Appendix D. Memory Tables – CCNP Enterprise Design ENSLD 300-420 Official Cert Guide: Designing Cisco Enterprise Networks

Appendix D. Memory Tables

Chapter 1

Table 1-2 IP Protocol Numbers

Protocol Number

IP Protocol

1

Internet Control Message Protocol (ICMP)

2

Internet Group Management Protocol (IGMP)

6

 

 

User Datagram Protocol (UDP)

 

IPv6 encapsulation

50

 

51

 

 

ICMPv6

 

 

89

Open Shortest Path First (OSPF)

103

 

 

Virtual Router Redundancy Protocol (VRRP)

Table 1-3 IPv4 Header Fields

Field

Length

Description

 

4 bits

Indicates the IP header’s format, based on the version number. Set to 0100 for IPv4.

IHL

 

 

 

 

QoS parameters.

Total Length

 

Length of the packet, in bytes, including header and data.

Identification

16 bits

Identifies a fragment.

 

3 bits

 

Fragment Offset

13 bits

 

 

8 bits

Decremented by 1 by each router. When this is 0, the router discards the packet.

 

 

Indicates the upper-layer protocol.

Header Checksum

 

Checksum of the IP header; does not include the data portion.

 

 

IP address of the sending host.

Destination Address

32 bits

 

IP Options

 

Options for security, loose source routing, record route, and timestamp.

Padding

 

 

Table 1-6 DSCP and IP Precedence Values

IP Precedence

Limitation

 

DSCP

 

 

Service Type

Decimal

Binary

Class

Decimal

Codepoint

Routine

0

000

Best effort

 

 

 

 

 

Assured Forwarding (AF) Class 1

8 to 14

001xxx

Immediate

2

010

AF Class 2

16 to 22

010xxx

 

3

011

AF Class 3

24 to 30

011xxx

 

4

100

AF Class 4

32 to 38

100xxx

 

5

101

 

 

 

 

6

110

 

48

110xxx

 

7

111

Control

56

111xxx

Table 1-8 IP DSCP Values

DSCP Class

DSCP Codepoint Value

DSCP Decimal

Default

 

0

CS1

 

8

AF11

 

10

AF12

 

12

AF13

 

14

CS2

 

16

AF21

 

18

AF22

 

20

AF23

 

22

CS3

 

24

 

011010

26

 

011100

28

 

011110

30

 

100000

32

 

100010

34

 

 

36

AF43

 

 

CS5

 

 

EF

 

 

CS6

 

 

 

111000

56

Table 1-13 NAT Concepts

NAT Address Type

Description

Static NAT

 

Dynamic NAT

 

PAT

 

Inside local address

 

Inside global address

 

Outside global address

 

Outside local address

 

Chapter 2

Table 2-6 IPv6 Address Types

IPv6 Address Type

Description

Unicast

 

Anycast

 

Multicast

 

Table 2-7 IPv6 Address Prefixes

IPv6 Address Type

Prefix

 

0000::0001

Unspecified address

 

 

2000::/3

Unique local unicast

 

 

 

 

FF00::/8

OSPFv3

 

EIGRP routers

 

DHCP

 

Table 2-8 IPv6 Address Autoconfiguration Scheme

IPv6 Address Configuration Scheme

Description

Manual configuration

 

SLAAC link-local

 

SLAAC global unique

 

DHCPv6

 

Table 2-9 IPv6 Mechanisms

IPv6 Mechanism

Description

ICMPv6

 

IPv6 Neighbor Discovery

 

AAAA

 

 

Performs stateless IPv6 address assignment.

 

Provides stateful IPv6 address assignment.

 

Routing protocol that uses UDP port 521.

 

Cisco routing protocol for IPv6.

