You are on page 1of 20

APPENDIX J

Memory Tables

Chapter 1
Table 1-2 ISL and 802.1Q Compared
Function ISL 802.1Q
Defined by
Inserts another 4-byte header instead of completely encapsulating the
original frame
Supports normal-range (1–1005) and extended-range (1006–4094) VLANs
Allows multiple spanning trees
Uses a native VLAN

Table 1-3 VTP Features


Function Server Client Transparent
Only sends VTP messages out ISL or 802.1Q trunks
Supports CLI configuration of VLANs
Can use normal-range VLANs (1–1005)
Can use extended-range VLANs (1006–4095)
Synchronizes (updates) its own config database when
receiving VTP messages with a higher revision number
Creates and sends periodic VTP updates every 5 minutes
Does not process received VTP updates, but does forward
received VTP updates out other trunks
Places the VLAN ID, VLAN name, and VTP configuration
into the running-config file
Places the VLAN ID, VLAN name, and VTP configuration
into the vlan.dat file in flash
3 Appendix J: Memory Tables

Chapter 1 lists a configuration checklist for configuring VLANs and assigning the VLANs
to interfaces. As much as you can, complete the checklist. The following list shows the
same step numbers/letters as used in the chapter.

Step 1 To configure a new VLAN, follow these steps:

a.

b. (Optional)

Step 2 To configure a VLAN for each access interface, follow these steps:

a.

b.

c. (Optional)
Table 1-4 Trunking Administrative Mode Options with the switchport mode Command
Command Option Description
access
trunk
dynamic desirable
dynamic auto

Table 1-5 Expected Trunking Operational Mode Based on the Configured Administrative
Modes
Administrative Mode Access Dynamic Auto Trunk Dynamic Desirable
access
dynamic auto
trunk
dynamic desirable

Table 1-6 Voice and Data VLAN Configuration


Device Name of the VLAN Configured With This Command
Phone
PC
Chapter 2 4

Chapter 1 lists a configuration checklist for configuring VTP. As much as you can, complete
the checklist. The following list shows the same step numbers/letters as used in the chapter.

Step 1

Step 2

Step 3 (Optional)

Step 4 (Optional)

Step 5 (Optional)

Step 6
Table 1-7 Where VTP Clients and Servers Store VLAN-Related Configuration
Configuration Commands Where Stored How to View
vtp domain
vtp mode
vtp password
vtp pruning
vlan vlan-id
name vlan-name
switchport access vlan vlan-id
switchport voice vlan vlan-id

Chapter 2
Table 2-2 Three Classes of Problems Caused by Not Using STP in Redundant LANs
Problem Description
Broadcast storms
MAC table instability
Multiple frame transmission

Table 2-3 STP: Reasons for Forwarding or Blocking


Characterization of Port STP State Description
All the root switch’s ports
Each nonroot switch’s root port
Each LAN’s designated port
All other working ports
5 Appendix J: Memory Tables

Table 2-4 Fields in the STP Hello BPDU


Field Description
Root bridge ID
Sender’s bridge ID
Cost to reach root
Timer values on the root switch

Table 2-6 Default Port Costs According to IEEE


Ethernet Speed Original IEEE Cost Revised IEEE Cost
10 Mbps
100 Mbps
1 Gbps
10 Gbps

Table 2-7 STP Timers


Timer Description Default Value
Hello
Max Age
Forward Delay

Table 2-8 IEEE 802.1D Spanning-Tree States


Learns MACs Based on Transitory or Stable
State Forwards Data Frames? Received Frames? State?
Blocking
Listening
Learning
Forwarding
Disabled
Chapter 2 6

Table 2-9 RSTP and STP Port States


STP State RSTP State
Operational State (802.1d) (802.1w) Forwards Data Frames in This State?
Enabled Blocking
Enabled Listening
Enabled Learning
Enabled Forwarding
Disabled Disabled

Table 2-10 RSTP and STP Port Roles


RSTP Role STP Role Definition
Root port
Designated port
Alternate port
Backup port
Disabled

Table 2-11 Comparing Three Options for Multiple Spanning Trees


Supports Supports Only One Instance Required for
Option STP RSTP Configuration Effort Each Redundant Path
PVST+
PVRST
MIST

Table 2-12 STP Defaults and Configuration Options


Setting Default Command(s) to Change Default
Bridge ID
Interface cost
PortFast
BPDU Guard
7 Appendix J: Memory Tables

