CCNA - midterm Flashcards

1
Q

SWITCH BOOT SEQUENCE

A

When a Cisco switch powers on, it follows these five steps:

  1. POST: The switch runs a self-test (POST) to check the CPU, DRAM, and part of the flash storage.
  2. Boot Loader: A small program in ROM is loaded after POST, starting the boot process.
  3. CPU Initialization: The boot loader sets up CPU registers, memory mapping, and speed.
  4. Flash Initialization: The boot loader prepares the flash file system.
  5. Load IOS: The boot loader finds and loads the default IOS operating system into memory, taking control of the switch.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Differentiate boot system, flash:, c2960-lanbasek9-mz.150-2.SE/ and c2960-lanbasek9-mz.150-2.SE.bin

A
  • Boot system - the main command
  • flash: - the storage device
  • c2960-lanbasek9-mz.150-2.SE/ - the path to the file system
  • c2960-lanbasek9-mz.150-2.SE.bin - the IOS file name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shows whether the system is receiving power and functioning properly.

A

System LED (SYST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shows the RPS status.

A

Redundant Power Supply LED (RPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When green, indicates port status mode is selected, which is the default. Port status can then be understood by the light associated with each port.

A

Port Status LED (STAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When green, indicates port duplex mode is selected. Port duplex can then be understood by the light associated with each port.

A

Port Duplex LED (DUPLX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When green, indicates port speed mode is selected. Port speed can then be understood by the light associated with each port.

A

Port Speed LED (SPEED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Present if the switch supports PoE. Indicates the PoE status of ports on the switch.

A

Power over Ethernet LED (PoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Recovering from a System Crash

A

If the switch’s operating system is missing or damaged, the boot loader allows access to the switch through a console connection. Here’s how to access it:

  1. Connect a PC to the switch via console cable and open terminal software.
  2. Unplug the switch power cord.
  3. Reconnect the power and, within 15 seconds, press and hold the Mode button while the System LED flashes green.
  4. Keep holding until the LED turns amber and then solid green, then release the Mode button.
  5. The boot loader prompt will appear in the terminal software.

The boot loader lets you format the flash, reinstall the OS, or recover a lost password using commands like dir to view files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To manage a switch remotely, assign it an IP address, subnet mask, and a default gateway. This setup is similar to configuring a host device.

The switch’s virtual interface (SVI) on S1 should be given an IP address. The SVI is a virtual, not physical, interface. Use a console cable to connect to a PC for initial configuration.

A

Switch Management Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Switch SVI Configuration Example

A

By default, the switch uses VLAN 1 for management. For security, it’s best to use a different VLAN for management.

  1. Configure the Management Interface: Assign an IP address and subnet mask to the switch’s management SVI (e.g., VLAN 99). The SVI won’t be “up/up” until VLAN 99 is created and a device is connected to a port in that VLAN. If using IPv6, configure the switch for dual IP modes first.
  2. Configure the Default Gateway: If managing the switch remotely from another network, set a default gateway. No IPv6 gateway is needed since the switch receives this info from a router advertisement.
  3. Verify Configuration: Use show ip interface brief and show ipv6 interface brief to check the status of interfaces and confirm the IP setup. The IP on the SVI allows remote management, but not routing of Layer 3 packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Duplex Communication

A
  • Full-Duplex: Allows data to be sent and received simultaneously, improving efficiency. It requires microsegmentation (one device per switch port) and eliminates collisions. Gigabit Ethernet and 10 Gb NICs need full-duplex to function properly.
  • Half-Duplex: Only allows data to flow in one direction at a time, causing potential collisions and performance issues.

Full-duplex provides 100% efficiency in both directions, doubling the bandwidth usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Configure Switch Ports at the Physical Layer

A
  • Switch ports can be configured with specific duplex and speed settings using the duplex and speed commands.
  • By default, Cisco Catalyst 2960 and 3560 switch ports are set to auto for both duplex and speed. At 10/100 Mbps, they can be ihalf- or full-duplex, but at 1000 Mbps, they are always full-duplex.
  • Autonegotiation is useful when device settings are unknown or may change, but it’s best to manually set speed and duplex for known devices like servers or workstations.
  • When troubleshooting, check duplex and speed settings, as mismatched configurations can cause connectivity issues. Fiber-optic ports like 1000BASE-SX always operate at a fixed speed and full-duplex.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Auto-MDIX

A
  • Auto-MDIX allows the switch to automatically detect and adjust for the correct cable type (straight-through or crossover) needed for the connection.
  • Without auto-MDIX, use straight-through cables for devices like servers and routers, and crossover cables for connecting switches or repeaters.
  • With auto-MDIX, either cable type works, and the interface adjusts automatically for proper communication.
  • On newer Cisco switches, enable auto-MDIX with the mdix auto command, and set speed and duplex to auto for proper function.
  • Auto-MDIX is enabled by default on Catalyst 2960 and 3560 switches but not on older models like the Catalyst 2950 and 3550. Use the show controllers ethernet-controller command to check the setting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

 The ___________ command can be used to verify that the switch has been correctly configured. From the sample abbreviated output on S1, some important information is shown in the figure:

A

show running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

 The _____________ command is another commonly used command, which displays status and statistics information on the network interfaces of the switch. The show interfaces command is frequently used when configuring and monitoring network devices.

A

show interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The first line of the output for the ___________________________ command indicates that the FastEthernet 0/18 interface is up/up, meaning that it is operational. Further down, the output shows that the duplex is full and the speed is 100 Mbps.

A

show interfaces fastEthernet 0/18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Access Layer Issues

A

The show interfaces command helps identify common media problems by displaying line and data link protocol statuses.

  • Up/Down Status:
    • Interface up, line protocol down: This suggests issues like an encapsulation mismatch, an error-disabled interface, or a hardware problem.
    • Both down: Likely indicates no cable attached or an interface issue, such as the other end being administratively down.
    • Interface administratively down: This means the interface was manually disabled using the shutdown command.

The output also shows interface counters and statistics, which can reveal errors that impact network performance, even if they don’t cause complete failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Give the 7 Error Type and differentiate them

A
  1. Input Errors Total number of errors. It includes runts, giants, no buffer, CRC, frame, overrun, and ignored counts.
  2. Runts Packets that are discarded because they are smaller than the minimum packet size for the medium. For instance, any Ethernet packet that is less than 64 bytes is considered a runt.
  3. Giants Packets that are discarded because they exceed the maximum packet size for the medium. For example, any Ethernet packet that is greater than 1,518 bytes is considered a giant.
  4. CRC CRC errors are generated when the calculated checksum is not the same as the checksum received.
  5. Output Errors Sum of all errors that prevented the final transmission of datagrams out of the interface that is being examined.
  6. Collisions Number of messages retransmitted because of an Ethernet collision.
  7. Late Collisions A collision that occurs after 512 bits of the frame have been transmitted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is the sum of all errors in datagrams that were received on the interface being examined. This includes runts, giants, CRC, no buffer, frame, overrun, and ignored counts. The reported input errors from the show interfaces command include the following:
* run frames
* giants
* CRC errors

A

“Input errors”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Ethernet frames that are shorter than the 64-byte minimum allowed length are called _________. Malfunctioning NICs are the usual cause of excessive _______ frames, but they can also be caused by collisions.
A

Runt Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • Ethernet frames that are larger than the maximum allowed size are called ___________.
A

Giants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  • On Ethernet and serial interfaces, ___________ usually indicate a media or cable error. Common causes include electrical interference, loose or damaged connections, or incorrect cabling. If you see many __________, there is too much noise on the link and you should inspect the cable. You should also search for and eliminate noise sources.
A

CRC errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is the sum of all errors that prevented the final transmission of datagrams out the interface that is being examined. The reported __________ from the show interfaces command include the following:
* collision
* late collision

A

“Output errors”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Collisions -

A

Collisions in half-duplex operations are normal. However, you should never see collisions on an interface configured for full-duplex communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Late collisions -

A

A late collision refers to a collision that occurs after 512 bits of the frame have been transmitted. Excessive cable lengths are the most common cause of late collisions. Another common cause is duplex misconfiguration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Telnet Operation

A

Telnet uses TCP port 23 and transmits data, including login details (username and password), in unencrypted plaintext. This makes it insecure, as attackers can easily capture sensitive information (e.g., using Wireshark).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SSH Operation

A

SSH is a secure protocol that uses TCP port 22, offering encrypted remote management connections. Unlike Telnet, SSH encrypts both the login details and transmitted data, making it safer. Even if a threat actor tracks the session via the IP address, the username and password remain encrypted. SSH should replace Telnet for secure connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Verify the Switch Supports SSH

A

To enable SSH on a Catalyst 2960 switch, ensure it’s running an IOS version with cryptographic features. Use the show version command to check the IOS version. If the IOS filename includes “k9,” it supports encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Configure SSH

A
  1. Verify SSH Support: Use show ip ssh to check if the switch supports SSH. If the IOS doesn’t support encryption, this command won’t work.
  2. Configure IP Domain: Set the domain name with ip domain-name domain-name.
  3. Generate RSA Key Pair: Use crypto key generate rsa to enable SSH and generate the RSA key pair. Delete with crypto key zeroize rsa if needed.
  4. Configure User Authentication: Create a local username and password with username username secret password.
  5. Configure vty Lines: Enable SSH on vty lines using transport input ssh and set local authentication with login local.
  6. Enable SSH Version 2: Enable SSH v2 with ip ssh version 2.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Verify SSH is Operational

A
  1. On a PC, use an SSH client like PuTTY to connect to the switch (S1) with IP address 172.17.99.11 on VLAN 99.
  2. From PC1 (IP 172.17.99.21), initiate an SSH connection to the switch.
  3. Enter the username (admin) and password (ccna) when prompted to connect to the switch’s CLI.
  4. Use show ip ssh to check SSH version and configuration on the switch (SSH v2 is enabled in the example).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

One distinguishing feature between switches and routers is the type of interfaces supported by each. For example, Layer 2 switches support LANs; therefore, they have multiple FastEthernet or Gigabit Ethernet ports. in the figure is used to demonstrate the configuration of router IPv4 and IPv6 interfaces.
* refers to a network design where two separate, independent systems or paths are used to ensure redundancy and reliability. It typically involves two sets of stocks or resources that can back up each other, minimizing the risk of failure. If one path or resource fails, the other takes over to maintain continuous operation.

A

Dual Stack Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Configure Router Interfaces

A

Routers connect LANs and WANs and support various interfaces (e.g., Gigabit Ethernet, serial, DSL). To configure an interface:

  1. Assign an IP Address: Use ip address ip-address subnet-mask for IPv4 or ipv6 address ipv6-address/prefix for IPv6.
  2. Activate the Interface: By default, interfaces are off. Use no shutdown to enable them, and ensure the interface is connected to another device.
  3. Add a Description (optional): Configure a brief description for each interface to aid in troubleshooting and network management.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

IPv4 Loopback Interfaces

A

A loopback interface is a virtual, internal interface on a router, not linked to any physical port. It’s always “up” as long as the router is functioning.

