1/75
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the port states of STP?
Disabled
Blocking
Listening
Learning
Forwarding
PortFast
Used in RSTP configurations. forces the state to go from discarding straight to forwarding, skipping the learning and listening states.
BPDU Guard
Monitors PortFast enabled ports for incoming BPDUs. If a BPDU is detected, it will place the port into an error-disabled state.
How do you get a port out of an error-disabled state?
issue the shutdown command, followed by the shutdown command.
How do you troubleshoot STP issues
use the command show spanning-tree summary command.
What is the order to request an IPv4 address from a DHCPv4 Server?
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
What is DHCPNAK?
It is a negative acknowledgement message. Used for when a clients request for a network address uses an incorrect network subnet or an expired IP address.
A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL modem that is connected to the local phone company. What method is typically used to configure the connection to the phone company?
Set the WAN connection in the wireless router as a DHCP Client.
What does it mean if the “A” Flag is set to 1?
SLACC is allowed.
What does it mean if the “O” flag is set to a value of 1?
Tells the client to use SLACC to obtain its IP Address and get extra info from a DHCPv6 Server
What does it mean if the “M” flag has a value of 1?
Tells the client to obtain all of its information using DHCPv6.
How do you enable the SLACC-only method?
use the ipv6 unicast-routing command.
What is an EUI-64 Interface ID?
Uses the 48 bit MAC Address. Places FFFF in the middle of the address, converts the address to binary and then flips the 7th bit. This changes the value of the second hexadecimal digit.
What is a randomly generated Interface ID?
Generated by the Operating System of a host. It is used by default on Windows 10 as it is more secure.
What is Duplicate Address Detection?
It ensures that every hosts IPv6 Global Unicast Address (GUA) is unique.
What is the process used to obtain a IPv6 Address
Host sends an RS message to all IPv6 enabled routers.
Router sends an RA Message to the host.
Host sends a DHCPv6 SOLICIT message to the address ff02:1:2
DHCPv6 Server responds with an ADVERTISE Message.
Host responds to DHCPv6 server depending on the M flag in the RA.
DHCPv6 Server sends a reply message with requested configuration parameters.
What happens to the standby router when it stops receiving hello messages from an active router?
The standby router will assume the role of the active router.
Wireless Personal-Area Network (WPAN)
Low power and short range (20-30ft). Example is Bluetooth
Wireless MAN (WMAN)
Used in large geographical areas such as a city. Uses Specific licensed frequencies.
Wireless WAN (WWAN)
Extensive Geographical Areas. Uses licensed frequencies.
Bluetooth
IEEE WPAN standard that pairs devices up to 300ft (100m)
WiMAX
Alternative Wired internet connections. Uses 802.16 and has a 50km range.
802.11
2.4ghz, up to 2mb/s
802.11a
5ghz - up to 54mb/s. CANNOT be used with 802.11b or .11g
802.11b
2.4ghz - up to 11mb/s
802.11g
2.4ghz - up to 54mb/s. Backwards compatible with 802.11b
802.11n
2.4 + 5ghz. 150-600mb/s, requires MIMO tech to be used.
802.11AC
450mb/s to 1.3gb/s. Supports up to 8 antennas.
802.11AX
2.4 + 5ghz, uses High-Efficiency Wireless (HEW), can also use 1ghz or 7ghz frequencies.
What are the 2.4GHZ 802.11 types?
b/g/n/ax
What are the 5GHZ variants of 802.11?
a/n/ac/ax
Autonomous Access Point
Standalone devices that are configured with the use of a CLI or GUI.
Controller-based AP
Also known as a lightweight AP (LAP). uses Lightweight AP Protocol (LAPP) and is configured and managed by the WLC.
Omnidirectional Antenna
Provides 360 degree coverage.
MIMO Tech
Uses up to 8 antennas to increase bandwidth.
Directional Antenna
Focuses radio signal in one direction
ad-hoc mode
used to connect peer-to-peer without an AP.
Infrastructure Mode
Used to connect clients to the network using an AP.
Tethering
Variation of ad hoc topology, where cell data is used to create a hotspot.
Basic Service Set (BSS)
Uses a single AP to interconnect all wireless clients.
Extended Service Set (ESS)
Two BSSs interconnected by a wireless distribution system.
What is the process of CSMA/CA?
Listens
sends a ready to send message to AP
receives a clear to send message from AP
Transmits
Acknowledges all transmissions.
What are the 5 things that a client and an AP must agree on?
SSID
Password
Network mode
Security mode
Channel mode
Passive mode
Access Point publically advertises using broadcast beacon frames.
Active Mode
Clients must know the SSID of an AP
CAPWAP
An IEEE standard that allows a WLC to manage multiple APs and WLANs.
What ports do CAPWAP use?
5246 and 5247.
Datagram Transport Layer Security (DTLS)
Provides encryption between AP and WLC.
Flex Connect Connected Mode
WLC is reachable, full CAPWAP connectivity.
Flex Connect Standalone mode
WLC is unreachable, no CAPWAP connections.
SSID Cloaking
the act of disabling an APs beacon frame.
MAC Address filtering
Administrators can manually permit or deny clients based on MAC Addresses.
Open System Authentication
No password required
Client responsible for security
typically used in cafes and airports.
Shared Key Authorization
Provides mechanisms such as WPA, WPA2, WPA3
Encrypts data between client and AP
Wired Equivelent Policy (WEP)
Utilizes the RC4 encryption method
Based on 802.11 standard
Very outdated.
Wi-Fi Protected Access (WPA)
Enhances WEP by using TKIP.
WPA2
Uses Advanced Encryption System (AES) to encrypt data. Considered the strongest encryption protocol.
WPA3
Uses only the latest security methods. Not backwards compatible.
WPA2 Personal
Intended for home use. Uses PSK
WPA2 Enterprise
Intended for enterprise networks. Requires a RADIUS server.
Temporal Key Integrity Protocol (TKIP)
Used by WPA and supports legacy WLAN devices.
AES
uses CCMP to encrypt data. Used by WPA2.
WPA3 Personal
Thwarts brute force attacks using SAE
WPA 3 Enterprise
Uses 802.1x/EAP Authentication. Requires the use of a 192 bit cryptographic suite.
Open Networks
Do NOT use any authentication methods.
IoT Onboarding
Uses Device Provisioning Protocol (DPP) to quickly onboard IoT devices.
What are the steps for basic network setup?
Log into router via web browser
change default admin password
login with new password
change default DHCP IPv4 Address
Renew the IP address
Log into the router with new IP address.
What are the basic steps to setup wireless?
View WLAN defaults
Change the network mode
Configure the SSID
Configure the Channel
Configure the Security mode
Configure the passphrase
Port Forwarding
A rule-based method of directing traffic between devices on seperate networks.
Port Triggering
Allows the router to temporarily forward data through inbound ports to a specific device.
What are the steps for basic WLAN Configuration?
Create WLAN
Apply and enable WLAN
Select Interface
Secure WLAN
ensure operation of WLAN
Monitor WLAN
View Wireless client information.
What are the steps to configure a new interface?
Create new interface
Configure VLAN name and ID
Configure the port and interface address.
Configure DHCP server address
Apply and confirm
verify interfaces.
What are the steps to configure a DHCP Scope?
configure new DHCP scope
Name the scope
verify the scope
configure and enable the scope
verify the scope
What are the steps to configure a WPA2 enterprise WLAN
create new wlan
configure wlan name and SSID
enable wlan for vlan 5
verify aes and 802.1x defaults
configure WLAN security to use RADIUS server
Verify the WLAN is available.
What are the troubleshooting steps for WLAN Configuration?
Identify the problem
Establish a theory
Test your theory
Establish a plan
Verify System Functionality
Document