Kyndal India
10+ BACentric Interview Questions and Answers
Q1. What is the difference between nexus and catalyst series
Nexus series is designed for data center networking while Catalyst series is designed for enterprise networking.
Nexus series is optimized for high-performance data center environments.
Catalyst series is more commonly used in enterprise networks.
Nexus switches have features like Virtual Device Contexts (VDCs) and FabricPath.
Catalyst switches have features like Power over Ethernet (PoE) and StackWise.
Nexus switches are typically more expensive than Catalyst switches.
Q2. How many links we can bundle in port channel
The number of links that can be bundled in a port channel depends on the specific network equipment and configuration.
The maximum number of links that can be bundled in a port channel varies depending on the network device and software.
Commonly, network devices support bundling anywhere from 2 to 8 links in a port channel.
Some high-end switches or routers may support even more links in a port channel, such as 16 or 32.
It is important to consult the specific documentation of t...read more
Q3. What are the tools you have used for monitoring
I have used tools like SolarWinds, Nagios, and Wireshark for monitoring network performance and security.
SolarWinds
Nagios
Wireshark
Q4. Can you explain about change management
Change management is the process of planning, implementing, and monitoring changes in a structured way to minimize negative impacts and ensure successful outcomes.
Change management involves identifying the need for change, assessing the impact, planning the change, implementing it, and monitoring its effects.
It is important to communicate with stakeholders throughout the process to ensure buy-in and minimize resistance.
Change management often involves creating a detailed chan...read more
Q5. How ISE authenticate end device
ISE authenticates end devices through various methods such as 802.1X, MAC Authentication Bypass (MAB), and Web Authentication.
ISE uses 802.1X for authenticating end devices based on their credentials.
MAC Authentication Bypass (MAB) allows devices to be authenticated based on their MAC address.
Web Authentication is used for guest or non-802.1X devices to authenticate through a web portal.
ISE can also integrate with other identity stores such as Active Directory for authenticat...read more
Q6. How to bypass ise authentication
Bypassing ISE authentication involves exploiting vulnerabilities or using unauthorized methods to gain access.
Exploiting vulnerabilities in the ISE system
Using unauthorized credentials or access methods
Spoofing MAC addresses or IP addresses
Intercepting and modifying network traffic
Using brute force attacks to guess passwords
Q7. What is VPC ?
VPC stands for Virtual Private Cloud, a virtual network dedicated to a user's account within a cloud environment.
VPC allows users to create isolated sections of the cloud where they can launch resources like virtual machines, databases, and storage.
Users can define their own IP address range, subnets, route tables, and network gateways within a VPC.
VPC provides security by allowing users to control inbound and outbound traffic to resources within the virtual network.
Examples ...read more
Q8. What is hsrp glbp
HSRP (Hot Standby Router Protocol) and GLBP (Gateway Load Balancing Protocol) are protocols used in networking for providing redundancy and load balancing.
HSRP is a Cisco proprietary protocol used for providing high availability by allowing two or more routers to work together in a group, with one router acting as the active router and the others as standby routers.
GLBP is also a Cisco proprietary protocol that allows multiple routers to share the load of routing traffic, pro...read more
Q9. Process to create vpc in nexus
Creating a VPC in Nexus involves configuring VLANs, VRFs, and interfaces.
Configure VLANs for the VPC
Configure VRFs for the VPC
Configure interfaces for the VPC
Verify the VPC configuration
Q10. What is stacking
Stacking is a networking technique where multiple switches are interconnected to increase bandwidth and redundancy.
Stacking involves connecting multiple switches together to operate as a single unit
It allows for easier management and configuration of multiple switches
Stacking can improve network performance by increasing bandwidth and providing redundancy
Examples of stacking protocols include Cisco StackWise, Juniper Virtual Chassis, and HP Intelligent Resilient Framework (IR...read more
Q11. What is flex connect
FlexConnect is a feature in Cisco wireless LAN controllers that allows access points to locally switch traffic instead of tunneling it back to the controller.
FlexConnect allows access points to function even if they lose connection to the controller.
It is useful for branch offices or remote locations where a direct connection to the controller may not be feasible.
FlexConnect can improve network performance by reducing latency and bandwidth usage.
Examples of use cases include ...read more
Q12. Type of ise authentication
ISE authentication refers to the Identity Services Engine authentication method used for network access control.
ISE authentication is a method used for network access control
It provides secure access to network resources based on user identity
Examples include 802.1X authentication, MAC Authentication Bypass (MAB), and web authentication
Q13. What is server. What is console
A server is a computer program or device that provides functionality to other programs or devices. A console is a physical device used to access a server or computer system.
A server is a program or device that provides services to other programs or devices
A server can be a physical or virtual machine
A console is a physical device used to access a server or computer system
A console can be a keyboard and monitor connected to a server or a remote access tool
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month