Cisco advanced Routing and switching for Linux systems

Source: Internet
Author: User
Tags switches

Day

1. What is a Vlan? The role of VLANs?

Vlan: Virtual local Area Network

Role: Broadcast control, increased security, bandwidth utilization, reduced latency

2. What is Trunk? What are the Trunk patterns?

Trunk: Trunk link that can host multiple VLANs

Trunk mode:

Access (Access)

Main road (Trunk)

Dynamic Desire (desirable) active

Dynamic Automatic (Auto) passive

3. What is the role of EtherChannel?

Eternetchannel (Ethernet channel)

Role:

1) Multi-line load balancing, increased bandwidth

2) Line Backup (when one line fails, other lines communicate, no packet loss)

4. What is DHCP? What is the role of DHCP?

DHCP: Dynamic Host Configuration Protocol

Role: Automatically assign IP addresses to clients

Day 02

1. What is a three layer switch? What is the difference between a two-layer interchange and a three-tier interchange and route?

Layer three switches: switches with network layer routing capabilities called layer three switches

Difference:

The second layer switch: belongs to the data Link layer device, which realizes the data frame forwarding according to the MAC address table.

Layer Three switch: Layer three switching technology is the technology that combine routing technology with switching technology. After routing the first data stream, the

It will generate a map of the MAC address and IP address, and when the same data stream passes again, it will be directly from layer two through this table

routing, which eliminates the network delay caused by router routing and improves the efficiency of packet forwarding.

Routers: Routers work in the third layer of the OSI layer seven protocol, whose primary task is to receive packets from a network interface, based on

The destination address contained therein is decided to be forwarded to the next destination address.

2. What is the classification of routing protocols according to the application range? What are the classes of dynamic routing according to the algorithm?

1) Depending on the scope of application, routing protocols can be divided into two categories

The routing protocol within an as is called the Internal Gateway Protocol: the Internal Gateway routing protocol has the following: RIP-1, RIP-2, IGRP, EIGRP,

Is-is and OSPF;

The routing protocol between as is called the External Gateway Protocol External Gateway Protocol (also called Inter-Domain routing protocol): there are two types of inter-domain routing protocols: external

Gateway Protocol (EGP) and Border Gateway Protocol (BGP)

2) Dynamic routing according to the algorithm can be divided into: Distance vector routing protocol, link state routing protocol

Distance Vector Routing protocol: Select Route RIP,IGRP based on the number of routes that are routed from the source network to the target network

Link-State routing protocol: select route Ospf,is-is for each path from the source network to the target network

Day 03

1. What is HSRP? How does it work?

HSRP: Hot Standby Routing protocol

HSRP is a Cisco private protocol that ensures that user communication can be quickly and transparently restored when a network edge device or access link fails.

This provides redundant rows for the IP network. By using the same virtual IP address and virtual MAC address, two or more units on a LAN segment

Routers can serve as a virtual router for external use. HSRP enables Cisco routers within a group to monitor each other's running state.

2. What is the STP role?

STP: Spanning Tree protocol

Function: Logically disconnects the loop, prevents the broadcast storm from generating, when the line fails, the blocking interface is activated, resuming the communication, starting the backup line

's role.

Day 04

1. What is an ACL?

ACL (Access control list): Read the third layer, the fourth layer of Baotou information, according to predefined rules to filter the package.

2. Types and characteristics of access control lists

1) standard access control List

Filtering packets based on source IP address

List number is 1~99

2) Extended access Control List

Filter packets based on source IP address, destination IP address, specified protocol, port, etc.

List number is 100~199

3) Named access control List

Named access control lists allow names to be used instead of list numbers in standard and extended access control lists

Day 05

1. What is NAT? What are the implementation methods?

NAT (Network address translation): By translating the private IP address of the internal network into the world's only public IP address, the internal network can

To connect to an external network such as the Internet.

How NAT is implemented:

The corresponding relationship of the IP address is one-to-one, and is constant, with the help of the static transformation, it can realize some specific service in the external network.

Access to the service provider.

Dynamic conversion: The correspondence between IP addresses is indeterminate, but random, and all private addresses authorized to access the Internet can be randomly

Convert to any of the specified legitimate external IP addresses

Port multiplexing: By changing the source IP address and source port of the out-of-Office packet and port translation, all hosts on the internal network can

Share a legitimate IP address to achieve Internet access and conserve IP.

2. What is the specific idea of troubleshooting when you access http://www.tmooc.cn from a browser?

1.ipconfig View the current network configuration;

2.ping 127.0.0.1 Check whether the native TCP/IP protocol is installed successfully;

3.ping gateway address to verify connectivity to external network exits;

4.ping DNS server address verifies whether the intranet can find a DNS server;

5.ping domain name, verify that the DNS server is able to parse successfully (example: Ping www.tmooc.cn);


Cisco advanced Routing and switching for Linux systems

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.