  • Uses: It’s helpful for testing and managing the router, ensuring at least one interface is always available. It can also simulate networks for testing routing processes and configuration practice.
  • Multiple Loopbacks: You can create several loopback interfaces to simulate more networks in lab setups.
  • Configuration: Assign a unique IPv4 address to each loopback interface.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Interface Verification Commands

A

Use these commands to check interface status and configuration:

  • show ip interface brief / show ipv6 interface brief: Display a summary of all interfaces, including their IPv4/IPv6 address and status.
  • show running-config interface interface-id: Show the configuration applied to a specific interface.
  • show ip route / show ipv6 route: Display the IPv4/IPv6 routing table, with active interfaces marked as ‘C’ (Connected) or ‘L’ (Local) in Cisco IOS 15.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Verify Interface Status

A

Use show ip interface brief or show ipv6 interface brief to quickly check the status of all interfaces. If both the Status and Protocol are “up,” the interface is active. Any other output suggests a configuration or cabling issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Verify IPv6 Link Local and Multicast Addresses

A

Use show ipv6 interface brief to see two IPv6 addresses on each interface: a global unicast address (manually configured) and a link-local address (starting with FE80). The link-local address is automatically added with the global address.

For more details, use show ipv6 interface gigabitethernet 0/0/0 to view the interface status and all IPv6 addresses, including multicast addresses (starting with FF02).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Verify Interface Configuration

A

Use show running-config interface to see the current configuration of a specific interface. For more details:

  • show interfaces: Displays information and packet flow for all interfaces.
  • show ip interface / show ipv6 interface: Shows IPv4/IPv6 details for all interfaces.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Verify Routes

A

Use show ip route and show ipv6 route to view connected and local routes.

  • A local route has a /32 (IPv4) or /128 (IPv6) mask and an admin distance of 0.
  • A C next to a route means it’s a directly connected network.
  • The router’s global unicast address is added as a local route to efficiently process packets destined for that address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Filter Show Command Output

A

By default, output pauses after 24 lines. Press Enter for the next line or the spacebar for the next set. Use terminal length 0 to stop the pause.

You can also filter output using a pipe (|) followed by a filter:

  • section: Shows the section starting with the expression.
  • include: Displays lines that match the expression.
  • exclude: Hides lines that match the expression.
  • begin: Starts output from the line matching the expression.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Command History Feature

A

The command history stores executed commands for easy recall.

  • Press Ctrl+P or the Up Arrow to recall older commands.
  • Press Ctrl+N or the Down Arrow for newer commands.
  • By default, the history stores the last 10 commands. Use show history to view them.
  • To change the number of stored commands for the current session, use terminal history size.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Summarize Module 1

A
  • After powering on, a Cisco switch follows a five-step boot sequence.
  • Set the BOOT environment variable using the boot system command.
  • Monitor switch activity with LEDs: SYST, RPS, STAT, DUPLX, SPEED, and PoE.
  • The boot loader helps when the operating system is damaged or missing.
  • Configure IP address and subnet mask for remote management access.
  • Set a default gateway for remote network access.
  • Full-duplex communication doubles bandwidth by allowing both send/receive at once.
  • Switch ports can be manually set for specific duplex and speed.
  • Use autonegotiation if device settings may change or are unknown.
  • With auto-MDIX, the switch detects and configures cable type automatically.
  • Use show commands to verify switch configurations.
  • Telnet (TCP port 23) is insecure, transmitting data and credentials in plaintext.
  • SSH (TCP port 22) provides secure, encrypted remote connections.
  • “k9” in the IOS filename supports cryptographic features.
  • To configure SSH: verify support, set domain, generate RSA keys, configure authentication, VTY lines, and enable version 2.
  • Use show ip ssh to verify SSH status.
  • Always configure the device name, passwords, banner, and save changes.
  • Routers support various LAN and WAN interfaces, interconnecting networks.
  • IPv4 loopback is a logical interface, internal to the router.
  • Use these commands to verify interface status:
    • show ip interface brief for a summary of interfaces,
    • show running-config interface for interface settings,
    • show ip route for routing table contents.
  • Filter command output with the pipe (|) and expressions like section, include, exclude, and begin.
  • Command history is enabled by default, storing the last 10 commands.
  • Use show history to view the command history buffer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Switching in Networking

-

A
  • Ingress: Traffic entering the interface
  • Egress: Traffic leaving the interface

A switch forwards traffic based on the ingress interface and destination MAC address using its MAC address table (CAM table).

MAC Address Table
The switch learns the destination MAC address by recording source MAC addresses and the port they came from. It uses this information to decide where to forward traffic. A switch won’t send traffic back through the same interface it received it on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Ingress vs Egress

A
  • Ingress: Traffic entering the interface
  • Egress: Traffic leaving the interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Switch Learn and Forward Method

A
  1. Learn: examines Source Address
    • The switch adds the source MAC address to the table if it’s not already there.
    • If the source MAC is in the table, it resets the timeout to 5 minutes.
  2. Forward: Examines Destination Address
    • If the destination MAC is in the table, it forwards traffic out the correct port.
    • If the destination MAC is not in the table, it floods the traffic to all ports except the one it was received on.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Switch Forwarding Methods

A

Switches use ASICs for quick forwarding decisions, using one of these methods:

  • Store-and-forward: Receives the entire frame, checks for errors, and forwards only valid frames. Cisco’s preferred method.
  • Cut-through: Forwards the frame as soon as it determines the destination MAC address.

Store-and-forward:
- Error Checking: Checks for CRC errors and discards bad frames.
- Buffering: Buffers the frame while checking for errors and handling speed differences.

