Vol 2 Part 3: IP Services Flashcards

1
Q

What are System Logs (Syslog)?

A

Sends messages in real time to the CLI. Occurs when an event happens on the network device. Cisco routers and switches default to send Syslogs to the console CLI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What commands must be used to enable Syslog?

A

Line con 0

Logging console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What commands must be used when setting up Syslog while using Telnet/SSH?

A

Enable
Conf t
Line vty 0 15
Logging monitor

Additionally, the command terminal monitor (term mon) must be issued once telnet or SSH access if granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CISCO IOS devices automatically store logs in what memory?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command is used to save Syslogs in the device’s RAM?

A

logging buffered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command is used in order to set up a Syslog server?

A

logging host x.x.x.x

You can also use a name instead of an IP if DNS is configured!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What two commands can be used to configure NTP and how do they work?

A

NTP Master [stratum level]
This command sets up NTP to act only as a server to provide time, with the time derived from the internal clock of the device.

NTP Server [address | hostname]
This sets up your device to act as both a client and a server. Once the clock is synchronized, it supplies timing to other NTP clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stratum level refers to what with respect to NTP? What is the level used for best accuracy and what is the default stratum level? How do router hops affect the stratum?

A

Stratum 1 is the best accuracy. The default level is 8. Every router hop adds one to the stratum, meaning a router two hops away from the master would be stratum 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What commands are used to configure a loopback interface?

A

Enable
conf t
interface loopback0
ip address 172.16.9.9 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should you do with the loopback IP with respect to NTP? What commands are used to configure this?

A

NTP should be configured to use the loopback IP as the timing source. This can be done using the command NTP source loopback 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two different Layer 2 discovery protocols?

A

Cisco Discovery Protocol (CDP)

Link Layer Discovery Protocol (LLDP, vendor neutral)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What devices will CDP discover when used?

A

All directly connected Cisco devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What IEEE standard defines LLDP?

A

IEEE 802.1AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What capability code does LLDP use? What does that code refer to?

A

B. Refers to the bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which 2 capabilities does LLDP not identify that CDP does? Hint, the capability code for the first one is “I”.

A

IGMP and the neighbor’s platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command is used to enable/disable LLDP?

A

[no] lldp run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What command is used to configure LLDP to enable/disable the transmission of LLDP messages?

A

[no] lldp transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What command is used to configure LLDP to enable/disable the receipt of LLDP messages on an interface?

A

[no] lldp receive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a good practice when setting up a network where each router and switch must have timing synchronized quickly?

A

Set the clock of each device as close to the current time as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NAT Addressing refers to inside and outside, as well as local and global. Explain what each term means.

A

Inside- Refers to the permanent location of the host from the enterprise’s perspective. The host is INSIDE the enterprise
Outside- With source NAT, the one address used by the host that resides outside of the enterprise. NAT does NOT change this address.
Local- It is the address used for that host while the packet flows within the local enterprise as opposed to the internet.
Global- The address used for that host while the packet flows in the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain the 4 types of NAT (Inside local, inside global, outside global, outside local)

A

Inside local- The private address of the host used while inside of the enterprise.
Inside global- The address a host within your enterprise uses while traversing the internet.
Outside global- a public address used by a host outside of your enterprise
Outside local- This term is NOT used with source NAT. With destination NAT, the address would represent a host outside of the enterprise, but the address used to represent that host as packets pass through the local enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When configuring NAT, what commands are used to set up the inside and outside portion of the NAT design?

A

ip nat inside

ip nat outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What command is used to statically configure a 1 to 1 mapping of IPs using NAT?

A

Ip nat inside source static inside-local inside-global

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When configuring dynamic NAT, what two commands must be used to set up the NAT pool?

A

Ip nat pool name first address last address netmask subnet mask

Ip nat inside source list acl number pool pool name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When configuring NAT overload (Port Address Translation/PAT), what command must you use?

A

Ip nat inside source list acl number interface type/number overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Why would you want to use NAT overload (PAT)?

A

When your number of inside hosts is larger than the number of available public ip addresses you have available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which RFC addresses the problem with public IPv4 exhaustion by allocating private address space?

A

RFC 1918

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What command would you want to use in order to show hits, misses, interfaces, and access-lists in NAT?

A

Show ip nat statistics

29
Q

What are the four characteristics of network traffic that can be managed with respect to Quality of Service (QoS)? Explain what each characteristic means.

A

Bandwidth- speed of the link in bits per second (bps).

Delay- broken up into one-way and round-trip. One-way delay is the time between sending the packet and it arriving at the destination. Round-trip refers to the time it takes to get to the destination and then receive a reply back. This is also known as LATENCY.

Jitter- the variation in the one-way delay between consecutive packets.

Loss- Number of lost messages, usually reflected as a percentage.

30
Q

What is Quality of Experience (QoE)?

A

The users perception of how fast or slow an application on the network is.

31
Q

What is batch traffic?

A

Batch traffic runs in the background when something must be backed up or transferred. The user does not see nor consider batch traffic.

32
Q

What are our 4 main types of QoS tools? Explain each tool.

A

Classification and marking- marking packets and the definition of trust boundaries.

