8/14/2019 TestKiller 640-506 Ed1
1/28
CISCO
STUDY GUIDE
Cisco Support
Exam 640-506Edition 1
8/14/2019 TestKiller 640-506 Ed1
2/28
www.testkiller.com
Congratulations!!
You have purchased a TestKiller, Ltd. Study Guide.
This study guide is a selection of keypoints you will need to know to pass
the official CCNP Support 640-506 exam. Study and memorize the
following concepts, keypoints and problems for approximately 15 to 20
hours and you will be prepared to take the exams. We guarantee it!
Remember, average study time is 15 to 20 hours and then you are ready!!!
GOOD LUCK!
DISCLAIMER
This study guide and/or material is not sponsored by, endorsed by or affiliated with CiscoSystems, Inc. Cisco, Cisco Systems, CCDA, CCNA, CCDP, CCNP,
CCIE, CCSI, the Cisco Systems logo and the CCIE logo are trademarks or registered
trademarks of Cisco Systems, Inc. in the United States and certain other countries. All
other trademarks are trademarks of their respective owners.
GuaranteeIf you use this study guide correctly and still fail the exam, send your official
score notice and mailing address to:
TestKiller, Ltd.
8200 Pat Booker Rd. #368
San Antonio, TX 78233
We will gladly refund the cost of this study guide. However, you will not
need this guarantee if you follow the above instructions.
This material is protected by copyright law and international treaties.Unauthorized reproduction or distribution of this material, or any portion
thereof, may result in severe civil and criminal penalties, and will be
prosecuted to the maximum extent possible under law.
Copyright 2001 TestKiller, Ltd. All Rights Reserved
8/14/2019 TestKiller 640-506 Ed1
3/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
i
Table of Contents
The Complexity of Internetworks....................................................................................... 1
Protocol Characteristics ...................................................................................................... 1Reliable vs. Unreliable Protocol Characteristics ............................................................ 1
Connection-Oriented Services vs. Connectionless Services........................................... 1
Token Rings .................................................................................................................... 1FDDI Fiber Distributed Data Interface ........................................................................ 2
AppleTalk ....................................................................................................................... 2
Troubleshooting ATM .................................................................................................... 2Troubleshooting Frame Relay......................................................................................... 2
Cisco Routing and Switching Processes............................................................................. 2
Routing............................................................................................................................ 2Switching ........................................................................................................................ 3
Interface Buffers ............................................................................................................. 3General Troubleshooting Tools .......................................................................................... 4
Low-End Cable Test Equipment..................................................................................... 4High-End Cable Testers.................................................................................................. 4
Cisco Management and Diagnostic Tools .......................................................................... 4
Cisco Management Tools ............................................................................................... 4Cisco Diagnostic Commands.......................................................................................... 4
Routing and Routed Protocol Troubleshooting .................................................................. 4
Troubleshooting TCP/IP Connectivity ........................................................................... 4Troubleshooting Novell Connectivity............................................................................. 5
Troubleshooting AppleTalk Connectivity ...................................................................... 5AppleTalk Router Diagnostic Commands.................................................................. 5
Debug Apple events:................................................................................................... 5
AppleTalk Data Stream Protocol ................................................................................ 5AppleTalk Session Protocol........................................................................................ 5
AppleTalk Printer Access Protocol............................................................................. 6
Diagnosing and Correcting Catalyst Problems............................................................... 6
Bridge vs. Switch........................................................................................................ 6VLAN Frame Tagging with ISL................................................................................. 6
Troubleshooting VLANs on Routers and Switches........................................................ 6
Diagnosing and Correcting Frame Relay Problems........................................................ 6Frame Relay Frame Format ........................................................................................ 6
WAN and Frame Relay Diagnostic Tools .................................................................. 7
Frame Relay Loopback Tests...................................................................................... 7
8/14/2019 TestKiller 640-506 Ed1
4/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
1
Key Concepts
Cisco Support
The Complexity of InternetworksAs more advanced technologies and services are introduced into the field of information processing and communications, the resulting internetworks are becoming increasingly
complex. The problem-solving model includes the following steps:
1. Define the problem
2. Gather the facts
3. Consider the possibilities
4. Create an action plan5. Implement the action plan
6. Observe the results of the action plan
7. Repeat the problem solving process
8. Resolve the problem
Protocol Characteristics
Reliable vs. Unreliable Protocol Characteristics
Reliable protocol - error correction, flow control and retransmission functionalitybuilt in.
