CCNA3 Study Guide PDF
CCNA3 Study Guide PDF
CCNA3 Study Guide PDF
Answers
1.1
What are the three layers of the hierarchical network design model?
What are the advantages of designing LANs using the hierarchical model?
The hierarchical model separates out different functions of a network, giving a modular
design. This should make the network easier to manage and troubleshoot. It should be
easier to expand the network (scalability), and it should be easier to maximise
performance.
It allows end devices to connect to the network and controls which devices may
connect.
End devices, such as PCs, printers, and IP phones. Network devices such as routers,
switches, bridges, hubs, and wireless access points.
It controls the flow of network traffic. In particular, it controls traffic between different
broadcast domains (subnetworks, VLANs). It aggregates traffic from the access layer
that needs to be passed to the core layer for longer distance transmission.
It is the high speed backbone of the network. Its main task is to forward large amounts
of data quickly.
The distribution layer and the core layer are combined. It is used for smaller networks.
What is a wiring closet?
A room designed to hold network devices such as switches and routers. It is a central
point where network cabling comes together.
Why is it not easy to see the logical hierarchical design of a network when looking at the
network layout in a building?
The devices operating at different layers may not be physically separated. For example,
switches operating at different layers may be kept in the same cabinet.
It gives better availability and reliability. If one switch or link goes down then an
alternative path can be used.
Traffic (and particularly long distance traffic) is forwarded through distribution layer and
core layer switches that are designed to work at high speeds, and not through a series
of lower-speed access layer switches.
Access layer switches can restrict the devices that are permitted to connect to their
ports. Distribution layer devices can be configured with access control policies that
restrict traffic according to IP addresses or application layer protocols. (The core layer is
optimised for speed. Security measures are not appropriate at this layer because they
slow things down.)
Switches at a given layer have similar functions and therefore are likely to have similar
configurations. This makes it easier to check configurations and to configure new
switches.
Should the same type of switch be used at each layer of the hierarchical design?
No. The distribution and core layers need very fast switches. The access layer can use
less expensive switches.
What is “network diameter” in hierarchical network design?
Network diameter is the number of devices that a packet has to cross before it reaches
its destination.
Network device latency is the time spent by a device as it processes a packet or frame.
The switch has to look in the frame header and find the destination MAC address. It
then looks this address up in its MAC address table and finds the matching exit port. It
then forwards the frame out of the port.
Switches can be linked by more than one physical link. These physical links can be
combined into one logical link that makes use of the combined bandwidth.
It would be too expensive. The advantage of improved reliability would not justify the
extra cost.
At the access layer. Make sure that all end devices will be able to connect to the
network.
Converged networks need special switching equipment that was originally affordable
only by big companies.
Converged networks need Quality of Service management to give voice and video
traffic priority over data.
Converged networks need people with expertise to set them up and manage them.
Where firms have existing separate networks that work well, the firms may be reluctant
to make a change.
What are the benefits of a converged network?
In a new build, there is only one set of cabling to install instead of two or three.
There is only one network to manage instead of two or three. This may mean having
one set of people to run the network instead of several sets of people, so the company
may employ fewer staff.
When changes are needed, there is only one network to change.
New communications options are possible. A PC can be used to make phone calls or
for videoconferencing by adding appropriate software and peripherals. There is no need
for a separate IP phone or videoconferencing equipment.
Why was videoconferencing equipment originally kept on a separate network from data
or phones, and what made it possible to combine videoconferencing with other
networks?
1.2
What is traffic flow analysis, and why might you want to do it?
Traffic flow analysis is the measurement of bandwidth usage. It can show what
demands different sources of traffic are making on the network. You might do it to get
the information you need to improve network performance, plan network changes,
decide if you need to upgrade, and decide what type of new equipment is needed.
How can measurements be made in order to carry out a traffic flow analysis?
It can be done manually by monitoring switch ports, but this is time consuming and not
feasible for large networks. There are software analysis tools that take the
measurements and perform the analysis, giving a visual display
Users are normally grouped by job function because they have similar requirements for
bandwidth, applications, access to servers etc. The User Communities Analysis shows
what demands the different groups of users make on the network. Some design
implications are:
The number of switch ports needed for each group of users, including possible growth.
The location of servers that the users access.
The bandwidth requirements of the users.
Which two types of traffic need to be considered when planning data storage facilities?
Servers and data stores should be kept physically close to each other and should be
connected by high performance switches. Businesses often keep their servers and data
stores in a secure data centre.
How might you deal with a bottleneck where there is insufficient bandwidth?
Use link aggregation (multiple links between switches) or install higher performance
switches.
It is difficult to produce a topology diagram later by examining the network itself, and the
diagram is necessary for the efficient management of the network. It shows all the
switches and how they are connected, including aggregated links and redundant links,
and the ports used. It shows how servers, storage devices and end user devices such
as workstations are connected.
What is the difference between a fixed configuration switch and a modular switch?
A fixed configuration switch has a fixed number of ports and these cannot be changed.
A modular switch has a chassis that can take line cards. The line cards contain the
ports. A modular switch can therefore have different numbers or types of ports,
depending on the choice of line cards.
Stackable switches are designed to be connected together and act as a single switch.
The connection between the switches is through a special high speed port and not
through the normal switch ports.
