16
CHAPTER 5 CONFIGURING NETWORK DEVICES—STUDY GUIDE 5.1.1.1 1. WHAT FEATURES DOES AN ISR COMBINE? ANS. THE FEATURES COMBINED IN AN ISR 1. ROUTING AND LAN SWITCHING FUNCTIONS 2. SECURITY 3. VOICE AND WAN CONNECTIVITY 2. THE ISR IS IDEAL FOR WHAT TYPE OF BUSINESSES? ANS. ISR IS IDEAL FOR SMALL TO MEDIUM SIZED BUSINESSES AND FOR ISP MANAGED CUSTOMERS. 4. WHAT DOES THE (IOS) SOFTWARE FEATUES ENABLE A CISCO DEVICE TO DO? ANS. IOS SOFTWARE PROVIDES FEATUES THAT ENABLE A CISCO DEVICE TO SEND AND RECEIVE NETWORK TRAFFIC USINGA WIRED OR WIRELESS NETWORK. CISCO IOS SOFTWARE IS OFFERED TO CUSTOMERS IN MODULES CALLED IMAGES.. THESE IMAGES SUPPORT VARIOUS FEATURES FOR BUSINESSES OF EVERY SIZE.. 5. WHAT IS AN IP BASED IMAGE? ANS. THE ENTRY LEVEL CISCO IOS SOFTWARE IMAGE IS CALLED THE IP BASED IMAGE . THE IP BASED IMAGE SOFTWARE SUPPORTS SMALL TO MEDIUM SIZED BUSINESSES AND SUPPORTS ROUTING BETWEEN NETWORKS. 6. WHAT DOES THE CISCO IP BASED SOFTWARE SUPPORT? ANS. SUPPORTS SMALL TO MEDIUM-SIZED BUSINESSES ROUTING BETWEEN NETWORKS. 7. WHAT FUNCTIONALITY IS ADDED BY INSTALLING THE ADVANCED SECURITY IMAGE? ANS. ADVANCED SECURITY IMAGE PROVIDES ADVANCED SECURITY FEATURES, SUCH AS PRIVATE NETWORKING AND FIREWALLS. 8. WHAT IS SHIPPED WITH EACH CISCO DEVICE? ANS. EACH DEVICE IS SHIPPED WITH CABLES AND DOCUMENTATION NEEDED TO POWER UP THE DEVICE AND BEGIN THE INSTALLATION. 9. WHAT ARE THREE TOOLS REQUIRED TO INSTALL A NEW CISCO DEVICE? ANS. THREE TOOLS REQUIRED:

Chapter 5 Configuring Network Devices

  • Upload
    genny91

  • View
    106

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Chapter 5 Configuring Network Devices

CHAPTER 5 CONFIGURING NETWORK DEVICES—STUDY GUIDE

5.1.1.1

1. WHAT FEATURES DOES AN ISR COMBINE?

ANS. THE FEATURES COMBINED IN AN ISR

1. ROUTING AND LAN SWITCHING FUNCTIONS2. SECURITY3. VOICE AND WAN CONNECTIVITY

2. THE ISR IS IDEAL FOR WHAT TYPE OF BUSINESSES?

ANS. ISR IS IDEAL FOR SMALL TO MEDIUM SIZED BUSINESSES AND FOR ISP MANAGED CUSTOMERS.

4. WHAT DOES THE (IOS) SOFTWARE FEATUES ENABLE A CISCO DEVICE TO DO?ANS. IOS SOFTWARE PROVIDES FEATUES THAT ENABLE A CISCO DEVICE TO SEND AND RECEIVE NETWORK TRAFFIC USINGA WIRED OR WIRELESS NETWORK. CISCO IOS SOFTWARE IS OFFERED TO CUSTOMERS IN MODULES CALLED IMAGES.. THESE IMAGES SUPPORT VARIOUS FEATURES FOR BUSINESSES OF EVERY SIZE..

5. WHAT IS AN IP BASED IMAGE?ANS. THE ENTRY LEVEL CISCO IOS SOFTWARE IMAGE IS CALLED THE IP BASED IMAGE. THE IP BASED IMAGE SOFTWARE SUPPORTS SMALL TO MEDIUM SIZED BUSINESSES AND SUPPORTS ROUTING BETWEEN NETWORKS.

6. WHAT DOES THE CISCO IP BASED SOFTWARE SUPPORT?ANS. SUPPORTS SMALL TO MEDIUM-SIZED BUSINESSES ROUTING BETWEEN NETWORKS.

7. WHAT FUNCTIONALITY IS ADDED BY INSTALLING THE ADVANCED SECURITY IMAGE?ANS. ADVANCED SECURITY IMAGE PROVIDES ADVANCED SECURITY FEATURES, SUCH AS PRIVATE NETWORKING AND FIREWALLS.

8. WHAT IS SHIPPED WITH EACH CISCO DEVICE?ANS. EACH DEVICE IS SHIPPED WITH CABLES AND DOCUMENTATION NEEDED TO POWER UP THE DEVICE AND BEGIN THE INSTALLATION.

9. WHAT ARE THREE TOOLS REQUIRED TO INSTALL A NEW CISCO DEVICE?ANS. THREE TOOLS REQUIRED:

1. CABLE TIES PC WITH TERMINAL EMULATION PROGRAM2. NUMBER 2 PHILIP SCREWDRIVER3. CABLES FOR WAN INTERFACES, LAN INTERFACES AND USB INTERFACES.

