mathterew.blogg.se

Therchannel asa asdm
Therchannel asa asdm











You have been assigned the task of configuring a VLAN interface on an ASA 5510.

  • Configure the two interfaces as an EtherChannel.
  • Configure the two interfaces as a redundant interface.
  • Bring up a second GigabitEthernet interface on the same VLAN as the first one.
  • Which one of the following describes the best approach to meet the requirements? A single GigabitEthernet link exists today a second link would also add redundancy. Suppose you want to double the bandwidth between an ASA’s outside interface and a neighboring switch. Which ASA command can be used to display a list of all physical interfaces?
  • Its member priority is higher than other member interfaces.
  • A member interface, which was previously active before it went down, regains its link status.
  • The link status of the current active interface goes down.
  • What must happen for a member interface to take over the active role as part of a redundant interface?
  • The member interfaces swap the active role when one of them fails.
  • IP addresses must be applied to the member physical interfaces of a redundant interface.
  • Each member interface of a redundant interface cannot have its own security level.
  • An ASA can have up to eight redundant interface pairs.
  • A redundant interface is made up of two or more physical interfaces.
  • A redundant interface load balances traffic across member interfaces.
  • Which of the following answers describe an attribute of a redundant interface? (Choose all that apply.) Giving yourself credit for an answer you correctly guess skews your self-assessment results and might provide you with a false sense of security. If you do not know the answer to a question or are only partially sure of the answer, you should mark this question wrong for purposes of the self-assessment. The goal of self-assessment is to gauge your mastery of the topics in this chapter. “Do I Know This Already?” Section-to-Question MappingĬonfiguring Interface Security Parameters You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes.” Table 3-1. Table 3-1 lists the major headings in this chapter and their corresponding “Do I Know This Already?” quiz questions. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read the entire chapter. The “Do I Know This Already?” quiz allows you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. This chapter discusses each of these topics in detail. Each of its interfaces must be configured to interoperate with other network equipment and to participate in the IP protocol suite.
  • Verifying Interface Operation: This section covers the commands you can use to display information about ASA interfaces and confirm whether they are operating as expected.Ī Cisco Adaptive Security Appliance (ASA) must be configured with enough information to begin accepting and forwarding traffic before it can begin doing its job of securing networks.
  • Configuring the Interface MTU: This section discusses the maximum transmission unit size and how it can be adjusted to set the largest possible Ethernet frame that can be transmitted on an Ethernet-based ASA interface.
  • Configuring Interface Security Parameters: This section explains the parameters you can set to assign a name, an IP address, and a security level to an ASA interface.
  • Configuring VLAN Interfaces: This section covers logical interfaces that can be used to connect an ASA to VLANs over a trunk link.
  • Configuring Physical Interfaces: This section discusses Cisco ASA interfaces that can be connected to a network through physical cabling, as well as the parameters that determine how the interfaces will operate.
  • This chapter covers the following topics:













    Therchannel asa asdm