« Home « Kết quả tìm kiếm

CCNP Quick Reference


Tóm tắt Xem thử

- Quick Reference.
- Core layer—The backbone that provides a high-speed path between distribution elements..
- The newer Cisco model—the Enterprise Composite Model—is significantly more complex and attempts to address the shortcomings of the Hierarchical Design Model by expanding the older version and making specific recommendations about how and where certain network functions should be implemented.
- Enterprise Edge—The portion of the enterprise network connected to the larger world..
- Service Provider Edge—The different public networks that are attached.
- Campus Backbone—The core of the LAN.
- The AD is the metric from the neighbor to the network.
- FD is the metric from this router, through the neighbor, to the network..
- BW min is the minimum bandwidth along the path—the choke point bandwidth..
- The sum of the delays (in tens of microseconds) is used in the equation..
- Bandwidth is the largest contributor to the metric.
- Figure 2-3, in the.
- Each router keeps the complete set of LSAs in a table—the Link State Database (LSDB)..
- The meaning of the keywords of this command are:.
- Maximum-number—The threshold.
- Reset-time minutes—The length of time to stay in the ignore state..
- Advertises routes in another O E1—The metric routing domain.
- O E2—The metric does not increase (default)..
- Advertises O N1—The metric routes in another routing domain.
- O N2—The metric does not increase (default)..
- Contains the type of LSU requested and the ID of the router requesting it..
- Full state—The LSDB has been synchronized with the adjacent neighbor..
- For this reason, a single IP address is designated as the “name” of the router—the RID..
- resources of the routers.
- Areas of the network under different administrative control (“layer 8”.
- map to the redistribution.
- The router has already been configured with two access lists, numbered 23 and 103 (not shown.) The first route map state- ment, with sequence number 10, is a permit statement.
- looking at the administrative distance (AD) value assigned to the routing process.
- Dynamic—The IP address is assigned for a limited amount of time or until the client releases it..
- The router changes the destination address of the packet to the unicast address of the server.
- The router sends the unicast packet to the server..
- The server responds with the IP address and other parameters, such as the default gateway assigned to the client..
- Routing table—This is a list of the paths to each network used by the router, and the next hop for each network.
- The next hop for a route received from an EBGP neighbor is the IP address of the neighbor that sent the update..
- The next-hop IP address is the IP address of an edge router belonging to the next-hop autonomous system.
- The network does not have to be connected to the router.
- OpenConfirm—Router has received a reply to the open message..
- Next hop The IP address of the next-hop router..
- A source tree is identified by (S,G) where S is the IP address of the server and G is the group multicast address.
- Include mode—The receiver lists the group or groups to which it will belong and the servers it will use..
- Exclude mode—The receiver lists the group or groups to which it will belong and the servers it will not use..
- show ip mroute—This shows the contents of the multicast routing table.
- IPv6 addresses are composed of the following elements (see Figure 8-1):.
- Length—The length of the data in the packet..
- Core—The backbone that provides a high-speed path between distribution elements..
- The newer Cisco model—the Enterprise Composite Model—is significantly more complex and attempts to address the major shortcoming of the Hierarchical Design Model by expanding the older version and making specific recommendations about how and where certain network functions should be implemented.
- Enterprise Campus—The portion of the design that is like the old hiearchical model..
- Enterprise Edge—The connections to the public network..
- Service Provider Edge—The different public networks that are attached..
- Campus Backbone—The center of the network, like the old “core”..
- show running-config interface interface-num—Use the following to verify the VLAN membership of the port:.
- Access—The port is a user port in a single VLAN..
- Trunk—The port negotiates trunking with the port on the other end of the link..
- Non-negotiate—The port is a trunk and does not do DTP negotiation with the other side of the link..
- Dynamic Desirable—Actively negotiates trunking with the other side of the link.
- Mappings are local to the switch.
- Start with the most basic assumptions and work your way “up” the OSI model.
- Are both sides of the link in the correct trunking mode?.
- Server—The default VTP role.
- Spanning Tree.
- It selects path according to the following criteria:.
- Lowest path cost to the root 3.
- Path cost—This is the cumulative value of the cost of each link between the bridge and the root.
- the port that leads back to the root.
- Switch C—The connected link has a cost of 100 (Ethernet), the link through B has a path cost of 38 (two 100 Mbps links), and so B is chosen..
- Switch D—The link through B has a path cost of 119, the path cost through C to A is 119, the path through C then B is 57, so C is chosen..
- Switch E—The lowest path cost is the same for both ports (76 through D to C to B to A).
- Some of the fields in the BPDU include:.
- Root bridge ID—The BID of the current root..
- Sender’s root path cost—The cost to the root..
- Sender’s port ID—The port number, transmitted as final tie-breaker..
- Root port—The best path to the root (same as STP)..
- Alternate port—A backup to the root port..
- Backup port—A backup to the designated port..
- A logical interface—the Port Channel interface—is created.
- None of the bundle ports can be a SPAN port..
- Then, at each port that is part of the EtherChannel, use the following:.
- On—The port channels without using PAgP negotiation.
- Desirable—Port actively negotiates channeling status with the interface on the other end of the link.
- Active—Port actively negotiates channeling with the port on the other end of the link.
- It also uses probes, which must be acknowledged by the device on the other end of the link.
- Unidirectional link failure—The link is up but data flows only in one direction.
- A router on a stick attaches the router to the switch using a trunk line (ISL or 802.1Q).
- IP Address.
- Learn—The router does not know the virtual IP address and is waiting to hear from the active router..
- Listen—The router knows the IP and MAC of the virtual router, but it is not the active or standby router..
- Speak—Router sends periodic HSRP hellos and participates in the election of the active router..
- Active—Router forwards packets on behalf of the virtual router..
- Routers in the same VRRP group must belong to the same subnet/VLAN.
- DFS and TMC are part of the 802.11h.
- WPA2—The Wi-Fi Alliance’s implementation of the 802.11i standard, which specifies the use of Advanced Encryption Standard (AES) for data encryption and uses 802.1x authentication methods.
- (However, Layer 2 operation has been deprecated by Cisco.) The controller can be either in the same broadcast domain and IP subnet or in a different broadcast domain and IP subnets for Layer 3 operation.
- Gain—The energy an antenna adds to the RF signal..
- Polarization—The physical orientation the RF element.
- Effective Isotropic Radiated Power (EIRP)—The AP radio’s effective transmission power.
- The client connects to the port.
- control auto interface of the switch..
- Physically secure access to the device..
- Integrated applications—The network is application aware, enhanc- ing the efficiency of applications.
- Campus—The enterprise core, or headquarters

Xem thử không khả dụng, vui lòng xem tại trang nguồn
hoặc xem Tóm tắt