Network Engineer Basic Questions
Network Engineer Basic Questions
Network Engineer Basic Questions
QUESTIONS
NETWORK ENGINEER
www.codelivly.com
OSI (Open system interconnect)
1. Explain OSI Layer?
m Open system interconnect (OSI) was developed by the international organization for
standardization (ISO) and introduced in 1984.
m It’s a consists of seven layers
m Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data
link layer, Physical layer.
2. Which Layer is Responsible for Reliable Connection?
3. What are Different protocol works at each of the Layer in OSI model?
Application layer
It’s responsible for providing an interface for the user to interact with application services or
network services. Ex-Web browser (HTTP), Telnet
Presentation layer
It’s responsible for defining a standard format to the data.
The major functions described at this layer are: -
Encoding-Decoding Ex- AVI-(video), WAV-(voice), JPEG (graphite), ASCII (text)
Encr yption-Decr yption
Session layer
It’s responsible for establishing, maintaining, and terminating the sessions.
Session ID is used to identify a session or interaction.
Ex-Remote procedural call, Apple talk session protocol
Transport Layer
It provides data delivery mechanism between applications in the network.
Transport layer is the major function layerIn OSI layer
Identifying service
Multiplexing&De-multiplexing
Segmentation, Error correction, flow control
Transport layer protocols?
The protocols which takes care of data transport at transport layer are TCP/UDP
Different between TCP/UDP
TCP UDP
Transmission Control Protocol User datagram protocol
Connection Oriented Connection less
Support acknowledgements No support for acknowledgements
Reliable communication Unreliable communication
Protocol no.6 Protocol no.17
Ex-HTTP, FTP, SMTP DNS, DHCP, TFTP
Network Layer
It provides logical addressing path determination (routing)
The protocols that work in this layer are: - Routed Protocol, Routing Protocol
Routed ProtocolsgUsed to carry user data between data.
Routing Protocolsgused performs path determinisation routing.
Data link layer
It provides communication with network layer.
Mac (media access control) it provides reliable transit of data across a physical link.
Physical layer
It defines the electrical, mechanical functional specification for communication between the
network devices.
1
5. What is the port number and give some example?
Application layer
A port number is a way to identify a specific process to which an Internet or other network
message is to be forwarded when it arrives at a server. For the Transmission Control Protocol
and the User Datagram Protocol, a port number is a 16-bit integer that is put in the header
appended to a message unit.
m FTP - File Transfer Protocol (TCP-20,21)
m SSH - Secure Shell SSH Secure Login (TCP-22)
m Telnet remote login service, unencrypted text messages (23)
m SMTP - Simple Mail Transfer Protocol E-mail routing (TCP-25)
m DNS - Domain Name System (TCP/UDP-53)
m DHCP - Dynamic Host Configuration Protocol IP-(67server)-68(client).
m HTTP - Hypertext Transfer Protocol (TCP-80) used in the World Wide Web (TCP-80)
m POP3 - Post Office Protocol POP3 (TCP-110)
m NTP - Network Time Protocol (UDP-123)
m SNMP - Simple Network Management Protocol (UDP-161/162)
m HTTPS - Secure (HTTPS) HTTP over TLS/SSL (TCP-443)
2
10. What is the MAC format?
It is a 12 Digits 48 Bit(6byte) Hardware address written in Hexadecimal format.
It consists of two parts: -
m The first 24 Bits OUI (Organizationally Unique Identifier) is assigned by IEEE.
m The last 24 Bits is Manufacturing-assigned Code.
11. What is a Frame?
The Data link layer formats the message into pieces, each called a data frame and adds a
customized header containing the hardware source and destination address.
12. What is the TCP/IP Model?
3
TCP (Transmission Control Protocol)
23. What is (Transmission Control Protocol) TCP?
It is one of the most used protocols within digital network communications and ensures
end-to-end data delivery. TCP organizes data so that it can be transmitted between a server
and a client. It guarantees the integrity of the data being communicated over a network.
24. Explain TCP Three-Way handshake process?
TCP 3-way handshake is a process which is used in a TCP/IP network to make a connection
between the server and client. It is a three-step process that requires both the client and
server to exchange synchronization and acknowledgment packets before the real data
communication process starts.
SYN
1
SYN-ACK
2
ACK
3
26. 1.
What are the TCP
PUSH(PSH)-It Flags?
pushes the buffered data to the receiver’s application. If data is to be
send on the immediate basic, we will push it.
TCP 2.
Flags are used
Reset toItinfluence
(RST)- the
Reset the flow of Data across a TCP connection.
connection.
3. Finish (FIN)- It Finishes the session. It means No More Data form the sender.
4. Urgent (URG)- It is used to set the priority to tell the receiver that this data is important
for you.
5. Acknowlagement-(ACK)-All packets after SYS packet sent by the client should have this
flag set.ACK=10 means host has received 0 through 9 and is expecting byte 10 next.
6. Synchronize (SYN)-It initiated a connection. It Synchronize sequence number.
28. What is the importance of Sequence Number and Acknowledgement Number?
m Sequence Number is a 32-bit field which indicates the amount of data that is send
during a TCP session. By sequence number, the sender can be assured that the
receiver received the data because the receiver uses this sequence number as the ac-
knowledgement number in the next segment it sendsto acknowledge the received data.
