Chap 24 - Network Assurance Flashcards

1
Q

What are 2 of the most common reasons for getting a timeout with traceroute?

A
  • Missing route
  • Down interface.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

By default how many hops will traceroute try before completing?

A

30 times/hops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With traceroute how many probes per hop?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With traceroute what does a !H mean?

A

An “ICMP destination host unreachable” (likely because there’s no route)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For traceroute what is the default timeout when waiting for a reply from a probe?

A

3 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For traceroute what is the default port number?

A

33434

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is one of the most common reasons to use debug?

A

When routing protocols are having adjacency issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In OSPF what are 4 of the most common reasons to use debug?

A
  • MTU issues with debug adjacency
  • Incorrect interface types with debug hello
  • Improperly configured network mask with debug hello
  • Mis-matched timers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What debug command is useful for troubleshooting an OSPF adjacency issue?

A

debug ip ospf adjacency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In OSPF what debug command is useful for troubleshooting a mismatched timer issue?

A

debug ip ospf hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In OSPF what debug command will find an incorrect subnet mask?

A

debug ip ospf hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 2 ways of running a Conditional Debug?

A
  • Using an ACL
  • Specifying an interface along with an ACL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In SNMPv3 what does noAuthNoPriv mean?

A
  • Authentication by username only
  • No encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In SNMPv3 what does AuthNoPriv mean?

A
  • Authentication by MD5 or SHA
  • No encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In SNMPv3 what does AuthPriv mean?

A
  • Authentication by MD5 or SHA
  • With encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In SNMP what is a get-request?

A

Retrieves a value from a specific variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In SNMP what is a get-next-request?

A

Retrieves a value from a variable within a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In SNMP what is a get-bulk-request?

A

Retrieves large blocks of data, such as multiple rows in a table, that would otherwise require the transmission of many small blocks of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In SNMP what is a get-response?

A

The Reply sent by the router in response to a get request, get next request, or set request sent by an NMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In SNMP what is a set-request?

A

Stores a value in a specific variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In SNMP what is a Trap?

A

Sends an unsolicited message from an SNMP agent to an SNMP manager when some event has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

By default where are all syslog messages sent?

A

The console.

23
Q

What is the default size of the logging buffer?

A

4096 bytes

24
Q

In general what 2 components are necessary for Netflow to work?

A
  • Netflow Data Capture
  • Netflow Data Export
25
Q

What does Netflow Data Capture do?

A

Captures the statistics

26
Q

What does Netflow Data Export do?

A

Send the statistics to a Netflow Collector.

27
Q

What 4 components of Flexible Netflow?

A
  • Flow Records
  • Flow Monitors
  • Flow Exporters
  • Flow Samplers
28
Q

What are Flow Records?

A

Flow records define what traffic will be analyzed or monitored.

29
Q

What are 3 facts about Flow Monitors?

What does it have?
What are 2 things defined in it?
Where is the flow monitor?

A
  • Has its own cache
  • Ties the Flow Record and the Flow Exporter together
  • Is applied to the interface
30
Q

What does a Flow Exporter do?

A

Exports NetFlow data from the Flow Monitor cache to a remote host or NetFlow collector.

31
Q

What are Flow Samplers?

A

It takes samples of NetFlow data rather than analyzing all NetFlow data.

32
Q

What are the 4 steps in configuring Custom Flow Record?

A
  • Define the flow record name
  • Set a description
  • Set match criteria for key fields
  • Set collect criteria for non-key fields
33
Q

What are the 5 steps in configuring a Flow Exporter?

A
  • Define the Exporter name
  • Set a useful description
  • Specify the destination IP to export to
  • Specify the flow version
  • Specify the UDP port
34
Q

What are the 5 steps in configuring a Flow Monitor?

A
  • Define the Flow Monitor name
  • Set a useful description
  • Assign the Flow Record to be used
  • Specify a cache timeout of 60 for active connections
  • Assign the Exporter to the Monitor
35
Q

Why do you need to assign a Flow Exporter to a Flow Monitor?

