Switch Part Deux Flashcards

1
Q

To access Telnet or SSH

A

A switch needs a working IP configuration, as well as login security on the vty lines (password and/or username)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enable password

A

used to protect enable mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Parameters for usernames and passwords

A

login local line subcommand

username teresa password (or secret) giudice global config command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AAA server

A

Switch sends message to the AAA server asking whether the name and password are allowed and the AAA server replies; usually use either the RADIUS or TACACS+ protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Configuring SSH

A
  1. use login local line subcommand
  2. username teresa password(or secret) giudice global config command
  3. ip domain-name example.com to configure a DNS domain name
  4. Create encryption keys using the crypto key generate rsa global config command
  5. ip ssh version 2 global config command for enhanced security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Info about status of SSH on the switch

A

show ip ssh: status info about the SSH server itself

show ssh: shows info about each user currently connected into the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Controlling support of Telnet and SSH command

A

transport input {all|none|telnet|ssh} vty subcommand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

service password-encryption

A

offers weak password encryption to all unencrypted passwords; usually start with 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MOTD bammer

A

Shown before the login prompt; used for temporary messages that can change from time to time (banner motd # message #) global config command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Login banner

A

Shown before login prompt but after MOTD banner; used for permanent messages (banner login # message #) global config command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exec banner

A

shown after login prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

show history

A

lists commands currently held in the history buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

history size

A

from console or vty line config mode, sets number of commands saved in the history buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

terminal history size

A

from enable mode, set number of commands saved in the history buffer for this one terminal session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

logging console

A

global config command that enables syslog messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

logging synchronous

A

console line subcommand that displays syslog messages only at more convenient times, such as after a show command

17
Q

Configuring IPv4 on a switch

A
  1. interface vlan 1
  2. ip address ip-address mask
  3. no shutdown
  4. ip default-gateway 192.168.1.1 global config command
  5. ip name-server ip-address1 ip-address2
18
Q

Enabling DHCP on a switch

A
  1. int vlan 1
  2. no shutdown
  3. ip address dhcp

show dhcp lease to view DHCP info

19
Q

duplex and speed

A

interface subcommands used to statically configure the duplex and speed of port

20
Q

Port security

A

identifies devices based on the source MAC address of Ethernet frames the devices send

21
Q

switch port violation

A

occurs whenever a new source MAC address arrives at the port, pushing the number of allowed MAC addresses past the allowed maximum

22
Q

sticky secure MAC addresses

A

Port security learns the MAC addresses off each port and stores those in the port security configuration (in the running-config file).

23
Q

Configuration of port security

3-6 are optional

A
  1. make switch either a static access or trunk interface (switchport mode access (or trunk) if subcommand)
  2. enable port security (switchport port-security if subcom)
  3. switchport port-security maximum 5
  4. siwtchport port-security violation {protect|restrict|shutdown}
  5. switchport port-security mac-address
  6. switchport port-security mac-address sticky
24
Q

Securing unused switch interfaces

A

Shutdown interface
make port a nontrunking interface
assign port to an unused VLAN via switchport access vlan 30
set native VLAN to an unused VLAN

25
Reasons for choosing VLANs
1. reduces CPU overhead on each device by shrinking broadcast domain 2. reduce securtity risks 3. create more flexible designs 4. solve problems more quickly 5. reduce workload for STP
26
VLAN trunking .....
Adds another header to the frame before sending it over the trunk that includes the VLAN ID
27
802.1Q
trunking protocol that inserts a 4-byte VLAN header into the Ethernet header
28
Native VLAN...
802.1Q does not add its header; both switches must agree on which VLAN is the native VLAN; supports connections to devices that do not understand trunking
29
Layer 3 switches are known as....
Multilayer switches and they are based on the function between a layer 2 switch and a layer 3 router
30
Layer 2 switches will not....
forward data between two VLANs
31
Purpose of VLAN Trunking Protocol (VTP)
To dynamically advertise VLAN configuration information
32
Dynamic Trunking Protocol
used for Cisco switches that support both the ISL and 802.1Q trunking methods
33
switchport trunk encapsulation {dot1q|isl|negotiate}
used for Cisco switches that support both trunking methods or use DTP to negotiate the method
34
Limit VLANs using this if subcommand:
switchport trunk allowed vlan {add|all|except|remove} 3-5
35
Reasons a particular VLAN may be prevented to cross a trunk:
1. VLAN is removed from the trunk's allowed VLAN list 2. A VLAN dne in the switch's configuration 3. VLAN has been administratively disabled 4. A VLAN has been automatically pruned by VTP 5. STP has placed the trunk into a blocking state