CISCO
STUDY GUIDE
Cisco Support
Exam 640-506
Edition 1
www.testkiller.com
Congratulations!!
You have purchased a TestKiller, Ltd. Study Guide.
This study guide is a selection of keypoints you will need to know to pass
the official CCNP Support 640-506 exam. Study and memorize the
following concepts, keypoints and problems for approximately 15 to 20
hours and you will be prepared to take the exams. We guarantee it!
Remember, average study time is 15 to 20 hours and then you are ready!!!
GOOD LUCK!
DISCLAIMER
This study guide and/or material is not sponsored by, endorsed by or affiliated with Cisco
Systems, Inc. Cisco®, Cisco Systems®, CCDA™, CCNA™, CCDP™, CCNP™,
CCIE™, CCSI™, the Cisco Systems logo and the CCIE logo are trademarks or registered
trademarks of Cisco Systems, Inc. in the United States and certain other countries. All
other trademarks are trademarks of their respective owners
.
Guarantee
If you use this study guide correctly and still fail the exam, send your official
score notice and mailing address to:
TestKiller, Ltd.
8200 Pat Booker Rd. #368
San Antonio, TX 78233
We will gladly refund the cost of this study guide. However, you will not
need this guarantee if you follow the above instructions.
This material is protected by copyright law and international treaties.
Unauthorized reproduction or distribution of this material, or any portion
thereof, may result in severe civil and criminal penalties, and will be
prosecuted to the maximum extent possible under law.
Copyright 2001 TestKiller, Ltd. All Rights Reserved
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
i
Table of Contents
The Complexity of Internetworks....................................................................................... 1
Protocol Characteristics ...................................................................................................... 1
Reliable vs. Unreliable Protocol Characteristics ............................................................ 1
Connection-Oriented Services vs. Connectionless Services........................................... 1
Token Rings .................................................................................................................... 1
FDDI – Fiber Distributed Data Interface ........................................................................ 2
AppleTalk ....................................................................................................................... 2
Troubleshooting ATM .................................................................................................... 2
Troubleshooting Frame Relay......................................................................................... 2
Cisco Routing and Switching Processes............................................................................. 2
Routing............................................................................................................................ 2
Switching ........................................................................................................................ 3
Interface Buffers ............................................................................................................. 3
General Troubleshooting Tools .......................................................................................... 4
Low-End Cable Test Equipment..................................................................................... 4
High-End Cable Testers.................................................................................................. 4
Cisco Management and Diagnostic Tools .......................................................................... 4
Cisco Management Tools ............................................................................................... 4
Cisco Diagnostic Commands.......................................................................................... 4
Routing and Routed Protocol Troubleshooting .................................................................. 4
Troubleshooting TCP/IP Connectivity ........................................................................... 4
Troubleshooting Novell Connectivity............................................................................. 5
Troubleshooting AppleTalk Connectivity ...................................................................... 5
AppleTalk Router Diagnostic Commands .................................................................. 5
Debug Apple events:................................................................................................... 5
AppleTalk Data Stream Protocol ................................................................................ 5
AppleTalk Session Protocol........................................................................................ 5
AppleTalk Printer Access Protocol............................................................................. 6
Diagnosing and Correcting Catalyst Problems ............................................................... 6
Bridge vs. Switch........................................................................................................ 6
VLAN Frame Tagging with ISL................................................................................. 6
Troubleshooting VLANs on Routers and Switches........................................................ 6
Diagnosing and Correcting Frame Relay Problems........................................................ 6
Frame Relay Frame Format ........................................................................................ 6
WAN and Frame Relay Diagnostic Tools .................................................................. 7
Frame Relay Loopback Tests...................................................................................... 7
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
1
Key Concepts
Cisco Support
The Complexity of Internetworks
As more advanced technologies and services are introduced into the field of information
processing and communications, the resulting internetworks are becoming increasingly
complex. The problem-solving model includes the following steps:
1. Define the problem
2. Gather the facts
3. Consider the possibilities
4. Create an action plan
5. Implement the action plan
6. Observe the results of the action plan
7. Repeat the problem solving process
8. Resolve the problem
Protocol Characteristics
Reliable vs. Unreliable Protocol Characteristics
• Reliable protocol - error correction, flow control and retransmission functionality
built in.
• Unreliable protocol – reliability provided by higher-layer protocols.
