Ccna-Notes PDF
Ccna-Notes PDF
2 Static Routing 5
3 Wan Protocols 10
5 TELNET 21
6 SDM – Security
SDM – Security Device Manager 24
8 NAT – Network
NAT – Network Address Translation 31
10 RIP V2 43
11 Frame relay 50
12 Switching 59
13 Intervlan 63
16 Wireless LAN 79
17 Booting 81
Switch ON the router (if new router that is not configured it will ask -----
Router>
* User Mode/User
Mode/User Executable Mode
Mode
Router#configure
Router#configure terminal(enter)
Router(config)#
* Global Configuration Mode - Any configuration change in this mode affects the
t he
whole router.
Router(config)#interface
Router(config)#interface e 0/fastethernet
0/fastethernet 0/ S0 / S 1(enter)
Router(config-if)#
Router(config)#Line
Router(config)#Line console 0(enter)
0(enter)
Router(config-line)#password
Router(config-line)#password xxxx
Router(config-line)#login
Router(config-line)#login
Router(config)#username
Router(config)#username xxxx password xxxx
Router(config)#Line
Router(config)#Line console 0
-2-
-connect to window select com1 ok
-com1 properties window select restore default ok
Switch ON the router (if new router that is not configured it will ask -----
Router>
* User Mode/User
Mode/User Executable Mode
Mode
Router#configure
Router#configure terminal(enter)
Router(config)#
* Global Configuration Mode - Any configuration change in this mode affects the
t he
whole router.
Router(config)#interface
Router(config)#interface e 0/fastethernet
0/fastethernet 0/ S0 / S 1(enter)
Router(config-if)#
Router(config)#Line
Router(config)#Line console 0(enter)
0(enter)
Router(config-line)#password
Router(config-line)#password xxxx
Router(config-line)#login
Router(config-line)#login
Router(config)#username
Router(config)#username xxxx password xxxx
Router(config)#Line
Router(config)#Line console 0
-2-
Router(config-line)#login
Router(config-line)#login local
Router(config)#hostname
Router(config)#hostname HOR(enter)
HOR(enter)
HOR(config)#
Router(config)#service
Router(config)#service password-encryption
password-encryption
Router(config)#enable
Router(config)#enable password/secret xxxx
QUESTIONS
1 . What are
are the different modes
modes in a router?
router?
-3-
Ping A.B.C.D
o Router(config)#interface
Router(config)#interface ethernet 0/fastethernet 0/serial 0/ serial 1(enter)
o Router(config)# line console 0
Router(config-if/line)# ---------- Specific configuration mode
2 . Difference between
between Login and Login
Login Local?
o Login activates the usermode entry password for a single user without username.
o Login local activates the username and password for the same usermode, incase of
multiple users.
o Router(config)#service
Router(config)#service password-encryption
password-encryption – Encrypts all the passwords at a time. The
passwords once encrypted, cannot be decrypted by any command.
o Router(config)#Line
Router(config)#Line console 0(enter)
Router(config-line)#password
Router(config-line)#password xxxx
Router(config-line)#login
Router(config-line)#login - Login activates the usermode entry password for a single user
without username.
o Router(config)#enable
Router(config)#enable password/secret
password/secret xxxx
o Router(config)#username
Router(config)#username xxxx password xxxx
o Router(config-line)#login
Router(config-line)#login local - Login local activates the username and password for the
same usermode, incase of multiple users.
STATIC ROUTING
DTE DCE
10.0.0.1 20.0.0.1 20.0.0.2
30.0.0.1
10n/w
30 n/w
E0 S0 S0 E0
-4-
HOR BOR
R1(config)#interface e 0 R2(config)#interface e 0
R1(config-if)#ip address 10.0.0.1 255.0.0.0 R2(config-if)#ip address 30.0.0.1 255.0.0.0
R1(config-if)#no shutdown * R2(config-if)#no shutdown
R1(config)#interface s 0 R2(config)#interface s 0
R1(config-if)#ip address 20.0.0.1 255.0.0.0 R2(config-if)#ip address 20.0.0.2 255.0.0.0
R1(config-if)#no shutdown R2(config-if)#clock rate 64000
R2(config-if)#no shutdown
* All interfaces are administratively down when the router is switched on. We change their
status to up by using the command ‘no shutdown’.
** In static routing, we are manually adding the destination network to our Routing table.
Next hop address refers to the address of the next router that receives the packet and then
forwards it to the remote location.
Commands
1 . Router#show running-config
This will display the current configuration of the router.
-5-
2 . Router#show controllers serial 0
To identify the DCE & DTE ends of the Serial cable.
Outputs
Router#sh running-config
interface Ethernet0
ip address 10.0.0.1 255.0.0.0
!
interface Ethernet1
no ip address
shutdown
!
interface Serial0
ip address 20.0.0.2 255.0.0.0
clockrate 64000
!
interface Serial1
no ip address
shutdown
!
IP route 30.0.0.0 255.0.0.0 20.0.0.1
!
line con 0
line aux 0
line vty 0 4
login
!
End
Router#sh int e0
-6-
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set, keepalive set (10 sec)
Router#sh int s0
State 1 - When both no shutdown and clock rate is applied to corresponding interfaces
State 2 - When clock rate is not given on DCE end & layer 1 problem
Router#show controllers s 0
-7-
Router#show ip route
Router#sh protocols
Global values:
Internet Protocol routing is enabled
Ethernet0 is up, line protocol is up
Internet address is 10.0.0.1/8
Ethernet1 is administratively down, line protocol is down
Serial0 is up, line protocol is up
Internet address is 20.0.0.2/8
Serial1 is administratively down, line protocol is down
Questions
o Router(config)interface e 0 / s 0
-8-
Router(config-if)ip address <IP addr> <SNM>
Router(config-if)no shutdown
o The serial line has two ends DTE and DCE. This line goes up and down when IP address
and no shutdown is configured on both sides and will be in asynchronous state always. To
synchronize the link clock rate should be configured at DCE end.
o Router#sh controllers s 0
4 . Difference between
Request timed out
Destination host unreachable
Reply from <ip add> : <byte= > time<xms TTL=xxx
When the packet is lost in transition, we will get “request timed out” message.
If the host doesn’t know the route to the destination - “Destination unreachable”
message is displayed i.e., the specified address is not present in the routing table
Time To Live (TTL) – a field in an IP header that indicates the no. of routers (hops) the
packet can cross. TTL for systems is 128 and for routers it is 255. If the destination is
not reached before the TTL expires, then the packet is dropped. This stops IP packets
from continuously circling around in the network looking for a home.
WAN PROTOCOLS
-9-
E0 S0 S0 E0
Make sure you are able to ping the destination network before you configure WAN
Protocols
R1(config)#int s 0
R1(config-if)#encapsulation PPP
R1(config-if)#exit
When line protocol is not same on both routers, then the state of the link goes up and
down i.e. the encapsulation on R1 --- PPP, R2 --- HDLC.
