CCNA Cram Flashcards

1
Q

How config SSH

A
  1. Configure host name
    conf t
    hostname [hostname]
  2. Configure DNS domain name
    ip domain name [domainname]
  3. Generate RSA keys
    crypto key generate rsa
  4. Config enable password, username/password (ACL if you want to)
    enable secret [password]
    username [username] secret [password]
  5. Enable SSHv2
    ip ssh version 2
  6. Configure VTY lines
    line vty 0 15
    login local
    transport input ssh
    access-class 1 in (if putting in ACL)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What error do you get if not create hostname first when config ssh

A

Please define hostname other than Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What error do you get if try to create key for SSH and no domain name specified

A

Please define a domain-name first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HSRP v1 IP and MAC

A
  1. 0.0.2
  2. 0c07.acXX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HSRP v2 VIP and MAC

A
  1. 0.0.102
  2. 0c9f.fXXX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VRRP VIP and MAC

A
  1. 0.0.18
  2. 5e00.01XX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GLBP IP and MAC

A
  1. 0.0.102
  2. b400.XXYY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Max ports in LAG on WLC

A

2504 and 3504 - 4

5508 - 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do APs know the IP of WLC

A

option 43 ip [ip of WLC]

Set this up in the DHCP configs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Configs to set up DHCP server

A

ip dhcp pool [pool name]

network [ip network] [subnet mask]

default-router [default router ip]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Interfaces on WLC

A

Software interfaces:

Management - Telnet, SSH, HTTP, HTTPS, Radius, NTP, Syslog

Redundancy Management -

Virtual interface - used when comminucation w/ wireless clients to relay DHCP, client web authentication

Service ports - used for out-of-band management

Dynamic - used to map WLAN to VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What see if Duplex issues

A

Full duplex side - High FCS Errors

Half duplex side - High collisions specifically late collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Speed mismatch

A

Usually will bring interface down (down/down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPAs with Encryption Method / Data Integrity Method / Key Management / Authentication

A

WEP - Encryption-RC4 / Authentication-Open System & Shared Key / Integrity-CRC-32

WPA - Encryption-TKIP w/ RC4 / Authentication-PSK & 802.1x w/ EAP / Ingegrity-64 bit MIC

WPA2 - Encryption-AES-CCMP / Authentication-PSK & 802.1x w/ EAP / Integrity-CCMP w/ AES

WPA3 - Encryption-AES-GCMP / Authentication-AES-GCMP / Integrity-SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does power inline police command do

A

Disables port and sends syslog message if PD draws too much power

Interface will go in err-disable state and can be restored with shutdown then no shutdown command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does power inline police action err-disable command do

A

disables the port and sends syslog message if PD draws too much power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does power inline police action log command do

A

If PD pulls too much power it will just restart interface and send Syslog (will not disable the interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is NETCONF

A

Is SBI

Uses XML and RPCs

Relies on SSH for transport

Used to configure network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What encoding formats do REST APIs use?

A

XML - uses HTML-like tags (uses tags to define blocks of data)

JSON - uses objects that contain key and value pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is REST API used for?

A

Used on the Northbound Plane to communicate with the SDN application plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OnePK

A

Is used for SBIs

Is Cisco Proprietary SBI

Uses Java C or Python to config devs

Can use either SSL or TLS to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OpFlex

A

Is SBI protocol

Uses declarative SDN model - instructions sent to controller not so detailed

Allows devs in data plane to make more network decisions on how to implement policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Open Flow

A

Is SBI Protocol

Is an imperative SDN model

Detailed instructions sent to SDN controller when new policy config’ed

SDN Controller manages both the network and the policies applied to the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What SBI Protocols are used in SDN

A

OnePK

OpFlex

OpenFlow

NETCONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What NBI protocols are used in SDN

A

REST

OSGi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is REST

A

Uses HTTP or HTTPs to enable external resources to access and make use of programs exposed by API

Usually use XML or JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is OSGi

A

Is NBI Protocol

Java based

Enables development of modular programs

Allows Python language as means of extended controller functions

For transport often use HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a recursive static route

A

Specifies destination IPv6 nework and IPv6 next hop address only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How many routers can a router make neighborships with in the DROTHER state for OSPF?

A

Only with the DR and BDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How can you tell if routers are connected are on point-to-point / point-to-multipoint network in OSP?