Cut-through:
- Forwards the frame immediately after checking the destination MAC.
- Fragment Free: Ensures frames are at least 64 bytes to avoid runts.
- Limitations: Does not check errors, may propagate bad frames, and can’t handle ports with different speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Store-and-forward

A

Receives the entire frame, checks for errors, and forwards only valid frames. Cisco’s preferred method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Cut-through

A

Forwards the frame as soon as it determines the destination MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Store-and-forward:
* Error Checking
* Buffering

A

Store-and-forward:
- Error Checking: Checks for CRC errors and discards bad frames.
- Buffering: Buffers the frame while checking for errors and handling speed differences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Cut-through:
* Fragment Free
* Limitations

A

Cut-through:
- Forwards the frame immediately after checking the destination MAC.
- Fragment Free: Ensures frames are at least 64 bytes to avoid runts.
- Limitations: Does not check errors, may propagate bad frames, and can’t handle ports with different speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Collision Domains

A

Switches eliminate collision domains and reduce congestion.

  • Full-duplex links eliminate collision domains.
  • Half-duplex links create collision domains, leading to bandwidth contention and possible collisions.

Most devices, including Cisco and Microsoft, use auto-negotiation for duplex and speed settings by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Broadcast Domains

A
  • A broadcast domain includes all Layer 1 or Layer 2 devices on a LAN.
  • A router (Layer 3 device) breaks a broadcast domain.
  • Devices in the domain receive broadcast traffic, which a switch floods to all interfaces except the incoming one.
  • Too many broadcasts can cause congestion and slow performance.
  • Adding more devices at Layer 1 or Layer 2 expands the broadcast domain.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Alleviating Network Congestion

A

Switches use the MAC address table and full-duplex to avoid collisions and reduce congestion. Key features include:
- Fast Port Speeds – Up to 100gbps, depending on the model.
- Fast Internal Switching – Uses fast internal bus/memory for better performance.
- Large Frame Buffers – Stores frames temporarily for efficient processing.
- High Port Density – More ports for devices, reducing cost and congestion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Summarize of Module 2

A

Frame Forwarding
- Ingress is the entry port, and egress is the exit port.
- The switch uses a MAC address table to forward frames.
- It can use store-and-forward or cut-through for forwarding.

Switching Domains
- Half-duplex Ethernet ports create collision domains.
- Full-duplex eliminates collision domains.
- A switch floods broadcasts or unknown unicast frames to all ports except the ingress.
- Broadcast domains are broken by Layer 3 devices like routers.
- Switches extend broadcast domains but eliminate collision domains and reduce congestion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

are logical connections with other similar devices.

A

VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Benefits of VLAN Design:

A
  1. Smaller Broadcast Domains: Dividing the LAN reduces the number of broadcast domains.
  2. Improved Security: Only users in the same VLAN can communicate together.
  3. Improved IT Efficiency: VLANs can group devices with similar requirements, e.g., faculty vs. students.
  4. Reduced Cost: One switch can support multiple groups or VLANs.
  5. Better Performance: Small broadcast domains reduce traffic, improving bandwidth.
  6. Simpler Management: Similar groups will need similar applications and other network resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

VLAN 1 is the following: ​
* The default VLAN​
* The default Native VLAN​
* The default Management VLAN​
* Cannot be deleted or renamed​

Note: While we cannot delete VLAN1 Cisco will recommend that we assign these default features to other VLANs​

A

Default VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Dedicated to user-generated traffic (email and web traffic). ​

VLAN 1 is the default data VLAN because all interfaces are assigned to this VLAN.

A

Data VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

This is used for trunk links only. ​

All frames are tagged on an 802.1Q trunk link except for those on the native VLAN.

A

Native VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

This is used for SSH/Telnet VTY traffic and should not be carried with end user traffic.​

Typically, the VLAN that is the SVI for the Layer 2 switch.

A

Management VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A separate VLAN is required because Voice traffic requires:​
* Assured bandwidth​
* High QoS priority​
* Ability to avoid congestion​
* Delay less that 150 ms from source to destination​
The entire network must be designed to support voice.​

A

Voice VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

is a point-to-point link between two network devices(VLAN).

A

trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Without ____, all devices connected to the switches will receive all unicast, multicast, and broadcast traffic.​

A

VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

With VLANs, unicast, multicast, and broadcast traffic is confined to a VLAN. Without a _____ to connect the VLANs, devices in different VLANs cannot communicate. ​

A

Layer 3 device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
  • 2-byte field with hexadecimal
  • reffered as Tag Protocol ID (TPID)
  • 3-bit user priority
  • 1-bit Canonical Format Identifier (CFI)
  • 12-bit vlan up to 4069
A

802.1Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
  • tagged with appropriate layer 2 class of service priority value
A

voice VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The ______ command can show us both data and voice VLANs assigned to the interface.​

A

show interfaces fa0/18 switchport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Native vs Extended Range VLAN

A

Normal Range VLAN 1 - 1005
* Used in Small to Medium sized businesses
* 1002 - 1005 are reserved for legacy VLANs
* 1, 1002 - 1005 are auto created and cannot be deleted
* Stored in the vlan.dat file in flash
* VTP can synchronize between switches

Extended Range VLAN 1006 - 4095
* Used by Service Providers
* Are in Running-Config
* Supports fewer VLAN features
* Requires VTP configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Commands to verify VLAN info

A

brief Display VLAN name, status, and its ports one VLAN per line.​
id vlan-id Display information about the identified VLAN ID number. ​
name vlan-name Display information about the identified VLAN name. The vlan-name is an ASCII string from 1 to 32 characters.​
summary Display VLAN summary information.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

use the______ to place interface back in VLAN 1 & change VLAN port membership​

A

no switchport access vlan

71
Q

command to delete all VLANS

A

delete flash:vlan.dat or delete vlan.dat

72
Q

Is set to trunk administratively​
Is set as trunk operationally (functioning)​
Encapsulation is dot1q​

