Mod 10 Day 1 Flashcards
What are the five principles of network management
Configuration management Accounting / administration Management Fault management Performance Management Security Management
Documents and controls Network changes for equipment hardware and software throughout the network’s life cycle. This exist in software hardware programming and security
Configuration management
This gathers usage statistics for billing and accounting purposes it also tracks users, their passwords, permissions, operations of network equipment, and backups
Accounting / administration Management
This detects, runs diagnostic test, isolates, and corrects Network faults to include error log maintenance.
Fault management
Encompasses the evolution and reporting of network equipment functionality, gathers and maintains historical logs of statistical information
Performance Management
Protects a network from unauthorized access,keeps users from creating or deleting Services relevant to control information and protects functions that control the distribution of cryptographic keying
Security Management
What are the three layers of the Cisco hierarchical model
Core layer
Distribution layer
Access layer
The only purpose of this layer is to transport data as fast as possible
Core layer
This layer provides routing, filtering, and access to the WAN
Distribution layer
This layer controls access to intra-network resources, which are usually locally available to users if remote access is needed the distribution layer handles that traffic
Access layer
What two files do Cisco routers and switches rely on to run
Cisco internetwork operating system IOS
CONFIGURATION (startup-config)
This is only accessible from a terminal connected directly to the CONSOLE PORT of the device. Physical security.
ROM Monitor (ROMMON)
This command list hardware and software version information
Show version
This command shows the current status of all interfaces including any virtual interfaces
Show IP interface brief
Provides detailed information about the interfaces, including encapsulation, Mac address, bandwidth, duplex, IP address, and DCE/DTE setting
Show interface
What is used to learn an address each time a device communicates with another host and the physical address / Mac address is required
Address resolution protocol ARP
This command will reveal all devices with which the router has communicated
Show arp
What are the three iOS access methods
Console port
Auxiliary port
VTY lines
Local, command line access through a terminal emulation program
Console port
Remote, command line access through a modem, it can also be used as a console port
Auxiliary port
Remote, logical access using application layer protocols such as telnet or SSH
VTY lines
Provides access to basic monitoring commands and is used to view statistics. Level 0-1
Router>
User exec
Provides access to all other router commands, accessed with the enable command. Level 2-15
Router#
Privileged exec
This command is used to verify access levels
Show privilege