Network Protocols and File Maintenance
86 Questions
9 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the first step when copying an IOS image to a device using TFTP?

  • Check the configuration file in NVRAM
  • Copy the IOS image file from the TFTP server
  • Ping the TFTP server (correct)
  • Verify the amount of free flash space
  • What command is used to verify free flash space on the device before an IOS image transfer?

  • check flash space
  • show version
  • show flash: (correct)
  • verify flash
  • During the IOS image transfer process, what information is the user prompted to provide?

  • Source file name and DNS server address
  • IP address of the remote host and destination file name (correct)
  • IP address of the router and source file name
  • Source file name and destination directory
  • What does the boot system command do during device startup?

    <p>Specifies the IOS software image to load</p> Signup and view all the answers

    What is the primary purpose of having multiple boot system commands in sequence?

    <p>To provide a fault-tolerant boot plan</p> Signup and view all the answers

    What command is used to verify the current working directory when accessing NVRAM?

    <p>pwd</p> Signup and view all the answers

    Which command would you use to list the contents of the NVRAM directory?

    <p>dir</p> Signup and view all the answers

    What is the purpose of the startup-configuration file in NVRAM?

    <p>To contain the configuration loaded on boot</p> Signup and view all the answers

    Which command is equivalent for viewing file systems on a Cisco 2960 Switch?

    <p>show file systems</p> Signup and view all the answers

    How can configuration files be backed up using Tera Term?

    <p>By selecting Log from the File menu</p> Signup and view all the answers

    What should be done first to save a configuration file in Tera Term?

    <p>Click on the File menu</p> Signup and view all the answers

    What type of images can be uploaded and downloaded with the Cisco 2960 switch?

    <p>Software images</p> Signup and view all the answers

    If you want to access the files stored in NVRAM, what command must you use first?

    <p>cd</p> Signup and view all the answers

    What is Tera Term primarily used for in relation to configuration files?

    <p>To back up and log configuration files</p> Signup and view all the answers

    Which of the following best describes the startup-configuration file?

    <p>The configuration loaded when the device starts</p> Signup and view all the answers

    What is the primary function of the software clock on a router or switch?

    <p>To serve as a time source when the device boots</p> Signup and view all the answers

    Why is it important to synchronize time across all devices on a network?

    <p>To accurately determine the order of events</p> Signup and view all the answers

    Which of the following methods can be used to set the date and time on a router or switch?

    <p>Manually configure or use NTP</p> Signup and view all the answers

    What command is used to manually set the time on a router?

    <p>R1# clock set 20:36:00 nov 15 2019</p> Signup and view all the answers

    What message indicates that the system clock has been updated on a router?

    <p>%SYS-6-CLOCKUPDATE: System clock has been updated</p> Signup and view all the answers

    What can occur if devices on a network are not synchronized in terms of their time settings?

    <p>Event order determination will be compromised</p> Signup and view all the answers

    What is a potential risk of manually configuring the date and time on a router?

    <p>It could lead to inconsistencies in event logging</p> Signup and view all the answers

    What problem might arise from configuring time settings on devices independently, without using NTP?

    <p>Difficulty in correlating events across devices</p> Signup and view all the answers

    What is the initial step to enter ROMMON mode on a Cisco device?

    <p>Use a break sequence during boot up</p> Signup and view all the answers

    What command is used to set the configuration register for password recovery?

    <p>confreg 0x2142</p> Signup and view all the answers

    What happens after setting the configuration register to 0x2142?

    <p>The device will ignore the startup config file</p> Signup and view all the answers

    Which command should be entered after changing the configuration register to start the device?

    <p>reset</p> Signup and view all the answers

    During the password recovery process, what mode does the device display after executing the break sequence?

    <p>ROMMON mode</p> Signup and view all the answers

    What should you do to restart the device after setting the configuration register?

    <p>Use the reset command</p> Signup and view all the answers

    What is the purpose of copying the startup-config to the running-config?