Connection-Oriented Services vs. Connectionless Services
• Connection-oriented - flow control, error control and session termination.
Examples of this include TCP and ATM.
• Connectionless services -no connection setup between the two communicating
protocol entities. UDP is an example.
Token Rings
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
2
IBM technology that consists of a token that is 3 bytes long. It has a start delimiter, an
access protocol byte and an end delimiter. Data/command frames vary in size and are
dependent on the size of the data field.
FDDI – Fiber Distributed Data Interface
The use of optical fiber as a transmission medium is the most important characteristic.
Fiber offers some advantages over traditional copper wiring:
• Security - does not emit electrical signals that can be tapped.
• Reliability - immune to electrical interference.
• Speed - much higher throughput potential than copper cable.
AppleTalk
AppleTalk’s transport layer consists of:
• Routing Table Maintenance Protocol (RTMP)
• AppleTalk Update-Based Routing Protocol (AURP)
• AppleTalk Echo Protocol (AEP)
• AppleTalk Transaction Protocol (ATP)
• Name Binding Protocol (NBP).
Troubleshooting ATM
Allowed encapsulation methods are AAL5, PVC and SVC. ISL contains header, original
packet, and FCS fields. ISL not directly supported by ATM, but can be implemented in
ATM LANE configuration.
Troubleshooting Frame Relay
Typical problems include frame relay links down, inability to ping remote routers, or
inability to ping end-to-end. You must ensure that both Cisco devices are using IETF
encapsulation method.
Cisco Routing and Switching Processes
Routing
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
3
The routing process moves packets based on the source, destination, and network
conditions. Routing protocols identify the best path(s) to use routing packets to the
outbound, using one or more of the router interfaces.
Switching
As part of the switching process, the router moves the packet(s) from the appropriate
interface to the destination address.
The basic switching paths are:
• Process switching
• Fast Switching
• Silicon Switching/Autonomous Switching
• Optimum Switching
• Distributed Switching
• NetFlow Switching
Switching features that affect performance include:
• Queuing
• Random early detection
• Compression
• Filtering (access lists)
• Encryption
• Accounting
Interface Buffers
The interface buffers on the SP (Switch Processor) card are used for buffering packets
copied from interface processors. The SP and SSP (Silicon Switch Processor) controllers
have 512 KB available for packet buffering.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
4
General Troubleshooting Tools
Low-End Cable Test Equipment
At the low-technology end of the spectrum of test equipment the following equipment is
used:
• Volt-Ohm Meters
• Digital Multimeters
High-End Cable Testers
Higher technological advancements include:
• Time Domain Reflectometer (TDR)
Cisco Management and Diagnostic Tools
Cisco Management Tools
• Cisco Works
• Netsys Network Management Suites
• TrafficDirector Remote Monitoring Software
• The VlanDirector Switch Management Application
• WAN Manager
Cisco Diagnostic Commands
• show
• debug
• ping
• trace
• cdp
• core dump
Routing and Routed Protocol Troubleshooting
Troubleshooting TCP/IP Connectivity
Four main diagnostic commands include:
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
5
• ping – connectivity test which is actually an Internet Control Message Protocol
(ICMP) echo test packet.
• trace – traces path from source to destination.
• show – details information about interface conditions, protocol status, neighbor
reachability and traffic.
• debug – analyzes packets; generates high amount of output and may adversely
affect production networks.
Troubleshooting Novell Connectivity
Three diagnostic commands are primarily used to troubleshoot Novell Networks:
• ping – works only on Cisco routers running Cisco IOS 8.2 or later.
• show – details information about interface conditions, protocol status,
neighborhood reachability and traffic.
• debug – analyzes packets; generates high amount of output and may adversely
affect production networks.
Troubleshooting AppleTalk Connectivity
AppleTalk Router Diagnostic Commands
• show
• test Apple
• debug
Debug Apple events:
Displays information about AppleTalk special events such as if neighbors are
reachable/unreachable or if interfaces go up/down.
AppleTalk Data Stream Protocol
This protocol guarantees data bytes are delivered in the same order as they are sent and
that they are not duplicated.
AppleTalk Session Protocol
Session Protocol establishes and maintains logical conversations between an AppleTalk
clients and the server. ASP is considered a session layer protocol.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
6
AppleTalk Printer Access Protocol
Printer Access Protocol is a connection-oriented protocol responsible for establishing and
maintaining connections between clients and servers.
