Secure Network Access, Visibility, and Enforcement Flashcards

1
Q

Allows you to enable authentication across the wired infrastructure, without affecting wired users or devices. It can be thought of as an audit mode. With the help of logging data for validation, administrators use the monitor mode to help ensure that all devices are authenticating correctly, either with 802.1X or MAB. If a device is misconfigured or is missing an 802.1X supplicant, access will be allowed and logged. However, if authentication succeeds, authorization (for example, Dynamic VLAN, Downloadable access control list (DACL)) can still be applied.

A

Monitor Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It allows selective transition from an open (nonfiltering) preauthorization method to selective preauthorization. This function is provided by static port ACLs (Pre-ACL as shown in the previous figure) that allow necessary services such as Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) while blocking all other network access. Users connected to controlled ports will receive additional access (based on policy) after successful authentication, based on DACL that will override the static ACL on the port.

A

Low Impact Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It provides the highest level of controls by configuring the closed preauthorization port control. No traffic will be permitted on a port except EAPOL before authentication and authorization.

A

Closed Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some forms of 802.X fallback methods?

A

MAB, Guest VLAN, Authentication Fail VLAN, CWA (Cisco Web Authentication) with ISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: A switch can use any Layer 2 packet including CDP, STP, DTP, and LLDP to learn a source MAC address during MAB.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: Cisco ISE MAB authentication policy is by default configured in such a way that MAB will always succeed for the unknown MAC addresses.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 802.1X host modes on a port?

A

Single, Multiple, Multiple Domain Authentication, Multiple Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: In multiple host mode, every client on the port must be authorized.

A

False, only the first client must authenticate, then all subsequent clients are authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In MDA mode, how many MAC addresses can be learned in each domain and how many domains are there?

A

2 domains data/voice and 1 MAC per domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In multi-authentication mode, what determines the group VLAN assignment?

A

The first host to connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does critical authentication and low impact mode interact?

A

Low-impact mode does not work well with the inaccessible authentication bypass feature. When a RADIUS server (ISE) is not reachable, a port is put into critical state and critical VLAN is applied. The problem is that preauthentication ACL is still applied to the port in critical state, therefore limiting traffic going through the port into the critical VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Timeout = (max-reauth-req +1) * tx-period, using the default Cisco values, what is the default amount of time an endpoint without a supplicant to get access via MAB, or the Guest VLAN.

A

90 seconds. 30 seconds tx-period and 2 max-reauth-req

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does IP device tracking functionality do on a switch?

A

he purpose of IP device tracking is for the switch to obtain and maintain a list of devices that are connected to the switch via an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What global AAA settings need to be configured before you can use 802.1X?

A

These settings include enabling AAA new-model and configure AAA lists for 802.1X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What global RADIUS setting need to be configured before you can use 802.1X?

A

Individual RADIUS servers, RADIUS server group, RADIUS attributes, RADIUS CoA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the following command: authentication port-control auto

A

Enables port-based authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port

17
Q

What would happen without this command: authentication periodic

A

The host would be indefinitely autheticated

18
Q

On the WLC, enabling Cisco ISE Default settings sets these parameters:

A

RADIUS CoA,
applies AuthC details to the accounting server,
Sets the Layer 2 security of a WLAN to WPA+WPA2.
Sets authentication key management (AKM) method to 802.1X.
Enables MAC filtering if the Layer 2 security of a WLAN is set to None.

19
Q

What is the purpose of AAA override on the WLC?

A

This setting enables you to apply dynamic VLAN, Quality of Service (QoS), and ACLs to individual clients based on the returned RADIUS attributes from the AAA server, such as Cisco ISE.

20
Q

Cisco ISE configuration for 802.1X consists of the following overall tasks:

A

Configure Cisco ISE digital certificates. Digital certificates on Cisco ISE are used for different purposes, for example for sever-side and client-side EAP authentication.

