A P P E N D I X

A

Answers to the “Do I Know This

Already?” Quizzes and Q&A

Sections

Answers to the Chapter 2 “Do I Know This Already?”

Quiz

1

What are the two different names for the router’s mode of operation that, when

accessed, enables you to issue commands that could be disruptive to router

operations?

Enable and privileged mode. Both are commonly used and found in Cisco

documentation.

2

What command would you use to receive command help if you knew that a

show

command option begins with a

c

,

but you cannot recall the option?

You would use

show c?

. Help would appear immediately after you typed the

?

symbol. You would not need to press Enter afterward; if you did so, the router would

try to execute the command with only the parameters you had typed after the

?

.

3

After typing

show ip route

, which is the only command you issued since logging in to

the router, you now want to issue the

show ip arp

command. What steps would you

take to execute this command by using command recall keystrokes?

Press the Up-arrow key, Backspace five times, and then type

arp

. The Up-arrow key

retrieves the

show ip route

command. The Backspace key moves the cursor backward

and erases the character. Typing inserts the characters into the line.

4

What is the name of the user interface mode of operation used when you cannot issue

disruptive commands?

User mode.

5

What configuration command causes the router to require a password from a user

at the console? What configuration mode context must you be in—that is, what

command(s) must be typed before this command after entering configuration mode?

List the commands in the order in which they must be typed while in config mode.

line console 0

login

The

line console 0

command is a context-setting command; it adds no information to

the configuration by itself. The command can be typed from any part of configuration

mode. The

login

command, which follows the

line console 0

command, tells the IOS

that a password prompt is desired at the console.

702

Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

6

What does CDP stand for?

Cisco Discovery Protocol. CDP is Cisco proprietary and is not dependent on a particular

Layer 3 protocol to be configured and working.

7

What does the NV stand for in NVRAM?

Nonvolatile. NVRAM is used for storing the startup configuration file used when the

router is brought up. NVRAM is battery-powered if it is really RAM. In some routers,

Cisco has (sneakily) used a small portion of Flash memory for the purpose of NVRAM,

but Cisco would not ask such trivia on the test.

8

Name two commands used to view the configuration that is currently used in a router.

Which one is a more recent addition to the IOS?

write terminal

and

show running-config

. The newer command is

show running-config

and, hopefully, is easier to remember.

9

What two methods could a router administrator use to cause a router to load the IOS

stored in ROM?

Setting the configuration register boot field to binary 0001, or adding

boot system rom

to the configuration file and copying it to the startup configuration file. To set the

configuration register to hex 2101, which would yield binary 0001 in the boot field, the

config-register 0x2101

global configuration command would be used.

10

What is the process used to update the contents of Flash memory so that a new IOS in a

file called c4500-d-mz.120-5.bin, on TFTP server 128.1.1.1, is copied into Flash

memory?

copy tftp flash

. The other details, namely the IP address of the TFTP server and the file

name, are requested via prompts to the user.

11

Two different IOS files are in a router’s Flash memory: one called c2500-j-l.111-3.bin and

one called c2500-j-l.112-14.bin. Which one does the router use when it boots up? How

could you force the other IOS file to be used? Without looking at the router configuration,

what command could be used to discover which file was used for the latest boot of the

router?

The first IOS file listed in the

show flash

command is the one used at reload time, unless

a boot system command is configured. The configuration command

boot system flash

xyz123.bin

would override the order of the files in Flash memory. The

show version

command displays the file name of the IOS for the latest reload of a router. The

show

version

output tells you the version as well as the name of the file that was used at the last

reload. This information is particularly difficult to find in the output of the command;

watch for three lines, separated by empty lines above and below. The IOS file loaded is in

one of those messages.

Answers to the Chapter 2 Q&A Section

703

12

What are the primary purposes of Flash memory in a Cisco router?

To store IOS and microcode files and to allow remote loading of new versions of these

files. In most routers, only an IOS is found. If microcode is upgraded, these files also

reside in Flash memory.

Answers to the Chapter 2 Q&A Section

1

What are the two names for the router’s mode of operation that, when accessed, enables

you to issue commands that could be disruptive to router operations?

Enable mode and privileged mode. Both modes are commonly used and found in Cisco

documentation.

2

What are three methods of logging on to a router?

Console, auxiliary port, and Telnet. All three cause the user to enter user EXEC mode.

3

What is the name of the user interface mode of operation used when you cannot issue

disruptive commands?

User EXEC mode.

4

Can the auxiliary port be used for anything besides remote modem user access to a

router? If so, what other purpose can it serve?

Yes: For direct attachment of a terminal, and dial for the purpose of routing packets.

Although originally created to support remote administration access, many customers use

an auxiliary port for dial backup, particularly when analog lines are desired or when that

is all that is available.

5

How many console ports can be installed on a Cisco 7500 router?

One. This is a purposefully strange question. You do not order the console port; every

router comes with one and only one. So, technically, you do not even order one because it

is implied by ordering the router.

6

What command would you use to receive command help if you knew that a

show

command

option begins with a

c,

but you cannot recall the option?

show c?

. Help would appear immediately after you typed the

?

symbol. You would not

need to press Enter after the

?

. If you did so, the router would try to execute the command

with only the parameters you had typed after the

?

.

704

Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

7

While you are logged in to a router, you issue the command

copy ?

and get a response of

“Unknown command, computer name, or host.” Offer an explanation as to why this error

message appears.

The user was in user mode. The user must be in enable/privileged mode to use the

copy

command. When in user mode, the router does not provide help for privileged commands

and treats the request for help as if there is no such command.

8

Is the number of retrievable commands based on the number of characters in each

command, or is it simply a number of commands, regardless of their size?

Number of commands. The length (that is, number of characters) of each command does

not affect the command history buffer.

9

How can you retrieve a previously used command? (Name two ways.)

Ctrl+p

and Up-arrow. Up-arrow refers literally to the Up arrow key on the keyboard. Not

all terminal emulators support

Ctrl+p

or Up-arrow, so recalling both methods is useful.

10

After typing

show ip route

, which is the only command you typed since logging in to the

router, you now want to issue the

show ip arp

command. What steps would you take to

execute this command by using command recall keystrokes?

Press Up-arrow, Backspace five times, and type

arp

. The Up-arrow key retrieves the

show

ip route

command. Backspace moves the cursor backward and erases the character.

Typing inserts the characters into the line.

11

After typing

show ip route 128.1.1.0

, you now want to issue the command

show ip route

128.1.4.0

. What steps would you take to do so, using command recall and command

editing keystrokes?

Press Up-arrow,

Ctrl+b

(or Left-arrow) twice, and Backspace once, and then type 4. The

Ctrl+b

and Left-arrow keys back up one character in the line, without deleting the

character. Backspace deletes the 1, in this case. Typing inserts into the line.

12

What configuration command causes the router to require a password from a user at the

console? What configuration mode context must you be in—that is, what command(s)

must be typed before this command after entering configuration mode? List the commands

in the order in which they must be typed while in config mode.

line console 0

login

The

line console 0

command is a context-setting command; it adds no information to the

configuration. The command can be typed from any part of configuration mode. The

login

command, which follows the

line console 0

command, tells IOS that a password prompt

is desired at the console.

Answers to the Chapter 2 Q&A Section

705

13

What configuration command is used to tell the router the password that is required at the

console? What configuration mode context must you be in—that is, what command(s)

must you type before this command after entering configuration mode? List the commands

in the order in which they must be typed while in config mode.

line console 0

password xxxxxxx

The

password

command tells the IOS the value that should be typed when a user wants

access from the console. This value is requested by the IOS because of the login

command. The password xxxxxxx must be typed while in console configuration mode,

which is reached by typing line console 0.

14

What are the primary purposes of Flash memory in a Cisco router?

To store IOS and microcode files and to allow remote loading of new versions of these

files. In most routers, only an IOS is found. If microcode is upgraded, the files also reside

in Flash memory.

15

What is the intended purpose of NVRAM memory in a Cisco router?

To store a single configuration file, used at router load time. NVRAM does not support

multiple files.

16

What does the NV stand for in NVRAM?

Nonvolatile. NVRAM is battery powered if it is really RAM. In some routers, Cisco has

(sneakily) used a small portion of Flash memory for the purpose of NVRAM, but Cisco

would not ask such trivia on the test.

17

What is the intended purpose of RAM in a Cisco router?

RAM is used as IOS working memory (storing such things as routing tables or packets)

and for IOS code storage. (In some router models, not all the IOS is copied into RAM.

Some of the IOS is left in Flash memory so that more RAM is available for working

memory.)

18

What is the main purpose of ROM in a Cisco router?

To store a small limited-function IOS and to store bootstrap code. Typically, this IOS is

used only during maintenance or emergencies.

19

What configuration command would be needed to cause a router to use an IOS image

named c2500-j-l.112-14.bin on TFTP server 128.1.1.1 when the router is reloaded? If you

forgot the first parameter of this command, what steps must you take to learn the correct

parameters and add the command to the configuration? (Assume that you are not logged

in to the router when you start.)

boot system tftp 128.1.1.1 c2500-j-l.112-14.bin

706

Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

As for the second part of the question: Log in from con/aux/telnet, type the

enable

command, type the enable password, type the

configure terminal

command, and type

boot ?

. Help appears for the first parameter of the

boot command.

20 What command sets the password that would be required after typing the enable

command? Is that password encrypted by default?

enable password or enable secret. The password in the enable command is not

encrypted by default. The enable secret password is encrypted using MD5.

21 To have the correct syntax, what must you add to the following configuration command:

banner This is Ivan Denisovich’s Gorno Router--Do Not Use

A delimiter character that is not part of the banner is the first parameter, which is followed

by the banner text, which is followed by the delimiter character. For example, the “#” is

the delimiter in the following command:

banner # This is Ivan.... Do Not Use #

22 Name two commands that affect the text used as the command prompt.

hostname and prompt.

23 When using setup mode, you are prompted at the end of the process as to whether you want

to use the configuration parameters you just typed in. Which type of memory is this

configuration stored in if you type yes?

Both NVRAM and RAM. Setup is the only IOS feature that modifies both the active and

the startup configuration files as the result of one action by the user.

24 What two methods could a router administrator use to cause a router to load the IOS

stored in ROM?

Setting the configuration register boot field to binary 0001, or adding boot system rom

to the configuration file and copying it to the startup configuration file. To set the

configuration register to hex 2101, which would yield binary 0001 in the boot field, the

config-register 0x2101 global configuration command would be used.

25 What could a router administrator do to cause a router to load file xyz123.bin from TFTP

server 128.1.1.1 upon the next reload? Is there more than one way to accomplish this?

boot system tftp xyz123.bin 128.1.1.1

This is the only way to make the router load this file from the TFTP server.

26 What is the process used to update the contents of Flash memory so that a new IOS in a

file called c4500-d-mz.120-5.bin on TFTP server 128.1.1.1 is copied into Flash memory?

copy tftp flash. The other details, namely the IP address of the TFTP server and the file

name, are requested via prompts to the user.

Answers to the Chapter 2 Q&A Section 707

27 Name three possible problems that could prevent the command boot system tftp c2500-jl.

112-14.bin 128.1.1.1 from succeeding.

The possible reasons include: 128.1.1.1 is not accessible through the network; there is no

TFTP server on 128.1.1.1; the file is not in the TFTP default directory; the file is

corrupted; a boot command could precede this boot command in the configuration file;

and the IOS referenced in the first boot command would be used instead.

28 Two different IOS files are in a router’s Flash memory: one called c2500-j-l.111-3.bin and

one called c2500-j-l.112-14.bin. Which one does the router use when it boots up? How

could you force the other IOS file to be used? Without looking at the router configuration,

what command could be used to discover which file was used for the latest boot of the

router?

The first IOS file listed in the show flash command is the one used at reload time, unless

a boot system command is configured. The configuration command boot system flash

xyz123.bin would override the order in Flash memory. show version is the command

used to display the file name of the IOS for the latest reload of a router. The show version

output tells you the version, as well as the name of the file that was used at last reload time.

It is particularly difficult to find in the output of the command.

29 What does CDP stand for?

Cisco Discovery Protocol. CDP is proprietary and is not dependent on a particular Layer

3 protocol to be configured and working.

30 On what type of interfaces is CDP enabled by default? (Assume IOS versions 11.0 and

later.)

On all interfaces that support SNAP headers. These include LANs, Frame Relay, and

ATM.

31 What command can be used to provide as much detailed information as possible with

CDP?

show cdp neighbor detail.

32 Is the password required at the console the same one that is required when Telnet is used

to access a router?

No. The Telnet (“virtual terminal”) password is not the same password, although many

installations use the same value.

33 How could a router administrator disable CDP?

The no cdp run command disables CDP for the entire router. The no cdp enable interface

subcommand disables it for just that interface.

34 Which IP routing protocols could be enabled using setup?

RIP and IGRP.

708 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

35 Name two commands used to view the configuration to be used at the next reload of the

router. Which one is a more recent addition to the IOS?

show config and show startup-config. show startup-config is the newer one and,

hopefully, is easier to remember.

36 Name two commands used to view the configuration that is currently used in a router.

Which one is a more recent addition to the IOS?

write terminal and show running-config. show running-config is the newer command

and, hopefully, is easier to remember.

37 True or False: The copy startup-config running-config command always changes the

currently used configuration for this router to exactly match what is in the startup

configuration file. Explain.

False. Some configuration commands do not replace an existing command but are simply

added to a list of related commands. If such a list exists, the copy startup-config runningconfig

command simply adds those to the end of the list. Many of these lists in a router

configuration are order-dependent.

Answers to the Chapter 3 “Do I Know This Already?” Quiz

1 Name the seven layers of the OSI model.

Application (Layer 7), presentation (Layer 6), session (Layer 5), transport (Layer 4),

network (Layer 3), data link (Layer 2), and physical (Layer 1).

2 What is the main purpose(s) of Layer 3?

The network layer defines logical addressing and routing as a means to deliver data across

an entire network. IP and IPX are two examples of Layer 3 equivalent protocols.

3 What is the main purpose(s) of Layer 2?

The data link layer defines addressing specific to a particular medium as part of the means

to provide delivery of data across that medium. It also includes the protocols used to

determine what device(s) access the media at any point in time.

4 What OSI layer typically encapsulates using both a header and a trailer?

The data link layer. The trailer typically includes a frame check sequence (FCS), which is

used to perform error detection.

5 Describe the features required for a protocol to be considered connectionless.

Unordered low-overhead delivery of data from one host to another is the service provided

in most connectionless protocol services.

Answers to the Chapter 3 “Do I Know This Already?” Quiz 709

6 Describe the features required for a protocol to be considered connection-oriented.

The protocol must either exchange messages with another device before data is allowed

to be sent, or some pre-established correlation between the two endpoints must be defined.

TCP is an example of a connection-oriented protocol that exchanges messages before data

may be sent; Frame Relay is a connection-oriented protocol for which pre-established

correlation between endpoints is defined.

7 In a particular error-recovering (reliable) protocol, the sender sends three frames,

labeled 2, 3, and 4. On its next sent frame, the receiver of these frames sets an

acknowledgment field to 4. What does this typically imply?

Setting the acknowledgment field to 4 implies that frames through number 3 were

received successfully. Most windowing, error-recovery (reliable) protocols use forward

acknowledgment.

8 Name three connection-oriented protocols.

TCP, SPX, LLC Type 2, and X.25 are some examples of connection-oriented protocols

that happen to provide error recovery. ATM and Frame Relay are also connectionoriented,

but without error recovery.

9 Name three terms popularly used as synonyms for MAC address.

NIC address, card address, LAN address, hardware address, Ethernet address, Token Ring

address, FDDI address, and burned-in address are used synonymously with MAC address.

All of these names are used casually and in formal documents, and they refer to the same

6-byte MAC address concept as defined by IEEE.

10 What portion of a MAC address encodes an identifier representing the manufacturer of the

card?

The first 3 bytes. For instance, Cisco is assigned 0000.0C as one of its Organizationally

Unique Identifiers (OUIs). Many Cisco router Ethernet interfaces have MAC addresses

beginning with that value. The output of the show interface command for a LAN interface

lists the burned in address after the acronym BIA.

11 Are DLCI addresses defined by a Layer 2 or a Layer 3 protocol?

Layer 2. While not specifically covered in this chapter, Frame Relay protocols do not

define a logical addressing structure that can usefully exist outside a Frame Relay

network; by definition, the addresses would be OSI Layer 2 equivalent.

12 How many bits are present in a MAC address?

MAC addresses comprise 48 bits. The first 24 bits for burned-in addresses represent a code

that identifies the manufacturer.

710 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

13 How many bits are present in an IPX address?

IPX addresses comprise 80 bits—32 bits in the network portion and 48 bits in the node

portion.

14 Name the two main parts of an IP address. Which part identifies the “group” of which this

address is a member?

Network and host are the two main parts of an IP address. As described in Chapter 5,

“Network Protocols,” technically there are three portions of the IP address: network,

subnet, and host. However, because most people think of the network and subnet portions

as one portion, another correct answer to this question, using popular terminology, would

be subnet and host.

15 Describe the differences between a routed protocol and a routing protocol.

The routed protocol defines the addressing and Layer 3 header in the packet that is actually

forwarded by a router. The routing protocol defines the process of routers exchanging

topology data such that the routers know how to forward the data. A router uses the routing

table created by the routing protocol to choose how to forward a routed protocol packet.

16 Name at least three routed protocols.

TCP/IP (IP), Novell (IPX), OSI (CLNP), DECNET (CLNP), AppleTalk (DDP), and

VINES are some examples of routed protocols.