Diagnosing and Correcting Catalyst Problems
Bridge vs. Switch
Functionality
Bridge
Switch
Pass packets between network segments
Yes
Yes
OSI layer
DataLink
DataLink
Filtering Software
Hardware
(ASIC)
VLAN Frame Tagging with ISL
ISL is used over point-to-point connections to interconnect two VLAN capable Cisco
products such as Catalyst 5000 and higher series switches and Cisco 2600 and higher
series routers.
Troubleshooting VLANs on Routers and Switches
• To configure a VLAN use RSM in the Catalyst 5000 switch or attach a router,
with a FastEthernet or Gigabit Ethernet interface, to a VLAN trunking port using
ISL encapsulation.
• Incorrect VLAN trunking protocol configuration will cause a VLAN to be slow or
malfunction.
• When a line protocol Frame Relay is down, check for timing problems with
myseq and myseen keep-alive events. Command to show: debug serial
interface.
Diagnosing and Correcting Frame Relay Problems
Although Frame Relays is a Layer2 datalink protocol, when Frame Relay problems occur
you should first check the lower-layer hardware interface.
Frame Relay Frame Format
Congestion-related bit positions in the frame are:
• FECN
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
7
• BECN
• DE
WAN and Frame Relay Diagnostic Tools
The show and debug commands are designed for the purpose.
Frame Relay Loopback Tests
1. Do the local loopback test with LMI.
2. Try the local test on the other side LMI.
3. If LMI come up, but you cannot get a non-LMI DLCI to the remote interface
to carry other traffic, contact the service provider.
4. The frame relay service can perform remote loop tests and will be more
willing to do so if you have already eliminated the local loops as a possible
cause of the problem.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
8
WARNING: It is important that you read and study the
“CCNP Keypoints” portion of this study guide. We have
identified important “KEYPOINTS” in this section.
Please ensure that you absolutely know and understand
these prior to sitting for the exam.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
9
Support Troubleshooting Keypoints
1. When delivering service related to trouble tickets, the Customer Support Engineer
(CSE), will consider the following:
• The details of the warranty and service contact.
• The type of problem and the priority level of the call.
• An assessment of the severity of the network degradation.
• The equipment involved and the amount of network downtime.
2. A fiber-optic cable tester is commonly used to measure attenuation (signal loss) and
return loss for wavelengths.
3. A time domain reflector (TDR) is commonly used to locate opens, shorts, crimps,
links, sharp bends, impedance mismatches, and other defects in cables.
4. Browsing problems can occur when several Windows NT devices are set up as master
browsers and send inconsistent updates.
5. A Protocol Analyzer is used periodically to record, interpret, and display how a
communication protocol operates in the network architecture.
6. The first step for troubleshooting Windows NT/95 TCP/IP networks is to determine if
the local host configuration is correct.
7. After isolating a problem to a specific device such as a router or switch, the next step
is to isolate the problem within the specific device.
8. The show ip arp command is used to check if hosts are listed in the IP routing table.
The routing table shows the correspondence between network (IP) and LAN
hardware (MAC) addresses.
9. A switched Ethernet interface on a Catalyst switch provides greater access to
bandwidth as compared with a hub. It can connect directly to end users or other
switches.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
10
10. The show frame-relay map command displays information about a configured
association between a DLCI and another protocol.
11. Identifying IP as the selected ping protocol in the privileged mode for TCP/IP, allows
you to check for MTU, set data patterns, set a source address, and record the route
used.
12. BRI layer 1 activation on the S/T interface occurs immediately after the TE and NT
synchronize and NT sends A = 1.
13. CCO Documentation is a web-based Cisco resource for the list of field replaceable
units when in need of spare parts.
14. The Cisco NetSYS tools are used for network simulation and modeling.
15. The Software Center is a CCO web-based resource for major code upgrades and
maintenance releases of Cisco software products.
16. The output of the Cisco IOS show controllers token command will count isolating
and non-isolating errors.
17. A connectionless protocol, such as UDP, requires an application to request
retransmission of missing or corrupt packets s since the receiving device will not
know that the packets were dropped or lost.
18. Speed is the main advantage of a connectionless protocol.
19. The debug IP icap command will check if the router is sending or receiving ICMP
messages.
20. The service timestamps {log|debug} uptime [msec] command will allow you to
configure the router to indicate how long after the system rebooted that events
occurred.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
11
21. The show tech-support command can you use to obtain a comprehensive output of a
router’s condition that can be sent to your tech support engineer.