Wire speed is the data rate that a switch port can attain. A port may be designed to
operate at 100 Mb/s Fast Ethernet or 1000 Mb/s Gigabit Ethernet. The forwarding rate
is the amount of data that the switch can process per second. If the forwarding rate is
less than the total wire speed of all the ports then it is not possible for all the ports to
operate simultaneously at their wire speed.
What is Etherchannel?
A system that uses link aggregation to provide high bandwidth between switches. Up to
8 ports can be bound together so that they act as a single link.
Power over Ethernet is a feature that lets a switch provide a power supply to a device
such as an IP phone or a wireless access point. The power is supplied over the
Ethernet cable. The advantage is that the devices do not need a separate power
supply, so it may be possible to position them more flexibly. The disadvantage is that
the feature makes the switch much more expensive.
Layer 2.
A switch that operates at layer 3 as well as at layer 2. For example, it can forward
packets based on IP addressing, not just on MAC addressing.
Port security, VLANs, Fast Ethernet/Gigabit Ethernet, PoE, and link aggregation.
Quality of Service is needed for converged networks.
High forwarding rate to allow all ports to operate to their full bandwidth
High bandwidth links (possibly 10Gbps) and link aggregation
Redundancy to ensure reliability and availability
Multiple, hot-swappable power supplies
Quality of service to maintain priority for video and voice traffic
Inter-VLAN routing (layer 3 function)
Access control lists for security (layer 3 function)
Very high forwarding rates as this is the high speed backbone of the network.
High bandwidth ports, preferably 10Gbps. Support for link aggregation.
Redundancy to give reliability and availability.
Redundant power supplies.
Efficient cooling.
Hot-swappable hardware components to avoid downtime for maintenance.
Support for quality of service. (Particularly important where there are links to lower
bandwidth WANs.)
Layer 3 features.
Which Cisco Catalyst switch does not provide a command line interface?
Which Catalyst switch is suitable for access level use in small organisations, provides
up to 48 ports, but does not provide PoE?
Catalyst 2960
What does the Catalyst 3560E switch provide that the 3560 switch does not?
10 Gbps connectivity.
Catalyst 6500
Which type of catalyst switch can be stacked so that up to 9 switches can operate as a
single logical switch?
Catalyst 3750
They are designed for use in data centres for linking servers and data stores.
A device that needs to transmit must listen for traffic on the shared medium. If there is
traffic then it waits. If there is no traffic then it sends.
The device continues to listen while sending.
If another device also sends then the signals will meet and there is a collision. The
device detects a collision if it receives signals while it is transmitting.
On detecting a collision, the transmitting devices send out a jamming signal to warn all
devices on the network that there is a collision.
All devices stop transmissions and run the backoff algorithm that gives them a random
time to wait before attempting to transmit again.
Any device may be the first to transmit after the backoff period. The devices that were
transmitting at the time of the collision do not have any priority.
In an Ethernet frame, which field comes immediately after the start frame delimiter, and
how long is this field?
If the value in the Length/Type field is less than 0x0600 then it gives the length of the
frame’s data field. If the value is 0x0600 or more then it is a code to identify the type of
protocol running at OSI layer 3.
How long is the data field, and why is a pad sometimes needed?
The data field can be anything from 46 to 1500 bytes. A data field of 46 bytes would
give a total frame length of 64 bytes, and this is the smallest frame allowed in order for
collisions to be detected in time for the CSMA/CD process to work properly. If the
amount of data is less than 46 bytes then a pad is added to make the length up to 46
bytes.
What is the purpose of the field in the frame trailer?
The trailer contains the Frame Check Sequence Field. The sending device carries out a
cyclic redundancy check calculation based on the contents of the frame, and stores the
result in this field. The receiving device carried out the same calculation and compares
the result with the contents of the field. If they are different then the frame has been
corrupted in transmission and should be discarded.
How does the NIC of a receiving PC use the destination MAC address?
If the destination MAC address is the address of the Ethernet port of the NIC, or is a
broadcast address or a multicast address being used by the device, then the frame is
passed up to the network layer for further processing. If not, then the frame is
discarded.
The first 24 bits of a MAC address. It identifies the manufacturer of the NIC or device.
Where there is a shared medium, for example where devices are connected by a hub.
Ports set to use full duplex have their collision detection capabilities disabled, so full
duplex must not be used on a shared medium.
Fully switched and full duplex so that each end device has a dedicated link in each
direction to the switch.
What is the advantage of having a switch port set to auto, rather than full or half, and
what is a potential problem?
A switch port set to auto will attempt to negotiate with the device at the other end of the
link on whether the link should operate using full or half duplex. If the other device is
also able to autonegotiate then they will choose the best option that they can both
manage, which should be full duplex. There is no need for manual configuration. There
could be a problem if the other device is not able to autonegotiate, but is set to use full
duplex. When autonegotiation fails, the switch will default to half duplex and there will
be a mismatch leading to errors.
What is the advantage of having the auto-MDIX feature enabled on a switch port?
You can use either a straight-through or a crossover cable. The switch will detect which
is in use and compensate accordingly.
It contains a list of switch ports with the MAC address of the device connected to each
port. When a frame arrives, the switch reads the destination MAC address and forwards
the frame out of the correct port.
It reads the source MAC address in each incoming frame and matches it to the entry
port. It adds the information to its table. (Or refreshes the information if it is already
there.)
