Showing posts with label CCNA. Show all posts
Showing posts with label CCNA. Show all posts

Basic CCNA Interview Questions AND Answers

What is Routing?
Routing is the process of selecting best paths in a network and forward data from source to destination through it. Routing is usually performed by a dedicated device called a router.

What is Protocol?
A 'protocol' is a set of invisible computer rules that enable two devices to connect and transmit data to one another. Protocols determine how data are transmitted between computing devices and over networks.

Explain difference between Router, Switch and Hub?
Hubs, switches, and routers are all computer networking devices with varying capabilities. Let's look in detail
      Hub
A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple – anything that comes in one port is sent out to the others. Hub has single collision domain and single broadcast domain
      Switch
Switch is a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. Switches have multiple collision domains and have a single broadcast domain
      Router
Router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers won't forward broadcast. If a router is present in a network, we may have at least TWO broadcast domains.

Explain broadcast and collision domain?
A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.
            A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters

What is the size of IP Address?
32 bit for IPv4 and 128 bit for IPv6

IEEE standard for wireless networking?
IEEE 802.11

What is the range of class A address?
Class A Range from 1.0.0.1 to 126.255.255.254 and Supports 16 million hosts on each of 127 networks.

What is the range of class B address?
Class B range from 128.1.0.1 to 191.255.255.254 and Supports 65,000 hosts on each of 16,000 networks.

What is the range of class C address?
Class C range is from 192.0.1.1 to 223.255.254.254 and Supports 254 hosts on each of 2 million networks.

What is PoE (Power over Ethernet)?
Power over Ethernet or PoE describes the technology which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras.

What is a peer-peer process?
A peer-to-peer (P2P) network is a type of decentralized and distributed network architecture in which individual nodes in the network (called "peers") act as both suppliers and consumers of resources. There will be no centralized system we usually seen like Client server model. Simply in p2p, network devices act as both client and server

What is ping? Why you use ping?
Ping [Packet Internet Groper PING] a computer network tool used to test whether a particular host is reachable across an IP network

What is the difference between tracert and traceroute
Both Tracert and traceroute commands do similar purpose. On a router or switch you would use the command traceroute and on a pc you would use tracert .

What is Round Trip Time?
Round-trip time (RTT), also called round-trip delay, is the time required for a packet to travel from a specific source to a specific destination and back again.Source is the computer sending the packet and the destination is a remote computer or system that receives the packet and retransmits it. A user can determine the RTT to and from an IP address by pinging that address

Define the terms Unicast, Multicast and Broadcast and Anycast?
Unicast – One to One communication                    Eg: http
Multicast – One to a group Communication          Eg: SLP
Broadcasting – One to All communication            Eg: ARP
Anycast – One to nearest Communication             Eg : 6to4

Where do we use cross and standard cable?
To connect same group device use Cross Cable
To connect different group device use Straight Cable
For Example:
To connect one PC to another PC use Cross Cable
To connect one comp to switch OR one switch to router use straight cable

What are the differences between static ip addressing and dynamic ip addressing?
Dynamic IP addresses can change each time you connect to the Internet, while static IP addresses are reserved for you statically and don't change over time. In short, Dynamic IP addresses are provided by DHCP server and static IP addresses are given manually

Difference between CSMA/CD and CSMA/CA?
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) is a media access control method used in local area networking using early Ethernet technology to overcome collision when it happened while Carrier sense multiple access with collision avoidance (CSMA/CA) is used in wireless network to avoid collision

What is DHCP scope?
A Dynamic Host Configuration Protocol (DHCP) scope is the consecutive range of possible IP addresses that the DHCP server can lease to clients on a subnet.

What is Checksum?
A simple error-detection scheme in which each transmitted message is accompanied by a numerical value based on the number of set bits in the message. The receiving station then applies the same formula to the message and checks to make sure the accompanying numerical value is the same. If not, the receiver can assume that the message has been garbled.

What is Redundancy?
Network redundancy is a method which provide a back up for the primary device or route and thereby ensuring network will be available even the primary device or route become failed or unavailable

What are the different memories used in a CISCO router?

ROM
ROM is read-only memory available on a router's processor board. The initial bootstrap software that runs on a Cisco router is usually stored in ROM. ROM also maintains instructions for Power-on Self Test (POST) diagnostics.

Flash Memory
Flash memory is an Electronically Erasable and Re-Programmable memory chip. The Flash memory contains the full Operating System Image (IOS, Internetwork Operating System).Flash memory retains content when router is powered down or restarted.

