CCNA Cram Flashcards

1
Q

How config SSH

A
  1. Configure host name
    conf t
    hostname [hostname]
  2. Configure DNS domain name
    ip domain name [domainname]
  3. Generate RSA keys
    crypto key generate rsa
  4. Config enable password, username/password (ACL if you want to)
    enable secret [password]
    username [username] secret [password]
  5. Enable SSHv2
    ip ssh version 2
  6. Configure VTY lines
    line vty 0 15
    login local
    transport input ssh
    access-class 1 in (if putting in ACL)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What error do you get if not create hostname first when config ssh

A

Please define hostname other than Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What error do you get if try to create key for SSH and no domain name specified

A

Please define a domain-name first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HSRP v1 IP and MAC

A
  1. 0.0.2
  2. 0c07.acXX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HSRP v2 VIP and MAC

A
  1. 0.0.102
  2. 0c9f.fXXX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VRRP VIP and MAC

A
  1. 0.0.18
  2. 5e00.01XX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GLBP IP and MAC

A
  1. 0.0.102
  2. b400.XXYY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Max ports in LAG on WLC

A

2504 and 3504 - 4

5508 - 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do APs know the IP of WLC

A

option 43 ip [ip of WLC]

Set this up in the DHCP configs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Configs to set up DHCP server

A

ip dhcp pool [pool name]

network [ip network] [subnet mask]

default-router [default router ip]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Interfaces on WLC

A

Software interfaces:

Management - Telnet, SSH, HTTP, HTTPS, Radius, NTP, Syslog

Redundancy Management -

Virtual interface - used when comminucation w/ wireless clients to relay DHCP, client web authentication

Service ports - used for out-of-band management

Dynamic - used to map WLAN to VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What see if Duplex issues

A

Full duplex side - High FCS Errors

Half duplex side - High collisions specifically late collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Speed mismatch

A

Usually will bring interface down (down/down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPAs with Encryption Method / Data Integrity Method / Key Management / Authentication

A

WEP - Encryption-RC4 / Authentication-Open System & Shared Key / Integrity-CRC-32

WPA - Encryption-TKIP w/ RC4 / Authentication-PSK & 802.1x w/ EAP / Ingegrity-64 bit MIC

WPA2 - Encryption-AES-CCMP / Authentication-PSK & 802.1x w/ EAP / Integrity-CCMP w/ AES

WPA3 - Encryption-AES-GCMP / Authentication-AES-GCMP / Integrity-SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does power inline police command do

A

Disables port and sends syslog message if PD draws too much power

Interface will go in err-disable state and can be restored with shutdown then no shutdown command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does power inline police action err-disable command do

A

disables the port and sends syslog message if PD draws too much power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does power inline police action log command do

A

If PD pulls too much power it will just restart interface and send Syslog (will not disable the interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is NETCONF

A

Is SBI

Uses XML and RPCs

Relies on SSH for transport

Used to configure network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What encoding formats do REST APIs use?

A

XML - uses HTML-like tags (uses tags to define blocks of data)

JSON - uses objects that contain key and value pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is REST API used for?

A

Used on the Northbound Plane to communicate with the SDN application plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OnePK

A

Is used for SBIs

Is Cisco Proprietary SBI

Uses Java C or Python to config devs

Can use either SSL or TLS to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OpFlex

A

Is SBI protocol

Uses declarative SDN model - instructions sent to controller not so detailed

Allows devs in data plane to make more network decisions on how to implement policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Open Flow

A

Is SBI Protocol

Is an imperative SDN model

Detailed instructions sent to SDN controller when new policy config’ed

SDN Controller manages both the network and the policies applied to the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What SBI Protocols are used in SDN