Queuing- scheduling of packets to give one type of packet priority over another

Shaping and policy- used on opposite ends of a link to control the flow and drop or remark packets

Congestion avoidance- how to manage packet loss that occurs when network devices get too busy

33
Q

When using classification and marking, it is important to MATCH early in the life of the packet whenever possible. What must you do to the packet once matched?

A

Mark. Marking is the process of changing one or more header field values.

34
Q

QoS tools can use ACLs! When a packet is matched by the ACL with a permit, the router will consider the packet a match for QoS. What Cisco propriety application can be used to do this?

A

Cisco Network Based Application Recognition (NBAR/NBAR2)

35
Q

IPP was replaced by DSCP by redefining the ToS byte from 3 bits to 6. This gives us 64 total different markings over the original 8. What is this model referred to as?

A

the DiffServ model

36
Q

Marking the Ethernet header can only be used on an interface enabled with what?

A

trunking (802.1Q)

37
Q

What is DSCP Expedited Forwarding (EF)?

A

A special marking for traffic that needs low latency, low jitter, and low loss.

38
Q

What device in particular should be marked with the decimal number 46 (the marking used for EF)?

A

Voice payloads (Cisco phones)

39
Q

DSCP Assured Forwarding (AFxy) defines how many values, how many separate queues, and how many levels of drop priority?

A

12 DSCP Values
4 separate queues
3 levels of drop priority

40
Q

When using queueing as a QoS tool, what can be used in order to enable more packets to be forwarded over other queues?

A

weight

41
Q

When using policing as a QoS tool, traffic is discarded or re-marked as worse. If the rate goes past what is configured, traffic will be discarded. What can we use with policing in order to allow traffic during low activity?

A

bursting

42
Q

When using policing as a QoS tool, we can dedicate bandwidth to a customer. What is this bandwidth rate referred to as?

A

Committed Information Rate (CIR)

43
Q

When policing is enabled on an interface, it can be enabled in either direction. However, where is is TYPICALLY enabled?

A

at the ingress

44
Q

When using congestion avoidance as a QoS tool, TCP uses a flow control method known as what?

A

windowing

45
Q

When using windowing, what happens to the window size each time an ACK is received?

A

The window size is doubled

46
Q

If a queue is maxed out, all of the packets in the queue can be dropped. What is this known as?

A

full drop

47
Q

What is the one-way delay of voice traffic for network standards?

A

150

48
Q

In order to maximize QoE, that is the bandwidth requirement for video?

A

384Kbps-20Mbps

49
Q

What is the worst drop tolerance in DSCP?

A

AF13

50
Q

What happens to traffic if a customer’s CIR is exceeded?

A

The traffic is dropped

51
Q

What are the three different versions of the First Hop Redundancy Protocol?

A
  1. Hot Standby Router Protocol (HSRP). Cisco only. Active/standby model.
  2. Virtual Router Redundancy Protocol. Vendor Neutral. Active/standby model.
  3. Gateway Load Balancing Protocol (GLBP). Cisco only. Active/active model.
52
Q

Redundancy is crucial in a network in order to ensure network availability. What do we try to avoid in a network with respect to network availability?

A

A single point of failure, as a failure in this part of the network would result in a loss to some part of the user population.

53
Q

What does FHRP do, and why do we use it?

A

FHRP configures two different routers to act as one. This eliminates each router from being a single point of failure and helps increase network availability.

54
Q

The default routers in a subnet share what, as defined by the FHRP? What is this used for?

A

The default routers share a virtual IP address. This virtual IP address is used as their default router address.

55
Q

Explain the role each router plays in HSRP with respect to the active/standby model.

A

Active/standby allows two or more routers to act as one router, with one router being active and the other in a standby state, listening in case the active router goes down.

56
Q

What is the Simple Network Management Protocol (SNMP)?

A

SNMP enables the monitoring and management of the IP-based network, monitoring variables such as interface, bandwidth, availability, latency, etc.

57
Q

What layer does SNMP operate on?

A

Application later

58
Q

SNMP provides a message format between devices known as BLANK and BLANK.

A

agents and managers

59
Q

The SNMP manager is called a BLANK.

A

A Network Management Station (NMS)

60
Q

How do SNMP managers communicate with SNMP agents?

A

Using SNMP protocol messages

61
Q

Each SNMP agent keeps a database of variables in a database known as BLANK.

A

The Management Information Base (MIB)

62
Q

SNMPv1 defined clear-text passwords as BLANK.

A

communities

63
Q

Both agents and manages need a BLANK in order to communicate on SNMPv1.

A

community string

64
Q

What dictates the security mechanisms available on SNMP?

A

The version number (SNMPv1,v2,v3)

65
Q

SNMPv3 got rid of the communities concept, and replaced it with what 3 concepts? Explain each concept.

A

Message integrity- validates if a message has been changed

Authentication- optional. Username plus a hashed password.

Encryption- option. Privacy. Contents of SNMPv3 messages are encrypted.

66
Q

File Transfer Protocol (FTP) resides on what 2 ports, and what communication protocol is used?

A

Ports 20/21 with TCP

67
Q

Trivial File Transfer Protocol (TFTP) uses what ports and what communication protocol?

A

Port 69 with UDP

68
Q

What is the variable in a device agent called in SNMP?

A

OID

69
Q

SNMP managers can be configured to use an alert than must be acknowledged. What is this alert called?

A

an inform alert