When the TCP session starts, the initial sequences number can be any number in the
range of 0-4294967295.
m Acknowledgement number is used to Acknowledge the received data and is equal to
the received sequence number plus 1.
29. Which is the importance of the identification field in the IP Packets?
This is used to identify each fragmented packet so that destination device can rearrange the
whole communication in order.
4
30. What is the MTU (Maximum Transmission Unit)?
A maximum transmission unit (MTU) is the largest packet or frame size, specified in octets
(eight-bit bytes) that can be sent in a packet- or frame-based network such as the internet.
The internet’s transmission control protocol (TCP) uses the MTU to determine the maximum
size of each packet in any transmission.
31. What is the Fragmentation?
Fragmentation is a process of breaking the IP packet into smaller pieces (fragment).
Fragmentation is required when the datagram is larger than the MTU. Each fragment then
becomes a datagram and transmitted independently from source. These datagrams are
reassembled by the destination.
32. How the packet is reassembled?
IP fragmentation is an Internet Protocol (IP) process that breaks packets into smaller pieces
(fragments), so that the resulting pieces can pass through a link with a smaller maximum
transmission unit (MTU) than the original packet size. The fragments are reassembled by the
receiving host.
33. What is the Importance of DF, FM Flag?
If DF bit is set, fragmentation is not allowed. When a router needs to forward a packet larger
than the outgoing interface’s MTU, the router either fragment the packet or discards it.
Routing
5
41. What are different modes in the router?
User mode: -
m Only some basic monitoring and limited show commands work in this mode.
m Ex-Enable, ping, traceroute, etc. Router>
Privilege mode: -
m Monitoring Troubleshooting and verification commands work in this mode.
m Ex-show, configure terminal, write, etc Router#
Global Configuration mode: -
m Global Configuration made in this mode affects the operation of the device.
m Ex-Hostname, etc. Router(config)#
42. What is the command to reboot a router?
m #reload
43. What is the command to backup IOS to TFTP server?
m #copy flash tftp
44. What is the command to copy running config to startup config?
m #copy running-config start-up-config
45. Define static routing?
m In static routing, route manually configured on the router by network administrator
Advantages Disadvantages
6
51. What is EGP?
An Exterior Gateway Protocol refer to a routing protocol that handles routing between
different Autonomous System (AS) Ex-Border Gateway Protocol (BGP).
52. What is an Autonomous System?
An Autonomous System (AS) is a group of networks under a single administrative control.
53. What is Administrative Distance?
Administrative Distance is the trustworthiness of a routing protocol. Routers use AD value to
select the best path when there are two or more different routes to the same destination
learned two different routing protocols.
54. What is the Range of AD Values?
m 0-255, Where 0 is the best and 255 is the worst.
Direct connect g
Static route 0
EIGRP (summary route) gg5
eBGP route 1g20
EIGRP route g90
OSPF route g110
RIP route g120
Exterior EIGRP g170
iBGP g200
7
60. What is Bandwidth, Delay, Reliability, Load?
m Bandwidth- It is the Data capacity of a link in Kbps.
m Delay- It is the time takes to reach the destination.
m Reliability- The path with the least amount of errors or downtime.
m Load- It is the amount of utilization of a path
m MTU- maximum transmission unit (MTU) define the maximum size of the packet that
can be sent over a medium.
61. Define Bandwidth and Latency?
Bandwidth looks at the amount of data being transferred while latency looks at the amount
of time it takes data to transfer. These two terms come together as throughput, which
refers to the amount of data that is being transferred over a set period.
62. What is Cost?
Cost is the inverse proportion of bandwidth of the links.
8
72. What are the EIGRP Hello & Hold Timer?
m Hello Timer- Router will send a hello to its neighbours every 5 seconds (hello time)
m Hold Timer- If Router does not receive hello for 15 seconds (hold timer) then it will
assume that link down and it will drop neighborship.
73. What is a Successor?
A successor is the best path to reach a destination in the topology table.
74. What is the Feasible successor?
A Feasible successor is the second-best path to reach a destination after successor. It acts as a
backup for the successor.
75. What is the Feasible distance?
Feasible distance is the distance (metric) to reach the destination network. The route with
this metric will be in the routing table as it is the best route to reach a remote(destination)
Network.
76. What is advertised Distance & Reported Distance?
Advertised distance is the distance (metric) of a neighbour router to reach the destination
network. This is the metric of a destination network as reported by a neighbour.
77. What authentication does EIGRP support?
EIGRP support only MD5 authentication.
78. What is the Formula EIGRP used to Calculate Metric?
((10^7/least bandwidth of link) +cumulative delay) *256
79. What is the Different Administrative Distance that EIGRP used?
m Internal-90
m Extranal-170
m Summary -5
80. What is the EIGRP packet types?
Hello - Used for discovery of EIGRP neighbours and for detecting when a neighbour is no
longer available
Request - Used to get specific information from one or more neighbours
Update - Used to transmit routing and reachability information with other EIGRP neighbours
Query - Sent out to search for another path during convergence
Reply - Sent in response to a query packet
81. What is the EIGRP named mode?
The named mode is the new way of configuring EIGRPthis mode allows EIGRP configurations
to be entered in a hierarchical manner under the router mode. Each named mode configuration
can have multiple address families and autonomous system number combinations.