Chapter 3
Table 3-2 LAN Switch Interface Status Codes
Line Status Protocol Status Interface Status Typical Root Cause
admin. down down
down down
up down
down down (err-disabled)
up up

Table 3-3 10BASE-T and 100BASE-Tx Pin Pairs Used


Devices That Transmit on 1,2 Devices That Transmit on 3,6
and Receive on 3,6 and Receive on 1,2

Table 3-4 Port Security Behavior Based on Violation Mode


Violation Counters
Discards All Traffic Results in Increment for
Violation Discards After Violation err-disabled Each New
Mode Offending Traffic Occurs Interface State Violation
shutdown
restrict
protect

Table 3-5 Commands That Can Find Access Ports and VLANs

EXEC Command Description


Lists each VLAN and all interfaces assigned to that VLAN, but does not
include trunks
Identifies an interface’s access VLAN, voice VLAN, and the administrative
(configured) mode and operational mode (access or trunking)
Lists MAC table entries: MAC addresses with associated interfaces and
VLANs
Chapter 5 8

Chapter 4
Chapter 4 lists a summary of a host’s routing logic, with two main branches in what the host
decides to do. As much as you can, complete the description of each step.

1.

a.

b.

Chapter 4 lists a summary of a router’s routing logic, with two main branches in what the
host decides to do. As much as you can, complete the description of each step.

1.

2.

3.

4.

5.

6.
Table 4-2 Comparing the Use of the Terms Classless and Classful
As Applied To Classful Classless
Addresses
Routing protocols
Routing (forwarding)

Chapter 5
Table 5-2 Classless and Classful Interior IP Routing Protocols
Routing Is It Sends Mask in Supports Supports Manual Route
Protocol Classless? Updates VLSM Summarization
RIP-1
IGRP
RIP-2
EIGRP
OSPF
9 Appendix J: Memory Tables

Chapter 5 lists a five-step process for finding summary routes. As much as you can,
complete the step list.

Step 1

Step 2

Step 3

Step 4

Step 5
Table 5-5 Autosummarization Support and Defaults
Routing Supports Defaults to Use Can Disable
Protocol Classless? Autosummarization? Autosummarization?1 Autosummarization?
RIP-1
RIP-2
EIGRP
OSPF

Chapter 6
Table 6-3 Standard and Extended IP Access Lists: Matching

Type of Access List What Can Be Matched


Both standard and extended ACLs

Only extended ACLs


Chapter 7 10

Table 6-5 Popular Applications and Their Well-Known Port Numbers


Application Name Keyword in access-list
Port Number(s) Protocol Application Command Syntax
20
21
22
23
25
53
67, 68
69
80
110
161
443
16,384–32,767

Table 6-7 Operators Used When Matching Port Numbers

Operator in the access-list Command Meaning


eq
neq
lt
gt
range

Chapter 7
Table 7-1 ICMP Message Types

Message Description
Destination Unreachable
Time Exceeded

Redirect

Echo Request, Echo Reply


11 Appendix J: Memory Tables

Table 7-2 ICMP Unreachable Codes

Unreachable Code When It Is Used What Typically Sends It


Network unreachable

Host unreachable

Can’t fragment

Protocol unreachable

Port unreachable

Table 7-3 Codes That the ping Command Receives in Response to Its ICMP Echo Request

ping Command Code Description


!
.
U
N
M
?
Chapter 8 12

Chapter 8
Table 8-2 IP IGP Metrics
IGP Metric Description
RIP-1, RIP-2
OSPF
EIGRP

Table 8-3 Interior IP Routing Protocols Compared

Feature RIP-1 RIP-2 EIGRP OSPF IS-IS


Classless No Yes
Supports VLSM No Yes
Sends mask in update No Yes
Distance vector Yes No
Link-state No Yes
Supports autosummarization No Yes Yes No No

Supports manual summarization No Yes Yes Yes Yes

Proprietary No No

Routing updates are sent to a multicast IP address No —

Supports authentication No Yes

Convergence Slow Fast


13 Appendix J: Memory Tables

Table 8-4 Comparing Features of IGPs: RIP-2, EIGRP, and OSPF


Features RIP-2 OSPF EIGRP
Metric
Sends periodic updates
Full or partial routing updates
Where updates are sent
Metric considered to be "infinite"
Supports unequal-cost load balancing

Table 8-5 Default Administrative Distances


Route Type Administrative Distance
Connected
Static
BGP (external routes)
EIGRP (internal routes)
IGRP
OSPF
IS-IS
RIP
EIGRP (external routes)
BGP (internal routes)
Unusable
Chapter 11 14