Answers to the Chapter 3 Q&A Section

1 Name the seven layers of the OSI model.

Application (Layer 7), presentation (Layer 6), session (Layer 5), transport (Layer 4),

network (Layer 3), data link (Layer 2), and physical (Layer 1). Some mnemonics to help

you recall the names of the layers are: All People Seem To Need Data Processing (Layer

7 to 1), Please Do Not Take Sausage Pizzas Away (Layer 1 to 7), and the ever-popular

Pew! Dead Ninja Turtles Smell Particularly Awful (Layer 1 to 7).

2 What is the main purpose(s) of Layer 7?

Layer 7 (application layer) provides standardized services to applications. The definition

for this layer is typically ambiguous because it varies. The key is that it does not define a

user interface, but instead is a sort of toolbox used by application developers. For example,

a Web browser is an application that uses HTML format text, as defined by the TCP/IP

application layer, to describe the graphics to be displayed onscreen.

3 What is the main purpose(s) of Layer 6?

Layer 6 (presentation layer) defines data formats, compression, and possibly encryption.

Answers to the Chapter 3 Q&A Section 711

4 What is the main purpose(s) of Layer 5?

Layer 5 (session layer) controls the conversation between two endpoints. Although

the term used is session, the term conversation more accurately describes what is

accomplished. The session layer ensures that not only communication but also useful

sets of communication between endpoints is accomplished.

5 What is the main purpose(s) of Layer 4?

Layer 4 (transport layer) provides end-to-end error recovery, if requested.

6 What is the main purpose(s) of Layer 3?

Layer 3 (network layer) defines logical addressing and routing as a means to deliver data

across an entire network. IP and IPX are two examples of Layer 3 equivalent protocols.

7 What is the main purpose(s) of Layer 2?

The data link layer defines addressing specific to a particular medium as part of the means

to provide delivery of data across that medium. It also includes the protocols used to

determine what device(s) accesses the media at any point in time.

8 What is the main purpose(s) of Layer 1?

Layer 1 (physical layer) is responsible for encoding energy signals onto the medium and

interpreting a received energy signal. Layer 1 also defines the connector and cabling

details.

9 Describe the process of data encapsulation as data is processed from creation until it exits

a physical interface to a network. Use the OSI model as an example.

Data encapsulation represents the process of a layer adding a header (and possibly a

trailer) to the data as it is processed by progressively lower layers in the protocol

specification. In the context of OSI, each layer could add a header so that—other than the

true application data—there would be six other headers (Layers 2 to 7) and a trailer for

Layer 2, with this L2-PDU being encoded by the physical layer onto the network media.

10 Describe the features required for a protocol to be considered connectionless.

Unordered low-overhead delivery of data from one host to another is the service provided

in most connectionless protocol services.

11 Name at least three connectionless protocols.

LLC type 1, UDP, IPX, IP, and PPP are some examples of connectionless protocols.

Remember, Frame Relay, X.25, and ATM are connection-oriented, regardless of whether

they define error recovery.

712 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

12 Describe the features required for a protocol to be considered connection-oriented.

The protocol must either exchange messages with another device before data is allowed

to be sent, or some pre-established correlation between the two endpoints must be defined.

TCP is an example of a connection-oriented protocol that exchanges messages before data

may be sent; Frame Relay is a connection-oriented protocol for which pre-established

correlation between endpoints is defined.

13 In a particular error-recovering protocol, the sender sends three frames, labeled 2, 3, and

4. On its next sent frame, the receiver of these frames sets an acknowledgment field to 4.

What does this typically imply?

Frames up through number 3 were received successfully. Most windowing, error-recovery

protocols use forward acknowledgment.

14 Name three connection-oriented protocols.

TCP, SPX, LLC Type 2, and X.25 are some examples of connection-oriented protocols

that provide error recovery. ATM and Frame Relay are also connection-oriented, but

without error recovery.

15 What does MAC stand for?

MAC stands for Media Access Control.

16 Name three terms popularly used as a synonym for MAC address.

NIC address, card address, LAN address, hardware address, Ethernet address, Token Ring

address, FDDI address, and burned-in address are all synonymous with MAC address. All

of these names are used casually and in formal documents, and refer to the same 6-byte

MAC address concept as defined by IEEE.

17 Are IP addresses defined by a Layer 2 or Layer 3 protocol?

IP addresses are defined by the IP part of TCP/IP, which is the second layer of TCP/IP.

However, compared to OSI, IP most closely matches OSI Layer 3 in function, so the

popular (and CCNA exam) answer is Layer 3.

18 Are IPX addresses defined by a Layer 2 or Layer 3 protocol?

IP addresses are defined by a Layer 3 protocol.

19 Are OSI NSAP addresses defined by a Layer 2 or Layer 3 protocol?

OSI NSAP addresses are defined by a Layer 3 protocol. Of course, they are truly Layer 3

because they are defined by OSI. The number of bits in the address is variable. However,

it is highly unlikely that questions about NSAPs would be on the exam because they are

not mentioned in any objective and are not covered in any class.

Answers to the Chapter 3 Q&A Section 713

20 What portion of a MAC address encodes an identifier representing the manufacturer of the

card?

The first 3 bytes comprise the portion of a MAC address that encodes an identifier

representing the manufacturer of the card.

21 Are MAC addresses defined by a Layer 2 or Layer 3 protocol?

MAC addresses are defined by a Layer 2 protocol. Ethernet and Token Ring MAC

addresses are defined in the 802.3 and 802.5 specifications.

22 Are DLCI addresses defined by a Layer 2 or Layer 3 protocol?

DLCI addresses are defined by a Layer 2 protocol. Although they are not specifically

covered in this chapter, Frame Relay protocols do not define a logical addressing structure

that can usefully exist outside a Frame Relay network; by definition, the addresses would

be OSI Layer 2 equivalent.

23 Name two differences between Layer 3 addresses and Layer 2 addresses.

Layer 3 addresses can be used regardless of media type, whereas Layer 2 addresses are

useful only on a particular medium. Layer 3 addresses are designed with a minimum of

two parts, the first of which creates a grouping concept. Layer 2 addresses do not have a

grouping concept that allows the setup interfaces on the same medium to share the same

value in a portion of the data link address, which is how Layer 3 addresses are structured.

24 How many bits are present in an IP address?

IP addresses have 32 bits: a variable number in the network portion, and the rest of the 32

in the host portion. IP Version 6 uses a much larger address. Stay tuned!

25 How many bits are present in an IPX address?

IPX addresses have 80 bits: 32 bits in the network portion and 48 bits in the node portion.

26 How many bits are present in a MAC address?

MAC addresses have 48 bits. The first 24 bits for burned-in addresses represent a code that

identifies the manufacturer.

27 Name the two main parts of an IPX address. Which part identifies which “group” this

address is a member of?

Network number and node number are the two main parts of an IPX address. Addresses

with the same network number are in the same group. On LAN interfaces, the node

number is made to have the same value as the LAN MAC address.

714 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

28 Name the two main parts of an IP address. Which part identifies which “group” this

address is a member of?

Network and host are the two main parts of an IP address. As described in Chapter 5,

technically there are three portions of the IP address: network, subnet, and host. However,

because most people think of the network and subnet portions as one portion, another

correct answer to this question, using popular terminology, would be subnet and host.

29 Name the two main parts of a MAC address. Which part identifies which “group” this

address is a member of?

There are no parts, and nothing defines a grouping concept in a MAC address. This is a

trick question. Although you might have guessed that the MAC address has two parts—

the first part dictated to the manufacturer, and the second part made up by the

manufacturer—there is no grouping concept.

30 Name three benefits to layering networking protocol specifications.

Some examples of benefits to layering networking protocol specifications include reduced

complexity, standardized interfaces, modular engineering, interoperable technology,

accelerated evolution, and simplified teaching and learning. Questions such as this on the

exam will require some subjective interpretation of the wording on your part. The wording

in this answer is consistent with the outdated CCNA exam 640-407, but some questions

on the current exam remain from the old one, so the wording in this answer might be

helpful.

31 What header and/or trailer does a router discard as a side effect of routing?

A router discards the data link header and trailer as a side effect of routing. This is because

the network layer, where routing is defined, is interested in delivering the network layer

(Layer 3) PDU from end to end. Routing uses intermediate data links (Layer 2) to

transport the data to the next routers and eventually to the true destination. The data link

header and trailer are useful only to deliver the data to the next router or host, so the header

and trailer are discarded by each router.

32 Describe the differences between a routed protocol and a routing protocol.

The routed protocol defines the addressing and Layer 3 header in the packet that is actually

forwarded by a router. The routing protocol defines the process of routers exchanging

topology data so that the routers know how to forward the data. A router uses the routing

table created by the routing protocol to choose how to forward a routed protocol packet.

33 Name at least three routed protocols.

TCP/IP (IP), Novell (IPX), OSI (CLNP), DECNET (CLNP), AppleTalk (DDP), and

VINES are some examples of routed protocols.

Answers to the Chapter 4 “Do I Know This Already?” Quiz 715

34 Name at least three routing protocols.

IP RIP, IP IGRP, IP/IPX/AppleTalk EIGRP, IP OSPF, OSI NLSP, AppleTalk RTMP, Vines

VTP, OSI IS-IS are some examples of routing protocols

35 How does an IP host know what router to send a packet to? In which cases does an IP host

choose to send a packet to this router instead of directly to the destination host?

Typically an IP host knows to what router to send a packet based on its configured default

router. If the destination of the packet is in another subnet, the host sends the packet to the

default router. Otherwise, the host sends the packet directly to the destination host because

it is in the same subnet and, by definition, must be on the same data link.

36 How does an IPX host know which router to send a packet to? In which case does an IPX

host choose to send a packet to this router instead of directly to the destination host?

An IPX host knows which router to send a packet to by broadcasting a RIP request to

locate any servers or routers on the attached IPX network that have a route to the

destination network. If the destination is an IPX address on the attached network, a router

is not needed and the node forwards the packet directly instead of sending a RIP request.

37 Name three items in an entry in any routing table.

The group identifier, the interface by which to forward the packet, and the Layer 3 address

of the next router to send this packet to are three items that you will always find in a

routing table entry.

38 What OSI layer typically encapsulates using both a header and a trailer?

The data link layer typically encapsulates using both a header and a trailer. The trailer

typically includes a frame check sequence (FCS), which is used to perform error

detection.

Answers to the Chapter 4 “Do I Know This Already?” Quiz

1 What do the letters MAC stand for? What other terms have you heard to describe the same

or similar concept?

Media Access Control (MAC). Many terms are used to describe a MAC address: NIC,

LAN, hardware, burned-in, Universally Administered Address (UAA), Locally

Administered Address (LAA), Ethernet, Token Ring, FDDI, card, wire, and real are all

terms used to describe this same address in different instances.

2 What standards body owns the process of ensuring unique MAC addresses worldwide?

IEEE. The first half of the burned-in MAC address is a value assigned to the manufacturer

by the IEEE. As long as the manufacturer uses that prefix and doesn’t duplicate values it

assigns in the last 3 bytes, global uniqueness is attained.

716 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

3 What is the distance limitation of 10BaseT? 100BaseTX?

10BaseT allows 100 meters between the device and the hub or switch, as does

100BaseTX. Table 4-5 on page 144 summarizes the lengths for all Ethernet LAN types.

4 How fast is Fast Ethernet?

100 million bits per second (100 Mbps).

5 What routing protocol does a transparent bridge use to learn about Layer 3 addressing

groupings?

None. Bridges do not use routing protocols. Transparent bridges do not care about Layer

3 address groupings. Devices on either side of a transparent bridge are in the same Layer

3 group—in other words, the same IP subnet or IPX network.

6 Name two of the methods of internal switching on typical switches today. Which provides

less latency for an individual frame?

Store-and-forward, cut-through, and fragment-free. Cut-through has less latency per

frame but does not check for bit errors in the frame, including errors caused by collisions.

Store-and-forward stores the entire received frame, verifies that the FCS is correct, and

then sends the frame. Cut-through sends the first bytes of the frame out before the last

bytes of the incoming frame have been received. Fragment-free is like cut-through, in that

the frame can be sent before the incoming frame is totally received; however, fragmentfree

processing waits to receive the first 64 bytes, to ensure no collisions, before beginning

to forward the frame.

7 If a switch hears three different configuration BPDUs from three different neighbors on

three different interfaces, and if all three specify that Bridge 1 is the root, how does it

choose which interface is its root port?

The root port is the port in which the CBPDU with the lowest-cost value is received. The

root port is placed into a forwarding state on each bridge and switch.

8 Assume that a building has 100 devices attached to the same Ethernet. These users then

are migrated onto two separate shared Ethernet segments, each with 50 devices, with a

transparent bridge in between. List two benefits that would be derived for a typical user.

Fewer collisions and less waiting should occur because twice as much capacity exists.

Also, if the placement of devices causes a small percentage of traffic to be forwarded by

the bridge, fewer collisions and less waiting should occur.

9 Define the term broadcast domain.

A set of Ethernet devices for which a broadcast sent by any one of them should be received

by all others in the group. Unlike routers, bridges and switches do not stop the flow of

broadcasts. Two segments separated by a router would each be in a different broadcast

domain. A switch can create multiple broadcast domains by creation of multiple VLANs,

but a router must be used to route packets between the VLANs.

Answers to the Chapter 4 “Do I Know This Already?” Quiz 717

10 Describe the benefits of creating three VLANs of 25 ports each, versus a single VLAN of

75 ports, in each case using a single switch. Assume that all ports are switched ports (each

port is a different collision domain).

Three different broadcast domains are created with three VLANs, so the devices’ CPU

utilization should decrease due to decreased broadcast traffic. Traffic between devices in

different VLANs will pass through some routing function, which can add some latency

for those packets. Better management and control are gained by including a router in the

path for those packets.

11 If two Cisco LAN switches are connected using Fast Ethernet, what VLAN trunking

protocols could be used? If only one VLAN spanned both switches, is a VLAN trunking

protocol needed?

ISL and 802.1Q are the trunking protocols used by Cisco over Fast Ethernet. If only one

VLAN spans the two switches, a trunking protocol is not needed. Trunking or tagging

protocols are used to tag a frame as being in a particular VLAN; if only one VLAN is used,

tagging is unnecessary.

12 Define the term VLAN.

Virtual LAN (VLAN) refers to the process of treating one subset of a switch’s interfaces

as one broadcast domain. Broadcasts from one VLAN are not forwarded to other VLANs;

unicasts between VLANs must use a router. Advanced methods, such as Layer 3 switching

in a NetFlow feature card in a Catalyst 5000 switch, can be used to allow the LAN switch

to forward traffic between VLANs without each individual frame being routed by a router.

However, for the depth of CCNA, such detail is not needed.

13 How many IP addresses must be configured for network management on a Cisco Catalyst

1900 switch if eight ports are to be used with three VLANs?

A single IP address is needed. There is no need for an IP address per port because the

switch is not a router. The management IP address is considered to be in VLAN1.

14 What Catalyst 1900 switch command displays the version of IOS running in the switch?

This is a trick question. The show version command shows the level of switch software,

but because the switch does not run IOS, no command will display the level of IOS in the

switch.

15 Configuration is added to the running configuration in RAM when commands are typed in

Catalyst 1900 configuration mode. What causes these commands to be saved into

NVRAM?

Unlike the router IOS, commands are saved in both running config and in NVRAM as the

user enters the configuration commands. No separate command, such as copy runningconfig

startup-config in the router IOS, is needed.

718 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

16 Name the three VTP modes. Which of these does not allow VLANs to be added or

modified?

Server and client modes are used to actively participate in VTP, and transparent mode is

used to simply stay out of the way of servers and clients while not participating in VTP.

Switches in client mode cannot change or add VLANs.

Answers to the Chapter 4 Q&A Section

1 What do the letters MAC stand for? What other terms have you heard to describe the same

or similar concept?

Media Access Control (MAC). Many terms are used to describe a MAC address: NIC,

LAN, hardware, burned-in, UAA (Universally Administered Address), LAA (Locally

Administered Address), Ethernet, Token Ring, FDDI, card, wire, and real are all terms

used to describe this same address in different instances.

2 Name two benefits of LAN segmentation using transparent bridges.

The main benefits are reduced collisions and more bandwidth. Multiple 10- or 100-Mbps

Ethernet segments are created, and unicasts between devices on the same segment are not

forwarded by the bridge, which reduces overhead.

3 What routing protocol does a transparent bridge use to learn about Layer 3 addressing

groupings?

None. Bridges do not use routing protocols. Transparent bridges do not care about Layer

3 address groupings. Devices on either side of a transparent bridge are in the same Layer

3 group—in other words, the same IP subnet or IPX network.

4 What settings are examined by a bridge or switch to determine which should be elected as

root of the Spanning Tree?

The bridge priority is first examined (the lowest wins). In case of a tie, the lowest bridge

ID wins. The priority is prepended to the bridge ID in the actual CBPDU message so that

the combined fields can be easily compared.

5 Define the term VLAN.

Virtual LAN (VLAN) refers to the process of treating one subset of a switch’s interfaces

as one broadcast domain. Broadcasts from one VLAN are not forwarded to other VLANs;

unicasts between VLANs must use a router. Advanced methods, such as Layer 3 switching

in a NetFlow feature card in a Catalyst 5000 switch, can be used to allow the LAN switch

to forward traffic between VLANs without each individual frame being routed by a router.

However, for the depth of CCNA, such detail is not needed.

Answers to the Chapter 4 Q&A Section 719

6 Assume that a building has 100 devices attached to the same Ethernet. These users then

are migrated onto two separate shared Ethernet segments, each with 50 devices, with a

transparent bridge in between. List two benefits that would be derived for a typical user.

