Intervew Questions
Intervew Questions
FIREWALL
1.What is a firewall?
Firewall is a device that is placed between a trusted and an untrusted network.It denies or
permit traffic that enters or leaves the network based on pre-configured policies.Firewall
protects inside network from unauthorized access by users on an outside network.A firewall
can also protect the inside network from each other.
Eg.by keeping a management network separate from a user network.
2.difference between gateway and firewall?
Gateway joins 2 networks together and a network firewall protects a network against the
unauthorized incoming or outgoing access.Network firewall may be hardware device or
software programs.
3.At which layers may be a firewall works?
Firewall works at 3,4 &7 layers
4.difference between statefull and stateless firewall?
Statefull firewall:a statefull firewall is aware of the connections that pass through it.It adds
and maintains the informations about the users connextions in the state table,reffered to as a
connection table.It then uses this connection table to implement the security policies for user
connections.eg;PIX,ASA,CHECKPOINT
Stateless firewall:(packet filtering) does not look at the state of connections but just at the
packets themselves.
Eg:extended acl on cisco ios routers.
5.what information a statefull firewall maintains?
Source ip address,destination ip address,ip protocol like tcp,udp.ip protocol informations like
tcp udp port numbers,tcp sequence numbers,tcp flags.
6. what are the security levels in cisco ASA?
Used to determine the trustworthiness of the network attached to the respective
interface.Security levels can be configured between 0 to 100 where higher numbers are more
trusted than lower.By default ASA allows traffic from higher security level to the lower
security level only.
7. How can we allow packets from a lower security level to a higher security level?
(override security level)We uses ACL.
8. Do same security level is allowed or denied in ASA?
By default it is not allowed.To allow this we use ASA(config)same-security-traffic permit
inter-interfsce
9. What is the security level of inside and outside interface by default?
The security level of inside interface by default is 100.for outside interfce by default is 0.
10. What protocols are inspected by ASA?
By default TCP and UDP are inspected by ASA
11. Does ASA inspects ICMP?
No.ASA does not inspects ICMP by default
12. Explain DMZ(Demilitarized zone)server?
If we need some network resources such as a web server or FTP server to be available to
outside users we place these resources on a separate network behind the firewall called a
demilitarized zone (DMZ).The firewall allows limited access to the DMZ.but because the
DMZ only includes the public servers ,an attack there only affects the servers and does not
affect the inside network
13. How does a firewall process a packet?
When a packet is received on the ingress interface, the ASA checks if it matches an existing
entry in the connection table. If it does, protocol inspection is carried out on that packet. ------
If it does not match an existing connection and the packet is either a TCP-SYN packet or
UDP packet, the packet is subjected to ACL checks. The reason it needs to be a TCP-SYN
packet is that an SYN packet is the first packet in the TCP 3-way handshake. Any other TCP
packet that isn’t part of an existing connection is likely an attack.
If the packet is allowed by ACLs and is also verified by translation rules, the packet goes
through protocol inspection.
Then, the IP header is translated if NAT is used and if the NAT rule specifies an egress
interface, the ASA will virtually forward the packet to this egress interface and then perform
a route lookup.
If a route is found that specifies the egress interface, then the Layer-2 header of the packet is
re-written and the packet is forwarded out the egress interface
14. What are the values for timeout of the TCP session, UDP session, ICMP session?
TCP session - 60 minutes UDP session - 2 minutes ICMP session - 2 seconds
15. Explain TCP Flags?
While troubleshooting TCP connections through the ASA, the connection flags shown for
each TCP connection provide information about the state of TCP connections to the ASA.
15.What is the command to see timeout timers? #
show run timeout
16. What is the Difference between ports in ASA 8.4 and ASA 8.2?
In ASA 8.4 all ports are Gig ports and in ASA 8.2 all are Ethernet ports.
17. What is the command to check the connection table?
# show conn
18. How ASA works in reference to Traceroute?
ASA does not decrement the TTL value in traceroute because it does not want to give its
information to others for security purpose. It forwards it without decrementing the TTL
Value.
19. What if we apply ACL as global in ASA?
It will be applied on all interfaces towards inbound. The global option is only in ASA 8.4 not
in ASA 8.2
20. What is the difference in ACL on ASA than on Router?
In the router, if we delete one access-control entry whole ACL will be deleted. In ASA, if we
will delete one access-control entry whole ACL will not be deleted.
21. Name some concepts that cannot be configured on ASA?
Line VTY cannot be configured on ASA. Wildcard mask concept is not present in ASA.
Loopback cannot be configured on ASA.
22. What is the command to capture packets in ASA?
To capture packet from inside interface:- # capture abc interface inside To see it:- # show
capture abc
23. What is the command to enable HTTP on ASA?
# http server enable
24. How to give static route on ASA?
# route outside < Next Hop>
25. How to give default route on ASA?
# route outside 0 0 < Next Hop>
26. What are the different types of ACL in the Firewall?
1. Standard ACL 2. Extended ACL 3. Ethertype ACL (Transparent Firewall) 4. Webtype
ACL (SSL VPN)
27. What is Transparent Firewall?
In Transparent Mode, ASA acts as a Layer 2 device like a bridge or switch and forwards
Ethernet frames based on destination MAC-address.
28. What is the need for a Transparent Firewall?
If we want to deploy a new firewall into an existing network it can be a complicated process
due to various issues like IP address reconfiguration, network topology changes, current
firewall etc. We can easily insert a transparent firewall in an existing segment and control
traffic between two sides without having to readdress or reconfigure the devices.
29. What are the similarities between the switch and ASA (in Transparent mode)?
Both learn which mac addresses are associated with which interface and store them in the
local mac address table.
30. What are the differences between a switch and ASA (in Transparent mode)?
ASA does not flood unknown unicast frames that are not found in the mac address table.
ASA does not participate in STP. Switch process traffic at layer 1 & layer 2 while ASA can
process traffic from layer 1 to layer 7. 31.What are the features that are not supported in
Transparent mode?
1. Dynamic Routing. 2. Multicasting. 3. QOS. 4. VPNs like IPSec and WebVPN cannot be
terminated. 5. ASA cannot act as a DHCP relay agent
31. Explain Ether-Type ACL?
In Transparent mode, unlike TCP/IP traffic for which security levels are used to permit or
deny traffic all non-IP traffic is denied by default. We create Ether-Type ACL to allow NON-
IP traffic. We can control traffic like BPDU, IPX etc with Ether-Type ACL.
32. What is the command to convert ASA into Transparent mode?
# firewall transparent
33. What is the command to see mode (routed or transparent)?
# show firewall
34. Explain Failover?
Failover is a Cisco proprietary feature. It is used to provide redundancy. It requires two
identical ASAs to be connected to each other through a dedicated failover link. The health of
active interfaces and units are monitored to determine if a failover has occurred or not.
35. What are the types of Failover?
1. Active/Standby Failover. 2. Active/Active Failover.
36. What information is exchanged between ASAs over a Failover link?
1. State - Active or standby. 2. Hello Messages. 3. Network Link Status. 4. Mac Addresses. 5.
Configuration Replication and Synchronization
37. What is the difference between Stateful failover and Stateless failover? Stateless Failover
- When failover occurs all active connections are dropped. Clients need to re-establish
connections when the new active unit takes over. Stateful Failover - The active unit
continually passes per-connection state information to the standby unit. After a failover
occurs, the same connection information is available at the new active unit. Clients are not
required to reconnect to keep the same communication session.
38. What Information Active unit passes to the standby unit in Stateful Failover?
NAT translation table, TCP connection states, The ARP table, The Layer 2 bridge table
(when running in transparent firewall mode), ICMP connection state etc.
39. What are the Failover Requirements between two devices?
Hardware Requirements - The two units in a failover configuration must be the same model,
should have the same number and types of interfaces. Software Requirements - The two units
in a failover configuration must be in the same operating modes (routed or transparent single
or multiple contexts). They must have the same software version.
40. Explain Active/Standby Failover?
In Active/Standby Failover, one unit is the active unit which passes traffic. The standby unit
does not actively pass traffic. When failover occurs, the active unit fails over to the standby
unit, which then becomes active. We can use Active/Standby Failover for ASAs in both
single or multiple context mode
41. Explain Active/Active Failover?
It is only available for ASAs in multiple context mode. In an Active/Active failover
configuration, both ASAs can pass network traffic. In Active/Active Failover, we divide the
security contexts on the ASA into Failover Groups. A Failover Group is simply a logical
group of one or more security contexts. Each group is assigned to be active on a specific ASA
in the failover pair. When Failover occurs, it occurs at the Failover group level.
42. What is the command to enable Failover?
# failover
43. What is the command to see Failover?
# show failover
44. Explain Unit Health Monitoring in Failover? How Failover occurs?
The ASA unit determines the health of the other unit by monitoring the failover link. When a
unit does not receive three consecutive hello messages on the failover link, it sends hello
messages on each interface, including the failover interface, to find whether or not the other
unit is responsive. Based upon the response from the other unit it takes following actions: 1.
If the ASA receives a response on the failover interface, then it does not failover. 2. If the
ASA does not receive a response on the failover link, but it does receive a response on
another interface, then the unit does not failover. The failover link is marked as failed. 3. If
the ASA does not receive a response on any interface, then the standby unit switches to active
mode and classifies the other unit as failed.
45. How active unit is determined in Active/Standby Failover?
1. If a unit boots and detects another unit already running as active, it becomes the standby
unit. 2. If a unit boots and does not detect active unit, it becomes the active unit. 3. If both
units boot simultaneously, then the primary unit becomes the active unit, and the secondary
unit becomes the standby unit.
46. Name some commands replicated to standby unit?
All configuration commands except for mode, firewall, and failover LAN unit are replicated
to standby unit.
# copy running-config startup-config
# write memory
47. Name some commands that are not replicated to the standby unit?
All forms of the copy command except for
# copy running-config startup-config all forms of the write command except for
# write memory Explain Active/Standby failover & Active/Active failover in terms of
preemption? In Active/Standby failover there is no preemption. In Active/Active failover
preemption is optional.
48. Explain the Security Context?
We can partition a single ASA into multiple virtual devices, known as Security Contexts.
Each context acts as an independent device, with its own security policy, interfaces, and
administrators. Multiple contexts are similar to having multiple standalone devices.
49. What features are supported in multiple context mode?
Routing tables, Firewall features, IPS, and Management.
50. What features are not supported in multiple context mode? VPN and Dynamic Routing
Protocols.
51. Explain System area?
When we boot up in multiple mode from the CLI, we are taken into the system area. The
system area is used to create and manage the contexts, configure the physical properties of
the interfaces, create VLANs for trunking, create resource classes to restrict the context
system resource usage.
52. What is the admin context?
When the appliance boots up, one context is automatically created called Admin Context
which defaults to being the administrative context. Any context can be made administrative
context. One of the contexts on our appliance must be the administrative context. An “*”
beside a context name indicates that the context is the administrative context.
53. How ASA classifies packets?
The packet that enters is to be processed by which context is classified by ASA as follows:-
1. Unique Interfaces - If only one context is associated with the ingress interface, the ASA
classifies the packet into that context. 2. Unique MAC Addresses - If multiple contexts share
an interface, then the interface MAC address is used as a classifier. ASA lets us assign a
different MAC address in each context to the same shared interface. By default, shared
interfaces do not have unique MAC addresses. We can set the MAC addresses manually or
we can automatically generate MAC addresses by # mac-address auto command 3. NAT
Configuration - If we do not use unique MAC addresses, then the mapped addresses in our
NAT configuration are used to classify packets.