A

So that the traffic being collected by the Flow Record can be Exported to the NetFlow Collector

36
Q

How do you assign the Flow Monitor to an Interface?

A
  • int gig0/1
    • ip flow monitor MyFlowMonitor input
37
Q

What are 3 traditional options for troubleshooting a layer 2 issue?

A
  • Insert a splitter
  • Mirror the traffic to an additional port
  • Insert a switch between the 2 devices and configure the switch to mirror the transient traffic to an analyzer
38
Q

What are 3 options for Catalyst switches to SPAN traffic?

A
  • Local SPAN
  • Remote SPAN (RSPAN)
  • Encapsulated Remote SPAN (ERSPAN)
39
Q

In SPAN, when specifying a destination port what 7 packet types are normally not included?

A
  • 802.1q VLAN tags
  • STP BPDUs
  • CDP
  • DTP
  • VTP
  • PAgP
  • LACP
40
Q

What is the command to include all L2 protocols in the SPAN?

A

sw1(config)# monitor session <session-id> destination interface <interface-id> encapsulation replicate</interface-id></session-id>

41
Q

What is normally not included on the SPAN destination port?

A

STP

42
Q

What is the difference in these 2 commands:

CMD A - monitor session 1 destination interface gig0/1 ingress dot1q vlan 20

CMD B - monitor session 1 destination interface gig0/1 ingress untagged vlan 20

A

This is used when the same port specified as the destination port must also send/receive normal traffic.

CMD A requires the normal traffic (ingress) be accepted only if it has an 802.1q tag with VLAN 20

CMD B allows normal traffic be accepted even if it doesn’t have an 802.1q tag but is associated with vlan 20

43
Q

What does RSPAN do?

A

It allows the source ports to be located on one switch and the destination port on a different switch.

44
Q

For an RSPAN what 2 things are different?

A
  • MAC addresses are not learned on ports associated with the RSPAN VLAN
  • Traffic is flooded out all the ports associated to the RSPAN VLAN
45
Q

What is ERSPAN?

A

ERSPAN provides the ability to monitor traffic in one area of the network and route the SPAN traffic to a traffic analyzer in another area of the network through Layer 3 routing.

46
Q

What are 8 probes that IP SLA can be configured to monitor?

A
  • Delay (one-way and round-trip)
  • Jitter (directional)
  • Packet loss (directional)
  • Packet sequencing
  • Path (per hop)
  • Connectivity (directional)
  • Server or website download time
  • Voice Quality Scores
47
Q

What are 9 capabilities offered by Cisco DNA Center?

A
  • Cisco SD-Access config
  • Config templates
  • Simplified provisioning
  • Simplified security policies
  • Software Image mgmt
  • Wireless network mgmt
  • 3rd party integration
  • Network Assurance
  • Plug and Play
48
Q

In Flexible Netflow when defining a custom flow record what command is used to add a Key Field?

A

Match

49
Q

In Flexible Netflow when defining a custom flow record what command is used to add a Non-Key Field?

A

Collect

50
Q

You are currently monitoring a trunk (all vlans) on a switchport with SPAN but you only want to monitor traffic from VLANs 2 and 3. What is the command to do that?

A
  • SW1(config)# monitor session 1 filter vlan 2,3
  • The vlans following the ‘filter’ keyword specifies the VLANs you WANT to monitor, not the VLANs you want to filter out.
51
Q

What does the command ‘logging synchronous’ do?

A

During a console session it prevents unsolicited log messages from interrupting messages that are solicited.

52
Q

What does the keyword ‘level’ do in the command ‘logging synchronous’.

A

If the keyword level is used in the ‘logging synchronous’ command it will direct the traffic at that level and more severe to be logged asynchronously

53
Q

What are the defaults level and line in the ‘logging synchronous’ command?

A
  • level defaults to 2 to most severe
  • line defaults to 20
54
Q

What are the 8 syslog severity codes?

A
  • 0 emergency
  • 1 alert
  • 2 critical
  • 3 error
  • 4 warning
  • 5 notification
  • 6 informational
  • 7 debugging