Switch Part Deux Flashcards

1
Q

To access Telnet or SSH

A

A switch needs a working IP configuration, as well as login security on the vty lines (password and/or username)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enable password

A

used to protect enable mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Parameters for usernames and passwords

A

login local line subcommand

username teresa password (or secret) giudice global config command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AAA server

A

Switch sends message to the AAA server asking whether the name and password are allowed and the AAA server replies; usually use either the RADIUS or TACACS+ protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Configuring SSH

A
  1. use login local line subcommand
  2. username teresa password(or secret) giudice global config command
  3. ip domain-name example.com to configure a DNS domain name
  4. Create encryption keys using the crypto key generate rsa global config command
  5. ip ssh version 2 global config command for enhanced security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Info about status of SSH on the switch

A

show ip ssh: status info about the SSH server itself

show ssh: shows info about each user currently connected into the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Controlling support of Telnet and SSH command

A

transport input {all|none|telnet|ssh} vty subcommand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

service password-encryption

A

offers weak password encryption to all unencrypted passwords; usually start with 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MOTD bammer

A

Shown before the login prompt; used for temporary messages that can change from time to time (banner motd # message #) global config command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Login banner

A

Shown before login prompt but after MOTD banner; used for permanent messages (banner login # message #) global config command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exec banner

A

shown after login prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

show history

A

lists commands currently held in the history buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

history size

A

from console or vty line config mode, sets number of commands saved in the history buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

terminal history size

A

from enable mode, set number of commands saved in the history buffer for this one terminal session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

logging console

A

global config command that enables syslog messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

logging synchronous

A

console line subcommand that displays syslog messages only at more convenient times, such as after a show command

17
Q

Configuring IPv4 on a switch

A
  1. interface vlan 1
  2. ip address ip-address mask
  3. no shutdown
  4. ip default-gateway 192.168.1.1 global config command
  5. ip name-server ip-address1 ip-address2
18
Q

Enabling DHCP on a switch

A
  1. int vlan 1
  2. no shutdown
  3. ip address dhcp

show dhcp lease to view DHCP info

19
Q

duplex and speed

A

interface subcommands used to statically configure the duplex and speed of port

20
Q

Port security

A

identifies devices based on the source MAC address of Ethernet frames the devices send

21
Q

switch port violation

A

occurs whenever a new source MAC address arrives at the port, pushing the number of allowed MAC addresses past the allowed maximum

22
Q

sticky secure MAC addresses

A

Port security learns the MAC addresses off each port and stores those in the port security configuration (in the running-config file).

23
Q

Configuration of port security

3-6 are optional

A
  1. make switch either a static access or trunk interface (switchport mode access (or trunk) if subcommand)
  2. enable port security (switchport port-security if subcom)
  3. switchport port-security maximum 5
  4. siwtchport port-security violation {protect|restrict|shutdown}
  5. switchport port-security mac-address
  6. switchport port-security mac-address sticky
24
Q

Securing unused switch interfaces

A

Shutdown interface
make port a nontrunking interface
assign port to an unused VLAN via switchport access vlan 30
set native VLAN to an unused VLAN

25
Q

Reasons for choosing VLANs

A
  1. reduces CPU overhead on each device by shrinking broadcast domain
  2. reduce securtity risks
  3. create more flexible designs
  4. solve problems more quickly
  5. reduce workload for STP
26
Q

VLAN trunking …..

A

Adds another header to the frame before sending it over the trunk that includes the VLAN ID

27
Q

802.1Q

A

trunking protocol that inserts a 4-byte VLAN header into the Ethernet header

28
Q

Native VLAN…

A

802.1Q does not add its header; both switches must agree on which VLAN is the native VLAN; supports connections to devices that do not understand trunking

29
Q

Layer 3 switches are known as….

A

Multilayer switches and they are based on the function between a layer 2 switch and a layer 3 router

30
Q

Layer 2 switches will not….

A

forward data between two VLANs

31
Q

Purpose of VLAN Trunking Protocol (VTP)

A

To dynamically advertise VLAN configuration information

32
Q

Dynamic Trunking Protocol

A

used for Cisco switches that support both the ISL and 802.1Q trunking methods

33
Q

switchport trunk encapsulation {dot1q|isl|negotiate}

A

used for Cisco switches that support both trunking methods or use DTP to negotiate the method

34
Q

Limit VLANs using this if subcommand:

A

switchport trunk allowed vlan {add|all|except|remove} 3-5

35
Q

Reasons a particular VLAN may be prevented to cross a trunk:

A
  1. VLAN is removed from the trunk’s allowed VLAN list
  2. A VLAN dne in the switch’s configuration
  3. VLAN has been administratively disabled
  4. A VLAN has been automatically pruned by VTP
  5. STP has placed the trunk into a blocking state