Incercare Flashcards

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

<div>What does the following OSPF configuration command do?</div>

<div>(config-router)# area <i>area-id</i> range <i>ip-address</i> <i>netmask</i> [cost <i>n</i>]<br></br></div>

A

On ABR (not ASBR), this summarises the routes <b>from</b> the specified area<br></br>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command is used to summarise OSPF routes on an ASBR?

A

(config-router)# summary-address <i>prefix</i> <i>netmask</i>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can routes be filtered on OSPF ABRs?

A

Two ways:<div>(config-router)# area <i>area-id</i> range <i>ip-address</i> <i>netmask</i> not-advertise - this will stop advertisements of the specified route (and all more specific routes) from the specified area<br></br></div><div><br></br></div><div>Or:</div><div><div>(config-router)# area <i>area-id</i> filter-list prefix <i>PREFIX-FILTER</i> in - filter routes received from the specified area</div>(config-router)# area <i>area-id</i> filter-list prefix <i>PREFIX-FILTER</i> out - filter routes advertised into the specified area<br></br></div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between E1 and E2 external route in OSPF

A

<div>E1 - Includes the cost of reaching the ASBR</div>

<div>E2 - Does not include the cost of reaching the ASBR</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to select the type of external OSPF routes advertised by a router?

A

This is configured with a <b>metric-type</b> parameter for redistribute command<br></br><div>(config-router)# redistribute <i>source</i> subnets metric-type { 1 | 2 }</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a stubby area?

A

Stubby areas are guaranteed not to have an ASBR. Since they themselves don’t redistribute any external routes into OSPF, routers in a stubby area can safely assume that any traffic to external prefixes needs to go via ABR into area 0. Therefore, a stubby area does not receive LSA type 4 and 5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a totally stubby area?

A

A totally stubby area is a type of a stubby aread in which ABRs simply act as a default gateway and don’t generate specific summary (type 3) LSAs. Instead, they just send a type 3 LSA with the default route. Therefore, LSAs 3 (exception: default route LSA), 4 and 5 are not used in totally stubby areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a <b>not-so-stubby area</b> (NSSA)

A

Not-so-stubby areas (NSSA) disallow type 4 and type 5 LSAs, but can actually have an ASBR. Since type 5 LSA are disallowed, a new type, type 7, is used to propagate external routes. Unlike type 5, type 7 LSAs can be summarised. They are translated into type 5 on ABRs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a <b>totally not-so-stubby</b> area

A

A totally not-so-stubby area doesn’t allow type 3, 4 or 5 LSAs. They allow ASBR and use type 7 LSAs to propagate external routes. Since type 3 is disallowed, all routers received a default route to an ABR to get to the backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the OSPF packet types?

A

<div>1. Hello – Establish neighborship and monitor</div>

<div>2. DBD – Database Description</div>

<div>3. LSR – Link-state requests</div>

<div>4. LSU – Link-state update</div>

<div>5. LSACK – Acknowledgement</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Commands to configure non-standard OSPF areas

A

<div>Stubby – (config-router)# area <i>n</i> stub</div>

<div>Totally stubby – (config-router)# area <i>n</i> stub no-summary</div>

<div>NSSA – (config-router)# area <i>n</i> nssa</div>

Totally NSSA – (config-router)# area <i>n</i> nssa no-summary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a type 1 LSA?

A

Router LSA – Describes router ID, interfaces (including status), IP addresses and masks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a type 2 LSA?

A

Network LSA – Describes DR and BDR IP addresses, subnet ID and mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a type 3 LSA?

A

Summary LSA – Describes subnet ID and mask as well as RID of ABR that advertises this LSA. They retain the metric of from the originating area, adding the metric from the backbone area if necessary, giving an accurate measure of the cost to get to the destination network. Only one summary LSA for each prefix is created by an ABR even if there are multiple paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a type 4 LSA?

A

ASBR Summary - Describes a pair of ASBR and ABR routers, contains their IDs only. This lets other routers know how to get to an ASBR from another area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a type 5 LSA?

A

External LSA – Describes information on routes redistributed into OSPF by an ASBR. This is flooded to all areas, except stub and NSSA areas, unchanged. Type 5 LSA cannot be summarised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a type 7 LSA?

A

NSSA LSA – Replaces Type 5 in NSSAs and totally NSSAs. They are translated into type 5 LSAs on ABRs when sent to area 0. Type 7 LSAs can be summarised, unlike type 5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an OSPF virtual link and how to configure it?

A

A virtual link allows attaching a non-backbone area to another non-backbone area. ABR will create a de facto tunnel with a router in area 0 and act as if it had an interface in area 0 itself. To configure this:<div><br></br></div><div>(config-router)# area <i>n</i> virtual-link <i>corresponding-router-ID</i> - this needs to be done on both routers. Use the transit area ID.</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How can OSPF AD be configured?

A

(config-router)# distance intra-area <i>AD</i> inter-area <i>AD</i> external <i>AD</i>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How to check the FIB?

A

show ip cef [<i>ip-address</i>/<i>prefix</i>]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How to check CEF adjacency table?

A

show adjacency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the STP Root port selection tiebreakers?

A

<div>1. Lower cost </div>

<div>2. Lowest priority of the advertising switch (if multiple switches are advertising)</div>

<div>3. Lower system MAC on the advertising switch (if multiple switches are advertising)</div>

<div>4. Lowest port priority on the advertising switch (if selecting among links to the same switch)</div>

<div>5. Lowest port number on the advertising switch (if selecting among links to the same switch)</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When two non-root switches are connected, ports on one must be blocked to avoid a loop. What tiebreakers are used to decide which switch should block the port?

A

<div>1. The switch with the lowest root path cost forwards, the other one blocks</div>

