The flashcards below were created by user Anonymous on FreezingBlue Flashcards.

  1. RIP Protocol Type
    Distance Vector
  2. RIP Algorithm
  3. RIP AD
  4. RIP Metric
    Hop Count
  5. RIP Update freq
    Periodic Updates
  6. RIP update size
    Full Updates
  7. RIP Convergence Size
    Slow convergence, Hold-down Timer
  8. RIP Message Protocol (v6)
    UDP/520 (521)
  9. RIP Authentication
    Authentication Plain, MD5 (IPSec)
  10. RIP Multicast (v6) (FF02::9)
  11. OSPF Protocol Type
    Link State
  12. OSPF Algorithm
    Dijkstra SPF
  13. OSPF AD
  14. OSPF Metric
    Variety of cost factors (RTT, Throughput, reliability)
  15. OSPF Update freq
    Requested with LSA and triggered
  16. OSPF update size
    LSU, small
  17. OSPF Message Protocol
  18. OSPF Authentication
    Plain, MD5 (AH)
  19. OSPF Multicast
    Multicast (FF02::5, 6)
  20. EIGRP Protocol Type
    Advanced Distance Vector
  21. EIGRP Algorithm
    Diffusing Update Algroithm - DUAL
  22. EIGRP AD
    AD 90 (170 External, 5 Summary)
  23. EIGRP Metric
    Bandwidth/Delay + Optionals (MTU, Reliability, Load)
  24. EIGRP Update freq
    Triggered Updates
  25. EIGRP Update size
    Partial Updates
  26. EIGRP Message Protocol
    IP/88 (Supports non-IP L3 protocols)
  27. EIGRP Authentication
  28. EIGRP Multicast
    Multicast (FF02::A)
  29. BGP Protocol Type
    Path Vector
  30. BGP AD (e and iBGP)
    AD eBGP = 20, iBGP = 200
  31. BGP Metric
  32. BGP Update freq
    Periodic Updates
  33. BGP update size
    Full Updates
  34. BGP Message Protocol
  35. BGP Authentication
  36. Explain TCP Slowstart
    • Window size increases exponentially
    • *Packet Dropped*
    • Segment Size reduced to 1
    • Window increased exponentially until x0.5 of previous max window (Congestion window size)
    • Increases linearly
  37. Explain WRED
    • (Weighted Random Early Detection)
    • To prevent TCP window sizing for multiple streams coming into sync WRED selectively drops packets before max throughput is reached. Considers QoS and queue size
  38. What are the two types of VRF?
    • VRF-lite - Typical installation
    • Cisco EVN - New method. Trunks VRF traffic in a VNET encapsulation between trunk links
  39. Connected AD
  40. Static AD
  41. EIGRP Summary AD
  42. eBGP AD
  43. EIGRP (Internal) AD
  44. IGRP AD
  45. OSPF AD
  46. IS-IS AD
  47. RIP AD
  48. ODR AD
  49. EIGRP (ext) AD
  50. iBGP AD
  51. Unreachable AD
  52. Describe the two types of Access List and numbering ranges
    • Standard: 1 to 99 and 1300 to 1999. Source only
    • Extended: 100 to 199 and 2000 to 2699. Source, Destination, Port
  53. What are the problems with NBMA networks and distance vector protocols?
    • Split Horizon when same interface is used to talk to multiple routers
    • DR Election may not happen in a Hub-Spoke topology
  54. What precaution should be taken when using FHRP?
    When using FHRP adjust ARP timer < CAM Table timer so MAC record doesn't time out before ARP. ARP messages are send out when MAC is unknown, CAM table floods when destination port is not known.
  55. Explain uRPF
    • - Used to prevent ip spoofing
    • - Must have CEF enabled
    • - Strict - Packet dropped if source ip doesn't enter interface as matched in the FIB table (used by CEF)
    • - Loose - Source must be reachable, not tied to interface
    • - VRF - Like loose but applied to vrf
  56. List router security accounts
    • Global username - username xxxxx privledge 15 password xxxxx
    • Line password - service password-encryption
    • TACACS/Radius
    • Secret password (4= SHA-256, 5 = MD5)
  57. What remote site tunnel options are available?
    • MPLS L2
    • MPLS L3
    • GRE
  58. Describe the 3 technologies used by DMVPN
  59. What is NHRP?
    • ? Client/Server model of address assignment
    • § Converts Tunnel int ip > Physical interface id
    • ? Each spoke advertises it's info back to server
  60. What is IPSec Phase 1?
    • § ISAKMP session
    • § Sets up Management tunnel for secure key exchange
    • § Bidirectional encryption (same key each way)
    • § Transform Sets exchanged to form a SA
  61. What is IPSec Phase 2?
    • § Sets up Bi-directional tunnel for traffic
    • § Unidirectional encryption (Different key each way)
  62. What does AH provide?
    Integrity and data origin authentication
  63. What does ESP provide?
    Integrity, data origin authentication and encryption
  64. Describe the difference between Transport and tunnel mode
    Original IP or encapsulated with diff IP
  65. What is the main advantage of GRE?
    Van be encapsulated within any L3 protocol (IPSEC(GRE(PAYLOAD)))
  66. What is an advantage of IPSec?
    Scalable, on demand mesh
  67. What is the IPv6 Multicast address for All Nodes?
  68. What is the IPv6 Multicast address for All Routers?
  69. What is the prefix for IPv6 Unique local?
    FD00:: /7
  70. What is the prefix for IPv6 Link local?
    FE80:: /10
  71. What is the prefix for IPv6 Global Unicast?
    2000:: /3
  72. What must you do when creating a EUI-64 derived IPv6 Address
    Flip the 7th most significant bit (OUI) and insert FFFE in the middle
  73. What does IOS do when a serial link uses EUI-64?
    Takes the MAC of the lowest numbered eth interface
  74. What are the type of address assignment in IPv6? And how are default router/dns communicated?
    • Stateful DHCP (Server provides IP, DNS. Default router provided by NS messages)
    • Stateless Autoconfig (NDP to discover subnet, default router, Stateless DHCP to learn DNS)
    • Static
    • Static w/EUI-64
  75. What are the uses for NDP?
    • L2 Mapping (IPv6 > L2)
    • Inverse Neighbor Discovery (L2 > IPv6)
    • IP Assignment/Gateway/DNS
    • Duplicate Address Detection
  76. What is the solicited node multicast?
    • Asks for a response from all nodes on the link with last 24 bits
    • Address: FF02::1:FF00:0 /104
  77. What is noAuthNoPriv (SNMP)
    No auth, No encryption, community-string (username for v3)
  78. What is authNoPriv (SNMP)
    HMAC (MD5, SHA-1), no encryption
  79. What is authPriv (SNMP)
    HMAC (MD5, SHA-1), Encryption (DES, 3DES, AES)
  80. How does TACACS Compare to RADIUS?
    • TCP > UDP
    • Full Packet Encryption > Password Encryption
    • Basic Accounting > Robust Accounting
Card Set
Questions for CCNP Routing Exam
Show Answers