思科认证CCNA基础英文版

合集下载

CCNA专业英文词汇收集全集

CCNA专业英文词汇收集全集

CCNA专业英文词汇全集CCNA为思科最基础的入门认证,其中,考试偏重网络概念和理论,对于初学者来说,不少专业英文术语难以理解,导致学员学习进度维难。

CISCO系列认证的原版教材,专业词汇出现频率积高,考生只要熟悉本文,相信学习起来一定事半功倍^-^10BaseT-----原始IEEE802.3标准的一部分,1OBaseT是1OMb/s基带以太网规范,它使用两对双绞电缆(3类、4类或5类),一对用于发送数据另一对用于接收数据。

1OBaseT每段的距离限制约为100米。

参见Ethernet和IEEE 802.3。

1OOBaseT-----基于IEEE 802.3U标准,1OOBaseT是使用UTP接线的基带快速以太网规范。

当没有通信量出现时。

1OOBaseT在网络上发送链接脉冲(比1OBaseT中使用的包含更多信息)。

参见10BaseT、Fast Ethernet和IEEE 802.3。

100BaseTX-----基于IEEE 802.3U标准,100BaseTX是使用两对UTP或STP 接线的10OMb/S基带快速以太网规范。

第一对线接收数据;第二对线发送数据。

为确保正确的信号定时,一个100BaseTX网段不能超过100米长。

A&B bit signaling (A和B比特信令)-----用于T-1传输设备,有时称为"第24信道信令"。

在这一方案中,每个T-1于信道使用每个第六帧的一个比特来发送监控信令信息。

AAA-----身份验证(Authentication)、授权(Authorization)和统计(Accounting)Cisco开发的一个提供网络安全的系统。

奏见authentication。

authorization和accountingAAL ATM适应层-----数据链路层的一个与服务有关的子层,数据链路层从其他应用程序接受数据并将其带人ATM层的48字节有效负载段中。

