You have received a new Cisco 5760 Controller and have gone through the initial startup wizard. You are now trying to add APs to the controller, but these are not joining. Which three checks should you do next? (Choose three.)
Answer : BCE
Reference:
http://www.cisco.com/c/en/us/support/docs/wireless/2500-series-wireless-controllers/113034-2500-deploy-guide-00.html#anc10
Answer : ACE
Explanation:
Answer : D
Reference:
http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/system_management/ config_system_management_chapter_010000.html
When connecting an autonomous access point in workgroup bridge mode to a WLAN configured on a Cisco WLC, which two options are true? (Choose two.)
Answer : AB
Explanation:
On a Cisco autonomous AP, the maximum number of attempts to send a packet (packet retries) is set to 32 by default. Which statement about the result when the
AP has tried to send a packet for that number of attempts and no response is received from the client is true?
Answer : A
Explanation:
The maximum data retries setting determines the number of attempts the wireless device makes to send a packet before giving up and dropping the packet.
The default setting is 32.
Reference:
http://www.cisco.com/c/en/us/td/docs/wireless/access_point/15_2_4_JB/configuration/guide/scg15-2-4-Book/scg15-2-4-chap6-radio.html#pgfId-1039239
You are the network administrator of a Cisco Autonomous AP deployment. You want to stop a client with MAC address 5057.a89e.b1f7 and IP address 10.0.0.2 from associating to your APs.
Which configuration do you use?
Answer : AC
Explanation:
Filters Using MAC-Based ACLs -
You can use MAC address-based filters in order to filter client devices based on the hard coded MAC address. When a client is denied access through a MAC- based filter, the client cannot associate with the AP. MAC address filters allow or disallow the forwarding of unicast and multicast packets either sent from or addressed to specific MAC addresses.
This is the command syntax to create a MAC address-based ACL on the AP:
Note: This command has been wrapped to two lines because of spatial considerations. access-listaccess-list-number{permit | deny}
48-bit-hardware-address 48-bit-hardware-address-mask
In Cisco IOS Software Release 12.3(7)JA, MAC address ACLs can use numbers in the range of 700 to 799 as the ACL number. They can also use numbers in the expanded range of 1100 to 1199.
This example illustrates how to configure a MAC-based filter through the CLI, in order to filter the client with a MAC address of0040.96a5.b5d4:
-> Log in to the AP through the CLI.
Use the console port or Telnet in order to access the ACL through the Ethernet interface or the wireless interface.
-> Enter global configuration mode on the AP CLI:
-> AP#configure terminal
-> Create a MAC address ACL 700.
This ACL does not allow the client 0040.96a5.b5d4 to associate with the AP. access-list 700 deny 0040.96a5.b5d4 0000.0000.0000
!--- This ACL denies all traffic to and from !--- the client with MAC address 0040.96a5.b5d4.
-> Issue this command in order to apply this MAC-based ACL to the radio interface: dot11 association mac-list 700
Filters Using Standard Access ListsYou can use standard ACLs to allow or disallow the entry of client devices into the WLAN network based on the IP address of the client. Standard ACLs compare the source address of the IP packets to the addresses that are configured in the ACL in order to control traffic. This type of
ACL can be referred to as a source IP address-based ACL.
The command syntax format of a standard ACL isaccess-listaccess-list-number{permit | deny} {hostip-address|source-ip source-wildcard| any}.
In Cisco IOS® Software Release 12.3(7)JA, the ACL number can be any number from 1 to 99. Standard ACLs can also use the extended range of 1300 to 1999.
These additional numbers are expanded IP ACLs.
When a standard ACL is configured to deny access to a client, the client still associates to the AP. However, there is no data communication between the AP and the client.
This example shows a standard ACL that is configured to filter the client IP address 10.0.0.2 from the wireless interface (radio0 interface). The IP address of the
AP is 10.0.0.1.
After this is done, the client with IP address 10.0.0.2 cannot send or receive data through the WLAN network even though the client is associated to the AP.
Complete these steps in order to create a standard ACL through the CLI:
Log in to the AP through the CLI.
Use the console port or use Telnet in order to access the ACL through the Ethernet interface or th
Which feature intersection of a Cisco 5760 Wireless LAN Controller with HA AP SSO is not true?
Answer : B
Explanation:
-> Switchover during AP Pre-Image download causes the APs to start image download all over again from the new Active controller.
-> Rogue APs and clients are not synced to Standby and are re-learnt upon switchover.
-> Infrastructure MFP key is not synced to the Standby controller and is re-learnt upon switchover.
