Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Cisco Press CCNA ICND 2004 - Cisco Press.pdf
Скачиваний:
120
Добавлен:
24.05.2014
Размер:
13.19 Mб
Скачать

Chapter 8 527

19.What command switches a router from classless routing to classful routing?

Answer: The no ip classless global configuration command disables classless routing, thereby enabling classful routing.

Chapter 8

“Do I Know This Already?” Quiz

1.What does CIDR stand for?

Answer: F

2.Which of the following summarized subnets are valid routes according to the main purpose of CIDR?

Answer: D. CIDR’s original intent was to allow the summarization of multiple Class A, B, and C networks to reduce the size of Internet routing tables. Only answer D summarizes multiple networks.

3.Which of the following are not private addresses according to RFC 1918?

Answer: B, E. RFC 1918 identifies private network numbers. It includes Class A network 10.0.0.0, Class B networks 172.16.0.0 through 172.31.0.0, and 192.168.0.0 through 192.168.255.0.

4.With static NAT, performing translation for inside addresses only, what causes NAT table entries to be created?

Answer: C. With static NAT, the entries are statically configured. Because the question mentions translation for inside addresses, the inside keyword is needed on the command.

5.With dynamic NAT, performing translation for inside addresses only, what causes NAT table entries to be created?

Answer: A. With dynamic NAT, the entries are created as a result of the first packet flow from the inside network.

6.Which of the following commands identifies the inside local IP addresses when using dynamic NAT to translate only the source addresses of packets from a private network number?

Answer: A. The list 1 parameter references an IP ACL, which matches packets, identifying the inside local addresses.

528Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions

7.Which of the following commands identifies the outside local IP addresses when using dynamic NAT to translate only the source addresses of packets from a private network number?

Answer: E. The outside local IP address is not changed when only the source address of packets from a private network are translated.

8.Imagine that an Ethernet interface on a router has already been configured with IP address 10.1.1.1, mask 255.255.255.0. Which of the following commands adds a secondary IP address to the interface?

Answer: G. The ip address command is used, but with the secondary keyword at the end. Without the secondary keyword, the IP address would replace the original IP address.

9.Which of the following file transfer protocols, defined in various Internet RFCs, provides the most features?

Answer: A. Only FTP and TFTP are file transfer protocols defined in RFCs. FTP is easily the more feature-filled protocol, as compared to TFTP.

10.Imagine that Fred is a PC attached to an Ethernet, and that its default router, R1, is attached to the same Ethernet. R1 has a point-to-point serial link to R2, which has an Ethernet attached, to which PC Barney is attached. The MTU of each Ethernet has the default value. What must be true for R1 to fragment packets sent from Fred to Barney?

Answer: A. Ethernet interfaces default to an MTU of 1500. So the serial link would need an MTU lower than 1500 to cause fragmentation. Otherwise, R1 would never receive an IP packet from Fred that needed to be fragmented.

11.Router1 has a FastEthernet interface 0/0 with IP address 10.1.1.1. The interface is connected to a switch. This connection is then migrated to ISL. Which of the following commands could be useful to configure Router1 for ISL?

Answer: A, G

12.What is the meaning of “.” in the output of a ping command?

Answer: C. The “.” implies that the ping command sent the request, and waited, but did not receive a reply.

Chapter 8 529

13.What is the meaning of “U” in the output of a ping command?

Answer: E. The “U” designation implies that the ping command received an ICMP unreachable message, which might mean that the router had no route to the subnet to which the packet was sent.

14.What ICMP message code(s) does the trace command rely on?

Answer: C. The trace command sends packets with TTL = 1, and then TTL = 2, and so on. By receiving TTL Exceeded messages from the various routers in the route, the trace command can identify the routers.

Q&A

1.Define private addressing as defined in RFC 1918.

Answer: Some hosts will never need to communicate with other hosts across the Internet. For such hosts, assigning IP addresses from registered networks wastes IP addresses. To conserve IP addresses, a set of network numbers, called private addresses, has been reserved and can be used in these cases to help conserve IP addresses for use over the Internet.

