Chapter 3: Network Infrastructure Flashcards

1
Q

Who developed the TCP/IP stack?

A

The United States Department of Defence (DOD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term best describes the following?

“rules of the Internet and are managed by the Internet Engineering Task Force IETF.”

A

RFCs (Requests for Comments).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define an Opaque Network.

A

A network that is created and managed by a separate entity outside vSphere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the difference between a vSphere Standard Switch (vSS) and a vSphere Distributed Switch (vDS)

A

A vSS is created and managed by a single ESXi host, whereas a vDS is created and managed through vCenter Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What component of vSphere networking is responsible for tagging/untagging packets with VLAN IDs?

A

The VMkernel adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the valid VLAN ID range for a standard port group?

A

1 to 4095.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the valid VLAN ID range for a distributed port group?

A

1 to 4094.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What needs to be configured in a virtual machine’s settings to allow for the use of Jumbo frames?

A

The VMXNET3 virtual network adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What network polices can be applied to a vSS?

A

The following policies can be applied to a vSphere Standard Switch (vSS):
- Teaming & Failover
- Security
- Traffic Shaping
- VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What NIC teaming options are available on both a vSS & vDS?

A

The following NIC teaming options are available for both vSS & vDS:
- Route Based on Originating Virtual Port
- Route Based on IP Hash
- Route Based on Source MAC Hash
- Use Explicit Failover Order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In regards to vNICs, describe the difference between an initial and effective MAC address.

A

Initial MAC addresses are the MAC addresses assigned to an adapter when a vNIC is created and cannot be changed from within the OS. The effective vNIC can have it’s MAC address changed from within the guest OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the function of Promiscuous Mode in regards to vSS port group security policies.

A

A security feature that enables/disables the vNIC only to receive frames that match the effective MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the available and default values for Promiscuous mode in a vSS?

A

Default is reject, options are reject and accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the function of MAC Address Changes in regards to vSS port group security policies.

A

A security policy that allows the ESXi host to accept or reject effective MAC address changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the default and available values for MAC Address Changes in a vSS?

A

Default is accept, options are reject and accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the function of Forged Transmits in regards to vSS port group security policies.

A

A security policy that enables the ESXi to drop packets if the source and effective MAC addresses do not match.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the default and available values for Forged Transmits in regards to vSS port group security policies?

A

Default is accept, options are reject and accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the 3 traffic shaping policies available to port groups?

A

Average bandwidth, peak bandwidth, and burst size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What additional policies can be applied with a vDS over a vSS?

A

vDS’ have the following additional features:
- Monitoring
- Traffic Filtering & Marking
- Resources Allocation
- Port Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What additional NIC teaming option is available with a vDS that is not with a vSS?

A

Load-based NIC teaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of policy allows you to assign a network resource pool to a port group?

A

A Resource Allocation Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does NIOC reserve network bandwidth for virtual ports?

A

Using shares that guarantee a level of allocated bandwidth regardless of the current network utilization or contention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe the purpose of Network Resource Pools.

A

A mechanism that enables you to apply a part of the bandwidth that is reserved for VM system traffic to a set of distributed port groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What role does DRS play in regards to NIOC version 3?

A

DRS automatically places/migrates the virtual machine on a host that can satisfy the reserved bandwidth for the VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What switch feature best describes the following?

“A feature that collects IP network traffic as it enters or exits an interface.”

A

NetFlow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What current version of NetFlow is supported a vDS?

A

NetFlow version 10, also identified as IPFIX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the purpose of a collector in regards to NetFlow?

A

To collect the traffic information and network flows for the purpose of network analysis and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the purpose of the sampling rate in regards to NetFlow?

A

To define how many packets are sampled from the network flow.

For example, if the sampling rate is set to 4, then NetFlow will sample 1 packet then skip (drop) the next 4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the default setting for NetFlow on a vDS?

A

NetFlow is disabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe the function of Traffic Filtering and Marking Policies in regards to vDS.

A

To protect the network from unwanted traffic and security attacks.

31
Q

In regards to traffic marking, how is data marked in a layer 2 frame?

