SD WAN Flashcards

1
Q

Legacy networks run on expensive hardware such as routers and switches, which require time-consuming configuration and maintenance. In addition, these networks require expensive transport connections or carrier circuits to secure and segment the network. These carrier circuits might also not offer the bandwidth that is now required by users and modern applications hosted in private or public data centers.

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Legacy networks operate on the old model of a distributed control plane, which means that every node in the network must be configured with routing and security rules. Remote site management, change control, and network maintenance represent major logistical challenges.

A

Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Legacy networks that run on dedicated carrier circuits depend on the carrier to install new circuits, which can take several months. This process can dramatically delay the launch of new branch locations.

A

Lengthy installation times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legacy networks that run on carrier circuits sacrifice control to the ISP, from network design to configuration to monitoring. Requesting changes from the ISP also requires extra time and is prone to communication errors.

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Legacy networks typically backhaul all branch traffic to the main data center for inspection and filtering. However, with advancements in cloud technologies, and wider adoption of cloud-delivered services, traffic flows have changed, with more traffic now being destined to the internet. This means that backhauling all traffic through a centralized security stack is no longer efficient. Backhauling traffic in this way increases latency and can decrease the user’s overall quality of experience.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legacy networks require complex end-to-end quality of service (QoS) configurations to ensure business-critical applications are prioritized. Manually updating or modifying these configurations is a lengthy process that can be error-prone.

A

Application Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Every router at the edge of a network has two sides for routing

A

WAN and LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One to the transport network

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service side of the network

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Cisco SD-WAN network fabric, also called an ______ network, forms a software overlay that runs over standard network transport services, including the public Internet, MPLS, 5G/LTE, and satellite.

A

Overlay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ and ______ advertisements to establish and maintain the flow of traffic throughout the network.

A

Routing, Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ segmentation using virtual routing and forwarding (VRF), to isolate various flows of traffic

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ to ______concepts for setting up and maintaining bidirectional connections between pairs of protocol entities.

A

Peer, Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On-premises and cloud security options, as well as ______ plane and _______ plane authentication and encryption.

A

Data, Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______ for routing and data traffic.

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ connectivity options supporting a range of transports.

A

Flexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Simplified management via a single pane of ______ platform.

A

Glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cisco SD-WAN network separates the data plane from the control plane and _______ much of the routing that used to require dedicated hardware.

A

Virtualizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Centralized controllers, called ______ controllers, oversee the control plane of the Cisco SD-WAN fabric, efficiently managing provisioning, maintenance, and security for the entire Cisco SD-WAN overlay network.

A

vSmart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

______ orchestrator, automatically authenticates all other Cisco SD-WAN devices when they join the Cisco SD-WAN overlay network.

A

vBond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ______ plane manages the rules for routing traffic through the overlay network, and the data plane passes the actual data packets among the WAN Edge devices.

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cisco _______ provides a simple, yet powerful, set of graphical dashboards for monitoring network performance on all devices in the overlay network, from a centralized monitoring station.

A

vManage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ______ network carries packets from one WAN Edge device to another.

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The ______ protocol is enabled by default and runs over each of these tunnels, detecting loss, latency, jitter, and path failures.

