Module 5 Flashcards
(25 cards)
Virtual LAN - VLAN
It is a virtual LAN, with its own network and broadcast domain. Provides Layer 2 & 3 segmentation. Allows us 2 separate network traffic on switches on a switch port by switch port basis.
Switchport
is the physical opening where a data cable can be plugged in.
Access Port
connects a network host to a single VLAN and manages data traffic for that virtual network. Because data can only go back and forth on the designated VLAN, an access port handles untagged Ethernet frames.
Trunk Port
is a point-to-point link b/w 2 network devices that carry more than 1 VLAN. On a complex network with multiple VLANs, a trunk port manages data transfer to and from those virtual networks. To do so, a trunk port recognizes frame tags that specify the intended destination for the data.
Hybrid Port
can function like both an access port and a trunk port. It can manage both tagged and untagged frames, and can receive data from more than one VLAN. Both user and network devices can be connected through a hybrid port.
VLAN Trunking
a trunk carries multiple VLANs it copies them 2 other switches.
Trunk Encapsulation
add tags to the frames for identification
Inter-Switch Link - (ISL)
is a Cisco proprietary protocol for frame tagging.
Switchport trunk encapsulation dot1q
the command tells the switch that the interface should use IEEE 802.1Q encapsulation on the frames when the interface is configured as a trunk.
VLAN Trunking Protocol - VTP
Cisco proprietary. Allows sharing of VLANs among many switches. VLAN database of the VTP Server is shared w/ the VTP client.
Inter-VLAN Routing - L3 Switch
allows 2 route L3 traffic from 1 VLAN 2 another. Otherwise, those on different VLANs can’t talk. Enable by creating an interface in a switch.
Router on Stick
configuring the router to route traffic b/w VLANs. Enabled by configuring a trunk b/w switch & router and configure the router sub-interfaces.
Spanning Tree Protocol - STP 802.1D
is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Created by Radia Perlman since 1985.
Switching Loop
when a broadcast & multicast are sent out on the network the broadcast traffic is flooded out of all ports. As a result, this will repeat & flood the network until CPU & bandwidth are completely exhausted on the switch.
Bridge Protocol Data Unit - BPDU
contains switch MAC address & STP priority bridge aka (Bridge ID).
Root Bridge
using Bridge ID select spanning-tree root bridge. An election is determined by the lowest # bridge ID. If SPT is the default root bridge will be a switch with the lowest MAC address.
Rapid Spanning Tree - RSTP - 802.1W
has fewer port states & faster convergence. Discarding = Blocking, Learning, & Forwarding. In contrast to STP, it takes 30- 50 sec to converge. Port state is listening, learning, blocking, &forwarding.
Speed & Duplex
any device w/ a NIC has speed & duplex. These must match in switches, auto-negotiate can hard set speed & duplex.
Power Over Ethernet - 802.3AF - PoE
provides electrical power 2 PoE supported devices via copper cable Cat5 & >. Has 15.4 watts of DC power but PoE+ (802.3at standard) provides up to 25.5 watts.
Port Bonding
Linking 2 or more connections on a single link to increase bandwidth. Used 2 upstream Sw & prevent congestion. Uses Link Aggregation Control Protocol - LACP (open source) & Etherchannel (cisco).
Port Mirroring
used 2 monitor traffic on a specific port. Duplicated network traffic from 1 port & mirrors it 2 another port. Attaches a sniffer or traffic analyzer 2 destination port. Ex ( Wireshark). Called SPAN on cisco devices.
MAC Filtering
used a lot w/ wireless networks. Restricts access 2 only specific wireless devices.
Port Security
Allows a specific MAC @ 2 connect 2 a specific port. If the wrong MAC @ it gets deleted & automatically shut down (turned off)
Authentication
the switch will send network authentication request 2 an authenticator server 4 verification of user account or host MAC @. Uses EAP in 802.1x to communicate authentication.