K. A CP-LP approach to network management in OSPF routing

合集下载

Meraki MS390 交换机数据手册说明书

Meraki MS390 交换机数据手册说明书

MS390 DatasheetOverviewThe Meraki MS390addresses the most demanding enterprise applications by combining the simplicity of the Meraki dashboard with powerful switching hardware. To satisfy high-bandwidth applications and the deployment of high-speed802.11ax/wifi-6access points,the MS390provides multigigabit ports,480G stacking, and modular10/40G uplinks.The MS390delivers resiliency with fast stack convergence and StackPower.The MS390provides Adaptive Policy using an over-the-wire tag which segments traffic into security groups to deliver scalable security.The MS390is integrated under the Meraki dashboard to provide a simply powerful solution to the most demanding wired access applications.Adaptive Policy provides simple&scalable security policies to segment traffic using Security Groups.Security Groups are created in the dashboard using natural language such as“IOT device”&“Guest.”The security policy intent(e.g.,Permit or Deny)is then simply provisioned between Security Groups which results in the segmentation of each group’s traffic.By making security policy management intuitive and scalable relative to legacy IP-address based Access Control Lists, Adaptive Policy empowers operators to confidently secure their network traffic independent of future network changes.By pooling&distributing power across MS390s using a series of StackPower cables,StackPower provides simple and resilient power distribution across the stack.ModelsNumber of Ports Model DescriptionMS390-24-HW24-port GbE switchMS390-24P-HW24-port GbE PoE+ switch24 Ports MS390-24U-HW24-port GbE UPoE switch MS390-24UX-HW24-port mGbE UPoE switch48 Ports MS390-48-HW48-port GbE switchMS390-48P-HW48-port GbE PoE+ switchMS390-48U-HW48-port GbE UPoE switchMS390-48UX-HW36-port 2.5GbE+ 12-port mGbE UPoE switch MS390-48UX2-HW48-port 5GbE UPOE switchFeaturesCategory FeaturesHighlights •Layer-3•40G or 10G modular uplink options on all models •mGig support•Dual Dedicated 120G Hardware Stacking Ports•PoE+ and UPoE Support•StackPower in a ring topology supporting upto 4 switchesManagement •Managed via Cisco Meraki Dashboard•Zero-touch remote provisioning (no staging needed)•Basic configuration capability via local management page•Detailed historical per-port and per-client usage statistics•Operating System, device, and hostname fingerprinting•Automatic firmware upgrades with scheduling control•SNMP and SYSLOG support for integration with other network management solutions*Remote Diagnostics •Email, SMS and Mobile push notification alerts1•Ping, traceroute, cable testing, and link failure detection with alerting •Remote packet capture•Dynamic and interactive network discovery and topology •Combined event and configuration change logs with instant searchStacking •Physically stack up to 8 switches with 480 Gbps of stacking bandwidth on all models•Virtual stacking supports thousands of switch ports in a single logical stack for unified management, monitoring, and configuration•Faster convergence•StackPower in a ring topology supporting upto 4 switchesEthernet Switching Capabilities •802.1p Quality of Service, 8 queues (w/ 6 configurable for DSCP-to-CoS mapping)•802.1Q VLAN and trunking support for up to 4,094 VLANs (1000 active VLANs with STP enabled)•Single Instance of 802.1s Multiple Spanning Tree Protocol (interoperable with RSTP, STP, PVST, RPVST)•STP Enhancements: BPDU guard, Root guard, Loop guard, UDLD•Broadcast storm control•802.1ab Link Layer Discovery Protocol (LLDP) and Cisco Discovery Protocol (CDP)•802.3ad Link aggregation with up to 8 ports per aggregate, Multichassis aggregates supported on stacked switches •Port mirroring•IGMP snooping for multicast filtering•MAC Forwarding Entries: 32KLayer 3•Static routing, OSPFv2•Multicast routing (PIM-ASM)•Warm Spare (VRRP) *•DHCP Server, DHCP RelaySecurity •Integrated multi-factor authentication for Dashboard management•Role-based access control (RBAC) with granular device and configuration control •Corporate wide password policy enforcement•IEEE 802.1X RADIUS and MAB, hybrid authentication and RADIUS server testing •Single-Host/Multi-Domain/Multi-Host/Multi Authentication•Port security: Sticky MAC, MAC whitelisting *•DHCP snooping, detection and blocking, Dynamic ARP Inspection•IPv4 and IPv6 ACLs•Secure Connect *•Adaptive Policy *MS390 LicensingMS390license structure includes two feature tiers:Enterprise and Advanced. The MS390 also introduces a new and simpler license to hardware mapping, specifically 24-port or 48-port licenses. As with all MS, every MS390 license is available in 1, 3, 5, 7, and 10 year terms.MS390 License Structure24-Port Model48-port ModelAdvanced Features LIC-MS390-24A LIC-MS390-48A* Available in a future software releaseEnterprise Features LIC-MS390-24E LIC-MS390-48EThe features available with advanced licensing are:•Adaptive policy *•Greater than 1,000 routes for OSPFContext and Comparisons24 Port Models48 Port ModelsDescriptionMS350-24XMS355-24X2MS390-24UXMS350-48FPMS355-48X2MS390-48UX21GbE RJ4516--4824-mGbE RJ4582424-244810GbE SFP+44Modular 44Modular 40GbE QSFP+n/a 2Modular -2Modular Hardware Stack Port 2x 40G 2x 100G2x 120G2x 40G 2x 100G2x 120GManagement Interface 111111Hot Swap PS Yes, Dual Yes, Dual Yes, Dual Yes, Dual Yes, Dual Yes, Dual Hot Swap Fans Yes, 2x Yes, 3x Yes, 3x Yes, 2x Yes, 3x Yes, 3x Layer 3 Routing Yes Yes Yes YesYes Yes UPoE CapableYes, 740W Yes, 740W Yes, 560W No, 740W(only PoE/PoE+)Yes, 740W Yes, 645W Max Switching Capacity 176 Gbps 640 Gbps 640 Gbps 176 Gbps 688 Gbps 640 Gbp Max Stacking Bandwidth160 Gbps400 Gbps480 Gbps160 Gbps400 Gbps480 Gbps* Available in a future software releaseIn the Co-term licensing model (most existing Organizations), an Organization must either have all MS390 Enterprise or all MS390 Advanced licenses - they cannot be mixed. In the Per-device licensing model, a mix of Enterprise and Advanced can be added to a single Organization, but certain features may require all devices in a Network to have Advanced licenses, e.g. Adaptive Policy.For more information on licensing, refer to Meraki Licensing Models article .Technical Breakdown Interfaces SpecificationsModel InterfacesUplink10/40GbE(SFP+, QSFP+)120G HardwareStack PortDedicatedManagementInterfacePoE/UPoECapabilitiesMS390-24-HW24 x1GbE RJ45Modular21n/a MS390-24P-HW24 x1GbE RJ45Modular21PoE MS390-24U-HW24 x1GbE RJ45Modular21UPoEMS390-24UX-HW 24 x 100M/1G/2.5G/5G/10G RJ45Modular21UPoEMS390-48-HW48 x1GbE RJ45Modular21n/a MS390-48P-HW48 x1GbE RJ45Modular21PoE MS390-48U-HW48 x1GbE RJ45Modular21UPoEMS390-48UX-HW36 x100M/1G/2.5G +12 x100M/1G/2.5G/5G/10GModular21UPoEMS390-48UX2-HW48 x100M/1G/2.5G/5G Modular21UPoE Physical SpecificationsModelDimensions(h x w x d)Weight Mount Type Hot Swap Fans Operating Temperature HumidityAll models are available with modular uplinks that have been listed under the Accessories list. For supported SFP modules please refer the SFP Datasheet.Cabling Best Practices for Multi-Gigabit operations:While Category-5e cables can support multigigabit data rates upto 2.5/5 Gbps, external factors such as noise, alien crosstalk coupled with longer cable/cable bundle lengths can impede reliable link operation. Noise can originate from cable bundling, RFI, cable movement, lightning, power surges and other transient event. It is recommended to use Category-6a cabling for reliable multigigabit operations as it mitigates alien crosstalk by design.W/ Default Power Supply1.73” x 17.5” x17.7”MS390-24-HW16.03 lb (7.27 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90%(4.4 x 44.5 x 44.9cm)1.73” x 17.5” x17.7”16.33 lb (7.4 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90% MS390-24P-HW(4.4 x 44.5 x 44.9cm)1.73” x 17.5” x 19.2”16.63 lb (7.54 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90% MS390-24U-HW(4.4 x 44.5 x 44.8cm)1.73” x 17.5” x 20.2”MS390-24UX-HW18.18 lb (8.25 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90%(4.4 x 44.5 x 51.3cm)1.73” x 17.5” x17.7”16.43 lb (7.45 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90% MS390-48-HW(4.4 x 44.5 x 44.9cm)1.73” x 17.5” x17.7”16.73 lb (7.59 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90% MS390-48P-HW(4.4 x 44.5 x 44.9cm)1.73” x 17.5” x 19.2”MS390-48U-HW17.03 lb (7.72 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90%(4.4 x 44.5 x 48.8cm)1.73” x 17.5” x 22.2”20.50 lb (9.34 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90% MS390-48UX-HW(4.4 x 44.5 x 56.4cm)1.73” x 17.5” x 22.2”20.05 lb (9.09 kg)1U Rack Mount Yes, 3x-5°C to 45°C 5 to 90% MS390-48UX2-HW(4.4 x 44.5 x 56.4cm)PerformanceSwitching Capacity Stacking Bandwidth Forwarding rateModelMS390-24-HW208 Gbps480 Gbps154.76 MppsMS390-24P-HW208 Gbps480 Gbps154.76 Mpps MS390-24U-HW208 Gbps480 Gbps154.76 Mpps MS390-24UX-HW640 Gbps480 Gbps476.19 Mpps MS390-48-HW256 Gbps480 Gbps190.48 Mpps MS390-48P-HW256 Gbps480 Gbps190.48 Mpps MS390-48U-HW256 Gbps480 Gbps190.48 Mpps MS390-48UX-HW580 Gbps480 Gbps431.54 Mpps MS390-48UX2-HW640 Gbps480 Gbps476.19 MppsPower Options and SpecificationsModel Default PowerSupplyHot Swap PowerSupplyAvailable PoE W/Primary PSAvailable PoE W/ SecondaryPS***Power Load(idle/max)MS390-24-HWMA-PWR-350WAC**Yes, Dual n/a n/a79.2 / 99 WMS390-24P-HWMA-PWR-715WAC**Yes, Dual445W720W84.1 / 554.4WMS390-24U-HWMA-PWR-1100WACYes, Dual830W1440W85.4 / 990.3WMS390-24UX-HWMA-PWR-1100WACYes, Dual560W1440W162.7 / 809.9WMS390-48-HWMA-PWR-350WAC**Yes, Dual n/a n/a83.9 / 109.9WMS390-48P-HWMA-PWR-715WAC**Yes, Dual437W1152W92.6 / 555 WMS390-48U-HWMA-PWR-1100WACYes, Dual822W1800W145 / 844.9WMS390-48UX-HWMA-PWR-1100WACYes, Dual490W1590W218.5 / 785.5WMS390-48UX2-HWMA-PWR-1100WACYes, Dual645W1745W157.9 / 843.8W** Upgrade options to715W and 1100W PSU are available.*** The PoE values are provided considering the secondary PS to be the default power supply of the respective model.What's includedModel Package ContentsMS390-24-HW 1 x Power Supply (MA-PWR-350WAC), Rack mount brackets and screw kit,3 x Pre-Installed Fans, Cable guide MS390-24P-HW 1 x Power Supply (MA-PWR-715WAC), Rack mount brackets and screw kit, 3 x Pre-Installed Fans, Cable guide MS390-24U-HW 1 x Power Supply (MA-PWR-1100WAC), Rack mount brackets and screw kit, 3 x Pre-Installed Fans, Cable guide MS390-24UX-HW 1 x Power Supply (MA-PWR-1100WAC), Rack mount brackets and screw kit, 3 x Pre-Installed Fans, Cable guide MS390-48-HW 1 x Power Supply (MA-PWR-350WAC), Rack mount brackets and screw kit, 3 x Pre-Installed Fans, Cable guide MS390-48P-HW 1 x Power Supply (MA-PWR-715WAC), Rack mount brackets and screw kit, 3 x Pre-Installed Fans, Cable guide MS390-48U-HW 1 x Power Supply (MA-PWR-1100WAC), Rack mount brackets and screw kit, 3 x Pre-Installed Fans, Cable guide MS390-48UX-HW 1 x Power Supply (MA-PWR-1100WAC), Rack mount brackets and screw kit, 3 x Pre-Installed Fans, Cable guide MS390-48UX2-HW 1 x Power Supply (MA-PWR-1100WAC), Rack mount brackets and screw kit, 3 x Pre-Installed Fans, Cable guideOptional AccessoriesAccessory Description Supported ModelsMA-PWR-350WAC350W AC Power Supply MS390-24-HW, MS390-48-HWMA-PWR-715WAC715W AC Power Supply All ModelsMA-PWR-1100WAC1100W AC Power Supply All ModelsMA-MOD-2X40G 2 x 40G Uplink Module All ModelsMA-MOD-4X10G 4 x 10G Uplink Module All ModelsMA-MOD-8X10G8 x 10G Uplink Module All ModelsMA-CBL-120G-50CM Meraki 120G Stacking Cable, 0.5Meter All ModelsMA-CBL-120G-1M Meraki 120G Stacking Cable, 1Meter All ModelsMA-CBL-120G-3M Meraki 120G Stacking Cable, 3Meter All ModelsMA-CBL-SPWR-30CM Meraki MS390 30CM StackPower Cable All ModelsMA-CBL-SPWR-150CM Meraki MS390 150CM StackPower Cable All Models MA-FAN-16K2System Fan All Models MA-RCKMNT Meraki MS390 Rack Mount Kit All ModelsRegulations and ComplianceElectromagnetic CompatibilityCertifications FCC Part 15 (CFR 47) Class A, ICES-003 Class A, CISPR22 Class A,CNS13438, EN 300 386 V1.6.1,EN 55022 Class A, EN 61000-3-2,EN61000-3-3, KN 32, TCVN 7189 Class A, EN 55032 , CISPR 32 Class A, V-2/2015.04, V-3/2015.04, VCCI-CISPR 32 Class A, CISPR24, EN 300 386 V1.6.1, EN 55024, KN35, TCVN 7317SafetyCAN/CSA-C22.2 No. 60950-1, UL 60950-1, EN 60950-1, IEC 60950-1, AS/NZS 60950.1 Environmental Reduction of Hazardous Substances (RoHS)Warranty Full lifetime hardware warranty with next-day advanced replacement included MTBF RatingModelMTBF at 25°CMS390-24-HW314,790MS390-24P-HW299,000MS390-24U-HW238,410MS390-24UX-HW214,760MS390-48-HW305,870MS390-48P-HW277,770MS390-48U-HW227,410MS390-48UX-HW202,160MS390-48UX2-HW198,647Installation GuideFor instructions on how to install and configure the MS390 series switch please refer the MS390 Series Installation Guide。