Chapter 10
Table 10-2 EIGRP Features Compared to OSPF

Feature EIGRP OSPF


Converges quickly
Built-in loop prevention
Sends partial routing updates, advertising only new or changed
information
Classless; therefore, supports manual summarization and VLSM
Allows manual summarization at any router
Sends routing information using IP multicast on LANs
Uses the concept of a designated router on a LAN
Flexible network design with no need to create areas
Supports both equal-metric and unequal-metric load balancing
Robust metric based on bandwidth and delay
Can advertise IP, IPX, and AppleTalk routes
Public standard

Chapter 11
Table 11-2 Neighbor Requirements for EIGRP and OSPF

Requirement EIGRP OSPF


Interfaces must be in an up/up state
Interfaces must be in the same subnet
Must pass neighbor authentication (if configured)
Must use the same ASN/process-ID on the router configuration command
Hello and hold/dead timers must match
IP MTU must match
Router IDs must be unique
K-values must match
Must be in the same area
15 Appendix J: Memory Tables

Chapter 12
Table 12-2 PPP LCP Features

Function LCP Feature Description


Looped link detection Magic number

Error detection Link Quality Monitoring (LQM)

Multilink support Multilink PPP

Authentication PAP and CHAP

Table 12-4 Likely Reasons for Data-Link Problems on Serial Links


Line Status Protocol Status Likely Reason
Up Down (stable) on both ends

or

Down (stable) on one end, flapping between up and down


on the other
Up Down on one end, up on the other
Up Down (stable) on both ends

Table 12-5 Summary of Symptoms for Mismatched Subnets on Serial Links


Symptoms When IP Addresses on a Serial Link Are in Different Subnets HDLC PPP
Does a ping of the other router’s serial IP address work?
Can routing protocols exchange routes over the link?
Chapter 13 16

Chapter 13
Table 13-2 Frame Relay Terms and Concepts

Term Description
Virtual circuit (VC)

Permanent virtual circuit (PVC)

Switched virtual circuit (SVC)

Data terminal equipment (DTE)

Data communications equipment


(DCE)

Access link
Access rate (AR)

Committed Information Rate


(CIR)
Data-link connection identifier
(DLCI)
Nonbroadcast multiaccess
(NBMA)
Local Management Interface
(LMI)

Table 13-4 Frame Relay LMI Types

Name Document IOS LMI-Type Parameter


Cisco Proprietary
ANSI T1.617 Annex D
ITU Q.933 Annex A
17 Appendix J: Memory Tables

Chapter 14
Table 14-4 PVC Status Values

Status Active Inactive Deleted Static


The PVC is defined to the
Frame Relay network
The router will attempt to send
frames on a VC in this state

Chapter 15
Table 15-3 Comparing VPN Encryption Algorithms

Encryption Algorithm Key Length (Bits) Comments


Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)

Table 15-6 Summary of Functions Supported by ESP and AH

Feature Supported by ESP? Supported by AH?


Authentication
Message integrity
Encryption
Antireplay

Chapter 17
Table 17-4 Example IPv6 Prefixes and Their Meanings

Term Assignment Example from Chapter 17


Registry prefix
ISP prefix
Site prefix
Subnet prefix
Chapter 17 18

Table 17-5 Details of the RS/RA Process

Message RS RA
Multicast destination
Meaning of multicast address

Table 17-6 IPv6 Address Configuration Options

Static or Dynamic Option Portion Configured or Learned


Static
Static
Dynamic
Dynamic

Table 17-7 Comparison of Stateless and Stateful DHCPv6 Services

Feature Stateful DHCP Stateless DHCP


Remembers IPv6 address (state information) of
clients that make requests
Assigns IPv6 address to client

Supplies useful information, like DNS server IP


addresses
Is most useful in conjunction with stateless
autoconfiguration

Table 17-9 Common Link Local Multicast Addresses


Easily Seen
Type of Address Purpose Prefix Hex Prefix(es)
Global unicast Unicast packets sent through the public Internet
Unique local Unicast packets inside one organization
Link Local Packets sent in the local subnet
Multicast (link Multicasts that stay on the local subnet
local scope)
19 Appendix J: Memory Tables

Chapter 17 lists a configuration checklist for configuring IPv6. As much as you can,
complete the checklist. The following list shows the same step numbers/letters as used in
the chapter.

Step 1

Step 2

Step 3

Step 4

You might also like