RAM
RAM is very fast memory that loses its information when the router is shutdown or restarted. On a router, RAM is used to hold running Cisco IOS Operating System, IOS system tables and buffers RAM is also used to store routing tables,RAM Provides temporary memory for the router configuration file of the router while the router is powered on.

RAM Stores running Cisco IOS Operating System, Active program and operating system instructions, the Running Configuration File, ARP (Address Resolution Protocol) cache, routing tables and buffered IP Packets.

NVRAM (Non-volatile Random Access Memory)
NVRAM is used to store the Startup Configuration File. This is the configuration file that IOS reads when the router boots up. It is extremely fast memory and retains its content when the router is restarted.

What are the different types of passwords used in securing a CISCO router?
Here are the five passwords you can set on a Cisco router:
·        Console
·        Aux
·        VTY
·        Enable password
·        Enable Secret

What is the use of "Service Password Encryption"?
"Service Password Encryption" command allows you to encrypt all passwords(including clear text) on your router so they cannot be viewed from your running-config

Define and explain the five conversion steps of data encapsulation.
Data encapsulation is a process that makes use of the layered model concept in that each layer depends on the layer above and below relative to OSI. The lower layer uses encapsulation to put the data from the upper layer into its own encapsulated data field i.e., the information in a protocol is wrapped, or contained, in the data section of another protocol.
In the process of encapsulation, header information is added to the data from the above layer.
The five steps of conversion are
Step
Action
Layers Involved
Keyword
Step 1
Alphanumeric input from user converted into Data
Application/Presentation/Session
DATA
Step 2
Data converted into segments
Transport
SEGMENTS
Step 3
Segments converted into Packets or Datagrams and Network Header is added
Network
PACKETS
Step 4
Packets or Datagrams are built into Frames
Data Link
FRAMES
Step 5
Frames are converted into bits( 1s and 0s) for transmission
Physical
BITS

In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
#erase startup-config

      Which command is used to copy the configuration from RAM to NVRAM
      #Copy running-config startup-config

Differentiate Logical Topology from Physical Topology?
Physical topology is the network what we can see and Logical topology is the network which data packets are send from source to destination 

What is AS (Autonomous System)?
An autonomous system (AS) can be said as either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division). An autonomous system is also sometimes referred to as a routing domain. An autonomous system is assigned a globally unique number, sometimes called an Autonomous System Number (ASN).

What is the difference between Private IP and Public IP?
Public IP is used across internet and Private IPs are used within the local LAN

Explain different cable types?
Straight cable – To connect different group devices (Switch – Router)
Cross Cable - To connect same group device (PC –PC, SwitchSwitch)
Rollover cable – To connect Console port to Computer

How does RIP differ from EIGRP?
      The major difference between both is that EIGRP is Cisco propriety and RIP is open standard
Some internal differences between them are:
·        AD value of Rip is 120 and AD value for EIGRP is 90 internal / 170 external.
·        RIP uses Bellmen ford algorithm to calculate the path while Eigrp use Dual method to calculate the routes paths
·        Maximum hop count for RIP is 15 that is after 15 counts the packet is dropped while that of EIGRP is 100 by default and upto 255 by configuration.
·        RIP(ver 1) is classfull protocol where as EIGRP is classless protocol
·        In RIP full routing table exchanged, but in EIGRP missing routes are exchanged
·        For RIP protocol, hello timers every 30 seconds but in EIGRP hello timer every 5 seconds
·        RIP v1 sends updates as broadcast while EIGRP send updates as Multicast
·        EIGRP uses an Autonomous number to determine which domain it belongs to which is not the case with RIP protocols.
·        RIP is mostly used for smaller networks which EIGRP is used for larger networks.
·        RIP is a distance vector routing protocol while EIGRP is an hybrid routing protocol.
·        RIP sends full update whenever network change occurs whereas EIGRP sends triggered updates

Differentiate User Mode from Privileged Mode
Privileged mode has access to the entire router or switch configuration. User EXEC mode only has limited options. Specifically, to do any configuration changes, you need to enter privileged mode first.User EXEC mode is used mainly for running show commands and to collect details

What is 100BaseFX?
100BaseFX is a version of Fast Ethernet that is often used for wiring campus backbones.

