Table 29-2 Some Types of IPvé Addresses and Their First Hex Digit(s)
ptelel ea ol) elegy
Global unicast 2 or 3 (originally); all not otherwise reserved (today)
Unique local FD
Multicast FF
Link local PESO
Table 5-3 Popular Applications and Their Well-Known Port Numbers
eas ti eae a Appl
20 TCP ETP data
21 TCP ETP control
22 TCP SSH
23 TCP Telnet
25 TCP SMTP
53 upp, TCP! [DNS
67 UDP. DHCP Server
68 UDP. DHCP Client
69 UDP TETP
80 TCP HTTP (WWW)
110 TCP POP3
161 UDP SNMP.
43 TCP SSL.
514 UDP Syslog
1 DNS uses both UDP and TCP in different instances. It uses port 53 for both TCP and UDP.Table 11-2 Neighbor Requirements for EIGRP and OSPF
ag EIGRP OSPF
Interfaces must be in an up/up state. Yes Yes
Interfaces must be in the same subnet. Yes Yes
Access control lists (ACL) must not filter routing protocol messages. _| Yes Yes
Must pass routing protocol neighbor authentication (if configured). Yes ‘Yes
Must use the same ASN/PID on the router configuration command. Yes No
Hello and hold/dead timers must match. No Yes
Router IDs (RID) must be unique. No! Yes
K-values must match. Yes N/A
Must be in the same area. NIA Yes
1 Having duplicate EIGRP RIDs does not prevent routers from becoming neighbors, but it can cause prob-
lems when external EIGRP routes are added to the routing table.
‘When a router first powers on, it follows these four steps:
Step 1. The router performs a power-on self-test (POST) process to discover the hard-
ware components and verify that all components work properly.
Step 2. The router copies a bootstrap program from ROM into RAM and runs the
bootstrap program.
Step 3. The bootstrap program decides which IOS image (or the ROMMON OS) to
load into RAM, and then the bootstrap program loads the OS. After loading
the chosen OS image, the bootstrap program hands over control of the router
hardware to the newly loaded OS.
Step 4. If the bootstrap program happened to load IOS, once IOS is running, it finds
the startup-config file and loads it into RAM as the running-config.Table 2-10 Port States Compared: 802.1D STP and 802.iw RSTP
ee Ee ee
Port is administratively disabled Disabled Discarding
Stable state that ignores incoming data frames and is not | Blocking Discarding
used to forward data frames
Interim state without MAC learning and without Listening Not used
forwarding
Interim state with MAC learning and without forwarding __| Learning Learning
Stable state that allows MAC learning and forwarding of [Forwarding | Forwarding
data frames
‘The following list details the configuration steps on each router:
Step 1.
Step 2.
Step 3.
Step 4.
Step 5.
Step 6.
Use the interface tunnel number global command to create a tunnel interface.
‘The interface numbers have local meaning only and do not have to match
between the two routers.
(Optional) Use the tunnel mode gre ip interface subcommand in tunnel inter-
face mode to tell IOS to use GRE encapsulation on the tunnel. (This is the
default setting for a tunnel interface)
Use the ip address address mask interface subcommand to assign an IP
address to the tunnel interface, using a subnet from the secure network's
address range. The two routers on the tunnel should use addresses from the
same subnet.
Configure the tunnel’s source IP address in the unsecured part of the network
in one of two ways. Regardless of the method, the local router’s source IP
address must match the other router's tunnel destination.
Step 4A. Use the tunnel source ip-address tunnel interface subcommand to
directly set the tunnel’s source IP address.
Step 4B. Use the tunnel source inrerface-id tunnel interface subcommand to
indirectly set the tunnel’s source IP address by referencing an inter-
face on the local router.
Use the tunnel destination (ip-address | hosrmame} command to configure
the tunnel’s destination IP address in the unsecured part of the network. (This
value must match the IP address used by the other router as its tunnel source
IP address)
‘Add routes that use the tunnel by enabling,a dynamic routing protocol on the
tunnel or by configuring static IP routes.