HCDP英文版多选题

HCDP英文版多选题

多选题1.Which of the following are characteristics of a high availability network?A Faults seldom occur.B Services can be quickly restored when a fault occurs.C Faults never occur.D Services can only be manually restored when a fault occurs.AB2.Which of the following statements about BFD control packets are true?A BFD control packet is encapsulated in a UDP packet for transmission.B BFD detection is not available in VRP 5.7C Echo packets use UDP destination port number 3784.D Echo packets use UDP destination port number 3785.ABC3.Which of the following statements about the BFD asynchronous mode are true?A The local system regularly send BFD control packets,and the remote system detects theBFD control packets sent from the local system.B The local system detects the BFD control packets sent by itself.C If one system does not receive any BFD packets from its peer within a detection period,itadvertises a session down event.D Each system confirms its connections with other systems in a particular method.After aBFD seeion is set up, BFD control packets are no longer sent .AC4.Which of the following statements about the BFD demand mode are true?A The local system regularly send BFD control packets,and the remote system detects theBFD control packets sent from the local systemB The local system detects the BFD control packets sent by itself.C If one system does not receive any BFD packets from its peer within a detection period,itadvertises a session down event.D Each system confirms its connections with other systems in a particular method.After aBFD seeion is set up, BFD control packets are no longer sent .BD5.Which of the following statements about the BFD echo function are true?A The local system sends a series of BFD Echo packets,and the remote system loops thepackets back through its forwarding channel.B If the local system does not receive several consecutive Echo packets,it advertises asession down event.C The echo function can work together with the asynchronous or demand detection mode.D The echo function can take the place of fault detection by sending BFD control packets. ABCD6.Which of the following statements about a smart link group are true?A Smart link group consists of a maximum of two interfaces,where there are twointerfaces,one is an active interface,and the other a standby interface.B Of the two interface in a smart link group,one is active,and the other is standby.C when an active interface goes down,the Smart link group automatically blocks it andchanges the status of the standby interface to active.D when an active interface recovers,the standby interface is blocked and traffic is switchedback to the active interface.ABC7.Which of the following statements about Flush packets in a smart link group are true?A A smart link group sends flush packets to instruct other devices to update the addresstable.B Flush packets use IEEE 802.3 encapsulation.C The destination MAC address of Fulsh packets is an unknown unicast address,which isused to distinguish protocols.D The destination MAC address of flush packets is a special multicast address,which is usedto distinguish protocols.ABC8.When links are switched in a smart link group, which of the following mechanisms can beused to refresh MAC and ARP entries?A MAC and ARP entries are refreshed automatically with respect to traffic.B The smart link group uses a new link to send flush packets.C MAC entries are refreshed after the aging time expires.D ARP entries are refreshed after the aging time expires.ABC9.Which of the following statements about link aggregation are true?A link aggregation binds a group of physical interfaces together as a logical interface toincrease the bandwidth and reliability.B Link aggregation complies with IEEE 802.3ah.C The logical link formed by bundling multiple physical links together is called a linkaggregation group (LAG) or a trunk.D Active and inactive interfaces exist in link aggregation,Active interfaces forward data,whereas inactive interfaces do not.ABCD10.Which of the following statements about link aggregation are true?A Link aggregation can be performed in manual load balancing or LACP mode.in manualloading balancing mode,LACP is disabled:in LACP mode,LACP is enabled.B In manual load balancing mode,all active member interfaces forward data and performload balancing.C In static LACP mode,the creation of the Eth-Trunk and the addition of member interfacesto the Eth-Trunk are perfaormed pared with link aggregation in manual load balancing mode,active interfaces in static LACP mode are seleted by sending LACP data units(LACPDUs).D Indynamic LACP mode,the creation of the Eth-Trunk,the addition of memberinterfaces,and the selection of active interfaces are performed based on LACP negotiation. ABCD11.Which of the following statements about LACP are true?A It complies with IEEE 802.3ad.B A device enabled with LACP exchanges link Aggregation Control protocol data Units(LACPDUs) with its peer.C Devices at both ends determine the active interface according to the interface priority ofthe active device.ABC12.Which of the following reliability designs are related to routers?A Reliability design of the system and hardwareB Reliability design of the softwareC Reliability test authenticationD Reliability design of the IP networkABCD13.Which of the following can speed up OSPF fast convergence?A Configuring dynamic BFD for OSPFB Adjusting the interval at which OSPF calculation is performedC Configuring the interval at which an LSA are retransmittedD Configuring the maximum number of external LSAs in the LSDBAB14.When the GR restarter performs the active/standby switchover, the neighbor performs whichof the following perations when detecting that a TCP disconnection?A Keeping the routing tables of various address families advertised by the GR Restarterduring negotiation,marking entries in these tables with stale tags,and starting a stale timer.B Starting a restart timer.C Clearing all routing entries and forwarding entries related to the GR restarter if the GRrestarter fails to re-establish the BGP connection with the neighbor after the restart timer expires.D Remaining the neighbor relationship unchanged.15.Which of the following statements about the reliability requirement level are true?A Faults seldom occur in the system software or hardware.B System functions are not affected by faults.C System functions are affected by faults but can rapidly recover.D System functions can be ensured by using redundancy design,switchover policy,and highsuccess rate in switchover.ABCD16.Which of the following are end-to-end link protection modes?A 1:1B M:NC N:1D 1+1ABD17.On a BGP/MPLS IPv4 VPN,OSPF,LDP,and static routes are configured.which of the followingprotocols need to be enabled with GR to achieve NSF on PEs?A OSPFB MPLS LDPC BGPD Static routesABC18.Which of the following statements about BFD are true?A It cannot be used to detect MPLS networks.B It provides low-load and short-duration detection for paths between adjacent forwardingengines.C It provides a unified mechanism for detecting all types of media and BFD-supportingprotocols.D It is a bidirectional detection mechanism.BCD19.Which of the following statements about the setup of a BFD session are true?A A BFD session can be set up in either static or dynamic mode.B A static BFD session is set up by manually configuring BFD session parameters anddelivering requests for setting up a BFD session. BFD session parameters include the local and remote discriminators.C A dynamic BFD session is set up by dynamically allocating local discriminators.D Static and dynamic BFD session are not differentiated.ABC20.Which of the following statements are correct regarding OSPF Router LSA?A Every router running OSPF must generate Router LSA.B In broadcast and NBMA network,only DROther generates Router LSA.C Router LSA describes link states of the router in area.D Router LSA is flooded in the whole AS.AC21.Which of the following statements are correct regarding Network LSA in OSPF network?A Network LSA is generated by ABR.B only the router which connects NBMA or Broadcast Network may generate network LSA.C DR uses network LSA to describe routers that have established adjacency relation with itin the network.D Network LSA is flooded in the whole AS.BC22.Which type of LSA is only used to calculate external route?A Type 1B Type 2C Type 3D Type 4E Type 5DE23.Which of the following are OSPF packet type?A LSAB LS requestC LSPD LS UpdateE LS ackBDE24.Which of the following elements together uniquely identify a LSA?A LS typeB Link state IDC Advertising RouterD LS Sequence numberABC25.Which of the following statements are correct regarding how OSPF detects old and duplicateLSAs?A The smaller the sequence number,the more recent the LSA,B The smaller the LS age,the more recent the LSA.C When router generates a new LSA at the first time,it will use 0x80000001 as thesequence number.D An LSA can be flushed from routing domain by setting its LSA age to Maxage.BCD26.Which of the following statements are correct regarding intra-area route calculation of OSPF?A Every OSPF router only uses one Router LSA to describe local active link state for onearea.B Every OSPF uses more than one Router LSA to describe local active link state for one area.C One Router LSA Only describes one linkD One Router LSA describes more than one linkAD27.In OSPF protocol,which of the following elements are used to describe one link?A Link IDB DataC TypeD MetricABCD28.In OSPF protocol,which of the following elements are used by network LSA to describebroadcast network segment or NBMA network segment?A LINK IDB Net maskC Attached Router listD MetricABC29.Which of the connection types that Router LSA can describe?A Point-to-pointB StubC transitD Virtual linkABCD30.In OSPF, which of the following statements are incorrect regarding Router LSA generated byRouter A?A In point-to-point link type, Data is set to the interface IP address of RouterA.B In TransNet link type,Data is set to the interface IP address of RouterA.C In StubNet link type,Data is set to the interface IP address of RouterA.D In Virtual link type,Data is set to the Router ID of RouterA.CD31.In OSPF protocol,which of the following elements are used by network LSA to describebroadcast network segment or NBMA network segment?A Link IDB Net maskC Attached Router listD MetricABC32.Which of the connection types that Router LSA can describe?A Point-to-pointB StubC TransitD Virtual linkABCD33.In OSPF area,RTA and RTB interconnect through FE interface.which of the followingcommands can be used to configure the link cost between RTA and RTB as 10?A Use commed ospf cost 10 on two routersB Use commed ospf cost 5 on two routersC Use commed bandwidth-reference 500 on two routers to change bandwidth-referencevalueD use command bandwidth-reference 1000 on two routers to change bandwidth-reference AD34.In OSPF protocol,which of the following statements are incorrect regarding link ID of RouterLSA?A in point-to-point link type,link ID is the neighbor’s interface IP address.B In TransNet link type,link ID is the network address of TransNet network segment.C In StubNet link type,link ID is the network address of Stub network.D In virtual link typemlink ID is the neighbor’s Router ID of virtual link.AB35.Which of the following statements are correct regarding how OSPF detects old and duplicateLSAs?A The smaller the sequence number,the more recent the LSA.B The smaller the LS age,the more recent the LSA.C When router generates a new LSA at the first time.it will use 0x80000001 as thesequence number.D An LSA can be flushed from routing domain by setting its LSA age to Maxage.BCD36.OSPF uses SPF algorithm to calculate SPF tree according to topology.which of the followingstatements are correct regarding SPF tree node?A The node on SPF tree indicates router and port.B There are two types of SPF tree node; Transit node and Stub node.C The router node on SPF tree is one type of Stub nodes.D The router node on SPF tree is one type of Transit nodes.BD37.What kind of the BGP attributes does AS-Path attribute belong to ?A MandatoryB TransitiveC OptionalD Non-transitiveAB38.Which of the following statements are correct regarding BGP attribute?A Till now,there are 16 BGP attributesB BGP attribute can be extended to 256 typesC Well-know discretionary attribute may not be included in each BGP update message,suchas Origin attributeD AS_PATH is an Optional Transitive attributeAB39.Which of the following statements belong to BGP COMMUNTY attribute?A NO_EXPORTB NO_ADVIERTISEC LOCAL_EXPORT_SUBCONFEDD NO_BROADCASTABC40.Which of the BGP attributes are Well-known mandatory attributes?A ORIGINB AS_PATHC NEXT_HOPD MEDE LOCAL_PREFF COMMUNITYABC41.Which of the attributes must exist in the BGP Update messages?A LOCAL_PREFB NEXT-HOPC ORIGIND AS_PATHBCD42.Which of the attributes may affect BGP Route Selection?A NEXT_HOPB AS_PATHC LOCAL_PREFD CLUSTER_IDABCD43.Which of the following can be used for BGP route selection?A ACLB IP-PREFIXC AS-PATH-FILTERD COMMUNITY-FILTERABCD44.Which of the following statements about comparison between ACL and IP-PREFIX are true?A Both ACL and IP-PREFIX can be used for route filteringB Both ACL and IP-PREFIX can be used for data packet filteringC ACL can be used for data packet filtering and route filtering,but IP-PREFIX can only beused