82. What is the EIGRP Passive interface?
With EIGRP running on a network, the passive-interface command stops both outgoing and
incoming routing updates
83. What is EIGRP variance values?
EIGRP provides a mechanism to load balance over unequal cost paths through Variance
Command. Variance is a number (1 to 128), multiplied by the local best metric then includes the
routes with the lesser or equal metric. The default Variance value is 1, which means equal-cost
load balancing.
84. What is the EIGRP Convergence?
Regarding convergence, EIGRP maintains a backup route. In case the current path to the
destination network fails, it can immediately switch over to using the backup route, the
feasible successor leading to faster convergence.
9
85. How do I fix EIGRP stuck in active?
EIGRP maintains a timer called “active timer” which has a default value of 3 minutes (180
seconds). EIGRP waits half of the active timer value (90 seconds) for a reply. If the router
does not receive a response within 90 seconds, the originating router sends a stuck in active
(SIA) query to EIGRP neighbours that did not respond
86. What is leak map in EIGRP?
The leak-map just allows you to advertise a specific prefix within the range of a summary
advertisement, as well as the summary itself. Basically, all routers just have EIGRP 100
running & auto-summary disabled.
87. What is the EIGRP stub router?
Stub routing is an EIGRP feature primarily designed to conserve local router resources, such as
memory and CPU, and improve network stability. The stub routing feature is most used in hub-
andspoke networks.
88. What is split horizon in EIGRP?
Split horizon is one of the methods used by distance vector routing protocols to avoid routing
loops.
The principle is simple – a router will not advertise a route back onto the interface from which it
was learned. Split horizon is enabled on interfaces by default.
89. What multicast address does EIGRP used?
EIGRP router use the multicast address of 224.0.0.10
90. How Configure EIGRP?
m Router (Config)#router eigrp 100
m Router (Config-router) #network 172.16.1.0 0.0.0.255
m Router (Config-router) #network 10.16.1.0 0.0.0.255
m Router (Config-router) #no auto-summary
91. How to configuration EIGRP named mode?
m R1(Config)# router eigrp name IBM Hyd
m R1(Config-router) #address-family ipv4 autonomous-system 12
m R1(Config-router-af) # Network 192.168.12.0
m R1(Config-router-af)#af-interface Fastehternet 0/0
92. Tell me some commands to troubleshoot EIGRP?
m #show ip route gIt Shows full Routing Table
m #show router ip eigrp gIt Shows only EIGPR Routes
m #show ip eigrp neighbours gIt Shows EIGPR Neighbours Table
m #show ip eigrp topology gIt Shows EIGPR Topology Table
10
94. What is the area in OSPF?
An area is a logical collection of OSPF networks, routers, and links that have the
same area identification. A router within an area must maintain a topological database for
the area to which it belongs.
95. What is the Intra-area route?
Intra-area routes refer to updates that are passed within the area.
96. What is an Area border router (ABR)?
An area border router is in the OSPF boundary between two areas. Both sides of any link
always belong to the same OSPF area.
97. What is the Backbone area?
The backbone area (Area 0) is the core of an OSPF network. All other areas are connected to
it and all traffic between areas must traverse it. All routing between areas is distributed
through the backbone area
Area 120 Area 121 Area 122
ABR2
ABR1
Area 0
BB-R1 BB-R2
Backbone
11
102. What is OSPF Dead interval?
Dead interval: this defines how long we should wait for hello packets before we declare the
neighbour dead. (40 Sec)
103. What is the OSPF interface priority?
Default priority for an OSPF interface is 1. The range is from 0 to 255. 0 means that the
interface does not involve in the DR/BDR election.
104. What is the passive interface?
m Passive Interface is a feature used by routing protocol to stop sending updates on the
interface.
m If an interface is configured as a passive interface, it does not participate in OSPF
and does not establish adjacencies or send routing updates. However, the interface is
announced as part of the routing network
105. What are the Requirements of neighbor adjacency?
Establish neighbour adjacencies: OSPF-enabled routers must form adjacencies with
their neighbour before they can share information with that neighbour.
m The devices must be in the same area.
m The devices must have the same authentication configuration.
m The devices must be on the same subnet.
m The MTUs on the interfaces must match.
m The devices hello and dead intervals must match.
m The devices must have matching stub flags.
106. How do I reset my OSPF neighbour?
Use the clear ip ospf neighbour command to clear neighbour
107. What is Designated Router (DR)?
m Designated Router (DR) – It is elected to minimize the number of adjacencies formed.
DR distributes the LSAs to all the other routers. DR is elected in a broadcast network to
which all the other routers shares their DBD. In a broadcast network, router requests for
an update to DR and DR will respond to that request with an update.
108. What is Backup-Designated Router (BDR)?
Backup Designated Router (BDR) – BDR is backup to DR in a broadcast network. When DR
goes down, BDR becomes DR and performs its functions.
