ICND2 Flashcards

1
Q

What are the four major categories of PPP features?

A

Compression, Callback, Multilink, and Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IOS Command: Enable PPP

A

interface config: encapsulation ppp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the STP root elected?

A

Lowest Bridge ID becomes root.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the STP Bridge IP?

A

Configured bridge priority prepended to MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a switch determine its STP root port? Place in order.

A

1 - lowest path cost to root
2 - lowest neighbor bridge id
3 - lowest port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the common STP costs for Ethernet up to TenGigabitEthernet

A

10Mbps 100
100Mbps 19
1Gbps 4
10Gbps 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is the designated bridge determined on each segment?

A

The same as STP root port:
1 - lowest path cost to root
2 - lowest neighbor bridge id
3 - lowest port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a designated port do in STP?

A

It connects a non-root segment from the switches perspective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of STP port connects to a designated port?

A

A non-designated blocking port or a root port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List STP states in order

A

listening
learning
forwarding, blocking, disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Commands to set bridge priority

A

spanning-tree vlan vlan-id priority n
spanning-tree vlan vlan-id root primary
(secondary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Single command to enable portfast and bpduguard

A

spanning-tree portfast edge bpduguard default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cisco’s PVST and Rapid PVST require one to set bridge priority in increments of …

A

4096

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What two components are unified when using Cisco Stackwise

A

Backplane and Administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a master switch is chosen what happens to the other switches in a Stackwise configuration.

A

The other switches reboot and adopt the master’s configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the rules for electing a stack master

A

1) The current stack master remains the stack master
2) The switch with the highest member priority value
3) The switch with the non-default interface-level configuration
4) The switch with the higher hardware/software priority. (cryptography and ip services first)
5) The switch with the longest uptime
6) The switch with the lowest MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is another name for 802.1x

A

EAP (Extensible Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What standards are used to authenticate EAP.

A

Radius or TACACs

EAP = 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does DHCP stop rogue DHCP servers?

A

By setting ports connected to valid DHCP servers as “trusted.” Untrusted ports receiving DHCP responses disable themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which VLAN should not be used as per Cisco best practices?

A

VLAN 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Etherchannel obtains optimal load balancing over what number of links?

A

Powers of 2

2,4,8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why does Cisco recommend against hardcoding etherchannel and not using PAGP or LACP?

A

Without PAGP or LACP if one side of the etherchannel is misconfigured it could cause a spanning-tree loop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the PAgP commands?

A

channel-group n mode desirable

channel-group n mode auto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the LACP commands?

A

channel-group n mode active

channel-group n mode passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Steps for Etherchannel configuration

A

(first shut down interfaces)

1) Base interfaces must have identical configuration
2) Use the channel-group command to create etherchannel
3) All configuration done on virtual port-channel interface after bundling

4) Summary - ‘show etherchannel summary’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the default spanning-tree costs Ethernet through TenGig

A

Fa - 19
1G - 4
2G - 3
10G - 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What commands bundles interfaces and creates a virtual port-channel interface

A

channel-group n mode x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the basic config registers

A

0x2100 - ROMMON
0x2101 - RXBoot
0x2102 - Normal Boot
0x2142 - Ignore NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What command will show the configuration register?

A

show version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

List four things that can be done from ROMMON

A

Modify configuration register
Set temporary IP address
Initiate TFTP transfer of Cisco IOS
Initiate x/ymodem upload over the console cable of Cisco IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Where are ‘boot system’ commands found?

A

Global Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Where does an IOS router look for the image to load in order

A

1) “boot system” commands
2) Look for first IOS image in flash
3) Broadcast for a TFTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Set configuration register in ROMMON

A

confreg 0x2102

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Download IOS from TFTP in ROMMON

A
set (show ip information)
IP_ADDRESS=
IP_SUBNET_MASK=
DEFAULT_GATEWAY=
TFTP_SERVER=
TFTP_FILE=
tftpdnld
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

List steps to obtain and install a license on an IOS 15 device

A

1 - Purchase license and receive PAK key
2 - Get license file from CLM or www.cisco.com/go/license using UDI
3 - Use the CLI to install the .lic file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How do you find the UDI and what is it a combination of

A

show license udi

It is a combination of the product id (PID) and SN. (ex: CISCO2911/K9FTX1524PIRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Command to show licenses

A

show license all

show license detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Command to show features enabled on device

A

show license feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Install license

A

license install flash0:licensefile.lic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Backup license

A

license save flash:filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Unistall a license

A
license boot module x x x disable
do reload
license clear x
conf t
no license boot module x x x disable
do reload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the administrative distances of the major routing protocols?

