Chapter 5. Managing Your Router

<feature><title>Terms You’ll Need to Understand:</title> <objective>

CDP (Cisco Discover Protocol)

</objective>
<objective>

ICMP (Internet Control Message Protocol)

</objective>
<objective>

Telnet

</objective>
<objective>

Secure Shell (SSH)

</objective>
</feature>
<feature><title>Concepts and Techniques You’ll Need to Master:</title> <objective>

Using Telnet

</objective>
<objective>

Using Secure Shell (SSH)

</objective>
<objective>

IOS naming conventions

</objective>
<objective>

Backing up and restoring your IOS

</objective>
<objective>

Backing up and restoring your configuration

</objective>
</feature>

Introduction

This chapter deals with managing your Cisco router. It covers IOS naming conventions, backing up and restoring your IOS and configuration, and using the Cisco Discovery Protocol, Telnet, and ICMP.

IOS Naming Conventions

An IOS filename is broken down into four parts:

  • Platform

  • Feature set

  • Run location and compression

  • Version

For example, if our IOS name was C2500-D-L.120-9.bin, we could break it down as follows:

  • Platform: C2500

  • Feature Set: D

  • Run Location: L

  • IOS Version: 12.0(9)

The feature set identifies the feature contents on the router. Common feature sets include “j” for enterprise, “d” for desktop, and “s” for plus features such as Network Address Translation (NAT), InterSwitch Link (ISL), and Virtual Private Dial-up Networks (VPDN). Although the number of feature sets is too many to list here, Table 5.1 lists the more common ones found on a 2500 platform.

Table 5.1. Feature Sets

Feature Set

Description

I

IP

IS

IP PLUS

J

Enterprise

JS

Enterprise Plus

JK8S

Enterprise Plus with IPSec

D

Desktop

Exam Alert

The feature sets are provided as an example only; you do not need to know the feature set codes for the exam. You will need to know, however, what is included in an IOS filename: platform, feature set, compression/run location, and version.

The run location indicates both its execution area and, when applicable, the compression identifiers. Table 5.2 illustrates the common run locations.

Table 5.2. Memory Locations

Code

Location

F

Image runs in flash

M

Image runs in Random Access Memory (RAM)

R

Image runs in Read Only Memory (ROM)

L

Image will be relocated at runtime

The compression identifiers indicate what type of compression is used on the image. Common compression identifiers are shown in Table 5.3.

Table 5.3. Compression Identifiers

Code

Compression

Z

Image is Zip compressed

X

Image is Mzip compressed

W

Image is Stac compressed

For example, image c7200-js-mz is an IOS for the 7200 series router, with enterprise plus software, executed in RAM, and is Mzip compressed.

You can view the IOS files you have stored in flash memory by executing the command show flash. This command can be executed from either User EXEC or Privileged EXEC mode. Following is the output of the show flash command on a 1604 router:

Router>show flash
PCMCIA flash directory:
File  Length   Name/status
  1   6611048  /c1600-nosy-l.120-25.bin
[6611112 bytes used, 1777496 available, 8388608 total]
8192K bytes of processor board PCMCIA flash (Read ONLY)

In this instance, there is only one IOS in flash. Taking the filename, c1600-nosy-l.120-25.bin, you can see that the platform is a 1600 series router with a feature set of ‘nosy’ (the 1600 designation for IP/IPX/FW Plus) and is relocated at runtime but not compressed. The IOS version is 12.0(25).

Although the show flash command will show you all IOS files that you have in flash, it will not show you the IOS that you are currently using if you have more than one IOS. To view the IOS that you are currently using on your router, execute the command show version. Like the show flash command, the show version command may be executed from User EXEC or Privileged EXEC. Following is the output of the show version command with the relevant portions in bold text.

Router>show version
Cisco Internetwork Operating System Software
IOS (tm) 1600 Software (C1600-NOSY-L), Version 12.0(25), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Tue 31-Dec-02 12:29 by srani
Image text-base: 0x080357F8, data-base: 0x02005000

ROM: System Bootstrap, Version 11.1(10)AA, EARLY DEPLOYMENT RELEASE SOFTWARE
(fc1)
ROM: 1600 Software (C1600-BOOT-R), Version 11.1(10)AA, EARLY DEPLOYMENT RELEASE
SOFTWARE (fc1)

Router uptime is 6 minutes
System restarted by power-on
System image file is "flash:/c1600-nosy-l.120-25.bin"
<output omitted for brevity>

Exam Alert

Know the difference between the show flash and the show version commands. show flash will show all IOS files that you have in flash memory, whereas the show version command will show you which IOS file you are currently using.