109. How OSPF DR and BDR are elected?
DR and BDR election – DR and BDR election takes place in broadcast network or multiaccess
network. Here are the criteria for the election:
m Router having the highest router priority will be declared as DR.
m If there is a tie in router priority, then highest router I’d will be considered. First, the
highest loopback address is considered. If no loopback is configured, then the highest
active IP address on the interface of the router is considered.
110. What is the OSPF packet types?
OSPF uses the assigned IPv4 protocol 89 and multicast addresses 224.0.0.5 (All routers) and
224.0.0.6 (DR routers) where possible to reduce unnecessary traffic.
m Hello - neighbour discovery, build neighbour adjacencies and maintain them.
m DBD (Database description) - This packet is used to check if the LSDB between 2
routers is the same. The DBD is a summary of the LSDB.
m LSR (Link-state request) - Requests specific link-state records from an OSPF
neighbour.
m LSU (Link-state update) - Sends specific link-state records that were requested. This
packet is like an envelope with multiple LSAs in it.
m LSAck (Link-state acknowledgments) - OSPF is a reliable protocol so we have a
packet to acknowledge the others.
12
111. What is the OSPF neighbor states?
OSPF must get through 7 states to become neighbour here they are:
m Down – In this state, no hello packet has been received on the interface.
Note - The Down state doesn’t mean that the interface is physically down. Here, it
means that OSPF adjacency process has not started yet.
m INIT – In this state, hello packet has been received from the other router.
m 2WAY – In the 2WAY state, both the routers have received the hello packets from other
routers. Bidirectional connectivity has been established.
Note – In between the 2WAY state and Exstart state, the DR and BDR election takes
place.
m Exstart – In this state, NULL DBD are exchanged. In this state, master and slave
election take place. The router having the higher router I’d becomes the master while
other becomes the slave. This election decides Which router will send it’s DBD first
(routers who have formed neighborship will take part in this election).
m Exchange – In this state, the actual DBDs are exchanged.
m Loading – In this state, LSR, LSU and LSA (Link State Acknowledgement) are ex-
changed.
Important – When a router receives DBD from another router, it compares its own
DBD with the other router DBD. If the received DBD is more updated than its own
DBD then the router will send LSR to the other router stating what links are needed.
The other router replies with the LSU containing the updates that are needed. In return
to this, the router replies with the Link State Acknowledgement.
m Full – In this state, synchronization of all the information takes place. OSPF routing can
begin only after the Full state.
113. What is the OSPF network types?
The default OSPF network type is based on media used for the connection. Can be changed
independently of media used. Cisco provides five OSPF network types, as listed in Table 8
13
115. What is the Router LSA (link-state advertisement)?
LSA Type 1 (Router LSA) packets are sent between routers within the same area of origin
and do not leave the area. An OSPF router uses LSA Type 1 packets to describe its own
interfaces but also carries information about its neighbours to adjacent routers in the same
area.
Area 0
R1 R2
Type 1 - Router LSA
LSA Type 1 Packets exchanged between OSPF routers within the same area
Area 0
Network 192.168.20.0/24
R1 V R2
Type 2 Type 2
Network LSA Network LSA
DR
R1 R2 ABR R3 ABR R4
LSA Type 3 - An OSPF ABR router advertises the summarized route 192.168.2.0/24 to Area 0
14
118. What is the ASBR Summary LSA?
LSA Type 4 (ASBR Summary LSA) packets are the LSAs that advertise the presence of
an Autonomous System Border Router (ASBR) to other areas. In the example below
when R2 (ABR) receives the LSA Type 1 packet from R1 it will create a LSA Type 4 (Summary
ASBR LSA) packet, which advertises the ASBR route received from Area 1, and inject it
into Area 0.
While LSA Type 4 packets are used by ABRsto advertise the ASBR route through their areas,
it will not be used by the ASBR itself within its local area (Area 1); ASBR uses LSA Type 1 to
inform its neighbours (R2 in this case) within its networks.
LSA Type 5 packets advertise the default route to all OSPF routers
This external route/prefix is redistributed in to the OSPF network by the ASBR (R1)
and seen as O E1or E2 entries in other OSPF routers routing tables.
15
123. Explain Stub Area and different types of Stub area?
Stub Area
Sometimes we need to control the advertisement of external routes into an area. This area
is called stub area. Stub area are not capable of importing routes external to OSPF. Type 4,
& Type 5 LSA are filtered from stub areas and a default route is injected into that area by
ABR in place of external routes.
Three restriction apply to OSPF stub area: -
1. No virtual links are allowed in the stub area.
2. Stub area cannot be a backbone area.
3. No Autonomous System Boundary Router are allowed
Totally Stubby Area Like stub areas, totally stubby area does not receive type4 and type5 LSA
from their ABRs. However, they also do not receive type 3 LSAs. It allows advertisement of
internal router in that area. Not-So-Stubby Areas The motivation behind NSSA is to allow OSPF
stub area to carry external routes. External router is imported into OSPF NSSA as Type 7 LSA by
ASBR. Type 7 LSA cannot go into area 0 so it is converted back into Type 5 LSA by ABR and
injected into area 0. Totally NSSA Along with Type4 & Type5, Type3 LSA will also be filtered in
Totally NSSA
124. Can we have OSPF run over a GRE Tunnel?
Yes, we can have OSPF run over a GRE tunnel.
