Showing posts with label Interview Question and Answer. Show all posts
Showing posts with label Interview Question and Answer. Show all posts

AWS Interview Questions only

By // No comments:

AWS (Amazon Web Service) Interview Questions only


In this Articles we will see Most Important AWS(Amazon web service) interview Questions. Please read full articles if you face any problem regarding this articles so you may leave comment or drop email, within 24 hours you will get reply by our team.

Please leave comment if article good and share it also.



Q1: What is AWS(Amazon Web Service)?

Q2: What are the key components of AWS?

Q3: How do you secure Amazon EC2 instance surnning within my VPC?

Q4: What is the IP range of defaul VPC?

Q5: How  many default subnets are in default VPC?

Q6: Can you use AWS direct connect or hardware VPN connections to
access VPCs I'm peered with?

Q7: What is IAM Service?

Q8: What happens when I reboot an EC2 instance?

Q9: How you will change the root EBS device of my amazon EC2 instance?

Q10: What is the difference between Amazon SNS and Amazon SQS?

Q11: How to delete files recursively from an S3 bucket?

Q12: How to access/ping as server located on AWS?

Q13: What is the maximum length of a file-name in S3?

Q14: What is Amazon RDS?

Q15: What is maximum value you can set for my backup retention period?

Q16: Is automatice backups are enabled by default for new DB Instance?

Q17: What is MFA in AWS?

Q18: What Amazon VPC?

Q19: What does RRS stand for?

Q20: What is DynamoDB?

Q21: What is ElastiCache?

Q22: What is the AWS key Management Service?

Q23: Explain is AWS WAF?

Q24: What is Amazon EMR?

Q25: Why we use ur VPC?

Q26: Explain is Amazon EC2?

Q27: What is Amazon EC2 instance?

Q28: Describe some features of Amazon EC2?

Q29: What are the differences between Amazon S3 and EC2?

Q30: How many buckets can you create in AWS(Amazon web service)
 by default?

Q31: What is T2 instances?



Q32: What is AWS Data pipeline?

Q33: What are the components of AWS Data Pipeline?

Q34: Do you need an Internet Gateway to use peering connections?

Q35: Can you monitor the network traffice in your VPC?

Q36: What is Amoazon Kinesis Firehose?

Q37: Is it possible to use AWS as a web host? What are the way
of using AWS as web host?

Q38: How step you follow to make 10,000 files as public in S3?

Q39: How the buffer is used in Amazon web services?

Q40: How do you see how much disk space is using by s3 bucket?

Q41: Can you use your existing AMIs in Amazon VPC?

Q42: Is there any bandwidth limitations for peering connections?

Q43: What are the steps to build a custom VPC?

Q44: Why should you use Amazon VPC, Advantage of useing AWS VPC?

Q45: What is C4 instances?

Q46: What is AWS Certificate Manager?

Q47: What is Amazon S3?

Q48: What is AMI(Amoazon Machine Image)?

Q49: What is the relation between an instance and AMI?

Q50: What is Redshift?






AWS Interview Questions and Answers

By // No comments:

AWS Interview Questions and Answers


In this Articles we will see Most Important AWS(Amazon web service) interview Questions and Answers. Please read full articles if you face any problem regarding this articles so you may leave comment or drop email, within 24 hours you will get reply by our team.

Please leave comment if article good and share it also.






Q1: Brief describe of AWS?

AWS stands for Amazon Web Service; it is a collection of remote computing services also known as cloud computing platform.  This new realm of cloud computing is also known as IaaS or Infrastructure as a Service.

Q2: What are the basic structures of the Amazon EC2 service?

As the Amazon EC2 service is a cloud facility so it has entirely all the cloud features. Amazon EC2 delivers the subsequent features:

Virtual computing atmosphere (popular as instances)

Pre-configured patterns for your illustrations (popular as Amazon Machine Images – AMIs)

Amazon Machine Images known as AMIs is a comprehensive set that you require for your server (counting the operating system and extra software)

Amazon EC2 delivers numerous arrangements of Storage, CPU, memory, and networking measurements for your occurrences (popular as instance type)

Locked login data for your cases by means of key pair (AWS supplies the public vital and you can supply the inaccessible key in a safe place)

Storage capacities of provisional data is erased when you stop or dismiss your occurrence (popular as occurrence store volumes)

Amazon EC2 delivers tenacious storage volumes (by means of Amazon Elastic Block Store – EBS)

A firewall that permits you to stipulate the procedures, docks, and source IP ranges that can spread your occurrences using security groups
Stationary IP addresses for lively cloud computing (popular as Elastic IP address)

Amazon EC2 delivers metadata (popular as tags)

Amazon EC2 offers virtual systems that are reasonably secluded from the rest of the AWS cloud, and that you can optionally attach to your own system (recognized as virtual private clouds – VPCs)

Q3: Explain what is T2 instances?

T2 instances are designed to provide moderate baseline performance and the capability to burst to higher performance as required by workload.

Q4: How the buffer is used in Amazon web services?

The buffer is used to make the system more robust to manage traffic or load by synchronizing different component.  Usually, components receive and process the requests in an unbalanced way, With the help of buffer, the components will be balanced and will work at the same speed to provide faster services.

Q5: What are the main components of AWS?

Below mentioned are the key components of AWS:

Route 53: A DNS web facility

Easy E-mail Facility: It permits transfer of e-mail using RESTFUL API demand or through consistent SMTP

Self and Access Organization: It offers improved security and uniqueness management for your AWS account

Simple Storage Device known as S3: It is a storing device and the greatest extensively used AWS service

Elastic Compute Cloud known as EC2: It offers on-demand computing properties for hosting requests. It is very valuable in case of random workloads

Elastic Block Store known as EBS: It delivers determined storage volumes that assign to EC2 to permit you to continue data past the lifetime of a single EC2

CloudWatch: To screen AWS possessions, it permits administrators to assess and gather key. Similarly, one can set an announcement alarm in case of issue



Q6: Explain in detail the function of Amazon Machine Image (AMI)?

An Amazon Machine Image AMI is a pattern that comprises a software conformation (for instance, an operative system, a request server, and applications). From an AMI, we present an example, which is a duplicate of the AMI successively as a virtual server in the cloud. We can even offer plentiful examples of an AMI.

Q7: What is the connection between Instance and AMI?

We can launch diverse types of occurrences from a lone AMI. An example type basically controls the hardware of the host processer used for your example. Each occurrence type offers dissimilar calculate and memory competences. After we introduce an instance, it looks like an old-style host, and we can interrelate with it as we would do with any mainframe. We have comprehensive control of our examples; we can usage pseudo to run instructions that need root rights.

Q8: In VPC with private and public subnets, database servers should ideally be launched into which subnet?

With private and public subnets in VPC, database servers should ideally launch into private subnets.

Q9: what is S3?

S3 is known for Simple Storage Service. You can custom S3 interface to supply and recover any quantity of data, at any time and from anyplace on the web. For S3, the expense model is “pay as you go”.
Amazon S3 delivers access to dependable and budget data storage organization. It is intended to make web-scale calculating simpler by permitting you to store and save any amount of data, at any period, from within Amazon EC2 or anyplace on the web.

Q10: Can S3 be cast-off with EC2 instances, in case of “Yes” please specify How?

Yes, it can be cast-off for instances with root approaches backed by native occurrence storage. By using Amazon S3, developers have access to the similar extremely scalable, dependable, fast, low-priced data storage substructure that Amazon uses to track its own worldwide network of web sites. In order to perform systems in the Amazon EC2 atmosphere, developers use the tools providing to load their Amazon Machine Images (AMIs) into Amazon S3 and to transfer them between Amazon S3 and Amazon EC2. Additional use case might be for websites hosted on EC2 to load their stationary content from S3.

Q11: If I’m expending Amazon Cloud Front, can I custom Direct Connect to handover objects from my own data centre?

Yes. Amazon Cloud Front provisions custom origins counting origins from separate of AWS. With AWS Direct Connect, you will be exciting with the particular data transfer rates.

Q12: If my AWS Direct Connect flops, will I lose my connection?

If a gridlock AWS Direct connect has been arranged, in the occasion of a let-down it will change over to the second one. It is optional to permit Bidirectional Forwarding Detection (BFD) when arranging your influences to safeguard faster recognition and failover. On the other hand, if you have organized a backup IPsec VPN joining as an alternative, all VPC traffic will failover to the backup VPN connection routinely.