<div>2. The switch with the lowest priority forwards</div>

<div>3. The switch with the lowest system MAC forwards</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How is STP path cost calculated?
Received path cost (included in BPDU received by the switch) + the locally calculated cost of the ingress interface (the interface BPDUs are received on). The cost in BDPUs sent downstream does not include the cost of the egress interface.
26
What determines which routers become OSPF DR/BDR on a segment?
Highest OSPF interface priority wins, second highest becomes the BDR. In case of a tie, the highest RID wins. A router with interface priority set to 0 will never become a DR or BDR.
27
What is the MAC address format for HSRPv1
0000.0C07.ACxx, where xx is the HSRP group ID
28
Which protocol uses 0000.0C07.ACxx MAC address format
HSRPv1
29
What is the MAC address format for HSRPv2 used with IPv4.
0000.0C9F.Fxxx, where xxx is the HSRP group ID.
30
What is the MAC address format for HSRPv2 used with IPv6.
0005.73A0.0xxx, where xxx is the HSRP group ID.
31
Which protocol uses 0000.0C9F.Fxxx MAC address format
HSRPv2 when used with IPv4
32
Which protocol uses 0005.73A0.0xxx MAC address format
HSRPv2 with IPv6
33
How many group IDs are available in HSRPv1
256
34
How many group IDs are available in HSRPv2
4096
35
What port is used for HSRP control messages in HSRPv1?
UDP 1985
36
What port is used for HSRP control messages in HSRPv2 with IPv4?
1985
37
What port is used for HSRP control messages in HSRPv2 with IPv6?
UDP 2029
38
What multicast address is used for HSRPv1?
224.0.0.2 (all routers)
39
What multicast address is used for HSRPv2 with IPv4?
224.0.0.102
40
What multicast address is used for HSRPv2 with IPv6?
FF02::66
41
What is a Virtual Tunnel Endpoint (VTEP)
Device that encapsulates and de-encapsulates VXLAN
42
What is a Network Virtual Endoint
Logical interface that encapsulates and de-encapsulates VXLAN
43
What is a VNI?
VXLAN Network Identifier. VNIs are used for VXLAN network segmentation and are mapped to VLANs on VTEPs.
44
How many VNIs are available
Over 16 million:
224 = 16777216
45
What is a type 8 OSPFv3 LSA
Link-state advertisements. They are used to advertise the router's link-local IPv6 addresses, prefixes and options. These LSA are not flooded outside local links.
46
What is a Type 9 OSPFv3 LSA
Intra-area prefix LSA. It carries IPv6 prefix information that is carried by type 1 and type 2 LSA in OSPFv2
47
What commands are available at privilege level 0?
disable
enable
exit
help
logout
48
What routing protocol is used in the underlay network in SD-Access when LAN automation is used?
IS-IS. Other protocols can be used, but it is not recommended by Cisco and have to be configured manually.
49
What traffic are outbound ACLs applied to?
Only transit traffic. Host-originating traffic will not be filtered by an outbound ACL.
50
Which Cisco SD-WAN (Viptela SD-WAN) component is required to have a public IP?
vBond orchestrator
51
What is an Intent API
An Intent API is a business-outcome-oriented northbound REST API. It is used to facilitate DNA Center policy workflow that is used to define business intent, that is then translated into policy-based access control, routing and QoS.
52
What is an Integration API
Integration APIs are westbound APIs used to integrate third party sysetms, such as IT Service Management (ITSM) and IP Address Management (IPAM).
53
What is the IP protocol type for GRE?
47
54
What is the IP protocol type for Encapsulating Security Payload (ESP)
50
55
What is the IP protocol number for Authentication Header (AH)?
51
56
What is the IP protocol number for TCP?
6
57
What is the IP protocol number for UDP?
17
58
What are the IKE states?
1. MM_NO_STATES - Peers have not yet agreed on IKE SA parameters
2. MM_SA_SETUP - SA parameters agreed upon, Diffie-Helman exchange pending
3. MM_KEY_EXCH - Diffie-Helman exchange done, IKE SA not yet successful
4. MM_KEY_AUTH - IKE SA authentication complete
5. QM_IDLE - quick mode negotiation now possible
59
What are the two hypervisor types?
Type 1 hypervisor - bare metal, running directly on hardware
Type 2 hypervisor - runs on top of a host OS.
60
What is an STP Dispute?
STP Dispute is a condition when a switch receives a BPDU inferior to its own. This is an indication of either:
Uni-directional link - the other switch is not receiving superior BDPUs and thus is still sending its own, inferior BPDU
Software issue on the other switch.
61
What is the IP protocol number used by EIGRP's Reliable Transport Protocol?
88
62
What is the IP protocol number used by OSPF?
89
63
What is the default exec-timeout?
10 minutes
64
What is the overhead of GRE tunnel key?
4 bytes
65
What is a GRE tunnel key
A tunnel key is a 4-byte pre-shared cleartext password that needs to match for a GRE packet to be accepted.
66
What is OnePK?
Cisco-proprietary southbound API. It uses Java, C, or Python to configure network devices. It can use either Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to encrypt data in transit.
67
What Openflow?
Southbound API using an Imperative SDN model, sending detailed instructions to network devices.
68
What is OpFlex?
Southbound API using a Declarative SDN model, sending instructions but leaving the implementations to the devices.
69
What is the IEEE standard for MACsec?
IEEE 802.1AE
70
What path selection mechanism for BGP?
1. Weight - highest is best (local, Cisco-specific)
2. Local preference - highest is best (this is set by the router in our AS)
3. Originated locally (added by network statement or redistributed from IGP on this router) are preferred to routes received from other routers. Locally originated routes will have a weight of 32768.
4. AS path - Shortest is best
5. Origin - Origin “i” (IGP, added via network statement) beats “?” (incomplete, meaning redistributed). “e” is no longer used.
6. Multiple Exit Discriminator - if there are multiple routes from the same AS, the lowest MED (set by the router in foreign AS)
7. Path - External (eBGP) paths are preferred over internal (iBGP)
8. if iBGP, smallest iBGP metric
9. if iBGP and Route Reflection is used, shortest Cluster-List length
10. Router ID - Lowest Router ID
11. Lowest Peer Address
71
What attributes must be identical for switches to be in the same MST region?
1. Configuration name
2. Configuration revision
3. A digest (i.e. the output of a hash function) of the VLAN-MSTI mapping.
72
What is an Internal Spanning Tree (IST)?
IST is an instance of MST that is always present and has an ID of 0. It runs on all ports and also carries information about other instances, so there’s only one set of BDPUs sent.
73
What are the PAgP timers?
Hello: 30s
74
What are the default values of LACP timers?
LACP slow - Hello 30s, Dead 90s
LACP fast - Hellos 1s, Dead 3s
75
How to configure LACP fast mode?
(config-if)# lacp rate fast
76
What are the default values of EIGRP timers?
Hello - 5s
Hold - 15s
77
What are BGP routing updates called?
Network Layer Reachability Information (NLRI)
78
How is eBGP direct neighbour requirement enforced?
TTL of packets containing eBGP messages is set to 1.
79
What might cause a BGP peer to be in Idle state?
1. No route towards peer
2. BGP peer is administratively down
3. Timeout after an unsuccessful peering attempt. After the first attempt, the ConnectRetryTimer is set to 60 and is doubled after each subsequent unsuccessful attempt. When the ConnectRetryTimer counts down to 0, the condition is cleared and another connection attempt is made.
80
What is a BGP community?
BGP community is an optional transitive BGP attribute that is used to “tag” an NLRI as it traverses different routers and AS. Each router can act upon a community using route-maps or a similar mechanism.

A community is a 32-bit number (possibly larger with new RFCs) presented as either a single 32-bit value or two 16-bit values side-by-side (xxxxxx:yyyyyy).
81
Which messages are used by HSRP?
1. Hello - sent at regular intervals, includes priority value and information about the device (physical IP, virtual IP)
2. Coup - Sent by a router preempting another router
3. Resign - Sent when router ceases to be active, either due to preemption or due to being shut down
4. Advertise - Sent periodically (30 seconds in my lab) by passive devices.
82
What decides which routers become HSRP active and standby routers?
1. Priority - higher is better
2. IP address - higher is better, if priorities are equal
83
What is the multicast Group for EIGRP?
224.0.0.10
84
What steps are necessary for IPSec configuration?
1. Configure IKE policy (Optional).
2. Add a pre-shared key to a keyring and associate it with a particular peer.
3. Configure an IPSec transform set.
4. Configure an IKE profile.
5. Configure an IPsec profile.
6. Apply IPSec to traffic.
85
How can IPSec be applied to traffic, assuming all prerequisite configuration is in place?
1. Create and apply a crypto map to a physical interface. This will punt all traffic hitting the interface and matching the crypto map into an IPSec tunnel (no GRE)
2. Create and apply a crypto map to a GRE tunnel interface. This will encapsulate egressing GRE packets in IPSec.
3. Apply an IPSec profile to a GRE tunnel interface
4. Create a Virtual Tunnel Interface (VTI) and configure it with an IPSec profile
86
What BGP Local Preferencje values are preferred?
Higher values are preferred
87
What BGP Multi-Exit Discriminator (MED) values are preferred?
Lower values are preferred
88
What is the preference for BGP origin codes?
1. i - IGP
2. e - EGP
3.? - incomplete
89
What BGP prefixes are marked with i (IGP) origin code?
Prefixes added using network BGP command
90
What prefixes are marked with E (EGP) origin code?
Prefixes for Exterior Gateway Protocol.