-> New Active controller re-learns the shun list from IPS and other MCs, and redistributes it to the MAs.
-> wIPS information is not synced to the Standby unit and is re-learnt upon switchover.
-> Clean Air detected Interferer devices are re-learnt after switchover.
-> Net Flow records are cleared upon switchover and collection starts fresh on the new Active controller.
-> Mobility paths and tunnels to the MO and other peer MCs are not disrupted upon switchover. However the Client state is cleaned up on the MO under which the HA pair exists and is re-learnt from the new Active controller when the client re-associates.
-> Roamed clients that have their data path going through the Mobility Tunnel Endpoint (MTE) "become Local" in case of L2 with Sticky Anchoring and L3 Roam.
L2 Roamed Clients are not affected except when roaming occurs between CUWN and CA controllers.
-> RRM related configurations and the AP neighbor list in the Leader HA pair is synced to the Standby controller.
-> Upon Guest Anchor controller switchover, mobility tunnels stay active, APs remain connected, clients rejoin at MA or MC, and are anchored on the new Active controller.
Reference:
http://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/5700/software/release/ios_xe_33/5760_HA_DG_iosXE33.html#pgfId-45754
DRAG DROP -
Drag and drop the Cisco AVVID IP DSCP values on the left to its matching traffic type on the right. Not all options are used.
Select and Place:
Answer :
Answer : A
Reference:
http://www.cisco.com/c/en/us/td/docs/wireless/technology/bonjour/7-5/Bonjour_Gateway_Phase-2_WLC_software_release_7-5.html#54133
DRAG DROP -
Prime infrastructure allows you to change an alarm status. Drag and drop the status on the left to the correct description on the right.
Select and Place:
Answer :
Which three statements about the high availability configuration on the Cisco 5760 WLCs are true? (Choose three.)
Answer : BEF
Reference:
http://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/5700/software/release/ios_xe_33/5760_HA_DG_iosXE33.html#pgfId-43309
You are a network administrator at ACME corporation where you have a pair of Cisco 5760 Wireless LAN Controllers deployed for HA AP SSO mode. A failover event occurs and the secondary Cisco 5760 controller moves into the active role. Which three statements about the failover event are true? (Choose three.)
Answer : ACD
Explanation:
Two wireless IP phones are never able to call each other when connected to the same autonomous AP. However, they can place calls to other wireless IP phones that are connected to other APs or to wired IP phones. The wireless phones are operating on VLAN100. Based on this output, which statement about the problem is true? ap(config-subif)#do show run interface do 0.100
Building configuration"¦
Current configuration: 320 bytes
!
interface Dot11Radio1.100
encapsulation dot1Q 100
no ip route-cache
bridge-group 100
bridge-group 100 subscriber-loop-control
bridge-group 100 port-protected
bridge-group 100 block-unknown-source
no bridge-group 100 source-learning
no bridge-group 100 unicast-flooding
bridge-group 100 spanning-disabled
end
Answer : E
Explanation:
Public Secure Packet Forwarding (PSPF) prevents client devices associated to an access point from inadvertently sharing files or communicating with other client devices associated to the access point. It provides Internet access to client devices without providing other capabilities of a LAN. This feature is useful for public wireless networks like those installed in airports or on college campuses.
Answer : D
Explanation:
The port is a part of a monitor session (a SPAN session) as a destination port. Look for "monitor session" commands in your configuration that refer to the port, and if you do not need this monitoring session, you may remove it from your configuration. That will make the port work normally again.
Reference:
https://supportforums.cisco.com/discussion/11667971/gigabitethernet201-down-line-protocol-down-monitoring
You are setting up a Cisco access point in repeater mode with a non-Cisco point as the parent and you use this interface configuration on your Cisco access point. interface Dot11Radio0 no ip address no ip route-cache no ip route-cache
!
ssid my WIFInetwork
!
station-role repeater
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
You are getting the following error message. Which reason for this issue is true?
%DOT11-4-CANT_ASSOC: Interface Dot11Radio0, cannot associate. NO aironet Extension IE
Answer : B
Explanation:
Repeaters and bridges have to be the same manufacturer because there are some protocols that other manufacturers won't accept. So Cisco Aironet to Cisco
Aironet will work. Cisco Aironet to Cisco Linksys (and other manufacturers) will NOT workReference:
Reference:
https://supportforums.cisco.com/discussion/11308521/cisco-ap-1141-repeater-hp-procurve-problems
Have any questions or issues ? Please dont hesitate to contact us