Sample
Sample
Cisco Certified
Support Technician
(CCST) Networking
100-150 Exam
A Day-By-Day Review Guide for the
CCST-Networking Certification Exam
Allan Johnson
Cisco Press
Hoboken, NJ
ii 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam
The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc.,
shall have neither liability nor responsibility to any person or entity with respect to any loss or
damages arising from the information contained in this book or from the use of the discs or
programs that may accompany it.
iii
The opinions expressed in this book belong to the author and are not necessarily those of Cisco
Systems, Inc.
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been
appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this
information. Use of a term in this book should not be regarded as affecting the validity of any
trademark or service mark.
Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities (which
may include electronic versions; custom cover designs; and content particular to your business, train-
ing goals, marketing focus, or branding interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.
For questions about sales outside the U.S., please contact [email protected].
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each
book is crafted with care and precision, undergoing rigorous development that involves the unique
expertise of members from the professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any comments regarding how
we could improve the quality of this book, or otherwise alter it to better suit your needs, you can
contact us through email at [email protected]. Please make sure to include the book title
and ISBN in your message.
Dedications
For my wife, Becky. Thank you for all your support during this crazy whirlwind of a year. You are
the stabilizing force that keeps me grounded.
Acknowledgments
As a technical author, I rely heavily on my technical editor; Patrick Gargano had my back for
this work. Thankfully, when James Manly contacted him, he was willing and able to do the ardu-
ous review work necessary to make sure that you get a book that is both technically accurate and
unambiguous.
Russ White’s Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide, First
Edition was one of my main sources. Russ is well known in the computer networking community
where he is a highly respected expert. I recommend subscribing to the podcast Hedge, where Russ is
a co-host.
The Cisco Network Academy authors for the online curriculum take the reader deeper, past the
CCST Networking exam topics, with the ultimate goal of preparing the student not only for
CCST Networking certification, but for more advanced college-level technology courses and
degrees as well. Thank you especially to Rick Graziani, Bob Vachon, John Pickard, Dave Holzinger,
Martin Benson, Suk-Yi Pennock, Allan Reid, Anna Bolen and the rest of the ACE team. Their
excellent treatment of the material is reflected throughout this book.
James Manly, executive editor, effectively juggles multiple projects simultaneously, steering each from
beginning to end. Thank you, James, for shepherding this project for me.
Thank you to the professional and thorough review of this work by development editor Ellie Bru,
project editor Mandie Frank, and copy editor Bart Reed. Their combined efforts ensure that what I
authored is ready for publication.
And to the rest of the Pearson family who contributes in countless ways to bring a book to the
reader, thank you for all your hard work.
vi 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam
Contents at a Glance
Day 31: Networking Models 1
Day 9: Wireshark 185
Day 5: Firewalls 227
Exam Day 269
Post-Exam Information 271
Exam Checklist 275
Index 279
Reader Services
Register your copy at www.ciscopress.com/title/9780138222918 for convenient access to
downloads, updates, and corrections as they become available. To start the registration process,
go to www.ciscopress.com/register and log in or create an account.* Enter the product ISBN
9780138222918 and click Submit. When the process is complete, you will find any available bonus
content under Registered Products.
*Be sure to check the box that you would like to hear from us to receive exclusive discounts on
future editions of this product.
viii 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam
Contents
Day 31: Networking Models 1
Study Resources 4
Sources of Delay 15
Physical Path Length 15
Serialization Delay 15
ix
Queueing Delay 15
Jitter 15
Speed Tests 16
The iPerf Tool 17
Study Resources 20
Topology Variations 26
Small Office/Home Office (SOHO) 26
SOHO Routers 27
Flow Control 40
Connection Establishment and Termination 40
UDP 41
Study Resources 42
NTP 46
NTP Configuration and Verification 47
Study Resources 53
DHCP 57
DHCPv4 58
DHCPv6 58
SLAAC 58
Stateless and Stateful DHCPv6 Operation 60
DNS Operation 61
Study Resources 62
xi
NAT Concepts 64
A NAT Example 66
Dynamic and Static NAT 66
NAT Overload 67
NAT Benefits 68
NAT Limitations 68
Study Resources 68
Study Resources 76
Loopback Address 83
Unspecified Address 83
Unique Local Address 84
IPv4 Embedded Address 84
Multicast 85
Assigned Multicast 85
Solicited-Node Multicast 86
Anycast 87
Migration to IPv6 89
Study Resources 90
Fiber-Optic Cabling 98
Types of Fiber Media 98
Single-Mode Fiber (SMF) 99
Multimode Fiber (MMF) 99
Fiber-Optic Connectors 100
Fiber Patch Cords 101
Fiber versus Copper 104
Channels 105
802.11 Standards 107
Wireless Interference 108
Wi-Fi Networks 109
Linux 129
Verifying Connectivity 130
Index 279
xxi
Introduction
If you’re reading this introduction, you’ve probably already spent a considerable amount of time and
energy pursuing your CCST Networking certification. Regardless of how you got to this point
in your travels through your studies, 31 Days Before Your Cisco Certified Support Technician (CCST)
Networking 100-150 Exam most likely represents the last leg of your journey on your way to the
destination: to become a Cisco Certified Support Technician in Networking. However, if you are
like me, you might be reading this book at the beginning of your studies. If so, this book provides an
excellent overview of the material you must now spend a great deal of time studying and practicing.