10. WHAT SHOULD YOU READ BEFORE BEGINNING ANY EQUIPMENT INSTALLATION?ANS. BEFORE ATTEMPTING ANY INSTALLATION BE SURE TO READ THE QUICK START GUIDE

11. WHAT ARE THE SIX STEPS TO PERFORM A POWER UP PROCEDURE ON AN ISR 1841?ANS. THE STEPS:

1. Securely mount and ground the device

Page 2: Chapter 5 Configuring Network Devices

2. Seat the external compact flash card3. Connect the power cable4. Configure the terminal emulation software on the pc and connect the pc to

the console port.5. Turn on the router6. Observe the startup messages on the pc as the router boots up.

12. LIST THE 3 STAGES OF THE ROUTER BOOTUP PROCESS.ANS. THE THREE STAGES OF THE BOOTUP:

1. PERFORM POWER-ON SELF TEST (POST) AND LOAD THE BOOTSTRAP PROGRAM. POST IS USED TO TEST ROUTER HARDWARE

2. LOCATE AND LOAD THE CISCO IOS SOFTWARE3. LOCATE AND EXECUTE THE STARTUP CONFIGURATION FILE OR ENTER SETUP

MODE. TO BEGIN THE CONFIGRUATION PROCESS.13. WHAT ARE 3 PLACES WHERE IOS CISCO FILES CAN BE LOCATED?

ANS. THREE PLACES THE FILES CAN BE LOCATED:1. FLASH MEMORY2. TFTP SERVER3. ANOTHER LOCATION INDICATED IN STARTUP CONFIGURATION FILE.

14. WHAT HAPPENS IF A CONFIG FILE IS NOT FOUND?ANS. THE ROUTER PROMPTS USER TO ENTER SETUP MODE.,TO BEGIN THE CONFIGURATION PROCESS.

15. WHAT HAPPENS IF THE CONFIG FILE IS FOUND?ANS. IT IS COPIED INTO RAM AND PROMPT CONTAINING THE HOST NAME IS DISPLAYED.

16. WHAT IS THE STARTUP CONFIGURATION?ANS. THE STARTUP CONFIGURATION FILE IS THE SAVED CONFIGURATION FILE THAT SETS THE PROPERTIES OF THE DEVICE EACH TIME THE DEVICE IS POWERED UP. THIS FILE IS STORED IN NON VOLATILE RAM.

17. WHERE IS THE STARTUP CONFIGURATION FILE STORED?ANS THE STARTUP CONFIGURATION FILE IS STORED IN NON VOLATILE RAM.

18. WHAT HAPPENS TO THE FILES IN NVRAM WHEN POWER TO THE DEVICE IS POWERED OFF?ANS. WHEN THE DEVICE IS POWERED OFF THE CONFIG FILES ARE LOST.

19. WHAT DOES A CISCO ROUTER DO WHEN IT IS POWERED ON?ANS. WHEN THE ROUTER IS FIRST POWERED ON IT LOADS THE CISCO IOS SOFTWARE TO WORKING MEMORY, OR RAM.

20. WHAT IS THE SECOND THING A CISCO ROUTER WILL DO WHEN POWERED UP?ANS. THE STARTUP CONFIGURATION FILE IS COPIED FROM NVRAM TO RAM.

21. WHAT DOES THE TERM RUNNING CONFIGURATION REFER TO?ANS. RUNNING CONFIG REFERS TO THE CURRENT CONFIGURATION RUNNING IN RAM ON THE DEVICE. THIS FILE CONAINS THE COMMANDS USED TO DETERMINE HOW THE DEVICE OPERATES ON THE NETWORK. THE RUNNING CONFIGURATION FILES IS STORED IN THE WORKING MEMORY OF THE DEVICE.

Page 3: Chapter 5 Configuring Network Devices

22. WHAT HAPPENS TO THE INFORMATION ON RAM OR RUNNING CONFIGURATION WHEN IT IS TURNED OFF?ANS. THE RUNNING CONFIGURATION IS LOST EACH TIME THE DEVICE IS SHUT DOWN.

23. IF CHANGES ARE MADE TO THE RUNNING CONFIGURATION WHAT IS NECESSARY IN ORDER FOR THE CHANGES TO BE SAVED WHEN THE DEVICE IS POWERED OFF?ANS. IT IS NECESSARY TO MANUALLY COPY THE RUNNING CONFIGURATION TO THE STARTUP CONFIGURATION FILE. COPY RUNNING CONFIGURATION STARTUP CONFIG OR COPY RUN START SAVES THE RUNNING CONFIG TO THE STARTUP CONFIG FILE.

24. WHAT COMMAND IS USED TO SAVE THE ROUTER’S RUNNING CONFIGURATION TO THE STARTUP CONFIGURATION ?ANS. COPY RUNNING-CONFIG STARTUP-CONFIG

25. WHAT COMMAND CAN BE USED TO TROUBLESHOOT SOME OF THE BASIC HARDWARE AND SOFTWARE COMPONENTS USED DURING THE BOOTUP PROCESS?ANS. SHOW VERSIONCOMMAND.

