Ethernet Features Flashcards

1
Q

802.3ad

A

Link Aggregation
- Congestion can occur when ports all operate at the same speed
- Allows for combination of multiple physical connections into a single logical connection
- Bandwidth available is increased and the congestion is minimized or prevented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PoE 802.3af
PoE+ 802.3at

A

■ Supplies electrical power over Ethernet
● Requires CAT 5 or higher copper cable
● Provides up to 15.4 watts of power to device
● PoE+ provides up to 25.5 W of power to device
■ Two Device Types
● Power Sourcing Equipment (PSE)
● Powered Device (PD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port Monitoring or Mirroring

A

■ Helpful to analyze packet flow over network
● Connect a network sniffer to a hub and it sees all
● But, switches require port monitoring for network analyzer to see all the traffic
■ Port mirroring makes a copy of all traffic destined for a port and sends it to another port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.1x

A

User Authentication
■ For security purposes, switches can require users to authenticate themselves before gaining access to the network
■ Once authenticated, a key is generated and shared between the
supplicant (device wanting access) and the switch (authenticator)
■ Authentication server checks the supplicant’s credentials and creates the key
■ Key is used to encrypt the traffic coming from and being sent to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Management Access and Authentication

A

■ To configure and manage switches, you can use two options
● SSH
○ Remote administration program that allows you to connect to the switch over the network
● Console Port
○ Allows for local administration of the switch using a separate laptop and a rollover cable (DB-9 to RJ-45)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Out-of-band (OOB)

A

■ Management involves keeping all network configuration devices on a separate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

First-Hop Redundancy

A

■ Hot Standby Router Protocol (HSRP) uses virtual IP and MAC addresses to provide a “active router” and a “standby router”
● HSRP is a Cisco-proprietary protocol
● If Active is offline, then standby answers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Other First-Hop Redundancy Protocols

A

■ Gateway Load Balancing Protocol (GLBP)
● Cisco-proprietary protocol
■ Virtual Router Redundancy Protocol (VRRP)
● Open-source protocol
■ Common Address Redundancy Protocol (CARP)
● Open-source protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC Filtering

A

■ Permits or denies traffic based on a device’s MAC address to improve security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Traffic Filtering

A

■ Multilayer switches may permit or deny traffic based on IP addresses or application ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Quality of Service (QoS)

A

■ Forwards traffic based on priority markings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.1D

A

Spanning Tree Protocol (STP)
○ Permits redundant links between switches and prevents traffic loops
○ Availability is measured in 9’s
■ Five 9’s is 99.999% uptime and allows only 5 minutes down per year
○ Shortest Path Bridging (SPB) is used for larger network environments instead
○ Without STP, MAC Address table corruption can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Broadcast Storms

A

■ If broadcast frame received by both switches, they can forward frames to each other
■ Multiple copies of frame are forwarded, replicated, and forwarded again until the network is consumed with forwarding many copies of the same initial frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Root and Nonroot Bridges

A

■ Root Bridge
● Switch elected to act as a reference point for a spanning tree
● Switch with the lowest bridge ID (BID) is elected as the root bridge
● BID is made up of a priority value and a MAC address (with the
lowest value considered root)
■ Nonroot Bridge
● All other switches in an STP topology
■ MAC Address table corruption can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Root, Designated, and Non-Designated Ports

A

■ Root Port
● Every non-root bridge has a single root port
● Port closest to the root bridge in terms of cost
● If costs are equal, lowest port number is chosen
■ Designated Port
● Every network segment has a designated port
● Port closest to the root bridge in terms of cost
● All ports on root bridge are designated ports
■ Non-Designated Port
● Ports that block traffic to create loop-free topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Root and Nonroot Bridges

A

■ Single root port on non-root bridge
■ All other ports on non-root bridge are non-designated
■ All ports on root bridge are designated

17
Q

Port States

A

■ Non-designated ports do not forward traffic during normal operation; however, they do receive bridge protocol data units (BPDUs)
■ If a link in the topology goes down, the non-designated port detects the failure and determines whether it needs to transition to a forwarding state
■ To get to the forwarding state, though, it has to transition through four states
● Blocking
○ BPDUs are received but they are not forwarded
○ Used at beginning and on redundant links
● Listening
○ Populates MAC address table
○ Does not forward frames
● Learning
○ Processes BPDUs
○ Switch determines its role in the spanning tree
● Forwarding
○ Forwards frames for operations
■ Root and Non-designated port are blocking
■ Designated ports are forwarding

18
Q

Link Costs

A

■ Associated with the speed of a link
■ Lower the link’s speed, the higher the cost
■ Long STP is being adopted due to higher link speeds over 10 Gbps
■ Values range from 2,000,000 for 10-Mbps Ethernet to as little as 2 for 10 Tbps

19
Q

VLANs

A

■ Switch ports are in a single broadcast domain
■ Allow you to break out certain ports to be in different broadcast domains
■ Before VLANs, you had to use routers to separate departments,
functions, or subnets
■ Allow different logical networks to share the same physical hardware
■ Provides added security and efficiency

20
Q

802.1q

A

■ Multiple VLANs transmitted over the same physical cable
■ VLANs are each tagged with 4-byte identifier
● Tag Protocol Identifier (TPI)
● Tag Control Identifier (TCI)
■ One VLAN is left untagged
● Called the Native VLAN

21
Q

VPN

A

Virtual Private Network
Creates a secure VPN or virtual tunnel over an untrusted network like the Internet

22
Q

VPN Concentrator

A

Dedicated network device that provides secure connections between remote users and a company network

23
Q

VPN Headend

A

A specific type of VPN concentrator used to terminate IPSec VPN tunnels within a router or other device

24
Q

Firewalls

A

■ Network security appliance at your boundary
■ Firewalls can be software or hardware
■ Stateful Firewalls
● Allows traffic that originates from inside the network and go out
to the Internet
● Blocks traffic originated from the Internet from getting into the
network

25
Q

NGFW

A

■ Conducts deep packet inspection at Layer 7
■ Detects and prevents attacks
■ Much more powerful than basic stateless or stateful firewalls
■ Continually connects to cloud resources for latest information on threats

26
Q

IDS/IPS

A

■ Intrusion Detection System (IDS)
● Recognizes attacks through signatures and anomalies
■ Intrusion Prevention System (IPS)
● Recognizes and responds

27
Q

Proxy Server

A

■ A specialized device that makes requests to an external network on behalf of a client

28
Q

Content Engine/Caching Engine

A

■ Dedicated appliance that performs the caching functions of a proxy server

29
Q

Content Switch/Load Balancer

A

■ Distributes incoming requests across various servers in a server farm

30
Q

VoIP Phone

A

A hardware device that connects to your IP network to make a
connection to a call manager within your network

31
Q

Unified Communications (or Call) Manager

A

Used to perform the call processing for hardware and software-based IP phones

32
Q

Industrial Control System (ICS)

A

Describes the different types of control systems and associated
instrumentation

33
Q

Supervisory Control and Data Acquisition (SCADA)

A

Acquires and transmits data from different systems to a central panel for monitoring and control

34
Q

Virtual Network Devices

A

Major shift in the way data centers are designed, fielded, and operated