BGP authentication can prevent illegal routers from establishing neighbors with BGP routers. BGP authentication can be divided into ID5 authentication and Keychain authentication. Which of the followingBGP packets will carryBGPKeychain authentication information?
As shown in the figure, 0SPF is enabled on all interfaces of the router. The cost value of the link is marked in the figure, R2's
LoogbackO is advertised by mouth in area 0, then in In area 1, both R2 and R3 transmit the routing information of 10.0.2.2/32 in the form of Typae3 LSA.
MPLS-straight is slower than IP forwarding.
As shown in the figure, SF is enabled on all interfaces of the router, the cost value of the link is marked in the figure, and the Loopback0 interface of R2 is advertised in area 1, then the cost value of R1 reaching 10.0.2.2/32 is?
On the network shown in the figure, IS-IS runs on Rl, R2, R4, and R5, and the area ID is 49.0001. IS-IS runs on R3 and R6, and the area ID is 49.0002. In AS 65000, Ri, R3, R4, and R6 each establish IBGP peer relationships with R2 and R5. R2 and R5 are RRs, and Rl, R4, R3, and R6 are clients. The IBGP peer relationships are established using LoopbackO. The IP address of LoopbackO on each router is 10.0.X.X/32, and the router ID is 10.0.X.X, where X is the number of the router. Rl and R4 import the external route 192.168.1.0/24 to BGP through the import-route command, and R3 and R6 import the external route 192.168.2.0/24 to BGP through the import-route command. Which of the following statements are true?
The figure shows the debugging information on an OSPF router. Which of the following is the router ID of this router?
As shown in the figure, in a medium-sized network, BGP generally deploys dual RRs to improve R reliability. When deploying dual RRs, the ClusterIDs of the two RRs are generally set to be the same. What is the reason for this?
In BGP/MPLS IP VPN, the 0SPF multi-instance process uses the DN bit to prevent Type5 LSA loops.
Which of the following is not part of the preparatory work for the cutover plan?
IGP converges faster than BGP, which may cause network traffic loss. By enabling the OSPF and BGP linkage feature of the device, the device can keep the OSPF and BGP linkage during the set linkage time.____The router makes the link metric value in the LSA advertised to be the maximum value, so as to inform other OSPF devices not to use this router to forward data, so as to avoid traffic loss. (Note: If English letters are involved, all uppercase)
Which of the following statements is false when troubleshooting the dual-active failure of a VRRP backup group?
In the network shown in the figure below, to implement a remote LDP session between SWA and SWC. the following
The law is correct
Which of the following is not a hardware preparation for cutover?
Basic QinQ can choose the outer tag encapsulation method according to the business type.
On the OSPFv3 network shown in the figure, area 1 is a common area. Which of the following statements are true?
BGP allows you to use the filter-policy acl-number import command to filter received routes. The value of ad-number ranges from 2000 to 3999.
O TRUE
O FALSE
In the process of viewing the debug output through the SSH terminal, a lot of information pops up. Which of the following operations can
Make the Moni tor terminal no longer pop up debug messages?
Part of the configuration of R1 is as follows. Which statement about OSPF on R1 is correct?
ospf 1 router-id 172.16.1.1
area 0.000
network 10.1.12.1 0.0.0.0
network 10.1"3"0.0.0.0
network 172.16/1 1 0.0.0.0
ospf 2 vpn-instance tt
area QQO.O
network 10J J 1 0.000
As shown in the figure, the network has a loop because STP is not enabled. Which of the following phenomena may be bowed?
When there are multiple redundant links in the IS-S network, multiple equal-cost routes may appear. Which of the following statements is false about equal-cost routing within an IS-IS network?
When B, CPIMPLS TP VPN is deployeD. the OSPF VPN Route Tag (VPN Route Tag) is not transmitted in the extended community attribute of MP-BGP, but the local concept is only meaningful on PE routers that receive MP-BGP routes and generate OSPF LSAs.