for route filteringD IP-PREFIX can be used for data packet filtering and route filtering,but ACL can only beused for route filteringAC45.Which of the following statements about ACL type are true?A ACL consists of basic ACL,advanced ACL and interface-based ACLB ACL ranging from 2000 to 2999 belongs to advanced ACLC ACL ranging from 3000 to 3999 belongs to advanced ACLD Advanced ACL can be used to match either destination address or source addressACD46.Which of the following can only be used for BGP route selection?A ACLB IP-PREFIXC AS-PATH-FILTERD COMMUNITY-FILTERCD47.Which of the following statements about VLSM characteristics are true?A VLSM supports both IPv4 and IPv6B VLSM supports overlapped address ranges.C VLSM provides more proper route summarization information in the routing table.D VLSM allows a subnet to be divided into smaller subnets.CD48.Which of the following IP address are network addresses?A 64.104.3.7/28B 192.168.12.64/26C 192.135.12.191/26D 198.18.12.16/28BD49.What are the advantages of subnet division?A Isolating broadcast trafficB Improving network QosC Increasing the IP address usageD Improving network reliabilityAC50.Assume that the subnet mask is 255.255.255.248,which of the following addresses are validhost addresses?A 192.168.200.87B 196.123.142.190C 223.168.210.100D 220.100.100.154BCD51.Which of the following addresses can be used on a public network?A 172.30.0.1/16B 127.254.11.15/16C 172.15.12.7/16D 193.168.10.4/16CD52.Which of the following rules should a network administrator obey when the networkadministrator uses the VLSM technology to plan subnets?A A subnet is composed of all summarized routes.B A subnet can address a host or be further subnetted.C The update message of a routing protocol in use must carry subnet mask information.D The summarized networks must have the same high-order bit.BCD53.Which of the following statements about OSPF authentication are false?A Entering a password in cipher text is allowedB The ospf authentication-mode md5 1 huawei command and the ospfauthentication-mode md5 1 plain Huawei command have the same function.C If passwords are configured for both an area and an interface,the password configuredfor the area is used.D The ospf authentication-mode simple Huawei command and the ospfauthentication-mode simple plain Huawei command have the same function.BC54.Which of the following statements about route summary are true?A advertise is the default parameter of the abr-summary comman,IF neither advertise nornot-advertise is specified in the abr-summary command,advertise is used.B not-advertise is the default parameter of the abr-summary command,If neither advertisenor not-advertise is specified in the abr-summary command,not-advertise is used.C The abr-summary command is run in the OSPF viewD The asbr-summary command is run in the OSPF view.AD55.What are the OSPF message types?A HelloB Database DescriptionC Link state RequestD Link state UpdateE Link state AckABCDE56.What are possible causes for a failure in the establishment of an OSPF neighbor relationship?A Router IDs conflictB Area IDs are mismatchedC Network masks are inconsistentD Authentication types and authentication passwords are inconsistentABCD57.Which statements about OSPF packets are true?A Hello packets can be sent after OSPF is enabled on an interface.B LS Request packets are sent only after an adjacency is established.C LS Update packets contain detailed LSA information for LSDB synchronization.D LS Update packets are sent only after an adjacency is established.ABC58.Which of the following statements about state transition are true?A The neighbor state machine transitions from the loading state to the full state if aloadingdone event occursB The neighbor state machine transitions from the Exstart state to the Full state if aNegotiationdone event occursC The neighbor state machine transitions from the Exchange state to the full state if anExchangedone event occursD The neighbor state machine transitions from the Exchange state to the loading state if anExchangedone event occurs.ACD59.Which of the following statements are true?A The neighbor state machine can transition from the Down state to the attempt stateB The neighbor state machine can transition from the Down state to the init stateC The neighbor state machine can transition from the init state to the Exstart stateD The neighbor state machine can transition from the init state to the 2-way stateABCD60.Which of the following LSAs are flooded within a single area?A Router LSAB Network LSAC Summary LSAD AS External LSAABC61.Which of the following statements about an AS-External-LSA are true?A The Link State ID field specifies the network segment address for an advertiseddestination.B The Advertising Router field specifies the Router ID of an ASBR.C The Net mask field specifies the network mask of an advertised.D The link state ID and Advertising Router fields are used together to uniquely identify anAS-External-LSA.ABC62.Which of the following statements are true?A An LSDB uses a directed graph to show a network topology.The graph contains threeelements:routers,Stub networks,and transit network.B A broadcast network or an NBMA network,each having two or more routers,is a Transitnetwork.C The default value of bandwidth-reference is 10M.D The cost of the route from a Transit network to an attached router is 0.ABD63.Which of the following statements are false?A An ASBR-Summary-LSA describes the route to an ASBR and is flooded within an AS.B An ASE-LSA describes the route to an external AS and is flooded to an external ASC An AS-External-LSA does not belong to any specific area.D The metric of a Type-1 external route is the AS external metric only.ABD64.Which parameters are optional for configuring a BGP peer?A IP addressB DescriptionC PasswordD AS-numberBC65.Which types of packets are supported by BGP?A HelloB NotificationC UpdateD Route-refreshBCD66.Which methods can be used to import local routes to BGP?A Run the network commandB Receive routes from peersC Run the summary automatic commandD Run the import command.AD67.BGP is an inter-AS routing protocol,which statements about BGP are true?A BGP adopts a reliable transmission protocol.B BGP supports automatic peer discovery.C BGP supports incremental route update.D BGP supports various routing policies.ACD68.Which statements about prerequisites to establishing a BGP peer relationship are true?A BGP peers have been manually configured.B A TCP connection has been established between two neighboring routers.C BGP peers have exchanged routing information.D MD5 authentication has been configured on BGP peers.AB69.Which statements about BGP route advertisement are true?A ALL BGP routes learned from BGP peers are advertised to other BGP peers.B Only the routes learned from an IGP are advertised to other BGP peers.C By default,the routes learned from IBGP peers are not advertised to other IBGP peers.D Only the optimal routes are advertised to other BGP peers.CD70.Which of the following conditions must be met for importing routes to BGP by using thenetwork command?A The routes are optimal in the ip routing table.B The routes do not need to match the specified mask length.C The routes match the specified mask lengthD The routes are IGP routes.AC71.Which statements about the AS number range are true?A If 2-byte AS numbers are supported,a private AS number ranges from 32768 to 65535.B IF 2-byte AS numbers are supported,a private AS number ranges from 64512 to 65535.C IF 2-byte AS numbers are supported,an AS number ranges from 1 to 65535.D If 4-byte AS numbers are supported.a 4-byte AS number is in the X.Y format.Here”X”and“y” are integers ranging from 1 to 65535 and 0 to 65535 respectively.BCD72.A notification message with Error Code 2 indicates an error OPEN message.which of thefollowing error sub-codes can be contained in this OPEN message?A 1: indicates that the version number is not supported.B 2: indicates that the AS of the peer is incorrect.C 3: indicates that the BGP identifier is incorrect.D 4: indicates that the Optional parameters filed is not supported.ABCD73.Which parameters are carried in a BGP Open message?A Local AS numberB BGP IDC Keepalive timerD Holder timerE Current peer statusABD74.Which commands are relevant to a BGP route reflector?A peer reflect-clientB reflect between-clientsC reflector cluster-idD rr-filterABCD75.Which statements about the process of establishing a BGP peer relationship are true?A There may by two TCP connections during the establishment of the BGP peerrelationship.B IF two TCP connections are established between BGP peers,one connection functions asthe primary connection,and the other as the backup connection.C IF two TCP connections are established between BGP peers,one TCP connection is torndown.D IF there are multiple TCP connections between BGP peers,BGP keeps the TCP connectioninitiated by the peer with a greater BGP router ID.ACD76.Which statements about BGP route reflection are true?A IBGP peers must be fully connected in absence of a route reflector(RR),The BGP routereflection mechanism is introduced to lower the requirement.B After learning routes from a non-client,a route reflector(RR) advertises these routes to allclients.C After learning routes from a client,an RR advertises these routes to all clients andnon-clients.D After learning routes from an EBGP peer,an RR advertises these routes to all clients andnon-clients.ABCD77.In a route-policy,which BGP attributes can be invoked by if-match clauses?A Local-PreferenceB AS-PathC MEDD CommunityBCD78.In a route-policy,which BGP attributes can be used to define apply clauses?A Local-PreferenceB TagC OriginD AS-PathACD79.Which BGP attributes are optional in a BGP update packet?A OriginB NexthopC Local-PreferenceD MEDCD80.Which statements about BGP well-known mandatory attributes are true?A Well-known mandatory attributes must be identified by all BGP routers.B Well-known mandatory attributes must be transmitted between BGP peers.C Well-known mandatory attributes are optional in an Update packet,and can be carried inan Update packet as needed.D Well-known mandatory attributes must be carried in an Update packet.ABD81.in OSPF,which of the following statements are incorrect regarding Router LSA generated byRouter A?A In point-to-point link type,data is set to the interface IP address of RouterA.B In transNet link type, data is set to the interface IP address of RouterA.C In StubNet link type,data is set to the interface IP address of RouterA.D In Virtual link type, data is set to the Router ID of RouterA.CD82.which attributes are well-known community attributes?A NO_EXPORT (0xFFFFFF01)B NO_ADVERTISE(0xFFFFFF02)C NO_EXPORT_SUBCONFEDD AS(2Byte):Number(2Byte)ABC83.which statements about BGP route selection rules are true?A BGP first ignores routes with unreachable next hops.B A summarized route takes precedence over a non-summarized route.C EBGP routes take precedence over IBGP routes.D IF other conditions of routes are the same,the route with the shortest cluster_list ispreferred.ABCD84.which BGP attributes can be used to prevent routing loops?A originator_IDB AggregatorC Cluster_listD AS-PathACD85.which of the following BGP routing policies can be used to filter routes?A ip-prefixB route-policyC as-path-filerD community-filterABCD86.which attributes meet the following two conditions:(1)A BGP router (Router A)can choosewhether to carry this attribute in an update packet.(2) If a receiving router(Router B )cannot identify this attribute,this router can advertise this attribute to another BGP router (RouterC).Router C may be able to identify and use this attribute.A AggregatorB Local_prefC multi_exit_discD CommunityAD87.which of the following route selection tools can be used only in BGP?A Route-policyB IP-prefixC AS-path-filterD Community-filterCD88.which of the following routing protocols support import-route?A OSPFB RIPC BGPABC89.which of the following routes match this ACL filter? Acl number 2001 rule 0 permit source1.1.1.0 0.0.254.255A 1.1.1.1/32B 1.1.2.1/32C 1.1.3.1/32D 1.1.4.1/32AC90.which of the following route prefixes match this IP-prefix-filter? IP ip-prefix test index 10permit 10.0.0.0 16 greater-equal 24 less-equal 28A 10.0.1.0/23B 10.0.1.0/24C 10.0.1.0/25D 10.0.1.0/28BCD91.one route selection tool may have several Items defined,to which of following tools will thesystem automatically add a deny-any item following all the configured items?A ACLB IP-prefixC AS-path-filterD community-filterABCD92.which of the following as-path attributes does not match this AS-path-filter? IpAS-path-filter 1 permit 100(_100)*(_400)*$A 100B 100 200 400C 100 400D 100 400 400 400B93.which of the following methods are supported by OSPF for delivering default routes?A Delivery by an ABRB Delivery by an ASBRC Forcible deliveryD Non-forcible deliveryABCD94.which of the following scenarios can an AS-path-filter be used for?A Filtering the routes received from a BGP peer based on the as-path attributes of theroutes,for example,peer X.X.X.X as-path-filter importB Filtering the routes sent to a BGP peer based on the as-path attributes of the routes,forexample,peer X.X.X.X as-path-filter exportC Apply clauses in a route-policyD IF-match clauses in a route-policyABD95.which of the following protocols support default route advertisement by using commands?A RIPB OSPFC BGP。