This protocol and the origin code are no longer used.
91
What prefixes are marked with ? (incomplete) origin code?
Prefixes redistibuted from other routing protocols.
92
What is the default value of BGP Local Preference?
100
93
What is the default value of BGP Multi-Exit Discriminator (MED) attribute?
0 when originating locally, equal to IGP metric when redistributed.
94
When is BGP Multi-Exit Discriminator (MED) used?
Only when comparing paths from the same AS (unless bgp always-compare-med is configured)
95
What parameters can be included in EIGRP metric?
1. Bandwidth
2. Delay
3. Reliability
4. Load
96
What parameters are used to calculate EIGRP metric by default?
Bandwidth and delay
97
What is the default formula for EIGRP metric?
Metric = 256*(10^7/BW+delay/10)
98
How is bandwidith measured in EIGRP
Slowest link on the path, measured in bps.
99
How is delay measured in EIGRP?
Cumulative delay from all hops on the path.
100
What tables are used by EIGRP?
1. Neighbour table
2. Topology table
3. Routing table
101
What is EIGRP reported distance?
Distance to destination route reported by the next-hop router.
102
What EIGRP computed distance
Computed distance – distance to the destination subnet, used as metric. Reported distance + distance to next hop.
103
What is EIGRP successor?
Next-hop for the successor (i.e. best) route.
104
What is a successor route?
EIGRP route with the lowest metric for the destination
105
What is a feasible successor?
Fallback routes with the second-lowest metric that satisfy the feasability condition.
106
What is the feasibility condition.
Feasible successor must have a reported distance lower than the feasible distance.
107
What is feasible distance?
Shortest computed distance for a destination. In other words, the computed distance of successor route.
108
What do entries in EIGRP topology table consist of?
1. Network prefix
2. EIGRP neighbours that advertised this prefix
3. Metric advertised by each neighbour
4. Attributes used to calculate each metric.
5. Originating routers
6. Hop counts
109
How many equal-metric paths does EIGRP load-balance between by default?
4
110
How to enable unequal-cost load-balancing in EIGRP?
Set variance parameter to value higher than 1. All paths whose computed distance is shorter than feasible distance times variance and which satisfy the feasibility condition will be be eligible for loadbalancing.

(config-router)# variance <1-255>
111
How can EIGRP routes be summarised?
Automatically and manually
112
What does EIGRP automatic summarisation summarises prefixes to?
To the classful network (e.g. 172.16.1.0/24 to 172.16.0.0/16).
113
When does EIGRP automatic summarisation work?
Only when at least one of the subnets summarised is directly connected.
114
How to enable EIGRP automatic summarisation?
(config-router)# auto-summary
115
How to enable EIGRP manual summarisation?
On the advertising interface:
(config-if)# ip summary-address eigrp ASN summary-prefix netmask
116
How to enable EIGRP authentication?
Create a keychain:
  • (config)# key chain chain-name
  • (config-keychain)# key n
  • (config-keychain-key)# key-string string
And then apply it to an interface:
  • (config-if)# ip authentication mode eigrp as-number md5
  • (config-if)# ip authentication key-chain eigrp as-number chain-name
117
How to change the administrative distance for EIGRP?
(config-router)# distance int_distance ext_distance
118
What is the AD of EIGRP internal routes?
90
119
What is the AD of EIGRP external routes?
170
120
What is the AD of EIGRP summary routes?
5
121
What is the AD of eBGP routes?
20
122
What is the AD of iBGP routes?
200
123
What is the AD of OSPF routes?
110
124
What is the topology requirement for iBGP?
Full-mesh of peer relatioships or use of a route reflector
125
What port BGP sends messages to?
TCP 179
126
What does Idle BGP state mean?
This is the starting state. In Idle state, routers do not attempt to initiate a TCP connection to their peers.
127
What does Connect BGP state mean?
A router has sent a SYN TCP segment to its configured peer’s port 179 and awaits a reply. It also listens at its own port 179 for SYN TCP segments incoming from its configured peer.
128
What does Active BGP state mean?
The router has (again) tried to initiate a TCP connection. It also listens at its own port 179 for SYN TCP segments incoming from its configured peer.
129
What does BGP OpenSent state mean?
The originating router has already sent an Open message (which mean a TCP handshake was successful) and is awaiting one in return. The parameters in the messages have to match to progress to next state.
130
What are the conditions for move from OpenSent to OpenConfirm BGP states?
  • Matching BGP versions
  • Source IP for Open message matches the configured peer IP
  • AS in the Open message matches the configure peer AS
  • BGP Router ID (RID) must be present and unique.
  • Security parameters (password, TTL) must be correct
131
What message is sent to signal move from OpenSent to OpenConfirm BGP state?
Keepalive
132
What message is sent to signal move from OpenConfirm to Established BGP state?
Keepalive
133
What happens when the message received in OpenSent BGP state is incorrect?
A Notification message is sent and the state is changed to Idle.
134
What does OpenConfirm BGP state mean?
After sending a Keepalive message, the router waits for a reply. If it receives a Keepalive message, it moves to Established state. If it receives a Notification, it moves to Idle.
135
What does Established BGP state mean?
This is the final stable state for BGP peer relationship. NLRIs are exchanged using Update message - in a burst at first and then only in incremental updates - and Keepalive is used to maintain the peering.
136
What is the Cisco default value for BGP hold timer?
180 seconds
137
What happens when BGP peers have different hold timers configured?
The smaller hold timer value is used by both peers.
138
What is BGP Open message used for?
To establish BGP adjacency and negotiate session capabilities.
139
What is BGP Keepalive message used for?
To keep the session alive in absence of updates. Exchanged every one-third of the hold time (so every 60 seconds, by default).
140
What is BGP Update message used for?
To advertise routes or withdraw previously advertised routes.
141
What is BGP Notification message used for?
To signal an error in the BGP session and to close the session.
142
How to dynamically summarise a route in BGP?
(config-router)# aggregate-address network subnet-mask [summary-only] [as-set]
143
What does the summary-only argument in aggregate-address BGP command do?
It suppressed more specific prefixes within the range of summary prefix. Without it, both are advertised.
144
What does the as-set parameter in BGP aggregate-address do?
It preserves the AS_Path of aggregated routes in a separate AS_Set attribute.
145
How the AS_Set path attribute is treated by BGP routers?
It counts as a single AS in AS_Path length calculation, but its components are used for loop detection.
146
How to statically summarise routes in BGP?
Create a static null route and advertise it via BGP network statement:
(config)# ip route prefix netmask null0
(config-router)# network prefix mask netmask
147
What is the default Router ID for BGP?
The highest IP from among loopback interfaces in an UP state. If no loopbacks are up, the highest IP from among physical interfaces in an UP state.
148
What is the default BGP address family?
IPv4 Unicast
149
How to statically configure BGP Router ID?
(config-router)# bgp router-id router-id
150
How to activate an address family for a BGP neighbour?
  • (config-router)# address-family afi safi - for IP traffic AFI is either ipv4 or ipv6, SAFI is either unicast or multicast. IPv4+unicast by default.
  • (config-router-af)# neighbor ip-address activate
151
What are the 4 primary methods of BGP route filtering?
  • Distribution lists
  • Prefix lists
  • AS path ACL
  • Route maps
152
How do distribution lists filter BGP routes?
The source part of an extended ACL matches network (as with standard ACL) and the destination part matches the subnet mask.

