- •CCIE Security Written Exam Blueprint
- •General Networking Topics
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Networking Basics—The OSI Reference Model
- •Ethernet Overview
- •Internet Protocol
- •Variable-Length Subnet Masks
- •Classless Interdomain Routing
- •Transmission Control Protocol
- •TCP Services
- •Routing Protocols
- •ISDN
- •IP Multicast
- •Asynchronous Communications and Access Devices
- •Foundation Summary
- •Requirements for FastEther Channel
- •Scenario
- •Scenario 2-1: Routing IP on Cisco Routers
- •Scenario Answers
- •Scenario 2-1 Answers: Routing IP on Cisco Routers
- •Application Protocols
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Domain Name System
- •Trivial File Transfer Protocol
- •File Transfer Protocol
- •Hypertext Transfer Protocol
- •Secure Socket Layer
- •Simple Network Management Protocol
- •Simple Mail Transfer Protocol
- •Network Time Protocol
- •Secure Shell
- •Foundation Summary
- •Scenario
- •Scenario Answers
- •Scenario 3-1 Solutions
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Cisco Hardware
- •show and debug Commands
- •Password Recovery
- •Basic Security on Cisco Routers
- •IP Access Lists
- •Foundation Summary
- •Scenario
- •Scenario Answers
- •Security Protocols
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Authentication, Authorization, and Accounting (AAA)
- •Remote Authentication Dial-In User Service (RADIUS)
- •Kerberos
- •Virtual Private Dial-Up Networks (VPDN)
- •Encryption Technology Overview
- •Internet Key Exchange (IKE)
- •Foundation Summary
- •Scenario
- •Scenario 5-1: Configuring Cisco Routers for IPSec
- •Scenario Answers
- •Scenario 5-1 Solutions
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •UNIX
- •Microsoft NT Systems
- •Common Windows DOS Commands
- •Cisco Secure for Windows and UNIX
- •Cisco Secure Policy Manager
- •Cisco Secure Intrusion Detection System and Cisco Secure Scanner
- •Cisco Security Wheel
- •Foundation Summary
- •Scenarios
- •Scenario 6-1: NT File Permissions
- •Scenario 6-2: UNIX File Permissions
- •Scenario Answers
- •Scenario 6-1 Solution
- •Scenario 6-2 Solution
- •Security Technologies
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Advanced Security Concepts
- •Cisco Private Internet Exchange (PIX)
- •Cisco IOS Firewall Security Feature Set
- •Public Key Infrastructure
- •Virtual Private Networks
- •Foundation Summary
- •Scenario
- •Scenario Answer
- •Scenario 7-1 Solution
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Network Security Policies
- •Standards Bodies and Incident Response Teams
- •Vulnerabilities, Attacks, and Common Exploits
- •Intrusion Detection System
- •Protecting Cisco IOS from Intrusion
- •Foundation Summary
- •Scenario
- •Scenario 8-1: Defining IOS Commands to View DoS Attacks in Real Time
- •Scenario Answer
- •Scenario 8-1 Solution
Scenario 2-1: Routing IP on Cisco Routers 99
Scenario
Scenario 2-1: Routing IP on Cisco Routers
Figure 2-21 displays a network with one Cisco router and two directly attached Ethernet interfaces. Use Figure 2-21 to answer the following questions.
Figure 2-21 Scenario Diagram
E0 IP address 1.1.1.100 |
|
|
E1 IP address 2.1.1.100 |
|||||||||||||||
MAC address 3333.3333.3333 |
|
|
MAC address 4444.4444.4444 |
|||||||||||||||
|
|
|
|
|
|
|
|
|
R1 |
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Ethernet 0 |
|
|
|
Ethernet 1 |
|||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
PC1 |
|
|
|
|
|
|
|
|
|
|
PC2 |
|||||||
|
|
|
|
|
|
|
|
|
|
|
|
|||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
IP address 1.1.1.1 |
|
|
IP address 2.1.1.1 |
|||||||||||||||
MAC address 1111.1111.1111 |
|
|
MAC address 2222.2222.2222 |
1In Figure 2-21, PC1 cannot communicate with PC2. What is the likely cause of the problem assuming that the router is configured correctly?
a.Router R1 requires a routing protocol to route packets from Ethernet0 to Ethernet1.
b.There is a problem with the IP address configuration on Router R1.
c.The gateway address on PC1 is wrong.
d.The gateway address on the router is wrong.
2In Figure 2-21, what will be the ping response display when an exec user on Router R1 pings PC1’s IP address for the first time? Assume that all configurations are correct.
a.!!!!!
b.!!!!.
c. .....
d. .!!!!
e. .!!!!!
100 Chapter 2: General Networking Topics
3 What IOS command was used to display the following output taken from Router R1?
Protocol |
Address |
Age (min) |
Hardware Addr |
Type |
Interface |
Internet |
1.1.1.100 |
- |
333.3333.3333 |
ARPA |
Ethernet0 |
Internet |
2.1.1.100 |
- |
4444.4444.4444 |
ARPA |
Ethernet1 |
Internet |
1.1.1.1 |
10 |
1111.1111.1111 |
ARPA |
Ethernet0 |
Internet |
2.1.1.1 |
10 |
2222.2222.2222 |
ARPA |
Ethernet1 |
a.show ip arpa
b.show ip arp
c.show interface ethernet0
d.show interface ethernet1
Scenario 2-1 Answers: Routing IP on Cisco Routers 101
Scenario Answers
Scenario 2-1 Answers: Routing IP on Cisco Routers
1Answer: c. Cisco IOS routers will route between directly connected interfaces and, because PC1 cannot ping PC2 on another subnet, the PC1 gateway address must not be configured correctly.
2Answer: d. The first request will fail because of the ARP broadcast. The subsequent pings (five in total: one for an ARP request and four successful replies) will reply successfully.
3Answer: b. show ip arp displays the correct ARP address table for the devices in Figure 2-21.
Exam Topics in this Chapter
14Domain Name System (DNS)
15Trivial File Transfer Protocol (TFTP)
16File Transfer Protocol (FTP)
17Hypertext Transfer Protocol (HTTP)
18Secure Socket Layer (SSL)
19Simple Mail Transfer Protocol (SMTP)
20Network Time Protocol (NTP)
21Secure Shell (SSH)
22Lightweight Directory Access Protocol (LDAP)
23Active Directory