CCNA认证基础课程-课后作业.习题答案

CCNA认证基础课程-课后作业.习题答案

CCNA认证基础-习题分析讲义第一部分第一章1. Convert the binary number 10111010 into its hexadecimal equivalent. Select thecorrect answer from the list below. (3)1) 852) 903) BA4) A15) B36) 1C2. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select thecorrect answer from the list below. (4)1) 1562) 1583) 1604) 1625) 1646) 1663. Which binary number is a representation of the decimal number 248? (3)1) 111010002) 111101003) 111110004) 111110104. Which of the following will test the internal loopback of a node? (3)1) ping 10.10.10.12) ping 192.168.1.13) ping 127.0.0.14) ping 223.223.223.2235) ping 255.255.255.2555. What can be verified by successfully pinging the reserved loopback address ona host? (2)1) Connectivity exists between two hosts on the LAN.2) The TCP/IP stack of the local host is configured correctly.3) A connection exists between a host and the default gateway.4) The route a packet takes from the local host to a remote host is valid.6. Which of the following commands could be used on a Windows-basedcomputer to view the current IP configuration of the system? (Choose two.) (3,4)1) configip2) ifconfig3) ipconfig4) winipcfg5) Winipconfig7.Refer to the exhibit. What must be configured on Host B to allow it to communicate withthe Host C? (Choose three.) (2,4,6)1)the MAC address of RTA router interface connected to Switch 12) a unique host IP address3)the IP address of Switch 14)the default gateway address5)the MAC address of Host C6)the subnet mask for the LAN8. What are important characteristics to consider when purchasing a networkinterface card? (Choose two.) (2,3)1) security used on the network2) media used on the network3) system bus used on the computer4) software installed on the network5) diagnostic tools installed on the network第二章1. Select the necessary information that is required to compute the estimated timeit would take to transfer data from one location to another. (Choose two.) (1,5)1) file size2) data format3) network in use4) type of medium5) bandwidth of the link2. Using the data transfer calculation T=S/BW, how long would it take a 4MB file tobe sent over a 1.5Mbps connection? (2)1) 52.2 seconds2) 21.3 seconds3) 6.4 seconds4) 2 seconds5) 0.075 seconds6) 0.0375 seconds3. What are features of the TCP/IP Transport layer? (Choose two.) (3,5)1) path determination2) handles representation, encoding and dialog control3) uses TCP and UDP protocols4) packet switching5) reliability, flow control and error correction4. Which of the following is the Layer 4 PDU? (4)1) bit2) frame3) packet4) Segment5. What is important to remember about the data link layer of the OSI model whenconsidering Peer to Peer communication? (Choose three.) (3,4,5)1) It links data to the transport layer.2) It encapsulates frames into packets.3) It provides a service to the network layer.4) It encapsulates the network layer information into a frame.5) Its header contains a physical address which is required to complete the datalink functions.6) It encodes the data link frame into a pattern of 1s and 0s (bits) for transmissionon the medium.6. Which statement describes a star topology? (2)1) Each host in the network is connected to a backbone cable that is terminated atboth ends.2) Each host is connected to a hub or switch, either of which acts as a central pointfor all network connections.3) Each host is directly connected to two other hosts to form a long chain of hosts.4) Each host has a connection to all other hosts in the network.7. Which statements describe the logical token-passing topology? (Choose two.)(2)1) Network usage is on a first come, first serve basis.2) Computers are allowed to transmit data only when they possess a token.3) Data from a host is received by all other hosts. Electronic tokens are passedsequentially to each other.4) Token passing networks have problems with high collision rates.8. Which technologies are considered to be LAN technologies? (Choose two.) (2,5)1) DSL2) Token Ring3) Frame Relay4) ISDN5) Ethernet9.Refer to the exhibit. Host A wants to send a message to host B. Place the following stepsin the correct order so that the message can be sent. (4)A - add network layer addressesB - transmit bitsC - create application dataD - add data link layer addresses1) B, A, D, C2) D, A, C, B3) A, D, A, B4) C, A, D, B5) C, D, A, B6) C, B, A, D10.After an uns u ccessful ping to the local router, the technician decides to investigate therouter. The technician observes that the lights and fan on the router are not operational.In which layer of the OSI model is the problem most likely occurring? (4)1) transport2) network3) data link4) physical11. Refer t o the exhibit. What is the order of the TCP/IP Protocol Data Units as datais moved as indicated through the OSI model? (3)1) data, segments, frames, packets, bits2) data, packets, segments, frames, bits3) data, segments, packets, frames, bits4) data, packets, frames, segments, bits第三章1. Which combinations of charges will be repelled by electric force? (Choose two.)(4,6)1) neutral and neutral2) neutral and positive3) neutral and negative4) positive and positive5) positive and negative6) negative and negative2. Which of the following are considered the best media for use in data networkcommunications? (Choose three.) (2,3,6)1) glass2) fibers3) copper4) gold5) plastic6) silicon7) Silver3. Which of the following wireless standards increased transmission capabilitiesto 11 Mbps? (2)1) 802.11a2) 802.11b3) 802.11c4) 802.11d4. What is attenuation? (3)1) opposition to the flow of current2) measurement of electrical signals relative to time3) degradation of a signal as it travels along the medium4) amount or volume of traffic that is flowing on the medium5. Which cable specifications are indicated by 10BASE-T? (3)1) 10 Mbps transmission speed, baseband signal, 500 meter cable length, coaxialcable2) 10 Mbps transmission speed, broadband signal, 100 meter cable length, coaxialcable3) 10 Mbps transmission speed, baseband signal, 100 meter cable length,twisted-pair cable4) 10 Gbps transmission speed, broadband signal, 500 meter cable length,twisted-pair cable6. For which Ethernet installations would fiber optic rather than Cat5 UTP be abetter media choice? (Choose two.) (2,4)1) a 3 meter connection between two 10BASE-T hubs2) an environment with many potential sources of EMI and RFI3) a peer to peer connection between two NICs with RJ45 connectors4) an installation between two buildings that are located 500 meters apart5) a single building installation where installation costs are the major concern7. Refer to the exhibit. Which type of UTP cable should be used to connect Host Ato Switch1? (4)1) rollover2) console3) crossover4) straight-through8. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernetconnection between Host A and Host B? (3)1) coax cable2) rollover cable3) crossover cable4) straight-through cable第四章1. During cable testing, which of the following are used to calculate theinformation carrying capacity of a data cable? (Choose two.) (2,5)1) bit speed2) attenuation3) wire map4) saturation limit5) analog bandwidth2. What type of wiring problem is depicted in this sample of a cable tester? (3)1) a fault2) a short3) an open4) a split a good map3. In a new network installation, the network administrator has decided to use amedium that is not affected by electrical noise. Which cable type will best meet this standard? (5)1) coaxial2) screened twisted pair3) shielded twisted pair4) unshielded twisted pair5) fiber optic4. How does network cable length affect attenuation? (3)1) Category 5 cable that is run in metal conduit has the highest attenuation in theshortest distance.2) Shorter cable lengths have greater signal attenuation.3) Longer cable lengths have greater signal attenuation.4) The length of the cable has no effect on signal attenuation.第五章1. The highest capacity Ethernet technologies should be implemented in whichareas of a network? (Choose three.) (3,4,5)1) between workstation and backbone switch2) between individual workstations3) between backbone switches4) between enterprise server and switch5) on aggregate access links2. What device must be used between an AUI port of a networking device and themedia to which it is being connected? (3)1) a transducer2) a transmitter3) a transceiver4) a transponder5) a port replicator3. An ISDN Basic Rate Interface (BRI) is composed of how many signalingchannels? (1)1) 12) 23) 34) 44. Which layer of the OSI model covers physical media? (1)1) Layer 12) Layer 23) Layer 34) Layer 45) Layer 56) Layer 65. What type of network cable is used between a terminal and a console port? (3)1) cross-over2) straight-through3) rollover4) patch cable6. What is the recommended maximum number of workstations configured on apeer-to-peer network? (3)1) 252) 153) 104) 55) 27. Which of the following increases the potential for a collision to occur? (4)1) the use of an active hub instead of an intelligent hub2) the use of an intelligent hub instead of an active hub3) a reduction in the number of devices attached to the hub4) an increase in the number of devices attached to the hub8. What is the maximum length of a media segment used for 100BASE-TX? (1)1) 100 meters2) 185 meters3) 400 meters4) 500 meters9. Which cable diagram displays the end to end pinout for a crossover cable usedwith Cisco devices? (3)1) Cable A2) Cable B3) Cable C4) Cable D第六章1. What does the "10" in 10Base2 indicate about this version of Ethernet? (2)1) The version uses Base10 numbering within the frames.2) The version operates at a transmission rate of 10 Mbps.3) Frames can travel 10 meters unrepeated.4) The maximum frame length is 10 octets.2. How is a MAC address represented? (4)1) four groups of eight binary digits separated by a decimal point2) four Base10 digits separated by a decimal point3) six hexadecimal digits4) twelve hexadecimal digits5) twenty-four Base10 digits3. Which of the following statements are correct about CSMA/CD? (Choose three.)(1,3,6)1) It is a media access method used in LANs.2) It is a media access method used in FDDI WANs.3) When a device needs to transmit, it checks to see if the media is available.4) A device sends data without checking media availability because all deviceshave equal access.5) Multiple devices can successfully transmit simultaneously.6) Only one device can successfully transmit at a time.4. Which devices shown in the graphic must have a MAC address? (5)1) only PC2) only router3) PC and router4) PC, hub, and router5) PC, printer, and router第七章1. Which of the following items are common to all 100BASE technologies?(Choose three.) (1,4,5)1) frame format2) media3) connectors4) timing5) multi-part encoding2. Which of the following does 1000BASE-T use to accomplish gigabit speeds onCat 5e cable? (4)1) the use of four conductors in full-duplex mode2) the use of two multiplexed pairs of wires, simultaneously3) the use of three pairs of wires for data and the fourth for stabilization andforward error correction4) the use of all four pairs of wires in full-duplex mode, simultaneously3. For which of the following is Ethernet considered the standard? (Choose three.)(1,4,5)1) inter-building connection2) mid-length voice3) video conferencing4) vertical wiring5) horizontal wiring6) diagonal wiring4. To make sure timing limitations are not violated when implementing a 10 MbpsEthernet network involving hubs or repeaters, a technician should adhere to which rule? (4)1) the 4-5-3 rule2) the 6-4-2 rule3) the 3-4-5 rule4) the 5-4-3 rule5. What is the maximum distance that 10BASE-T will transmit data before signalattenuation affects the data delivery? (1)1) 100 meters2) 185 meters3) 300 meters4) 500 meters6. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchangedata between hosts on an Ethernet network? (2)1) 1 and 2; 4 and 52) 1 and 2; 3 and 63) 3 and 6; 7 and 84) 4 and 5; 7 and 8第八章1. John has been hired as the network administrator of a local company and hasdecided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience? (1)1) collision domain extended2) an increased number of collision domains3) increased network performance4) increased bandwidth5) extended bandwidth2. "CompA" is trying to locate a new computer named "CompB" on the network.Which of the following does "CompA" broadcast to find the MAC address of "CompB"? (2)1) MAC request2) ARP request3) ping4) Telnet5) proxy ARP3. Which of the following is a term associated with replacing hubs with switchesto increase the number of collision domains? (3)1) encapsulation2) latency3) segmentation4) layered model5) broadcast domain6) Extended4. The accumulation of traffic from which of the following can cause a networkcondition called broadcast radiation? (Choose three.) (3,5,6)1) anonymous FTP servers2) telnet sessions3) video over IP applications4) NAS services5) ARP requests6) RIP updates5. Which of the following describes the use of Spanning Tree Protocol (STP)? (4)1) resolve routing loops2) eliminate Split Horizon errors3) limit collisions4) resolve switching loops6. Which term describes the delay in time that occurs when a frame leaves itssource device and reaches its destination? (4)1) collision2) backoff3) attenuation4) latency5) broadcast7. Based on the graphic above, which of the following occurs as each host systemcomes on line in the topology? (2)1) The switch sends its MAC address to each host.2) The switch adds MAC address to the bridge table as each host sends a frame.3) Each host exchanges MAC addresses with each other.4) The switch listens for data traffic to block since the switch lacks an IP address. 8. Which devices segment collision domains? (Choose two.) (2,3)1) transceiver2) router3) switch4) hub5) media9. Which protocol is used to eliminate switching loops? (3)1) Transmission Control Protocol2) Routing Information Protocol3) Spanning Tree Protocol4) Interior Gateway Routing Protocol5) Internetworking Protocol10. Refer to the exhibit. A network associate needs to establish an Ethernetconnection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (2,5)1) switch2) hub3) bridge4) router5) repeater第九章1. Which term describes an ARP response by a router on behalf of a requestinghost? (3)1) ARP2) RARP3) Proxy ARP4) Proxy RARP2. Which protocol functions at the internet layer of the TCP/IP protocol suite? (4)1) File Transfer Protocol (FTP)2) Trivial File Transfer Protocol (TFTP)3) Transmission Control Protocol (TCP)4) Internet Protocol (IP)5) User Datagram Protocol (UDP)6) Simple Mail Transport Protocol (SMTP)3. Which of these workstation installation and setup tasks are concerned withnetwork access layer functions? (Choose two.) (2,4)1) configuring the e-mail client2) installing NIC drivers3) configuring IP network settings4) connecting the network cable5) using FTP to download application software updates4. Which part of an IP address identifies a specific device on a network? (4)1) first two octets2) third and fourth octets3) network portion4) host portion5) only the fourth octet5. Which of the following are features of the Internet Protocol (IP)? (Choose two.)(1,3)1) It is the most widely implemented global addressing scheme.2) It allows two hosts to share a single address on a local area network.3) It is a hierarchical addressing scheme allowing addresses to be grouped.4) It is only locally significant, used primarily on local area networks.6. Which of the following are useable Class A IP addresses with a default subnetmask? (Choose three.) (2,3,5)1) 127.0.39.12) 111.9.28.303) 123.1.2.1324) 128.50.38.25) 105.1.34.16) 0.23.92.37. Which application layer protocols use UDP at the transport layer? (Choose two.)(2,4)1) FTP2) SNMP3) Telnet4) DHCP5) SMTP第十章1. Which OSI layer encapsulates data into packets? (3)1) session2) transport3) network4) data link2. Which OSI layer defines the functions of a router? (3)1) physical2) data link3) network4) transport5) session3. Which of the following are Cisco proprietary routing protocols? (Choose two.)(2,6)1) RIPv22) IGRP3) OSPF4) BGP5) RIPv16) EIGRP4. A company with a Class B license needs to have a minimum of 1,000 subnetswith each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one? (4)1) 255.255.0.02) 255.255.240.03) 255.255.255.04) 255.255.255.1925) 255.255.255.2245. A small company has a class C network license and needs to create five usablesubnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask? (3)1) 255.255.255.02) 255.255.255.1923) 255.255.255.2244) 255.255.255.2406. When a network administrator applies the subnet mask 255.255.255.248 to aClass A address, for any given subnet, how many IP addresses are available to be assigned to devices? (6)1) 10222) 5103) 2544) 1265) 306) 67. Host A is assigned the IP address 10.18.97.55 /21. How many more networkdevices can be assigned to this subnetwork if Host A is the only one that has an IP address assigned so far? (4)1) 2542) 5093) 10214) 20455) 40946) 81908.Refe r to the exhibit. The network administrator wants to create a subnet for thepoint-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?1) 255.255.255.1922) 255.255.255.2243) 255.255.255.2404) 255.255.255.2485) 255.255.255.2529. What is the correct number of usable subnetworks and hosts for the IP networkaddress 192.168.35.0 subnetted with a /28 mask?1) 6 networks / 64 hosts2) 14 networks / 32 hosts3) 14 networks / 14 hosts4) 30 networks / 64 hosts10. Which subnet masks would be valid for a subnetted Class B address? (Choosetwo.) (5,6)1) 255.0.0.02) 255.254.0.03) 255.224.0.04) 255.255.0.05) 255.255.252.06) 255.255.255.19211. Refer to the exhibit. How will the Fohi router dynamically learn routes to the192.168.16.16/28, 192.168.16.32/28, and 192.168.16.48/28 subnetworks? (3)1) with a static route2) with a routed protocol3) with a routing protocol4) with a directly connected route12. How many broadcast domains are shown in the diagram? (1)1) three2) four3) five4) six5) seven6) eight13. How many collision domains are shown in the diagram? (5)1) three2) four3) five4) six5) seven6) eight14. A router interface has been assigned an IP address of 172.16.192.166 with amask of 255.255.255.248. To which subnet does the IP address belong?1) 172.16.0.02) 172.16.192.03) 172.16.192.1284) 172.16.192.1605) 172.16.192.1686) 172.16.192.17615. Refer to the exhibit. Host A is sending data to Host B. Once R2 determines thatdata from Host A must be forwarded to R1 to reach Host B, which layer of the OSI model will R2 use to address and build the frames destined for R1?1) physical2) data link3) network4) transport5) session6) presentation16. Which type of address is 192.168.170.112/28?1) host address2) subnetwork address3) broadcast address4) multicast address17. Which type of address is 223.168.17.167/29?1) host address2) multicast address3) broadcast address4) subnetwork address18. Which combination of network id and subnet mask correctly identifies all IPaddresses from 172.16.128.0 through 172.16.159.255?1) 172.16.128.0 255.255.255.2242) 172.16.128.0 255.255.0.03) 172.16.128.0 255.255.192.04) 172.16.128.0 255.255.224.05) 172.16.128.0 255.255.255.19219. Refer to the exhibit. The internetwork in the exhibit has been assigned the IPaddress 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?1) 255.255.224.02) 255.255.240.03) 255.255.248.04) 255.255.252.05) 255.255.254.06) 255.255.255.0第十一章1. If a network administrator needed to download files from a remote server, whichprotocols could the administrator use to remotely access those files? (Choose two.) (3,5)1) NFS2) ASCII3) TFTP4) IMAP5) FTP6) UDP2. What is established during a connection-oriented file transfer betweencomputers? (Choose two.) (2,5)1) a temporary connection to establish authentication of hosts2) a connection used for ASCII or binary mode data transfer3) a connection used to provide the tunnel through which file headers aretransported4) a command connection which allows the transfer of multiple commands directlyto the remote server system5) a control connection between the client and server3. Which of the following protocols are used for e-mail transfer between clientsand servers? (Choose three.) (3,4,5)1) TFTP2) SNMP3) POP34) SMTP5) IMAP46) postoffice4. Which type of institution does the domain suffix .org represent? (4)1) government2) education3) network4) non-profit5. Which of the following services is used to translate a web address into an IPaddress? (1)1) DNS2) WINS3) DHCP4) Telnet6. Which part of the URL http://www.awsb.ca/teacher gives the name of thedomain? (4)1) www2) http://3) /teacher4) awsb.ca7. Which protocols are TCP/IP application layer protocols? (Choose two.) (2,4)1) UDP2) FTP3) IP4) SMTP5) TCP8. What are three characteristics of the TCP protocol? (Choose three.) (3,4,6)1) has less overhead than UDP2) is used for IP error messages3) forces the retransmission undelivered packets4) creates a virtual session between end-user applications5) carries the IP address of destination host in the TCP header6) is responsible for breaking messages into segments and reassembling9. Two peer hosts are exchanging data using TFTP. During the current session, adatagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram? (2)1) Datagram retransmission requires user authentication.2) Datagram retransmission is controlled by the application.3) Datagram retransmission relies on the acknowledgements at transport layer.4) Datagram retransmission occurs when the retransmission timer expires in thesource host.案例学习1. 子网计算练习:Answer2. 子网号及广播地址计算练习Answer3. 子网规划练习:已知:给定一个C类地址201.16.5.0/24。

