当前位置:网站首页>Network technology related topics
Network technology related topics
2022-07-06 14:13:00 【Chen Shenshen】
Large network enterprise network foundation
What is? ARP?ARP The role of ?
What is? ICMP?
Briefly describe the forwarding principle of the switch .
Briefly describe the working principle of the router .
sketch Trunk The role of .
common Cisco What are the simulators ?
sketch “ Analog switch module ” and “1 A fast Ethernet interface module ”.
Three layer exchange
1. What is layer 3 switching ?
2. Briefly describe the defects of single arm routing .
3. Briefly describe the forwarding principle of layer 3 switch .
4.Cisco Switch common MLS What are the architectures ?
5. Figure out what is “ Virtual interface ”?
6. What is the command to start the routing function ?
7. Configure an interface on the layer 3 switch as a routing interface ( in other words : Disable the switch ) What's your order ?
8. What is? DHCP?
9. sketch DHCP Authentication method of relay service .
10. sketch DHCP Precautions for relay configuration .
Spanning tree protocol (STP)
Briefly describe the problems of redundant links .
What is? STP?
sketch STP How it works .
What is? “ bridge ”?
Spanning tree algorithm (STA) Which three steps can be classified ?
How to select the root bridge ?
How to select the root port ?
How to select the specified port ?
Figure Bridge ID The composition of .
10. Figure port ID The composition of .
11. What is? BPDU?
12.BPDU What are the key fields ?
13. What do you mean “STP convergence ”?
14. Use a table to list five types of switch ports “STP Status and use ”.
15. Briefly describe three timing methods of spanning tree timer , And write the default time .
16. Spanning tree and VLAN What are the main relationships between ?
Hot backup routing protocol (HSRP)
What is? HSRP?
sketch HSRP Who are the group members of , And explain the functions of each group member .
sketch HSRP How it works .
Icon “ fictitious MAC Address structure ( Mark the bytes of each segment , common 6 byte )”.
HSRP The configured router has six states , Namely ?
sketch HSRP Two kinds of timers , And mark the time .
sketch HSRP And VRRP The difference between ( Write at least three points ).
sketch “ preempt ” The role of .
sketch “ Port tracking ” The role of .
IP Subnet partition
sketch “IP Address ” What are the two parts .
Briefly describe the principle of subnet division .
Application of subnet division —— The formula :
① Number of subnets :
② Host number :
③ Number of available hosts :
Briefly describe what is “ soft ” The rules .
Briefly describe what is “ hard ” The rules .
sketch IP Four principles that address planning mainly follows .
Access control list ( One )
Briefly describe what is TCP? What is? UDP?( And explain the differences )
2.
3. Icon “TCP Three handshakes ” And “TCP Four times ( Wave ) hand ”.
4. Use a table to list commonly used TCP Port and its description .
5. Use a table to list commonly used UDP Port and its description .
6. What is? ACL?
7. common ACL What are the three types ?( Explain and write the list number range )
8. Icon ACL The inspection conditions of ( in other words “ACL Five elements of ”).
9. sketch ACL Application direction of .
Access control list ( Two )
Brief description of standards ACL And expansion ACL The difference between .
Write to see ACL Orders for information .
Network address translation (NAT)
What is? NAT?
NAT What are the ways to implement ?
sketch NAT The advantages of .
sketch NAT The shortcomings of .
sketch PAT The advantages of .
Write to see NAT Commands for converting entries .
边栏推荐
猜你喜欢
xray與burp聯動 挖掘
强化學習基礎記錄
Attack and defense world misc practice area (GIF lift table ext3)
captcha-killer验证码识别插件
HackMyvm靶机系列(1)-webmaster
Middleware vulnerability recurrence Apache
sqqyw(淡然点图标系统)漏洞复现和74cms漏洞复现
Sqqyw (indifferent dot icon system) vulnerability recurrence and 74cms vulnerability recurrence
Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
链队实现(C语言)
随机推荐
记一次edu,SQL注入实战
HackMyvm靶机系列(3)-visions
captcha-killer验证码识别插件
7-14 错误票据(PTA程序设计)
7-7 7003 combination lock (PTA program design)
强化学习基础记录
内网渗透之内网信息收集(五)
A complete collection of papers on text recognition
Web vulnerability - File Inclusion Vulnerability of file operation
Using qcommonstyle to draw custom form parts
Middleware vulnerability recurrence Apache
The United States has repeatedly revealed that the yield of interest rate hiked treasury bonds continued to rise
xray与burp联动 挖掘
Interpretation of iterator related "itertools" module usage
Experiment 9 input and output stream (excerpt)
《英特尔 oneAPI—打开异构新纪元》
Experiment 7 use of common classes (correction post)
sqqyw(淡然点图标系统)漏洞复现和74cms漏洞复现
安全面试之XSS(跨站脚本攻击)
实验四 数组