Example:
permit 172.16.0.0 0.0.255.255 255.255.128.0 0.0.127.0

This will match all networks in 172.16.0.0/16 range that have subnet masks between 255.255.128.0 and 255.255.255.0, i.e. prefix length /17 to /24.
153
How to apply a distribution list?
(config-router-af)# neighbor neighbour-ip distribute-list {name | id} {in | out}
154
How to specify a range of prefix lengths for a prefix-list entry?
Use both ge and le operators in the same entry
155
How to apply a prefix list to a neighbour?
(config-router-af)# neighbor neighbour-ip prefix-list name {in | out}
156
How to configure a prefix-list entry?
(config)# ip prefix-list list-name seq seq-no {permit | deny} prefix/prefix-len [ge prefix-len] [le prefix-len] [eq prefix-len]
157
What does a prefix-list entry match without any operator?
It matches the network exactly, i.e. just this single network and none within it.
158
What does a prefix-list entry with eq operator match?
It matches all networks within the specified one that have a prefix length exactly the same as the value.
159
How to define an AS path ACL?
(config)# ip as-path access-list acl-number {deny | permit} regex
160
What regex matches AS 200 at the beginning of the AS_Path (i.e. AS 200 is the neighbour AS)?
^200
161
What regex matches AS 200 at the end of the AS_Path (i.e. Route originates in AS 200)?
200$
162
What regex matches AS 200 in the middle of the AS_Path?
_200_
163
What regex matches an empty AS_Path?
^$
164
How to perform a BGP reset?
clear ip bgp ip-address [soft]
clear bgp afi safi ip-address [soft] [in | out]
165
What does a hard BGP reset do?
Tears down the BGP session, forcing it to be re-established from scratch.
166
What does a soft BGP reset do?
Triggers a full BGP advertisment to rebuild the BGP cache.
167
What is the meaning of No_Advertise BGP community?
The router receiving such a route should not advertise it any further.
168
What is the meaning of No_Export BGP community?
The router receiving such route should advertise it into iBGP, but not into eBGP. Other routers in the receiving AS should honour this community, which means that the route should not be advertised beyond that AS.
169
What is the meaning of Local_AS BGP community?
The route should not be advertised outside the local AS or, in confederation, outside the local sub-AS.
170
Are BGP communities advertised by default?
No, they need to be explicitly enabled on a per neighbour basis:
(config-router)# neighbor ip-address send-community [standard | extended | both]
171
What is the overhead for GRE without any additional features?
24 bytes (20 bytes IP header + 4 bytes GRE header).
172
What is recursive routing in the context of a tunnel?
When the next hop for tunnel destination points at the tunnel. This causes the tunnel to fail.
173
What can cause a GRE tunnel interface to be down?
  • There is no route to the tunnel destination address
  • The source interface is down
  • Router has detected recursive routing
  • Keepalive is configured and has expired
  • Tunnel interface is administratively disabled
  • Tunnel is configured with IPSec and the associated IPSec SA is down.
174
What functions does Authentication Header (AH) provide?
Peer authentication, data authentication and replay detection, but no encryption
175
What functions does Encapsulating Security Payload (ESP) provide?
Peer authentication, data encryption, data authentication and replay detection
176
What is the packet format for IPSec transport mode?
IP header remains intact, IPSec header is added after the IP header and only the payload is encrypted.
177
What is IPSec tunnel mode?
The whole IP packet is encapsulated. A new IP header + IPSec header are added before the encrypted original packet.
178
What is the limitation of IPSec transport mode vs tunnel mode?
Transport mode does not add a new IP header, so if either source or destination for the traffic is a non-publicly routable (e.g. RFC 1918) address, packets will go out into the internet with a non-routable destination or source address and promptly get lost.
179
How does GRE work with IPSec transport mode?
The original packet + GRE header is encrypted by transport mode and then a new IP header is added in the beginning. This allows transport mode to work for a site-to-site tunnel.
180
How does GRE work with IPSec tunnel mode?
The original packet is encapsulated in GRE and then again encapsulated by IPSec.
181
What modes are available for IKEv1 phase 1?
  • maim mode - 6 messages
  • aggressive mode - 3 messages at the cost of reduced encryption security and leaking the identities of both IKE peers.
182
In a route-map, how are multiple match statements with the same match option (eg. prefix-list) evaluated?
Boolean OR logic applies. Only one has to match for the statement to take effect.
183
In a route-map, how are multiple match statements with different match options (eg. prefix-list and acl) evaluated?
Boolean AND logic applies, all need to match for the route map entry to be applied.
184
What is the multicast IP block?
224.0.0.0/4 (224.0.0.0-239.255.255.255)
185
What is an Events and Notifications API?
It's an eastbound API used by appplications to establish a notification handler for Cisco DNA to notify them of events.
186
What are the three main approaches to QoS?
  • Best effort - No QoS.
  • Integrated Services (IntServ) - Applications reserver bandwidth using RSVP and CAC.
  • Differentiated Services (DiffServ) - Packets are classified for shaping and policing purposes.
187
Where can policing be performed?
On both ingress and egress.
188
Where can shaping be performed?
On egress only
189
What Layer 2 markings are available?
Class of Service (CoS) for Ethernet and WiFi Multimedia (WMM) 
190
What Layer 3 markings are available?
  • IP Precedence (IPP) - deprecated
  • Differentiated Service Code Point (DSCP)
    191
    What is the format of DSCP?
    6 bits + 2 bit Explicit Congestion Notification (ECN).
    192
    What is the format of IPP field?
    3 bits in the Type of Service (ToS) byte for 8 classes, out of which 6 are usable.
    193
    What is the format of Class of Service (CoS) field?
    3 bits Priority Code Point + 1 bit Drop Eligible Identifier. Of the 8 values available (0-7), 6 and 7 are reserved. Of the available, 5 is best (used e.g. for voice traffic by Cisco IP phones), 0 is the worst.
    194
    What WiFi Multimedia (WMM) classes are available?
    • voice (AC_VO)
    • video (AC_VI)
    • best effort (AC_BE)
    • background (AC_BK)
    195
    How doess WMM classification impact forwarding?
    WMM class determines how long a client should wait, when a collision occurs, before retransmitting. The shorter the wait, the higher probability the client will start transmitting first, forcing others to wait.
    196
    What is Committed Information Rate (CIR)?
    CIR is the rate (in bps) at which tokens are added to a bucket.
    197
    What is Committed Burst Size (Bc)?
    The size of bucket used for policing.
    198
    What is Committed Time Interval (Tc)?
    This is the time (in ms) over which a committed burst is sent.
    199
    What happens when CIR is smaller than the line rate of outgoing interface?
    Data is sent in bursts, i.e. data is sent at full line rate up to the value of Bc and then stops until the end of Tc interval.
    200
    What are the three main policier algorithms?
    • Single-rate, two-colour
    • Single-rate, three-colour (srTCM)
    • Two-rate, three-colour (trTCM)
    201
    What is a single-rate two-color policier?
    It's the simplest type of policier: uses a single bucket and performs the configured action on all excess traffic
    202
    What is a single-rate, three colour policier?
    Uses two buckets, one for committed burst (Bc bucket), the other for excess burst (Be bucket). Tokens are added to the regular Bc bucket, and, when Bc bucket is full, they overflow to the Be bucket. Similarly, they are taken from the Bc bucket first and, when it is emptied, they are taken from Be bucket. This means that the Be bucket fills when traffic is below the CIR and represents “savings” that can be used when traffic exceeds CIR. When Be bucket runs out, traffic is capped at CIR.
    203
    What is a two-rate, three colour policier?
    Uses two buckets, Bc and Be, and two rates: CIR and Peak Information Rate (PIR), which needs to be higher than CIR. Bc is filled at CIR, Be independently at PIR. Traffic up to CIR is accepted, traffic exceeding CIR and up to PIR is marked down, the rest is dropped.
    204
    What is Class-based weighted fair queuing (CBWFQ)?
    CBWFQ is a queuing algorithm used for trafic shaping. It assigns traffic to classes (up to 256) depending on priority, with each class having a minimum guaranteed bandwidth. Each class is given weight to determine the allocation of bandwidth.
    205
    What is a Low-latency Queue (LLQ)?
    Special queue for real-time traffic. Traffic assigned to LLQ is given priority and transmitted first. LLQ is configured with maximum share of bandwidth to make sure it doesn't crowd out other traffic.
    206
    How does Weighted Random Early Detection (WRED) work?
