Network Assurance Flashcards

1
Q

CAPWAP ports

A

5246-5247

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CAPWAP - Control Channel Traffic Port

A

5246

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAPWAP - Data Channel Traffic Port

A

5247

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TFTP Port

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Port can AP’s use to transfer data files

A

TFTP - Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port is used by mobility communications

A

16666-16667

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mobility Communications Port - 16666

A

Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobility COmmunications Port - 16667

A

Not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NETCONF SSH Subsystem Port

A

830

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of credentials are configured on Access Points to ensure those credentials are avalaible everywhere?

A

Global Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can you override global credentials for a specific Cisco IOS AP?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cisco AP DHCP Option

A

43

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cisco AP DNS option

A

cisco-capwap-controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What broadcast address does a Cisco AP use to find a WLC?

A

255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does (order) an AP learn about WLC@s

A
  1. DHCP option 43 (good for global companies where offices and controllers are on different continents).
  2. DNS entry for cisco-capwap-controller (good for local businesses - can also be used to find where brand new APs join) If you use CAPWAP, make sure there is a DNS entry for cisco-capwap-controller.
  3. Management IP addresses of controllers the LAP remembers previously.
  4. A Layer 3 broadcast on the subnet.
  5. Statically configured information.
  6. Controllers present in the mobility group of the WLC the AP last joined.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

“DHCP option 43 is used by large companies to localize the information by the DHCP. This method is used by large enterprises that have a single DNS suffix. For example….” give an example

A

Cisco owns buildings in Europe, Australia, and the United States. In order to ensure that the LAPs only join controllers locally, Cisco cannot use a DNS entry and must use DHCP option 43 information to tell the LAPs what the management IP address of their local controller is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who created CAPWAP

A

IETF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CAPWAP is based

A

Lightweight Access Point Protocol (LWAPP) but adds additional security with Datagram Transport Layer Security (DTLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAPWAP IPv4 Protocol Number

A

17 - uses UDP ports 5246 (control) and 5247 (data)

20
Q

In an AP Split MAC architecture the following are examples of use cases performed by what?
802.11 authentication
802.11 association and re-association (mobility)
802.11 frame translation and bridging
802.1X/EAP/RADIUS processing
Termination of 802.11 traffic on a wired interface, except in the case of FlexConnect APs (discussed later in this guide)

A

The AP itself

21
Q

What certificate does AP’s use for certificates when forming initial DTLS tunnels?

A

Manufacturing Installed Certificate (MIC)
Installed by cisco when shipped

22
Q

What type of security archtiecture facilitates this VPN?

A

FlexConnect

23
Q

What message types facilitate an inter-subnet WLC controller roam?

A

Mobiliy

24
Q

In a Cisco WLC with full Mobility setup - does a inter-subnet controller roam result in a client IP address change?

A

No - WLC setup an “ANchor” original and “Foreign” entry in both WLC CLient Databases
User keeps original IP and “Foreign” client database tunnels traffic to anchor database

25
Q

Cisco preferred redundancy model for WLC’s

A

N+1

26
Q

Do backup WLC’s require liences

A

YEs

27
Q

WHat port do WLC’s use to perform Stateful Switchover Wireless Controller Redundancy

A

REdundancy port

28
Q

If a port says lineprotocol down (monitoring) - what does this mean

A

Port is a SPAN destination port

29
Q

What Layer 3 switching technology must be enabled for Netflow to export records?

A

CEF

30
Q

Does a version incomatibility affect showing local Netflow stats?

A

No

31
Q

Is Netflow Version 9 backward compatible with other versions?

A

No

32
Q

Are all netflow versions backwards compatible

A

Yes - apart from 9

33
Q

What three (transport) protocols can a SYSLOG message be sent using

A

TCP
UDP
BEEPS

34
Q

Syslog - what port is when when connecting via TLS

A

6514

35
Q

If BPDU Guard is enabled, do root ports get err-disabled when a BPDU is received?

A

No

36
Q

What enviroment is CIsco OfficeExtend used for? What is it?

A

AP’s used to extend corporate WLAN into users home

37
Q

With Cisco OfficeExtend what protocol is used to provide securty between office and home?

A

DTLS

38
Q

What command would enable the feature circled in red in SNMP?

A

service sequence-numbers

39
Q

To configure a client to use a particualr key with a server what command should be used

A

ntp server <server_ip> key <key_id></key_id></server_ip>

40
Q

In NTP what command is used to define the authentication key?

A

ntp authentication-key <number> md5 <key></key></number>

41
Q

Specifies one or more keys that a time source must provide in its NTP packets in order for the device to synchronize to it

A

ntp trusted-key

42
Q

What enables NTP authentication?

A

ntp authentication command

43
Q

Difference ntp authentication-key and ntp trusted-key

A

ntp authentication-key used to define keys that are presented

ntp trusted-keys are used to define keys that are accepted

44
Q

Syslog - TLS Port and Protocol

A

TCP 6514

45
Q

Syslog - DTLS Port and Protocol

A

UDP 6514