Configure identity sources, that are used to verify clients identity. This include configuration of local user and device accounts, and integrations with external identity sources, such as Microsoft Active Directory, or general Lightweight Directory Access Protocol (LDAP) server.

Configure network devices, which act as RADIUS clients. The settings include device name, IP address, and RADIUS settings.

Review authentication policy. Generally, no changes are needed in Cisco ISE default authentication policy.

Configure authorization policy. Authorization policy on Cisco ISE usually needs to be customized based on your requirements.
21
Q

For Cisco ISE what is the most common use case for using internal identity source in the context of 802.1X

A

to maintain a database of MAC addresses for MAB, or to maintain a database of guest accounts for web authentication.

22
Q

Password is a mandatory parameter of an internal Cisco ISE user, which protocols don’t work with this?

A

EAP-TLS or Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS), do not use password-based authentication. The internal database does not work with these protocols.

23
Q

What is the only mandatory setting for a user group?

A

a name

24
Q

To deploy MAB using the internal Cisco ISE endpoints database, you must identify and add endpoint MAC addresses. How can you add them?

A

You can add endpoints manually, or by importing them from a file or an LDAP database.

25
Q

In ISE, a policy set serves what three key, interrelated functions?

A

Serves as a container for a logical grouping of authentication and authorization policies.

Uses Boolean conditions to steer RADIUS authentication requests to the appropriate group of policies for network authentication and authorization.

Limits authentication session to a set of allowed protocols (or proxy to an external RADIUS server).
26
Q

A policy set by configuring which three key items?

A

a name, conditions, and a resultant set of allowed protocols.

27
Q

What is the purpose of Cisco ISE Authentication Policy?

A

used to specify the identity source RADIUS authentication request that it will be authenticated against

28
Q

What are the 3 components of an ISE Authentication Policy?

A

Name

Set of conditions

Resulting identity source
29
Q

How is machine and user authentication support handled in Cisco NAM & Native OS on supplicants?

A

Cisco NAM (network access manger) single authentication process with EAP Chaining.
Native OS machine and user authentication as a separate authentication process.

30
Q

What are the 3 steps to configure Windows supplicant?

A

Configure client and/or root CA certificate.

Start Wired AutoConfig Windows service.

Configure and enable 802.1X authentication on an interface.
31
Q

Which two options are advantages of using Cisco AnyConnect Secure Mobility Client over native Microsoft Windows 10 OS supplicant?

A

Richer EAP support & MACsec encryption

32
Q

What is the purpose of Cisco Web Authentication?

A

Web authentication provides a means to provide access to the 802.1X enabled network for endpoints that do not have 802.1X supplicant or lack local credentials to authenticate to the network. Web authentication is usually used to provide access for guest users.

33
Q

The disadvantages of the LWA (local web authentication) scenarios include:

A

No support for CoA.

Endpoints can be granted access with features such as locally configured guest VLAN or authentication failed VLAN. No information will be logged in the centralized audit trail.

You must configure web authentication and the web portal on each network access device separately.
34
Q

What are the 5 steps to CWA configuration on the Cisco ISE server.

A

Verification of the guest portal and guest authentication identity source sequence.

Verification of the MAB authentication rule.

Configuration of authorization profile for CWA redirection.

Configuration of authorization rules for redirection.

Configuration of authorization rules for guest access.
35
Q

Which two actions are needed on a Cisco WLC in order to configure a wireless CWA?

A

Enable Cisco ISE NAC state on the guest WLAN.
Configure redirect ACL to permit DHCP, DNS, and traffic to Cisco ISE.

36
Q

You are using the Microsoft Active Directory domain machine with native supplicant. You want to confirm that the network connectivity is available before a user has initiated a successful login attempt on the machine. Which type of authentication do you use?

A

Machine Connection

37
Q

Which three parameters are set by enabling Cisco ISE Default settings under AAA RADIUS configuration on Cisco WLC? (Choose three.)

A

sets the Layer 2 security of a WLAN to WPA+WPA2

enables RADIUS CoA

sets the AKM method to 802.1X