设为首页收藏本站language 语言切换
查看: 2955|回复: 4
收起左侧

[其他] 300-101 第202题疑问

[复制链接]
发表于 2017-8-28 08:18:27 | 显示全部楼层 |阅读模式
10鸿鹄币
QUESTION 202
" m  v; X$ N/ H9 z7 O% ]" EWhen unicast reverse path forwarding is configured on an interface, which action does$ \2 b7 q7 c5 Q) N* z) s
the interface take first when it receives a packet?3 |7 G9 |9 X9 Z- ]9 H0 T
A. It check the ingress access list9 s5 }" G6 |$ p" t5 u8 e" U0 o9 E
B. It check the egress access list( S5 e* C& ~7 E$ ?
C. It verifies that the source has a valid CEF adjacency
4 w" w! [0 _) P7 |' FD. It verifies a reverse path via the FIB to the source; w- y: `4 o8 k% u! a1 T
Correct Answer: D$ R% @; K. O8 y( a( r/ N, k' p
Section: part 5
  g8 R1 Y* T1 ~  E: PExplanation' O( m5 R8 X3 ]- V
Explanation/Reference:+ z5 Q4 p! l" Z: X  X+ i
When a packet is received at the interface where Unicast RPF and ACLs have been configured, the
' h: k* b- y' O, z8 dfollowing actions occur:9 m+ F. H. o$ q" q: O- u& T8 L' F
Step 1: Input ACLs configured on the inbound interface are checked.; D+ E! J: P4 X4 M' o9 ^
Step 2: Unicast RPF checks to see if the packet has arrived on the best return path to the source, which it; ?& D! E% s  j* J/ Z
does by doing a reverse lookup in the FIB table
. p) z8 U& C9 X& i& O
3 V' p4 j6 p" Z下面的解析中的第一步 说的是先检查  进口ACL  那么为啥不会选A呢。。。。。
; |) @8 Z4 B, r$ L* G, `9 t" l: t, P1 n- D  d0 x5 R

最佳答案

查看完整内容

我觉得题库是错的,不过有一点需要考虑,就是题干并没有指明ACL有被配置。 思科官网链接:https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_urpf/configuration/15-sy/sec-data-urpf-15-sy-book/cfg-unicast-rfp.html?dtid=osscdc000283#GUID-07331556-315A-4327-9679-0390DD2F6FC1 思科给出的带ACL的uRPF配置案例: int eth0/1/1 ip address 192.168.200.1 255.255.255.0 ip verify unicast reverse-pat ...
发表于 2017-8-28 08:18:28 | 显示全部楼层
我觉得题库是错的,不过有一点需要考虑,就是题干并没有指明ACL有被配置。
% w/ j' X9 V% k5 m8 S
: V* d/ @5 f; l& o思科官网链接:https://www.cisco.com/c/en/us/td ... 7-9679-0390DD2F6FC1
) I' Y( y* c- f+ y! t6 h% ?" K3 G. M" v6 }  {3 G
思科给出的带ACL的uRPF配置案例:; m8 {& k3 O5 K$ l, p2 k+ `: E
2 [: C0 _- Z" y0 v1 z  S  B
int eth0/1/1' \! ~6 M6 H5 U6 l% m
ip address 192.168.200.1 255.255.255.0& X5 G4 \3 Z' c! p4 G7 z$ w. a: J
ip verify unicast reverse-path 197
( |; o8 D& U1 m8 ^!
; m: ?$ s6 i3 u9 Y4 p$ T8 Yint eth0/1/2: ~$ |& ?0 |) b/ B( w9 x' N$ f6 N; D
ip address 192.168.201.1 255.255.255.0
% M) o* o3 D" N8 R!
! K, P2 {% q' o- u( Jaccess-list 197 deny   ip 192.168.201.0 0.0.0.63 any log-input
1 H2 D: c) s" K. ]3 Z& G. X2 Waccess-list 197 permit ip 192.168.201.64 0.0.0.63 any log-input$ g' H2 H  H8 |1 V$ J
access-list 197 deny   ip 192.168.201.128 0.0.0.63 any log-input6 x1 y1 d1 m% ]  l; Y1 `
access-list 197 permit ip 192.168.201.192 0.0.0.63 any log-input" {- V2 s! v. z! _# F( h. K- ]' Q
access-list 197 deny ip host 0.0.0.0 any log
沙发 2017-8-28 08:18:28 回复 收起回复
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-29 02:28 , Processed in 0.324215 second(s), 24 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表