ccnp interview question

Upload: ajai-issac-arisseril

Post on 06-Apr-2018

233 views

Category:

Documents


2 download

TRANSCRIPT

  • 8/3/2019 Ccnp Interview Question

    1/40

    CCNA INTERVIEW Q&AQ. What is a router?A. A router is a device that connects more than one physical network,or segments of a network, using IP routing software. As packets reachthe router, the router reads them and forwards them to theirdestination.

    Q. Discuss wireless networking.A. This is a network configured to use communication techniques suchas infrared, cellular, or microwave, so that cable connections are notrequired.

    Q. Discuss WAN (wide area network).A. A WAN is extended over longer distances that a LAN (local areanetwork). It can range from a few miles to across the world. TCP/IP isthe primary WAN protocol and was developed to provide reliable,secure data transmissions over long distances.

    Q. What is OSPF?A. Open Shortest Path First is a routing protocol that supports theconcept of a core area to which everything attaches.

    Q. What is BGP?A. Border Gateway Protocol is used for routing between networks onthe Internet core, and it supports many advanced routing features.

    Q. What is an autonomous system?A. An autonomous system is a community of interest. Used inconjunction with routing protocols, it breaks up parts of the networkinto manageable chunks.

    Q. What is dial on demand?A. Dial on demand is a technology that only activates networkconnection when interesting packets are to be sent across theinfrastructure.

    Q. What mask would you use to supernet two class Caddresses?A. The subnet would be 255.255.254.0.

    Q. What is VLANing?A. Virtual LAN is used on large LANs to break up the network intosmaller broadcast domains. This creates communities of interest.

    These communities can be based around organizational structures.

  • 8/3/2019 Ccnp Interview Question

    2/40

    Q. What is CIDR?A. Classless Internet domain routing is used in conjunction withclassless routing protocols to summarize the Internet into smallerrouting tables.

    Q. What is VLSM?A. Variable Length Subnet Mask is used to allocate the amount of address space required by the end network.

    Q. What is a class D IP address?A. Class D addresses are multicast addresses.

    Q. What addresses do multicasts start with?A. Multicasts start with the address 224.0.0.0.

    Q. Which name resolution system is implemented with TCP/IP

    by default?A. Although WINS is a name resolution that is implemented by TCP/IPby default, it only works on Windows-based networks. The only truename resolution system that almost every TCP/IP networks uses isDNS.

    Q. You are the administrator of a 100-station Ethernetnetwork. Your users are complaining of slow network speeds.What could you replace your hub with to increase your network throughput?A. A switch would increase performance by making virtual, direct

    connections between sender and receiver. A bridge and router wouldactually decrease performance because these devices introducelatency into the communication.

    Q. Which TCP/IP utility is most often used to test whether an IPhost is up and functional?A. The Ping utility is the most often used TCP/IP utility because it allowsyou to test individual hosts.

    Q. Which utility can you use to find the MAC and TCP/IPaddress of your Windows NT or 2000 workstation?

    A. The ipconfig utility is available for both these operating systems. Itdisplays information like the MAC and TCP/IP address of yourworkstation as well as other TCP/IP configuration information.

    Q. Which utility can you use to verify a packets path?A. The tracert utility traces the route from the source IP host to thedestination host.

  • 8/3/2019 Ccnp Interview Question

    3/40

    Q. Which WAN technology uses digital signaling from sender toreceiver?A. The T-series of WAN connection (such as T1, T3, and so on) uses

    digital signaling from sending hardware to receiving hardware.Q. You are setting up a workstation for remote access to theoffice. The office has a modem pool configured, and it isworking correctly. The required results are that theworkstation and modem bank must establish a connection andthat the server at the office must authenticate theworkstation. Optionally, the workstation and office must beable to communicate by using a single protocol, and theworkstation must be able to access all network devices at theoffice. The proposed solution is to install a POTS telephone

    line, modem cable, and modem connected to the workstation.How would you configure the protocols to achieve the desiredresults?A. This question tests your ability to configure protocols and select thebest one to meet the connectivity requirements. The recommendedprotocol here would be TCP/IP since it can be used across the differentaccess methods.

    Q. Which remote access protocol can run over both serial andparallel connections?A. Because PPP doesnt contain a physical layer specification as part of

    the protocol, it can run over any kind of medium.

    Q. What Microsoft TCP/IP protocol can be used over theInternet to create a secure, virtual network?A. The Point-to-Point Tunneling Protocol (PPTP) allows you to create asecure, virtual connection between two points by tunneling oneprotocol inside another. Usually, a PPP connection is opened over a

    TCP/IP link.

    Q. Which type of firewall checks for a current communicationand the next packet needed?

    A. A proxy provides firewall services by keeping track of allcommunications sessions and prefetching the next packets.

    Q. Which type of security uses a file that identifies predefinedIP addresses that are allowed to send data through a router?A. Access Control List security uses a file (the ACL) that identifies whichaddresses can send data through a particular firewall or router.

  • 8/3/2019 Ccnp Interview Question

    4/40

    A broadcast domain is a logical division of a computer network , inwhich all nodes can reach each other by broadcast at the data link layer . A broadcast domain can be within the same LAN or it can berouted towards other LAN segments.

    A collision domain is a physical network segment where data packets can "collide" with one another for being sent on a shared medium, inparticular in the Ethernet networking protocol. A network collision is ascenario wherein one particular device sends a packet on a networksegment, forcing every other device on that same segment to payattention to it. Meanwhile, another device does the same, and the twocompeting packets are discarded and re-sent one at a time. Thisbecomes a source of inefficiency in the network

    *************************CCNP****************************

    Quick Notes - LANWhat is carrier sense multiple access collision detect(CSMA/CD)?CSMA/CD describes the Ethernet access method. In CSMA/CD, manystations can transmit on the same cable, and no station has priorityover any other. Before a station transmits, it listens on the wire tomake sure no other station is transmitting. If no other station istransmitting, the station transmits across the wire. CSMA/CD is allabout devices taking turns using the wire.

    What are MAC addresses?For computers to identify each other on the data link layer, they needa MAC address (hardware address). All devices on a LAN must have aunique MAC address. A MAC address is a 48-bit (six octet) addressburned into a network interface card. The first three octets (24 bits) of the MAC address indicate the vendor that manufactured the card. Thisis called the Organization Unique Identifier (OUI). The last three octetsof the MAC address are the unique host address. An example of a MACaddress is 00-80-C6-E7-9C-EF.

    What are the three types of LAN traffic? The three types of LAN traffic are:UnicastsBroadcastsMulticasts

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Broadcasting_(computing)http://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Collision_(telecommunications)http://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Broadcasting_(computing)http://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Collision_(telecommunications)http://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Ethernet
  • 8/3/2019 Ccnp Interview Question

    5/40

    RIP V1 and V2?

    RIP v2 supports VLSM with a new field in the header "subnet mask"Supports authentication with the authentication field in the headerRIP V1 uses Broadcast and RIP V2 uses Multicast

    What are unicast frames?Unicast frames are the most common type of LAN traffic. A unicastframe is a frame intended for only one host. In unicast frames, the onlystation that processes the frame is the station that has its own MACaddress in the destination portion of the packet.

    What are broadcast frames?

    Broadcast frames are frames intended for everyone. Stations viewbroadcast frames as public service announcements. All stations receiveand process broadcast frames. In large networks, broadcasts can bringthe network to a crawl, because every computer must process them.

    What is the destination address of broadcast frames? The destination address of broadcast frames (Layer 2 broadcastaddresses) is FF-FF-FF-FF-FF-FF, or all 1s in binary.

    What are multicast frames?Multicast frames address a group of devices that have a common

    interest. These frames allow the source to send only one copy of theframe on the network even though it is intended for several stations.Only stations that have a card that is configured to receive multicastframes process them. All other stations discard multicast frames.

    What devices can you use to segment a LAN at Layer 1, Layer2, and Layer 3?

    Three devices you can use to segment a LAN are:Hubs/repeaters (Layer 1)Bridges/switches (Layer 2) - physical addressesRouters (Layer 3) - logical addresses

    What happens when you segment the network withhubs/repeaters?Because hubs and repeaters operate at the physical layer of the OSImodel, segmenting a network with these devices appears as anextension to the physical cable. Hubs and repeaters are transparent todevices. They are unintelligent devices. All devices that connect to a

  • 8/3/2019 Ccnp Interview Question

    6/40

    hub/repeater share the same bandwidth. Hubs/repeaters create asingle broadcast and collision domain.

    What is the advantage of segmenting a network withbridges/switches?

    Bridges/switches operate at Layer 2 of the OSI model and filter by MACaddress. Each port on a bridge/switch provides full-dedicatedbandwidth and creates a single collision domain. Becausebridges/switches operate at Layer 2 of the OSI model, they cannot filterbroadcasts, and they create a single broadcast domain. For the CCNAtest, remember that switches create more collision domains and fewercollisions.

    What is the difference between bridges and switches?Bridges and switches function the same way; the only difference is inhow they are implemented. Bridges are implemented by software and

    usually have a couple of network ports. Switches are implemented inhardware by ASIC chips and have many ports.

    What are the advantages and disadvantages of segmentingthe LAN with routers?An advantage of segmenting the LAN with routers is that eachinterface on a router creates a single broadcast and collision domain.Routers operate at Layer 3 of the OSI model and do not propagatebroadcasts. Some disadvantages are that routers are not transparentand are implemented in software, thus introducing latency in thenetwork.

    What is the Maximum Transmission Unit (MTU) for an Ethernetframe?1500 bytes is the MTU for an Ethernet frame. You will notice that somepublications state that the MTU for Ethernet is 1518 bytes. This iscorrect also. But what is the true answer? The MTU for Ethernet,including the header, source and destination address, data, and CRC is1518 bytes. The MTU for the data portion of the frame is 1500 bytes.

    What three major functions do Layer 2 switches provide? The three major functions that Layer 2 switches provide areAddress learningPacket forwarding/filteringLoop avoidance by spanning tree

    What are some advantages of switches?Some advantages of switches are as follows:

    They increase available network bandwidth. They reduce the number of users per segment.

  • 8/3/2019 Ccnp Interview Question

    7/40

    They provide dedicated bandwidth to each segment. Transparent bridging (switching) provides five bridging functions todetermine what to do when it receives a frame.

    What are these five processes? The five processes are:LearningFloodingFilteringForwardingAging

    In transparent bridging, what is the learning process? The first process a bridge goes through when it is powered on is thelearning process. The MAC address table on the bridge contains no

    entries, and the bridge goes through the learning process to record allworkstations on every interface. In the learning process, the bridgerecords the source MAC address and source port number in the MACaddress table every time it sees a frame.

    In transparent bridging, what is the flooding process?When a bridge is first turned on, it has no MAC address in its table.When a switch receives a unicast frame, it knows the source addressand port from which the unicast frame came, but no entry exists in itstable for the destination address. This is called an unknown unicastframe. When a switch receives an unknown unicast frame, it sends the

    frame out all forwarding interfaces on the bridge except the interfacethat received the frame. This process is the flooding process.

    In transparent bridging, what is the filtering process? The filtering process occurs when the source and destination addressesreside on the same interface on the bridge. Because the bridge doesnot need to forward a frame in which the destination and sourceaddresses reside on the same interface, it filters the frame anddiscards it.

    In transparent bridging, what is the forwarding process?

    The forwarding process occurs when a switch receives a unicast frameand has an entry of the destination address in its MAC table. Theswitch then forwards the frame to the interface where that destinationaddress resides.

    In transparent bridging, what occurs during the aging process?Every time a bridge learns a source address, it time-stamps the entry.When the bridge sees a frame from this source, it updates the time

  • 8/3/2019 Ccnp Interview Question

    8/40

    stamp. If the bridge does not hear from the source for a specificamount of time (called the aging timer), the bridge deletes the entryfrom its MAC address table. This process is the aging process.What is the default aging time in transparent bridges?

    The default aging timer is 5 minutes.

    What is the Spanning-Tree Protocol (STP)?STP is a loop-prevention bridge-to-bridge protocol. Its main purpose isto dynamically maintain a loop-free network. It does this by sendingout Bridge Protocol Data Units (BPDUs), discovering any loops in thetopology, and blocking one or more redundant links.

    How does STP maintain a loop-free network?STP maintains a loop-free network byElecting a root bridgeElecting a root port on each nonroot bridge

    Electing designated portsPutting in the blocking state any port that is not a root port ordesignated port

    In spanning tree, what is a Bridge ID (BID)?A BID is an 8-byte field that is composed of the bridge's 6-byte MACaddress and a 2-byte bridge priority.

    What is the default bridge priority in a Bridge ID for all Ciscoswitches?32,768

    In spanning tree, what is path cost?Path cost is a calculation to determine the link's bandwidth. It is avalue assigned to each port that is based on the port's speed.

    What is the spanning tree path cost for each of the following?10 Mbps100 Mbps1 Gbps

    The path costs are as follows:10 Mbps - 100100 Mbps - 191 Gbps - 4

    When calculating a loop-free environment, what four-stepdecision sequence does spanning tree use to determine whatwill be the root bridge and which ports will forward or block?

    The four-step decision sequence that spanning tree uses to determinethe root bridge and which port will forward is as follows:

  • 8/3/2019 Ccnp Interview Question

    9/40

    Step 1. The lowest root BIDStep 2. The lowest path cost to the root bridgeStep 3. The lowest sender BIDStep 4. The lowest port ID

    How do bridges pass spanning tree information betweenthemselves?Bridges pass STP information using special frame called BridgeProtocol Data Units (BPDUs).

    How often do bridges send BPDUs out active ports? The default time that bridges send BPDUs out active ports is 2seconds.Note: All ports on a switch listen for BPDUs in case there is a topologychange.

    In STP, how is a root bridge elected?In STP, the bridge with the lowest BID is elected the root bridge. Allports on the root bridge are placed in the forwarding state and arecalled designated ports.Note: The BID is a 6-byte field that is composed of a default priority(32,768) and a MAC address. Because all Cisco switches use thedefault priority, the switch with the lowest MAC address is elected theroot bridge. As a rule of thumb, lower will always win in spanning tree.

    After bridges elect the root bridge, what do they do next?After electing the root bridge, switches elect root ports. A root port is

    the port on nonroot bridges that is closest to the root bridge. Everynonroot bridge must select one root port.

    How do nonroot bridges decide which port they will elect as aroot port?Nonroot bridges use root path cost to determine which port will be theroot port. Root path cost is the cumulative cost of all links to the rootbridge. The port with the lowest root path cost is elected the bridge'sroot port and is placed in the forwarding state.

    What is the difference between path cost and root path cost?

    Path cost is the value assigned to each port. It is added to BPDUsreceived on that port to calculate the root path cost. Root path cost isdefined as the cumulative cost to the root bridge. In a BPDU, this is thevalue transmitted in the cost field. In a bridge, this value is calculatedby adding the receiving port's path cost to the value contained in theBPDU.

  • 8/3/2019 Ccnp Interview Question

    10/40

    If a nonroot bridge has two redundant ports with the sameroot path cost, how does the bridge choose which port will bethe root port?If a nonroot bridge has redundant ports with the same root path cost,the deciding factor is the port with the lowest port ID (port number).

    After the root bridge and root ports are selected, the last stepin spanning tree is to elect designated ports. How do bridgeselect designated ports?In spanning tree, each segment in a bridged network has onedesignated port. This port is a single port that both sends and receivestraffic to and from that segment and the root bridge. All other ports areplaced in a blocking state. This ensures that only one port on anysegment can send and receive traffic to and from the root bridge,ensuring a loop-free topology. The bridge containing the designatedport for a segment is called the designated bridge for that segment.

    Designated ports are chosen based on cumulative root path cost to theroot bridge.Note: Every active port on the root bridge becomes a designated port.

    If a bridge is faced with a tie in electing designated ports, howdoes it decide which port will be the designated port?In the event of a tie, STP uses the four-step decision process discussedin Question 30. It first looks for the BPDU with the lowest BID; this isalways the root bridge. If the switch is not the root bridge, it moves tothe next step: the BPDU with the lowest path cost to the root bridge. If both paths are equal, STP looks for the BPDU with the lowest sender

    BID. If these are equal, STP uses the link with the lowest port ID as thefinal tiebreaker.

    What are the four spanning tree port states? The four spanning tree port states areBlockingListeningLearningForwardingRemember that root and designated ports forward traffic and thatnondesignated ports block traffic but still listen for BPDUs.Important note: There is another port state - Disabled - (No framesforwarded, no BPDUs heard). If it shows up in the answer options -select it along with the others.

    What is the STP blocking state?When a switch starts, all ports are in the blocking state. This is toprevent any loops in the network. If there is a better path to the root

  • 8/3/2019 Ccnp Interview Question

    11/40

    bridge, the port remains in the blocked state. Ports in the blocked statecannot send or receive traffic, but they can receive BPDUs.

    What is the STP listening state?Ports transition from a blocked state to a listening state. In this state,

    no user data is passed. The port only listens for BPDUs. After listeningfor 15 seconds (if the bridge does not find a better path), the portmoves to the next state, the learning state.

    What is the STP learning state?In the STP learning state, no user data is being passed. The port quietlybuilds its bridging table. The default time in the learning state is 15seconds.

    What is the STP forwarding state?After the default time in the learning state is up, the port moves to the

    forwarding state. In the forwarding state, the port sends and receivesdata.

    What is STP forward delay? The forward delay is the time it takes for a port to move from thelistening state to the learning state or from the learning state to theforwarding state. The default time is 30 seconds.

    What is the hello time in STP timers? The hello time is the time interval between the sending of BPDUs. Thedefault time is 2 seconds.

    What is the Max Age timer? The Max Age timer is how long a bridge stores a BPDU beforediscarding it. The default time is 20 seconds (ten missed hellointervals).

    What is the default time a port takes to transition from theblocking state to the forwarding state?

    The default time a port takes to transition from the blocking state tothe forwarding state is 50 seconds: 20 seconds for Max Age, 15seconds for listening, and 15 seconds for learning.

    What does STP do when it detects a topology change in thenetwork due to a bridge or link failure?If spanning tree detects a change in the network due to a bridge or linkfailure, at least one bridge interface changes from the blocking state tothe forwarding state, or vice versa.

    WAN

  • 8/3/2019 Ccnp Interview Question

    12/40

    The three WAN connection types available are leased lines,circuit-switched, and packet-switched. Define the differencesbetween each connection type.

    Leased lines are dedicated point-to-point lines that provide a singlepreestablished WAN communication path from the customer's networkto the remote network. Leased lines are usually employed oversynchronous connections. They are generally expensive and arealways up.Circuit-switched connections are dedicated for only the duration of thecall. The telephone system and ISDN are examples of circuit-switchednetworks. Packet-switched connections use virtual circuits (VCs) toprovide end-to-end connectivity.Packet-switched connections are similar to leased lines, except thatthe line is shared by other customers. A packet knows how to reach its

    destination by programming of switches. Frame Relay is an example of a packet-switched connection.

    Define customer premises equipment (CPE), and give an example.CPE is equipment that is located on the customer's (or subscriber's)premises. It is equipment owned by the customer or equipment leasedby the service provider to the customer. An example is your router.

    What is the demarcation point (demarc)? The demarc is the point where the CPE ends and the local loop begins.It is the last responsibility of the service provider and is usually an RJ-

    45 jack located close to the CPE. Think of the demarc as the boundarybetween the customer's wiring and the service provider's wiring.What is the local loop?

    The local loop is the physical cable that extends from the demarc tothe central office.

    Describe the central office (CO). The CO is the telco switching facility that connects the customer to theprovider's switching network. The CO is sometimes referred to as apoint of presence. It is the point where the local loop gains access tothe service provider's access lines.

    What is the toll network?All the telco switches, COs, and trunk lines inside the WAN provider'snetwork are the toll network.

    What are synchronous links?Synchronous links have identical frequencies and contain individualcharacters encapsulated in control bits, called start/stop bits, that

  • 8/3/2019 Ccnp Interview Question

    13/40

    designate the beginning and end of each character. Synchronous linkstry to use the same speed as the other end of a serial link.

    What are Asynchronous links?Asynchronous links send digital signals without timing. Asynchronouslinks agree on the same speed, but there is no check or adjustment of the rates if they are slightly different. Only 1 byte per transfer is sent.

    List some typical Layer 2 encapsulation methods for WAN links.. High-Level Data Link Control (HDLC) Point-to-Point Protocol (PPP) Serial Line Internet Protocol (SLIP) X.25/Link Access Procedure, Balanced (LAPB)

    Frame Relay Asynchronous Transfer Mode (ATM)Describe HDLC.HDLC was derived from Synchronous Data Link Control (SDLC). It is thedefault encapsulation type on point-to-point dedicated links and circuit-switched connections between Cisco routers. It is an ISO-standard bit-oriented data-link protocol that encapsulates data on synchronouslinks. HDLC is a connection-oriented protocol that has very littleoverhead. HDLC lacks a protocol field and therefore cannotencapsulate multiple network layer protocols across the same link.Because of this, each vendor has its own method of identifying the

    network-layer protocol. Cisco offers a propriety version of HDLC thatuses a type field that acts as a protocol field, making it possible formultiple network-layer protocols to share the same link.

    By default, Cisco uses HDLC as its default encapsulationmethod across synchronous lines (point-to-point links). If aserial line uses a different encapsulation protocol, how do youchange it back to HDLC?

    To change a serial line back to HDLC, use the following interfacecommand on the serial interface you want to change: Router(config-if)#encapsulation hdlc

    What is the Point-to-Point Protocol (PPP)?PPP is an industry-standard protocol that provides router-to-router orrouter-to-host connections over synchronous and asynchronous links. Itcan be used to connect to other vendors' equipment. It works withseveral network-layer protocols, such as IP and IPX. PPP providesauthentication through PAP or CHAP.

  • 8/3/2019 Ccnp Interview Question

    14/40

    Describe X.25/LAPB.X.25/LAPB is an ITU-T standard that has a tremendous amount of overhead because of its strict timeout and windowing techniques. LAPBis the connection-oriented protocol used with X.25. It uses the ABM(Asynchronous Balance Mode) transfer mode. X.25/LAPB was used in

    the 1980s when WAN links were not as error-free as they are today.X.25 is a predecessor of Frame Relay. X.25 supports both switched andpermanent virtual circuits.

    What is Frame Relay?An industry standard, Frame Relay is a switched data link layerprotocol that uses virtual circuits to identify the traffic that belongs tocertain routers. It provides dynamic bandwidth allocation andcongestion control.

    Quick Notes - INTERNETWORKING

    What are the three layers of the Cisco Hierarchical Model? The three layers of the Cisco Hierarchical Model are: 1the access layer

    The distribution layer The core layer

    In the Cisco Hierarchical Model, what is the function of the accesslayer?Sometimes referred to as the desktop layer, the access layer is thepoint at which users connect to the network through low-end switches.Some functions of the access layer include:

    Connectivity into the distribution layerShared BandwidthMAC Address filtering (switching)Segmentation

    What is the function of the distribution layer in the CiscoHierarchical Model?

    The distribution layer is also known as the workgroup layer. It is thedemarcation point between the access and core layers of the network.Its primary function is to provide routing, filtering, and WAN access.

    The distribution layer determines how packets access the core, so it isthe layer at which to implement policy-based connectivity. Somefunctions include the following:Collection point for access layer devicesBroadcast and multicast domain segmentationSecurity and filtering services such as firewalls and access listsProviding translation between different media typesInter-VLAN routing

  • 8/3/2019 Ccnp Interview Question

    15/40

    What is the role of the core layer in the Cisco HierarchicalModel?

    The core layer is the backbone of the network. Its main function is toswitch traffic as fast as possible. Therefore, it should not perform anyfiltering to slow down traffic.

    The ISO's OSI Reference Model contains seven layers. What arethey? Include the layer number and name of each layer in youranswer.

    The seven layers of the OSI model are as follows:Layer 7 - Application layerLayer 6 - Presentation layerLayer 5 - Session layerLayer 4 - Transport layerLayer 3 - Network layerLayer 2 - Data link layerLayer 1 - Physical layer

    What are some reasons that the industry uses a layeredmodel?Here are some reasons why the industry uses a layered model:It encourages industry standardization by defining what functionsoccur at each level.It allows vendors to modify or improve components at only one layerversus rewriting the whole protocol stack.It helps interoperability by defining standards for the operations ateach level.It helps with troubleshooting.

    What does the application layer (Layer 7) of the OSI model do,and what are some examples of this layer?

    The application layer is the layer that is closest to the user. This meansthat this layer interacts directly with the software application. Theapplication layer's main function is to identify and establishcommunication partners, determine resource availability, andsynchronize communication. Some examples include the following:

    TCP/IP applications such as Telnet, File Transfer Protocol (FTP), SimpleMail Transfer Protocol (SMTP), WWW, and HTTP.OSI applications such as Virtual Terminal Protocol, File

    Transfer, Access, and Management (FTAM), and Common ManagementInformation Protocol (CMIP).