思科基础实验(中英文对照)CCNA-CCNP实验

思科基础实验(中英文对照)CCNA-CCNP实验

目录实验一路由器基本配置............................................ 错误!未指定书签。

实验二静态路由......................................................... 错误!未指定书签。

实验三缺省路由......................................................... 错误!未指定书签。

实验四静态路由&缺省路由&CDP协议............... 错误!未指定书签。

实验五三层交换机实现VLAN间通信................. 错误!未指定书签。

实验六Vtp ................................................................... 错误!未指定书签。

实验七生成树STP ..................................................... 错误!未指定书签。

实验八RIP路由协议1 ............................................. 错误!未指定书签。

实验九RIP路由协议2 ............................................. 错误!未指定书签。

实验十OSPF单区域1 .............................................. 错误!未指定书签。

实验十一OSPF单区域2 ......................................... 错误!未指定书签。

实验十二OSPF单区域3 ......................................... 错误!未指定书签。

实验十三EIGRP ........................................................ 错误!未指定书签。

思科认证英文题库300-410

思科认证英文题库300-410

Exam : 300-410Title : Implementing Cisco EnterpriseAdvanced Routing andServicesVendor : CiscoVersion : DEMONO.1 An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install.Which command must the engineer run to correct the configuration?A.sudo maglev-config updateB.sudo maglev install config updateC.sudo maglev reinstallD.sudo update config installAnswer: ANO.2 Which command displays the IP routing table information that is associated with VRF-Lite?A.show ip protocols vrfB.show run vrfC.show ip route vrfD.show ip vrfAnswer: CNO.3 Which statement about IPv6 RA Guard is true?A.It does not offer protection in environments where IPv6 traffic is tunneled.B.It is not supported in hardware when TCAM is programmed.C.It cannot be configured on a switch port interface in the ingress direction.D.Packets that are dropped by IPv6 RA Guard cannot be spanned.Answer: ANO.4 While troubleshooting connectivity issues to a router, these details are noticed:*Standard pings to all router interfaces, including loopbacks, are successful.*Data traffic is unaffected.*SNMP connectivity is intermittent.*SSH is either slow or disconnects frequently.Which command must be configured first to troubleshoot this issue?A.show interface | inc dropB.show ip routeC.show policy-map control-planeD.show policy-mapAnswer: CNO.5 Refer to the exhibit.Why is the remote NetFlow server failing to receive the NetFlow data?A.The flow exporter is configured but is not used.B.The destination of the flow exporter is not reachable.C.The flow monitor is applied to the wrong interface.D.The flow monitor is applied in the wrong direction.Answer: BNO.6 A network engineer is investigating a flapping (up/down) interface issue on a core switch thatis synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?A.service timestamps log uptimeB.clock calendar-validC.clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00D.service timestamps log datetime localtime show-timezoneAnswer: D。

