2.8 Network Device Management Access Flashcards

Summarize network device management access (Telnet, SSH, HTTP, HTTPS, console, TACACS+/RADIUS, and cloud managed). (24 cards)

1
Q

What is Telnet used for in network device management?

A

For remote Command Line Interface access.

(CLI)

Telnet transmits data in plaintext, which poses a security risk as usernames, passwords, and commands can be intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define:

SSH (Secure Shell)

A

A secure protocol for remote CLI access.

SSH encrypts communication, making it more secure than Telnet, which transmits data in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the key differences between SSH and Telnet?

A
  • SSH encrypts data; Telnet does not.
  • SSH is more secure than Telnet.
  • SSH uses port 22; Telnet uses port 23.

SSH is the preferred protocol for secure remote device management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False:

A network device can only be managed via one protocol at a time.

A

False

Devices can support multiple management protocols, but it is best practice to disable insecure ones like Telnet in favor of more secure options like SSH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank:

The default port used by Telnet for remote access is ________.

A

23

Telnet uses port 23 by default to facilitate remote access. It operates in plaintext, meaning all traffic, including credentials, can be intercepted without encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the process of configuring SSH on a Cisco device.

A
  1. Set a domain name
  2. Generate RSA keys
  3. Enable the SSH server
  4. Configure user authentication

SSH configuration ensures secure access and prevents unauthorized remote login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary security risk associated with using Telnet?

A

It sends all data, including usernames and passwords, as clear-text data.

Telnet is generally considered insecure and should be replaced by more secure protocols like SSH, which encrypts communication to protect sensitive data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What method is used to access the graphical interface of a WLC?

A

HTTP/HTTPS

HTTP and HTTPS protocols are used for web-based access to the WLC’s graphical user interface, with HTTPS providing encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False:

HTTP is considered secure for remote management of network devices.

A

False

HTTP sends data in plaintext, while HTTPS provides encrypted, secure communication for web-based device management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is encryption important for protocols like SSH and HTTPS?

A

It secures data from unauthorized interception.

Without encryption, sensitive information such as passwords and configuration details can be exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary function of TACACS+?

(Terminal Access Controller Access-Control System Plus)

A

It is used for authentication, authorization, and accounting.

TACACS+ provides centralized control over device access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary function of RADIUS?

A

It is used for network access authentication and authorization.

RADIUS (Remote Authentication Dial-In User Service) is widely used for managing access to network devices, but it combines authentication and authorization, unlike TACACS+.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the benefits of using TACACS+ over RADIUS.

A
  1. Granular control.
  2. Encryption of the entire payload.
  3. Separate authentication, authorization, and accounting.

TACACS+ provides more security and flexibility compared to RADIUS, which is simpler but less secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False:

RADIUS provides more detailed logging than TACACS+.

A

False

TACACS+ offers more detailed accounting logs, whereas RADIUS provides basic authentication and accounting logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List the steps to configure RADIUS authentication on a network device.

A
  1. Define the RADIUS server IP.
  2. Set a shared secret.
  3. Configure RADIUS settings.
  4. Test authentication.

RADIUS enables centralized user authentication and authorization for network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank:

A console port provides ______, out-of-band access.

A

local

The console port is typically used for initial configuration or troubleshooting when network access is unavailable.

17
Q

Define:

What is a cloud-managed device?

A

A device managed via a cloud-based platform.

Cloud management centralizes control and enables remote configuration, offering scalability and flexibility across distributed networks.

18
Q

What are the two modes of operation in the CLI?

A

User EXEC mode and Privileged (Enable) mode

User EXEC mode allows basic commands, while Privileged mode allows powerful commands.

19
Q

Fill in the blank:

To switch from User EXEC mode to Privileged mode, enter the command ________.

A

enable

The “enable” command switches you to Privileged mode, where you can execute configuration commands.

20
Q

Fill in the blank:

The command used to reboot a Cisco switch from the CLI is ________.

A

reload

The “reload” command is executed in Privileged mode and is typically used to apply changes or reboot the device for recovery.

21
Q

What does the command ‘enable secret <password>‘ do?

A

Defines the password required to access Privileged mode.

The “enable secret” command sets an encrypted password for Privileged mode, offering more security than the “enable password.”

22
Q

True or False:

The WebUI allows direct configuration and CLI access for verification.

A

True

The WebUI provides a graphical interface for configuring network devices and can allow CLI access for advanced settings.

23
Q

What tool can be used to assist with command recall in the CLI?

A

? (question mark)

The ”?” command provides context-sensitive help, listing valid commands or options in the current CLI mode.

24
Q

How does pressing the Tab key assist in command entry?

A

It completes the rest of the command.

The Tab key is a time-saving feature that auto-completes commands or parameters once enough characters have been typed.