A

Bidirectional Forwarding Detection (BFD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
The WAN Edge routers securely communicate to other WAN Edge routers using ______ tunnels over each transport.
IPsec
24
_______ runs between vSmart controllers and between vSmart controllers and WAN Edge routers where control plane information, such as route prefixes, next-hop routes, crypto keys, and policy information, is exchanged over a secure DTLS or TLS connection.
Overlay Management Protocol (OMP)
25
______ is the transport VPN.
VPN 0
26
______ is the management VPN.
VPN 512
27
_______ contains the interfaces that connect to the WAN transports.
VPN 0
28
_______ carries the out-of-band management traffic to and from the Cisco SD-WAN devices.
VPN 512
29
Secure sessions with the controller are set up automatically, using ______ and certificate infrastructure.
RSA
30
The _______ centrally influences access control; that is, it determines which prefixes are allowed to talk to each other inside a VPN.
Controller
31
The _______ optimizes user experience by influencing transport link choice based on _______ or other attributes
Controller, service-level agreement (SLA)
31
The ______ can centralize services such as firewalls, identity provider (IdPs), and intrusion detection systems (IDSs).
Network
32
_______ facilitates the mutual discovery of the control and management elements of the fabric by using a zero-trust certificate-based allowed list model.
Cisco vBond orchestrator
33
For situations in which Cisco vSmart controllers, the Cisco vManage system, or the WAN Edge routers themselves are behind the ______, the Cisco vBond orchestrator facilitates the function of ______ traversal, by allowing the learning of public (post-___) and private (pre-___) IP addresses.
Network Address Translator (NAT)
34
Cisco vSmart controllers facilitate fabric discovery by running ___ among themselves, and between themselves and the WAN Edge routers.
OMP
35
Cisco vSmart controllers facilitate fabric discovery by running ______ among themselves, and between themselves and the WAN Edge routers.
Overlay Management Protocol
36
Control _______ acting on the control plane information are locally enforced on the Cisco vSmart controllers.
Policies
37
The use of a centralized control plane dramatically reduces the control plane load traditionally associated with building large-scale IPsec networks, solving the _______complexity problem.
n^2
38
When delivered as a cloud service, Cisco vSmart controllers are ______ hosted in the Cisco cloud.
Redundantly
39
Cisco vManage provides the single pane of _______ for day-0, day-1, and day-2 operations.
Glass
40
The Cisco vManage GUI allows segregated administrative access by implementing ______ for proper roles and responsibilities.
Role-based access control (RBAC)
41
Performance statistics can be exported into external systems or to Cisco ______ tool for further processing and closer examination.
vAnalytics
42
______ is a TCP-based, highly scalable control plane protocol that unifies all control plane functions under the single protocol umbrella.
Overlay Management Protocol
43
OMP operates inside bidirectionally certificate-authenticated _____ or Datagram Transport Layer Security (DTLS) connections established among the Cisco vSmart controllers and between the Cisco vSmart controllers and the WAN Edge routers.
Transport Layer Security (TLS)
44
By using the concepts of ______ families and route attributes, OMP advertises all pertinent control plane information between the WAN Edge routers to establish direct IPsec communication between the WAN Edge routers without relying on Internet Key Exchange (IKE) protocol.
Address
45
The use of OMP and Cisco vSmart controllers creates a ________ control plane in which WAN Edge routers establish control plane connectivity only to a handful of Cisco vSmart controllers and not to every other WAN Edge router in the topology.
linear-complexity
46
Data plane and application-aware routing policies are implemented on the ______ routers.
Wan Edge
47
WAN Edge routers export performance statistics, and alerts and events to a centralized Cisco ______ system for a single point of management.
vManage
48
WAN Edge routers use OSPF, EIGRP and BGP routing protocols for learning ______ information from service (LAN)–side interfaces and for pre-existing network integration with non-SD-WAN sites.
Reachability
49
For _______ redundant service (LAN)–side interfaces, WAN Edge routers implement Virtual Router Redundancy Protocol (VRRP) first-hop redundancy protocol, which can operate on a per-VLAN basis.
Layer 2
50
_______ deployment relies on the use of signed certificates installed in the onboard Trusted Platform Module (TPM) to establish a unique router identity
Zero-touch
51
The ______ l form factor can be deployed in public clouds, such as AWS and Microsoft Azure, or as an Cisco Enterprise Network Virtualization (Enterprise NFV) on the vCPE/uCPE platforms using Kernel-based virtual machine (KVM) or ESXi hypervisors.
Virtual
52
The Cisco vEdge Cloud is a ______ version of the WAN Edge router, inheriting all the capabilities offered on the Cisco physical branch routers