As shown in the figure, an engineer uses 4 routers to test branch network interoperability. Among them, R1, R2, and R3 in branch 1 deploy OSPF to implement network interoperability. R2, R3, and R4 in branch 2 deploy IS-S to implement network interoperability. Now the engineer wants to implement R1 to access the loopback interface address of R4. Which of the following operations can meet this requirement?
As shown, all routers run OSPF. Which of the following statements is correct?
A campus has deployed IPv6 for service testing. There are 4 routers (R1, 22, R3 and R4) in this network, running 0SPFV3 to realize the interconnection of IPv6 network. A new router R5 needs to be connected to the network for testing. An engineer introduces a direct route in the OSPFVV3 process of R4 so that devices in the campus network can access the GE0/0/1 port address of R5. Which of the following statements about the scene is true of?
When MPLS is deployed in the network and the network layer protocol is IP, the route corresponding to the FEC must exist in the IP routing table of the LSR, otherwise the label forwarding entry of the FEC will not take effect.
display interface GEO/O/O once, and found that the Total Eror count (the total number of error packets at the physical layer of the interface) is not correct. . At this time, it can be concluded that the current time and fall has not disappeared.
When a fault occurs, the fault can be classified to reduce the scope of fault location. Which of the following is not an interface configuration fault?
On the OSPFv3 network shown in the figure, the IPv6 address of Loopback0 on R3 is 2000-3/128, and OSPFv3 is enabled. Which of the following statements are true?
Link LSAs of OSPFv3 are propagated throughout the area.
What characteristics must a high-risk operation plan have?
Match the alarm severity to the severity of the fault and countermeasures
C. Critical", Major-2, Minor-3, Warning-4 A
D. Critical-3, Major-2, Minor-1, Warning-4
There are multiple types of MAC address entries on a switch. Which of the following entries are manually configured and cannot be aged out?
The following six tools cannot be used to match BGP routing entries?
As shown in the figure, OSPF is enabled on all interfaces of the router. Which of the following statements is correct?
During the test phase of the cutover, the criteria to indicate that the test has been completed are:
As shown in the figure, configure a backhaul summary route 10.0.0.0/24 on the border route RT1. next hop
to RT2. At the same time, the default route to the external network is configured. At this point, a routing black hole will appear. The following is about routing
Is the black hole statement correct? (multiple choice)
On the network shown in the figure, VRRP is configured on Rl and R2, and the virtual IP address is 10.0.12.254. After the configuration is complete, the network engineer checks the VRRP status on R1 and R2, and finds that both devices are in the Master state. Which of the following is not a possible cause of this problem?
In an operator's MPLSVPN network, there are two devices PE1 and PE2 for MPLSVPN data forwarding. PE1 receives a private network route of 172.16.1.0/24 from the client, and converts it to a VPNv4 route on PE1 and assigns a label of 1027 Released to PE2. The outgoing label of the MPLS LSR-ID of PE2 reaching PE1 is 1025o When a client on PE2 accesses 172.16.1.0/24, the frame sent by PE2, the inner and outer labels should be a combination of the following 6 options?
The figure shows the file information on R2. When a network engineer runs the dir | exclude 1 command to view the file information, which of the following files will be displayed?
As shown in the figure, private network routing information is exchanged between PE1 and PE2 and their respective CEs through OSPF, and the same DomainlD is set on both PE1 and PE2. When routes are imported from BGP to OSPF on PE2, it is possible that Which of the following types of SAs are passed to CE2?
What is the command to adjust the link cost of an IS-IS interface?
If display current-configuration can reach the setting of !JIS-IS, and display saved-
There is no IS-IS setting in the configuration, so that means?
IPSG is a source IP address filtering technology based on Layer 3 interfaces. It prevents malicious hosts from forging authorized hosts' IP addresses to access authorized network resources.
The rules of RR advertising routes violate the rules of IBGP split horizon, so it may cause loops in the AS
road. Which routing attributes does RR use to prevent loops?