A

There is no DR/BDR in point-to-point or point-to-multipoint OSPF networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

OSPF hello/dead timers

A

If hello/dead timers dont match then neighborship will not establish

Ethernet link Hello: 10/40

Point-to-Point link Hello: 10/40

Point-to-Multipoint link: 10/40

Non-broadcast Link Hello: 30/120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is ARP Poisoning and how to stop

A

Attacker sends gratutious ARP to host

Associates attackers MAC with the IP of valid host

Traffic will go through the attackers pc

to stop - implement DAI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is VLAN Hopping and how stop it

A

Attacker injects packets into other VLANs by accessing VLAN Trunks and double tagging 802.1Q Frames

if successful - allows attacker to send traffic to other VLANs w/o router

To prevent - disable DTP on trunk ports, change the native VLAN and config user-facing ports as access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is MAC spoofing and how to stop it

A

Attacker uses MAC of another host to bypass port security methods

Also can impersonate another host

Implement port security with sticky secure MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

MAC Flooding and how to stop

A

Attacker generates forged frames every minute to overwhelm MAC addy table

Then cant make forwarding decisions and all traffic flooded

Attacker can see all data

To stop - add port security to limit MAC addys to be learned on interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is DHCP spoofing and how to stop

A

install rogue DHCP server to intercept DHCP req

respond with own IP as default gateway and can see everything

to fix - enable DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is DAI and how implement

A

Mitigates ARP poisoning attacks (or ARP Spoofing attacks)

DAI inspects traffic on ingress ports to ensure incoming traffic doesn’t contain ARP replies from HOST computers

Supported on: Access Ports, Trunk Ports, EtherChannel Ports, Private Virtual LAN Ports

Enabled on single or multiple VLANs

Configuration:

conf t

ip arp inspection vlan [vlans]

CANNOT put DAI on interfaces - ONLY globally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is Port Security and how to implement

A

Allows traffic into switchport from Authorized MAC

If not authorized is discarded and sometimes that port will be disabled

Enabled on interface level

By default - only allows ONE MAC

Can do a few different ways:

switchport port-security (allows 1 MAC)

switchport port-security mac-address [MAC addy] - for specific MAC

switchport port-security maximum [number] - max number of MACs to learn dynamically from the interface

switchport port-security mac-address sticky - dynamically learned MACs will be saved when switch restarts

By default when violation occurs it will be shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Port-security violations

A

If port-security violation occurs - by default interface will go into err-disable

Reenable by shut/no shut

OR

errdisable recovery cause psecure-violation

CAN change so doesnt disable with:

switchport port-security violation restrict - this will send counter to increment and send SNMP trap notificiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

NTP static client mode

A

NTP static client mode is the default

The client will get time from an NTP server

ntp server [ip address of the NTP server]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

NTP broadcast client mode

A

Listens on config’ed interfaces for NTP broadcasts from NTP server

NTP client uses this to adjust time

Broadcast can get time from any NTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

NTP Authentication Mode

A

Provides source verification for NTP sync’ing

Supports MD5 keys

to enable:

ntp authenticate

ntp authentication-key [keynumber] md5 [key]

ntp trusted-key [key number]

ntp server [ip address] key [key number]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

NTP Modes

A

Static Client

Broadcast Client

Authentication

Server

Asymetric Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

NTP Server Mode

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

NTP Server Mode

A

To enable
ntp master [stratum 1-15]

Default stratum 8

Sync time with clients and with eachother

Dev with higher stratum numbers get time from dev with lower stratum numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

NTP Symetric Active Mode

A

Command is:

ntp peer [ip address of NTP host]

attempts to mutually sync with another NTP host

host might sync peer or be synced by peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Application Plane SDN

A

Applications that are written to allow interaction with control reside in

Applications designed to improve network management effeciency through network automation

Use NB APIs like REST and OSGI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Control Plane SDN

A

Centralized

Responsible for network decisions making

(OSPF)

Connects to Application plane via NBIs

Conencts to Data plane via SBIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Data Plane SDN

A

Network tasks pushed down by Control Plane to Data Plane

Include encapsulation/deencapsulation, adding/removing trunk headers, matching MAC addys to tables, IPs to paths, encryption, NAT, ACLs

Connects via SBIs to Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Management Plane SDN

