Term
| ____________ forwards frames from source to destination through a virtual path. |
|
Definition
|
|
Term
|
Definition
| Permanent Virtual Circuits |
|
|
Term
|
Definition
| Switched Virtual Circuits |
|
|
Term
| A PVC uses a 10-bit address in the Frame-Relay header called the ___________________. |
|
Definition
| Data Link Connection Identifier (DLCI) |
|
|
Term
| A ____ is a virtual circuit that is connected permanently and does not need call setup to start transporting data. |
|
Definition
|
|
Term
| A _____________ is a temporary virtual circuit connection and is set up only when the user needs to transport data. |
|
Definition
|
|
Term
| _____ is a suite of protocols that Frame-Relay uses to exchange information about the state of the connection. |
|
Definition
|
|
Term
|
Definition
| Local Management Interface |
|
|
Term
| What are the three LMI types supported by Cisco? |
|
Definition
|
|
Term
| What LMI type is the default for Cisco Routers? |
|
Definition
|
|
Term
|
Definition
| Data Circuit-terminating Equipment |
|
|
Term
|
Definition
| Data Terminating Equipment |
|
|
Term
| We can check the type of interface (whether it is DTE or DCE) with the help of the _______________ command. |
|
Definition
|
|
Term
| What is the first step in configuring Frame-Relay? |
|
Definition
| enable Frame-Relay encapsulation on the interface |
|
|
Term
| What command enables Frame-Relay encapsulation on an interface? |
|
Definition
| Router(config-if)#encapsulation frame relay |
|
|
Term
| __________ Mappings rely on Frame-Relay Inverse ARP to resolve the next hop network layer address to a local DLCI value. |
|
Definition
|
|
Term
| If we disable Frame-Relay inverse ARP we need to provide a __________ mapping for a particular DLCI to the next-hop IP address. |
|
Definition
|
|
Term
| If the line status is down on both sides of the link this refers to a __________ problem. |
|
Definition
|
|
Term
| What command will allow us to check for Layer 1 problems on a serial interface? |
|
Definition
| show controllers serial interface |
|
|
Term
| _________ problems can be due to a mismatch in the encapsulation type, keepalives are disabled, or a CHAP/PAP authentication failure. |
|
Definition
|
|
Term
| ___________ problems can be due to incorrect IP addressing or that the network is not configured under the routing protocol process. |
|
Definition
|
|
Term
| ______ are dedicated private virtual links over a service provider network. |
|
Definition
|
|
Term
| ______ provide the same facility as a point-to-point leased line but with an advantage of lower cost. |
|
Definition
|
|
Term
| Why were VPN's developed initially? |
|
Definition
| To deal with the security issues of transmitting clear text data across a network |
|
|
Term
| ____________ is a Cisco proprietary tunneling protocol. It was created by Cisco for virtual private dial-up networks. This type of VPN implements secure connection from the user to the corporate network. |
|
Definition
|
|
Term
| _____________ originally was developed by Microsoft to provide a secure remote access solution where traffic needed to be transported from a client, across a public network, to a Microsoft server (VPN gateway). |
|
Definition
| Point to Point Tunnelling Protocol |
|
|
Term
| ______ was designed for wireless networks, but has been incorporated into PPTP. Even though PPP is used in dialup scenarios, PPTP doesn't require the use of dialup to establish remote access connections; you can use dialup or your local LAN connection. |
|
Definition
|
|
Term
| ____________ is a combination of PPTP and L2F. It is defined in RFCs 2661 and 3438. |
|
Definition
|
|
Term
| ___________ is also Cisco Proprietary tunneling protocol. It forms virtual point-to-point links thus it allows a wide range of protocols to be encapsulated in IP tunnels. |
|
Definition
| Generic Routing Encapsulation |
|
|
Term
| ________ can be of two types; end user or device. User or remote VPN devices provide information to the network to be accessed. It can use keys or digital certificate or signature. |
|
Definition
|
|
Term
| __________ concerns with how user data will be encapsulated and transported over the network. Some VPN implementations will encapsulate only application layer information, whereas others can encapsulate an entire Layer-3 packet or Layer-2 frame. |
|
Definition
|
|
Term
| _________ is used to solve eavesdropping issues. It basically takes user data and a key value and runs it through an encryption algorithm, producing what looks like a random string of characters. Only a device with the same key value can decrypt the information. |
|
Definition
|
|
Term
| With ____________, a signature is attached to the packet. The signature is created by taking contents from the packet and a shared key and running this information through a hashing function, producing a fixed output, called a digital signature. |
|
Definition
|
|
Term
| What are the two ways of configuring keys? |
|
Definition
|
|
Term
| _____________ refers to where we can prove that the transaction occurred between two parties on the basic of IP address location and other information stored in the database. |
|
Definition
|
|
Term
| Each VPN encapsulation supports different __________ and ___________ so before making a choice we should see the VPN encapsulation and the application compatibility. |
|
Definition
| applications and protocols |
|
|
Term
| What are the two types of authentication used by PPP? |
|
Definition
|
|
Term
| _________ is less secure than CHAP because passwords are sent in clear text. |
|
Definition
|
|
Term
| _________ is more secure than PAP and is used during initial link establishment phase. After the link is established, it also checks the link periodically. |
|
Definition
|
|
Term
|
Definition
| Protocol Authentication Protocol |
|
|
Term
| What does CHAP stand for? |
|
Definition
| Challenge Handshake Authentication Protocol |
|
|