Cornell Notes Sheet: 200-301 CCNA

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 17

200-301 CCNA

CORNELL
NOTES
SHEET
QUESTION NOTES
S
1.0
Network Fundamentals
 1.1 Explain role/function of network components
o 1.1.a Routers
 Routers use the longest stick match (the more specific route to the subnet)
if more than one route exists to the same subnet
o 1.1.b L2 and L3 switches
o 1.1.c Next-generation firewalls and IPS
o 1.1.d Access points
o 1.1.e Controllers (Cisco DNA Center and WLC)
o 1.1.f Endpoints
o 1.1.g Servers
 1.2 Describe characteristics of network topology architectures
o 1.2.a 2 tier (Collapsed Core)
 Core/distribution layers combined as a single layer; collapsed core
devices are characterized by high speed connectivity and routing,
filtering, NAT distribution functions
 Each access switch connects to distribution switch(es) w/ one or
more ports/uplinks (partial mesh)
o 1.2.b 3 tier (Hierarchy)
 Core: Move large amounts of data as fast as possible, majority of users
 Distribution: Routing. filtering, WAN access, NAT, firewalls,
redistribution
 Access: End device connectivity
o 1.2.c Spine-leaf
 Provides high bandwidth, low-latency, nonblocking server-to-server
connectivity
 2 tier
 Leaf layer: Every access switch connects to each of the switches
in spine layer to create full mesh topology
o Leaf switches provide devices access to the fabric
(spine/leaf switch network), deployed at top of the track
o Devices (Servers, Firewalls/Load Balancers, WAN
routers) connect to leaf switches
o Leaf switches can connect to every spine switch
o Access layer
 Spine layer: Made up of switches that perform routing
o Spine switches connect to all leaf switches, deployed
middle/end of row
o Aggregation layer
 East-west network traffic; evenly distributed load among top-tier
switches as path is randomly chosen

 3 tier
 Leaf layer, Spine layer, and Core layer that consists of routers
added to leaf and spine later
 Data flows can take shortcuts but take same number of hops
regardless of source/destination (fully mesh)
o 1.2.d WAN
o 1.2.e Small office/home office (SOHO)
o 1.2.f On-premises and cloud
 1.3 Compare physical interface and cabling types
o 1.3.a Single-mode fiber, multimode fiber, copper
 Single Mode
 Single light ray; great distance
 Distances up to 2000 (full-duplex)
 MultiMode
 Multiple light rays, relatively short distance (modal dispertion)
 Distances up to 412 meters
 Copper
 Up to 100 meters
 Cat 5 100 Mbps
o Pins 1,3,2,6. The really stupid thing is that anything with
bandwidth less than Cat 5e aren’t capable of auto-MDIX. I
was fooled all along into thinking our cables nowadays
aren’t bidirectional!
 Cat 5e: 1000 Mbps
 Cat 6: 10 Gbps (>55 Meters)
o 24 gauge connectors
 Cat 6a: 10 Gbps
 Cat 7: 10 Gbps
o 1.3.b Connections (Ethernet shared media and point-to-point)
o 1.3.c Concepts of PoE
 IEEE 802.3af/802.3at standards describe any systems which pass
electrical power along with data on twisted pair Ethernet cabling as PoE
 Power is usually supplied by PoE-enabled switch
 PoE injectors add PoE capability to regular non-PoE network links
 1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
o Collisions occur when 2 devices transmit at the same time
o In a connection with two different duplex configurations, the half-duplex end will
experience late collisions
 1.5 Compare TCP to UDP
o TCP
 1.6 Configure and verify IPv4 addressing and subnetting
o Configure route summarization
 Identify summarized route for subnet group
 Convert last significant octet of the first & last subnet in range to
binary
o ex. 172.16.31.0 /24 -> 00011111
o ex. 172.16.16.0 /24 -> 00010000
o
 Identify last consecutive bit shared
 Convert all values right of shared bit to 1 to produce a mask value
of the summarized route
o 11110000 -> 255.255.240.0
 Identify subnet addresses included in the range indicated by the
advertised subnet and mask
o 172.16.17.0
o 172/16.30.0
o Unable to use 172.16.16.0, 172.16.31.0
 (config-router)#no auto-summary turn off automatic route-
summarization
 Default: Summarize subnets based on classful boundaries when
advertising routes on networks w/ a different class boundary
 (config-if)#)ip summary-address [routing protocol] a.b.c.d m.m.m.m
configured summary address on specified outbound interface
 If neighboring devices receive query packet for network that
matches summary route, it sends a network a.b.c.d/m unreachable
message in response and won’t extend query packets further
 Add summary route to routing table w/ the route’s next-hop
interface set to null0