OSPFv3

 

Table 2-12 NAT64 Stateless and Stateful NAT64 Comparison

Factor

Stateless

Stateful

 

 

1:many translation

 

 

Conserves IPv4 addresses

Address transparency

Helps ensure end-to-end transparency

 

IPv6 address type

 

 

 

 

Can use manual address assignment, DHCPv6, or SLAAC

Table 2-15 IPv6 and IPv4 Characteristics

Characteristic

IPv6

IPv4

Address length

 

32 bits

Address representation

 

Dotted decimal

Header length

 

 

Upper-layer protocols

Next Header field

 

Link address resolution

ND

 

 

 

Stateful DHCP

DNS (name-to-address resolution)

 

A records

Interior routing protocols

 

 

Classification and marking

Traffic Class and Flow Label fields, Differentiated Services Codepoint (DSCP)

 

Private addresses

Unique local addresses

 

 

 

Sending host and intermediate routers

Loopback address

 

127.0.0.1

Address scope types

 

Unicast, multicast, broadcast

Chapter 3

Table 3-7 Default EIGRP Values for Bandwidth and Delay

EIGRP Term

Definition

 

The route with the lowest metric to reach a destination.

Successor

 

 

The best metric along a path to a destination network, including the metric to the neighbor advertising that path.

 

The total metric along a path to a destination network, as advertised by an upstream neighbor.

Feasibility condition

 

 

A route that satisfies the feasibility condition and is maintained as a backup route.

Table 3-8 EIGRP Route States

EIGRP Route State

Definition

 

The current successor no longer satisfies the feasibility condition, and there are no feasible successors identified for that destination. The router is in the query process to find a loop-free alternative route.

 

The router has identified successors to a destination. The router is not performing a recomputation.

 

The router that issued the query gives up and clears its connection to the router that is not answering, effectively restarting the neighbor session.

Chapter 4

Table 4-3 OSPF Router Types

Type

Description

Internal router

 

Area border router (ABR)

 

Autonomous system boundary router (ASBR)

 

Backbone router

 

Table 4-4 Major LSA Types

Type Code

Type

Description

1

Router LSA

 

2

Network LSA

 

3

Summary LSA for ABRs

 

4

Summary LSA for ASBRs

 

5

Autonomous system external LSA

 

7

Not-so-stubby area (NSSA) external LSA

 

Table 4-6 OSPFv3 LSA Types

LSA Name

LS Type

Description

Router LSA

0x2001

 

 

0x2002

 

Interarea-prefix LSA

0x2003

 

 

0x2004

 

Autonomous system external LSA

0x4005

 

 

0x2006

 

NSSA Type 7 LSA

0x2007

 

 

0x0008

 

Intra-area-prefix LSA

0x2009

 

Table 4-7 BGP Attributes

BGP Attribute

Description

Category

Origin

 

Well-known mandatory

AS_Path

 

Well-known mandatory

Next hop

 

Well-known mandatory

Local preference

 

Well-known discretionary

MED

 

 

Community

 

 

Atomic aggregate

 

 

Weight

 

 

Table 4-8 BGP Best Path Order

BGP Best Path Order

 

 

 

 

 

 

 

 

 

 

 

 

Chapter 5

Table 5-3 IP Multicast Protocols

IP Multicast Protocol

Description

 

A host sends an IGMP query message to the router, and the switch adds the host to the multicast group and permits that port to receive multicast traffic.

PIM-SM

 

 

This protocol never builds a shortest path tree.

 

 

 

 

Table 5-4 Well-Known Multicast Addresses

Multicast Address

Multicast Group

FF01::1

 

FF02::1

 

 

All routers (node-local)

FF02::2

 

FF02::5

 

FF02::6

 

FF02::9

 

 

EIGRP routers

 

Mobile agents

FF02::C

 

FF02::D

 

Table 5-6 SNMP Message Types

SNMP Message

Description

Get Request

 

 

Retrieves the next issuance of the MIB variable.

Get Response

 

Set Request

 

 

Transmits an unsolicited alarm condition.

GetBulk

 

 

Alerts an SNMP manager about specific conditions with a confirmation.

Table 5-11 NetFlow, CDP, Syslog, and RMON

Technology

Description

 

Collects network flow data for network planning, performance, accounting, and billing applications.

 

Proprietary protocol for network discovery that provides information on neighboring devices.

 

Reports state information based on facility and severity levels.

 

Provides aggregate information of network statistics and LAN traffic.