CCNA2-FINAL-(A+B+C套)英文版

CCNA2-FINAL-(A+B+C套)英文版

CCNA第二学期《Final Examinnation》英文A卷1 What are two functions of a router? (Choose two.)It forwards data packets toward their destination.It forwards the packet to the destination if the TTL value is 0.It changes the destination IP address of data packets before forwarding them to an exit interface.It determines the best path based on the destination MAC address.It acts as an intersection between multiple IP networks.2 Which router component contains a scaled-down version of the IOS that can be used to reload a complete version of the IOS in the event that the IOS becomes damaged or corrupted?ROMFlashSDRAMNVRAM3 Using default settings, what is the next step in the router boot sequence after the IOS loads from flash? Perform the POST routine.Search for a backup IOS in ROM.Load the bootstrap program from ROM.Load the running-config file from RAM.Locate and load the startup-config file from NVRAM.4Refer to the exhibit. How many routes are ultimate routes?34575ADCABCIt will load balance the traffic between ADC and ABCIt will send the traffic via ABC, and will use ADC as a backup path only when ABC fails.6Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols.Which path will be used to transmit the data packets from PC1 to PC2?The packets will travel via R2-R1.The packets will travel via R2-R3.The traffic will be load-balanced between two paths — via R2-R1 and via R2-R3.The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.Refer to the exhibit. The network is configured for OSPF routing with default settings. The bandwidths have been configured correctly for each link. If the T1 link between router A and router E fails, what path will a packet from router A take to reach the LAN attached to router F when the network has converged?A, B, C, FA, B, C, E, FA, D, G, E, FA, D, G, H, F8 In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes. Which route will be used to reach this network?D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/09 Which two statements are true for link-state routing protocols? (Choose two.)Routers that run a link-state protocol can establish a complete topology of the network.Routers in a multipoint network that run a link-state protocol can exchange routing tables.Routers use only hop count for routing decisions.The shortest path first algorithm is used.Split horizon is used to avoid routing loops.10with static routeswith a routed protocolwith a routing protocolwith directly connected routes11Refer to the exhibit. What is the meaning of the highlighted value 120?It is the metric that is calculated by the routing protocol.It is the value that is used by the DUAL algorithm to determine the bandwidth for the link.It is the administrative distance of the routing protocol.It is the hold-down time, measured in seconds, before the next update.12 Which statement is true about the metrics used by routing protocols?A metric is a value used by a particular routing protocol to compare paths to remote networks.A common metric is used by all routing protocols.The metric with the highest value is installed in the routing table.The router may use only one parameter at a time to calculate the metric.13 Which routing protocol by default uses bandwidth and delay to calculate the metric of a route? RIPv1RIPv2OSPFEIGRP14 Which three routing metrics are correctly defined? (Choose three.)delay - the link speedreliability - the error rate on a linkload - the amount of traffic on a linkcost - the value to indicate preference for a routehop count - the path selected with the highest bandwidthbandwidth - the amount of time it takes a packet to travel a link15 Which two statements about routing protocols are accurate? (Choose two.)OSPF supports VLSM.RIPv1 supports VLSM.RIPv2 does not have a hop count limit.EIGRP supports discontiguous network designs.16Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)a CSU/DSU devicea modeman Ethernet switcha huba bridge17 When connecting two devices, which situation would normally require the use of a crossover cable? connecting a host to a switchconnecting a switch to a routerconnecting a switch to a switchconnecting a host to a router console port18Refer to the exhibit. A network administrator has run the show interface command. The output of this command is displayed. What is the first step that is required to make this interface operational?Switch the cable with a known working cable.Issue the no shutdown command on the interface.Configure the interface as a loopback interface.Set the encapsulation for the interface.19 Which port should a terminal emulator be connected to in order to access a router without network connectivity?T1serialconsoleFastEthernet20 Which router mode is accessed by entering the enable command?user EXECprivileged EXECglobal configurationinterface configuration21Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway?10.1.1.110.1.1.2172.16.1.122Refer to the exhibit. The show cdp neighbors command was run on one of the devices as shown. Based on this information, which two facts can be determined? (Choose two.)The command was run on the router.ABCD is a non- CISCO device.Layer 3 connectivity between two devices exists.ABCD supports routing capability.ABCD is connected to the Fa0/0 interface of the neighboring device.23Refer to the exhibit. Which statement is true about the Ethernet interfaces shown in the network?A frame leaves interface Fa0/0 of R1 with the source MAC address as 000C.3010.9260.A packet will not be forwarded between R1 and R2 until the no shutdown command is issued on the Fa0/0 interface of R1.24Refer to the exhibit. Which solution provides the most efficient use of router resources for forwarding traffic between BR and HQ?RIPRIPv2EIGRPstatic routes25Refer to the exhibit. Pings are failing between HostA and HostB. The network administrator discovers that Router1 does not have a route to the 172.16.0.0 network. Assuming Router2 is configured correctly, which two static routes could be configured on Router1 to enable Host A to reach network 172.16.0.0? (Choose two.)ip route 172.16.0.0 255.255.0.0 S0/0ip route 172.16.0.0 255.255.0.0 S0/1ip route 172.16.0.0 255.255.0.0 192.168.0.1ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/0ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/126Refer to the exhibit. How was the OSPF default gateway entry for R2 determined?Default routes are automatically injected by OSPF into all advertisements.A static default gateway route is defined in the configuration of R2.The default-information originate command is applied on R1.The ISP defines the gateway of last resort and automatically passes it to R1 and R2.The ip default-gateway command is applied on R2.27Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?答案:D28192.168.2.1192.135.250.129 Because of a topology change, the next hop IP address in the current static route must be reconfigured. How can a static route entry be altered to accommodate a topology change?Keep the existing static route and configure a new static route with the correct next hop IP address.Negate the existing static route and configure a new static route with the correct next hop IP address.Do nothing. The existing static route will automatically update the next hop entry with the new IP address. Keep the existing static route, reload the router, and configure a new static route with the correct next hop IP address.30Refer to the exhibit. The entire 192.168.1.0 network has been allocated to address hosts in the diagram. Utilizing VLSM with contiguous address blocks, which set of addresses and prefixes could be used to create an addressing solution with a minimum waste of IP addresses?答案:D31Refer to the exhibit. Which host has a combination of IP address and subnet mask on the same network as Fa0/0 of Router1?host Ahost Bhost Chost D32Refer to the exhibit. If the EIGRP routing protocol is used throughout the network, which IP address and mask prefix should be sent by router R1 to the Edge router as a result of manual summarization of LANs A, B, C, and D?33Refer to the exhibit. Routers RTRA and RTRB are running OSPF. What entry does RTRA add in the routing table when Serial 0/0/0 receives an update about the network that is attached to RTRB?O 172.16.7.0/30 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.7.16/28 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.7.0/24 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/0O 172.16.0.0/16 [110/51] via 10.10.10.2, 00:00:25, Serial0/0/034Refer to the exhibit. If RIPv1 is used as the routing protocol throughout the network, what RIPv1 route will router R1 advertise to router R3?10.1.0.010.1.1.010.1.2.035 Which statement correctly describes a feature of RIP?RIP is a link-state routing protocol.RIP uses only one metric—hop count— for path selection.Advertised routes with hop counts greater than 10 are unreachable.Messages are broadcast every 10 seconds.36Refer to the exhibit. The network is using the RIPv2 routing protocol. If network 10.0.0.0 goes down, what mechanism will prevent Router1 from advertising false routing information back to Router2?triggered updatespoison reverseholddown timerssplit horizonroute poisoningsplit horizonhold-down timertriggered updates38Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)The missing information for Blank 1 is the command show ip route.The missing information for Blank 1 is the command debug ip route.The missing information for Blank 2 is the number 100.The missing information for Blank 2 is the number 120.The missing information for Blank 3 is the letter R.The missing information for Blank 3 is the letter C.39Refer to the exhibit. R1 and R2 are adjacent routers both running RIP. All interfaces on both routers are correctly configured and operational. Both routers are configured to include all connected interfaces in routing updates. R2 is not showing any routes from R1 in the routing table. What is the likely cause?The adjacent interfaces are passive.The distance of 120 exceeds 15 hops.R2 will not accept version 1 updates from R1.Routes are being summarized by R1 but not by R2.40Refer to the exhibit. All routers are configured to use the EIGRP routing protocol with defaultIt will travel via A, B, and C.It will travel via A, F, E, D, and C.It will travel via A, G, H, and C.41 Which multicast address does EIGRP use to send hello and updates packets?224.0.0.5224.0.0.6224.0.0.942 A router has EIGRP configured as the only routing protocol. In what way might EIGRP respond if there is no feasible successor route to a destination network and the successor route fails?It broadcasts hello packets to all routers in the network to re-establish neighbor adjacencies.It sends queries to adjacent neighbors until a new successor route is found.It immediately sends its entire routing table to its neighbors.It will set the metric for the failed route to infinity.43Refer to the exhibit. EIGRP 1 has been configured on R1. What is the effect of configuring the ip bandwidth-percent eigrp command?The EIGRP bandwidth routing metric will be reduced by 30%.EIGRP 1 protocol traffic will be restricted to 30% of the link bandwidth.Packets that are routed based on EIGRP routing table entries will be limited to 30% of the link bandwidth. EIGRP traffic will be permitted to burst for short periods to 30% above the configured link bandwidth.44Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)All routes are stable.Each route has one feasible successor.The administrative distance of EIGRP has been set to 50.The show ip eigrp topology command has been run on R1.45Refer to the exhibit. A network designer is testing a prototype of WAN connections. All of the routers in the exhibit are configured for OSPF routing. The design requires that the path between routers A and D through ISP-A is the primary and the path through ISP-B servers as a backup. The designer notices that router A has two equal-cost paths to the LAN on router D. How can the designer correct this problem?Issue a clock rate 2000000 interface command on S0/0/1 of router ISP-B.Change the default OSPF reference bandwidth on router A.Configure two static routes with administrative distances of 10.Use the bandwidth command to change the default bandwidth on the link to router B.46Refer to the exhibit. R1 and R2 are unable to establish an adjacency. What two configuration changes will correct the problem? (Choose two.)Set a lower priority on R2.Configure the routers in the same area.Set a lower cost on R2 compared to R1.Add a backup designated router to the network.Match the hello and dead timers on both routers.47Refer to the exhibit. If the router loopback interfaces, FastEthernet interfaces, and OSPF priorities are configured as shown, which router would win an OSPF DR election?ABCD48 Two routers need to be configured within a single OSPF area. Which two components need to be configured on both routers to achieve this? (Choose two.)the same process IDthe same area IDnetwork addresses and wildcard masksthe same router IDthe same loop back address49Refer to the exhibit. What OSPF network statements are required for the router B to advertise the three networks that are attached?router ospf 1network 10.0.0.0 0.0.0.255 area 0router ospf 1network 10.1.1.0 0.3.255.255 area 0network 10.10.1.0 0.255.255.255 area 0network 10.20.1.0 0.255.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.255.255 area 0network 10.20.1.0 0.0.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.0.255 area 0network 10.20.1.0 0.0.0.255 area 050Refer to the exhibit. A network administrator is trying to determine why router JAX has no OSPF routes in its routing table. All routers are configured for OSPF area 0. From the JAX router, the administrator is able to ping its connected interfaces and the Fa0/1 interface of the ORL router but no other router interfaces. What is a logical step that the network administrator should take to troubleshoot the problem?Reboot the routers.Change the OSPF process ID on all of the routers to 0.Check to see if the cable is loose between ORL and JAX.Check to see if CDP packets are passing between the routers.Use show and debug commands to determine if hellos are propagating.CCNA第二学期《Final Examinnation》英文B卷1 A network administrator is in charge of two separate networks that share a single building. What device will be required to connect the two networks and add a common connection to the Internet that can be shared?hubrouteraccess pointEthernet switch2 Which two router component and operation pair are correctly described? (Choose two.)DRAM - loads the bootstrapRAM - stores the operating systemFlash - executes diagnostics at bootupNVRAM - stores the configuration fileROM - stores the backup configuration filePOST - runs diagnostics on hardware modules3 A router boots and enters setup mode. What is the reason for this?The IOS image is corrupt.Cisco IOS is missing from flash memory.The configuration file is missing from NVRAM.The POST process has detected hardware failure.4Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)5 Which candidate route has the longest match for a packet with a destination address of 10.30.16.48?6Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols.Which path will be used to transmit the data packets from PC1 to PC2?The packets will travel via R2-R1.The packets will travel via R2-R3.The traffic will be load-balanced between two paths — via R2-R1 and via R2-R3.The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.R 192.168.1.0/24 [120/3] via 192.168.110.1, 00:00:17, Serial0/1/0R 192.168.1.0/24 [120/2] via 192.168.200.1, 00:00:17, Serial0/0/0R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:17, Serial0/0/1R 192.168.1.0/24 [120/4] via 192.168.101.1, 00:00:17, Serial0/1/18Refer to the exhibit. The router receives a packet that is destined for 192.168.5.79. How will the router handle this packet?It will forward the packet via the FastEthernet0/0 interface.It will forward the packet via the Serial0/0/0 interface.It will forward the packet via the Serial0/0/1 interface.It will drop the packet.9 A network administrator uses the RIP routing protocol to implement routing within an autonomous system. What are two characteristics of this protocol? (Choose two.)It uses the Bellman-Ford algorithm to determine the best path.It displays an actual map of the network topology.It offers rapid convergence in large networks.It periodically sends complete routing tables to all connected devices.It is beneficial in complex and hierarchically designed networks.10 Which two statements are true for link-state routing protocols? (Choose two.)Routers that run a link-state protocol can establish a complete topology of the network.Routers in a multipoint network that run a link-state protocol can exchange routing tables.Routers use only hop count for routing decisions.The shortest path first algorithm is used.Split horizon is used to avoid routing loops.11 Which two statements are true about classless routing protocols? (Choose two.)They can be used for discontiguous subnets.They can forward supernet routes in routing updates.They cannot implement classful routes in routing tables.They use only a hop count metric.They do not include the subnet mask in routing updates.12 Which statement is true regarding routing metrics?All routing protocols use the same metrics.EIGRP uses bandwidth as its only metric.Routers compare metrics to determine the best route.The larger metric generally represents the better path.13 Which routing protocol by default uses bandwidth and delay to calculate the metric of a route?RIPv2OSPFEIGRP14 You have been asked to explain converged networks to a trainee. How would you accurately describe a converged network?A network is converged when all routers have formed an adjacency.A network is converged immediately after a topology change has occurred.A network is converged when all routers flush the unreachable networks from their routing tables.A network is converged after all routers share the same information, calculate best paths, and update their routing tables.15Refer to the exhibit. All the routers are properly configured to use the RIP routing protocol with default settings, and the network is fully converged. Router A is forwarding data to router E. Which statement is true about the routing path?Router A will send the data via the A-D-E path that is listed in the routing table.Router A will load-balance the traffic between A-B-E and A-C-E.Router A will determine that all paths have equal metric cost.Router A will send the data through A-D-E and keep A-B-E and A-C-E as the backup paths.16Refer to the exhibit. A device is required to complete the connection between router R1 and the WAN. Which two devices can be used for this? (Choose two.)a CSU/DSU devicean Ethernet switcha huba bridge17 Which component is typically used to connect the WIC interface of a router to a CSU/DSU?V.35 cableRJ-45 adaptercrossover cablestraight-through cable18 Which router mode is accessed by entering the enable command?user EXECprivileged EXECglobal configurationinterface configuration19Refer to the exhibit. What are the effects of the exhibited commands on the router?All passwords are encrypted.Only Telnet sessions are encrypted.Only the enable password is encrypted.Only the enable password and Telnet session are encrypted.Enable and console passwords are encrypted.20Refer to the exhibit. A technician has configured the interfaces on the Router, but upon inspection discovers that interface FastEthernet0/1 is not functioning. Which action will most likely correct the problem with FastEthernet0/1?A clock rate should be added to the interface configuration.The subnet mask should be added to the interface configuration.An interface description needs to be added to the interface configuration.The no shutdown command needs to be added to the interface configuration.21Refer to the exhibit. Which two facts can be derived from this output? (Choose two.)Three network devices are directly connected to Router2.The serial interface between Router2 and Router3 is up.Router1 and Router3 are directly connected.Six devices are up and running on the network.Layer 3 functionality between routers is configured properly.22Refer to the exhibit. Which route in the routing table of R1 will be discarded by its neighboring router? 192.168.2.0192.168.3.0192.168.9.0192.168.10.0192.168.11.023Refer to the exhibit. All interfaces are addressed and functioning correctly. The network administrator runs the tracert command on host A. Which two facts could be responsible for the output of this command? (Choose two.)The gateway for Host A is missing or improperly configured.The gateway for Host B is missing or improperly configured.24 In which situation would a default static route be recommended?when connecting an edge router to the Internetwhen variable length subnet masking is in effectwhen there is more than one valid route for a destination networkwhen a destination network has a larger mask than any routes in the routing table25 What is the advantage of configuring a static route with an exit interface instead of a next-hop address?The router will perform a recursive lookup.This route will automatically be used as the gateway of last resort.The exit interface configuration consumes less router processing time.The exit interface configuration has an administrative distance value of 1.26Refer to the exhibit. On the basis of the show running-config output, which option correctly reflects the routes that will be listed in the R2 routing table?答案:D27 A static route has been configured on a router. However, the destination network no longer exists. What should an administrator do to remove the static route from the routing table?Change the routing metric for that route.Nothing. The static route will go away on its own.Change the administrative distance for that route.Remove the route using the no ip route command.28Refer to the exhibit. Hosts on the 192.168.1.0 network cannot communicate with hosts on the 172.16.1.1 network. The network administrator has run the show ip route command on R1.What could be the cause of this problem?The FastEthernet interface on R1 is disabled.Autosummarization is enabled on R1.The serial interface S0/0/0 of R1 is administratively down.No static route or routing protocol is configured.29A new static route must be configured on R1 with the R3 serial interface as the next hop.A new default route must be configured on R1 with the R3 serial interface as the next hop.The default route on R2 should be configured with the R3 serial interface as the next hop.The default route on R2 must be replaced with a new static route and the next hop should be the R1 FastEthernet interface.31Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?32Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?The IP address of host A is incorrect.The default gateway of host A is incorrect.The Fa0/1 interfaces of the two routers are configured for different subnets.The subnet mask for the Fa0/0 interface of R1 is incorrect.33Automatic summarization is enabled on R1.The routing table of R2 contains only classful networks.R2 will reject this update.The routing protocol that is configured on both routers is RIPv1.34 Which additional piece of information is included in the updates of classless routing protocols to support the use of VLSM and discontiguous networks?metricnetwork maskneighbor router IDadministrative distance35Refer to the exhibit. The network is running the RIP routing protocol. Network 10.0.0.0 goes down. Which statement is true regarding how the routers in this topology will respond to this event?Router4 will learn about the failed route 30 seconds later in the next periodic update.Split horizon will prevent Router4 from fowarding packets to the 10.0.0.0 network until the holddown timer expires.Router5 immediately flushes the unreachable route from its routing table.Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0.clears an unreachable route from the routing table after the invalid timer expiresprevents regular update messages from inappropriately reinstating a route that may have gone badremoves an unreachable route from the routing table after the flush timer expireslimits the period of time or number of hops a packet can traverse through the network before it should be discardedused to mark the route as unreachable in a routing update that is sent to other routers37 Which two technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two.)authenticationlink-state advertisementshold-down timersSpanning Tree Protocolsplit horizon38Refer to the exhibit. PC1 is unable to access the Internet. What is the cause of the problem?An incorrect IP address is configured between the two routers.No static route is configured on Router2.A routing loop has occurred.No routing protocol is configured on either of the two routers.39。