R2(config)#int s 0
R2(config-if)#encapsulation PPP
R2(config-if)#exit
CHAP
In case of CHAP, the user password should be the same. Here 3-way handshake takes
place.
PAP
COMMANDS
1. Router#sh int s 0
- 10 -
To check the encapsulation in the serial interface
OUTPUTS
Router#sh int s0
Questions
- 11 -
o PPP – Point-to-Point Protocol
o Frame-Relay
PPP HDLC
PAP CHAP
3 . What are the advantages of using PPP encapsulation over ISDN links?
o PAP
Authentication Acknowledgement
HOR BOR
When the username and password are matched in the HOR Database, BOR is allowed.
o CHAP
Challenge
Response
Success / Failure
- 12 -
Packet + Hash Function =Message Digest
1. MD 5 is one-way process.
2. It is always constant.
3. A small change will result in a big change in MD.
5 . What command would you enter to display the CHAP authentication as it occurs in
real time?
o CHAP is more secure than PAP as the password is encrypted here using MD5,
while in PAP the clear text password is sent over the link.
7 . The output shown below was taken from two directly connected routers. Based on the
output of these two routers, What happen when the below command Router#show interface
serial 0 is entered?
Corp#show running-config
!
Isdn switch-type basic-5ess
Username Remote password cisco
!
interface s0
ip address 192.168.0.1 255.255.255.0
encapsulation ppp
Remote#show running-config
!
Isdn switch-type basic-5ess
Username Corp password Cisco
!
interface s0
ip address 192.168.0.2 255.255.255.0
encapsulation ppp
ppp authentication chap
o The passwords in the username do not match, so the link will not come up and the line
protocol will be down, which would make LCP closed. Both the usernames and the
passwords are case sensitive.
- 13 -
DCE DTE
10.0.0.1 20.0.0.1 20.0.0.2
30.0.0.1
10 n/w E0 S0 S0 E0
30 n/w
HOR BOR
RIP
IGRP
* In RIP, we specify only those networks that belong to us. RIP sends routing table updates to
its neighbors for every 30secs. RIP uses hop count as a unit of metric. The administrative distance
of RIP is 120
** IGRP uses autonomous number system. Here, only the networks that come under the same
autonomous system number will communicate with each other. Autonomous number is provided
by ISP. (By default, networks in different Autonomous system will not communicate, for different
Autonomous systems to communicate redistribution should be done - CCNP concept).
IGRP sends updates for every 90secs and uses bandwidth and delay as unit of metric. IGRP has
an administrative distance of 100
- 14 -
Time Intervals RIP IGRP
Update Interval 30 90
Commands
1 . Router#debug ip rip
It shows the updates sent to the neighbor routers for every 30 sec.
2. Router#Clear ip route *
This allows the routing table to switch to the new updates by clearing the old entries.
5 . Router#debug ip routing
Displays the dynamic changes made in the routing table
Outputs
- 15 -
Router#debug ip rip
- 16 -
Router#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
U - per-user static route, o - ODR
Gateway of last resort is not set
C 20.0.0.0/8 is directly connected, Serial0
C 10.0.0.0/8 is directly connected, Ethernet0
R 30.0.0.0/8 [120/1] via 20.0.0.1, 00:00:06, Serial0
E:\ftp 30.0.0.10
connected to 30.0.0.10
220 mohan Microsoft FTP service <version 5.0>.
user <30.0.0.10:<none>>:anonymous
331 Anonymous access allowed, send identity <e-mail name> as password.
Password:
230 Anonymous user logged in
ftp> dir
200 PORT command successful.
150 Opening ASCII mode data connection for /bin/ls.
09-17-07 07:41PM 26 Frame.txt
09-17-07 07:41PM 9 Igrp.txt
09-17-07 07:41PM 32 Isdn.txt
09-17-07 07:40PM 10 Rip.txt
226 Transfer complete.
ftp:247 bytes received in 0.00seconds 284000.00kbytes/sec.
ftp>get frame.txt
200 PORT command successful.
226 Transfer complete.
ftp:28 bytes received in 0.00seconds 26000.00kbytes/sec.
ftp>bye
Questions
- 17 -
1. Difference between Static Routing & Dynamic Routing?
o In static routing, we are manually adding the destination network to our Routing table.
Uses autonomous number system. Does not use autonomous number system.
Sends updates for every 90secs. Sends updates for every 30secs.
Bandwidth, delay and distance as a unit of Hop count as a unit of metric.
metric.
Update Interval 30 90
- 18 -
Distance-vector routing protocols sends routing table updates at regular intervals to keep
track of any changes in the Internetwork. Routing loops can occur when a network outage happens
and no router is updated with the change in routing table.
Ra Rb Rc Re
Rd
o Assume that the first update has been received by every router and now they are in the due
of 29sec.
o Now, the interface to Network 5 is down and also all routers know about Network 5.
Then Re prompts Rc to stop routing to Network 5 through it. But Ra, Rb and Rd don’t
know about Network 5 yet, so they keep sending the updates.
o Rc will be sending its update and cause Rb to stop routing to Network 5, but Ra and Rd
are not updated. To them, it appears that Network 5 is still available through Rb.
o Ra will continue to send its updates for every 30secs and unfortunately Rb and Rd
receives a message that Network 5 can be reached from Ra. So Rb and Rd sends the
information that Network 5 is available.
o Any packet destined for Network 5 will go from Ra to Rb and then back to Ra. This leads
to a routing loop.
Split horizon:
Split horizon defines that the routing information cannot be sent back in the direction from
which it was received i.e., the routing protocol determines which interface a network route was
learned on and it won’t advertise the route back to that same interface.
Route poisoning:
- 19 -
This helps to avoid routing loops in a meshed structure even if split horizon works out. E.g.
when Network 5 goes down, Re initiates route poisoning by advertising Network 5 as 16 hops or
unreachable, this poisoning of the route to Network 5 keeps Rc from being susceptible to
incorrect updates about the route to Network 5. When Rc receives a route poisoning from Re; it
sends an update, called “Poison reverse” back to Re. This ensures all routes on the segment have
received the poisoned route information.
5. You type “debug ip rip ” on your router console and see that 172.16.10.0 is being
advertised to you with a metric of 16. What does this mean?
6. What command is used to stop RIP routing updates from exiting out an interface but still
receive RIP route updates?
o Router(config-router)#passive-interface s0
7. A network that is advertised by both RIP and IGRP appears in the routing table flagged
as an IGRP route. Why is the RIP route to this network not used in the routing table?
8. Which parameters does IGRP use to find out the best path to a remote network?
o Router#debug ip rip
TELNET
- 20 -
10.0.0.1 20.0.0.1 20.0.0.2 30.0.0.1
10 n/w 20 n/w 30
n/w
Make sure you are able to ping the destination network before you configure WAN
Protocols
R1#telnet 20.0.0.2
R1>telnet 20.0.0.2
R2>enable
%No password set
R2>exit
R1# ----------- Will disconnect the session.