26. WHAT DOES THE CONFIGURATION REGISTER SETTING OF 0X2102 TELL THE ROUTER TO DO?ANS.0X2102 IS THE FACTORY DEFAULT SETTING FOR THE CONFIGURATION REGISTER. THIS VALUE INDICATES T HAT THE ROUTER ATTEMPTS TO LOAD A CISCO SOFTWARE IMAGE FROM FLASH AND LOADS THE STARTUP CONFIGURATION FILE INTO VNVRAM.

27. IF THERE IS A SECOND VALUE IN PARENTHESIS WHAT DOES IT DENOTE?ANS. A SECOND VALUE DENOTES THE CONFIGURATION REGISTER VALUE TO B E USED DURING THE NEXT RELOAD OF THE ROUTER.

28. LIST THREE REASONS THAT A ROUTER MAY FAIL TO BOOTUP PROPERLY.ANS. REASONS THE ROUTER MIGHT BOOTUP IMPROPERLY:

1. CORRUPT OF MISSING IOS FILE2. INCORRECT LOCATION FOR CISCO IMAGE3. INADEQUATE MEMORY TO LOAD CISCO IMAGE.

29. IF THE ROUTER FAILS TO BOOT THE IOS HOW DOES IT BOOT UP?ANS. IF THE ROUTER FAILS TO BOOT THE IOS IT THEN BOOTS UP IN ROM MONITOR. ROMmon SOFTWARE IS A SIMPLE COMMAND SET STORED IN READ ONLY MEMORY.

30. WHEN THE ROUTER BOOTS UP TO ROMmon MODE WHAT IS ONE OF THE FIRST STEPS IN TROUBLESHOOTING?ANS. ONE OF THE FIRST STEPS IN TROUBLESHOOTING IS TO LOOK IN FLASH MEMORY FOR A VALID IMAGE USING THE DIR FLASH: COMMAND IF AN IMAGE IS LOCATED ATTEMPT TO BOOT THE IMAGE WITH THE BOOT FLASH:COMMAND.

31. IF THE ROUTER BOOTS PROPERLY WITH THE BOOT FLASH: COMMAND, WHAT ARE TWO POSSIBLE R EASONS WHY THE CISCO IOS IMAGE DID NOT LOAD FROM FLASH INITIALLY?ANS. FIRST USE THE SHOW VERSION VERSION COMMAND TO CHECK THE CONFIGURATION REGISTER TO ENSURE T HAT IT IS CONFIGURED FOR THE DEFAULT BOOT SEQUENCE. IF THE CONFIGURATION REGISTER VALUE IS CORRECT USE THE SHOW STARTUP-CONFIG COMMAND TO SEE IF THERE IS A BOOTSYSTEM COMMAND THAT INSTRUCTS THE ROUTER TO USE A DIFFERENT LOCATION FOR THE CISCO IOS IMAGE.

32. WHAT DOES AN OUT-OF-BAND MANAGEMENT CONNECTION REQUIRE?

Page 4: Chapter 5 Configuring Network Devices

ANS. OUT-OF-BAND MANAGEMENT REQUIRES A COMPUTER TO BE DIRECTLY CONNECTED TO THE CONSOLE PORT OR AUXILLARY PORT (AUX) OF THE NETWORK DEVICE BEING CONFIGURED. THIS TYPE OF CONNECTION DOES NOT REQURE THE LOCAL NETWORK CONNECTIONS ON THE DEVICE TO BE ACTIVE

33. WHY DO TECHNICIANS USE OUT-OF-BAND MANAGEMENT TO INITIALLY CONFIGURE A NETWORK DEVICE?ANS. THEY USE OUT-OF-BAND MANAGEMENT TO INITIALLY CONFIGURE A NETWORK DEVICE BECAUSE UNTIL PROPERLY CONFIGURED THE DEVICE CANNOT PARTICIPATE IN THE NETWORK. OUT-OF-BAND MANAGEMENT IS ALSO USEFUL WHEN THE NETWORK CONNECTIVITY IS NOT FUNCTIONING CORRECTLY AND THE DEVICE CANNOT BE REACHED OVER THE NETWORK. PERFORMING OUT-OF-BAND TASKS REQUIRES A TERMINAL EMULATION CLIENT INSTALLED ON THE PC.

34. WHEN IS OUT-OF-BAND MANAGEMENT USEFUL?ANS. OUT-OF-BAND MANAGEMENT IS USEFUL WHEN THE NETWORK CONNECTIVITY IS NOT FUNCTIONING CORRECTLY AND THE DEVICE CANNOT BE REACHED OVER THE NETWORK.

35. WHEN IS IN-BAND MANAGEMENT USED?ANS. IN-BAND MANAGEMENT IS USED TO MONITOR AND MAKE CONFIGURATION CHANGES TO A NETWORK DEVICE OVER A NETWORK CONNECTION.

36. WHAT MUST BE CONNECTED FOR A COMPUTER TO CONNECT TO THE DEVICE AND PERFORM IN-BAND MANAGEMENT?ANS. AT LEAST ONE NETWORK DEVICE INTERFACE ON THE DEVICE MUST BE CONNECTED TO THE NETWORK AND BE OPERATIONAL. EITHER TELNET HTTP SSH CAN BE USED TO ACCESS A CISCO DEVICE FOR IN-BAND MANAGEMENT.

37. WHAT IS THE CISCO IOS COMMAND LINE INTERFACE?ANS. THE CISCO IOS COMMAND LINE INTERFACE IS A TEXT BASED PROGRAM THAT ENABLES ENTERING AND EXECUTING CISCO IOS COMMANDS TO CONFIGURE, MONITOR, AND MAINTAIN CISCO DEVICES.