125. How do we configure the OSPF Routing Protocol?
16
128. Can Router on different subnet become BGP Neighbors?
Can does not require neighbours to be attached to the same subnet. Instead, BGP routers
use a TCP connection between the routers to pass BGP message allowing neighbouring
routers to be on the same or different subnet.
129. Different between eBGP & iBGP neighbors?
m IBGP - neighborship is formed between routers within the same AS (autonomous
system)
m EBGP - neighborship is formed between routers different AS (autonomous system)
130. Explain Loop prevention mechanism in BGP?
BGP used two mechanisms to prevent loops: -
m When a router learns route from an iBGP peer, that router does not advertise the same
routes to another iBGP peer.
m By using AS_PATH- When advertising to an eBGP peer, a BGP router adds its own
ASN to the AS_PATH. If a BGP router receives an Update and the route advertisement
lists an_AS_PATH with its own ASN, the router ignores that route.
Note: - A BGP router does not add its ASN when advertising to an iBGP Peer.
131. What is different between the hard reset and soft rest in BGP?
m Hard Reset - In case of hard reset the local router brings down the neighborship,
brings down the underlying TCP connection and all the BGP table entire learning from
neighbour are removed #clear ip bgp command used for hard reset.
m Soft Reset - In case of a soft reset the router does not bring down the BGP
neighborship or the underlying TCP connection.
m However, the local router resends outgoing Updates and reprocesses incoming
Update adjusting the BGP table base on the current configuration #clear ip bgp * soft
command used for soft reset.
132. What are different BGP Message Types?
m Open - It is Used to establish a neighbour relationship and exchange parameters,
including autonomous system number and authentication values.
m Keepalive - are sent periodically (every 60 seconds by default) to ensure that the
remote peer is still available. If a router does not receive a KEEPALIVE from a peer for a
Hold - time period (by default, 180 seconds), the router declares that peer dead.
m Update - It exchange Path Attributes and the associated prefix/length (NLRI) that use
those attributes.
m Notification - It is used to report BGP error. It results in a reset of neighbour
relationship.
133. Explain various state of BGP?
m Idle - the initial BGP state.
m Connect - The BGP process is waiting for the TCP Connection to be completed. If
it is successful, it will be continuing to the Open Sent State. In case it fails, it will be
continuing to active state.
m Active - BGP will try another TCP three-way handshake to establish a connection with
the remote BGP neighbour. If it successful, it will be move to the Open Sent State.
m Open sent - BGP has both established the TCP connection and sent an OPEN
Message and is awaiting a reply OPEN Message. Once it receives a reply OPEN
Message, the BGP peer will send a KEEPALIVE message.
m Open confirm - BGP listens for a reply KEEPALIVE message
m Established - All neighbour parameters matched, the neighbour relationship has been
established and the peers can now exchange update message.
17
BGP States
Idle
Connect Active
Open Sent
Open Confirm
Established
18
m Neighbour type - eBGP is preferred over iBGP
m IGP metric - Route with nearest IGP neighbour (lowest IGP metric) is preferred.
m eBGP route - Oldest (longest known) route is preferred.
m Neighbour Router ID - Lowest is preferred.
m Neighbour IP Address - Lowest is preferred.
Switching
A switch is a device which is used to connect multiple devices inside Local Area Network
(LAN). Unlike hubs, a switch examines each packet and process it accordingly rather than
simply repeating the signal to all port. Switches operate at Layer Two (Data Link layer) of the
OSI model.
143. What is the different between a HUB, Switch & Router? 144. What are
functions of the switch?
The Switch performs three major function: -
m Address learning
m Packet forwarding.
m Loop avoidance by Spanning Tree Protocol
19
145. What is Sub interface?
To support ISL or 802.1Q routing on a Fast Ethernet interface, the router’s interface is
divided into logical interface-one for each VLAN. These are called Sub interfaces.
146. What is a Broadcast Domain & Collision Domain?
Broadcast Domain - Broadcast is a type of communication, where the sending device sends a
single copy of data and that copy of data will be delivered to every other device in the
network segment.
Collision Domain - It is a network scenario where one device sends a packet on a network
segment forcing every other device on that same segment to pay attention to it. At the
same time, if a different device on that same segment to pay attention to it.
147. What is a MAC address table and how a switch will build a MAC table?
The switch maintains an address table called MAC address table to efficiently switch frames
between interfaces. When the switch receives a frame, it associates the MAC address of the
sending device with the switch port on which it was received.
148. How does switch learn Mac address?
A switch can learn MAC address in two ways; statically or dynamically. In the static option,
we must add the MAC addresses in the CAM table manually. In the dynamic option, the
switch learns and adds the MAC addressesin the CAM table automatically. The switch
stores the CAM table in the RAM.
149. Explain Flooding?
If the destination MAC address is not found in the MAC address table, the switch forwards
the frame out all its ports except the port on which the frame was received. This is known as
flooding
20
153. Explain the different between 802.1Q and ISL?
802.1Q - It’s an open standard created by the Institute of Electrical and Electronics Engineers
(IEEE). To identify to which VLAN a frame belongs to, a field is inserted into the frame’s
header. It is a light weighted protocol & adds only 4 Byte within Frame’s Header.