    During congestion, it drops packets depending on how much of the queue has filled, thus signalling to senders to slow down transmission. DSCP drop probability or IPP class determine the relative likelihood of a packet being dropped.
    207
    How does Explicit Congestions Notification (ECN) work?
    When a router senses congestion, it sets both ECN bits in ToS byte in IP header to 1. Then, the receiver will notify the sender of congestion by setting an ECN-Echo TCP flag. The sender then acknowledges this with Congestion Window Reduced (CWR) TCP flag.
    208
    What are the steps to configure QoS?
    1. Define class-maps to categorise traffic into classes
    2. Define policies for classes using policy-maps
    3. Apply policy maps to interfaces
    209
    What is an Endpoint Identifier (EID)?
    IP address of an endpoint in a LISP site
    210
    What is a Routing Locator (RLOC)
    IP address of a LISP router
    211
    How does LISP resolve EIDs to RLOCs?
    1. A packet arrives at an ITR.
    2. ITR sends a Map Request to an MR.
    3. MR looks up the destination EID it forwards the Map Request to the Egress Tunnel Router (ETR) that is associated with the destination EID.
    4. The ETR responds to the ITR with the ETR’s RLOC.
    5. The ITR caches the response.
    212
    What is the port used by LISP control plane?
    UDP 4342
    213
    What is the port used by LISP data plane?
    UDP 4341
    214
    What is dBm?
    Power relative to 1 milliwatt
    215
    What dB value means the power is doubled?
    +3 dB
    216
    What is dBi?
    Power gain relative to ideal-type isotropic antenna that radiates signal equally in all directions.
    217
    What is the typical gain of a dipole antenna?
    +2 to +5 dB
    218
    What is the typical gain of a patch antenna?
    +6 to +10 dBi
    219
    What is the typical gain of a Yagi antenna?
    +10 to +14 dBi
    220
    What is the typical gain of a parabolic dish antenna?
    +20 to +30 dBi
    221
    What is the simplified formula for received signal strength?
    Transmit power (dBm, Tx) + antenna gain (dBi, Rx+Tx) - cable loss (Rx+Tx) - free space loss
    222
    What is RSSI?
    Normalised received signal strength, taking into account the receiver's sensitivity threshold
    223
    What is SNR?
    Relative strength of signal to noise measured in dB
    224
    What SNR value is considered adequate for bulk data?
    +25 dB
    225
    What SNR value is considered adequate for real-time data?
    +30 dB
    226
    What is the notation for MIMO?
    TxRx:streams
    Where Tx is the number of radios on the transmitter, Rx is the number of radios on the receiver, and streams is the number of spatial streams in use.
    227
    What is dynamic rate shifting (DRS)?
    Adaptation of the data rate and modulation scheme to changes in signal quality
    228
    Which technology uses transmit beamforming (TxBF)?
    Multi-user Multiple-Input Multiple-Output
    229
    What is MIMO?
    Multiple-Input Multiple-Output, i.e. usage of multiple radios on the transmitter and receiver.
    230
    What allows MIMO to increase transmit rates?
    Creation of multiple spatial streams on the same channel, multiplying throughput in a process called spatial multiplexing. Multiple signal processing techniques are used to make sure that these transmissions are distinguishable from each other.
    231
    What is transmit beamforming (TxBF)?
    TxBF allows transmission to different devices on the same channel simultaneously. Since multiple signals travel along slightly different paths, beamforming is able to shift the phase of each signal so that they arrive in phase at a specific receiver (improving signal quality and SNR) and out of phase at other receivers.
    232
    What are the steps in AP join process?
    1. Boot
    2. WLC discovery
    3. WLC selection
    4. Establishment of CAPWAP tunnel
    5. WLC Join
    6. Check firmware image offered by WLC. If different from own, download it, install and reboot
    7. Config download
    8. Run state
    233
    What WLC discovery methods are tried by an AP?
    1. Broadcast with CAPWAP Discovery Request packets to UDP 5246
    2. Prior knowledge - configured WLCs + 8 of last WLCs the AP joined
    3. DHCP Option 43
    4. DNS query for CISCO-CAPWAP-CONTROLLER.local-domain, where local-domain is learned from DHCP.
    234
    What is the WLC selection order?
    1. Primary configured WLC
    2. Secondary configured WLC
    3. Tertiary configured WLC
    4. WLCs determined by other means, based on reported load
    235
    What is the failover process for Cisco APs?
    An AP sends keepalive messages to the WLC every 30 seconds by default. If no response is received, the AP sends four more keepalives in 3 second intervals. If it receives no response to these, it starts failover:
    1. To the secondary or tertiary configured WLC
    2. To other discovered WLCs
    236
    What is a WLC HA group?
    Group of WLCs in hot-standby mode. All share a single Mobility MAC and runtime information. If the active fails, a standby seamlessly takes over in Stateful Switchover (SSO)
    237
    What is Hybrid Remote Edge Access Point (H-REAP)
    It's an old name for FlexConnect
    238
    How does Cisco Centralised Key Management (CCKM) work?
    WLC maintains a database of clients and cryptographic keys and provides the keys to APs (and possibly other WLCs during an inter-controller roam) so that a new key doesn’t have to be negotiated.
    239
    How does wireless key caching work?
    A client maintains a list of keys (up to 8) it used for different APs. If it associates with an AP it saw previously, it can use a cached key instead of negotiating a new one.
    240
    How does IEEE 802.11r (AKA Fast BSS Transition (BSS FT)) work?
    The client performs an FT handshake with the new AP before roaming, in which it quickly negotiates new cryptographic keys while avoiding a full 802.11i/EAP handshake. Additionally, QoS parameters can be transferred in the same way. A client can also initiate the handshake via the original AP to reduce the delay even further.
    241
    What is inter-controller roaming?
    When a client roams between APs associated to two different WLCs
    242
    What is intracontroller roaming?
    When a client roams between two APs associated with the same WLC
    243
    What is layer 2 roaming?
    Roaming between two WLCs that have the WLAN mapped to the same VLAN.
    244
    What is Layer 3 roaming?
    Roaming between WLCs that have the WLAN used by client mapped to different VLANs
    245
    What is required for layer 3 roaming to work without changing the client's IP?
    Both WLCs have to be in the same mobility group
    246
    What is the data plane used by SD-Access?
    VXLAN with customised header
    247
    What is the control plane used by SD-Access?
    LISP
    248
    What is the policy plane used by SD-Access?
    Cisco TrustSec
    249
    How is VXLAN modified for use with SD-Access?
    The packet format a number of additional fields, primarily the Group Policy ID field, that are used to identify the policy that has been applied to the packet.
    250
    What is an SD-Access control plane node?
    A node the registers and resolves EID to RLOC mappings. Basically a LISP MS/MR.
    251
    What is a fabric border node?
    A node that connects external Layer 3 networks to the SDA fabric and acts as PxTR.
    252
    What is a fabric edge node?
    Node connecting wired devices (both end devices and APs) to the SDA fabric. Acts as LISP xTR.
    253
    What is a fabric WLC controller?
    WLC that connects APs and wireless endpoints to SDA fabric. Not part of the fabric, but fabric-aware (fabric-enabled).
    254
    What are intermediate nodes in SD-Access?
    Nodes that provide only underlay services with no overlay role.
    255
    How is Layer 3 segmentation performed in SD-Access?
    1. Devices use VRF to create multiple routing tables
    2. Control plane uses LISP Instance IDs to separate the VRFs.
    3. Data plane uses VXLAN VNID field to carry VN information.
    256
    What devices are in SD-Access controller layer?
    Cisco ISE and Cisco DNA Center appliances
    257
    What are the components of Viptela SD-WAN solution?
    • vManage NMS
    • vSmart Controller
    • vBond Orchestrator
    • SD-WAN routers
    • vAnalytics
    258
    What is a vManage NMS
    Network Management System, allows monitoring and configuration of SD-WAN.
    259
    What is the role of a vSmart controller?
    Establishes tunnels with SD-WAN routers, exchanges routes using Overlay Management Protocol (OMP), distributes policies to SD-WAN routers.
    260
    What is the role of SD-WAN router?
    WAN edge at a site, talks to vSmart controller and establishes tunnels with it.
    261
    What SD-WAN routers are available?
    • vEdge - Dedicated router running Viptela software.
    • cEdge - Cisco router running a specialised IOS XE with SD-WAN functionality. Offers additional security features compared to vEdge.
    262
    What is the role of a vBond orchestrator?
    Authenticates SD-WAN routers and facilitates their connection to vSmart controllers (e.g. using NAT traversal), manages load-balancing between multiple vSmart controllers.
    263
    What is the role of vAnalytics?
