V1 Chapter 6. Configuring Basic Switch Managment

¡Supera tus tareas y exámenes ahora con Quizwiz!

log message

A message generated by any computer, but including Cisco routers and switches, for which the device OS wants to notify the owner or administrator of the device about some event.

Imagine that you have configured the enable secret command, followed by the enabled password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode?

enable secret

Which line subcommand tells a switch to wait until a show command's output has completed before displaying log messages on the screen?

logging synchronous

An engineer's desktop PC connects to a switch at the main site. A router at the main site connects to each branch office through a serial link, small router and switch at each branch. Which commands must be configured on the branch office switches, in the listed configuration mode, to allow the engineer to telnet to the branch office switches?

1) The ip address command in interface configuration mode. 2) The ip default-gateway command in global configuration mode. 3) The password command in vty line configuration mode.

local username

A username (with matching password), configured on a router or switch. It is considered local because it exists on the router or switch, and not on a remote server.

VLAN Interface

A configuration concept inside Cisco switches, used as an interface between IOS running on the switch and a VLAN supported inside the switch, so that the switch can assign an IP address and send IP packets into that VLAN.

An engineer wants to set up simple password protection with no usernames for some switches in a lab, for the purpose of keeping curious coworkers from logging in to the lab switches from their desktop PCs. What command would be a useful part of that configuration?

A login vty mode subcommand

enable mode

A part of the Class IOS CLI in which the user can use the most powerful and potentially disruptive commands on a router or switch, including the ability to then reach configuration mode and reconfigure the router.

AAA Server

A server that holds security information and provides services related to user login, particularly authentication (is the user who he says he is?), authorization (once authenticated, what do we allow the user to do?), and accounting (tracking the user).

name resolution

The process by which an IP host discovers the IP address associated with a hostname, often involving sending a DNS request to a DNS server, with the server supplying the IP address used by a host with the listed hostname.

Telnet

The standard terminal-emulation application layer protocol in the TCP/IP protocol stack. Telnet is used for remote terminal connection, enabling users to log in to remote systems and use resources as if they were connected to a local system. Telnet is defined in RFC 854.

An engineer had formerly configured a Cisco 2960 switch to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which commands could have been part of the new configuration?

1) A username name secret password global configuration command. 2) A login local vty mode subcommand

A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250 (with mask 255.255.255.0) is reserved for use by this new LAN switch and that 172.16.2.254 is already configured on the router connected to that same VLAN. The switch needs to support SSH connections into the switch from any subnet in the network. Which commands are part of the required configuration in this case?

1) The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode. 2) The ip default-gateway 172.16.2.254 command in global configuration mode.

Secure Shell (SSH)

A TCP/IP application layer protocol that supports terminal emulation between a client and server, using dynamic key exchange and encryption to keep the communications private.

AAA

Authentication, authorization, and accounting. Authentication confirms the identity of the user or device. Authorization determines what the uses or device is allowed to do. Accounting records information about access attempts, including inappropriate requests.

DNS

Domain Name System. An application layer protocol used throughout the Internet for translating host names into their associated IP addresses.

history buffer

In a Cisco router or switch, the function by which IOS keeps a list of commands that the user has used in this login session, both in EXEC mode and configuration mode. The user can then recall these commands for easier repeating or making small edits and issuing similar commands.

default gateway

On an IP host, the IP address of some router to which the host sends packets when the packet's destination address is on a subnet other than the local subnet.


Conjuntos de estudio relacionados

English 9 Honors Final Study Guide

View Set

The Healthy People Initiative, Household Food Insecurity and Hunger

View Set

Chapter 9 Antimicrobial Chemotherapy

View Set

Marketing Chapters 9, 12, 13, 14, 15, & 16 Multiple Choice Questions

View Set

HTML Tutorial 1 (test study material)

View Set