成长值: 64690
|
Question 4 – An exhibit with three routers A, B and C. Router A is connected to Router B. Router B is connected to Router C.7 ]9 B- d; m) M% u9 b. k8 L m
& r* \ l" Y9 f; C- x/ e; W5 D7 mAnswer: Router C does not have a route to the loopback interface of Router A (which is used as the tunnel source on Router A and tunnel destination on Router C).
A' T$ j9 G l# L/ B, i7 Q% k——————————-: g% s( S1 _0 v7 X ?5 N7 S! R
– Question 6 – A firewall has been inserted between 2 routers running GRE. Which protocol needs to be allowed through on the firewall?
8 Q5 W; v2 j5 {, s+ h
* \- d4 _/ p/ v2 yAnswer: Create a firewall rule to allow IP protocol 47
3 J$ G. h8 w5 A7 }% Z1 @5 b——————————-# W2 U2 @& s8 y3 @* I+ w
– Question 9 – Refer to the exhibit (ClientA is connecting to the network via e0/0 interface while the “tunnel source e0/1” in the configuration). ClientA is unable to reach ClientB while other users from other Spokes can reach ClientB. Which command resolves this issue?, H! p: n* |, _; G- \/ m; A' }
) a( j' G5 N. y( ]* V0 ]
Answer: tunnel source ethernet0/0% Z( L+ t* H9 V" s
——————————-% j( V* B8 _: l9 N
– Question 12 – The GRE tunnel went down when an unrelated interface went down. What is the reason for that?0 w! Q* P" z: t% e% ]
: J1 y( ~5 t: ]Answer: That interface is configured as the tunnel source
5 R- P1 n. A# [: @" b1 firewall has been inserted between 2 routers running GRE. Which protocol needs to be allowed through on the firewall.
3 A8 W) s) Z6 ?/ _protocol 47(not sure about it)
& b# G0 D" Q7 H– Exhibit with 3 routers, select why BGP not coming up between the HQ routers
' |2 F. a; d+ s# Awrong ip in BGP or wrong autonomous system2 i3 Z+ q: B8 v! o2 g8 v( w
– AAA D&D2 l; @8 g6 M& f' E1 O; ~& K
– IPV4 ACL between 3 routers and which one allowed SSH access+ n! W: E: e. R' j% k% X
the ACL that mention permit any(or host,network) any or (host/network) eq (ssh or 22)# e) m4 _4 Y9 Q% h) b
– Large exihibit with many routers. Select why BD-PC1 unbale to communicate with HQ router by looking at the routing table/ p; u2 E& H7 a
& k( v1 {; t; J) S. R8 [% J) U– 1 question about GRE multipoint setup with NHRP
" V- P \& k* W/ ^( n6 }7 M% U% m: a+ W/ w6 t9 Z
– 1 question about how to apply IPV6 access list
& E: j3 Z. {6 e* Oin ipv6 ACL should be with name or tag only,it should be in extended form so we need source & destination & on interface we should use ipv6 traffic filter" l" I8 @5 G9 o& B
( a2 {& f7 B) t% W– 1 question on how to SSH from a network device to another1 { J9 K# w/ b+ l! L' j4 X/ T/ b
by username ## pass ## ,then ip domain-name then crypto key generate rsa 10248 W1 e7 r$ c+ H( T; t1 ~
in line vty 0-15 (ie)
8 R: U4 v6 k$ n4 h9 Dtranspot input ssh
9 r! Q9 h3 p# |( a5 P5 a/ b& C& Q+ R7 E6 B
– 1 question on how to secure AUX access on a router:* a% O) N4 l% V# `3 F1 _) _5 H
ans: in prev mode :type sh line ,take aux line # then in config mode:
0 I+ w0 X4 B& l1 h8 o# A# zi.e aux #155
3 v x8 Z& H6 Q; z( y7 qline 155
A. {4 H' I5 `: V$ Omode inout' @2 z9 [3 w- e. O! \
speed 115200
+ I$ u5 A; H( N, _flowcontrol hardware$ Z6 a$ l5 j# ]- x l9 e
transpot input all% p8 b* M+ |+ Z% ^' u
pass cisco
5 e" f% f8 L$ ]+ `! A, i; {9 ]login2 A) j, I# t6 [; y! x m" i
end
2 o: `$ Z- N: e/ J3 c% Pthen sh run (secure line aux will appear)6 J# v: U9 I4 Y2 }3 z& h) s2 d7 w/ c
G, ]& A' K {- b9 I# E# P
8 N2 T, C' n% o* o |
|