ccnp sw ch 17

  1. Which one of the following can filter packets even if they are not routed to another Layer 3 interface?




    B.
  2. In what part of a Catalyst switch are VLAN acls implemented?

    a. NVRAM
    b. CAM
    c. RAM
    d TCAM
    d
  3. Which one of the following commands can implement a VLAN ACL called test?




    A.
  4. After VACL is configured, where is it applied?




    D.
  5. Which of the following private VLANs is the most restrictive?




    D.
  6. the vlan 100 cmd has just been entered. What is the next command needed to configure vlan 100 as a secondary isolated VLAN?




    C.
  7. What type of port config should you use for private VLAN interfaces that connect to a router?




    B.
  8. Promiscuous ports must be  ________ to primary and secondary VLANS, and host ports must be ____________.




    C.
  9. In a switch spoofing attack, an attacker makes use of which one of the following?




    D.
  10. Which one of the following commands can be used to prevent a switch spoofing attack on an end=user port




    C.
  11. Which one fo the following represents the spoofed information an attacker sends in a VLAN hopping attack?




    B.
  12. Which one of the following methods can be used to prevent a VLAN hopping attack?




    D.
  13. detail VACL configuration.
    • G ip access-list extended local 17
    • ACL permit ip host 192.168.99.17 192.168.99.0 0.0.0.255
    • ACL  exit
    • G vlan access-map block-17 10
    • AM match ip address local-17
    • AM action drop
    • AM vlan access-map block-17 20
    • AM action forward
    • AM exit
    • G   vlan filter block-17 vlan-list 99


    • Note.  ACL local-17 IDs IP address to block. Access-map says "based on ACL local-17, drop, then forward the rest".
    • Then, the last line sets the filter onto vlan 99.
  14. Describe a Private VLAN (PVLAN)
    Where a host or primary vlan can be logically associated with a secondary vlan.  The secondary vlan can then talk to ports in the primary vlan (e.g. a router).
  15. What are the 2 types of secondary vlans?  (in a private vlan setting).
    Isolated - all hosts on this can only talk to the primary vlan.

    Community - these hosts can talk to the primary vlan and with each other.  they can't cross private vlan boundaries.
  16. Are private vlans local or global in nature?
    Local.  VTP does not pass private vlan info.  If PVLANs cross switches, they must be set up on each switch.
  17. What must be done to configure a port for PVLAN use?
    associate a vlan with the port.  Define port mode. 

    Promiscuous - This port can talk to both primary vlan and private vlans.  This ignores private vlan rules.  Usually a router, firewall or gateway.

    Host - this connects to a regular host.  port talks only with a promiscuous port or ports in the same community vlan.
  18. What default DTP setting permits switch spoofing? 

    How do you mitigate this?
    Admin mode: dynamic auto  (this means that if DTP is requested, the port will allow DTP trunking)

    Mitigate:  use switchport mode access cmd.  This makes the port to not allow any trunking.
  19. Describe VLAN hopping.
    Where an attacker crafts a package with a double 802.1Q tags.  first tag is real vlan the host is on.  second tag is for the "hopped-to" vlan. 

    This requires that the trunk uses the native VLAN. 

    Mitigate,  mark the trunks native vlan and prune from both ends of the trunk. 

    OR

    • use cmd vlan dot1q tag native
    • This will force the switch to tag all native vlans.
Author
boultonm
ID
246676
Card Set
ccnp sw ch 17
Description
ch 17
Updated