virtualized
53
The Cisco vEdge Cloud can be used as a virtual network function (VNF) for a virtual customer-premises equipment (vCPE) _______ at the branch.
deployment
54
The controllers can be deployed ______ or in a hosted environment
on-premises
55
The centralized Cisco ______ controllers oversee the control plane of the Cisco SD-WAN fabric...
vSmart
56
_______ orchestrator automatically authenticates all other Cisco SD-WAN devices in the overlay network.
vBond
57
_______ is a centralized network management system for all overlay network components.
vMnanage
58
The ______ pane, which runs across the top of the Monitor Overview screen, displays the number of Cisco vBond, Cisco vSmart, and Cisco vManage controllers.
Device
58
_______ displays the number of WAN Edges in the overlay network.
Device
59
______ pane displays the total number of reboots in the last 24 hours for all devices in the network, including soft and cold reboots and reboots that occurred as a result of power-cycling a device.
Reboot
60
_______ tab to list all the system IP and hostname of the device on which the _______ occurred, the ______ index, and the core time and filename.
Crash
61
______displays the hostname and system IP of the device on which the ______ is installed, the ______ serial number, and its expiration date and status.
Certificate
62
The WAN Edge ______ pane indicates whether WAN Edge devices are connected to the required number of Cisco vSmart controllers.
Health
63
When a site has multiple WAN Edge routers, ______ pane displays the state for the entire site, not for individual devices
BFD Connectivity
64
Monitor > Devices > Device 360 screen or the Tools > ______ l screen.
SSH Terminal
65
The WAN Edge ______ pane provides four counts.
Inventory
66
Total number of WAN Edge routers whose authorized serial number has been uploaded on the Cisco vManage server.
Configuration > Devices
67
Total number of authorized WAN Edge routers in the overlay network.
Configuration > Certificates > WAN Edge List
68
These routers are marked as Valid and are now operational in the network.
Deployed
69
You can configure these routers at a staging site before shipping them to the actual branch and making them a part of the overlay network.
Staging
70
The _______ Health pane displays the aggregated average loss, latency, and jitter for all links and all combinations of colors (for example, all LTE-to-LTE links and all LTE-to-3G links).
Transport
71
_______ pane shows the 10 tunnels with the greatest average loss over the last 24 hours.
Application-Aware Routing
72
In the WAN Edge list, click on the More options icon to access ______ device information
Real Time
73
Use the _______ Terminal screen to establish an ______ session to a Cisco SD-WAN device.
SSH
74
These are routers marked as Valid in the Configuration > Certificates > ______ page
WAN Edge List
75
The Monitor > Devices > ______ window for the vSmart controller is displayed and shows the vSmart Control Connections by default.
Device 360
76
From the left side menu select ________ to view interface statistics.
Interface
77
By default, the Device Options search field displays System Information, which includes the device's hostname, site ID, and other information.
Real Time
78
In the Device Options search field, select ______.
Interface Detail
79
Select ________ in the Select Filter popup window.
Do Not Filter
80
Click on ______ in the top-left corner of the page to return to the main Monitor > Overview dashboard.
Cisco SD-WAN
81
At the vSmart command prompt, issue the ______ command.
Show System Status
82
The output of the ______ command displays interface configuration and statistics.
Show Interface
83
At the Monitor > Devices dashboard, click on the ______ Hostname to open the Monitor > Devices > Device 360 dashboard.
DC-Edge2
84
The Monitor > Device > Device 360 > _______ window for the vBond is displayed by default.
Control Connections
85
From the menu on the left, choose Troubleshooting. The Connectivity and Traffic panes will be displayed. Click _______ to choose that connectivity tool.
Ping
86
Destination IP Address: _______
172.16.0.101
87
VPN: ______
VPN–0
88
Source/Interface for VPN - 0: _______
ge0/0 – ipv4–192.168.66.3
89
Click Advanced Options. Enter ___ for the Count
10
90
To provide the highest level of security, only authenticated and authorized devices are allowed access to and participation in the _______ overlay network
Cisco SD-WAN
91
The ______ controller performs automatic authentication on all WAN Edge routers before they can send any data traffic over the network.
vBond
92
For vBond orchestrators and vSmart controllers, a network administrator must download the necessary authentication-related files from Cisco _______, and then these devices automatically receive their configurations from Cisco _______.
vManage
93
For WAN Edge hardware routers, after they boot up, they are authenticated on the network and receive their configurations automatically from the Cisco vManage through a process called _______ or Cisco Plug-n-Play (PnP).
Zero-touch provisioning (ZTP
94
Plug-n-Play automatic process is led by the vBond _______