Fewer collisions and less waiting should occur because twice as much capacity exists.

Also, if the placement of devices causes a small percentage of traffic to be forwarded by

the bridge, fewer collisions and less waiting should occur.

7 What standards body owns the process of ensuring unique MAC addresses worldwide?

IEEE. The first half of the burned-in MAC address is a value assigned to the manufacturer

by the IEEE. As long as the manufacturer uses that prefix and doesn’t duplicate values it

assigns in the last 3 bytes, global uniqueness is attained.

8 Assume that a building has 100 devices attached to the same Ethernet. These devices are

migrated to two different shared Ethernet segments, each with 50 devices. The two

segments are connected to a Cisco LAN switch to allow communication between the two

sets of users. List two benefits that would be derived for a typical user.

Two switch ports are used, which reduces the possibility of collisions. Also, each segment

has its own 10- or 100-Mbps capacity, allowing more throughput and reducing the

likelihood of collisions. Furthermore, although unlikely to be on the CCNA exam, some

Cisco switches can reduce the flow of multicasts using the Cisco Group Message Protocol

(CGMP).

9 Name two of the methods of internal switching on typical switches today. Which provides

less latency for an individual frame?

Store-and-forward, cut-through, and FragmentFree. Cut-through has less latency per

frame but does not check for bit errors in the frame, including errors caused by collisions.

Store-and-forward stores the entire received frame, verifies that the FCS is correct, and

then sends the frame. Cut-through sends the first bytes of the frame out before the last

bytes of the incoming frame have been received. Fragment free is similar to cut-through

in that the frame can be sent before the incoming frame is totally received; however,

fragment-free processing waits to receive the first 64 bytes, to ensure no collisions, before

beginning to forward the frame.

10 What is the distance limitation of 10BaseT? 100BaseTX?

10BaseT allows 100 meters between the device and the hub or switch, as does

100BaseTX. Table 4-5 on page 144 summarizes the lengths for all Ethernet LAN types.

11 Describe how a transparent bridge decides whether it should forward a frame, and tell

how it chooses the interface out which to forward the frame.

The bridge examines the destination MAC address of a frame and looks for the address in

its bridge (or address) table. If found, the matching entry tells the bridge which output

interface to use to forward the frame. If not found, the bridge forwards the frame out all

720 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

other interfaces (except for interfaces blocked by Spanning Tree and the interface in which

the frame was received). The bridge table is built by examining incoming frames’ source

MAC addresses.

12 How fast is Fast Ethernet?

100 million bits per second (100 Mbps).

13 Describe the benefit of the Spanning-Tree Protocol as used by transparent bridges and

switches.

Physically redundant paths in the network are allowed to exist and be used when other

paths fail. Also, loops in the bridged network are avoided. Loops are particularly bad

because bridging uses LAN headers, which do not provide a mechanism to mark a frame

so that its lifetime can be limited; in other words, the frame can loop forever.

14 If a switch hears three different configuration BPDUs from three different neighbors on

three different interfaces, and if all three specify that Bridge 1 is the root, how does the

switch choose which interface is its root port?

The root port is the port in which the CBPDU with the lowest-cost value is received. The

root port is placed in forwarding state on each bridge and switch.

15 How does a transparent bridge build its address table?

The bridge listens for incoming frames and examines the source MAC address. If not in

the table, the source address is added, along with the port (interface) by which the frame

entered the bridge. The bridge also marks an entry for freshness so that entries can be

removed after a period of disuse. This reduces table size and allows for easier table

changes in case a Spanning Tree change forces more significant changes in the bridge

(address) table.

16 How many bytes long is a MAC address?

6 bytes long, or 48 bits.

17 Assume that a building has 100 devices attached to the same Ethernet. These users then

are migrated onto two separate Ethernet segments, each with 50 devices and separated by

a router. List two benefits that would be derived for a typical user.

Collisions are reduced by creating two collision domains. Broadcasts also are reduced

because the router does not forward broadcasts. Routers provide greater control and

administration as well.

18 Does a bridge/switch examine just the incoming frame’s source MAC, destination MAC,

or both? Why does it examine the one(s) it examines?

The bridge/switch examines both MAC addresses. The source is examined so that entries

can be added to the bridge/address table. The destination address is examined to determine

the interface out which to forward the frame. Table lookup is required for both addresses

Answers to the Chapter 4 Q&A Section 721

for any frame that enters an interface. That is one of the reasons that LAN switches, which

have a much larger number of interfaces than traditional bridges, need to have optimized

hardware and logic to perform table lookup quickly.

19 Define the term collision domain.

A collision domain is a set of Ethernet devices for which concurrent transmission of a

frame by any two of them will result in a collision. Bridges, switches, and routers separate

LAN segments into different collision domains. Repeaters and shared hubs do not

separate segments into different collision domains.

20 When a bridge or switch using Spanning-Tree Protocol first initializes, who does it assert

should be the root of the tree?

Each bridge/switch begins by sending CBPDUs claiming itself as the root bridge.

21 Name the three reasons why a port is placed in forwarding state as a result of Spanning

Tree.

First, all ports on the root bridge are placed in forwarding state. Second, one port on each

bridge is considered its root port, which is placed in forwarding state. Finally, on each

LAN segment, one bridge is considered to be the designated bridge on that LAN; that

designated bridge’s interface on the LAN is placed in forwarding state.

22 Define the difference between broadcast and multicast MAC addresses.

Both identify more than one device on the LAN. Broadcast always implies all devices on

the LAN, whereas multicast implies some subset of all devices. Multicast is not allowed

on Token Ring; broadcast is allowed on all LAN types. Devices that intend to receive

frames addressed to a particular multicast address must be aware of the particular

multicast address(es) they should process. These addresses are dependent on the

applications used. Read RFC 1112, the Internet Group Message Protocol (IGMP), for

related information about the use of Ethernet multicast in conjunction with IP multicast.

For example, the broadcast address is FFFF.FFFF.FFFF, and one sample multicast address

is 1000.5e00.0001.

23 Excluding the preamble and starting delimiter fields, but including all other Ethernet

headers and trailers, what is the maximum number of bytes in an Ethernet frame?

1518 bytes. See Figure 4-5 on page 141 for more detail.

24 Define the term broadcast domain.

A broadcast domain is a set of Ethernet devices for which a broadcast sent by any one of

them should be received by all others in the group. Unlike routers, bridges and switches

do not stop the flow of broadcasts. Two segments separated by a router would each be in

a different broadcast domain. A switch can create multiple broadcast domains by creating

multiple VLANs, but a router must be used to route packets between the VLANs.

722 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

25 Describe the benefits of creating three VLANs of 25 ports each, versus a single VLAN of

75 ports, in each case using a single switch. Assume that all ports are switched ports (each

port is a different collision domain).

Three different broadcast domains are created with three VLANs, so the devices’ CPU

utilization should decrease due to decreased broadcast traffic. Traffic between devices in

different VLANs will pass through some routing function, which can add some latency

for those packets. Better management and control are gained by including a router in the

path for those packets.

26 If two Cisco LAN switches are connected using Fast Ethernet, what VLAN trunking

protocols could be used? If only one VLAN spanned both switches, is a VLAN trunking

protocol needed?

ISL and 802.1Q are the trunking protocols used by Cisco over Fast Ethernet. If only one

VLAN spans the two switches, a trunking protocol is not needed. Trunking or tagging

protocols are used to tag a frame as being in a particular VLAN; if only one VLAN is used,

tagging is unnecessary.

27 Explain the function of the loopback and collision detection features of an Ethernet NIC

in relation to half-duplex and full-duplex operations.

The loopback feature copies the transmitted frame back onto the receive pin on the NIC

interface. The collision detection logic compares the received frame to the transmitted

frame during transmission; if the signals do not match, then a collision is occurring. This

logic implies that half duplex is being used because if collisions can occur, only one

transmitter at a time is allowed. With full duplex, collisions cannot occur, so the loopback

and collision detection features are not needed, and concurrent transmission and reception

is allowed.

28 Name the three interface states that the Spanning-Tree Protocol uses, other than

forwarding. Which of these states is transitory?

Blocking, listening, and learning. Blocking is the only stable state; the other two are

transitory between blocking and forwarding. Table 4-13 on page 170 summarizes the

states and their features.

29 What are the two reasons that a nonroot bridge/switch places a port in forwarding state?

If the port is the designated bridge on its LAN segment, the port is placed in forwarding

state. Also, if the port is the root port, it is placed in forwarding state. Otherwise, the port

is placed in blocking state.

30 Can the root bridge/switch ports be placed in blocking state?

The root bridge’s ports are always in a forwarding state because they always have cost 0

to the root, which ensures that they are always the designated bridges on their respective

LAN segments.

Answers to the Chapter 4 Q&A Section 723

31 How many IP addresses must be configured for network management on a Cisco Catalyst

1900 switch if eight ports are to be used and with three VLANs?

A single IP address is needed. No need exists for an IP address per port because the switch

is not a router. The management IP address is considered to be in VLAN1.

32 What command on a 1900 series switch would cause the switch to block frames destined

to 0200.7777.7777, entering interface 0/5, from going out port 0/6?

The mac-address-table restricted static 0200.7777.7777 0/6 0/5 global configuration

command would block the frames. This also makes address 0200.7777.7777 permanently

held in the MAC address table for port 0/6.

33 What Catalyst 1900 switch command displays the version of IOS running in the switch?

This is a trick question. The show version command shows the level of switch software,

but because the switch does not run IOS, no command will display the level of IOS in the

switch.

34 What does the Catalyst 1900 switch command address violation disable do?

This global configuration command tells the switch what action to take when the

maximum number of addresses on a port has been exceeded. If a new dynamically learned

MAC address on some port had caused the maximum (as defined by the port secure

command) to be exceeded, the port would have been disabled.

35 What command erases the startup config in a Catalyst 1900 switch?

The delete nvram EXEC command erases the configuration file in NVRAM. In fact,

although it is easy to call it the startup-config, commands instead refer to this

configuration file as NVRAM.

36 Configuration is added to the running configuration in RAM when commands are typed in

Catalyst 1900 configuration mode. What causes these commands to be saved into

NVRAM?

Unlike the router IOS, commands are saved in both running config and in NVRAM as the

user enters the configuration commands. No separate command, such as copy runningconfig

startup-config in the router IOS, is needed.

37 How do EXEC and configuration commands refer to the two Fast Ethernet ports on a

Catalyst 1912 switch?

These two ports are known as fastethernet 0/26 and 0/27. 0/25 is always reserved for the

AUI port, and 0/1 through 0/24 are always reserved for the (up to) first 24 Ethernet ports.

38 What Catalyst 1900 switch command displays the switching table?

The show mac-address-table command displays the table the switch uses to make

switching decisions.

724 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

39 What does VTP do, and what does the abbreviation stand for?

VLAN Trunking Protocol is a protocol used to transmit configuration information about

VLANs between interconnected switches. VTP helps prevent misconfiguration, eases

administration of the switches, and also reduces broadcast overhead by the use of VTP

pruning.

40 Name the three VTP modes. Which of these does not allow VLANs to be added or

modified?

Server and client modes are used to actively participate in VTP; transparent mode is used

to simply stay out of the way of servers and clients while not participating in VTP.

Switches in client mode cannot change or add VLANs.

41 What Catalyst 1900 switch command assigns a port to a particular VLAN?

The vlan-membership static x interface subcommand assigns the port to VLAN

number x.

42 What Catalyst 1900 switch command creates vlan 10 and assigns it a name of

bigbadvlan?

The vlan 10 name bigbadvlan global configuration command creates the VLAN.

43 What Catalyst 1900 switch command lists the details about VLAN number 10?

The show vlan 10 command displays VLAN information about VLAN number 10.

44 What Catalyst 1900 switch command configures ISL trunking on fastethernet port 26 so

that as long as the switch port on the other end of the trunk is not disabled (off) or

configured to not negotiate to become a trunk, the trunk will definitely be placed in

trunking mode?

The trunk desirable interface subcommand tells this switch to be in trunking mode (in

other words, to use ISL) as long as the switch in the other end of the trunk is configured

for on, autonegotiate, or desirable. If the other switch has configured the trunk as off or

nonegotiate, trunking will not be enabled.

45 What type of VTP mode allows a switch to create VTP advertisements?

Only VTP servers generate VTP advertisements.

Answers to the Chapter 5 “Do I Know This Already?” Quiz

1 What do TCP, UDP, IP, and ICMP stand for? Which protocol is considered to be Layer 3

equivalent when comparing TCP/IP to the OSI protocols?

Transmission Control Protocol, User Datagram Protocol, Internet Protocol, and Internet

Control Message Protocol. Both TCP and UDP are Layer 4 protocols. ICMP is considered

Answers to the Chapter 5 “Do I Know This Already?” Quiz 725

a Layer 3 protocol because it is used for control and management of IP. IP is the core part

of the network layer of TCP/IP, so it is also considered to be a Layer 3 protocol.

2 Describe how TCP performs error recovery. What role do the routers play?

TCP numbers the first byte in each segment with a sequence number. The receiving host

uses the acknowledgment field in segments it sends back to acknowledge receipt of the

data. If the receiver sends an acknowledgment number that is a smaller number than the

sender expected, the sender believes the intervening bytes were lost, so the sender resends

them. The router plays no role unless the TCP connection ends in the router—for example,

a Telnet into a router.

3 Does FTP or TFTP perform error recovery? If so, describe the basics of how error

recovery is performed.

Both FTP and TFTP perform error recovery. FTP relies on TCP, whereas TFTP performs

application layer recovery one block of data at a time.

4 How many TCP segments are exchanged to establish a TCP connection? How many are

required to terminate a TCP connection?

A three-way connection establishment sequence is performed, and a four-flow connection

termination sequence is used.

5 Given the IP address 134.141.7.11 and the mask 255.255.255.0, what is the subnet

number?

The subnet is 134.141.7.0. The binary algorithm is shown in the following table.

6 Given the IP address 134.141.7.11 and the mask 255.255.255.0, what is the subnet

broadcast address?

The broadcast address is 134.141.7.255. The binary algorithm is shown in the following

table.

Address 134.141.7.11 1000 0110 1000 1101 0000 0111 0000 1011

Mask 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000

Result 134.141.7.0 1000 0110 1000 1101 0000 0111 0000 0000

Address 134.141.7.11 1000 0110 1000 1101 0000 0111 0000 1011

Mask 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000

Result 134.141.7.0 1000 0110 1000 1101 0000 0111 0000 0000

Broadcast Address 134.141.7.255 1000 0110 1000 1101 0000 0111 1111 1111

726 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

7 Given the IP address 200.1.1.130 and the mask 255.255.255.224, what are the assignable

IP addresses in this subnet?

The subnet number is 200.1.1.128, and the subnet broadcast address is 200.1.1.159. The

assignable addresses are all the addresses between the subnet and broadcast addresses,

namely 200.1.1.129 to 200.1.1.158.

8 Given the IP address 220.8.7.100 and the mask 255.255.255.240, what are all the subnet

numbers if the same (static) mask is used for all subnets in this network?

The Class C network number is 220.8.7.0. The mask implies that the bits 25 through 28,

which are the first 4 bits in the fourth octet, comprise the subnet field. Essentially, the

subnet numbers have the same numbers in the network portion and the same (all binary 0)

value in the host portion of the number. Each individual subnet number has a unique value

in the subnet portion of the number.

The binary algorithm is shown in the following table. Refer to the section “Given a

Network Number and a Static Subnet Mask, What Are the Valid Subnet Numbers?” in

Chapter 5 for a review of the algorithm.

9 Create a minimal configuration enabling IP on each interface on a 2501 router (two

serial, one Ethernet). The NIC assigned you network 8.0.0.0. Your boss says that you need,

at most, 200 hosts per subnet. You decide against using VLSM. Your boss says to plan your

subnets so that you can have as many subnets as possible, rather than allow for larger

First three octets in binary 1101 1100 0000 1000 0000 0111

Host field with all zeros added 1101 1100 0000 1000 0000 0111 0000

All binary 0 subnet field added,

completing the first subnet

number

1101 1100 0000 1000 0000 0111 0000 0000 220.8.7.0

Added binary 1 to subnet field,

giving second subnet number

1101 1100 0000 1000 0000 0111 0001 0000 220.8.7.16

Added binary 1 to subnet field,

giving third subnet number

1101 1100 0000 1000 0000 0111 0010 0000 220.8.7.32

Added binary 1 to subnet field,

giving fourth subnet number

1101 1100 0000 1000 0000 0111 0011 0000 220.8.7.48

Added binary 1 to subnet field,

giving fifth subnet number

1101 1100 0000 1000 0000 0111 0100 0000 220.8.7.64

Added binary 1 to subnet field,

giving sixth subnet number

1101 1100 0000 1000 0000 0111 0101 0000 220.8.7.80

Skipped a few for brevity

Last subnet number 1101 1100 0000 1000 0000 0111 1111 0000 220.8.7.240

Answers to the Chapter 5 “Do I Know This Already?” Quiz 727

subnets later. You decide to start with the lowest numerical values for the subnet number

you will use. Assume that point-to-point serial links will be attached to this router and that

RIP is the routing protocol.

router rip

network 8.0.0.0

interface ethernet 0

ip address 8.0.1.1 255.255.255.0

interface serial 0

ip address 8.0.2.1 255.255.255.0

interface serial 1

ip address 8.0.3.1 255.255.255.0

The zero subnet was not used in this solution. If desired, the ip subnet-zero global

command could have been used, enabling subnet 8.0.0.0 as well as the subnets 8.0.1.0,

8.0.2.0, and 8.0.3.0 to be used in the configuration.

