Cisco ques and answers
Cisco ques and answers
2. Define IP address ?
● IP is Internet protocol address
● Length is 4 bytes and represented in dot decimal format
● Types are IPV4 & IPV6
● Classes of Ip address are class A, class B , class C, class D and class E
3. IP address range
● Class A ip address range is from 1 to 126
● Class B is 128 to 191
● Class c is 192 to 223
● Class D is 224 to 239
● Class E is 240 to 255
4. Private IP address
● Private ip address doesn't routed via internet
● Class A private IP is 10.0.0.0
● Class B private IP is 172.16.0.0 to 172.31.0.0
● and Class C private IP is 192.168.0.0
5. Auto configuration IP
● 169.254.0.0 is auto configuration Ip
● If the host is unable to get ip from DHCP server then the host assigns the ip from the
range of 169.254.0.0 6.
FTP
● Ftp is file transfer protocol
● Ftp used to send and receive the files
● Ftp is TCP based application
● Ftp port number is 20&21
SSH
● SSH is secure shell
● SSH used for remote login
● SSH port number is 22
● SSH is TCP based application
● In SSH credentials sent in encrypted format
TELNET
● Telnet used for remote login
● Telnet uses the port number 23
● Telnet is TCP based application
DNS
● DNS is domain name service
● DNS converts domain name into ip address
● DNS port number is 53
● DNS uses both TCP and UDP protocol.
DHCP
● Dynamic host configuration protocol
● It automatically assigns the ip details and DNS details to the computer
● DHCP is UDP based application
● DHCP uses port number 68 & 67
TFTP
● TFTP is trivial file transfer protocol
● TFTP used to send and receive the files
● TFTP is UDP based application
● TFTP uses port number 69
9. Define PING?
● Ping is Packet Internet Grober .
● It's used to test the connectivity of the network
● The continuous ping is used to check the packet drops
11.TCP
● Transmission control protocol
● TCP is a connection oriented protocol.
● It's a reliable protocol .
● TCP protocol number is 6 .
● Some of the TCP based applications are HTTP, TELNET , FTP
12. UDP
● UDP is user datagram protocol
● UDP is a connectionless oriented protocol.
● It's not a reliable protocol
● UDP protocol number is 17
● Some of the UDP based applications are DHCP , TFTP
13. ICMP
● ICMP is internet control message protocol
● ICMP is used for error reporting
● It belongs to network layer
● ICMP protocol number is 1
30.MSS
● Maximum segment size
● Maximum amount of data that present in a single segment
● MTU value for Ethernet is 1500 bytes
31.MTU
● maximum transfer unit
● Maximum amount of data handled by interfaces
● MSS value is 1460 bytes.
33.TCP header
contains
● Source port number
● Destination port number
● Sequence number
● Acknowledgement number
● Header length
● Reserved Flag
● Window size
● Checksum
● Urgent pointer
● TCP options
● Padding
34.UDP header
contains
● Source port number
● Destination port number
● Total length
● Checksum
35 IP header fields
are
● Version
● Header length
● Types of service
● Total length
● Identification
● Flag
● Fragmentation offset
● Time to live
● Protocol
● Checksum
● Source ip address
● Destination ip address
● Options
Chapter 2
1. VLAN
● Vlan is a virtual local area network
● It divides the network at layer 2
● By default switch will not allow to communicate from one vlan to another vlan There
are total 4096
● VLANS Vlan types are normal range vlan and extended range vlan
● Vlan 0 to 1023 are normal range vlan
● Greater than 1023 are extended range vlan
2.Default vlan
● The default vlan are 1,1002,1003,1004&1005
● The default vlan are not allowed to create or delete
5.Access port
● Access port used to connect end user devices
● Access port carries the traffic from only one vlan at a time
● Access port will be member only one vlan at a time
● Doesn't tag the VLAN id
6. Trunk port
● Used to connect network devices
● It carries traffic from all the VLANS
● It tags the VLAN id It is not any member of VLAN
● Tags Vlan ID
7. Purpose of VTP
● Generally to configure VLAN in multiple switches we need to login each and every
switch to configure the VLANS But in VTP,
● if you configure VLAN in server mode it distributes the VLAN information to the
remaining switches among the same domain.
8.DTP
● DTP is dynamic trunking protocol
● It's a Cisco proprietary protocol
● DTP tries to form a trunk between the switches
● DTP modes are auto and desirable
● To form the trunk either one of the interfaces should be in desirable mode.
9. 802.1q
● The dot1q protocol tags the VLAN id at the trunk port.
● It's a open standard protocol
● Dot 1q inserts the tag between the source Mac address and type or length field
among the ethernet frame
● Its supports both standard and extended VLAN
11. VTP
VTP is vlan trunking protocol
It carries vlan information between the switches
VTP modes are
● Server
● Client
● Transparent
Vtp versions are
● Version 1
● Version 2
● Version 3
Vtp messages are
● Summary advertisement
● Subset advertisement
● Advertisement request.
18. What are all the step to create the extended range VLAN(1024 - 4095)?
● By Default switch will be in server mode, it won't allow to create extended range
VLAN
● So change the VTP mode to transparent, now only it allow to create Extended range
VLAN
20.What is STP?
STP stands for spanning the protocol
it provides layer 2 security.