ISL (Inter-Switch Link) - This protocol is Cisco proprietary which means unlike 802.1Q, it can
be used only between Cisco switches’ works by adding Header (26 Bytes) and Trailer(4Bytes)
with Original Ethernet Frame.
154. What is a Native VLAN and What type of traffic will go through Native VLAN?
The trunk port is assigned a default VLAN ID for a VLAN that all untagged traffic will travel
on. This VLAN is called the Native VLAN and is always VLAN 1 by default (but can be changed
to any VLAN number). Similarly, any untagged or tagged traffic with unassigned VLAN ID is
assumed to belong to the Native VLAN.
21
163. What are differentVTP mode?
m VTP Server mode - By default, every switch is in server mode. Switch in VTP Server
Mode can create, delete VLANs and will propagate VLAN changes.
m VTP Client mode - Switch in VTP client mode cannot create or delete VLANs. VLAN
Trunking Protocol (VTP) client mode switch listen to VTP advertisements from other
switches and modify their VLAN configuration accordingly. It listens and forwards
updates.
m VTP Transparent mode - Switch in VTP Transparent mode does not share its VLAN
database but it forwards received VTP advertisements. We can create and delete
VLANs on a VTP transparent switch, but these changes are not sent to other switches.
164. What are requirement to exchange VTP message between two switches?
m A switch should be configured as either a VTP server or VTP client.
m VTP domain name must be same on both switches.
m VTP version must match.
m The link between the switches should be a trunk link.
165. Explain Dynamic Trucking Protocol (DTP)?
Dynamic Trunking Protocol (DTP) is a Cisco proprietary trunking protocol used for
negotiating trunking on a look between two cisco switches. Dynamic Trunking Protocol
(DTP) can also be used for negotiating the encapsulation type of either 802.18 or Cisco ISL
(inter-switch-link)
166. Explain Dynamic desirable & Dynamic auto?
Dynamic Desirable - It initiates negotiation. Switch port configured as DTP dynamic desirable
mode
will actively try to convert the link to a trunk link if the port connected to other port is capable to
form a trunk.
Dynamic Auto - It does not initiate negotiation but can respond to negotiation.
Switch port configured as DTP dynamic auto is capable to form trunk link if the other side switch
interface is configured to form a trunk interface and can negotiate with trunk using DTP
m Disabled - A port in the disabled state does not participate in the STP.
m Blocking - A blocking port does not forward frames. It only listens to BPDUs. The pur-
pose of the blocking state is to prevent the use of looped paths.
m Listening - A port in Learning state populates the MAC address table but doesn’t for-
ward data frames. The port still sends and receives BPDUs as before.
m Forwarding - The port now can send and receive data frames collect MAC addresses
in its address table, send and receive BPDUs. The port is now a fully functioning switch
port within the spanning-tree topology.
22
170. What is STP timer and explain different types of STP timer?
STP uses three timers to make sure that a network converges properly before a bridging
loop can form.
m Hello timer - The timer interval between configuration BPDUs send by the root bridge.
Its 2 seconds by default.
m Forward Delay timer - The time interval that a switch port spends in both the Listening
and Leaning states. The default value is 15 seconds.
m Max (Maximum) Age timer - Maximum length of time a BPDU can be stored without
receiving an update. It can also be defined as a time interval that a switch stores a
BPDU before discarding it. It is 20 seconds by default.
171. Explain types of STP Port Roles?
m Root port - The root port is always the link directly connected to the root bridge, or the
shortest path to the root bridge. It is always on Non-Root Bridge.
m Designated port - A designated port is one that has been determined as having the
best(lowest) cost. A designated port will be marked as a forwarding port. It can be on
both the root Bridge & non-root Bridge. All ports of root bridge are designated port.
m Forwarding port - A forwarding port forwarding frames.
m Blocked port - A blocked port is the port that is used to prevent loops. It only listens to
BPDUs. Any port other than root port and designated port is a blocked port.
172. What is BPDU?
All the switches exchange information to select root bridge as well as for configuration of
the network. This is done through the Bridge Protocol Data Unit (BPDU). Each switch
compares the parameters in the BPDU that it sends to one neighbor with the one that it
receives from another neighbor.
173. What is the destination MAC address used by Bridge Protocol data Unites
(BPDUs)?
Bridge Protocol Data Units (BPDUs) frames are sent out as at multicast destination MAC
address 01:80:c2:00:00:00.
174. How Root Bridge is elected?
The bridge ID used to elect the root bridge in the STP domain. This ID is 8 bytes long and
includes both the priority and the MAC address of the devices.
Switch with the lowest Bridge ID is elected as the root bridge which means switch with the
lowest priority will become root bridge if two or more switches have same priority then
switch with lowest mac address will become root Bridge
175. What is the Root Port?
Once the Root switch is elected, every other switch in the network must select a single port
on itself to reach the Root Switch. The port with the lowest root path cost (lowest
cumulative cost to reach the root switch) is elected as the root port and is placed in the
forwarding state. Root bridge will never have a root port.