10 Describe the question and possible responses in setup mode when a router wants to know

the mask used on an interface. How can the router derive the correct mask from the

information supplied by the user?

When using versions of the IOS before version 12.0, the question asks for the number of

subnet bits. The router creates a subnet mask with x more binary 1s than the default mask

for the class of network of which the interface’s IP address is a member. (x is the number

in the response.) “Number of subnet bits” from the setup question uses the definition that

there are three parts to an address—network, subnet, and host. The size of the network

field is based on the class of address; the interface’s address was typed in response to an

earlier setup question. The mask simply has binary 1s in the network and subnet fields,

and binary 0s in the host field.

With version 12.0 and beyond, setup prompts for the subnet mask in canonical decimal

format—for example, 255.255.255.0.

11 Define the purpose of the trace command. What type of messages does it send, and what

type of ICMP messages does it receive?

The trace command learns the current route to a destination address. It uses IP packets

with UDP as the transport layer protocol, with TTL values beginning at 1 and then

incrementing by 1 in successive messages. The result is that intervening routers find that

the TTL is exceeded and send ICMP “TTL exceeded” messages back to the originator of

the packet, which is the router where the trace command is being executed. The source

addresses of the “TTL exceeded” packets identify each router. By sending other packets

with TTL=2, then 3, and so on, eventually the packet is received by the host. The host

returns a “port unreachable” ICMP message, which lets the trace command know that the

endpoint host has been reached.

728 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

12 What causes the output from an IOS ping command to display “UUUUU”?

U is an indication that an unreachable message was received. The type of unreachable

message is not implied by the “U”.

13 How many bytes comprise an IPX address?

Ten bytes. The network portion is 32 bits, and the node portion is 48 bits. The node part

conveniently is the same size as a LAN MAC address.

14 Give an example of an IPX network mask used when subnetting.

There is no such thing as subnetting with IPX. This is an example of a question meant to

shake your confidence on the exam. Thoughts like, “I never read about subnetting IPX!”

can destroy your concentration. Be prepared for unusual questions or answers like this on

the exam.

15 Create a configuration enabling IPX on each interface, with RIP and SAP enabled on each

as well, for a 2501 (two serial, one Ethernet) router. Use networks 100, 200, and 300 for

interfaces S0, S1, and E0, respectively. Choose any node values.

ipx routing 0200.1111.1111

interface serial 0

ipx network 100

interface serial 1

ipx network 200

interface ethernet 0

ipx network 300

The node part of the address was supplied in the ipx routing command so that the IPX

addresses are easily recognizable on the serial interfaces. This helps with troubleshooting

because it will be easier to remember the IPX addresses used when pinging.

16 What show command lists the IPX address(es) of interfaces in a Cisco router?

show ipx interface. The other show commands list only the IPX network numbers, not

the entire IPX addresses.

Answers to the Chapter 5 Q&A Section

1 What do TCP, UDP, IP, and ICMP stand for? Which protocol is considered to be Layer 3

equivalent when comparing TCP/IP to the OSI protocols?

Transmission Control Protocol, User Datagram Protocol, Internet Protocol, and Internet

Control Message Protocol. Both TCP and UDP are Layer 4 protocols. ICMP is considered

a Layer 3 protocol because it is used for control and management of IP. IP is the core part

of the network layer of TCP/IP.

Answers to the Chapter 5 Q&A Section 729

2 Name the parts of an IP address.

Network, subnet, and host are the three parts of an IP address. However, many people

commonly treat the network and subnet parts of an address as a single part, leaving only

two parts, the subnet and host parts. On the exam, the multiple-choice format should

provide extra clues as to which terminology is used.

3 Define the term subnet mask. What do the bits in the mask whose values are binary 0 tell

you about the corresponding IP address(es)?

A subnet mask defines the number of host bits in an address. The bits of value 0 define

which bits in the address are host bits. The mask is an important ingredient in the formula

to dissect an IP address; along with knowledge of the number of network bits implied for

Class A, B, and C networks, the mask provides a clear definition of the size of the network,

subnet, and host parts of an address.

4 Given the IP address 134.141.7.11 and the mask 255.255.255.0, what is the subnet

number?

The subnet is 134.141.7.0. The binary algorithm is shown in the table that follows.

5 Given the IP address 193.193.7.7 and the mask 255.255.255.0, what is the subnet

number?

The network number is 193.193.7.0. Because this is a Class C address and the mask used

is 255.255.255.0 (the default), there is no subnetting in use. The binary algorithm is shown

in the table that follows.

6 Given the IP address 10.5.118.3 and the mask 255.255.0.0, what is the subnet number?

The subnet is 10.5.0.0. The binary algorithm math is shown in the table that follows.

Address 134.141.7.11 1000 0110 1000 1101 0000 0111 0000 1011

Mask 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000

Result 134.141.7.0 1000 0110 1000 1101 0000 0111 0000 0000

Address 193.193.7.7 1100 0001 1100 0001 0000 0111 0000 0111

Mask 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000

Result 193.193.7.0 1100 0001 1100 0001 0000 0111 0000 0000

Address 10.5.118.3 0000 1010 0000 0101 0111 0110 0000 0011

Mask 255.255.0.0 1111 1111 1111 1111 0000 0000 0000 0000

Result 10.5.0.0 0000 1010 0000 0101 0000 0000 0000 0000

730 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

7 Given the IP address 190.1.42.3 and the mask 255.255.255.0, what is the subnet number?

The subnet is 190.1.42.0. The binary algorithm math is shown in the table that follows.

8 Given the IP address 200.1.1.130 and the mask 255.255.255.224, what is the subnet

number?

The subnet is 200.1.1.128. The binary algorithm math is shown in the table that follows.

9 Given the IP address 220.8.7.100 and the mask 255.255.255.240, what is the subnet

number?

The subnet is 220.8.7.96. The binary algorithm math is shown in the table that follows.

10 Given the IP address 140.1.1.1 and the mask 255.255.255.248, what is the subnet

number?

The subnet is 140.1.1.0. The binary algorithm math is shown in the table that follows.

11 Given the IP address 167.88.99.66 and the mask 255.255.255.192, what is the subnet

number?

The subnet is 167.88.99.64. The binary algorithm math is shown in the table that follows.

Address 190.1.42.3 1011 1110 0000 0001 0010 1010 0000 0011

Mask 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000

Result 190.1.42.0 1011 1110 0000 0001 0010 1010 0000 0000

Address 200.1.1.130 1100 1000 0000 0001 0000 0001 1000 0010

Mask 255.255.255.224 1111 1111 1111 1111 1111 1111 1110 0000

Result 200.1.1.128 1100 1000 0000 0001 0000 0001 1000 0000

Address 220.8.7.100 1101 1100 0000 1000 0000 0111 0110 0100

Mask 255.255.255.240 1111 1111 1111 1111 1111 1111 1111 0000

Result 220.8.7.96 1101 1100 0000 1000 0000 0111 0110 0000

Address 140.1.1.1 1000 1100 0000 0001 0000 0001 0000 0001

Mask 255.255.255.248 1111 1111 1111 1111 1111 1111 1111 1000

Result 140.1.1.0 1000 1100 0000 0001 0000 0001 0000 0000

Address 167.88.99.66 1010 0111 0101 1000 0110 0011 0100 0010

Mask 255.255.255.192 1111 1111 1111 1111 1111 1111 1100 0000

Result 167.88.99.64 1010 0111 0101 1000 0110 0011 0100 0000

Answers to the Chapter 5 Q&A Section 731

12 Given the IP address 134.141.7.11 and the mask 255.255.255.0, what is the subnet

broadcast address?

The broadcast address is 134.141.7.255. The binary algorithm is shown in the table that

follows.

13 Given the IP address 193.193.7.7 and the mask 255.255.255.0, what is the broadcast

address?

The broadcast address is 193.193.7.255. Because this is a Class C address and the mask

used is 255.255.255.0 (the default), there is no subnetting in use. The binary algorithm is

shown in the table that follows.

14 Given the IP address 10.5.118.3 and the mask 255.255.0.0, what is the broadcast address?

The subnet is 10.5.0.0. The binary algorithm math is shown in the table that follows.

Address 134.141.7.11 1000 0110 1000 1101 0000 0111 0000 1011

Mask 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000

Result 134.141.7.0 1000 0110 1000 1101 0000 0111 0000 0000

Broadcast

Address

134.141.7.255 1000 0110 1000 1101 0000 0111 1111 1111

Address 193.193.7.7 1100 0001 1100 0001 0000 0111 0000 0111

Mask 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000

Result 193.193.7.0 1100 0001 1100 0001 0000 0111 0000 0000

Broadcast

Address

193.193.7.255 1100 0001 1100 0001 0000 0111 1111 1111

Address 10.5.118.3 0000 1010 0000 0101 0111 0110 0000 0011

Mask 255.255.0.0 1111 1111 1111 1111 0000 0000 0000 0000

Result 10.5.0.0 0000 1010 0000 0101 0000 0000 0000 0000

Broadcast

Address

10.5.255.255 0000 1010 0000 0101 1111 1111 1111 1111

732 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

15 Given the IP address 190.1.42.3 and the mask 255.255.255.0, what is the broadcast

address?

The broadcast address is 190.1.42.255. The binary algorithm math is shown in the table

that follows.

16 Given the IP address 200.1.1.130 and the mask 255.255.255.224, what is the broadcast

address?

The broadcast address is 200.1.1.159. The binary algorithm math is shown in the table that

follows.

17 Given the IP address 220.8.7.100 and the mask 255.255.255.240, what is the broadcast

address?

The broadcast address is 220.8.7.111. The binary algorithm is shown in the table that

follows.

Address 190.1.42.3 1011 1110 0000 0001 0010 1010 0000 0011

Mask 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000

Result 190.1.42.0 1011 1110 0000 0001 0010 1010 0000 0000

Broadcast

Address

190.1.42.255 1011 1110 0000 0001 0010 1010 1111 1111

Address 200.1.1.130 1100 1000 0000 0001 0000 0001 1000 0010

Mask 255.255.255.224 1111 1111 1111 1111 1111 1111 1110 0000

Result 200.1.1.128 1100 1000 0000 0001 0000 0001 1000 0000

Broadcast

Address

200.1.1.159 1100 1000 0000 0001 0000 0001 1001 1111

Address 220.8.7.100 1101 1100 0000 1000 0000 0111 0110 0100

Mask 255.255.255.240 1111 1111 1111 1111 1111 1111 1111 0000

Result 220.8.7.96 1101 1100 0000 1000 0000 0111 0110 0000

Broadcast

Address

220.8.7.111 1101 1100 0000 1000 0000 0111 0110 1111

Answers to the Chapter 5 Q&A Section 733

18 Given the IP address 140.1.1.1 and the mask 255.255.255.248, what is the broadcast

address?

The broadcast address is 140.1.1.7. The binary algorithm math is shown in the table that

follows.

19 Given the IP address 167.88.99.66 and the mask 255.255.255.192, what is the broadcast

address?

The broadcast address is 167.88.99.127. The binary algorithm math is shown in the table

that follows.

20 Given the IP address 134.141.7.11 and the mask 255.255.255.0, what are the assignable

IP addresses in this subnet?

The subnet number is 134.141.7.0, and the subnet broadcast address is 134.141.7.255. The

assignable addresses are all the addresses between the subnet and broadcast addresses,

namely 134.141.7.1 to 134.141.7.254.

21 Given the IP address 193.193.7.7 and the mask 255.255.255.0, what are the assignable

IP addresses in this subnet?

The subnet number is 193.193.7.0, and the subnet broadcast address is 193.193.7.255. The

assignable addresses are all the addresses between the subnet and broadcast addresses,

namely 193.193.7.1 to 193.193.7.254.

22 Given the IP address 10.5.118.3 and the mask 255.255.0.0, what are the assignable IP

addresses in this subnet?

The subnet number is 10.5.0.0, and the subnet broadcast address is 10.5.255.255. The

assignable addresses are all the addresses between the subnet and broadcast addresses,

namely 10.5.0.1 to 10.5.255.254.

Address 140.1.1.1 1000 1100 0000 0001 0000 0001 0000 0001

Mask 255.255.255.248 1111 1111 1111 1111 1111 1111 1111 1000

Result 140.1.1.0 1000 1100 0000 0001 0000 0001 0000 0000

Broadcast

Address

140.1.1.7 1000 1100 0000 0001 0000 0001 0000 0111

Address 167.88.99.66 1010 0111 0101 1000 0110 0011 0100 0010

Mask 255.255.255.192 1111 1111 1111 1111 1111 1111 1100 0000

Result 167.88.99.64 1010 0111 0101 1000 0110 0011 0100 0000

Broadcast

Address

167.88.99.127 1010 0111 0101 1000 0110 0011 0111 1111

734 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

23 Given the IP address 190.1.42.3 and the mask 255.255.255.0, what are the assignable IP

addresses in this subnet?

The subnet number is 190.1.42.0, and the subnet broadcast address is 190.1.42.255. The

assignable addresses are all the addresses between the subnet and broadcast addresses,

namely 190.1.42.1 to 190.1.42.254.

24 Given the IP address 200.1.1.130 and the mask 255.255.255.224, what are the assignable

IP addresses in this subnet?

The subnet number is 200.1.1.128, and the subnet broadcast address is 200.1.1.159. The

assignable addresses are all the addresses between the subnet and broadcast addresses,

namely 200.1.1.129 to 200.1.1.158.

25 Given the IP address 220.8.7.100 and the mask 255.255.255.240, what are the assignable

IP addresses in this subnet?

The subnet number is 220.8.7.96, and the subnet broadcast address is 220.8.7.111. The

assignable addresses are all the addresses between the subnet and broadcast addresses,

namely 220.8.7.97 to 220.8.7.110.

26 Given the IP address 140.1.1.1 and the mask 255.255.255.248, what are the assignable

IP addresses in this subnet?

The subnet number is 140.1.1.0, and the subnet broadcast address is 140.1.1.7. The

assignable addresses are all the addresses between the subnet and broadcast addresses,

namely 140.1.1.1 to 140.1.1.6.

27 Given the IP address 167.88.99.66 and the mask 255.255.255.192, what are the

assignable IP addresses in this subnet?

The subnet number is 167.88.99.64, and the subnet broadcast address is 167.88.99.127.

The assignable addresses are all the addresses between the subnet and broadcast

addresses, namely 167.88.99.65 to 167.88.99.126.

28 Given the IP address 134.141.7.7 and the mask 255.255.255.0, what are all the subnet

numbers if the same (static) mask is used for all subnets in this network?

The Class B network number is 134.141.0.0. The mask implies that the entire third octet,

and only that octet, comprises the subnet field. Essentially, the subnet numbers have the

same numbers in the network portion and the same (all binary 0) value in the host portion

of the number. Each individual subnet number has a unique value in the subnet portion of

the number.

The binary algorithm is shown in the table that follows. Refer to the section “Given a

Network Number and a Static Subnet Mask, What Are the Valid Subnet Numbers?” in

Chapter 5 for a review of the algorithm.

Answers to the Chapter 5 Q&A Section 735

29 Given the IP address 10.5.118.3 and the mask 255.255.255.0, what are all the subnet

numbers if the same (static) mask is used for all subnets in this network?

The Class A network number is 10.0.0.0. The mask implies that the entire second and

third octets, and only those octets, comprise the subnet field. Essentially, the subnet

numbers have the same numbers in the network portion and the same (all binary 0)

value in the host portion of the number. Each individual subnet number has a unique value

in the subnet portion of the number.

The binary algorithm is shown in the table that follows. Refer to the section “Given a

Network Number and a Static Subnet Mask, What Are the Valid Subnet Numbers?” in

Chapter 5 for a review of the algorithm.

Step 2 (only one line shown) 1000 0110 1000 1101

Step 3 (only one line shown) 1000 0110 1000 1101 0000 0000

Step 4 1000 0110 1000 1101 0000 0000 0000 0000 134.141.0.0

Step 5 1000 0110 1000 1101 0000 0001 0000 0000 134.141.1.0

Step 6 1000 0110 1000 1101 0000 0010 0000 0000 134.141.2.0

Step 6 1000 0110 1000 1101 0000 0011 0000 0000 134.141.3.0

Step 6 1000 0110 1000 1101 0000 0100 0000 0000 134.141.4.0

Step 6 1000 0110 1000 1101 0000 0101 0000 0000 134.141.5.0

Skipped a few for brevity

Step 6 1000 0110 1000 1101 1111 1111 0000 0000 134.141.255.0

Step 2 (only one line shown) 0000 1010

Step 3 (only one line shown) 0000 1010 0000 0000

Step 4 0000 1010 0000 0000 0000 0000 0000 0000 10.0.0.0

Step 5 0000 1010 0000 0000 0000 0001 0000 0000 10.0.1.0

Step 6 0000 1010 0000 0000 0000 0010 0000 0000 10.0.2.0

Step 6 0000 1010 0000 0000 0000 0011 0000 0000 10.0.3.0

Step 6 0000 1010 0000 0000 0000 0100 0000 0000 10.0.4.0

Step 6 0000 1010 0000 0000 0000 0101 0000 0000 10.0.5.0

Skipped a few for brevity

Step 6 0000 1010 1111 1111 1111 1111 0000 0000 10.255.255.0

736 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

30 Given the IP address 220.8.7.100 and the mask 255.255.255.240, what are all the subnet

numbers if the same (static) mask is used for all subnets in this network?

The Class C network number is 220.8.7.0. The mask implies that the bits 25 to 28, which

are the first 4 bits in the fourth octet, comprise the subnet field. Essentially, the subnet

numbers have the same numbers in the network portion and the same (all binary 0) value

in the host portion of the number. Each individual subnet number has a unique value in the

subnet portion of the number.

