Boson Notes #2 Flashcards

1
Q

OSPF Maximum equal cost paths

A

OSPF can insert a maximum of FOUR equal-cost paths into the routing table by default.

By using maximum-paths 8 command you can override this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lightweight AP in bridged mode

A

Lightweight AP in bridged mode acts as a dedicated connection between two networks.

Needs a WLC to operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FlexConnect ACLs

A

FlexConnect ACLs are supported on the native VLAN, it is configured on wireless AP VLAN interfaces if it is operating in FlexConnect mode.

FlexConnect ACLs are applied per AP per VLAN.

FlexConnect mode enables a failsafe for lightweight AP if it’s connected to the WLC if CAPWAP tunnels goes down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Fram Size

A

Giant Frame exceeds 1518 bytes,

baby giant is up to 1600 bytes,

jumbo frame is up to 9216 bytes

runt frame that is fewer than 64 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collison

A

Collison occurs when a packet must be reset because of an interruption that occurs before the 64th byte or 512th bit.

When two devices transmit data at the same time a collision occurs.

Collisions can be caused by duplex mismatch, malfunctioning devices, or too many nodes on a network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CSMA/CD

A

CSMA/CD – both devices will wait a random amount before resending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Autonomous AP

A

Autonomous AP contains interfaces for both wireless and wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cisco hierarchical network model

A

Cisco hierarchical network model

Three layers: Core, Distribution (aka aggregation layer), and access layer.

Core – low latency high reliability, network backbone, fast convergence, fastest switching path.

Distribution - router filtering and inter-VLAN routing, security policies, QoS, routing, summarization, net hop redundancy.

Access – media termination points for end devices. Provides access to the network, user authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Puppet

A

Puppet – TCP 8140, uses HTTP, client/server architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Chef

A

Chef – client/server architecture or stand-alone client.

Chef communicates on TCP 443, configs stores in cookbook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ansible

A

Ansible -uses SSH,

configs stored in playbooks that is written in YAML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Salt

A

Salt – client/server architecture, requires TCP 4505 4506

uses Python.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

802.1w

A

802.1w – RSTP includes PortFast, UpLinkFast, BackboneFast.

PortFast enables ports for immediate access to the network.

UpLinkFast increases convergence speed for access layer SW

BackboneFast increases convergence speed for SW that detects a failure on links that are not directly connected to the Sw.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.1D

A

802.1D – traditional STP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.1s

A

802.1s – Multiple Spanning Tree (MST) – creates multiple spanning-tree instances on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.3ad

A

LACP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cisco lightweight AP

A

Cisco lightweight AP – operating in local mode and provides BSS.

BSS is a closed group of wireless devices that are dependent on a fixed device.

BSS is also the default that requires WLC.

The connection between a Lightweight AP and a WLC uses CAPWAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Lightweight AP in bridge mode

A

Lightweight AP in bridge mode – Bridge mode enables LWAP to act as a dedicated connection between two networks.

Will form a mesh network of lightweight AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MAC Multicast

A

01-00-5E-0F-0F-0F to

01-00-5E-7F-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Feasible Distance

A

Feasible Distance – EIGRP term for best metric along a path to a destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Successor

A

Successor – best path to a destination network.

22
Q

Feasible Successor

A

Feasible Successor – backup path that is guaranteed loop-free and be used of successor route goes down.

23
Q

Advertised Distance (AD) – (aka Reported Distance RD)

A

Advertised Distance (AD) – (aka Reported Distance RD)

Metric that has been calculated by the next-hop router.

24
Q

VPBX (Virtual Private Branch Exchange)

A

VPBX (Virtual Private Branch Exchange) used to route telephone calls

25
Q

Encapsulation

A

Encapsulation: adding a VPN header and IP header to the packet.

26
Q

IP SEC encryption process in site to site:

A
  1. sending device combines session key (encryption key/shared key)
  2. sending device encapsulates the encrypted data and session key into a packet with a VPN header and a new Ip header.
  3. sending deice sends the completed packet to the destination device.
  4. Destination/receiving device uses the same session key to decrypt.
27
Q

Cisco IP phone COS Priority

A

Cisco IP phone COS Priority

0 lowest
7 highest

0 default

28
Q

Beacons

A

Beacons are management frames that contain the SSID of a wireless network.

29
Q

SNMPv3 Engine ID

A

SNMPv3 Engine ID - identifies SNMP server, it is used as a calculation process for authentication/hashes.

Engine ID must be created before you create a remote user on the SNMPv3 agent, this ID must match on both devices.

30
Q

ATM (PPPoA)

A

ATM (PPPoA) – used to initiate a session with a DSL service provider

PPP frames are not encrypted.

31
Q

RADIUS

A

RADIUS – only encrypts the password in access request packets; it does not encrypt the entire contents of the packet.

It combines AAA into a single function.

Port - 1812, 1813 TCP

32
Q

TACACS+

A

TACACS+ - encrypts the entire content of the packets, provides more control for admins as it separates AAA.