A

Network management protocols

Telnet, SSH, SNMP, Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Collision troubleshooting

A

Collision - happens before 64th byte

Usually due to duplex mismatch

Malfunctioning dev

Too many nodes

LATE Collision - happens after the 64th byte

Usually due to duplex mismatch

To long network segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is runt and what causes it

A

Frame with less than 64 bytes and has bad FCS

Discarded

May be excessive collisions or malfunctioning hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is baby giant

A

Frame up to 1600 bytes

can happen in Q-in-Q encapsulation, MPLS

54
Q

What is giant

A

frame up to 9216 bytes

can issue system mtu [bytes] to allow - but need make sure supported.

55
Q

lldp commands

A

no lldp run - turns off globally from global config

lldp transmit - turns on interface from interface config to send out

lldp receive - turns on interface from interface config to receive

add no in font of above to turn off on interfaces

56
Q

Interfaces on WLC

A

STATIC:

management

AP-manager interface

virtual interface

service port interface

57
Q

Management Interface on WLC

A

Static

Used for management information

Used for all L2 LWAPP to communication btw controller and APs

Used to communicate with other WLCs

58
Q

Service Port Interface on WLC

A

Static interface

used for maintenace purposes

used to recover WLC if fails

only interface available while WLC booting

59
Q

Dynamic Interface

A

User defined

Used for client data

Doesnt need to be reachable by all other WLCs

Works like VLANs

60
Q

Ways to assign IPv6 address

A

(1) ipv6 enable - will derive a link local IPv6 address (online inside the link)
(2) ipv6 address [address/prefix length] eui-64 - configs static IPv6 using standard and MAC - manual
(3) use SLAAC or DHCPv6 - ipv6 address autoconfig (SLAAC) ; ipv6 address dhcp (DHCPv6)

61
Q

What Supports Cisco SDA

62
Q

What is Cisco IOS 15

A

Is network OS used to config, manage and troubleshoot single dev

Interact via CLI through SSH or Telnet

63
Q

What is Cisco Network Assistant

A

free Java-based Application

Allows LAN admin to do network operation, diagnois issues, interact with network dev via a GUI

Supports managemet of up to 80 devs

64
Q

What is Cisco Prime Infrastructure (PI)

A

Enterprise Cisco managment platform

Relies on browser GUI

Admins can do operations on network, diagnosis issues, and interact with dev on the network

65
Q

how to remove RSA keys from router

A

crypto key zeroize rsa

66
Q

Puppet

A

Accepts IB req from agent using HTTPS on TCP 8140

Operates on Linux, UNIX, Microsoft Windows

Uses client/server

Written in Ruby DSL or Puppet DSL

67
Q

Chef

A

Works on Linux, UNIX and Windows

Either client/server or cleint only

Communicates using HTTPS on TCP port 443

Config in Recipes in Cookbooks

Written in Ruby DSL

Managed nodes running client can pull cookbooks

Standalone can pull from local dir

68
Q

Ansible

A

Linus, Unix, Windows

no agent software on nodes

uses SSH on TCP 22to connect to nodes

Configs in playbook written in YAML

69
Q

What is Cisco ACI

A

Application Centric Infrastruction

Leaf/Node

Used in data centers

Network application policies defined on APIC (Cisco Application Infrastructure Policy) - applied on Leaf/Nodes

70
Q

How update in OSPF:

Router ID

cost

hello interval

dead interval

A

Router ID - In router config: router-id [id number]

Cost - In interface config: ip ospf cost [cost]

Hello interval - In interface config : ip ospf hello-interval [seconds]

Dead interval - In interface config : ip ospf dead-interval [seconds]

71
Q

What is a recursive static route

A

a route to a network that only provides the originating IP and the terminating IP

72
Q

What is a directly attached static route

A

provides the network and the interface to egress

73
Q

What happens if MTU settings are mismatched in OSPF

A

will get stuck in Exstart, Exchange or Loading states

74
Q

What does it mean if OSPF shows 2WAY/DROTHER

A

Means that neither are DR or BDR and so stay in 2way state

75
Q

OSPF Broadcast Network Type

A

Enabled by default on FDDI and Ethernet

Have DR and BDR elections

Multicast updates send (dont have to use neighbor command)