A

By adding a Class of Service (Cos) tag in the ethernet header.

32
Q

In regards to traffic marking, how is data marked in a layer 3 packet?

A

By adding a Differentiated Service Code Point (DSCP) tag in the IP header.

33
Q

What type of tagged packets are preferred on an ethernet switch during times of contention?

A

Packets with a higher tag move to the front of an ethernet switch’s queue.

34
Q

In regards to Private VLANs, a Primary VLAN is subdivided into smaller _____?

A

Secondary VLANs.

35
Q

What are the 3 types of secondary PVLANs?

A

Promiscuous, Community, and Isolated.

36
Q

Describe how traffic is segmented on a Promiscuous secondary PVLAN.

A

Nodes in a promiscuous secondary PVLAN can communicate with
- any node in the same primary private VLAN
- any node with any secondary PVLAN in the same primary VLAN

37
Q

Describe how traffic is segmented on a Community secondary PVLAN.

A

Nodes in a community secondary PVLAN can communicate with:
- nodes in the same primary private VLAN
- nodes in a promiscuous PVLAN within the same primary PVLAN

Nodes in a community secondary PVLAN can not communicate with:
- nodes in other communities or isolated secondary PVLANs

38
Q

Describe how traffic is segmented on an Isolated secondary PVLAN.

A

Nodes in an isolated secondary PVLAN can communicate with:
- nodes in a promiscuous secondary PVLAN within the same primary PVLAN

Nodes in an isolated secondary PVLAN cannot communicate with:
- other nodes in the same PVLAN
- nodes in other community or isolated secondary PVLANs

39
Q

Describe the purpose of Port Mirroring in regards to distributed ports.

A

Port mirroring allows administrators to duplicate everything that is happening on one distributed port to then be visible on another distributed port.

40
Q

What is are the options for distributed port mirroring type sessions?

A

There are 4 options available for the sessions:
- Distributed Port Monitoring
- Remote Mirroring Source
- Remote Mirroring Destination
- Encapsulated Remote Mirroring (L3) source

41
Q

Describe the following session type in regards to distributed port mirroring:

“Distributed Port Monitoring”

A

Mirrors packets from one set of distributed ports to other distributed port groups.

42
Q

Describe the following session type in regards to distributed port mirroring:

“Remote Mirroring Source”

A

Mirrors packets from a set of distributed ports to specific uplinks.

43
Q

Describe the following session type in regards to distributed port mirroring:

“Remote Mirroring Destination”

A

Mirrors packets from a set of VLANs to distributed ports.

44
Q

Describe the following session type in regards to distributed port mirroring:

“Encapsulated Remote Mirroring (L3) Source”

A

Mirrors packets from a set of distributed ports to the IP address of a remote agent.

45
Q

Describe the purpose of Port Bindings in regards to vNICs.

A

To determine how VMs are bound or attached to virtual switch ports.

46
Q

What are the 2 types of port bindings?

A

Static & Ephemeral Bindings.

47
Q

Describe Static Bindings in regards to port bindings and allocation.

A

With a static port binding, the vNIC is attached to a port in a distributed port group and the VM remains attached to the port regardless of the power state of the VM.

48
Q

Describe Ephemeral Bindings in regards to port bindings and allocation.

A

Ephemeral means there is no binding of the vNIC to a specific port. Virtual switch ports are created and deleted on demand by the host.

49
Q

What are the 2 types of port allocations for distributed port groups?

A

Elastic & Fixed port allocations.

50
Q

Describe an Elastic port allocation.

A

Ports in the port group are created and removed on demand.

51
Q

Describe a Fixed port allocation.

A

The number of ports in the port group is static and cannot be dynamically expanded.

52
Q

What are the default settings for a distributed port group?

A

Defaults are as follows:
- Binding Type: Static
- Port Allocation: Elastic
- Number of Ports: 8

53
Q

How do LAGs function differently between a host proxy switch versus a distributed switch?

A

With a host proxy switch, the physical NICs on the switch can only be connected to one LAG port. Whereas with a distributed switch the LAG port can connect to multiple physical NICs from different hosts.