 1.7 Describe the need for private IPv4 addressing
 1.8 Configure and verify IPv6 addressing and prefix
o ipv6 address [ipv6-prefix/prefix-length] eui-64 configure global IPv6 address
with interface ID
 Specify only the 64-bit network prefix
 Last 64 bits are automatically computed from the interface ID
 Automatically configures link-local address on interface
o show ipv6 interface [type] [number] Verifies that IPv6 addresses are
configured correctly for the specified interface
 Interface is up if hardware usable, Line protocol is up if interface
provides two-way communication
o show ipv6 interface brief
 1.9 Compare IPv6 address types
o 1.9.a Global unicast
o 1.9.b Unique local
o 1.9.c Link local
o 1.9.d Anycast
o 1.9.e Multicast
o 1.9.f Modified EUI 64
 1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
o ipconfig (Win), ifconfig (Mac/Linux) displays IP configuration info:
 IP address and mask
 Default gateway
 DNS and WINS server addresses
 IP address of the DHCP server used for configuration
 MAC address

o netstat resolves IP address of hostname and displays name-resolution related
info by looking for it in the following order
 Local DNS cache
 HOSTS file
 DNS server query
 1.11 Describe wireless principles
o 1.11.a Nonoverlapping Wi-Fi channels
o 1.11.b SSID
o 1.11.c RF
o 1.11.d Encryption
 1.12 Explain virtualization fundamentals (virtual machines)
 1.13 Describe switching concepts
o 1.13.a MAC learning and aging
 MAC aging specifies time before CAM table entry ages out and is
discarded (default 300 seconds; 0 to 1 mil)
 Configure in Interface configuration mode/VLAN configuration mode
 If VLAN not specified, aging applies to all VLANs
 MAC learning is the process by which new entries are added to the
switches’ CAM table when a frame is received. Once an association is
made, the switch forwards subsequent frames to a single port without
flooding all the others
 Built using the MAC source address of frames received
 Enabled on all VLANS by default
o 1.13.b Frame switching
 LAN switches are characterized by the forwarding methods that they
support
 Store-and-forward switches entire frame in internal memory and
check frame for errors before forwarding to destination; bad
frames are discarded
o Ingress (incoming) interface buffers frames as FCS
checksum field is checked, giving the switch ample time to
adjust speed between ingress and egress port
 Cut-through switches forward frames as soon as they know the
destination MAC address and outgoing egress interface port; only
the destination MAC address (6 bytes) is copied into memory
o Reduces latency but bandwidth issues can buildup as a
result
o No support for ports w/ varying ingress/egress speeds
 Fragment-free switches are like cut-through switches except the
first 64 bytes of the frame are stored before forwarding
o Runts are typically less than 64 bits; this at least verifies
frame is minimally-sized
o Compromise between above 2 methods
o 1.13.c Frame flooding
 Switch sends copy of frame to all nodes on all ports when the destination
MAC address of the frame is a broadcast address
 Switches never send traffic out same interface it was received on
 If source MAC address is
o Not in CAM table: Add new entry mapping port # to MAC
address(Learning)
o Is already mapped to the port on which the frame was
received: No changes made to CAM table
o Is already in CAM table but frame was received on
different switch port: Update entry, refresh timer
 If destination MAC address is a:
o Broadcast address: Switch floods the frame to all ports
(flooding)
o Unknown Unicast: Switch floods frame to all ports [that
are members of the same VLAN], only recipient accepts
the frame, all other devices drop frame
o Unicast address (In CAM table): Switch forwards frame to
switch port in CAM table (forwarding)
o Unicast address (In CAM table but destination device is
connected to same port on which frame was received):
Switch ignores frame and does not forward it (filtering)
o 1.13.d MAC address table
 Forwarding database built by switch which contains mappings of MAC
addresses to their respective port
 MAC addresses are only used for local delivery on same IP
network; at each point the
 Columns: VLAN, MAC address, Type (Dynamic/Static), Ports
o Static entries persist through reboot; dynamic entries do
not
 When frame arrives on switch port (interface), the switch examines the
source and destination MAC address and makes note of the port the frame
arrived on
2.0
Network Access
 2.1 Configure and verify VLANs (normal range) spanning multiple switches
o 2.1.a Access ports (data and voice)
o 2.1.b Default VLAN
o 2.1.c Connectivity
 2.2 Configure and verify Interswitch connectivity
o 2.2.a Trunk ports
o 2.2.b 802.1Q
o 2.2.c Native VLAN
 2.3 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and
LLDP)
o CDP Cisco Discovery Protocol
 Broadcasts periodic advertisements (unencrypted, unauthorized)
containing device information: Hostname, IOS version, interfaces of
directly connected neighbors (no hopping across devices!)
 Network troubleshooting, design, changes, documentation
 Disable on edge routers and user-facing interfaces; keep device-facing
interfaces
 show cdp neighbors show CDP neighbors
 Interface vs Remote Port
 detail show ip addresses of connected devices
 show cdp show global CDP info
 do show cdp
 run privleged exec prompt
 no cdp run disable cdp by force timeout holdtime
 no cdp enable within interface
 cdp run enable cdp
 cdp enable within interface
o LLDP Link Layer Discovery Protocol
 Disabled by default and must be configured on a per-interface basis and
enabled globally before being used; similar syntax as CDP
 lldp run to enable