Q13: What is Amazon EC2?

Amazon EC2 offers numerous data storage choices for your occurrences. Each choice has an exclusive mixture of presentation and sturdiness. These storages can be used self-sufficiently or in grouping to suit your necessities.
There are chiefly four types of storages offered by AWS.

Q14: What is Amazon EBS?

Amazon EBS: Its sturdy, block-level storage capacities can involve in running Amazon EC2 occurrence. The Amazon EBS volume continues self-sufficiently from the running lifespan of an Amazon EC2 occurrence. After an EBS volume is involved to an example, you can use it like any other bodily hard drive. Amazon EBS encryption feature provisions encryption feature.

Q15: What is Amazon EC2 Instance Store?

Amazon EC2 Instance Store: Storage disk that is involved to the host computer is mentioned to as occurrence store. The instance storage offers provisional block-level storing for Amazon EC2 instances. The data on an illustration store volume perseveres only during the life of the related Amazon EC2 instance; if you halt or dismiss an instance, any data on occurrence store volumes is misplaced.

Q16: What is Addition Storage?

Addition Storage: Every time your presentation an occurrence from an AMI, a root storage device is twisted for that occurrence. The root storage device comprises all the information essential to boot the occurrence. You can stipulate storage volumes in calculation to the root device volume when you generate an AMI or present an instance using hunk device mapping.

Q17: How many buckets can you create in AWS by default?

By default, you can create upto 100 buckets in each of your AWS accounts.

Q18: Brief describe Amazon Machine Image and what is the connection between Instance and AMI?

Amazon Web Services offers numerous ways to contact Amazon EC2, like web-based border, AWS Command Line Interface CLI as well as Amazon Tools for Windows Power Shell. Initially, you are required to sign up for an AWS version and you can contact Amazon EC2. Amazon EC2 offers a Query API. These requirements are HTTP or HTTPS requirements that practice the HTTP verbs GET or POST and a Query constraint called Action.

Linux Interview Question and Answer

By // No comments:

Linux Interview Questions and Answers



Q1. What is Linux

Linux is an operating system based on UNIX, and was first introduced by Linus Torvalds. It is based on the Linux Kernel, and can run on different hardware platforms manufactured by Intel, MIPS, HP, IBM, SPARC and Motorola.

Q2. What is different between linux and unix?

Unix originally began as a propriety operating system from Bell Laboratories, which later on spawned into different commercial versions. On the other hand, Linux is free, open source and intended as a non-propriety operating system for the masses.

Q3. How is Linux connected to UNIX?

The kernel that Linux uses resembles that of UNIX but does not require UNIX code.

Q4. Explain the three different permissions in Linux.

– Read: Gives users the permission to read files or list directories
– Write: Gives users the permission to write to the file of new files and directories
– Execute: Gives users the permission to run the file or lookup a specific file within a directory

Q5. How many partitions do you need to install Linux?

You need at least two partitions to install Linux on your system.

Q6. Define MBR and GRUB.

 MBR is Master Boot Record and GRUB is Graand Unified Bootloader.

Q7. What is LVM and what is its role?

LVM stands for Logical Volume Manager. It is used to resize the file system online.

Q8. What is the role of Ivextend and Ivreduce?

They are commands used to extend or reduce the volume.

Q9. In the context of Linux, what is GPL?

GPL stands for General Public License. It was originally created to protect the GNU project.

Q10. What is umask?

umask stands for “user file creation mask”. It is used to determine those settings of a mask that control file permission data and directory data.

Q11. In the context of Linux, what does POSIX stand for?

POSIX stands for Portable Operating System Interface for Computer Environments. It is the de facto standard for ensuring compatibility between UNIX versions.

Q12. What do Hard Links do?

Hard links point directly to the physical file located on the disk, and not on the path name.

Q13. What is the # symbol used for?

# is used for creating new comments.

Q14. Describe Telnet and SSH.

Both Telnet and SSH are communication protocols that are used to manage systems remotely. While SSH requires exchange of keys, Telnet transmits data in plain text. Hence, SSH is said to be more secure than Telnet.

Q15. Explain the GNU project.

GNU is a project that was initiated by Richard Stallman in 1983 at MIT. The project began with the idea of providing control and freedom to the users in using software. As part of the GNU project, users are free to use, run, copy and share software.

Q16. How do you turn a Linux system into a proxy server?

Using the Squid service, you can turn a Linux system into a proxy server.

Q17. What is LILO in the context of Linux?

LILO is a boot loader for Linux. It is used for loading the Linux operating system into the main system memory before beginning operations.

Q18. What is the difference between home directory and working directory?

Home directory is the default directory when a user logs in whereas working directory is the user’s current working directory.

Q19. What does pwd stand for?

In Linux, it stands for print working directory.

Q20. In Linux, how do you track system events?

To track events, a daemon called syslogd is used.

Q21. What do you do when you encounter a suspicious IP?

We should first block the suspicious IP by integrating tcp_wrapper. Next, we need to enable the “tcp_wrapper=YES” parameter in the configuration file at ‘/etc/vsftpd.conf’. Final step – include the suspicious IP in the ‘host.deny’ file in ‘/etc/host.deny’.


Q22. State the difference between the locate and slocate commands.

Locate searches for a file with the latest entries while slocate searches for files that users have accessed most recently.

Q23. How do you review boot messages in Linux?

By using the dmesg command. Dmesg will pull out boot messages stored in the kernel ring buffer.

Q24. What are symbolic links?

Symbolic links are “shortcut keys” in Linux. These links point to specific programs, files or directories.




Top 35 System Administrator Interview Questions and Answers

By // No comments:

Top 35 System Administrator Interview Questions and Answers




Q1: What is Active Directory?

Active Directory is database service which contains all the information about object such as users, group, object, OU and computer. It enables authentication and authorization for client in a network. It’s used to manage centralized security in domain network.

Q2: Which protocol is used by Active Directory?

LDAP protocol

Q3: What is DNS?

DNS stand for Domain Name System. It is used to resolve FQDN (fully qualified domain name) to IP address and vice versa such as www.example.com to 61.95.352.76. It is use 53 port.

Q4: How many records create on DNS?

There are Six records create on DNS server:

1.       A and AAAA record
2.       PTR record
3.       CName/ Alias record
4.       SRV record
5.       SOA record
6.       MX record

Q5: How many zones are create?

There are three zones:
1.       Primary zone
2.       Second zone
3.       Stub zone

Q6: What is DHCP?
DHCP stand for dynamic host configuration protocol. It is provide automatic IP address range such as subnet, gateway etc. to computer in network. It uses 67 and 68 port.




Q7: How does DHCP work?

DHCP work on DORA process:
D denote as discover DHCP
O denote as offer DHCP
R denote as request DHCP
A denote as acknowledgement

Q8: Which ports are used by DHCP?

Port 67 and 68

Q9: What is Super Scope?

A super scope is a collection of individual scope that can be managed as a single administrative unit in network.

Q10: What is different between Window server 2008 and Window server 2012?

1.       Microsoft has removed dcpromo command to install Active Directory domain service from window server 2012 whereas window server 2008 is used to install.
2.       Window server 2008 had release both 32bit and 64bit whereas window server 2012 completely released 64bit for better performance and scalability.
3.       Window server 2012 has upgrade version IISv8 with more features whereas window server 2008 IIS version 7.
4.       Window server 2012 has both interfaces core and graphic it means if want to work on core so may switch core and if want to graphics mode so may switch but in Window server 2008 have both different-different installation.
5.       Microsoft has released new version of PowerShell 3 with advance feature where window server 2008 has PowerShell 2 version.
6.       Hyper-v 3.0 has upgrade in Window server 2012 with some features such as virtual machine can be migrating without shared storage.
7.       Window server 2012 has feature that i-pad or phone can be part of domain in network.

Q11. What is WDS?

WDS stand for Windows deployment service. It is used to install operating system through remotely in network.

Q12: How many FSMO roles?

There are five FSMO roles:

1.       Schema role
2.       Domain naming master role
3.       Infrastructure role
4.       PDC Emulator role
5.       RID (relative infrastructure) role

Q13: In which file active directory database store and location?