Unreliable protocol reliability provided by higher-layer protocols.
Connection-Oriented Services vs. Connectionless Services
Connection-oriented - flow control, error control and session termination.Examples of this include TCP and ATM.
Connectionless services -no connection setup between the two communicatingprotocol entities. UDP is an example.
Token Rings
8/14/2019 TestKiller 640-506 Ed1
5/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
2
IBM technology that consists of a token that is 3 bytes long. It has a start delimiter, an
access protocol byte and an end delimiter. Data/command frames vary in size and aredependent on the size of the data field.
FDDI Fiber Distributed Data InterfaceThe use of optical fiber as a transmission medium is the most important characteristic.
Fiber offers some advantages over traditional copper wiring:
Security - does not emit electrical signals that can be tapped.
Reliability - immune to electrical interference.
Speed - much higher throughput potential than copper cable.
AppleTalkAppleTalks transport layer consists of:
Routing Table Maintenance Protocol (RTMP)
AppleTalk Update-Based Routing Protocol (AURP)
AppleTalk Echo Protocol (AEP)
AppleTalk Transaction Protocol (ATP)
Name Binding Protocol (NBP).
Troubleshooting ATM
Allowed encapsulation methods are AAL5, PVC and SVC. ISL contains header, originalpacket, and FCS fields. ISL not directly supported by ATM, but can be implemented in
ATM LANE configuration.
Troubleshooting Frame Relay
Typical problems include frame relay links down, inability to ping remote routers, or
inability to ping end-to-end. You must ensure that both Cisco devices are using IETFencapsulation method.
Cisco Routing and Switching Processes
Routing
8/14/2019 TestKiller 640-506 Ed1
6/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
3
The routing process moves packets based on the source, destination, and network
conditions. Routing protocols identify the best path(s) to use routing packets to theoutbound, using one or more of the router interfaces.
SwitchingAs part of the switching process, the router moves the packet(s) from the appropriate
interface to the destination address.
The basic switching paths are:
Process switching
Fast Switching
Silicon Switching/Autonomous Switching
Optimum Switching
Distributed Switching
NetFlow Switching
Switching features that affect performance include:
Queuing
Random early detection
Compression
Filtering (access lists)
Encryption
Accounting
Interface Buffers
The interface buffers on the SP (Switch Processor) card are used for buffering packetscopied from interface processors. The SP and SSP (Silicon Switch Processor) controllers
have 512 KB available for packet buffering.
8/14/2019 TestKiller 640-506 Ed1
7/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
4
General Troubleshooting Tools
Low-End Cable Test Equipment
At the low-technology end of the spectrum of test equipment the following equipment is
used:
Volt-Ohm Meters
Digital Multimeters
High-End Cable Testers
Higher technological advancements include:
Time Domain Reflectometer (TDR)
Cisco Management and Diagnostic ToolsCisco Management Tools
Cisco Works
Netsys Network Management Suites
TrafficDirector Remote Monitoring Software
The VlanDirector Switch Management Application
WAN Manager
Cisco Diagnostic Commands
show
debug
ping
trace
cdp
core dump
Routing and Routed Protocol Troubleshooting
Troubleshooting TCP/IP Connectivity
Four main diagnostic commands include:
8/14/2019 TestKiller 640-506 Ed1
8/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
5
ping connectivity test which is actually an Internet Control Message Protocol(ICMP) echo test packet.
trace traces path from source to destination.
show details information about interface conditions, protocol status, neighbor
reachability and traffic. debug analyzes packets; generates high amount of output and may adversely
affect production networks.
