成长值: 64940
|
Question 4 – An exhibit with three routers A, B and C. Router A is connected to Router B. Router B is connected to Router C.
! S# h" n* H. ~$ Q3 n4 ~, p4 q/ L8 I4 r
Answer: Router C does not have a route to the loopback interface of Router A (which is used as the tunnel source on Router A and tunnel destination on Router C).! u6 W+ b9 a1 |' t) E( X. c
——————————-
, @8 w. S* Z8 Q) r& D# ~6 h– Question 6 – A firewall has been inserted between 2 routers running GRE. Which protocol needs to be allowed through on the firewall?
2 F; D- f [4 S6 E8 i% e" i
% Z7 p0 U4 E+ F* [3 uAnswer: Create a firewall rule to allow IP protocol 477 ]! i- F5 v% `+ T- L b5 S
——————————-: s3 g# F. |, \; b1 `% B+ V0 S
– Question 9 – Refer to the exhibit (ClientA is connecting to the network via e0/0 interface while the “tunnel source e0/1” in the configuration). ClientA is unable to reach ClientB while other users from other Spokes can reach ClientB. Which command resolves this issue?- j/ D9 D a+ N2 U, v) m: k
) n. {+ H8 K2 z) Q. z+ OAnswer: tunnel source ethernet0/0
; R, Z# K- }% R' i) y* x——————————-; d' s5 ?' r- d
– Question 12 – The GRE tunnel went down when an unrelated interface went down. What is the reason for that?; D% y9 }$ @- R" P" f
: }( w/ F2 e4 O) ~0 T- M5 d
Answer: That interface is configured as the tunnel source
5 L3 V9 Q1 W3 B! V% E& t I1 firewall has been inserted between 2 routers running GRE. Which protocol needs to be allowed through on the firewall.) V& c7 U2 r! j7 _' B+ C
protocol 47(not sure about it)
% }; A; D: I, u% |3 O0 z– Exhibit with 3 routers, select why BGP not coming up between the HQ routers
! r0 o, i" v6 o) ]' }3 A7 Rwrong ip in BGP or wrong autonomous system# @: q1 e6 W9 ~- M+ O [) Z
– AAA D&D
- g& n, H5 y; U– IPV4 ACL between 3 routers and which one allowed SSH access/ {9 c9 A: w/ d. @
the ACL that mention permit any(or host,network) any or (host/network) eq (ssh or 22)
0 C% c' a7 ^7 F6 U* e" M1 h: \– Large exihibit with many routers. Select why BD-PC1 unbale to communicate with HQ router by looking at the routing table
. F* E+ s: ?0 { y R0 u4 F7 W
; g T' D9 U3 X- F6 ?' i; i9 r– 1 question about GRE multipoint setup with NHRP2 A# l0 X+ Y+ b
6 V" [8 v- f( e+ b t' `
– 1 question about how to apply IPV6 access list2 H; A6 o' O- ^
in ipv6 ACL should be with name or tag only,it should be in extended form so we need source & destination & on interface we should use ipv6 traffic filter9 o( Q# I3 [/ a7 A4 ~0 X/ m
$ W4 U6 S* v2 `& B5 g, {0 w" O
– 1 question on how to SSH from a network device to another
+ {& K9 r7 K$ Pby username ## pass ## ,then ip domain-name then crypto key generate rsa 1024
. h5 V0 f$ m+ e V) ain line vty 0-15 (ie) c% D# K9 A7 T
transpot input ssh5 K& g, w8 }1 M: P/ I1 b
3 u! m8 `& ^# W
– 1 question on how to secure AUX access on a router:
# N1 ?" b0 D+ f$ j9 Z1 Mans: in prev mode :type sh line ,take aux line # then in config mode:+ d n' A! e+ ?1 X" f
i.e aux #155
$ N5 Z( T& T) o c, p9 g gline 155
7 ~# X* f0 ~( J6 G2 Mmode inout( F- c6 X, G% c- x; A
speed 115200
% |2 K( z' e* C! @! vflowcontrol hardware6 i- a3 {( V+ l
transpot input all
2 H* O- h0 R8 }pass cisco! s3 d5 y: s( A0 L% X5 A& ~8 y& a
login3 h6 t [3 V: _- P* @
end
3 L+ y- Q0 J: h) t6 _* }& ~then sh run (secure line aux will appear)- Y5 s% ^! f* z9 Y$ x2 E
3 w3 ^/ F7 m/ T, o$ r, E
/ t7 |5 K, e# V! \4 Y0 W |
|