54. What is the command to switch to multiple context Mode?
# mode multiple
After entering this command the appliance will reboot itself and our current configuration is
automatically backed up to flash in case we want to switch back to single mode. The file is
called “old_running.cfg.”
55. What is the command to switch back to single mode?
# mode single
56. What are different types of NAT in ASA?
Static NAT - A consistent mapping between a real and mapped IP address. It allows
Bidirectional traffic initiation.
Dynamic NAT - A group of real IP addresses are mapped to a (usually smaller) group of
mapped IP addresses on a first come first served basis. It allows only Unidirectional traffic
initiation.
Dynamic Port Address Translation (PAT) - A group of real IP addresses are mapped to a
single IP address using a unique source port of that IP address. Identity NAT - A real address
is statically translated to itself, essentially bypassing NAT.
57. What is Policy NAT?
Policy NAT allows you to NAT by specifying both the source and destination addresses in an
extended access list. We can also optionally specify the source and destination ports. Regular
NAT can only consider the source addresses, not the destination address. In Static NAT it is
called as Static Policy NAT. In Dynamic NAT it is called Dynamic Policy NAT.
58. Give the order of preference between different types of NAT?
1. Nat exemption. 2. Existing translation in Xlate. 3. Static NAT
- Static Identity NAT - Static Policy NAT - Static NAT - Static PAT
4. Dynamic NAT - NAT
Zero - Dynamic Policy NAT - Dynamic NAT - Dynamic PAT
59. What is the difference between Auto NAT & Manual NAT?
Auto NAT (Network Object NAT) - It only considers the source address while performing
NAT. So, auto NAT is only used for static or dynamic NAT. Auto NAT is configured within
an object. Manual NAT (Twice NAT) - Manual NAT considers either only the source address
or the source and destination address while performing NAT. It can be used for almost all
types of NAT like NAT exempt, policy NAT etc. Unlike auto NAT that is configured within
an object, manual NAT is configured directly from the global configuration mode.
60.Give NAT Order in terms of Auto NAT & Manual NAT?
NAT is ordered in 3 sections.
Section 1 – Manual NAT Section 2 – Auto NAT Section 3 – Manual Nat After-Auto
60. What is the command to see NAT Translations?
# show xlate
# show nat
61. What is the command to see both NAT Table and Connection Table?
# show local-host.
VPN
1. What is VPN?
Virtual Private Network (VPN) creates a secure network connection over a public network
such as the internet. It allows devices to exchange data through a secure virtual tunnel. It uses
a combination of security features like encryption, authentication, tunneling protocols, and
data integrity to provide secure communication between participating peers.
2. What is Authentication, Confidentiality & Integrity?
Authentication - Verifies that the packet received is actually from the claimed sender. It
verifies the authenticity of the sender. Pre-shared Key, Digital Certificate are some methods
that can be used for authentication. Integrity - Ensures that the contents of the packet have not
been altered in between by man-in-middle. Hashing Algorithm includes MD5, SHA.
Confidentiality - Encrypts the message content through encryption so that data is not
disclosed to unauthorized parties. Encryption algorithms include DES (Data Encryption
Standard), 3DES (Triple-DES), AES (Advanced Encryption Standard).
3. What is Symmetric and Asymmetric Encryption?
In symmetric encryption, a single key is used both to encrypt and decrypt traffic. It is also
referred to as a shared key or shared secret encryption. Symmetric encryption algorithms
include DES, 3DES, AES. In Asymmetric encryption, two keys are used to encrypt and
decrypt traffic, one for encryption and one for decryption. The most common asymmetric
encryption algorithm is RSA.
4. What is IPSec VPN?
IP Security Protocol VPN means VPN over IP Security. It allows two or more users to
communicate in a secure manner by authenticating and encrypting each IP packet of a
communication session. IPSec provides data confidentiality, data integrity and data
authentication between participating peers.
5. At which layer IPSec works?
IPSec secures IP traffic at the Layer 3 (Network Layer) of the OSI model
6. Name a major drawback of IPSec?
IPSec only supports unicast IP traffic.
7. What is the difference between Transport and Tunnel mode?
Tunnel mode - Protects data in network-to-network or site-to-site scenarios. It encapsulates
and protects the entire IP packet—the payload including the original IP header and a new IP
header (protects the entire IP payload including user data). Transport mode - Protects data in
host-to-host or end-to-end scenarios. In transport mode, IPsec protects the payload of the
original IP datagram by excluding the IP header (only protects the upper-layer protocols of IP
payload (user data)). IPSec protocols AH and ESP can operate in either transport mode and
tunnel mode.
8. What are the three main security services that IPSec VPN provides?
IPSec offers the following security services: 1. Peer Authentication. 2. Data confidentiality.
3. Data integrity.
9.Define Digital Signatures?
A digital signature is an attachment to an electronic message used for security purposes. It is
used to verify the authenticity of the sender.
10.What is Authorization?
Authorization is a security mechanism used to determine user/client privileges or access
levels related to network resources, including firewalls, routers, switches and application
features. Authorization is normally preceded by authentication and during authorization, It’s
the system that verifies an authenticated user’s access rules and either grant or refuses
resource access.
11. What is Site to Site and Remote Access VPN?
A site-to-site VPN allows offices in multiple locations to establish secure connections with
each other over a public network such as the Internet. Remote Access VPN allows Remote
users to connect to the Headquarters through a secure tunnel that is established over the
Internet. The remote user is able to access internal, private web pages and perform various
IP-based network tasks. There are two primary methods of deploying Remote Access VPN:
1. Remote Access IPSec VPN. 2. Remote Access Secure Sockets Layer (SSL) VPN.
12. What are the 3 protocols used in IPSec?
1. Authentication Header (AH). 2. Encapsulating Security Payload (ESP). 3. Internet Key
Exchange (IKE).
13.Explain IPSec Protocol Headers?
1. Encapsulating Security Payload (ESP) - It is an IP-based protocol which uses port 50 for
communication between IPSec peers. ESP is used to protect the confidentiality, integrity and
authenticity of the data and offers anti-replay protection. Drawback - ESP does not provide
protection to the outer IP Header. 2. Authentication Header (AH) - It is also an IP-based
protocol that uses port 51 for communication between IPSec peers. AH is used to protect the
integrity and authenticity of the data and offers anti-replay protection. Unlike ESP, AH
provides protection to the IP header also. Drawback - AH does not provide confidentiality
protection.
14.How ESP & AH provides anti-replay protection?
Both ESP and AH protocols provide anti-replay protection based on sequence numbers. The
sender increments the sequence number after each transmission, and the receiver checks the
sequence number and rejects the packet if it is out of sequence.
15. What is IKE?
It is a hybrid protocol that implements Oakley and SKEME key exchanges inside the Internet
Security Association and Key Management Protocol (ISAKMP) framework. It defines the
mechanism for creating and exchanging keys. IKE derives authenticated keying material and
negotiates SAs that are used for ESP and AH protocols.
16. Which protocol does IKE use?
IKE uses UDP port 500.
17. Explain how IKE/ISAKMP Works?
IKE is a two-phase protocol: Phase 1 IKE phase 1 negotiates the following:- 1. It protects the
phase 1 communication itself (using crypto and hash algorithms). 2. It generates Session key
using Diffie-Hellman groups. 3. Peers will authenticate each other using pre-shared, public
key encryption, or digital signature. 4. It also protects the negotiation of phase 2
communication. There are two modes in IKE phase 1: Main mode - Total Six messages are
exchanged in the main mode for establishing phase 1 SA. Aggressive mode - It is faster than
the main mode as only Three messages are exchanged in this mode to establish phase 1 SA. It
is faster but less secure. At the end of phase 1, a bidirectional ISAKMP/IKE SA (phase 1 SA)
is established for IKE communication. Phase 2 IKE phase 2 protects the user data and
establishes SA for IPSec. There is one mode in IKE phase 2: Quick mode - In this mode,
Three messages are exchanged to establish the phase 2 IPSec SA. At the end of phase 2
negotiations, two unidirectional IPSec SAs (Phase 2 SA) are established for user data—one
for sending and another for receiving encrypted data.
18. Explain the messages exchange between the peers in IKE/ISAKMP?
Phase 1 - Main Mode MESSAGE 1: Initiator offers Policy proposal which includes
encryption, authentication, hashing algorithms (like AES or 3DES, PSK or PKI, MD5 or
RSA). MESSAGE 2: Responder presents policy acceptance (or not). MESSAGE 3: Initiator
sends the Diffie-Helman key and nonce. MESSAGE 4: Responder sends the Diffie-Helman
key and nonce. MESSAGE 5: Initiator sends ID, preshare key or certificate exchange for
authentication. MESSAGE 6: Responder sends ID, preshare key or certificate exchange for
authentication. Only First Four messages were exchanged in clear text. After that, all
messages are encrypted. Phase 2 - Quick Mode MESSAGE 7: Initiator sends Hash, IPSec
Proposal, ID, nonce. MESSAGE 8: Responder sends Hash, IPSec Proposal, ID, nonce.
MESSAGE 9: Initiator sends signature, hash, ID. All messages in Quick mode are encrypted.
19. What is Diffie-Hellman?
DH is a public-key cryptography protocol which allows two parties to establish a shared
secret over an insecure communications channel. Diffie-Hellman is used within IKE to
establish session keys and is a component of Oakley.
20.How Diffie-Hellman works?
Each side has a private key which is never passed and a Diffie-Hellman Key (Public Key
used for encryption). When both sides want to do a key exchange they send their Public Key
to each other. for example Side A get the Public Key of Side B, then using the RSA it creates
a shared key which can only be opened on Side B with Side B's Private Key So, even if
somebody intercepts the shared key he will not be able to do reverse engineering to see it as
only the private key of Side B will be able to open it.
21.What are Security Associations?
The SAs define the protocols and algorithms to be applied to sensitive packets and specify
the keying material to be used by the two peers. SAs are unidirectional and are established
per security protocol (AH or ESP). 22.What is Transform set?
An IKE transform set is a combination of security protocols and algorithms. During the IPsec
SA negotiation, the peers agree to use a particular transform set for protecting a particular
data flow.
23. What are Crypto access lists?
Crypto access lists specify which IP traffic is protected by crypto and which traffic is not
protected by crypto. To protect IP traffic "permit" keyword is used in an access list. If the
traffic is not to be protected then "deny" keyword is used in the access list.
24.What is Crypto map?
Crypto map is used to pull together the various parts used to set up IPSec SAs including: 1.
Which traffic should be protected by IPSec (crypto access list). 2. Where IPSec-protected
traffic should be sent (remote IPSec peer). 3. What IPSec SA should be applied to this traffic
(transform sets). Multiple interfaces can share the same crypto map set in case we want to
apply the same policy to multiple interfaces. If more than one crypto map is created for a
given interface then use the sequence number of each map entry to rank the map entries, the
lower the seq-num argument the higher the priority.
25.How do you check the status of the tunnel’s phase 1 & 2?
Use following commands to check the status of tunnel phases: Phase 1 - # show crypto
isakmp sa Phase 2 - # show crypto ipsec sa What is IPsec 26.Virtual Tunnel Interface?
IPSec VTI is the concept of using a dedicated IPsec interface called IPSec Virtual Tunnel
Interface for highly scalable IPSec-based VPNs. IPSec VTI provides a routable interface for
terminating IPSec tunnels. VTI also allows the encrypting of multicast traffic with IPSec.
27. What is the difference between Static Crypto Maps and Dynamic Crypto Maps?
Static Crypto Maps are used when peers are predetermined. It is basically used in IPSec site
to site VPNs. Dynamic crypto maps are used with networks where the peers are not always
predetermined. It is basically used in IPSec Remote Access VPNs. There are two types of
IPSec VTI interfaces: 1. Static VTI (SVTI): This can be used for site-to-site IPsec-based
VPNs. 2. Dynamic VTI (DVTI): DVTI replaces dynamic crypto maps. It can be used for
remote-access VPNs.