But I must warn you: unless you are extremely well-versed in networking technologies and have
considerable experience supporting networks, this book will not serve you well as the sole resource
for your exam preparations. Therefore, let me spend some time discussing my recommendations for
study resources.
Study Resources
Cisco Press and Pearson IT Certification offer an abundance of networking-related books to serve
as your primary source for learning how to install, configure, operate, and troubleshoot small to
medium-size routed and switched networks.
Primary Resources
First on the list must be Russ White’s Cisco Certified Support Technician CCST Networking 100-150
Official Cert Guide 1st Edition (ISBN: 9780138213428). If you do not buy any other books, buy this
one. Russ’s method of teaching, combined with his technical expertise and down-to-earth style, is
unsurpassed in our industry. As you read through his book, you sense that he is sitting right there
next to you walking you through the material. With your purchase, you get access to practice exams
and study materials and other online resources that are worth the price of the book. There is no
better resource on the market for a CCST Networking candidate.
If you are a Cisco Networking Academy student, you are blessed with access to the online version
of the Networking Essentials version 3 curriculum and the wildly popular Packet Tracer network
simulator. However, this content is also available for free to anyone who signs up at https://skills-
forall.com. After registering and logging in, look for the Network Technician Career Path
(https://skillsforall.com/career-path/network-technician). Here, you can gain access to the
following four mini-courses that add up to 70 hours of training:
nn Networking Basics
nn Networking Devices and Initial Configuration
nn Network Addressing and Basic Troubleshooting
nn Network Support and Security
xxiii
You can also buy Networking Essentials Companion Guide v3: Cisco Certified Support Technician
(CCST) Networking 100-150, Second Edition (ISBN: 978-0-13-832133-8), which maps to both the
Networking Essentials version 3 instructor-led online course and the four self-enroll mini-courses.
You might also consider purchasing Networking Essentials Lab Manual v3: Cisco Certified Support
Technician (CCST) Networking 100-150, 2nd Edition (ISBN: 9780138293727). You can find these
books at http://www.ciscopress.com by clicking the Cisco Networking Academy link.
So which resources should you buy? The answer to that question depends largely on how deep
your pockets are or how much you like books. If you’re like me, you must have it all! I admit it; my
bookcase is a testament to my Cisco “geekness.” Whatever you choose, you will be in good hands.
Any or all of these resources will serve you well.
The book counts down starting with Day 31 and continues through exam day to provide post-test
information. Inside this book is also a calendar and checklist that you can tear out and use during
your exam preparation.
Use the calendar to enter each actual date beside the countdown day and the exact day, time, and
location of your CCST Networking exam. The calendar provides a visual for the time you can
dedicate to each exam topic.
The checklist highlights important tasks and deadlines leading up to your exam. Use it to help you
map out your studies.
xxiv 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam
To earn your certification, you must pass a 50-minute exam composed of 35 to 50 questions.
Certiport has an exam tutorial here:
https://certiport.pearsonvue.com/Educator-resources/Exam-details/Exam-tutorials/
Cisco_Tutorial.pdf
If that link doesn’t work, be sure to register at https://www.certiport.com and then look for the
exam tutorials link. One of the nice features of the CCST Networking exam is that you can move
forward and back through test items, changing your answers if desired, before the exam ends or you
select Finish.