Refer to the section “Given a Network Number and a Static Subnet Mask, What Are the

Valid Subnet Numbers?” in Chapter 5 for a review of the algorithm.

31 Given the IP address 140.1.1.1 and the mask 255.255.255.248, what are all the subnet

numbers if the same (static) mask is used for all subnets in this network?

The Class B network number is 140.1.0.0. The mask implies that the bits 17 to 29, which

are all the bits in the third octet and the first 5 bits in the fourth octet, comprise the subnet

field. Essentially, the subnet numbers have the same numbers in the network portion and

the same (all binary 0) value in the host portion of the number. Each individual subnet

number has a unique value in the subnet portion of the number.

The binary algorithm is shown in the table that follows. Refer to the section “Given a

Network Number and a Static Subnet Mask, What Are the Valid Subnet Numbers?” in

Chapter 5 for a review of the algorithm.

Step 2 (only one line shown) 1101 1100 0000 1000 0000 0111

Step 3 (only one line shown) 1101 1100 0000 1000 0000 0111 0000

Step 4 1101 1100 0000 1000 0000 0111 0000 0000 220.8.7.0

Step 5 1101 1100 0000 1000 0000 0111 0001 0000 220.8.7.16

Step 6 1101 1100 0000 1000 0000 0111 0010 0000 220.8.7.32

Step 6 1101 1100 0000 1000 0000 0111 0011 0000 220.8.7.48

Step 6 1101 1100 0000 1000 0000 0111 0100 0000 220.8.7.64

Step 6 1101 1100 0000 1000 0000 0111 0101 0000 220.8.7.80

Skipped a few for brevity

Step 6 1101 1100 0000 1000 0000 0111 1111 0000 220.8.7.240

Step 2 (only one line shown) 1000 1100 0000 0001

Step 3 (only one line shown) 1000 1100 0000 0001 0000 0000 0000 0000

Step 4 1000 1100 0000 0001 0000 0000 0000 1000 140.1.0.0

Step 5 1000 1100 0000 0001 0000 0000 0001 1000 140.1.0.8

Step 6 1000 1100 0000 0001 0000 0000 0010 0000 140.1.0.16

Answers to the Chapter 5 Q&A Section 737

32 How many IP addresses could be assigned in each subnet of 134.141.0.0, assuming that

a mask of 255.255.255.0 is used? If the same (static) mask is used for all subnets, how

many subnets are there?

There will be 2hostbits, or 28 hosts per subnet, minus two special cases. The number of

subnets will be 2subnetbits, or 28, in this case. The chart that follows summarizes the related

information in the same manner as the “Foundation Topics” section of Chapter 5

described the binary algorithm to solve this type of problem.

33 How many IP addresses could be assigned in each subnet of 10.0.0.0, assuming that a

mask of 255.255.255.0 is used? If the same (static) mask is used for all subnets, how many

subnets are there?

There will be 2hostbits, or 28 hosts per subnet, minus two special cases. The number of

subnets will be 2subnetbits, or 216, in this case. The chart that follows summarizes the

related information in the same manner as the “Foundation Topics” section of Chapter 5

described the binary algorithm to solve this type of problem.

Step 6 1000 1100 0000 0001 0000 0000 0010 1000 140.1.0.24

Step 6 1000 1100 0000 0001 0000 0000 0011 0000 140.1.0.32

Step 6 1000 1100 0000 0001 0000 0000 0011 1000 140.1.0.40

Skipped a few for brevity

Step 6 1000 1100 0000 0001 1111 1111 1111 1000 140.1.255.248

Network and

Mask

Number of

Network Bits

Number of

Host Bits

Number of

Subnet Bits

Number of

Hosts per

Subnet

Number of

Subnets

134.141.0.0,

255.255.255.0

16 8 8 254 256

Network and

Mask

Number of

Network Bits

Number of

Host Bits

Number of

Subnet Bits

Number of

Hosts per

Subnet

Number of

Subnets

10.0.0.0,

255.255.255.0

8 8 16 254 65,536

738 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

34 How many IP addresses could be assigned in each subnet of 220.8.7.0, assuming that a

mask of 255.255.255.240 is used? If the same (static) mask is used for all subnets, how

many subnets are there?

There will be 2hostbits, or 24 hosts per subnet, minus two special cases. The number of

subnets will be 2subnetbits, or 24, in this case. The chart that follows summarizes the related

information in the same manner as the “Foundation Topics” section of Chapter 5

described the binary algorithm to solve this type of problem.

35 How many IP addresses could be assigned in each subnet of 140.1.0.0, assuming a mask

of 255.255.255.248 is used? If the same (static) mask is used for all subnets, how many

subnets are there?

There will be 2hostbits, or 23 hosts per subnet, minus two special cases. The number of

subnets will be 2subnetbits, or 213, in this case. The chart that follows summarizes the

related information in the same manner as the “Foundation Topics” section of Chapter 5

described the binary algorithm to solve this type of problem.

36 Create a minimal configuration enabling IP on each interface on a 2501 router (two

serial, one Ethernet). The NIC assigned you network 8.0.0.0. Your boss says you need at

most 200 hosts per subnet. You decide against using VLSM. Your boss also says to plan

your subnets so that you can have as many subnets as possible rather than allow for larger

subnets later. You decide to start with the lowest numerical values for the subnet number

you will use. Assume that point-to-point serial links will be attached to this router and that

RIP is the routing protocol.

router rip

network 8.0.0.0

interface ethernet 0

ip address 8.0.1.1 255.255.255.0

interface serial 0

ip address 8.0.2.1 255.255.255.0

interface serial 1

ip address 8.0.3.1 255.255.255.0

Network and

Mask

Number of

Network Bits

Number of

Host Bits

Number of

Subnet Bits

Number of

Hosts per

Subnet

Number of

Subnets

220.8.7.0,

255.255.255.

240

24 4 4 14 16

Network and

Mask

Number of

Network Bits

Number of

Host Bits

Number of

Subnet Bits

Number of

Hosts per

Subnet

Number of

Subnets

140.1.0.0 16 3 13 6 8096

Answers to the Chapter 5 Q&A Section 739

The zero subnet was not used in this solution. If desired, the ip subnet-zero global

command could have been used, enabling subnet 8.0.0.0 as well as the subnets 8.0.1.0,

8.0.2.0, and 8.0.3.0 to be used in the configuration.

37 In the previous question, what would be the IP subnet of the link attached to serial 0? If

another user wanted to answer the same question but did not have the enable password,

what command(s) might provide this router’s addresses and subnets?

The attached subnet is 8.0.2.0, 255.255.255.0. The show interface, show ip interface,

and show ip interface brief commands would supply this information, as would show ip

route. The show ip route command would show the actual subnet number instead of the

address of the interface.

38 Describe the question and possible responses in setup mode when a router wants to know

the mask used on an interface. How can the router derive the correct mask from the

information supplied by the user?

When using versions of the IOS before version 12.0, the question asks for the number of

subnet bits. The router creates a subnet mask with x more binary 1s than the default mask

for the class of network of which the interface’s IP address is a member. (x is the number

in the response.) “Number of subnet bits” from the setup question uses the definition that

there are three parts to an address—network, subnet, and host. The size of the network

field is based on the class of address; the interface’s address was typed in response to an

earlier setup question. The mask simply has binary 1s in the network and subnet fields,

and binary 0s in the host field.

With version 12.0 and beyond, setup prompts for the subnet mask in canonical decimal

format—for example, 255.255.255.0.

39 Name the three classes of unicast IP addresses and list their default masks, respectively.

How many of each type could be assigned to companies and organizations by the NIC?

Class A, B, and C, with default masks 255.0.0.0, 255.255.0.0, and 255.255.255.0,

respectively. 27 Class A networks are mathematically possible; 214 Class Bs are possible;

and 221 Class C networks are possible. There are two reserved network numbers in each

range.

40 Describe how TCP performs error recovery. What role do the routers play?

TCP numbers the first byte in each segment with a sequence number. The receiving host

uses the acknowledgment field in segments it sends back to acknowledge receipt of the

data. If the receiver sends an acknowledgment number that is a smaller number than the

sender expected, the sender believes that the intervening bytes were lost, so the sender

resends them. The router plays no role unless the TCP connection ends in the router—for

example, a telnet into a router. A full explanation is provided in the section, “Error

Recovery (Reliability)” in Chapter 5.

740 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

41 Define the purpose of an ICMP redirect message.

The ICMP redirect message enables a router to tell a host to use a different router than

itself because that other router has a better route to the subnet to which the host sent a

packet. The redirect also implies that the router sending the redirect, the host sending the

original packet, and the better router all have interfaces attached to this same subnet.

42 Define the purpose of the trace command. What type of messages is it sending, and what

type of ICMP messages is it receiving?

The trace command learns the current route to a destination address. It uses IP packets

with UDP as the transport layer protocol, with TTL values beginning at 1 and then

incrementing by 1 in successive messages. The result is that intervening routers will find

that the TTL is exceeded and will send ICMP “TTL exceeded” messages back to the

originator of the packet, which is the router where the trace command is being executed.

The source addresses of the “TTL exceeded” packets identify each router. By sending

other packets with TTL=2, then 3, and so on, eventually the packet is received by the host.

The host returns a “port unreachable” ICMP message, which lets the trace command

know that the endpoint host has been reached.

43 What does IP stand for? What does ICMP stand for? Which protocol is considered to be

Layer 3 equivalent when comparing TCP/IP to the OSI protocols?

Internet Protocol and Internet Control Message Protocol. Both protocols are considered

to be part of TCP/IP’s protocols equivalent to OSI Layer 3. ICMP is also considered a

Layer 3 protocol because it is used for control and management of IP. However, an IP

header precedes an ICMP header, so it is common to treat ICMP as another Layer 4

protocol, like TCP and UDP. ICMP does not provide services to a higher layer, so it is

really an adjunct part of Layer 3.

44 What causes the output from an IOS ping command to display “UUUUU?”

U is an indication that an unreachable message was received. The type of unreachable

message is not implied by the “U”.

45 Describe how to view the IP ARP cache in a Cisco router. Also describe the three key

elements of each entry.

show ip arp displays the IP ARP cache in a Cisco router. Each entry contains the IP

address, the MAC address, and the interface from which the information was learned. The

encapsulation type is also in the table entry.

46 How many hosts are allowed per subnet if the subnet mask used is 255.255.255.192? How

many hosts are allowed for 255.255.255.252?

255.255.255.192 has 6 bits of value 0, giving 26 hosts, minus the two reserved numbers,

for 62. The 255.255.255.252 mask leaves 22 hosts, minus the two reserved numbers, for

two hosts. 255.255.255.252 is often used on serial links when using VLSM; point-to-point

links need only two IP addresses.

Answers to the Chapter 5 Q&A Section 741

47 How many subnets could be created if using static length masks in a Class B network when

the mask is 255.255.255.224? What about when the mask is 255.255.252.0?

With a Class B network, the first 16 bits are network bits. With mask 255.255.255.224,

there are 5 host bits, leaving 11 subnet bits. 211 is 2048. If the zero and broadcast subnets

are avoided, 2046 are left. For the mask 255.255.252.0, there are 10 host bits, leaving 6

subnet bits. 26 is 64; if avoiding the two special cases, that leaves 62 possible subnets.

48 How many bytes comprise an IPX address?

Ten bytes. The network portion is 32 bits, and the node portion is 48 bits. The node part

conveniently is the same size as a LAN MAC address.

49 What do IPX and SPX stand for?

Internetwork Packet Exchange and Sequenced Packet Exchange.

50 Define encapsulation in the context of Cisco routers and Novell IPX.

Data link encapsulation describes the details of the data link header and trailer created by

a router as the result of routing a packet out an interface. Novell allows several options on

LANs. Encapsulation is used for any routed protocol on every router interface. Novell just

happens to have many options that are still in use, particularly on Ethernet.

51 Give an example of an IPX network mask used when subnetting.

There is no such thing as subnetting with IPX. This is an example of a question meant to

shake your confidence on the exam. Thoughts like, “I never read about subnetting IPX!”

can destroy your concentration. Be prepared for unusual questions or answers like this on

the exam.

52 Describe the headers used for two types of Ethernet encapsulation when using IPX.

Ethernet_II uses Ethernet version 2 headers (destination and source address, and

type field). Ethernet_802.3 uses an 802.3 header (destination and source address, and

length field). Ethernet_802.2 uses an 802.3 header and an 802.2 header (802.2 adds DSAP,

SSAP, and Control fields). Ethernet_SNAP uses an 802.3 header, an 802.2 header, and

then a SNAP header (SNAP adds OUI and protocol fields). The names in this answer use

Novell’s names. The corresponding keywords in the IOS are arpa, novell-ether, SAP, and

SNAP, respectively. The Novell names refer to the last header before the IPX header. See

Table 5-32 and Table 5-33, on pages 301 and 302, for a reference for all LAN

encapsulations.

53 Name the part of the NetWare protocol specifications that, like TCP, provides end-to-end

guaranteed delivery of data.

SPX (Sequenced Packet Exchange).

742 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

54 Name the command that lists all the SAP entries in a Cisco router.

show ipx servers. Many people remember that the command uses either the servers, or

server, or service, or sap keyword. The exam is likely to list those four keywords as the

four answers; spend a little time memorizing the commands summarized at the beginning

of each configuration section in most chapters of this book.

55 How many different values are possible for IPX network numbers?

232, or around four billion. Networks 0 and FFFFFFFF are reserved. The size of the

network number is one big reason why there is no need for subnetting IPX networks.

56 Create a configuration enabling IPX on each interface, with RIP and SAP enabled on each

as well, for a 2501 (two serial, one Ethernet) router. Use networks 100, 200, and 300 for

interfaces S0, S1, and E0, respectively. Choose any node values.

ipx routing 0200.1111.1111

interface serial 0

ipx network 100

interface serial 1

ipx network 200

interface ethernet 0

ipx network 300

The node part of the address was supplied in the IPX routing command so that the IPX

addresses are easily recognizable on the serial interfaces. This helps troubleshooting

because it will be easier to remember the IPX addresses used when pinging.

57 In the previous question, what would be the IPX address of the serial 0 interface? If

another user wanted to know but did not have the enable password, what command(s)

might provide this IPX address?

100.0200.1111.1111

show ipx interface

If you left off the node parameter on the IPX routing command in the previous question,

the IPX address would have a node number equal to the MAC address used on the Ethernet

interface.

58 What show command lists the IPX address(es) of interfaces in a Cisco router?

show ipx interface. The other show commands list only the IPX network numbers, not

the entire IPX addresses.

Answers to the Chapter 5 Q&A Section 743

59 How many Novell encapsulation types are valid in the IOS for Ethernet interfaces? What

about for FDDI and Token Ring?

There are four encapsulations for Ethernet, three encapsulations for FDDI, and two

encapsulations for Token Ring. Table 5-32 and Table 5-33, on pages 301 and 302, list the

different encapsulations.

60 A router is attached to an Ethernet LAN. Some clients on the LAN use Novell’s Ethernet_II

encapsulation, and some use Ethernet_802.3. If the only subcommand on Ethernet0 reads

ipx network 1, which of the clients are working? (All, Ethernet_II, or Ethernet_802.3?)

Just those with Ethernet_802.3 are working. The associated IOS keyword is novell-ether,

and this is the default IPX encapsulation. This question is just trying to test your recall of

the default encapsulation for Ethernet.

61 A router is attached to an Ethernet LAN. Some clients on the LAN use Novell’s

Ethernet_802.2 encapsulation, and some use Ethernet_SNAP. Create a configuration that

allows both types of clients to send and receive packets through this router.

interface ethernet 0

ipx network 1 encapsulation sap

ipx network 2 encapsulation snap secondary

Subinterfaces could also have been used instead of secondary IPX networks.

62 True or false: Up to 64 IPX networks can be used on the same Ethernet by using the IPX

secondary address feature. If true, describe the largest number that is practically needed.

If false, what is the maximum number that is legal on an Ethernet?

False. Only one network per encapsulation is allowed. Because four Ethernet

encapsulations can be used with IPX, four IPX networks are supported. Using the same

logic, only three networks are allowed on FDDI, and two on Token Ring.

63 In the ipx network 11 interface subcommand, does the IOS assume that 11 is binary, octal,

decimal, or hexadecimal? What is the largest valid value that could be configured instead

of 11?

All IPX network numbers are considered to be hexadecimal by the IOS. The largest value

is FFFFFFFE, with FFFFFFFF being reserved as the broadcast network.

64 What IOS IPX encapsulation keyword implies use of an 802.2 header but no SNAP

header? On what types of interfaces is this type of encapsulation valid?

SAP encapsulation on the IOS implies use of the 802.2 header immediately before the IPX

packet. SAP and SNAP are valid on Ethernet, FDDI, and Token Ring. SAP also refers to

the field in the 802.2 header that is used to identify IPX as the type of packet that follows

the 802.2 header.

744 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

65 Name the two commands typically used to create a default gateway for a router.

The ip default-gateway command and the ip route 0.0.0.0 0.0.0.0 command. Both

accomplish the goal of having the router use a known route as the default for packets that

are not matched in the routing table. The ip route 0.0.0.0 0.0.0.0 uses the fact that network

0.0.0.0 is used by the IOS to represent the default network.

66 Assume that subnets of network 10.0.0.0 are in the IP routing table in a router but that no

other network and their subnets are known, except that there is also a default route

(0.0.0.0) in the routing table. A packet destined for 192.1.1.1 arrives at the router. What

configuration command determines whether the default route will be used in this case?

If the command ip classless is configured, the packet is routed using the default route. If

no ip classless is configured, then the packet will be discarded.