Commands
- 21 -
1. R1#sh sessions - To display the sessions opened by a particular user.
Version :
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-IS-L), Version 12.3(13), RELEASE SOFTWARE
(fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2005 by cisco Systems, Inc.
Compiled Thu 10-Feb-05 11:49 by ssearch
advertisement version: 2
Outputs
Router#sh sessions
- 22 -
Conn Host Address Byte Idle Conn Name
1 20.0.0.1 20.0.0.1 0 0 20.0.0.1
* 2 20.0.0.1 20.0.0.1 0 0
Router#sh users
- 23 -
Security Device Manager (SDM) is a web-based device-management tool for Cisco
routers that can simplify router deployments by allowing us to manage and troubleshoot complex
network and connectivity issues and also supports a wide range of Cisco IOS Software releases to
set up advanced configurations. It is used to configure a router through a HTTP service. To do
this make sure your router is configured with atleast one ip address on a LAN interface and
connects a host to the router.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int f0/0
Router(config-if)#ip address 1.1.1.1 255.255.255.0
Router(config-if)#no shut
From here, you just open a browser & type http://1.1.1.1, SDM gets loaded and open a window.
Clicking the Configure button at the top of the page, choose the type of interface we want to
configure and then click the Create New Connection button at the bottom of the page (fig.1a). This
opens the LAN or WAN wizard, depending on which interface we chose to configure. By clicking
the Edit Interface/Connection tab, you get to see your interface status. (fig.1b).
- 24 -
Fig.1a
Fig.1b
You can double-click to edit that particular interface. Click on the Additional Tasks Button at the
bottom left portion and then select Router properties icon. Here, you can set the hostname, MOTD
banner, and enable secret password.
You can also create a DHCP pool on your router. Click on the DHCP folder, then the DHCP pool
icon and then click Add button.
Questions
- 25 -
1. Difference between exit and using ctrl+shift+6 x?
Show sessions will show the sessions we opened by telnet ting to the corresponding
Destinations.
Show users will show the sessions opened by other destinations to us.
A and E
th
4. What happens if we try to open a 6 session to a destination?
th
If 6 session is opened an error message is displayed.
5. What are two reasons a network administrator would use CDP? (Choose two.)
D and E
- 26 -
In Out
R R
E0 S0 S0 E0
Out In
LAN1
LAN2
30.0.0.0
10.0.0.0
An access list is a list of conditions that classify the packets (or) the packet definition).
Unauthorized access can be blocked by using access list. These lists can be used to
control the traffic passing through the router. Following are different types of access lists.
Action, ACL number, Source IP, SWCM (Source Wild Card Mask) are the parameters to
be considered while configuring standard ACL which considers only the source address when rules
are defined and to be checked.
Syntax:
Once you have defined the access-list, binding should be done at the interface
required (E0 or S0).
For an interface at any time there are maximum of two binding (in and out).
R1(config)#int e 0 / s0
R1(config-if)#ip Access-group 5 in/out
For binding we consider two directions: In & Out. This specifies the direction in which the
data packets are moving with respect to the Router.
Action, ACL number, Source IP, SWCM (Source Wild Card Mask), Destination IP, DWCM,
Protocol, interface and the destination port number are the parameters considered while
configuring Extended ACL.
- 27 -
Syntax:
R1(config)#Access-list<AlNo><Action><protocol><SIP><SWCM><DIP><DWCM>eq
<PORT No./Name>
Syntax:
R1(config)#Access-list<AlNo><Action><protocol><SIP><SWCM><DIP><DWCM>eq
<PORT No./Name>log
R1(config)#Access-list 101 deny TCP 10.0.0.10 0.0.0.0 30.0.0.10 0.0.0.0 eq ftp log
Log - gives information about the port no of source, number of packets send, number of
matches made etc.,
Standard
Extended
R1(config-ext-nacl)#<Action><protocol><SIP><SWCM><DIP><DWCM>eq<PORT
No./Name>
R1(config-ext-nacl)#deny TCP 10.0.0.10 0.0.0.0 30.0.0.10 0.0.0.0 eq www
R1(config-ext-nacl)#permit TCP 10.0.0.10 0.0.0.0 30.0.0.10 0.0.0.0 eq telnet
R1(config-ext-nacl)#deny ICMP any any
- 28 -
Command
1 . Show access-lists
This displays all the access lists created.
Output
Router#sh access-lists
Extended access-list 123
10 deny tcp host 10.0.0.10 host 30.0.0.10 eq telnet
Questions
o Standard Access Lists - Standard access list considers only the source address.
Deny/Permit actions are applied on the source address. Once the access list is defined,
binding can be done at any one of the interface (Ethernet or serial).
o Extended Access Lists - This considers source address, Destination address, protocol,
destination ports etc .In Extended access list we can specify the applications that are to be
permitted or denied from the source to destination.
o Named Access Lists - As the name suggests, we can define an access list using a
name instead of number wherein we can modify (or delete) the list by individual
conditions which is not possible in the numbered lists.
o In numbered access lists, if we try to delete an individual statement from the access list,
the whole list will be deleted. In named access lists, we can edit the list by individual
statement.
o Router(config-line)# access-class 10 in
5 . Which single access list statement will combine all four of these statements into a
- 29 -
single statements that will have exactly the same effect?
6 . If you want to deny all Telnet connections to the network 192.168.10.0, which
Command will you use?
7 . What are the possible ways to refer to a host 172.16.30.55 in an IP access list?
o 172.16.30.55 0.0.0.0
o host 172.16.30.55
8 . Which access lists will allow only HTTP traffic into network 196.15.7.0?
o Router(config)#interface ethernet 0
o Router(config-if)#ip access-group 110 in
- 30 -
NETWORK ADDRESS TRANSLATION (NAT)
20.0.0.2
R
Private
10.0.0.10 Public
30.0.0.20
2. Pool NAT
3. Static NAT
* Router translates source addresses reaching inside (say e0) if it matches the list, to the same
public address at serial interface.
** Router translates source addresses reaching inside (say e0) if it matches the list, from the range
of addresses mentioned in the pool.
*** When a packet comes from 10.0.0.10 through inside source, then source is always translated
to only one address (20.0.0.5) and vice versa.
- 31 -
Commands
OUTPUTS
Router#debug ip nat
IP NAT debugging is on
Router#
01:10:59: NAT*: s=10.0.0.10->20.0.0.5, d=30.0.0.1 [205]
01:10:59: NAT*: s=30.0.0.1, d=20.0.0.5->10.0.0.10 [205]
01:11:00: NAT*: s=10.0.0.10->20.0.0.5, d=30.0.0.1 [206]
01:11:00: NAT*: s=30.0.0.1, d=20.0.0.5->10.0.0.10 [206]
- 32 -
Questions
1. What is NAT?
Network Address Translation involves re-writing the source and destination address
of packets as they pass through a router. NAT is done in order to enable multiple hosts on
a private network to access the Internet using a single public IP address.