A
Directly connected: 0
Static: 1
EIGRP Summary 5
EBGP 20
EIGRP 90
IGRP 100
OSPF 110
IS-IS 115
RIP 120
EGP 140
ODR 160
EX EIGRP 170
iBGP 200
NHRP 250
Floating Static (ex. DHCP-learned) 254
Unknown 255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

When selecting a route what does the router consider in order

A
  1. Next Hop Reachability
  2. Route Specificity
  3. Administrative Distance
  4. Metric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

List 3 major distance vector routing protocols

A

RIP, EIGRP. BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

List 2 major link state protocols

A

OSPF, IS-IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

List 3 major differences between distance vector and link state routing protocols

A

DV

  • only knows what the neighbor tells it
  • memory / processor efficient
  • loop prevention mechanisms needed

LS

  • maintains a map of the network system
  • resource consuming
  • maintains loop free by nature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

List distance vector loop prevention methods

A

1) maximum metric
2) route poisoning
3) triggered updates
4) split horizon
5) hold down timers

6) AS_PATH attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Why did Cisco create EIGRP when OSPF already existed.

A

EIGRP is simpler to implement than OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the SPF algorithm

A

Finds the best path to each destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

OSPF area 0 is the _____

A

backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the primary reason for using multiple areas in OSPF?

A

to summarize routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What OSPF router type brings an Internet connection into the system

A

ASBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Does OSPF use TCP or UDP for routing updates?

A

Trick question: It uses the OSPF protocol number 89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

OSPF vs. EIGRP

A

OSPF is hierarchical EIGRP is not

OSPF has a route database with the entire network
EIGRP keeps only successors and feasible successors

OSPF is link state EIGRP is distance vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How does a Cisco router pick a router-id if one is not configured statically?

A

Highest active interface IP - loopbacks preferred over others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

OSPF default hello and dead timers

A

10 and 40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

List four things that must match in an OSPF hello packet

A

1) Hello / Dead Timer
2) Subnet Mask
3) Area ID
4) Authentication password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the role of the master router?

A

It is the first to send a DBD packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the default OSPF hello times on NBMA links?

A

hello 30, dead 120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

How does OSPF determine the master router?

A

higher router-id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Describe OSPF Loading process

A

Each router examines the DBDs from ExStart. For any entry the router doesn’t know about it sends a link-state request (LSR) and a link-state update (LSU) is returned.

Note LSU is a collection of LSAs. LSACK acknowledges these updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

List OSPF states when

A

Init: Hello packet received
Two-way: own router ID found in hello packet
Exstart: Master and slave determned
Exchange: DBD packets exchanged
Loading: LSRs and LSUs for required LSAs.
Full: OSPF routers are now neighbors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Multicast group for OSPF all routers and OSPF DR

A
  1. 0.0.5 (all routers)

224. 0.0.6 (all OSPF designated routers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What does an OSPF priority of 0 mean?

A

A router with priority 0 will never be elected as DR or BDR. (NBMA spokes, for example, might need this)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What determines the DR/BDR in an OSPF election

A

Highest priority and in a tie highest RID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What does the BDR do?

A

It acts maintains a full relationship with all neighbors but does not send LSAs and just waits for the DR to die.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Command to adjust hello timer on OSPF

A

interface mode:

ip ospf hello-interval n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Command to adjust OSPF metric so it works better with larger links

A

router mode:
auto-cost reference bandwidth 10000
(10G links = 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Command to change ospf cost on an interface

A

ip ospf cost n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

By default what is the slowest speed at OSPF cost 1

A

100 meg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Configure OSPF to advertise a default route even if there isn’t a default route in the table

A

default-information originate always

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Command to view all routes learned by OSPF

A

show ip/ipv6 ospf database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Command to view all successors and feasible successors learned by EIGRP

A

show ip/ipv6 eigrp topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

List main bullets of NIST cloud computing definition

A
On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is one way to connect between multiple cloud service providers

A

An intercloud exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is a VNF?

A

Virtual Network Function - virtual version of network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What does MEC stand for

A

Multichassis EtherChannel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Access Switches have Stackwise. Core/Distribution switches have?

A

Chassis Aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is a MIB

A

Management Information Base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is contained in a MIB

A

Object Identifiers (OID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is a major drawback to an SNMP trap and what does SNMPv3 implement to resolve that?

A

An snmp trap has no acknowledgement. SNMPv3 introduces the inform message which has an ack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What are the 3 SNMPv3 security modes

A

noAuthNoPriv clear-text username authentication
authNoPriv: MD5 or SHA authentication but no encryption
authPriv: MD5 or SHA authentication and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Configure server 192.168.12.2 for SNMPv2c read only access community name ICND2 and enable traps

A

snmp-server community ICND2 ro
snmp-server location Omaha
snmp-server contact kevin.joyce@outlook.com
snmp-server host x.x.x.x version 2c ICND2
snmp-server enable traps (pick traps)

84
Q

What is route poisoning

A

When a network goes down a DV protocol will send a triggered update which is a network with an infinite metric.

85
Q

What is poison reverse?

A

When a poisoned route is learned a poisoned route is sent back to the same router with the same infinite metric.

86
Q

What is split horizon?

A

A router never advertises a route through the interface it learns it from. (unless it is reverse poisoning a route.)

87
Q

What is the command to view the EIGRP neighbor table and what information is contained in it?

A

show ip eigrp neighbors

Lists all directly connected neighbors

  • H (Handle) - first neighbor gets 0 - next one 1 - gaps get filled
  • Next Hop IP
  • Interface
  • Hold Time
  • Uptime
  • SRTT (Smooth round trip time)
  • RTO (retransmission timeout)
  • Q Count
  • Seq Number
88
Q

What is the command to view the EIGRP topology table and what information is contained in it.

A
  • Successors and Feasible Successors
  • Metric (FD)
  • Route State (Passive, Active, Update, Query, Reply)
89
Q

In EIGRP what are the requirements for a route to be a feasible successor

A

1) It must not be a successor
2) The advertised distance must be less than the feasible distance of the successor
3)

Nice plain english: A router can become a backup path if he is closer to the destination than your best path.

90
Q

What command is used for unequal cost load balancing in EIGRP links. What type of routes can be used for load balancing?

A

variance n where n is the multiplier
Feasible successors can be used.

Example with variance 3 and FD of 100 on the successor a feasible successor with a FD of 300 will join the pool and will take 1/4 the traffic.

91
Q

What protocol does EIGRP use for reliable messages?

A

RTP (Reliable Transport Protocol)

92
Q

List EIGRP packet types and whether or not they need acks

A
Hello - Unreliable
Update - Reliable
Query - Reliable
Reply - Reliable
Ack - ack doesn't get acked

Update packets send new routing information. Reply packets send routing information in response to query packets.

93
Q

Describe EIGRP Adjancency process

A

1) R1 sends hello
2) R2 sends Update
3) R2 sends hello (on its own timer - not in response to update)
4) R1 sends ack for update packet
5) R1 sends update
6) R2 sends ack back

94
Q

How could you run EIGRP over a network that does not support multicast?

A

router mode:

neighbor x.x.x.x interface

95
Q

List EIGRP K values

A
Bandwidth (K1)
Load (K2)
Delay (K3)
Reliability (K4)
MTU (K5)
96
Q

What is the EIGRP metric formula for default K values K1 and K3

A

(10^7 / minimum bandwdith + (sum of delays)) * 256

97
Q

Command to set EIGRP to use delay only in metric calculation

A

router mode:
metric weights 0 0 0 1 0 0

(First 0 is TOS which must be 0 - then K1, K2, etc.)

98
Q

Command to summarize subnets within 172.16.0.0/23

A

interface mode:

ip summary-address eigrp as 172.16.0.0 255.255.254.0

99
Q

What is a dis-contiguous network?

A

When a classful network has another classful network on a segment between 2 or more of its subnets.

So, for example, might be equal cost routing to 1.0.0.0/8 going to seperate ways to two seperate subnets - if auto-summary is in place.

100
Q

For unequal cost load balancing what command shows the traffic share count?

A

show ip route x.x.x.x

101
Q

What does SIA Query do?

A

SIA Query is sent half way through the SIA timer - to give the neighbor router a chance to return a SIA reply which keeps EIGRP from dropping the neighbor adjacency and losing the other routes.

102
Q

List items that cause problems with EIGRP adjacencies

A
Uncommon subnet
K value mismatch
AS mismatch
Layer 2 issues
Access-list issues
NBMA (not sending broadcasts)
103
Q

What is the EIGRP multicast address?

A

224.0.0.10

104
Q

What is a path vector routing protocol

A

BGP is the only example - it records the AS path

105
Q

Describe the ways BGP can be homed

A

Single homed: you are connected to a single ISP using a single link.
Dual homed: you are connected to a single ISP using dual links.
Single multi-homed: you are connected to two ISPs using single links.
Dual multi-homed: you are connected to two ISPs using dual links.

106
Q

command to add password to bgp neighbor

A

neighbor x.x.x.x password MYPASS

107
Q

What is BGP synchronization

A

This is for transit networks. BGP won’t advertise a network learned from another AS unless it sees the network in the IGP as well. This way traffic doesn’t transit your AS until the IGP is up to date. For a stub AS one can disable synchronization with no synchronization command in router mode.

108
Q

Configure iBGP peers to loopbacks

A

router bgp 2
neighbor 2.2.2.2 remote-as 2
neighbor 2.2.2.2 update-source loopback 0
neighbor 2.2.2.2 next-hop-self

109
Q

When is next-hop-self configuration is needed in BGP

A

For iBGP peers - so that they advertise their own next hop instead of the IP of the EBGP peer that advertised the router.

110
Q

What is BGP split horizon?

A

iBGP does not advertise prefixes learned from another iBGP peer

111
Q

What methods make multi-hop iBGP networks work without BGP split horizon breaking it?

A

BGP Route Reflectors

BGP Confederations

112
Q

What does * and > mean in ‘show ip bgp’

A
* = valid router and BGP can use it
> = the entry has been selected as the best path
113
Q

What does a next hop of 0.0.0.0 mean in BGP?

A

It means the network originates on the local router.

114
Q

What are the 2 BGP origin codes in use

A

i - originated using the ‘network’ command or equivalent.

? - Redistributed into BGP

115
Q

List other BGP status codes beyond valid(*) and best (>)

A

s - supressed: BGP knows the network but won’t advertise it, this can occur when the network is part of a summary.
d - damped: BGP doesn’t advertise this network because it was flapping too often (network appears, disapears, appears, etc.) so it got a penalty.
h- history: BGP learned this network but doesn’t have a valid route at the moment.
r - RIB-failure: BGP learned this network but didn’t install it in the routing table. This occurs when another routing protocol with a lower administrative distance also learned it.
S - stale: this is used for non-stop forwarding, this entry has to be refreshed when the remote BGP neighbor has returned.

116
Q

Which BGP states can lead to active state and why?

A

Connect and OpenSent - Connect because 3-way handshake fails and OpenSent because something is wrong with the open message (ie wrong AS number)

117
Q

If BGP hold timers don’t match what happens?

A

The lower timer is used

118
Q

List the BGP states in order (excluding active)

A
Idle
Connect
OpenSent
OpenConfirm
Established
119
Q

Describe the BGP OpenConfirm state

A

BGP waits for a keepalive message from the remote BGP neighbor. When we receive the keepalive, we can move to the established state and the neighbor adjacency will be completed. When this occurs, it will reset the hold timer. If we receive a notification message from the remote BGP neighbor then we fall back to the Idle state. BGP will keep sending keepalive messages.

120
Q

Describe the BGP established state

A

The BGP neighbor adjacency is complete and the BGP routers will send update packets to exchange routing information. Every time we receive a keepalive or update message, the hold timer will be resetted. In case we receive a notification message we will jump back to the Idle state.

121
Q

Describe the BGP Idle state

A

This is the first state where BGP waits for a “start event”. The start event occurs when someone configures a new BGP neighbor or when we reset an established BGP peering. After the start event, BGP will initialize some resources, resets a ConnectRetry timer and initiates a TCP connection to the remote BGP neighbor. It will also start listening for a connection in case the remote BGP neighbor tries to establish a connection. When successful, BGP moves to the Connect state. When it fails, it will remain in the Idle state.

122
Q

Describe the BGP Connect state

A

BGP is waiting for the TCP three-way handshake to complete. When it is successful, it will continue to the OpenSent state. In case it fails, we continue to the Active state. If the ConnectRetry timer expires then we will remain in this state. The ConnectRetry timer will be reset and BGP will try a new TCP three-way handshake. If anything else happens (for example resetting BGP) then we move back to the Idle state.

123
Q

Describe the BGP Active state

A

BGP will try another TCP three-way handshake to establish a connection with the remote BGP neighbor. If it is successful, it will move to the OpenSent state. If the ConnectRetry timer expires then we move back to the Connect state. BGP will also keep listening for incoming connections in case the remote BGP neighbor tries to establish a connection. Other events can cause the router to go back to the Idle state (resetting BGP for example).

124
Q

Describe the BGP OpenSent state

A

In this state BGP will be waiting for an Open message from the remote BGP neighbor. The Open message will be checked for errors, if something is wrong (incorrect version numbers, wrong AS number, etc.) then BGP will respond with a Notification message and jumps back to the Idle state. This is also the moment where BGP decides whether we use EBGP or IBGP (since we check the AS number). If everything is OK then BGP starts sending keepalive messages and resets its keepalive timer. At this moment, the hold time is negotiated (lowest value is picked) between the two BGP routers. In case the TCP session fails, BGP will jump back to the Active state. When any other errors occur (expiration of hold timer), BGP will send a notification message with the error code and jumps back to the Idle state. In case someone resets the BGP process, we also jump back to the Idle state.

125
Q

What four messages does BGP use?

A

Open
Update
Keepalive
Notification

126
Q

What is contained in a BGP Open message

A

Version (4)
My AS
Hold TIme
BGP Identifier (same rules as OSPF and EIGRProuter-id)
Optional Parameters - MP-BGP, Route Refresh, 4-octet AS numbers

127
Q

configure a time range from 09:00 to 17:00 weekdays

A

time-range WORK_HOURS

periodic weekdays 09:00 to 17:00

128
Q

Apply the time range WORK_HOURS to an extended ACL statement

A

101 deny tcp any host 192.168.23.3 eq 80 time-range WORK_HOURS

129
Q

What is the only traffic allowed on an 802.1X port prior to authentication

A

EAPoL (Extensible Authentication Protocol over LAN)

130
Q

What are the two layer 2 control protocols used in PPP and what do they do

A

LCP - Link control protocol - setting up link and authentication
NCP - Enables the sending of multiple protocols like IP, IPv6, CDP (IPX and AppleTalk)

131
Q

What are the two PPP authentication options and what is the difference

A

PAP (Password Authentication Protocol): Plaintext!

CHAP (Challenge Authentication Protocol) - instead of plaintext password a hash of the password is sent

132
Q

Configure CHAP

A

R1(config)# username R2 password MYSECRET
R2(config)# username R1 password MYSECRET
R1(config)#interface serial 0/0
R1(config-if)#ppp authentication chap
R2(config)#interface serial 0/0
R2(config-if)#ppp authentication chap

133
Q

Does PPP CHAP have to be configured on both links?

A

No

134
Q

Should one use a secret to increase CHAP security?

A

No! PPP can’t hash a password that is already hashed.

135
Q

Configure PPPoE on client side

A

Client(config)#interface dialer 1
Client(config-if)#mtu 1492
Client(config-if)#encapsulation ppp
Client(config-if)#ip address negotiated
Client(config-if)#ppp chap hostname CUSTOMER
Client(config-if)#ppp chap password CISCO
Client(config-if)#dialer pool 1

Client(config)#interface GigabitEthernet 0/1
Client(config-if)#pppoe-client dial-pool-number 1

136
Q

Configure PPP Multilink

A

R1(config)#interface multilink 1
R1(config-if)#ip address 192.168.12.1 255.255.255.0
R2(config)#interface multilink 1
R2(config-if)#ip address 192.168.12.2 255.255.255.0

R1(config)#interface Serial 0/0/0
R1(config-if)#encapsulation ppp
R1(config-if)#ppp multilink group 1

R1(config)#interface Serial 0/1/0
R1(config-if)#encapsulation ppp
R1(config-if)#ppp multilink group 1

137
Q

What command verifies ppp multilink operation

A

show ppp multilink

138
Q

What is recursive routing when it comes to tunnels?

A

When the destination IP for the tunnel interface is learned through the tunnel itself.

139
Q

What can one do to prevent recursive routing through a tunnel?

A

Don’t advertise the destination IP on the tunnel interface - or use route filtering
Make sure the AD of the destination IP through the tunnel is higher than
Instead of AD make sure the metric is worse.

140
Q

What does DMVPN use to know the public IP of multipoint tunnel neighbors?

A

NHRP - Next Hop Resolution Protocol

141
Q

Describe NHRP

A

One router will be the NHRP server.
All other routers will be NHRP clients.
NHRP clients register themselves with the NHRP server and report their public IP address.
The NHRP server keeps track of all public IP addresses in its cache.
When one router wants to tunnel something to another router, it will request the NHRP server for the public IP address of the other router.

142
Q

Summarize the three DMVPN phases

A

Note - phases are configuration options - the DMVPN solution does not progress through them.

Phase 1 - Spokes register with the hub. All traffic flows through the hub on point-to-point gre tunnels. Hub has multipoint GRE interface.

Phase 2 - All spoke routers run multipoint GRE so direct spoke-to-spoke tunneling is possible. When a spoke wants to reach another spoke it uses NHRP to find the tunnel IP. It must have the route and next-hop IP of the spoke tunnel ip to work.

Phase 3 - Specific routes are not needed by spokes for spoke-to-spoke connectivity. Routing will be set up as phase 1 but when a packet bound for another spoke reaches the hub it will send a NHRP redirect to both spokes. Both spokes resolve the public IP with NHRP and install a new routing entry so they can reach each other locally.