22. The ipx ping-default Novell command sets the non-default ping to correspond to
Novell’s NLSP specification.
23. After initiating an action plan to resolve a network problem, the network still
continues to perform poorly, you should iterate the process and, as required, undo the
changes that did not work.
24. A switched VLAN corresponds to a single-routed subnet.
25. Process switching is relatively slow when tracing the process of packet flow in a
router such as the Cisco 7000 series. This is due to the fact it must interrupt the RSP
for the time is takes to copy the packet from the SP to the RSP.
26. Know the following facts about the ping ipx command:
• This command works on Cisco IOS software Release 8.2 or later.
• This command was part of Cisco’s IOS software before a ping command was
developed by Novell.
• With the privileged form of the command, a higher repeat count than five (the
default) can be specified.
• Many of the command’s return characters are comparable to those used with a
ping in the IP protocol stack.
27. Statistics, events, history, and alarms are the RFC1757 RMON groups supported by
the embedded RMON agent and SwitchProbe functions.
28. The application-specific integrated circuits (ASIC) or hardware-based filtering
perform bus arbitration on a single switching bus of the Catalyst 5000. They control
how packets access the backplane as they transfer to destinations on the switch.
29. The show config Catalyst 5000 command is comparable to the router’s Cisco IOS
software command, show running-config.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
12
30. The WINS protocol used with Windows NT/95 is routable in its native operation.
31. To compare abnormal network performance or to plan for network expansion, use the
baselining profile.
32. Quality of service management is a key network management area that is NOT one of
the ISO defined functional areas of network management.
33. A cable tester is commonly used to check STP, UTP, 10BaseT, and coax for near-end
crosstalk, and noise.
34. The debug ip rip command checks for routing packets in a network that uses TCP/IP
and RIP (Routing Information Protocol).
35. Cisco routers can use IEEE 802.1Q LANs to/from IEEE 802.10 FDDI translation to
augment VLAN operation on Catalyst switches by performing VLAN translation.
36. The show version command can be used to:
• Gather initial facts about a router’s system hardware.
• Determine how long the system has been up.
• Determine the general situation that caused the last system boot-up.
37. When troubleshooting PPP CHAP authentication for ISDN BRI, check to make sure
that the password and router name configured on the local router is equal to the
password and TE name on the remote router.
38. Know the following four facts about the inter-switch link (ISL) specification:
• ISL adds an extra 30 bytes to the frame.
• ISL is for point-to-point connections only.
• ISL can support token ring as well as Fast Ethernet.
• ISL adds or removes its frame tagging and FCS fields for traffic between
VLAN capable Cisco products.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
13
39. The Catalyst 5000 switched port analyzer, the port that mirrors traffic to a protocol
analyzer, is identified by the destination module/port identifier.
40. Collisions only occur in a shared Ethernet environment, thus a switched Ethernet
domain does NOT cause slow or unreliable performance on a VLAN.
41. If the show ipx traffic command shows the bad hop count increasing, there may be a
back-door bridge between segments.
42. The show interface command IOS software provides several diagnostic commands to
help you troubleshoot ISDN BRI from a local router to a remote router.
43. The debug ip packet command displays the flow of IP packets transmitted between
local and remote hosts.
44. Contact your service provider and state that you are having problems with the LMI, if
you are checking the frame relay PVCs and only the local DLCI.0 or DLCI.1023 will
come up.
45. You can check the RJ-45 connector at both ends of a cable to determine if it is
crossover or straight through.
46. The debug arp command is used to determine if the router is sending and receiving
ARP requests/retries.
47. The four Cisco IOS commands used to check for data link protocol characteristics
are:
• show interface
• clear counters
• show controller
• show cdp neighbor
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
14
48. The output of the Cisco IOS show appletalk traffic command will increment the
count for encapsulation failed errors if the encapsulation of a DDP packet fails, or the
AppleTalk ARP fails.
49. When troubleshooting a crash or hung system, a Cisco Support Engineer (CSE) will
ask for output from a show stack and a core dump.
50. Inspect the Port link LED on the switching module to check for an indication of an
active link state on a Catalyst port.
51. You must check for a line in the output of the show interface command to see how
long it has been since the counters have been cleared so that the count can renew.
52. Routers will autosense an LMI type on the Frame Relay DTE/DCE.
53. The show log command on a Catalyst switch is used to check for error messages if
system messages are redirected to another destination.
