exam questions

Exam 300-710 All Questions

View all questions & answers for the 300-710 exam

Exam 300-710 topic 1 question 36 discussion

Actual exam question from Cisco's 300-710
Question #: 36
Topic #: 1
[All 300-710 Questions]

An organization has a Cisco FTD that uses bridge groups to pass traffic from the inside interfaces to the outside interfaces. They are unable to gather information about neighboring Cisco devices or use multicast in their environment. What must be done to resolve this issue?

  • A. Create a firewall rule to allow CDP traffic
  • B. Create a bridge group with the firewall interfaces
  • C. Change the firewall mode to transparent
  • D. Change the firewall mode to routed
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
gc999
Highly Voted 1 year, 6 months ago
Selected Answer: A
The case already has the bridge group configured, any change of the firewall mode would cause the routing impact. Only option A is acceptable. From the link below, I believe no matter then bridge group is on routed mode or transparent mode, it needs access rule to pass the multicast traffic when using bridge group.
upvoted 7 times
gc999
1 year, 6 months ago
The link is here https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html#ID-2106-0000001e:~:text=Broadcast%20and%20multicast%20traffic%20can%20be%20passed%20using%20access%20rules
upvoted 2 times
...
...
14a1949
Most Recent 21 hours, 25 minutes ago
Selected Answer: C
Creating a firewall rule to allow CDP traffic (option A) might seem like a straightforward solution, but it's important to consider how Cisco Firepower Threat Defense (FTD) operates in different firewall modes. When the FTD is in routed mode, it functions at Layer 3 and doesn't support CDP (Cisco Discovery Protocol) or multicast traffic by default. Switching the FTD to transparent mode (option C) would enable Layer 2 features, such as CDP and multicast, because in transparent mode, the device acts more like a bridge, allowing Layer 2 traffic to pass through. So, for full functionality including gathering information about neighboring Cisco devices and supporting multicast traffic, changing the firewall mode to transparent is the most appropriate solution.
upvoted 1 times
...
14a1949
1 week, 1 day ago
Selected Answer: C
Changing the firewall mode to routed (option D) would allow the FTD device to participate in Layer 3 routing, which can help with gathering information about neighboring devices and supporting multicast traffic. However, this mode requires each interface to be on a different subnet, which might not align with your current network setup using bridge groups. On the other hand, changing the firewall mode to transparent (option C) allows the firewall to operate at Layer 2, passing traffic between interfaces without being seen as a router hop. This mode supports protocols like CDP (Cisco Discovery Protocol) and multicast traffic, which are essential for gathering information about neighboring devices and using multicast in the environment. So, while routed mode (option D) could work, transparent mode (option C) is generally more suitable for environments using bridge groups and needing Layer 2 connectivity.
upvoted 1 times
...
14a1949
1 week, 1 day ago
Selected Answer: C
You are correct! Changing the firewall mode to transparent (option C) would resolve the issue. In transparent mode, the firewall operates at Layer 2, allowing it to pass traffic between interfaces without being seen as a router hop. This mode supports protocols like CDP (Cisco Discovery Protocol) and multicast traffic, which are essential for gathering information about neighboring devices and using multicast in the environmen
upvoted 1 times
...
14a1949
1 week, 1 day ago
Selected Answer: D
I understand your perspective. However, creating a firewall rule to allow CDP traffic (**A**) would only address the discovery of neighboring Cisco devices through CDP. It would not solve the multicast issue in the environment. To enable both CDP and multicast functionalities, the firewall needs to operate at Layer 3, which is achieved by: **D. Change the firewall mode to routed** Switching to routed mode will allow the Cisco FTD to handle Layer 3 tasks, including CDP and multicast routing, thereby resolving the issues faced by the organization. If you have any further questions or need more clarification, I'm here to help!
upvoted 1 times
...
devildog
4 months, 2 weeks ago
Selected Answer: D
Guidelines for Multicast Routing Firewall Mode Supported only in routed firewall mode. Transparent firewall mode is not supported. https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/multicast_routing_for_firepower_threat_defense.html
upvoted 1 times