    In the OSI model, what are the responsibilities of the presentation layer(Layer 6)? Give some examples of this layer.Also known as the translator, the presentation layer provides codingand conversion functions to application layer data. This guarantees

  • 8/3/2019 Ccnp Interview Question

    16/40

    that the application layer on another system can read data transferredfrom the application layer of a different system. Some examples of thepresentation layer are:Compression, decompression, and encryption

    JPEG, TIFF, GIFF, PICT, QuickTime, MPEG, and ASCII

    What are the functions of the session layer (Layer 5)? Givesome examples.

    The session layer is responsible for creating, managing, and endingcommunication sessions between presentation layer entities. Thesesessions consist of service requests and responses that developbetween applications located on different network devices. Someexamples include SQL, RPC, NFS, X Window System, ZIP, NetBIOSnames, and AppleTalk ASP.

    What is the transport layer (Layer 4) responsible for? Give

    some examples of transport layer implementations. The transport layer segments and reassembles data from upper-layerapplications into data streams. It provides reliable data transmission toupper layers. End-to-end communications, flow control, multiplexing,error detection and correction, and virtual circuit management aretypical transport layer functions. Some examples include TCP, UDP*,and SPX.Note: watch out for end-to-end on communications on the exam!

    Transport layer.

    * Error correction does not apply to UDP - connection-less -

    unreliable.....

    What is flow control, and what are the three methods of implementingit?Flow control is the method of controlling the rate at which a computersends data, thus preventing network congestion. The three methods of implementing flow control areBufferingCongestion avoidanceWindowingAlmost certain to be on the exam.

    Describe the function of the network layer (Layer 3), and give someexamples of network layer implementations.

    The network layer provides internetwork routing and logical networkaddresses. It defines how to transport traffic between devices that arenot locally attached. The network layer also supports connection-

  • 8/3/2019 Ccnp Interview Question

    17/40

    oriented and connectionless service from higher-layer protocols.Routers operate at the network layer. IP, IPX, AppleTalk, and DDP areexamples of network layer implementations.

    Are network layer addresses physical or logical?Network layer addresses are logical addresses specific to the networklayer protocol being run on the network. Each network layer protocolhas a different addressing scheme. They are usually hierarchical anddefine networks first and then host or devices on that network. Anexample of a network address is an IP address, which is a 32-bitaddress often expressed in decimal format. 192.168.0.1 is an exampleof an IP address in decimal format.How do routers function at the network layer of the OSI model?Routers learn, record, and maintain awareness of different networks.

    They decide the best path to these networks and maintain thisinformation in a routing table. The routing table includes the following:Network addresses, which are protocol-specific. If you are runningmore than one protocol, you have a network address for each protocol.

    The interface the router uses to route a packet to a different network.A metric, which is the distance to a remote network or the weight of the bandwidth, load, delay, and reliability of the path to the remotenetwork.Routers create broadcast domains. One interface on a router creates asingle broadcast domain and collision domain. However, an interfaceon a switch creates only a single collision domain.

    In addition to learning the remote network and providing a path to thenetwork, what other functions do routers carry out?Routers perform these tasks:Routers, by default, do not forward broadcasts or multicasts.Routers can perform bridging and routing functions.If a router has multiple paths to a destination, it can determine thebest path to the destination.Routers forward traffic based on Layer 3 destination addresses.Routers can connect Virtual LANs (VLANs).Routers can provide quality of service for specified types of networktraffic.What is the responsibility of the data link layer (Layer 2)?

    The data link layer provides functional and procedural means forconnectionless mode among network entities, and for connectionmode entities it provides the establishment, maintenance, and releaseof data link connections among network entities and for the transfer of data link service data units. The data link layer translates messagesfrom the network layer into bits for the physical layer, and it enablesthe network layer to control the interconnection of data circuits within

  • 8/3/2019 Ccnp Interview Question

    18/40

    the physical layer. Its specifications define different network andprotocol characteristics, including physical addressing, errornotification, network topology, and sequencing of frames. Data linkprotocols provide the delivery across individual links and areconcerned with the different media types, such as 802.2 and 802.3.

    The data link layer is responsible for putting 1s and 0s into a logicalgroup. These 1s and 0s are then put on the physical wire. Someexamples of data link layer implementations are IEEE 802.2/802.3,IEEE 802.5/802.2, packet trailer (for Ethernet, the FCS or CRC), FFDI,HDLC, and Frame Relay.

    The IEEE defines what two sublayers of the data link layer? The two sublayers of the data link layer are The Logical Link Control (LLC) sublayer The Media Access Control (MAC) sublayer These two sublayers provide physical media independence.

    For what is the LLC sublayer responsible? The Logical Link Control (802.2) sublayer is responsible for identifyingdifferent network layer protocols and then encapsulating them to betransferred across the network. An LLC header tells the data link layerwhat to do with a packet after it is received.

    What functions does the Media Access Control (MAC) sublayer provide? The MAC sublayer specifies how data is placed and transported overthe physical wire. The LLC layer communicates with the network layer,but the MAC layer communicates downward directly to the physical

    layer. Physical addressing (MAC addresses), network topologies, errornotification, and delivery of frames are defined at this sublayer.

    What are some network devices that operate at the data link layer?Bridges and switches are network devices that operate at the data linklayer. Both devices filter traffic by MAC addresses.

    What is the function of the OSI model's physical layer (Layer 1)? Givesome examples of physical layer implementations.

    The physical layer defines the physical medium. It defines the mediatype, the connector type, and the signaling type (baseband versusbroadband). This includes voltage levels, physical data rates, andmaximum cable lengths. The physical layer is responsible forconverting frames into electronic bits of data, which are then sent orreceived across the physical medium. Twisted pair, coaxial cable, andfiber-optic cable operate at this level. Other implementations at thislayer are repeaters/hubs, RJ-45.

  • 8/3/2019 Ccnp Interview Question

    19/40

    The Ethernet and IEEE 802.3 standards define what threephysical wiring standards that operate at 10 Mbps?

    These physical wiring standards operate at 10 Mbps:10Base210Base5

    10BaseTWhat are collision domains?In Ethernet segments, devices connect to the same physical medium.Because of this, all devices receive all signals sent across the wire. If two devices send a packet at the same time, a collision occurs. In theevent of a collision, the two devices run a backoff algorithm and resendthe packet. The devices retransmit up to 15 times. The first station todetect a collision issues a jam signal. When a jam signal is sent from aworkstation, it affects all of the machines on the segment, not just thetwo that collided; when the jam signal is on the wire, no workstationscan transmit data. The more collisions that occur in a network, the

    slower it will be, because the devices will have to resend the packet. Acollision domain defines a group of devices connected to the samephysical medium.

    What are broadcast domains?A broadcast domain defines a group of devices that receive eachothers' broadcast messages. As with collisions, the more broadcaststhat occur on the network, the slower your network will be. This isbecause every device that receives a broadcast must process it to seeif the broadcast is intended for it.

    What devices are used to break up collision and broadcast domains?Switches and bridges are used to break up collision domains. Theycreate more collision domains and fewer collisions. Routers are used tobreak up broadcast domains. They create more broadcast domains andsmaller broadcast areas.

    How do the different layers of the OSI model communicatewith each other?Each layer of the OSI model can communicate only with the layerabove it, below it, and parallel to it (a peer layer). For example, thepresentation layer can communicate with only the application layer,session layer, and presentation layer on the machine it iscommunicating with. These layers communicate with each other usingprotocol data units (PDUs). These PDUs control information that isadded to the user data at each layer of the model. This informationresides in fields called headers (the front of the data field) and trailers(the end of the data field).

    What is data encapsulation?

  • 8/3/2019 Ccnp Interview Question

    20/40

    A PDU can include different information as it goes up or down the OSImodel. It is given a different name according to the information it iscarrying (the layer it is at). When the transport layer receives upperlayer data, it adds a TCP header to the data; this is called a segment.

    The segment is then passed to the network layer, and an IP header is

    added; thus, the data becomes a packet. The packet is passed to thedata link layer, thus becoming a frame. This frame is then convertedinto bits and is passed across the network medium. This is dataencapsulationApplication layer -- Data

    Transport layer -- SegmentNetwork layer -- PacketData link layer -- Frame

    There is also the Physical Layer -- Bits

    What is the difference between a routing protocol and a routedprotocol?

    Routing protocols determine how to route traffic to the best location of a routed protocol. Examples of routing protocols are RIP, EIGRP, OSFP,and BGP. Examples of routed protocols are IP and IPX.