A

OnePK

OpFlex

OpenFlow

NETCONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What NBI protocols are used in SDN
REST OSGi
26
What is REST
Uses HTTP or HTTPs to enable external resources to access and make use of programs exposed by API Usually use XML or JSON
27
What is OSGi
Is NBI Protocol Java based Enables development of modular programs Allows Python language as means of extended controller functions For transport often use HTTP
28
What is a recursive static route
Specifies destination IPv6 nework and IPv6 next hop address only
29
How many routers can a router make neighborships with in the DROTHER state for OSPF?
Only with the DR and BDR
30
How can you tell if routers are connected are on point-to-point / point-to-multipoint network in OSP?
There is no DR/BDR in point-to-point or point-to-multipoint OSPF networks.
31
OSPF hello/dead timers
If hello/dead timers dont match then neighborship will not establish Ethernet link Hello: 10/40 Point-to-Point link Hello: 10/40 Point-to-Multipoint link: 10/40 Non-broadcast Link Hello: 30/120
32
What is ARP Poisoning and how to stop
Attacker sends gratutious ARP to host Associates attackers MAC with the IP of valid host Traffic will go through the attackers pc to stop - implement DAI
33
What is VLAN Hopping and how stop it
Attacker injects packets into other VLANs by accessing VLAN Trunks and double tagging 802.1Q Frames if successful - allows attacker to send traffic to other VLANs w/o router To prevent - disable DTP on trunk ports, change the native VLAN and config user-facing ports as access
34
What is MAC spoofing and how to stop it
Attacker uses MAC of another host to bypass port security methods Also can impersonate another host Implement port security with sticky secure MAC addresses
35
MAC Flooding and how to stop
Attacker generates forged frames every minute to overwhelm MAC addy table Then cant make forwarding decisions and all traffic flooded Attacker can see all data To stop - add port security to limit MAC addys to be learned on interface
36
What is DHCP spoofing and how to stop
install rogue DHCP server to intercept DHCP req respond with own IP as default gateway and can see everything to fix - enable DHCP snooping
37
What is DAI and how implement
Mitigates ARP poisoning attacks (or ARP Spoofing attacks) DAI inspects traffic on ingress ports to ensure incoming traffic doesn't contain ARP replies from HOST computers Supported on: Access Ports, Trunk Ports, EtherChannel Ports, Private Virtual LAN Ports Enabled on single or multiple VLANs Configuration: conf t ip arp inspection vlan [vlans] CANNOT put DAI on interfaces - ONLY globally
38
What is Port Security and how to implement
Allows traffic into switchport from Authorized MAC If not authorized is discarded and sometimes that port will be disabled Enabled on interface level By default - only allows ONE MAC Can do a few different ways: switchport port-security (allows 1 MAC) switchport port-security mac-address [MAC addy] - for specific MAC switchport port-security maximum [number] - max number of MACs to learn dynamically from the interface switchport port-security mac-address sticky - dynamically learned MACs will be saved when switch restarts By default when violation occurs it will be shutdown
39
Port-security violations
If port-security violation occurs - by default interface will go into err-disable Reenable by shut/no shut OR errdisable recovery cause psecure-violation CAN change so doesnt disable with: switchport port-security violation restrict - this will send counter to increment and send SNMP trap notificiation
40
NTP static client mode
NTP static client mode is the default The client will get time from an NTP server ntp server [ip address of the NTP server]
41
NTP broadcast client mode
Listens on config'ed interfaces for NTP broadcasts from NTP server NTP client uses this to adjust time Broadcast can get time from any NTP server
42
NTP Authentication Mode
Provides source verification for NTP sync'ing Supports MD5 keys to enable: ntp authenticate ntp authentication-key [keynumber] md5 [key] ntp trusted-key [key number] ntp server [ip address] key [key number]
43
NTP Modes
Static Client Broadcast Client Authentication Server Asymetric Active
44
NTP Server Mode
45
NTP Server Mode