    <p>To apply the configuration settings at runtime</p> Signup and view all the answers

    What information is typically omitted in the output displayed in ROMMON mode?

    <p>Device's current configuration</p> Signup and view all the answers

    If a user interrupts the boot process and enters ROMMON mode, what prompt is displayed?

    <p>rommon 1 &gt;</p> Signup and view all the answers

    What is the main reason for utilizing ROMMON mode in Cisco devices?

    <p>To perform password recovery</p> Signup and view all the answers

    What is the primary function of SNMP agents?

    <p>To collect and store information about the device and its operation</p> Signup and view all the answers

    Which UDP port does the SNMP manager use to poll the SNMP agents?

    <p>UDP port 161</p> Signup and view all the answers

    What are the two primary SNMP manager requests?

    <p>Get and set</p> Signup and view all the answers

    What role does the Management Information Base (MIB) play in the SNMP system?

    <p>It contains information about the device and operational statistics</p> Signup and view all the answers

    In the context of SNMP, what does the 'set' action do?

    <p>It changes configurations on an SNMP agent and can trigger actions</p> Signup and view all the answers

    What is the purpose of SNMP traps?

    <p>To send alerts or information directly to the SNMP manager</p> Signup and view all the answers

    Who has access to the Management Information Base (MIB)?

    <p>Only authenticated remote users</p> Signup and view all the answers

    What is one of the main components of the SNMP system?

    <p>Management Information Base (MIB)</p> Signup and view all the answers

    Which statement describes the SNMP manager's responsibilities?

    <p>Collecting information and changing configurations of SNMP agents</p> Signup and view all the answers

    What does the get-request do in SNMP?

    <p>Retrieves a value from a specific variable</p> Signup and view all the answers

    The boot system command is used to load a new IOS image during bootup from the router's RAM.

    <p>False</p> Signup and view all the answers

    Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) are used for network device discovery.

    <p>True</p> Signup and view all the answers

    The command 'show clock detail' provides in-depth information about the system clock settings.

    <p>True</p> Signup and view all the answers

    The Network Time Protocol (NTP) helps devices synchronize their time settings independently without a central reference.

    <p>False</p> Signup and view all the answers

    The Management Information Base (MIB) is exclusively accessible to SNMP agents.

    <p>False</p> Signup and view all the answers

    The command 'cdp enable' activates the Cisco Discovery Protocol on the device.

    <p>True</p> Signup and view all the answers

    The command 'ntp server ip-address' is used to configure the NTP settings on a Cisco device.

    <p>True</p> Signup and view all the answers

    Stratum levels in NTP indicate the number of hops away from a time source.

    <p>True</p> Signup and view all the answers

    The software clock on a router or switch begins counting when the system is powered off.

    <p>False</p> Signup and view all the answers

    NTP is used for synchronizing the time across all devices in a network.

    <p>True</p> Signup and view all the answers

    It is impossible to determine the order of events if the time is not synchronized between devices on a network.

    <p>True</p> Signup and view all the answers

    A router's clock can only be set manually and cannot be configured automatically.

    <p>False</p> Signup and view all the answers

    The command 'clock set 20:36:00 nov 15 2019' is used to manually configure the date and time on a Cisco router.

    <p>True</p> Signup and view all the answers

    When the system clock of a router is updated, it displays a message indicating the previous time setting.

    <p>True</p> Signup and view all the answers

    Configuring time settings independently on devices can lead to accurate time reporting.

    <p>False</p> Signup and view all the answers

    The primary source of time for a Cisco device is generated from external servers only.

    <p>False</p> Signup and view all the answers

    Using the NTP method to set the clock on a router eliminates the need for manual configuration.

    <p>True</p> Signup and view all the answers

    The message '%SYS-6-CLOCKUPDATE' indicates a failure in updating the system clock.

    <p>False</p> Signup and view all the answers

    The command to copy a configuration file from a TFTP server is copy running-config tftp.