 lldp transmit enable interface to send info
 lldp recieve enable interface to receive info
 show lldp Displays LLDP information, including frequency of
transmissions, hold time for packets to be sent, and the delay time for
LLDP initialization on an interface.
 show lldp interface Displays information about interfaces that have
LLDP enabled, including transmit and receive configuration, as well as
the current state
 show lldp neighbors
 show lldp entry
 2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
 2.5 Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol
and identify basic operations
o 2.5.a Root port, root bridge (primary/secondary), and other port names
o 2.5.b Port states (forwarding/blocking)
o 2.5.c PortFast benefits
 2.6 Compare Cisco Wireless Architectures and AP modes
o Hub-and-spoke
 Wireless controller connects to all APs via wired links, connecting
wireless to internal wired network and pushing out configuration changes
for APs
o Distributed Wireless Mesh
 2.7 Describe physical infrastructure connections of WLAN components (AP, WLC,
access/trunk ports, and LAG)
o AP
 Often configured as a bridge connecting a wireless segment to a wired
segment on same subnet
 Layer 2 device
o WLC (wireless controller) connects and manages multiple APs through wired
links
 Push down configuration changes
 Provides DHCP services typically
 Routes traffic from the wireless network to internal wired network and
vice versa
 Hub-and-spoke infrastructure
 All wireless data must pass through controller
 APs communicate only with WLC and not each other
 Bottleneck & single-point-of-failure if no redundancy
 2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP,
HTTPS, console, and TACACS+/RADIUS)
o SSH client requirements
 k9 (crypto) IOS image
 hostname hostname configure hostname if not previously done
 ip domain-name configure DNS domain name of router
 crypto key generate rsa generate an SSH key to be used with SSH
 line vty 0 # ; transport input ssh Disable Telnet (enabled by default),
enable SSH only
 2.9 Configure the components of a wireless LAN access for client connectivity using
GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN
settings
3.0
IP Connectivity
Separate  3.1 Interpret the components of routing table
routing tables o 3.1.a Routing protocol code
are used for  Indicates the route source
each protocol  L: Address of local router interface
(IP,  C: Directly connected network
AppleTalk)  S: Static route
 P: Dynamic network learned with OSPF
 R: Dynamic network learned with RIP
o 3.1.b Prefix
 Network address for destination route
o 3.1.c Network mask
 Subnet address for destination route
o 3.1.d Next hop
 IP address of next router the packet will be forwarded to
o 3.1.e Administrative distance
 Value that measures trustworthiness of route sources (routing protocols)
given multiple sources of info about remote networks. Lower number =
preferred route
o 3.1.f Metric
 Used to determine the path to take with multiple ways to get to a remote
network; identifies how far a destination is (distance/time). Lower metric
= Higher preference
o 3.1.g Gateway of last resort
 Also known as the default route, avoids the packet being dropped if no
match is found
 3.2 Determine how a router makes default forwarding decisions
o 3.2.a Longest match
 The best match in the routing table; the route with the most left
matching bits (the longest match)
o 3.2.b Administrative distance
 If a static route is available, select it.
 Choose route with lowest administrative distance if router learns of
multiple routes through different routing protocols
 Choose route with the best cost as defined by the routing metric if router
learns of multiple routes through the same protocol
 Route Sources and Default Administrative Distances
 Direct Connected:0
 Static:1
 EIGRP Summary Route:5
 External BGP: 20
 Internal EIGRP: 90
 IGRP: 100
 OSPF: 110
 IS-IS: 115
 RIP: 120
 External EIGRP: 170
 Internal BGP: 200
o 3.2.c Routing protocol metric
 3.3 Configure/verify IPv4/IPv6 static routing
o 3.3.a Default route
 Works best when only one path exists to a part of network
 Router(config)#ip route 0.0.0.0 0.0.0.0 {ip-address | exit-intf}
 Configure default route to internet; assuming the ISP’s address is
160.12.99.1
o ip route 0.0.0.0 0.0.0.0 160.12.99.1
 Router(config)#ipv6 route ::/0 {ipv6-address | exit-intf}
 Router#show ip route static or show ipv6 route static Show static
routes in routing table
o 3.3.b Network route
 Used when connecting to a remote network
 Router(config)#ip route network-address subnet-mask { ip-address |
exit-intf [ip-address]} [distance]
 Distance defaults to 1 if not specified
 Configure static route on the router to 10.0.0.0/8; assuming we use
the next hop address of 172.17.12.98
o ip route 10.0.0.0 255.0.0.0 172.17.12.98
 A route to network 10.0.0.0 is added to routing
table; the next hop router address (outgoing
interface/default gateway IP address) is
172.17.12.98 (where packets that are addressed for
the network are forwarded)
o 3.3.c Host route
o 3.3.d Floating static
 Backup routes
 Router(config)#ip route network-address subnet-mask { ip-address |
exit-intf [ip-address]} [distance]
 Increase administrative distance of floating route (>1) to ensure
it’s higher than the default static route and used only as backup
 Routes don’t show in show ip route
 3.4 Configure and verify single area OSPFv2
o 3.4.a Neighbor adjacencies
o 3.4.b Point-to-point
o 3.4.c-d Broadcast (DR/BDR selection), Router ID
 DR: Single designated router who coordinates routing table updates for
all routers on the subnet
 BDR (Backup designated router): Single designated router who becomes
DR if unavailable
 Values used to elect DR/BDR, in this order:
 First the Router with highest OSPF priority (0-255, default 1) set
on the interface becomes the DR
o ip ospf priority # give priority setting
o Priority 0 means router never becomes DR or BDR
o DR remains DR even if another router with higher
priority/router ID comes online; Reset OSPF to force new
election
o DR that comes back online doesn’t resume DR role unless
reset is performed
 For routers with the same priority value, the highest Router ID
becomes DR; the router ID is determined in this order:
o Highest Router ID configured for the OSPF process
o Highest loopback address (recommended)
 Never goes down like an interface address could
 interface loopback #
o Highest active IP address for any of it’s interfaces that’s up
 BDR is router with next highest priority/router ID
o 3.5 Describe the purpose of first hop redundancy protocol
 HSRP uses a virtual IP address and virtual MAC address configured on a
group of routers that
4.0
IP Services
 4.1 Configure and verify inside source NAT using static and pools
 4.2 Configure and verify NTP operating in a client and server mode
 4.3 Explain the role of DHCP and DNS within the network

