Answer: network 0.0.0.0 255.255.255.255 Question 4 Network admin creates a layer 3 Etherchannel, bounding 4 interfaces into channel group 1. On what interface is the IP address configured? A. the port-channel 1 interface B. the highest number member interface C. all member interfaces D. the lowest number member interface Answer: A Question 5 3. What is the authentication type of SNMPv2? Answer: Community string Question 6 What parameters can be different on ports with an Etherchannel?
  • 18. A. speed B. trunk encapsulation C. DTP negotiation setting D. duplex Answer: C Question 7 Which is true about OSPF router-id? (Choose two) A. It is used for type 1 router LSA B. Highest IP address of the loopback is used C. router-id needs to be matched on ospf neighbors D. router-id is 16 bit Answer: A B