Troubleshooting Novell Connectivity
Three diagnostic commands are primarily used to troubleshoot Novell Networks:
ping works only on Cisco routers running Cisco IOS 8.2 or later.
show details information about interface conditions, protocol status,
neighborhood reachability and traffic. debug analyzes packets; generates high amount of output and may adversely
affect production networks.
Troubleshooting AppleTalk Connectivity
AppleTalk Router Diagnostic Commands
show
test Apple
debug
Debug Apple events:
Displays information about AppleTalk special events such as if neighbors arereachable/unreachable or if interfaces go up/down.
AppleTalk Data Stream Protocol
This protocol guarantees data bytes are delivered in the same order as they are sent and
that they are not duplicated.
AppleTalk Session Protocol
Session Protocol establishes and maintains logical conversations between an AppleTalk
clients and the server. ASP is considered a session layer protocol.
8/14/2019 TestKiller 640-506 Ed1
9/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
6
AppleTalk Printer Access Protocol
Printer Access Protocol is a connection-oriented protocol responsible for establishing and
maintaining connections between clients and servers.
Diagnosing and Correcting Catalyst ProblemsBridge vs. Switch
Functionality Bridge Switch
Pass packets between network segments Yes Yes
OSI layer DataLink DataLink
Filtering Software Hardware (ASIC)
VLAN Frame Tagging with ISL
ISL is used over point-to-point connections to interconnect two VLAN capable Cisco products such as Catalyst 5000 and higher series switches and Cisco 2600 and higher
series routers.
Troubleshooting VLANs on Routers and Switches
To configure a VLAN use RSM in the Catalyst 5000 switch or attach a router,with a FastEthernet or Gigabit Ethernet interface, to a VLAN trunking port using
ISL encapsulation.
Incorrect VLAN trunking protocol configuration will cause a VLAN to be slow ormalfunction.
When a line protocol Frame Relay is down, check for timing problems with
myseq and myseen keep-alive events. Command to show: debug serial
interface.
Diagnosing and Correcting Frame Relay Problems
Although Frame Relays is a Layer2 datalink protocol, when Frame Relay problems occuryou should first check the lower-layer hardware interface.
Frame Relay Frame Format
Congestion-related bit positions in the frame are:
FECN
8/14/2019 TestKiller 640-506 Ed1
10/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
7
BECN
DE
WAN and Frame Relay Diagnostic Tools
The show and debug commands are designed for the purpose.
Frame Relay Loopback Tests
1. Do the local loopback test with LMI.
2. Try the local test on the other side LMI.
3. If LMI come up, but you cannot get a non-LMI DLCI to the remote interface
to carry other traffic, contact the service provider.
4. The frame relay service can perform remote loop tests and will be more
willing to do so if you have already eliminated the local loops as a possiblecause of the problem.
8/14/2019 TestKiller 640-506 Ed1
11/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
8
WARNING: It is important that you read and study the
CCNP Keypoints portion of this study guide. We have
identified important KEYPOINTS in this section.
Please ensure that you absolutely know and understand
these prior to sitting for the exam.
8/14/2019 TestKiller 640-506 Ed1
12/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
9
Support Troubleshooting Keypoints
1. When delivering service related to trouble tickets, the Customer Support Engineer
(CSE), will consider the following:
The details of the warranty and service contact.
The type of problem and the priority level of the call.
An assessment of the severity of the network degradation.
The equipment involved and the amount of network downtime.
2. A fiber-optic cable tester is commonly used to measure attenuation (signal loss) and
return loss for wavelengths.
3. A time domain reflector (TDR) is commonly used to locate opens, shorts, crimps,links, sharp bends, impedance mismatches, and other defects in cables.
4. Browsing problems can occur when several Windows NT devices are set up as master
browsers and send inconsistent updates.
5. A Protocol Analyzer is used periodically to record, interpret, and display how a
communication protocol operates in the network architecture.