    <p>True</p> Signup and view all the answers

    The USB feature on a Cisco router only supports USB 2.0 flash drives.

    <p>False</p> Signup and view all the answers

    Using the dir command allows users to view the contents of the USB flash drive.

    <p>True</p> Signup and view all the answers

    The USB file system on a Cisco router is referred to as usbflash1:.

    <p>False</p> Signup and view all the answers

    To verify that the USB drive is present, the show file systems command is used.

    <p>True</p> Signup and view all the answers

    The copy run usbflash0:/ command is used to backup the configuration to the USB drive.

    <p>True</p> Signup and view all the answers

    The command requires the user to specify the directory when copying files to a USB flash drive.

    <p>False</p> Signup and view all the answers

    The command to restore a configuration from a TFTP server includes pressing Enter to confirm the filename each time.

    <p>True</p> Signup and view all the answers

    The ip address provided for the TFTP server must always be in the 192.168.x.x range.

    <p>False</p> Signup and view all the answers

    The optional name during the TFTP restoration process can be anything chosen by the user.

    <p>True</p> Signup and view all the answers

    CDP is a Layer 2 protocol specific to Cisco devices.

    <p>True</p> Signup and view all the answers

    CDP operates independently of the media and protocol used in the network.

    <p>True</p> Signup and view all the answers

    CDP sends periodic advertisements to connected devices that share information about their interfaces.

    <p>True</p> Signup and view all the answers

    LLDP is the sole protocol used for mapping network topologies.

    <p>False</p> Signup and view all the answers

    SNMP is solely responsible for managing file systems on a network device.

    <p>False</p> Signup and view all the answers

    The command 'show running-config' can be executed after capture has been initiated.

    <p>True</p> Signup and view all the answers

    A configuration can only be restored from a text file by using the Tera Term application.

    <p>False</p> Signup and view all the answers

    In Tera Term, selecting 'Close' after capture ensures that the file is verified for corruption.

    <p>False</p> Signup and view all the answers

    Encrypted passwords need to be converted to plaintext in the configuration file before pasting it into the device.

    <p>True</p> Signup and view all the answers

    The command 'copy running-config tftp' is used to back up the startup configuration.

    <p>False</p> Signup and view all the answers

    To paste a configuration into a device using Tera Term, you do not need to enter global configuration mode.

    <p>False</p> Signup and view all the answers

    When using Tera Term, you must first choose a file from the File menu to send it to the device.

    <p>True</p> Signup and view all the answers

    Non-command text such as 'IOS messages' should be retained in the configuration file before pasting.

    <p>False</p> Signup and view all the answers

    Enabling the device involves adding 'enable' and 'configure terminal' at the beginning of the configuration file.

    <p>True</p> Signup and view all the answers

    The file's content during Tera Term operation is applied directly as commands in the CLI.

    <p>True</p> Signup and view all the answers

    Study Notes

    Network Discovery

    • CDP and LLDP are used to discover devices on a network
    • CDP is a Cisco proprietary protocol
    • LLDP is a standard protocol and is interoperable between vendors

    Time and Calendar Services

    • Routers and switches have an internal clock that starts when they boot
    • This internal clock is the primary time source
    • It is important to synchronize time across all devices on a network
    • This can be achieved by manually configuring the date and time or by using NTP

    Network Time Protocol (NTP)

    • NTP is a protocol that synchronizes the time on network devices
    • It ensures that consistent time is maintained across devices
    • NTP uses a hierarchical structure of servers to maintain accuracy
    • This helps in troubleshooting and event analysis

    Router and Switch File Maintenance

    • There are different file systems on routers and switches
    • The primary file systems are NVRAM, flash, and RAM
    • NVRAM stores the startup configuration, which is loaded when the device boots
    • Flash stores the operating system and other configuration files
    • RAM is used for temporary storage

    Router File Systems

    • The cd command changes the directory in the file system
    • The pwd command displays the current working directory
    • The dir command lists the contents of the current directory

