SD WAN Flashcards

1
Q

Legacy networks run on expensive hardware such as routers and switches, which require time-consuming configuration and maintenance. In addition, these networks require expensive transport connections or carrier circuits to secure and segment the network. These carrier circuits might also not offer the bandwidth that is now required by users and modern applications hosted in private or public data centers.

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Legacy networks operate on the old model of a distributed control plane, which means that every node in the network must be configured with routing and security rules. Remote site management, change control, and network maintenance represent major logistical challenges.

A

Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Legacy networks that run on dedicated carrier circuits depend on the carrier to install new circuits, which can take several months. This process can dramatically delay the launch of new branch locations.

A

Lengthy installation times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legacy networks that run on carrier circuits sacrifice control to the ISP, from network design to configuration to monitoring. Requesting changes from the ISP also requires extra time and is prone to communication errors.

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Legacy networks typically backhaul all branch traffic to the main data center for inspection and filtering. However, with advancements in cloud technologies, and wider adoption of cloud-delivered services, traffic flows have changed, with more traffic now being destined to the internet. This means that backhauling all traffic through a centralized security stack is no longer efficient. Backhauling traffic in this way increases latency and can decrease the user’s overall quality of experience.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legacy networks require complex end-to-end quality of service (QoS) configurations to ensure business-critical applications are prioritized. Manually updating or modifying these configurations is a lengthy process that can be error-prone.

A

Application Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Every router at the edge of a network has two sides for routing

A

WAN and LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One to the transport network

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service side of the network

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Cisco SD-WAN network fabric, also called an ______ network, forms a software overlay that runs over standard network transport services, including the public Internet, MPLS, 5G/LTE, and satellite.

A

Overlay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ and ______ advertisements to establish and maintain the flow of traffic throughout the network.

A

Routing, Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ segmentation using virtual routing and forwarding (VRF), to isolate various flows of traffic

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ to ______concepts for setting up and maintaining bidirectional connections between pairs of protocol entities.

A

Peer, Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On-premises and cloud security options, as well as ______ plane and _______ plane authentication and encryption.

A

Data, Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______ for routing and data traffic.

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ connectivity options supporting a range of transports.

A

Flexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Simplified management via a single pane of ______ platform.

A

Glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cisco SD-WAN network separates the data plane from the control plane and _______ much of the routing that used to require dedicated hardware.

A

Virtualizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Centralized controllers, called ______ controllers, oversee the control plane of the Cisco SD-WAN fabric, efficiently managing provisioning, maintenance, and security for the entire Cisco SD-WAN overlay network.

A

vSmart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

______ orchestrator, automatically authenticates all other Cisco SD-WAN devices when they join the Cisco SD-WAN overlay network.

A

vBond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ______ plane manages the rules for routing traffic through the overlay network, and the data plane passes the actual data packets among the WAN Edge devices.

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cisco _______ provides a simple, yet powerful, set of graphical dashboards for monitoring network performance on all devices in the overlay network, from a centralized monitoring station.

A

vManage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ______ network carries packets from one WAN Edge device to another.

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The ______ protocol is enabled by default and runs over each of these tunnels, detecting loss, latency, jitter, and path failures.

A

Bidirectional Forwarding Detection (BFD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The WAN Edge routers securely communicate to other WAN Edge routers using ______ tunnels over each transport.

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_______ runs between vSmart controllers and between vSmart controllers and WAN Edge routers where control plane information, such as route prefixes, next-hop routes, crypto keys, and policy information, is exchanged over a secure DTLS or TLS connection.

A

Overlay Management Protocol (OMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

______ is the transport VPN.

A

VPN 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

______ is the management VPN.

A

VPN 512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_______ contains the interfaces that connect to the WAN transports.

A

VPN 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

_______ carries the out-of-band management traffic to and from the Cisco SD-WAN devices.

A

VPN 512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Secure sessions with the controller are set up automatically, using ______ and certificate infrastructure.

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The _______ centrally influences access control; that is, it determines which prefixes are allowed to talk to each other inside a VPN.