Differentiate full-duplex from half-duplex?
Full-duplex means that communication can occur in both directions at the same time. Half-duplex means communication can only occur in one direction at a time

What does the "show protocol" display?
      To display the configured protocols, use the show protocols command in user EXEC or privileged EXEC mode.
#show protocols [interface-name interface-number]

If you find any mistake in this post feel free to write to shabeeribm@gmail.com
Read More...

CCNA (200-120) Quick notes before exam

I prepared this notes after passing my CCNA 200-120.This last minute quick notes are only intended to refresh your knowledge. Make sure you know everything mentioned here before attending the CCNA 200-120 exam.For complete and detailed CCNA notes click here

Points to Remember
  • By default router can break up broadcast domains.You need vlans in switches to break broadcast domains
  • Both router and switch can break up collision domains
  • Routing occur in internet layer in DOD TCP/IP reference model
  • PPP perform in layer 2
  • FTP belongs to Application layer
  • When Global command that is set once and affects the entire router
  • LCP PPP sub protocol negotiates authentication options
  • PPP and DSL are valid WAN connectivity methods
  • Rapid Spanning Tree Protocol, an enhancement to Spanning Tree Protocol is used to prevent loops
  • When using the term “frame” we can easily recognize it belongs to the Data Link layer
  • When using the term “Packet” we can easily recognize it belongs to the Network layer
  • Show version command reveals the last method used to powercycle a router
  • show ip interface command is used to verify which interfaces are affected by the ACL
  • Both routers must use the same password for CHAP to authentication 

Basic notes
To check the connectivity between a host and a destination (through some networks) we can use both “tracert” and “ping” commands. But the difference between these 2 commands is the “tracert” command can display a list of near-side router interfaces in the path between the source and the destination. The “traceroute” command has the same function of the “tracert” command but it is used on Cisco routers only, not on a PC 

When powered on, the router first checks its hardware via Power-On Self Test (POST). Then it checks the configuration register to identify where to load the IOS image from. In the output above we learn that the Configuration register value is 0×2102 so the router will try to boot the system image from Flash memory first.

The last known good router will try to inform you that the destination cannot be reached (with a Destination Unreachable message type) so from that information you can learn how far your packets can travel to and where the problem is.

Each interface on a router must be in a different network. If two interfaces are in the same network, the router will not accept it and show error when the administrator assigns it.
When no startup configuration file is found in NVRAM, the System Configuration Dialog will appear to ask if we want to enter the initial configuration dialog or not.

Ping command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN

Organizational Unique Identifier (OUI) is the first 24 bits of a MAC address for a network device, which indicates the specific vendor for that device as assigned by the Institute of Electrical and Electronics Engineers, Incorporated (IEEE). This identifier uniquely identifies a vendor, manufacturer, or an organization.

The Maximum Transmission Unit (MTU) defines the maximum Layer 3 packet (in bytes) that the layer can pass onwards.

Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD. CSMA/CD is only used in old switches

The Network layer is responsible for network addressing and routing through the internetwork. So a ping fails, you may have an issue with the Network layer.
Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

 The transport layer divides a data stream into segments and may add reliability and flow control information. 

Application layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication

When upgrading new version of the IOS we need to copy the IOS to the Flash so first we have to check if the Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we should check the available RAM too. We can check both with the “show version” command.

When will devices transmit in a Ethernet network ?
Ethernet network is a shared environment so all devices have the right to access to the medium. If more than one device transmits simultaneously, the signals collide and cannot reach the destination. If a device detects another device is sending, it will wait for a specified amount of time before attempting to transmit. When there is no traffic detected, a device will transmit its message. While this transmission is occurring, the device continues to listen for traffic or collisions on the LAN. After the message is sent, the device returns to its default listening mode.

Two purposes does the Ethernet protocol use physical addresses
Physical addresses or MAC addresses are used to identify devices at layer 2
To allow communication between different devices on the same network

The following locations can be configured as a source for the IOS image:
Flash (the default location)
TFTP server
ROM (used if no other source is found)

What is the difference between a CSU/DSU and a modem?
A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a router to a phone line.

Router boot process:
The Power-On Self Test (POST) checks the router’s hardware. When the POST completes successfully, the System OK LED indicator comes on.
The router checks the configuration register to identify where to load the IOS image from. A setting of 0×2102 means that the router will use information in the startup-config file to locate the IOS image. If the startup-config file is missing or does not specify a location, it will check the following locations for the IOS image:
1. Flash (the default location)
2. TFTP server
3. ROM (used if no other source is found)

Basic IOS notes
service password-encryption command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file.