华为AR160系列企业路由器数据手册说明书

华为AR160系列企业路由器数据手册说明书

DatasheetProduct OverviewThe AR160 series are fixed interface routers that provide a comprehensive platform for a variety of network topologies, including IMS, NGN, WAN and PSTN. The AR160s also employ embedded hardware encryption for security.The AR160 series are mature, stable and quiet routers that offer high performance functionality for small networks, enabling small businesses to greatly increase productivity at a lower cost.AR160s are easy to deploy, configure and customize, greatly reducing cost of deployment and maintenance, while offering maximum value to customers. These models allow network administrators to expand their networks easily and quickly, saving time and costs. The routers support firewalls, call processing, and application program functionalities.The AR160 series include the following models:●AR161, AR161G-L, AR161W, AR169, AR169G-L, AR169WThe specifications for these models are shown in the following table.AR161AR161G-LAR161WAR169AR169G-LAR169WProduct Features and BenefitsSmall Size and High Performance●More applications: Huawei series routers use the dual-core processor that isolates the control plane from the forwarding plane and processes more enterprise applications. Huawei series routers improve user experience for multimedia service when streams overlap.●Higher performance: The AR160s can process various enterprise applications, and its service processing capability is four times that in the industry.●Greater potential: Huawei series routers provide the capability to migrate services to the 3G and LTE networks.Low Investment with High Returns●Easy to construct: The AR160s supports plug-and-play, intelligent configuration, and deployment using the USB flash drive. It can function immediately after being installed. Users do not need to configure an IP address manually. The PPP and VPN indicators show the status of corresponding services. The AR160s helps to quickly construct an enterprise IT network.●Simplified solution: Huawei provides an all-around solution that integrates the routing, switching, voice, security, and wireless services. Customers can customize solutions as required.●Easy to expand: Huawei series routers have four/eight FE/GE ports, can access more employee for small enterprises. The two uplink WAN ports implement load balancing and link protection, maximizing the return on investments.Small footprint on a Comprehensive Platform●Maturity and Stableness: The AR160s uses the Huawei VRP operating system and VSP voice platform. In addition, theAR160s uses modularized hardware design, which brings good user experience.●Low-noise office: Huawei series routers have no fan, which brings low noise and good user experience.●Secure environment: The lightning failure rate of AR160s is only 3% of industry average. The AR160s can be applied in the harsh environment.Sample DeploymentsWAN AccessExample deployment in branch networks for WAN access. In this example, the AR160s function as the egress routers on enterprise branch networks and provide multiple access methods, including Ethernet, xDSL, 3G, LTE and WLAN.VPN Deployment for Secure Enterprise CommunicationsVPNs Connecting Branches and Partners to HeadquartersThis illustration shows how to deploy AR160s using VPNs to connect branches and partners to headquarters.AR160s provide various VPN tunnel protocols to ensure secure communications between:●Enterprise branches and other branch offices●Enterprise branches and headquarters●Partners and enterprise resourcesAR160s support the following VPN tunnel protocols:●GRE VPN●IPSEC VPN●DSVPN●L2TP VPNAR160s support fast tunnel set-up and authentication.Wireless Access and Management in Branch3G/LTE and Wi-Fi Wireless Access applicationThe AR160s routers complied with 3G and LTE standards including HSPA+ and FDD LTE, meeting the wireless communication requirements between branches and the headquarters. In addition, the 3G or LTE data link can be used as a backup for wired link to protect the xDSL, FE/GE, and ISDN uplinks. The backup link improves network stability and reduces network construction costs.Some models of AR160s routers are dual SIM devices, providing dual SIM standby. The customers can switch the SIM card manually according to 3G/LTE network standards. In addition, the device can switch to the backup SIM card when signal is weak to avoid link interruptionThe AR160s routers integrated WLAN wireless access capabilities, support 802.11a/b/g/n standard communication, Built-in AC function make the deployment and management more conveniently. Its wireless features can meet users’ demand for wireless access, and help enterprises to build a branch network flexibly.Wireless AC Management applicationThe AR160s routers integrated AC (Access Controller, a wireless controller) functionality, which can manage the wireless AP (Access Point, Access Point) in wireless LAN. AR supported rich certification and flexible user access control, which can provide security access guarantee for Wi-Fi users. The rich wireless capabilities integrated in one device, this can realize centralized management of wired and wireless network, meet the customers’ requirements of building different scale enterprises networks. Copper and Fiber integration Access SolutionHuawei new generation AR160 routers integrated 4 GE LAN and 1 GE WAN ports, some models support VDSL2 access, which can provide 100M access bandwidth (800 meters). This new box device can bring a high bandwidth experience to the enterprise and carrier customers.In the future, if the customers have optical access requirements, they don't need to replace the devices. As the GE WAN port supports Combo switch. The one box solution can meet the customers’ requirements perfectly, thereby prote ct their investments. Technical SpecificationsAR160s Technical SpecificationsHow to Configure the Modular AR160 RoutersThe AR160 series routers require 2 types of configuration modules:●Basic software configuration●Software license configurationThe basic software configuration modules provide functions such as routing, switching, and security. The software license configuration modules provide additional functions such as AC.Ordering InformationThe AR160 series routers are configured by selecting and installing the appropriate configuration module. The configuration module ordering information and descriptions are shown in the following tables.Table 1: Chassis OptionsCopyright © Huawei Technologies Co., Ltd. 2019. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissionsand other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders.NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied.The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: 。

tcpip路由协议第一卷 pdf

tcpip路由协议第一卷 pdf

tcpip路由协议第一卷第一章:网络和路由选择基本知识网络是由一系列互相连接的节点构成的,这些节点可以是计算机、路由器或者其他网络设备。

在TCP/IP协议中,这些节点被称为"主机"。

网络的目的是允许这些节点之间进行通信。

路由选择是网络通信中的一项关键功能,它决定了数据包如何在不同的网络节点之间进行转发。

简单来说,路由选择就是确定最佳路径的过程,以将数据包从源主机传输到目标主机。

第二章:常用内部路由协议内部路由协议用于在自治系统内部路由数据包。

自治系统是一个网络组织,它在路由选择过程中采用统一的策略。

最常见的内部路由协议包括RIP(Routing Information Protocol)和OSPF(Open Shortest Path First)。

RIP是一种基于距离向量的路由协议,它通过在各个路由器之间交换路由信息,然后根据接收到的路由信息更新自身的路由表。

RIP协议在小型网络中表现良好,但在大型网络中可能会导致路由循环和收敛缓慢。

OSPF是一种基于链路状态的路由协议,它通过收集网络中所有路由器的链路状态信息,然后使用Dijkstra算法计算出最短路径。

OSPF协议能够快速收敛,并且能够处理大型网络中的路由问题。

第三章:路由控制工具在管理和控制网络路由时,通常会使用一些工具来帮助我们完成工作。

这些工具包括:1.BGP(Border Gateway Protocol)**:BGP是用于自治系统之间路由信息交换的外部网关协议。

它是唯一一种用来进行路由信息控制的协议。

2.EIGRP(Enhanced Interior Gateway Routing Protocol)**:EIGRP是一种混合型的路由协议,结合了距离向量和链路状态的特性。

它提供了一种可靠的方法来确定最佳路径。

3.Static Routes**:静态路由是由管理员手动配置的路由,不依赖于任何动态路由协议。

虽然配置静态路由相对简单,但需要管理员对网络有深入的了解。

路由选择翻译要点

路由选择翻译要点

Chapter 13. Routing Choices第13章路由选择In the early days of networking, huge projects were undertaken to determine the best在早期的网络、大型项目进行确定最佳routing protocol—for some definition of “best. ”For instance, one project commissioned 路由协议的一些“最好的定义。

“例如,一个项目委托by the US Air Force attempted to measure the speed of convergence for each of the由美国空军试图衡量收敛的速度primary routing protocols (OSPF, IS-IS, and EIGRP), how much bandwidth each protocol主要路由协议(OSPF是什么,EIGRP),多少带宽每个协议used under normal operation, how much bandwidth was required when the protocol was在正常的操作下,使用协议时需要多少带宽converging (given a specific network topology and breakage scenarios), how many融合(给定一个特定的网络拓扑和破损的场景),有多少network engineers knew each of the protocols under investigation, and a number of other网络工程师知道每个协议接受调查,和其他一些factors. Ultimately, the project was designed to churn all these factors together and因素。

Part4_思科配置专家CCP_路由器配置工具介绍

Part4_思科配置专家CCP_路由器配置工具介绍

Firewall
IPS
Advanced configuration
Routing
© 2008 Cisco Systems, Inc. All rights reserved.
PDF created with pdfFactory trial version
Presentation_ID
Cisco Confidential
2
Why CCP?
§ Lower Total Cost of Ownership
Productivity: Up and running in under 30 minutes Simplicity: Configurations completed without touching CLI Cost Savings: Lower VAR skill requirements Reliability: CCP uses Cisco TAC approved configurations Increased Uptime: Easy-to-comprehend charts for troubleshooting & real-time monitoring
§ CCP 1.1
Content Filtering Voice –CUCME and CUE Platforms supported –85x, 86x, 87x, 88x, 18xx, 28xx, 38xx, 72xx
Free Download: /go/ciscocp Feedback for CCP: ccp-feedback@
Cisco Configuration Professional
PDF created with pdfFactory trial version

