WhichtwostatementsarecorrectwithregardtoroutedistinguisherasdefinedinRFC4364-AKAIP-VPN(MPLS-VPN)?() A.TheconfigurationtodefineRoute-DistinguisherisIpvrfbulleRd1:1B.AroutedistinguishercanbeimportedandexportedtoandfromaVRFC.Route-Distinguisherisan8byteBGPattributevalueusedininfluencingBGPbestpath algorithm.D.Route-Distinguisherisan8bytevalueusedincreatinguniqueVPNv4address.
WhichtwostatementsarecorrectwithregardtoroutedistinguisherasdefinedinRFC4364-AKAIP-VPN(MPLS-VPN)?()
A.TheconfigurationtodefineRoute-DistinguisherisIpvrfbulleRd1:1
B.AroutedistinguishercanbeimportedandexportedtoandfromaVRF
C.Route-Distinguisherisan8byteBGPattributevalueusedininfluencingBGPbestpath algorithm.
D.Route-Distinguisherisan8bytevalueusedincreatinguniqueVPNv4address.
相关考题:
What best describes the usage of Route-Target rewrite?()A、Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.B、Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.C、Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.D、None of the above.
If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider
Which option describes the incorrect usage of the Label Distribution method?()A、LDP is primarily used in internal networks of MPLS-VPN providers.B、MP-BGP is used for label distribution for VPN customer routes.C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.
下列关于MPLS-VPN的描述中,哪些说法是错误的()A、RD属性是利用BGP的MP_UNREACH_NLRI扩展属性,将每个VPN出口的路由由IPV4路由变成VPNV4路由B、MPLS私网标签是由PE的BGP协议进行分发的,它对每一条的VPNV4路由分发一个随机的私网标签,一一对应,不许重复C、MPLS私网标签是由PE针对VPNV4路由所分发的,且VPNV4路由是由RD+IPV4路由所组成的,也就是说不同的私网标签其本质是RD的不同D、MPLS-VPN的RT属性是使用BGP-4的Extended_Communities属性,它在BGP邻居建立时,已经作为协商属性之一,向所有邻居进行了宣告
Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()A、 OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformanceB、 IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider supportC、 QoS requirements with MPLS-VPN must be implemented by the service providerD、 Hierarchical VPLS designs are the least scalableE、 IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required
Which three choices are BGP Extended communities used in MPLS-VPN deployment?()A、Site Of Origin SOOB、Route-TargetC、Route-DistinguisherD、Domain Identifier BGP extended commumity
Which IOS features are used to avoid Routing loops when dynamic Routing protocols are used betweenPE and CE in MPLS-VPN networks?()A、Site Of Origin SOO.B、SHAM links with OSPFC、BGP cost communityD、BGP feature allow-as inE、RPF Reverse Path forwarding.F、Access-list Control in Distance Vector protocol like RIP and EIGRP.
单选题Which option describes the incorrect usage of the Label Distribution method?()ALDP is primarily used in internal networks of MPLS-VPN providers.BMP-BGP is used for label distribution for VPN customer routes.CDirected LDP is used for label distribution in L2-VPN Attachement Circuits.DMP-BGP is used for label distribution in MPLS Traffic Engineered networks.
单选题What best describes the usage of Route-Target rewrite?()ARoute-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.BRoute-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.CRoute-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.DNone of the above.
多选题MPLS-VPN专线是通过采用MPLS技术在中国移动IP骨干网上构建企业IP专网,同时通过VPN进行隔离,实现政企客户多个分支机构之间()的互联,用途与数据(IP-VPN)专线类似。A跨地域B安全C高速D可靠
多选题If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()AA sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkBA sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedCA SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorDA SHAM link is part of OSPF network of MPLS-VPN provider
多选题Which IOS features are used to avoid Routing loops when dynamic Routing protocols are used betweenPE and CE in MPLS-VPN networks?()ASite Of Origin SOO.BSHAM links with OSPFCBGP cost communityDBGP feature allow-as inERPF Reverse Path forwarding.FAccess-list Control in Distance Vector protocol like RIP and EIGRP.
多选题Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()AOSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformanceBIP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider supportCQoS requirements with MPLS-VPN must be implemented by the service providerDHierarchical VPLS designs are the least scalableEIGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required
单选题L3 MPLS-VPN网络中,P设备必须要维护的信息有()。A私网路由B公网路由C私网LSPDvpn-instance