Back Up and Restore IOS

At some point in your career, you will need to back up, restore, or upgrade your IOS. You can use TFTP, FTP, or RCP to transfer an IOS image to or from a server. TFTP is the most common so that is covered here. (It is also covered in the CCNA exam.)

TFTP is the Trivial File Transfer Protocol. Unlike FTP, there are no means of authenticating with a username or password or navigating directories. To back up your IOS, you will use the copy command from within Privileged EXEC mode. The syntax of this command is copy <from> <to>. Thus, if you want to copy an IOS from your IOS to a TFTP server, the syntax would be copy tftp flash. After executing this command, you will be prompted with a number of questions asking for such things as the IOS filename and IP address of the TFTP server. Following is the output of this command. The TFTP server in this example is located at the IP address 172.16.0.254.

Router#copy flash tftp

PCMCIA flash directory:
File  Length   Name/status
5148040  /c1600-sy56i-mz.121-20.bin
[5148104 bytes used, 3240504 available, 8388608 total]
Address or name of remote host [255.255.255.255]? 172.16.0.254
Source file name?/c1600-sy56i-mz.121-20.bin
Destination file name [c1600-sy56i-mz.121-20.bin]?
Verifying checksum for 'c1600-sy56i-mz.121-20.bin' (file # 1)...  OK
Copy 'c1600-sy56i-mz.121-20.bin' from Flash to server
as 'c1600-sy56i-mz.121-20.bin'? [yes/no]y
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Upload to server done

Flash device copy took 00:01:24 [hh:mm:ss]

To restore or upgrade your IOS from a TFTP server to a router, the syntax would be copy tftp flash.

Remember the following troubleshooting steps if you are having difficulties using TFTP:

  1. Verify that the TFTP server is running.

  2. Verify cable configurations. You should use a crossover cable between a router and a server or, if you have a switch, use a straight-through cable from the router to the switch and from the switch to the server.

  3. Verify that your router is on the same subnet as your TFTP server or has a means to route to it somehow (static route or routing protocol).

Backup and Restore Configurations

Backing up and restoring your configuration is no different than it was for your IOS. To save your configuration, you will copy your running-config in RAM to your startup-config in NVRAM by executing the Privileged EXEC command copy running-config startup-config. If you want to copy your startup-config file to a TFTP server, you would type copy startup-config tftp. If you want to restore your configuration from a TFTP server, you would execute the command copy tftp running-config. (You can also elect to copy it to your startup-config.) Finally, the copy tftp running-config command will merge a configuration file on a TFTP server with your current configuration.

Tip

If you are using a Linux TFTP server, make sure that you first use the touch command to create a zero-byte file with the name of the IOS image; otherwise, the file will not copy to the TFTP server. Consult the Linux documentation for more information.

Troubleshooting and Remote Management

Having the ability to remotely manage your router is crucial to any network engineer. If you have a wide-area network that spans across the world, you do not want to have to fly out to a location every time you have a problem with a router. Four protocols you can use to help you in troubleshooting and remotely manage your routers are

  • Telnet

  • Secure Shell (SSH)

  • CDP

  • ICMP

Telnet

Telnet operates at the application layer of the OSI model and is used to remotely connect into a router. Configuring Telnet authentication is covered in Chapter 4, “Working with Cisco Equipment.” As a review, however, the commands to configure a router to allow Telnet access are as follows (the password cisco is used in this example):

Router(config)#enable secret cisco
Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password cisco

You must have an enable password for Telnet access to work. If you do not, you will get the following output when you attempt to access Privileged EXEC mode:

Router#telnet 192.168.1.1
Trying 192.168.1.1 ... Open
User Access Verification
Password:
Router>en
% No password set
Router>

To close out an active Telnet session, type exit.

It is also possible to suspend a Telnet session and resume it later. This is helpful as it keeps you from having to remember the IP address of a router. Instead, you can suspend your Telnet session and resume it later based on its session number, not IP address.

To suspend a Telnet session, press Ctrl+Shift+6, x. (Hold down the Ctrl, Shift, and 6 buttons at the same time. Release them, and then press x.)

To see what sessions you have suspended, execute the show sessions command from User EXEC or Privileged EXEC mode. In the output that follows, there are two Telnet sessions that have been suspended:

Router#show sessions
Conn Host                Address             Byte  Idle Conn Name
   1 192.168.1.1         192.168.1.1            0     0 192.168.1.1
*  2 172.16.0.1          172.16.0.1             0     0 172.16.0.1

Entries that have an asterisk (*) next to them indicate the last session you were using. There are four methods of resuming a session:

  • Enter key—Pressing the Enter key will take you to the last session you were currently using (as shown by the asterisk in the show sessions command).