23
177. What information can a DHCP provide to Host?
A DHCP server can provide the following information: -
m IP address
m Subnet mask
m Default gateway
m Domain Name Server
m WINS information
178. How DHCP works?
DHCP works on DORA Process (DISCOVER – OFFER – REQUEST -ACKNOWLEDGEMENT)
24
188. What is the different between Transport & Tunnel mode?
m Tunnel mode - Protects data in network-to-network or site-to-site scenarios. It
encapsulates and protects the entire IP packet-the payload including the original IP
header and a new IP header(protects the entire IP payload including user data).
m Transport mode - Protects data in host-to-host or end-to-end scenarios. In transport
mode, IPsec protects the payload of the original IP datagram by excluding the IP
header(only protects the upper-layer protocols of IP payload (user data)
189. What are the three main security services that IPsec VPN provide?
IPsec offers the following security services: -
m Peer Authentication.
m Data confidentiality.
m Data integrity.
190. Define Digital Signature?
A digital signature is an attachment to an electronic message used for security purposes.
It is used to verify the authenticity of the sender.
191. What is Site to Site and Remote access VPN?
A site-to-site VPN allows offices in multiple location to establish secure connections with
each other over a public network such as the internet.
Remote Access VPN allows Remote users to connect to the Headquarters through a secure
tunnel that is established over the internet. The remote user can access internal, private
web pages and perform various IP-based network tasks.
There are two primary methods of deploying Remote Access VPN.
m Remote Access IPsec VPN.
m Remote Access Secure Sockets layer(SSL) VPN.
192. What are the 3-protocol used in IPsec?
m Authentication Header (AH).
m Encapsulation Security Payload (ESP).
m Internet Key Exchange (IKE).
193. How ESP & AH provide anti-replay protection?
Both ESP and AH protocols provide anti-replay protection based on sequence numbers.
The sender increments the sequences number after each transmission, and the receiver
checks the sequences number after sequence number and rejects the packet if it is out of
sequence.
194. What is IKE?
It is a hybrid protocol that implements Oakley and SKEME key exchanges inside the Internet
Security Association and Key Management Protocol (ISAKMP) framework. It defines the
mechanism for creating and exchanging keys. IKE derives authenticated keying material and
negotiates SAs that are used for ESP and AH protocols.
195. Which protocol does IKE use?
IKE uses UDP port 500.
196. Explain how IKE/ISAKMP Works?
IKE is a two-phase protocol: -
Phase1
IKE phase 1 negotiates the following: -
m It protects the phase 1 communication itself (using cryto and hash algorithms).
m It generates session key using Diffie-Hellman groups.
m Peer will authenticate each other using pre-shared, public key encryption, or digital
signature.
m It also protects the negotiation of phase 2 communication.
25
Phase-2
IKE phase 2 protects the user data and establishes SA for IPsec.
There is one mode in IKE phase 2:
m Quick mode - In this mode, three messages are exchanged to establish the phase 2
IPsec SA.
At the end of phase 2 negotiation, two unidirectional IPsec SAs (Phase 2 SA) are established
for used data – one for sending and another for receiving encrypted data.
197. Explain the message exchange between the peers in IKE/ISAKMP?
Phase-1 – Main mode
m MESSAGE-1 - Initiator offers policy proposal which includes encryption, authentication,
hashing algorithms (like AES, or 3DES, PAK or PKI, MD5 or RSA).
m MESSAGE-2 - Responder presents policy acceptance (or not).
m MESSAGE-3 - Initiator sends the Diffie-Helman key and nonce.
m MESSAGE-4 - Responder sends the Diffie-Helman key and nonce.
m MESSAGE-5 - Initiator sends ID, preshare key or certificate exchange for
authentication.
m MESSAGE-6 - Responder sends ID, preshare key or certificate exchange for
authentication.
Only first four messages were exchanged in clear text. After all message are encrypted.
Phase-2-Quick mode
m MESSAGE-7 Initiator sends Hash, IPsec Proposal, ID, nonce.
m MESSAGE-8 Responder sends Hash, IPsec Proposal, ID, nonce.
m MESSAGE-9 Initiator sends signature, hash, ID.
All messages inQuick mode are encrypted.
198. What is Diffie-Hellman?
DH is a public-key cryptography protocol which allows two parties to establish a shared
secret over an insecure communications channel. Diffie-Hellman is used within IKE to
establish session keys and is a component of Oakley.
199. What are Security Associations?
The SAs define the protocols and algorithms to be applied to sensitive packets and specify
the keying material to be used by the two peers. SAs are unidirectional and are established
per security protocol (AH or ESP).
200. What is Transform set?
An IKE transform set is a combination of security protocols and algorithms. During yhe IPsec
SA negotiation, the peers agree to use a particular transform set for protecting a particular
data flow.
201. What are Crypto access lists?
Crypto access lists specify which IP traffic is protected by Crypto and which traffic is not
protected by crypto. To protect IP traffic “permit” keyword is used in an access list. If the
traffic is not to be protected,then “deny” keyword is used in the access list.