54. Graphical user interface applications for high-end tools in troubleshooting and
managing Catalyst switches are found at CWSI.
55. When troubleshooting a connectionless protocol, it is usually helpful to check if there
are problems indicated by a connection-oriented upper layer.
56. When troubleshooting a connection-oriented protocol, a key symptom to look for is
multiple retransmission of data segments.
57. A lobe cable failure on the ring will cause transitions to come from a growing number
of interface resets.
58. By default, the output of debug and system error messages are sent to the console
terminal.
59. Logging to an internal buffer produces the lowest overhead.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
15
60. Novell-Ether is the Cisco IOS term used as the equivalent to Novell 802.3 raw (called
ETHERNET_802.3 in NetWare).
61. Routers use process switching when you are using the problem diagnostics of a Cisco
IOS debug command.
62. “Defining the problem” is the troubleshooting process step that involves a set of
symptoms and associated causes.
63. If a host wants to initiate a session in the TCP connection sequence, or wants to
acknowledge that it has received an initiation request, it will send a TCP ACK packet.
64. The service timestamps command keeps track of when debug elements occurred and
the duration of time between events.
65. Phase1/Phase2 incompatibility is likely to cause inability to see zones or services
outside a given router’s own network.
66. The purpose of VLAN Trunking Protocol (VTP) is to ensure there is a trunk or
VLAN1 operating.
67. A host that wants to initiate a session in the Novell connection sequence must
perform the following steps, in the following order, before the client can send NCP
requests to log in to a server:
1. Broadcast a SAP GNS request.
2. Receive a GNS reply.
3. Send a RIP request to find a route.
4. Receive a RIP reply.
68. The show cdp neighbors detail command is used to see information about Cisco
devices across a data link.
69. When checking that switches and routers are consistently configured for VLANs,
VLAN ID 1 is used for management and troubleshooting only.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
16
70. It is not a cause for a complete interface reset if interface counters clear with the clear
interface command.
71. A CSE will ask for output from show interface and show protocol in situations
involving diagnosing lost data or performance problems, or isolating partial loss of
system function.
72. Four ways to handle the debug tool in Cisco IOS software:
• Reduce the scope of the debug by checking events.
• Turn off the debug after you finish with your diagnostics.
• Be aware of debug’s processing switching implications.
• Limit the impact of debug checking by using access lists.
73. Catalyst 5000 troubleshooting begins with the Catalyst 5000 module located in the
top slot of the chassis. This slot contains the console and network ports in the
supervisor engine module.
74. IP access lists can cause IP data to be unintentionally filtered by one or more router
interfaces.
75. The show trunk [module/port] command checks a module/port, and displays the
trunking status, VLAN active status, and VLANs that can use the link.
76. A router is sometimes called router-on-a-stick because it can run Spanning-Tree
Protocol and operate as an aggregation point for inter-VLAN routing between
multiple VLAN switches.
77. In the output of the Cisco IOS show ipx traffic command, incrementing count in the
format errors counter usually indicate a corrupted header in the packets that
encountered a bad hop count.
78. If certain TCP/IP protocol services are available, but not others, the extended IP
access list may be not properly configured.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
17
79. Pins 3, 4, 5, and 6 are the key pins used for ISDN signal connections.
80. Configuration mismatch is the source of a common Novell network problem where
inconsistent frame types are used by the IPX clients and servers.
81. Switching is more affected by lower latency than routing because it can move
packets, frames, or cells from buffer to buffer with simpler determination of traffic
source and destinations.
82. During the Catalyst 5000 power-up sequence, when you see the LEDs flash, the
power-up sequence is under way and not yet completed.
83. A Catalyst physical port that is a trunk can be several spanning trees. On this shared
topology, loops in one spanning tree can have a media load impact on other spanning
trees.
84. You can reduce spanning-tree protocol BPDU traffic during extended periods of
instability for VLANs by setting forward delay and max-age timers to maximum
values.
85. The ISDN BRI physical frame is 48 bits in length. At 4000 frames per second, it
provides 192 Kbps. Know the following four facts about the use of this bandwidth:
• The 2B+D occupies the entire frame.
• Some bits of the ISDN BRI frame are used for synchronization and
collision avoidance.
• On the local loop, full-duplex logical channels coexist using time-division
multiplexing.