A

Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The _______ optimizes user experience by influencing transport link choice based on _______ or other attributes

A

Controller, service-level agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The ______ can centralize services such as firewalls, identity provider (IdPs), and intrusion detection systems (IDSs).

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

_______ facilitates the mutual discovery of the control and management elements of the fabric by using a zero-trust certificate-based allowed list model.

A

Cisco vBond orchestrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

For situations in which Cisco vSmart controllers, the Cisco vManage system, or the WAN Edge routers themselves are behind the ______, the Cisco vBond orchestrator facilitates the function of ______ traversal, by allowing the learning of public (post-___) and private (pre-___) IP addresses.

A

Network Address Translator (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cisco vSmart controllers facilitate fabric discovery by running ___ among themselves, and between themselves and the WAN Edge routers.

A

OMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cisco vSmart controllers facilitate fabric discovery by running ______ among themselves, and between themselves and the WAN Edge routers.

A

Overlay Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Control _______ acting on the control plane information are locally enforced on the Cisco vSmart controllers.

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The use of a centralized control plane dramatically reduces the control plane load traditionally associated with building large-scale IPsec networks, solving the _______complexity problem.

A

n^2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

When delivered as a cloud service, Cisco vSmart controllers are ______ hosted in the Cisco cloud.

A

Redundantly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cisco vManage provides the single pane of _______ for day-0, day-1, and day-2 operations.

A

Glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The Cisco vManage GUI allows segregated administrative access by implementing ______ for proper roles and responsibilities.

A

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Performance statistics can be exported into external systems or to Cisco ______ tool for further processing and closer examination.

A

vAnalytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

______ is a TCP-based, highly scalable control plane protocol that unifies all control plane functions under the single protocol umbrella.

A

Overlay Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

OMP operates inside bidirectionally certificate-authenticated _____ or Datagram Transport Layer Security (DTLS) connections established among the Cisco vSmart controllers and between the Cisco vSmart controllers and the WAN Edge routers.

A

Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

By using the concepts of ______ families and route attributes, OMP advertises all pertinent control plane information between the WAN Edge routers to establish direct IPsec communication between the WAN Edge routers without relying on Internet Key Exchange (IKE) protocol.

A

Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The use of OMP and Cisco vSmart controllers creates a ________ control plane in which WAN Edge routers establish control plane connectivity only to a handful of Cisco vSmart controllers and not to every other WAN Edge router in the topology.

A

linear-complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Data plane and application-aware routing policies are implemented on the ______ routers.

A

Wan Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

WAN Edge routers export performance statistics, and alerts and events to a centralized Cisco ______ system for a single point of management.

A

vManage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

WAN Edge routers use OSPF, EIGRP and BGP routing protocols for learning ______ information from service (LAN)–side interfaces and for pre-existing network integration with non-SD-WAN sites.

A

Reachability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

For _______ redundant service (LAN)–side interfaces, WAN Edge routers implement Virtual Router Redundancy Protocol (VRRP) first-hop redundancy protocol, which can operate on a per-VLAN basis.

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

_______ deployment relies on the use of signed certificates installed in the onboard Trusted Platform Module (TPM) to establish a unique router identity

A

Zero-touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The ______ l form factor can be deployed in public clouds, such as AWS and Microsoft Azure, or as an Cisco Enterprise Network Virtualization (Enterprise NFV) on the vCPE/uCPE platforms using Kernel-based virtual machine (KVM) or ESXi hypervisors.

A

Virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The Cisco vEdge Cloud is a ______ version of the WAN Edge router, inheriting all the capabilities offered on the Cisco physical branch routers

A

virtualized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The Cisco vEdge Cloud can be used as a virtual network function (VNF) for a virtual customer-premises equipment (vCPE) _______ at the branch.

A

deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

The controllers can be deployed ______ or in a hosted environment

A

on-premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The centralized Cisco ______ controllers oversee the control plane of the Cisco SD-WAN fabric…

A

vSmart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

_______ orchestrator automatically authenticates all other Cisco SD-WAN devices in the overlay network.

A

vBond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

_______ is a centralized network management system for all overlay network components.

A

vMnanage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The ______ pane, which runs across the top of the Monitor Overview screen, displays the number of Cisco vBond, Cisco vSmart, and Cisco vManage controllers.

