A company purchased private lines from two operators. In order to optimize the lines, the company
used the 6GP protocol to learn from two
Route entries that operate off. However, after the enterprise found that this configuration, the traffic
of the port route increased greatly, and the network engineering arrangement
After investigation, it was found that the traffic of the two operators was passed to each other
through the enterprise egress router. Therefore, the enterprise intends to use the routing strategy so
that the traffic of the packets of different carriers is no longer passed to each other. Is the
configuration in the following figure correct?
A
The routing policy tools that can be used by BGP mainly include Filterpolicy and oRoute-policy.
Fiterpolicy can only filter routes, Rote - policy can only modify routes
B
Explanation:
A campus deploys OSPF to implement network interworking. The LSDB of R2 is shown in the figure.
From this LSDB. it is possible to
What information was obtained?
B, D
Which of the following are static information coke analysis?
A, C, D
According to this diagram, can we break the
B, C
According to this picture, cooked I'] can be judged?
C, D
Which of the following actions may affect the normal operation of the customer's network?
B, C, D
Which of the following information can the DHCP binding table contain?
B, C, D
The Discovery message of LDP is used for neighbor discovery, and LDP has different discovery
mechanisms when discovering neighbors. The following statement about the Discovery message in
the basic discovery mechanism is correct
B, C
When troubleshooting a network, if you need to confirm the business traffic path, which of the
following may need to be done ()
A, B, C
As shown below:
IR2] ad 2000
[R2-ad-basic-2000]rule deny
[R2-ad-basic-2000]quit
#
[R2] ospf
[R2-ospf1]area 1
[R2-ospM-area-0.0.0.1] filter 2000 import
[R2-ospf-1-area-0.0.0,1] quit
[R2-ospf-1] default-route-advertise always
D
About the difference between NSR and NSF, which is correct?
C
In the multi-level RR scenario, a large number of secondary RRs will be connected to the primary RR,
which may lead to BGP of the primary RR. The routing table overflows, what method can be used to
reduce the risk of overflowing the routing table of the advanced RR BGP?
B
What fields are added in Update in order to advertise IPv6 routes in BGP4+.
C
When deploying MPLS/BGP IP VPN, which of the following descriptions is wrong about using BGP to
exchange routing information between PEs and CEs?
B