Orchestrator
95
The automatic validation and authentication of Cisco SD-WAN devices during the bring-up process occur only if the vSmart controllers and the vBond orchestrators know the serial and ______ numbers of the devices that are permitted in the network.
Chassis
96
To initiate a session between the vSmart controller and the vBond orchestrator, the vSmart controller initiates an encrypted Datagram _____ connection to the vBond orchestrator.
Transport Layer Security (DTLS)
97
After the bidirectional authentication is complete between the two devices, the DTLS connection between the vBond orchestrator and the vSmart controller transitions from being a temporary connection to being a ______ connection.
permanent
98
Each device automatically generates an ______ private key–public key pair when it boots.
RSA
99
After all the vSmart controllers have registered themselves with the vBond orchestrator, the vBond orchestrator and the vSmart controllers are ready to validate and authenticate the WAN Edge ________ in the Cisco network.
Routers
100
If the authentication handshaking succeeds, a permanent ______ communication channel is established between the vSmart and vBond devices.
DTLS
101
The vBond orchestrator sends its trusted root CA signed certificate to the vSmart ______.
Controller
102
The vBond orchestrator sends the WAN Edge authorized _______ number file to the vSmart controller
Serial
103
The vSmart controller uses its chain of trust to _______ the organization name from the certificate and compares it to the organization name that is configured on the vSmart controller.
Extract
104
The vSmart controller uses the root CA chain to verify that the certificate has indeed been signed by the root CA (either _______ or the enterprise CA).
DigiCert
105
In the other direction, The _______ controller sends its trusted root CA signed certificate to the vBond orchestrator.
vSmart
106
In the other direction, the ______ orchestrator uses its chain of trust to extract the vSmart controller’s serial number from the certificate.
vBond
107
In the other direction, the vBond orchestrator uses its _______ of trust to extract the organization name from the certificate and compares it to the organization name that is configured on the vBond orchestrator.
Chain
108
In the other direction, the vBond ______ uses the root CA chain to verify that the certificate has indeed been signed by the root CA (either DigiCert or the enterprise CA)
Orchestrator
109
In vSmart to vSmart, vSmart1 ______ an encrypted DTLS connection to vSmart2 and sends its trusted root CA signed certificate to vSmart2.
Initiates
110
In vSmart to vSmart, vSmart2 uses its chain of _______ to extract vSmart1’s serial number.
Trust
111
This category includes all physical Cisco platforms except for the ASR1002-X, ENCS, and CSR1000v
Cisco IOS XE WAN Edge Router
112
This category includes the vEdge 2000 and vEdge 5000 routers.
Physical Viptela vEdge Router
113
Physical Viptela vEdge Router
Physical Viptela vEdge Router
114
For Cisco IOS XE WAN Edge routers, each router is uniquely identified by the ______ and certificate serial number (SUDI certificate).
Chassis ID
115
For physical Viptela OS vEdge routers, the certificate is stored in an on-board ______, which is installed during manufacturing.
Trusted Platform Module (TPM)
116
For virtual WAN Edge Routers, an ______ is first generated by Cisco vManage for each device listed in the uploaded WAN Edge list.
OTP/token
117
Deploy WAN Edge Router, establish a secure connection with the ______ so that it can receive its full configuration
Cisco vManage
118
Deploy WAN Edge Router, establish a secure connection with the ______ so that it can begin participating in the Cisco overlay network
vSmart controller
119
WAN Edge router authenticates the vBond orchestrator, The vBond orchestrator sends its trusted root _______ signed certificate to the WAN Edge router.​
CA
120
WAN Edge router authenticates the vBond orchestrator, the vBond orchestrator sends its trusted root CA signed certificate to the _______.​
WAN Edge Router
121
WAN Edge router authenticates the vBond orchestrator, the _______ uses its chain of trust to extract the organization name from the certificate and compares it to the organization name that is configured on the router itself.
WAN Edge router
122
WAN Edge router authenticates the vBond orchestrator, the WAN Edge router uses the root CA chain to verify that the certificate has indeed been signed by the root CA (either DigiCert or the ______).
Enterprise CA
123
In the opposite direction, the vBond orchestrator sends a ______ to the WAN Edge router.
Challenge
124
What are the four challenges?
Chassis, Serial, Board ID, and 256-Bit
125
The ______ compares the serial and chassis numbers to the list in its WAN Edge authorized device list file.
vBond orchestrator
126
Check _______ of the 256-bit random value is proper by using the WAN Edge router’s public key.
Signing
127
The ________ uses the root CA chain from the WAN Edge routers board ID certificate to verify that the board ID certificate is itself valid.
vBond Orchestrator
128