  • Resume—Typing resume without specifying a session number will allow you to resume the last session you were using. This is the same as pressing the Enter key.

  • Resume #—Typing resume followed by the session number will resume Telnet for that session. For example, typing resume 1 would resume Telnet for the 192.168.1.1 router.

  • Resume [IP address | hostname]—Instead of giving a Telnet session number, you can also give the IP address or, if you have DNS lookups enabled with a DNS server, you can type in the hostname of the remote router.

Exam Alert

Know the commands you use to resume and close a Telnet session (Ctrl+Shift+6, x; show sessions; resume; disconnect). Also, remember that the exit command will close an active session, whereas the disconnect command will close a suspended session.

Secure Shell (SSH)

In addition to Telnet, you can also use Secure Shell (SSH) to remotely manage your routers. Configuring your router for SSH is covered in Chapter 4. Now you will learn how to use your router as an SSH client to connect into other routers.

SSH is preferred by many engineers because it secures your communication to your router when remotely managing it. This is done by encrypting the communication with algorithms such as Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES), as well as by securing the authentication to the router through password hashing algorithms such as Message Digest 5 (MD5) and Secure Hash Algorithm 1 (SHA-1). Encrypting communication and hashing the password prevents malicious hackers from eavesdropping on you when you are configuring your router.

Starting an encrypted SSH session with a router is done with the ssh command. This command can be entered from either User EXEC or Privileged EXEC mode. It has several options as outlined in Table 5.4.

Table 5.4. SSH Options

Command Option

Description

-v {1 | 2}

This optional parameter specifies whether you are going to use version 1 or version 2. SSH version 1 had some known vulnerabilities, so you should use version 2 whenever possible.

-c {3des | aes128-cbc | aes192-cbc | aes256-cbc}

This optional parameter specifies the encryption you are going to use when communicating with the router. This value is optional; if you choose not to use it, the routers will negotiate the encryption algorithm to use automatically.

-l username

This specifies the username to use when logging in to the remote router.

-m {hmac-md5 | hmac-md5-96 | hmac-sha1 | hmac-sha1-96}

This specifies the type of hashing algorithm to use when sending your password. It is optional and if you do not use it, the routers will negotiate what type of hashing to use.

ip-address | hostname

You need to specify the IP address or, if you have DNS or static hostnames configured, the name of the router you want to connect to.

For example, if you wanted to use SSH version 2 to connect to a router at IP address 192.168.0.1 with the username of Admin, using AES256-CBC encryption, and using SHA1 hashing, you would type the following:

Router#ssh –v 2 –l Admin –c aes256-cbc –m hmac-sha-1 192.168.0.1

The syntax may appear long at first, but after you start using it on a regular basis to manage your routers, it will become second nature to you.

CDP

Sometimes when you Telnet to another router, you might not know what its IP address is. If this is the case, you can use the CDP to discover the Layer 3 address of neighboring devices.

CDP is a Cisco proprietary Layer 2 (data link) multicast protocol that is enabled on all Cisco routers and switches. It can be used to discover information about directly connected devices. Although it is a Layer 2 protocol, it is not forwarded by Cisco switches. (It is by other vendors, however.)

To view what neighboring Cisco devices you have connected to your router or switch, execute the show cdp neighbors command from either User EXEC or Privileged EXEC mode. Following is an example of this output:

Router#show cdp neighbors
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
                  S - Switch, H - Host, I - IGMP, r - Repeater

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID
CoreRouter          Ser 1          144           R        2500      Ser 0

Here you see that you are connected to a router named “CoreRouter.” You are connected to it out of your local interface serial 1. The holdtime indicates how long it will take to flush this entry out should your router stop hearing CDP frames. CDP sends advertisements every 60 seconds by default and will flush out an entry if it fails to hear a CDP advertisement after 180 seconds. (Timers are manipulated with the cdp timers global configuration command.) The capability of this device is R, which stands for router. In fact, from this output you can see that this is a 2500 series router and it is connected to your router out of its serial 0 interface.