Ntds.dit and location c:/window/ntds

Q14: What are the GPO?

Group policy object is collection of group policy security settings. Gpo affects the user and computer accounts located in sites, domain and organization Units(OU). There are two types of Group policy object local and non-local.

Q15: How to take gpo backup?

Open group policy object management > right click on group policy object > click on backup > select target (where you want to keep your backup file) > ok.

Q16: What is DFS?

Distributed File System (DFS) allows administrators to group shared folders located on different servers by transparently connecting them to one or more DFS namespaces. A DFS namespace is a virtual view of shared folders in an organization

Q17: How many types of Backup?

There are five types of Backup:

1.       Normal Backup
2.       Copy backup
3.       Differential backup
4.       Incremental backup
5.       Daily backup

Q18: What is different between differential and incremental backup?

Differential Backup:

Differential backups copy those files that have been changed since the last full backup took place. So if a full backup was done on Day 1, Day 2's differential will copy all of the files that have changed since Day 1's backup copied everything. Day 3's differential backup will also copy all of the files that have changed since Day 1's full copy was made

Incremental Backup:

Incremental backups copy all of the files that have changed since the last backup was made. They do this whether the last backup was a full one or an incremental copy. So if a full backup was done on Day 1, Day 2's incremental will back up all of the files that have changed since Day 1. Likewise, Day 3's incremental backup will only copy those files that have changed since Day 2's incremental took place

Q19: What is WSUS?

Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Window operating systems.

Q20: How to take active directory backup?

1. Open up your command prompt by clicking Start and type "cmd" and hit enter.

2. In your command prompt type "wbadmin start systemstatebackup -backuptarget:e:" and press enter.

Note: You can use a different backup target of your choosing

3. Type "y" and press enter to start the backup process.

Q21: How many lookup zone in DNS?

There are two lookup zone:

1.       Forward lookup zone
2.       Reverse lookup zone

Q22: How many partition in Active Directory?

There four partition in Active Directory:

1.       Schema partition
2.       Domain partition
3.       Infrastructure partition
4.       Application partition

Q23: What is structure of Active Directory?

There are two structure of Active Directory:

1.       Logical structure: Domain and organization Units
2.       Physical structure: Site, tree and forest

Q24: What is IIS?

Internet Information Server (IIS) is one of the most popular web servers from Microsoft that is used to host and provide Internet-based services to ASP.NET and ASP Web applications. A web server is responsible for providing a response to requests that come from users. When a request comes from client to server IIS takes that request from users and process it and send response back to users

Q25: What is FTP?

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

Q26: What is DHCP reservation?

A DHCP reservation is a permanent IP address assignment. It is a specific IP address within a DHCP scope that is permanently reserved for leased use to a specific DHCP client.

Q27: When I am accessing website so error 503 has shown service unavailable how to fix it?

Click on Start > Run > Type inetmgr > Press enter key > Expand IIS  > click on application pools  > Start application pool if it shows stopped >  right click on application pool and click on recycle.

Q28: How to take database backup Microsoft SQL express server 2014?

Open Microsoft SQL express server 2014 > Right click on database > Click on backup > Click on browse and assign path where you have to keep backup file > ok.

Q29: How many file create in Microsoft SQL?

Microsoft SQL create two files MDF and LDF.

Q30: How can I access Microsoft SQL server through IP Address in network?

Open Microsoft SQL configuration management > Double click on Network > Enable TCP/IP service.

Q31: How many network address?

There are five network address:

Class A: 1 to 126
Class B: 128 to 191
Class C: 192 to 223
Class D: 224 to 239
Class E: 240 to 255

Q32: What is private and public ip address?

Private ip address is unique in throughout world and it is paid ip address and use for WAN environment. It provide by ISP.

Public ip address is use for LAN environment and it is free of cost.

Q33: What is range of public ip address?

Class A: 10.0.0.0 to 10.255.255.255
Class B: 172.16.0.0 to 172.31.255.255
Class C: 192.168.0.0 to 192.168.255.255

Q34: What is APIPA IP address?

When client request for automatic ip address from DHCP server and then DHCP server does not provide any IP address in that case client assign ip address 169.254.x.x itself that is APIPA IP address.

Q35: How can I set Desktop Wallpaper through group policy?

Open group policy management > create new policy assign name Desktop Wallpaper > Right click on that > select edit > Expand user configuration > Expand Administrative templates > Click on Desktop > Enable prohibited change wallpaper > Enable set Desktop Wallpaper > provide image location >press ok.


Top 18 DNS Interview Questions and Answers

By // No comments:

Top 18 DNS Interview Questions and Answers



Q1: What is DNS?

Ans: DNS stand for Domain Name System/Service. It’s used to resolve FQDN (Fully qualified domain name) to IP address and Vice versa such as www.example.com to 184.59.51.27 and vice versa.

Q2: How many types of DNS?

Ans:  There are two types of DNS server:

1.       Authoritative DNS
2.       Non-Authoritative DNS

Q3: How many types of zone in DNS?

Ans: There are three types of Zone in DNS:

1.       Primary Zone
2.       Secondary Zone
3.       Stub Zone

Q4: What is stub zone?

Ans: Stub zone contains Name Server record, SOA and SRV information of network which helps to resolve fast query and assign best path.

Q5: What is Secondary zone and how does it different from primary zone?

Ans: Secondary zone is copy of primary zone, it’s contain read only database of primary zone whereas primary zone contains main database of DNS Server. when primary zone fail to respond then secondary zone resolve client query. It’s means fault tolerance also.







Q6: How many lookup zone in DNS?

Ans: There are two lookup zone in DNS:

1.       Forward lookup zone
2.       Reverse lookup zone

Q7: What is forward lookup zone?

Ans: Forward lookup zone helps to resolve name (www.example.com) to IP address (61.95.235.79). A record creates in forward lookup zone.

Q8: What is Reverse lookup zone?

Ans: Reverse lookup zone helps to resolve IP Address (104.211.37.48) to name (www.example.com). PTR record creates in Reverse Lookup Zone.

Q9: How many records in DNS server?

Ans:  There are six records in DNS Server:

1.       A, AAA Record
2.       PTR Record
3.       CName/Alias Record
4.       SRV Record
5.       SOA Record
6.       MX Record

Q10: What is A record?

Ans: A record is used to resolve Name (www.example.com) to IP Address (61.95.234.98). It creates in Forward lookup zone.

Q11: What is difference between A record and AAAA record?

Ans:  A record called as host record also. It is used to resolve Name to IP Address in IPv4 Address while AAAA record same work but it use in IPv6 Address.



Q12: What is PTR record?

Ans: PTR stand for Pointer record. It is used to resolve IP Address to name like www.example.com to 61.95.125.45. It creates in Reverse lookup zone.

Q13: What is SOA?

Ans:  SOA stand for Start of Authority record. It record is information of DNS zone about that zone and about other zone. Each zone contains single SOA record.

Q14: What is SRV record?

Ans: SRV stand for Service locator record. It contains of all service information of DNS Server like port, target, priority and so on.  

Q15: What is CName/ Alias record?

Ans: Canonical Name/Alias record is used to specify that a domain name is an alias for another domain such as host name test.example.com alias name www.example.com.

Q16: What is MX record?

Ans: Mx stand for Mail Exchanger record. This record use in mail server and responsible for accepting email messages on behalf of recipient’s domain.

Q17: Which port is used by DNS server?

Ans: Port: 53

Q18: What is the Name server and how to identify it?

Ans: Nameserver is a server on the internet to handle queries regarding the location of a domain name's various services. They allow using domains instead of IP addresses.

Q19: What is Round Robin DNS?


Ans: Round Robin DNS is technique which used to load distribution, load balancing or fault-tolerance Internet protocol service host like FTP server, webserver and manage the DNS response to address requests from client computers.

Top 14 DHCP Interview Questions and Answers

By // No comments:

DHCP Interview Questions and Answers




Q1: What is DHCP server?

Ans: DHCP stand for Dynamic Host Configuration Protocol. It is network protocol that enable a server to assign automatically IP address range such as subnet, gateway etc. to computer in network. It uses 67 and 68 port number.

Q2: How does it work?

Ans: It works on DORA process.

D denote DHCP Discover

O denote DHCP Offer

R denote DHCP Request

A denote DHCP Acknowledgement






Q3: Which port are used by DHCP?