What does a switch do if a frame arrives and the destination MAC address is not in its
MAC address table?
It floods the frame out of all ports except the incoming port.
It floods the frame out of all ports except the incoming port.
You replace a hub with a layer 2 switch. How does this affect collision domains?
It replaces a large collision domain with many small collision domains. (This should
reduce the number of collisions and improve performance.)
You replace a hub with a layer 2 switch. How does this affect broadcast domains?
Why can switch based latency be a problem if cheap switches are used on a busy
network?
Entry level switches (the cheaper models) may not have enough internal processing
power to cope with all their ports operating simultaneously at their maximum bandwidth.
This can cause delays. More expensive models of switch should have enough internal
throughput to work at “wire speed” so that switch based latency is not an issue.
Routers work with layer 3 data, which is more deeply encapsulated and takes longer to
extract from a frame, and they carry out more complicated processing on the data.
Why does a router split a network into separate broadcast domains?
What are the two varieties of cut-through switching, and how do they work?
Fast forward reads an incoming frame only as far as the end of the destination MAC
address and then immediately starts to transmit on the outgoing port while the
remainder of the frame is still being received. It does not carry out any kind of checking
of the frame.
Fragment free reads the first 64 bytes of the frame before starting to forward it. This
ensures that the frame is at least 64 bytes long and therefore not a collision fragment.
There is no other checking.
The switch stores the whole of an incoming frame into a buffer, reads the whole frame
and carries out a cyclic redundancy check. Damaged frames are discarded. The frame
is then forwarded through the appropriate port.
All frames are checked so that corrupted frames are not forwarded to take up
bandwidth and processing time on other devices.
It is possible to carry out quality of service (QoS) processing to give priority to voice and
video traffic, so this form of switching is necessary on converged networks.
It is possible to read a frame entering at one bandwidth and transmit it at a different
bandwidth.
A symmetric switch has all ports working at the same bandwidth. An asymmetric switch
is capable of operating with ports working at different bandwidths. Most modern
switches are asymmetric.
Port-based memory buffering has a separate buffer of fixed capacity for each incoming
port. Shared memory buffering puts all incoming frames into the same buffer so that the
memory can be allocated dynamically as required. This can allow larger frames to be
processed.
Port-based memory buffering keeps frames entering by each port in a separate queue.
If the frame at the front of the queue needs an exit port that is busy, then the frames
behind it have to wait even if their exit ports are available. In shared memory buffering,
each frame can leave as soon as its exit port is available.
Where ports are operating at different bandwidths, shared memory buffering is
particularly important.
The traditional Ethernet switch is a layer 2 switch, which processes layer 2 MAC
addresses in order to determine how to forward frames. A layer 3 switch can do this,
but it can also process layer 3 IP addresses and use them to make switching decisions.
This enables layer 3 switches to carry out some routing operations that would
traditionally be carried out by a router.
What factors would you take into account when choosing between a layer 3 switch and
a router?
Switch>enable
What are you doing if you give this command? What prompt will you see next?
Which commands would you give in order to enter interface configuration mode for
interface Fa0/1, starting with the following prompt?
Switch>
Switch>enable
Switch#configure terminal
Switch(config)#interface fa0/1
Switch(config-if)#
Cisco Network Assistant is an application that can be downloaded from Cisco if you
have a valid CCO account. It lets you manage single switches or groups of switches by
using a graphical user interface rather than the command line interface.
What are the two ways of using ? to obtain help when using the command line
interface?
Start entering a command word and type ? without a space in front of it. You should see
a list of possible ways of completing the word.
Type ? with a space in front of it. You should be given a list of words that can be
entered next.
What is the command history buffer, and how can you show its contents?
It stores the last 10 commands that were entered. (By default. You can change the
number.) Each mode has its own buffer.
show history is the command to list the contents. You need to give it at the right
prompt, depending on which mode’s commands you want to list.
How do you know whether a switch has passed or failed the POST?
The SYST LED will blink green if the POST was successfully completed, but turn amber
if it was not.
POST messages are also displayed if you have a console connection active as you
start the switch.
A switch will operate without an IP address. If you want to access the switch remotely
by Telnet or using the web based interface or if you want to be able to ping it for test
purposes then you need to give it an IP address.
Which switch interface(s) should be configured with an IP address, and do you need a
different IP address for each interface?
Unlike a router, a switch is configured with just one IP address. This address is not
configured on any of the physical interfaces. Instead it is configured on a virtual
interface: a VLAN interface. At least one of the physical interfaces needs to be assigned
to the VLAN that has the IP address.
By default, which VLAN is used for switch management, and is it considered good
practice to keep to this default?
By default, VLAN 1 is used. This can lead to security problems so it is advisable to use
a different VLAN for management purposes. (In the example, VLAN 99 is used, but this
does not have to be the case.)
Starting from privileged exec mode on switch SW1, how would you configure the ip
address 192.168.1.2/24 on VLAN 99 and associate the physical FastEthernet 0/24
interface with this VLAN? Go on to configure the default gateway 192.168.1.1 and save
the configuration.
SW1#configure terminal
SW1(config)#interface vlan 99
SW1(config-if)#ip address 192.168.1.2 255.255.255.0
SW1(config-if)#no shutdown
SW1(config-if)#exit
SW1(config)#interface fa 0/24
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 99
SW1(config-if)#exit
SW1(config)#ip default-gateway 192.168.1.1
SW1(config)#exit
SW1#copy run start
What is the effect of the commands duplex auto and speed auto given in interface
configuration mode on a switch?