A

Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

_______ displays the number of WAN Edges in the overlay network.

A

Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

______ pane displays the total number of reboots in the last 24 hours for all devices in the network, including soft and cold reboots and reboots that occurred as a result of power-cycling a device.

A

Reboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

_______ tab to list all the system IP and hostname of the device on which the _______ occurred, the ______ index, and the core time and filename.

A

Crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

______displays the hostname and system IP of the device on which the ______ is installed, the ______ serial number, and its expiration date and status.

A

Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

The WAN Edge ______ pane indicates whether WAN Edge devices are connected to the required number of Cisco vSmart controllers.

A

Health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

When a site has multiple WAN Edge routers, ______ pane displays the state for the entire site, not for individual devices

A

BFD Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Monitor > Devices > Device 360 screen or the Tools > ______ l screen.

A

SSH Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

The WAN Edge ______ pane provides four counts.

A

Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Total number of WAN Edge routers whose authorized serial number has been uploaded on the Cisco vManage server.

A

Configuration > Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Total number of authorized WAN Edge routers in the overlay network.

A

Configuration > Certificates > WAN Edge List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

These routers are marked as Valid and are now operational in the network.

A

Deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

You can configure these routers at a staging site before shipping them to the actual branch and making them a part of the overlay network.

A

Staging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The _______ Health pane displays the aggregated average loss, latency, and jitter for all links and all combinations of colors (for example, all LTE-to-LTE links and all LTE-to-3G links).

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

_______ pane shows the 10 tunnels with the greatest average loss over the last 24 hours.

A

Application-Aware Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

In the WAN Edge list, click on the More options icon to access ______ device information

A

Real Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Use the _______ Terminal screen to establish an ______ session to a Cisco SD-WAN device.

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

These are routers marked as Valid in the Configuration > Certificates > ______ page

A

WAN Edge List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The Monitor > Devices > ______ window for the vSmart controller is displayed and shows the vSmart Control Connections by default.

A

Device 360

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

From the left side menu select ________ to view interface statistics.

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

By default, the Device Options search field displays System Information, which includes the device’s hostname, site ID, and other information.

A

Real Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

In the Device Options search field, select ______.

A

Interface Detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Select ________ in the Select Filter popup window.

A

Do Not Filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Click on ______ in the top-left corner of the page to return to the main Monitor > Overview dashboard.

A

Cisco SD-WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

At the vSmart command prompt, issue the ______ command.

A

Show System Status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

The output of the ______ command displays interface configuration and statistics.

A

Show Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

At the Monitor > Devices dashboard, click on the ______ Hostname to open the Monitor > Devices > Device 360 dashboard.

A

DC-Edge2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

The Monitor > Device > Device 360 > _______ window for the vBond is displayed by default.

A

Control Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

From the menu on the left, choose Troubleshooting. The Connectivity and Traffic panes will be displayed. Click _______ to choose that connectivity tool.

A

Ping

86
Q

Destination IP Address: _______

A

172.16.0.101

87
Q

VPN: ______

A

VPN–0

88
Q

Source/Interface for VPN - 0: _______

A

ge0/0 – ipv4–192.168.66.3

89
Q

Click Advanced Options. Enter ___ for the Count

A

10

90
Q

To provide the highest level of security, only authenticated and authorized devices are allowed access to and participation in the _______ overlay network

A

Cisco SD-WAN

91
Q

The ______ controller performs automatic authentication on all WAN Edge routers before they can send any data traffic over the network.

A

vBond

92
Q

For vBond orchestrators and vSmart controllers, a network administrator must download the necessary authentication-related files from Cisco _______, and then these devices automatically receive their configurations from Cisco _______.

A

vManage

93
Q

For WAN Edge hardware routers, after they boot up, they are authenticated on the network and receive their configurations automatically from the Cisco vManage through a process called _______ or Cisco Plug-n-Play (PnP).