IS-/S supports multi-instance and multi-process, that is, one IS-S router. Multiple VPN instances can be configured with multiple
IS-IS process associated. Are the following descriptions of IS-JS multi-instance and multi-process correct?
As shown in the figure, R1, R2, R3, and R4 are in the same PLs domain, and LDP is used to distribute IPLS labels between devices. R4 is the Egress LSR of the FEC 4.4.4.0/24. If you want to achieve R1 access
4.4.4.0/24, R4 does not need to query the label table but can know the forwarding priority of the data, then the outgoing label of R3 for the FEC should be:____. (Please fill in the Arabic numerals directly, without symbols)
What is the meaning of display current-configuration I include vlan command?
Which of the following TLVs is added to IS-IS to support multi-topology?
The device operating environment is crucial for stable device operating, including the equipment room, power supply, and heat dissipation. Maintenance personnel must be on site to maintain the device operating environment.
According to this figure, it can be known that in VLAN 300, from 17:22:38 to 17:22.44,00e0-fc3d-3bdB. 0 MA, C flaps occurred on 2020-06-04.
Which of the following statements about the multicast address used by 0SPFv3 is correct?
A campus deploys OSPF to implement network interworking. The LSDB of R2 is shown in the figure. From this LSDB. it is possible to
What information was obtained?
If you want to check the files under Flash, which command should you use?
Which statement about DHCP Snooping is wrong?
As shown in the figure, a park has deployedIPv6For business testing, the network has4router. run
0SPFV3Realize network interconnection. about theOSPFV3network generatedLSA. Which of the following statement it's wrong?
Which of the following descriptions is correct about configuring static LSPs in MPLS networks?
To prevent hackers from attacking user devices or networks through MA, C addresses, you can configure the MA, C addresses of untrusted users as black hole MA, C addresses to filter out illegal MA, C addresses.
According to this picture, Xinmen can be judged?
Which of the following will not cause the VRRP backup group to flap?
OSPFV2 is an IGP running on an IPv4 network; OSPFV3 is an IGPo running on an IPv6 network. The basic working mechanism of OSPFv3 is the same as that of OSPFV2, such as the election of DR and B, DR. As shown in the figure, an engineer uses 3 routers to test IPv6 services. He wants to realize the interconnection of IPv6 networks by running OSPFV3.
Pass. Which of the following statements about the election of the network DR is correct?
In the MPLS network, there are different operation types for labels, among which the meaning of the "pop" action is:
Deployment in a small and medium-sized networkOSPF,When viewing the routing table of a device, it is found that there are only directly connected routes.
It is not possible for the operation to cause the fault?
Regarding the sham link, which of the following descriptions is wrong?
After the cutover is completeD. it is generally necessary to check the following items?
From this figure, we can conclude that
To ensure security, authentication can be configured in the OSPFV3 process area view.
During the process of viewing the debug input through the SSH terminal, there is a lot of pop-up information. Which of the following operations can make the monitor terminal no longer pop up the debug message?
When deploying BGPIMPLS IPVPN, when two VPNs have a common site, the common site must not use overlapping address space with other sites of the two VPNs.
Service routes of an enterprise are transmitted on the network. Some configurations of PE1 and PE2 are shown in the figure. Which of the following LSAs may CE2 receive?
From this figure, it can be known that
On a broadcast network, routers (including non-DIS routers) of the same level on a network segment can establish neighbor relationships. In the implementation of BFD for IS-IS, however, BFD sessions are established only between a DIS and non-DIS routers, not between non-DIS routers.
To speed up the detection of link failures in an IS-IS network, you can associate IS-IS with BFD.
On the network shown in the figure, the DHCP server function is enabled on GEO/0/0 of R2, and the address pool is an interface address pool. When GEO/0/0 and GEO/0/1 of R1 function as DHCP clients, only one interface can obtain an IP address by default.