最新CiscoCCNA专业英文词汇全集1汇总

最新CiscoCCNA专业英文词汇全集1汇总

C i s c o C C N A专业英文词汇全集1Cisco:CCNA专业英文词汇全集(2)上B8ZS 二进进制8零替换----- 一种线路编码,在连接的远端解释,在T-1和E-1电路的链路上连续传输八个零时,它使用一个特殊的代码替代。

这一技术保证1的密度不受数据流的约束。

也称为双极性8零替换。

对比AMI。

参见ones density。

backbone (骨干)----- 网络的基本部分,它提供发送到其他网络和从其他网络发起的通信量的主要路径。

back end (后端)----- 为前端提供服务的一个节点或软件程序。

参见server。

bandwidth (带宽)----- 网络信号使用的最高和最低频率间的间隔。

通常,它涉及一个网络协议或介质的额定吞吐能力。

bandwith on demand (BoD,按需带宽)----- 这一功能允许一个附加的B 信道用于为一个特定连接增加可用带宽量。

baseband (基带)----- 网络技术的一个特性,它只使用一个载波频率。

以太网就是一个例子。

也称 "窄带"。

对broadband。

baseline (基线)----- 基线信息包括有关该网络的历史数据和常规使用信息。

这个信息可以用来确定该网络最近是否有可能引起问题的变化。

Basic Management Setup (基本管理建立) ----- Cisco路由器在建立模式中使用。

只有提供足够的管理和配置才能使路由器工作,这样才有人能远程登录到该路由器并配置它。

baud (波特)----- 每秒比特 (b/s)的同义词,如果每个信号单元代表一比特的话。

它是一个发信号速度的单位,等效于每秒钟传输的单独的信号单元数。

BDR 备份指定路由器 (Backup Designated Router)----- 一个OSPF网络中用来备份指定的路由器以防失效。

beacon (信标)----- 一个FBDT设备或令牌环帧,它指出环上的一个严重问题,如电缆断开。

BvkdtbnCCNA认证基础-教学大纲

BvkdtbnCCNA认证基础-教学大纲
第一十一章
1.什么是ACL
2.为什么建立ACL
3.创建ACL的顺序
4.如何应用ACL
5.ACL如何工作
6.配置ACL
7.如何使用通配符掩码
8.如何使用通配符any和host
9.标准访问控制列表与扩展访问控制列表
10.为ICMP、IGMP、TCP、UDP配置扩展ACL
11.默认状态下的扩展ACL
12.命名访问控制列表
Time will pierce the surface or youth, will be on the beauty of the ditch dug a shallow groove ; Jane will eat rare!A born beauty, anything to escape his sickle sweep
14.常见的RIP配置问题
15.检验RIP的配置
16.RIP的故障排除
17.RIP的负载均衡
18.结合使用静态路由与RIP协议
第八章
1.使用ICMP的重要性
2.ICMP的类型以及信息请求与回送消息格式
3.导致ICMP差错消息产生的可能原因
4.ICMP消息传送机制
5.ICMP回应消息
6.ICMP重定向和改变请求
5.管理系统IOS映像文件
第六章
1.路由器如何为分组从源端到目的端选择路由
2.网络和主机寻址方式
3.路径选择与分组交换
4.被动路由协议和路由选择协议
5.内部和外部协议
6.网络层协议操作与多协议路由选择
7.静态路由于动态路由
8.配置静态路由
9.配置默认路由
10.静态路由配置的故障排除
11.使用动态路由的原因

cisco认证教材

cisco认证教材

教材图书NA中文图书思科网络技术学院教程(上、下册)人民邮电出版社ISBN7-115-08773-3/TP.1816 ¥78Cisco CCNA认证考试(640-507)考试指南人民邮电出版社ISBN7-115-09105-6/TP.2068 ¥83Cisco CCNA认证考试(640-607)考试指南英文版已出,中文版代定Cisco网络设备互联解决方案电子工业出版社ISBN7-5053-6531-2/TP.3598 ¥36NP中文图书组建或扩展的Cisco网络人民邮电出版社ISBN7-115-09156-0/TP.2111 ¥75 对应503(BSCN)组建Cisco多层交换网络人民邮电出版社ISBN7-115-08884-5/TP.1901 ¥39 对应504(BCMSN)组建Cisco远程接入网络人民邮电出版社ISBN7-115-08666-4/TP.1739 ¥63 对应505(BCRAN)CCNP Support认证考试指南电子工业出版社ISBN7-5053-6959-8/TP.3972 ¥36 对应506(CIT)Cisco 互联网络故障查找与排除电子工业出版社IsBN7-5053-5812-X/TP.3032 ¥42 对应506(CIT)(此书即电子工业出版社的网络工程丛书系列中的一本,红皮黄页A5幅面,推荐)3._CCDA/CCDP中文图书CCDA认证考试指南人民邮电出版社 ISBN7-115-09123-4/TN.1695 ¥58 对应441(DCN)Cisco互连网络设计人民邮电出版社ISBN7-115-08880-2/TP.1897 ¥62 对应025(CIT)思科网络设计工程师标准教材(DCN)希望电子出版社¥65 对应441(DCN)注:以上图书均为中文版,并标有Cisco Systems的Cisco Press标示。