38. WHAT ARE CLI COMMANDS USED TO DO?ANS. CLI COMMANDS ENABLE ENTERING AND EXECUTING CISCO IOS COMMANDS TO CONFIGURE, MONITOR AND MAINTAIN CISCO DEVICES.

39. WHAT IS USED TO ACCESS A CISCO DEVICE FOR IN-BAND MANAGEMENT?ANS. TELNET HTTP OR SSH CAN BE USED TO ACCESS A DEVICE FOR IN-BAND MANAGEMENT.

40. WHAT IS THE CISCO SDM EXPRESS TOOL USED FOR?ANS. SDM CAN BE USED FOR ONLY IN-BAND MANAGEMENT TASK.

41. HOW IS IT UNLIKE CLI?ANS. IT CAN ONLY BE USED FOR IN BAND MANAGEMENT TASK.

42. WHAT ARE FOUR OPTIONS THAT OFFERED ON THE FULL SDM PACKAGE?ANS. FOUR OPTIONS:

1. CONFIGURING ADDITIONAL LAN AND WAN CONNECTIONS2. CREATING FIREWALLS

Page 5: Chapter 5 Configuring Network Devices

3. CONFIGURING VPN CONNECTIONS4. PERFORMING SECURITY TASK.

43. WHAT IS A MAJOR DIFFERENCE BETWEEN THE CISCO SDM AND CLI?ANS. SDM USED FOR IN BAND MANAGEMENT AND THEY DO NOT ALLUSE THE SAME COMMANDS

44. WHY IS NECESSARY TO USE CLI?ANS. SOME ROUTERS DO NOT SUPPORT SDM

45. WHAT ARE THE FIVE STEPS INVOLVED IN FOLLOWING BEST PRACTICES WHEN INSTALLING A NEW DEVICE?ANS. THE FIVE STEPS FOLLOWING BEST PRACTICES:

1. CREATE FIREWALLS2. CONFIGURE VPN3. PERFORM SECURITY4. CONFIGURE LAN 5. QUICK START GUIDE

46. HOW DO YOU START USING THE CISCO SDM EXPRESS?ANS. CONNECT AN ETHERNET CABLE FROM THE PC NIC TO THE ETHERNET PORT ON THE ROUTER OR T HE ISR.

47. WHAT DOES CISCO SDM EXPRESS TOOL PROVIDE?ANS. CISCO ROUTER AND SECURITY DEVICE MANAGER.

48. WHEN IS THE ROUTER AVAILABLE ON THE LAN?ANS. AFTER THE INITIAL CONFIGURATION IS COMPLETED THE ROUTER IS AVAILABLE ON THE LAN THE ROUTER CAN ALSO CAN ALSO HAVE A WAN CONNECTION, A FIREWALL AND UP TO 30 SECURITY ENHANCEMENT CONFIGURED.

49. WHAT INFORMATIN IS REQUIRED WHEN USING THE SDM EXPRESS BASIC CONFIGURATION?ANS. THE INFORMATION REQUIRED:

1. HOST NAME THE NAME ASSIGNED TO THE ROUTER2. DOMAIN NAME FOR THE ORGANIZATION EX. CISCO.COM3. USERNAME AND PASSWORD USED TO ACCESS SDM EXPRESS TO

CONFIGURE AND MONITOR THE ROUTER PASSWORD MUST BE 6 WORDS4. ENABLE SECRET PASSWORD THE PASSWORD THAT CONTROLS USER ACCESS

TO THE ROUTER WHICH AFFECTS THE ABILITY TO MAKE CONFIGURATION CHANGES USING THE CLI, TELNET OR THE CONSOLE PORTS.

5. LAN CONFIGURATION SETTING ENABLE THE ROUTER INTERFACE TO PARTICIPATE ON THE CONNECTED LOCAL NETWORK.

50. IF NAT OR PAT IS USED WHAT KIND OF ADDRESS SHOULD BE USED?

ANS. THE ADDRESS USED TO ACCESS SDM EXPRESS NOT THE ADDRESS THAT WAS PROVIDED IN THE QUICK START GUIDE. IT CAN BE A PRIVATE IP ADDRESS.

51. WHAT ARE 3 OTHER LAN SETTINGS?ANS. 3 SETTINGS:

Page 6: Chapter 5 Configuring Network Devices

1. IP ADDRESS2. SUBNET MASK3. SUBNET BITS

52. WHY IS IMPORTANT TO TAKE NOTICE OF THIS ADDRESS?ANS. THIS ADDRESS IS IMPORTANT BECAUSE THIS IS THE ADDRESS TO ACCESS T HE SDM NOT THE ADDRESS PROVIDED IN THE QUICK START GUIDE.

53. WHAT DOES DHCP DYNAMICALLY ALLOCATE?ANS. DHCP DYNAMICALLY ALLOCATES AN IP ADDRESS TO A NETWORK HOST WHEN THE HOST IS POWERED UP.