    Switch File Systems

    • The show file systems command displays a list of the file systems on a switch
    • The flash file system on Cisco Catalyst switches can be used to copy configuration files and archive software images

    Back Up Configuration

    • Configuration files can be saved to a text file using tools like Tera Term
    • This allows you to create a backup of the configuration for later use

    Password Recovery Example

    • The ROMMON mode can be accessed by using a break sequence during the boot process
    • The confreg command can be used to set the configuration register to 0x2142
    • This disables the startup configuration from loading during startup
    • This allows you to recover the password by copying the startup configuration to the running configuration

    Simple Network Management Protocol (SNMP)

    • SNMP is a protocol used to manage network devices
    • It allows network administrators to monitor and configure devices remotely
    • SNMP uses three key elements: the SNMP manager, the SNMP agent, and the Management Information Base (MIB)
    • The SNMP manager sends requests to the SNMP agent, which retrieves information from the MIB
    • The SNMP agent can also send trap messages to the SNMP manager to report events

    Introduction to SNMP

    • The SNMP manager is part of a Network Management System (NMS)
    • It can collect information from an SNMP agent using the “get” action and can change configurations using the “set” action
    • SNMP agents can forward information to the SNMP manager using “traps”
    • The SNMP agent and MIB reside on SNMP client devices
    • MIBs store data about the device and its operations

    SNMP Operation

    • SNMP agents store data about the device in the MIB
    • The SNMP manager uses the agent to access information in the MIB
    • There are two primary types of SNMP requests: “get” and “set”
    • The “get” request retrieves information from the MIB
    • The “set” request changes the value of a variable in the MIB

    IOS Image Management

    • The show flash command can be used to check the free space on the device flash
    • The copy tftp flash command copies an IOS image from a TFTP server to the device flash
    • The boot system command specifies the location and image name to load during startup
    • The boot system command can be used to create a fault-tolerant boot plan with multiple images

    Copy an IOS Image to a Device Example

    • Ping the TFTP server to test connectivity
    • Ensure that there is sufficient flash space on the new image file
    • Copy the IOS image from the TFTP server to the device using the copy tftp flash command
    • The user will be prompted for the IP address of the TFTP server, the source filename, and the destination filename

    Device Discovery with CDP

    • CDP is a Cisco protocol that is used to gather information about Cisco devices connected on the same data link
    • CDP is media and protocol independent
    • CDP runs on all Cisco devices
    • CDP sends periodic advertisements to connected devices
    • Advertisements include device type, device name, and number and type of interfaces
    • CDP is used to map a network topology

    Device Discovery with LLDP

    • LLDP is a standard protocol that discovers devices and gathers information about them
    • LLDP can be used to map a network topology

    NTP

    • NTP synchronizes time across devices on a network
    • NTP is used to determine the order of events and the cause of an event
    • NTP can be manually set or configured using Network Time Protocol
    • The software clock in a router or switch starts when the system boots
    • When the time is not synchronized between devices, it will be impossible to determine the order of events and the cause of an event

    SNMP

    • SNMP is used for network management tasks
    • SNMP uses MIBs to manage devices
    • SNMP uses OIDs to identify objects in the MIB
    • SNMP offers several request types: get-request, get-next-request, get-bulk-request, set-request, and get-response
    • SNMP uses a manager and an agent to manage devices
    • The SNMP manager sends requests to the SNMP agent
    • The SNMP agent receives the requests and queries the MIB
    • The SNMP agent sends the response back to the manager

    Syslog

    • Syslog is a protocol for logging events on a network
    • Syslog uses a server to collect logs from multiple devices
    • Syslog messages contain information about the event, the device, and the time
    • Syslog is used to monitor network activity and troubleshoot problems

    Router and Switch File Maintenance

    • Router and Switch File Maintenance uses various methods to back up and restore IOS configuration files
    • Routines include Text file restoration, TFTP server, USB connections

