review Flashcards
What happens when the max number of allowed MAC addresses is reached?
The port is shut down
Role Based CLI
define views to different set of exec commands. These views restrict CLI access
Access Lists mask type?
wildcard /30 = 0.0.0.3
IPv6 ACLs : What type?
Extended only
Warning Syslog?
4 - Warn
Emergencies Syslog
0
Alert Syslog
1 l for alert
error Syslog
3 for 3 rrrs
notification syslog
5 for no ti fi ca tion
informational syslog
6 for in for ma tio nal
debugging syslog
7 bugs
What is ISE?
Integrated Service Engine
-part of the BYOD solution. Identity and Access control policy - checks computer before getting on the network
What is ACS?
Access control Server - used for authenticating and store users and passwords.
Used with TACACS+ and RADIUS
What does the “aaa new-model” command do?
Enables the configuration of the rest of the AAA
How to connect to a ACS Server?
tacacs-server host #.#.#.# mypassword