2. What does the Inside Global address represent in the configuration of NAT?
Access-list defines the range of the hosts that can access the global address.
4. A network technician at Mohans would like to implement NAT in the network shown
in the exhibit. Inside hosts are allowed to use a private addressing scheme. Where NAT
should be configured?
R3 R2 R1
Internet
5 . Type of NAT that utilizes different ports to map multiple IP addresses to a single globally
registered IP address?
Overloading
6. What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5
172.35.16.5?
It creates a global address pool for all outside NAT transactions.
It establishes a dynamic address pool for an inside static address.
It creates dynamic source translations for all inside local PAT transactions.
It creates a one-to-one mapping between an inside local address and an inside
global address.
D
- 33 -
7. What flavor of Network Address Translation can be used to have one IP address
allow many users to connect to the global Internet?
NAT
Static
Dynamic
PAT
Overloading
E
A,C and E
- 34 -
OSPF & EIGRP
OSPF
R1(config)#router OSPF 15
R1(config-router)#network 10.0.0.0 0.255.255.255 area 0
R1(config-router)#network 20.0.0.0 0.255.255.255 area 0
R2(config)#router OSPF 12
R2(config-router)#network 30.0.0.0 0.255.255.255 area 0
R2(config-router)#network 20.0.0.0 0.255.255.255 area 0
Between two OSPF routers the process-ids need not be the same
EIGRP
The autonomous system numbers should be the same while communicating between
EIGRPs
- 35 -
Loop back interface
It’s a logical interface i.e., not a real router interface. When the Router ID of a router-
interface with the highest address, goes up and down, re-election for the new DR will not get
completed. Loop back interface resolves this problem, as it never goes down & router id never
changes.
LSA LSA
LSA
Here,
Information of Ra is not sent to Rc
Information of Rc is not sent to Ra
But Rb knows about Ra and Rc
R R
- 36 -
Commands
OSPF
EIGRP
- 37 -
OUTPUTS
- 38 -
Questions
Sl.
No OSPF EIGRP
1 Link state. Hybrid(DV + LS).
10 Uses Dijsktra algorithm to find the best Uses DUAL (Diffusing Update
path (Shortest path). Algorithm) is used to find the best path.
- 39 -
Backbone Router
Switch
3. How OSPF works out? ABR
Area 1
Area
1
ABR
Area 0
ABR
Area 3 Area 2
AS 200
Area 1
ABR – Area Border Router.
ASBR – Autonomous System Border Router.
AS – Autonomous System.
OSPF is designed to have a hierarchical structure as large networks are a bit difficult to
manage. This allows to decrease routing overhead and to confine n/w instability to single
area of n/w.
OSPF must have an area 0 (backbone area) and all routers should connect to this area. But
routers (i.e., ABRs) that connect other areas to backbone area should have at least one
interface connecting to area 0.
4. Show commands that will display the state of the OSPF DR/BDR election process?
- 40 -
5. Which command will display all the EIGRP feasible successor routes known to a router?
6. When designing OSPF networks; what is the purpose of using a hierarchical design?
To speed up convergence
To confine network instability to single areas of the network
To reduce routing overhead
7. If routers in a single area are configured with the same priority value, what value does a
router use for the OSPF Router ID?
8. Which one of the following EIGRP commands can check the IP addresses of the
adjacent neighbors?
10. With which network type will OSPF establish router adjacencies but not perform the
DR/BDR election process?
Point-to-point
o A
- 41 -
Router(config)# router ospf 1
Router(config-router)#network 10.0.0.0 255.0.0.0 area 0
But still he can’t see any routes in the routing table. What configuration error did the
administrator make?
The wildcard mask is incorrect. The wildcard should have been 0.255.255.255.
13 . Which EIGRP information is held in RAM and maintained through the use of
Hello and update packets?
Neighbor table
Topology table
o A
- 42 -
10.0.0.1 20.0.0.1 20.0.0.2 30.0.0.1
R R
10.0.0.0 30.0.0.0
E0 S0 S0 E0
Here the command ‘version 2’ is added to the RIP protocol to change it to RIPv2.
R2(config)#Key chain XYZ
R2(config-keychain)#key 2
R2(config-keychain-key)#key-string 123
The Key identifier and the Key-string should be same on the both end routers.
R1(config)#int s0
R1(config-if)#ip rip authentication key-chain ABC
R1(config-if)#ip rip authentication mode text / md5
R2(config)#int s0
R2(config-if)#ip rip authentication key-chain XYZ
R2(config-if)#ip rip authentication mode text / md5
Text and md5 are the two authentication methods used in RIPv2. By default RIPv2
can send & receive only version 2 updates. RIPv2 also allows sending and receiving
version 1 updates on any of the interface.
R1(config)#int s0
R1(config-if)#ip rip send / receive version 1 2
R2(config)#int s0
R2(config-if)#ip rip send / receive version 1 2
RIP version 2 has all its characteristics same as RIPv1 except some changes.