28. What is Cisco Easy VPN?
Remote Access VPN, when implemented with IPsec is called Cisco Easy VPN. The Easy
VPN is easy to set up, with minimal configuration required at the remote client site. Cisco
Easy VPN allows us to define centralized security policies at the head-end VPN device (VPN
Server) which are then pushed to the remote site VPN device upon connection.
29. What is DMVPN?
DMVPN allows IPSec VPN networks to better scale hub-to-spoke and spoke-to-spoke
topologies optimizing the performance and reducing latency for communications between
sites. It offers the following benefits: 1. It Optimizes network performance. 2. It Reduces
router configuration on the hub. 3. Support for dynamic routing protocols running over the
DMVPN tunnels. 4. Support for multicast traffic from hub to spokes. 5. The capability of
establishing direct spoke-to-spoke IPsec tunnels for communication between sites without
having the traffic to go through the hub.
30.What are the three phases of DMVPN?
Phase 1 - In phase 1 we use NHRP so that spokes can register themselves with the hub. Only
Hub uses a multipoint GRE interface, all spokes will be using regular point-to-point GRE
tunnel interfaces which means that there will be no direct spoke-to-spoke communication, all
traffic has to go via the hub. The only advantage of the phase I setup is the fact the hub
router’s configuration is much simpler. Summarization is possible in phase 1. Phase 2 - In
phase 2 all spokes routers also use multipoint GRE tunnels so we do have direct spoke to
spoke tunneling. When a spoke router wants to communicate to another spoke it will send an
NHRP resolution request to the hub to find the NBMA IP address of the other spoke.
Summarization is not possible in phase 2. Full Process: 1. Spoke 1 forwards a packet with a
next hop which is another spoke (spoke 2). There is no NHRP map entry for this spoke so an
NHRP resolution request is sent to the hub. 2. The request from spoke 1 contains the tunnel
IP address of the spoke 2 so the hub relays the request to spoke 2. 3. Spoke 2 receives the
request, adds its own address mapping to it and sends it as an NHRP reply directly to spoke 1.
4. Spoke 2 then sends its own NHRP resolution request to the hub that relays it to spoke 1. 5.
Spoke 1 receives the request from spoke 2 via the hub and replies by adding its own mapping
to it and sending it directly to spoke 2. Spoke to Spoke tunnel is established.
Phase 3 - In phase 3 NHRP redirect configured on the hub tells the initiator spoke to look for
a better path to the destination spoke. On receiving the NHRP redirect message the spokes
communicate with each other over the hub and they have their NHRP replies for the NHRP
Resolution Requests that they sent out. NHRP Shortcut configured on the spoke updates the
CEF table. It basically changes the next-hop value for a remote spoke from the initial hub
tunnel IP address to the NHRP resolved tunnel IP address of remote spoke. Summarization is
possible in phase 3.
31. Explain Next Hop Resolution Protocol (NHRP)?
It is a Layer 2 protocol which is used to map a tunnel IP address to an NBMA address. It
functions similar to ARP. Hub maintains the NHRP database of the public addresses for each
spoke. When the spoke boots up, it registers its real address to the hub and queries the NHRP
database for real addresses of other spokes so that they can build direct tunnels.
32.What is GRE?
Generic Routing Encapsulation Protocol is a tunneling protocol developed by Cisco designed
to encapsulate IP unicast, multicast and broadcast packets. It uses IP protocol number 47.
33. Name a major drawback of both GRE & L2TP?
No encryption.
34. What is SSL VPN? How it is different from IPSec VPN?
SSL VPN provides remote access connectivity from any internet enabled device through a
standard web browser and its native SSL encryption. It does not require any special client
software at a remote site. In IPSec VPN connection is initiated using a pre-installed VPN
client software so it requires the installation of special client software. In SSL VPN
connection is initiated through a web browser so it does not requires any special purpose
VPN client software, only a web browser is required.
35. At which Layer does SSL VPN operate?
SSL is an Application layer (Layer 7) cryptographic protocol that provides secure
communications over the Internet for web browsing, e-mail and other traffic. It uses TCP port
443.
36. What are different SSL VPN Modes?
SSL VPN can be deployed in one of the following three modes:-
1. Clientless mode - It works at Layer 7, Clientless mode provides secure access to web
resources and web-based content. This mode can be used for accessing most content that you
would expect to access in a web browser such as Internet, databases and online tools.
Clientless mode also supports the common Internet file system (CIFS). Clientless mode is
limited to web-based content only. It does not provide access to TCP connections such as
SSH or Telnet.
2. Thin client mode - It works at Layer 7 and is also known as port forwarding. Thin client
mode provides remote access to TCP-based services such as Telnet, Secure Shell (SSH),
Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP) and Post
Office Protocol (POP3) applications. Thin client is delivered via a Java applet that is
dynamically downloaded from the SSL VPN appliance upon session establishment.
3. Thick client mode - It works at Layer 3 and is also known as tunnel mode or full tunneling
client. The thick client mode provides extensive application support through dynamically
downloaded SSL VPN Client software or the Cisco AnyConnect VPN client software from
the VPN server appliance. This mode delivers a lightweight, centrally configured, and easy-
to-support SSL VPN tunneling client that provides full network layer (Layer 3) access to
virtually any application.
37. Explain SSL Handshake?
1. The client initiates by sending a CLIENT-HELLO message which contains SSL version
that the client supports, in what order the client prefers the versions, Ciphersuits
(Cryptographic Algorithms) supported by the client, Random Number.
2. The server will send back a SERVER-HELLO message Which contains Version Number
(Server selects SSL version that is supported by both the server and the client), Cipher Suits
(selected by server the best cipher suite version that is supported by both of them), Session
ID, Random Data. 3. The server also sends PKI certificate for authenticating himself signed
and verified by Certificate Authority along with the public key for encryption.
4. The server will then send Server Hello Done indicating that the server has finished
sending its hello message, and is waiting for a response from the client.
5. Client will send its certificate if the server has also requested for client authentication in
server hello message.
6. Client will send the Client Key Exchange message after calculating the premaster secret
with the help of the random values of both the server and the client. This message is sent by
encrypting it with the server's public key which was shared through the hello message. The
server will decrypt the premaster secret with its private key. Now both client and server will
perform a series of steps to generate session keys (symmetric) which will be used for
encryption and decryption of data exchanges during SSL session and also to verify its
integrity.
7. Client will send CHANGE CIPHER SUITE message informing the server that future
messages will be encrypted using session key.
8. Client will send CLIENT FINISH (DONE) message indicating that the client is done.
9. The server will also send CHANGE CIPHER SUITE message.
10. Client will also send CLIENT FINISH (DONE) message.
ACL
1. What is ACL?
Access Control List is a packet filtering method that filters the IP packets based on source
and destination address. It is a set of rules and conditions that permit or deny IP packets to
exercise control over network traffic.
2. What are different Types of ACL?
There are two main types of access lists:- 1. Standard Access List. 2. Extended Access List.
3. Explain Standard Access List?
Standard access list examines only the source IP address in an IP packet to permit or deny
that packet. It cannot match other fields in the IP packet. The standard access list can be
created using the access-list numbers 1-99 or in the expanded range of 1300-1999. The
standard access list must be applied close to the destination. As we are filtering based only on
source address, if we put the standard access-list close to the source host or network then
nothing would be forwarded from source. Example'
R1(config)# access-list 10 deny host 192.168.1.1
R1(config)# int fa0/0
R1(config-if)#ip access-group 10 in
4. Explain Extended Access List?
Extended Access List filters the network traffic based on the Source IP address, Destination
IP address, Protocol Field in the Network layer, Port number field at the Transport layer.
Extended Access List ranges from 100 to 199, In expanded range 2000-2699. Extended
Access List should be placed as close to the source as possible. Since extended access list
filters the traffic based on specific addresses (Source IP, Destination IP) and protocols we
don’t want our traffic to traverse the entire network just to be denied wasting the bandwidth.
Example
R1(config)# access-list 110 deny tcp any host 192.168.1.1 eq 23
R1(config)# int fa0/0
R1(config-if)# ip access-group 110 in
5.Explain Named ACL and its advantages over Number ACL?
Named ACL is just another way of creating standard and extended ACL. In Named ACL
names are given to identify access-list. It has the following advantage over number ACL - In
Name ACL we can give sequence number which means we can insert a new statement in the
middle of ACL. Example
R1(config)# ip access-list extended CCNA
R1(config)# 15 permit tcp host 10.1.1.1 host 20.1.1.1 eq 23
R1(config)# exit This will insert above statement at Line 15.
R1(config)# int fa0/0
R1(config-if)#ip access-group ccna in
6.What is Wildcard Mask?
The wildcard mask is used with ACL to specify an individual host, a network, or the range of
the network. Whenever a zero is present, it indicates that octet in the address must match the
corresponding reference exactly. Whenever a 255 is present, it indicates that octet need not be
evaluated. The wildcard mask is completely opposite to subnet mask.
Example- For /24 Subnet Mask - 255.255.255.0 Wildcard Mask - 0.0.0.255
7.How to permit or deny specific Host in ACL?
1. Using a wildcard mask "0.0.0.0" Example- 192.168.1.1 0.0.0.0 or 2. Using keyword
"Host" Example- Host 192.168.1.1
In which directions we can apply an Access List?
We can apply an access list in two directions:- IN - ip access-group 10 in OUT - ip access-
group 10 out
8.Difference between inbound access-list and outbound access-list?
When an access-list is applied to inbound packets on an interface, those packets are first
processed through ACL and then routed. Any packets that are denied won’t be routed. When
an access-list is applied to outbound packets on an interface, those packets are first routed to
outbound interface and then processed through ACL
9. Difference between #sh access-list command and #sh run access-list command?
#sh access-list shows the number of hit counts.
#sh run access-list does not show the number of hit counts.
10.How many access lists can be applied to an interface on a Cisco router?
We can assign only one access list per interface per protocol per direction which means that
when creating an IP access lists, we can have only one inbound access list and one outbound
access list per interface. Multiple access lists are permitted per interface, but they must be for
a different protocol.
11. How are access lists processed?
Access lists are processed in sequential, logical order, evaluating packets from the top down,
one statement at a time. As soon as a match is made, the permit or deny option is applied, and
the packet is not evaluated against any more access list statements. Because of this, the order
of the statements within any access list is significant. There is an implicit “deny” at the end of
each access list which means that if a packet doesn’t match the condition on any of the lines
in the access list, the packet will be discarded.
BASIC ROUTING
1. What is Routing?
The function of routing is to route packets between networks that are not locally attached.
2. What is a Router?
A Router is a networking device that performs routing which means it routes packets between
devices that are on different networks. A router is a Layer 3 device.
3. What are the different types of memory in the router?
RAM - Running configuration file: running-config is stored in RAM NVRAM - Startup
Configuration file: startup-config is stored in NVRAM Flash Memory - IOS is stored in Flash
Memory ROM - Instructions for POST, Bootstrap program, Mini-IOS is stored in ROM
4. What are the possible locations of IOS image?
FLASH and TFTP Server.
5. What is ROM Monitor?
If the Bootstrap program is not able to find a valid IOS image, it will act as ROM Monitor.