devildog
2 months, 3 weeks ago
Changing my answer to C. Transparent firewall mode A. seems to be popular, but CDP uses multicast. The question states that both CDP and multicast are not working. This would mean that allowing CDP through the firewall would not fix the underlying issue of multicast not functioning. Transparent mode supports multicast which in turn means CDP should work.
upvoted 1 times
...
...
squirrelzzz
5 months, 3 weeks ago
Selected Answer: C
Allows CDP and multicast by default in transparent mode
upvoted 1 times
...
MB2222
9 months ago
Correct answer is: A https://community.cisco.com/t5/security-knowledge-base/what-do-you-need-to-know-about-transparent-firewall-asa-or-ftd/ta-p/3773884 NON-IP traffic will be blocked by default in transparent firewall mode.
upvoted 1 times
...
touchy
10 months, 4 weeks ago
Selected Answer: A
"In routed mode, some types of traffic cannot pass through the ASA even if you allow it in an access rule. The bridge group, however, can allow almost any traffic through using either an access rule (for IP traffic) or an EtherType rule (for non-IP traffic): IP traffic—In routed firewall mode, broadcast and multicast traffic is blocked even if you allow it in an access rule, including unsupported dynamic routing protocols and DHCP (unless you configure DHCP relay). Within a bridge group, you can allow this traffic with an access rule (using an extended ACL). Non-IP traffic—AppleTalk, IPX, BPDUs, and MPLS, for example, can be configured to go through using an EtherType rule." Based on the above, changing the mode to routed will not solve the issue. Furthermore, in transparent mode non-IP traffic is blocked by default. Answer B is the least possible since we already have bridge groups. So we are left with A
upvoted 1 times
...
achille5
1 year, 5 months ago
Selected Answer: A
Broadcast and multicast traffic can be passed using access rules.
upvoted 1 times
achille5
1 year, 5 months ago
CDP packets are sent to a multicast
upvoted 2 times
...
...
bassfunk
1 year, 5 months ago
Selected Answer: A
IP traffic—In routed firewall mode, broadcast and multicast traffic is blocked even if you allow it in an access rule, including unsupported dynamic routing protocols and DHCP (unless you configure DHCP relay). Within a bridge group, you can allow this traffic with an access rule (using an extended ACL)
upvoted 3 times
...
spambox730
1 year, 6 months ago
Selected Answer: A
see gc999 link
upvoted 1 times
...
ureis
1 year, 8 months ago
This organization use bridge groups already -> Answer B is not correct. Answer A seems to be not correct as the firewall rule only allows CDP traffic, not multicast. So only answer C is left. Note: Bridge groups are supported in both transparent and routed firewall mode.
upvoted 2 times
...
saad_SEIU
1 year, 9 months ago
Selected Answer: D
Bridge groups can't pass traffic between each others in Transparent mode.
upvoted 2 times
...
Initial14
1 year, 9 months ago
Selected Answer: A
The firewall is in Transparent mode, but CDP with BVI in transparent mode has no limitation, so there must be rule implemented to allow CDP. For me the answer is A
upvoted 1 times
...
Joe_Blue
1 year, 10 months ago
Selected Answer: C
The inability to gather information about neighboring Cisco devices or use multicast in a Cisco FTD environment that uses bridge groups is likely due to the fact that the firewall is operating in routed mode. In order to resolve this issue and enable the necessary features, the firewall mode needs to be changed to transparent mode. In transparent mode, the firewall operates as a bridge between the two interfaces, allowing multicast traffic to pass through and enabling the organization to gather information about neighboring Cisco devices. In addition, it is not necessary to create a bridge group when operating in transparent mode, as the firewall acts as a transparent bridge between the two interfaces.
upvoted 3 times
...
Weyland
2 years, 3 months ago
Selected Answer: C
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/intro-fw.html Search for CDP and do your own reading.
upvoted 2 times
Weyland
2 years, 3 months ago
I mean routed, transparent or bridge groups does not pass CDP. This negates -A, -B and -C.
upvoted 1 times
bassfunk
1 year, 5 months ago
Your own link refutes this. Read the last sentence. The answer is A. IP traffic—In routed firewall mode, broadcast and multicast traffic is blocked even if you allow it in an access rule, including unsupported dynamic routing protocols and DHCP (unless you configure DHCP relay). Within a bridge group, you can allow this traffic with an access rule (using an extended ACL)
upvoted 2 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago