Chapter 11: Switch Features Flashcards
What is a managed switch?
A switch with an operating system that enables device configuration and can run software that implements additional features.
What does in-band management of a switch mean?
Managing the switch from the same network that moves data, whether you connect locally or remotely.
What is a management port?
A dedicated port on every managed device used for device management.
What does out-of-bound management of a switch mean?
Managing the switch from outside the network, usually via a separate network just for managing and monitoring.
ex. A switch separate from the rest of the network and connected to the dedicated ports of the network switches.
What does flow control do?
It enables the host to send an Ethernet PAUSE frame, which asks the switch to hold up for some amount of time so the host can catch its breath.
What network issue can be caused by flow control?
Latency
What is port security?
It is locking switch ports to a specific MAC address. The port will only work with a specific computer after configuration.
What is sticky or persistent MAC?
In Cisco switches, the MAC addresses can be dynamically learned or manually configured, stored in the address table, and added to the running configuration file.
What does a VLAN (Virtual Local Area Network) enable you to do?
It enables you to segment a physical network into multiple discreet networks without having to add additional hardware by using managed switches.
How do you set up a VLAN on a switch?
By creating one or more VLANs, then assigning ports to those VLANs.
What do you call the process of transferring VLAN traffic between two or more switches?
Trunking
What is a trunk port on a switch?
A port configured to carry all traffic, regardless of VLAN number, between all switches in a LAN.
What is the IEEE trunking protocol used in VLANS that enable you to connect switches from different manufacturers?
802.1Q
A static VLAN assigns VLANS to ____.
ports
A dynamic VLAN assigns VLANS to ____.
MAC addresses
What is an 802.1Q tag field?
A field tacked onto a frame’s Ethernet header enabling the next switch to associate it with the correct VLAN.
A network vulnerability that lets the attacker access VLANs they should not be able to access is called:
double-tagging attack
How do you prevent a double-tagging attack?
By setting the native VLAN to an unused VLAN on truck ports and configuring trunk ports to tag its native VLAN traffic as well.
What does Cisco’s proprietary protocol called VLAN Trunking Protocol (VTP) do?
It automates the updating of multiple VLAN switches. You put the switches into one of three states: server, client, or transparent.
The process of passing traffic between two VLANs using a router (using one or more ports) is called:
inter-VLAN routing
What type of VLAN only allows traffic from private ports to be switched to the uplink trunk port, isolating hosts from each other at Layer 2?
A private VLAN
You can configure any port on a multilayer switch to act as a ____ port or a ____ port.
switch; router
Making multiple servers look like a single server, creating a server cluster, and evenly distributing requests to these servers is called ____.
load balancing
How does DNS performed load balancing work?
Each Web server gets its own public IP address and each DNS server for the domain has multiple “A” records, each with the same fully qualified domain name (FQDN). These “A” records are cycled.
When a computer comes to the DNS server for resolution, the server responds with all the “A” records for a FQDN. Then the next time DNS is queried, all the “A” records for a FQDN are returned again but in a different order. This is known as ____.
round robin
At what network layer do content switches work?
Layer 7 (Application layer)
What do quality of service (QoS) policies do?
They prioritize traffic through rules that control how much bandwidth a protocol, PC user, VLAN, or IP address may use.
When you control the flow of packets into or out of the network according to the type of packet or other rules, you are ____.
traffic shaping
Hardware and software tools that filter traffic based on various criteria, such as port number, IP address, or protocol are called ____.
firewalls
Where are firewalls located on a network?
On the border of the network, between the outside and the inside.
Define: Host-Based Firewall
A firewall installed on a single computer, that works on the border of that system.
An application that inspects packets, looking for active intrusions and functions inside the network is called a/an ____.
IDS or Intrusion Detection System
An IDS in promiscuous mode does what?
Inspects a copy of every packet on a network.
What type of IDS consists of multiple sensors placed around the network that reports to a central application that reads a signature file to detect anything out of the ordinary?
A network-based IDS (NIDS)
What type of IDS runs on individual systems and monitors for events such as system file modification or registry changes?
A host-based IDS (HIDS)
Similar to an IDS, a/an ____ sits directly in the flow of network traffic and can stop an attack while it is happening.
IPS or Intrusion Prevention System
Copying data from any or all physical ports on a switch to a single physical port is called ____.
port mirroring
What standalone multi-port hardware device copies all of the bits it sees and sends them out on a separate port for monitoring and is used for non-obtrusive data collection?
A network tap
What sits between clients and external servers, pocketing the requests from the clients for external server resources and making those requests itself?
A proxy server
Whom does a forward proxy server act on behalf of?
Clients, getting information from various sources and handing that info to the clients.
Whom does a reverse proxy server act on behalf of?
Servers
Clients contact the reverse proxy server, which gathers info from its associated server(s) and hands the info to the clients.
802.1X is an example of ____.
port-based authentication