That switch port will attempt to autonegotiate the duplex setting and the bandwidth with
the attached device. (This is the default condition on most switches, so you should not
need to give these commands if you want autonegotiation.)
What is the advantage of including the command ip http server in the switch
configuration?
It allows you to use the web based GUI interface for configuring the switch if you access
the switch remotely.
How does a dynamic address get into the switch MAC address table?
The switch learns it by inspecting the source MAC address of an incoming frame.
It provides security. Only the device with the specified MAC address can connect to the
switch port. Also, static addresses are not aged out and removed from the table.
What command would you give to map the MAC address 000c.7671.7d90 to interface
fa 0/6 on VLAN 3?
Show startup-config
Show running-config
Which command would give information about the hardware and the operating system?
Show version
Which command would display the table of MAC addresses and associated ports?
Show mac-address-table
Which command would tell you if ports are operational, and give their duplex and speed
settings?
Show interfaces
How would you make a copy of your saved configuration to a file called backupJan08 in
flash memory?
You want to go back to the saved configuration. Why is it better to reload the switch
rather than using the command copy start run?
Copy start run will read the saved configuration into RAM, but it will not remove the
commands already in RAM, it will just add to the existing running configuration. This
may not be what you want.
Which command would you use to make a copy of the running configuration to a file
called SW1config on a PC with IP address 192.168.13.6 that is running TFTP server
software?
You have used the command erase start to remove a saved startup configuration.
Which command has the same effect?
erase nvram:
How would you remove a file called backupJan08 from flash memory?
delete flash:backupJan08
(Be very careful when deleting files from flash. The IOS is held there with other vital
files.)
How would you configure switch SW1 so that console access and telnet access are
protected by a password? Start in privileged exec mode and return there. Assume that
the switch has 16 vty lines. Use cisco as the password in every case as you would in
the lab (though of course you would not use this password on a “real” network).
SW1#configure terminal
SW1(config)#line con 0
SW1(config-line)#password cisco
SW1(config-line)#login
SW1(config-line)#line vty 0 15
SW1(config-line)# password cisco
SW1(config-line)# login
SW1(config-line)#end
How can the login passwords, which are not normally encrypted, be given weak
encryption?
service password-encryption
You want to establish a console connection with a 2960 switch, but you have forgotten
the login password. You want to keep the existing saved switch configuration. What do
you do?
If you configure both a login banner and a motd banner, which will display first?
Why should SSH be preferred to Telnet for remote access whenever possible?
The switch is being configured to use SSH instead of Telnet on the vty lines.
The attacker introduces a rogue DHCP server that is on the network segment under
attack and therefore likely to be closer than the genuine DHCP server. When a host
requests an IP address, the rogue DHCP server replies first and gives the host an IP
address and a default gateway which directs traffic to the attacker’s device. Traffic from
the host that should go to a remote network will go to the attacker instead.
An attacker using Wireshark (or similar) could inspect the contents of CDP packets and
find out about devices. The attacker could also fake CDP packets to give false
information to neighbour devices. CDP should therefore be disabled unless it is
required.
What are the three types of secure MAC address that can be configured on a switch
port?
Shutdown.
Dynamic
How would you configure switch port 0/13 to learn and accept the first four MAC
addresses that connect to it, as secure sticky addresses, but then reject any other MAC
addresses?
Start at the prompt SW1(config)#
SW1(config)#int fa 0/13
SW1(config-if)#switchport mode access
SW1(config-if)#switchport port-security
SW1(config-if)# switchport port-security maximum 4
SW1(config-if)# switchport port-security mac-address sticky
SW1(config-if)#end
Your switch has 24 ports but you are only using 14 ports at present. What should you
do to enhance security?
3.1
Why is it generally a good idea to split up a large network into smaller networks?
Splits up broadcast domains, which cuts down traffic and should improve performance.
Allows different groups of users to have different facilities and security regimes.
What is the advantage of implementing subnets as VLANs rather than using routers to
separate subnets?
VLANs can be implemented using switches, which are cheaper and operate more
quickly that routers. (Though a layer 3 device such as a router is still needed to route
traffic between VLANs.) A VLAN can be implemented across several switches in
different locations, so that a group of users with the same requirements does not have
to be all together in the same place.
255
Which VLANs exist by default on a Catalyst 2600 switch, and which of these are
intended for Ethernet networks?
VLAN 1 is for Ethernet. VLANs 1002 to 1005 also exist, but are for use on Token Ring
or FDDI networks.
If you create a normal range VLAN, where will the information about it be stored?
In a file called vlan.dat which is in flash memory. (Not in the running or startup
configuration.)
A new Catalyst switch has not yet been configured. Are the Ethernet ports associated
with any VLAN? If so, which one?
You could, but it is better for security reasons to create another VLAN to be the
management VLAN and assign the IP address to it. This management VLAN will be
used only for managing the switch via Telnet, SSH or the web based interface.
What name is given to the type of VLAN that carries normal user traffic such as files,
downloads and e-mails?
Which type of VLAN needs special configuration so that its traffic has priority over other
traffic?
Voice VLAN.
What are the two methods of assigning an end device to a VLAN, and which method is
more common? (Assume that voice traffic is not required.)