 router(config)#ip host [name]  Creates static DNS entries.


a.b.c.d

 router(config)#ip domain-  Configures the router default domain


name [name] (for DNS).

 router(config)#ip name-  Sets the default DNS name server.


server a.b.c.d

 router(config)#ip domain-  Enables the router to use DNS to


lookup identify IP addresses from hostnames.

 router(config)#no ip domain-  Disables the broadcast name


lookup resolution of hostnames.

 router#show hosts  Displays a list of known IP hosts.

o Router/Switch looks at Static DNS entries then DNS server query (if enabled)
o Workstation looks at local DNS cache, hosts files, DNS server query (primary),
DNS server query (secondary)
 4.4 Explain the function of SNMP in network operations
 4.5 Describe the use of syslog features including facilities and levels
 4.6 Configure and verify DHCP client and relay
o DHCP runs on interfaces based on the IP address assigned to the interface; if it’s
assigned an IP address that matches a DHCP pool, DHCP listens for requests on
that interface. If the interface doesn’t have an IP address, it wont run DHCP
 Lease request: DHCPDiscover sent by client
 Cisco routers use DHCPDiscover packet to obtain IP subnet on
which DHCP client resides
 Lease offer: DHCPOffer is sent by all DHCP servers with available IP
addresses
 Lease selection: Client selects IP address from first offer and broadcasts
DHCPREQUEST
 Lease acknowledgement: DHCP server that made offer responds with a
DHCPACK to client
o Enable DHCP requests across subnets by enabling BOOTP (DHCP broadcast)
requests through router and configure a server for BOOTP forwarding to request
IP info on behalf of other clients
o ip address dhcp enable the device to receive configuration information
 use in interface mode for physical interface on router; use in vlan1
interface mode for switch
 automatically replace any manually configured address for interface
o service dhcp enable DHCP service on router
o no ip dhcp conflict logging force DHCP server to not log IP address conflicts
o ip dhcp pool VLAN ID Set DHCP pools on specified VLAN
 domain-name domain
 network address mask Sets network address and subnet mask for DHCP
address pool
 default-router x.x.x.x Set default gateway
 dns-server x.x.x.x x.x.x.x Set DNS server; you don’t have to have
multiple, can set up to 8
 lease d h m Set lease time
 infinite
 d days
 h hours
 m minutes
 host address mask or client-identifier mac address Binds specific IP
address and mask to host, creating a separate pool from that of the subnet.
Give the pool a unique name.
 Only one manual binding per host pool
 Bindings for DHCP clients use the latter command;
01aa.bbcc.ddee.ff, where 01 represents media type
o 1:Ethernet
o 5:IEEE 802 Networks
o 17:HDLC
o 20:Serial Line
o ip dhcp excluded-address x.x.x.x – x.x.x.x Set DHCP Exclusions; doesn’t have
to be a range
 Global configuration command; not part of pool
o ip helper-address x.x.x.x Enable DHCP relay agent feature
 x.x.x.x is IP address of DHCP server
o no ip forward-protocol udp port Control which broadcast packets & protocols
are forwarded by a DHCP relay agent
 37: Time
 49: TACACS
 53: DNS
 67: BOOTP/DHCP Server
 68: BOOTP/DHCP Client
 69: TFTP
 137: NetBIOS Name Service
 138: NetBIOS Datagram Service
o Privleged EXEC
 show ip dhcp binding Display info about each IP address lease
 show ip dhcp pool name Display info about DHCP address pools: pool
name, IP address range of requested subnets, total number of addresses