A

sh int fa0/1 switchport command

73
Q

reset trunk to the default state

A

no sw trunk alllowed vlan
no sw trunk native vlan

74
Q

is a proprietary Cisco protocol.​

characteristics are as follows:​

  • On by default on Catalyst 2960 and 2950 switches​
  • Dynamic-auto is default on the 2960 and 2950 switches​
  • May be turned off with the nonegotiate command​
  • May be turned back on by setting the interface to dynamic-auto​
  • Setting a switch to a static trunk or static access will avoid negotiation issues with the switchport mode trunk or the switchport mode access commands.
A

Dynamic Trunking Protocol (DTP)

75
Q

interface configuration command to stop DTP negotiation.​

A

switchport nonegotiate

76
Q

negotiated int modes

A
  1. access:
    Permanent access mode and negotiates to convert the neighboring link into an access link.
  2. dynamic auto:
    Will become a trunk interface if the neighboring interface is set to trunk or desirable mode.
  3. dynamic desirable:
    Actively seeks to become a trunk by negotiating with other auto or desirable interfaces.
  4. trunk:
    Permanent trunking mode and negotiates to convert the neighboring link into a trunk link.
77
Q

command to determine the current DTP mode

A

show dtp interface f0/1

78
Q

are used to segment switched Layer 2 networks for a variety of reasons. Regardless of the reason, hosts in one VLAN cannot communicate with hosts in another VLAN unless there is a router or a Layer 3 switch to provide routing services.​

79
Q

is the process of forwarding network traffic from one VLAN to another VLAN.

A

Inter-VLAN routing

80
Q

There are three inter-VLAN routing options:

A

Legacy Inter-VLAN routing - This is a legacy solution. It does not scale well.​
Router-on-a-Stick - This is an acceptable solution for a small to medium-sized network.​
Layer 3 switch using switched virtual interfaces (SVIs) - This is the most scalable solution for medium to large organizations.​

81
Q

The first inter-VLAN routing solution relied on using a router with multiple Ethernet interfaces. Each router interface was connected to a switch port in different VLANs. The router interfaces served as the default gateways to the local hosts on the VLAN subnet.​

using physical interfaces works, but it has a significant limitation. It is not reasonably scalable because routers have a limited number of physical interfaces. Requiring one physical router interface per VLAN quickly exhausts the physical interface capacity of a router.​

Note: This method of inter-VLAN routing is no longer implemented in switched networks and is included for explanation purposes only.

A

Legacy inter-VLAN routing

82
Q

method overcomes the limitation of the legacy inter-VLAN routing method. It only requires one physical Ethernet interface to route traffic between multiple VLANs on a network.​
* has subinterfaces
* max of 50 VLANS

A

‘router-on-a-stick’ inter-VLAN routing

83
Q

The modern method of performing is to use Layer 3 switches and switched virtual interfaces (SVI). An SVI is a virtual interface that is configured on a Layer 3 switch, as shown in the figure.​
layer 3 == multilayer switch

A

inter-VLAN routing

84
Q

are created the same way that the management VLAN interface is configured. The SVI is created for a VLAN that exists on the switch. Although virtual, the SVI performs the same functions for the VLAN as a router interface would. Specifically, it provides Layer 3 processing for packets that are sent to or from all switch ports associated with that VLAN.​
* much faster
* increase bandwidth
* more expensive

A

Inter-VLAN SVIs

85
Q
  • This command configures the subinterface to respond to 802.1Q encapsulated traffic from the specified vlan-id. The native keyword option is only appended to set the native VLAN to something other than VLAN 1.
A

encapsulation dot1q vlan_id [native]

86
Q
  • This command configures the IPv4 address of the subinterface. This address typically serves as the default gateway for the identified VLAN.​
A

ip address ip-address subnet-mask

87
Q

Common Inter-VLAN Issues

A
  1. Missing VLANs
    How to Fix: Create (or re-create) the VLAN if it does not exist. Ensure the host port is assigned to the correct VLAN.
    How to Verify: Use commands: show vlan [brief], show interfaces switchport, ping.
  2. Switch Trunk Port Issues
    How to Fix: Ensure trunks are configured correctly. Ensure the port is a trunk port and enabled.
    How to Verify: Use commands: show interface trunk, show running-config.
  3. Switch Access Port Issues
    How to Fix: Assign the correct VLAN to the access port. Ensure the port is an access port and enabled. Host may be incorrectly configured in the wrong subnet.
    How to Verify: Use commands: show interfaces switchport, show running-config interface, ipconfig.
  4. Router Configuration Issues
    How to Fix: Router subinterface IPv4 address is incorrectly configured. Router subinterface should be assigned to the VLAN ID.
    How to Verify: Use commands: show ip interface brief, show interfaces.
88
Q
  1. Missing VLANs
A

How to Fix: Create (or re-create) the VLAN if it does not exist. Ensure the host port is assigned to the correct VLAN.
How to Verify: Use commands: show vlan [brief], show interfaces switchport, ping.

89
Q
  1. Switch Trunk Port Issues
A

How to Fix: Ensure trunks are configured correctly. Ensure the port is a trunk port and enabled.
How to Verify: Use commands: show interface trunk, show running-config.

90
Q
  1. Switch Access Port Issues
A

How to Fix: Assign the correct VLAN to the access port. Ensure the port is an access port and enabled. Host may be incorrectly configured in the wrong subnet.
How to Verify: Use commands: show interfaces switchport, show running-config interface, ipconfig.