67 Assume that subnets of network 10.0.0.0 are in the IP routing table in a router but that no

other network and their subnets are known, except that there is also a default route

(0.0.0.0) in the routing table. A packet destined for 10.1.1.1 arrives at the router, but

there is no known subnet of network 10 that matches this destination address. What

configuration command determines whether the default route will be used in this case?

The packet will be routed using the default route, regardless of other configuration

commands. In this particular scenario, where the Class A, B, or C network is known, there

is no match for the destination in the known subnets, and a default exists, the default must

be used.

68 What does the acronym CIDR stand for? What is the original purpose of CIDR?

Classless Interdomain Routing is the concept of grouping multiple sequential network

numbers into a single routing table entry, for the purpose of improving scalability of

Internet routers by reducing the size of the IP routing table.

69 Define the term private addressing as defined in RFC 1918.

Some hosts will never need to communicate with other hosts across the Internet. For such

hosts, assignment of IP addresses from registered networks wastes IP addresses. To

conserve IP addresses, a set of network numbers, called private addresses, has been

reserved and can be used in these cases to help conserve IP addresses for use over the

Internet.

70 Define the acronym NAT and the basics of its operation.

Network Address Translation is a mechanism for allowing hosts with private addresses or

addresses that conflict with IP addresses from a registered network to communicate with

hosts over the Internet. The basic operation involves the NAT router changing the IP

addresses in packets to and from these hosts so that the only type of IP address used in

flows through the Internet uses addresses that are legitimately registered.

Answers to the Chapter 6 “Do I Know This Already?” Quiz 745

71 Which requires more lines of source code, FTP or TFTP? Justify your answer.

TFTP requires less code. It was designed to be simple (that is, trivial), with the small

amount of memory needed to load the code ranking as an advantage to using TFTP. FTP

is much more robust, with many more features and more code.

72 Does FTP or TFTP perform error recovery? If so, describe the basics of how they perform

error recovery.

Both FTP and TFTP perform error recovery. FTP relies on TCP, whereas TFTP performs

application layer recovery one block of data at a time.

73 Describe the process used by IP routers to perform fragmentation and reassembly of

packets.

When a packet must be forwarded but the packet is larger than the maximum transmission

unit (MTU) size for the outgoing interface, the router fragments the packet, as long as the

Don’t Fragment bit is not set. No IP router reassembles the fragments; fragments are

reassembled at the final destination host.

74 How many TCP segments are exchanged to establish a TCP connection? How many are

required to terminate a TCP connection?

A three-way connection establishment sequence is used, and a four-flow connection

termination sequence is used.

75 How many Class B-style networks are reserved by RFC 1918 private addressing?

Sixteen Class B networks are reserved for use as private networks in RFC 1918, networks

172.16.0.0 to 172.31.0.0.

Answers to the Chapter 6 “Do I Know This Already?” Quiz

1 Define what split horizon means to the contents of a routing update. Does this apply to

both the distance vector algorithm and the link-state algorithm?

Routing updates sent out an interface do not contain routing information about subnets

learned from updates entering the same interface. Split horizon is used only by distance

vector routing protocols.

2 Does IPX RIP use Split Horizon?

Split horizon means that routes learned by receiving updates on interface x will not be

advertised in the routing updates sent out interface x. IPX RIP uses split horizon by

default. SAP also uses split horizon concepts.

746 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

3 Describe the purpose and meaning of route poisoning.

Route poisoning is the distance vector routing protocol feature in which a newly bad route

is advertised with an infinite metric. Routers receiving this routing information then can

mark the route as a bad route immediately. The purpose is to prevent routing loops.

4 Describe the meaning and purpose of triggered updates.

A triggered update is the routing protocol feature in which an update is sent immediately

when new routing information is learned rather than waiting on a timer to complete before

sending another routing update.

5 Write down the steps you would take to migrate from RIP to IGRP in a router whose

current RIP configuration includes only router rip, followed by a network 10.0.0.0

command.

Issue the following commands in configuration mode:

router igrp 5

network 10.0.0.0

no router rip

If RIP still was configured, IGRP’s routes would be chosen over RIP. The IOS considers

IGRP to be a better source of routing information, by default, as defined in the

administrative distance setting (default 120 for RIP, 100 for IGRP).

6 How does the IOS designate a subnet in the routing table as a directly connected network?

What about a route learned with IGRP or a route learned with RIP?

The show ip route command lists routes with a designator in the left side of the command

output. C represents connected routes, I is used for IGRP, and R represents routes derived

from RIP.

7 From a router’s user mode, without using debugs or privileged mode, how can you

determine what routers are sending you routing updates?

The show ip protocol command output lists the routing sources—the IP addresses of

routers sending updates to this router. Knowing how to determine a fact without looking

at the configuration will better prepare you for the exam. Also, the show ip route

command lists next-hop router IP addresses. The next-hop routers listed identify the

routers that are sending routing updates.

8 If the command router rip followed by network 10.0.0.0, with no other network

commands, was configured in a router that has an Ethernet0 interface with IP address

168.10.1.1, would RIP send updates out Ethernet0?

No. There must be a network statement for network 168.10.0.0 before RIP will advertise

out that interface.

Answers to the Chapter 6 “Do I Know This Already?” Quiz 747

9 Describe the metric(s) used by IPX RIP in a Cisco router.

The primary metric is a counter of timer ticks. If two routes to the same network tie with

the ticks metric, the hop count is considered. Ticks are increments of 1/18ths of a second.

The number of ticks is not measured but is set with defaults of 1 on LAN interfaces and 6

on WAN interfaces. The IPX delay interface subcommand overrides the defaults.

10 What does GNS stand for? Who creates GNS requests, and who creates GNS replies?

GNS stands for Get Nearest Server. Clients create the request, which is a broadcast

looking for a nearby server. Servers and routers reply, based on their SAP table, with the

IPX address of a server whose RIP metric is low.

11 If Serial0 has a bandwidth 1544 interface subcommand and Serial1 has a bandwidth 56

interface subcommand, what metric will IPX RIP associate with each interface?

The IOS is unaffected by an interface’s bandwidth when considering IPX RIP metrics;

ticks will default to 6 for any serial interface, regardless of bandwidth setting.

12 What show commands list IPX RIP metric values in a Cisco router?

show ipx route

show ipx servers

This is a trick question. The services listed by the show ipx servers command also contain

a reference to the RIP metrics; the information is handy when looking for good servers for

a GNS reply.

13 Define the term integrated multiprotocol routing in the context of the Cisco IOS and Novell

IPX.

Integrated multiprotocol routing means that multiple routed protocols use a common

routing protocol, which consolidates routing updates. EIGRP is the only such routing

protocol covered in the recommended training path for CCNAs; EIGRP exchanges

routing information for IP, IPX, and AppleTalk. IGRP and Integrated IS-IS support both

IP and OSI CLNS routable protocols.

14 What routing protocols support integrated multiprotocol routing?

EIGRP supports integrated multiprotocol routing for IP, IPX, and AppleTalk. IGRP and

Integrated IS-IS support integrated multiprotocol routing for IP and OSI CLNS.

748 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

15 Identify reasons for using tunneling.

The four reasons outlined in this text are these:

To allow multiprotocol traffic to flow over an IP backbone

To support VPNs

To overcome discontiguous network problems

To overcome the shortcoming of some routing protocols with low maximum metric

limitations

Other reasons may also be valid because this question is somewhat subjective.

16 What tunneling transport protocol is used by the IOS?

To answer this question, you must understand the term transport protocol. Transport

protocol refers to the protocol that encapsulates the data and transports the data to the

other side of the tunnel. There is only one transport protocol in the IOS: IP.

Answers to the Chapter 6 Q&A Section

1 What type of routing protocol algorithm uses a holddown timer? What is its purpose?

Distance vector. Holddown helps prevent counting to infinity problems. Holddown is

explained in detail in the section “Distance Vector Routing Protocols” in Chapter 6. After

hearing that a route has failed, a router waits for holddown time before believing any new

information about the route.

2 Define what split horizon means to the contents of a routing update. Does this apply to

both the distance vector algorithm and the link state algorithm?

Routing updates sent out an interface do not contain routing information about subnets

learned from updates entering the same interface. Split horizon is used only by distance

vector routing protocols.

3 Write down the steps you would take to migrate from RIP to IGRP in a router whose

current RIP configuration includes only router rip, followed by a network 10.0.0.0

command.

Issue the following commands in configuration mode:

router igrp 5

network 10.0.0.0

no router rip

Answers to the Chapter 6 Q&A Section 749

If RIP still were configured, IGRP’s routes would be chosen over RIP. The IOS

considers IGRP to be a better source of routing information by default, as defined in

the administrative distance setting (default 120 for RIP, 100 for IGRP).

4 How does the IOS designate a subnet in the routing table as a directly connected network?

What about a route learned with IGRP and a route learned with RIP?

The show ip route command lists routes with a designator in the left side of the command

output. C represents connected routes, I is used for IGRP, and R represents RIP-derived

routes.

5 Create a configuration for IGRP on a router with these interfaces and addresses: e0 using

10.1.1.1, e1 using 224.1.2.3, s0 using 10.1.2.1, and s1 using 199.1.1.1. Use process ID 5.

router igrp 5

network 10.0.0.0

network 199.1.1.0

If you noticed that 224.1.2.3 is not a valid Class A, B, or C address, you get full credit.

A new address will be needed for Ethernet 1, with a matching network command.

6 Create a configuration for IGRP on a router with these interfaces and addresses: to0

using 200.1.1.1, e0 using 128.1.3.2, s0 using 192.0.1.1, and s1 using 223.254.254.1.

router igrp 1

network 200.1.1.0

network 128.1.0.0

network 192.0.1.0

network 223.254.254.0

Because four different networks are used, four network commands are required. If you

noticed that the question did not specify the process ID (1, in this sample) but configured

one, you get full credit. A few of these network numbers are used in examples; memorize

the range of valid A, B, and C network numbers.

7 From a router’s user mode, without using debugs or privileged mode, how can you

determine what routers are sending you routing updates?

The show ip protocol command output lists the routing sources, the IP addresses of

routers sending updates to this router. Knowing how to determine a fact without looking

at the configuration will better prepare you for the exam. Also, the show ip route

command lists next-hop router IP addresses. The next-hop routers listed identify the

routers that are sending routing updates.

8 How often does IPX RIP send routing updates, by default?

Every 60 seconds.

750 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

9 Describe the metric(s) used by IPX RIP in a Cisco router.

The primary metric is a counter of timer ticks. If two routes to the same network tie with

the ticks metric, the hop count is considered. Ticks are increments of 1/18ths of a second.

The number of ticks is not measured but is set with defaults of 1 on LAN interfaces and 6

on WAN interfaces. The IPX delay interface subcommand overrides the defaults.

10 Does IPX RIP use Split Horizon?

Split horizon means that routes learned via updates received on interface x will not be

advertised in routing updates sent out interface x. IPX RIP uses split horizon by default.

SAP also uses split horizon concepts.

11 True or false: RIP and SAP information is sent in the same packets. If true, can only one

of the two be enabled in a router? If false, what commands enable each protocol globally

in a router?

False. Only one command is used, and it enables both: ipx routing. Neither type of update

is sent unless IPX is also enabled on the interface with the ipx network interface

subcommand.

12 What does GNS stand for? Who creates GNS requests, and who creates GNS replies?

GNS stands for Get Nearest Server. Clients create the request, which is a broadcast

looking for a nearby server. Servers and routers reply, based on their SAP table, with the

IPX address of a server whose RIP metric is low.

13 Define the term separate multiprotocol routing in the context of the Cisco IOS and Novell

IPX.

Separate multiprotocol routing means that each routed protocol, such as IP, IPX, or

AppleTalk, uses a separate set of routing protocols, which each send separate routing

updates to advertise routing information.

14 How often does a router send SAP updates, by default?

Every 60 seconds.

15 If Serial0 has a bandwidth 1544 interface subcommand and Serial1 has a bandwidth 56

interface subcommand, what metric will IPX RIP associate with each interface?

The IOS is unaffected by an interface’s bandwidth when considering IPX RIP metrics;

ticks will default to 6 for any serial interface, regardless of bandwidth setting.

16 True or false: Routers forward SAP packets as they arrive but broadcast SAP packets on

interfaces in which no SAP packets have been received in the last 60 seconds.

False. Routers never forward SAP packets, but they instead read the information in the

updates, update their own SAP tables, and then discard the packets. Routers also send SAP

updates every update timer (default 60 seconds), regardless of what other routers may do.

Answers to the Chapter 6 Q&A Section 751

This sample question is another case of tricky wording that may be used to make sure you

know the topic.

17 What show commands list IPX RIP metric values in a Cisco router?

show ipx route

show ipx servers

This is a trick question. The services listed by the show ipx servers command also contain

a reference to the RIP metrics; the information is handy when looking for good servers for

a GNS reply.

18 Define the term integrated multiprotocol routing in the context of the Cisco IOS and Novell

IPX.

Integrated multiprotocol routing means that multiple routed protocols use a common

routing protocol, which consolidates routing updates. EIGRP is the only such routing

protocol covered in the recommended training path for CCNAs; EIGRP exchanges

routing information for IP, IPX, and AppleTalk. IGRP and Integrated IS-IS support both

IP and OSI CLNS routable protocols.

19 If the commands router rip and network 10.0.0.0, with no other network commands, were

configured in a router that has an Ethernet0 interface with IP address 168.10.1.1, would

RIP send updates out Ethernet0?

No. There must be a network statement for network 168.10.0.0 before RIP will advertise

out that interface. The network command simply selects the connected interfaces on

which to send and receive updates.

20 If the commands router igrp 1 and network 10.0.0.0 were configured in a router that has

an Ethernet0 interface with IP address 168.10.1.1, would IGRP advertise about

168.10.0.0?

No. There must be a network statement for network 168.10.0.0 before IGRP will advertise

about that directly connected subnet.

21 If the commands router igrp 1 and network 10.0.0.0 were configured in a router that has

an Ethernet0 interface with IP address 168.10.1.1, mask 255.255.255.0, would this router

have a route to 168.10.1.0?

Yes. The route will be in the routing table because it is a directly connected subnet, not

because of any action by IGRP.

22 What routing protocols support integrated multiprotocol routing?

EIGRP supports integrated multiprotocol routing for IP, IPX, and AppleTalk. IGRP and

Integrated IS-IS support integrated multiprotocol routing for IP and OSI CLNS.

752 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

23 Must IGRP metrics for multiple routes to the same subnet be exactly equal for the multiple

routes to be added to the routing table? If not, how close in value do the metrics have

to be?

IGRP (and EIGRP) use a concept called variance, which represents how close the metrics

to the same subnet must be before the metrics are considered equal. The variance router

subcommand is used to set the value.

24 When using RIP, what configuration command controls the number of equal-cost routes

that can be added to the routing table at the same time? What is the maximum number of

equal-cost routes to the same destination that can be included in the IP routing table at

once?

The ip maximum-paths x router subcommand is used in RIP configuration mode to set

the number. The maximum is 6, and the default is 4.

25 When using IGRP, what configuration command controls the number of equal-cost routes

that can be added to the routing table at the same time? What is the maximum number of

equal-cost routes to the same destination that can be included in the IP routing table at

once?

The ip maximum-paths x router subcommand is used in IGRP configuration mode to set

the number. The maximum is 6, and the default is 4.

26 What feature supported by RIP-2 allows it to support variable-length subnet masks

(VLSM)?

The association and transmission of mask information with each route allows VLSM

support with any routing protocol, RIP-2 included.

27 Name three features of RIP-2 that are not features of RIP-1.

The features included in RIP-2 but not in RIP-1 include: transmission of subnet mask with

routes, authentication, next-hop router IP address in routing update, external route tags,

and multicast routing updates.

28 What configuration commands are different between a router configured for RIP-1 and a

router configured for only support of RIP-2?

The router rip and network commands would be identical. The RIP-2 router would

require a version 2 router subcommand to enable RIP-2.

29 Identify reasons for using tunneling.

The four reasons outlined in this text are: to allow multiprotocol traffic to flow over an IP

backbone, to support VPNs, to overcome discontiguous network problems, and to

overcome the shortcoming of some routing protocols with low maximum metric

limitations. Other reasons also might be valid because this question is somewhat

subjective.

Answers to the Chapter 6 Q&A Section 753

30 What tunneling transport protocol is used by the IOS?

To answer this question, you must know what the term transport protocol refers to.

Transport protocol refers to the protocol that both encapsulates the data and transports the

data to the other side of the tunnel. This is a trick question—there is only one transport

protocol in the IOS: IP.

31 Define the tunneling terms transport protocol, encapsulation protocol, and passenger

protocol.

The term transport protocol refers to the protocol that both encapsulates the data and

transports the data to the other side of the tunnel. The encapsulation protocol follows the

transport protocol; its main purpose is to have a type field to identify the type of packet

that is encapsulated. This encapsulated protocol is called the passenger protocol because

it is being carried to the other end of the tunnel.

32 List the Interior IP routing protocols that have auto summarization enabled by default.

Which of these protocols allows auto summary to be disabled using a configuration

command?

RIP-1, IGRP, EIGRP, and RIP-2 all have auto summarization enabled by default. EIGRP

and RIP-2 can disable this feature.

33 List the interior IP routing protocols that support route aggregation.

EIGRP and OSPF support route aggregation.

34 Identify the command that would list all IP routes learned via RIP.

The show ip route rip command would list only RIP-learned routes.