Port based or static VLANs are configured on switch ports and a device connecting to a
port belongs to the VLAN configured on that port. Dynamic VLANs assign devices to
VLANs using the MAC addresses of the devices, and these VLAN to MAC address
matches need to be stored on a server. Static VLANs are more common.
A PC attached to a switch sends out a broadcast ARP request. Which devices will
receive the ARP request?
A link that carries traffic for more than one VLAN. It is a point to point link between two
switches or between a switch and a router.
Which protocol is now most commonly used for frame tagging, and which other protocol
may still be in use?
IEEE 802.1Q is now the common protocol. Inter Switch Link (ISL) is a Cisco proprietary
protocol that is no longer supported by newer Cisco switches, but may still be in use.
What is the purpose of the EtherType field in a frame, which is set to the hexadecimal
value of 0x8100?
It signals to the device receiving the frame that this is a tagged IEEE 802.1Q frame
containing VLAN information. If the frame were untagged then the device would find the
length/type field in this position.
What does a switch port on a trunk link do if it receives a frame without a tag?
Forwards it on to the native VLAN. By default this is VLAN 1, but usually a different
native VLAN is configured on a trunk link.
Why can native VLANs and VLAN trunks give problems when Cisco devices and non-
Cisco devices are mixed on a network?
Cisco devices do not tag frames from the native VLAN when forwarding them on a trunk
link, but some non-Cisco devices do tag them. By default, Cisco switches drop tagged
frames destined for the native VLAN, so frames from non-Cisco devices may be
dropped.
How can you configure the fastethernet interface fa0/1 of switch SW1 to be a trunk
port?
SW1(config)#int fa0/1
SW1(config-if)#switchport mode trunk
How can you configure the fastethernet interface fa0/2 of switch SW1 to be a port that
handles traffic from one VLAN only?
SW1(config)#int fa0/2
SW1(config-if)#switchport mode access
It allows linked switches to negotiate on whether or not the link between them is a trunk
link.
Two switches are connected. If both ends of the link are ports in dynamic auto mode,
will the link be a trunk or not?
No, it will be an access link.
Two switches are connected. If both ends of the link are ports in dynamic desirable
mode, will the link be a trunk or not?
What is the currently approved method of creating a VLAN, number 6, called Finance,
on switch SW1?
SW1(config)#vlan 6
SW1(config-vlan)#name Finance
SW1(config-vlan)#end
Database configuration mode. (You don’t go into global configuration mode. Starting
from privileged exec, you go straight into VLAN database mode. No longer
recommended.)
Which command will let you see a list of all existing VLANs and the ports that are
associated with each one?
What information does the command “show vlan summary” give you?
It tells you how many VLANs there are on the switch. No VLAN numbers, names or
detail.
Interface fa 0/12 will be removed from its existing VLAN and returned to the default
VLAN. (VLAN 1 unless this has been changed.)
The VLAN database in flash memory is deleted. When the switch is reloaded, all
configured VLAN information will have disappeared (you hope!).
Which is the native VLAN, and which VLANs can this interface handle?
VLAN 1 is the native VLAN. The trunk can handle traffic belonging to all VLANs.
Which additional commands would you give to make VLAN 90 the native VLAN and to
permit traffic belonging to VLANs 3, 4 and 5 only?
Which command would show you how interface Fa0/1 has been configured for
trunking?
Which VLAN traffic can now pass over the trunk link?
How can you stop interface Fa0/1 from being a trunk link?
SW1(config)#int fa0/1
SW1(config-if)#switchport mode access
SW1(config-if)#end
Have the ports at both ends of the link been configured with the same native VLAN?
Are the ports at both ends of the link working as trunk links or is there a problem with
their modes? (E.g. one of them configured as an access port or both of them in dynamic
auto mode.)
Are all the required VLANs allowed on the trunk at both ends?
Do all the devices on a VLAN have addresses on the same subnet? (Easy to get this
wrong.)
4.1
What is the purpose of VTP?
To make the management of VLANs easier by allowing switches to learn about VLANs
from each other.
A trunk link.
What are the three VTP modes that a switch could take?
What name is given to a group of switches that share VLAN information using VTP?
A VTP domain.
Which VTP modes allow switches to save VLAN information in the vlan database?
Server mode switches store VLAN information for their domain. Transparent mode
switches store information about their own VLANs.
Which VTP versions can be used on a Catalyst 2960 switch, and which is the default
version?
Versions 1 and 2 can be used. Version 1 is the default. There is a version 3 that can be
used on some switches, but no on the Catalyst 2960.
What does a server switch do to the configuration revision number when a new VLAN is
added?
Increases it by 1.
It shows the receiving switch whether the advertisement contains more up to date
information than the information that it already has.
It does not have any vlan database of its own, so it needs to obtain VLAN information
from a server switch in its domain. It sends out a VTP request advertisement and
receives information in a subset advertisement from the server.
It will forward the summary advertisement to any other switches, but do nothing else
about it. There is no newer VLAN information available.
It will forward the summary advertisement to other switches but ignore its contents.
Which modes of switch will allow you to create new VLANs?
Server switches (for the domain) and Transparent switches (for local use only).
Yes. It is a good idea to have more than one server. If there was only one server and it
failed, then the VLAN information would be lost.