若在当地书店找不到上述图书的朋友,推荐到dangdang看一下,有折扣的哦。

CCNA英文版01

CCNA英文版01
ICND 2.0—0-9
P M
Module 2: Managing Your Network Environment
Module 4: Extending Switched Networks with VLANs
Module 5: Determining IP Routes (cont.)
2002, Cisco Systems, Inc. All rights reserved.
Module 4: Extending Switched Networks with VLANs (cont.)
Day 4
Module 5: Determining IP Routes (cont.)
Day 5
Module 8: Establishing Frame Relay Connections
Lunch
Module 1: Operating and Configuring Cisco IOS Devices (cont.) Module 3: Configuring Catalyst Switch Operations (cont.) Module 6: Managing IP Traffic with Access Lists (cont.) Module 7: Establishing Serial Point-to-Point Connections
A M
Module 3: Configuring Catalyst Switch Operations
Module 5: Determining IP Routes
Module 6: Managing IP Traffic with Access Lists
Module 9: Completing ISDN Calls

CCNA_Exploration_网络基础知识_(版本_4[1].0)答案

CCNA_Exploration_网络基础知识_(版本_4[1].0)答案

CCNA Exploration: 网络基础知识(版本4.0)第二章1.下列哪些陈述正确指出了中间设备在网络中的作用?(选择三项)答案:1,确定数据传输路径3,重新定时和重新传输数据信号5,管理数据流2.请选择关于网络协议的正确陈述(选择三项)答案:1,定义特定层PDU的结构3,概述层与层之间通信所需的功能5,需要取决于协议层的封装过程3.封装的两个功能是什么?(选择两项)答案:4,标识属于同一通信的数据片段5,确保数据片段可以转发到正确的接收端设备4.数据链路层封装添加的报尾信息有何主要功能?答案:1,支持差错校验5.OSI模型哪两层的功能与TCP/IP模型的网络接入层相同?(选择两项)答案:3,物理层4,数据链路层6.什么是PDU?答案:4,特定层的封装7.以下哪种特征正确代表了网络中的终端设备?答案:2,发送数据流8.请参见图示。

IP地址为10.0.0.34的“手机A”已经与IP地址为172.16.1.103的“IP电话1”建立了IP会话。

请根据图示回答,下列哪个设备类型是对无线设备“手机A”功能的最准确描述?答案:2,终端设备9.请参见图示。

下列哪三个标签正确标识了图示网段的网络类型?(选择三项)答案:2,网络B—WAN 3,网络C—LAN 6,网络A—LAN10.下列哪三项陈述是对局域网(LAN)最准确的描述?(选择三项)答案:1,LAN通常位于一个地域内2,此类网络由一个组织管理5,LAN为同一个组织内的用户提供网络服务和应用程序访问11.请参见图示。

哪个网络术语描述了图中所示的数据交替发送过程?答案:4,多路复用12.第4层端口指定的主要作用是什么?答案:5,标识终端设备内正在通信的进程或服务13.哪种设备被视为中间设备?答案:5,交换机14.请参见图示。

哪个术语正确判断出了包含于区域B中的设备类型?答案:4,中间设备15.请参见图示。

所示网络属于哪一类型?答案:3,LAN16.哪一层负责将数据段封装成数据包?答案:3,网络层17.通过检查网络层头部可以确定什么?答案:2,目的主机地址18.请参见图示。

CCNA项目培训讲义英文

CCNA项目培训讲义英文
Network Management - SNMP*
Name Management - DNS*
*Used by the Router
1-16
Transport Layer Overview
Application Transport Internet Data-Link Physical
Transmission Control Connection-
Send SYN, ACK 2
(seq = 300 ack = 101 ctl = syn,ack)
1-23
TCP Simple Acknowledgment
Sender
Receiver
Window Size = 1
1-24
TCP Simple Acknowledgment
Sender Send 1
Data-Link Physical
• Combines bits into bytes and bytes into frames
• Access to media using MAC address • Error detection, not correction
• Move bits between devices • Specifies voltage, wire speed, and
0101110101001000010
1-14
TCP/IP Protocol Stack
7 Application
6 Presentation
5
Session
4
Transport
3
Network
2
Data-Link
1
Physical

CCNA英语大全(附带音标)

CCNA英语大全(附带音标)