Ans: 67 and 68

Q4: What is DHCP scope?

Ans: It’s range of possible IP Addresses that DHCP server can lease IP address to client on a subnet.

Q5: What is DHCP Super Scope?

Ans: A super scope is a collection of individual scopes that can be managed as a single administrative unit in network.

Q6: What is reservation in DHCP?

Ans: DHCP reservation feature is used to reserve IP address for providing permanent IP address to client.

Q7: What does default time lease new IP address to client?

Ans: 8 days



Q8: What is command used to release IP address?

Ans: ipconfig /release

Q9: What is command used to renew IP address?

Ans: ipconfig /renew

Q10: What is DHCP relay agent?

Ans: A DHCP relay agent is any host or IP router that forwards DHCP packets between clients and servers.

Q11: How to make client of DHCP server?

Ans: Check mark on Obtain an IP address automatically

Q12: What is APIPA IP address?

Ans: When DHCP server fail or down to assign automatically ip address to client in that case computer automatic assign ip address itself that is APIPA IP address.

Q13: What is the range of APIPA IP address?

Ans: 169.254.0.1 to 169.254.255.255

Q14: Suppose we have a PC which is connected to our corporate network and unable to get ip address and when I am using ipconfig command to check ip address so show 169.254.x.x ip address what is the reason behind it?


Ans: It possible that DHCP down or unable to make connection between server to client.

Top 20 Active Directory Interview Questions and Answers

By // No comments:
Top 20 Active Directory Interview Questions and Answers


Q1: What is Active Directory?
Ans: Active Directory is database services which contains all the information of Objective such as Users, Computers, OU, Printers and so on. It’s enable Authentication and Authorization for Client in domain. It used to manage Centralized security in network.

Q2: What is the location to store Active Directory file?
Ans: %Systemroot%/NDTS/ntds.dit or C:/Windows/ NDTS/ntds.dit

Q3: What is file name in which Active Directory file store?
Ans: Ntds.dit

Q4: Which protocol is used  by Active directory?
Ans: LDAP




Q5: How many partition in Active Directory?
Ans: Schema Partition, Domain Partition, Configuration Partition and Application Partition.

Q6: How to check FSMO Role in window server operating System?
Ans: Netdom query

Q7: How many file are create in NTDS folder? Brief describe about these.
Ans: Ntds.dit : The Active Directory database.
       Edb.chk : The checkpoint file.
       Edb*.log : The transaction logs; each 10 megabytes (MB) in size.
       Res1.log and Res2.log : Reserved transaction logs.

Q8: What is the Sysvol folder?
Ans: Sysvol stand for System volume. It contains all information and share folder copy of domain and also Group Policy security.

Q9: what is the logical/physical structure of AD environment?
Ans: Physical Structure:  Domain Controller and Site.
Logical Structure: Domain, Tree, Forest and Organization Unit.

Q10: How to take backup of Active Directory?
Ans:  System State data where all the Active Directory file and information store. Utility for backup Ntbackup and wbadmin



Q11:  What is Stand for DC, CDC, ADC and RODC?
Ans: DC Stand for Domain controller.
         CDC stand for Child domain controller
         ADC stand for Additional domain controller
         RODC stand for Read only domain controller.

Q12: What is object and example of distinguished name?
Ans: Objects are located within Active Directory domains according to a hierarchical path, which includes the labels of the Active Directory domain name and each level of container objects. The full path to the object is defined by the distinguished name (also known as a "DN"). The name of the object itself, separate from the path to the object, is defined by the relative distinguished name.
Example: CN=Smith,OU=Sales,DC=ABC,DC=COM

Q13: What is OU?
Ans: OU stand for Organization Unit. It is collection of users and group and it give us platform to apply group policy security on users and group in OU.

Q14: Why do we create OU?
Ans: OU stand for Organization Unit, It helps to mange user and group of user according to department and give us platform to apply group policy security.

Q15: What is domain?
Ans: Domain is collection of users, group, computers, printers and so on in a network. These objects share a common directory database, security policies, and security relationships with other domains. After install Active Directory domain service for using centralized security in a domain on objects.

Q16: What is distinguish between Domain and Domain controller?
Ans: Domain: Domain is collection of users, group, computers, printers and so on in a network. These objects share a common directory database, security policies, and security relationships with other domains.
Domain Controller: It is used to denote a computer within the domain that controls the rest of the computers in the domain. From the domain controller, a network administrator can access networked computers, create or delete accounts, or manage privileges and security.

Q17: What is Forest?
Ans: Forest is a collection of Tree in domain that share a common global catalog, directory schema, logical structure and directory configuration. At the top forest represents the security boundary within user, group and other object are accessible.

Q18: What is Tree?
Ans: Tree is Collection of Domain which use contiguous name hierarchal in Domain (such as abc.com>it.abc.com>South.it.abc.com).

Q19: What is different between Role transfer and Seizing?
Ans: When Primary Domain controller (DC) server is going into maintain task and another servicing then FSMO role transfer task perform with Domain Controller (DC) and Additional Domain Controller (ADC) whereas Domain Controller(DC) dead and it’s not usable for future in that case Seize task perform on Additional Domain Controller (ADC) to become Domain Controller (DC) .

Q20: How to recover deleted Active directory users?
Ans: In Window server 2012: Open Run and type “dsac.exe” then new wizard open Active Directory Administrative Center then click on Domain name(like abc.com) and then go to OU then you see deleted user now recover that.
In window server 2008: LDP used to recover deleted active directory user.


Wireless and Network Interview Questions and Answers

By // No comments:
Wireless and Network Interview Questions and Answers






Q1. What is Wi-Fi?

Wi-Fi is a technology that uses radio waves to provide network connectivity. A wi-fi connection is established using a wireless adapter to create hotspots - areas in the vicinity of a wireless router that are connected to the network and allow users to access internet services. Once configured, wifi provides wireless connectivity to your devices by emitting frequencies between 2.4 GHz - 5 GHz, based on the amount of data on the network.

Q2. What is a Wi-Fi hotspot?

A hotspot is a physical location where people may obtain internet access, typically using wi-fi technology, via a wireless local area network (Wlan) using a router connected to an internet service provider.

Q3. What are IBSS and BSS?

Independent Basic Service Set (IBSS) allows two or more devices to communicate directly with each other without a need for a central device.
Basic Service Set (BSS) wireless LAN is established using a central device called an Access Point that centralizes access and control over a group of wireless devices.

Q4. Why WPA encryption is preferred over WEP?

A)     Encryption is preferred over WEP.
B)      The access point and the client are manually configured with different WPA key values.
C)      Wep Key values remain the same until the client configuration is changed.
D)     The values of WPA keys can change dynamically while the system is used.

Q5. What is 802.1x and EAP?

IEEE 802.1x is an IEEE standard for port-based network access control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or Wlan.

Q6. Name two devices can interfere with the operation of a wireless network because they operate on similar frequencies?

1.       Microwave oven
2.       Cordless phone

Q7. What are three basic parameters to configure on a wireless access point?

1.       SSID
2.       RF
3.       Channel authentication method





Q8. What is the maximum data rate specified for IEEE 802.11b wlan?

11 mbps

Q9. Which encryption type does wpa2 uses?

WPA uses Tkip and wpa2 uses AES, but in summary Tkip is an older encryption standard used by the old WPA standard. AES is a newer wi-fi encryption solution used by the new-and-secure wpa2 standard. In theory, that's the end of it 317 and 802.1b is being utilized in the wireless network.

Q10. How does DHCP work with the Wireless?

The wireless is designed to act as a dhcp relay agent to the external dhcp server and acts like a dhcp server to the client. This is the sequence of events that occurs: Generally, wlan is tied to an interface which is configured with a dhcp server. When the wireless receives a dhcp request from the client on a wlan, it relays the Request to the dhcp server with its management ip address. The wireless shows its virtual ip address, which must be a non−routable address, usually configured as 192.168.0.1, as the dhcp server to the client.

Q11. Which two wireless encryption method are based on RC4 encryption algorithm?

1.       Wep
2.       Tkip

Q12. What is the function of wlan on wireless?

Wlan is similar to that of ssid in the access point. It is required for a client to associate with its wireless network.