• The A bit of the ISDN BRI frame is used during line startup to indicate
physical layer activation.
86. Configuring IP address on the main interface of VLANs that are setup using a
router’s Cisco IOS software is not necessary.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
18
87. The “carrier transitions” command output line will most accurately reflect the
stability of the frame reply provider’s facility (the number of times that DCD has
changed state).
88. The incorrect interpretations of Q.931 exchanges sent between a Cisco router and an
ISDN switch can be caused by the argument being incorrect for the command ISDN
switch-type.
89. Configuring a VTP server off line and then connecting it to the network may cause
inconsistency by advertising an inaccurate revision of the domain.
90. You can explicitly set the trunk for the VLANs to be on, if you notice that there is a
disagreement about the VLANs configured on a Catalyst 5000 trunk.
91. Proper handling of Cisco troubleshooting tools:
• You need to know the impact of tools on router performance.
• You need to know the most selective focused use of the tools.
• You need to know how to minimize the impact of tools on other processes.
• You need to know how to stop the tool operation when you finish
troubleshooting.
92. A router within a VTP domain can be transparent (forward messages) for VTP.
93. The routing process assesses the destination and source of traffic.
94. To determine what initiated a BRI call, you need to check the DDR with a dial string
to a destination trigger.
95. During troubleshooting, you can ensure TCP/IP problems are not with the domain
name system (DNS) by using IP addresses rather than domain names.
96. The debug apple zip command reports the discovery of new zones.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
19
97. IEEE 802.1D and VLAN Trunking Protocol (VTP) are options used by basic LAN
switching.
98. A router having a count of over-runs or under-runs usually indicates that there is a
problem with the interface hardware.
99. The show spantree command on a Catalyst 5000 switch will allow you to observe
spanning-tree port states such as disabled, blocking, listening, learning, forwarding,
etc.
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
20
Support Troubleshooting
Practice Problems
1. Given the sample LAN protocol analyzer capture for IPX, which two troubleshooting
facts can be derived from the exhibited packet?
IPX: --------IPX Header---------
IPX:
IPX: Checksum = FFFF
IPX: Length = 224
IPX: Transport control = 00
IPX: 0000. . . . = Reserved
IPX: . . . . 0000 = Hopcount
IPX: Packet type = 0 (Novell)
IPX:
IPX: Dest network Node = 1000.FFFFFFFFFFFFF Socket = 1106 (SAP)
IPX: Source Network Node = 1000.02.60.8C.C2.SC.79, Socket=1106 (SAP)
A:
This is a broadcast packet.
This portion of the frame is a network layer protocol.
2. This is a sample of a LAN protocol analyzer capture. Which troubleshooting fact can
be derived from the exhibited packet?
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
21
DDP: -------DDP Header -------
DDP:
DDP: Hop Count = 0
DDP: Length = 119
DDP: Checksum = 396A (correct)
DDP: Destination network number = 0
DDP: Destination node = 225
DDP: Destination socket = 1(RTMP)
DDP: Source network number = 1140
DDP: Source node = 100
DDP: Source socket = 1 (RTMP)
DDP: DDP protocol type = 1 (RTMP data)
DDP:
A:
This is a Apple Talk routing information packet.
3. In this sample LAN protocol analyzer capture, what does SNAP mean in the packet?
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
22
DLC:------DLC Header-------
DLC:
DLC: Frame 1 arrived at 15:05:33:389, frame size is 62 (003E hex) bytes
DLC: AC: Frame priority 0, Reservation priority 0, Monitor count 0
DLC: FC: LLC frame PCF attention code: None
DLC: FS: Addr recognized indicators: 00, Frame copied indicators: 00
DLC: Destination = Station cisco A05903
DLC: Source = Station IBM 0AE591
DLC:
LLC: LLC Header
LLC:
LLC: DSAP = AA, SSAP = AA, command, Unnumbered frame, UI
LLC:
SNAP: SNAP Header
SNAP:
SNAP: Type = 0800 (IP)
SNAP:
A:
Subnetwork access protocol
4. In this LAN protocol analyzer capture, which troubleshooting fact can be derived?
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
23
DLC: -------DLC Header-------
DLC:
DLC: Frame 2 arrived at 14:53:37:6592 frame size is 60(D03C hex) bytes
DLC: Destination = FF FF FF FF FF FF
DLC: Source = Station cisco 01 56 AB
DLC: Ethertype = 0806 (ARP)
DLC:
ARP: --------ARP/RARP frame-------
ARP:
ARP: Hardware type = (10MB ETHERNET)
ARP: Protocol type = 0800 (IP)
ARP: Length of hardware address = 6bytes
ARP: length of protocol address = 4bytes
ARP: Opcode I (ARP Request)
ARP: Sender’s hardware address = cisco 0156AB
ARP: Sender’s protocol address = [144.251.100.204]
ARP: Target hardware address = 00 00 00 00 00 00
ARP: Target protocol address = [144.251.100.100]
A:
The purpose is to find the Ethernet address of 144.251.100.100
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
24
Index
AEP ....................................................... 2
AppleTalk ............................... 2, 5, 6, 14
ASP ....................................................... 5
ATM.................................................. 1, 2
ATP ....................................................... 2
AURP.................................................... 2
bandwidth........................................ 9, 17
BECN.................................................... 7
BRI.............................. 10, 12, 13, 17, 18
bridge .................................................. 13
buffers ................................................... 3
Catalyst 5000 ...................... 6, 16, 18, 19
CCO Documentation........................... 10
cdp ............................................ 4, 13, 15
Cisco Works.......................................... 4
Compression ......................................... 3
Connectionless .................................... 10
connection-oriented..................... 1, 6, 14
copper cable .......................................... 2
CSE ........................................... 9, 14, 16
DE ......................................................... 7
debug ... 4, 5, 6, 7, 10, 12, 13, 14, 15, 16,
18
Debug.................................................... 5
Diagnostic Tools ............................... 4, 7
Distributed Switching ........................... 3
DLCI ......................................... 7, 10, 13
encapsulation............................... 2, 6, 14
Encryption............................................. 3
error correction...................................... 1
Ethernet ............................... 9, 12, 13, 23
Fast Switching....................................... 3
FDDI ............................................... 2, 12
FECN .................................................... 6
Filtering................................................. 3
flow control........................................... 1
frame relay .................................. 2, 7, 13
Frame Relay ............................ 2, 6, 7, 14
Frame Tagging...................................... 6
ICMP................................................... 10
IETF ...................................................... 2
IPX ................................................ 17, 20
ISDN ................................. 12, 13, 17, 18
ISL............................................... 2, 6, 12
keep-alive.............................................. 6
LMI ........................................... 7, 13, 14
loopback................................................ 7
Management Tools................................ 4
Multimeters........................................... 4
Name Binding Protocol......................... 2
NBP....................................................... 2
NetFlow Switching ............................... 3
Netsys Network Management Suites .... 4
Novell............................ 5, 11, 15, 17, 20
optical fiber ........................................... 2
Optimum Switching.............................. 3
packets............... 3, 10, 11, 12, 13, 16, 17
ping ................................... 2, 4, 5, 10, 11
point-to-point .................................. 6, 12
problem solving model ......................... 1
Process switching.................................. 3
protocol .. 1, 2, 5, 6, 9, 10, 11, 12, 13, 14,
16, 17, 20, 21, 22, 23
Protocol Analyzer ................................. 9
PVC....................................................... 2
Queuing................................................. 3
RMON................................................. 11
routing................. 3, 9, 12, 16, 17, 18, 21
Routing Table Maintenance Protocol ... 2
RTMP.............................................. 2, 21
Security ................................................. 2
session layer .......................................... 5
show. 4, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15,
16, 19
Silicon Switching.................................. 3
SSP........................................................ 3
SVC....................................................... 2
Switches ................................................ 6
switching........... 3, 11, 14, 15, 16, 17, 19
TCP ................. 1, 4, 9, 10, 12, 15, 16, 18
TDR....................................................... 9
TDRs ..................................................... 4
The VlanDirector Switch Management
Application........................................ 4
www.testkiller.com
GFI - Security & Communication tools for NT/2000: FAXmaker fax server software, Mail essentials email
content checking & anti-virus software and LANguard network security software.
http://www.gfi.com/tt.shtml
25
throughput............................................. 2
token.......................................... 2, 10, 12
trace.................................................. 4, 5
TrafficDirector Remote Monitoring
Software ............................................ 4
transport layer ...................................... 2
trunking........................................... 6, 16
Update-Based Routing Protocol ........... 2
VLAN ............... 6, 11, 12, 13, 15, 16, 19
Volt-Ohm Meters .................................. 4
WAN Manager...................................... 4