To enable ntp master [stratum 1-15] Default stratum 8 Sync time with clients and with eachother Dev with higher stratum numbers get time from dev with lower stratum numbers
46
NTP Symetric Active Mode
Command is: ntp peer [ip address of NTP host] attempts to mutually sync with another NTP host host might sync peer or be synced by peer
47
Application Plane SDN
Applications that are written to allow interaction with control reside in Applications designed to improve network management effeciency through network automation Use NB APIs like REST and OSGI
48
Control Plane SDN
Centralized Responsible for network decisions making (OSPF) Connects to Application plane via NBIs Conencts to Data plane via SBIs
49
Data Plane SDN
Network tasks pushed down by Control Plane to Data Plane Include encapsulation/deencapsulation, adding/removing trunk headers, matching MAC addys to tables, IPs to paths, encryption, NAT, ACLs Connects via SBIs to Controller
50
Management Plane SDN
Network management protocols Telnet, SSH, SNMP, Syslog
51
Collision troubleshooting
Collision - happens before 64th byte Usually due to duplex mismatch Malfunctioning dev Too many nodes LATE Collision - happens after the 64th byte Usually due to duplex mismatch To long network segment
52
What is runt and what causes it
Frame with less than 64 bytes and has bad FCS Discarded May be excessive collisions or malfunctioning hardware
53
What is baby giant
Frame up to 1600 bytes can happen in Q-in-Q encapsulation, MPLS
54
What is giant
frame up to 9216 bytes can issue system mtu [bytes] to allow - but need make sure supported.
55
lldp commands
no lldp run - turns off globally from global config lldp transmit - turns on interface from interface config to send out lldp receive - turns on interface from interface config to receive add no in font of above to turn off on interfaces
56
Interfaces on WLC
STATIC: management AP-manager interface virtual interface service port interface
57
Management Interface on WLC
Static Used for management information Used for all L2 LWAPP to communication btw controller and APs Used to communicate with other WLCs
58
Service Port Interface on WLC
Static interface used for maintenace purposes used to recover WLC if fails only interface available while WLC booting
59
Dynamic Interface
User defined Used for client data Doesnt need to be reachable by all other WLCs Works like VLANs
60
Ways to assign IPv6 address
(1) ipv6 enable - will derive a link local IPv6 address (online inside the link) (2) ipv6 address [address/prefix length] eui-64 - configs static IPv6 using standard and MAC - manual (3) use SLAAC or DHCPv6 - ipv6 address autoconfig (SLAAC) ; ipv6 address dhcp (DHCPv6)
61
What Supports Cisco SDA
Cisco DNA
62
What is Cisco IOS 15
Is network OS used to config, manage and troubleshoot single dev Interact via CLI through SSH or Telnet
63
What is Cisco Network Assistant
free Java-based Application Allows LAN admin to do network operation, diagnois issues, interact with network dev via a GUI Supports managemet of up to 80 devs
64
What is Cisco Prime Infrastructure (PI)
Enterprise Cisco managment platform Relies on browser GUI Admins can do operations on network, diagnosis issues, and interact with dev on the network
65
how to remove RSA keys from router
crypto key zeroize rsa
66
Puppet
Accepts IB req from agent using HTTPS on TCP 8140 Operates on Linux, UNIX, Microsoft Windows Uses client/server Written in Ruby DSL or Puppet DSL
67
Chef
Works on Linux, UNIX and Windows Either client/server or cleint only Communicates using HTTPS on TCP port 443 Config in Recipes in Cookbooks Written in Ruby DSL Managed nodes running client can pull cookbooks Standalone can pull from local dir
68
Ansible
Linus, Unix, Windows no agent software on nodes uses SSH on TCP 22to connect to nodes Configs in playbook written in YAML
69
What is Cisco ACI
Application Centric Infrastruction Leaf/Node Used in data centers Network application policies defined on APIC (Cisco Application Infrastructure Policy) - applied on Leaf/Nodes
70
How update in OSPF: Router ID cost hello interval dead interval
Router ID - In router config: router-id [id number] Cost - In interface config: ip ospf cost [cost] Hello interval - In interface config : ip ospf hello-interval [seconds] Dead interval - In interface config : ip ospf dead-interval [seconds]