- 43 -
Difference between Routing Protocols:
Metric Hop count Bandwidth & Cost Bandwidth & Hop count
Delay Delay
Sends Routing table Routing table Link state Routing table Routing
updates updates advertiseme updates table
nt updates
Outputs
- 44 -
After RIPv2 is configured on both the routers
Router#debug ip rip
RIP protocol debugging is on
Router#
RIP: sending v2 update to 224.0.0.9 via Ethernet0/0 (10.0.0.1)
RIP: build update entries
20.0.0.0/8 via 0.0.0.0, metric 1, tag 0
30.0.0.0/8 via 0.0.0.0, metric 2, tag 0
RIP: sending v2 update to 224.0.0.9 via Serial0/1 (20.0.0.1)
RIP: build update entries
10.0.0.0/8 via 0.0.0.0, metric 1, tag 0
RIP: received v2 update from 20.0.0.2 on Serial0/1
30.0.0.0/8 via 0.0.0.0 in 1 hops
RIPv2 on one router & the other end is configured with RIPv1
Router#debug ip rip
RIP protocol debugging is on
Router#
RIP: sending v2 update to 224.0.0.9 via Serial0 (20.0.0.2)
RIP: build update entries
30.0.0.0/8 via 0.0.0.0, metric 1, tag 0
RIP: sending v2 update to 224.0.0.9 via Ethernet0 (30.0.0.1)
RIP: build update entries
10.0.0.0/8 via 0.0.0.0, metric 2, tag 0
20.0.0.0/8 via 0.0.0.0, metric 1, tag 0
RIP: ignored v1 packet from 20.0.0.1 (illegal version)
Router#debug ip rip
RIP protocol debugging is on
Router#
RIP: sending v1 update to 255.255.255.255 via Ethernet0/0(30.0.0.1)
RIP: build update entries
network 10.0.0.0 metric 2
network 20.0.0.0 metric 1
RIP: sending v1 update to 255.255.255.255 via Serial0/1 (20.0.0.2)
RIP: build update entries
network 30.0.0.0 metric 1
RIP: received v2 update from 20.0.0.1 on Serial0/1
10.0.0.0/8 via 0.0.0.0 in 1 hops
Router#show ip protocols
Routing Protocol is "rip"
- 45 -
Sending updates every 30 seconds, next due in 21 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Redistributing: rip
Default version control: send version 2, receive version 2
Interface Send Recv Triggered RIP Key-chain
Ethernet0/0 2 2
Serial0/1 2 2
Routing for Networks:
20.0.0.0
30.0.0.0
Routing Information Sources:
Gateway Distance Last Update
20.0.0.1 120 00:00:03
Distance: (default is 120)
[ By default RIPv2 can send & receive only version 2 updates ]
Router#debug ip rip
RIP protocol debugging is on
Router#
RIP: sending v2 update to 224.0.0.9 via Ethernet0 (30.0.0.1)
RIP: build update entries
10.0.0.0/8 via 0.0.0.0, metric 2, tag 0
20.0.0.0/8 via 0.0.0.0, metric 1, tag 0
RIP: received packet with text authentication abc
RIP: received v2 update from 20.0.0.1 on Serial0
10.0.0.0/8 via 0.0.0.0 in 1 hops
RIP: sending v2 update to 224.0.0.9 via Serial0 (20.0.0.2)
RIP: build update entries
30.0.0.0/8 via 0.0.0.0, metric 1, tag 0
Router#debug ip rip
RIP protocol debugging is on
Router#
RIP: sending v2 update to 224.0.0.9 via Serial0 (20.0.0.2)
RIP: build update entries
30.0.0.0/8 via 0.0.0.0, metric 1, tag 0
RIP: sending v2 update to 224.0.0.9 via Ethernet0 (30.0.0.1)
RIP: build update entries
10.0.0.0/8 via 0.0.0.0, metric 2, tag 0
20.0.0.0/8 via 0.0.0.0, metric 1, tag 0
- 46 -
10.0.0.0/8 via 0.0.0.0 in 1 hops
Different Authentication modes on both ends i.e., md5 authentication on one end &
text on the other end.
Router#debug ip rip
RIP protocol debugging is on
Router#
RIP: ignored v2 packet from 20.0.0.1 (invalid authentication)
RIP: sending v2 update to 224.0.0.9 via Ethernet0 (30.0.0.1)
RIP: build update entries
20.0.0.0/8 via 0.0.0.0, metric 1, tag 0
RIP: sending v2 update to 224.0.0.9 via Serial0 (20.0.0.2)
RIP: build update entries
30.0.0.0/8 via 0.0.0.0, metric 1, tag 0
Questions
- 47 -
It has the same maximum hop count as version 1
It uses broadcasts for its routing updates
It is a classless routing Protocol
It has a lower administrative distance than RIPv1
It supports authentication
Broadcast
Multicast
Unicast
o Multicast
4. The network shown in the exhibit is running the RIPv2 routing protocol. The
fastEthernet0/0 interface on R1 goes down. In which two ways will the routers in this
network respond to this change? (Choose two.)
A. All routers will reference their topology database to determine if any backup routes
to the 192.168.1.0 network are known.
- 48 -
B. Routers R2 and R3 mark the route as inaccessible and will not accept any further
routing updates from R1 until their hold down timers expire.
D. When router R2 learns from R1 that the link to the 192.168.1.0 network has been
lost, R2 will respond by sending a route back to R1 with an infinite metric to the
192.168.1.0 network.
o C and D
o The above output depicts that the other end router is using RIPv1 and the routing
protocol used on this router is RIPv2. As RIPv2 cannot receive version 1 by default, it is
ignoring version1 packets sent by the router that is configured with RIPv1
R IPv1
Frame Relay
- 49 -
X X
HO hor bor HO
Frame-relay switch
Y Y
Frame relay connections are often given a Committed Information Rate (CIR)
(CIR) and an allowance
of burstable bandwidth known as the Extended Information Rate (EIR).
of burstable (EIR ). The provider guarantees
that the connection will always support the CIR rate, and sometimes the EIR rate. Frames that are
sent in excess of the CIR are marked as " discard eligible"
eligible" (DE) which means they can be dropped
when congestion occurs within the frame relay network. Frames sent in excess of the EIR are
dropped immediately.
Congestions in the network are reported by
1. FECN=Forward
FECN=Forward Explicit Congestion Notification bit
2. BECN=Backward
BECN=Backward Explicit Congestion Notification bit
3. DE=Discard
DE=Discard Eligibility bit provides the network with a signal to determine which
frames to be discarded, when there is a congestion on the line. The Frame-relay
switch will discard frames with a DE value of 1 before discarding other frames.
R(config)#int
R(config)#int s 0
R(config)#encapsula
R(config)#encapsulation
tion frame-relay
// Defining
// Defining the wan protocol
Once Encapsulation Frame-relay is given, serial interface requests the Frame-relay switch for
the LMI type it uses and accordingly it changes. Then a DLCI is allocated to the l ink by the
Frame Relay Switch. Then inverse arp maps destination ip address to the link’s DLCI No.
.
- 50 -
R3
S0 s1
100 200
20.0.0.1 20.0.0.2
R1 R2
R(config)#int S 0
R(config-if)#frame-relay map ip 20.0.0.2 100 broadcast
Frame-relay mapping can be used in partially meshed topology or Hub & Spoke. If R1
wants to communicate with R2, which is not directly connected, we map R1 to R2 through the
source DLCI number i.e, 100.
Point-to-point (Sub-interface)
R3
Frame Switch
100 200
R1 R2
We can have multiple virtual circuits on a single serial interface, treating each and every
single virtual circuit as a separate interface. This is achieved by creating sub interfaces in a Frame
Relay network to avoid split horizon issues from preventing routing updates. We can configure
separate sub interfaces for each PVC with a unique DLCI and subnet assigned to the sub interface.