    Router and Switch File Maintenance: Using a Text File to Restore a Configuration

    • Can be easily copied and pasted into a device
    • Requires editing to remove non-command text
    • Requires editing to include commands: 'enable' and 'configure terminal'
    • Can be restored from a text file using Tera Term

    Router and Switch File Maintenance: Using TFTP to Back Up and Restore a Configuration

    • A network protocol that allows for file transfers
    • To back up a configuration to a TFTP server:
      • Enter the copy running-config tftp command
      • Enter the IP address of the host where the configuration file will be stored
      • Enter the name to assign to the configuration file
      • Press Enter to confirm each choice
    • To restore a configuration from a TFTP server:
      • Enter the copy tftp running-config command
      • Enter the IP address of the host where the configuration file is stored
      • Enter the name to assign to the configuration file
      • Press Enter to confirm each choice

    Router and Switch File Maintenance: Using USB to Back Up and Restore a Configuration

    • Procedure:
      • Issue the show file systems command to verify that the USB drive is there and confirm its name
      • Use the copy run usbflash0:/ command to copy the configuration file to the USB flash drive
      • Be sure to use the name of the flash drive, as indicated in the file system
      • The slash is optional but indicates the root directory of the USB flash drive
      • The IOS will prompt for the filename
    • USB ports enable certain models of Cisco routers to support USB flash drives
    • USB flash provides secondary storage and an additional boot device

    IOS Image Management

    • IOS Image Management upgrades the IOS image installed on a router
    • To upgrade to the copied IOS image after that image is saved on the router's flash memory, configure the router to load the new image during bootup by using the boot system command

    Cisco Discovery Protocol (CDP)

    • CDP is a Cisco proprietary protocol used to gather information about Cisco devices on the same data link
    • CDP runs on all Cisco devices such as routers, switches, and access servers
    • CDP runs on all Cisco Devices
    • To enable CDP, use the command: cdp enable
    • To disable CDP, use the command: no cdp enable
    • To see CDP neighbors, use the command: show cdp neighbors
    • To see detailed information about the CDP neighbors, use the command: show cdp neighbors detail
    • LLDP is a Layer 2 protocol used to discover devices connected to a network
    • LLDP is a standard protocol, unlike Cisco's CDP
    • To enable LLDP, use the command: lldp run
    • To disable LLDP, use the command: no lldp run
    • To see LLDP neighbors, use the command: show lldp neighbors
    • To see detailed information about the LLDP neighbors, use the command: show lldp neighbors detail

    Network Time Protocol (NTP)

    • NTP is a protocol used to synchronize clocks on devices on a network
    • To configure a device as an NTP client, use the command: ntp server ip-address
    • To view NTP status, use the command: show ntp status
    • To view NTP associations, use the command: show ntp associations
    • The stratum level of an NTP server indicates its accuracy
    • Stratum 1 servers are directly connected to a time source, such as an atomic clock
    • Stratum 2 servers are connected to a stratum 1 server
    • Stratum 3 servers are connected to a stratum 2 server, and so on
    • To manually set the clock on a router, use the command: clock set hh:mm:ss mm dd yyyy
    • To see the clock status on a router, use the command: show clock
    • To see more clock details, use the command: show clock detail

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers key concepts of network discovery protocols such as CDP and LLDP, as well as time synchronization using NTP. Additionally, it touches on the file systems used in routers and switches, emphasizing the importance of configuration storage. Test your understanding of these fundamental networking principles.

    More Like This

    Zabbix SNMP OID Discovery Quiz Day2 P6
    24 questions
    Zabbix 6 Day3 P2
    30 questions

    Zabbix 6 Day3 P2

    SpellboundTropicalIsland avatar
    SpellboundTropicalIsland
    Nmap Network Discovery and Security Quiz
    18 questions
    Network Host Discovery Techniques
    40 questions

    Network Host Discovery Techniques

    BestPerformingSnail6897 avatar
    BestPerformingSnail6897
    Use Quizgecko on...
    Browser
    Browser