2.0 Virtualization Domain 10% Flashcards

1
Q

The basis of the SD-Access control plane and is used to manage the mappings between endpoint identifiers (EIDs) which are assigned to hosts and routing locators (RLOCs) which are assigned to routers.

A

Locator/ID Separation Protocol (LISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Manages the endpoint to fabric node mapping

A

Host Tracking Database (HTDB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LISP device that encapsulates IP packets from Endpoint Identifiers (EIDs) that have destinations to a different LISP site.

A

Ingress Tunnel Router (ITR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encapsulates traffic from non-LISP sites destined for EIDs at LISP sites

A

Proxy Ingress Tunnel Router
(PITR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

device that de-encapsulates LISP packets from EIDs that reside outside the LISP site but have destinations the lie inside the LISP site

A

Egress Tunnel Router (ETR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ETR router uses to send traffic to non-LISP sites

A

Proxy Egress Tunnel Router
(PETR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Single device that combines both ITR and ETR LISP functions

A

Tunnel Router
(xTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • accepts encapsulated Map-Request messages from the ITRs,
  • dencapsulate those messages,
  • forwards towards the ETRs
A

LISP Map Resolver
(MR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Basis of the SD-Access data plane and is used to extend and enchance VLAN capabilities by overlaying a layer 2 network on top of a layer 3 network

A

Virtual Extensible Local Area Network
(VXLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encapsulation method is used in VXLAN to transport layer 2 data over an IP-based underlay?

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

24-bit segment ID that replaces the VLAN ID and extends layer 2 segmentation from 4,094 possible VLANS to 16 million broadcast domains

A

VXLAN Network Identifier
(VNID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does VXLAN use for loop protection?

A

Layer 3 routing protocols and Equal Cost Multipathing (ECMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Draft IETF standard that redefines a reserved portion of the standard VXLAN header to inclue Security Group Tag (SGT) information.

A

VXLAN Group Policy Option
(VXLAN-GPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

device that provides the encapsulation and deencapsulation for the VXLAN

A

Virtual Tunnel Endpoint
(VTEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

logical interface where the VXLAN encapsulation and deencapsulation occurs

A

Network Virtual Interface (NVI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

network virtualization mechanism that enables a single layer 3 router to function as multiple virtual routers

A

Virtual Routing and Forwarding
(VRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an open standard that operates at the Network layer and is responsible for securing VPN traffic by providing device authentication, data encryption, and data integrity

18
Q

What encryption methods are supported by IPSec

A
  • Data Encrytpion Standard (DES)
  • Triple DES (3DES)
  • Advanced Encryption Standard (AES)
19
Q

What command creates and names a VRF?

A

ip vrf vrf-name

20
Q

What command within the VRF configuration is used to distinguish routing domains?

A

rd asn:arbitrary#

21
Q

What command is required if BGP is running in the VRF and creates a list of import and export route target (RT) communities for the VRF?

A

route-target {export | import | both} asn:arbitrary#

22
Q

What command is used to associate interfaces with the VRF?

A

within the interface configuration mode of each interface you want to participate in the VRF issue:
ip vrf forwarding vrf-name

23
Q

which command was issued to produce the following output:

A

show ip vrf detail vrf-name

24
Q

What command is used to create the logical interface of a tunnel?

A

interface tunnel tunnel-number

25
Cisco IOS defaults to what mode of GRE?
IPv4 GRE
26
What command with the tunnel configuration is used to assign the virtual interface of the tunnel?
**ip address** *ipv4-address*
27
what commands identify the source and destination ip addresses of the physical intefaces?
**tunnel source** *ip-address of source router* **tunnel destination** *ip-address of destination router*
28
What command produced the following output?
**show interfaces tunnel** *tunnel-number*
29
What IP protocol needs to be allowed by and ACL or firewall if GRE tunnels are being used?
IP protocol 47
30
What type of hypervisor doesn't require a host OS?
**Type 1**
31
What are some examples of type 1 hypervisors?
**VMWare ESXi and Microsof Hyper-V**
32
What are some examples of type 2 hypervisors?
**Oracle Virtual Box** **VMWare Fusion** **VMWare Player**
33
Emulates the physical hardware of a host computer system such as a desktop or server
**Virtual Machine**
34
Allows VMs to quickly and easily migrate between host machines
**Encapsulation**
35
Ensures that a VM can migrate to any physical host with the appropriate resources
**Hardware Independance**
36
* Is an ETSI standard that defines the decoupling of network functions (NFs) from hardware * used to create appliances, such as load balancers, firewalls and intrusion detection systems (IDSs), * can perform the functions of their physical counterparts without being confined to a dedicated hardware platform
**Network Functions Virtualization (NFV)**
37
T/F a vSwitch is a virtualized switch that emulates a physical multilayer switch?
**False** a vSwitch can only emulate a physical layer 2 switch
38
What are some common Cisco VNFs
**Cisco Cloud Services Router 1000v (CWR 1000v)** **Cisoco Integrated Services Virtual Router (ISRv)** **Cisco NextGen Firewall Virtual Appliance (NGFWv)**
39
What are some limitations of a vSwitch?
* **cannot share a connection to a physical NIC with another vSwitch** * **two vSwitches cannot be connected together**
40
What hash algorithms are used by IPSec to ensure data integrity?
**Message Digest 5 (MD5) or Secure Hash Algorithm 1 (SHA 1)**
41
What are Authentication methods used by IPSec?
**Pre-Shared Keys** **Digital Signatures**