91
Q
  1. Router Configuration Issues
A

How to Fix: Router subinterface IPv4 address is incorrectly configured. Router subinterface should be assigned to the VLAN ID.
How to Verify: Use commands: show ip interface brief, show interfaces.

92
Q

Verify that the port connecting to the router is correctly configured as a trunk link using the .​

A

show interface trunk command

93
Q

If that port is missing from the output, examine the configuration of the port with the _____ command to see how the port is configured.​

A

show running-config interface X

94
Q
  • correct address but unable to ping its default gateway
    show vlan brief
    show int X sw
    show run int X
A

switch access port issues

95
Q

is created using the interface interface_id subinterface_id global configuration mode command. ​

A

subinterface

96
Q

is an important part of the hierarchical design for eliminating single points of failure and preventing disruption of network services to users.

A

Redundancy

97
Q

True/False:
Ethernet LANs require a loop-free topology with a single path between any two devices.

98
Q

is a loop-prevention network protocol that allows for redundancy while creating a loop-free Layer 2 topology.
logically blocks physical loops in a Layer 2 network, preventing frames from circling the network forever

A

Spanning Tree Protocol (STP)

99
Q

compensates for a failure in the network by recalculating and opening up previously blocked ports.

100
Q

provides multiple network services by eliminating the possibility of a single point of failure.

A

Path redundancy

101
Q

STP was developed specifically as a loop prevention mechanism for ________________________

A

Layer 2 Ethernet

102
Q

is when the switch does not have the destination MAC address in its MAC address table and must forward the frame out all ports, except the ingress port.

A

unknown unicast frame

103
Q

is an abnormally high number of broadcasts overwhelming the network during a specific amount of time.
can disable a network within seconds by overwhelming switches and end devices. Broadcast storms can be caused by a hardware problem such as a faulty NIC or from a Layer 2 loop in the network.

A

broadcast storm

104
Q

To prevent these issues from occurring in a redundant network, some type of ___________ must be enabled on the switches.

A

spanning tree

105
Q

T/F:
Spanning tree is enabled manually on Cisco switches

A

False
it is enabled by default

106
Q

STP is based on an algorithm invented by __________ while working for Digital Equipment Corporation, and published in the 1985 paper "An Algorithm for Distributed Computation of a Spanning Tree in an Extended LAN.”

A

Radia Perlman

107
Q

creates a loop-free topology by selecting a single root bridge where all other switches determine a single least-cost path.

A

spanning tree algorithm (STA)

108
Q

-is the interval between BPDUs. The default is 2 seconds but can be modified to between 1 and 10 seconds.

A

Hello Timer

109
Q
  • is the time that is spent in the listening and learning state. The default is 15 seconds but can be modified to between 4 and 30 seconds.
A

Forward Delay Timer

110
Q
  • is the maximum length of time that a switch waits before attempting to change the STP topology. The default is 20 seconds but can be modified to between 6 and 40 seconds.
A

Max Age Timer

111
Q

versions of STP, there is a root bridge elected for each spanning tree instance. This makes it possible to have different root bridges for different sets of VLANs.

A

Per-VLAN Spanning Tree (PVST)

112
Q

: This is the original IEEE 802.1D version (802.1D-1998 and earlier) that provides a loop-free topology in a network with redundant links. Also called Common Spanning Tree (CST), it assumes one spanning tree instance for the entire bridged network, regardless of the number of VLANs.

113
Q

: is a Cisco enhancement of STP that provides a separate 802.1D spanning tree instance for each VLAN configured in the network.
* supports PortFast, UplinkFast, BackboneFast, BPDU guard, BPDU filter, root guard, and loop guard.

A

Per-VLAN Spanning Tree (PVST+)

114
Q

: This is an updated version of the STP standard, incorporating IEEE 802.1w.

A

802.1D-2004

115
Q

or IEEE 802.1w is an evolution of STP that provides faster convergence than STP.

A

Rapid Spanning Tree Protocol (RSTP)

116
Q

: This is a Cisco enhancement of RSTP that uses PVST+ and provides a separate instance of 802.1w per VLAN. Each separate instance supports PortFast, BPDU guard, BPDU filter, root guard, and loop guard.

A

Rapid PVST+

117
Q

is an IEEE standard inspired by the earlier Cisco proprietary Multiple Instance STP (MISTP) implementation. MSTP maps multiple VLANs into the same spanning tree instance.

A

Multiple Spanning Tree Protocol (MSTP)

118
Q

is the Cisco implementation of MSTP, which provides up to 16 instances of RSTP and combines many VLANs with the same physical and logical topology into a common RSTP instance. Each instance supports PortFast, BPDU guard, BPDU filter, root guard, and loop guard.

A

Multiple Spanning Tree (MST)

119
Q

supersedes the original 802.1D while retaining backward compatibility

A

RSTP (IEEE 802.1w)

120
Q

EtherChannels can be formed through negotiation using one of two protocols, ___________-. These protocols allow ports with similar characteristics to form a channel through dynamic negotiation with adjoining switches.

A

Port Aggregation Protocol (PAgP) or Link Aggregation Control Protocol (LACP)

121
Q

is a Cisco-proprietary protocol that aids in the automatic creation of EtherChannel links.

A

PAgP (pronounced “Pag - P”)

122
Q

helps create the EtherChannel link by detecting the configuration of each side and ensuring that links are compatible so that the EtherChannel link can be enabled when needed.