Quite a bit of information gets generated from this command, but it did not tell you the IP address of the 2500 nor did it tell you the IOS version running on the 2500. The two commands you can enter through the Layer 3 IP address and IOS version are as follows:

  • show cdp neighbors detail

  • show cdp entry *

These two commands are functionally equivalent. You can look at a specific device in the show cdp entry command or use the wildcard asterisk character to view all entries. Following is the output of the show cdp neighbors detail command (the other show command would generate the same output):

Router#show cdp neighbors detail
-------------------------
Device ID: CoreRouter
Entry address(es):
  IP address: 10.0.0.1
Platform: cisco 2500,  Capabilities: Router
Interface: Serial0,  Port ID (outgoing port): Serial0
Holdtime: 171 sec

Version:
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-I-L), Version 12.1(20), RELEASE SOFTWARE (fc2)
Copyright (c) 1986-2003 by cisco Systems, Inc.
Compiled Thu 29-May-03 22:00 by kellythw

Exam Alert

If you need to Telnet into a router but do not know its IP address, use CDP. Remember, only the show cdp neighbors detail and show cdp entry * will show you the IP address and IOS version of neighboring devices.

ICMP

Another useful troubleshooting tool is the ICMP. ICMP is a Layer 3 (network) protocol designed to carry status messages. CCNAs will exercise ICMP via two programs, Ping and Traceroute. The two messages used by the Ping program, Echo Request and Echo Reply, test both connectivity and integrity; the responding station’s job is to reply and repeat the payload, thus testing the quality of the connection. The ping command followed by an IP address or name uses a default payload and primarily tests connectivity.

If a host is unreachable, you will get an ICMP Type 3 Destination Unreachable message. If a firewall or access-list is blocking ICMP, you will get an ICMP Type 3/Code 13 Destination Unreachable: Administratively Prohibited message. Unreachables will show a “U” in the output on your screen, whereas a successful ping will show exclamation points (!). Timeouts will show a “.” (period) in the output. The extended ping has options to test integrity, such as the capability to change the size and content of the payload to be echoed back. Cisco also supports an extended ping feature that is accessible from Privileged EXEC. To access the extended ping feature, enter Privileged EXEC and type ping. Do not enter an IP address, however; instead, press Enter, and you will be presented with a number of questions. With extended ping, you have the ability to set the size of your ping messages, source interface, number of pings, and timeout settings. Following is the output of the extended ping command. Note that the exclamation mark is an indication of a successful ping:

Router#ping
Protocol [ip]:
Target IP address: 10.0.0.1
Repeat count [5]: 1000
Datagram size [100]: 1024
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 172.16.0.1
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 1000, 1024-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Tip

When bringing up a new wide-area network circuit, you can do an extended ping and send out 10,000 pings with a size of 1,024 bytes. Watch the results and verify success. If some packets are lost, you know it is not a clean circuit and you should contact your provider.

Traceroute is a technique used when you suspect that a router on the path to an unreachable network is at fault. Traceroute sends out a packet to a destination with a Time To Live (TTL) of 1. If the first hop is not the destination, an ICMP type 11/Code 0 (ICMP Time Exceeded) message is sent back and the response time in milliseconds is recorded. Routers decrement TTL so that a packet will not circulate forever if there is a problem such as a routing loop (covered in Chapter 10, “Basic Routing”). When a TTL gets to 0, the router drops the packet and returns the unreachable message.

A second packet is then sent out with a TTL value of 2, and if it is not the destination, an unreachable message is sent back and the response time in milliseconds is recorded. This continues until the destination is reached or until the maximum TTL as defined by the vendor is reached. (Cisco uses 30 as its maximum TTL with Traceroute, but this is configurable.)

Many devices support Traceroute. On Windows machines, the command is tracert. On Cisco devices, the command is traceroute, but this can be abbreviated as trace.

Exam Alert

Make sure that you know what options are available with extended ping. Also, know why you would use the traceroute command.

Exam Prep Questions

1.

Which of the following is included in the filename c1600-js-mz.120-9.bin? Select all that apply.

Exam Prep Questions
  1. Platform

Exam Prep Questions
  1. Feature set

Exam Prep Questions
  1. IOS Version

Exam Prep Questions
  1. Compression Type

2.

You are trying to Telnet to a router, but do not know its IP address. What commands can you enter to see the IP address of a neighboring router? Select all that apply.

Exam Prep Questions
  1. show cdp neighbors detail

Exam Prep Questions
  1. show cdp neighbors

Exam Prep Questions
  1. show cdp entry *

Exam Prep Questions
  1. show cdp

Exam Prep Questions
  1. show cdp entry neighbors

3.

What is the command to back up your IOS to a TFTP server?

Exam Prep Questions
  1. copy nvram tftp

Exam Prep Questions
  1. copy tftp nvram

Exam Prep Questions
  1. copy tftp flash

Exam Prep Questions
  1. copy flash tftp

4.

Which of the following commands can you enter to return to the last suspended Telnet session you were using? Assume that the session number is 1. Select all that apply.