    What 3 devices are used to segment a LAN?RouterSwitchBridge

    Quick Notes - CABLING TECHNOLOGY

    What is a straight-through cable, and when would you use it?A straight-through cable is the same at both ends. A straight-throughcable uses pins 1, 2, 3, and 6. The send and receive wires are notcrossed. You should use a straight-through cable when connectingdissimilar devices. Examples include connecting PCs to switches orhubs or a router to a switch or a hub.

    What is a crossover cable, and when would you use it?A crossover cable is a cable that has the send and receive wirescrossed at one of the ends. On a Category 5 cable, the 1 and 3 wiresand the 2 and 6 wires are switched on one of the cable's ends. Youshould use a crossover cable when connecting similar devices, such asconnecting a router to a router, a switch to a switch or hub, a hub to ahub, or a PC to a PC.Important tip -- Router (think of it as a PC) to PC via 10BaseT (NIC)uses a "crossover cable". (contradicts the rule)

    How do you set up a console session to a Cisco device?

  • 8/3/2019 Ccnp Interview Question

    21/40

    To set up a console session to a Cisco device, you connect a rollovercable to the console port on the Cisco device. You then connect theother end to your PC and configure a terminal emulation application tothe following com settings: 9600 bps, 8 data bits, no parity, 1 stop bit,and no flow control.

    What is the maximum cable length for each of the following? The maximum cable lengths are as follows:10Base2 (thinnet) 185 meters10Base5 (thicknet) 500 meters10BaseT 100 meters10BaseFL 2000 meters (400 meters in a shared environment and 2000meters in a point-to-point environment)100BaseT 100 meters

    What does Base stand for in 10BaseT and 100BaseT?

    Base in 10BaseT and 100BaseT stands for baseband. Baseband is anetwork technology in which only one carrier frequency (signal) isused.

    What is the difference between baseband and broadband?Baseband is a network technology in which only one carrier frequencyis used (such as Ethernet). Broadband is a network technology in whichseveral independent channels are multiplexed into one cable (forexample, a T1 line).

    Quick Notes - ACCESS LISTSBesides named access lists, what are the two types of IP access lists? The two types of IP access lists are standard and extended.

    What criteria do standard IP access lists use to filter packets?Standard IP access lists filter packets by the source address. Thisresults in the packet's being permitted or denied for the entire protocolsuite based on the source network IP address.

    What criteria do extended IP access lists use to filter packets?Extended IP access lists filter packets by source address, destinationaddress, protocols, and port numbers.

    In what two ways can IP access lists be applied to an interface?Access lists can be applied as inbound or outbound access lists.Inbound access lists process packets as they enter a router's interfaceand before they are routed. Outbound access lists process packets asthey exit a router's interface and after they are routed.

  • 8/3/2019 Ccnp Interview Question

    22/40

    How many access lists can be applied to an interface on aCisco router?Only one access list per protocol, per direction, per interface can beapplied on a Cisco router. Multiple access lists are permitted perinterface, but they must be for a different protocol.

    How are access lists processed?Access lists are processed in sequential, logical order, evaluatingpackets from the top down, one statement at a time. As soon as amatch is made, the permit or deny option is applied, and the packet isnot applied to any more access list statements. Because of this, theorder of the statements within any access list is significant.

    What is at the end of each access list?At the end of each access list, an implicit deny statement denies anypacket not filtered in the access list.

    What are the number ranges used to define standard andextended IP access lists?

    The number ranges used to define standard and extended IP accesslists are as follows: Standard IP access lists 1 to 99 and 1300 to 1999 Extended IPaccess lists 100 to 199 and 2000 to 2699

    When implementing access lists, what are wildcard masks?Wildcard masks define the subset of the 32 bits in the IP address thatmust be matched. Wildcards are used with access lists to specify a

    host, network, or part of a network. Wildcard masks work exactly theopposite of subnet masks. In subnet masks, 1 bits are matched to thenetwork portion of the address, and 0s are wildcards that specify thehost range. In wildcard masks, when 0s are present, the octet addressmust match.

    What is the IOS command syntax used to create a standard IP accesslist?Here is the command syntax to create a standard IP access list:access-list access-list-number {permit deny} source-address [wildcardmask]access-list-number is a number from 1 to 99.For example:RouterA(config)#access-list 10 deny 192.168.0.0 0.0.0.255

    How can you display all access lists on a Cisco router? To display all access lists on a Cisco router, use the show access-listcommand: RouterA#show access-list Standard IP access list 10 deny192.168.0.0, wildcard bits 0.0.0.255Extended IP access list 101 permittcp any any eq www permit udp any any eq domain permit udp any eq

  • 8/3/2019 Ccnp Interview Question

    23/40

    domain any permit icmp any any deny tcp 192.168.10.0 0.0.0.255 anyeq wwwRouterA#

    Quick Notes - FRAME RELAY What protocol does Frame Relay rely on for error checking?Frame Relay does not rely on any certain protocol for error checking.Instead, it relies on upper-layer protocols to provide error checking. Forexample, Frame Relay relies on TCP to provide error checking in an IPnetwork.

    At what layers of the OSI model does Frame Relay operate?Frame Relay operates at the two lower layers of the OSI model (datalink and physical).

    What is the difference between switched virtual circuits (SVCs)and permanent virtual circuits (PVCs)?SVCs are virtual circuits that are dynamically established when dataneeds to be transferred and that are terminated when datatransmission is complete. SVCs consist of four states: call setup, datatransfer, idle, and call termination. PVCs are permanently establishedvirtual circuits that operate in one of two states: idle or data transfer.When the PVC is idle, the connection between the DTE devices is stillactive.

    What is a Data Link Connection Identifier (DLCI)?A DLCI is a number that identifies the logical circuit between the routerand the Frame Relay switch. It is the Frame Relay Layer 2 address. TheFrame Relay switch maps DLCIs between each pair of routers to createa PVC. For IP devices at the end of each virtual circuit to communicate,their IP addresses need to be mapped to DLCIs. If you are runningCisco IOS 11.2 or later, mapping is done automatically using InverseARP. DLCIs have local significance. Think of DLCIs as the MAC addressof the Frame Relay network.

    What is the committed information rate (CIR)?

    The CIR is the committed information rate, by the service provider, inbits per second, at which data will be transferred. The service providersends any data in excess of this rate if its network has capacity at thattime.

    How does Frame Relay use Inverse ARP?

  • 8/3/2019 Ccnp Interview Question

    24/40

    Frame Relay uses Inverse ARP as a way to dynamically map a networklayer address to a DLCI. With Inverse ARP, the router can discover thenetwork address of a device associated with a VC.

    What is the Local Management Interface (LMI)?

    The LMI is a signaling standard between a CPE device (a router) andthe Frame Relay switch that is responsible for managing andmaintaining status between the devices. It is autosensed with CiscoIOS Release 11.2 and later.

    In Frame Relay, what is Forward Explicit CongestionNotification (FECN)?

    The FECN is the bit in the Frame Relay header that signals to anyonereceiving the frame (switches and DTEs) that congestion is occurring inthe same direction as the frame. Switches and DTEs can react byslowing the rate at which data is sent in that direction.

    What is Backward Explicit Congestion Notification (BECN)? The BECN is the bit in the Frame Relay header that signals to switchesand DTEs receiving the frame that congestion is occurring in thedirection opposite (backward) that of the frame. If switches and DTEdevices detect that the BECN bit in the Frame Relay header is set to 1,they slow the rate at which data is sent in that direction.

    In the Frame Relay header, what is the discard eligibility (DE)bit?

    If congestion is detected on the Frame Relay network, the DE bit isturned on in the Frame Relay header. The DE bit is turned on forframes that are in excess of the CIR. The DE bit tells a switch whichframes to discard if they must be discarded.

    What is the default LMI type for Cisco routers that areconfigured for Frame Relay?

    The default LMI for Cisco routers configured for Frame Relay is Cisco. If you are running Cisco IOS Release 11.2 or later, the Cisco router triesto autosense which LMI type the Frame Relay switch is using. If itcannot autosense the LMI type, the router uses Cisco as its LMI type.

    The three types of LMIs supported by Cisco routers are:CiscoANSIQ933a

    When a router receives LMI information, it updates its VCstatus to one of three states. What are these three states?

    The three states that a VC uses to update its status are as follows:

  • 8/3/2019 Ccnp Interview Question

    25/40

    Active state The connection is active, and routers can exchange data.Inactive state The local connection to the Frame Relay switch isworking, but the remote router's connection to the Frame Relay switchis not working.Deleted state Indicates that no LMIs are being received from the Frame

    Relay switch or that there is no service between the router and theFrame Relay switch.