How to secure the virtual terminal interfaces on a router?
Configure a virtual terminal password and login process.
Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Commands
Router(config)# service password-encryption command encrypts all plaintext passwords.

Router (config-if)# ppp authentication chap pap command is used to enable CHAP authentication with PAP as the fallback method on a serial interface 

Router#show vlan command only displays access ports, the trunk ports are not showed in this command

"Show frame-relay lmi” command allows you to verify the encapsulation type (CISCO or IETF) for a frame relay link

 show ip ospf database -  command is used to display the collection of OSPF link states

 Below lists popular modes in Cisco switch/router:
Router>
User mode
Router#
Privileged mode
Router(config)#
Configuration mode
Router(config-if)#
Interface level (within configuration mode)
Router(config-router)#
Routing engine level (within configuration mode)
Router(config-line)#
Line level (vty, tty, async) within configuration mode

Trunking Notes:
Valid Vlan Trunk Modes
Desirable
Auto
ON

Dynamic Trunking Protocol (DTP) is a Cisco proprietary protocol for negotiating trunking on a link between two devices and for negotiating the type of trunking encapsulation (802.1Q) to be used.

IEEE 802.1Q is the networking standard that supports Virtual LANs (VLANs) on an Ethernet network. It is a protocol that allows VLANs to communicate with one another using a router. 802.1Q trunks support tagged and untagged frames.If a switch receives untagged frames on a trunk port, it believes that frame is a part of the native VLAN. Also, frames from a native VLAN are not tagged when exiting the switch via a trunk port.

Three elements must be used when you configure a router interface for vlan trunking? 
one IP network or subnetwork for each subinterface 
subinterface encapsulation identifiers that match vlan tags
one subinterface per vlan

Cisco switches support two trunking protocols 802.1q & ISL. 802.1q is an open standard and is thus compatible between most vendors’ equipment while Inter-Switch Link (ISL) is Cisco proprietary.

Click here for detailed VTP notes

STP Notes

Only non-root bridge can have root port. 

The path cost to the root bridge is the most important value to determine which port will become the root port on each non-root switch. In particular, the port with lowest cost to the root bridge will become root port (on non-root switch).

Per VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN configured in the network. It means a switch can be the root bridge of a VLAN while another switch can be the root bridge of other VLANs in a common topology. For example, Switch 1 can be the root bridge for Voice data while Switch 2 can be the root bridge for Video data. If designed correctly, it can optimize the network traffic.

If we connect two switches via 2 or more links and do not enable STP on these switches then a loop (which creates multiple copies of the same unicast frame) will occur. It is an example of an improperly implemented redundant topology.

PVST+ is based on IEEE802.1D Spanning Tree Protocol (STP). But PVST+ has only 3 port states (discarding, learning and forwarding) while STP has 5 port states (blocking, listening, learning, forwarding and disabled). So discarding is a new port state in PVST+.

RSTP only has 3 port states that are discarding, learning and forwarding. When RSTP has converged there are only 2 port states left: discarding and forwarding

A BPDU is superior than another if it has:
1. A lower Root Bridge ID
2. A lower path cost to the Root
3. A lower Sending Bridge ID
4. A lower Sending Port ID

Click here for detailed STP Notes

ACL  Notes
The standard access lists are ranged from 1 to 99 and from 1300 to 1999 

We can have only 1 access list per protocol, per direction and per interface. It means:
We can not have 2 inbound access lists on an interface
We can have 1 inbound and 1 outbound access list on an interface

We can use a dynamic access list to authenticate a remote user with a specific username and password. The authentication process is done by the router or a central access server such as a TACACS+ or RADIUS server.

Click here for detailed ACL notes

NAT Notes
With static NAT, translations exist in the NAT translation table as soon as you configure static NAT command(s), and they remain in the translation table until you delete the static NAT command(s).Because static NAT translations are always present in the NAT table so outside hosts can initiate the connection without being dropped

With dynamic NAT, translations do not exist in the NAT table until the router receives traffic that requires translation. Dynamic translations have a timeout period after which they are purged from the translation table.

By not reveal the internal Ip addresses, NAT adds some security to the inside network

By allocating specific public IP addresses to inside hosts, NAT eliminates the need to re-address the inside hosts

VLAN Notes
A “native VLAN mismatch” error will appear by CDP if there is a native VLAN mismatch on an 802.1Q link. “VLAN mismatch” can cause traffic from one vlan to leak into another vlan.