If the switch has any VLANs configured then they will be saved in the switch’s own
VLAN database, and they will be retrieved. The switch stays in transparent mode
(assuming that the configuration has been saved.)
Switchports need to be assigned to VLANs. This is not done centrally, but is done on
each switch.
What is the effect of giving the vtp pruning command on a server switch?
VTP pruning is enabled for the whole domain. VLAN flood traffic will be sent only where
it is needed – in the direction of devices on that VLAN.
What happens to the vtp configuration revision number of a switch if you change its vtp
domain name?
Why might you want to change the domain name of a switch temporarily before adding
it to an existing VTP domain?
If the new switch has a configuration revision number of 0 then there is no danger of the
new switch altering the VLAN information in the VTP domain and updating it with the
wrong information.
Which should you do first on a server, configure the VTP domain name or create the
VLANs?
Configure the domain name first because this will remove existing VLANs.
Is it possible to have a VTP domain where all the switches are in server mode?
Yes.
5.1
Why is it an advantage to have redundancy in a switched Ethernet network?
The additional devices and links provide alternative paths for data if some paths
become unavailable because of equipment failure. This increases the reliability and
availability of the network.
What mechanism is available in the packet header to prevent endless routing loops, but
is not available in the frame header to do the same for switching loops.
If frames are caught in a loop, how can you break the loop?
You need to break the loop physically by removing a connection or powering off a
switch.
A large number of broadcasts looping endlessly in a network, taking all the bandwidth
so that normal traffic cannot be sent.
How does Spanning Tree Protocol manage physical loops to allow redundancy without
allowing frames to travel in loops?
It shuts down certain ports so that no loops are active. If a link fails and the blocked port
is needed, then Spanning Tree Protocol will recalculate and unblock ports as required.
What is the name of the type of frame that STP sends in order to carry out its function?
The switch that is used as a starting point for the STP calculations. It is chosen by an
election.
The switch with the lowest BID becomes the root bridge. The switches exchange BID
information in their BPDUs.
Every switch except the root bridge has one root port. It is the port closest to the root
bridge – the one with the lowest cost route to the root bridge. Root ports are allowed to
forward frames.
Every 2 seconds.
When a switch first starts up, which BID does it put in its BPDU as the root ID?
Its own BID. It is saying that it is the root bridge.
What would make a switch change the root ID that it puts in its BPDUs?
If it receives a BPDU that has a lower value as the root ID then it uses this lower value.
It is saying that it is not the root bridge, another switch is the root bridge.
If there are several switches between a certain port and the root bridge, how is the cost
to the root bridge worked out?
It is the sum of the costs of all the links on the route. The cost for a link depends on the
bandwidth of the link.
What is the revised IEEE value for the cost of a Fast Ethernet link?
19
How can you configure a switch so that it wins the election for root bridge?
Change its priority so that it has the lowest priority value of any switch on the network.
It allows STP to support VLANs by running a separate process for each VLAN. The
extended system ID contains the VLAN number.
How is the root bridge chosen if all the switches have the default priority?
If the default priority of a switch is 32768, why may the priority be shown as 32769?
It sets the switch priority to 24576, or to 4096 less than the lowest priority detected on
the network – whichever of these is lower. The effect is to make this the switch with the
lowest priority so that it becomes root bridge.
Originally they went up in increments of 1 from 1 to 65536, using 16 bits. When the
extended system ID was introduced, it took 12 of the original 16 bits. Only 4 bits
remained. In order to keep the same maximum value, the priority needs to go up in
steps of 4096 (212) You could try it out and see.
Why might you use the command spanning-tree vlan 1 root secondary?
It sets the switch priority to 24576. Assuming that you have used spanning-tree vlan 1
root primary on your chosen root bridge, and that all the other switches are left with
the default priority, this switch will win the election if the root bridge fails. It therefore lets
you choose a backup root bridge.
A port that has been administratively shut down. It does not participate in STP.
If a switch has two ports with the same cost route to the root bridge, which of these
ports will become the root port?
Each port has a port priority that can be configured, and the one with the lower priority
becomes root port. If both have the same priority then the one with the lower port ID
becomes root port. (E.g. Fa0/1 would win over Fa0/2.)
If port Fa0/6 has the default port priority, how would its priority be written?
128.6
Why do all active ports on the root bridge become designated ports?
Each segment has a designated port, and this is the port closer to the root bridge. If one
of the ports on a segment is on the root bridge then it has to be the closer port, so it is
designated.
Which of these states are temporary and are not seen once the network has
converged?
What are the purposes of the Hello, Forward delay and Maximum age timers?
The Hello timer, default 2 seconds, controls the interval at which BPDUs are sent out.
The Forward delay timer, default 15 seconds, controls the time the switch spends in the
listening and learning states. The Maximum age timer, default 20 seconds, controls the
time BPDU information is kept. After 20 seconds with no BPDU received, the switch will
assume that the link is down and STP calculations will have to be run again.
They can, but it is not recommended. They are optimized for a network diameter of 7. If
it is really necessary then the network diameter can be changed and the timers will
automatically change with it, Even this is not recommended in normal conditions.
What is PortFast?
It is a Cisco proprietary method of speeding up STP convergence. Access ports that are
connected to end devices, such as workstations, can never be involved in loops. It
makes sense to bring them to the forwarding state immediately without spending time in
listening and learning. A port configured with PortFast will do this. It is important not to
configure a port as PortFast if it is connected to another switch,
Why does STP use timers to keep switches in the blocking, listening and learning states
for given lengths of time?