. R3(config)#int S 0
R3(config-if)#no ip address
R3(config-if)#exit
R3(config)#int S 0.5 point-to-point
// logically dividing the physical interface
R3(config-subif)#ip address 20.0.0.1 255.0.0.0
// Assigning the IP address to the sub-interface
R3(config-subif)#frame-relay interface-DLCI 100
- 51 -
Lab Setup :
S1 Frame switch S0
DCE DCE
20 .0.0.1 20.0.0.2
DTE S0 S0 DTE
E0 E0
HOR BOR
Step : 1
Frsw(config)#int S 0
Frsw(config-if)#encapsulation frame-relay *
Frsw(config-if)#frame-relay intf-type dce **
Frsw(config-if)#frame-relay route 100 int S 1 200 ***
Frsw(config-if)#clock rate 64000
Frsw(config-if)#no shutdown
Frsw(config)#int S 1
Frsw(config-if)#encapsulation frame-relay
Frsw(config-if)#frame-relay intf-type dce
Frsw(config-if)#frame-relay route 200 int S 0 100
Frsw(config-if)#clock rate 64000
Frsw(config-if)#no shutdown
Step : 2
HOR(config)#int s0 BOR(config)#int s0
HOR(config-if)#encapsulation frame-relay BOR(config-if)#encapsulation frame-relay
- 52 -
Step : 3
Step : 4
HOR(config)#int s0 BOR(config)#int s0
HOR(config-if)#no frame-relay inverse-arp BOR(config-if)#no frame-relay inverse-arp
HOR(config-if)# ^z BOR(config-if)# ^z
HOR#clear frame-relay-inarp BOR#clear frame-relay-inarp
This will remove the dynamic address resolution done by Frame Relay Switch
HOR(config)#int s0
HOR(config-if)#frame-relay map ip 20.0.0.2 100 broadcast *
BOR(config)#int s0
BOR(config-if)#frame-relay map ip 20.0.0.1 200 broadcast
* Here we are mapping Branch office IP address to the Head office DLCI number manually. If
dynamic routing protocols are used, we use the keyword ‘broadcast’ .
Step : 5
Step : 6
- 53 -
Creating Sub-interface
HOR(config)#int s0
HOR(config-if)#no ip address
HOR(config-if)#exit
HOR(config)#int s0.100 point-to-point
HOR(config-subif)#ip address 20.0.0.1 255.0.0.0
HOR(config-subif)#frame-relay interface-dlci 100
BOR(config)#int s0
BOR(config-if)#no ip address
BOR(config-if)#exit
BOR(config)#int s0.200 point-to-point
BOR(config-subif)#ip address 20.0.0.2 255.0.0.0
BOR(config-subif)#frame-relay interface-dlci 200
Commands
Outputs
LMI Statistics for interface Serial0 (Frame Relay DTE) LMI TYPE = CISCO
Invalid Unnumbered info 0 Invalid Prot Disc 0
Invalid dummy Call Ref 0 Invalid Msg Type 0
Invalid Information ID 0 Invalid Report IE Len 0
Num Status Enq. Sent 13 Num Status msgs Rcvd 9
- 54 -
PVC Statistics for interface Serial0 (Frame Relay DTE)
Active Inactive Deleted Static
Local 1 0 0 0
Switched 0 0 0 0
Unused 0 0 0 0
DLCI = 200, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0
Questions
- 55 -
1 . What is frame-relay?
o Inverse ARP helps to map destination IP address to local DLCI number at the frame Switch
o ARP helps to get the MAC address from the corresponding IP address.
o RARP helps to get the IP address from the corresponding MAC address
o The DLCI serves to identify the virtual connection so that the receiving end knows which
information connection a frame belongs to.(Range=16 to 1007). This helps in Layer 2
identification.
5 . You are troubleshooting a frame relay connection and wish to view the LMI traffic status.
Which command should you issue?
6 . When setting up Frame Relay for point-to-point subinterface, what should not
be configured?
- 56 -
router. Which command will prepare the WAN interface of the router for this
connection?
8 . How should a router that is being used in a Frame Relay network be configured to
avoid split horizon issues from preventing routing updates?
o Configure a separate subinterface for each PVC with a unique DLCI and subnet
assigned to the subinterface.
o The mapping between DLCI 100 and the end station IP address 20.0.0.2 was learned
through Inverse ARP
11. By looking at the graphic below, what functions does the Frame Relay DLCI provide
with respect to Router A?
o Router A would use DLCI 100 to get to the RouterB networks. RouterB would use DLCI
200 to get to the Router A networks.
12 . What does the STATUS=ACTIVE refers to in the output of the show frame-relay
- 57 -
pvc command?
o Active state - Indicates that the connection is active and that routers can exchange data.
This is the state of an operational Permanent virtual Connection
o Non-broadcast multi-access
SWITCHING
- 58 -
Trunk Port
Trunk Link
Switches
Hosts Access Link
Switch(config)#int f 0/1
Switch(config-if)#switchport access vlan 3 // allocating ports to vlan
Switch(config-if)#exit
Switch(config)#int f 0/2
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
- 59 -
** Switch(config)#int f 0/24
Switch(config-if)#switchport mode trunk // creating the trunk port
Switch(config-if)#exit
By default, trunk port of the switch is in VLAN1. So this port should be configured as
trunk port to carry all Vlan information.
Domain Name
Switch(config)#VTP server/client/transparent
Commands
- 60 -
1. Switch#sh MAC-address-table
Displays the MAC address of the device and the corresponding port nos. to which
the devices are connected.
2. Switch#sh vlan
Displays the vlan information including port nos. that are in use, existing vlans &
which port belongs to which vlan.
4. Switch#sh spanning-tree
Displays priority, Root ID, Bridge ID, Mac address, Root Bridge
- 61 -
OUTPUTS
Switch#sh vlan
Switch#sh spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0014.a845.7280
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Intervlan Routing
- 62 -
By default, only hosts that are within the same VLAN can communicate. To allow inter-VLAN
communication, we need a router or a layer 3 switch.
Router
f 0/0 f 0/1
f 0/4 f 0/9
Switch
PC 1 PC 2
f 0/3 f 0/8
Configuring Switch
Switch(config)#vlan 2 Switch(config)#vlan 3
Switch(config-vlan)#name Fin Switch(config-vlan)#name mktg
Allocating Ports
Configuring Router
Router(config)#int f0/0
Router (config-if)#ip add 10.1.0.1 255.255.0.0
Router (config-if)#no shutdown
Router(config)#int f0/1
Router (config-if)#ip add 10.2.0.1 255.255.0.0
Router (config-if)#no shutdown
- 63 -
Intervlan communication using single fast Ethernet interface of the Router is achieved by
creating sub interfaces.
Router
f 0/0
f 0/5
PC 1 f 0/3 f 0/8 PC 2
Configuring Switch
Switch(config)#vlan 2 Switch(config)#vlan 3
Switch(config-vlan)#name Fin Switch(config-vlan)#name mktg
Allocating Ports
Switch(config)#int f0/5
Switch(config-if)#switchport mode trunk
Configuring Router
Router(config)#int f0/0
Router (config-if)#no ip address
Router (config-if)#no shutdown
Router (config-if)#exit
Router(config)#int f0/0 .1
Router(config-subif)#encapsulation dot1q <vlan no.>
Router(config-subif)#encapsulation dot1q 2
Router(config-subif)#ip add 10.1.0.1 255.255.0.0
Router(config)#int f0/0 .2
Router(config-subif)#encapsulation dot1q <vlan no.>
Router(config-subif)#encapsulation dot1q 3
Router(config-subif)#ip add 10.2.0.1 255.255.0.0
- 64 -
Questions
Switch Hub
o Store & forward-- stores the frame, checks for the errors and forwards only the error
free frames.
o Fragment free – is also called as Modified Cut-through. The minimum ip packet size
st
is of 64 bytes. The 1 64 bytes of frame is checked for errors, where this 64 bytes
include the frame header, Destination MAC add (DMAC), Source MAC add (SMAC)
and some data. So, if these 64 bytes seem to be a good frame set then it is forwarded or
else it dumps the packets.