华为云引擎S5731-S系列交换机产品介绍说明书

BrochureProduct OverviewThe CloudEngine S5731-S series switches were developed based on next-generation high-performing hardware and theHuawei Versatile Routing Platform (VRP). The CloudEngine S5731-S supports simplified operations and maintenance (O&M), intelligent stack (iStack), flexible Ethernet networking. It also provides enhanced Layer 3 features and mature IPv6 features. The CloudEngine S5731-S can be used in various scenarios. For example, it can be used as an access or aggregation switch on a campus network or as an access switch in a data center.Models and AppearancesThe following models are available in the CloudEngine S5731-S series.Models and Appearances DescriptionCloudEngine S5731-S24T4X●24 10/100/1000Base-T Ethernet ports, 4 10GE SFP+ ports ● 1+1 power backup● Forwarding performance: 96 Mpps ● Switching capacity: 672 Gbit/sCloudEngine S5731-S24P4X●24 10/100/1000Base-T Ethernet ports, 4 10GE SFP+ ports ● 1+1 power backup ● PoE+● Forwarding performance: 96 Mpps ● Switching capacity: 672 Gbit/sCloudEngine S5731-S48T4X●48 10/100/1000Base-T Ethernet ports, 4 10GE SFP+ ports ● 1+1 power backup● Forwarding performance: 125 Mpps ● Switching capacity: 672 Gbit/sCloudEngine S5731-S48P4X●48 10/100/1000Base-T Ethernet ports, 4 10GE SFP+ ports ● 1+1 power backup ● PoE+● Forwarding performance: 125 Mpps ●Switching capacity: 672 Gbit/sFeatures and HighlightsPowerful Service Processing Capability and Multiple Security Control Mechanisms●The CloudEngine S5731-S supports many Layer 2/Layer 3 multicast protocols such as PIM SM, PIM DM, PIM SSM, MLD, and IGMP snooping, to support multi-terminal high-definition video surveillance and video conferencing services.●The CloudEngine S5731-S supports multiple Layer 3 features including OSPF, IS-IS, BGP, and VRRP, meeting enterprises' requirements on access and aggregation service bearing, and enabling a variety of voice, video, and data applications.●The CloudEngine S5731-S supports MAC address authentication, 802. 1x authentication, and Portal authentication, and implements dynamic delivery of policies (VLAN, QoS, and ACL) to users.●The CloudEngine S5731-S provides a series of mechanisms to defend against DoS and user-targeted attacks. DoS attacks are targeted at switches and include SYN flood, Land, Smurf, and ICMP flood attacks. User-targeted attacks include bogus DHCP server attacks, IP/MAC address spoofing, DHCP request flood, and change of the DHCP CHADDR value.●The CloudEngine S5731-S sets up and maintains a DHCP snooping binding table, and discards the packets that do not match the table entries. You can specify DHCP snooping trusted and untrusted ports to ensure that users connect only to the authorized DHCP server.●The CloudEngine S5731-S supports strict ARP learning, which protects a network against ARP spoofing attacks to ensure normal network access.Easy O&M●The CloudEngine S5731-S supports Super Virtual Fabric (SVF), which virtualizes the "Core/aggregation + Access switch + AP" structure into a logical device. The CloudEngine S5731-S provides the innovative network management solution in the industry to simplify device management. It allows plug-and-play access switches and APs. In addition, the CloudEngine S5731-S supports service configuration templates. The templates are configured on core devices and automatically delivered to access devices, enabling centralized control, simplified service configuration, and flexible configuration modification. The CloudEngineS5731-S functions as a client in an SVF system.●The CloudEngine S5731-S supports zero-touch deployment, replacement of faulty devices without additional configuration, USB-based deployment, batch configuration, and batch remote upgrade. The capabilities facilitate device deployment, upgrade, service provisioning, and other management and maintenance operations, and also greatly reduce O&M costs. The CloudEngine S5731-S can be managed using SNMP v1/v2c/v3, CLI, web-based network management system, or SSH v2. 0. Additionally, it supports RMON, multiple log hosts, port traffic statistics collection, and network quality analysis, which facilitate network optimization and reconstruction.Multiple Reliability Mechanisms●The CloudEngine S5731-S supports iStack. This technology can virtualize up to nine physical switches into one logical switch. Member switches in a stack implement redundancy backup to improve device reliability and use inter-device link aggregation to improve link reliability. iStack provides high network scalability. You can increase a stack's ports, bandwidth, and processing capacity by simply adding member switches. iStack also simplifies device configuration and management. After a stack is set up, multiple physical switches are virtualized into one logical device. You can log in to any member switch in the stack to manage all the member switches in the stack.●The CloudEngine S5731-S is equipped with two removable power modules that can work in 1+1 redundancy backup mode.●In addition to traditional STP, RSTP, and MSTP, the CloudEngine S5731-S supports Huawei-developed Smart Ethernet Protection (SEP) technology and the latest Ethernet Ring Protection Switching (ERPS) standard. SEP is a ring protection protocol specific to the Ethernet link layer, and applies to various ring network topologies, such as open ring topology, closed ring topology, and cascading ring topology. This protocol is reliable, easy to maintain, and implements fast protection switching within 50 ms. ERPS is defined in ITU-T G. 8032. It implements millisecond-level protection switching based on traditional Ethernet MAC and bridging functions.●The CloudEngine S5731-S supports Smart Link. One CloudEngine S5731-S switch can connect to multiple aggregation switches through multiple links, implementing backup of uplinks and significantly improving reliability of access devices.●The CloudEngine S5731-S supports Ethernet OAM (IEEE 802.3ah/802.1ag) to detect link faults quickly.Mature IPv6 Technologies●The CloudEngine S5731-S uses the mature, stable VRP platform and supports IPv4/IPv6 dual stack, IPv6 RIPng, and IPv6 over IPv4 tunnels (including manual, 6-to-4, and ISATAP tunnels). With these IPv6 features, the CloudEngine S5731-S can be deployed on a pure IPv4 network, a pure IPv6 network, or a shared IPv4/IPv6 network, helping achieve IPv4-to-IPv6 transition.OPS●Open Programmability System (OPS) is an open programmable system based on the Python language. IT administrators can program the O&M functions of a switch through Python scripts to quickly innovate functions and implement intelligent O&M.Intelligent O&M●The CloudEngine S5731-S provides telemetry technology to collect device data in real time and send the data to Huawei campus network analyzer CampusInsight. The CampusInsight analyzes network data based on the intelligent fault identification algorithm, accurately displays the real-time network status, effectively demarcates and locates faults in a timely manner, and identifies network problems that affect user experience, accurately guaranteeing user experience.●The CloudEngine S5731-S supports a variety of intelligent O&M features for audio and video services, including the enhanced Media Delivery Index (eMDI). With this eDMI function, the switch can function as a monitored node to periodically conduct statistics and report audio and video service indicators to the CampusInsight platform. In this way, the CampusInsight platform can quickly demarcate audio and video service quality faults based on the results of multiple monitored nodes.Intelligent Upgrade●Switches support the intelligent upgrade feature. Specifically, switches obtain the version upgrade path and download the newest version for upgrade from the Huawei Online Upgrade Platform (HOUP). The entire upgrade process is highly automated and achieves one-click upgrade. In addition, preloading the version is supported, which greatly shortens the upgrade time and service interruption time.●The intelligent upgrade feature greatly simplifies device upgrade operations and makes it possible for the customer to upgrade the version independently. This greatly reduces the customer's maintenance costs. In addition, the upgrade policies on the HOUP platform standardize the upgrade operations, which greatly reduces the risk of upgrade failures.Product SpecificationsFixed port 24 10/100/1000Base-Tports, 4 10GE SFP+ports 24 10/100/1000Base-T(PoE+) ports, 4 10GESFP+ ports48 10/100/1000Base-Tports, 4 10GE SFP+ports48 10/100/1000Base-T(PoE+) ports, 4 10GESFP+ portsDimensions (W x D x H) 442 mm x 420 mm x 43.6mm442 mm x 420 mm x 43.6mm442 mm x 420 mm x 43.6mm442 mm x 420 mm x 43.6mmChassis height 1U 1U 1U 1UChassis weight(fullconfigurationweight)8.4kg 8.6kg 8.55kg 8.8kgInput voltage ●Rated voltage range:100 V AC to 240 VAC, 50/60 Hz●Maximum voltagerange:−AC input: 90 V ACto 290 V AC, 45Hz to 65 Hz−High-Voltage DC ●Rated voltage range:100 V AC to 240 VAC, 50/60 Hz●Maximum voltagerange:−AC input: 90 V ACto 290 V AC, 45Hz to 65 Hz−High-Voltage DC●Rated voltage range:100 V AC to 240 VAC, 50/60 Hz●Maximum voltagerange:−AC input: 90 V ACto 290 V AC, 45Hz to 65 Hz−High-Voltage DC●Rated voltage range:100 V AC to 240 VAC, 50/60 Hz●Maximum voltagerange:−AC input: 90 V ACto 290 V AC, 45Hz to 65 Hz−High-Voltage DCinput: 190 V DC to 290 V DC input: 190 V DCto 290 V DCinput: 190 V DCto 290 V DCinput: 190 V DCto 290 V DCMaximum power consumption 114 W ●121 W (without PDs);●977 W (with PDs,PDs: 740 W)124 W ●132 W (without PDs);●1750 W (with PDs,PDs: 1440 W)Noise ●Under normaltemperature (soundpower): 57.5dB(A)●Under hightemperature (soundpower): 70.9dB(A)●Under normaltemperature (soundpressure): 47.5dB(A) ●Under normaltemperature (soundpower): 62.3dB(A)●Under hightemperature (soundpower): 71.8dB(A)●Under normaltemperature (soundpressure): 52.8dB(A)●Under normaltemperature (soundpower): 57.5dB(A)●Under hightemperature (soundpower): 70.9dB(A)●Under normaltemperature (soundpressure): 47.5dB(A)●Under normaltemperature (soundpower): 62.3dB(A)●Under hightemperature (soundpower): 71.8dB(A)●Under normaltemperature (soundpressure): 52.8dB(A)Operating temperature ●0-1800 m altitude: -5°C to 45°C●1800-5000 m altitude:The operatingtemperature reducesby 1ºC every time thealtitude increases by220 m.●0-1800 m altitude: -5°C to 45°C●1800-5000 m altitude:The operatingtemperature reducesby 1ºC every time thealtitude increases by220 m.●0-1800 m altitude: -5°C to 45°C●1800-5000 m altitude:The operatingtemperature reducesby 1ºC every time thealtitude increases by220 m.●0-1800 m altitude: -5°C to 45°C●1800-5000 m altitude:The operatingtemperature reducesby 1ºC every time thealtitude increases by220 m.Storagetemperature-40℃~70℃-40℃~70℃-40℃~70℃-40℃~70℃Relative humidity 5% to 95% (non-condensing)5% to 95% (non-condensing)5% to 95% (non-condensing)5% to 95% (non-condensing)Surgeprotectionspecification(service port)Common mode: ±6 kV Common mode: ±6 kV Common mode: ±6 kV Common mode: ±6 kVSurge protection specification (power port) ●Differential mode: ±6kV●Common mode: ±6kV●Differential mode: ±6kV●Common mode: ±6kV●Differential mode: ±6kV●Common mode: ±6kV●Differential mode: ±6kV●Common mode: ±6kVHeat dissipation Air cooling heatdissipation, intelligentspeed adjustment, andpluggable fansAir cooling heatdissipation, intelligentspeed adjustment, andpluggable fansAir cooling heatdissipation, intelligentspeed adjustment, andpluggable fansAir cooling heatdissipation, intelligentspeed adjustment, andpluggable fansService FeaturesMAC address table IEEE 802.1d standards compliance 32K MAC address entriesMAC address learning and agingStatic, dynamic, and blackhole MAC address entriesPacket filtering based on source MAC addressesVLAN 4094 VLANsGuest VLAN and voice VLANGVRPMUX VLANVLAN assignment based on MAC addresses, protocols, IP subnets, policies, and portsVLAN mappingEthernet loop protection RRPP ring topology and RRPP multi-instanceSmart Link tree topology and Smart Link multi-instance, providing millisecond-level protection switching SEPERPS (G.8032)BFD for OSPF, BFD for IS-IS, BFD for VRRP, and BFD for PIMSTP (IEEE 802.1d), RSTP (IEEE 802.1w), and MSTP (IEEE 802.1s)BPDU protection, root protection, and loop protectionIP routing Static routes, RIP v1/2, RIPng, OSPF, OSPFv3, IS-IS, IS-ISv6, BGP, BGP4+, ECMP, routing policy Up to 16K FIBv4 entriesUp to 8K FIBv4 entriesInteroperability VLAN-Based Spanning Tree (VBST), working with PVST, PVST+, and RPVSTLink-type Negotiation Protocol (LNP), similar to DTPVLAN Central Management Protocol (VCMP), similar to VTPIPv6 features Up to 8K ND entriesPMTUIPv6 Ping, IPv6 Tracert, and IPv6 TelnetACLs based on source IPv6 addresses, destination IPv6 addresses, Layer 4 ports, or protocol typesMulticast Listener Discovery snooping (MLDv1/v2)IPv6 addresses configured for sub-interfaces, VRRP6, DHCPv6, and L3VPNMulticast IGMP v1/v2/v3 snooping and IGMP fast leaveMulticast forwarding in a VLAN and multicast replication between VLANsMulticast load balancing among member ports of a trunkControllable multicastPort-based multicast traffic statisticsIGMP v1/v2/v3, PIM-SM, PIM-DM, and PIM-SSMMSDPQoS/ACL Rate limiting in the inbound and outbound directions of a portPacket redirectionPort-based traffic policing and two-rate three-color CAREight queues per portDRR, SP and DRR+SP queue scheduling algorithmsWREDRe-marking of the 802.1p and DSCP fields of packetsPacket filtering at Layer 2 to Layer 4, filtering out invalid frames based on the source MAC address,destination MAC address, source IP address, destination IP address, TCP/UDP port number, protocoltype, and VLAN IDQueue-based rate limiting and shaping on portsSecurity Hierarchical user management and password protectionDoS attack defense, ARP attack defense, and ICMP attack defenseBinding of the IP address, MAC address, port number, and VLAN IDPort isolation, port security, and sticky MACMAC Forced Forwarding (MFF)Blackhole MAC address entriesLimit on the number of learned MAC addressesIEEE 802.1x authentication and limit on the number of users on a portAAA authentication, RADIUS authentication, and HWTACACS authenticationNACSSH V2.0HTTPSCPU protectionBlacklist and whitelistAttack source tracing and punishment for IPv6 packets such as ND, DHCPv6, and MLD packetsSecure BootIPSecECADeceptionReliability LACPE-trunkEthernet OAM (IEEE 802.3ah and IEEE 802.1ag)ITU-Y.1731LLDPBFD for BGP, BFD for IS-IS, BFD for OSPF, BFD for static route VXLAN VXLAN L2 and L3 gatewaysCentralized and distributed gatewayBGP-EVPNConfigured through the NETCONF protocolSuper Virtual Fabric (SVF) A two-layer client architecture is supported.IGMP snooping can be enabled on access switches (ASs) and the maximum number of access users on a port can be configured.ASs can be independently configured. Services that are not supported by templates can be configured on the parent.Third-party devices are allowed between SVF parent and clients.Working as an SVF client that is plug-and-play with zero configurationiPCA Directly coloring service packets to collect real-time statistics on the number of lost packets and packet loss ratioCollection of statistics on the number of lost packets and packet loss ratio at network and device levels TWAMP Two-way IP link performance measurementMeasurement on two-way packet delay, one-way packet loss rate, and one-way packet jitterManagement and maintenance iStack, with up to 9 member switches in a stack SNMP v1/v2c/v3RMONSmart Application Control (SAC)Web-based NMSSystem logs and alarms of different levels GVRPMUX VLANNetStreamIntelligent O&MNetworking and ApplicationsLarge-sized Enterprise Campus NetworksThe CloudEngine S5731-S provides various terminal security management features, and supports functions such as PoE, voice VLAN, and QoS. The switch can be used for desktop access and provides gigabit access speed.The CloudEngine S5731-S provides various security features including ARP security, IP security, IP source guard, and user access control policies such as NAC and ACLs, to control access of user terminals.In addition, the switch supports the Link Aggregation Control Protocol (LACP) to provide multi-link access for servers, improving link bandwidth and reliability.In terms of device management, the CloudEngine S5731-S provides Easy Operation and USB-based deployment, which facilitates device deployment and management.Small-and Middle-Sized Enterprise Campus NetworkThe CloudEngine S5731-S switches can be located at the aggregation layer to build a high-performance, reliable enterprise campus network.On an enterprise network or campus network, the CloudEngine S5731-S switches connect to access switches through gigabit or 10 gigabit interfaces, provide high performance and large switching capacity, and connect to core switches through 10 gigabit optical interfaces. The network provides 10 Gbit/s rate for the backbone layer and 100 Mbit/s access rate for terminals, meeting requirements for high bandwidth and multi-service.The CloudEngine S5731-S provides SEP and RRPP to implement millisecond-level protection switchover. The switches form a stack system by using iStack technology to implement the distributed forwarding structure and fast fault recovery. The stack system increases the number of user interfaces and improves packet processing capability. The member switches can be managed in a uniform manner to facilitate network management and maintenance.Small-Sized Enterprise Campus NetworkOther than that, the CloudEngine S5731-S switches can be used as the core switches of a small-sized enterprise campus network, which have powerful aggregation and routing capabilities. The CloudEngine S5731-S switches use iStack to ensure high reliability. The switches provide various access control policies to achieve centralized user management and simplify configuration.Ordering InformationThe following table lists ordering information of the CloudEngine S5731-S series switches.CloudEngine S5731-S24T4X CloudEngine S5731-S24T4X (24*10/100/1000BASE-T ports, 4*10GE SFP+ ports, without powermodule)CloudEngine S5731-S24P4X CloudEngine S5731-S24P4X (24*10/100/1000BASE-T ports, 4*10GE SFP+ ports, PoE+, without power module)CloudEngine S5731-S48T4X CloudEngine S5731-S48T4X (48*10/100/1000BASE-T ports, 4*10GE SFP+ ports, without power module)CloudEngine S5731-S48P4X CloudEngine S5731-S48P4X (48*10/100/1000BASE-T ports, 4*10GE SFP+ ports, PoE+, without power module)PAC600S12-CB 600W AC Power Module PAC150S12-R 150W AC Power Module PDC1000S12-DB 1000W DC Power Module PAC1000S56-CB 1000W AC PoE Power Module FAN-023A-BFan ModuleMore InformationFor more information about Huawei Campus Switches, visit or contact us in the following ways: ● Global service hotline: /en/service-hotline● Logging in to the Huawei Enterprise technical support website: /enterprise/ ● Sendinganemailtothecustomerservicemailbox:********************Copyright © Huawei Technologies Co., Ltd. 2019. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissionsand other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders. NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied.The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.Huawei Technologies Co., Ltd. Address:Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website:。