It allows the network time to converge before user data frames are forwarded. This is
based on a network diameter of 7 switches.
Once a network has converged, BPDUs are normally sent outwards from the root bridge
but not back towards it. How do switches inform the root bridge if a link goes down?
They send a topology change notification (TCN) frame, which is a special BPDU.
They provide support for VLANs, so that each VLAN can have its own instance of STP.
Ports may be blocking for some VLANs but not for others. PVST used only ISL for
trunking, but PVST+ supports both ISL and IEEE802.1Q.
Rapid STP was introduced to avoid having to wait up to 50 seconds for the network to
converge.
How does the BPDU for RSTP compare with the BPDU for STP?
They have the same format – same fields of the same length. RSTP has the version
field set to 2.
A switch running STP waits for 20 seconds (10 missed BPDUs) before assuming that
the link is down. How long does a switch running RSTP wait?
A port that is not intended to be connected to another switching device. It will only be
connected to an end device such as a workstation.
It will change to the forwarding state at once when it is enabled, and will not spend time
in intermediate states.
Which Cisco proprietary enhancement to STP is similar to the edge port in RSTP?
PortFast
What happens if an RSTP edge port receives a BPDU? Is its behaviour the same as
that of a PortFast port used with STP?
If an RSTP edge port receives a BPDU, this means that it has been connected to a
switch. It immediately stops being an edge port. It reverts to normal and takes part in
spanning tree activities. A PortFast port does not do this by default, though there is a
feature that can allow it to do so.
On a Cisco switch, what is the command that configures a port as an RSTP edge port,
and why was this command chosen?
spanning-tree portfast
This command was chosen to make the transition from STP to RSTP easier because
the command is unchanged from the old PortFast configuring command.
It depends on the type of link. They can be point-to-point or shared. The type can be
found automatically or it can be configured.
Which type of port makes most use of this classification?
Designated ports.
RSTP has a discarding port state that is not found in STP. Which STP port states
correspond to the discarding port state?
In STP, root ports and designated ports are able to forward frames. RSTP has these
port roles, but it introduces roles for ports that are not forwarding. What are these roles
and what is their purpose?
Alternate ports are discarding (closed down) but can take over from designated ports
quickly when necessary. Backup ports are discarding, but can take over from root ports
quickly when necessary.
How can RSTP converge more quickly than STP, and without the use of timers?
It works on one link at a time, closing it down briefly and determining the port roles,
using a proposal and agreement process. Then it moves on to the next link.
Not necessarily. At least one switch on each loop in a VLAN must be running it,
otherwise there will be a broadcast storm.
If a switch is running PVST+ by default, how can it be configured to run Rapid PVST+ ?
A powerful switch in the middle of the network with a direct connection to the servers
and routers. This keeps the average distance traveled by frames as small as possible.
They break up broadcast domains (as routers do), so there can be redundant links
without forming switching loops that cause broadcast storms. They keep the advantage
of forwarding very quickly (unlike routers).
You have designed a network without switching loops. Should you disable STP?
No. There is too much risk that a loop could be created by accident and cause a
broadcast storm. It is better to leave STP running as it does not make too much
demand on processing or bandwidth.
Why is it essential for the network administrator to know the topology of the network,
including all redundant links, which switch is the root bridge, and which ports are closed
down by STP?
6.1
How are VLANs and subnets related?
Each VLAN is associated with a different subnet, so each VLAN has its own group of IP
addresses.
The packets have to be routed from one VLAN (subnet) to another by using a router (or
a multilayer switch).
There is a separate link, switch port and router port for each VLAN. The switch ports
connected to the router are in access mode, not trunk mode.
There is one trunked link connecting the router to the switch, so that all the VLANs use
the same physical router port.
Each VLAN is a separate subnet, so each VLAN will need a different IP address on the
router. How can all the VLANs share one interface?
Several subinterfaces, one for each VLAN, are configured on one physical interface,
and each subinterface is given a different IP address.
Suppose that a PC is on VLAN 2. What default gateway should be configured on the
PC?
The address of the router interface connected to that VLAN, if traditional inter-VLAN
routing is used, or the address of the router subinterface assigned to that VLAN if router
on a stick is used.
No. The no shutdown command goes on the physical interface, not on the
subinterface.
What are the advantages and disadvantages of using “router on a stick” rather than
traditional inter-VLAN routing?
Using a single trunk link allows more VLANs to be added without the need for extra
physical interfaces. It is cheaper to use a single trunk link, because routers with many
interfaces are expensive. The physical cabling is simpler.
Subinterfaces share the interface bandwidth and this might create a bottleneck. Not all
routers are able to have subinterfaces configured for VLANs. The configuration for a
trunk link is a bit more complicated than configuring separate interfaces.
6.2.1
Do you need to configure a routing protocol on a router that is used for inter-VLAN
routing?
No. If all the VLANs are directly connected then it will not need a routing protocol to
route between them. Directly connected networks go into the routing table
automatically. A routing protocol will only be needed if more than one router is involved.
When inter-VLAN routing is used, how are the switchports that link to the router
configured?
If traditional inter-VLAN routing is used, with a separate link for each VLAN, then the
switch port is in access mode and assigned to the appropriate VLAN. If “router on a
stick” is used, then the switch port is configured for trunking.