Although Cisco outlines general exam topics, not all topics might appear on the CCST Networking
exam; likewise, topics that are not specifically listed might appear on the exam. The exam topics that
Cisco provides and this book covers are a general framework for exam preparation. Be sure to check
Cisco’s website for the latest exam topics.
xxv
You can schedule your exam at any time. I recommend that you schedule it for 31 days from now.
The process and available test times vary based on the local testing center you choose.
Remember, there is no better motivation for study than an actual test date. Sign up today.
xxvi 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam
Credits
Figures 2.3–2.6, 2.8–2.19: Linksys Holdings
Key Topics
Today’s review focuses on the different measurements for network performance, the sources of
delay, testing network performance online, and testing network performance using the Windows
iPerf tool.
Bandwidth
Bandwidth is determined by the medium’s physical properties and is measured in bits per second.
For example, 10GBASE-T Ethernet has a maximum capacity of 10Gbps (gigabits per second). The
available bandwidth of a connection is how Internet service providers (ISPs) advertise and charge
for their services.
Throughput
Throughput is the actual rate of data transfer across the network and will be less than the band-
width. This is because there is overhead on the link, such as routing protocols, Layer 2 minimum
frame sizes (Ethernet), network congestion, and more.
Another important reason that throughput is less than bandwidth is because network engineers
want to ensure the link has enough capacity to adjust to new demand bursts. For example, in
Figure 28-1, Application 4 might not be able to start if the other three applications are consuming
closer to 100% of the link’s capacity. For this reason, it is common for network designers to consider
a link at 80% bandwidth utilization as full utilization.
14 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam
100%
Application 4
80%
Application 3
Application 2
Application 1
Goodput
Although less commonly mentioned, goodput is the measure of the actual payload of data that is
transmitted across the network. Goodput will always be less than throughput because every data
packet contains fields of overhead. For example, Ethernet has a 20-byte header and IPv6 has a
40-byte header. In addition, there will always be a small number of errors in data transmission where
packets must be recent.
End-to-End Bandwidth
The bandwidth of an end-to-end path is limited by the lowest bandwidth link along the path. For
example, a 1Gbps local link does not guarantee 1Gbps to all destinations. In Figure 28-2, Host
A will have an end-to-end bandwidth of 1Gbps to Server E. However, Host A will be limited to
100Mbps to Server G and 10Mbps to Server H.
1Gbps E
1Gbps C
B
A
1Gbps 100Mbps
F 1Gbps
G
100Mbps
D 10Mbps
H
Day 28 15
Sources of Delay
Delay is the time it takes for a packet to travel from source to destination. Sources of delay include
the following:
nn The physical path length
nn The time it takes to transmit data onto the wire (serialization delay)
nn Queueing when there is congestion between the source and destination
nn Jitter, which is the measure of difference in delay between packets
Serialization Delay
Serialization delay refers to the time it takes to convert digital data into a stream of bits and transmit
it onto the network. This process involves encoding the data and sending it out as a series of bits, as
shown for the 8 bits in Figure 28-3.
Bit 8
Physical
Bit 8
Bit 7
Bit 6
Bit 4
Bit 7
Bit 2
Bit 1
Bit 3
Bit 5
Interface
Bit 6
Bit 5
Octet in Memory
Bit 4
Bit 3
Bit 2
Bit 1
Queueing Delay
Queueing delay occurs when there is congestion or contention for resources within the network.
When multiple packets are trying to traverse the same network link simultaneously, they may have
to wait in a queue before they can be transmitted. This queueing delay is directly related to network
traffic and the network’s capacity. Higher levels of congestion lead to longer queueing delays.
Jitter
Jitter is the measure of variation in delay between packets. In an ideal network, packets would
all arrive at the destination with consistent and predictable delays, as shown for the top row of
packets in Figure 28-4. However, in real-world networks, factors such as varying traffic loads,
16 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam
different routing paths, and queueing delays can introduce variation in the arrival times of packets,
as shown in the bottom row of packets in Figure 28-4.
P1 P2 P3 P4 P5 P6
A B
P1 P2 P3 P4 P5 P6
Jittered packets
Jitter can be a significant issue in real-time applications like Voice over Internet Protocol (VoIP) or
video streaming applications, where consistent timing is essential. To mitigate jitter, network engi-
neers often use techniques like quality of service (QoS) to prioritize certain types of traffic and
reduce variability in delay.
