Which of the following statements about MUX VLANs are true?
What is the default aging time of the MA, C address table of Huawei switches?
A router's Network LSA is shown in the figure. Which of the following statements is correct?
Area: 0.0.0.0
Type: Network
Lsid: 10.0.122
Advrtr: 10.0.12.2
Ls age: 824
Len: 32
Options : E
\seq#:80000002
1chksum : 0x8970
INet mask: 255.255.255.0
IPriority : Low
IAttached Router 10.0.12.2
.Attached Router 10.0.12.1
display interface GEO/O/O once, and found that the Total Eror count (the total number of error packets at the physical layer of the interface) is not correct. . At this time, it can be concluded that the current time and fall has not disappeared.
The routing attributes of the three routing entries are shown in the figure. Assuming that the next hops of the three routing entries are all reachable, when these three routing entries are
After the entries arrive at the BP router in order, by default, BGP will finally call a route
entry?
As shown in the figure, on the R1 router, the network administrator can control the path of the traffic entering AS100 after modifying the value of the routing entry sent to R2 through the routing policy.
Which of the following descriptions is correct about configuring static LSPs in MPLS networks?
In the network shown in the figure below, to implement a remote LDP session between SWA and SWC. the following
The law is correct
R1 and R2 use directly connected interfaces to establish an EBGP peer relationship. R1 imports 2000:: 1/128 to BGR By default, which of the following is the next hop of the route from R2 to 2000:: 1/128?
The routing policy tools that can be used by BGP mainly include Filter-policy and Route-policy. Fiter-policy can only filter routes, and Route-policy can only modify routes.
A campus deploys both IPv4 and IPv6 networks for service testing, and runs IS-IS to realize network interconnection. The IS-IS routing protocol has good scalability and is widely used in the existing network. Which of the following statements is true about IS-IS scalability?
On a PIM-SM multicast network, a network engineer finds that multicast clients cannot receive multicast data. Which of the following is not a possible cause of this problem?
In the process of establishing an LDP session, the active party will first send Initialization information to negotiate parameters. If the passive party does not accept the negotiated parameters, it will send it.
In what ways can log information be viewed:
After the cutover is completeD. it is generally necessary to check the following items?
As shown in the figure, all interfaces of the router enable DSPF. The cost value of the link is marked in the figure. R2
The LoopbackD interface is advertised in area 1, then the cost of R1 reaching 10.2/32 is?
Which of the following are advantages of VLAN aggregation?
The RR rules for advertising routes violate the IBGP split horizon rules, which may cause loops in the AS. Which routing attributes does RR use to prevent loops?
As shown in the figure, Client1 and Client2 act as clients of RR1 and RR2 at the same time, and RR1 and RR2 are in the same
In a Cluster, R introduces 10 routes. It is assumed that the configuration of B, CP is correct. Neighbor relations have been established
Now, how many routing entries exist in the BGP routing table of Client2?
If display current-configuration can reach the setting of !JIS-IS, and display saved-
There is no IS-IS setting in the configuration, so that means?
As shown in the figure, MPLS/BGP IPVPN is deployed on the network. The MP-BGP neighbor relationship is established between PE1 and PE2 through the LoopbackD interface. After the configuration is complete, it is found that CE1 and CE2 cannot learn routes from each other. Run the command to check the error on PE2. The neighbor information is shown in the figure, what is the most likely cause of the problem?
Deploying port isolation technology in Ethernet can realize Layer 2 intercommunication and Layer 3 isolation, making networking more flexible.
A,correct
B,mistake
Link LSAs of OSPFv3 are propagated throughout the area.
In the hub-spoke networking shown in the figure, the Hub-PE can be configured to allow repetitive local AS numbers for correct route transmission.
Assuming that the neighbor relationship between BGP routers has been established successfully, the configuration on R1 is shown in the figure. ask for R1
Which router can the route entry 10.10.10.0/24 be delivered to the farthest?
AS 200
bgp 100
peer 13.X3 as-number 300
peer B3.33 connect * interface LoopBackO peer 3.33.3 route-policy COMMUNITY e»porx peer 3333 next >hop-local
peer Xl.3.3 advertise-cofnmunity
network 10.10.T0.0 24
route^poktcy COMMUNITY permit node 10 prefix COMMUNITY spply cocYWTUiiMty route-policy COMMUNITY permit node 20 «p ip prefix COMMUNITr index 10 permit
A company purchased private lines from two operators. In order to optimize the lines, the company used the 6GP protocol to learn from two
Route entries that operate off. However, after the enterprise found that this configuration, the traffic of the port route increased greatly, and the network engineering arrangement
After investigation, it was found that the traffic of the two operators was passed to each other through the enterprise egress router. Therefore, the enterprise intends to use the routing strategy so that the traffic of the packets of different carriers is no longer passed to each other. Is the configuration in the following figure correct?
On a BGP/MPLS IP VPN network, which of the following are carried when a PE advertises VPNv4 routes?
On the OSPFv3 network shown in the figure, area 1 is a stub area. Which of the following statements are true?
Which of the following are static information coke analysis?
