I have a question I need help with. It's an interview question that I need to prepare for and was wondering if anyone can help me out with it. Thanks!
You are given a point-to-point gigabit Ethernet link that is tunneled and encrypted. You are told that applications are not performing well or do not work at all. What are router or switch configuration changes you might make to ensure that applications would perform better? Are there any considerations?
Leo presents some good suggestions about this question. And I will take a slightly different approach to give you a somewhat different viewpoint. One thing that is similar in tunnels and in encryption/VPN is that they add extra information to the header and this may cause problems with maximum frame size and fragmentation. The generic solution for this is to reduce the MTU/maximum frame size of packets going through the interface.
The consideration about this is that reducing the frame size will have (somwhat of a) impact on performance since using smaller packets may require more packets to carry the same amount of data between the peers. In reality the impact is likely to be small. But in terms of interview questions it should be mentioned.
Thanks Richard. I posted the same question on another message board and someone brought up that the question might be referring to a QinQ trunk. In this case, wouldn't you increase the mtu to 1504 to account for the added vlan tag. Is a QinQ even a possibility?
Is a GRE tunnel the most likely way (or only way) the link described in the question would be setup?
No way to tell.
I mean if they drop you in the water running, then the first order of business is to ensure your link is UP and working fine. Users are able to login, check emails, network shares, etc.
Problems with specific applications depend entirely on alot of major factors. Could be the server, could be the client, could be the link. Anything can go wrong.
The question is designed to see how the applicant can be "creative" or how well can you organize yourself in troubleshooting something, what is your conduct and decorum.
They don't expect you to know all the tools and goodies. The client wants to know HOW DO YOU THINK, how do you get around doing things. Do you loose your cool? Do you un-ravel? Do you get do down on your knees and cry.
In an interview, look at the interviewer straight in the eye. But, for your sake, DO NOT LOOK DOWN TO THE LEFT!
[toc:faq]The ProblemOn traditional switches whenever we have a trunk
interface we use the VLAN tag to demultiplex the VLANs. The switch needs
to determine which MAC Address table to look in for a forwarding
decision. To do this we require the switch to do...
[toc:faq]Introduction:Netdr is a tool available on a RSP720, Sup720 or
Sup32 that allows one to capture packets on the RP or SP inband. The
netdr command can be used to capture both Tx and Rx packets in the
software switching path. This is not a substitut...
IntroductionOSPF, being a link-state protocol, allows for every router
in the network to know of every link and OSPF speaker in the entire
network. From this picture each router independently runs the Shortest
Path First (SPF) algorithm to determine the b...