6. The first step for troubleshooting Windows NT/95 TCP/IP networks is to determine if
the local host configuration is correct.
7. After isolating a problem to a specific device such as a router or switch, the next stepis to isolate the problem within the specific device.
8. The show ip arp command is used to check if hosts are listed in the IP routing table.The routing table shows the correspondence between network (IP) and LAN
hardware (MAC) addresses.
9. A switched Ethernet interface on a Catalyst switch provides greater access to
bandwidth as compared with a hub. It can connect directly to end users or other
switches.
8/14/2019 TestKiller 640-506 Ed1
13/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
10
10. The show frame-relay map command displays information about a configured
association between a DLCI and another protocol.
11. Identifying IP as the selected ping protocol in the privileged mode for TCP/IP, allowsyou to check for MTU, set data patterns, set a source address, and record the route
used.
12. BRI layer 1 activation on the S/T interface occurs immediately after the TE and NTsynchronize and NT sends A = 1.
13. CCO Documentation is a web-based Cisco resource for the list of field replaceable
units when in need of spare parts.
14. The Cisco NetSYS tools are used for network simulation and modeling.
15. The Software Center is a CCO web-based resource for major code upgrades andmaintenance releases of Cisco software products.
16. The output of the Cisco IOS show controllers token command will count isolating
and non-isolating errors.
17. A connectionless protocol, such as UDP, requires an application to request
retransmission of missing or corrupt packets s since the receiving device will not
know that the packets were dropped or lost.
18. Speed is the main advantage of a connectionless protocol.
19. The debug IP icap command will check if the router is sending or receiving ICMP
messages.
20. The service timestamps {log|debug} uptime [msec] command will allow you toconfigure the router to indicate how long after the system rebooted that events
occurred.
8/14/2019 TestKiller 640-506 Ed1
14/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
11
21. The show tech-support command can you use to obtain a comprehensive output of a
routers condition that can be sent to your tech support engineer.
22. The ipx ping-default Novell command sets the non-default ping to correspond toNovells NLSP specification.
23. After initiating an action plan to resolve a network problem, the network still
continues to perform poorly, you should iterate the process and, as required, undo thechanges that did not work.
24. A switched VLAN corresponds to a single-routed subnet.
25. Process switching is relatively slow when tracing the process of packet flow in a
router such as the Cisco 7000 series. This is due to the fact it must interrupt the RSPfor the time is takes to copy the packet from the SP to the RSP.
26. Know the following facts about the ping ipx command:
This command works on Cisco IOS software Release 8.2 or later.
This command was part of Ciscos IOS software before a ping command wasdeveloped by Novell.
With the privileged form of the command, a higher repeat count than five (thedefault) can be specified.
Many of the commands return characters are comparable to those used with aping in the IP protocol stack.
27. Statistics, events, history, and alarms are the RFC1757 RMON groups supported by
the embedded RMON agent and SwitchProbe functions.
28. The application-specific integrated circuits (ASIC) or hardware-based filtering
perform bus arbitration on a single switching bus of the Catalyst 5000. They controlhow packets access the backplane as they transfer to destinations on the switch.
29. The show config Catalyst 5000 command is comparable to the routers Cisco IOSsoftware command, show running-config.
8/14/2019 TestKiller 640-506 Ed1
15/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
12
30. The WINS protocol used with Windows NT/95 is routable in its native operation.
31. To compare abnormal network performance or to plan for network expansion, use the
baselining profile.
32. Quality of service management is a key network management area that is NOT one of
the ISO defined functional areas of network management.
33. A cable tester is commonly used to check STP, UTP, 10BaseT, and coax for near-end
crosstalk, and noise.
34. The debug ip rip command checks for routing packets in a network that uses TCP/IP
and RIP (Routing Information Protocol).
35. Cisco routers can use IEEE 802.1Q LANs to/from IEEE 802.10 FDDI translation to
augment VLAN operation on Catalyst switches by performing VLAN translation.
36. The show version command can be used to:
Gather initial facts about a routers system hardware.