VTP Interview Questions and Answers

By // No comments:


          VTP Interview Questions and Answers



1.What are different vlan modes ?

The vtp protocol is a fairly complex protocol, but easy to understand and implement once you get to know it. Currently, 3 different versions of the protocol exist, that is, version 1, 2 (adds support for token ring networks) and 3, with the first version being used in most networks.

Despite the variety of versions, it also operates in 3 different modes: server, client and transparent mode, giving us maximum flexibility on how changes in the network effect the rest of our switches. To help keep things simple and in order to avoid confusion, we will work with the first version of the vtp protocol - vtp v1, covering more than 90% of networks.

Below you'll find the 3 modes the vtp protocol can operate on any switch throughout the network:

Vtp server mode

Vtp client mode

Vtp transparent mode




2. What happens to interfaces when you delete a vlan?

You can delete a specific vlan or all vlans that are configured on a network interface. When you delete all vlans on an interface, the interface is then available to be configured as a regular physical interface.

3. What is the difference between vtp transparent and vtp client mode ?

All server and client switches in the same vtp domain will use the vlan database with the highest revision number. ... Vtp transparent mode, maintains its own vlan definitions in its config file. Vtp transparent mode, though, can pass a vlan database through it, although it doesn't use it itself.

4. Which is the default mode of vtp ?

Server mode

5. What is vtp pruning ?

Vlan trunking protocol (vtp) is used to communicate vlan information between switches in the same vtp domain. Vlan trunking protocol (vtp) pruning is a feature in cisco switches, which stops vlan update information traffic from being sent down trunk links if the updates are not needed.

6. What are two benefits of using vtp in a switching environment?

It maintains vlan consistency across a switched network.
It allows frames from multiple vlans to use a single interface.
It allows vlan information to be automatically propagated throughout the switching environment. ... One of the two switches must be configured as a vtp server.

7. Which vtp mode is capable of creating only local vlans and does not synchronize with other switches in the vtp domain?

Transparent

Vlan Interview Questions and Answers

By // No comments:
Vlan Interview Questions and Answers





Q1. Which switching technology reduces the size of a broadcast domain?

By using vlan technology we can reduces the size of Broadcast domain. Vlan (virtual local area network) is a logical grouping or segmenting the devices under a single broadcast domain. As a result provides security and flexibility.

Q2. Which protocols are used to configure trunking on a switch?

Vlan trunking protocol (vtp) is a cisco proprietary protocol that propagates the definition of virtual local area networks (vlan) on the whole local area network. To do this, vtp carries vlan information to all the switches in a vtp domain. Vtp Advertisements can be sent over 802.1q, and isl trunks.

Q3. Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new vlan to be distributed to all the switches in a domain?

Vtp

Q4. What is SVI?

A switched virtual interface (SVI) is a vlan of switch ports represented by one interface to a routing or bridging system. There is no physical interface for the vlan and the SVI provides the layer 3 processing for packets from all switch ports associated with the vlan.

Q5. What is meant by “router on stick”?

Router-on-a-stick is a term frequently used to describe a setup up that consists of a router and switch connected using one Ethernet link configured as an 802.1q trunk link. In this setup, the switch is configured with multiple vlans and the router performs all routing between the different networks/vlan.

Q6. Which are the two Trunking protocols?

There are two main types of Encapsulation Trunking protocols.

1. ISL (inter switch link) which is cisco proprietary protocol.

2. 802.1q which is an IEEE standard.

Q7. Which protocol encapsulates Ethernet frames?

ISL encapsulates Ethernet frames while 802.1q tags Ethernet frame.

Q8. Which is the vlan not tagged by 802.1q?

Native vlan

Q9. How to delete vlan information from switch?

Delete flash:vlan.dat

Q10. What is difference between Vlan access and trunk mode?

Access mode is used to connect end devices (host) to switches while trunk mode is used to connect between switches.

Q11. What is difference between dynamic auto and dynamic desirable?

Dynamic Desirable: attempts to negotiate a trunk with the other end.




Dynamic Auto: forms a trunk only if requested by the other end.

Q12. What is the use of none negotiate command in switch?

None negotiate command disables automatic formation of trunk links. It will be good to configure trunk manually and give none-negotiate command for security reason.

Q13. Explain different switch port modes?

Trunk: forms an unconditional trunk

Dynamic Desirable: Attempts to negotiate a trunk with the far end

Dynamic Auto: Forms a trunk only if requested by the far end

Access: It will never form a trunk

Q14. What is DTP?
Dynamic Trunking protocol is used to automatically establish trunks between capable ports (insecure method).

Q15. Can we see trunk interfaces in show vlan command?

Nope


Q16. Which is the command used to see trunk interfaces?

Show interface trunk

Show interface fa1/0/13 trunk

Show interface fa1/0/13 switchport

Show interface status | include trunk

Q17. What are frame tagging and different types of frame tagging?
Vlan frame tagging is a technology which is used to identify the vlan that the packet belongs to. The vlan frame tag is placed on the Ethernet frame when the Ethernet frame reaches a switch from an access port, which is a member of vlan.

Q18. What is the maximum number of vlans permitted in 802.1q and ISL?
Maximum vlan permitted in 802.1q is 4094

Maximum vlan permitted in ISL is 1000

Q19. What is the header size of 802.1q?

4 bytes

Q20. What is the difference between an access port and a trunk port?

A trunk does add dot1q or ISL tags directly to frames and can exist on all or multiple vlans. While an access port only passes traffic from a set vlan but does not modify the frame with a vlan tag.

Q21. What is a native vlan and what type of traffic will go through native vlan?

The native vlan is the only vlan which is not tagged in a trunk, in other words, native vlan frames are transmitted unchanged. Per default the native vlan is vlan 1 but you can change that:

#show interface fa0/8 trunk.

#Port mode encapsulation status native vlan

Q22. What is inter-vlan routing?

Virtual LAN (vlans) divides one physical network into multiple broadcast domains. But, vlan-enabled switches cannot, by themselves, forward traffic across vlans boundaries. So you need to have routing between these vlans which is called inter vlan routing.

OSPF Interview Questions and Answers

By // No comments:
OSPF Interview Questions and Answers




1. Why are loopbacks advertised as /32 host routes in ospf?

Loopbacks are considered host routes in ospf, and they are advertised as /32

2. Which command in ospf shows the network lsa information?

Show ip ospf 10 database network

3. What command would you use to create a totally stubby area?

Router ospf 10

Area 10 stub no –summary


4. How we can connect a normal area to a backbone area if they are not directly connected?

By using virtual link

5. Can we have ospf run over a gre tunnel?

Yes, refer to configuring a gre tunnel over ipsec with ospf.

6. Is there a way to manipulate and prefer the type 3 lsas to originate from two different areas sent to the non-backbone area?

Type 3 lsa is originated by the area border router (abr) as a summary route. Manipulating the summary route is not possible in an abr router.

7. What is the maximum number of ospf processes (vrf aware) on 7600/6500 platforms?

Cisco ios has a limit of 32 routing processes. Two of these are saved for static and directly connected routes. The cisco 7600 router supports 28 ospf processes per vrf.

8. Is there a way to compare cisco nx-os/ios ospf commands?

Yes, refer to cisco nx-os/ios ospf comparison.

9. Is there any feature of ospf protocol for quick convergence and a slow re-convergence of routes?

The ospf shortest path first throttling feature makes it possible to configure spf scheduling in millisecond intervals and to potentially delay spf calculations during network instability. Spf is scheduled to calculate the shortest path tree (spt) when there is a change in topology.

Syntax of the command under ospf:

Timers throttle spf [spf-start] [spf-hold] [spf-max-wait]

Where:

Spf-start—initial delay to schedule an spf calculation after a change, in milliseconds. Range is from 1 to 600000.

Spf-hold—minimum hold time between two consecutive spf calculations, in milliseconds. Range is from 1 to 600000.

Spf-max-wait—maximum wait time between two consecutive spf calculations, in milliseconds. Range is 1 to 600000.

10. What the hello packet carries when we enable ospf?

Hello packets are ospf packet type 1. These packets are multicast periodically to 224.0.0.5 multicast address on all interfaces (unicast on virtual-links) enabling dynamic discovery of neighbors and maintain neighbor relationships. On broadcast and nbma networks, hello packets are used to elect dr and bdr.