A

Zero-touch provisioning (ZTP

94
Q

Plug-n-Play automatic process is led by the vBond _______

A

Orchestrator

95
Q

The automatic validation and authentication of Cisco SD-WAN devices during the bring-up process occur only if the vSmart controllers and the vBond orchestrators know the serial and ______ numbers of the devices that are permitted in the network.

A

Chassis

96
Q

To initiate a session between the vSmart controller and the vBond orchestrator, the vSmart controller initiates an encrypted Datagram _____ connection to the vBond orchestrator.

A

Transport Layer Security (DTLS)

97
Q

After the bidirectional authentication is complete between the two devices, the DTLS connection between the vBond orchestrator and the vSmart controller transitions from being a temporary connection to being a ______ connection.

A

permanent

98
Q

Each device automatically generates an ______ private key–public key pair when it boots.

A

RSA

99
Q

After all the vSmart controllers have registered themselves with the vBond orchestrator, the vBond orchestrator and the vSmart controllers are ready to validate and authenticate the WAN Edge ________ in the Cisco network.

A

Routers

100
Q

If the authentication handshaking succeeds, a permanent ______ communication channel is established between the vSmart and vBond devices.

A

DTLS

101
Q

The vBond orchestrator sends its trusted root CA signed certificate to the vSmart ______.

A

Controller

102
Q

The vBond orchestrator sends the WAN Edge authorized _______ number file to the vSmart controller

A

Serial

103
Q

The vSmart controller uses its chain of trust to _______ the organization name from the certificate and compares it to the organization name that is configured on the vSmart controller.

A

Extract

104
Q

The vSmart controller uses the root CA chain to verify that the certificate has indeed been signed by the root CA (either _______ or the enterprise CA).

A

DigiCert

105
Q

In the other direction, The _______ controller sends its trusted root CA signed certificate to the vBond orchestrator.

A

vSmart

106
Q

In the other direction, the ______ orchestrator uses its chain of trust to extract the vSmart controller’s serial number from the certificate.

A

vBond

107
Q

In the other direction, the vBond orchestrator uses its _______ of trust to extract the organization name from the certificate and compares it to the organization name that is configured on the vBond orchestrator.

A

Chain

108
Q

In the other direction, the vBond ______ uses the root CA chain to verify that the certificate has indeed been signed by the root CA (either DigiCert or the enterprise CA)

A

Orchestrator

109
Q

In vSmart to vSmart, vSmart1 ______ an encrypted DTLS connection to vSmart2 and sends its trusted root CA signed certificate to vSmart2.

A

Initiates

110
Q

In vSmart to vSmart, vSmart2 uses its chain of _______ to extract vSmart1’s serial number.

A

Trust

111
Q

This category includes all physical Cisco platforms except for the ASR1002-X, ENCS, and CSR1000v

A

Cisco IOS XE WAN Edge Router

112
Q

This category includes the vEdge 2000 and vEdge 5000 routers.

A

Physical Viptela vEdge Router

113
Q

Physical Viptela vEdge Router

A

Physical Viptela vEdge Router

114
Q

For Cisco IOS XE WAN Edge routers, each router is uniquely identified by the ______ and certificate serial number (SUDI certificate).

A

Chassis ID

115
Q

For physical Viptela OS vEdge routers, the certificate is stored in an on-board ______, which is installed during manufacturing.

A

Trusted Platform Module (TPM)

116
Q

For virtual WAN Edge Routers, an ______ is first generated by Cisco vManage for each device listed in the uploaded WAN Edge list.

A

OTP/token

117
Q

Deploy WAN Edge Router, establish a secure connection with the ______ so that it can receive its full configuration

A

Cisco vManage

118
Q

Deploy WAN Edge Router, establish a secure connection with the ______ so that it can begin participating in the Cisco overlay network

A

vSmart controller

119
Q

WAN Edge router authenticates the vBond orchestrator, The vBond orchestrator sends its trusted root _______ signed certificate to the WAN Edge router.​

A

CA

120
Q

WAN Edge router authenticates the vBond orchestrator, the vBond orchestrator sends its trusted root CA signed certificate to the _______.​

A

WAN Edge Router

121
Q

WAN Edge router authenticates the vBond orchestrator, the _______ uses its chain of trust to extract the organization name from the certificate and compares it to the organization name that is configured on the router itself.