Between WAN Edge and vBond, certificates are exchanged and _______ authentication occurs between vBond and WAN Edge over the encrypted tunnel
Mutual
129
Between WAN Edge and vBond, vBond validates WAN Edge router serial number and chassis ID against authorized WAN Edge allowed ______.
List
130
Between WAN Edge and vBond, WAN Edge router validates _______ certificate organization name against locally configured one.
vBond
131
Between WAN Edge and vBond, vBond returns a ______ of vSmart and Cisco vManage controllers to WAN Edge.
List
132
Between WAN Edge and vBond, notifies _______ and Cisco vManage of WAN Edge router public IP address.
vSmart
133
Between WAN Edge and vManage, certificates are exchanged and mutual authentication occurs between _______, Cisco vManage, and WAN Edge.
vSmart
134
Between WAN Edge and vManage, vSmart and Cisco vManage validate WAN Edge router______ number and chassis ID against the authorized WAN Edge allowed list.
Serial
135
Between WAN Edge and vManage, WAN Edge router validates vSmart and Cisco vManage certificate ________ name against locally configured one.
Organization
136
Between WAN Edge and vManage, permanent DTLS/TLS _______ between vSmart, Cisco vManage, and WAN Edge is established.
Tunnel
137
WAN Edge Router authenticates vManage, the Cisco vManage sends its trusted root ______ signed certificate to the WAN Edge router.
CA
138
WAN Edge Router authenticates vManage, the WAN Edge router uses its ______ to extract the organization name from the certificate and compares it to the organization name that is configured on the router itself.
Chain of Trust
139
WAN Edge Router authenticates vManage, the WAN Edge router uses the root ______ chain to verify that the certificate has indeed been signed by the root CA (either DigiCert or the enterprise CA).
CA
140
WAN Edge Router authenticates vManage, the Cisco vManage compares the serial and chassis numbers to the list in its _______ authorized device list file.
WAN Edge
141
The vSmart controller sends a ______ challenge to the WAN Edge router.
256 Bit
142
When multiple SD-WAN devices are installed behind a single NAT device, you can configure different port numbers for each device so that the NAT can properly identify each individual device.
Port Offset
143
Configuring a port offset from the base port ______.
12346
144
In the context of a Cisco SD-WAN overlay network, ________ is the process by which devices try different ports when attempting to establish connections with each other, if a connection attempt on the first port fails.
Port Hopping
145
In port hopping, how many hops?
5
146
Does vSmart and vManage need port hopping?
No.
147
vBond orchestrators always connect to other Cisco SD-WAN devices using port ___.
12346
148
For WAN Edge routers configured to use TLS tunnels, which use TCP, the routers select a random TCP port, so you must configure proper _____ entries for the Cisco vManage and vSmart controllers to be able to communicate with WAN Edge routers.
NAT
149
For WAN Edge routers configured to use DTLS tunnels, which use UDP, at a minimum you must open the _____ base ports that are used by a WAN Edge router with a default port offset of 0.
5
150
The _____ controller, which is the centralized brain of the Cisco SD-WAN solution, establishes and maintains DTLS or TLS connections to all Cisco SD-WAN devices in the overlay network
vSmart
151
Cisco SD-WAN provides an automatic provisioning software as a service (SaaS) called ______, which allows hardware WAN Edge routers to join the overlay network automatically.
ZTP
152
ZTP step, the hardware WAN Edge router powers up.
Step 1
153
ZTP step, the router contacts a DHCP server and receives its IP address from the server.
Step 2
153
ZTP step, the router contacts a DNS server to resolve the hostname ztp.viptela.com and receives the IP address of the Cisco ZTP server. A similar process occurs with an IOS XE SD-WAN device with Cisco plug-and-play, except that the address resolved is devicehelper.cisco.com.
Step 3
154
ZTP step, the router contacts a DNS server to resolve the hostname ztp.viptela.com and receives the IP address of the Cisco ZTP server. A similar process occurs with an IOS XE SD-WAN device with Cisco plug-and-play, except that the address resolved is devicehelper.cisco.com.
Step 4
155
ZTP step, the router establishes a transient connection to the vBond orchestrator and sends its chassis ID and serial number. (At this point in the ZTP process, the router does not have a system IP address, so the connection is established with a null system IP address.)
Step 5
156
ZTP step, the router establishes a connection to Cisco vManage and is verified by it. Cisco vManage sends the router its system IP address.
Step 6
157
The router re-establishes a connection to the vBond orchestrator, using its system IP address.
Step 7
158
The router re-establishes a connection to Cisco vManage using its system IP address.
Step 8
159
After the reboot, the router re-establishes a connection to the vBond orchestrator, which again verifies the router
Step 9
160
The router establishes a connection to Cisco vManage, which pushes the full configuration to the router.
Step 10
161