ROM Monitor is capable of performing certain configuration task such as:-
1. Recovering a lost password
2. Changing the configuration register value etc.
3. Downloading IOS image using TFTP
6. What are the different modes in the router?
1. User Exec Mode - In User Exec mode, we can only view the configuration settings on the
device but cannot make any changes to the device configuration. IOS prompt in user exec
mode is Router>
2. Privilege Mode - In Privilege mode, we can both view and make changes to the
configuration of a router. IOS prompt in Privilege Mode is Router# Command to navigate to
privilege mode from user exec mode:- Router>enable Router#
3. Global Configuration Mode - In Global Configuration mode we can make global changes.
Global changes are the changes which affect the router (device) as a whole such as changing
the hostname of a device. IOS prompt in Privilege Mode is Router (config) # Command to
navigate to Global Configuration mode from Privilege mode:- Router# configure terminal
Router (config) #
4. Specific Configuration Mode - We can navigate to a number of sub prompt from global
configuration, such as the interface prompts to configure the properties of a specific interface
and the router mode to configure routing protocols. IOS prompt in specific configuration
mode for interface prompt is Router (config-if) # Example:- Router (config) # interface fa0/0
Router (config-if) #
OSPF
1. What is the OSPF Routing protocol?
Open shortest path first is an Open Standard Link State routing protocol which works by using
the Dijkstra algorithm to initially construct the shortest paths and follows that by populating
the routing table with resulting best paths.
2. Mention some characteristics of OSPF?
1. OSPF is a classless routing protocol that supports VLSM and CIDR. 2. It allows for the
creation of areas and autonomous system. 3. OSPF uses cost as its metric, which is computed
based on the bandwidth of the link. 4. It has no hop-count limit. It supports unlimited Hop
count. 5. OSPF supports both IPV4 & IPV6. 6. OSPF routes have an administrative distance
of 110. 3.What is the need for dividing the autonomous system into various areas?
We would divide the autonomous system into various areas to keep route updates to a
minimum (reduce the number of routing updates in the network) to conserve resources and to
keep problems from propagating throughout the network.
4.What is the benefit of dividing the entire network into areas?
The following are benefits of dividing the entire network into areas:- 1. Decrease routing
overhead. 2. Speed up convergence. 3. Confine network instability to single areas of the
network.
5.What is Backbone Area?
While configuring multi-area OSPF, one area must be called area 0, referred to as backbone
area. All other areas must connect to backbone area as inter-area traffic is sent through the
backbone area.
6. Explain Area Border Router(ABR)?
It is the router that connects other areas to the backbone area within an autonomous system.
ABR can have its interfaces in more than one area.
7. What is an Autonomous System Border Router (ASBR)?
The router that connects different Autonomous Systems is known as the autonomous system
border router.
8. What is OSPF Router ID?
Router Id is used to identify the router. The highest IP address of the router's loopback
interfaces is chosen as the Router ID, If no loopback is present then the highest IP address of
the router's physical interfaces will be chosen as the Router ID.
9. What Parameters must match for two routers to become neighbors?
The following parameters must be the same on both routers in order for routers to become
neighbors:- 1. Subnet 2. Area id 3. Hello and Dead interval time 4. Authentication
10. How OSPF DR & BDR is elected? •
The router with the Highest Priority becomes the DR and router with the second highest priority
becomes the BDR. If there is a tie in priority, the router with the Highest Router ID will become
DR. • By default priority on Cisco routers is 1. We can manually change it. • If the Router
priority is set to 0 (Zero), that router will not participate in the DR/BDR election. • DR election
process is not preemptive. If a router with a higher priority is added to the network, it will not
become DR until we clear OSPF process and DR/BDR election takes place again. Command
to change the priority on an interface
router(config)# interface fa0/0
router(config-if)# ip ospf priority 100
11. Why DR and BDR are elected in OSPF?
All OSPF routers will form adjacencies with the DR and BDR. If link-state changes, the update
will be sent only to the DR, which then forwards it to all other routers. This greatly reduces the
flooding of LSAs, therefore, conserving the bandwidth.
12. Explain the various OSPF states?
OSPF routers need to go through several states before establishing a neighbor relationship:-
1. Down - No Hello packets have been received on the interface.
2. Attempt - In Attempt state neighbors must be configured manually. It applies only to non-
broadcast multiaccess (NBMA) networks.
3. Init state - Router has received a Hello message from the other OSPF router.
4. 2way state - The neighbor has received the Hello message and replied with a Hello message
of his own. Bidirectional Communication has been established. In Broadcast network DR-
BDR election can occur after this point.
5. Exstart state – DR & BDR establish adjacencies with each router in the network. A master-
slave election will take place (Master will send its DBD first).
6. Exchange state – Routing information is exchanged using DBD (Database Descriptor)
packets, Link-State Request (LSR). Link-State Update packets may also be sent.
7. Loading state – LSRs (Link State Requests) are send to neighbors for every network it
doesn't know about. The Neighbor replies with the LSUs (Link State Updates) which contain
information about requested networks. The requested information has been received, other
neighbor goes through the same process.
8. Full state - All neighbor routers have the synchronized database and adjacencies has been
established.
13. Explain OSPF LSA, LSU and LSR? The LSAs (Link-State Advertisements) are used by
OSPF routers to exchange routing and topology information. When two neighbors decide to
exchange routes, they send each other a list of all LSA in their respective topology database.
Each router then checks its topology database and sends Link State Request (LSR) message
requesting all LSAs that was not found in its topology table. Other router responds with the
Link State Update (LSU) that contains all LSAs requested by the neighbor.
14. What are the steps required to change Neighborship into adjacency?
1. Two-way communication (using Hello Protocol) 2. Database Synchronization which
means exchange of Database Description (DD) packets, Link State Request (LSR) packets,
Link State Update (LSU) packets. 3. After Database synchronization is complete, the two
routers are considered adjacent.
15.Explain OSPF timers?
Hello interval - This defines how often OSPF router will send the hello packet to other OSPF
router. Dead interval - This defines how long a router will wait for hello packets before it
declares the neighbor dead.
16.What is the default Hello Interval?
The default Hello Interval for OSPF is 10 seconds.
17. What is the default Dead Interval?
The Dead Interval is four times the Hello Interval. By default, it is 40 seconds.
18. What multicast address does OSPF use?
OSPF use the multicast address of 224.0.0.5 & 224.0.0.6.
19.Tables maintained by OSPF? Router participating in OSPF routing protocol maintains three
OSPF tables:-
1.Neighbor table - Stores information about OSPF neighbors. command to see # show ip ospf
neighbor
2.Topology table - Stores the topology structure of a network. command to see # show ip ospf
topology
3.Routing table - Stores the best routes to all known networks. command to see # show ip route
ospf
20. What are different OSPF LSA types ?
1. Router LSA (Type1) - Each router generates a Type 1 LSA that lists its active interfaces, IP
addresses, neighbors and the cost. LSA Type 1 is flooded only within an area.
2. Network LSA (Type2) - Type 2 LSA is sent out by the designated router (DR) and lists all
the routers on the segment it is adjacent to. Type 2 LSA are flooded only within an area. It
contains the information about DR's.
3. Summary LSA (Type3) - Type 3 LSAs are generated by Area Border Routers (ABRs) to
advertise networks from one area to the rest of the areas in Autonomous System. It contains
the information about inter-area routes.
4. Summary ASBR LSA (Type4) - It is generated by the ABR and contains routes to ASBRs.
5. External LSA (Type5) - External LSAs are generated by ASBRs and contain routes to
networks that are external to current AS.
6. Not-So-Stubby Area LSA (Type7) - Stub areas do not allow Type 5 LSAs. A Not So Stubby
Area (NSSA) allows advertisement of Type 5 LSA as Type 7 LSAs. Type LSA is generated
by an ASBR inside a Not So Stubby Area (NSSA) to describe routes redistributed into the
NSSA.
21.How do we configure the OSPF Routing Protocol?
router(config)# router ospf 10
router(config-router)# network 12.1.1.0 0.0.0.255 area 0
router(config-router)# network 23.1.0.0 0.0.255.255 area 1
router(config-router)# exit
• Router ospf 10 command enables the OSPF process. Here “10” indicates the OSPF process
ID and can be different on neighbor routers. Process ID allows multiple OSPF processes to run
on the same router.
• The second command configures 12.1.1.0/24 network in area 0.
• The third command configures 23.1.0.0/16 network in area 1.
1. What is the OSPF Routing Protocol?
Open shortest path first is an Open Standard Link State routing protocol which works by using
the Dijkstra algorithm to initially construct the shortest paths and follows that by populating
the routing table with resulting best paths.
2. What are the steps required to change neighborship into adjacency?
1. Two-way communication (using Hello Protocol).
2. Database Synchronization which means exchange of Database Description (DD) packets,
Link State Request (LSR) packets, Link State Update (LSU) packets. After Database
synchronization is complete, the two routers are considered adjacent.
3. Explain LSA (Link-State Advertisement), LSU (Link State Update) and LSR (Link State
Request)?
The LSAs (Link-State Advertisements) are used by OSPF routers to exchange routing and
topology information. When two neighbors decide to exchange routes, they send each other a
list of all LSAs in their respective topology database. Each router then checks its topology
database and sends Link State Request (LSR) message requesting all LSAs that was not found
in its topology table. Other router responds with the Link State Update (LSU) that contains all
LSAs requested by the neighbor.
4. Explain OSPF Router ID?
Router Id is used to identify the Router. The highest IP address of the router's loopback
interfaces is chosen as the Router ID, If no loopback is present then the highest IP address of
the router's physical interfaces will be chosen as the Router ID. OSPF prevents neighborships
between routers with duplicate RIDs. All OSPF RIDs in a domain should be unique. OSPF
Router ID should not be changed after the OSPF process is started and the OSPF neighborships
are established. If you change the OSPF router ID, we need to either reload the IOS or use
"clear ip ospf process" command (restart the OSPF process) for changed Router ID to take
effect. To manually configure the router ID
R1(config)# router ospf 5
R1(config-router)# router-id 5.5.5.5
5.Can we use OSPF without backbone area?
Yes, but then only intra-area communication is possible. Inter-area communication is not
possible without the backbone area.
6.What is the difference between an OPPF neighbor and an adjacent neighbor? LSAs are
exchanged only among adjacent routers not among neighbor routers.
7.What are different neighbour states in OSPF?
OSPF routers need to go through several states before establishing a neighbor relationship:-
1. Down - No Hello packets have been received on the interface.
2. Attempt - In Attempt state neighbors must be configured manually. It applies only to
nonbroadcast multiaccess (NBMA) networks.
3. Init - Router has received a Hello message from the other OSFP router.
4. 2way - Neighbor has received the Hello message and replied with a Hello message of his
own. Bidirectional Communication has been established. In Broadcast network DR-BDR
election can occur after this point.
5. Exstart - DR & BDR establish adjacencies with each router in the network. A master-slave
election will take place (Master will send its DBD first).
6. Exchange - Routing information is exchanged using DBD (Database Descriptor) packets,
Link-State Request (LSR) and Link-State Update packets may also be sent.
7. Loading - LSRs (Link State Requests) are send to neighbors for every network it doesn't
know about. The Neighbor replies with the LSUs (Link State Updates) which contains
information about requested networks. After all the requested information have been received,
other neighbor goes through the same process.
8. Full - All neighbor routers have the synchronized database and adjacencies has been
established.
8. Explain different OSPF LSA Types?
1. Router LSA (Type1) - Each router generates a Type 1 LSA that lists its active interfaces,
IP addresses, neighbors and the cost. LSA Type 1 is flooded only within an area.
2. Network LSA (Type2 - Type2 LSA is sent out by the designated router (DR) and lists all
the routers on the segment it is adjacent to. Type 2 LSA are flooded only within an area.