VLANs allow to group users by function, not by location or geography
VLANs help minimize the incorrect configuration of VLANs so it enhances the security of the network

VLANs increase the number of broadcast domains while decreasing the size of the broadcast domains which increase the utilization of the links. It is also a big advantage of VLAN

Advantages of VLANs
VLANs establish broadcast domains in switched networks.
VLANs allow access to network services based on department, not physical location.
VLANs can greatly simplify adding, moving, or changing hosts on the network.

For 802.1q encapsulation, the native VLAN must matched at both side; otherwise the link will not work.

VLAN 1 is the default VLAN on Cisco switch. It always exists and can not be added, modified or removed.
VLANs 1002-1005 are default VLANs for FDDI & Token Ring and they can’t be deleted or used for Ethernet.

Click here for detailed VLAN notes

Frame Relay Notes
To configure subinterface for Frame Relay, first we have to remove the IP address from the physical interface and choose a Frame Relay encapsulation.

The PVC STATUS displays the status of the PVC. The DCE device creates and sends the report to the DTE devices. There are 4 statuses:
ACTIVE: the PVC is operational and can transmit data
 INACTIVE: the connection from the local router to the switch is working, but the connection to the remote router is not available
DELETED: the PVC is not present and no LMI information is being received from the Frame Relay switch
STATIC: the Local Management Interface (LMI) mechanism on the interface is disabled (by using the “no keepalive” command). This status is rarely seen so it is ignored in some books.

DLCI: DLCI stands for Data Link Connection Identifier. DLCI values are used on Frame Relay interfaces to distinguish between different virtual circuits. DLCIs have local significance because the identifier references the point between the local router and the local Frame Relay switch to which the DLCI is connected.

Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the Frame Relay switch. Frames that are sent in excess of the CIR are marked as discard eligible (DE) which means they can be dropped if the congestion occurs within the Frame Relay network.
Note: In the Frame Relay frame format, there is a bit called Discard eligible (DE) bit that is used to identify frames that are first to be dropped when the CIR is exceeded.

Local Management Interface (LMI) is a signalling standard protocol used between your router (DTE) and the first Frame Relay switch

Inverse ARP is a technique by which dynamic mappings are constructed in a network, allowing a device such as a router to locate the logical network address and associate it with a permanent virtual circuit (PVC).

IP Routing Notes
When one route is advertised by more than one routing protocol, the router will choose to use the routing protocol which has lowest Administrative Distance. 
Routers decrement the TTL by 1 every time they forward a packet; if a router decrements the TTL to 0, it throws away the packet. This prevents packets from rotating forever

Remember these rules:
The IP addresses (of source and destination) of a packet never change during the transportation through the network. For example if PC-A wants to send a packet to PC-Z then the source and destination IP addresses of the packet will be the IP addresses of PC-A and PC-Z no matter how many devices they go through.
The MAC addresses, conversely, will change while passing the devices. The source MAC address is the address of the last sender and the destination MAC address is the address of the next device.

The simple syntax of static route:
ip route destination-network-address subnet-mask {next-hop-IP-address | exit-interface}

Explanation
destination-network-address: destination network address of the remote network
subnet mask: subnet mask of the destination network
next-hop-IP-address: the IP address of the receiving interface on the next-hop router
exit-interface: the local interface of this router where the packets will go out

DHCP Notes
Network or sub network IP address and broadcast address should never be assignable to hosts. When try to assign these addresses to hosts, you will receive an error message saying that they can’t be assignable.

An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

OSPF Notes
The highest IP address of all loopback interfaces will be chosen as Router-ID
110 is the default administrative distance of OSPF

The default number of equal-cost paths that can be placed into the routing of a Cisco OSPF router is 4. We can change this default value by using “maximum-paths” command:
Router(config-router)#maximum-paths 2
Note: Cisco routers support up to 6 equal-cost paths

Characteristics of a link-state routing protocol
Provides common view of entire topology
Calculates shortest path
Utilizes event-triggered updates

Describe the routing protocol OSPF
It supports VLSM.
It confines network instability to one area of the network.
It allows extensive control of routing updates

Hierarchical design of OSPF (basically means that you can separate the larger internetwork into smaller internetworks called areas) helps us create a network with all features listed like (decrease routing overhead, speed up convergence; confine network instability to single areas of the network).

Hello packets and LSAs from other routers are used by router running a link-state protocol to build and maintain its topological database

To form an adjacency (become neighbour), router A & B must have the same Hello interval, Dead interval and AREA number.