Chapter 6

Table 6-2 Cisco Hierarchical Layer Functions

Hierarchical Layer

Layer Functions

Core

 

 

High reliability

 

 

 

Fault tolerance

 

 

 

Avoidance of slow packet manipulation caused by filters or other processes

 

 

 

QoS

Distribution

 

 

Redundancy and load balancing

 

 

 

Aggregation of WAN connections

 

 

 

Security filtering

 

 

 

Departmental or workgroup access

 

 

 

Routing between VLANs

 

Media translations (for example, between Ethernet and Token Ring)

 

 

 

Demarcation between static and dynamic routing protocols

Access

 

 

High availability

 

 

 

Broadcast suppression

 

 

 

Rate limiting

 

 

 

VACLs

 

 

 

Trust classification

 

 

PoE and auxiliary VLANs for VoIP

Table 6-7 Campus Transmission Media Comparison

Factor

Copper/UTP

Multimode Fiber

Single-Mode Fiber

Bandwidth

Up to 10 Gbps

 

 

Distance

 

thernet

Up to 100 km (Fast Ethernet)

 

 

thernet

Up to 5 km (Gigabit Ethernet)

 

 

Up to 300 m (10 Gigabit Ethernet)

Up to 40 km (10 Gigabit Ethernet)

 

 

Moderate

Moderate to expensive

Recommended use

 

 

 

Table 6-8 Cisco PoE and UPOE Comparison

Category

PoE

PoE+

Cisco UPOE

Cisco UPOE+

Minimum cable type

 

CAT 5e

CAT 5e

 

IEEE standard

 

 

Cisco proprietary

Cisco proprietary

Maximum power to the PSE port

 

 

 

 

 

 

 

51W

71.3W

UTP pairs

2

 

 

4

 

100 m

100 m

100 m

100 m

Table 6-10 Mechanisms in Cisco STP Toolkit

Mechanism

Improves Spanning Tree Protocol Performance or Stability?

Description

PortFast

Performance

 

UplinkFast

Performance

 

BackboneFast

Performance

Spanning Tree Protocol

Loop Guard

Stability

 

Root Guard

Stability

Spanning Tree Protocol

BPDU Guard

Stability

 

BPDU Filter

Stability

 

Table 6-11 Loop Guard and UDLD Comparison

Functionality

Loop Guard

UDLD

 

Per port

Per port

Action granularity

 

 

Spanning Tree Protocol

 

Yes, when enabled on all links in a redundant topology

Protection against Spanning Tree Protocol failures caused by problems in the software (designated switch does not send BPDUs)

 

 

Protection against miswiring

 

 

Chapter 7

Table 7-4 Access Layer Designs

Access Layer Design Model

Description

Traditional Layer 2 access layer

 

Updated Layer 2 access layer

 

Layer 3 access layer

 

Hybrid access layer

 

Table 7-5 Campus Layer Design Best Practices

Layer

Best Practices

Access layer

Limit VLANs to a single closet, when possible, to provide the most deterministic and highly available topology.

Use RPVST+ if Spanning Tree Protocol is required. It provides the best convergence.

 

 

 

 

 

 

Distribution layer

Use first-hop redundancy protocols. HSRP, VRRP, or GLBP should be used if you implement Layer 2 links between the access and distribution.

 

 

 

Summarize routes from the distribution layer to the core layer of the network to reduce routing overhead.

Use VSS as an option to eliminate the use of Spanning Tree Protocol.

Core layer

 

 

 

Use two equal-cost paths to every destination network.

Chapter 8

Table 8-2 WAN Comparison

WAN Technology

Bandwidth

Reliability

Latency

Cost

Layer 2 VPN

High

 

 

High

4G/5G

Low/medium

 

 

Medium

Metro Ethernet

 

High

Low

 

MPLS Layer 3 VPN

 

High

Low

 

SD-WAN with two transports (Internet/MPLS)

Medium/high

 

Medium

 

DWDM

 

 

Low

High

Table 8-3 Benefits of Ethernet Handoffs at the Customer Edge

Benefit

Description

Service-enabling solution

 

Flexible architecture

 

 

 

 

 

Seamless enterprise integration

 

Table 8-4 SD-WAN Platform Options

Physical Devices

Software Devices

Branch Services/Data Center

vEdge Appliances for Branch/Data Center

Universal CPE

Private Cloud

Public Cloud

ISR 1000

200 Mbps

vEdge 100

100 Mbps

 

OpenStack

vEdgeCloud: CSR1000v

Microsoft Azure

vEdgeCloud: CSR1000v

 