Regarding MP-BGP, which of the following descriptions is wrong?
Which of the following are advantages of VLAN aggregation?
A company consists of a head office and two branch offices, and uses MPLS VPN technology to transmit private network routes. In the networking mode of HuB&Spoke. Branches can only send and receive routes to and from the head office, and branches cannot directly send and receive routes to each other. In order to achieve the above requirements, which of the following schemes can the setting of RT be?
Which of the following sequences can be matched by the regular expression 100.S
If faced with a complex network failure, and it is estimated that the troubleshooting cannot be completed in a short period of time, and the user urgently needs to restore the availability of the network, then the correct approach is.
What check items can be set by IPSG?
All routers in a network run IS-IS, and all are in Area 49.0001, where the L SDB of R1 is shown in the figure
According to this, it is judged that the DIS of Level-2 is. (Please fill in the device name, such as R1)
|
DatabaseinformationforISIS (1)
Level-1Link State Database
LSPIDO Seq Num ChecksumbHoldtime Length ATT/P/OL
0001.0000.4004.00-00 0x00000008 0xb701 1186 68 0/0/0
0001.0000.2002.00-00Ox 0000008 0xb701 1186680/0/0
0001.0100.1001.00-00*0x00000050x2f9d1187 680/0/0
0001.0100.1001.01-00*0x00000001 0xa79e1110550/0/0
Level-2 Link State Database
LSPIDAN> Seq Num Checksum., Holdtime Length ATT/P/OL
0001.00002002.00-00 0000000080xb7011188 6S0/0/0
0001.0100.1001.00-00* 0x00000060x2d9e 1187 680/0/0
0001.0100.1001.01-00* 0x00000005OxdObO 1191 660/0/0
0100.0000.3003.00-00 000000005 0xfe53 1185 560/0/0
0
Configuring DHCP Snooping can be used to prevent imitator attacks, so the configuration process needs to include the following
What are the steps?
Which of the following regular expressions can match only BGP routes that pass through AS200 and then through AS300
eyes?
On a stable network that requires fast route convergence, you can change the value of the interval at which OSPF LSAs are updated to 0 so that topology or route changes can be immediately advertised on the network through LSAs, which speeds up route convergence.
Regarding the label space of MPLS, the description is wrong:
In OSPFv3, an LSA whose propagation range is one area has_____kind. (Fill in Arabic numerals only)
The Router LSA of a router is shown in the figure. Which of the following statements is wrong?
The IS-IS Level-1 neighbor relationship between R3 and R4 is not established. According to the information in this figure_What is the possible reason?
From this picture, we can judge
Public Routing Table . ISIS Summary Count 6 ISIS Routing Table's Status : < Active > Summary Count 6
On the OSPFv3 network shown in the figure, area 1 is a stub area. Which of the following statements are true?
Which of the following statements about the OSPFV3 packet format is correct?
As shown in the figure, OSPF is deployed in a campus, and Area 1 is deployed as an NSSA area. In the case of missing header, R2 will automatically generate a missing header route of Type 7 LSA and flood it in the NSSA area
As shown in the figure, in a medium-sized network, BGP generally deploys dual RRs to improve R reliability. When deploying dual RRs, the Cluster IDs of the two RRs are generally set to be the same. The reason for this is
Can Huawei equipment perform traffic suppression for Mingbi packets?
The figure shows the Router-LSA generated by a router. Which of the following statements are true based on the LSA?
In an MPLS domain, LSR can be divided into Ingress LSR, Transit LSR and Egress LSR according to the different processing methods of LSRs for data. For the same FEC. a certain LSR can be the Ingress LSR of the FEC or the Transit LSR of the FEC. LSRO
After a fault occurs, you need to collect and back up various types of fault information in time as a reference for troubleshooting. In addition, when seeking emergency assistance from Huawei Technologies Co., Ltd.
Which of the following statements about 1S-IS (IPv6) is true?