54. HOW LONG ARE ADDRESSES LEASED TO HOST?ANS. THE ADDRESSES ARE LEASED FOR ONE DAY.

55. IF YOU CHANGE THE LOWEST (STARTING) OR THE HIGHEST (ENDING) ADDRESS WHAT MUST YOU BE AWARE OF?ANS. YOU MUST BE AWARE THAT IF THE ADDRESS IS CHANGED IT MUST BE IN THE SAME NETWORK OR SUBNET AS THE SAME NETWORK AS THE LAN INTERFACE ALSO IT THE ADDRESS IS TO CHANGED TO DECREASE THE POOL SIZE IT MUST BE THE SAME NETWORK AS THE STARTING IP ADDRESS.

56. HOW DO YOU CONFIGURE A DEVICE LIKE A ROUTER FOR DHCP?ANS. SELECT ENABLE DHCP ON LAN INTERFACE CHECKBOX. CHECKING THIS BOX ENABLES THE ROUTER TO ASSIGN PRIVATE IP ADDRESSES, TO DEVICES ON THE LAN.

57. WHAT ARE 3 PIECES OF INFORMATION NEED TO CONFIGURED FOR A DEVICE FOR DHCP?ANS. THREE PIECES OF INFORMATION:

1. DOMAIN NAME2. PRIMARY DOMAIN SERVER3. SECONDARY DOMAIN SERVER

58. WHAT DOES THE PRIMARY DOMAIN NAME SERVER RESOLVE?ANS. PRIMARY DOMAIN NAME SERVER RESOLVE URLS

59. WHAT IS SECONDARY DOMAIN NAME SERVER FIELD USED?ANS. THE DOMAIN NAME SERVER IS USED IF THE PRIMARY DNS SERVER DOES NOT RESPOND.

60. WHAT ARE SERIAL CONNECTIONS USED TO CONNECT?ANS. A SERIAL CONNECTION CAN BE USED TO CONNECT NETWORKS THAT ARE SEPARATED BY LARGE GEOGRAPHICAL DISTANCES.

61. WHAT DO WAN NETWORKS INTERCONNECTIONS REQUIRE?ANS. WAN NETWORKS INTERCONNECTIONS REQUIRE A TELECOMMUNICATION SERVICE PROVIDER (TSP)

62. WHAT NEEDS TO BE DETERMINED PRIOR TO SETTING UP THE CONNECTION?ANS. PRIOR TO SETTING UP THE CONNECTION IT NEEDS TO BE DETERMINED WHAT TYPEOF CONNECTION AND PROTOCOL ENCAPSULATION REQUIRED.

63. WHAT ARE 3 DIFFERENT ENCAPSULATION TYPES?ANS. 3 ENCAPSULATION TYPES:

1. HIGH LEVEL DATA LINK CONTROL (HLDC)

Page 7: Chapter 5 Configuring Network Devices

2. FRAME RELAY3. POINT-TO-POINT PROTOCOL (PPP)

64. WHAT TYPES OF ENCAPSULATION USE A STATIC IP ADDRESS OR AN IP UNNUMBERED?ANS. Have to check the cisco academy for this answer

65. WHAT IS THE DIFFERENCE BETWEEN CISCO SDM AND CISCO SDM EXPRESS?ANS. THE DIFFERENCE ESSENTIALLY IS AFTER THE ROUTER’S BASIC CONFIGURATION IS COMPLETED USING SDM EXPRESS USERS SWITCH TO SDM. ENABLING NAT REQUIRES THE USE OF SDM.

66. WHAT DOES PAT ENABLE HOST TO DO?

ANS. PAT ENABLES THE HOSTS ON THE INTERNAL LOCAL NETWORK TO SHARE THE SINGLE REGISTERED IP ADDRESS ASSIGNED TO THE WAN INTERFACE. THIS WAY HOSTS WITH INTERNAL PRIVATE ADDRESSESS CAN HAVE ACCESS TO THE INTERNET.

67. WITH PAT WHAT DO INTERNAL PRIVATE ADDRESSES HAVE ACCESS TO?ANS. HAVE ACCESS TO THE INTERNET.

68. LIST THE FOUR STEPS FOR CONFIGURING NAT?ANS. FOUR STEPS:

1. ENABLE NAT CONFIGURATION USING SDM2. NAVIGATE THROUGH THE BASIC NAT WIZARD

3. SELECT THE INTERFACE AND SET IP RANGES4. REVIEW THE CONFIGURATION

69. WHICH HOST ARE TRANSLATED?ANS. ONLY THE HOSTS WITH THE INTERNAL ADDRESS RANGES SPECIFIED IN THE SDM CONFIGURATION ARE TRANSLATED. IT IS IMPORTANT TO VERIFY THAT ALL ADDRESS RANGES THAT NEED ACCESS TO THE INTERNET ARE INCLUDED.

70. WHAT ARE THE TWO LEVELS OF ACCESS TO THE COMMAND-LINE INTERFACE SUPPORTED BY THE CISCO IOS?ANS. THE TWO LEVELS OF ACCESS TO THE COMMAND-LINE INTERFACE:

1. USER EXEC MODE

2. PRIVILEGED EXEC MODE71. WHEN A ROUTER IS POWERED ON, WHAT ACCESS-LEVEL WILL THE ROUTER DEFAULT TO?

ANS. WHEN A ROUTER IS POWERED ON THE ACCESS LEVEL DEFAULTS TO USER EXEC

MODE. THIS MODE IS INDICATED BY THE COMMAND LINE PROMPT ROUTER>72. WHICH COMMANDS CAN BE EXECUTED IN T HE USER EXEC MODE?

ANS. COMMANDS THAT CAN BE EXECUTED IN USER EXEC MODE ARE LIMITED TO OBTAINING INFORMATION ABOUT HOW THE DEVICE IS OPERATING, AND TROUBLESHOOTING USING SOME SHOW COMMANDS AND THE PING AND TRACEROUTE UTILITIES.

73. WHAT IS THE COMMAND LINE PROMPT WHEN IN USER MODE?

Page 8: Chapter 5 Configuring Network Devices

ANS. HAVE TO RESEARCH THIS ANSWER??????????74. WHAT ACCESS LEVEL IS REQUIRED IN ORDER TO ENTER COMMANDS THAT CAN ALTER THE

OPERATION OF THE DEVICE?

ANS. TO ALTER THE OPERATION OF THE DEVICE THE ACCESS LEVEL MUST BE PRIVILEGED LEVEL ACCESS.

75. WHAT COMMAND IS ENTERED TO ACCESS PRIVLEGED EXEC MODE?

ANS. THE COMMAND TO ENTER TO ACCESS PRIVILEGED EXEC MODE IS ENABLE76. WHAT IS THE COMMAND LINE PROMPT WHEN IN PRIVILEGED MODE?

ANS. THE COMMAND LINE PROMPT FOR PRIVILEGED MODE IS ROUTER#77. WHAT IS ENTERED AT THE COMMAND PROMPTS TO DISABLE T HE PRIVILEGE MODE AND

RETURN THE DEVICE TO USER MODE?ANS. TO DISABLE P RIVILEGE MODE AND RETURN TO USER MODE ENTER DISABLE OR EXIT AT THE COMMAND PROMPTS.

78. WHAT COMMAND IS ENTERED TO ACCESS G LOBAL CONFIGURATION MODE.

ANS. TO ENTER GLOBAL CONFIGURATION MODE TYPE THE COMMAND CONFIGURE

TERMINAL OR CONFIG TERMINAL ROUTER (CONFIG)#79. WHAT IS THE COMMAND LINE PROMPT WHEN THE IN GLOBAL CONFIGURATION

MODE?ANS. THE COMMAND LINE PROMPT FOR GLOBAL CONFIGURATION MODE IS

ROUTER (CONFIG)#80. WHAT IS INTERFACE CONFIGURATION MODE IS USED TO DO?

ANS. INTERFACE CONFIGURATION MODE IS USED TO CONFIGURE LAN AND WAN INTERFACES.

81. TO ACCESS INTERFACE CONFIGURATION MODE FROM GLOBAL CONFIGURATION MODE, WHAT COMMAND IS TYPED?ANS. TO ACCESS INTERFACE CONFIGURATION MODE FROM GLOBAL CONFIGURATION TYPE THE COMMAND INTERFACE {TYPE} {NUMBER}. INTERFACE CONFIGURATION MODE IS INDICATED BY T HE COMMAND PROMPT:

82. WHAT IS THE COMMAND LINE PROMPT WHEN IN ROUTER CONFIGURATION MODE?ANS. THE COMMAND LINE PROMPT IN ROUTER CONFIGURATION MODE IS:

ROUTER (CONFIG-IF)#83.WHAT IS THE COMMAND LINE PROMPT WHEN IN ROUTER CONFIGURATION SUBMODE?

ANS. THE COMMAND LINE PROMPT IS ROUTER (CONFIG-ROUTER) #84. WHAT IS THE ROUTER CONFIGURATION SUBMODE USED FOR?

ANS. ?????????????????????????????????????

85. WHAT IS THE REASON WHY NETWORK TECHS PREFER TO USE THE CISCO IOS CLI TO CONFIGURE ROUTERS.

Page 9: Chapter 5 Configuring Network Devices

ANS. TECHS PREFER TO USE CISCO IOS CLI BECAUSE THEY OFFER COMMANDS THAT ARE NEEDED TO CONFIGURE DEVICES.

86. WHAT WILL ENTERING THE HELP OR “?” DISPLAY?ANS. IF THE FIRST FEW CHARACTERS OF A COMMAND IS KNOWN BUT THE E XACT COMMAND IS NOT, ENTER AS MUCH AS THE COMMAND AS POSSIBLE, FOLLOWED BY A ?, NOTE THAT THERE IS NO SPACE BETWEEN THE COMMAND CHARACTERS AND THE ?. IF A ? IS ENTERED AND NOTHING MATCHES, THE HELP LIST WILL BE EMPTY. THIS INDICATES THAT THE COMMAND STRING IS NOT SUPPORTED BY THE COMMAND.ADDITIONALLY TO GET A LIST OF THE PARAMETER OPTIONS FOR A SPECIFIC COMMAND ENTER PART OF THE COMMAND FOLLOWED BY A SPACE, AND THE ? SHOWS A LIST OF THE POSSIBLE VARIATIONS. CHOOSE ONE OF THE ENTRIES TO COMPLETE THE COMMAND STRING. ONCE THE COMMAND STRING IS COMPLETED, A <CR> APPEARS. PRESS ENTER TO ISSUE THE COMMAND. IF A ? IS ENTERED AND NOTHING MATCHES, THE HELP LIST WILL BE EMPTY. THIS INDICATES THAT THE COMMAND STRING IS NOT A SUPPORTED COMMAND.