143
Q

What is an EVC and VPWS

A

Also called E-Line (Ethernet Line Service)
Ethernet Virtual Circuit - point-to-point virtual ethernet link
VPWS is Virtual Private Wire Service which specifically refers to labeling the frame for MPLS transit

144
Q

What is VPLS

A

Virtual Private Lan Service - E-LAN (Ethernet LAN Service)

145
Q

What is E-Tree

A

Ethernet Tree Service

Traditional Frame Relay topology on Ethernet.. (Hub and spoke)

146
Q

List four features provided by VPN

A

Confidentiality
Authentication
Integrity (verifying packet wasn’t changed)
Anti-replay

147
Q

List 4 commond VPN protocols

A

IPSec
PPTP
L2TP
SSLVPN

148
Q

What is PPTP

A

Point-to-point tunneling protocol
GRE tunnel with PPP and encryption done with MPPE

This has been proven insecure

149
Q

What is L2TP

A

Layer Two Tunneling Protocol
As an extension of PPTP can tunnel layer two traffic. For secure VPN it can be combined with IPSEC This combination is often referred to as L2TP/IPSec

150
Q

List 4 types of delay found in a network

A

Processing
Queuing
Serialization
Propagation (ie speed of light through fiber)

151
Q

List application and traffic types relevant to QOS - with examples

A

Batch Application - FTP
Interactive Application - SSH
Voice and Video Application - VOIP

152
Q

List the basic QOS Tools with short descriptions

A

Classification and marking: if we want to give certain packets a different treatment, we have to identify and mark them.
Queuing – Congestion Management: instead of having one big queue where packets are treated with FIFO, we can create multiple queues with different priorities.
Shaping and Policing: these two tools are used to rate-limit your traffic.
Congestion Avoidance: there are some tools we can use to manage packet loss and to reduce congestion.

153
Q

The first 6 bits of the DS field are used to set a ______ that will affect the ______ at each node. The codepoint is also what we call the ______ value.

A

codepoint, PHB (Per Hob Behavior), DSCP value.

154
Q

What is the name for using reservations to enforce end-to-end QoS?

A

IntServ (Integrated Services)

155
Q

What is it called when no reservations are made and each device has its own QOS prioritization?

A

DiffServ

156
Q

What is the default PHB DSCP value? How are packets treated by default?

A

00000000

Packets are ‘best effort.’

157
Q

What are the class-selector codepoints?

A
IP Precedence bits are the first 3 DSCP bits.  CS0=000 CS7=111
Default/CS0 - Routine
CS1 - Priority
CS2 - Immediate
CS3 - Flash
CS4 - Flash Override
CS5 - Critical
CS6 - Internetwork Control
CS7 - Network Control
158
Q

What were the value of the TOS bytes

A
1000	minimize delay
0100	maximize throughput
0010	maximize reliability
0001	minimize monetary cost
0000	normal service
159
Q

What are 2 function of Assured Forwarding PHB?

A

Queueing and Congestion Avoidance

160
Q

What bits of the DS field are used in Assured Forwarding

A

First 3 - Class (up to 4 binary 100)
bits 4 & 5 - drop probability - 01, 10, 11 - low, medium high
bit 6 remains 0

161
Q

What two functions does expedited forwarding PHB have?

A
  1. Queuing

2. Policing

162
Q

What is NBAR

A

Network Based Application Recognition

163
Q

List the DSCP codepoints

A

af11 Match packets with AF11 dscp (001010)
af12 Match packets with AF12 dscp (001100)
af13 Match packets with AF13 dscp (001110)
af21 Match packets with AF21 dscp (010010)
af22 Match packets with AF22 dscp (010100)
af23 Match packets with AF23 dscp (010110)
af31 Match packets with AF31 dscp (011010)
af32 Match packets with AF32 dscp (011100)
af33 Match packets with AF33 dscp (011110)
af41 Match packets with AF41 dscp (100010)
af42 Match packets with AF42 dscp (100100)
af43 Match packets with AF43 dscp (100110)
cs1 Match packets with CS1(precedence 1) dscp (001000)
cs2 Match packets with CS2(precedence 2) dscp (010000)
cs3 Match packets with CS3(precedence 3) dscp (011000)
cs4 Match packets with CS4(precedence 4) dscp (100000)
cs5 Match packets with CS5(precedence 5) dscp (101000)
cs6 Match packets with CS6(precedence 6) dscp (110000)
cs7 Match packets with CS7(precedence 7) dscp (111000)
default Match packets with default dscp (000000)
ef Match packets with EF dscp (101110)

164
Q

What DS bits for EF?

A

101110

165
Q

What are typical Precedence or DSCP values for voice and call signaling?

