Term
|
Definition
a group of access layer switches, together with their distribution layer switches |
|
|
Term
|
Definition
provide membership based on MAC address |
|
|
Term
|
Definition
frames that barely exceed the MTU size |
|
|
Term
|
Definition
the port actively attempts to convert the link into trunking mode |
|
|
Term
|
Definition
port can be converted to a trunk link but only if the far end switch actively requests it |
|
|
Term
- set switch to transparent mode and then change it back to server mode
- change the domain name then change it back
|
|
Definition
ways to set VTP revision number back to 0 |
|
|
Term
|
Definition
- makes more efficient use of trunk bandwith by reducing unnecessary flooded traffic
- when a switch has a port associated with a VLAN the switch sends an advertisement to its neihgbor switched that it has active ports on that VLAN. This enables the switch to decide whether the flooded traffic from a VLAN should be allowed on the trunk links
|
|
|
Term
|
Definition
|
|
Term
|
Definition
occurs when a switch either moves a port into the forwarding state or moves a port from the forwarding or learning states into the blocking state |
|
|
Term
|
Definition
determines the amount of time a port stays in the listening state before moving to the learning state, and how long it stays in the learning state before moving to the forwarding state |
|
|
Term
|
Definition
enables fast-uplink failover on an access layer switch when the dual uplinks are connected into the distribution layer |
|
|
Term
|
Definition
enables fast convergence in the network backbone or core layer switches after a STP topolgy change occurs |
|
|
Term
|
Definition
if a BPDU is received on a port where BPDU Guard is enabled, that port is immediately put in errdisabled state |
|
|
Term
- Loop Guard
- Unidirectional Link Detection (UDLD)
|
|
Definition
Cisco features that help detect or prevent the unexpected loss of BPDU's |
|
|
Term
|
Definition
keeps track of the BPDU activity on non-designated ports |
|
|
Term
|
Definition
UDLD messages are sent out once a second for 8 seconds. If none of the messages are echoed back then the port becomes err-disabled |
|
|
Term
|
Definition
EtherChannel negotiation protocols |
|
|
Term
|
Definition
any port that connects to another switch and becomes a designated port |
|
|
Term
Internal Spanning Tree (IST) |
|
Definition
runs to work out a loop-free topology between the links where CST meets the region boundary and all switches inside the region
it presents the entire region as a single virtual bridge to the CST outside |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
uses SNMP to poll and receive data from any number of network devices.
Ususally an application that runs in a central location |
|
|
Term
|
Definition
a process that runs on the network devices being monitored |
|
|
Term
|
Definition
enables the gathering of realistic information about how specific types of traffic are being handled end to end across a network |
|
|
Term
|
Definition
both the SPAN source and destination are located on the local switch
the source is one or more switch ports |
|
|
Term
|
Definition
the SPAN source and destination are located on differnet switches. Mirrored traffic is copied over a special-purpose VLAN across trunks between switches from the source to the destination |
|
|
Term
|
Definition
only communicate with promiscuous ports. Cannot communicate with isolated ports. Also, there can be only 1 per PVLAN. |
|
|
Term
|
Definition
can communicate with all other ports. The default gateway is usually connected to this port so that all devices in PVLAN can go outside |
|
|
Term
|
Definition
can communicate with other members of that community and promiscuous ports but cannot communicate with other communities. There can be multiple community VLANs per PVLAN. |
|
|
Term
|
Definition
is built from the Multilayer Switch’s routing table and is sorted to optimize searches |
|
|
Term
|
Definition
is built from Multilayer Switch’s ARP table. Used to prepend Layer 2 addressing information. Maintains Layer 2 next-hop addresses for all FIB entries. |
|
|
Term
|
Definition
indicates that a particular next hop should be directly connected, but there is no MAC header rewrite information available. |
|
|
Term
|
Definition
disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch. |
|
|
Term
|
Definition
maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs. |
|
|
Term
|
Definition
the time interval that a switch stores a BPDU before discarding it |
|
|
Term
|
Definition
allows devices to interoperate with both PVST and CST |
|
|
Term
|
Definition
any port that connects to another switch and becomes a designated port |
|
|
Term
|
Definition
news of an event is sent to an SNMP manager, and the manager is required to acknowledge receipt by echoing the request back to the agent |
|
|
Term
|
Definition
monitoring traffic passing within one or more VLANs on the switch with the VLANs being the SPAN source |
|
|
Term
|
Definition
an interactive method that focuses on quickly rebuilding the Routing Information Base table after supervisor switchover.
Router can use this to get assistance from other ___ aware neighbors to converge and rebuild the FIB instead of waiting for Layer 3 routing protocols |
|
|
Term
|
Definition
each new ARP request for the virtual router address receives the next avaliable virtual MAC address in reply. Traffic load is distributed evenly across all routers |
|
|
Term
|
Definition
GLBP group interface's weighting value determines the proportion of traffic that should be sent to that AVF. A hgher weighting results in more frequent ARP replies containing the virtual MAC address of the router |
|
|
Term
|
Definition
each client that generates an ARP request for the virtual router address always receives the same virtual MAC address in reply |
|
|
Term
|
Definition
the port is forced to always authorize any connected client. No authentication is necessary. This is the default state |
|
|
Term
|
Definition
the port is forced to never authorize any connected client |
|
|
Term
|
Definition
the port uses an 802.1x exchange to move from the unauthorized to the authorized state, if successful |
|
|
Term
|
Definition
template gives balance to all functions. |
|
|
Term
|
Definition
maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network. |
|
|
Term
dual IPv4 and IPv6 templates |
|
Definition
enable a dual stack environment |
|
|