3. Summary LSA (Type3) - Type 3 LSAs are generated by Area Border Routers (ABRs) to
advertise networks from one area to the rest of the areas in Autonomous System.
4. Summary ASBR LSA (Type4) - Generated by the ABR. It contains routes to ASBRs.
5. External LSA (Type5) - External LSAs are generated by ASBRs and contain routes to
networks that are external to the current Autonomous System.
6. Not-So-Stubby Area LSA (Type7) - Stub areas do not allow Type 5 LSAs. A Not So
Stubby Area (NSSA) allows advertisement of Type 5 LSA as Type 7 LSAs. Type LSA is
generated by an ASBR inside a Not So Stubby Area (NSSA) to describe routes redistributed
into the NSSA.
9.Why does the master slave need to be elected between two neighbour interface?
Master sends its DBD (Database Description) First.
10. Explain different OSPF Network types?
1. Broadcast 2. Non-Broadcast (NBMA) 3. Point-to-Point 4. Point-to-multipoint 5. Point-to-
multipoint non-broadcast
11. What is the requirement of doing summarization?
1. Reduces the amount of information stored in routing tables.
2. Allocates an existing pool of addresses more economically.
3. Lessens the load on router processor and memory resources.
4. Less number of update messages.
5. Less bandwidth.
12. How routes are selected in OSPF according to preference?
Intra-Area routes(0)> Inter-Area routes(0-IA)> External-Type-1(E1)> External-Type-2(E2)>
NSSA-1(N1)> NSSA-2(N2).
13. What is Route Redistribution?
Route redistribution is the process of taking routes learned via one routing protocol and
injecting those routes into another routing protocol domain. For example, two companies
might merge, one company is using Enhanced Interior Gateway Routing Protocol (EIGRP)
and the other is using Open Shortest Path First (OSPF). Route redistribution allows
exchanging of routes between the two routing domains with a minimal amount of
configuration and with little disruption to the existing networks.
14. What is the default redistribution OSPF cost?
Redistribution into OSPF uses the following defaults:-
1. When taking from BGP, use a default metric of 1.
2. When taking from another OSPF process, take the source route’s metric. 3. When taking
from all other sources, use a default metric of 20.
15. What is the difference between Type-1 (E1) & Type-2 (E2) redistribution?
Type-2 is the default route type for routes learned via redistribution. The key with E2 routes is
that the cost of these routes reflects only the redistributed cost. E2 = only redistributed cost.
Type-1 redistributed routes reflects the cost to reach ASBR + redistributed cost. E1 = Cost to
reach ASBR + redistributed cost
16.Explain OSPF Virtual Link?
OSPF requires the use of a backbone area (area 0) with each area connecting to area 0 through
an ABR. However, in some cases, the regular area might not have a convenient point of
connection to the backbone area. In this case, OSPF uses the virtual link to connect that regular
area to the backbone area virtually. An OSPF virtual link allows two ABRs that connect to
the same non-backbone area to form a neighbor relationship through that non-backbone area,
even when separated by many other routers and subnets. This virtual link acts as a virtual
point-to-point connection between the two routers, with that link inside area 0. The routers
form a neighbor relationship, inside area 0, and flood LSAs over that link.
17.Explain OSPF Stub Area and different types of Stub Areas?
Stub Area Sometimes we need to control the advertisement of external routes into an area.
This area is called Stub area. Stub areas are not capable of importing routes external to OSPF.
Type 4 & Type 5 LSA are filtered from Stub areas and a default route is injected into that area
by ABR in place of external routes.
To make area stub we have to give # area 1 stub command on all routers of that area. Three
restrictions apply to OSPF stub areas
1. No virtual links are allowed in the stub area.
2. Stub area cannot be a backbone area.
3. No Autonomous System Boundary Routers are allowed. Totally Stubby Area Like stub
areas, totally stubby areas do not receive type 4 or 5 LSAs from their ABRs. However, they
also do not receive type 3 LSAs. It only allows advertisement of internal routes in that area.
To make area totally stubby area we have to give # area 1 stub no-summary command on
ABR. Not-So-Stubby Areas The motivation behind NSSA is to allow OSPF stub areas to
carry external routes. External routes are imported into OSPF NSSA as Type 7 LSA by ASBR.
Type 7 LSA cannot go into area 0 so it is converted back into Type 5 LSA by ABR and
injected into area 0. To make area Not-So-Stubby Area we have to give # area 1 NSSA
command on all routers of that area. Totally NSSA Along with Type 4 & Type 5 LSA, Type
3 LSA will also be filtered in Totally NSSA. To make area Totally Not-So-Stubby Area we
have to give # area 1 nssa no-summary command on ABR of that area.
18.How do I change the reference bandwidth in OSPF?
We can change the reference bandwidth using the OSPF auto-cost reference-bandwidth
command under router OSPF. By default, reference bandwidth is 100 Mbps.
19.How does OSPF calculate its metric or cost?
OSPF uses Cost as its metric. The formula to calculate the OSPF cost is reference bandwidth
divided by interface bandwidth. For example, in the case of Ethernet, it is 100 Mbps / 10
Mbps = 10. If # ip ospf cost _ command is used on the interface, it overrides this formulated
cost. 20.Explain OSPF Authentication?
These are the three different types of authentication supported by OSPF to secure routing
updates.
1. Null Authentication - also called Type 0. It means no authentication information is
included in the packet header. It is the default.
2. Plain Text Authentication - also called Type 1. It uses simple clear-text passwords.
3. MD5 Authentication - also called Type 2. It uses MD5 cryptographic passwords. Plain
Text Authentication Step1 - To configure plain text authentication, first we have to enable
authentication. Authentication can be enabled either under area or for a specific interface.
To enable authentication for area
Router(config)# router ospf 100
Router(config-router)# network 192.168.1.0 0.0.0.255 area 0
Router(config-router)# area 0 authentication This will enable authentication for all the
interfaces of the router in area 0. OR If we don't want to enable authentication for an area, we
can enable it for the specific interface. This is useful if different interfaces that belong to the
same area need to use different authentication methods. Router(config)# interface fa0/1
Router(config-if)# ip ospf authentication Step2 - Next, We have to configure authentication
key on the interface
Router(config)# interface fa0/1
Router(config-if)# ip ospf authentication-key Cisco123 Here Cisco123 is the password value.
MD5 Authentication Step1 - To configure MD5 authentication, first we have to enable
authentication.
Router(config)# router ospf 1
Router(config-router)# network 192.168.1.0 0.0.0.255 area 0
Router(config-router)# area 0 authentication message-digest OR Router(config)# interface
fa0/1
Router(config-router)# ip ospf authentication message-digest Step2 - Next, We have to
configure authentication key on the interface
Router(config)# interface fa0/1
Router(config-router)# ip ospf message-digest-key 10 md5 Cisco123 Here Cisco123 is the
password value and 10 is the Key ID (number). It doesn’t matter which key ID you choose
but it has to be the same on both ends. Authentication passwords do not have to be the same
throughout an area. However, they must be the same between neighbors.
21.Which command enables OSPF for IPv6 on a router?
# ipv6 router ospf process-id
22.What is the link-state retransmit interval, and what is the command to set it?
OSPF must send an acknowledgement of each newly received link-state advertisement (LSA).
LSAs are retransmitted until they are acknowledged. The link-state retransmit interval defines
the time between retransmissions. We can use the command ip ospf retransmit-interval to set
the retransmit interval. The default value is 5 seconds.
23.When routes are redistributed between OSPF processes, are all shortest path first algorithm
(SPF) metrics preserved or is the default metric value used?
The SPF metrics are preserved. The redistribution between them is like redistribution between
any two IP routing processes.
24.How do I stop individual interfaces from developing adjacencies in an OSPF network?
To stop routers from becoming OSPF neighbors on a particular interface, issue the passive-
interface command at the interface.
25.When I have two Type 5 link-state advertisements (LSAs) for the same external network
in the OSPF database, which path should be installed in the routing table?
When you have two Type 5 LSAs for the same external network in the OSPF database, prefer
the external LSA that has the shortest path to the Autonomous System Boundary Router
(ASBR) and install that into the IP routing table. Use the show ip ospf border-routers
command to check the cost to the ASBR.
26.Should I use the same process number while configuring OSPF on multiple routers within
the same network?
OSPF, unlike Border Gateway Protocol (BGP) or Enhanced Interior Gateway Routing
Protocol (EIGRP), does not check the process number (or autonomous system number) when
adjacencies are formed between neighboring routers and routing information is exchanged.
27. Can we have OSPF run over a GRE tunnel?
Yes, we can have OSPF run over a GRE tunnel
BGP
1. Explain the Border Gateway Protocol (BGP)?
Border Gateway Protocol advertises, learns and chooses the best paths inside the global
Internet.
2. When two ISPs connect, they typically use BGP to exchange routing information.
Enterprises also sometimes use BGP to exchange routing information with ISPs, allowing the
enterprise routers to learn internet routes. when we have multiple Internet connections and we
want to influence some packets to take one path and some packets to take another we use BGP.
3.Can Routers on different subnet become BGP neighbors?
BGP does not require neighbors to be attached to the same subnet. Instead, BGP routers use a
TCP connection between the routers to pass BGP messages allowing neighboring routers to be
on the same or different subnet.
4.What TCP port number BGP use for connection?
BGP uses TCP port 179 for the connection.
5. Difference between eBGP and iBGP neighbor?
In iBGP, neighborship is formed between routers within the same AS (autonomous system)
whereas in eBGP, neighborship is formed between routers within different AS.
6. What Administrative Distance BGP uses for iBGP & eBGP?
AD for iBGP = 200, AD for eBGP = 20.
7. Explain Loop prevention mechanism in BGP?
BGP uses two mechanisms to prevent loops:- 1. When a router learns routes from an iBGP
peer, that router does not advertise the same routes to another iBGP peer. 2. By using
AS_PATH - When advertising to an eBGP peer, a BGP router adds its own ASN to the
AS_PATH. If a BGP router receives an update and the route advertisement lists an AS_PATH
with its own ASN, the router ignores that route. Note - A BGP router does not add its ASN
when advertising to an iBGP peer.
8. Do we need to follow the 3-way handshake process to establish BGP communication?
Yes
9. What is the difference between the hard reset and soft reset in BGP?
In case of hard reset the local router brings down the neighborship, brings down the underlying
TCP connection and all the BGP table entries learned from that neighbor are removed.
#clear ip bgp * command is used for hard reset. In case of a soft reset, the router does not bring
down the BGP neighborship or the underlying TCP connection. However, the local router
resends outgoing Updates and reprocesses incoming Updates adjusting the BGP table based on
the current configuration.
#clear ip bgp * soft command is used for soft reset.
10. What are different BGP Message Types?
1. Open - It is Used to establish a neighbor relationship and exchange parameters, including
autonomous system number and authentication values. 2. Keepalive - It is Sent periodically
to maintain the neighbor relationship. If the Keepalive message is not received within the
negotiated hold timer then BGP neighborship will be turned down.
3.Update - It exchanges Path Attributes and the associated prefix/length (NLRI) that use those
attributes.
4. Notification - It is Used to report BGP error. It results in a reset of neighbor relationship.
7.Compare HUB and Switch with respect to broadcast and collision domain?
In the hub, there is one collision domain and one broadcast domain. In a switch, there is
multiple collision domains and one broadcast domain.
8.What is a MAC address table and how a switch will build a MAC table?
To switch frames between LAN ports efficiently, the switch maintains an address table called
MAC address Table or CAM Table (Content Addressable Memory Table). When the switch
receives a frame, source MAC address is learned and recorded in the CAM table along with
the port of arrival, VLAN and time stamp. The switch dynamically builds the MAC address
table by using the Source MAC address of the frames received. This table is then used by the
switch to determine where to forward traffic on a LAN.
