exam questions

Exam 300-715 All Questions

View all questions & answers for the 300-715 exam

Exam 300-715 topic 1 question 146 discussion

Actual exam question from Cisco's 300-715
Question #: 146
Topic #: 1
[All 300-715 Questions]

Refer to the exhibit.

A network engineer is configuring the switch to accept downloadable ACLs from a Cisco ISE server.
Which two commands should be run to complete the configuration? (Choose two.)

  • A. radius-server attribute 8 include-in-access-req
  • B. ip device tracking
  • C. dot1x system-auth-control
  • D. radius server vsa send authentication
  • E. aaa authorization auth-proxy default group radius
Show Suggested Answer Hide Answer
Suggested Answer: BC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Natcat
Highly Voted 3 years, 5 months ago
Correct answer should be B and D. Option C is only enable dot1x globally, not for accept downloadable ACLs.
upvoted 8 times
...
327c7c8
Most Recent 3 days, 6 hours ago
Selected Answer: BC
vsa send vendor specific attribute and has nothing to do with CoA, radius-server attribute 8 send the attribute to ISE and has nothing to do with the CoW or dACL but the only 2 commands that has an impact are enabling dot1x globally "C" and device tracking which enable the switch to know the IP address of the endpoints connected to its port which will have impact on the dACL. "B and C"
upvoted 1 times
...
XBfoundX
7 months, 3 weeks ago
For me the two answers are dot1x enable globally and the device ip tracking command. If i don't have dot1x enabled my switch will simply does not use the dot1x feature. How a switch can download a dynamic acl from ISE if i do not enable the feature that permit to that client to authenticate via ISE and based on what result he got he will receive a result with a dACL? the ip tracking device feature is enabled for this purpose: per-user ACL with any SW use ip tracking to re-arrange the ACL to add instead of any to host IP. What this means is that the device ip tracking command let the switch modify that specific acl with the host ip address /32 address of the device that is connected to that port.
upvoted 3 times
...
DarkArmy
9 months, 1 week ago
Answer is B and D https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-mt/sec-user-8021x-15-mt-book/sec-ieee-802x-acl-assign.html Configuring Downloadable ACLs To configure a switch to accept downloadable ACLs or redirect URLs from the RADIUS server during authentication of an attached host, perform this task. SUMMARY STEPS 1. enable 2. configure terminal 3. ip device tracking 4. aaa new-model 5. aaa authorization network default group radius 6. radius-server vsa send authentication 7. interface interface-id 8. ip access-group acl-id in 9. end 10. show running-config interfaceinterface-id 11. copy running-config startup-config
upvoted 2 times
NikoTomas
4 months, 1 week ago
Ok, but first you must enable Dot1x globally to make it work. So C) "dot1x system-auth-control" has higher preference than sending vendor-specific VSA attributes, which are anyway enabled by default. "Step 5. Enable vendor-specific attributes (VSAs) on the switch (which may be enabled by default on the switch already): C9300(config)# radius-server vsa send authentication C9300(config)# radius-server vsa send accounting "
upvoted 1 times
...
...
faridh
10 months, 3 weeks ago
Selected Answer: BC
Page 5 at https://www.cisco.com/c/en/us/td/docs/routers/cloud_edge/c8300/software_config/cat8300swcfg-xe-17-book/m-chng-of-auth.pdf
upvoted 1 times
...
denverfly
1 year, 1 month ago
Selected Answer: AC
The correct answers are. radius-server attribute 8 include-in-access-req and dot1x system-auth-control. The radius-server attribute 8 include-in-access-req command tells the switch to include the RADIUS attribute 8 (user group membership) in the Access-Request packet that is sent to the RADIUS server. This attribute is used by the RADIUS server to determine which downloadable ACL to send to the switch. The dot1x system-auth-control command enables 802.1X authentication on the switch. This is required for the switch to be able to accept downloadable ACLs from the RADIUS server.
upvoted 1 times
...
Slavey
1 year, 2 months ago
B & D from documentation we have: Configuring Downloadable ACLs To configure a switch to accept downloadable ACLs or redirect URLs from the RADIUS server during authentication of an attached host, perform this task. SUMMARY STEPS 1. enable 2. configure terminal 3. ip device tracking 4. aaa new-model 5. aaa authorization network default group radius 6. radius-server vsa send authentication 7. interface interface-id 8. ip access-group acl-id in 9. end