71
What is a recursive static route
a route to a network that only provides the originating IP and the terminating IP
72
What is a directly attached static route
provides the network and the interface to egress
73
What happens if MTU settings are mismatched in OSPF
will get stuck in Exstart, Exchange or Loading states
74
What does it mean if OSPF shows 2WAY/DROTHER
Means that neither are DR or BDR and so stay in 2way state
75
OSPF Broadcast Network Type
Enabled by default on FDDI and Ethernet Have DR and BDR elections Multicast updates send (dont have to use neighbor command) Hello is 10s / Dead is 40s Command: ip ospf network broadcast
76
OSPF Non-Broadcast Network Types
Enabled by default on Frame Relay and X.25 DR/BDR elections Must manually config neighbor routers using neighbor command Hello is 30 / Dead is 120 use command ip ospf network non-broadcast
77
OSPF point-to-point network type
Enabled by default on HDLC and PPP DR/BDR elections are not done Multicast updates sent - no need to use Neighbor command Hello / Dead : 10/40 Use ip ospf network point-to-point
78
OSPF point-to-multipoint networks
DR/BDR elections not done Uses multicasts Hello / Dead : 30 / 120 ip ospf network point-to-multipoint
79
OSPF point-to-multipoint nonbroadcast network
DR/BDR elections NOT done must use neighbors to manually config neighbors Hello / Dead are 30 / 120 ip ospf network point-to-multipoint non-broadcast
80
Layer 3 Security Options in WLC using GUI
Different for WLAN and Guests: Found in Layer3 Security dropdown on Layer3 tab of Security in the GUI: \*\*Must select L2 security before selecing L3 secuity\*\* None - WLAN or Guest IPSec - WLANs only VPN Pass-through - WLANs only - allows client to establish connection specific VPN server Web Authentication - Guest only - prompts for username/pwd when client connects to network Web Passthrough - Guest only - enables direct access to network for Guest LAN w/o prompting for username/password
81
Layer 2 Security Options in WLC
Secuity then Layer2 \*\*Can't do L2 security on Guest LAN\*\* Options: None WPA + WPA2 802.1X - Uses EAP and dynamic WEP key Static WEP - uses static shared WEP key Static WEP + 802.1X - uses shared WEP or EAP CKIP - uses CKIP None+EAP Passthrough - uses open authentication with EAP authorization
82
What error would you get if you installed SFP not supported
SYS-3-TRANCEIVER\_NOTAPPROVED
83
What happens if you connected cable to wrong port?
See ports on switch up but line protocol down
84
What do you see if there is issue with fiber cable
You'd see port status lights on the SFP module not lit
85
What is AES
AES encryption algorithm (Advanced Encryption Standard) Used in WPA2 and WPA3 Stronger than RC4 used in WPA 128 bit cipher used to encrypt with secuity key of 128, 192 or 256 bits
86
What is CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol Provides additional encryption - using block ciphers Used by WPA2
87
What is RC4
Stream cipher encryption Used in WEP Not very secure
88
TKIP
Temporal Key Integrity Protocol Provide MIC and encryption Used in WPA Better that WEP but uses RC4 as encryption algorithm
89
GCMP
Galois/Counter Mode Protocol Used with AEP for MIC and Encrpytion Used in WPA3 Uses GMAC for MIC
90
What command should you use to get general info about AP on WLC
show ap config general [AP name] Shows IP address and other info on Cisco AP
91
92
How can you get detailed info on AP on WLC
show ap config general [ap name] includes AP IP, default gateway IP, DNS
93
See Syslog server settings for all APs joined to WLC
show ap config global can see syslog host, logging level, telnet, ssh, TX power, attena status.
94
How see memory dump for AP
show ap core-dump [ap name] large and used for troubleshooting
95
How see crash dumps and radio core dump from APs
show ap crash-file
96
What is PSK
Its Key Management method Used in WPA or WPA2 Wireless clients connect to network w/ Key configed on WLC Key can be ASCI or HEX
97
Key management on WLC
PSK 802.1X CCKM
98
What is 802.1X
Default for WPA and WPA2 on Enterprise Requires RADIUS server Uses EAP to authenticate users
99
What is CCKM
Key Managment
100
What is FIB