Network mask- subnet mask of the advertising ospf interface. For unnumbered point-to-point interfaces and virtual-links, it is set to 0.0.0.0 (4-bytes)

hello interval- interval at which hello packets are advertised. By default, 10 seconds for point-to-point link and 30 seconds for nbma/broadcast links (2-bytes)

options- the local router advertises its capabilities in this field. (1-byte)

rtr pri- the priority of the local router. It is used for dr/bdr election. If set to 0, the router is ineligible for the election. (1-byte)

routerdeadinterval- the dead interval as requested by the advertising router. By default, 40 seconds for point-to-point link and 120 seconds for nbma/broadcast links (4-bytes)

designated router- the ip address of the current dr. Set to 0.0.0.0 if no dr is elected yet. (4-bytes) backup designated router- the ip address of the current bdr. Set to 0.0.0.0 if no bdr is elected yet. (4-bytes)

neighbor- the router ids of all ospf routers from whom a valid hello packet have been seen on the network.


11. What is ospf router id and how is it elected?

Router id is 32 bit number similar to ip address. It is elected as highest ip address of loopback interfaces or highest ip of the active physical interfaces if loopback is not present. It can also be set manually but it will take effect when ospf process is reset completely or device is reloaded. There should be only one router-id per device running ospf to avoid database issues




12. What are lsa types?

Lsa type 1 (router lsa)

Router link state advertisements type 1 are generated by every router for each link that belongs to an area. They are flooded only inside of area to which they belong. Link id of this lsa is the router id of the router that generated it.

Lsa type 2 (network lsa)

Generated by designated router (dr) for multiaccess networks and describe the routers that are connected to that segment. They are sent inside the area to which the network segment belong. The link id is the interface ip address of the designated router which describe that particular segment.

Lsa type 3 (summary lsa)

Type 3 lsas are generated by area border routers (abrs). In type 3 lsas are advertised networks from an area to the rest of the areas in as. Advertised networks in type 4 lsa can be summarized or not. The link-state id used by this lsa is the network number advertised.

Lsa type 4 (summary lsa)

Generated by abrs, this type os lsa contain routes to asbrs. Link id used is router id of the asbr described. Are not flooded in stub areas.

Lsa type 5 (external lsa)

Autonomous system external lsas are generated by asbrs and contain routes to networks that are external to current as. Link-state id is network number advertised in lsa. Type 5 lsas are not flooded inside any stub areas.

Lsa type 6 (multicast lsa)

This type of lsa is used for multicast applications.

Lsa type 7 (nssa external lsa)

Type 7 lsa allow injection of external routes throug not-so-stubby-areas (nssa). Generally external routes are advertised by type 5 lsa but they are not allowed inside any stub area. That’s why type 7 lsa is used, to trick ospf. Type 7 lsa is generated by nssa asbr and is translated into type 5 lsa as it leaves the area by nssa abr, which is then propagated throughout the network as type 5 lsa.

Lsa type 8 (external attributes lsa for border gateway protocol (bgp))

Used to work with bgp.

Lsa type 9,10,11 (opaque lsas)


For future use.

13. What are area types? Why there are different area concepts?

Standard areas can contain lsas of type 1, 2, 3, 4, and 5, and may contain an asbr. The backbone is considered a standard area.

Stub areas can contain type 1, 2, and 3 lsas. A default route is substituted for external routes. Totally stubby areas can only contain type 1 and 2 lsas, and a single type 3 lsa. The type 3 lsa

describes a default route, substituted for all external and inter-area routes.

Not-so-stubby areas implement stub or totally stubby functionality yet contain an asbr. Type 7 lsas generated by the asbr are converted to type 5 by abrs to be flooded to the rest of the ospf domain.

14. What is the main importance of stub network? Why it is been developed in ospf?

A stub network is a somewhat casual term describing a computer network, or part of an internetwork, with no knowledge of other networks, that will typically send much or all of its non-local traffic out via a single path, with the network aware only of a default route to non-local destinations

15. What will happen if we redistribute between different processes?

There can be several reasons for redistribution between multiple processes. These are a few examples:

Filter an ospf route from part of the domain Separate different ospf domains

Migrate between separate domains

16. What is the adjacency type? Is adjacency is formed in between all the ospf enabled routers or not? Explain

Down

This is the first ospf neighbor state. It means that no information (hellos) has been received from this neighbor, but hello packets can still be sent to the neighbor in this state.

During the fully adjacent neighbor state, if a router doesn't receive hello packet from a neighbor within the router dead interval time (routerdead interval = 4*hello interval by default) or if the manually configured neighbor is being removed from the configuration, then the neighbor state changes from full to down.

Attempt

This state is only valid for manually configured neighbors in an nbma environment. In attempt state, the router sends unicast hello packets every poll interval to the neighbor, from which hellos have not been received within the dead interval.

Init

This state specifies that the router has received a hello packet from its neighbor, but the receiving router's id was not included in the hello packet. When a router receives a hello packet from a neighbor, it should list the sender's router id in its hello packet as an acknowledgment that it received a valid hello packet.

2-way

This state designates that bi-directional communication has been established between two routers. Bi-directional means that each router has seen the other's hello packet. This state is attained when the router receiving the hello packet sees its own router id within the received hello packet's neighbor field. At this state, a router decides whether to become adjacent with this neighbor. On broadcast media and non-broadcast multiaccess networks, a router becomes full only with the designated router (dr) and the backup designated router (bdr); it stays in the 2-way state with all other neighbors. On point-to-point and point-to-multipoint networks, a router becomes full with all connected routers.

At the end of this stage, the dr and bdr for broadcast and non-broadcast multiacess networks are elected. For more information on the dr election process, refer to dr election.

Note: receiving a database descriptor (dbd) packet from a neighbor in the init state will also a cause a transition to 2-way state.

Exstart

Once the dr and bdr are elected, the actual process of exchanging link state information can start between the routers and their dr and bdr.

In this state, the routers and their dr and bdr establish a master-slave relationship and choose the initial sequence number for adjacency formation. The router with the higher router id becomes the master and starts the exchange, and as such, is the only router that can increment the sequence number. Note that one would logically conclude that the dr/bdr with the highest router id will become the master during this process of master-slave relation. Remember that the dr/bdr election might be purely by virtue of a higher priority configured on the router instead of highest router id. Thus, it is possible that a dr plays the role of slave. And also note that master/slave election is on a per-neighbor basis.

Exchange

In the exchange state, ospf routers exchange database descriptor (dbd) packets. Database descriptors contain link-state advertisement (lsa) headers only and describe the contents of the entire link-state database. Each dbd packet has a sequence number which can be incremented only by master which is explicitly acknowledged by slave. Routers also send link-state request packets and link-state update packets (which contain the entire lsa) in this state. The contents of the dbd received are compared to the information contained in the routers link-state database to check if new or more current link-state information is available with the neighbor.

Loading

In this state, the actual exchange of link state information occurs. Based on the information provided by the dbds, routers send link-state request packets. The neighbor then provides the requested link-state information in link-state update packets. During the adjacency, if a router receives an outdated or missing lsa, it requests that lsa by sending a link-state request packet. All link-state update packets are acknowledged.

Full

In this state, routers are fully adjacent with each other. All the router and network lsas are exchanged and the routers' databases are fully synchronized.

Full is the normal state for an ospf router. If a router is stuck in another state, it is an indication that there are problems in forming adjacencies. The only exception to this is the 2-way state, which is normal in a broadcast network. Routers achieve the full state with their dr and bdr in nbma/broadcast media and full state with every neighbor in the remaining media such as point-to-point and point-to-multipoint.

Note: the dr and bdr that achieve full state with every router on the segment will display full/drother when you enter the show ip ospf neighbor command on either a dr or bdr. This simply means that the neighbor is not a dr or bdr, but since the router on which the command was entered is either a dr or bdr, this shows the neighbor as full/drother.

17. If router id is same between ospf enabled routers will they form adjacency or not?

Yes

18. What is lsa 7 and how it can be used?

Type 7 lsa allows injection of external routes throug not-so-stubby-areas (nssa). Generally external routes are advertised by type 5 lsa but they are not allowed inside any stub area. That’s why type 7 lsa is used, to trick ospf. Type 7 lsa is generated by nssa asbr and is translated into type 5 lsa as it leaves the area by nssa abr, which is then propagated throughout the network as type 5 lsa.

