review Flashcards
What happens when the max number of allowed MAC addresses is reached?
The port is shut down
Role Based CLI
define views to different set of exec commands. These views restrict CLI access
Access Lists mask type?
wildcard /30 = 0.0.0.3
IPv6 ACLs : What type?
Extended only
Warning Syslog?
4 - Warn
Emergencies Syslog
0
Alert Syslog
1 l for alert
error Syslog
3 for 3 rrrs
notification syslog
5 for no ti fi ca tion
informational syslog
6 for in for ma tio nal
debugging syslog
7 bugs
What is ISE?
Integrated Service Engine
-part of the BYOD solution. Identity and Access control policy - checks computer before getting on the network
What is ACS?
Access control Server - used for authenticating and store users and passwords.
Used with TACACS+ and RADIUS
What does the “aaa new-model” command do?
Enables the configuration of the rest of the AAA
How to connect to a ACS Server?
tacacs-server host #.#.#.# mypassword
image resilience feature?
ios image file invisible from show flash command
Retire/Unretire
unretire = compile/use signature / retire = do not use/compile
secure boot-config
takes a snapshot of running config and securely archives it
public keys on routers
verifies digital signature of IPS signature file
zone pairs
aaaa
show crypto session
shows phase 1 & phase 2 sessions of IPSec
features of TACACS+
separates AAA / encrypts body of every packet
What can attack CDP?
DoS
ACL position
as close to the source traffic