A

WAN Edge router

122
Q

WAN Edge router authenticates the vBond orchestrator, the WAN Edge router uses the root CA chain to verify that the certificate has indeed been signed by the root CA (either DigiCert or the ______).

A

Enterprise CA

123
Q

In the opposite direction, the vBond orchestrator sends a ______ to the WAN Edge router.

A

Challenge

124
Q

What are the four challenges?

A

Chassis, Serial, Board ID, and 256-Bit

125
Q

The ______ compares the serial and chassis numbers to the list in its WAN Edge authorized device list file.

A

vBond orchestrator

126
Q

Check _______ of the 256-bit random value is proper by using the WAN Edge router’s public key.

A

Signing

127
Q

The ________ uses the root CA chain from the WAN Edge routers board ID certificate to verify that the board ID certificate is itself valid.

A

vBond Orchestrator

128
Q

Between WAN Edge and vBond, certificates are exchanged and _______ authentication occurs between vBond and WAN Edge over the encrypted tunnel

A

Mutual

129
Q

Between WAN Edge and vBond, vBond validates WAN Edge router serial number and chassis ID against authorized WAN Edge allowed ______.

A

List

130
Q

Between WAN Edge and vBond, WAN Edge router validates _______ certificate organization name against locally configured one.

A

vBond

131
Q

Between WAN Edge and vBond, vBond returns a ______ of vSmart and Cisco vManage controllers to WAN Edge.

A

List

132
Q

Between WAN Edge and vBond, notifies _______ and Cisco vManage of WAN Edge router public IP address.

A

vSmart

133
Q

Between WAN Edge and vManage, certificates are exchanged and mutual authentication occurs between _______, Cisco vManage, and WAN Edge.

A

vSmart

134
Q

Between WAN Edge and vManage, vSmart and Cisco vManage validate WAN Edge router______ number and chassis ID against the authorized WAN Edge allowed list.

A

Serial

135
Q

Between WAN Edge and vManage, WAN Edge router validates vSmart and Cisco vManage certificate ________ name against locally configured one.

A

Organization

136
Q

Between WAN Edge and vManage, permanent DTLS/TLS _______ between vSmart, Cisco vManage, and WAN Edge is established.

A

Tunnel

137
Q

WAN Edge Router authenticates vManage, the Cisco vManage sends its trusted root ______ signed certificate to the WAN Edge router.

A

CA

138
Q

WAN Edge Router authenticates vManage, the WAN Edge router uses its ______ to extract the organization name from the certificate and compares it to the organization name that is configured on the router itself.

A

Chain of Trust

139
Q

WAN Edge Router authenticates vManage, the WAN Edge router uses the root ______ chain to verify that the certificate has indeed been signed by the root CA (either DigiCert or the enterprise CA).

A

CA

140
Q

WAN Edge Router authenticates vManage, the Cisco vManage compares the serial and chassis numbers to the list in its _______ authorized device list file.

A

WAN Edge

141
Q

The vSmart controller sends a ______ challenge to the WAN Edge router.

A

256 Bit

142
Q

When multiple SD-WAN devices are installed behind a single NAT device, you can configure different port numbers for each device so that the NAT can properly identify each individual device.

A

Port Offset

143
Q

Configuring a port offset from the base port ______.

A

12346

144
Q

In the context of a Cisco SD-WAN overlay network, ________ is the process by which devices try different ports when attempting to establish connections with each other, if a connection attempt on the first port fails.

A

Port Hopping

145
Q

In port hopping, how many hops?

A

5

146
Q

Does vSmart and vManage need port hopping?

A

No.

147
Q

vBond orchestrators always connect to other Cisco SD-WAN devices using port ___.

A

12346

148
Q

For WAN Edge routers configured to use TLS tunnels, which use TCP, the routers select a random TCP port, so you must configure proper _____ entries for the Cisco vManage and vSmart controllers to be able to communicate with WAN Edge routers.

A

NAT

149
Q

For WAN Edge routers configured to use DTLS tunnels, which use UDP, at a minimum you must open the _____ base ports that are used by a WAN Edge router with a default port offset of 0.

A

5

150
Q

The _____ controller, which is the centralized brain of the Cisco SD-WAN solution, establishes and maintains DTLS or TLS connections to all Cisco SD-WAN devices in the overlay network

A

vSmart

151
Q

Cisco SD-WAN provides an automatic provisioning software as a service (SaaS) called ______, which allows hardware WAN Edge routers to join the overlay network automatically.

A

ZTP

152
Q

ZTP step, the hardware WAN Edge router powers up.

A

Step 1

153
Q

ZTP step, the router contacts a DHCP server and receives its IP address from the server.

A

Step 2

153
Q

ZTP step, the router contacts a DNS server to resolve the hostname ztp.viptela.com and receives the IP address of the Cisco ZTP server. A similar process occurs with an IOS XE SD-WAN device with Cisco plug-and-play, except that the address resolved is devicehelper.cisco.com.

A

Step 3

154
Q

ZTP step, the router contacts a DNS server to resolve the hostname ztp.viptela.com and receives the IP address of the Cisco ZTP server. A similar process occurs with an IOS XE SD-WAN device with Cisco plug-and-play, except that the address resolved is devicehelper.cisco.com.

A

Step 4

155
Q

ZTP step, the router establishes a transient connection to the vBond orchestrator and sends its chassis ID and serial number. (At this point in the ZTP process, the router does not have a system IP address, so the connection is established with a null system IP address.)

A

Step 5

156
Q

ZTP step, the router establishes a connection to Cisco vManage and is verified by it. Cisco vManage sends the router its system IP address.

A

Step 6

157
Q

The router re-establishes a connection to the vBond orchestrator, using its system IP address.

A

Step 7

158
Q

The router re-establishes a connection to Cisco vManage using its system IP address.

A

Step 8

159
Q

After the reboot, the router re-establishes a connection to the vBond orchestrator, which again verifies the router

A

Step 9

160
Q

The router establishes a connection to Cisco vManage, which pushes the full configuration to the router.

A

Step 10

161
Q

The router joins the organization’s overlay network.