3 . Facts of Vlans
o Systems are connected to the switch through the access link and the switches are
connected each other through the trunk links.
- 65 -
5 . Different Operating modes in switch?
o Server — By default, all switches are in Server mode.Vlans can configured in created in
this mode.
o Transparent — will not take any condition; it just forwards the conditions to the other
switches.
o Spanning-tree Protocol is been run to avoid the routing loops in a switched network. It
elects the Root Bridge and the Non-Root Bridge with the help of bpdu. The one with the
lesser bpdu will be elected as the Root Bridge. Root Bridge will be having every port in
forwarding mode of a frame on interface.
7 . What does a switch do when it receives a frame on interface and destination address is
unknown?
o It floods the network with the frame looking for the device
o Blocking: It won’t forward frames, pr event looping and by defaults all ports are blocked.
o Listening: Listens no loop has formed on N/W before passing frame.
o Learning: Listens and learns all paths in the N/W and updates MAC table.
o Forwarding: Sends and receives frames.
o Disabled: Does not participate in forwarding frame.
o Address Learning: Learns the source hardware/Mac address of each frame received and
stores it in MAC address table.
o Loop Avoidance: When more connection are made on switch for redundancy, BC loops
occur. Spanning-tree Protocol is used to stop BC loops.
- 66 -
10 . What is the result of segmenting a network with a switch?
o It increases the number of collision domains and will be smaller collision domains
11 . What will occur if two Cisco LAN switches are connected with a single crossover cable?
o The switch port link lights will be green, indicating normal operation.
12 . What are the three distinct functions of layer 2 switching that increase available
bandwidth on the network?
Address learning
Forwarding and filtering
Loop avoidance
o A
13 . What technology is used by Catalyst switches to resolve topology loops and ensure that
data flows properly through a single network path?
14 . Your core switch needs to be set as the root bridge of your network. What will make our
core switch the root bridge?
16 . Which LAN switch type waits for the collision window to pass before looking up the
destination hardware address in the MAC filter table and forwarding the frame?
o Fragment Free looks at the first 64 bytes of a frame to make sure a collision does not
occur. It is sometimes referred to as modified cut-through.
17 . When a new trunk link is configured on an IOS-based switch, which VLANs are allowed
over the link?
18 . What VTP mode allows you to change VLAN information on the switch?
o Server
- 67 -
19 . These two switches are not sharing VLAN information. From the output below,
what is the reason. why these switches are not sharing VTP messages?
o Three
- 68 -
VIRTUAL PRIVATE NETWORK (VPN)
A virtual private network (VPN) allows the creation of private networks across the
Internet. VPNs are used daily to give remote users and disjointed networks connectivity over a
public medium like the Internet instead of using more expensive permanent means.
- 69 -
Questions
1. What are the two security appliances that can be installed in a network? (choose 2)
o B and E
Remote access VPNs allow remote users like telecommuters to securely access the corporate
network wherever and whenever they need to.
Site-to-site VPNs or intranet VPNs, allow a company to connect its remote sites to the
corporate backbone securely over a public medium like the Internet instead of requiring more
expensive WAN connections like Frame Relay.
3. To provide security in your VPN tunnel, what protocol suite would you use?
o IPSec
IPSec is an industry-wide standard suite of protocols and algorithms that allows for secure
data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI
model.
4. Which of the following describes the creation of private networks across the Internet,
enabling privacy and tunneling of non-TCP/IP protocols?
A. HDLC
B. Cable
C. VPN
D. IPSec
E. xDSL
o C
- 70 -
Internet Protocol Version 6 (IPv6)
Ipv4 is a 32 bit addressing scheme, whereas IPv6 is a 128 bit hexa decimal addressing
scheme, represented in 8 combinations of 4 hexa decimal numbers each separated by a colon.
Hence IPV6 is called a 16-bit Hexadecimal Colon-delimited Block.
Representation:
2003:1234:ABCD:0001:5678:DCBA:4321:EFGH
Global Interface ID
Unicast
Subnet
Global Prefix
1. Global Unicast recognizes the particular Region or Zone. It is a publicly routable address.
4. Interface id is of 64 bits, where the 48 bit MAC address is padded with FFFE which is of 16
bits and is placed exactly in the middle of the MAC address to make it a 64 bit interface id.
Ex: 2000:12ab:34cd:00ef:1234:4295:0000:00cd
In the above expression ‘00ef ‘ can be represented as ‘ef ‘ and the continuous z eros can be
replaced by double colons( :: ).It can be re-written as
2000:12ab:34cd:ef:1234:4295::cd
Ex : 2000:0000:0000:00ef:1234:kf34:eef0:cd4e
=>
2000::ef: 1234:kf34:eef0:cd4e
- 71 -
Ex : 2001:0000:0000:0012:0000:0000:1234:56ab
0:0:0:0:0:0:0:0
This is the equivalent of IPv4’s 0.0.0.0
0:0:0:0:0:0:0:1
The equivalent of 127.0.0.1 in IPv4
2000::/3
The global Unicast address range.
FC00::/7
The unique local Unicast range.
FE80::/10
The link-local Unicast range.
FF00::/8
The multicast range.
3FFF:FFFF::/32
Reserved for examples and documentation.
2001:0DB8::/32
Also reserved for examples and documentation.
You can specify the entire 128-bit global IPv6 address or you can use the eui-64 option.
The eui-64 format allows the device to use its MAC address and pad it to m ake the interface ID.
The Globe is divided into 5 Zones and each zone will be assigned a number range to i dentify them.
Here the ‘/64’ represents the identification of the Zone and the IP of the company in that zone.Eui -
64 will pad an extra FFFE to the MAC address exactly to its center.
- 72 -
E.g. MAC address 0060.d673.1987 after padding would look like – 0260.d6ff.fe73.1987
0 0 6 0 D 6 7 3 1 9 8 7
0000 0000
th
7 bit is 0 then the address is locally unique.
0 2 6 0 D 6 F F F E 7 3 1 9 8 7
0000 0010
th
After padding the 7 bit changes to 1, now the address is Link local address. It is globally unique
address.
This padding process is called as EUI-64 i.e. Extended Uniform Identifier. EUI-64 is an IEEE
standard that is given to the MAC address of any particular system where eve ry system’s MAC
address will be automatically assigned. MAC address is the part of IPV6 address which makes it a
unique address.
