Securing Routing Protocols and the Control Plane Flashcards

1
Q

Control plane packets are handled by what?

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three functions handled by the control plane?

A

BGP, RSVP, ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command provides information on receiving adjacency traffic?

A

show ip cef

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control plane policing helps to protect the CPU by doing what?

A

Filtering and rate-limiting traffic destined to the control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the following CoPP access control list example, which traffic is being prevented from reaching the control plane?
Extended IP access list 123
10 deny tcp 192.168.1.0 0.0.0.255 any eq telnet
20 deny udp 192.168.1.0 0.0.0.255 any eq domain
30 permit tcp any any eq telnet
40 permit udp any any eq domain
50 deny ip any any

A

Telnet and DNS traffic from outside the 192.168.1.0/24 subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What subinterfaces can be leveraged as part of control plane protection?

A

Host subinterface, CEF-Exception subinterface, Transit subinterface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which line in the following OSPF configuration will not be required for MD5 authentication to work?
interface GigabitEthernet0/1
ip address 192.168.10.1 255.255.255.0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 CCNA
!
router ospf 65000
router-id 192.168.10.1
area 20 authentication message-digest
network 10.1.1.0 0.0.0.255 area 10
network 192.168.10.0 0.0.0255 area 0
!

A

area 20 authentication message-digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When configuring MD authentication, router process (only for OSPF) must be configured and key chain in EIGRP

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RIPv2 and EIGRP both make use of a key chain for authentication.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is needed to implement MD5 authentication for BGP?

A

Router process configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly