单选题There is MPLS VPN traffic traversing through a TE intermediate router. What is the MPLS packet labelstack sequence (from outer to inner) for the VPN traffic on this router?()ATE label, IGP label, VPN labelBIGP label, TE label, VPN labelCTE label, VPN label, IGP labelDVPN label, IGP label, TE labelEIGP label, VPN label, TE label
单选题
There is MPLS VPN traffic traversing through a TE intermediate router. What is the MPLS packet labelstack sequence (from outer to inner) for the VPN traffic on this router?()
A
TE label, IGP label, VPN label
B
IGP label, TE label, VPN label
C
TE label, VPN label, IGP label
D
VPN label, IGP label, TE label
E
IGP label, VPN label, TE label
参考解析
解析:
暂无解析
相关考题:
There is MPLS VPN traffic traversing through a TE intermediate router. What is the MPLS packet labelstack sequence (from outer to inner) for the VPN traffic on this router?()A、TE label, IGP label, VPN labelB、IGP label, TE label, VPN labelC、TE label, VPN label, IGP labelD、VPN label, IGP label, TE labelE、IGP label, VPN label, TE label
Which option describes the incorrect usage of the Label Distribution method?()A、LDP is primarily used in internal networks of MPLS-VPN providers.B、MP-BGP is used for label distribution for VPN customer routes.C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.
Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()A、MP-BGP routingB、Static routingC、Policy routingD、AutorouteE、Forwarding adjacency
In the context of MPLS Traffic engineering, TE path calculation is conducted by().A、TE middle pointB、TE tail endC、TE head endD、All TE nodes along the pathE、Independent server
对于iMC MPLS VPN管理,说法正确的是()A、MPLS VPN管理实现了MPLS VPN业务端到端的规划、部署、监视、审计B、MPLS VPN管理支持Cisco、H3C、Huawei厂家主流设备C、MPLS VPN管理支持与基础网络管理功能的无缝集成D、MPLS VPN管理仅能支持H3C网络设备
iMC MVM为业界少数全面支持多种MPLS技术管理的解决方案,可以同事支持()。A、MPLS L2 VPN-VPLSB、MPLS L2 VPN-MartiniC、MPLS TED、MPLS L3 VPN-BGP
ISIS为支持MPLS TE,必须进行的配置包括()。A、ISIS视图下配置支持宽度量B、ISIS视图下使用traffic-eng命令使能ISIS-TEC、ISIS视图下使用opaque-capability enable命令使能opaque能力D、ISIS视图下使用mpls-te enable命令使能mpls te
对于MPLS VPN、MPLS TE等不同的MPLS应用来说,以下描述正确的是()。A、所有MPLS应用的数据平面是相同的B、所有MPLS应用的数据平面是不同的C、所有MPLS应用的控制平面是相同的D、所有MPLS应用的控制平面是不同的
Which four services use the inner labels of an MPLS label stack? ()A、MPLS VPNB、switching path in MPLS coreC、Cisco MPLS Traffic Engineering and Fast RerouteD、MPLS over ATME、VPN over Traffic Engineering coreF、any transport over MPLS
以下哪个系统可以实现对MPLS TE的管理()。A、iManager NSM LSP ManagerB、iManager NSM Qos ManagerC、iManager D2610D、iManager NSM VPN Manager
Which statements are correct for forwarding traffic into MPLS TE tunnels?()A、Autoroute causes the tunnel to be treated as a directly connected link to the head-end.B、Autoroute causes the TE head-end to establish IGP adjacency with the tail-end over the tunnel.C、Forwarding adjacency makes the TE head-end node advertise the Tunnel LSP into the IGP.D、Forwarding adjacency supports unequal cost load balancing over multiple TE tunnels.
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()A、MPLS TE supports admission controlB、MPLS TE tunnel traffic is a link attribute to compute the TE tunnel pathC、MPLS TE uses BGP extension to advertise link attributesD、MPLS TE provides protection capabilityE、MPLS TE uses RSVP to establish LSP
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed? ()A、 VPN TrafficB、 DNS TrafficC、 LDAP TrafficD、 HTTP TrafficE、 HTTPS TrafficF、 Traffic from the network address of 192.168.10/24
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
单选题Which option describes the incorrect usage of the Label Distribution method?()ALDP is primarily used in internal networks of MPLS-VPN providers.BMP-BGP is used for label distribution for VPN customer routes.CDirected LDP is used for label distribution in L2-VPN Attachement Circuits.DMP-BGP is used for label distribution in MPLS Traffic Engineered networks.
单选题Which statement about L2VPN Pseudowire Switching is not true?()AL2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across an inter-AS boundaryBL2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across two separate MPLS networksCQuality of service is not supported per PseudowireDL2VPN Pseudowire Switching connects two or more contiguous Pseudowires segments to from an end-to-end multihop PseudowireEThe Cisco MPLS Traffic Engineering tunnel selection is not supported
单选题In the context of MPLS Traffic engineering, TE path calculation is conducted by().ATE middle pointBTE tail endCTE head endDAll TE nodes along the pathEIndependent server
多选题Which three statements about MPLS traffic engineering (MPLS TE) are true? ()AMPLS TE supports admission controlBMPLS TE tunnel traffic is a link attribute to compute the TE tunnel pathCMPLS TE uses BGP extension to advertise link attributesDMPLS TE provides protection capabilityEMPLS TE uses RSVP to establish LSP
多选题Which methods would enable traffic to be forwarded along an MPLS TE tunnel?()AMP-BGP routingBStatic routingCPolicy routingDAutorouteEForwarding adjacency
单选题There is MPLS VPN traffic traversing through a TE intermediate router. What is the MPLS packet labelstack sequence (from outer to inner) for the VPN traffic on this router?()ATE label, IGP label, VPN labelBIGP label, TE label, VPN labelCTE label, VPN label, IGP labelDVPN label, IGP label, TE labelEIGP label, VPN label, TE label
多选题Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()AOSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformanceBIP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider supportCQoS requirements with MPLS-VPN must be implemented by the service providerDHierarchical VPLS designs are the least scalableEIGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required
单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.