    Optional service for data collection and analysis
    264
    What is used for Viptela SD-WAN control connection?
    DTLS
    265
    What is Cloud OnRamp?
    A feature of Cisco SD-WAN that continuously monitors connection to cloud services and selects the best path.
    266
    What is conditional debugging?
    A filter to only show debug messages related to a particular condition (e.g. an interface)
    267
    Which fields have to match for a traditional NetFlow flow?
    • Source IP
    • Destination IP
    • Source port
    • Destination port
    • Layer 4 protocol type (TCP, UDP etc.), i.e. the IP protocol field
    • ToS byte
    • Input logical interface
    268
    What Netflow version are available in Cisco devices?
    1, 5 and 9
    269
    How does Flexible NetFlow extend NetFlow?
    • Allows customisation of key fields used to identify a flow
    • Allows traffic sampling to reduce the CPU and memory load
    • Allows configuration of different receivers for different flows
    270
    What are the 4 basic elements of Flexible NetFlow configuration?
    • Flow exporters - destinations where NetFlow data should be sent
    • Flow records - defines key fields used to identify flows and non-key fields which should be collected
    • Flow monitors - combines records with exporters, i.e. “this data should be sent to this receiver”. Monitors are then applied to interfaces to effect the configuration and start collecting data. Monitor caches data structured per the record attached and sends it to the exporters at moments determined by cache configuration (see configuration below)
    • Flow samplers - Enable sampling. Flow samplers are applied to flow records.
    271
    What is Local SPAN?
    Traffic is mirrored to a different interface on the same switch where an analyser is connected.
    272
    What is Remote SPAN (RSPAN)?
    Mirrored traffic is forwarded to all ports assigned to a special VLAN. Another switch that has this VLAN trunked to can then mirror this traffic to one of its ports, where an analyser is connected.
    273
    What is Encapsulated Remote SPAN (ERSPAN)?
    Mirrored traffic is encapsulated in L3 packets and can be routed to a remote analyser.
    274
    How can VLAN filter be applied to SPAN?
    • (config)# monitor session session-id filter vlan vlan-id
    275
    How to mark a VLAN for use with RSPAN?
    • (config-vlan)# remote-span
    276
    What is the minimum configuration for Local SPAN?
    • (config)# monitor session session-id source {interface {ifname|ifrange} | vlan vlan-id} [rx|tx|both] - add a source interface/vlan. An interface range can be specified, and multiple sources can be configured for the same session if the command is repeated. By default, both ingress and egress traffic is captured, this can be overridden with tx (egress only) or rx (ingress only) keywords.
    • (config)# monitor session session-id destination interface ifname - mirror traffic from source(s) to the specified interface.
    277
    How to configure an RSPAN sender?
    • (config)# monitor session session-id source {interface {ifname|ifrange} | vlan vlan-id} [rx|tx|both] - add a source interface/vlan. An interface range can be specified, and multiple sources can be configured for the same session if the command is repeated.
    • (config)# monitor session session-id destination remote vlan vlan-id
    278
    How to configure an RSPAN receiver?
    • (config)# monitor session session-id source remote vlan vlan-id
    • (config)# monitor session session-id destination interface ifname
    279
    What are the steps to configure ERSPAN?
    • (config)# monitor session session-id erspan-source - Enter ERSPAN configuration mode
    • (config-mon-erspan-src)# source interface if-name
    • (config-mon-erspan-src)# filter vlan-id (optional)
    • (config-mon-erspan-src)# destination - enter destination configuration mode
    • (config-mon-erspan-src-dst)# ip address ipaddress - configure destination IP
    • (config-mon-erspan-src-dst)# erspan-id id - (optional) configure ERSPAN ID, used to differentiate different sessions from same source at the destination
    • (config-mon-erspan-src-dst)# origin ip address ipaddress - (optional) configure source IP for this traffic
    280
    What are the Places in Network (PIN) in Cisco SAFE framework?
    • Branch - Remote, more difficult to secure
    • Campus - Numerous users
    • Data centre - Highly critical
    • Edge
    • Cloud
    • WAN
    281
    What are the secure domains in Cisco SAFE framework?
    • Management - management of devices and systems
    • Security intelligence - detection of emerging security threats
    • Compliance - compliance with security and privacy regulations.
    • Segmentation
    • Threat defense
    • Secure services
    282
    What is Cisco Talos
    A threat intelligence tool compiling data on malware from a wide range of sources.
    283
    What is Cisco Threat Grid?
    Static (comparison with malware samples) and dynamic (behavioural analysis) file analysis
    284
    What is Cisco Advanced Malware Protection (AMP)?
    A service for malware analysis and detection
    285
    What is Cisco AnyConnect?
    A VPN solution. Also assesses endpoint’s compliance before allowing connection.
    286
    What is Cisco Umbrella?
    DNS resolver that block malicious domains. Formerly known as OpenDNS
    287
    What is Cisco Stealthwatch?
    Collector and aggregator of telemetry data. Monitors and analyses network security to identify threats. Collects NetFlow/IPFix data.
    288
    What is Cisco ISE?
    A Network Access Control (NAC) solution. It provides, among others, a 802.1x Authentication Server and can be integrated into DNA Centre to provide intent-based access policy.
    289
    What is a 802.1X supplicant?
    An end device attempting to access the network
    290
    What is a 802.1X authenticator?
    This is the network device (AP, switch or WLC) that the supplicant communicates with and that forwards this communication to an authentication server.
    291
    What is a 802.1X authentication server?
    This is the server that the supplicant authenticates against.
    292
    Which device initiates 802.1X authentication process?
    Either the supplicant with an EAPoL-Start message or the authenticator with an EAPoL-Request-Identity message.
    293
    How does the supplicant communicate with the authenticator?
    Using EAP over LAN (EAPoL)
    294
    What can be used to authenticate a device that does not support 802.1X?
    Mac Address Bypass (MAB) or WebAuth
    295
    How does Mac Address Bypass work?
    When the authenticator prompts the end device with EAP Request-Identity message and the supplicant doesn’t respond, after a timeout, the authenticator forwards the MAC address of the end device to the authentication server. The authentication server then checks the MAC address against its MAB list and either grant or deny access.
    296
    How does WebAuth work?
    The end device is allowed access to a web server and redirected there. The user can then input their credentials on a web page to authenticate and receive network access.
    297
    What are the two WebAuth options available for Cisco devices?
    • Local Web Authentication (LWA) - the switch hosts the web server and redirects HTTP/HTTPS traffic to it. Credentials input via WebAuth are sent to the Radius server, which then either grants or denies access. Little customisation is possible. No VLAN assignment possible. dACL is possible.
    • Central Web Authentication (CWA) - Uses Cisco ISE. Switch initiates MAB, Cisco ISE responds with an URL hosted on itself. HTTP/HTTPS traffic is redirected to this URL where the end user can authenticate via a web browser. VLAN assignment and dACL are possible.
    298
    What is Enhanced FlexAuth?
    An enhancement to NAC using MAB or WebAuth that eliminates the wait before 802.1X authentication times out and alternative methods are tried. It allows setting MAB as the first method, with 802.1X configured as either a fallback or the priority method.
    299
    What is Cisco Identity-Based Networking Services (IBNS) 2.0?
    It's an integrated NAC solution using the following components:
    • Cisco ISE
    • Common Classification Policy Language (C3PL)
    • Enhanced FlexAuth
    In some contexts, it's a synonym of Common Classification Policy Language (C3PL) new-style 802.1X configuration.
    300
    What is Common Classification Policy Language (C3PL)?
    It's a new style of 802.1X configuration. If any IBNS 2.0/C3PL command is used, the configuration mode will be permanently switched - the only option to go back is to boot with a startup-config with legacy configuration (either by reloading before writing changes or by copying an appropriate startup-config and then reloading).
    301
    What is Cisco TrustSec?
    It's a policy plane solution using Scalable Group Tags (SGT) to assign devices to groups that then determine the access policies applied to them.
    302
    How many possible SGT values are there?
    16 bits = 65536 values
    303
    How can SGTs be assigned?
    • Dynamically - Cisco ISE assigns a tag depending on the outcome of the authentication process.