35 Identify the command(s) that would list all IP routes in network 172.16.0.0.

show ip route 172.16.0.0 lists all the routes in 172.16.0.0. Also, the show ip route

list 1 command would list routes in network 172.16.0.0, assuming that the following

configuration command also existed: access-list 1 permit 172.16.0.0 0.0.255.255.

36 Assume that several subnets of network 172.16.0.0 exist in a router’s routing table. What

must be true about those routes so that the output of the show ip route command lists mask

information only on the line that lists network 172.16.0.0, but not show mask information

on each route for each subnet?

If all the subnets of 172.16.0.0 use the same mask, the output of the show ip route

command lists only the mask in the heading line for the network. If VLSM were in use,

then each route for each subnet would reflect the mask used in that case.

37 True or false: Distance vector routing protocols learn routes by transmitting routing

updates.

False. Routes are learned by receiving routing updates from neighboring routers.

754 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

38 Assume that a router is configured to allow only one route in the routing table to each

destination network. If more than one route to a particular subnet is learned, and if each

route has the same metric value, which route is placed into the routing table if the routing

protocol uses distance vector logic?

In this scenario, the first route learned is placed into the table. If that route is removed at

a later time, the next routing update received after the original route has been removed is

added to the routing table.

39 Describe the purpose and meaning of route poisoning.

Route poisoning is the distance vector routing protocol feature in which a newly bad route

is advertised with an infinite metric. Routers receiving this routing information then can

mark the route as a bad route immediately. The purpose is to prevent routing loops.

40 Describe the meaning and purpose of triggered updates.

A triggered update is the routing protocol feature in which an update is sent immediately

when new routing information is learned rather than waiting on a timer to complete before

sending another routing update.

Answers to the Chapter 7 “Do I Know This Already?” Quiz

1 Configure a numbered IP access list that would stop packets from subnet 134.141.7.0,

255.255.255.0, from exiting serial 0 on some router. Allow all other packets.

access-list 4 deny 134.141.7.0 0.0.0.255

access-list 4 permit any

interface serial 0

ip access-group 4

The first access list statement denied packets from that subnet. The other statement is

needed because of the default action to deny packets not explicitly matched in an access

list statement.

2 How would a user who does not have the enable password find out what access lists have

been configured and where they are enabled?

The show access-list command lists all access lists. The show ip interfaces and show ipx

interfaces commands identify interfaces on which the access lists are enabled.

3 How many IP extended access-list commands are required to check a particular port

number on all IP packets?

Two statements are required. If the protocol type IP is configured, the port number is not

allowed to be checked. So, the TCP or UDP protocol type must be used to check the port

numbers. Therefore, if port 25 needs to be checked for both TCP and UDP, two statements

are needed: one for TCP and one for UDP.

Answers to the Chapter 7 “Do I Know This Already?” Quiz 755

4 True or false: If all IP or IPX access list statements in a particular list define the deny

action, then the default action is to permit all other packets.

False. The default action at the end of any IP or IPX access list is to deny all other packets.

5 How many IP access lists of either type can be active on an interface at the same time?

Only one IP access list per interface, per direction. In other words, one inbound and one

outbound are allowed, but no more.

6 In a standard named IP access list with three statements, a no version of the first statement

is issued in configuration mode. Immediately following, another access list configuration

command is added for the same access list. How many statements are in the list now, and

in what position is the newly added statement?

Three statements will remain in the list, with the newly added statement at the end of the

list. The no deny | permit. . . command deletes only that single named access list

subcommand in named lists. However, when the command is added again, it cannot be

placed anywhere except at the end of the list.

7 In an IPX access list with five statements, a no version of the third statement is issued in

configuration mode. Immediately following, another access list configuration command is

added for the same access list. How many statements are in the list now, and in what

position is the newly added statement?

Only one statement will remain in the list: the newly added statement. The no access-list

x command deletes the entire access list, even if all the parameters in an individual

command are typed in when issuing the no version of the command.

8 Name all the items that a SAP access list can examine to make a match.

Network

IPX address (network and node)

Subsets of the first two using a wildcard

Service type

Server name

Many people would consider checking the network number and checking a full IPX

address as the same item. These functions are listed separately here only to make sure you

recall that both variations are possible.

9 Name all the items that a standard IPX access list can examine to make a match.

Source network

Source IPX address (network and node)

Subset of node part of address (using mask)

756 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

Destination network

Destination IPX address (network and node)

Subset of node part of IPX address (using mask)

Many people would consider checking the network number and checking a full IPX

address as the same item. These functions are listed separately here only to make sure you

recall that both variations are possible. Also, the mask can be used only if the full IPX

address is specified and masks out only parts of the node part of the address.

10 Name all the items that a named extended IPX access list can examine to make a match.

Protocol

Source socket

Source network

Source IPX address (network and node)

Subset of entire address (using mask)

Destination socket

Destination network

Destination IPX address (network and node)

Subset of entire IPX address (using mask)

The same matching criteria are used for numbered extended IPX access lists as that used

for named extended IPX access lists.

11 Configure a SAP numbered access list so that SAPs 4 to 7 are matched, in network BEEF,

with a single command.

You cannot match more than one SAP with a single access list statement. To match four

separate SAP values, four separate access list statements are required.

12 What command could someone who has only the Telnet password, not the enable

password, use to find out what IPX access lists are enabled on which interfaces?

The show ipx interfaces command lists all interfaces and details about each interface,

including the name and number of all standard, extended, and SAP access lists enabled on

each interface.

Answers to the Chapter 7 Q&A Section 757

Answers to the Chapter 7 Q&A Section

1 Configure a numbered IP access list that would stop packets from subnet 134.141.7.0,

255.255.255.0, from exiting serial 0 on some router. Allow all other packets.

access-list 4 deny 134.141.7.0 0.0.0.255

access-list 4 permit any

interface serial 0

ip access-group 4

The first access list statement denied packets from that subnet. The other statement is

needed because the default action to deny packets is not explicitly matched in an access

list statement.

2 Configure an IP access list that allows only packets from subnet 193.7.6.0, 255.255.255.0,

going to hosts in network 128.1.0.0 and using a Web server in 128.1.0.0, to enter serial 0

on some router.

access-list 105 permit tcp 193.7.6.0 0.0.0.255

128.1.0.0 0.0.255.255 eq www

!

interface serial 0

ip access-group 105 in

A “deny all” is implied at the end of the list.

3 How would a user who does not have the enable password find out what access lists have

been configured and where they are enabled?

The show access-list command lists all access lists. The show ip interfaces and show ipx

interfaces commands identify interfaces on which the access lists are enabled.

4 Configure and enable an IP access list that would stop packets from subnet 10.3.4.0/24

from getting out serial interface S0 and that would stop packets from 134.141.5.4 from

entering S0. Permit all other traffic.

access-list 1 deny 10.3.4.0 0.0.0.255

access-list 1 permit any

access-list 2 deny 134.141.5.4

access-list 2 permit any

interface serial 0

ip access-group 1

ip access-group 2 in

758 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

5 Configure and enable an IP access list that would allow packets from subnet 10.3.4.0/24,

to any Web server, to get out serial interface S0. Also, allow packets from 134.141.5.4

going to all TCP-based servers using a well-known port to enter serial 0. Deny all other

traffic.

access-list 101 permit tcp 10.3.4.0 0.0.0.255 any eq www

access-list 102 permit tcp host 134.141.5.4 any lt 1023

interface serial 0

ip access-group 101 out

ip access-group 102 in

Two extended access lists are required. List 101 permits packets in the first of the two

criteria, in which packets exiting S0 are examined. List 102 permits packets for the second

criterion, in which packets entering S0 are examined.

6 Create an IPX packet filter to prevent packets from entering Serial0, except for packets

from address 500.0000.0000.0001 destined for any node in network 4.

access-list 800 permit 500.0000.0000.0001 4

interface serial0

ipx access-group 800 in

A “deny all else” is implied at the end of the list.

7 What services use IPX socket 4? What about Socket 7?

None. This is a trick question. SAP types 4 and 7 represent file and print services,

respectively. However, sockets are different, and there is no correlation between SAP

service types and sockets. The message: Read all the words in the question! Some

questions are purposefully designed to ensure that you know what each term means.

8 Create a configuration to add a SAP access list to filter all print services (SAP 7) from

being advertised out a router’s serial 0 and serial1 interfaces.

access-list 1000 deny -1 7

access-list 1000 permit -1

interface serial 0

ipx output-sap-filter 1000

interface serial1

ipx output-sap-filter 1000

In the two access-list 1000 commands, the –1 represents the wildcard meaning “any

network.” SAP type 7 is for print services; the first statement matches those services and

denies those services. However, other proprietary print solutions could use a different SAP

type. This access list matches only for the standard SAP type for printers.

Answers to the Chapter 7 Q&A Section 759

9 Name all the items that a SAP access list can examine to make a match.

Network

IPX address (network and node)

Subnets of the first two using a wildcard

Service type

Server name

Many people would consider checking the network number and checking a full IPX

address as the same item. These functions are listed separately here only to make sure you

recall that both variations are possible.

10 Can standard IP access lists be used to check the source IP address when enabled with

the ip access-group 1 in command, and can they check the destination IP addresses when

using the ip access-group 1 out command?

No. Standard IP access lists check only the source IP address, regardless of whether the

packets are checked when inbound or outbound.

11 How many IP extended access-list commands are required to check a particular port

number on all IP packets?

Two statements are required. If the protocol type IP is configured, the port number is not

allowed to be checked. So, the TCP or UDP protocol type must be used to check the port

numbers. Therefore, if port 25 needs to be checked for both TCP and UDP, two statements

are needed: one for TCP and one for UDP.

12 True or false: If all IP or IPX access list statements in a particular list define the deny

action, then the default action is to permit all other packets.

False. The default action at the end of any IP or IPX access list is to deny all other packets.

13 In an IPX access list with five statements, a no version of the third statement is issued in

configuration mode. Immediately following, another access list configuration command is

added for the same access list. How many statements are in the list now, and in what

position is the newly added statement?

Only one statement will remain in the list: the newly added statement. The no access-list

x command deletes the entire access list, even if all the parameters in an individual

command are typed in when issuing the no version of the command.

760 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

14 How many IP access lists of either type can be active on an interface at the same time?

Only one IP access list per interface, per direction. In other words, one inbound and one

outbound are allowed, but no more.

For questions 16 through 18, assume that all parts of the network in Figure A-1 are up and

working. IGRP is the IP routing protocol in use. Answer the questions following Example

A-1, which contains an additional configuration in the Mayberry router.

Answers to the Chapter 7 Q&A Section 761

15 Describe the types of packets that this filter would discard, and tell at what point they

would be discarded.

Only packets coming from Andy exit Mayberry’s Serial 0 interface. Packets originating

inside the Mayberry router—for example, a ping command issued from Mayberry, will

work because the IOS will not filter packets originating in that router. Opie is still out of

luck—he’ll never get (a packet) out of Mayberry!

16 Does the access list in Example A-1 stop packets from getting to Web server Governor?

Why or why not?

Packets from Andy can get to Web server Governor; packets from Mount Pilot can be

delivered to Governor if the route points directly from Mount Pilot to Raleigh so that the

packets do not pass through Mayberry. Therefore, the access list, as coded, stops only

hosts other than Andy on the Mayberry Ethernet from reaching Web server Governor.

17 Referring to Figure A-1, create and enable access lists so that access to Web server

Governor is allowed from hosts at any site, but so that no other access to hosts in Raleigh

is allowed.

! this access-list is enabled on the Raleigh router

access-list 130 permit tcp 180.3.5.0 0.0.0.255 host 144.155.3.99 eq www

access-list 130 permit tcp 180.3.7.0 0.0.0.255 host 144.155.3.99 eq www

!

interface serial 0

ip access-group 130 in

This access list performs the function, but it also filters IGRP updates as well. That is part

of the danger with inbound access lists; with outbound lists, the router will not filter

packets originating in that router. With inbound access lists, all packets entering the

interface are examined and could be filtered. An IGRP protocol type is allowed in the

extended access-list command; therefore, IGRP updates easily can be matched. The

command access-list 130 permit igrp any performs the needed matching of IGRP

updates, permitting those packets. (This command would need to appear before any

statements in list 130 that might match IGRP updates.)

Example A-1 Access List at Mayberry

access-list 44 permit 180.3.5.13 0.0.0.0

!

interface serial 0

ip access-group 44

762 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

18 Name all the items that a standard IPX access list can examine to make a match.

Source network

Source IPX address (network and node)

Subset of node part of address (using mask)

Destination network

Destination IPX address (network and node)

Subset of node part of IPX address (using mask)

Many people would consider checking the network number and checking a full IPX

address as the same item. These functions are listed separately here only to make sure you

recall that both variations are possible. Also, the mask can be used only if the full IPX

address is specified and masks out only parts of the node part of the address.

19 Name all the items that an extended IPX access list can examine to make a match.

Protocol

Source socket

Source network

Source IPX address (network and node)

Subset of entire address (using mask)

Destination socket

Destination network

Destination IPX address (network and node)

Subset of entire IPX address (using mask)

Many people would consider checking the network number and checking a full IPX

address as the same item. These functions are listed separately here only to make sure you

recall that both variations are possible. Also, the mask can be used only if the full IPX

address is specified and masks out only parts of the node part of the address.

20 Name all the items that a standard IP access list can examine to make a match.

Source IP address

Subset of entire source address (using mask)

Answers to the Chapter 7 Q&A Section 763

21 Name all the items that an extended IP access list can examine to make a match.

Protocol type

Source port

Source IP address

Subset of entire source address (using mask)

Destination port

Destination IP address

Subset of entire destination address (using mask)

22 True or false: When using extended IP access lists for restricting VTY access, the matching

logic is a best match of the list, rather than a first match in the list.

False. Access list logic is always first match for any application of the list.

23 In a standard numbered IP access list with three statements, a no version of the first

statement is issued in configuration mode. Immediately following, another access list

configuration command is added for the same access list. How many statements are in the

list now, and in what position is the newly added statement?

Only one statement will remain in the list: the newly added statement. The no access-list

x command deletes the entire access list, even if all the parameters in an individual

command are typed in when issuing the no version of the command.

24 In a standard named IP access list with three statements, a no version of the first statement

is issued in configuration mode. Immediately following, another access list configuration

command is added for the same access list. How many statements are in the list now, and

in what position is the newly added statement?

Three statements will remain in the list, with the newly added statement at the end of the

list. The no deny | permit. . . command deletes only that single named access list

subcommand in named lists. However, when the command is added again, it cannot be

placed anywhere except at the end of the list.

25 In an extended named IPX access list with five statements, a no version of the second

statement is issued in configuration mode. Immediately following, another access list

configuration command is added for the same access list. How many statements are in the

list now, and in what position is the newly added statement?

Five statements will remain in the list, with the newly added statement at the end of the

list. The no deny | permit. . . command deletes only that single named access list

subcommand in named lists. However, when the command is added again, it cannot be

placed anywhere except at the end of the list.

764 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

26 Name all the items that a named extended IPX access list can examine to make a match.

Protocol

Source socket

Source network

Source IPX address (network and node)

Subset of entire address (using mask)

Destination socket

Destination network

Destination IPX address (network and node)

Subset of entire IPX address (using mask)

The same matching criteria are used for numbered extended IPX access lists as are used

for named extended IPX access lists.

27 Name all the items that a named standard IP access list can examine to make a match.

Source IP address

Subset of entire source address (using mask)

Named standard IP access lists match the same items that numbered IP access lists match.

28 Configure a SAP numbered access list so that SAPs 4 through 7 are matched in network

BEEF with a single command.

You cannot match more than one SAP with a single access list statement. To match four

separate SAP values, four separate access list statements are required.

29 Configure a named IP access list that would stop packets from subnet 134.141.7.0,

255.255.255.0, from exiting serial 0 on some router. Allow all other packets.

ip access-list standard fred

deny 134.141.7.0 0.0.0.255

permit any

!

interface serial 0

ip access-group fred

The first access list statement denies packets from that subnet. The other statement is

needed because the default action to deny packets is not explicitly matched in an access

list statement.

Answers to the Chapter 7 Q&A Section 765

30 Configure a named IP access list that allows only packets from subnet 193.7.6.0,

255.255.255.0, going to hosts in network 128.1.0.0 and using a Web server in 128.1.0.0,

to enter serial 0 on some router.

ip access-list extended barney

permit tcp 193.7.6.0 0.0.0.255 128.1.0.0 0.0.255.255 eq www

!

interface serial 0

ip access-group barney in

A “deny all” is implied at the end of the list.

31 List the types of IP access lists (numbered standard, numbered extended, named standard,

named extended) that can be enabled to prevent Telnet access into a router. What

commands would be used to enable this function, assuming that access-list 2 was already

configured to match the right packets?

Any type of IP access list can be enabled for preventing VTY access. The command line

vty 0 4, followed by ip access-group 2 in, would enable the feature using access-list 2.

32 What command could someone who has only the telnet password, not the enable

password, use to find out what IPX access lists were enabled on which interfaces?

The show ipx interfaces command lists all interfaces and details about each interface,

including the name and number of all standard, extended, and SAP access lists enabled on

each interface.

33 What command would display the contents of IPX access-list 904, and that access list

alone?

Both the show access-list 904 and the show ipx access-list 904 commands would show

the same contents. Both actually show the information in the same format.

34 What command lists the IP extended access lists enabled on serial 1 without showing

other interfaces?

The show ip interface serial 1 command lists the names and numbers of the IP access

lists enabled on serial 1.

766 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

Answers to the Chapter 8 “Do I Know This Already?” Quiz

1 Can PPP perform dynamic assignment of IP addresses? If so, is the feature always

enabled?

PPP’s IPCP protocol can assign an IP address to the device on the other end of the link.