CCNA英语大全(附带音标)CCNA英语单词总汇Carrier['k?ri?]载体Access 通路访问Accomplish [?'k?mpli?]完成实现Accordance [?'k?:d?ns]一致的Account [?'kaunt]账号Active 活动、激活Additionally [?'di??nli]加上Adequate ['?dikwit]适当的Administrative [?d'ministr?tiv]管理Advantage [?d'vɑ:ntid?]有优势利益Aggregation [,?ɡri'ɡei??n]集合Algorithm ['?lɡ?rie?m]算法Allocate ['?l?ukeit]分配Application [,?pli'kei??n]请求Apply [?'plai]申请应用Assign [?'sain]分配指派Asynchronous[ei'si?kr?n?s]异步不同Automatic [,?:t?'m?tik]自动的Autonomous [?:'t?n?m?s]自治的Authentication [?:,θen ti'kei??n]认证、鉴别Authorization [,?:θ?rai'zei??n]授权Attenuation [?,tenju'ei??n]衰减Architecture ['ɑ:kitekt??]体系、结构、建筑学Auxiliary [?:ɡ'zilj?ri]辅助的Available [?'veil?bl]可用到的Avoid [?'v?id]避免、消除Backup备份Balance['b?l?ns]平衡Bandwidth['b?ndwidθ]带宽Belong[bi'l??]属于Benefit['benifit]利益Block[bl?k]妨碍阻塞Boundary['baund?ri]边界Branch[brɑ:nt?]分支Bridge网桥Broadband['br?:db?nd]宽带Binary ['bain?ri]二进制Broadcast广播Buffer['b?f?]缓冲器Bundle['b?ndl]捆包Cable 电缆Calculate['k?lkjuleit]考虑计划Capability[,keip?'bil?ti]性能Capacity[k?'p?s?ti]容量Card卡片Carrier ['k?ri?]载体Case案例Catalyst['k?t?list]催化剂Cell单元Central['sentr?l]中心Certification[,s?:tifi'kei??n]证明Channel信道Character['k?r?kt?]特性Characteristic[,k?r?kt?'ristik]特征Circuit['s?:kit]电路Circumstance['s?:k?mst?ns]环境详情Collision[k?'li??n]冲突Combination[,k?mbi'nei??n]联合Command[k?'mɑ:nd]命令Commit[k?'mit]提交Communication[k?,mju:ni'kei??n]通讯Compare[k?m'pε?]比较Complain[k?m'plein]抱怨Complexity[k?m'pleksiti]复杂Component[k?m'p?un?nt]组成Composite['k?mp?zit]复合物Compress[k?m'pres]压缩Compression[k?m'pre??n]密集Concept['k?nsept]概念Configuration[k?n,fiɡju'rei??n]配置Configure[k?n'fiɡ?]设定Confine[k?n'fain]限制Congestion[k?n'd?est??n]拥塞Connectivity[,k?nek'tiv?ti]连通性Connector[k?'nekt?]连接器Conserve[k?n's?:v]保存Consider[k?n'sid?]考虑Consist[k?n'sist]由-组成Console[k?n's?ul]控制台Continuous[k?n'tinju?s]连续的Contiguous[k?n'tiɡju?s]临近Continuous[k?n'tinju?s]连续的Contrast[k?n'trɑ:st]对比Controller[k?n'tr?ul?]管理员控制器Convergence[k?n'v?:d??ns]集中、汇聚Convention[k?n'ven??n]协定Corporate['k?:p?rit]共同Cost[k?st]成本Count[kaunt]计算计数Create[kri'eit]造成引起Crossover['kr?:s,?uv?]交叉(线)Cycle['saikl]周期Database数据库Debug调试Decimal['desim?l]十进制Decrease[di'kri:s]减少backbone ['b?kb?un]骨干Deduce[di'dju:s]推论Default默认Define[di'fain]定义Delivery[di'liv?ri]发送Demand[di'mɑ:nd]要求Deny[di'nai]拒绝Depend[di'pend]依靠Describe[di'skraib]描写Destination[,desti'nei??n]目的地Diagram['dai?ɡr?m]图表Dialog['dai?l?ɡ]会话Direction[di'rek??n]方向Discontinuous[,disk?n'tinju?s]不连续Discover[dis'k?v?]发现Distinction[dis'ti?k??n]差别Divide[di'vaid]划分Domain[d?u'mein]域Dramatically[dr?'m?tik?li]戏剧的Duplex['dju:pleks]双方Dynamic[dai'n?mik]动态Electronic[,ilek'tr?nik]电子Electromagnetic[i,lektr?um?ɡ'netik]电磁Enable能够Encapsulation[in,-k?ps?'lei??n]封装Encryption[in'krip??n]加密Enhance[in'hɑ:ns]提高增加Enlarge[in'lɑ:d?]扩大放大Ensure[in'?u?]保证Enterprise['ent?praiz]事业计划Environment[in'vai?r?nm?nt]环境外界Equate[i'kweit]相等Event[i'vent]事变结果Establish[i'st?bli?]建立Execute['eksikju:t]执行Exhibit[iɡ'zibit]展示Experience[ik'spi?ri?ns]经验Extend[ik'stend]扩充Factor['f?kt?]因素Failure['feilj?]失败故障Feasible['fi:z?bl]可行的Feature['fi:t??]特征Filter[filt?]过滤Flood[fl?d]泛洪Forward['f?:w?d]转发Frame [freim]桢Frequently['fri:kw?ntli]周期、频繁Function['f??k??n]功能Gateway['ɡeitwei]网关Hardware硬件Hierarchical[,hai?'rɑ:kik?l]分等级Hub集线器Ignore[iɡ'n?:]忽视Image['imid?]图象Impact['imp?kt]冲突Inbound入站Increase[in'kri:s]增大Input输入Instability[,inst?'bil?ti]不稳定Instruction [in'str?k??n]指令、命令Integrity [in'teɡr?ti]完整Interrupt [,int?'r?pt]中断Internal[in't?:n?l]内在Interference[,int?'fi?r?ns]干扰Invalid['inv?li:d]不正确Inverse['inv?:s]反转Issue['i?ju:]发布Legitimate[li'd?itim?t]合法Link连接Local['l?uk?l]本地Logical ['l?d?ik?l]逻辑Loopback回路Maintain[mein'tein]维持Memory['mem?ri]存储Modify['m?difai]更改Module['m?dju:l]模块Multipoint['m?ltip?int]多点的Multiplexing ['m?ltipleksi?]多路复用技术Negotiate[ni'ɡ?u?ieit]商议Neighbor['neib?]邻居Normal['n?:m?l]正常Obtain[?b'tein]获得Obviously['?bvi?sli]明显的Occur[?'k?:]出现Operational[,?p?'rei??n?l]操作Outbound['autbaund]外传Output输出Parameter[p?'r?mit?]参数Parity['p?riti]奇偶Participate[pɑ:'tisipeit]参与Parallel ['p?r?lel]平行、并行Passive['p?siv]被动Perform[p?'f?:m]完成任务Performance [p?'f?:m?ns]性能Permission[p?'mi??n]允许Permit[p?'mit]通行许可Platform['pl?tf?:m]平台Plug[pl?ɡ]进入Poison['p?iz?n]毒化Port端口Prefer[pri'f?:]优于Prevent[pri'vent]防止Primary['praim?ri]主要的Priority[prai'?r?ti]优先Private['praivit]私人Prohibit[pr?u'hibit]禁止Protocol['pr?ut?k?l]协议Provider[pr?u'vaid?]供给者Proxy['pr?ksi]代理服务器Purpose['p?:p?s]目的Quantity['kw?nt?ti]数量Query['kwi?ri]疑问Queue [kju:]队列Range[reind?]排列Reachable['ri:t??bl]可达成的Reboot重启Recognize['rek?ɡnaiz]认可Redistribute[,ri:di'stribju:t]重新分配Reduce[ri'dju:s]减少Reference['ref?r?ns]涉及Regard[ri'ɡɑ:d]关心Relay['ri:lei]转播、中继Release[ri'li:s]释放Reliable[ri'lai?bl]可靠Remain[ri'mein]剩余Remote[ri'm?ut]远程Repeater[ri'pi:t?]中继器Replace[ri'pleis]取代Require[ri'kwai?]命令Respond[ri'sp?nd]回答Retransmit[,ri:tr?nz'mit]转发中继Reverse[ri'v?:s]相反Revert[ri'v?:t]回复Rollover['r?ul,?uv?]反转(线)Router['raut?]路由器Scalability[,skeil?'biliti]可量测Scheme[ski:m]安排计划Secondary ['sek?nd?ri]第二的Secret['si:krit]密码Security[si'kju?riti]安全Segment['seɡm?nt]段节Separate['sep?reit]分开Serial['si?ri?l]连续的Session['se??n]会话Shortage ['??:tid?]不足Significance [siɡ'nifik?ns]重要的Similar['simil?]类似Simultaneous[,sim?l'teini?s]同时发生Single ['si?ɡl]单一的Storage ['st?rid?]存储Slot [sl?t]槽Software软件Source [s?:s]来源Specific [spi'sifik]细节Specify ['spes?fai]详细说明Split [split]分割Stability [st?'biliti]稳定性Standard ['st?nd?d]规格标准Statement ['steitm?nt]声明Static ['st?tik]静态Storm [st?:m]风暴Straight-through [streit][θru:]直连Structure ['str?kt??]结构Subnet ['s?bnet]子网Summarization [,s?m?rai'zei??n]摘要Summary ['s?m?ri]总的Superior [sju:'piri?]上级Switch交换机Suppression [s?'pre??n]抑制Suspend [s?'spend]延缓Synchronous ['si?kr?n?s]同步Symptom ['simpt?m]症状System系统Tag标签Target ['tɑ:ɡit]目标Temporary ['temp?r?ri]暂时Terminal ['t?:min?l]终端Technology [tek'n?l?d?i]技术Terminate ['t?:mineit]结束终止T opology [t?u'p?l?d?i]拓扑Track [tr?k]途径追踪Traffic['tr?fik]交通Translation[tr?ns'lei??n]翻译Transport[tr?ns'p?:t]传输Trigger['triɡ?]引发Troubleshoot['tr?bl?u:t]故障检测Trunk主干Type类型模范Unequal[,?n'i:kw?l]不同Utilization[,ju:tilai'zei??n]利用Valid['v?lid]有效的正确的Value['v?lju:]价值Variable['vε?ri?bl]变量Vector['vekt?]矢量Verification[,verifi'kei??n]确认、核实Verify['verifai]校验Version['v?:??n]版本Via['vai?]通过、经由Virtual['v?:t?u?l]虚的Troubleshooting['tr?bl,?u:ti?]排错Physical['fizik?l]物理Ethernet['i:θ?,net]以太网Token ring['t?uk?n][ri?]令排环Frame relay侦中继Definitions['defini??nz]定义Spantree 生成树Although [?:l'e?u] 尽管Privileged ['privilid?d]特权Engineer [,end?i'ni?]工程师Wireless ['wai?lis]无线Wiring ['wai?ri?]布线Cryptographic [,kript?'ɡr?fik]加密Coaxial ['k?u'?ks?l]同轴电缆Lifecycle ['laif,saikl]生存周期Integrated ['intiɡreitid]集成、综合Specification [,spesifi'kei??n]规范Embedding [im'bedi?]嵌入Automatic [,?:t?'m?tik]自动Procedure [pr?'si:d??]程序Response [ri'sp?ns]响应Layer ['lei?]层Subscriber[s?b'skraib?]签订用户Asymmetric [,?si'metrik]非对称Converter [k?n'v?:t?]转换器Analog ['?n?l?ɡ]模拟Allocation [,?l?u'kei??n]分配Cyclic ['saiklik]循环Redundancy [ri'd?nd?nsi]冗余Detection [di'tek??n]检测Constant ['k?nst?nt]不变的Copper ['k?p?]铜Distributed [di'stribjutid]分布式Division [di'vi??n]分割Variation[,vε?ri'ei??n]变化的Delay [di'lei]延迟Tolerance ['t?l?r?ns]极值Ratio ['rei?i?u]比率Certificate [s?'tifikeit]证书Revocation[,rev?'kei??n]撤销Combined[k?m'baind]联合、组合Multiplexer ['m?ltipleks?]多路复用、多路器Spread [spred] 传播Spectrum ['spektr?m]频谱Equipment [i'kwipm?nt]设备Location [l?u'kei??n]位置Differential [,dif?'ren??l]差分Distant['dist?nt]距离Frequency['frikw?nsi]频率Spectrum ['spektr?m]光谱,频谱Global ['ɡl?ub?l]全局、全球Policy ['p?lisi]策略Hyper['haip?]超Parallel ['p?r?lel]并行Coax[k?uks]同轴电缆Interior[in'ti?ri?]内部Tunneling['t?n?li?]通道、隧道Distribution[,distri'bju:??n]分布、分配Rate[reit]比率、速度。