Exam Prep Questions
  1. resume

Exam Prep Questions
  1. return session

Exam Prep Questions
  1. return 1

Exam Prep Questions
  1. resume 1

Exam Prep Questions
  1. Enter

5.

What command will show you the IOS you are currently using on your router?

Exam Prep Questions
  1. show nvram

Exam Prep Questions
  1. show flash

Exam Prep Questions
  1. show ios

Exam Prep Questions
  1. show version

6.

What command can you enter to close out a suspended Telnet session?

Exam Prep Questions
  1. close session

Exam Prep Questions
  1. disconnect

Exam Prep Questions
  1. exit

Exam Prep Questions
  1. quit

7.

The show cdp neighbors detail command will show you more output than just the show cdp neighbors command. What can you see with the show cdp neighbors detail command that you cannot see with the show cdp neighbors command? Select all that apply.

Exam Prep Questions
  1. IOS version

Exam Prep Questions
  1. Capabilities

Exam Prep Questions
  1. Platform

Exam Prep Questions
  1. Layer 3 address

Exam Prep Questions
  1. Outgoing interface

8.

An ICMP ping is composed of which two primary messages? Select 2.

Exam Prep Questions
  1. traceroute

Exam Prep Questions
  1. echo reply

Exam Prep Questions
  1. chargen

Exam Prep Questions
  1. echo request

Exam Prep Questions
  1. Ping reply

9.

Which of the following commands is used to troubleshoot Layer 3 connectivity?

Exam Prep Questions
  1. telnet

Exam Prep Questions
  1. ftp

Exam Prep Questions
  1. ping

Exam Prep Questions
  1. show cdp neighbors

10.

You suspect that the routing configuration on one of your routers is incorrect because you are unable to reach a remote network. What command can you use to detect which router has a problem routing to a remote network?

Exam Prep Questions
  1. telnet

Exam Prep Questions
  1. ping

Exam Prep Questions
  1. traceroute

Exam Prep Questions
  1. show ip route

 

Answers to Exam Prep Questions

1.

Answers A, B, C, and D are the correct answers. C1600 refers to the platform that the IOS runs on. The ‘js’ refers to the enterprise plus feature set. The IOS version is 12.0(9) as indicated in the 120-9 section. Finally, the compression and execution area are indicated as ‘mz,’ which indicates that the image runs from RAM and is Zip compressed.

2.

Answers A and C are correct. The commands show cdp neighbors detail and show cdp entry * are functionally equivalent and would show you the Layer 3 IP address of the neighboring router along with platform and IOS version. Answer B is incorrect because this would not give you the IP address of a neighboring router. Answer D shows global CDP statistics but will also not give you the output this question is asking about. Answer E is incorrect because it is not a valid command.

3.

Answer D is the correct answer. This would copy the IOS in flash memory to a TFTP server. Answers A and B are incorrect because the IOS is stored in flash and not NVRAM. Answer C is incorrect because copy tftp flash would upgrade your IOS from a TFTP server rather than copy your IOS to a TFTP server.

4.

Answers A, D, and E are correct. The resume command will resume you to the last Telnet session you were in. Typing resume 1 will return you to session 1. Pressing the Enter key by itself will also return you to the last session you were using. Answers B and C are incorrect because these are not valid commands.

5.

Answer D is the correct answer. The show version command will show you the current IOS you are using. Answer A is incorrect because this is not a valid command. Answer B will show you all the IOS images you have on your router but does not distinguish between different IOS images to tell you which one you are currently using. Answer C is incorrect because this is not a valid command.

6.

Answer B is the correct answer. Disconnect will close the last Telnet session you had open. Answer A is incorrect because this is not a valid command. Answer C will close an active Telnet session but not a suspended session, so is therefore incorrect. Answer D will not close out a suspended Telnet session, so it is also incorrect.

7.

Answers A and D are correct. The show cdp neighbors detail command will show you both the IOS version and the Layer 3 address of a neighboring device. Answers B, C, and E are incorrect because all of these are shown with both the show cdp neighbors and show cdp neighbors detail commands.

8.

Answers B and D are correct. ICMP ping messages are composed of echo request (ICMP type 8) and echo reply (ICMP type 0) messages. Answers A, C, and E are wrong because these are not ICMP messages.

9.

Answer C is correct. Ping uses ICMP, which operates at the third layer (network) of the OSI model. Answers A and B are wrong because Telnet and FTP operate at Layer 7 (application). Answer D is wrong because this operates at Layer 2 (data link).

10.

Answer C is the correct answer. Traceroute is used when you try to pinpoint which router has problems getting to a network. Answer A, B, and D are wrong because they do not allow you to detect which router is unable to reach a network.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.43.206