CCNA题库V104.2 补充新题 64Q(题库改版后新题目)

学网络技术去鸿鹄论坛命运的改变从技术开始鸿鹄团队致力于为每一位网络技术爱好者提供帮助有事您发帖,斑竹为您跑腿,给您答疑。

CCNA题库战报交流群:82327397欢迎备考CCNA的朋友加入,一起讨论交流,通过CCNA考试!CCNA最新题库/最新战报发布区:/forum-261-1.htmlCCNA考试代号:640-802考试时间:中文110分钟英文110+30=140分钟通过分数:825题库版本:V104.2Exam AQUESTION 1Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12on a switch?(choose two)A.SW1#show swithport port-security interface FastEthernet 0/12B.SW1# show swithport port-secure interface FastEthernet 0/12C.SW1# show port-secure interface FastEthernet 0/12D.SW1#show running-configAnswer: CDQUESTION 2Which component of VPN technology ensures that data can be read only by its intended recipient?A.data integrity B.encryption C.key exchange D.authenticationAnswer: DQUESTION 3Refer to the exhibit.What is the effect of the configuration that is shown?A.It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.B.Itconfigures a cisco network device to use the SSH protocol on incoming communications via the virtualterminal ports.C.It allows seven failed login attempts before the VTY lines are temporarily shutdown.D.It configures the virtual terminal lines with the password 030752180500.E.It configures SSH globally for all logins.Answer: BQUESTION 4Which IPV6 routing protocol uses multicast group FFO2::8 to send updates?A.RIPng B.OSPFv3C.IS-IS for IPv6D.staticAnswer: Cb b s .h h 010.co mWhich of the following are true regarding the debug output shown in the graphic?(choose two)A.This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#version 2RtrA(config-router)#network 172.16.0.0RtrA(config-router)#network 10.0.0.0B.This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#network 172.16.0.0RtrA(config-router)#network 10.0.0.0C.etwork 10.0.0.0 will be displayed in the routing table.work 192.168.168.0 will be displayed in the routing table.E.This router was configured with the commands:RtrA(config)#router ripRtrA(config-router)#network 192.168.1.0RtrA(config-router)#network 10.0.0.0RtrA(config-router)#network 192.168.168.0F.split-horizon was disabled on this router.Answer: BCQUESTION 6The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?A.10.10.0.0/18 subnetted with mask 255.255.255.252B.10.10.0.0/25 subnetted with mask 255.255.255.252C.10.10.0.0/24 subnetted with mask 255.255.255.252D.10.10.0.0/23 subnetted with mask 255.255.255.252E.10.10.0.0/16 subnetted with mask 255.255.255.252Answer: Db b s .h h 010.co mVLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3commmand interface configuration mode?A.The command is accepted and the respective VLAN is added to vlan dat.B.The command is rejected.C.The command is accepted and you must configure the VLAN manually.D.The port turns amber.Answer: AQUESTION 8Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?A.link bandwidth B.hop count C.link costD.administrative distanceE.link delayAnswer: DQUESTION 9Refer to the exhibit. In the Frame Relay network, which ip address would be assigned to the interfaces with point-to-poin PVCs?A.DLCI 16:192.168.10.1/24DLCI 17:192.168.10.2/24DLCI 99:192.168.10.3/24DLCI 28:192.168.10.4/24b b s .h h 010.co mB.DLCI 16:192.168.10.1/24DLCI 17:192.168.11.1/24DLCI 99:192.168.10.2/24DLCI 28:192.168.11.2/24C.DLCI 16:192.168.10.1/24DLCI 17:192.168.11.1/24DLCI 99:192.168.12.1/24DLCI 28:192.168.13.1/24D.DLCI 16:192.168.10.1/24DLCI 17:192.168.10.1/24DLCI 99:192.168.10.2/24DLCI 28:192.168.10.3/24Answer: BQUESTION 10Why will a switch never learn a broadcast address?A.Broadcast frames are never sent to swiches.B.Broadcast addresses use an incorrect format for the switching table.C. A broadcast address will never be the source address of a frame.D.Broadcasts only use network layer addressing.E.A broadcast frame is never forwarded by a switch.Answer: CQUESTION 11Wich command can you use to manually assign a static IPV6 address to a muter interface?A.ipv6 address PREFIX_1::1/64B.ipv6 autoconfig 2001:db8:2222:7272::72/64C.ipv6 autoconfigD.ipv6 address 2001:db8:2222:7272::72/64Answer: DQUESTION 12The EIGRP configuration in the Glencoe router uses a single network statement.From the output shown in the graph would advertise these networks in EIGRP?b b s .h h 010.co mwork 172.26.168.0 area 478work 172.26.0.0work 172.26.168.128 0.0.0.127work 172.26.168.128 area 478Answer: BQUESTION 13Which IPsec security protocol should be used when confidentiality is required?A.AH B.MD5C.PSK D.ESPAnswer: DQUESTION 14What is the function of the command switchport trunk native vlan 999 on a…(此处文字不清楚).?A.It designates VLAN 999 for untagged traffic.B.It blocks VLAN 999 traffic from passing on the trunk.C.It creates a VLAN 999 interface.D.It designates VLAN 999 as the default for all unkown tagged traffic.Answer: DQUESTION 15Which command can be used from a PC to verfy the connectivity between host that connect thro…(字体不清)…?A.tracert address B.ping address C.arp addressD.traceroute addressAnswer: AQUESTION 16In which solution is a router ACL used?A.protecting a server frome unauthorized accesB.controlling path selection,based on the route metricC.reducing router CPU utilizationD.filterring packets that are passing through a routerAnswer: DQUESTION 17Which statement is true, as relates to classful or classless routing?b b s .h h 010.co mA.RIPV1 and OSPF are classless routing protocols.B.Classful routing protocols send the subnet mask in routing updates.C.Automatic summarization at classful boundaries can cause problems on disc……D.EIGRP and OSPF are classful routing protocols and summarize routes by def……Answer: CQUESTION 18A router has two FastEthernet interfaces and needs to connect to four vlans in the local network.How can you accomplish this task,using the fewest physical interfaces and without decreasing network performance?A.Add two more FastEthernet interfaces.B.Add a second router to handle the vlan traffic.e a hub to connect the four vlans with a FastEthernet interface on router.D.Implement a router-on-a-stick configuration.Answer: DQUESTION 19Refer to the exhibit.How many broadcast domains are configured on switch2?A.5B.20C.4D.1Answer: CQUESTION 20What is the effect of using the service password-encryption command?A.nly passwords configured after the command has been entered will be encrypted.B.Only the enable password will be encrypted.C.Only the enable secret password will be encryptedD.It will encrypt the secret password and remove the enable secret password from the configuration.E.It will encrypt all current and future passwords.Answer: Eb b s .h h 010.co mQUESTION 21Refer to the exhibit.A technician has installed SwithchB and needs to configure it for remote access from the management workstation connected SwitchA Which set of commands is required to accomplish this task?A.SwitchB(config)#interface FastEthernet 0/1SwitchB(config)#ip address 192.168.8.252 255.255.255.0SwitchB(config)#no shutdownB.SwitchB(config)#ip default-gateway 192.168.8.254SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0SwitchB(config)#no shutdown C.SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0SwitchB(config)#ip default-gateway 192.168.8.254 255.255.255.0SwitchB(config)#no shutdownD.SwitchB(config)#ip default-network 192.168.8.254SwitchB(config)#interface vlan 1SwitchB(config)#ip address 192.168.8.252 255.255.255.0SwitchB(config)#no shutdownAnswer: BQUESTION 22Refer to the exhibit.The speed of all serial links is E1 and the speed of the all Ethernet links is 100Mb/s.A static route will be established on the Manchester router to the direct traffic toward the internet over the most direct path available.What configuration on the Manchester router will establish a router toward the internet for traffic that originates from workstation on the Manchester LAN?b b s .h h 010.co mA.ip route 0.0.0.0 255.255.255.0 172.16.100.2B.ip route 0.0.0.0 255.255.255.252 128.107.1.1C.ip route 0.0.0.0 0.0.0.0 128.107.1.1D.ip route 0.0.0.0 0.0.0.0 172.16.100.1E.ip route 0.0.0.0 255.255.255.255 172.16.100.2F.ip route 0.0.0.0 0.0.0.0 172.16.100.2Answer: FQUESTION 23What Frame Relay mechanism is used to build the map illustrated in the accompanying graphic?A.inverse multiplexingB.LMI mapingC.Inverse ARPD.ARPE.Proxy ARPAnswer: CQUESTION 24Refer to the exhibit.A network engineer is troubleshooting an internet connectivity problem on the computer.What is causing the problem?b b s .h h 010.co mA.wrong DNS serverB.wrong default gatewayC.incorrect IP addressD.incorrect subnet maskAnswer: CQUESTION 25How many broadcast domains are shown in the graphic assuming only the default vlan is configured on the switches?b b s .h h 010.co mA.oneB.sixC.twelveD.twoAnswer: AQUESTION 26How dose a DHCP server dynamically assign IP address to host?A.Addresses are allocated after a negotiation between the server and the host to determine the length ofthe agreement.B.Addresses are assigned for a fixed period of time.At the end of period,a newquest for an address mustbe made ,and another address is then assigned.C.Addresses are leased to host.A host will usually keep the same address by periodically contacting theDHCP sever to renew the lease.D.Addresses are permanently assigned so that the host uses the same address at all times.Answer: CQUESTION 27Which type of EIGRP route entry describes a feasible successor?A. a primary route,stored in the routing table B. a backup route,stored in the routing table C. a backup route,stored in the topology table D.a primary route,stored in the topology tableAnswer: CQUESTION 28What is the purpose of the inverse ARP?A.to map a known DLCI to an IP addressB.to map a known IP address to a MAC addressC.to map known SPID to a MACaddressD.to map a known DLCI to a MAC addressE.to map a known IP address to a SPID.F.to map a known MAC address to an IP addressAnswer: AQUESTION 29What is the default maximum number of equal-cost paths that can be placed into the routing of a cisco OSPF router?A.16B.2C.unlimitedD.4Answer: Db b s .h h 010.co mQUESTION 30Which IPV6 routing protocol uses multicast group FF02::9 to send updates?A.RIPng B.OSPFv3C.staticD.IS-IS for IPv6Answer: AQUESTION 31What are two benefits of using NAT?