This process is not required and is not performed by default. PPP usually does address

assignment for dial access, such as when a user dials an Internet service provider.

2 Create a configuration to enable PPP on serial 0 for IP and IPX. Make up IP and IPX

Layer 3 addresses as needed.

interface serial 0

ip addr 1.1.1.1 255.255.255.0

ipx network 1

encapsulation ppp

encapsulation ppp is all that is needed for PPP. Having IP and IPX enabled causes PPP

to enable the control protocols for each.

3 CHAP configuration uses names and passwords. Given Routers A and B, describe what

names and passwords must match in the respective CHAP configurations.

Router A has name B and a corresponding password configured. Router B has name A and

the same password configured. The names used are the host names of the routers unless

the CHAP name is configured.

4 What field has Cisco added to the HDLC header, making it proprietary?

A Protocol Type field has been added to allow support for multiprotocol traffic. HDLC

was not architected to allow for multiprotocol support originally.

5 Explain the purpose of Inverse ARP. Explain how Inverse ARP uses Frame Relay

broadcasts.

A router discovers the Layer 3 address(es) of a router on the other end of a VC when that

other router sends an Inverse ARP message. The message is not a broadcast. Broadcasts

are not supported over Frame Relay.

6 Would a Frame Relay switch connected to a router behave differently if the IETF option

were deleted from the encapsulation frame-relay ietf command on that attached router?

Would a router on the other end of the VC behave any differently if the same change were

made?

The switch does not behave differently. The other router, however, must also use IETF

encapsulation; otherwise, the routers will not be looking at the correct fields to learn the

packet type. The IETF-defined headers include the Protocol Type field options.

Answers to the Chapter 8 “Do I Know This Already?” Quiz 767

7 What show command will tell you the time that a PVC became active? How does the

router know what time the PVC became active?

The show frame-relay pvc command lists the time since the PVC came up, so you can

subtract this time from the current time of day to derive the time at which the VC came

up. The router learns this from an LMI message.

8 What debug options will show Inverse ARP messages?

debug frame-relay events, as shown in Example 8-19 on page 561.

9 What does the acronym LAPD stand for? Is it used as the Layer 2 protocol on dialed ISDN

bearer channels? If not, what is used?

Link Access Procedure, D-channel. LAPD is not used on bearer channels, but instead on

the signaling channel. PPP is typically used on bearer channels.

10 Define the term reference point. List two examples of reference points.

A reference point is an interface between function groups. R, S, T, and U are the reference

points. S and T are combined in many cases and then called the S/T reference point.

Reference points refer to cabling, which implies the number of wires used. In particular,

the S and T points use a four-wire interface; the U interface uses a two-wire cable.

11 Describe the decision process performed by the IOS to attempt to dial a connection using

legacy DDR.

First, some traffic must be routed out the interface to be dialed; this is typically

accomplished by adding static routes pointing out the interface. Then, “interesting” must

be defined; any packets routed out the interface that are considered interesting will cause

the interface to be dialed.

12 If packets from 10.1.1.0/24 were “interesting” in relation to DDR configuration such that

packets from 10.1.1.0/24 would cause a DDR connection out an interface BRI0, list the

configuration commands that would make the IOS think that those packets were

interesting on BRI0.

The access list that follows defines the packets from 10.1.1.0/24. The dialer-list defines

the use of access-list 1 for deciding what is interesting. The dialer-group command

enables that logic on interface BRI0.

access-list 1 permit 10.1.1.0 0.0.0.255

!

dialer-list 2 protocol ip list 1

!

interface bri 0

dialer-group 2

768 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

Answers to the Chapter 8 Q&A Section

1 Name two WAN data link protocols for which the standards define a protocol type field,

which is used to define the type of header that follows the WAN data-link header.

PPP and Frame Relay. The Frame Relay protocol field was added to the standard based on

efforts from the IETF.

2 Name two WAN data link protocols that define a method of announcing the Layer 3

addresses of the interface to other devices attached to the WAN.

PPP and Frame Relay. PPP uses control protocols specific to each Layer 3 protocol

supported. Frame Relay uses Inverse ARP.

3 What does the acronym LAPD stand for? Is it used as the Layer 2 protocol on dialed ISDN

bearer channels? If not, what is used?

Link Access Procedure, D-channel. It is not used on bearer channels, but instead is used

on the signaling channel. PPP is typically used on bearer channels.

4 “Frame Relay uses source and destination DLCIs in the Frame Relay header, with length

10, 11, or 12 bits.” Which parts of this statement do you agree with? Which parts do you

disagree with? Why?

There is only one DLCI field in the Frame Relay header, but it can be 10, 11, or 12 bits in

length. For further information, refer to the section “Frame Relay Protocols.”

5 Explain the purpose of Inverse ARP. Explain how Inverse ARP uses Frame Relay

broadcasts.

A router discovers the Layer 3 address(es) of a router on the other end of a VC when that

other router sends an Inverse ARP message. The message is not a broadcast. Broadcasts

are not supported over Frame Relay.

6 Would a Frame Relay switch connected to a router behave differently if the IETF option

were deleted from the encapsulation frame-relay ietf command on that attached router?

Would a router on the other end of the VC behave any differently if the same change were

made?

The switch does not behave differently. The other router, however, must also use IETF

encapsulation; otherwise, the routers will not be looking at the correct fields to learn the

packet type. The IETF-defined headers include the Protocol Type field options.

Answers to the Chapter 8 Q&A Section 769

7 What does NBMA stand for? Does it apply to PPP links? What about X.25 networks or

Frame Relay networks?

Nonbroadcast multiaccess. PPP is nonbroadcast, but not multiaccess. X.25 and Frame

Relay are NBMA networks. Multiaccess really means more than two devices connected

to the data link; therefore, when one device sends data, the intended receiver is not

obvious.

8 Define the terms DCE and DTE in the context of the physical layer and a point-to-point

serial link.

DTE refers to the device that looks for clocking from the device on the other end of the

cable on a synchronous link. The DCE supplies that clocking. An X.25 switch is a DCE

in the X.25 use of the word but probably is a DTE receiving clock from a DSU/CSU or

Mux from the physical layer perspective.

9 What layer of OSI is most closely related to the functions of Frame Relay? Why?

OSI Layers 1 and 2. As usual, Frame Relay refers to well-known physical layer

specifications. Frame Relay does define headers for delivery across the Frame Relay

cloud, but it provides no addressing structure to allow VCs among multiple different

Frame Relay networks; thus, it is not considered to match OSI Layer 3 functions. With the

advent of Frame Relay SVCs, it could be argued that Frame Relay performs some Layer

3–like functions.

10 When Inverse ARP is used by default, what additional configuration is needed to get IGRP

routing updates to flow over each VC?

No additional configuration is required. The forwarding of broadcasts as unicasts is

enabled on each VC and protocol for which an Inverse ARP is received.

11 Define the attributes of a partial mesh and full mesh Frame Relay network.

In a partial mesh network, not all DTEs are connected with a VC. In a full mesh network,

all DTEs are connected with a VC.

12 What key pieces of information are required in the frame-relay map statement?

Layer 3 protocol, next-hop router’s Layer 3 address, DLCI to reach that router, and

whether to forward broadcasts. Frame Relay maps are not required if Inverse ARP is in

use.

13 When creating a partial mesh Frame Relay network, are you required to use

subinterfaces?

No. Subinterfaces can be used and are preferred with a partial mesh because this removes

split horizon issues by treating each VC as its own interface. Likewise, subinterfaces are

optional when the network is a full mesh. Most people tend to use subinterfaces today.

770 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

14 What benefit related to routing protocols can be gained by using subinterfaces with a

partial mesh?

Split horizon issues are avoided by treating each VC as a separate interface. Split horizon

is still enabled; routing loops are not a risk, but all routes are learned.

15 Can PPP perform dynamic assignment of IP addresses? If so, is the feature always

enabled?

PPP’s IPCP protocol can assign an IP address to the device on the other end of the link.

This process is not required. PPP usually does address assignment for dial access, for

example, when a user dials an Internet service provider.

16 Create a configuration to enable PPP on serial 0 for IP and IPX. Make up IP and IPX

Layer 3 addresses as needed.

interface serial 0

ip addr 1.1.1.1 255.255.255.0

ipx network 1

encapsulation ppp

encapsulation ppp is all that is needed for PPP. Having IP and IPX enabled causes PPP

to enable the control protocols for each.

17 Create a configuration for Router1 that has Frame Relay VCs to Router2 and Router3

(DLCIs 202 and 203, respectively) for Frame Relay on Router1’s serial 1 interface. Use

any IP and IPX addresses you like. Assume that the network is not fully-meshed.

interface serial 1

encapsulation frame-relay

interface serial 1.1 point-to-point

ip address 168.10.1.1 255.255.255.0

ipx network 1

frame-relay interface-dlci 202

interface serial 1.2 point-to-point

ip address 168.10.2.1 255.255.255.0

ipx network 2

frame-relay interface-dlci 203

This is not the only valid configuration given the problem statement. However, because

there is not a full mesh, then point-to-point subinterfaces are the best choice. Cisco

encapsulation is used by default. The LMI type is autosensed.

18 What show command will tell you the time that a PVC became active? How does the

router know what time the PVC became active?

The show frame-relay pvc command lists the time since the PVC came up. The router

learns this from an LMI message.

Answers to the Chapter 8 Q&A Section 771

19 What show commands list Frame Relay information about mapping? In what instances

will the information displayed include the Layer 3 addresses of other routers?

show frame-relay map. The mapping information includes Layer 3 addresses when

multipoint subinterfaces are used or when no subinterfaces are used. The two cases in

which the neighboring routers’ Layer 3 addresses are shown are the two cases in which

Frame Relay acts like a multiaccess network. With point-to-point subinterfaces, the logic

works like a point-to-point link, where the next router’s Layer 3 address is not important

to the routing process.

20 True or false: The no keepalive command on a Frame Relay serial interface causes no

further Cisco proprietary keepalive messages to be sent to the Frame Relay switch.

False. This command stops LMI status inquiry messages from being sent. If the switch is

expecting these, the switch could take down the PVCs to this DTE. Be careful—this is

exactly the type of tricky wording on the exam. The messages do not go between the two

routers over Frame Relay, but the Cisco keepalive message is not sent on true point-topoint

links.

21 What debug options will show Inverse ARP messages?

debug frame-relay events, as shown in Example 8-19 on page 561.

22 True or false: The Frame Relay map configuration command allows more than one Layer

3 protocol address mapping on the same configuration command.

False. The syntax allows only a single network layer protocol and address to be

configured.

23 What do the letters in ISDN represent? What about BRI and PRI?

Integrated Services Digital Network. Basic Rate Interface. Primary Rate Interface. BRI is

the most likely to be on the exam.

24 Define the term function group. List two examples of function groups.

A function group is a set of ISDN functions that need to be implemented by a device. NT1,

NT2, TE1, TE2, and TA are all function groups.

25 Define the term reference point. List two examples of reference points.

A reference point is an interface between function groups. R, S, T, and U are reference

points. S and T are combined in many cases and then called the S/T reference point.

Reference points refer to cabling, which implies the number of wires used. In particular,

the S and T points use a four-wire interface; the U interface uses a two-wire cable.

772 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

26 How many bearer channels are in a BRI? What about a PRI in North America? What

about a PRI in Europe?

BRI uses two bearer channels and one signaling channel (2B+D). PRI uses 23B+D in

North America and 30B+D in Europe. The signaling channel on BRI is a 16-kbps channel;

on PRI, it is a 64-kbps channel.

27 True or false: ISDN defines protocols that can be functionally equivalent to OSI Layers 1,

2, and 3. Defend your answer.

True. Reference points in part define the physical interfaces. Used on the signaling

channel, LAPD is a data link protocol. SPIDs define a logical addressing structure and are

roughly equivalent to OSI Layer 3. Table 8-26 on page 568 summarizes ISDN protocols

as compared with the OSI model.

28 What reference points are used by ISDN BRI interfaces on Cisco routers?

A BRI interface with an S/T reference point, or a BRI with a U reference point, can be

bought from Cisco. With an S/T interface, an external NT1, NT2, or NT1/NT2 device is

required. With the U interface, no external device is required.

29 What do the letters LAPD represent? Is LAPD used on ISDN channels? If so, which ones?

Link Access Procedure, D-channel. LAPD is used only on ISDN D channels to deliver

signaling messages to the local ISDN switch. Many people don’t understand the function

of LAPD, thinking it is used on the B channels after the dial is complete. The encapsulation

chosen in the router configuration determines the data link protocol on the bearer

channels. There is no option on Cisco routers to turn off LAPD on the signaling channel.

30 Name the standards body that defines ISDN protocols.

International Telecommunications Union (ITU). This group was formerly the CCITT. The

ITU is governed by the United Nations.

31 What ISDN functions do standards ITU-T Q.920 and Q.930 define? Does either standard

correlate to an OSI layer?

Q.920 defines the ISDN data link specifications, such as LAPD; Q.930 defines Layer 3

functions, such as call setup messages. I.440 and I.450 are equivalent to Q.920 and Q.930,

respectively.

32 What ISDN functions does standard ITU-T I.430 define? Does it correlate to an OSI

layer?

I.430 defines ISDN BRI physical layer specifications. It is similar to OSI Layer 1. There

is no Q-series equivalent specification to I.430.

33 What do the letters SPID represent, and what does the term mean?

Service profile identifier. This is the ISDN phone number used in signaling.

Answers to the Chapter 8 Q&A Section 773

34 Define the terms TE1, TE2, and TA. Which term(s) imply that one of the other two must be

in use?

Terminal Equipment 1, Terminal Equipment 2, and terminal adapter. A TE2 device

requires a TA. A TE2 uses the R reference point. An S reference point is needed to perform

ISDN signaling; it is provided in that case by the TA.

35 What reference point is used between the customer premise and the phone company in

North America? What about in Europe?

The U interface is used in North America. Elsewhere, the T interface is used. The NT1

function, the dividing point between the T and U reference points, is implemented in telco

equipment outside North America.

36 Define the term SBus, and give one example of when it would be useful.

SBus is a bus with many devices sharing the S reference point. ISDN-capable phones,

faxes, and computers that wish to share the same BRI connect to the same NT1 using an

SBus. The SPIDs include subaddresses to distinguish among the multiple devices when

using an SBus.

37 What data link (OSI Layer 2) protocols are valid on an ISDN B channel?

HDLC, PPP, and LAPB are all valid options. PPP is the preferred choice, however. If

using DDR to more than one site, PAP or CHAP authentication is required. If used, PPP

must be used. PPP also provides automatic IP address assignment, which is convenient for

PC dial-in.

38 Define the terms PAP and CHAP. Which one(s) send the passwords in clear text format?

Password Authentication Protocol, Challenge Handshake Authentication Protocol. PAP

sends the passwords as simple text, whereas CHAP uses MD5 hashing to protect the

password contents.

39 Define MLPPP. Describe the typical home or small office use of MLPPP.

Multilink Point-to-Point Protocol. MLPPP is used to treat multiple B channels as a single

link because MLPPP fragments packets and sends different fragments across the multiple

links to balance the traffic. MLPPP is very useful for sharing two B channels in home or

small office use. It is not restricted to home use.

40 CHAP configuration uses names and passwords. Given Routers A and B, describe what

names and passwords must match in the respective CHAP configurations.

Router A has name B and a corresponding password configured. Router B has name A and

the same password configured. The names used are the host names of the routers unless

the CHAP name is configured.

774 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

41 Configure ISDN interface BRI1, assuming that it is attached to a DMS-100 ISDN switch,

that it uses only one SPID of 404555121201, and that you want to screen calls so that only

calls from 404555999901 are accepted.

isdn switch-type basic-dms100

interface bri1

isdn spid1 404555121201

isdn caller 404555999901

The switch-type command is required. The SPID(s) is required only with some switches.

The isdn caller command is needed only for call screening.

42 Name the configuration command used to enable FRF.9 compression on a point-to-point

Frame Relay subinterface.

The frame-relay payload-compress frf9 stac command enables FRF.9 compression on

a Frame Relay subinterface.

43 List the types of compression that are available on PPP links.

The STAC, Predictor, and MPPC compression types are available on PPP interfaces in the

IOS.

44 Describe the decision process performed by the IOS to attempt to dial a connection using

legacy DDR.

First, some traffic must be routed out the interface to be dialed; this is typically

accomplished by adding static routes pointing out the interface. Then, interesting must be

defined; any packets routed out the interface that are considered interesting will cause the

interface to be dialed.

45 If packets from 10.1.1.0/24 were “interesting” in relation to DDR configuration, such that

packets from 10.1.1.0/24 caused a DDR connection out an interface BRI0, list the

configuration commands that would make the IOS think that those packets were

interesting on BRI0.

The access list that follows defines the packets from 10.1.1.0/24. The dialer-list defines

the use of access-list 1 for deciding what is interesting. The dialer-group command

enables that logic on interface BRI0.

access-list 1 permit 10.1.1.0 0.0.0.255

!

dialer-list 2 protocol ip list 1

!

interface bri 0

dialer-group 2

Answers to the Chapter 8 Q&A Section 775

46 List the typical EIA/TIA standard interfaces used for serial cables with a Cisco router.

EIA/TIA-232, EIA/TIA-449, and EIA/TIA-530 are typical. V.35 and X.21, which are ITU

standards, are also typical. Be careful on the exam—this question asked for EIA/TIA

standards, so V.35 and X.21 would not be correct.

47 What field has Cisco added to the HDLC header, making it proprietary?

A Protocol Type field has been added to allow support for multiprotocol traffic. HDLC

was not architected to allow for multiprotocol support originally.