    How do you enable Frame Relay on a Cisco router? To enable Frame Relay on a Cisco router, you must first enable theserial interface for Frame Relay encapsulation with the encapsulationframe-relay interface command:

    RouterB(config)#int s 0RouterB(config-if)#ip address 192.168.1.1 255.255.255.0RouterB(config-if)#encapsulation frame-relay

    The default encapsulation for a serial interface configured for FrameRelay is cisco. If you are connecting to a non-Cisco router, how do youchange the encapsulation type?If you are connecting to a non-Cisco router in a Frame Relay network,you need to specify ietf as the encapsulation type:

    RouterB(config-if)#ip address 192.168.1.1 255.255.255.0RouterB(config-if)#encapsulation frame-relay ietf

    If you are using Cisco IOS Release 11.1 or earlier, or if you do not wantto autosense the LMI type, how do you define the LMI type on a Ciscorouter?

    To define the LMI type on a Cisco router, use the frame-relay lmi-type{ansi cisco q933a} interface command:

    RouterB(config-if)#ip address 192.168.1.1 255.255.255.0RouterB(config-if)#encapsulation frame-relayRouterB(config-if)#frame-relay lmi-type ansi

    If Inverse ARP is disabled on your router, how do you reenable it?Inverse ARP is enabled by default on a Cisco router. If it is disabled,reenable it by using the following command:RouterB(config-if)#frame-relay inverse-arp [protocol] [dlci]Supported protocols indicated by the protocol option include ip, ipx,decnet, appletalk, vines, and xns.

  • 8/3/2019 Ccnp Interview Question

    26/40

    If a remote router does not support Inverse ARP, you must define theaddress-to-DLCI tablestatically. How do you create these static maps?

    To define static maps on a Cisco router, use the following command:RouterA(config-if)#frame-relay map protocol protocol-address dlci

    [broadcast] [ietf cisco] [payload-compress packet-by-packet]where: protocol defines the supported protocol bridging or LLC. protocol-address is the remote router's network layer address. dlci defines the remote router's local DLCI. broadcast specifies whether you want to forward broadcasts overthe VC, permitting dynamic routing protocols over the VC. ietf ciscois the encapsulation type.

    What Cisco IOS command displays the LMI traffic statistics and LMItype?

    The show frame-relay lmi command displays the LMI traffic statisticsand LMI type:RouterA#show frame-relay lmiLMI Statistics for interface Serial0 (Frame Relay DTE)LMI TYPE = CISCO Invalid Unnumbered info 0Invalid Prot Disc 0 Invalid dummy Call Ref 0Invalid Msg Type 0 Invalid Status Message 0Invalid Lock Shift 0 Invalid Information ID 0Invalid Report IE Len 0 Invalid Report Request 0Invalid Keep IE Len 0 Num Status Enq. Rcvd 1748Num Status msgs Sent 1748 Num Update Status Sent 0

    Num St Enq. Timeouts 0routera#

    How do you display the current Frame Relay map entries andinformation about these connections on a Cisco router?

    To view the current map entries and information about theconnections, use the show frame-relay map command:RouterA#show frame-relay map

    Quick Notes - ROUTINGHow do OSPF-enabled routers build adjacencies and exchange

    their routing tables?OSPF-enabled routers build adjacencies by sending Hello packets outthrough all OSPF-enabled interfaces.

    If these routers share a command link and agree on parameters setwithin their Hello packets then they become neighbors. If theseparameters differ then the routers do not become neighbors andcommunication stops.

  • 8/3/2019 Ccnp Interview Question

    27/40

    OSPF routers form adjacencies with certain routers. These routers aredetermined by the layer 2 (data link) media type and as soon as theadjacencies are formed each router sends LSAs (Link StateAdvertisements) to all adjacent routers. The LSAs describe the state of each router's links. There are multiple LSA types and a route that

    receives an LSA from a neighbor records the LSA in a link-statedatabase and floods a copy of the LSA to all its other neighbors.When all databases are complete - then each router uses the SPF(Shortest-Path First) algorithm to calculate a loop-free topology andbuilds its routing table based on this topology.It is important to note that the Hello protocol is bidrectional and is themeans by which neighbors are discovered and acts as keepalivesbetween neighboring routers. It also establishes and maintain neighborrelationships and elects the DR (Designated Router) and BDR (BackupDesignated Router) to represent the segment on Broadcast and NBMA(nobroadcast multiaccess) networks.

    Note: Hello protocols are sent periodically sent out each OSPF-enabledinterface using IP multicast address 224.0.0.5. The default interval onNBMA (nonbroadcast multiaccess) networks is 30 seconds. The defaultinterval on Broadcast, Point-to-point, and point-to-multipoint networksis 10 seconds.

    What are LSAs (link-state advertisements)?LSAs are sent out all OSPF-enabled router interfaces describing thestate of the router's links. They are also packets that OSPF uses toadvertise changes in the condition of a link or other OSPF routers.

    Name two LSA (link-state advertisement) types? Type 1 LSAs are router LSAs and are generated by each router for thearea to which the router belongs. These LSAs describe the states of therouter'links to the area (area 0 for example) and are flooded within asingle area (area 0 for example).

    Type 2 LSAs are network LSAs and are generated by the DR(Designated Router) and the BDR (Backup Designated Router). Theydescribe the routers attached to a particular network and are floodedwithin a single area (area 0 for example).

    What is the routing metric OSPF is based on?Bandwith.Formula: Cost = 100,000,000 / bandwidth in bits per seconds

    The cost of a 100 MBbps connection would be:1000,000,000 / 100,000,000 =1Based on the schema above -- if adjacencies are established with onlywith the DR (Designated Router) and BDR (Backup Designated Router)-what is the circuit count?

  • 8/3/2019 Ccnp Interview Question

    28/40

    Formula:2(n - 1) where n is the number of routers in the network.2(5 - 1) = 8 circuits.A circuit can also be thought of as an adjacency or connection.Count four going into the DR and 4 going into the BDR for a total of 8.

    Note: OSPF avoids synchronizing between every pair of routers in thenetwork by using a DR and BDR. This way adjacencies are formed onlyto the DR and BDR, and the number of LSAs sent over the network isreduced. Now only the DR and BDR have four adjacencies, and all theother routers have two.On an OSPF-enabled router -- what is the router ID and where does anOSPF-enabled router receive its router ID?

    To initialize - OSPF must be able to define a router ID. The mostcommon and stable source for a router ID is the IP address set on thelogical loopback interface that is always available. If no logicalinterface is defined -- then the router receives its ID from the highest IP

    address on the physical interfaces.Note: If two loopback addresses are defined -- it will use the highestloopback address. Think highest logical or highest physical interfaceaddress.Name five OSPF network types:Broadcast networks: Ethernet/Token Ring. OSPF-enabled routers onbroadcast networks elect a DR (Designated Router) and BDR (BackupDesignated Router). All the routers in the network form adjacencieswith the DR and BDR. Note: OSPF packets are multicast to the DR andBDR.NBMA (nonbroadcast multiaccess) networks: Frame Relay/X.25/ATM.

    NBMA networks can connect more than two routers but have nobroadcast functionality. These networks elect an DR and BDR. Note:OSPF packets are unicast.Point-to-point networks: A physical DS1 (T1) for example.Point-to-point networks connect a pair of routers and always becomesadjacent.Point-to-multipoint networks: Point-to-multipoint networks are a specialconfiguration of NBMA networks in which networks are treated as acollection of point-to-point links. Point-to-multipoint networks do notelect a DR or BDR. Note: OSPF packets are multicast.

    Virtual links: Virtual links area special configuration that the routerinterprets as unnumbered point-to-point networks. The networkadministrator creates/defines virtual links.

    What is routing?Routing is the process in which items are forwarded from one locationto another. Routing is a hop-by-hop paradigm.

  • 8/3/2019 Ccnp Interview Question

    29/40

    A Cisco router performs routing and switching functions. Describe whateach function does.Routing is a way to learn and maintain awareness of the networktopology. Each router maintains a routing table in which it looks up thedestination Layer 3 address to get the packet one step closer to its

    destination. The switching function is the actual movement of temporary trafficthrough the router, from an inbound interface to an outboundinterface.

    What are the three types of routes you can use in a Cisco router? The three types of routes are static routes, dynamic routes, and defaultroutes.

    What is the difference between static and dynamic routes?Static routes are routes that an administrator manually enters into a

    router. Dynamic routes are routes that a router learns automaticallythrough a routing protocol.