It is used to prevent loops and provide redundancy to the network.
STP selections
a. Root bridge election
b. port election
1. designated port selection
2. non designated port selection
3. root port selection
PORT ELECTION
Root port selection
Every non road bridge should have at least one root port to reach the root bridge
1. The port with the lowest path cast to reach the road bridge is selected.
21. RSTP
Rapid spanning tree protocol
Developed by Cisco
Convergence time is lesser than 2 seconds
22.MSTP
Multiple spanning tree protocol
In MSTP multiple vlan mapped with single stp instances
1.IPSEC
Internet protocol security is frame work that offers confidentiality, integrity, authentication and
anti replay
2.VPN
VPN is a virtual private network , establishes secure private network over the internet
4.SSL VPN
● Secure socket layer
● VPN encrypts the traffic between web browser and web server
● In SSL VPN client software is not required
5.VPN protocols
● VPN protocols are
● IPsec
● Point to point tunnelling protocol
● Layer 2 tunnelling protocol and
● SSL VPN
6.IPSEC protocols
● IP sec protocols are
● authentication header
● Encapsulation security payload and
● Internet key exchange
8.Tunnel mode
Tunnel modes encrypt the entire ip packet
Transport mode
Transport mode encrypts only the payload of the packet
9.Gre vpn?
● GRE stands for Generic routing encapsulation,
● it is used to create point to point tunnels and it doesn't provide data encryption. It is
developed by Cisco
10.DM vpn?
● Dynamic multipoint VPN
● It is used to create point to multipoint tunnels and it doesn't provide data encryption; it
is developed by Cisco.
11.SSL contains?
● 1.Domain name
● 2.Organization name
● 3.Certificate authority name
● 4.Date of issue
● 5.Date of expiry
● 6.Public key
● Then client will validate the server by server public key with certificate authority after
that the client will use server random and generate the pre master key
● Then the pre master key will be encrypted using server public key and send to server
13.what is firewall?
Firewall is a network security device either hardware or software. it provide security and it
monitors all incoming and outgoing data traffic
14.ACL
Access Control List
It is a list of rules that permit or deny the traffic or packet.
2 types
● Standard ACL
● Extended ACL
Standard ACL:
● Filter applies based on Source IP
● Filter applies towards Destination IP.
● (1-99) are Standard ACL ranges.
Extended ACL:
● Filter applies based on Source IP, Destination IP, Source MAC address, Destination
MAC address and Protocol.
● Filter applies towards Source IP.
● (100-199) are extended ACL ranges.
15.NAT
NAT is a Network Address Translation.
It converts Private IP address into Public IP address and vice versa.
3 types of NAT
● Static NAT
● Dynamic NAT
● PAT
Static NAT
● 1 to 1 mapping, each and every private IP address needs a separate public IP
address.
● Manually, network admin have to bind each and every private IP address with the
registered public IP address.
Dynamic NAT
● 1 to 1 mapping, each and every private IP address needs a separate public IP
address.
● The binding of private IP address into public IP address is done automatically by the
router.
PAT
● Port Address Translation.
● Many to one mapping, upto 65535 private IP address is translated by using public
IP address.
● Mapping of Port number is done automatically.
DNS QUERY
1.Dns query
● Once the user type google.com, the computer doesn't know the IP of Google, so it
contacts the local dns server.
● If the local dns server have the IP, it's returning the IP address else it will contact the
root server
● The root server will give referral of top-level domain server to the local dns server
● Now the local dns server will contact the top-level domain server to get an IP of
Google
● The top-level domain server will give a referral of the authoritative server, now the
local dns server will contact the authoritative server and get the ip .
● After that local dns server will give the IP of Google to computer.
2.Record types
● A record
● AAAA- Quad A
● Canonical name record
● Mail exchange record
● Name server record
● Reverse pointer record
● Start of authority
● Service of location
3.RECURSIVE QUERY
● In recursive query local dns server will contact each and every dns server like root
server, top level domain server and authoritative server to get the IP
● Once the local dns server gets the IP, it will be handed over to the computer.
4.ITERATIVE QUERY
In iterative query, the computer itself should contact each and every dns server to get the IP
14.Push flag
If the application doesn't have any data to send, then it sets the push flag and informs the
TCP stack to push all the data from the sending buffer.
15.Urgent flag
If application has urgent data to send, then it sets the urgent flag and inform the TCP stack
to prioritise the data urgent data by holding the processing of other data
16.Reset flag
The client is requesting for some service, but that service is not available means then server
will send the reset flag.
17.Urgent pointer
Urgent pointer indicates where the urgent data starts and ends.
18.SACK
SACK is selective ACK, it uses the left edge and right edge to point out the missing data, it
informs the sender to resend the missing segment.
19.Window scaling
The normal window size is 65,535 bytes by using window scaling we can increase the size
of the window to 1GB.
20.TCP Option
TCP options are maximum segment size, selective acknowledgement, window scaling, time
stamp and no options.
TCP options are negotiated through the sync message
21.More fragment
If one packet is converted into 5 fragments, MF bit is set to 1 for first four fragments and MF
bit set to 0 for final fragment
22.IP flags
IP flags are don't fragment and more fragment
23.Don't fragment
If router receives the packet with don't fragment set to 1 then router will not fragment the
packet To fragments the packet, DF bit should be set to 0