19. What is ospf metric? How is it identified in routing table? Does it support redistribution?
Ospf uses a reference bandwidth of 100 mbps for cost calculation. The formula to calculate the cost is reference bandwidth divided by interface bandwidth. For example, in the case of ethernet, it is 100 mbps / 10 mbps = 10. Note: if ip ospf cost cost is used on the interface, it overrides this formulated cost.

20. What are the states used in ospf when forming neighbor ship?

2-way. The 2-way state indicates that the local router has received a hello packet with its own router id in the neighbor field. Thus, bidirectional communication has been established and the peers are now ospf neighbors

21. What are the packet types does ospf use? Explain hello, dead timers, lsa, lsu, lsr packets.

Types of ospf packets:

1. The hello packet:

the hello packets are sent over a period of time on all interfaces for the purpose of establishing and maintaining neighbor relationships. Hello packets are multicast on the networks having multicast capability, which enables discovery of neighboring routers dynamically. The inhabitance of differences among hello packets can form neighbor relationships by agreeing certain parameters.

2. The database description packet:

at the time of adjacency is being initialized, these packets are exchanged. These packets describe topological database contents. The database may be described by using multiple packets. A poll-response procedure is used for the description of multiple packets usage. Among the routers, one is designated to be master, and the other a slave. The database description packets are sent by the slave after sending the database description packets by the master.

3. The link state request packet:

a router may find the parts of its topological database are out of date, after database description package exchange with a neighboring router. The link state request packet is utilized for requesting the pieces of the neighbor’s database which are more up to date. There may be a need to utilize multiple link state request packets.

4. The link state update packets:

the flooding of link state advertisements is implemented by these packets. A collection of link state advertisements are carried by each link statement update packet, one hop further from its origin. A packed may be included by several link state advertisements.

5. The link state acknowledge packets:

the reliability of flooding link state advertisement is made by explicitly acknowledging flooded advertisements. The accomplishment of this acknowledgement is done through the sending and receiving of link sate acknowledgement packets. A single link state acknowledgement packet is used to acknowledge the multiple link state advertisements.

22. What will be hello/dead timers in network having link capacity of >t1 and <=t1?

For link above t1 i.e. 1.544mbps hello = 10 seconds, dead is 40 seconds

For link = or below hello = 30 seconds, dead = 120 seconds.

Dead interval is exact four times than hello and its value can’t be set manually.

23. What is the dr/bdr in ospf? How these are elected and in what scenario?

Dr/bdr election happens in shared multi access network to avoid full mesh scenario. In shared environment, every ospf router will try to form neighbor ship with other router, so dr/bdr comes in to action and act as single point of contact. Neighborship will only form with dr and backup dr. Dr router will be the highest priority router and bdr will be second highest priority. If there is a tie, then highest router-id will be used to make the decision. Router id is elected as the highest numerical loopback ip or the highest physical active ip address or the interface ip which comes up first.

24. What is the multicast ips used by ospf? What multicast ip does dr/bdr router and non-dr use?

Ospf routers use 224.0.0.5 multicast ip address. However, in dr/bdr it uses 224.0.0.5 and 224.0.0.6. Dr/bdr will use 224.0.0.6 while replying to ospf routers in broadcast multi access network.

25. How do i change the reference bandwidth in ospf?

You can change the reference bandwidth in cisco ios software release 11.2 and later using the ospf auto-cost reference-bandwidth command under router ospf. By default, reference bandwidth is 100 mbps. The ospf link-cost is a 16-bit number. Therefore, the maximum value supported is 65,535

26. How to generate default route in ospf?

There are two ways to inject a default route into a normal area. If the asbr already has the default route in its routing table, you can advertise the existing 0.0.0.0/0 into the ospf domain with the default-information originate router configuration command

27. How external routes are advertised generally (e1 or e2)? How to change from e2 to e1?

When we redistribute a protocol in ospf, by default itaccept those route as e2 in ospf domain. E1 & e2 is external type 1 and rxternal type 2. In cisco external route are e2 by nature. Basically difference between e1 and e2 is : e1 includes internal cost to asbr added to external cost, e2 does not include internal cost. It is same as external cost.E1 is prefered if route is equal cost path exist. Example: r1-r2-r3 is connected and r3 is a asbr. And suppose a cost of between r1 to r2 is 10 and r2 to r3 is 10. Cost of external router on r3(asbr) is 1800. Now if you thik about e1 cost to external route from r1 is (10+10+1800) 1820 but in case of e2 it is 1800.. E1 is usefull when there are multiple asbr to same destination and e2 is usefull when there is only one asbr in to reach destinaltion

28. What is ospf super backbone area?

The idea is that this super backbone can override the default behavior of ospf and provide connectivity between customers without the need for crazy virtual-links or tunneling (can’t use vls across area 0 anyway).

29. What is the concept of auto-cost in ospf?

The default reference bandwidth for OSPF is 10^8 bps or 100Mbit. Increasing the reference-bandwidth allows a more granular OSPF design. If changed it should be changed on all routers in the OSPF domain.The reason you would change the reference-bandwidth is that you may have link faster than 100M in your network. If you have Gigabit networks but are using the default reference-bandwidth, then Gigabit links are equal in cost to fast Ethernet.

device# configure

device(config)# router ospf

device(config-ospf-router)# auto-cost reference-bandwidth 500

30. Is there any dr and bdr concept in /31 networks?

No

31. What are the different network types in ospf?

Ospf network types

Having worked almost exclusively with ethernet transport my whole career, it took me a while to really grasp the concept of non-broadcast networks. Dynamic routing protocols, particularly ospf, demand familiarity with all sorts of layer two topologies, so i knew i had to better educate myself on the matter. Fortunately, working withdynamips and virtual frame relay networks provided the experience i needed to feel comfortable implementing all the different ospf network types.

Ospf addresses three classes of network (as listed in section 1.2 of rfc 2328): point-to-point, broadcast, and non-broadcast.

Point-to-point

This is by far the simplest network type, and serves as a convenient anchor from which to advance the discussion. A point-to-point network is, as its name aptly describes, a link between exactly two points (or routers). A packet sent from on of the routers will always have exactly one recipient on the local link.

Broadcast

Obviously, point-to-point links don't scale well. A much more efficient manner of connecting a large number of devices is to implement a multiaccess segment; that is, a segment which can be accessed by multiple end points. An ethernet segment is an example of such a network.

Ethernet networks support broadcasts; a single packet transmitted by a device can be multiplied by the medium (in this case an ethernet switch) so that every other end point receives a copy. This is advantageous not only in bandwidth savings, but also in facilitating automatic neighbor discovery.

In the example pictured above, r1 can multicast (a broadcast intended only for certain recipients) an ospf hello message to the link, knowing that all other ospf routers connected to the link will receive it and reply with their own multicast message. Consequently, neighbors can quickly identify each other and form adjacencies without knowing addresses beforehand. Isn't that convenient?

Ospf routers on a multiaccess segment will elect a designated router (dr) and backup designated router (bdr) with which all non-designated routers will form an adjacency. This is to ensure that the number of adjacencies maintained does not grow too large; a segment containing ten routers would require 45 adjacencies to form a mesh, but only 17 when a dr and bdr are in place.

Non-broadcast

Unfortunately, not all multi access technologies support broadcast transmissions. Frame relay and atm are probably the most common examples of non-broadcast transport, requiring individual permanent virtual circuits (pvcs) to be configured between end points.

Notice in the frame relay topology pictured above, r1 must craft and transmit an individual packet for every destination he wants to reach. Aside from being horribly inefficient with regard to bandwidth, this limitation requires the router to know the addresses of his neighbors before he can communicate to them.

Ospf can operate in one of two modes across a non-broadcast network: non-broadcast multi-access (nbma) or point-to-multipoint. Each of these topologies tackles the absence of broadcast capability from a different direction.

Non-broadcast multi-access (nbma)

An nbma segment emulates the function of a broadcast network. Every router on the segment must be configured with the ip address of each of its neighbors. Ospf hello packets are then individually transmitted as unicast packets to each adjacent neighbor.

As in a true broadcast network, a dr and bdr are elected to limit the number of adjacencies formed.