Configure ipv6 preference in IS-IS protocol view. The function of this command is to configure the priority of IPv6 routes generated by IS-Is protocol.
What is the meaning of display current-configuration I include vlan command?
BGP allows you to use the filter-policy acl-number import command to filter received routes. The value of ad-number ranges from 2000 to 3999.
O TRUE
O FALSE
BGP routing policies can control the advertisement and reception of routes.
An administrator runs the display mpls Isp command to view LSPs on a device. The command output is shown in the figure. Which of the following statements are true?
BGP authentication can prevent illegal routers from establishing neighbors with BGP routers. BGP authentication can be divided into ID5 authentication and Keychain authentication. Which of the followingBGP packets will carryBGPKeychain authentication information?
If the sticky MA, C function is enabled on an interface, by default, the number of MA, C addresses learned by the interface is as large as
few?
To protect a device against the attacks of forged BGP messages, you can configure GTSM to check whether the TTL value in the IP message header is within the specified range. If the peer x.x.x.x valid-ttl-hops 100 command is configured on a device, the valid TTL value range of the detected message is [155, 255].
As shown below:
The figure shows the file information on R2. When a network engineer runs the dir | exclude 1 command to view the file information, which of the following files will be displayed?
On a broadcast network, routers (including non-DIS routers) of the same level on a network segment can establish neighbor relationships. In the implementation of BFD for IS-IS, however, BFD sessions are established only between a DIS and non-DIS routers, not between non-DIS routers.
Part of the configuration of R1 is as follows. Which statement about OSPF on R1 is correct?
ospf 1 router-id 172.16.1.1
area 0.000
network 10.1.12.1 0.0.0.0
network 10.1"3"0.0.0.0
network 172.16/1 1 0.0.0.0
ospf 2 vpn-instance tt
area QQO.O
network 10J J 1 0.000
A campus has deployed IPv6 for service testing. There are 4 routers (R1, 22, R3 and R4) in this network, running 0SPFV3 to realize the interconnection of IPv6 network. A new router R5 needs to be connected to the network for testing. An engineer introduces a direct route in the OSPFVV3 process of R4 so that devices in the campus network can access the GE0/0/1 port address of R5. Which of the following statements about the scene is true of?
The ipv6 enable topology standard has been set in the S-IS protocol view. The meaning of this command is:
Pv4 shares a topology with IPv6.
by executing___________The command can completely isolate the second and third layer users of different ports on the same LAN and cannot communicate. (Please use English and lowercase letters to complete the command, and the command cannot be abbreviated)
As shown in the figure, OSPF is deployed in a campus, and Area 1 is deployed as an NSSA area. In the case of missing header, R2 will automatically generate a missing header route of Type 7 LSA and flood it in the NSSA area
esigth uses different colors to distinguish different alarm levels, red represents emergency, orange represents important, and yellow represents
The table is secondary, and blue represents the prompt. Which of the following statements about different alarm levels is correct: (multiple choice)
From this picture, we can judge
During an attempt to log in to a NetEngine AR6120 through the console port, the network engineer finds that the password is incorrect and the login fails. If a Telnet account can be used to log in to the device and the account has the permission to change the console port password, the network engineer can log in to the device through Telnet to change the console port password.
An engineer uses two routers to test IPv6 services, and simulates the interconnection between the headquarters and branches by running BGP4+. The logical topology of the network is shown in the figure. Regarding the transmission of IPv6 routes between the two devices, which of the following Is a statement wrong?
Which of the following statements is true about the role of ping and tracert?
As shown in the figure, all routers run OSPF, because R3 is in the backbone area, so in the LSDB of R3 There are no three types of LSAO
To speed up the detection of link failures in an IS-IS network, you can associate IS-IS with BFD.
As shown below:
After reset isis all is executeD. the IS-Is protocol process needs to be restarted and neighbors need to be re-establisheD. but various IS-IS statistics will not be cleared.
Which of the following sequences can be matched by the regular expression 100.S
Regarding the BGPI MPLS IPVPN network architecture, which of the following descriptions is wrong?
When deploying MPLS/BGP IP VPN, which of the following descriptions is wrong about using BGP to exchange routing information between PEs and CEs?
After basic QinQ is configured on an interface of a switch, the switch adds the default VLAN tag of the interface to packets only when the interface receives tagged packets. In this way, the VLAN space is expanded.
On the network shown in the figure, IS-IS runs on R1, R2, R4, and R5, and the area ID is 49.0001. IS-IS runs on R3 and R6, and the area ID is 49.0002. The import-route isis level-2 into level-1 command is configured on R2 and R5. In AS 65000, R1, R3, R4, and R6 each establish IBGP peer relationships with R2 and R5. R2 and R5 are RRs, and R1, R4, R3, and R6 are clients. The IBGP peer relationships are established using Loopback0. The IP address of Loopback0 on each router is 10.0.X.X/32, and the router ID is 10.0.X.X, where X is the number of the router. R1 and R4 import the external route 192.168.1.0/24 to BGP through the import-route command, and R3 and R6 import the external route 192.168.2.0/24 to BGP through the import-route command. Which of the following statements are true?
In the multi-level RR scenario, a large number of secondary RRs will be connected to the primary RR, which may lead to BGP of the primary RR. The routing table overflows, what method can be used to reduce the risk of overflowing the routing table of the advanced RR BGP?
When a fault occurs, the fault can be classified to reduce the scope of fault location. Which of the following is not an interface configuration fault?
Regarding BGP/MPLS IPVPN routing interaction, which of the following descriptions is wrong?
What is the default aging time of the MA, C address table of Huawei switches?
Run the display ip interface GEO/D/D command to view statistics about ping packets received on the interface.
About the difference between NSR and NSF, which is correct?
According to this picture, we can judge?
Type:Router
Lsid: 10.0.12 J
Adv rtr: 10.0.12.1
Ls age: 312
Len: 36
Options : A, BR E
\seq#:80000013
1chksum : 0xc61c
ILink count: 1
1* Link ID: 10.0.12.2
IData : 10.0.12.1
,Link Type: TransNet
.Metric : 1
Which of the following will not cause the VRRP backup group to flap?
After a fault occurs, you need to collect and back up various types of fault information in time as a reference for troubleshooting. In addition, when seeking emergency assistance from Huawei Technologies Co., Ltd.
The partial configuration of R1 is as follows. Which statement about OSPF on R1 is correct?
ospf 1 router-id 172.16.1 J
area 0.0.0.0
network 10.1.12.1 0.0.0.0
network 10.1.13.1 OQO.O
network 172 J 6.1.1 0.0.0.0
From this figure, it can be known that
To prevent hackers from attacking user devices or networks through MA, C addresses, you can configure the MA, C addresses of untrusted users as black hole MA, C addresses to filter out illegal MA, C addresses.
From this figure, we can conclude that
IGP converges faster than BGP, which may cause network traffic loss. By enabling the OSPF and BGP linkage feature of the device, the device can keep the OSPF and BGP linkage during the set linkage time.____The router makes the link metric value in the LSA advertised to be the maximum value, so as to inform other OSPF devices not to use this router to forward data, so as to avoid traffic loss. (Note: If English letters are involved, all uppercase)
As shown in the figure, an engineer uses 4 routers to test branch network interoperability. Among them, R1, R2, and R3 in branch 1 deploy OSPF to implement network interoperability. R2, R3, and R4 in branch 2 deploy IS-S to implement network interoperability. Now the engineer wants to implement R1 to access the loopback interface address of R4. Which of the following operations can meet this requirement?
What fields are added in Update in order to advertise IPv6 routes in BGP4+.
According to this diagram, can we break the
Regarding multi-instance CE (Mlulti-VPN-Instance CE, MCE), which of the following descriptions is wrong?
As shown in the figure, configure a backhaul summary route 10.0.0.0/24 on the border route RT1. next hop
to RT2. At the same time, the default route to the external network is configured. At this point, a routing black hole will appear. The following is about routing
Is the black hole statement correct? (multiple choice)
The figure shows the LSP information of R1 and R3 on an MPLS network. An administrator runs the ping -a 1.1.1.1 3.3.3.3 command on R1. Given this, which of the following statements is true?
IPSG is a source IP address filtering technology based on Layer 3 interfaces. It prevents malicious hosts from forging authorized hosts' IP addresses to access authorized network resources.
R1 executes the operation ping -a lO.l.Ll 10.5.16.2, what is the meaning of this command?
Which of the following statements about 1S-IS (IPv6) is true?
From this picture, we can judge
The cutover risk assessment mainly considers which of the following aspects?
The Discovery message of LDP is used for neighbor discovery, and LDP has different discovery mechanisms when discovering neighbors. The following statement about the Discovery message in the basic discovery mechanism is correct
What is the command to adjust the link cost of an IS-IS interface?
A campus deploys OSPF to implement network interworking. The LSDB of R2 is shown in the figure. From this LSDB. it is possible to
What information was obtained?
For high reliability purposes, the following LDP messages are transmitted through TCP: discovery messages, session messages, advertisement messages, and notification messages.
According to this picture, we can judge that R4 is on?
The router ID of OSPF V3 needs to be configured in dotted decimal with a length of 128 bits.
The following description of TL in PLSHeader is correct:
As shown in the figure, the MP_BGP neighbor relationship is established between PE1 and PE2 through the LoopbackO interface. After the configuration is complete, it is found that CE1 and CE2 cannot learn routes from each other. Which of the following options will cause this problem.
Network administrator A wants to use A, CL to match specific routing entries. Which of the following routing entries will be matched by the A, CL rules in the figure?
acl number 2000
rule 10 permit source 10.0.0.0 0.0.6.0
In intra-domain MPLS VPN networks, data packets will be encapsulated with two layers of MPLS when they enter the public network and are forwarded.
label, the description of the two-layer label in the following options is wrong
Which of the following reasons may cause the hosts in the same VLAN of the LAN to fail to communicate with each other?
In OSPFv3, an LSA whose propagation range is one area has_____kind. (Fill in Arabic numerals only)
BGP/MPLS IP VPNs can only use LDP to construct public network tunnels.