Hello is 10s / Dead is 40s

Command: ip ospf network broadcast

76
Q

OSPF Non-Broadcast Network Types

A

Enabled by default on Frame Relay and X.25

DR/BDR elections

Must manually config neighbor routers using neighbor command

Hello is 30 / Dead is 120

use command ip ospf network non-broadcast

77
Q

OSPF point-to-point network type

A

Enabled by default on HDLC and PPP

DR/BDR elections are not done

Multicast updates sent - no need to use Neighbor command

Hello / Dead : 10/40

Use ip ospf network point-to-point

78
Q

OSPF point-to-multipoint networks

A

DR/BDR elections not done

Uses multicasts

Hello / Dead : 30 / 120

ip ospf network point-to-multipoint

79
Q

OSPF point-to-multipoint nonbroadcast network

A

DR/BDR elections NOT done

must use neighbors to manually config neighbors

Hello / Dead are 30 / 120

ip ospf network point-to-multipoint non-broadcast

80
Q

Layer 3 Security Options in WLC using GUI

A

Different for WLAN and Guests:

Found in Layer3 Security dropdown on Layer3 tab of Security in the GUI:

**Must select L2 security before selecing L3 secuity**

None - WLAN or Guest

IPSec - WLANs only

VPN Pass-through - WLANs only - allows client to establish connection specific VPN server

Web Authentication - Guest only - prompts for username/pwd when client connects to network

Web Passthrough - Guest only - enables direct access to network for Guest LAN w/o prompting for username/password

81
Q

Layer 2 Security Options in WLC

A

Secuity then Layer2

**Can’t do L2 security on Guest LAN**

Options:

None

WPA + WPA2

802.1X - Uses EAP and dynamic WEP key

Static WEP - uses static shared WEP key

Static WEP + 802.1X - uses shared WEP or EAP

CKIP - uses CKIP

None+EAP Passthrough - uses open authentication with EAP authorization

82
Q

What error would you get if you installed SFP not supported

A

SYS-3-TRANCEIVER_NOTAPPROVED

83
Q

What happens if you connected cable to wrong port?

A

See ports on switch up but line protocol down

84
Q

What do you see if there is issue with fiber cable

A

You’d see port status lights on the SFP module not lit

85
Q

What is AES

A

AES encryption algorithm (Advanced Encryption Standard)

Used in WPA2 and WPA3

Stronger than RC4 used in WPA

128 bit cipher used to encrypt with secuity key of 128, 192 or 256 bits

86
Q

What is CCMP

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

Provides additional encryption - using block ciphers

Used by WPA2

87
Q

What is RC4

A

Stream cipher encryption

Used in WEP

Not very secure

88
Q

TKIP

A

Temporal Key Integrity Protocol

Provide MIC and encryption

Used in WPA

Better that WEP but uses RC4 as encryption algorithm

89
Q

GCMP

A

Galois/Counter Mode Protocol

Used with AEP for MIC and Encrpytion

Used in WPA3

Uses GMAC for MIC

90
Q

What command should you use to get general info about AP on WLC

A

show ap config general [AP name]

Shows IP address and other info on Cisco AP

92
Q

How can you get detailed info on AP on WLC

A

show ap config general [ap name]

includes AP IP, default gateway IP, DNS

93
Q

See Syslog server settings for all APs joined to WLC

A

show ap config global

can see syslog host, logging level, telnet, ssh, TX power, attena status.

94
Q

How see memory dump for AP

A

show ap core-dump [ap name]

large and used for troubleshooting

95
Q

How see crash dumps and radio core dump from APs

A

show ap crash-file

96
Q

What is PSK

A

Its Key Management method

Used in WPA or WPA2

Wireless clients connect to network w/ Key configed on WLC

Key can be ASCI or HEX

97
Q

Key management on WLC

A

PSK

802.1X

CCKM

98
Q

What is 802.1X

A

Default for WPA and WPA2 on Enterprise

Requires RADIUS server

Uses EAP to authenticate users

99
Q

What is CCKM

A

Key Managment

100
Q

What is FIB

A

Forwarding Information Base

All prefixes from IP routing table structured in way optimized for forwarding

The FIB and Adjacency table are 2 main componets of Cisco Express Forwarding (CEF)

Is synced with IP routing table

IP prefixes ordered so when L3 addy compared to FIB - longest most specific match found fist - makes faster

101
Q

What is the adjacency table?