Determine how long the system has been up.
Determine the general situation that caused the last system boot-up.
37. When troubleshooting PPP CHAP authentication for ISDN BRI, check to make sure
that the password and router name configured on the local router is equal to thepassword and TE name on the remote router.
38. Know the following four facts about the inter-switch link (ISL) specification:
ISL adds an extra 30 bytes to the frame.
ISL is for point-to-point connections only.
ISL can support token ring as well as Fast Ethernet.
ISL adds or removes its frame tagging and FCS fields for traffic between
VLAN capable Cisco products.
8/14/2019 TestKiller 640-506 Ed1
16/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
13
39. The Catalyst 5000 switched port analyzer, the port that mirrors traffic to a protocol
analyzer, is identified by the destination module/port identifier.
40. Collisions only occur in a shared Ethernet environment, thus a switched Ethernetdomain does NOT cause slow or unreliable performance on a VLAN.
41. If the show ipx traffic command shows the bad hop count increasing, there may be a
back-door bridge between segments.
42. The show interface command IOS software provides several diagnostic commands tohelp you troubleshoot ISDN BRI from a local router to a remote router.
43. The debug ip packet command displays the flow of IP packets transmitted between
local and remote hosts.
44. Contact your service provider and state that you are having problems with the LMI, ifyou are checking the frame relay PVCs and only the local DLCI.0 or DLCI.1023 will
come up.
45. You can check the RJ-45 connector at both ends of a cable to determine if it iscrossover or straight through.
46. The debug arp command is used to determine if the router is sending and receiving
ARP requests/retries.
47. The four Cisco IOS commands used to check for data link protocol characteristics
are:
show interface
clear counters
show controller
show cdp neighbor
8/14/2019 TestKiller 640-506 Ed1
17/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
14
48. The output of the Cisco IOS show appletalk traffic command will increment the
count for encapsulation failed errors if the encapsulation of a DDP packet fails, or theAppleTalk ARP fails.
49. When troubleshooting a crash or hung system, a Cisco Support Engineer (CSE) will
ask for output from a show stackand a core dump.
50. Inspect the Port link LED on the switching module to check for an indication of anactive link state on a Catalyst port.
51. You must check for a line in the output of the show interface command to see how
long it has been since the counters have been cleared so that the count can renew.
52. Routers will autosense an LMI type on the Frame Relay DTE/DCE.
53. The show log command on a Catalyst switch is used to check for error messages ifsystem messages are redirected to another destination.
54. Graphical user interface applications for high-end tools in troubleshooting and
managing Catalyst switches are found at CWSI.
55. When troubleshooting a connectionless protocol, it is usually helpful to check if thereare problems indicated by a connection-oriented upper layer.
56. When troubleshooting a connection-oriented protocol, a key symptom to look for is
multiple retransmission of data segments.
57. A lobe cable failure on the ring will cause transitions to come from a growing number
of interface resets.
58. By default, the output of debug and system error messages are sent to the consoleterminal.
59. Logging to an internal buffer produces the lowest overhead.
8/14/2019 TestKiller 640-506 Ed1
18/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
15
60. Novell-Ether is the Cisco IOS term used as the equivalent to Novell 802.3 raw (called
ETHERNET_802.3 in NetWare).
61. Routers use process switching when you are using the problem diagnostics of a CiscoIOS debug command.
62. Defining the problem is the troubleshooting process step that involves a set of
symptoms and associated causes.
63. If a host wants to initiate a session in the TCP connection sequence, or wants toacknowledge that it has received an initiation request, it will send a TCP ACK packet.
64. The service timestamps command keeps track of when debug elements occurred and
the duration of time between events.
65. Phase1/Phase2 incompatibility is likely to cause inability to see zones or servicesoutside a given routers own network.
66. The purpose of VLAN Trunking Protocol (VTP) is to ensure there is a trunk or
VLAN1 operating.