(leased, allocated, excluded, reserved)
 show ip dhcp server statistics
 show ip dhcp conflict also shows method used to identify conflicts
 ping: detected by server
 gratuitous ARP: detected by client
 clear ip dhcp conflict
 show ip dhcp database Display DHCP server database agent info:
remote file used to store automatic DHCP bindings, last date/time
bindings were read/written from server, whether last read/write of host
bindings was successful
 show hosts Display default domain name, style of name lookup service,
name server hosts, and cached list of hostnames/addresses

 4.7 Explain the forwarding per-hop behavior (PHB) for QoS such as classification,
marking, queuing, congestion, policing, shaping
o Weighted Random Early Detection (WRED) is a congestion avoidance
mechanism that drops packets selectively based on IP precedence
 4.8 Configure network devices for remote access using SSH
o
 4.9 Describe the capabilities and function of TFTP/FTP in the network
5.0
Security Fundamentals
 5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation
techniques)
o
 5.2 Describe security program elements (user awareness, training, and physical access
control)
o User awareness is a security program that makes users aware of the need for data
confidentiality and threats to data
o
 5.3 Configure device access control using local passwords
o
 5.4 Describe security password policies elements, such as management, complexity, and
password alternatives (multifactor authentication, certificates, and biometrics)
o
 5.5 Describe remote access and site-to-site VPNs
 5.6 Configure and verify access control lists
 5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and
port security)
 5.8 Differentiate authentication, authorization, and accounting concepts
 5.9 Describe wireless security protocols (WPA, WPA2, and WPA3)
 5.10 Configure WLAN using WPA2 PSK using the GUI
o Requires AES-256 encryption (64 hexadecimal characters) for WPA2 passphrase
6.0
Automation/Programmability
 6.1 Explain how automation impacts network management
 6.2 Compare traditional networks with controller-based networking
 6.3 Describe controller-based and software defined architectures (overlay, underlay, and
fabric)
o 6.3.a Separation of control plane and data plane
o 6.3.b North-bound and south-bound APIs
 Southbound APIs
 OpenFlow: Defines the way the SDN controller interacts with the
forwarding plane to make adjustments to the network
 NETCONF: uses XML to manage network device configuration
 onePK: Cisco-proprietary DBI that allows for management of
network device configuration without hardware updates
 OpFlex: Open-standard distributed control system; uses summary
policies
 6.4 Compare traditional campus device management with Cisco DNA Center enabled
device management
o Cisco DNA Center platform capabilities
 SDKs allow management to be extended to third-party network devices
 Intent-based APIs leverage controller
 Process adapters built on integration APIs allow integration with network
systems to streamline IT operations
 Domain adapters built on integration APIs allow integration with
infrastructure domains (data center, WAN, security) to deliver intent-
based infrastructure across entire enviornment
 6.5 Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data
encoding)
 6.6 Recognize the capabilities of configuration management mechanisms Puppet, Chef,
and Ansible
 6.7 Interpret JSON encoded data