Click here for detailed OSPF notes

EIGRP Notes

Make sure you know how to configure and troubleshoot EIGRP.
  • AD of EIGRP Internal Route is 90
  • AD of EIGRP external Route is 170
  • AD of EIGRP summary Route is 5
Passive Interface: In EIGRP (and OSPF) the passive interface command stops sending outgoing hello packets, hence the router cannot form any neighbor relationship via the passive interface. This behavior stops both outgoing and incoming routing updates
Feasible successor is a route whose Advertised Distance is less than the Feasible Distance of the current best path. A feasible successor is a backup route, which is not stored in the routing table but stored in the topology table.
EIGRP stub advertises summary and directly connected routes. EIGRP stub routing feature improves network stability, reduce resources utilization and simplifies stub router configuration. Any neighbor that receives a packet informing it of the stub status will not query the stub router for any routes.EIGRP stub configuration command increases scalability by limiting the
EIGRP query range
Active State: When a route (current successor) goes down, the router first checks its topology table for a feasible successor but it can’t find one. So it goes active on the that route to find a new successor by sending queries out to its neighbors requesting a path to the lost route.
Click here for detailed EIGRP Notes
Security Notes
We only enable PortFast feature on access ports (ports connected to end stations). But if someone does not know he can accidentally plug that port to another switch and a loop may occur when BPDUs are being transmitted and received on these ports.
With BPDU Guard, when a PortFast receives a BPDU, it will be shut down to prevent a loop

We can verify whether port security has been configured by using the “show running-config” or “show port-security interface” for more detail

Port security is only used on access port (which connects to hosts) so we need to set that port to “access” mode, then we need to specify the maximum number of hosts which are allowed to connect to this port.
Note: If we want to allow a fixed MAC address to connect, use the “switchport port-security mac-address ” command.

One of the most widely deployed network security technologies today is IPsec over VPNs. It provides high levels of security through encryption and authentication, protecting data from unauthorized access.

IPV6 Notes
Features of the IPv6 protocol
Autoconfiguration
No broadcasts
Plug-and-play
A single interface may be assigned multiple IPV6 addresses of any type.
Every IPV6 interface contains at least one loopback address.

With IPv6, devices can build a link-local address automatically. But notice this address is only used for communications within the local subnetwork, routers do not forward these addresses.
Below is the list of common kinds of IPv6 addresses:
Loopback address
::1
Link-local address
FE80::/10
Site-local address
FEC0::/10
Global address
2000::/3
Multicast address
FF00::/8

Click here for Detailed IPv6 notes

SNMP protocol can cause overload on a CPU of a managed device
TRAP and INFORM are the alert message generated by SNMP agents
In a GLBP network, AVG is responsible for the arp request

Components of SNMP
MIB
SNMP Manager
SNMP Agent

3 features are added in SNMPv3 over SNMPv2
Message Integrity
Authentication
Encryption 

Popular destinations for syslog messages to be saved
The logging buffer .RAM
The console terminal
Syslog server

The benefit of using Netflow
Network, Application & User Monitoring
Security Analysis
Accounting/Billing

3 things that the Netflow uses to consider the traffic to be in a same flow
IP address
Port numbers
L3 protocol type
Read More...

Quick reminder about HSRP

In this article we will discuss about brief about HSRP 
Quick reminder about HSRP
  • Hot Standby Router Protocol (HSRP) is a Cisco proprietary protocol.
  • With HSRP, two or more devices support a virtual router with a fictitious MAC address and unique IP address
  • Hosts use this IP address as their default gateway and the MAC address for the Layer 2 header
  • The virtual router’s MAC address is 0000.0c07.ACxx , in which xx is the HSRP group. Multiple groups (virtual routers) are allowed.
  • The Active router forwards traffic. The Standby router is backup and monitors periodic hellos (multicast to 224.0.0.2,
  • UDP port 1985) to detect a failure of the active router.
  • The active router is chosen because it has the highest HSRP priority (default priority is 100). In case of a tie, the router
  • with the highest configured IP address wins the election
  • A new router with a higher priority does not cause an election unless it is configured to preempt.

HSRP States
  • Initial: HSRP is not running.
  • Learn: The router does not know the virtual IP address and is waiting to hear from the active router.
  • Listen: The router knows the IP and MAC of the virtual router, but it is not the active or standby router.
  • Speak: Router sends periodic HSRP hellos and participates in the election of the active router.
  • Standby: Router monitors hellos from active router and assumes responsibility if active router fails.
  • Active: Router forwards packets on behalf of the virtual router.

Read More...