Which show command produces this type of output?
7.1
What are the advantages of wireless networks over cabled networks?
People can stay in contact with their work while they are travelling. People can move
within a building without cables having to be moved. A business can move into a new
building that does not have network cabling, and it is not necessary to run cables to
each workstation, which saves on cost, though some cabling will still be needed.
Medium, in LANs (on one site) and MANs (on sites within the same town/city).
At which OSI layers is the difference between cabled and wireless networks important?
What potential problems of a wireless LAN are not significant on a cabled LAN?
Interference, and the ability of anyone to receive a transmission if they have a receiver
within range. Wireless is also subject to regulation which may vary from country to
country,
No. It uses collision avoidance rather than collision detection and recovery.
What were the advantages and disadvantages of using the 802.11b standard rather
than the 802.11a standard?
802.11b was cheaper, it was less easily obstructed by walls etc, and it could have a
longer range. On the other hand, it was slower, maximum rate 11 Mbps as opposed to
54 Mbps. It used the 2.4 GHz band rather then the 5 GHz band, which led to more
interference as many appliances use the 2.4 GHz band.
How does the current 802.11g standard compare with 802.11a and 802.11b?
It uses the 2.4 GHz band like 802.11b. It is compatible with either of the earlier
standards because it can use DSSS modulation like 802.11b with speeds up to 11
Mbps, or it can use OFDM modulation like 802.11a with speeds up to 54 Mbps. It has a
similar range to the earlier standards.
How is the planned 802.11n standard expected to provide higher data rates?
It will use MIMO (multiple input/multiple output) technology. A high rate data stream will
be split into two or more lower data rate streams. These streams will be sent at the
same time using multiple antennae.
The IEEE standards cover modulation methods but not manufacture. Manufacturers
could interpret the standards differently so that devices would not be compatible. The
WiFi alliance is an association of vendors. They certify that vendors are keeping to
industry norms and standards so that their devices should work with devices from other
vendors.
It can have a wireless NIC installed as an expansion card, or it can have a removable
USB device.
The 2.4 GHz band is split into 13 channels for Europe. How far apart are the central
points of these channels, and how wide are the channels?
The channels have a centre frequency separation of 5 MHz. Each channel occupies 22
MHz of bandwidth so that they overlap.
How can you ensure that adjacent access points use channels that do not overlap?
Wireless enabled devices do not have an access point. They connect directly to each
other and negotiate the wireless parameters with each other. An ad hoc network is also
known as an independent basic service set (IBSS).
When planning a wireless LAN, you will need to draw coverage circles on a floor plan,
but what other factors should you take into account when locating access points?
Place the access point above obstructions and not near to metal obstructions.
Place the access point vertically and high up, perhaps near the ceiling.
Place access points in locations where users will be making use of them.
7.2
What are the three major categories of security threat to a wireless LAN?
War drivers who look for an unsecured network that will provide Internet access.
Hackers (Crackers) who enter systems to steal data or cause harm. They can often get
past weak security.
Employees may install rogue access points without permission and without
implementing the necessary security.
What is the problem of having wireless devices with default settings ready to be used?
The default settings are known. If the defaults are not changed then anyone can break
into the system.
A NIC on a shared medium will receive all transmissions but discard those that are not
addressed to it. What would a “man in the middle” attacker do to make a wireless laptop
accept transmissions addressed to another client?
Use special software to adapt the NIC of the laptop so that it accepts all transmissions.
The NIC then acts like an access point.
What authentication was included with the original 802.11 standard and why was this
unsatisfactory?
Open authentication provided no security at all. The client requested authentication and
the access point provided it without making any checks. WEP authentication was
designed to provide some privacy by using shared key encryption. This method was too
weak because the encryption algorithm could be cracked. Also, the 32 bit keys had to
be entered by hand and this led to errors.
What is 802.1x ?
Interim security measures included MAC filtering and turning off SSID broadcasts. Why
are these not considered to be adequate security measures/
It is easy for attackers to get round MAC address filtering by using software to modify
MAC addresses attached to adapters. SSIDs can be discovered by using a packet
sniffer to monitor traffic.
Temporal Key Integrity Protocol (TKIP) is the method certified as WPA and Advanced
Encryption Standard (AES)is certified as WPA2. AES is preferred. TKIP can be used on
legacy equipment.
While configuring a wireless access point, you see a reference to PSK2. Which
encryption method does this refer to?
If neither TKIP nor AES is mentioned then WPA2 is used (AES). If PSK2 with TKIP is
specified then WPA is used.
How can you add depth to your security system on a wireless network?
7.3
What should you do before starting to install a wireless access point?
Check the wired portion of the network, including Internet access and DHCP operation.
Check that at least one wireless host is able to make contact with the access point
without security, that it can obtain an IP address and that it can ping the local router.
What type of interface do wireless access points commonly offer for configuration?
When configuring the access point, which mode should you choose if you have both
wireless-G and wireless-N devices?
Mixed.
What radio band should you choose if your have only Wireless-G and Wireless-B
clients?
What radio band should you choose if your have only Wireless-N clients?
What radio band should you choose if your have Wireless-G, Wireless-B and Wireless-
N clients?
Older client devices may not have the best security option available. All devices must
use the same security option.
AES.
The SSID, the authentication method, the encryption method and the network key.