 

ENCS 5400

vEdgeCloud: ISRv

250 Mbps–2 Gbps

 

 

 

vEdge 2000

10 Gbps

 

 

 

Table 8-5 WAN Link Characteristics

 

Use

Cost

Advantages

Examples

Private

WAN to connect distant LANs

 

High security

Transmission quality

 

Shared

 

Relatively low cost

Leased bandwidth

Leased or private equipment

 

MPLS

Chapter 9

Table 9-2 Key Design Principles

Design Principle

Description

High availability

 

Scalability

 

Security

 

Performance

 

Manageability

 

Standards and regulations

 

Cost

 

Table 9-3 Application Requirements for Data, Voice, and Video Traffic

Characteristic

Data File Transfer

Interactive Data Application

Real-Time Voice

Real-Time Video

Response time

 

 

 

 

Throughput and packet loss tolerance

 

 

 

 

Downtime (high reliability = low downtime)

 

 

 

 

Table 9-4 Physical Bandwidth Comparison

WAN Connectivity

Bandwidth: Up to 100 Mbps

Bandwidth: 1 Gbps to 10 Gbps

 

 

 

 

 

 

 

 

 

Table 9-5 Availability Percentages

Availability

Downtime per Year

The Nines of Availability

Targets

99.000000%

 

 

 

99.900000%

 

 

 

99.990000%

 

 

 

99.999000%

 

 

 

99.999900%

 

 

 

99.999990%

 

 

 

99.999999%

 

 

 

Table 9-7 QoS Options

QoS Category

Description

 

 

 

 

 

 

 

 

Table 9-8 Link-Efficiency Mechanisms

Mechanisms

Description

 

 

 

 

 

 

Chapter 10

Table 10-2 SD-Access Very Small Site Guidelines

SD-Access Component Description

Size

Endpoints

 

IP pools

 

Virtual networks

 

Border nodes

 

Control plane nodes

 

Edge nodes

 

Wireless LAN controllers

 

Access points

 

Table 10-3 SD-Access Small Site Guidelines

SD-Access Component Description

Size

Endpoints

 

IP pools

 

Virtual networks

 

Border nodes

 

Control plane nodes

 

Edge nodes

 

Wireless LAN controllers

 

Access points

 

Table 10-4 SD-Access Medium Site Guidelines

SD-Access Component Description

Size

Endpoints

 

IP pools

 

Virtual networks

 

Border nodes

 

Control plane nodes

 

Edge nodes

 

Wireless LAN controllers

 

Access points

 

Table 10-5 SD-Access Large Site Guidelines

SD-Access Component Description

Size

Endpoints

Up to 50,000

IP pools

Up to 500

Virtual networks

Up to 64

Border nodes

Up to 4

Control plane nodes

Up to 6

Edge nodes

Up to 1000

Wireless LAN controllers

Up to 2

Access points

Up to 2000

Chapter 12

Table 12-2 Common HTTP Response Codes

Response Code

Description

 

 

Success Messages (2xxx)

200

 

 

 

201

 

 

 

204

 

 

 

Client Errors (4xx)

400

 

 

 

401

 

 

 

403

 

 

 

Server Errors (5xx)

500

 

 

 

501

 

 

 

Table 12-3 Cisco-Supported Products for YANG, NETCONF, and RESTCONF

Cisco-Supported Products

YANG, NETCONF, and/or RESTCONF

 

NETCONF/YANG

 

NETCONF/YANG

 

NETCONF/YANG/RESTCONF

 

NETCONF/YANG

 

NETCONF

 

NETCONF

Table 12-4 Leaf Attributes

Attribute

Description

Config

 

Default

 

mandatory

 

Must

 

Type

 

When

 

description

 

Reference

 

Units

 

Status

 

Table 12-5 NETCONF Protocol Operations

Operation

Description

<get-config>

 

<edit-config>

 

<get>

 

<get-schema>

 

<lock>

 

<unlock>

 

<close-session>

 

Table 12-6 RESTCONF CRUD Operations

Operation

Description

URI

GET

 

 

POST

 

 

PUT

 

 

DELETE

 

 

Table 12-7 Telemetry Methods

Method

Description

Model-driven telemetry

 

Cadence-based telemetry

 

Policy-based telemetry