12 - Introducing Virtualisation Protocols and Techniques Flashcards

1
Q

___ refers to the creation of independent logical traffic paths over a shared physical infrastructure

A

path isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a hypervisor?

A
  • Thin OS between hardware and virtual machine
  • allocates resources to virtual machines
  • Manages VMs (create, modify, destroy, move)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The virtualisation of the interconnection between devices is called…

A

data path virtualisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ combines the used of VRF instances with either 802.1q trunking for hop-by-hop path isolation or GRE/multipoint GRE for multihop path isolation

A

VRF-lite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ can also be used to extend VRFs across an IP infrastructure, and would be the best choice for large scale enterprises that require more than 32 virtual networks per device, or require traffic engineering and optimal path selection with Fast Reroute capabilities along with the ability to provide extremely scalable full mesh connectivity.

A

MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Within each networking device, there are two planes to virtualise. What are these?

A
  • Control plane – all the protocols, databases and tables necessary to make forwarding decisions and maintain a functional network toplogy free of loops or unintended black holes
  • Forwarding plane – all the processes and tables used to forward traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A VRF consists of…

A
  • IP routing table
  • A derived forwarding table
  • Set of interfaces that use the forwarding table
  • Set of rules and routing protocols that determine what goes into the forwarding table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some advantages of VRF-lite technology?

A
  • Allows for routing and forwarding separation
  • Simplifies the management and troubleshooting of traffic belonging to specific VRF
  • Enables support for alternate default routes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you apply a VRF to an interface?

A

ISP(config)# interface Ethernet 0/1
ISP(config-if)# ip vrf forwarding CUST-A
% Interface Ethernet0/1 IPv4 disabled and address(es) removed due to enabling VRF CUST-A
ISP(config-if)# ip address 172.16.2.18 255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why does applying a VRF remove the addressing?

A

Because the interface is being moved from global routing table to VRF routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What commands verifies a VRF?

A

show ip vrf , show ip vrf interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Generic routing encapsulation – a tunnelling protocol which provides a secure path for transporting packets over a public network by encapsulating packets inside a ___ protocol

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main characteristics of GRE?

A
  • One of many tunnelling protocols
  • IP protocol 47 defines GRE packets
  • Allows routing information to pass between connected networks
  • No encryption used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GRE adds a __ byte IP header and a _ byte GRE header, hiding existing packet headers

A

20, 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A GRE header contains a ___ field and ___ field to identify the L3 protocol being transported. It may contain a tunnel checksum, tunnel key and tunnel sequence

A

flag, protocol type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GRE does not __ traffic or use any strong security measures to protect traffic

A

encrypt

17
Q

GRE can be used along with ___ to provide data source authentication and data confidentiality, and data integrity

A

IPSec (IP security)

18
Q

GRE over IPsec tunnels are typically configured in a___ topology over an untrusted WAN in order to minimise the number of tunnels that each router must maintain

A

hub and spoke

19
Q

A tunnel interface supports a header for each of the following…

A
  • A passenger protocol or encapsulated protocol such as ipv4 or ipv6, this protocol is the one being encapsulated
  • A carrier or encapsulation protocol (GRE, in this case)
  • A transport deliver protocol, such as IP, which is the protocol that carries the encapsulated protocol
20
Q

You may have to adjust the __ on GRE tunnels by using the __ interface configuration command. This must match both sides.

A

MTU, ip mtu

21
Q

How do you configure a GRE tunnel?

A

Create a tunnel interface.
• Router(config)# interface tunnel tunnel-id
Configure the GRE tunnel mode. This mode is a default tunnel mode so it is not necessary to configure it.
• Router(config-if)# tunnel mode gre ip
Configure an IP address for the tunnel interface.
• Router(config-if)# ip address ip-address mask
Specify the tunnel source IP address.
• Router(config-if)# tunnel source ip-address
Specify the tunnel destination IP address.
• Router(config-if)# tunnel destination ip-address

22
Q

How do you verify if tunnel interface is up or down?

A

show ip inter brief tunnel tunnel-id

23
Q

How do you show the state of GRE tunnel?

A

show interface tunnel tunnel-id