123
Q

The modes for PAgP as follows:

A

On-This mode forces the interface to channel without PAgP. Interfaces configured in the on mode do not exchange PAgP packets.
PAgP desirable-This PAgP mode places an interface in an active negotiating state in which the interface initiates negotiations with other interfaces by sending PAgP packets.
PAgP auto-This PAgP mode places an interface in a passive negotiating state in which the interface responds to the PAgP packets that it receives but does not initiate PAgP negotiation.
The modes must be compatible on each side. If one side is configured to be in auto mode, it is placed

124
Q

is part of an IEEE specification (802.3ad) that allows several physical ports to be bundled to form a single logical channel.

A

Link Aggregation Control Protocol (LACP)

125
Q

provides the same negotiation benefits as PAgP. It helps create the EtherChannel link by detecting the configuration of each side and making sure that they are compatible so that the EtherChannel link can be enabled when needed

A

Link Aggregation Control Protocol (LACP)

126
Q

The modes for LACP are as follows:

A

On-This mode forces the interface to channel without LACP. Interfaces configured in the on mode do not exchange LACP packets.
LACP active-This LACP mode places a port in an active negotiating state. In this state, the port initiates negotiations with other ports by sending LACP packets.
LACP passive-This LACP mode places a port in a passive negotiating state. In this state, the port responds to the LACP packets that it receives but does not initiate LACP packet negotiation.

127
Q

The following guidelines and restrictions are useful for configuring EtherChannel:

A
  • EtherChannel support-All Ethernet interfaces must support EtherChannel with no requirement that interfaces be physically contiguous.
  • Speed and duplex-Configure all interfaces in an EtherChannel to operate at the same speed and in the same duplex mode.
  • VLAN match-All interfaces in the EtherChannel bundle must be assigned to the same VLAN or be configured as a trunk (shown in the figure).
  • Range of VLANs-An EtherChannel supports the same allowed range of VLANs on all the interfaces in a trunking EtherChannel. If the allowed range of VLANs is not the same, the interfaces do not form an EtherChannel, even when they are set toautoordesirablemode.
128
Q

– This is a coordinated attack from many devices, called zombies, with the intention of degrading or halting public access to an organization’s website and resources.

A

Distributed Denial of Service (DDoS)

129
Q

– This is an attack in which an organization’s data servers or hosts are compromised to steal confidential information.

A

Data Breach

130
Q

– This is an attack in which an organization’s hosts are infected with malicious software that cause a variety of problems. For example, ransomware such as WannaCry encrypts the data on a host and locks access to it until a ransom is paid.

131
Q
  • provides a secure connection to remote users across a public network and into the enterprise network. VPN services can be integrated into the firewall.
A

Virtual Private Network (VPN) enabled router

132
Q
  • provides stateful packet inspection, application visibility and control, a next-generation intrusion prevention system (NGIPS), advanced malware protection (AMP), and URL filtering.
A

Next-Generation Firewall (NGFW)

133
Q
  • includes authentication, authorization, and accounting (AAA) services. In larger enterprises, these services might be incorporated into an appliance that can manage access policies across a wide variety of users and device types. The Cisco Identity Services Engine (ISE) is an example of a NAC device.
A

Network Access Control (NAC)

134
Q
  • are hosts which commonly consist of laptops, desktops, servers, and IP phones, as well as employee-owned devices. Endpoints are particularly susceptible to malware-related attacks that originate through email or web browsing.
  • have typically used traditional host-based security features, such as antivirus/antimalware, host-based firewalls, and host-based intrusion prevention systems (HIPSs).
  • are best protected by a combination of NAC, AMP software, an email security appliance (ESA), and a web security appliance (WSA).
135
Q

is designed to monitor Simple Mail Transfer Protocol (SMTP). The Cisco ESA is constantly updated by real-time feeds from the Cisco Talos, which detects and correlates threats and solutions by using a worldwide database monitoring system. This threat intelligence data is pulled by the Cisco ESA every three to five minutes.

A

Cisco ESA device

136
Q
  • is a mitigation technology for web-based threats. It helps organizations address the challenges of securing and controlling web traffic.
  • combines advanced malware protection, application visibility and control, acceptable use policy controls, and reporting.
  • provides complete control over how users access the internet. Certain features and applications, such as chat, messaging, video and audio, can be allowed, restricted with time and bandwidth limits, or blocked, according to the organization’s requirements.
  • can perform blacklisting of URLs, URL-filtering, malware scanning, URL categorization, Web application filtering, and encryption and decryption of web traffic.
A

Cisco Web Security Appliance (WSA)

137
Q

The simplest method of remote access authentication is to configure a login and password combination on ____________

A

console, vty lines, and aux ports

138
Q

AAA

A

Authentication, Authorization, and Accounting

139
Q
  • provides the primary framework to set up access control on a network device.
  • is a way to control who is permitted to access a network (authenticate), what they can do while they are there (authorize), and to audit what actions they performed while accessing the network (accounting).
140
Q
  • Method stores usernames and passwords locally in a network device (e.g., Cisco router).
  • Users authenticate against the local database.
  • Local AAA is ideal for small networks.
A

Local AAA Authentication

141
Q
  • With the server-based method, the router accesses a central AAA server.
  • The AAA server contains the usernames and password for all users.
  • The router uses either the Remote Authentication Dial-In User Service (RADIUS) or Terminal Access Controller Access Control System (TACACS+) protocols to communicate with the AAA server.
  • When there are multiple routers and switches, server-based AAA is more appropriate.
A

Server-Based AAA Authentication

142
Q
  • is automatic and does not require users to perform additional steps after authentication.
  • governs what users can and cannot do on the network after they are authenticated.
  • uses a set of attributes that describes the user’s access to the network. These attributes are used by the AAA server to determine privileges and restrictions for that user.
    *
A

AAA authorization

143
Q

collects and reports usage data. This data can be used for such purposes as auditing or billing. The collected data might include the start and stop connection times, executed commands, number of packets, and number of bytes.