2.List the range of private networks defined in RFC 1918.

Answer: Class A network 10.0.0.0, Class B networks 172.16.0.0 to 172.31.0.0, and Class C networks 192.168.0.0 to 192.168.255.0.

3.Does CIDR affect the size of Internet routing tables? If so, what does it do to those routing tables?

Answer: CIDR allows ISPs to summarize multiple Class A, B, or C networks, typically Class C networks, into summary routes. It shortens the length of the IP routing table, improving Internet routing performance.

4.Define NAT and explain the basics of its operation.

Answer: Network Address Translation is a mechanism for allowing hosts with private addresses or addresses that conflict with IP addresses from a registered network to communicate with hosts over the Internet. The basic operation involves the NAT router’s changing the IP addresses in packets to and from these hosts so that only legitimately registered IP addresses are used in flows through the Internet.

530 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions

5.Define the term inside local address in relation to NAT. Use Figure A-2 to describe the answer.

Figure A-2 Network for Use in Answering NAT Questions

10.1.1.1

200.1.1.1

Server

 

 

Internet

NAT 170.1.1.1

10.1.1.2

Answer: The inside network is the enterprise network on the left in Figure A-2. The private IP addresses reside in this network. Inside local refers to the IP address actually assigned to the computer. For instance, 10.1.1.1 is an inside local address in this figure.

6.Define the term inside global address in relation to NAT. Use Figure A-2 to describe the answer.

Answer: The inside network is the enterprise network on the left in Figure A-2. The inside global address is the address in the public Internet that represents the inside local address. 200.1.1.0 would be a likely candidate for an inside global IP address in this example.

7.Create a configuration for NAT overload to a single IP address for the router shown in Figure A-2.

Answer:

interface Ethernet0/0

ip address 10.1.1.3 255.255.255.0 ip nat inside

!

interface Serial0/0

ip address 200.1.1.1 255.255.255.252 ip nat outside

!

ip nat inside source list 1 interface Serial0/0 overload

!

access-list 1 permit 10.1.1.2 access-list 1 permit 10.1.1.1

Chapter 8 531

8.Create a configuration for static NAT, mapping host 10.1.1.1 to 200.1.1.11, for the router shown in Figure A-2.

Answer:

interface Ethernet0/0

ip address 10.1.1.3 255.255.255.0 ip nat inside

!

interface Serial0/0

ip address 200.1.1.1 255.255.255.252 ip nat outside

!

ip nat inside source static 10.1.1.1 200.1.1.11

9.Which requires more lines of source code, FTP or TFTP? Explain your answer.

Answer: FTP requires more code. TFTP was designed to be simple (that is, trivial). The small amount of memory needed to load its code is one of its advantages. FTP is much more robust, with many more features and code.

10.Does FTP or TFTP perform error recovery? If so, describe the basics of how this occurs.

Answer: Both FTP and TFTP perform error recovery. FTP relies on TCP, whereas TFTP performs application layer recovery one block of data at a time.

11.Describe the process used by IP routers to perform fragmentation and reassembly of packets.

Answer: When a packet must be forwarded, but the packet is larger than the maximum transmission unit (MTU) size for the outgoing interface, the router fragments the packet as long as the Don’t Fragment bit is not set in the packet header. No IP router reassembles the fragments; fragments are reassembled at the final destination host.

12.How many Class B-style networks are reserved by RFC 1918 private addressing?

Answer: Sixteen Class B networks are reserved for use as private networks in RFC 1918—networks 172.16.0.0 to 172.31.0.0.

13.Describe why ARP requests use an Ethernet broadcast address instead of an Ethernet unicast address.

Answer: Hosts use ARP when they need to learn the MAC address of another IP host. Because the host does not know the MAC address, it would be impossible to use an Ethernet unicast, because the host would not know the right MAC address to put in the destination address field in the Ethernet frame.