67. A host that wants to initiate a session in the Novell connection sequence mustperform the following steps, in the following order, before the client can send NCP
requests to log in to a server:
1. Broadcast a SAP GNS request.
2. Receive a GNS reply.
3. Send a RIP request to find a route.
4. Receive a RIP reply.
68. The show cdp neighbors detail command is used to see information about Cisco
devices across a data link.
69. When checking that switches and routers are consistently configured for VLANs,VLAN ID 1 is used for management and troubleshooting only.
8/14/2019 TestKiller 640-506 Ed1
19/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
16
70. It is not a cause for a complete interface reset if interface counters clear with the clear
interface command.
71. A CSE will ask for output from show interface and show protocol in situationsinvolving diagnosing lost data or performance problems, or isolating partial loss of
system function.
72. Four ways to handle the debug tool in Cisco IOS software:
Reduce the scope of the debug by checking events.
Turn off the debug after you finish with your diagnostics.
Be aware of debugs processing switching implications.
Limit the impact of debug checking by using access lists.
73. Catalyst 5000 troubleshooting begins with the Catalyst 5000 module located in the
top slot of the chassis. This slot contains the console and network ports in the
supervisor engine module.
74. IP access lists can cause IP data to be unintentionally filtered by one or more router
interfaces.
75. The show trunk [module/port] command checks a module/port, and displays the
trunking status, VLAN active status, and VLANs that can use the link.
76. A router is sometimes called router-on-a-stick because it can run Spanning-TreeProtocol and operate as an aggregation point for inter-VLAN routing between
multiple VLAN switches.
77. In the output of the Cisco IOS show ipx traffic command, incrementing count in theformat errors counter usually indicate a corrupted header in the packets that
encountered a bad hop count.
78. If certain TCP/IP protocol services are available, but not others, the extended IP
access list may be not properly configured.
8/14/2019 TestKiller 640-506 Ed1
20/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
17
79. Pins 3, 4, 5, and 6 are the key pins used for ISDN signal connections.
80. Configuration mismatch is the source of a common Novell network problem where
inconsistent frame types are used by the IPX clients and servers.
81. Switching is more affected by lower latency than routing because it can move
packets, frames, or cells from buffer to buffer with simpler determination of traffic
source and destinations.
82. During the Catalyst 5000 power-up sequence, when you see the LEDs flash, thepower-up sequence is under way and not yet completed.
83. A Catalyst physical port that is a trunk can be several spanning trees. On this shared
topology, loops in one spanning tree can have a media load impact on other spanningtrees.
84. You can reduce spanning-tree protocol BPDU traffic during extended periods of
instability for VLANs by setting forward delay and max-age timers to maximum
values.
85. The ISDN BRI physical frame is 48 bits in length. At 4000 frames per second, it
provides 192 Kbps. Know the following four facts about the use of this bandwidth:
The 2B+D occupies the entire frame.
Some bits of the ISDN BRI frame are used for synchronization andcollision avoidance.
On the local loop, full-duplex logical channels coexist using time-divisionmultiplexing.
The A bit of the ISDN BRI frame is used during line startup to indicatephysical layer activation.
86. Configuring IP address on the main interface of VLANs that are setup using a
routers Cisco IOS software is not necessary.
8/14/2019 TestKiller 640-506 Ed1
21/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
18
87. The carrier transitions command output line will most accurately reflect the
stability of the frame reply providers facility (the number of times that DCD haschanged state).
88. The incorrect interpretations of Q.931 exchanges sent between a Cisco router and an
ISDN switch can be caused by the argument being incorrect for the command ISDN
switch-type.
89. Configuring a VTP server off line and then connecting it to the network may cause
inconsistency by advertising an inaccurate revision of the domain.
90. You can explicitly set the trunk for the VLANs to be on, if you notice that there is a
disagreement about the VLANs configured on a Catalyst 5000 trunk.
91. Proper handling of Cisco troubleshooting tools:
You need to know the impact of tools on router performance.
You need to know the most selective focused use of the tools.
You need to know how to minimize the impact of tools on other processes.
You need to know how to stop the tool operation when you finishtroubleshooting.
