Chapter 7 Flashcards

1
Q

Implementation Plan

A
  1. Deploy broadband connectivity
  2. Configure static routing
  3. Document and verify other services
  4. Implement and tune the IPsec VPN
  5. Configure GRE tunnels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DSL Variants

A

ADSL
(Asymmetric DSL) Asymmetric 8 Mbps / 1 Mbps

HDSL
(high bitrate DSL) Symmetric 2 Mbps / 2 Mbps

SDSL
(Symmetric DSL ) Symmetric 2 Mbps / 2 Mbps

SHDSL
(Single-pair high-speed DSL) Symmetric 2.3 Mbps / 2.3 Mbps

VDSL
(Very High bitrate DSL) Symmetric / Asymmetric 52 Mbps / 16 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The PPP connection is established between the ____ and ___.
The CPE device is configured with a _____ and ____
The core router authenticates the users using either a ____ or an _____ server.

A

CPE and the core router
username and password.
local database, external RADIUS AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Use the __________ command to debug the PPP session authentication.

A

debug ppp authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Verify ATM connectivity using the ____________ command.

A

debug atm events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Finally, check Layer 1 connectivity and discover the DSL

line status using the____________ command.

A

show dsl interface atm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Link the source IP addresses to the pool for dynamic address translation.

A

Router(config)#

ip nat inside source list BRANCH-NAT-ACL pool BRANCH-NAT-POOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Link a source IP addresses to a pool for static translation.

A

Router(config)#

ip nat inside source static 192.168.1.254 209.165.200.254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Displays active NAT translations
Displays NAT statistics.

Displays NAT translations as they occur.

A

show ip nat translations
show ip nat statistics

debug ip nat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Clears all IP NAT translations.

Clears all NAT statistics.

A

clear ip nat translation *

clear ip nat statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which three protocols are involved in the establishment of an IPsec VPN tunnel?

A

Encapsulating Security Protocol (protocol 50)
Authentication Header (protocol 51)
Internet Security Association and Key Management Protocol (UDP port 500)

UDP port 4500 (NAT-T)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Steps to Configuring an IPsec VPN

A
  1. Configure the initial key (ISAKMP policy) details.
  2. Configure the IPsec details.
  3. Configure the crypto ACL.
  4. Configure the VPN tunnel information.
  5. Apply the crypto map.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Contains authentication, encryption and the hashing method
commands that are first used to negotiate and exchange credentials
with a VPN peer.

A

ISAKMP Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identifies an acceptable combination of security protocols, algorithms, and other settings.

A

IPsec Details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is an extended IP ACL that identifies the traffic to be protected.
• A permit statement results in the traffic being encrypted, while a deny
statement sends traffic out in clear text.
• Both VPN peers must have reciprocating ACLs.

A

Crypto ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• Binds all tunnel information together.
• Identifies the IPsec transform set to use, the peer router, the ACL, and
other tunnel information.

A

VPN Tunnel Information

17
Q

The named crypto map must be applied to the Internet-facing

interface to which the peering router will connect to.

A

 Apply the Crypto Map

18
Q

Displays display the specifics contained in a crypto map configuration.
Displays the status information of the active crypto sessions.
Displays the settings used by current SAs.
View real time IPsec events.

A

show crypto map
show crypto session
show crypto ipsec sa
debug crypto ipsec

19
Q

Once in interface configuration mode, configure the tunnel

parameters including:

A
  • IP address
  • Tunnel source
  • Tunnel destination
  • Tunnel mode (type of tunnel)
20
Q

Change the ACL and add the Internet link and GRE tunnel network to EIGRP on the Branch router.

A

access-list 110 permit gre host 209.165.200.242 host

209.165.200.226

21
Q

VPN Headend Router Implementation Plan

A
  1. Allow IPsec traffic
  2. Define an address pool for connecting clients.
  3. Provide routing services for VPN subnets.
  4. Tune NAT for VPN traffic flows.
  5. Verify IPsec VPN configuration
22
Q

To verify if the VPN configuration is functioning properly,

use the following commands:

A
  • show crypto map
  • show crypto isakmp sa
  • show crypto sa
  • show crypto engine connections active
23
Q

What is a limitation of IPsec by design?

A

IPsec only forwards unicast traffic

24
Q

How is NAT tuned to handle traffic that is sent through a VPN tunnel between a mobile worker and internalcorporate resources?

A

Traffic should bypass translation with a deny access list statement or route-map.

25
Q

Which three statements would help an end user develop a better understanding of DSL technology?

A

ADSL typically has a higher download bandwidth than available upload bandwidth.
DSL speeds can exceed the speeds available with a typical T1 line.
Transfer rates vary by the length of the local loop.

26
Q

Which three items can be specified by ISAKMP policy parameters?

A

Hashing, encryption, authentication

27
Q

GRE Portocal

A

47