    What is a default route?Also known as the gateway of last resort, a default route is a specialtype of static route with an all-zeros network and network mask. Thedefault route is used to route any packets to a network that a routerdoes not directly know about to a next-hop router. By default, if arouter receives a packet to a destination network that is not in itsrouting table, it drops the packet. When a default route is specified, therouter does not drop the packet. Instead, it forwards the packet to the

    IP address specified in the default route.

    What is a routing protocol?A routing protocol defines the set of rules used by a router when itcommunicates with neighboring routers. Routing protocols listens forpackets from other participants in order to learn and maintain arouting table.

    What is administrative distance?Administrative distance (AD) is an integer from 0 to 255 that rates thetrustworthiness of routing information received on a router from aneighboring router. The AD is used as the tiebreaker when a router hasmultiple paths from different routing protocols to the same destination.

    The path with the lower AD is the one given priority.

    What are the three classes of routing protocols?

  • 8/3/2019 Ccnp Interview Question

    30/40

  • 8/3/2019 Ccnp Interview Question

    31/40

    With route poisoning, when a distance vector routing protocol noticesthat a route is no longer valid, the route is advertised with an infinitemetric, signifying that the route is bad. In RIP, a metric of 16 is used tosignify infinity. Route poisoning is used with holddowns.

    What are hold-down timers?Hold-down timers prevent regular update messages from reinstating aroute that might have gone bad. Hold-down timers also tell routers tohold for a period of time any changes that might affect routes.

    What are triggered updates?When a router notices that a directly connected subnet has changedstate, it immediately sends another routing update out its otherinterfaces rather than waiting for the routing update timer to expire.

    Triggered updates are also known as Flash updates.

    What is IP RIP?IP RIP is a true distance vector routing protocol that sends its completerouting table out all active interfaces every 30 seconds. IP RIP uses ahop count as its metric to determine the best path to a remotenetwork. The maximum allowable hop count is 15, meaning that 16 isunreachable. There are two versions of RIP. Version 1 is classful, andversion 2 is classless. IP RIP can load-balance over as many as sixequal-cost paths.

    What four timers does IP RIP use to regulate its performance?Here are the four timers that IP RIP uses to regulate its performance:

    Route update timer Time between router updates. The default is30 seconds. Route invalid timer Time that must expire before aroute becomes invalid. The default is 180 seconds. Route hold-down timer If IP RIP receives an update with a hop count higher thanthe metric recorded in the routing table, the router goes into holddownfor 180 seconds. Route flush timer Time from when a routebecomes invalid to when it is removed from the routing table. Thedefault is 240 seconds.

    How do you stop RIP updates from propagating out aninterface on a router?

    Sometimes you do not want RIP updates to propagate across the WAN,wasting valuable bandwidth or giving out valuable information aboutyour internetwork. The easiest way to stop RIP updates frompropagating out an interface is to use the passive-interface globalconfiguration command.

    How do you display the contents of a Cisco IP routing table?

  • 8/3/2019 Ccnp Interview Question

    32/40

    The show ip route command displays the Cisco routing table'scontents.

    What is Interior Gateway Routing Protocol (IGRP)?IGRP is a Cisco proprietary distance vector routing protocol. IGRP has a

    default hop count of 100 hops, with a maximum hop count of 255. IGRPuses bandwidth and line delay as its default metric, but it can also usereliability, load, and MTU.

    How do you enable IGRP on a Cisco router? The way you enable IGRP on a Cisco router is similar to the way youenable RIP, except you specify IGRP as the protocol and add anautonomous system number. For example:RouterA(config)#router igrp 10 (10 is the AS number)

    RouterA(config-router)#network 192.168.0.0RouterA(config-router)#network 192.168.1.0RouterA(config-router)#network 192.168.2.0

    What four timers does IGRP use to regulate its performance? The four timers IGRP uses to regulate its performance are as follows:

    Route update timer Time between router updates The default is 90seconds.Route invalid timer Time that must expire before a route becomesinvalid . The default is 270 seconds.

    Route hold-down timer If a destination becomes unreachable, or if thenext-hop router increases the metric recording in the routing table, therouter goes into holddown for 280 seconds.Route flush timer[md]Time from when a route becomes invalid to whenit is removed from the routing table. The default is 630 seconds.

    Quick Notes - SWITCHINGWhat are three types of LAN traffic?Unicasts - intended for one host.Broadcasts - intended for everyone.Multicasts - intended for a only a subset or group within an entirenetwork.

    What are unicast frames?Unicast frames are the most common type of network traffic. A unicastframe is a frame intended for only one host. The only station thatprocesses this frame is one station that has its own MAC address in thedestination portion of packet.

  • 8/3/2019 Ccnp Interview Question

    33/40

    What are broadcast frames?Broadcast frames are frames intended for everyone. Stations viewbroadcast frames as public service announcements. All stations receiveand process broadcast frames. In large networks, broadcasts can

    cause serious performance degradation in network hosts - (broadcaststorm). The destination address of broadcast frames (Data Link / Layer 2broadcast addresses is FF-FF-FF-FF-FF-FF or alternatively all 1s inbinary (11111111).

    What are multicast frames?Multicast frames address a group of devices that have a commoninterest. These frames allow the source to send only one copy of theframe on the network even though it is intended for several stations.Only stations that have a card that is configured by software to receive

    multicast frames for a particular multicast group can process a frameto that multicast address - all other stations discard multicast frames

    What three major functions do Data Link Layer / Layer 2Switches perform?Address learningPacket forwarding/filteringLoop avoidance by spanning tree

    What will occur when you attempt to segment a network withhubs and repeaters?

    Basically, hubs and repeaters become extensions of the physical cableplant. All devices that connect to either a hub or a repeater share thesame bandwidth and by definition hubs and repeaters create a singlebroadcast and collision domain.

    Think of both devices are pass-through devices much like a electricalpower-strip. Hubs and repeaters reside on the Physical Layer / Layer 1of the OSI model where they pass 0s and 1s along the wire or up to theData Link Layer. CSUs / Channel Service Units fall into the samecategory. All are regarded as unintelligent devices. No addressingtakes place on the Physical layer.What three devices are used to segment a LAN?Router - logical addressing - IP addressSwitch - physical addressing - MAC addressBridge - physical addressing - MAC addres

    What is microsegmentation?

  • 8/3/2019 Ccnp Interview Question

    34/40

    Each workstation or network device on the network has its owndedicated segment - also known as a Collision Domain - to a switch.Each device gets the segments full bandwidth and does not have toshare the dedicated segment with other devices. Collisions arereduced because each segment is its own Collision Domain.

    Important: Full-duplex transmission is achieved by microsegmentation.Each device can send and receive at the same time which doubles theamount of bandwidth between nodes.What are the three switching methods in Cisco Catalyst switches?

    The three frame operating modes to handle frame switching areStore-and-forwardCut-throughFragment-free

    What is the Cisco Catalyst store-and-forward switchingmethod?

    In the store-and-forward switching method, the switch receives theentire frame before it forwards it. The switch reads the cyclicredundancy check (CRC) to make sure the frame is not bad. If theframe is good, the switch forwards it. Because the switch stores theframe before forwarding it, latency is introduced in the switch. Latencythrough the switch varies with the size of the frame.

    What is the Cisco Catalyst cut-through switching method?In cut-through switching mode, the switch only checks the frame'sdestination address and immediately begins forwarding the frame outthe appropriate port. Because the switch checks the destination

    address in only the header and not the entire frame, the switchforwards a collision frame or a frame that has a bad CRC.

    What is the Cisco Catalyst fragment-free switching method?Also known as modified cut-through, fragment-free switching checksthe first 64 bytes before forwarding the frame. Ethernet specificationsstate that collisions should be detected during the first 64 bytes of theframe. By reading the first 64 bytes of the frame, the switch can filtermost collisions, although late collisions are still possible.

    What is the default switching mode in Cisco Catalyst 1900switches?

    The default switching mode for the Catalyst 1900 is fragment-free.

    What is half-duplex transmission mode?Half-duplex transmission is the default mode that Ethernet functions in.In half-duplex transmission, a device can only send or receive--not do

  • 8/3/2019 Ccnp Interview Question

    35/40

    both at once. In half-duplex mode, stations are susceptible tocollisions, and efficiency is rated at 50 to 60 percent.What is full-duplex transmission mode?In full-duplex mode, a station can send and receive at the same time.In full-duplex mode, collision detection is disabled. This mode offers

    100 percent efficiency in both directions.On a Cisco Catalyst 1900 switch, what are the default duplex settingsfor 10BaseT/100BaseT ports, default switching mode, and defaultprotocols?