A

AAA accounting

144
Q

is a port-based access control and authentication protocol. This protocol restricts unauthorized workstations from connecting to a LAN through publicly accessible switch ports. The authentication server authenticates each workstation that is connected to a switch port before making available any services offered by the switch or the LAN.

A

IEEE 802.1X standard

145
Q
  • This is a device running 802.1X-compliant client software, which is available for wired or wireless devices.
A

Client (Supplicant)

146
Q

–The switch acts as an ` intermediary between the client and the authentication server`. It requests identifying information from the client, verifies that information with the authentication server, and relays a response to the client. Another device that could act as authenticator is a wireless access point.

A

Switch (Authenticator)

147
Q

–The server validates the identity of the client and notifies the switch or wireless access point that the client is or is not authorized to access the LAN and switch services.

A

Authentication server

148
Q

Examples: Includes MAC address flooding attacks.

A

MAC Table Attacks

149
Q

Examples: Includes VLAN hopping and VLAN double-tagging attacks. It also includes attacks between devices on a common VLAN

A

VLAN Attacks

150
Q

Examples: Includes DHCP starvation and DHCP spoofing attacks.

A

DHCP Attacks

151
Q

Examples: Includes ARP spoofing and ARP poisoning attacks.

A

ARP Attacks

152
Q

Examples: Includes MAC address and IP address spoofing attacks

A

Address Spoofing Attacks

153
Q

Examples: Includes Spanning Tree Protocol manipulation attacks

A

STP Attacks

154
Q

prevents many types of attacks including MAC address flodding attacks and DHCP starvation attacks

A

port security

155
Q

prevents DHCP starvation and DHCP spoofing attacks

A

DHCP Snooping

156
Q

prevents ARP spoofing and ARP poisoning attacks

A

Dynamic ARP Inspection (DAI)

157
Q

prevents MAC and IP address spoofing attacks

A

IP Source Guard (IPSG)

158
Q
159
Q

enables traffic from one VLAN to be seen by another VLAN without the aid of a router.

A

VLAN hopping attack

160
Q

configures the host to spoof 802.1Q signaling and Cisco-proprietary Dynamic Trunking Protocol (DTP) signaling to trunk with the connecting switch. If successful, the switch establishes a trunk link with the host, as shown in the figure. Now the threat actor can access all the VLANs on the switch. The threat actor can send and receive traffic on any VLAN, effectively hopping between VLANs.

A

threat actor

161
Q

is specific situations could embed a hidden 802.1Q tag inside the frame that already has an 802.1Q tag. This tag allows the frame to go to a VLAN that the original 802.1Q tag did not specify.

A

threat actor

162
Q
  • is unidirectional and works only when the attacker is connected to a port residing in the same VLAN as the native VLAN of the trunk port
  • allows the attacker to send data to hosts or servers on a VLAN that otherwise would be blocked by some type of access control configuration.
A

VLAN double-tagging attack

163
Q
  • VLAN hopping and VLAN double-tagging attacks can be prevented by implementing the following trunk security guidelines
A

VLAN Attack Mitigation

164
Q

dynamically provide IP configuration information including IP address, subnet mask, default gateway, DNS servers, and more to clients. A review of the sequence of the DHCP message exchange between client and server is show in the figure.

A

DHCP servers

165
Q

– The goal of this attack is to create a DoS for connecting clients. DHCP starvation attacks require an attack tool such as Gobbler. Gobbler has the ability to look at the entire scope of leasable IP addresses and tries to lease them all. Specifically, it creates DHCP discovery messages with bogus MAC addresses.

A

DHCP Starvation Attack

166
Q

– This occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients. A rogue server can provide a variety of misleading information, including the following:

A

DHCP Spoofing Attack

167
Q
  • The rogue server provides an invalid gateway or the IP address of its host to create a man-in-the-middle attack. This may go entirely undetected as the intruder intercepts the data flow through the network.
A

Wrong default gateway

168
Q
  • The rogue server provides an incorrect DNS server address pointing the user to a nefarious website.
A

Wrong DNS server

169
Q
  • The rogue server provides an invalid IP address effectively creating a DoS attack on the DHCP client.
A

Wrong IP address

170
Q

occur when the threat actors alter the MAC address of their host to match another known MAC address of a target host. The switch overwrites the current MAC table entry and assigns the MAC address to the new port. It then inadvertently forwards frames destined for the target host to the attacking host.

A

MAC address spoofing attacks

171
Q

is when a threat actor hijacks a valid IP address of another device on the subnet or uses a random IP address. IP address spoofing is difficult to mitigate, especially when it is used inside a subnet in which the IP belongs.

A

IP address spoofing

172
Q

is a proprietary Layer 2 link discovery protocol. It is enabled on all Cisco devices by default. Network administrators also use CDP to help configure and troubleshoot network devices.

A

Cisco Discovery Protocol (CDP)

173
Q

is also vulnerable to reconnaissance attacks. Configureno lldp runto disable LLDP globally. To disable LLDP on the interface, configureno lldp transmitandno lldp receive.

A

Link Layer Discovery Protocol (LLDP)

174
Q

To mitigate the exploitation of CDP, limit the use of CDP on devices or ports. For example, disable CDP on edge ports that connect to untrusted devices.

A
  • To disable CDP globally on a device, use theno cdp runglobal configuration mode command. To enable CDP globally, use thecdp runglobal configuration command.
  • To disable CDP on a port, use theno cdp enableinterface configuration command. To enable CDP on a port, use thecdp enableinterface configuration command.