Ethernet Features Flashcards

1
Q

802.3ad

A

Link Aggregation
- Congestion can occur when ports all operate at the same speed
- Allows for combination of multiple physical connections into a single logical connection
- Bandwidth available is increased and the congestion is minimized or prevented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PoE 802.3af
PoE+ 802.3at

A

■ Supplies electrical power over Ethernet
● Requires CAT 5 or higher copper cable
● Provides up to 15.4 watts of power to device
● PoE+ provides up to 25.5 W of power to device
■ Two Device Types
● Power Sourcing Equipment (PSE)
● Powered Device (PD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port Monitoring or Mirroring

A

■ Helpful to analyze packet flow over network
● Connect a network sniffer to a hub and it sees all
● But, switches require port monitoring for network analyzer to see all the traffic
■ Port mirroring makes a copy of all traffic destined for a port and sends it to another port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.1x

A

User Authentication
■ For security purposes, switches can require users to authenticate themselves before gaining access to the network
■ Once authenticated, a key is generated and shared between the
supplicant (device wanting access) and the switch (authenticator)
■ Authentication server checks the supplicant’s credentials and creates the key
■ Key is used to encrypt the traffic coming from and being sent to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Management Access and Authentication

A

■ To configure and manage switches, you can use two options
● SSH
○ Remote administration program that allows you to connect to the switch over the network
● Console Port
○ Allows for local administration of the switch using a separate laptop and a rollover cable (DB-9 to RJ-45)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Out-of-band (OOB)

A

■ Management involves keeping all network configuration devices on a separate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

First-Hop Redundancy

A

■ Hot Standby Router Protocol (HSRP) uses virtual IP and MAC addresses to provide a “active router” and a “standby router”
● HSRP is a Cisco-proprietary protocol
● If Active is offline, then standby answers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Other First-Hop Redundancy Protocols

A

■ Gateway Load Balancing Protocol (GLBP)
● Cisco-proprietary protocol
■ Virtual Router Redundancy Protocol (VRRP)
● Open-source protocol
■ Common Address Redundancy Protocol (CARP)
● Open-source protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC Filtering

A

■ Permits or denies traffic based on a device’s MAC address to improve security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Traffic Filtering

A

■ Multilayer switches may permit or deny traffic based on IP addresses or application ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Quality of Service (QoS)

A

■ Forwards traffic based on priority markings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.1D

A

Spanning Tree Protocol (STP)
○ Permits redundant links between switches and prevents traffic loops
○ Availability is measured in 9’s
■ Five 9’s is 99.999% uptime and allows only 5 minutes down per year
○ Shortest Path Bridging (SPB) is used for larger network environments instead
○ Without STP, MAC Address table corruption can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Broadcast Storms

A

■ If broadcast frame received by both switches, they can forward frames to each other
■ Multiple copies of frame are forwarded, replicated, and forwarded again until the network is consumed with forwarding many copies of the same initial frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Root and Nonroot Bridges

A

■ Root Bridge
● Switch elected to act as a reference point for a spanning tree
● Switch with the lowest bridge ID (BID) is elected as the root bridge
● BID is made up of a priority value and a MAC address (with the
lowest value considered root)
■ Nonroot Bridge
● All other switches in an STP topology
■ MAC Address table corruption can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Root, Designated, and Non-Designated Ports

A

■ Root Port
● Every non-root bridge has a single root port
● Port closest to the root bridge in terms of cost
● If costs are equal, lowest port number is chosen
■ Designated Port
● Every network segment has a designated port
● Port closest to the root bridge in terms of cost
● All ports on root bridge are designated ports
■ Non-Designated Port
● Ports that block traffic to create loop-free topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Root and Nonroot Bridges

A

■ Single root port on non-root bridge
■ All other ports on non-root bridge are non-designated
■ All ports on root bridge are designated

17
Q

Port States

A

■ Non-designated ports do not forward traffic during normal operation; however, they do receive bridge protocol data units (BPDUs)
■ If a link in the topology goes down, the non-designated port detects the failure and determines whether it needs to transition to a forwarding state
■ To get to the forwarding state, though, it has to transition through four states
● Blocking
○ BPDUs are received but they are not forwarded
○ Used at beginning and on redundant links
● Listening
○ Populates MAC address table
○ Does not forward frames
● Learning
○ Processes BPDUs
○ Switch determines its role in the spanning tree
● Forwarding
○ Forwards frames for operations
■ Root and Non-designated port are blocking
■ Designated ports are forwarding

18
Q

Link Costs

A

■ Associated with the speed of a link
■ Lower the link’s speed, the higher the cost
■ Long STP is being adopted due to higher link speeds over 10 Gbps
■ Values range from 2,000,000 for 10-Mbps Ethernet to as little as 2 for 10 Tbps

19
Q

VLANs

A

■ Switch ports are in a single broadcast domain
■ Allow you to break out certain ports to be in different broadcast domains
■ Before VLANs, you had to use routers to separate departments,
functions, or subnets
■ Allow different logical networks to share the same physical hardware
■ Provides added security and efficiency

20
Q

802.1q

A

■ Multiple VLANs transmitted over the same physical cable
■ VLANs are each tagged with 4-byte identifier
● Tag Protocol Identifier (TPI)
● Tag Control Identifier (TCI)
■ One VLAN is left untagged
● Called the Native VLAN

21
Q

VPN

A

Virtual Private Network
Creates a secure VPN or virtual tunnel over an untrusted network like the Internet

22
Q

VPN Concentrator

A

Dedicated network device that provides secure connections between remote users and a company network

23
Q

VPN Headend

A

A specific type of VPN concentrator used to terminate IPSec VPN tunnels within a router or other device

24
Q

Firewalls

A

■ Network security appliance at your boundary
■ Firewalls can be software or hardware
■ Stateful Firewalls
● Allows traffic that originates from inside the network and go out
to the Internet
● Blocks traffic originated from the Internet from getting into the
network

25
NGFW
■ Conducts deep packet inspection at Layer 7 ■ Detects and prevents attacks ■ Much more powerful than basic stateless or stateful firewalls ■ Continually connects to cloud resources for latest information on threats
26
IDS/IPS
■ Intrusion Detection System (IDS) ● Recognizes attacks through signatures and anomalies ■ Intrusion Prevention System (IPS) ● Recognizes and responds
27
Proxy Server
■ A specialized device that makes requests to an external network on behalf of a client
28
Content Engine/Caching Engine
■ Dedicated appliance that performs the caching functions of a proxy server
29
Content Switch/Load Balancer
■ Distributes incoming requests across various servers in a server farm
30
VoIP Phone
A hardware device that connects to your IP network to make a connection to a call manager within your network
31
Unified Communications (or Call) Manager
Used to perform the call processing for hardware and software-based IP phones
32
Industrial Control System (ICS)
Describes the different types of control systems and associated instrumentation
33
Supervisory Control and Data Acquisition (SCADA)
Acquires and transmits data from different systems to a central panel for monitoring and control
34
Virtual Network Devices
Major shift in the way data centers are designed, fielded, and operated