A
Precedence 5 (Critical) or DSCP EF
Precedence 3 (Flash) or DSCP AF31

They are all arbitrary of course..

166
Q

In policing if the number of bytes in a packet exceed the number of tokens in the bucket what does the router do with the tokens? What does it do with the packet?

A

The tokens are left in the bucket and the action on the packet is set by the policer. ie single-rate 2 color it is marked as exceeded and dropped.

167
Q

Describe dual rate 3 color policing

A

When the number of bytes in the packet are less or equal than the number of tokens in the Bc bucket the packet is conforming. The policer takes the required tokens from the Bc bucket and performs the action. The policer also takes the same amount of tokens from the PIR bucket!
If the packet does not conform and the number of bytes of the packet is less than or equal to the number of tokens in the PIR bucket, the packet is exceeding.The policer will remove the required tokens from the PIR bucket and takes the configured action for exceeding packets.
When the packet is not conforming or exceeding, it is violating. The policer doesn’t take any tokens and performs the action for violating packets.

168
Q

What are the two rates in dual rate policing

A
CIR = Committed Information Rate
PIR = Peak Information Rate
169
Q

In policing what are the three colors?

A

Conforming
Exceeding
Violating

170
Q

When qos is enabled on a switch with ‘mls qos’ what is the default behavior on DSCP fields

A

They are erased! (after the value of the field is checked)

no mls qos rewrite ip dscp prevents this

171
Q

What is a trust boundary for qos on a switch?

A

Markings made by devices inside the boundary are kept and used. Outside the boundary are ignored and overwritten.

172
Q

What benefits do come with HSRPv2

A

4096 groups vs. 256
msec timers for v2
New multicast group 224.0.0.102 instead of ‘all routers’

173
Q

Configure HSRP with a hello timer of 100ms and hold of 300ms - preempt with a delay of 60 seconds and md5 authentication. The primary should track the ping results of 192.168.23.3.

A
interface Vlan1
 ip address 192.168.1.1 255.255.255.0
 standby version 2
 standby 1 ip 192.168.1.254
 standby 1 timers msec 100 msec 300
 standby 1 preempt delay minimum 60
 standby 1 authentication md5 key-string MY_SECRET_KEY
interface Vlan1
 ip address 192.168.1.2 255.255.255.0
 standby version 2
 standby 1 ip 192.168.1.254
 standby 1 timers msec 100 msec 300
 standby 1 priority 150
 standby 1 preempt delay minimum 60
 standby 1 authentication md5 key-string MY_SECRET_KEY
 standby 1 track 1 decrement 60

ip sla 1
icmp-echo 192.168.23.3
frequency 10
ip sla schedule 1 life forever start-time now

174
Q

List the five HSRP states

A
Initial
Listen
Speak
Standby
Active
175
Q

Which HSRP device will be active?

A

First the one with the highest configured priority

Second the one with the highest IP address

176
Q

What is the default HSRP hold time?

A

10 seconds

177
Q

Configure HSRP interface tracking

A

global: track 1 interface GigabitEthernet 0/2 line-protocol
if: standby 1 track 1 decrement 60

Or if: standby 1 track GigabitEthernet 0/2 60
(no decrement keyword for second option)

178
Q

List the major IPv6 address types

A
Global Unicast - 2000::/3
Unique Local - FD00::/8 (FC00::/7 with FC00::/8 undefined)
Link Local - FE80::/10
Multicast -FF00::/8
Unspecified - ::/128
Loopback - ::1
179
Q

EUI-64 has what in the middle of the host portion of the address? Which bit is flipped?

A

FFFE,

The 7th

180
Q

How is a solicited-node multicast address built

A

FF02::1:FF + Last 6 hex chars of unicast address

181
Q

What are the major IPv6 multicast addresses

A

ff02: :1 - all nodes
ff02: :2 - all routers

182
Q

What is a Neighbor Solicitation Message

A

IPv6 ARP request - sent to solicited node multicast address and includes the layer 2 address of the sending host

183
Q

What is sent in reply to a neighbor solicitation?

A

A neighbor advertisement message - includes layer 2 address of sending host and sent to layer 2 address of soliciting host.