92. A router within a VTP domain can be transparent (forward messages) for VTP.
93. The routing process assesses the destination and source of traffic.
94. To determine what initiated a BRI call, you need to check the DDR with a dial string
to a destination trigger.
95. During troubleshooting, you can ensure TCP/IP problems are not with the domainname system (DNS) by using IP addresses rather than domain names.
96. The debug apple zip command reports the discovery of new zones.
8/14/2019 TestKiller 640-506 Ed1
22/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
19
97. IEEE 802.1D and VLAN Trunking Protocol (VTP) are options used by basic LAN
switching.
98. A router having a count of over-runs or under-runs usually indicates that there is aproblem with the interface hardware.
99. The show spantree command on a Catalyst 5000 switch will allow you to observe
spanning-tree port states such as disabled, blocking, listening, learning, forwarding,etc.
8/14/2019 TestKiller 640-506 Ed1
23/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
20
Support Troubleshooting
Practice Problems
1. Given the sample LAN protocol analyzer capture for IPX, which two troubleshooting
facts can be derived from the exhibited packet?
IPX: --------IPX Header---------
IPX:
IPX: Checksum = FFFF
IPX: Length = 224
IPX: Transport control = 00
IPX: 0000. . . . = Reserved
IPX: . . . . 0000 = Hopcount
IPX: Packet type = 0 (Novell)
IPX:
IPX: Dest network Node = 1000.FFFFFFFFFFFFF Socket = 1106 (SAP)
IPX: Source Network Node = 1000.02.60.8C.C2.SC.79, Socket=1106 (SAP)
A: This is a broadcast packet.
This portion of the frame is a network layer protocol.
2. This is a sample of a LAN protocol analyzer capture. Which troubleshooting fact canbe derived from the exhibited packet?
8/14/2019 TestKiller 640-506 Ed1
24/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
21
DDP: -------DDP Header -------
DDP:
DDP: Hop Count = 0
DDP: Length = 119
DDP: Checksum = 396A (correct)
DDP: Destination network number = 0
DDP: Destination node = 225
DDP: Destination socket = 1(RTMP)
DDP: Source network number = 1140
DDP: Source node = 100
DDP: Source socket = 1 (RTMP)
DDP: DDP protocol type = 1 (RTMP data)DDP:
A: This is a Apple Talk routing information packet.
3. In this sample LAN protocol analyzer capture, what does SNAP mean in the packet?
8/14/2019 TestKiller 640-506 Ed1
25/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
22
DLC:------DLC Header-------
DLC:
DLC: Frame 1 arrived at 15:05:33:389, frame size is 62 (003E hex) bytes
DLC: AC: Frame priority 0, Reservation priority 0, Monitor count 0
DLC: FC: LLC frame PCF attention code: None
DLC: FS: Addr recognized indicators: 00, Frame copied indicators: 00
DLC: Destination = Station cisco A05903
DLC: Source = Station IBM 0AE591
DLC:
LLC: LLC HeaderLLC:
LLC: DSAP = AA, SSAP = AA, command, Unnumbered frame, UI
LLC:
SNAP: SNAP Header
SNAP:
SNAP: Type = 0800 (IP)
SNAP:
A: Subnetwork access protocol
4. In this LAN protocol analyzer capture, which troubleshooting fact can be derived?
8/14/2019 TestKiller 640-506 Ed1
26/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
23
DLC: -------DLC Header-------
DLC:
DLC: Frame 2 arrived at 14:53:37:6592 frame size is 60(D03C hex) bytes
DLC: Destination = FF FF FF FF FF FF
DLC: Source = Station cisco 01 56 AB
DLC: Ethertype = 0806 (ARP)
DLC:
ARP: --------ARP/RARP frame-------
ARP:
ARP: Hardware type = (10MB ETHERNET)
ARP: Protocol type = 0800 (IP)ARP: Length of hardware address = 6bytes
ARP: length of protocol address = 4bytes
ARP: Opcode I (ARP Request)
ARP: Senders hardware address = cisco 0156AB
ARP: Senders protocol address = [144.251.100.204]
ARP: Target hardware address = 00 00 00 00 00 00
ARP: Target protocol address = [144.251.100.100]
A: The purpose is to find the Ethernet address of 144.251.100.100
8/14/2019 TestKiller 640-506 Ed1
27/28
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software. http://www.gfi.com/tt.shtml
24
Index
AEP....................................................... 2AppleTalk ............................... 2, 5, 6, 14
ASP ....................................................... 5
ATM.................................................. 1, 2ATP....................................................... 2
AURP.................................................... 2
bandwidth........................................ 9, 17BECN.................................................... 7
BRI.............................. 10, 12, 13, 17, 18
bridge .................................................. 13
buffers ................................................... 3Catalyst 5000 ...................... 6, 16, 18, 19
CCO Documentation........................... 10
cdp ............................................ 4, 13, 15Cisco Works.......................................... 4
Compression ......................................... 3
Connectionless .................................... 10connection-oriented..................... 1, 6, 14
copper cable .......................................... 2
CSE ........................................... 9, 14, 16DE ......................................................... 7
debug ... 4, 5, 6, 7, 10, 12, 13, 14, 15, 16,
18Debug.................................................... 5
Diagnostic Tools ............................... 4, 7
Distributed Switching ........................... 3DLCI ......................................... 7, 10, 13
encapsulation............................... 2, 6, 14
Encryption............................................. 3error correction...................................... 1
Ethernet ............................... 9, 12, 13, 23
Fast Switching....................................... 3FDDI ............................................... 2, 12
FECN .................................................... 6
Filtering................................................. 3
flow control........................................... 1frame relay.................................. 2, 7, 13
Frame Relay............................ 2, 6, 7, 14
Frame Tagging...................................... 6ICMP................................................... 10
IETF...................................................... 2
IPX................................................ 17, 20
ISDN................................. 12, 13, 17, 18ISL............................................... 2, 6, 12
keep-alive.............................................. 6
LMI ........................................... 7, 13, 14loopback................................................ 7
Management Tools................................ 4
Multimeters........................................... 4Name Binding Protocol......................... 2
NBP....................................................... 2
NetFlow Switching ............................... 3
Netsys Network Management Suites.... 4Novell............................ 5, 11, 15, 17, 20
optical fiber........................................... 2
Optimum Switching.............................. 3packets............... 3, 10, 11, 12, 13, 16, 17
ping ................................... 2, 4, 5, 10, 11
point-to-point .................................. 6, 12problem solving model ......................... 1
Process switching.................................. 3
protocol .. 1, 2, 5, 6, 9, 10, 11, 12, 13, 14,16, 17, 20, 21, 22, 23
Protocol Analyzer ................................. 9
PVC....................................................... 2Queuing................................................. 3
RMON................................................. 11
routing................. 3, 9, 12, 16, 17, 18, 21Routing Table Maintenance Protocol ... 2
RTMP.............................................. 2, 21
Security ................................................. 2session layer.......................................... 5
show . 4, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15,
16, 19Silicon Switching.................................. 3
SSP........................................................ 3
SVC....................................................... 2
Switches ................................................ 6switching........... 3, 11, 14, 15, 16, 17, 19
TCP ................. 1, 4, 9, 10, 12, 15, 16, 18
TDR....................................................... 9TDRs..................................................... 4
The VlanDirector Switch Management
Application........................................ 4
8/14/2019 TestKiller 640-506 Ed1
28/28
www.testkiller.com25
throughput............................................. 2
token.......................................... 2, 10, 12
trace .................................................. 4, 5
TrafficDirector Remote Monitoring
Software ............................................ 4
transport layer...................................... 2
trunking........................................... 6, 16
Update-Based Routing Protocol ........... 2VLAN ............... 6, 11, 12, 13, 15, 16, 19
Volt-Ohm Meters .................................. 4
WAN Manager...................................... 4