    What are dynamic addresses on a Catalyst switch?Dynamic addresses are addresses that the switch learns aboutdynamically through the learning process. If the switch does not see aMAC address for a certain amount of time, it drops the MAC address.

    What are permanent MAC addresses on a Catalyst switch?Permanent MAC addresses are entered manually by the administratorand are not aged out.

    IP Access Control List (ACL)Standard IP Access Control Lists

    Filtering logic could be configured on any router and on any of itsinterfaces. Cisco IOS software applies the filtering logic of an ACLeither as a packet enters an interface or as it exits the interface. Inother words, IOS associates an ACL with an interface, and specificallyfor traffic either entering or exiting the interface. After you havechosen the router on which you want to place the access list, you mustchoose the interface on which to apply the access logic, as well aswhether to apply the logic for inbound or outbound packets.

    The key features of Cisco ACLs are:

    . Packets can be filtered as they enter an interface, before the routingdecision.. Packets can be filtered before they exit an interface, after the routingdecision.. Deny is the term used in Cisco IOS software to imply that the packetwill be filtered.. Permit is the term used in Cisco IOS software to imply that the packetwill not be filtered.. The filtering logic is configured in the access list.. If a packet does not match any of your access list statements, it isblocked.

  • 8/3/2019 Ccnp Interview Question

    36/40

    Access lists have two major steps in their logic: matching, whichdetermines whether it matches the access-list statement; and action,which can be either deny or permit. Deny means to discard the packet,and permit implies that the packet should be allowed. However, the

    logic that IOS uses with a multiple-entry ACL can be much morecomplex. Generally, the logic can be summarized as follows:

    Step 1: The matching parameters of the access-list statement arecompared to the packet.

    Step 2: If a match is made, the action defined in this access-liststatement (permit or deny) is performed.

    Step 3: If a match is not made in Step 2, repeat Steps 1 and 2 usingeach successive statement in the ACL until a match is made.

    Step 4: If no match is made with an entry in the access list, the denyaction is performed.Wildcard Masks

    IOS IP ACLs match packets by looking at the IP, TCP, and UDP headersin the packet. Standard IP access lists can also examine only thesource IP address. You can configure the router to match the entire IPaddress or just a part of the IP address. When defining the ACLstatements you can define a wildcard mask along with the IP address.

    The wildcard mask tells the router which part of the IP address in the

    configuration statement must be compared with the packet header. The wildcard masks look similar to subnet masks, in that theyrepresent a 32-bit number. However, the wildcard masks 0 bits tell therouter that those corresponding bits in the address must be comparedwhen performing the matching logic. The binary 1s in the wildcardmask tell the router that those bits do not need to be compared. Thus,wildcard mask 0.0.0.0, which in binary form is00000000.00000000.00000000.00000000, indicates that the entire IPaddress must be matched, while wildcard mask 0.0.0.255, which inbinary form is 00000000.00000000.00000000.11111111, indicatesthat the first 24 bits of the IP address must be matched, and wildcardmask 0.0.31.255, which in binary form is00000000.00000000.00011111.11111111, indicates that the first 24bits of the IP address must be matched.Standard IP Access List Configuration

    A standard access list is used to match a packet and then take thedirected action. Each standard ACL can match all, or only part, of thepackets source IP address. The only two actions taken when an

  • 8/3/2019 Ccnp Interview Question

    37/40

  • 8/3/2019 Ccnp Interview Question

    38/40

    Named ACLs can be used to match the same packets, with the sameparameters, you can match with standard and extended IP ACLs.Named IP ACLs do have some differences, however. The most obviousdifference is that IOS identifies named ACLs using names you assignthem as opposed to numbers. Named ACLs also have another key

    feature that numbered ACLs do not: You can delete individual lines in anamed IP access list.

    In addition, two important configuration differences exist betweennumbered and named access lists. One key difference is that namedaccess lists use a global command that places the user in a named IPaccess list submode, under which the matching and permit or denylogic is configured. The other key difference is that when a namedmatching statement is deleted, only that one statement is deleted.With numbered lists, the deletion of any statement in the list deletesall the statements in the list.

    Controlling Telnet Access with ACLsAccess into and out of the virtual terminal line (vty) ports of the CiscoIOS software can also be controlled by IP access lists. IOS uses vtys torepresent a user who has Telnetted to a router, as well as for Telnetsessions a user of a router has created to other devices. You can useACLs to limit the IP hosts that can Telnet into the router, and you canalso limit the hosts to which a user of the router can Telnet.

    IP SECIPSec is an suit of protocols designed to provide interopable and highsecure data transfer service. to understand IPSec we need to go to thebasics and see some defenitions and protocols used by IPSec and startfrom there to build our understanding on IPSec, after we know what isIPSec and what he need to provide us we can go over to the practicalusage and some configuration samples.

    so as I have said we have some basics to cover and we will start with:

    Authentication - is how the units verify they are who they say they are

    Data Integrity - making sure that the data that was sent it what wasrecived in the other side with no change

    Confidentiality - it the Encription of the data

    Anti-Replay - preventing play back attack, if this mechanizem was notenable then a potential attacker could capture a stream of data andreplay it to the box this stream was sent and potentialy could log into

  • 8/3/2019 Ccnp Interview Question

    39/40

    the network even if the data is hashed it dosent metter as the otherside need to know to unpack that data.

    this 4 definitios are the very basic to understand, and each one isplaying a very important role in the vpn.

    AH Authentication Header - as it is mentioned in his name it is aheader authentication method and can provide integrity authenticationand anti-relplay, it is the older form of creating IPSec VPN, and todayless used.

    ESP encapsulation security protocol - this is the new form of creatignIPSec VPN and it add the very important element of Confidentiality orencription of the data as I mentioned.

    the methods we have to encrypt the data are very wide spread but

    here are the most common onesDES data encription standart 64bit key

    3DES it is 192bit what is even funy The procedure for encryption isexactly the same as regular DES, but it is repeated three times.

    AES Advanced Encryption Standard has a minimum key size of 128bitand maximum of 256bit, a AES 128 is considered more secure then3DES.

    RSA (Ron Rivest, Adi Shamir, and Leonard Adleman) is used forAsymetric Public Private Keys

    Authentication there are 2 main methods to authenticate

    pre-shared key is a staticly defigned by the Admin on the units the lesssecure way but the more common method

    Certificate Authority this is the high security methode and the lesscommon due to the complex of configuration and usually also youneed to buy Certificate from one of the vendors like verisign,commodo...

    Integrity is using hashing for making sure that that the data is notchanged:

    MD5 Message-Digest algorithm 5 the most commonly hash used todaythe hash size is 128bit.

  • 8/3/2019 Ccnp Interview Question

    40/40

    SHA-1 Secure Hash Algorithm 1 the hash size is 160bit

    DH Diffie-Hellman "A public-key cryptography protocol which allowstwo parties to establish a shared secret over an insecurecommunications channel. Diffie-Hellman is used within IKE to establish

    session keys and is a component of Oakley." (this line was taken fromCisco Site:http://www.cisco.com/en/US/docs/ios/12_1t/12_1t3/feature/guide/dtgroup5.html#wp1015327 )Let Me try to expalin the proccess;

    each unit have a private key (used for decryption) a key that is neverpassed, and a Diffie-Helman Key (Public Key used for encryption) whena unit want to do a key exchange they each send there Public Key tothe other side so lets drill down to Unit_A, Unit_A get the Public Key of Unit_B then using the RSA create a shared key that shared key can

    only be opened on Unit_B with Unit_B Private Key so even if youintercept the shared key you cant reverse engineer it to see as onlythe private key of Unit_B will be able to understand it.

    ok untill here I have summerized for you all the key concepts andprovided an example of the proccess used in Asymetric Process of theIPSec next I will take the concept and show you in practice what needto be done to form an IPSec connection. General Guide lines toconfigure an IPSec connection:

    1) Create IKE Policy

    2) Create IPsec Transform Set3) Defign ACL for the encription4) Configure a Crypto Map5) Assign the Crypto Map to an Interface

    Note: when you want to create an IPsec between 2 units you mustmake sure there configuration match so this is a tip copy theconfiguration you did to a notepad and on the other side unit only flipthe ACL IP address to match the other side and paset it, if you didcorrect on the first side you will have a working connection, if you didbad then you will need to troubleshoot only one side and again copypaste to the other side, save time and pain!