CCNA考试题库中英文翻译版及答案

CCNA考试题库中英文翻译版及答案

CCNA考试题库中英⽂翻译版及答案CCNA考试题库中英⽂翻译版及答案1[1]1、 What are two reasons that a network administrator would use access lists? (Choose two、)1、出于哪两种理由,⽹络管理员会使⽤访问列表?A、 to control vty access into a routerA、控制通过VTY访问路由器B、 to control broadcast traffic through a routerB、控制⼴播流量穿越路由器2、⼀个默认得帧中继WAN被分类为哪种物理⽹络类型?A、 point-to-pointA、点到点B、 broadcast multi-accessB、⼴播多路访问C、 nonbroadcast multi-accessC、⾮⼴播多路访问D、 nonbroadcast multipointD、⾮⼴播多点E、 broadcast point-to-multipointE、⼴播点到多点Answer: C3、 A single 802、11g access point has been configured and installed in the center of a squarA few wireless users are experiencing slow performance and drops while most users are oat peak efficiency、 What are three likely causes of this problem? (Choose three、)3、⼀个802、11接⼊点被部署在⼀个⽅形办公室得中央,当⼤多数⽤户在⼤流量传输数⼀些⽆线⽤户发现⽆线⽹络变得缓慢与出现丢包A、 mismatched TKIP encryptionB、 null SSIDC、 cordless phonesD、 mismatched SSIDE、 metalF、 antenna type or directionAnswer: CEF4、 Refer to the exhibit、 How many broadcast domains exist in the exhibited topology?根据下图,图中得拓扑中存在多少个⼴播域?A、 one A、1B、 two B、2C、 three C、3D、 four D、4E、 five E、5F、 six F、6Answer: C5、 Refer to the exhibit、 What two facts can be determined from the WLAN diagram? (Choose two、) 5、根据下图,WLAN diagram决定了哪两个事实A、 The area of overlap of the two cells represents a basic service set (BSS)、A、两个 cells得overlap得区域描述了⼀个basic service setB、 The network diagram represents an extended service set (ESS)、B、⽹络描述了⼀个extended service setC、 Access points in each cell must be configured to use channel 1、C、再每个CELL中得AP必须被配置成使⽤channel 1D、 The area of overlap must be less than 10% of the area to ensure connectivity、D、为了确保连通性,重叠区域必须⼩于10%E、 The two APs should be configured to operate on different channels、E、两个访问点应该被配置成⼯作在不同得频道Answer: BE6、 The command frame-relay map ip 10、121、16、8 102 broadcast was entered on the router、Which of the following statements is true concerning this command?6、路由器上输⼊命令frame-relay map ip 10、121、16、8 102 broadcast,以下选项正确得就是?A、 This command should be executed from the global configuration mode、A、该命令应该在全局配置模式下被执⾏B、 The IP address 10、121、16、8 is the local router port used to forward data、B、IP地址10、121、16、8就是本地路由器⽤来转发数据得接⼝C、 102 is the remote DLCI that will receive the information、C、102就是远端得DLCI它将接受信息。

CCNA无线认证-IUWNE10S02L01-Understanding_Cisco_Unified_Wireless_Networks_Basic_Architecture-2

CCNA无线认证-IUWNE10S02L01-Understanding_Cisco_Unified_Wireless_Networks_Basic_Architecture-2

© 2008 Cisco Systems, Inc. All rights reserved.
IUWNE v1.0—2-9
Cisco WCS, WCS Navigator, and Location Appliance
WCS:
Planning, configuration, monitoring, location, IDS, and troubleshooting Hierarchical maps Intuitive GUI and templates Policy-based networking (QoS, security, RRM, etc.)
Understanding Cisco Unified Wireless Networks Basic Architecture
Basic Cisco WLAN Installation-2
© 2008 Cisco Systems, Inc. All rights reserved.
IUWNE v1.0—2-1
Work with ISR routers Support 8 to 12 APs Work in Cisco 2800 or 3800 routers Same software features as the 2106 Series WLC
© 2008 Cisco Systems, Inc. All rights reserved.
1400 Series
© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—2-3
1300 Series
Wireless LAN Controllers

CCNA官方Cisco 原本英文资料 PPT .ppt

CCNA官方Cisco 原本英文资料 PPT .ppt

ICND v2.0—3-10
Filtering Frames
• Station A sends a frame to station C. • Destination is known; frame is not flooded.
© 2002, Cisco Systems, Inc. All rights reserved.
• The frame from station A to station C is flooded out to all ports except port E0 (unknown unicasts are flooded).
© 2002, Cisco Systems, Inc. All rights reserved.
© 2002,ቤተ መጻሕፍቲ ባይዱCisco Systems, Inc. All rights reserved.
ICND v2.0—3-5
Ethernet Switches and Bridges
• Address learning • Forward/filter decision • Loop avoidance
• Execute an add, move, or change on an access layer switch, given a new network requirement
© 2002, Cisco Systems, Inc. All rights reserved.
ICND v2.0—3-3
© 2002, Cisco Systems, Inc. All rights reserved.
ICND v2.0—3-6
Transmitting Frames
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Starting a SwitchObjectivesUpon completing this lesson, you will be able to:•Start an access layer switch and recognize the normal boot sequence•Use the command-line interface to interact with the Cisco IOS software, given an operationalaccess layer switch•Use the online help facilities associated with the command-line interfaces, given an operational access layer switchInitial Startup of the Catalyst Switch•System startup routines initiate switch software.•Initial startup uses default configuration parameters.Port LEDs During Switch POST1. At the start, all port LEDs are green.2. Each LED turns off after its test completes.3. If a test fails, its LED turns amber.4. System LED turns amber if any test fails.5. If no test fails, POST completes.6. On POST completion, LEDs blink,then turn off.Initial Bootup Output from the Catalyst 1900 SwitchInitial Bootup Outputfrom the Catalyst 2950 Switch---System Configuration Dialog ---At any point you may enter a question mark '?' for help.Use ctrl-c to abort configuration dialog at any prompt.Default settings are in square brackets '[ ]'.Continue with configuration dialog? [yes/no]: yesEnter IP address: ip_addressEnter IP netmask: ip_netmaskWould you like to enter a default gateway address? [yes]: yesIP address of the default gateway: ip_addressEnter a host name: host_nameEnter enable secret: secret_passwordWould you like to configure a Telnet password? [yes] yesEnter Telnet password: telnet_passwordWould you like to enable as a cluster command switch? noEnter cluster name: cls_nameLogging In to the Switch and Entering the Enable PasswordContext-Sensitive Help Console Error Messages Identifies problems with any switch commands that are incorrectly entered so thatyou can alter or correct them Allows recall of long orcomplex commands orentries for reentry, review, orcorrectionCommand History BufferProvides a list ofcommands and thearguments associatedwith a specific command Switch Command-Line Help FacilitiesConfiguring the SwitchConfiguration Modes:•Global configuration mode–wg_sw_a#configure terminal–wg_sw_a(config)#•Interface configuration mode–wg_sw_a(config)#interface e0/1–wg_sw_a(config-if)#Configuring Switch Identification•Sets the local identity for the switchConfiguring the Switch IP Addresswg_sw_a(config)#ip address {ip address}{mask}Example:wg_sw_a(config)#ip address 10.5.5.11 255.255.255.0Configuring theSwitch Default Gatewaywg_sw_a(config)#ip default-gateway{ip address}Example:wg_sw_a(config)#ip default-gateway 172.20.137.1Showing Switch Initial Startup Statuswg_sw_a#show version•Displays the configuration of the system hardware, software version, names and sources of configuration files, and boot imageswg_sw_a#show running-configuration•Displays the switch’s current active configuration filewg_sw_a#show interfaces•Displays statistics for all interfaces configured on the switch wg_sw_a#show ip•Displays the IP address, subnet mask, and default gatewaySwitch show version Commandwg_sw_a#show versionCisco Catalyst 1900/2820 Enterprise Edition SoftwareVersion V8.01.01 written from 171.068.229.225Copyright (c) Cisco Systems, Inc. 1993-2001wg_sw_c uptime is 15day(s) 21hour(s) 53minute(s) 11second(s)cisco Catalyst 1900 (486sxl) processor with 2048K/1024K bytes of memory Hardware board revision is 5Upgrade Status: No upgrade currently in progress.Config File Status: No configuration upload/download is in progress27 Fixed Ethernet/IEEE 802.3 interface(s)Base Ethernet Address: 00-50-BD-73-E2-C0wg_sw_a#show running-configuration Building configuration...Current configuration:!hostname "wg_sw_c"!ip address 10.1.1.33 255.255.255.0ip default-gateway 10.3.3.3!interface Ethernet 0/1<text omitted>interface Ethernet 0/24!Interface Ethernet 0/25!interface FastEthernet 0/26!interface FastEthernet 0/27wg_sw_a#show running-configuration Building configuration...Current configuration:!hostname "wg_sw_c"!ip address 10.1.1.33 255.255.255.0ip default-gateway 10.3.3.3!interface Ethernet 0/1<text omitted>interface Ethernet 0/12!Interface Ethernet 0/25!interface FastEthernet 0/26!interface FastEthernet 0/27Catalyst 1924 SwitchCatalyst 1912 Switch Switch show running-configuration CommandSwitch show interfaces Commandwg_sw_a#show interfaces ethernet 0/1Ethernet 0/1 is EnabledHardware is Built-in 10Base-TAddress is 0050.BD73.E2C1MTU 1500 bytes, BW 10000 Kbits802.1d STP State: Forwarding Forward Transitions: 1 Port monitoring: DisabledUnknown unicast flooding: EnabledUnregistered multicast flooding: EnabledDescription:Duplex setting: Half duplexBack pressure: Disabled--More--Showing the Switch IP Addresswg_sw_c#show ipIP Address: 10.5.5.11Subnet Mask: 255.255.255.0Default Gateway: 10.5.5.3Management VLAN: 1Domain name:Name server 1: 0.0.0.0Name server 2: 0.0.0.0HTTP server : EnabledHTTP port : 80RIP : Enabledwg_sw_a#Summary•The startup of a Catalyst switch requires that you verify the physical installation, power up the switch, and view the Cisco IOS software output on the console.•The Catalyst switches have several status LEDs that are generally lit in green when the switch is functioningnormally but turn amber when there is a malfunction.•The Catalyst POST is executed only when the switch is powered up. The POST uses the switch port LEDs toindicate test progress and status.•During initial startup, if POST test failures are detected, they are reported to the console. If POST completessuccessfully, you can configure the switch.Summary (Cont.)•When you start any mode on a Catalyst switch, begin in user EXEC mode. To change modes, you must enter apassword.•The Catalyst switch uses Cisco IOS software with several command-line input help facilities, including context-sensitive help.•The Catalyst switch IOS software has the globalconfiguration mode and the interface configuration mode. •After logging in to a Catalyst switch, you can verify theswitch initial startup status using the switch statuscommands: show version, show running-configuration, and show interfaces.。

相关文档
最新文档