 Dynamic Routing Protocol


o Components
 Data structures
 Routing protocol messages
 Algorithms
o Responsibilities
 Discover remote networks
 Record/store current routing info
 Select best path to each destination
 Provide backup paths
o Advantages/Disadvantages
 Accommodates network growth, automatically adapts to structural
changes, for large networks
 Complex but unsecure without additional configuration, requires
additional resources
o Internal Routing
 Interior Gateway Protocol (IGP)
 RIP
 Routing Method: Distance vector
 Metric: Hop count (# of routers along path, where each router is 1
hop)
 Broadcast routing tables every 30 seconds
 Auto/manual route summarization (v2)
 Slow convergence time
 Full routing table sent at each update
 Maintains multiple paths to same network (load balancing):
Equal-cost only (v2)
 OSPF
 Link-state routing protocol (incremental updates to table)
 Hierarchical network design
 IP-only
 Classless routing protocol
o Subnet mask sent in routing update
o Supports manual route summarization with VLSM
 No automatic route summarization
 Metric: Cost (total bandwidth available from origin to
destination); faster links = lower cost
o SPF (shortest path first) algorithm) is chosen for the
routing table
 Routers that are neighbors (connected to the same subnet) with
OSPF enabled send Hello packets
 Both routers must be on same subnet
 Both routers must have the same hello & dead
intervals configured
 Both routers must use the same OSPF area
 Both routers must pass authentication requirements
 Stub area flag (value) for each router must match
o LSAs (Link-state advertisements) are ISPF packets that
maintain OSPF tables
 OSPF topology table is used for determining adjacency,
containing all routes
o Routers are adjacent when their topology tables contain the
same route info
 OSPF routing table contains best paths for sending packets
 Fast convergence time
 Not susceptible to routing-loops
 Scalable; no hop limitation
 Neighbor discovery before sending routing info
 Full network topology for loop avoidance
 High resources
 Maintains multiple paths to same network (load balancing):
Equal-cost only (v2)
o Up to 16 equal-cost paths; default is 4
 IS-IS
 IGRP
 EIGRP
 Routing Method: Balanced hybrid
 Metric: Bandwidth and Delay
 Slowest bandwidth, dependability of path, load, delay values
 Automatic/manual route summarization
 Faster convergence time than OSPF
 Neighbor discovery before sending routing info
 Partial network topology for loop avoidance
 Lower resources than OSPF
 Maintains multiple paths to same network (load balancing):
Unequal and Equal-cost (v2)
 Multiprotocol
 External Routing: ISPs
o External Gateway Protocol (EGP)
 BGP
 Only concerned with delivering data to an ISP’s connected
organization (AS)
 Routing tables consist of AS #’s and next hop required to get to
them
 Protocols by IP version
o IPv4
 Distance Vector
 RIPv2
 EIGRP
 Link-state
 OSPFv2
 IS-IS
 Path Vector
 BGP-4
o IPv6
 Distance Vector
 RIPng
 EIGRP for IPv6
 Link-state
 OSPFv3
 IS-IS for IPv6
 Path Vector
 BGP-MP
 Load Balancing
o Equal cost load balancing: routing table uses different exit interface to forward
packets on each equal cost paths
o Automatically implemented by dynamic routing protocols
 Best Path Determination
o Path Algorithms
 Distance Vector
 Entire table is updated periodically
 Slower convergence and greater potential for routing loops (which
occur from differing entries in routing table)
 Routers send entire routing table to their neighbor routers and
each router communicates only with its neighbors
o Minimize routing loops with methods:
 Split Horizon: Routers do not report info back to
router from which info originated
 Split Horizon with Poison Reverse: Reports
upstream networks as unreachable (hop count of
16) back up the path Faster convergence with split
horizon, with the drawback of more network traffic
since the entire table is broadcast each time an
update is sent
 Prevent count-to-infinity
 Triggered Updates: Routers broadcast topology
changes immediately without waiting for nest
update info, reducing convergence time
 Hold-downs: Routers hold updates that reinstates
an expired link for a time period that reflects
convergence on network, the hold-down timer
resets when it runs out or when a network change
occurs
 Easy configuration
 No global view of networks; maintains info and sends updates to
neighbors only
o Send entire routing table at regular intervals
o Tables are modified based on info received from neighbors
 Trustworthiness is rated by administrative distance
 Link-state
 Table is updated incrementally with changes
 Faster convergence and efficiency than DV protocols, not
susceptible to routing loops and less susceptible to erroneous info
(all firsthand)
 Scalable, better for larger networks
 Demanding on resources, harder configuration
o Maintain link-state database, an entire map of the network
(routers, network numbers, path)
o Routing table is different from LSDB; aren’t periodically
advertised.
o Routers
 Broadcast LSPs (link-state packets) to build tables
 Use hello packets to discover neighboring routers
 Exchange LSAs (link-state advertisements) to
construct a topological database
 Shortest path first (SPF) algorithm applies
to create an SPF tree that is used to build a
table of routing paths and associated ports
o Higher traffic to build routing tables (preferable to
maintaining!)
o Trustworthiness is rated by administrative distance
Routing Configuration Issues
 Overlapping routes
o Occurs when destination address in a packet the router receives matches more
than one of the routes within that router’s routing table
o A byproduct of poor network design, route summarization, incorrect static routes
 ACL issues
o If not configured correctly, ACLs can incorrectly limit legit traffic between
routers
 First rule in ACL that matches a packet is applied; remainder rules are
ignored
 Last rule in ACL is implicit deny- should no rules match a given packet,
the packet is dropped by default
 ACLs are bidirectional; determine which rules are applied in what
direction

