HCIA Summary & Abbreviations
HCIA Summary & Abbreviations
Address Resolution Protocol (ARP): used to map IP addresses to MAC addresses within a local network .
Twisted pairs:
▫ STP: shielded twisted pairs
▫ UTP: unshielded twisted pairs
2
Storage Media
● SDRAM: It stores the system running information and parameters
● Flash: store system software & configuration files - avoid data loss in case of power-off.
● NVRAM: used to store log buffer files.
● SD Card: used to store system files, configuration files, log files, and so on.
● USB: for device upgrade and data transmission.
Boot Read-Only Memory (BootROM): firmware stored in ROM, contains the initial instructions executed by
the processor when a device is powered on or reset.
TTL Time to Live: hop limit is a mechanism that limits the lifetime of data in a computer or network.
Private IP add
When multiple routes exist to the same destination, routers use a "preference" to determine which route to use.
A lower preference value is always better and considered as a primary route.
Cost is always calculated from the perspective of the outbound interface on the router forwarding the traffic.
The cost of the path from Router A (port cost=10) to Router B (port cost=10) is the cost of Router A's outbound
interface, which is 10(Not 20).
4
5- IP Routing Basics
Classless Inter-Domain Routing (CIDR): utilize IP add, by replacing the older classful addressing system.
6- OSPF Basics
Open Shortest Path First (OSPF)
Link State Advertisements (LSAs).
link state database (LSDB)
Shortest Path First (SPF)
Default cost value = 100 Mbit/s / Interface bandwidth
Cost of an OSPF route is the sum of costs of all inbound interfaces along a path from the destination
network segment to the local router.
Each OSPF router uses the SPF algorithm to calculate the shortest path to a specific destination.
OSPF network types DR & BDR Neighbor Default Hello / Sec Default Dead Interval
Election Discovery ( 4X hello interval)
Multi-access (MA)
Autonomous System (AS)
The neighbor status (When the protocol status of all routers is stable)
● Full → with the DR and the BDR
● 2-Way → with other DROther routers
The key factors that must match between the OSPF router interfaces from becoming neighbors are:
1. Area ID
2. Stub Area Flag
3. Subnet Mask
4. OSPF Network Type: (e.g., Broadcast, Point-to-Point)
5. Hello and Dead Timers:
a. The Hello interval dictates how often a router sends Hello packets (default Hello timer is 10 seconds.)
b. and Dead interval specifies how long a router waits to hear from a neighbor before declaring it down.
6. Authentication type: (e.g., plaintext or MD5) and the same password/key.
OSPF Authentication Types Area Authentication Interface Authentication
Flexibility Lower (applies to all interfaces by default) Higher (specific to one interface)
Scalability High (configure once per area) Low (configure one by one)
The authentication modes (Area or Interface) of two OSPF neighbors does not have to be identical. but the
authentication parameters (method and key) on the link must be the same.
6
Logical link control (LLC) = the destination service access point (DSAP) + source service access point
(SSAP) + Control field. → These fields are essential for directing data frames to the correct upper-layer
protocol and managing communication within the data link layer.
Virtual Routing and Forwarding (VRF): allows a single physical router to operate as multiple virtual routers,
each with its own routing table and forwarding instance.
Port Type Can Carry Multiple VLANs? How is PVID Set?
Primary Role Elects the Root Bridge. Selection of Root Ports and Designated Ports.
Components 16-bit Priority + 48-bit MAC Address. 4-bit Priority + 12-bit Port Number.
Default Values Priority: (default is: 32768) Priority: (default is: 128)
+ MAC: Unique to switch. + Port Number: Assigned sequentially.
Decision-Making The lowest BID wins the Root The lowest PID wins tie-breakers for port roles.
Bridge election.
Alternate/Backup Yes No No No
VLAN-based Spanning Tree (VBST) - Tree Concept → Huge processor resources (Huawei Protocol)
Multiple Spanning Tree Protocol (MSTP) - Improve VBST & provide multiple paths to make load balance.
Multiple spanning tree instance (MSTI) - MSTP tree paths
Smart Link is a network redundancy feature on switches that provides fast failover between redundant links. It
uses a master and backup link within a Smart Link group.
A router on a stick is a networking setup that allows routing between multiple VLANs using a single physical
router interface
The VLANIF interface determines whether to perform Layer 2 or Layer 3 forwarding based on the destination
MAC address
Layer 2→ destination MAC address exist on the switch's MAC address table
Layer 3 → destination MAC address matches the MAC address of the switch's own VLANIF interface
Layer 2 Ethernet Interface: The interface Sub-Interface: The interface connecting the switch to the
connecting the switch to the router is set to a router is set to a trunk interface
Access interface
Link aggregation group (LAG): logical grouping of multiple physical network connections (Ethernet
interfaces) into a single logical connection
Link aggregation can be classified into manual mode and LACP mode.
Link Aggregation Control Protocol (LACP)
Link Aggregation Control Protocol Data Units (LACPDUs)
The following parameters must be the same for member interfaces in an Eth-Trunk:
▫ Interface rate
▫ Duplex mode
▫ VLAN configurations (access, trunk, or hybrid)
If the master switch has more available ports than the configured maximum number of active ports, it
will select the ports with
● Smallest Port priority value first. (A lower number indicates a higher priority).
● Then, Smallest Port number.
By default, the LACP interface priority of an interface is 32768.
12
A wildcard mask specifies which bits of an IP address must match the network address.
Authentication modes:
● non-authentication,
● local authentication
● remote authentication (RADIUS or HWTACACS).
● 802.1X: for network access control (AC) at the port level
Authorization information includes the user group, VLAN ID, and ACL number.