    • Statically - SGT mapped statically to IPs, subnets, VLANs, interfaces etc.
    304
    How can SGTs be propagated inline?
    SGT is embedded in custom Cisco Meta Data (CMD) field in Ethernet header. This requires hardware support from each forwarding device, otherwise the frame will be dropped.
    305
    How does SXP Propagation work?
    Devices exchange IP-to-SGT mappings using SXP. An SXP-Speaker sends updates to SXP-Listeners (which in turn can act as speakers for other listeners if the connection is multi-hop). SXP can work together with inline tagging, bridging gap where there is no support for the inline tags.
    306
    Where do SGTs take effect?
    On the egress of a TrustSec network, where they decide whether traffic should be allowed or dropped.
    307
    How can SGTs be applied to traffic?
    Using either of the two:
    • Security Group ACL (SGACL) - Distributed by Cisco ISE and installed on routers and switches
    • Security Groupd Firewall (SGFW) - FW rules referencing SGTs and defined locally on the FW.
    308
    What is MACsec?
    MACsec is a protocol for Layer 2 data enryption and authentication. Ethernet frames are encrypted on the wire and decrypted at each hop, so that relevant header fields can be read, and their values used for forwarding decisions.
    309
    What is the frame format used by MACsec?
    MACsec adds a 16-byte 802.1AE header after the source MAC field, and a 16-byte Integrity Check Value at the end, before CRC, which provides authentication. Only destination MAC, source MAC and CRC remain unencrypted. The whole frame is authenticated.
    310
    What are the two modes of operation for MACsec?
    • Authentication using Galois Method Authentication Code (GMAC)
    • Encryption+authentication using Galois/Counter Mode AES (GCM-AES)
    311
    What are the keying mechanisms for MACsec?
    • Security Association Protocol (SAP) - Cisco proprietary, used only between switches (uplink MACsec)
    • MACsec Key Agreement (MKA) - Open standard, used both between switches (uplink MACsec) and between the edge switch and end device (downlink MACsec)
    312
    How are dACLs applied?
    As Port ACLs (PACL)
    313
    What layer does a Port ACL operate on?
    Either layer 2 or layer 3
    314
    How to configure a layer 2 PACL?
    1. (config)# mac access-list {standard | extended} acl-name
    2. (config-ext-macl)# {deny | permit} source destination
    3. (config-if)# mac access-group acl-name {in | out}
    315
    What are the steps to apply a VACL?
    1. Define an ACL to match IP or Ethernet traffic
    2. Create a VLAN access map to match ACL with an action (forward or drop)
    3. Apply the VLAN access map to a VLAN
    316
    What are the commands to apply VACL?
    • (config)# vlan access-map name seq
    • (config-access-map)# match {ip address {acl-number | acl-name} | mac address acl-name}
    • (config-access-map)# action {forward | drop} [log]
    • (config)# vlan filter access-map-name vlan-list list - the list can be a single number, a range, or several comma-separated numbers and ranges
    317
    If multiple ACLs are applied to the same switched traffic, in what order are they evaluated?
    1. Inbound PACL
    2. Inbound VACL
    3. Outbound VACL
    318
    If multiple ACLs are applied to the same routed traffic, in what order are they evaluated?
    1. Inbound PACL
    2. Inbound VACL
    3. Inbound RACL
    4. Outbound RACL
    5. Outbound VACL
    319
    How to disable exec timeout?
    (config-line)# exec-timeout 0 0
    or
    (config-line)# no exec-timeout
    320
    What are the 3 ways to authenticate users on a Cisco device?
    • Passwords configured directly on lines - not recommended
    • Local usernames and passwords - recommended as fallback
    • AAA - recommended as the primary method
    321
    How to configure a password directly on a line?
    • (config-line)# login - enable password checking for the specified line
    • (config-line)# password {[0] password | 7 encrypted-string} - specify password. It will be stored in cleartext unless (badly) encrypted if service password-encryption is enabled.
    322
    What port is used for WLC Discovery Broadcast?
    UDP 5246
    323
    What are the default zones in a zone-based firewall (ZBFW)?
    • Self-zone - contains the device’s own IPs. Any host-inbound or host-outbound traffic will cross this zone’s boundary.
    • Default zone - all interfaces that are not explicitly assigned to another zone. Default zone needs to be explicitly enabled, otherwise all traffic to and from interfaces not assigned to a zone is dropped.
    324
    What are the necessary steps for ZBFW configuration?
    1. Create zones
    2. Assign interfaces to zones
    3. Create inspection class-maps to classify traffic
    4. Create inspection policy-maps to define actions for each traffic class
    325
    What actions are available for ZBFW?
    1. drop [log]
    2. pass [log]
    3. inspect
    326
    What does pass action do in ZBFW?
    It allows traffic unidirectionally, without creating an FW session. A separate rule is required for return traffic.
    327
    What does inspect action in ZBFW do?
    It forwards the packet and creates an FW session, so that return traffic is allowed
    328
    What is Control Plane Policing (CoPP)?
    CoPP is a mechanism used to rate-limit host-inbound traffic that is punted to the control plane in order to avoid overloading CPU. CoPP uses class-maps to classify inbound traffic and a single policy-map called POLICY-CoPP to define thresholds and actions in response to threshold violation.
    329
    What is Management Plane Protection?
    It's a mechanism that restricts the interfaces and protocols over which remote administration can be performed.
    330
    Does an interface configured with Management Plane Protection forward other types of traffic?
    Yes, transit traffic is unaffected. MPP only filters host-inbound management traffic.
    331
    What is the syntax for Management Plane Protocol (MPP)?
    (config)# management-interace ifname allow protocol [protocol…]
    332
    What happens when Management Plane Protection is configured?
    All host-inbound management traffic that is not explicitly allowed is rejected.
    333
    5 examples of container systems:
    • Docker
    • LXD
    • rkt
    • Linux-VServer
    • Windows Containers
    334
    What is Network Function Virtualisation (NFV)?
    An architectural framework and set of standards to systematise network virtualisation maintained by European Telecommunications Standards Institute (ETSI).
    335
    What is a Virtual Network Function (VNF)?
    Virtualised devices performing layer 3 (routing), layer 4 (FW, loadbalancing) and layer 7 (NGFW, loadbalancing).
    336
    What is Network Function Virtualization Infrastructure (NFVI)?
    The whole environment in which VNFs are deployed.
    337
    What I/O virtualisation methods are available to minimise overhead?
    • Open vSwitch Data Plane Development Kit (OVS-DPDK)
    • PCI passthrough
    • Single-root I/O virtualisation (SR-IOV)
    338
    How does Open vSwitch Data Plane Development Kit (OVS-DPDK) work?
    A special DPDK Poll Mode Driver polls for data incoming on a pNIC and punts it directly to user space, eliminating the need for an interrupt and a context switch.
    339
    How does PCI Passthrough work?
    VMs access PCI devices, including pNICs directly. This creates a one-to-one mapping between a VM/VNF and a pNIC, which means the pNIC is dedicated to the VNF and cannot be accessed by either the host OS or other VMs
    340
    How does Single-root I/O virtualisation (SR-IOV) work?
    Multiple virtual NICs (called virtual functions, VF) are emulated on top of a pNIC (called a physical function, PF) and are assigned to VMs/VNFs which access them as in PCI passthrough. Traffic between VFs has to be switched either internally or by an external switch.
    341
    What is a Virtual Ethernet Bridge (VEB)?
    Switching solution for SR-IOV in which switching is performed by the pNIC itself.
    342
    What is Virtual Ethernet Port Aggregator (VEPA)?
    Switching solution for SR-IOV in which switching is performed by an external switch.
    343
    What is Cisco Enterprise Network Functions Virtualization (ENFV)?
    Cisco ENFV is a virtualisation solution that simplifies management and maintenance of virtualised network.
    344
    What are the components of Cisco ENFV?
    • Hardware layer - x86-based physical hardware that runs other components. Cisco offers tailor-made hardware packages:
    • Network Functions Virtualization Infrastructure Software (NFVIS) - Linux-based OS that provides virtualisation and works with orchestration, management and monitoring software.
    • VNF - Both Cisco (vISR, ASAv, NGFWv, vEdge, cEdge, vWAAS, vWLC) and third party
    • Management and Orchestration (MANO) - provided by Cisco DNA Center
      345
      What hardware can Cisco ENFV run on?
      • Enterprise Network Compute System (ENCS)
      • Cisco 4000 Series ISR + UCS E-Series
      • UCS C-Series
      • Cisco Cloud Services Platforms
      346
      What data format does NETCONF use?