Speed Tests
It’s relatively easy for you to test the speed of your personal Internet connections. A quick Internet
search will reveal several ad-supported sites that provide this service for free. Speed tests measure the
throughput of your link. Specifically, they measure the throughput between you and the destination
server that the speed test chooses for your test. Some speed tests, such as the one provided by Ookla,
allow you to change the destination server, as shown in Figure 28-5.
Ookla also has an app you can use to test the throughput of your cellular bandwidth, as shown in
Figure 28-6.
Example 28-1 shows the iPerf tool running on a Windows machine, testing the connection to a
public iPerf server in Dallas.
iperf Done.
C:\tools\iperf-3.1.3-win32>
NOTE You can easily find available iPerf public servers by doing an Internet search. The
server chosen for Example 28-1 was found at https://github.com/R0GGER/public-iperf3-
servers.
In Example 28-1, the number of kilobytes of data being transferred is measured every second. This
value is then converted into the number of bits per second. After 10 seconds, we can see that the
average throughput is 5.98Mbps for both the sender and the receiver.
Be sure you review the documentation for iPerf at https://iperf.fr/iperf-doc.php and practice differ-
ent command-line options, including the following:
nn -s sets the device to run in server mode.
nn -t changes the amount of time in seconds to something other than the default 10 seconds.
nn -w can be used to set the TCP window size.
nn -4 or -6 indicate to only use IPv4 or IPv6, respectively.
Example 28-2 shows all the available options for iPerf on Windows.
Day 28 19
C:\tools\iperf-3.1.3-win32> iperf3 -h
Usage: iperf [-s|-c host] [options]
iperf [-h|--help] [-v|--version]
Server or Client:
-p, --port # server port to listen on/connect to
-f, --format [kmgKMG] format to report: Kbits, Mbits, KBytes, MBytes
-i, --interval # seconds between periodic bandwidth reports
-F, --file name xmit/recv the specified file
-B, --bind <host> bind to a specific interface
-V, --verbose more detailed output
-J, --json output in JSON format
--logfile f send output to a log file
-d, --debug emit debugging output
-v, --version show version information and quit
-h, --help show this message and quit
Server specific:
-s, --server run in server mode
-D, --daemon run the server as a daemon
-I, --pidfile file write PID file
-1, --one-off handle one client connection then exit
Client specific:
-c, --client <host> run in client mode, connecting to <host>
-u, --udp use UDP rather than TCP
-b, --bandwidth #[KMG][/#] target bandwidth in bits/sec (0 for unlimited)
(default 1 Mbit/sec for UDP, unlimited for TCP)
(optional slash and packet count for burst mode)
-t, --time # time in seconds to transmit for (default 10 secs)
-n, --bytes #[KMG] number of bytes to transmit (instead of -t)
-k, --blockcount #[KMG] number of blocks (packets) to transmit
(instead of -t or -n)
-l, --len #[KMG] length of buffer to read or write
(default 128 KB for TCP, 8 KB for UDP)
--cport <port> bind to a specific client port (TCP and UDP,
default: ephemeral port)
-P, --parallel # number of parallel client streams to run
-R, --reverse run in reverse mode (server sends, client receives)
-w, --window #[KMG] set window size / socket buffer size
-M, --set-mss # set TCP/SCTP maximum segment size (MTU - 40 bytes)
-N, --no-delay set TCP/SCTP no delay, disabling Nagle's Algorithm
-4, --version4 only use IPv4
-6, --version6 only use IPv6
20 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam
[KMG] indicates options that support a K/M/G suffix for kilo-, mega-, or giga-
C:\tools\iperf-3.1.3-win32>
If you want to test the performance in your own network, download iPerf on the computer that
will receive the iPerf packets. Use the -s option to start an iPerf server, as shown in Example 28-3.
C:\tools\iperf-3.1.3-win32> iperf3 -s
-----------------------------------------------------------
Server listening on 5201
-----------------------------------------------------------
NOTE You will most likely need to configure a rule on your local firewalls to allow iPerf
traffic.