54
Q

How many LAGs are supported by a single vDS and a single host?

A

Up to 64 LAGs are supported by a vDS. Individual hosts support up to 32.

55
Q

What networking feature can be enabled on a vDS to check for specific network inconsistencies?

A

A vDS Health Check.

56
Q

What version of vDS supports multicast filtering and multicast snooping modes?

A

vDS 6.0.0 and later.

57
Q

Describe the function of basic multicast filtering in regards to virtual switches.

A

In basic multicast filtering mode, a virtual switch forwards multicast traffic for virtual machines according to the destination MAC address of the multicast group.

58
Q

Describe the function of multicast snooping in regards to virtual switches.

A

To forward multicast traffic based on the IGMP and MLD messages from VMs.

59
Q

How is basic multicast filtering different from multicast snooping?

A

Basic multicast filtering forwards multicast traffic from VMs based on the destination MAC of the multicast group, but the virtual switch does not interpret IGMP messages. Whereas with multicast snooping the virtual switch dynamic detects when a VM sends a packet containing IGMP or MLD membership information.

60
Q

How many multicast groups and sources can a VM receive information for with multicast snooping?

A

Up to 256 groups and 10 sources.

61
Q

What version of ESXi added support for the Cisco Discovery Protocol (CDP)?

A

ESXi version 3.X

62
Q

What are the 3 CDP/LLDP types that can be configured on a switch?

A

Listen, Advertise, & Both.

63
Q

Describe the function of TCP Segmentation Offload (TSO).

A

A networking feature of ESXi that allows segmentation of traffic to be offload from the VM and VMkernel ports to the physical NIC.

64
Q

Describe the function of DirectPath I/O.

A

To allow a VM to access physical PCI functions on platforms that have an I/O memory management unit (IOMMU).

65
Q

Describe the purpose of Single Root I/O Virtualization (SR-IOV).

A

To alow a single PCIe device to appear as multiple devices to the hypervisor or to a VM’s guest operating system.

66
Q

What is the benefit of using SR-IOV?

A

To support applications in a guest operating system are sensitive to network latency. VMs take advantage of SR-IOV be exchanging Ethernet Frames directly with the physical network adapter; bypassing the VMkernel.

67
Q

Describe the physical host requirements for SR-IOV.

A

The host requirements for SR-IOV are as follows:
- The physical host must be Intel or AMD
- The physical host must have IOMMU & SR-IOV enabled in the BIOS

68
Q

Describe the physical network adapter requirements for SR-IOV.

A

The NIC requirements for SR-IOV are as follows:
- The physical network adapter must support SR-IOV for the specific ESXi release
- SR-IOV must be enabled in the firmware
- Must use MSI-X interrupts

69
Q

Describe the Physical Function Driver requirements for SR-IOV.

A

Must be certified by VMware and installed on the ESXi host.

70
Q

Describe the Guest OS requirements for SR-IOV.

A

Must be supported by the NIC vendor the specific ESXi release.

71
Q

Describe the Virtual Function (VF) driver requirements for SR-IOV.

A

The VF driver requirements for SR-IOV are as follows:
- Must be compatible with the NIC and support by Guest OS
- Must be WLK/WHCK certified for Windows VMs
- Must be installed in the guest operating system

72
Q

What are the SR-IOV modes that a NIC can operate in ESXi?

A

There are 3 types of SR-IOV modes:
- Non SR-IOV mode
- SR-IOV only mode
- Mixed mode

73
Q

Describe the purpose of the VMkernel layer?

A

To provide connectivity for the hypervisor and handling system services such as vMotion, vSphere Replication, etc….

74
Q

Describe the different TCP/IP stacks that can be configured in ESXi.

A

The configurable TCP/IP stacks are as follows:
- Default TCP/IP Stack: network support for management and all VMkernel traffic types
- vMotion TCP/IP Stack: used to isolate vMotion traffic
- Provision TCP/IP Stack: supports traffic or VM migrations, cloning, and snapshots
- Custom TCP/IP Stack: Custom stacks to isolate custom applications