202. How to Check the status of the tunnel’s phase 1 & 2?
Use following commands to check the status of tunnel phases.
m Phase-1 #show crypto isakmp sa
m Phase-2 #show crypto ipsec sa
203. What is IPsec Virtual Tunnel Interface?
IPsec VTI is the concept of using a dedicated IPsec interface called IPsec Virtual Tunnel
interface for highly scalable IPsec-based VPNs. IPsec VTI provides a routable interface for
terminating IPsec tunnels. VTI also allows the encrypting of multicast traffic with IPsec.
26
204. What is the DMVPN?
DMVPN allows IPsec VPN networks to better scale hub-to-spok and spok-to-spok topologies
optimizing the performance and reducing latency for communications between sites.
It offers the following benefits:
m It Optimizes network performance.
m It reduces router configuration on the hub.
m Support for dynamic routing protocols running over the DMVPN tunnels.
m Support for multicast traffic from hub to spokes.
m The capability of establishing direct spoke-to-spoke IPsec tunnel for communication
between sites without having the traffic to go through the hub.
205. What is GRE?
Generic Routing Encapsulation Protocol is a tunnelling protocol developed by Cisco designed
to encapsulate IP unicast, multicast and broadcast packets. It uses IP protocol number 47.
206. Name a major drawback of both GRE & L2TP?
No encryption.
207. What is SSL VPN? How it is different from IPsec VPN?
SSL VPN provides remote access connectivity from any internet enabled device though a
standard web browser and its native SSL encryption. It does not require any special client
software at a remote site. In IPsec VPN connection is initiated using a pre-installed VPN
client software, only a web browser is required.
208. What is a firewall?
Firewall is a device that is placed between a trusted and untrusted network. It denies or
permits traffic that enters or leaves network based on pre-configured policies. Firewalls protect
inside networks from unauthorized access by users on an outside network. A firewall can also
protect inside networks from each other. For Ex-By keeping a Management network separate
from a user network.
209. What is the difference betweenGateway and Firewall?
A Gateway join two networks together and a network firewall protects a network against
unauthorized incoming or outgoing access. Network firewalls may be hardware devices or
software programs.
210. At which Layers does Firewall work?
Firewall works at layer 3,4 & 7.
211. What is the difference between Stateful & Stateless Firewall?
Stateful - A stateful firewall is aware of the connections that pass through it. It adds and
maintains information about user’s connection in the state table, referred to as a
connection table. It then uses this connection table to implement the security policies for
users connection. Example of the stateful firewall is PIX,ASA,Checkpoint.
Stateless firewall - (Packet Filtering) Stateless firewalls, on the other hand, does not look at
the state of connections but just at the packets themselves.
Example of a packet filtering firewall is the Extended Access Control Lists on Cisco IOS
Routers.
212. What information does Stateful firewall maintain?
Stateful firewall maintains the following information in its State table:-
m Source IP address.
m Destination IP address
m IP protocol loke TCP, UDP.
m IP protocol information such as TCP/UDP Port Numbers, TCP Sequence Numbers, and
TCP Flags.
27
215. What protocols are inspected by ASA?
If we need some network resources such as a Web server or FTP server to be available to
outside users, we place these resources on a separate network behind the firewall called a
demilitarized zone (DMZ). The firewall allows limited access to the DMZ, but because the
DMZ only includes the public servers, an attack there only affects the servers and does not
affect the inside network.
218. What are the values for timeout of the TCP session, UDP session, ICMP ses-
sion?
TCP session- 60 mints UDP session- 2 mints ICMP session- 2 sec
219. What is the difference in ACL on ASA than on Router?
In the router if we delete one access-control entry whole ACL will be deleted. In ASA if we
will delete one access-control entry whole ACL will not be deleted.
220. What are the different types of ACL in the Firewall?
Standard ACL Extended ACL Ether type ACL (Transparent Firewall) Web type ACL (SSL VPN)
221. What is Transparent Firewall?
In Transparent Mode, ASA acts as a Layer 2 device like a bridge or switch and forwards
ethernet frames based on destination MAC-address.
222. What is the need for a Transparent Firewall?
If we want to deploy a new firewall into an existing network it can be a complicated process due
to various issues like IP address reconfiguration, network topology changes, current firewall
etc. We can easily insert a transparent firewall in an existing segment and control traffic
between two sides without having to readdress or reconfigure the devices.
223. What are the different between a switch and ASA (in transparent mode)?
ASA does not flood unknown unicast frames that are not found in the MAC-Address Table.
ASA does not participate in STP.
Switch process traffic at layer 1 & layer 2 while ASA can process traffic from layer 1 to layer
7.
224. What information is exchanged between ASAs over a Failover link?
State- Active or standby. Hello Messages Network Link Status. Mac Addresses. Configuration
Replication and Synchronization.
225. Explain Active/Standby Failover?
In Active/Standby Failover, one unit is the active unit which passe traffic. The standby unit
does not actively pass traffic. When failover occurs, the active unit fails over to the standby
unit, which then becomes active. We can use Active/Standby Failover for ASAs in both single
and multiple context mode.
28
226. What is Policy NAT?
Policy NAT allows you to NAT by specifying both the source and destination addresses in an
extended access list. We can also optionally specify the source and destination ports.
Regular NAT can only consider the source addresses, not the destination address.
m In static NAT it is called as Static Policy NAT.
m In Dynamic NAT it is called Dynamic Policy NAT.
29