9.How does Switch learn Mac Address?
When a frame reaches to the port of a switch, the switch reads the MAC address of the source
device from the Ethernet frame and compares it to its MAC address table (also known as
CAM (Content Addressable Memory) table). If the switch does not find a corresponding entry
in the MAC address table, the switch will add the address to the table with the port number at
which the Ethernet frame is received. If the MAC address is already available in the MAC
address table, the switch compares the incoming port with the port already available in the
MAC table. If the port numbers are different, the switch updates the MAC address table with
the new port number.
10.How does Switch perform forwarding function?
When a Layer 2 Ethernet frame reaches a port on the switch, it not only reads the source MAC
address of the Ethernet frame as a part of learning function but also reads the destination MAC
address as a part of forwarding function. The destination MAC address is important to
determine the port to which the destination device is connected. As the destination MAC
address is found on the MAC address table, the switch forwards the Ethernet frame via the
corresponding port of the MAC address.
11. Explain Flooding?
If the destination MAC address is not found in the MAC address table, the switch forwards
the frame out all of its ports except the port on which the frame was received. This is known
as flooding.
VLAN
1. What is a VLAN and How does it reduce the broadcast traffic?
A VLAN is a logical grouping of network users and resources connected to administratively
defined ports on a switch. VLAN divides the broadcast domain So, the frames that will be
broadcasted onto the network are only switched between the ports logically grouped within the
same VLAN.
2. What is the difference between an access port and a trunk port?
Access port - Access port belongs to and carries the traffic of only one VLAN. Anything
arriving on an access port is simply assumed to belong to the VLAN assigned to the port. Any
device attached to an access link is unaware of a VLAN membership as switches remove any
VLAN information from the frame before it’s forwarded out to an access-link device. Access-
link devices can’t communicate with devices outside their VLAN unless the packet is routed.
Trunk Port - Trunk port can carry the traffic of multiple VLANs from 1 to 4094 VLANs at a
time. Normally Trunk link is used to connect switches to other switches or to routers. Trunk
ports support tagged and untagged traffic simultaneously.
3. What is Frame Tagging and different types of Frame Tagging?
Frame tagging method uniquely assigns a VLAN ID to each frame. It is used to identify the
VLAN that the Frame belongs to. There are mainly two types of Frame Tagging Method:-
1.Inter-Switch Link (ISL) 2.802.1Q These are also known as Frame Encapsulation Protocols.
4. Explain the difference between 802.1Q and ISL?
802.1Q - It is an open standard created by the Institute of Electrical and Electronics Engineers
(IEEE). To Identify to which VLAN a frame belongs to, a field is inserted into the frame's
header. It is a Light Weighted Protocol & adds only 4 Byte within Frame's Header. ISL (Inter-
Switch Link) - This protocol is Cisco proprietary which means unlike 802.1Q, it can be used
only between Cisco switches. ISL works by adding Header (26 Bytes) and Trailer(4 Bytes)
with Original Ethernet Frame.
5. What is a Native VLAN and What type of traffic will go through Native VLAN?
The Trunk port is assigned a default VLAN ID for a VLAN that all untagged traffic will travel
on. This VLAN is called the Native VLAN and is always VLAN 1 by default (but can be
changed to any VLAN number). Similarly, any untagged or tagged traffic with unassigned
VLAN ID is assumed to belong to the Native VLAN.
6. What is Inter-VLAN Routing?
VLANs divide broadcast domains in a LAN environment So, by default only Hosts that are
members of the same VLAN can communicate. Whenever hosts in one VLAN need to
communicate with hosts in another VLAN, the traffic must be routed between them. This is
known as Inter-VLAN routing. This can be done by two methods - Router-On-Stick & Switch
Virtual Interfaces (SVI) 7.Give the commands to create VLAN?
Switch(config)# vlan 10
Switch(config-vlan)# name sales
Switch(config-vlan)# exit
8.How can we add an interface to a VLAN?
Switch(config)# interface fastethernet0/0
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 10
9. How to configure trunk link?
Switch(config)# interface fa0/24
Switch(config-if)# switchport trunk encapsulation
Switch(config-if)# switchport mode trunk
10. How can we change Native VLAN?
Switch(config)# interface fa0/0
Switch(config-if)#switchport trunk native vlan 100
11. Which command is used to see trunk interfaces?
Switch# show interface trunk
12. Which command is used to see all VLANs information?
Switch# show vlan
STP
1. What is STP and Redundant Links?
Spanning Tree Protocol (STP) is a protocol which prevents layer 2 loops. STP enables switches
to become aware of each other so that they can negotiate a Loop-Free path through the network.
In practical Scenario, Redundant links are created to avoid complete network failure in an event
of failure of one link.
2. How STP works?
STP chooses a reference point (Root Bridge) in the network and calculates all the redundant
paths to that reference point. Then it picks one path which to forward frames and blocks other
redundant paths. When blocking happens, Loops are prevented.
3. What are the different port states?
1. Disabled - A port in the disabled state does not participate in the STP. 2. Blocking - A
blocked port does not forward frames. It only listens to BPDUs. The purpose of the blocking
state is to prevent the use of looped paths.
2. Listening - A port in the listening state prepares to forward data frames without populating
the MAC address table. The port also sends and listens to BPDUs to make sure no loops occur
on the network.
3. Learning - A port in learning state populates the MAC address table but doesn’t forward data
frames. The port still sends and receives BPDUs as before.
4. Forwarding - The port now can send and receive data frames, collect MAC addresses in its
address table, send and receive BPDUs. The port is now a fully functioning switch port within
the spanning-tree topology.
4. What is STP Timer and Explain different types of STP Timers?
STP uses three timers to make sure that a network converges properly before a bridging loop
can form. Hello timer - The time interval between configuration BPDUs sent by the root bridge.
It is 2 seconds by default. Forward Delay timer - The time interval that a switch port spends in
both the Listening and Learning states. The default value is 15 seconds. Max (Maximum) Age
timer - Maximum length of time a BPDU can be stored without receiving an update. It can also
be defined as a time interval that a switch stores a BPDU before discarding it. It is 20 seconds
by default. 5.Explain types of STP Port Roles?
Root port - The root port is always the link directly connected to the root bridge, or the shortest
path to the root bridge. It is always on Non-Root Bridge. Designated port - A designated port
is one that has been determined as having the best (lowest) cost. A designated port will be
marked as a forwarding port. It can be on both the root Bridge & non-root Bridge. All ports of
root bridge are designated port. Forwarding port - A forwarding port forwards frames. Blocked
port - A blocked port is the port that is used to prevent loops. It only listens to BPDUs. Any
port other than root port & designated port is a blocked port.
6.What is BPDU?
All the switches exchange information to select root bridge as well as for configuration of the
network. This is done through the Bridge Protocol Data Unit (BPDU). Each switch compares
the parameters in the BPDU that it sends to one neighbor with the one that it receives from
another neighbor.
7. What is the destination MAC address used by Bridge Protocol Data Units (BPDUs)?
Bridge Protocol Data Units (BPDUs) frames are sent out as at multicast destination MAC
address 01:80:c2:00:00:00.
8. What are Types of BPDU?
Two types of BPDU exist:- Configuration BPDU - This type of BPDU is used for spanning-
tree computation. Topology Change Notification (TCN) BPDU - This type of BPDU is used to
announce changes in the network topology.
9. How Root bridge is elected?
The bridge ID is used to elect the root bridge in the STP domain. This ID is 8 bytes long and
includes both the priority and the MAC address of the device. Switch with the lowest Bridge
ID is elected as the root bridge which means switch with the lowest priority will become root
bridge if two or more switches have same priority then switch with lowest mac address will
become root Bridge.
10. What is Path Cost or Spanning Tree Path Cost value?
The Spanning Tree Cost Value is inversely proportional to the bandwidth of the link and
therefore a path with a low cost value is preferable than a path with high cost value. Link
Bandwidth Cost Value 10 Gbps 2 1 Gbps 4 100 Mbps 19 10 Mbps 100
11. What is Root Port?
Once the Root Switch is elected, every other Switch in the network must select a single port
on itself to reach the Root Switch. The port with the lowest root path cost (lowest cumulative
cost to reach the root switch) is elected as the root port and is placed in the forwarding state.
Root bridge will never have a root port.
12. What is Extended System ID?
The Extended System ID is utilized by spanning-tree to include the VLAN ID information
inside 16-bit STP Bridge Priority value. Extended System ID is the least significant 12-bits in
16-bit STP Bridge Priority value.
1. What is STP & Redundant Links?
Spanning Tree Protocol (STP) is a protocol which prevents layer 2 loops. STP enables
switches to become aware of each other so that they can negotiate a Loop-Free path through
the network. In practical Scenario, Redundant links are created to avoid complete network
failure in an event of failure of one link.
2. How STP works?
STP chooses a reference point (Root Bridge) in the network and calculates all the redundant
paths to that reference point. Then it picks one path by which to forward frames and blocks
other redundant paths.
3. What are the different port states?
1. Disabled - A port in the disabled state does not participate in the STP. 2. Blocking - A
blocked port does not forward frames. It only listens to BPDUs. The purpose of the blocking
state is to prevent the use of looped paths.
2. Listening - A port in the listening state prepares to forward data frames without populating
the MAC address table. The port also sends and listens to BPDUs to make sure no loops occur
on the network.
3. Learning - A port in learning state populates the MAC address table but doesn’t forward data
frames. The port still sends and receives BPDUs as before.
4. Forwarding - The port now can send and receive data frames, collect MAC addresses in its
address table, send and receive BPDUs. The port is now a fully functioning switch port within
the spanning-tree topology.
4. What is the default time a port takes to transition from the blocking state to the forwarding
state?
The default time a port takes to transition from the blocking state to the forwarding state is 50
seconds: 20 seconds for Max Age, 15 seconds for listening, and 15 seconds for learning.
5.What are STP Timers and Explain different types of STP Timers?
STP uses three timers to make sure that a network converges properly before a bridging loop
can form.
1. Hello - The time interval between Configuration BPDUs sent by the root bridge. It is 2
seconds by default.
2. Forward Delay - The time interval that a switch port spends in both the Listening and
Learning states. The default value is 15 seconds.
3. Max Age - Maximum length of time, a BPDU can be stored without receiving an update. It
can also be defined as a time interval that a switch stores a BPDU before discarding it. It is 20
seconds by default.
6. Explain types of STP Port Roles?
1. Root port - The root port is always the link directly connected to the root bridge, or the
shortest path to the root bridge. It is always on Non-Root Bridge.
2. Designated port - A designated port is one that has been determined as having the best
(lowest) cost. A designated port will be marked as a forwarding port. It can be on both the Root
Bridge & Non-Root Bridge. All ports of Root Bridge are Designated Port.
3. Forwarding port - A forwarding port forwards frames
4. Blocked port - A blocked port is the port that is used to prevent loops. It only listens to
frames. Any port other than Root port & Designated port is Block Port.
7.What is the STP blocking state?
When a switch starts, all ports are in the blocking state to prevent any loop in the network. If
there is a better path to the root bridge, the port remains in the blocked state. Ports in the blocked
state cannot send or receive traffic, but they can receive BPDUs.
8.What is BPDU?
All the switches exchange information to select Root Bridge as well as for configuration of
the network. This is done through the Bridge Protocol Data Unit (BPDU). Each switch
compares the parameters in the BPDU that it sends to one neighbor with the one that it receives
from another neighbor.
9.How often do Bridges send BPDUs on active ports?
The default time that bridges send BPDUs is 2 seconds.