13
Accounting modes: non-accounting and remote accounting. ex: Users can access the Internet for free or
not.
Both RADIUS and HWTACACS servers can authorize users, but they differ in their approach and capabilities.
- RADIUS combines authentication and authorization. (Commonly used)
- while HWTACACS allows for separation of these functions
RADIUS uses the User Datagram Protocol (UDP) as the transmission protocol and uses UDP ports
● 1812 for authentication
● 1813 for accounting
Virtual Type Terminal (VTY): is a virtual interface on network devices like routers and switches that allows
remote access via protocols like Telnet or SSH
Network Time Protocol (NTP): is a networking protocol that synchronizes the clocks of computer systems
over a network.
Way of connection The server initiates the data connection to the client. The client initiates the data connection to the server.
Client connects to a random server port (specified by
Ports Used Server port 20 connects to a random client port. the server).
▫ CAPWAP data and control packets are transmitted on different UDP ports:
▪ UDP port 5246 for transmitting control packets
▪ UDP port 5247 for transmitting data packets
AC Connection Mode
● In-Path Networking
● Off-Path Networking
Modulation and Coding Schemes (MCSs): define how data is transmitted over a wireless medium by
combining modulation techniques and channel coding
● An SSID profile, which defines the name of the wireless network (SSID).
● A security profile, which defines the authentication and encryption methods.
● A traffic profile, which defines QoS and other service-related policies.
● A radio profile, which defines physical layer parameters like the channel and power.
iMaster NCE →
WAN devices: customer edge (CE), provider edge (PE), and provider (P)
Link Control Protocol (LCP): used to establish, configure, and test data-link connections.
Maximum Transmission Unit (MTU): defines the largest data packet size, measured in bytes, that a network
device can handle without needing to fragment it.
Maximum Receive Unit (MRU): the largest packet size a network interface can receive without needing to
fragment it.
Network Control Protocols (NCPs): a set of protocols (ex: IPCP) used within PPP to negotiate and configure
different network layer protocols for communication.
IP Control Protocol (IPCP): is a NCP Protocol used within PPP to configure and manage the transmission of
IP (Internet Protocol) data over a PPP link.
Point-to-Point Protocol over Ethernet (PPPoE): is a link layer protocol that encapsulates PPP frames into
Ethernet frames. PPPoE enables multiple hosts on an Ethernet to connect to a broadband remote access
server (BRAS).
Multiprotocol Label Switching (MPLS): is a networking technology that speeds up and optimizes data
forwarding by using labels instead of network addresses to direct traffic.
Segment Routing (SR): routing architecture that simplifies traffic and network by encoding forwarding
instructions directly into packet headers at the ingress node.
SR using MPLS labels is called SR-MPLS and using IPv6 is called SRv6.
Standard Network Management Protocol (SNMP): protocol used for remotely managing and monitoring NT
devices.
User Security Module (USM): a security framework used in SNMPv3 to authenticate users.
View-based Access Control Model (VACM): a mechanism used in network management protocols like
SNMPv3 to control access to managed objects (MIB objects)
Management Information Bases (MIBs):a database that stores information about managed devices in a
network
Network Management System (NMS):a software application or set of applications that allows network
administrators to monitor, manage, and control the various components of a computer network.
Object identifier (OID):Simple Network Management Protocol to identify managed objects (like network
devices, interfaces, etc.)
Trap: The agent process sends messages to the NMS to notify the NMS of critical or major events.
21
SNMPv1 defines five core protocol operations (sometimes referred to as PDU types):
1. GetRequest
2. GetNextRequest
3. SetRequest
4. GetResponse
5. Trap
6. GetBulkRequest
7. InformRequest
When more than one extension header is used in the same IPv6 packet, those headers must appear in the
following order:
1. Hop-by-Hop Options header
2. Destination Options header
3. Routing header
4. Fragment header
5. Authentication header (AH)
6. Encapsulating Security Payload (ESP) header.
❖ Global unicast address (GUA) -Globally unique- It is equivalent to a public IPv4 address
❖ Link-local address (LLA) - limited application scope - with the prefix of FE80::/10.
ICMPv6 RA messages are used to control the mode in which terminals automatically obtain IP addresses.
Router Solicitation (RS): is used to request address prefix information, to discover routers on the local
link - ICMPv6 messages used in IPv6 networks to request immediate Router Advertisement (RA) messages
from routers on the local network.
Router Advertisement (RA): The routers respond with (RA) message - Used to reply address prefix
information, In IPv6's SLAAC it is for dynamically assigning IPv6 addresses to devices.
Neighbor Solicitation (NS):IPv6 host that wants to communicate with another host will send (NS)
Neighbor Advertisement (NA):The target host receives the NS replies with (NA), containing its MAC address.
Southbound Interface (SBI): OpenFlow is a commonly used SBI in SDN,enabling the controller to program
the forwarding tables of the network devices.
Zero Touch Provisioning (ZTP): is an automated process that configures network devices like routers,
switches, and firewalls upon initial startup, eliminating the need for manual, on-site configuration
Network Functions Virtualization (NFV): is a network architecture concept that virtualizes network functions,
traditionally run on dedicated hardware, by using IT virtualization technologies.
telnetlib is a module in the standard Python library. It provides the telnetlib.Telnet class for implementing the
Telnet function.
Python Mode:
- Interactive mode: directly into the Python interpreter - Non-interactive: as script file
Module Python file (.py) with code Anywhere (via import) import math, math.sqrt()
DHCP snooping is a security feature in network switches that helps prevent DHCP spoofing attacks
27
Other Notes