A

Step 11

162
Q
  1. Catalyst8000v# config-______
A

Transaction

163
Q
  1. Catalyst8000v(config)# hostname ______
A

Branch1

164
Q
  1. Catalyst8000v(config)# _______
A

System

165
Q
  1. Catalyst8000v(config-system)# system-______ 172.27.0.12
A

IP

166
Q
  1. Catalyst8000v(config-system)# _____-id 20
A

Site

167
Q
  1. Catalyst8000v(config-system)# organization-_____ “Cisco-LearningAtCisco - 20998”
A

Name

168
Q
  1. Catalyst8000v(config-system)# ______10.2.6.2
A

vBond

169
Q
  1. Catalyst8000v(config-system)# ______
A

Commit

170
Q
  1. Branch1(config)# ______ GigabitEthernet 1
A

Interface

171
Q
  1. Branch1(config-int)# ______10.2.8.2/24
A

IP Address

172
Q
  1. Branch1(config-int)# no _______
A

Shutdown

173
Q
  1. Branch1(config-int)# ______
A

Exit

174
Q
  1. Branch1(config)# _______ Tunnel1
A

Interface

175
Q
  1. Branch1(config-int)# ip ______ GigabitEthernet 1
A

Umnumbered

176
Q
  1. Branch1(config-int)# tunnel ______ GigabitEthernet 1
A

Source

177
Q
  1. Branch1(config-int)# tunnel ______ sdwan
A

Mode

178
Q

10 Branch1(config-int)# no ______

A

Shut

179
Q
  1. Branch1(config-int)# ______
A

Exit

180
Q
  1. Branch1(config)# ______
A

sdwan

181
Q
  1. Branch1(config-sdwan)# _______ GigabitEthernet 1
A

interface

182
Q
  1. Branch1(config-interface-GigabitEthernet1)# tunnel-interface allow-service ______
A

all

183
Q
  1. Branch1(config-tunnel-interface)# encapsulation ______
A

ipsec

184
Q
  1. Branch1(config-tunnel-interface)# color ______
A

mpls

185
Q
  1. Branch1(config-tunnel-interface)# _____
A

exit

186
Q
  1. Branch1(config)# ip _______ 0.0.0.0 0.0.0.0 10.2.8.1
A

route

187
Q
  1. Branch1(config)# ______
A

commit

188
Q

How to change to config mode: Catalyst8000v#

A

config-transaction

189
Q

Catalyst8000v(config)#

A

config mode

190
Q

How to config hostname: Catalyst8000v(config)#

A

host-name hostname

191
Q

How to config Sys IP Address Catalyst8000v(config)#

A

system-ip ip-address

192
Q

Catalyst8000v(config-system)# site-id site-id

A

Numeric Identifier

193
Q

The vBond orchestrator’s IP address must be a public IP address: Catalyst8000v(config-system)# vbond _______

A

(dns-name | ip-address)

194
Q

The WAN Edge authorized _______ number file lists the serial and chassis numbers for all the WAN Edge routers allowed in the network.

A

Serial

195
Q

The automatic validation and authentication of Cisco SD-WAN devices that occurs during the bring up process can happen only if the vSmart controllers and the vBond orchestrators know the serial and _______ numbers of the devices that are permitted in the network.

A

Chassis

196
Q

Each Cisco SD-WAN device has a serial number, which is a 40-byte number that is included in the device’s certificate.

A

Serial Number

197
Q

In addition to a serial number, each WAN Edge router is identified by a _______.

A

Chassis Number

198
Q
  1. Cisco vManage learns the serial numbers for all the vSmart controllers that are allowed to be in the network while it is creating a CSR and installing the signed certificate.
A

vSmart authorized serial numbers

199
Q
  1. This file contains the serial and chassis numbers of all the WAN Edge routers that are allowed to be in the network
A

WAN Edge authorized serial number file

200
Q
  1. Upload the WAN Edge Serial Number File to Cisco vManage: In Cisco vManage, select the Configuration > ______ screen.
A

Devices

201
Q
  1. From the Upload WAN Edge dialog ______, choose the file that you want to upload.
A

Box

202
Q
  1. To upload the WAN Edge serial number file to Cisco vManage only, click ______.
A

Upload

203
Q

Manually, in Cisco vManage, select the Configuration > Certificates _______.

A

Screen

204
Q

Manually, from the ______ title bar, click WAN Edge List.

A

Certificates

205
Q

Manually, click _______ to Controller.

A

Send

206
Q

The ______ state is useful when you are preparing WAN Edge routers at one location and then sending them to different sites for installation.

A

Staging

207
Q

The _____ state is useful when the WAN Edge routers are being installed at their final destination.

A

Valid

208
Q

Display information about active control plane connections (on WAN Edge routers)

A

show sdwan control connections

209
Q

Display information about control plane connection attempts initiated by the local device.

A

show sdwan control connections-history

210
Q

Display the basic configuration parameters and local properties related to the control plane (on WAN Edge routers)

A

show sdwan control local-properties

211
Q

Display statistics about the packets that a WAN Edge router or vSmart controller has transmitted and received in the process of establishing and maintaining secure DTLS connections to Cisco SD-WAN devices in the overlay network (on WAN Edge routers).

A

show sdwan control statistics

212
Q

List a count of Cisco SD-WAN devices that the local device is aware of. For devices running on virtual machines that have more than one core, this command shows the number of devices that each vdaemon process instance is handling.

A

show sdwan control summary

213
Q

List the chassis numbers of the valid WAN Edge routers in the overlay network (on vSmart controllers only).

A

show control valid-vedges

214
Q

List the serial numbers of the valid vSmart controllers in the overlay network (on WAN Edge routers).

A

show sdwan control valid-vsmarts

215
Q

List the serial numbers of the valid vSmart controllers in the overlay network (on vSmart controllers)

A

show control valid-vsmarts

216
Q
A