      XML
      347
      What transport does NETCONF use?
      SSH or TLS with X.509 authentication
      348
      What operations are available for NETCONF?
      • - request running configuration and device’s state
      • - request all or part of configuration from a datastore
      • - Edit configuration on a datastore
      • - Copy configuration to another data store
      • - Deletes configuration from a datastore
      349
      What is YANG?
      YANG (Yet Another Next Generation) is a modelling language. It is used to create hierarchical data models that describe elements of a device’s configuration, objects that can be modified, actions that can be performed etc.
      350
      What needs to be done for EEM scripts to work with AAA?
      If authorisation is enabled, one need to specify the user to execute CLI commands in an EEM script, otherwise they will fail:
      (config)# event manager session cli username username
      351
      What are the agentless automation tools?
      • Ansible
      • Salt SSH
      • Puppet Bolt
      352
      Which automation tools use agents?
      • Puppet
      • Salt
      • Chef
      353
      What is the configuration language for Ansible?
      YAML
      354
      What is the configuration language for Salt?
      YAML
      355
      What is the configuration language for Puppet?
      Custom Ruby-based domain-specific language
      356
      What is the configuration language for Chef?
      Ruby
      357
      What is the default MSS for traffic originating from Cisco devices?
      536 bytes for remote destinations, 1460 bytes for local LAN.
      358
      How to set the MSS for traffic originating from a Cisco device?
      (config)# ip tcp mss bytes
      359
      How to adjust the MSS for transit traffic?
      (config-if)# ip tcp mss-adjust bytes
      360
      How many APs can a centralised or cloud-based WLC support?
      6000
      361
      How many clients can a centralised or cloud-based WLC support?
      64000
      362
      How many APs can a distributed WLC support?
      250
      363
      How many clients can a distributed WLC support?
      5000
      364
      How many APs can an embedded WLC support?
      250
      365
      How many clients can an embedded WLC support?
      2000
      366
      Which LACP system priorities are better?
      Lower is better
      367
      What are the basic steps to configure MST?
      • (config)# spanning-tree mode mst - enable MSTP
      • (config)# spanning-tree mst configuration - enter MSTP configuration mode
      • (config-mst)# name region-name - configuration name for the MST region
      • (config-mst)# revision no - Configuration revision for the MST region
      • (config-mst)# instance msti vlan vlan-list - associate VLANs with MSTI
      368
      How to set MSTP bridge priority?
      (config)# spanning-tree mst msti root {primary | secondary} - set priority to make switch primary or secondary root
      or
      (config)# spanning-tree mst msti priority value - set priority
      369
      How to enable BPDU by default on all access ports?
      • (config)# spanning-tree bpduguard default
      370
      How to toggle BPDU Guard on a specific interface?
      • (config)# spanning-tree bpduguard {enable | disable}
      371
      Static NAT configuration
      • (config-if)# ip nat inside – declare the interface to be on the internal network
      • (config-if)# ip nat outside – declare the interface to be on the outside
      • (config)# ip nat inside source static inside_local inside_global – create a static mapping. This command needs to be issued separately for each mapping.
      372
      Dynamic NAT configuration
      • (config-if)# ip nat inside – declare the interface to be on the internal network>
      • (config-if)# ip nat outside – declare the interface to be on the outside
      • (config)# ip access-list {acl_number | acl_name} rule – create/populate an ACL to specify which inside local addresses can use NAT
      • (config)# ip nat pool pool-name first-address last-address netmask subnet-mask – define a range of inside global addresses to use. Netmask is used only for verification: if the address range does not fit the subnet as determined by netmask, the command is rejected.
      • (config)# ip nat inside source list {acl_number | acl_name} pool pool-name – enable dynamic NAT and allow mappings between inside local addresses permitted by the specified ACL and inside global addresses in the pool
      373
      NAT overload configuration
      • (config-if)# ip nat inside – declare the interface to be on the internal network
      • (config-if)# ip nat outside – declare the interface to be on the outside
      • (config)# ip access-list {acl_number | acl_name} rule – create/populate an ACL to specify which inside local addresses can use NAT
      • (config)# ip nat inside source list {acl_number | acl_name} interface ifname overload – allow dynamic mappings between inside local addresses, permitted by the specified ACL, and ports and the inside global interface ifname and its ports.
      374
      What is 802.11v?
      WiFi power-saving standard
      375
      What is 802.11r?
      Fast Transition roaming standard
      376
      What is 802.11w?
      Wireless management frame protection standard
      377
      What is 802.11k?
      Assisted wireless roaming standard
      378
      What is the order of DHCPv6 messages?
      1. Solicit
      2. Advertise
      3. Request
      4. Reply
      379
      What is the range for numbered standard IP ACLs?
      1-99, 1300-1999
      380
      What is the range for numbered extended IP ACLs?
      100-199, 2000-2699
      381
      What is the range for numbered MAC ACLs?
      700-799
      382
      What is the AD of RIPv2
      120
      383
      What is the AD of IS-IS
      115
      384
      Which OSPF network types require manual neighbor configuration?
      Non-broadcast and point-to-multipoint non-broadcast
      385
      Which OSPF network types perform DR/BDR election?
      Broadcast and non-broadcast
      386
      What are the default OSPF timers for broadcast network?
      Hello - 10s
      Dead - 40s
      387
      What are the default OSPF timers for point-to-point network?
      Hello - 10s
      Dead - 40s
      388
      What are the default OSPF timers for non-broadcast network?
      Hello - 40s
      Dead - 120s
      389
      What are the default OSPF timers for point-to-multipoint network?
      Hello - 40s
      Dead - 120s
      390
      What are the default OSPF timers for point-to-multipoint non-broadcast network?
      Hello - 40s
      Dead - 120s
      391
      What is NTP static client mode?
      The host queries the NTP server for time and also acts as a server for other clients.
      392
      How to enable NTP static client mode?
      (config)# ntp server {address | hostname}
      393
      What is an NTP broadcast client?
      Host passively listens to NTP broadcasts from NTP servers to adjust its own clock. Less accurate than querying the server.
      394
      How to configure NTP broadcast client?
      On an interface:
      (config-if)# ntp broadcast client
      395
      How to configure NTP standalone server?
      (config)# ntp master [stratum] – default stratum 8
      396
      What is NTP symmetric active mode (AKA peer mode)?
      Two or more devices synchronise their clocks with each other.
      397
      How to configure NTP peer mode?
      (config)# ntp peer {address | hostname}
      398
      What is the configuration syntax for NTP access lists?
      (config)# ntp access group [ipv4 | ipv6] {peer | query-only | serve | serve-only} access-list [kod]
      399
      How to enable a switchport in a mode that initiates DTP negotiation?
      (config-if)# switchport mode dynamic desirable
      400
      How to enable a switchport in a mode that passively waits for the other side to begin DTP negotiation?
      (config-if)# switchport mode dynamic auto
      401
      What combination of switchport modes (access, trunk, dynamic) will cause a link to fail?
      Trunk on one end, access on the other
      402
      What mode will be negotiated if one switchport on a link is set to trunk and the other to dynamic auto?
      Trunk
      403
      What mode will be negotiated if one switchport on a link is set to access and the other to dynamic desirable?
      Access
      404
      What mode will be negotiated if both switchports on a link are set to dynamic auto?
      Access
      405
      What mode will be negotiated if both switchports on a link are set to dynamic desirable?
      Trunk
      406
      How to configure OSPF passive interface?
      (config-router)# passive-interface ifname
      407
      How to configure EIGRP stub router?
      (config-router)# eigrp stub [receive-only] [leak-map map-name] [connected] [summary] [static] [redistributed]
      408
      Which features make IS-IS suitable for SD-Access underlay
      Performance
      Protocol-independent neighbour relationships
      Can carry routing information for multiple protocols
      Can form neighbour relationships using loopback addresses