Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
What does 802.1x do? |
Requires a user to authenticate with a username/password before sending frames onto a LAN |
|
What do switch stacking and chassis aggregation do? |
Treat multiple physical switches as a single logical switch |
|
What Cisco layer is switch stacking usually used for? |
The Access layer |
|
What Cisco layer is Chassis aggregation usually used in? |
The Distribution layer |
|
What is an authenticator? |
An 802.1x switch that receives authentication credentials |
|
What is an AAA server? |
A server that verifies authentication for an 802.1x switch |
|
What Layer 2 protocol does 802.1x use? |
Ethernet |
|
What OSI layer does 802.1x operate at? |
Layer 2 |
|
What protocols do AAA servers use for Layer 3 and 4? |
IP and UDP |
|
What is a user attempting to authenticate to an 802.1x system called? |
A supplicant |
|
How are credentials encapsulated when they are sent to an AAA server? |
In an EAP over LAN (EAPoL) frame |
|
What are the 2 AAA protocols? |
TACACS+ and RADIUS |
|
What Transport layer protocol does TACACS+ use? |
TCP |
|
What Transport layer protocol does RADIUS use? |
UDP |
|
What advantage does TACACS+ provide when authenticating access to a switch? |
The ability to limit access to commands |
|
What is TACACS+ most often used for? |
Authenticating to a network device |
|
What is RADIUS most often used for? |
User authentication |
|
What port(s) does TACACS+ use? |
TCP 49 |
|
What port(s) does RADIUS use? |
UDP 1645 and 1812 |
|
Does TACACS+ encrypt the entire packet? |
Yes |
|
Does RADIUS encrypt the entire packet? |
No, only the credentials |
|
What command is used to enable AAA on a switch? |
aaa new-model |
|
What OSI layer does DHCP snooping operate at? |
Layer 2 |
|
What 2 port states does DHCP snooping create? |
Trusted and untrusted |
|
What does DHCP snooping do with untrusted ports? |
Watches them for unusual DHCP messages and discards them |
|
Once DHCP snooping is enabled, what status are ports in by default? |
Untrusted |
|
What sorts of ports should be placed in trusted mode for DHCP snooping? |
Routers, switches and DHCP servers |
|
What is the DHCP Binding Table? |
A database about successful IPv4 DHCP leases maintained by DHCP snooping |
|
What do switches in switch stacking use to connect to each other? |
Stacking ports |
|
How are stacking ports in switch stacking connected? |
In a ring |
|
What is the controlling switch in a switch stacking scenario called? |
The stack master |
|
What 2 switch-stacking technologies does Cisco support? |
FlexStack and FlexStack Plus |
|
What speed does FlexStack run at? |
10 Gbps |
|
What speed does FlexStack Plus run at? |
20 Gbps |
|
How many switches does FlexStack support? |
4 |
|
How many switches does FlexStack Plus support? |
8 |
|
How many switches can participate in chassis aggregation? |
2 |
|
What connection does chassis aggregation use? |
Standard ethernet interfaces |
|
What does Multichassis EtherChannel do? |
Lets you bundle links to multiple switches bound through chassis aggregation as a single link |