The router joins the organization’s overlay network.
Step 11
162
1. Catalyst8000v# config-______
Transaction
163
2. Catalyst8000v(config)# hostname ______
Branch1
164
3. Catalyst8000v(config)# _______
System
165
4. Catalyst8000v(config-system)# system-______ 172.27.0.12
IP
166
5. Catalyst8000v(config-system)# _____-id 20
Site
167
6. Catalyst8000v(config-system)# organization-_____ "Cisco-LearningAtCisco - 20998"
Name
168
7. Catalyst8000v(config-system)# ______10.2.6.2
vBond
169
8. Catalyst8000v(config-system)# ______
Commit
170
1. Branch1(config)# ______ GigabitEthernet 1
Interface
171
2. Branch1(config-int)# ______10.2.8.2/24
IP Address
172
3. Branch1(config-int)# no _______
Shutdown
173
4. Branch1(config-int)# ______
Exit
174
6. Branch1(config)# _______ Tunnel1
Interface
175
7. Branch1(config-int)# ip ______ GigabitEthernet 1
Umnumbered
176
8. Branch1(config-int)# tunnel ______ GigabitEthernet 1
Source
177
9. Branch1(config-int)# tunnel ______ sdwan
Mode
178
10 Branch1(config-int)# no ______
Shut
179
11. Branch1(config-int)# ______
Exit
180
12. Branch1(config)# ______
sdwan
181
13. Branch1(config-sdwan)# _______ GigabitEthernet 1
interface
182
14. Branch1(config-interface-GigabitEthernet1)# tunnel-interface allow-service ______
all
183
15. Branch1(config-tunnel-interface)# encapsulation ______
ipsec
184
16. Branch1(config-tunnel-interface)# color ______
mpls
185
17. Branch1(config-tunnel-interface)# _____
exit
186
18. Branch1(config)# ip _______ 0.0.0.0 0.0.0.0 10.2.8.1
route
187
19. Branch1(config)# ______
commit
188
How to change to config mode: Catalyst8000v#
config-transaction
189
Catalyst8000v(config)#
config mode
190
How to config hostname: Catalyst8000v(config)#
host-name hostname
191
How to config Sys IP Address Catalyst8000v(config)#
system-ip ip-address
192
Catalyst8000v(config-system)# site-id site-id
Numeric Identifier
193
The vBond orchestrator's IP address must be a public IP address: Catalyst8000v(config-system)# vbond _______
(dns-name | ip-address)
194
The WAN Edge authorized _______ number file lists the serial and chassis numbers for all the WAN Edge routers allowed in the network.
Serial
195
The automatic validation and authentication of Cisco SD-WAN devices that occurs during the bring up process can happen only if the vSmart controllers and the vBond orchestrators know the serial and _______ numbers of the devices that are permitted in the network.
Chassis
196
Each Cisco SD-WAN device has a serial number, which is a 40-byte number that is included in the device's certificate.
Serial Number
197
In addition to a serial number, each WAN Edge router is identified by a _______.
Chassis Number
198
1. Cisco vManage learns the serial numbers for all the vSmart controllers that are allowed to be in the network while it is creating a CSR and installing the signed certificate.
vSmart authorized serial numbers
199
2. This file contains the serial and chassis numbers of all the WAN Edge routers that are allowed to be in the network
WAN Edge authorized serial number file
200
3. Upload the WAN Edge Serial Number File to Cisco vManage: In Cisco vManage, select the Configuration > ______ screen.
Devices
201
4. From the Upload WAN Edge dialog ______, choose the file that you want to upload.
Box
202
5. To upload the WAN Edge serial number file to Cisco vManage only, click ______.
Upload
203
Manually, in Cisco vManage, select the Configuration > Certificates _______.
Screen
204
Manually, from the ______ title bar, click WAN Edge List.
Certificates
205
Manually, click _______ to Controller.
Send
206
The ______ state is useful when you are preparing WAN Edge routers at one location and then sending them to different sites for installation.
Staging
207
The _____ state is useful when the WAN Edge routers are being installed at their final destination.
Valid
208
Display information about active control plane connections (on WAN Edge routers)
show sdwan control connections
209
Display information about control plane connection attempts initiated by the local device.
show sdwan control connections-history
210
Display the basic configuration parameters and local properties related to the control plane (on WAN Edge routers)
show sdwan control local-properties
211
Display statistics about the packets that a WAN Edge router or vSmart controller has transmitted and received in the process of establishing and maintaining secure DTLS connections to Cisco SD-WAN devices in the overlay network (on WAN Edge routers).
show sdwan control statistics
212
List a count of Cisco SD-WAN devices that the local device is aware of. For devices running on virtual machines that have more than one core, this command shows the number of devices that each vdaemon process instance is handling.
show sdwan control summary
213
List the chassis numbers of the valid WAN Edge routers in the overlay network (on vSmart controllers only).
show control valid-vedges
214
List the serial numbers of the valid vSmart controllers in the overlay network (on WAN Edge routers).
show sdwan control valid-vsmarts
215
List the serial numbers of the valid vSmart controllers in the overlay network (on vSmart controllers)
show control valid-vsmarts
216