87. WHAT DOES <CR> INDICATE?ANS.?????????????????????????????????

88. WHAT DOES % INDICATE?ANS. % MARKS THE BEGINNING OF AN ERROR MESSAGE.

89. WHAT DOES THE COMMAND %INVALID INPUT DETECTED INDICATE ?ANS. %INVALID INPUT DETECTED MEANS AN INCORRECT COMMAND HAS BEEN ENTERED.

90. WHAT DOES ^ INDICATE?ANS ^ APPEARS AT THE POINT IN THE COMMAND STRING WHERE THERE IS AN INCORRECT OR UNRECOGNEZED CHARACTER. THE USER CAN RETURN TO THE POINT WHERE THE ERROR WAS MADE AND USE THE HELP FUNCTION TO DETERMINE THE CORRECT COMMAND TO USE.

91. BY DEFAULT HOW MANY COMMAND LINES RETAIN IN THE HISTORY BUFFER?ANS. BY DEFAULT 10 COMMAND LINES ARE HELD IN THE HISTORY BUFFER.

92. WHAT IS THE MAXIMUM NUMBER OF COMMAND LINES RETAIN IN THE HISTORY BUFFER?ANS. THE MAXIMUM NUMBER OF COMMAND LINES IS 256.

.93. WHAT COMMANDS ARE ENTERED IN ORDER TO CHANGE THE NUMBER OF COMMAND LINES

THAT ARE RECORDED DURING A TERMINAL SESSION?

ANS. THE COMMAND TO CHANGE THE NUMBER OF COMMAND LINES IS TO USE THE TERMINAL HISTORY S IZE COMMAND.

93. WHAT ARE THE TWO WAYS YOU CAN RECALL THE MOST RECENT COMMANDS IN THE HISTORY BUFFER?ANS. TO RECALL THE MOST RECENT COMMANDS IN THE HISTORY BUFFER:

1. PRESS CTRL-P2. UP ARROW KEY.

Page 10: Chapter 5 Configuring Network Devices

94. WHAT ARE THE TWO WAYS YOU CAN RETURN TO THE MOST RECENT COMMANDS IN THE HISTORY BUFFER?ANS. TO RETURN TO A MORE RECENT COMMAND IN THE HISTORY BUFFER PRESS CTRL-N OR THE DOWN ARROW

95. THE CISCO IOS CLI SHOW COMMANDS CAN BE USED TO VIEW WHAT INFORMATION?ANS. CISCO IOS CLI SHOW COMMANDS DISPLAY RELEVANT INFORMATION ABOUT THE CONFIGURATION AND OPERATION OF THE DEVICE.

96. WHAT ARE THREE USES FOR NETWORK TECHS USING SHOW COMMANDS?ANS. THREE USES FOR NETWORK TECHS USING THE SHOW COMMAND:

1. VIEWING CONFIGURATION FILES2. CHECKING THE STATUS OF DEVICE INTERFACES AND PROCESSES3. VERIFYING THE DEVICE OPERATIONAL STATUS

97. WHAT IS ONE OF THE FIRST CONFIGURATION TASK THAT SHOULD BE PERFORMED?ANS. ONE OF THE FIRST CONFIGURATION TASK IS FOR THE DEVICE TO BE GIVEN A UNIQUE NAME.

98. WHAT COMMAND SHOULD BE ENTERED IN ORDER TO CHANGE THE HOSTNAME OF A ROUTER ?ANS. THE COMMAND TO CHANGE THE HOSTNAME OF THE ROUTER IS..ROUTER (config) # hostname <name>

99. ONCE A HOSTNAME IS CONFIGURED ON A DEVICE WHAT SHOULD BE THE NEXT CONFIGURATION STEP?ANS. THE NEXT CONFIGURATION STEP IS TO CONFIGURE PASSWORDS TO PREVENT ACCESS TO THE DEVICE BY UNAUTHORIZED INDIVIDUALS.

100. WHAT DO THE ENABLE PASSWORD AND ENABLE SECRET COMMANDS PREVENT?ANS. THESE COMMANDS ARE USED TO RESTRICT ACCESS TO PRIVILEGE EXEC MODE.

101. WHAT COMMANDS ARE ENTERED TO SET ENABLE PASSWORDANS. 1. ROUTER (config) # enable password <password>

ROUTER (config) # enable secret password <password>102. WHAT IS THE DIFFERENCE IN THE COMMANDS?

ANS. THE DIFFERENCE IN THE TWO COMMANDS IS THAT THE ENABLE PASSWORD IS NOT ENCRYPTED BY DEFAULT. IF THE ENABLE PASSWORD IS SET , FOLLOWED BY THE ENABLE SECRET PASSWORD, THE ENABLE SECRET COMMAND OVERRIDES THE ENABLE PASSWORD COMMAND.

103. WHAT IS A BANNER?ANS. A BANNER IS TEXT THAT THE USER SEES WHEN INITIALLY LOGGING ON TO THE ROUTER.

104. WHAT SHOULD A BANNER WARN AGAINST?ANS. A BANNER SHOULD WARN AGAINST UNAUTHORIZED ACCESS.

105. WHAT IS THE PURPOSE OF HAVING A MOTD BANNER AND LOGIN INFORMATION BANNER?

Page 11: Chapter 5 Configuring Network Devices

ANS. A MOTD BANNER IS A MESSAGE OF THE DAY BANNER 106. WHAT IS THE PURPOSE OF A DELIMITING CHARACTER (#) ALLOW THE USER TO

DO?ANS. THE DELIMITING CHARACTER ALLOWS THE USER TO CREATE A MULTI-LINE BANNER.

