Chapter 4 Routing Fundamentals
system logging
reports system logs to different locations
ARP
resolves IP addresses to MAC addresses
Dynamic routes
entries in a routers routing table that are generated automatically by communications through protocols with other routers on the network.
secret
the enable___________password uses type 5 encryption and overrides the enable password.
Routing Tables
the information about accessible networks that is maintained by a router.
Inverse Mask
the number in an access control list that specifies which part of an IP address is considered significant.
Cisco IOS
the operating system used on Cisco devices such as routers, switches, and firewalls.
VLSM
the process of adjusting the subnet mask within a single network to allocate IP addresses more efficiently.
Logging
the process of recording activity on a computing device.
AAA Logging
the process of recording users' identities, establishing their level of access, and recording their activity with the use of a RADIUS or TACACS+ server.
route summarization
the process of shortening the network identifier in a subnet mask to allow one network route to represent multiple network routes.
Routing
the process of transporting packets of information across a network from source to destination. (Network layer OSI)
Virtual terminal
virtual session access points for simultaneous access to a Cisco device.
MAC address
An ARP broadcast is sent to the local subnet in an attempt to discover the destination computers___________________.
Standard ACLs
Access control lists that are limited in filtering parameters to a source IP address or network.
Named ACLs
An advancement over extended ACLs that allow filtering packets based on IP options and TCP flags, and that permit insertion and modification of individual ACEs.
data kink layer
During the routing process, the router strips off_____________header information and then examines the Network layer address.
SNMP trap logging
SNMP sends notifications of system status changes to SNMP management stations.
Metrics
cost values that help routers assess the desirability of a link
Routers
determine the best path for packets to take and then send them toward their destination.
ACLs
a group of rules that permit or deny passage of packets through a protocol time to live, IP options, and TCP flags.
Syslog server
a log management service
Banners
a message, usually a warning about appropriate use, presented to users of a digital system before authentication.
Stub network
a network segment on a larger networks edge; a dead-end segment.
Routed protocol
a networking protocol used to transport data packets.
Distance-vector routing protocol
a protocol that uses simple distance measurements such as hops to determine the best route for a packet.
SSH
a protocol to secure remote sessions by using asymmetric encryption.
routing protocol
a protocol used by routers to share their routing tables with each other.
stub router
a router that connects a stub network to the larger network.
Link-state routing protocol
a routing protocol that uses complex calculations to determine the best route for a packet.
Convergence
a state in which all routers on a network have up-to-date routing tables.
antispoofing
a way to prevent spoofing and ensure that no packets arrive at your security perimeter with suspicious addresses.
ACE
an individual rule in an ACL
Rollover cable
cable used to connect to a cisco console port
ARP tables
list the MAC and IP address resolution of other devices.
Default Routes
manual entries in a router's routing table that specify how to handle packets that are not routable.
Static Routes
manual entries in a routers routing table by an administrator.
AUX port
port on a cisco device that permits dial-in access to the device.
Console port
port on a cisco device that permits direct physical access from a nearby computer using the serial RS-232 protocol.
buffered logging
process of outputting data to a cisco router's RAM