10.What is the destination MAC address used by Bridge Protocol Data Units (BPDUs)?
Bridge Protocol Data Units (BPDUs) frames are sent out as at multicast destination MAC
address 01:80:c2:00:00:00.
11.What are Types of BPDU?
Two types of BPDU exist:- 1. Configuration BPDU - It is used for Spanning-Tree
Computation. 2. Topology Change Notification (TCN) BPDU - It is used to announce changes
in the Network Topology.
12. How Root bridge is elected?
The Bridge ID is used to elect the root bridge in the STP domain. This ID is 8 bytes long and
includes both the priority and the MAC address of the device. Switch with the lowest Bridge
ID is elected as the Root bridge which means switch with the lowest priority will become Root
Bridge if two or more switches have same priority then switch with lowest mac address will
become Root Bridge.
13.Explain Root path cost?
Root path cost is the Cumulative Cost of all links to the Root Bridge.
14.How Root Ports are elected?
Non Root Bridges use Root path cost to determine which port will be the Root port. The port
with the lowest root path cost is elected as the root port and is placed in the forwarding state.
15.What is the difference between Path cost and Root Path cost?
Path cost is the value assigned to each port. It is added to BPDUs received on that port to
calculate the root path cost. Root path cost is defined as the cumulative cost to reach the root
bridge. This value is calculated by adding the receiving port's path cost to the value contained
in the BPDU. In a BPDU, the Root path cost is transmitted not the path cost.
16. What is Path Cost or Spanning Tree Path Cost value?
The Spanning Tree Cost Value is inversely proportional to the associated bandwidth of the
link and therefore a path with a low-cost value is more preferable than a path with high-cost
value. Link Bandwidth Cost Value 10 Gbps 2 1 Gbps 4 100 Mbps 19 10 Mbps 100
17.What is Root Port?
Once the root switch is elected, every other Switch in the network must select a single port on
itself to reach the Root Switch. The single selected port on a Switch with least Path Cost to
reach the Root Bridge is called the Root Port. Root Bridge will never have a Root Port.
18.What is Extended System ID?
The Extended System ID is utilized by spanning-tree to include the VLAN ID information
inside 16-bit STP Bridge Priority value. Extended System ID is the least significant 12-bits in
16-bit STP Bridge Priority value.
19. Explain Root Guard? Root guard is used to protecting the root bridge. Root Guard stops a
new switch introduced in the network with a lower bridge ID to become the root bridge. If a
port with Root Guard feature enabled receives a superior BPDU, it moves the port into a root-
inconsistent state (equal to a listening state) thus maintaining the current Root Bridge status. It
is enabled on interface level.
switch(config-if)# spanning-tree guard root
20.What is the BPDU Guard?
When we enable portfast on a port, we do not expect BPDU's on that port. Suppose a switch is
connected by mistake on the port where portfast is enabled, a loop can form. An even greater
consequence is that connected switch has the potential to become the root bridge. The BPDU
Guard feature was developed to protect the integrity of switch ports that have PortFast enabled.
If any BPDU (superior to the current root or not) is received on a port where BPDU Guard is
enabled, that port immediately is put into the error-disable state. The port is shut down in an
error condition and must be either manually re-enabled or automatically recovered through the
error-disable timeout function. BPDU Guard can be enabled on both interface & global level.
It is basically enabled on access layer switches. In this, all VLANs are effected.
Switch(config)# spanning-tree portfast bpduguard default
Switch(config-if)# spanning-tree bpduguard enable Explain
21.Sudden Loss of BPDUs?
Suppose switch does not receive BPDUs, it will think that the topology must have changed,
so blocked ports can be unblocked again. What if the absence of BPDUs is actually a mistake
and not a topology change, bridging loops easily can form. There are two features that help
detect or prevent the unexpected loss of BPDUs:- 1. Loop Guard 2. Unidirectional Link
Detection (UDLD)
22.What is Loop Guard?
Loop Guard keeps track of the BPDU activity on non-designated ports. It does not allow non-
designated ports to become designated ports in case of sudden loss of BPDUs. While BPDUs
are received, the port is allowed to behave normally. When BPDUs go missing, Loop Guard
moves the port into the loop-inconsistent state (port is effectively blocking at this point to
prevent a loop from forming and to keep it in the non-designated role). When BPDUs are
received on the port again, Loop Guard allows the port to move through the normal STP states
and become active. It can be enabled on both interface & global level. It affects per VLAN
basis.
Switch(config)# spanning-tree loopguard default
Switch(config-if)# spanning-tree guard loop
23.What is BPDU Filter?
STP runs on a switch to prevent loops. However, in special cases when we need to prevent
BPDUs from being sent or processed on one or more switch ports, we can use BPDU filtering
to effectively disable STP on those ports. It prevents the port from sending and receiving
BPDUs. It can be enabled on both interface & global level.
Switch(config)# spanning-tree portfast bpdufilter default
Switch(config-if)# spanning-tree bpdufilter { enable | disable }
24.What is the difference between the BPDU Guard and BPDU Filter?
BPDU Guard works aggressively and puts the port in the error-disable state while BPDU filter
does not shut the port, it only filters BPDU. BPDU Guard only prevents receiving BPDUs
while BPDU filter prevents both sending and receiving BPDU. If Both BPDU Guard and
BPDU Filter is enabled on a port then only BPDU filter will work.
RSTP and MST
1. Root port - It is the port on the switch that has the best root path cost to the root bridge.
This is identical to
802.1D.
2. Designated port - The switch port on a network segment that has the best root path cost to
the root.
3. Alternate port - A port that has an alternative path to the root, different from the path the
root port takes. This
4. Backup port - A port that provides a redundant (but less desirable) connection to a segment
where another
switch port already connects. If that common segment is lost, the switch might or might not
have a path back to
the root.
1. Discarding - Incoming frames simply are dropped; no MAC addresses are learned. This
state combines the
2. Learning - Incoming frames are dropped, but MAC addresses are learned.
3. Forwarding - Incoming frames are forwarded according to MAC addresses that have been
learned.
RSTP distinguishes its BPDUs from 802.1D BPDUs as RSTP BPDU's version is set to 2.
BPDUs are sent out
every switch port at hello time intervals, regardless of whether BPDUs are received from the
root. When three
BPDUs are missed in a row, that neighbor is presumed to be down and all information related
to the port leading
to the neighbor is aged out. Also, some previously unused bits in the Message Type field are
used in RSTP
BPDU's.
Edge Port - Port on which end devices connect. Portfast is enabled on this port. As loop
cannot form on this port
so it can be placed immediately in the forwarding state. If a BPDU is received on edge port, it
loses its edge port
status.
Point to point Port - These are ports that connect to other switch and becomes designated
port. Full-duplex ports
are considered the point to point because only two switches can be present on the link.
In RSTP, BPDUs are exchanged back and forth in the form of a proposal and an agreement.
One switch proposes
that its port becomes a designated port and if the other switch agrees it replies with an
agreement message.
In RSTP, TCN BPDU is not sent to root bridge instead of the switch on which the change
happens will itself send
TCN BPDU to all other switches. BPDU with their TCN bit set is sent out on all non-edge
designated ports.
Explain MST?
Multiple Spanning Tree Protocol maps one or more VLANs to single STP instance. Multiple
instances of STP can
be used with each instance supporting a different group of VLANs. Instance zero is by
default on a switch. Any
Every switch in an MST region runs MST with compatible parameters. Within the region, all
switches must run
If two switches have the same set of attributes, they belong to the same MST region.
Explain M-Record?
In MST, one switch calculates a hash for a particular instance and send it to another switch.
Another switch will
match priority in that hash with its own calculated hash and root bridge is elected.
The entire MST instance-to-VLAN mapping table is not sent in the BPDUs because the
instance mappings must
be configured on each switch. Instead, a digest or a hash code computed is sent. Switches
compare the received
The configuration revision number gives us a means of tracking changes to the MST region
configuration. Each
time we make changes to the configuration, we should increase the number by one. It is not
incremented
automatically.
1.What is VTP?
VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol used by Cisco switches to
exchange VLAN
VTP Server mode - By default, every switch is in server mode. Switch in VTP Server Mode
can create, delete
VTP Client mode - Switch in VTP client mode cannot create or delete VLANs. VLAN
Trunking Protocol (VTP)
client mode switches listen to VTP advertisements from other switches and modify their
VLAN configurations
VTP Transparent mode - Switch in VTP Transparent mode does not share its VLAN database
but it forwards
received VTP advertisements. we can create and delete VLANs on a VTP transparent switch
but these changes
3.What are the requirements to exchange VTP messages between two switches?
VLAN Trunking Protocol (VTP) pruning is a feature in Cisco switches, which stops VLAN
update information
traffic from being sent down trunk links if the updates are not needed. Broadcast frames,
multicast frames or
unicast frames for which the destination MAC address is unknown are forwarded over a trunk
link only if the
switch on the receiving end of the trunk link has ports in the source VLAN. This avoids
unnecessary flooding.
DTP
1. Explain Dynamic Trunking Protocol (DTP)?
Dynamic Trunking Protocol (DTP) is a Cisco proprietary trunking protocol used for
negotiating trunking on a link between two Cisco Switches. Dynamic Trunking Protocol (DTP)
can also be used for negotiating the encapsulation type of either 802.1q or Cisco ISL (Inter-
Switch Link).
2. Explain dynamic desirable & dynamic auto?
Dynamic Desirable - It initiates negotiation. Switch port configured as DTP dynamic desirable
mode will actively try to convert the link to a trunk link if the port connected to other port is
capable to form a trunk. Dynamic Auto - It does not initiate negotiation but can respond to
negotiation. Switch port configured as DTP dynamic auto is capable to form trunk link if the
other side switch interface is configured to form a trunk interface and can negotiate with trunk
using DTP.
DHCP
1. What is DHCP?
Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts dynamically. It
allows easier administration and works well in small as well as very large network
environments. All types of hardware can be used as a DHCP server including a Cisco router.
2. What information can a DHCP server provide to a host?
A DHCP server can provide the following information:- IP address Subnet mask Default
gateway Domain Name Server WINS information
3. How DHCP Works?
DHCP works on DORA Process (DISCOVER - OFFER - REQUEST -
ACKNOWLEDGEMENT) 1. When a Client needs an IP configuration, it tries to locate a
DHCP server by sending a Broadcast called a DHCP DISCOVER. This message will have a
destination IP of 255.255.255.255 and destination MAC of FF:FF:FF:FF:FF:FF Source IP -
0.0.0.0 , Destination IP - 255.255.255.255, Source Mac - Mac address of Host, Destination
Mac - FF:FF:FF:FF:FF:FF ———————————————— 2. On Receiving DHCP
Discover, the server sends a DHCP OFFER message to the client. The DHCPOFFER is a
proposed configuration that may include IP address, DNS server address, and lease time. This
message will be Unicast and have the destination mac address of DHCP client's mac address.
The source mac address will be that of the DHCP server. Source Mac - Mac address of Server,
Destination Mac - Mac address of Host ———————————————— 3. If the Client
finds the Offer agreeable, it sends DHCP REQUEST Message requesting those particular IP
parameters. This message will be a Broadcast message. Source Mac - Mac address of Host,
Destination Mac - FF:FF:FF:FF:FF:FF ———————————————— 4. The Server
on receiving the DHCP REQUEST makes the configuration official by sending a Unicast
DHCP ACK acknowledgement. Source Mac - Mac address of Server, Destination Mac - Mac
address of Host
4. What is the reason for getting APIPA address?
With APIPA, DHCP clients can automatically self-configure an IP address and subnet mask
when a DHCP server is not available. When DHCP client boots up, it first looks for a DHCP
server in order to obtain an IP address and subnet mask. A client uses the self-configured IP
address until a DHCP server becomes available. The APIPA service also checks regularly for
the presence of a DHCP server. If it detects a DHCP server on the network, APIPA stops and
the DHCP server replaces the APIPA networking addresses with dynamically assigned
addresses.
