Flashcards #4
(31 cards)
In LISP how is the Map Register broken down?
2 parts:
EID - (Endpoint Identifier) Ip address, Vlan Netowk identifier
RLOC - Routing Locator Tunnel Router IP address
On what Lisp device is de-encapsulation performed
ETR
What is EAP?
Extendible Auhtentication Protocol. Provides a common protocol for differing authentication mechanims.
Enables the dynamic selction of the authentication mechanism at authentication time based on information transmitted in the Access-Request.
What EAP method requires that digital certificates are installed on the server but not the client?
PEAP
What EAP method require both a client and a server digital certificate?
EAP-TLS. Can be used for point-to-point connections and for both wired and wireless links.
What symbol in the output of show ip bgp indicates the best route to a destination?
>
What is the first step of QoS
Classification
The first device that is capable of marking will examine the packet and place it into a traffic class
Typically classification is initially classified based on source or destination IP address, source or destination port number, or application type.
What is the 2nd step of QoS
Marking
After classify the traffic, the network device then marks the packet in accordance with the QoS policy applied on the outbound interface.
The marking process always uses traffic descriptors that are dedicated to QoS, such as the Class of Service(CoS), Type of Server (ToS), Differentitated Services Code Point (DSCP), or IP Precedence fields
In QoS, what traffic descriptors are available at the Data Link Layer of the OSI model?
- CoS
- 802.1Q User Priority (PRI)
- Frame Relay discard Eligible (DE)
- Asynchronous Transfer Mode (ATM) Cell Loss Priority (CLP)
In QoS, what traffic descriptors are available at the Network Layer of the OSI model?
- ToS
- DSCP
- IP Precedence
In EEM, what sync status are used with the event cli command to allow the EEM applet to finsih before the CLI command be executed?
sync yes
What does the maximum path command mean?
it limits the number of parallel paths that can be used for load balancing./ Maximum number of parallel routes that an IP routing protocol installs in a routing table.
It supports all IP routing protocols
Where is Traffic Policing applied?
Inbound AND Outbound traffic
What is the purpose of Traffic Policing?
To slow down the traffic to t a value that the medium can support, to monitor bandwidth utilization, to enforce bandwidth limitations at the service PE, and to re-mark traffic that exceeds the SLA
What is the purpose of traffic shaping?
Used to slow down traffic due to congestion, to enforce bandwidth rates, and to send traffic classes at different rates. Applied to only inbound traffic.
What is symmetric active mode, and how do you enable it?
ntp peer command from global config.
NTP i sused to synchronize the time on network devices. A device in sym,etric active mode atempts to mutually synchronize with another NTP host. When symmetric active mode is enabled, the host might synchronize the peer or it might be synchronized by the peer.
When the service password-encryption command has been run, hat happends to the current and future Type 0 passwords?
They are encrypted as Type 7 passwords in the devices running config
What type are enable secret passwords stored as?
Type 5
What is the difference between service password-encryption and enable secret?
enable password - Sets the enable password, and stores that password in plaintext in the config.
enable secret - Sets the enable password, and stores that password as an md5 hash in the config.
service password-encryption - For any passwords in the config that are stored in plaintext, this command changes them to be stored as hashed values instead. This includes the enable password and username password , as well as some other types of passwords.
The big thing to note is that the hashing algorithm used by service password-encryption is a weak one - it is reversed very easily and there are tools online to do so. The hashing algorithm used by enable secret (md5) is not so easily broken.
Here’s the practical effect of the different commands:
What is Syslog default Transport protocol?
UDP
What is VRF Lite?
Virtual Routing and Forwarding Lite is an implementation of ciscos cirtual routing and forwarding (VRF) for catalyst switches and branch routers.
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/vrf.html#wp1045190
Does not support IS-IS and IGRP
Which commands does privilege level 0 grant the user access to?
Only:
- Disable
- Enable
- Exit
- Help
- Logout
What are the default Hello and Dead timers on a OSPF network?
10 seconds Hello
40 seconds Dead ( 4 x Hello)
In Spanning Tree, is Higher or Lower preferred
Lower priority etc wins the race.