upvoted 1 times
...
Cnoteone
1 year, 3 months ago
Selected Answer: BD
Talking about DACLs as per https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-mt/sec-user-8021x-15-mt-book/sec-ieee-802x-acl-assign.html
upvoted 2 times
...
JimboOh
1 year, 3 months ago
Selected Answer: BC
To configure a switch to accept downloadable ACLs from a Cisco ISE server, the following two commands are required: B. ip device tracking: This command enables the switch to track IP device information, which is needed for the ISE server to provide dynamic access policies based on a device's IP address. C. dot1x system-auth-control: This command enables 802.1X authentication on the switch and allows the switch to forward authentication requests to the ISE server.
upvoted 3 times
JimboOh
1 year, 3 months ago
Option B is correct because it enables the switch to track IP device information, which is required for the ISE server to provide dynamic access policies based on the IP address of the device. Without this command, the switch may not be able to provide the necessary device information to the ISE server for dynamic policy enforcement. Option C is correct because it enables 802.1X authentication on the switch and allows the switch to forward authentication requests to the ISE server. This is required for the ISE server to authenticate users and authorize access based on the user's identity and the device's posture. Created by ChatGPT so read with caution
upvoted 1 times
...
...
YmerG
1 year, 4 months ago
Selected Answer: BD
My answer according to this documentation: "https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-mt/sec-user-8021x-15-mt-book/sec-ieee-802x-acl-assign.html"
upvoted 1 times
YmerG
1 year, 4 months ago
I will change it to B and C. After I read this on the official book I think B&C are correct: "The dot1x system-auth-control command allows for the any source in the provided dACL to be replaced with the IP address of the single device connected to the switch port."
upvoted 2 times
...
...
tliz
1 year, 5 months ago
Selected Answer: BC
B & C are correct. A is not because it has nothing to do with dACL D has been enabled by default since IOS 15.x E is for enabling the Auth Proxy feature. See SISE 300-715 Official Cert Guide, pg. 266. Step 1. Enable dot1x Globally on the Switch dot1x system-auth-control Step 2. Enable dACLs to function by entering this command. IP device tracking
upvoted 3 times
...
Russ
1 year, 7 months ago
An old document, from 2012, but if they are using this as reference then the answer is B and D. Configuring Downloadable ACLs To configure a switch to accept downloadable ACLs or redirect URLs from the RADIUS server during authentication of an attached host, perform this task. SUMMARY STEPS 1. enable 2. configure terminal 3. ip device tracking 4. aaa new-model 5. aaa authorization network default group radius 6. radius-server vsa send authentication 7. interface interface-id 8. ip access-group acl-id in 9. end 10. show running-config interfaceinterface-id 11. copy running-config startup-config https://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_8021x/configuration/15-2mt/sec-ieee-802x-acl-assign.html
upvoted 2 times
...
aHash
1 year, 8 months ago
Selected Answer: AC
Tested on lab on a catalyst switch. dACLs work with A,C commands enabled. No ip device tracking, no vsa send authentication, no aaa authorization auth-proxy were enabled.
upvoted 3 times
...
book says B & C. dACL requires ip device tracking and dot1x system-auth-control allows the any source in the dACL to be replaced with the IP of a single device connected to switchport p266
upvoted 2 times
...
Akiva
2 years, 9 months ago
To configure a switch to accept downloadable ACLs or redirect URLs from the RADIUS server during authentication of an attached host, perform this task. SUMMARY STEPS 3. ip device tracking 4. aaa new-model 5. aaa authorization network default group radius 6. radius-server vsa send authentication
upvoted 3 times
...
MrCalifornia
3 years, 3 months ago
B & C are correct as user mahmoud65446 wrote correctly. Good expl ;)
upvoted 1 times
...
mahmoud65446
3 years, 4 months ago
B&C Downloadable access control lists (dACLs) are a very common enforcement mechanism in ISE deployments. In order for dACLs to function properly on a switch, a function called IP device tracking must be enabled globally. The dot1x system-authcontrol command allows for the any source in the provided dACL to be replaced with the IP address of the single device connected to the switch port.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago