Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Arkusz Danych Strona 29

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 168
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 28
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 29 -
Study the exhibit below carefully:
According to the exhibit all switches are connected through Fast Ethernet connections.
Server TestKing7 and Sensor IDTestKing7 are in the same VLAN.
Which of the following commands represents a valid configuration step to permit Sensor
IDTestKing7 to monitor traffic sent from Server TestKing7?
A 3500xl(config)#monitor session 1 source interface fastEthernet 0/5 tx
B 3500xl(config-if)#port monitor fastEthernet 0/5
C 3500xl>(enable)set span 0/5 0/24 both
D 3500xl(config)#monitor session 1 source interface fastEthernet 0/5 rx
E 3500xl>(enable)set span 0/24 0/5 rx create
F No SPAN configuration is required since both devices are in the same VLAN
Answer: B
Catalyst 2900XL / 3500XL
port monitor [interface | vlan]
Note: D would be correct for 3550 switches, but not for 3500XL
Cisco Courseware 5-14
QUESTION NO: 9
Which of the following represents the basic steps in the configuration of VACLs for
traffic capture on a Catalyst 4000 switch running Catalyst OS. (Choose all that apply.)
A. map the VACL to the capture port
B. assign ports to receive capture traffic
C. define an access-group for interesting traffic
D. commit the VACL to memory
E. create action clause to capture traffic
Answer: B, D
Page 146 Cisco Press CCSP Chapter 6 Capturing Network Traffic
Step 1: Define a security ACL
Step 2: Commit the VACL to memory
Step 3: Map the VACL to VLANs
Step 4: Assign the capture port
Przeglądanie stron 28
1 2 ... 24 25 26 27 28 29 30 31 32 33 34 ... 167 168

Komentarze do niniejszej Instrukcji

Brak uwag