184
Q

Configure a neighbor to obtain its IP through SLAAC

A

ipv6 address autoconfig

185
Q

Configure OSPFv3

A
ipv6 unicast-routing 
!
interface loopback 0
 ipv6 address 2001::1/128
 ipv6 ospf 1 area 0
!
interface fastEthernet 0/0
 ipv6 enable
 ipv6 ospf 1 area 0
!
ipv6 router ospf 1
 router-id 1.1.1.1
186
Q

Command to advertise default route in OSPFv3

A

default-information originate (always)

187
Q

Configure IPv6 EIGRP

A
interface loopback 0
 ipv6 address 2001::1/128
 ipv6 eigrp 1
!
interface GigabitEthernet 0/1
 ipv6 enable
 ipv6 eigrp 1
!
ipv6 router eigrp 1
 router-id 1.1.1.1
 no shutdown
188
Q

List main differences between IPv4 and IPv6 access lists

A

IPv4 access-lists can be standard or extended, numbered or named. IPv6 only has named extended access-lists.
IPv4 access-lists have an invisible implicit deny any at the bottom of every access-list. IPv6 access-lists have three invisible statements at the bottom:
permit icmp any any nd-na
permit icmp any any nd-ns
deny ipv6 any any

189
Q

Configure IPv6 ACL to allow only telnet to 2001:DB8:0:12::1

A
interface FastEthernet0/0
 no ip address
 ipv6 address 2001:DB8:0:12::2/64
 no ipv6 unreachables
 ipv6 traffic-filter R1_TRAFFIC in        
!
ipv6 access-list R1_TRAFFIC
 permit tcp host 2001:DB8:0:12::1 any eq telnet
190
Q

Configure SNMPv3

A
hostname R1
!
snmp-server group MYGROUP v3 priv
snmp-server user MYUSER MYGROUP v3 auth md5 MYPASS123 priv aes 128 MYKEY12
!
end
191
Q

Configure basic IP SLA

A
ip sla 1
 icmp-echo 192.168.12.2 
 frequency 10
!
ip sla schedule 1 start-time now life forever
192
Q

What command shows the result of active IP SLAs

A

show ip sla statistics

193
Q

Configure RSPAN

A
SW1
vlan 100
 remote-span
monitor session 1 source interface Fa0/1
monitor session 1 destination remote vlan 100
SW2
vlan 100
 remote-span
monitor session 1 source remote vlan 100
monitor session 1 destination interface fastEthernet 0/1
194
Q

Configure SPAN

A

monitor session 1 source interface Fa0/1
monitor session 1 destination interface Fa0/2
monitor session 2 source vlan 1
monitor session 2 destination interface Fa0/3

195
Q

What do the virutal MAC addresses for HSRPv1 and HSRPv2 start with?

A

v1 0000.0C07.AC–

v2 0000.0C9F.F—

196
Q

How is VRRP different from HSRP

A

Can use a router’s own IP as virtual IP

Hello timers 1 3 by default instead of 3 10

197
Q

How is GLBP different from HSRP/VRRP

A

Gateway –Load Balancing–

Multiple IPs/Virtual MACs for load balancing

198
Q

What is FHRP

A

a First Hop Redundancy Protocol aka HSRP / VRRP

199
Q

List recommended requirements for voice and video traffic - jitter, delay, and loss - as well as the recommended QOS marking for each

A
Both:
Jitter < 30ms
Delay < 150ms
Loss < 1%
Voice QOS: DSCP EF
Video QOS: AF41
200
Q

What does LLQ stand for?

A
low Latency queuing 
CB-WFQ is WFQ + classes that carve up bandwidth.
FYI CB-WFQ + strict priority
PQ-CBWFQ
-aka voice can go first.
201
Q

Compare TACACS+ to RADIUS

A

TACACS+ - Cisco Proprietary, Command-by-command authorization, packet fully encrypted, normally used for network devices

Radius - Industry standar RFC 2865, Only password encrypted, Normally used for user auth

202
Q

When an ACL denies a packet what messages is sent back to the source

A

ICMP unreachable

203
Q

List network traffic attributes IP SLA can track

A

Network Delay
Packet Loss
Jitter
Voice Quality

204
Q

What command shows the number of EIGRP packets sent and received?

A

show ip eigrp traffic

IP-EIGRP Traffic Statistics for process 78
Hellos sent/received: 2180/2005
Updates sent/received: 70/21
Queries sent/received: 3/1
Replies sent/received: 0/3
Acks sent/received: 22/11
205
Q

Configure GRE tunnels

A

R1:

interface Tunnel1
 ip address 192.168.13.1 255.255.255.0
 tunnel source GigabitEthernet0/1
 tunnel destination 192.168.23.3
interface 
!
GigabitEthernet0/1
 ip address 192.168.12.1 255.255.255.0
R2:
interface Tunnel1
 ip address 192.168.13.3 255.255.255.0
 tunnel source GigabitEthernet0/1
 tunnel destination 192.168.12.1
!         
interface GigabitEthernet0/1
 ip address 192.168.23.3 255.255.255.0