Point-to-multipoint

A point-to-multipoint configuration approaches the non-broadcast limitation in a different manner. Rather than trying to emulate broadcast capability, it seeks to organize the pvcs into a collection of point-to-point networks. Hello packets must still be replicated and transmitted individually to each neighbor, but the multipoint approach offers two distinct advantages: no dr/bdr is needed, and the emulated point-to-point links can occupy a common subnet.

All routers attached to a non-broadcast network must be manually configured to recognize it as a point-to-multipoint segment:

Router(config-if)# ip ospf network point-to-multipoint [non-broadcast]

The non-broadcast parameter can be appended to the ospf network type to force unicasting of packets rather than relying on multicast. This might be necessary when dynamic circuits are in use.

32. How does ospf calculate it’s metric or cost?

Ospf uses a reference bandwidth of 100 mbps for cost calculation. The formula to calculate the cost is reference bandwidth divided by interface bandwidth. For example, in the case of ethernet, it is 100 mbps / 10 mbps = 10.

Note: if ip ospf cost cost is used on the interface, it overrides this formulated cost.

33. What algorithm is used by ospf if equal cost routes exist?

If equal cost routes exist, ospf uses cef load balancing.

34. Are ospf routing protocol exchanges authenticated?


Yes, ospf can authenticate all packets exchanged between neighbors. Authentication may be through simple passwords or through md5 cryptographic checksums. To configure simple password authentication for an area, use the command ip ospf authentication-key to assign a password of up to eight octets to each interface attached to the area. Then, issue the area x authentication command to the ospf router configuration to enable authentication. (in the command, x is the area number.)

35. What is the link-state retransmit interval, and what is the command to set it?

Ospf must send acknowledgment of each newly received link-state advertisement (lsa). It does this by sending lsa packets. Lsas are retransmitted until they are acknowledged. The link-state retransmit interval defines the time between retransmissions. You can use the command ip ospf retransmit-interval to set the retransmit interval. The default value is 5 seconds.

36. What is the purpose of the variable ip-ospf-transmit-delay?

This variable adds a specified time to the age field of an update. If the delay is not added before transmission over a link, the time in which the link-state advertisement (lsa) propagates over the link is not considered. The default value is 1 second. This parameter has more significance on very low-speed links.

37. Can an ospf default be originated into the system based on external information on a router that does not itself have a default?

Ospf generates a default only if it is configured using the command default-information originate and if there is a default network in the box from a different process. The default route in ospf is 0.0.0.0. If you want an ospf-enabled router to generate a default route even if it does not have a default route itself, use the command default-information originates always.

38. Can i use the distribute-list in/out command with ospf to filter routes?

The distribute-list commands are supported in ospf but work differently than distance-vector routing protocols such as routing information protocol (rip) and enhanced interior gateway routing protocol (eigrp). Ospf routes cannot be filtered from entering the ospf database. The distribute-list in command only filters routes from entering the routing table; it does not prevent link-state packets from being propagated. Therefore, this command does not help conserve router memory, and it does not prohibit a router from propagating filtered routes to other routers.

39. How can i give preference to ospf inter area routes over intra-area routes?


According to section 11 of rfc 2328 , the order of preference for ospf routes is:

Intra-area routes, o Interarea routes, o ia

External routes type 1, o e1 External routes type 2, o e2

This rule of preference cannot be changed. However, it applies only within a single ospf process. If a router is running more than one ospf process, route comparison occurs. With route comparison, the metrics and administrative distances (if they have been changed) of the ospf processes are compared. Route types are disregarded when routes supplied by two different ospf processes are compared.

40. Do i need to manually set up adjacencies for routers on the switched multimegabit data service (smds) cloud with the ospf neighbor subcommand?

In cisco ios software releases earlier than cisco ios software release 10.0, the neighbor command was required to establish adjacencies over nonbroadcast multiaccess (nbma) networks (such as frame relay, x.25, and smds). With cisco ios software release 10.0 and later, you can use the ip ospf network broadcast command to define the network as a broadcast network, eliminating the need for the neighbor command. If you are not using a fully meshed smds cloud, you must use the ip ospf network point-to-multipoint command.

41. When routes are redistributed between ospf processes, are all shortest path first algorithm (spf) metrics preserved, or are the default metric value used?

The spf metrics are preserved. The redistribution between them is like redistribution between any two ip routing processes.

42. How does cisco accommodate ospf routing on partial-mesh frame relay networks?

You can configure ospf to understand whether it should attempt to use multicast facilities on a multi-access interface. Also, if multicast is available, ospf uses it for its normal multicasts.

Cisco ios software release 10.0 includes a feature called subinterfaces. You can use subinterfaces with frame relay to tie together a set of virtual circuits (vcs) to form a virtual interface, which acts as a single ip subnet. All systems within the subnet should be fully meshed. With cisco ios software releases 10.3, 11.0 and later, the ip ospf point-to-multipoint command is also available.

43. Which address-wild-mask pair should i use for assigning an unnumbered interface to an area?

When an unnumbered interface is configured, it references another interface on the router. When enabling ospf on the unnumbered interface, use the address-wild-mask pair of interfaces to which the unnumbered interface is pointing.

44. Can i have one numbered side and leave the other side unnumbered in ospf?

No, ospf does not work if you have one side numbered and the other side unnumbered. This creates a discrepancy in the ospf database that prevents routes from being installed in the routing table.
45. Why do i receive the “cannot allocate router id” error message when i configure router ospf one?

Ospf picks up the highest ip address as a router id. If there are no interfaces in up/up mode with an ip address, it returns this error message. To correct the problem, configure a loopback interface.

46. Why do i receive the “unknown routing protocol” error message when i configure router ospf one?

Your software may not support ospf. This error message occurs most frequently with the cisco 1600 series routers. If you are using a 1600 router, you need a plus image to run ospf.

47. Is it true that only the static option of the virtual link in ospf allows discontinuous networks, regardless of the mask propagation properties?

No, virtual links in ospf maintain connectivity to the backbone from non backbone areas, but they are unnecessary for discontiguous addressing. Ospf provides support for discontiguous networks because every area has a collection of networks, and ospf attaches a mask to each advertisement.

48. Are the multicast ip addresses mapped to mac-level multicast addresses?


No, virtual links in ospf maintain connectivity to the backbone from non backbone areas, but they are unnecessary for discontiguous addressing. Ospf provides support for discontiguous networks because every area has a collection of networks, and ospf attaches a mask to each advertisement.

49. Does the cisco ospf implementation support ip tos-based routing?

Cisco ospf only supports tos 0. This means that routers route all packets on the tos 0 path, eliminating the need to calculate nonzero tos paths.

50. Does the offset-list subcommand work for ospf?

The offset-list command does not work for ospf. It is used for distance vector protocols such as interior gateway routing protocol (igrp), routing information protocol (rip), and rip version 2.

51. Do i need any special commands to run ospf over bri/pri links?


In addition to the normal ospf configuration commands, you should use the dialer map command. When using the dialer map command, use the broadcast keyword to indicate that broadcasts should be forwarded to the protocol address.

52. Which cisco ios software release began support for per-interface authentication type in ospf?
Per-interface authentication type, as described in rfc 2178 , was added in cisco ios software release 12.0(8).

53. How can you detect the topological changes rapidly?

In order to have a rapid fault detection of topology changes, the hello timer value needs to be set to 1 second. The hold timer value, which is is four times that of the hello timer, also needs to be configured. There is a possibility of more routing traffic if the hello and hold timer values are reduced from their default values.

Note: tuning ospf timers might result in network as well device resource overhead. Cisco recommends using bidirectional forwarding detection (bfd) instead of tuning the routing protocol timers. Bfd also gives sub-second convergence. Refer to ospf support for bfd over ipv4 for more information.

54. How does ospf use two multilink paths to transfer packets?


Ospf uses the metric a cost, which is related to the bandwidth. If there are equal cost paths (the same bandwidth on both multilink), ospf installs both routes in the routing table. The routing table tries to use both links equally, regardless of the interface utilization. If one of the links in the first multilink fails, ospf does not send all the traffic down the second multilink. If the first multilink peaks 100%, ospf does not send any traffic down the second multilink because ospf tries to use both links equally, regardless of the interface utilization. The second is used fully only when the first multilink goes down.