Forwarding Information Base All prefixes from IP routing table structured in way optimized for forwarding The FIB and Adjacency table are 2 main componets of Cisco Express Forwarding (CEF) Is synced with IP routing table IP prefixes ordered so when L3 addy compared to FIB - longest most specific match found fist - makes faster
101
What is the adjacency table?
maintains L2 addressing info for FIB each network prefix in FIB assoc with next-hop addy and OB interface
102
IPSec
Provides data confidentiality, data integrity and origin authentication Uses ESP for confidentiality - encrypts entire IP packet and encapsulates it Uses AH to ensure integrity of packet and to authenticate packet AH verifies that the source addy in packet not modified - does NOT authenticate the identity of IPSec peer GRE handles lots protocols but not secure - IPSec only does IP but highly securte Package togehther with GRE over IPSec.
103
GRE
Generic Routing Encapsulation Provides broadcast and multicast packet encapsulation Cisco Proprietary Can tunnel info from one network to another w/o requiring transport security to support the network protocols in use at tunnel source/destination Can transport many different protocols - limited in security Combine GRE with IPSec
104
802.1w
RSTP Includes Portfast, Uplink Fast, Backbone Fast
105
802.1D
Traditional STP
106
802.1s
Multiple STP Creates multiple STP on network
107
Difference btw PortFast, Uplink Fast and Backbone Fast
Portfast puts port to immediately in forwarding state Uplink Fast - increases convergence speed for access layer that detects failure on root port with backup root port selection by immediately replacing rootport with aternative root port Backbone Fast - increase for switches that detect failure on links that are not directly connected to switches
108
What is BDPU Loop guard
Prevents non-designated ports from inadvertantly forming bridging loops if the steady flow of BDPUs is inturupted If port stops getting BDPUs it goes into loop-inconsistant phase and blocks Once gets BDPUs again it reenables the port and goes through the normal STP states To enable globally: spanning-tree loopguard default Or on port: spanning-tree guard loop
109
110
How GRE over IPSec works
Sending dev combines session key w/ data Uses session key to encrypt key and data Sending dev encapsulates data and key into packet with VPN header and new IP header Send dev
111
How to enable a password by entering the hash and not the password
enable secret 5 [md5 hash]
112
what type of encryption is used when do service password encryption
type 7
113
IPv6 Unicast
For a single interface Types: Global Unicast, Link Local, Loop Back, Unspecified
114
IPv6 MultiCast
ID's set of interfaces belonging to different nodes Can be node, link, site, orginization, global 4-bit field in the prefix id's scope Types: Solicited node, All nodes, All routers Use prefix FF00::/8
115
IPv6 Addy types
Unicasts MultiCasts AnyCasts
116
IPv6 Anycast
Set of interfaces that belong to different nodes Similar to multicasts but only sent to one interface and not all Sends to closes node
117
Global Unicast address
Unique IPv6 addy assigned to host interface Same as IPv4 public address Routable on the internet
118
Link-Local IPv6 Address
Allows communication btw neighboring hosts on same link Have local scope and cannot be used outside link Prefix FE80::/10
119
Loopback IPv6 Address
Used on loopback interface ::1/128
120
Unspecified IPv6 Address
All 0s ::/128
121
Solicited Node Address
Multicast addy Neighbor Solicitation (NS) messages sent here
122
All-nodes Address
Multicast Router Advertisements sent here
123
All-Router IPv6 Address
Router solicitation messages sent here Is multicast address
124
SMTP
Simple Mail Transfer Protocol Uses TCP port 25
125
SNMP
Simple Network Management Protocol UDP port 161
126
what does vty password enable
it enables password anytime you are accessing router virtually ssh / telnet
127
How set console password
Used if using cable to physically connect to router When password entered - goes until user EXEC mode line console 0 password [password]
128
How set telnet password
line vty 0 15 login password [password]
129
Multicast MAC address
Begins with 01-00-5E
130
RFC 1918
A Class: 10.0.0.0 - 10.255.255.255 B Class 172.16.0.0 - 172.31.255.255 C Class 192.168.0.0 - 192.168.255.255