(choose two)A.NAT protects network security because private networks are not advertised.B.NAT accelerates the routing process because no modifications are made on the packets.C.Dynamic NAT facilitates connections from the outside of the network.D.NAT facilitates end-to-end communication when IPsec is enable.E.NAT eliminates the need to re-address all host that require extemal access.F.NAT conserves addresses through host MAC-level multiplexing.Answer: AEQUESTION 32Which three statements about RSTP are true?(choose three)A.RSTP significantly reduces topology reconverging time after a link failure.B.RSTP expends the STP port roles by adding the alternate and backup roles.C.RSTP port atates are blocking,discarding,learing,or forwarding.D.RSTP also uses the STP proprsal-agreement sequence.E.RSTP use the same timer-baseed process as STP on point-to-point links.F.RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.Answer: ABFQUESTION 33Refer to the exhibit.The serial0/0 interface of the Tampa router connects the Oriando router.Which two statements are true about the connection between these two routers?(choose two)b b s .h h 010.co mA.The only device with which the Tampa router will negotiate a data link is the Orlando router.B.The link is addressed on the *zero*subnet 10.0.0.0 network.C.The link uses a three-way handshake for authentication.D.The link uses a two-way handshake for authentication.E.Data exchanges between the Oriando and Tampa routers are encrypted.Answer: BCQUESTION 34A switch is configured as a vtp sever with a domain name of CCNA.Which cisco ios privileged modecommand,followed by a reload of the swith,will reset the VTP management domain name of the switch to a NULL value?A.#vtp domain unset B.#delete vlan.dat C.#no vtp domain D.#vtp domain nullAnswer: BQUESTION 35If an Ethernet port on a router was assigned an IP address of 172.1.1.1/20,what is the maximum number of hosts allowed on this subnet?A.4094B.1024C.8190D.2046b b s .h h 010.co mE.4096Answer: AQUESTION 36Which two statements about static NAT translations are true?(choose two)A.They are always present in the NAT table.B.They allow connection to be initiated from the outside.C.They can be configured with access lists, to allow two or more connections to be initiated from theoutside.D.They require no inside or outside interface markings because addresses are statically defined.Answer: ABQUESTION 37Which of these represents an IPv6 link-local address?A.FE08::280e:611:a:f14f:3d69B.FE81::280f:512b:e14f:3d69C.FE80::380e:611a:e14f:3d69D.FEFE:0345:5f1b::e14d:3d69Answer: CQUESTION 38What are three features of the IPV6 protocol?(choose three)plicated header B.plug-and-play C.no broadcasts D.checksums E.optional IPsec F.autoconfigurationAnswer: BCFQUESTION 39Assuming default setting,how can you erase the VTP database of VLANs on a CISCO IOS switch running in VTP server mode?A.Enable VTP pruningB.From privileged mode ,erase the startup configuration file,then reload.C.From privileged mode ,erase the vlan date file, then reload.D.Cycle the switch power.Answer: CQUESTION 40Refer to the exhibit.which address and mask combination a summary of the routes learned by EIGRP?b b s .h h 010.co mA.192.168.25.0 255.255.255.240B.192.168.25.16 255.255.255.252C.192.168.25.0 255.255.255.252D.192.168.25.28 255.255.255.240E.192.168.25.16 255.255.255.240F.192.168.25.28 255.255.255.240Answer: EQUESTION 41Refer to the exhibit A frame on vlan 1on switch s1 is sent to switch s2 when the frame is received on vlan 2,what causes this behavior?A.trunk mode mismatchesb b s .h h 010.co mB.vlans that do not correspond to a unique IP subnetC.native vlan mismatchesD.allowing only vlan 2 on the destination.Answer: CQUESTION 42Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator ′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.Answer: BQUESTION 43What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A.lowest port MAC addressB.port priority number and MAC address.C.VTP revision numberD.highest port priority number.E.path costAnswer: EQUESTION 44Refer to the exhibit.Router 1 was just successfully rebooted.identify the current OSPF router ID for Router 1.b b s .h h 010.co mA.208.149.23.194B.220.173.149.10C.208.149.23.162D.190.172.32.10Answer: AQUESTION 45Why do large OSPF networks use a hierarchical design?(choose three)A.to confine network instability to single areas of the network.B.to reduce the complexity of router configuration C.to speed up convergenceD.to lower costs by replacing routers with distribution layer switchesE.to decrease latency by increasing bandwidthF.to reduce routing overheadAnswer: ACFQUESTION 46A network administrator receives an error message while tring to configure the Ethernet interface of a router with IP address 10.24.24.24/29.which statement explains the reason for this issue?A.The address is a broadcast address B.The Ehernet interface is faultyC.VLSM-capable routing protocols must be enable first on the router.D.This address is a network address.Answer: DQUESTION 47Which two are advantages of static routing when compared to dynamic routing?(choose two)A.Security increases because only the network administrator may change the routing tables.B.Configuration complexity decreases as network size increases.C.Routing updates are automatically sent to neighbors.D.Route summarization iscompued automatically by the router.E.Routing traffic load is reduced when used in stub network linksF.An efficient algorithm is used to build routing tables,using automatic updates.G.Routing tables adapt automatically to topology changes.b b s .h h 010.co mAnswer: AEQUESTION 48A company has a small network,consisting of a single switch and a single router.The switch has been configured with two vlans,and route-on-a-stick is being configured on the router for inter-vlan routing.A trunk is configured to connect the switch to the router.What is the minimum number of router subinterfaces that are required for all the vlans to communicate?A.one B.three C.two D.zeroAnswer: CQUESTION 49Which command can be a router to verify the layer 3 path to a host?A.traceroute address B.tracert address C.ssh address D.telnet addressAnswer: AQUESTION 50Which dose the frame-relay interface-dlc i command configure?A.remote DLCI on the main interface B.local DLCI on the main interface C.local DLCI on the subinterface D.remote DLCI on the subinterfaceAnswer: CQUESTION 51What is the OSPF default frequency,in seconds,at which a cisco router sends hello packets on a multi-access network?A.10B.40C.30D.20Answer: AQUESTION 52Refer to the exhibt.Host A has tested connectivity to a remote network.What is the default gateway for host A?b b s .h h 010.co mA.172.16.182.1B.192.168.1.1C.10.16.176.1D.192.168.1.6Answer: AQUESTION 53Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?A.transport type allB.transport output allC.transport preferred allD.transport input allAnswer: DQUESTION 54Which command shows your active Telnet connections?A.show sessionB.show cdp neighborsC.show usersD.show queueAnswer: AQUESTION 55Which two states are the port states when RSTP has converged?(choose two)A.blocking B.learning C.disabled D.forwarding E.listeningAnswer: ADb b s .h h 010.co mQUESTION 56There are no boot system commands in a router configuration in NVRAM.What is the fallback sequence that router will use to find an ios during reload?A.Flash,TFTP server,ROM B.Flash,NVRAM,ROMC.ROM,NVRAM,TFTP serverD.NVRAM,TFTP server,ROME.TFTP server,Flash,NVRAMAnswer: A QUESTION 57Refer to the graphic.A host is connected to switch port Fa0/3 with a crossover cable.The host and switch have…as shown.However,the port indicator on switch port Fa0/3 is not on,and the host can notcommunicate with…to vlan 2 on the same switch.Based on the information given.what is the problem?A.The switch has been assigned an incorrect subnet mask.B.Switch port FA0/3 is not configured as a trunk port C.Switch port FA0/3 has been blocked by STPD.The switch and the hosts must be in the same subnetE.The cable is the wrong typeAnswer: E QUESTION 58Refer to the exhibit.Which user-mode password has just been set?A.Telnet B.Auxiliary C.SSH D.Consoleb b s .h h 010.co mAnswer: AQUESTION 59DNS servers provide what service?A.they run a spell check on host names to ensure accurate routingB.they map individual hosts to their specific IP addressC.they convert domain names into IP addressD.Given an IP address,they determine the name of the host that is…Answer: CQUESTION 60Which command enables RSTP on a switch?A.spanning-tree mode rapid-pvstB.spanning-tree uplinkfastC.spanning-tree backbonefastD.spanning-tree mode mst Answer: A QUESTION 61Which two are features of IPv6?(choose two)A.multicast B.broadcast C.allcastD.podcastE.anycast Answer: AE QUESTION 62Which statement about access lists that are applied to an interface is true?A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocolC.you can place as many access lists as you want on any interfaceD.you can apply ony one access list on any interfaceAnswer: DQUESTION 63Which item represents the standard IP ACL?A.access-list 50 deny 192.168.1.1 0.0.0.255B.access-list 110 permit ip any anyC.access-list 2500 deny tcp any host 192.168.1.1 eq 22D.access-list 101 deny tcp any host 192.168.1.1bbs.hh1.c o mAnswer: AQUESTION 64What is one benefit of PVST+?A.PVST+reduces the CPU cycles for all the switches in the networkB.PVST+automatically selects the root bridge location,to provide optimiz…C.PVST+allow the root switch location to be optimized per vlan.D.PVST+supports Layer 3 load balancing without loops.Answer: Cmoc.1hh.sbb。

路由器的配置方法

路由器的配置方法作为连接广域网WAN的端口设备,路由器已得到广泛的应用,其主要功能是连接多个独立的网络或子网,实现互联网间的最佳寻径及数据报传送。

本文以Cisc o 2511路由器为例,介绍路由器的四种配置方法。

1用Cisco路由器主控口OSOLE接VT100及兼容终端进行配置这是一种较为简便的配置方法,把终端与路由器可靠连接后,打开终端与路由器的电源,路由器的启动过程就会在终端上显示出来,当出现符号“〉”时就可以在终端上对路由器进行配置了。

如果终端上未显示路由器启动过程,可能是终端通讯端口参数配置不对,需重新配置。

2通过Win 3.X或Win 95的终端仿真程序进行配置启动Win 3.X后,用鼠标双击“附件”,再双击“终端仿真程序”,单击“ 设置”,在下拉菜单中的“终端仿真”选DEC VT—100[ANSI],“通讯”中选择参数:波特率:9600;数据位:8;停止位:1;奇偶校验:无;流量控制:Xon/Xoff;连接口:COM1或COM2(根据实际连接而定)。

以上参数配置好后,单击“文件”,在下拉菜单中单击“保存”,给配置文件起名并选择路径,单击“确定”。

下次使用时只需打开配置文件,按回车就可以进入到路由器的配置。

Win 95的配置方法与Win 3.X类似。

3在TCP/IP网上通过终端仿真Telnet进行配置在UNIX、OS/2、Win 95等操作系统上都有Telnet终端仿真程序,通过网络上的主机运行telnet 145.1.1.5(路由器的IP地址),输入正确的口令就可以登录到网络上的路由器进行配置了。

如出现了“password requir ed,but none set”,则表明路由器的vty 04中未定义口令,需加入口令。

4用TFTP Server下载的配置文件进行配置UNIX、OS/2操作系统提供了TFTP服务器的功能,以OS/2为例,在OS/2的DOS窗口下运行ftfpd显示:IBM TCP/IP OS/2版本一TFTP Server版本19:50:56 ON dEC 7 1995 已准备好通过前三种方法的某种方式登录到路由器,当出现“>”后,就可以进行配置了,下面是一个配置实例。

tcpip-chapter 5 delivery and routing of ip packets


2nd delivery:indirect,Next-hop IP = IP21
3th delivery:direct, Dst IP = IPB 怎样确定
02.10.2020
下一跳?
8
交付的含义
查路由表决定分组的下一个接收者 交付——配合物理层完成传输——地址映射
(找到IP地址对应的物理地址)
02.10.2020
5
Direct vs. Indirect Delivery • 是否需要经过路由器?
Direct delivery(直接交付) • 配合物理网络传输
分组最终目的站点与分组的交付者(发送接口)在同 一个IP网络中 将分组直接投递给目的站点
更准确:二者在逻辑上属于同一个IP网络,物理上属于同一 个物理网络
主机
直接交付:将分组交付给目的站点 间接交付:将分组交付给给默认网关(Next hop)
路由器(多条Internet连接)
直接交付:将分组交付给目的站点(从哪一个接口送出?) 间接交付:交付给下一跳路由器(从哪一个接口送出?)
交付实质上反应了路由选择的结果
A
B
Net 1
02.10.2020
尽最大努力交付,best-effort delivery
02.10.2020
4
Chapter 5 Delivery, Forwarding, and Routing of IP Packets(IP分组交、转
发和路由选择)
Connection Delivery Routing methods (Forwarding) Static vs. dynamic routing Routing table and routing module Classless addressing: CIDR
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

ACP-LPApproachtoNetworkManagementinOSPFRouting

MatsPetterPetterssonDepartmentofComputerScienceLundUniversitySwedenmatsp@cs.lth.seRadosławSzymanekCorkConstraintComputationCentreUniversityCollegeCorkIrelandradsz@4c.ucc.ieKrzysztofKuchcinskiDepartmentofComputerScienceLundUniversitySweden

kris@cs.lth.se

ABSTRACTInthispaper,weconsideraroutingproblemrelatedtothewidelyusedOpenShortestPathFirst(OSPF)proto-col,whichisconsideredachallengewithintheConstraintProgramming(CP)community.Weaddressthespecialver-sionofOSPFwhichrequiresuniqueandsymmetricalpaths.Tosolvethisproblem,weproposeanovelhybridapproachwhichcombinesCPandLinearProgramming(LP).Ourapproachemploysanewglobalconstraintwithproblem-specificfilteringalgorithmstoefficientlyremoveinconsis-tentvaluesfrompartialsolutions.Moreover,thisconstraintemploystwoLPrelaxationswhichareusedtoindicatein-feasiblepartialsolutionsdueeithertonetworkcapacitycon-straints,ortoprotocol-specificroutingconstraints.Weshowtheefficiencyofourcompleteapproachonbackbonenet-workswithhundredsofdifferentdemandstoroute.

CategoriesandSubjectDescriptorsF.4.1[MathematicalLogic]:LogicandConstraintPro-gramming

Keywordsconstraintprogramming,linearprogramming,networkrout-ing

1.INTRODUCTIONTelecommunicationroutingproblems,wheredatatrafficistoberoutedbetweenpairsofroutersinanetwork,arenat-urallymodelledasnetworkflowproblems,wheretheroutersarerepresentedbynodesandnetworklinksarerepresentedbyedgesinagraph.Trafficisspecifiedaspoint-to-pointbandwidthdemandsforallpairsofrouters.Finally,thecapacitylimitationsofthenetworkaremodelledbythere-quirementthatthetotalflowonanedgedoesnotexceedthecapacityofitscorrespondinglink.

Permissiontomakedigitalorhardcopiesofallorpartofthisworkforpersonalorclassroomuseisgrantedwithoutfeeprovidedthatcopiesarenotmadeordistributedforprofitorcommercialadvantageandthatcopiesbearthisnoticeandthefullcitationonthefirstpage.Tocopyotherwise,torepublish,topostonserversortoredistributetolists,requirespriorspecificpermissionand/orafee.SAC’07March11-15,2007,Seoul,Korea.Copyright2007ACM1-59593-480-4/07/0003...$5.00.

Mostoftoday’sexistingnetworksuseroutingprotocolsthatrestrictthesetofallowedroutes.Inthiswork,welookatfindingfeasibleroutesfortheOpenShortestPathFirst(OSPF)routingprotocol,oneofthemostcommonlyusedroutingprotocolsinbackbonenetworks.InOSPF,networkoperatorscontrolroutingbyassigningaweighttoeachlinkinthenetwork.Routerswillsendtrafficalongtheshortestpathsdefinedbytheseweights.TheversionofOSPFroutingwheremorethanoneshortestpathisallowedbetweennodepairshasbeenshowntobeNP-hard[8].WeconsideraversionofOSPFwiththefurtherrequire-mentsthateachdemandisroutedalongauniquepath,andthatroutingissymmetric,i.e.,demandsfromatobuseex-actlythesameedgesasdemandsfrombtoa.Inpractice,therearegoodreasonsforpreferringdemandstoberoutedonuniquepaths.Itproducestrafficflowsthatarepreferredbynetworkoperators,forexamplebecausepacketsalwaysarriveinthecorrectorder.Previousapproachestothestudiedproblemhavemainlyappliedmathematicalprogramming[8]andlocalsearchtech-niques[6].Onemathematicalprogrammingapproach[1]hasusedsomeconstraintstoimprovesearchperformance.OurapproachdiffersfromthisinfundamentallybeingaCPmethod,augmentedwithsomeLPrelaxations.Otherre-latedworkintheCPcommunityhasfocusedonnetworkproblemswithsinglepathroutingbutwithouttheextraweight-basedrequirementsonpathsystemsintroducedbyOSPF[4,7,9,10].Thispaperisorganizedinthefollowingway.Section2definestheproblemmoreformallyandreviewssomeofitsproperties.Inthefollowingthreesectionsourmethodisdescribed,modellingandpropagationmethodsinSection3,LPrelaxationsinSection4,andsearchcontrolinSection5.TheexperimentalresultsarepresentedinSection6,followedbyconclusionsandfutureworkinSection7.

2.BACKGROUNDInthissection,wewilldefinetheproblemweareaddress-inganddiscusssomeofitsbasicproperties.Wearegiven:

•AnundirectedgraphG=(V,E)withnnodesandmedges,representingatelecommunicationnetwork.

•Afunction,c,assigninganintegercapacitytoeachedge–theamountofavailablebandwidthonthatedge.

•Asetofpoint-to-pointdemands,eachdemandbeingrepresentedasatriple,(si,ti,bi),wheresiandtiarethesourceandthedestinationnodesofthedemand,andbiistheamountofrequiredbandwidth.

Asolutiontotheproblemisafunction,w,assigningapositiveintegerweighttoeachedge.Forasolutiontobefeasible(wearenotconsideringanyobjectivefunctioninthiswork),twothingsarerequired:

•Foreachdemand,theshortestpath(asdefinedbyw)betweenitsendpointsisunique,i.e.,thereisonlyonepathofminimallength.Werefertothesetofalluniquepathsasthepathsystemcorrespondingtow.

相关文档
最新文档