- 73 -
LAB
DTE DCE
E0 S0 S0 E0
R1 R2
R2(config)#ipv6 unicast-routing
R2(config)#int e0
R2(config-if)#ipv6 add 2003:abcd:1234:0001::/64 eui-64
R2(config-if)# ipv6 rip 1 enable
R2(config-if)#no shutdown
R2(config)#int s0
R2(config-if)#ipv6 add 2005:abcd:1234:0002::/64 eui-64
R2(config-if)#no shutdown
R2(config-if)# ipv6 rip 1 enable
R2(config-if)#clock rate 64000
- 74 -
Outputs
Ethernet0 [up/up]
FE80::210:7BFF:FE7F:B8EA
2003:ABCD:1234:1:210:7BFF:FE7F:B8EA
Serial0 [up/up]
FE80::210:7BFF:FE7F:B8EA
2005:ABCD:1234:2:210:7BFF:FE7F:B8EA
Serial1 [administratively down/down]
For each interface IPv6 will create a Link local & Global Unicast address.
- 75 -
R2#sh ipv6 route ( without configuring RIP )
IPv6 Routing Table - 6 entries
Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP
C 2003:ABCD:1234:1::/64 [0/0]
via ::, Ethernet0
L 2003:ABCD:1234:1:210:7BFF:FE7F:B8EA/128 [0/0]
via ::, Ethernet0
C 2005:ABCD:1234:2::/64 [0/0]
via ::, Serial0
L 2005:ABCD:1234:2:210:7BFF:FE7F:B8EA/128 [0/0]
via ::, Serial0
L FE80::/10 [0/0]
via ::, Null0
L FF00::/8 [0/0]
via ::, Null0
- 76 -
RIPng: Sending multicast update on Ethernet0 for 1
src=FE80::210:7BFF:FE7F:B8EA
dst=FF02::9 (Ethernet0)
sport=521, dport=521, length=72
command=2, version=1, mbz=0, #rte=3
tag=0, metric=1, prefix=2003:ABCD:1234:1::/64
tag=0, metric=1, prefix=2003:ABCD:1234:2::/64
tag=0, metric=2, prefix=2003:ABCD:1234:3::/64
Dual Stacking :
It allows our devices to communicate using either IPv4 or IPv6. It’ll look something li ke this:
Router(config)#ipv6 unicast-routing
Router(config)#interface fastethernet 0/0
Router(config-if)#ipv6 address 2001:db8:3c4d:1::/64 eui-64
Router(config-if)#ip address 192.168.255.1 255.255.255.0
- 77 -
Questions
D
B
3. What two statements about IPv6 addresses are true? (Choose two.)
A. Leading zeros are required.
B. Two colons (::) are used to represent successive hexadecimal fields of zeros.
C. Two colons (::) are used to separate fields.
D. A single interface will have multiple IPv6 addresses of different t ypes.
B,D
4. What two statements about IPv4 and IPv6 addresses are true?
A. An IPv6 address is 32 bits long, represented in hexidecimal.
B. An IPv6 address is 128 bits long, represented in decimal.
C. An IPv4 address is 32 bits long, represented in decimal.
D. An IPv6 address is 128 bits long, represented in hexidecimal.
C,D
- 78 -
WIRELESS LAN (WLAN)
1. A single 802.11g access point has configured and installed in the center of a square office. A
few wireless users are experiencing slow performance and drops while most users are operating at
peak efficiency. What are three likely causes?
B,D,E
2. Which two statements best describe the wireless security standard that is defined by WPA?
(Choose two.)
A. It specifies use of a static encryption key that must be changed frequently to
enhance security.
B. It requires use of an open authentication method.
C. It specifies the use of dynamic encryption keys that change each time a client
establishes a connection.
D. It requires that all access points and wireless devices use the same encryption
key.
E. It includes authentication by PSK.
C, E
3. You and a co-worker have established wireless communication directly between your wireless
laptops. What type of wireless topology has been created?
A. BSS
B. ESS
C. IBSS
D. SSID
C
4. Which two devices can interfere with the operation of a wireless network because they operate
on similar frequencies? (Choose two.)
A. copier
B. microwave oven
C. toaster
D. cordless phone
E. IP phone
B, D
- 79 -
5. What is the maximum data rate specified for IEEE 802.11b WLANs?
A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps
B
6. Which spread spectrum technology does the 802.11b standard define for operation?
A. IR
B. DSSS
C. FHSS
D. DSSS and FHSS
E. IR, FHSS and DSSS
B
D
8. What two facts can be determined from the WLAN diagram (choose 2)?
A. The area of overlap of the two cells represents a basic service set (BSS)
B. The network diagram represents an extended service set (ESS)
C. Access points in each cell must be configured to use channel 1
D. The area of overlap must be less than 10% of the area to ensure connectivity
E. The two APs should be configured to operate on different channels
B and E
- 80 -
BOOTING
1. Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location
that is shown(choose two)?
A. Router 1 has specific boot system commands that instruct it to load IOS from a TFTP server
B. Router 1 is acting as a TFTP server for other routers.
C. Router 1 cannot locate a valid IOS image in the flash memory.
D. Router 1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.
E. Cisco routers will first attempt to load an image from TFTP for management purpose
A and C
C
- 81 -
3. When upgrading the IOS image, the network administrator receives the exhibited
Error message. What could be the cause of error?
A. The new IOS image is too large for the router flash memory.
B. The TFTP server is unreachable from the router
C. The new IOS is not correct for this router platform.
D. The IOS image on the TFTP server is corrupt.
E. There is not enough disk space on the TFTP server for the IOS image.
B
4. There are no boot system commands in a router configuration in NVRAM. What is the fallback
sequence that the router will use to find an IOS during reload?
A. TFTP server,Flash,NVRAM
B. ROM,NVRAM,TFTP server
C. NVRAM,TFTP server,ROM
D. Flash,TFTP server<ROM
E. Flash,NVRAM,ROM
D
B
6. Which command will copy the IOS to a backup host on your network?
E
- 82 -
7. The corporate office sends you a new router to connect, but upon connecting the console
cable,you see that there is already a configuration on the router. What should be done before a new
configuration is entered in the router?
C
8. What should the configuration register value be after you successfully complete the password
recovery procedure and return the router to normal operation?
A. 0x2100
B. 0x2101
C. 0x2102
D. 0x2142
C
C
10. The configuration register setting of 0x2102 provides what f unction to a router?
A. Tells the router to boot into ROM monitor mode
B. Provides password recovery
C. Tells the router to look in NVRAM for the boot sequence
D. Boots the IOS from a TFTP server
E. Boots an IOS image stored in ROM
C
11. You copy a configuration from a network host to a router’s RAM. The configuration looks
correct, yet it’s not working at all. What could the problem be?
C
- 83 -