5.What is the range of APIPA address?
The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself
with a default Class B subnet mask of 255.255.0.0.
6.What is the purpose of a relay agent?
A DHCP relay agent is any host that forwards DHCP packets between clients and servers if
they are not on the same physical subnet. Relay agents are used to forwarding requests and
replies between clients and servers when they are not on the same physical subnet. DHCP relay
agent can be configured using the IP helper-address command.
7.What is DHCP decline message?
It is sent by a client to the server indicating network address is already in use (already assigned
to another device).
8.What is a DHCPNAK message?
If the server is unable to satisfy the DHCPREQUEST message (the requested network address
has already been allocated to another device) the server should send DHCPNAK message to
the client. It can also be sent if client's notion of the network address is incorrect (Client has
moved to new a subnet) or client's lease expired.
SNMP
What is SNMP?
The Simple Network Management Protocol (SNMP) enables a network device to share
information about itself
and its activities. It uses the User Datagram Protocol (UDP) as the transport protocol for
passing data between
SNMP Manager - A network management system that uses SNMP to poll and receive data
from any number of
network devices. The SNMP manager usually is an application that runs in a central location.
SNMP Agent - A process that runs on the network device being monitored. All types of data
are gathered by the
device itself and stored in a local database. The agent can then respond to SNMP polls and
queries with
information from the database, and it can send unsolicited alerts or “traps” to an SNMP
manager.
SNMP uses the UDP port 161 for sending and receiving requests, and port 162 for receiving
traps from managed
devices.
Explain MIB?
MIB is a hierarchical Database Structure for information on the device. Example - serial
numbers are in a
There are different versions of SNMP - SNMP V1, SNMP V2c, and SNMP V3.
SNMP version 1 - It is the oldest flavor. It is Easy to set up – only requires a plaintext
community.
SNMP version 2c - It is identical to Version 1, except that it adds support for 64-bit counters.
SNMP version 3 - It adds security to the 64-bit counters. SNMP version 3 adds both
Encryption and
OSI MODEL
1. List the Layers of OSI Model?
Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data
Link Layer, Physical Layer.
2. What are the Functions of Transport, Network and Data Link Layer?
Transport layer
1. It segments and reassemble data from upper-layer applications and combines it into the same
data stream.
2. It provides end-to-end data transport services.
3. Establishes the logical connection between the sending host and destination host in an
internetwork.
4. It ensures Data integrity at the Transport layer by maintaining flow control.
Network layer
1. The Network layer (layer 3) manages device addressing.
2. It tracks the location of devices on the network.
3. It determines the best way to move data between devices that are not locally attached.
4. Routers Functions at the Network layer to provide the routing services within an
internetwork.
Data link layer
1. The Data Link layer is responsible for the physical transmission of the data.
2. It handles error notification, flow control.
3. Data Link layer ensures that messages are delivered to the proper device on a LAN using
mac addresses.
4. It translates messages from the Network layer into bits for the Physical layer to transmit.
5. The Data Link layer formats the message into the data frame and adds a customized header
containing the hardware destination and source address.
3.Which Layer is responsible for Reliable connection?
Transport Layer
4.What are the different protocols works at each of the layers in OSI Model?
Physical Layer
ISDN (Integrated Services Digital Network), ADSL (Asymmetric Digital Subscriber Line),
Universal Serial Bus, Bluetooth, Controller Area Network, Ethernet.
Data Link layer
Spanning Tree Protocol, VLan Trunking Protocol, Dynamic Trunking Protocol, HDLC, PPP,
Frame Relay, Token Ring.
Network Layer
ICMP, IGMP, IPV4, IPV6, IPSEC, OSPF, EIGRP, RIP, BGP.
Transport Layer
TCP, UDP, GRE.
Session Layer
NFS (Network File System).
Presentation Layer
Data encryption/decryption, Data compression, Data Conversion Protocols
Application Layer
DNS, DHCP, FTP, HTTP, NTP, SNMP, SMP, TELNET, TFTP, SSH.
5. What is a port number and give some examples?
TCP & UDP must use port numbers to communicate with upper layers because these are what
keep track of different conversations crossing the network simultaneously. PROTOCOLS
PORT NUMBERS FTP 20,
21
TELNET 23
SMTP 25
DNS 53
DHCP 67 (DHCP Server) 68(DHCP Client)
TFTP 69
HTTP 80
POP3 110
NTP 123
IMAP4 143
SNMP 161
BGP 179
HTTPS 443
RIP 520
TCP
1. What is TCP?
Transmission Control Protocol is a connection-oriented protocol. This means that before any
data transfer can take place, certain parameters have to be negotiated in order to establish the
connection.
2. Explain TCP Three-Way Handshake process?
For Reliable connection, the transmitting device first establishes a connection-oriented
(reliable) session with its peer system, which is called three-way handshake. Data is then
transferred. When the Data transfer is finished, the connection is terminated and a virtual circuit
is torn down.
1. In the First part of Three-way Handshake, the source sends a TCP SYN segment with the
initial sequence number X indicating the desire to open the connection. —————————
———————
2. In Second Part, when destination receives TCP SYN, It acknowledges this with Ack (X+1)
as well as its own SYN Y (It informs Source what sequence number it will start its data with
and will use in further messages). This response is called SYN/ACK. ——————————
——————
3. In the Third Part, the source sends an ACK (ACK = Y+1) segment to the destination
indicating that the connection is set up. Data transfer can then begin. During this 3 way
Handshake, devices are negotiating parameters like Window Size etc.
3.What does Window Size indicate?
It is 16-bit Window field which indicates the number of bytes a sender will send before
receiving an acknowledgement from the receiver.
4. What is the purpose of RST bit?
When the connection is not allowed by destination connection is reset. What are TCP Flags?
TCP Flags are used to influence the Flow of Data across a TCP Connection.
1. PUSH (PSH) - It Pushes the buffered data to the receiver's application. If data is to be sent
on the immediate basis we will push it.
2. Reset (RST) - It Resets the connection.
3. Finish (FIN) - It Finishes the session. It means No More Data from the sender.
4. Urgent (URG) - It is use to set the priority to tell the receiver that this data is important for
you.
5. Acknowledgement (ACK) - All packets after SYN packet sent by the client should have
this flag Set. ACK=10 means host has received 0 through 9 and is expecting byte 10 next.
6. Synchronize (SYN) - It initiates a connection. It Synchronizes the sequence number.
5. What is the difference between PUSH and URG flag?
The PSH flag in the TCP header informs the receiving host that the data should be pushed up
to the receiving application immediately. The URG flag is used to inform a receiving station
that certain data within a segment is urgent and should be prioritized.
7. What is the importance of Sequence Number and Acknowledgement Number?
Sequence Number is a 32-bit field which indicates the amount of data that is sent during a
TCP session. By sequence number, the sender can be assured that the receiver received the
data because the receiver uses this sequence number as the acknowledgement number in the
next segment it sends to acknowledge the received data. When the TCP session starts, the
initial sequence number can be any number in the range 0– 4,294,967,295. Acknowledgement
number is used to acknowledge the received data and is equal to the received sequence number
plus 1.
ICMP
1. What is the Internet Control Message Protocol?
ICMP is basically a management protocol and messaging service provider for IP. It can provide
Hosts with information about network problems.
2. At which layer do ICMP works?
It works at Network Layer.
3.Which two fields in the ICMP header is used to identify the intent of ICMP message?
Type and Code.
3. What are various ICMP messages?
1. Destination Unreachable. 2. Buffer Full. 3. Hops/Time Exceeded. 4. Ping. 5. Traceroute.
4. Explain how traceroute works in detail?
1. Firstly, traceroute creates a UDP packet from the source to destination with a TTL value of
1.
2. Packet reaches the first router where the router decrements the value of TTL by 1, making
packet’s TTL value 0 because of which the packet gets dropped.
3. As the packet gets dropped, it sends an ICMP message Hop/Time exceeded back to the
source.
4. This is how traceroute comes to know the first router’s address and the time taken for the
round-trip.
5. It sends two more packets in the same way to get average round-trip time. First, round-trip
takes longer than the other two due to the delay in ARP finding the physical address, the
address stays in the ARP cache during the second and the third time and hence the process
speeds up.
6. These steps take place again and again until the destination has been reached. The only
change that happens is that the TTL is incremented by 1 when the UDP packet is to be sent to
the next router/host.
7. Once the destination is reached, time exceeded ICMP message is not sent back this time
because the destination has already been reached.
8. But, the UDP packet used by traceroute specifies the destination port number that is not
usually used for UDP. So, when the destination verifies the headers of the UDP packet, the
packet gets dropped because of an improper port being used and an ICMP message
Destination Unreachable is sent back to the source.
9. When traceroute encounters this message, it understands that the destination is reached.
Also, The destination is reached 3 times to get the average round-trip time.
5.Why there are three columns in traceroute results?
Three probes (change with -q flag) are sent at each TTL setting and a line ***is printed
showing the TTL, the address of the gateway and round trip time of each probe( so three * ).
6.Which ICMP message confirms the traceroute is completed?
Destination Unreachable Message
EIGRP
The EIGRP RID is a 32-bit number in dotted decimal format. In EIGRP, duplicate RIDs do
not prevent routers
from becoming neighbors and two EIGRP routers with the same router ID will still form a
neighbor relationship.
The only time the value of EIGRP RIDs consider is when injecting external (redistributed)
routes into EIGRP. In
this case, the routers injecting the external routes should have unique RIDs to avoid
confusion.
Every OSPF router within the network will have a 32-bit number router ID that uniquely
identifies it to the other
routers on the network. Unlike EIGRP, OSPF prevents neighborships between routers with
duplicate RIDs. All
OSPF RIDs in a domain should be unique. OSPF Router ID should not be changed after the
OSPF process is
started and the OSPF neighborships are established. If you change the OSPF router ID, we
need to either reload
the IOS or use "clear ip ospf process" command (restart the OSPF process) for changed RID
to take effect.
BGP
Like OSPF, BGP also prevents neighborship between routers with same router ID. The BGP
router IDs of the two
routers should not be same. Router ID also acts as a tie-breaker for BGP path selection. If all
other attributes
(weight, local preference, origin, AS path etc) till router ID are equal then the decision is
made based on lowest
router ID.
In all of the above routing protocols, the Router ID is determined according to the following
general rules -
Step 1. Use the router ID defined in the router-id x.x.x.x OSPF router subcommand.
RIP
In RIP passive-interface command will disable sending multicast updates via a specific
interface but will allow
EIGRP
When an interface is passive, EIGRP quits sending any outgoing hello packets, so the router
can not form any
neighbor relationship via a passive interface. This behavior stops both outgoing and incoming
routing updates.
However, EIGRP still advertises the connected subnets if matched with an EIGRP network
command.
OSPF
It works just like it works with EIGRP. When a router configures an interface as passive to
OSPF, OSPF stops
sending outgoing hello packets, so the router can not form any neighbor relationship via the
passive interface.
This behavior stops both outgoing and incoming routing updates. However, OSPF still
advertises the connected
subnets if matched with an OSPF network command.
TCP UDP
POP3, IMAP,
NFS.
Neighborship
Requirements ----- - AS, K-Values, Authentication. Area ID, Hello
Interval,Dead
Time,Authenticat
ion.
Flush -240sec