Layer 2 issues
<int> is up, line protocol is down
 Mismatch in encapsulation type or other data link connection parameters
Layer 1 issues
<int is down, line protocol is down>
Layer 3 issues
<int is up, line protocol is up> but ping fails
Layer 7 issues
All other indicators work but inability to establish telnet/ssh session (by itself, the two
application protocols wouldn’t identify the layer the problem exists at)

When you troubleshoot, you generally go up the OSI model, from layer 1 to layer 7

Traffic bounces between interface address A and interface address B -> loop exists between the
2 routers

 Ping host you’re trying to contact


o Access another computer and ping the destination host. If the ping succeeds,
troubleshoot the local host configuration or physical connection
o It wouldn’t be a bad idea if ping fails, ping closest hop and continue further out
 Ping another host on the same remote network as the one you’re trying to contact
o If successful, the issue is with the remote host- misconfiguration, broken link..
 Ping a host on a different remote network (several others)
o If pings succeed, the issue lies with the routing path between your network and
the specific remote network
 Use traceroute
 First hop in output: default gateway router
 Second hop in output: verifies local router is connected to ISP
router
 Ping the default gateway
o If successful but you are still unable to contact the remote host, verify the router
configuration and check for broken links to the remote network, interfaces that
have shut down, access control lists or other controls that may block traffic
 Ping hosts on local network
o If successful, check default gateway router
o If fail, local host or connection to network is the issue. Check physical
connectivity, TCP/IP configuration
 ping 127.0.0.1 for IP stack verification BUT NOT physical connectivity
can succeed even if host is disconnected from network
2.1 Configure and verify VLANs (normal range) spanning multiple switchesw
2.1.a Access ports (data and voice)
2.1.b Default VLAN
2.1.c Connectivity
2.2 Configure and verify interswitch connectivity
2.2.b 802.1Q

SUMMARY: Write 4 or more sentences describing specific learning from these notes.
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________

You might also like