A

maintains L2 addressing info for FIB

each network prefix in FIB assoc with next-hop addy and OB interface

102
Q

IPSec

A

Provides data confidentiality, data integrity and origin authentication

Uses ESP for confidentiality - encrypts entire IP packet and encapsulates it

Uses AH to ensure integrity of packet and to authenticate packet

AH verifies that the source addy in packet not modified - does NOT authenticate the identity of IPSec peer

GRE handles lots protocols but not secure - IPSec only does IP but highly securte

Package togehther with GRE over IPSec.

103
Q

GRE

A

Generic Routing Encapsulation

Provides broadcast and multicast packet encapsulation

Cisco Proprietary

Can tunnel info from one network to another w/o requiring transport security to support the network protocols in use at tunnel source/destination

Can transport many different protocols - limited in security

Combine GRE with IPSec

104
Q

802.1w

A

RSTP

Includes Portfast, Uplink Fast, Backbone Fast

105
Q

802.1D

A

Traditional STP

106
Q

802.1s

A

Multiple STP

Creates multiple STP on network

107
Q

Difference btw PortFast, Uplink Fast and Backbone Fast

A

Portfast puts port to immediately in forwarding state

Uplink Fast - increases convergence speed for access layer that detects failure on root port with backup root port selection by immediately replacing rootport with aternative root port

Backbone Fast - increase for switches that detect failure on links that are not directly connected to switches

108
Q

What is BDPU Loop guard

A

Prevents non-designated ports from inadvertantly forming bridging loops if the steady flow of BDPUs is inturupted

If port stops getting BDPUs it goes into loop-inconsistant phase and blocks

Once gets BDPUs again it reenables the port and goes through the normal STP states

To enable globally: spanning-tree loopguard default

Or on port: spanning-tree guard loop

110
Q

How GRE over IPSec works

A

Sending dev combines session key w/ data

Uses session key to encrypt key and data

Sending dev encapsulates data and key into packet with VPN header and new IP header

Send dev

111
Q

How to enable a password by entering the hash and not the password

A

enable secret 5 [md5 hash]

112
Q

what type of encryption is used when do service password encryption

113
Q

IPv6 Unicast

A

For a single interface

Types: Global Unicast, Link Local, Loop Back, Unspecified

114
Q

IPv6 MultiCast

A

ID’s set of interfaces belonging to different nodes

Can be node, link, site, orginization, global

4-bit field in the prefix id’s scope

Types: Solicited node, All nodes, All routers

Use prefix FF00::/8

115
Q

IPv6 Addy types

A

Unicasts

MultiCasts

AnyCasts

116
Q

IPv6 Anycast

A

Set of interfaces that belong to different nodes

Similar to multicasts but only sent to one interface and not all

Sends to closes node

117
Q

Global Unicast address

A

Unique IPv6 addy assigned to host interface

Same as IPv4 public address

Routable on the internet

118
Q

Link-Local IPv6 Address

A

Allows communication btw neighboring hosts on same link

Have local scope and cannot be used outside link

Prefix FE80::/10

119
Q

Loopback IPv6 Address

A

Used on loopback interface

::1/128

120
Q

Unspecified IPv6 Address

A

All 0s

::/128

121
Q

Solicited Node Address

A

Multicast addy

Neighbor Solicitation (NS) messages sent here

122
Q

All-nodes Address

A

Multicast

Router Advertisements sent here

123
Q

All-Router IPv6 Address

A

Router solicitation messages sent here

Is multicast address

124
Q

SMTP

A

Simple Mail Transfer Protocol

Uses TCP port 25

125
Q

SNMP

A

Simple Network Management Protocol

UDP port 161

126
Q

what does vty password enable

A

it enables password anytime you are accessing router virtually

ssh / telnet

127
Q

How set console password

A

Used if using cable to physically connect to router

When password entered - goes until user EXEC mode

line console 0

password [password]

128
Q

How set telnet password

A

line vty 0 15

login

password [password]

129
Q

Multicast MAC address

A

Begins with 01-00-5E

130
Q

RFC 1918

A

A Class: 10.0.0.0 - 10.255.255.255

B Class 172.16.0.0 - 172.31.255.255

C Class 192.168.0.0 - 192.168.255.255