Port 49 TCP

Cisco Proprietary

33
Q

switchport port-security (xxxxxxxxxx)

A

switchport port-security violation – configs a SW port to discard traffic and increment violation counter

switchport port-security protect – configs a SW port to discard traffic that it receives from unauthorized hosts. Violation counter is not incremented.

switchport port-security shutdown – SW port will enter error-disabled state when the port received traffic from unauthorized hosts.

34
Q

Southbound APIs

A

Used to communicate with the data plane

OnePK - Cisco Proprietary API

OpenFlow - uses an imperative SDN model

OpFlex - uses a declarative SDN model

NETCONF - uses XML and RPCs to configure network devices

35
Q

Northbound APIs

A

Communicates with the application plane

REST - uses either XML or JSON format

OSGI (Open Service Gateway Initiative)

36
Q

EIGRP Routing table

A

EIGRP Routing table contains only successors, which are the best next-hop routes to a destination.

EIGRP routers maintain a routing table, topology table, neighbor table.

The topology table contains successors and feasible successors.

The router table/topology table does not list successor or feasible successors, they are listed in the neighbor table.

37
Q

Default-information originate

A

Default-information originate

configures OSPF to inject a router’s default external route into OSPF, as well as router becoming an ASBR (autonomous system boundary router)

38
Q

WFB CBWFQ LLQ

A

WFB CBWFQ LLQ

mitigates BW starvation.

LLQ does strict priority queues that can be used for delay-sensitive traffic.

39
Q

802.1X + CCKM

A

802.1X + CCKM – enables 802.1X clients to use Cisco Centralized Key Management (CCKM) to roam between AP without performing the 802.1x authentication process again.

Removed the need to re-authenticate with the RADIUS server.

40
Q

CCKM (Cisco Centralized Key Management)

A

CCKM (Cisco Centralized Key Management)

a fast rekeying method that enables a wireless client to roam from one AP to another without the intervention of a WLC.

It is used to reduce delay when wireless clients transition between AP, so delay-sensitive services like VoIP operate smoothly

41
Q

DAI

A

DAI – By default when DAI is configured, the ports will be configured as untrusted unless “TRUST” command is in place.

42
Q

Default Routes

A

Default Routes – used to send packets that are destined for a location that is not listed elsewhere in the routing table.

Most specific routes will be used if multiple static routes are known.

43
Q

CiscoWorks Wireless LAN Solution Edge (WLSE)

A

CiscoWorks Wireless LAN Solution Edge (WLSE) simplifies the management and deployment of WAPs in a Cisco Autonomous WLAN.

It can be installed to help automate the management and deployment of APs.

44
Q

WLC

A

WLC – Provides wireless network management service in a wireless network.

45
Q

WDS (Wireless Domain Services)

A

WDS (Wireless Domain Services) – Cisco IOS feature that can be installed on APs and used to enable those APs to interact with CiscoWorks WLSE.

46
Q

Cisco Wireless Service Module (WiSM)

A

Cisco Wireless Service Module (WiSM) – WLC module that can be installed in a Catalyst 6500 SW or Cisco 7600 router.

47
Q

WLC can have up to four static interfaces;

the management interface
the AP-manager interface
the virtual interface
the service port interface

A

AP-Manager interface on a WLC controls all L3 communications between a WLC and LWAP.

WLC Management interface – used for in-band management information. Used for all L2 LWAPP communications between the controller and the LWAP. Also used to communicate with other WLC on the network.

WLC Service port interface – used for maintenance purposes on a WLC. Used to recover WLC in the event of failure.

WLC Virtual Interface – provides specific IP that is the same across multiple controllers when wireless clients roam among the controllers.

48
Q

metric

A

A metric is a measurable value that is assigned by the routing protocol to different routes based on the usefulness of that route.

In situations where there are multiple paths to the same remote network, the routing metrics are used to determine the overall “cost” of a path from source to destination

49
Q

SW Forwarding Decisions

A

SW will use the destination MAC address to make forwarding decisions.

  1. searches Content Addressable Memory (CAM) table for a match, CAM aka Switching table.
  2. If MAC address is not found, the SW forwards the frame to all its ports except the port that it was received.
  3. If MAC address is found in the table, the SW forwards the frame to the appropriate port. The Source MAc address is also recorded if it did not exist in CAM table.
50
Q

Spine + Leaf

A

Spine + Leaf :

Create a scalable network fabric for east-west data transfer.

Spine and leaf nodes do not interconnect with other spine and leaf nodes.

APICS are connected to one or more leaf nodes, as well as end point groups (EPG).

51
Q

Neighbor Adjacencies (IPv6 Link-Local + OSPFv2)

A

IPv6 Link local (FE8) address used to form neighbor adjacencies,

OSPFv2 uses a multicast address to form neighbor adjacencies.

52
Q

Anycast address

A

Anycast address

used to send packets to the closest device that is configured with the anycast address, ideal for load balancing as it uses the same address for multiple devices in a group.