Study Resources
For today’s exam topics, refer to the following resources for more study:
firewalls, 227
application gateway (proxy) firewalls,
H
229–230 hacking tools
Cisco IOS firewall example, 230–231 network scanning/hacking, 237
host-based firewalls, 231–233 OS hacks, 237
iptables, 232 wireless hacking, 237
nftables, 232 hard copies as data loss vectors, 236
NGFW, 229–230 hashing algorithms, 248
stateful firewalls, 229
HEAD messages, 56
stateless firewalls, 227–228
TCP Wrappers, 233 headers
Windows Defender Firewall, 231–232 IPv4 addressing, 69
IPv6 addressing, 78–79
fixed ports, Cisco 4461 ISR, 151–153
TCP, 38, 41
flood attacks UDP, 41
TCP SYN, 242
help desks, 180
UDP, 243
policies/procedures, 180
flow control, TCP, 40 prioritization/escalation, 180–181
follow-the-path troubleshooting ticketing systems, 181–182
method, 178 trouble tickets
forensic tools, security, 237 fields, 182
forests, AD, 251 ticketing process, 181
forwarding help facility, Cisco IOS, 216
frame forwarding, 171 ? command, 215
packets, 155 command syntax help, 215
path determination, 156 console error messages, 215–216
switching, 156 Word help, 215
switch forwarding, 170 hierarchical campus design, 27–29
fragment-free switching, 172 hijacking sessions, 242
frame forwarding, 171 hold-down timers, 164
frequency channels, 105–106 home networks, configuring, 267–268
FTP (File Transfer Protocol), 43, 45 home routers
commands, 43–45 access, 267–268
SFTP, 43, 45 configuring, 258
TFTP, 43, 46 home users, authentication, 256–257
full mesh topologies, 23–24 host reachability messages, 48
host routing tables, viewing in Windows
G 11, 126–127
host-based firewalls, 231–233
GET messages, 55 hosts
getmac /v command, 124 defined, 113–114
Get-NetRoute command, 126–127 virtual hosts, 114–116
Gigabit Ethernet 0/0/0 and 0/0/1 HTTP (HyperText Transfer Protocol), 55
ports, 152 DELETE messages, 56
Gigabit Ethernet 0/0/2 and 0/0/3 GET messages, 55
ports, 152 HEAD messages, 56
global unicast addresses, 80–82 operation of, 56–57
POST messages, 55
goodput, 14
PUT messages, 56
Graziani’s 3–1-4 (pi) rule, 80
IP addressing 287
attacks PAN, 26
reset attacks, 242 physical topologies, 24–25, 146, 147–148
session hijacking, 242 point-to-point topologies, 23
TCP SYN flood attacks, 242 variations of, 26
connection establishment/termination, WAN, 23–24
40–41 WLAN, 26
error recovery (reliability), 39–40 traceroute command, 49–50
f low control, 40 tracert command, 128, 201–203
headers, 38, 41
traffic, VLAN
port numbers, 38–39
IP
TCP Wrappers, 233
multicast traffic, 174
windowing, 40
telephony traffic, 173
TCP/IP model, 1, 7 management traffic, 173
application layer, 3, 5 normal data traffic, 174
Internet layer, 3, 6–7 scavenger class traffic, 174
network access layer, 7–8
training, security, 251
PDU, 9–10
protocols, 8 transmitting data, 246
transport layer, 3, 5–6 transport layer, TCP/IP, 3, 5–6, 242–243
transport layer attacks, 242–243 transport protocols
telephony traffic, IP, 173 connectionless protocols, 37–38
Telnet, 207 connection-oriented protocols, 37–38
TCP, 37
Ten Gigabit Ethernet 0/0/4 and 0/0/5
connection establishment/termination,
ports, 152
40–41
terminal emulators, 208–209 error recovery (reliability), 39–40
terminating TCP connections, 40–41 flow control, 40
testing, penetration testing tools, headers, 38, 41
236–237 port numbers, 38–39
TFTP (Trivial FTP), 43, 46 windowing, 40
threats, security, 235 UDP, 37
headers, 41
three-tiered campus design, 28
port numbers, 38–39
throughput, 13–14
transportation layer, 2
ticketing systems, 181–182
trees, AD, 251
Time Exceeded messages, 49
triggered updates, routing tables, 164
timers, hold-down, 164
Trojan horses, 238
TKIP (Total Key Integrity Protocol), 257
trouble tickets
top-down troubleshooting method, 178 fields, 182
topologies ticketing process, 181
NAT, 65 troubleshooting
networks bottom-up troubleshooting method, 178
CAN, 26 comparison troubleshooting method, 179
full mesh topologies, 23–24 divide-and-conquer troubleshooting
hub-and-spoke topologies, 23 method, 178
hybrid topologies, 24 educated guess troubleshooting
LAN, 21–22 method, 179
logical topologies, 24–25, 147, 148–149 follow-the-path troubleshooting
MAN, 26 method, 178
VPN (Virtual Private Networks) 301