[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] scalability bridges limitations of SDLC (Synchronous Data Link Control) security PAP and router passwords auxiliary command console command enable password command enable secret command virtual terminal command 2nd 3rd Segment PDUs segments (networks) disabled protocol flexibility and Session Layer (OSI model) setup mode (routers) 2nd show commands router status 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th show controller bri command monitoring ISDN 2nd 3rd 4th show dialer bri command monitoring ISDN show frame-relay lmi command show frame-relay map command show frame-relay pvc command show interface bri command monitoring ISDN 2nd show interface command show interface comnmand show ip command show trunk command show version command IOS software updating show vlan-mambership command signal strength attenuation single path routing protocols SMTP (Simple Mail Transfer Protocol) TCP/IP and SNMP (Simple Network Management Protocol) TCP/IP and source-wildcard mask applying Spanning Tree Protocol (STP) split horizon routing protocols and star wired bus topology 2nd startup configuration file backingup/restoring 2nd 3rd 4th 5th configuring displaying 2nd 3rd 4th initial configuration 2nd 3rd 4th 5th 6th startup configuration files static routers 2nd static routing protocols static VLAN configuration 2nd status routers show commands 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Store and Forward devices store and forward switches store-and-forward switching 2nd STP (Spanning Tree Protocol) bridging loops preventing 2nd 3rd subinterfaces configuring 2nd subnet masks (IP subnets) 2nd subnetting (IP addresses) Class A example 2nd 3rd 4th Class C example 2nd default masks implementation considerations 2nd 3rd logical ANDing 2nd 3rd subnet masks 2nd SVCs (switched virtual circuits) switched services (WANs) switched virtual circuits (SVCs) switches bridging loops preventing 2nd STP 2nd 3rd configuring CLI (Command Line Interface) default configuration 2nd menu-driven interface 2nd 3rd 4th overview 2nd TCP/IP options 2nd cut-through cut-through switching fragment-free fragment-free switching frame filtering frame tagging 2nd 3rd Layer 2 limitations 2nd MAC addresses discovery principles of operation 2nd routers and 2nd starting 2nd 3rd store and forward store-and-forward switching 2nd technology overview 2nd trunk connections 2nd ISL (Inetrswitch Link) 2nd ISL (Inter-switch link) 2nd VTP (VLAN Trunking Protocol) 2nd 3rd 4th 5th 6th VTP (VLAN Trunking Protocol) pruning VTP modes 2nd VTP pruning VLANs assigning to ports 2nd configuring 2nd 3rd overview 2nd 3rd 4th trunking, enabling 2nd 3rd VTP (VLAN Trunking Protocol), enabling 2nd VLANs and 2nd 3rd 4th 5th Web interface Synchronous Data Link Control (SDLC) system requirements PrepLogic Practice Exam |