107. WHAT DOES THE COMMAND LOGGING SYNCHRONOUS DO?ANS. TO KEEP MESSAGES FROM INTEFERING WITH THE TYPED INPUT THE LOGGING SYNCHRONOUS COMMAND CAN BE ENTERED IN GLOBAL CONFIGURATION MODE.

108. WHAT DEFAULT FEATURE IN TURNED OFF BY ENTERING THE COMMAND NO IP DOMAIN-LOOKUP?ANS. THIS COMMAND HELPS RESOLVE UNKNOWN NAMES ENTERED IN ENABLE MODE ALSO MISTYPED OR ANY WORDS NOT RECOGNIZED BY THE ROUTER.

109. WHAT TYPE OF CONNECTION IS USED FOR INITIAL DEVICE CONFIGURATION?ANS.TO USE A PC ATTACHED TO A CONSOLE PORT ON THE DEVICE IS FREQUENTLY USED FOR INITIAL CONNECTIONS.

110. WHAT ARE 3 COMMANDS NEEDED TO BE ENTERED TO SET THE PASSWORD FOR CONSOLE CONNECTION ACCESS?ANS. THESE COMMANDS ARE DONE IN GLOBAL CONFIGURATION:

1.ROUTE (config)# line console 02.Router (config)# password <password>3.Router (config)#login

WHEN THE DEVICE IS CONNECTED TO THE NETWORK IT CAN BE ACCESSED OVER THE NETWORK CONNECTION. WHEN THE DEVICE IS ACCESSED O VER THE NETWORK IT IS CONSIDERED A VTY CONNECTION. THE PASSWORD MUST BE CONFIGURED ON THE VTY PORT.

111. WHAT WILL THE CONSOLE CONNECTION PASSWORDS (ABOVE IN #94 PREVENT?ANS. UNAUTHORIZED ACCESS IN USER MODE.

112. WHEN IS A CONNECTION CONSIDERED A VIRTUAL TERMINAL CONNECTION?ANS.????????????????????????????????????

113. WHAT ARE THREE COMMANDS NEED TO BE ENTERED TO SET THE PASSWORD FOR VIRTUAL PORT ACCESS?ANS. Route (config) # line vty 0 4 Router (config) # password <password>

Router (config)# login114. Enter the command to ensure that the passwords are encrypted.

Ans. THE GLOBAL CONFIGURATION COMMAND SERVICE PASSWORD ENCRYPTION ENSURES THAT ALL PASSWORDS ARE ENCRYPTED.

115. WHAT COMMAND IS ENTERED TO COPY THE CHANGES MADE TO THE RUNNING CONFIGURATION BACK TO THE STORED STARTUP CONFIGURATION FILE?ANS.IF THE RUNNING CONFIGURATION IS CHANGED IT MUST BE COPIED TO THE STARTUP CONFIGURATION FILE OR THE CHANGES ARE LOST WHEN THE DEVICE IS POWERED DOWN.

116. WHAT INTERFACES DO LO CAL NETWORK CONNECTIONS USE?

Page 12: Chapter 5 Configuring Network Devices

ANS. THE INTERFACES LOCAL NETWORK USE ARE ROUTER INTERFACE AND ETHERNET AND SERIAL INTERFACES.

117. WHAT INTERFACE DOES A WAN CONNECTION REQUIRE?ANS. WAN CONNECTION REQUIRE A SERIAL CONNECTION THROUGH AN ISP

118. WHAT IS REQUIRED ON A SERIAL INTERFACE UNLIKE A ETHERNET INTERFACES?ANS. SERIAL INTERFACES REQUIRE A CLOCK SIGNAL TO CONTROL TIMING OF THE COMMUNICATION CALLED A CLOCK RATE.

119. WHICH DEVICES ARE CONSIDERED DCE DEVICES THAT PROVIDE THE CLOCK RATE?ANS. A MODEM OR CSU/DSU

120. WHICH DEVICES ARE CONSIDERED DTE DEVICES THAT ACCEPT THE CLOCK RATE?ANS/ CISCO ROUTERS ARE DTE DATA TERMINAL EQUIPMENT

121. IF ROUTERS ARE GOING TO BE CONFIGURED DCE DEVICE WHAT MUST BE SET ON THE ROUTER INTERFACE?ANS. A CLOCK RATE MUST BE SET ON THE ROUTER INTERFACE.

122. CONFIGURATION ON ANY INTERFACE ON THE ROUTER MUST BE ACCOMPLISHED IN WHAT MODE?ANS. MUST BE ACCOMPLISHED IN GLOBAL CONFIGURATION MODE.

123. ENTER THE FIVE STEPS TO CONFIGURE AN INTERFACE.ANS. THE FIVE STEPS TO CONFIGURE AN INTERFACE:

1. SPECIFY THE TYPE OF INTERFACE Router (config)#SPECIFY A DESC. Router (config-if)#

2. CONFIG IP ADD AND SUBNET MK Router (config-if)#3. SET CLOCK RATE Router (cnfig-if)#4. ENABLE INTERFACE Router (config-if)#

124. WHAT COMMAND IS USED IN ORDER TO TURN OFF AN INTERFACE FOR MAINTENANCE OR TROUBLESHOOTING?ANS. THE COMMAND IS…………..SHUTDOWN