Which option for the connections between the data centers provides the best resiliency and stability?

A company has a data center that hosts multiple tenants. The company is adding a second and third data center. The core of each data center is an IRF virtual switch.

These are the IRF connections:

– IRF 1 is the core of the first data center.

– IRF 2 is the core of the second data center.

– IRF 3 is the core of the third data center.

– The three data centers are fully interconnected with dark fiber.

– IRF 1, IRF 2, and IRF 3 have connections to a WAN and to the Internet.

Which option for the connections between the data centers provides the best resiliency and stability?
A . a link aggregation that consists of all of the links
B . MSTP running on the links
C . IRF 1, IRF 2, and IRF 3 combined into a single IRF virtual device
D . SPBM configured across IRF 1, IRF 2, and IRF 3

Answer: C

Explanation:

IRF technology extends network control over multiple active switches. Management of a group of IRFenabled switches is consolidated around a single management IP address, which vastly simplifies network configuration and operations. You can combine as many as nine HP A-series switches to create an ultra-resilient virtual switching fabric comprising hundreds or even thousands of 1-GbE or 10-GbE switch ports.

References: Reducing network complexity, boosting performance with HP IRF technology, White Paper, page 3 http://h17007.www1.hp.com/docs/reports/irf.pdf

What is a benefit of using the HP Network Visualizer SDN application for capturing traffic on HP ProVision switches?

What is a benefit of using the HP Network Visualizer SDN application for capturing traffic on HP ProVision switches?
A . This application can correlate captured traffic with user information based on information synced with Microsoft Active Directory.
B . This application can configure mirroring on switches that do not support OpenFlow using traditional methods, eliminating the needs for upgrades.
C . This application can forward the captured traffic to HP DVLabs for deeper inspection as to whether the traffic poses a threat to the network.
D . This application can integrate with VMware vCenter, which uses the captured traffic to determine the correct policies to deploy to virtual hosts.

Answer: A

Explanation:

Network Visualizer supports integration with Microsoft Active Directory using LDAP protocol to obtain user groups which translates in user identity integration. Because of the detailed information and correlated data available to SDN, network administrators can determine the traffic that needs to be captured by filtering per user, user-group, device types, location, application, state of network, and time.

References: Being innovative with HP SDN Network Visualizer application, page 3 https://www.hpe.com/h20195/v2/GetPDF.aspx/4AA6-3816ENW.pdf

Refer to the exhibits on the Exhibit 1 and Exhibit 2 tabs.

Refer to the exhibits on the Exhibit 1 and Exhibit 2 tabs.

Exhibit 1

Exhibit 2

A network administrator has set up an HP VAN SDN Controller to operate in hybrid mode. The administrator wants to confirm that the controller has properly configured an HP Comware switch to be controlled by it in hybrid mode.

Which output in the exhibit indicates that the controller is using hybrid mode.
A . Active configuration
B . MissRule flow entry information
C . Flow entry 1 information
D . Flow table

Answer: B

In addition to setting up the routes between the instances, what is another requirement for this scenario?

Refer to the exhibit.

A network administrator wants to route all external traffic from VPN instances “TenantA” and “TenantB” to a firewall at 10.0.5.5 in VPN instance “SharedServices.”

In addition to setting up the routes between the instances, what is another requirement for this scenario?
A . The RAGG 3 interface must be added to VPN instances “TenantA” and “Tenant
B . ”
C . A router must implement Network Address Translation (NAT) to translate overlapping tenant network addresses.
D . Route leaking must be enabled globally on Router1, as well as on each of the VPN instances.
E . The routes must be redistributed between the different VPN instances.

Answer: A

How does the switch handle the packet?

Refer to the exhibit.

A standard ARP packet arrives on the switch with the flows shown in the exhibit.

How does the switch handle the packet? (Select two.)
A . It encapsulates the packet and sends it to the controller.
B . It forwards the packet normally.
C . It drops the packet.
D . It transmits the packet on port 200.
E . It transmits the packet on the ports in group table 200.

Answer: AB

How should the administrator separate the tenant traffic over the EVI links?

A customer has five data centers. Each data center hosts 10 tenants and separates the tenants using

VLAN assignments.

The network administrator is connecting the data centers using EVI.

How should the administrator separate the tenant traffic over the EVI links?
A . Set up a QinQ subinterface for each tenant on the EVI tunnel interfaces.
B . Set up a unique EVI network ID for each tenant and extend that tenant’s VLANs over that EVI network.
C . Set up a routed subinterface for each tenant on the EVI tunnel interfaces.
D . Extend all VLANs over the same EVI network. Use EVI VLAN mapping to map each tenant’s VLANs to a unique S-VLA

Answer: B

Which HP Network Protector feature should the administrator use to configure this policy?

A company has deployed the HP Network Protector SDN Application solution. The network administrator wants to use this application to prevent clients from accessing specific devices on the private network, including other clients.

Which HP Network Protector feature should the administrator use to configure this policy?
A . ACL Manager
B . blacklists
C . greylists
D . Redirection server

Answer: A

Which output interface supports the needs of this scenario?

Refer to the exhibits on the Exhibit 1 and Exhibit 2 tabs.

Exhibit 1

Exhibit 2

Network clients are configured to use the switch as their default gateway in VLAN 2. The HP Comware switch places VLAN 2 in OpenFlow instance 1. An SDN application has created the flow entry shown in Exhibit 1 to route traffic from 10.1.2.0/24 to 10.1.3.0/24. Exhibit 1 does not show the output interface for the flow.

Which output interface supports the needs of this scenario?
A . CONTROLLER
B . ANY
C . NORMAL
D . TABLE

Answer: C

Explanation:

NORMAL: Represents the traditional non-OpenFlow pipeline of the switch. Can be used only as an output port and processes the packet using the normal pipeline. If the switch cannot forward packets from the OpenFlow pipeline to the normal pipeline, it must indicate that it does not support this action.

References:

https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/ openflow-spec-v1.3.3.pdf JaPage: 13

What could the network administrator do to meet this requirement?

A company requires secure, encrypted connections between OpenFlow-enabled switches and the HP VAN SDN Controller.

What could the network administrator do to meet this requirement?
A . Configure TLS and certificates for the connection to the OpenFlow controller.
B . Configure the OpenFlow instance to use SSH and set up matching passwords on the switches and controller.
C . Configure fail secure mode on the OpenFlow instance.
D . Configure the controller connection on the switch out-of-band management (OOBM) port.

Answer: A

Explanation:

Openflow Controller TLS The Openflow controller component relies on PKI to establish mutual trust (2-way SSL) between itself and the Openflow switches that it manages.

References: HP VAN SDN Controller Administrator Guide, page 45

http://h20565.www2.hpe.com/hpsc/doc/public/display?sp4ts.oid=5443866&docId=emr_na­c04003114&docLocale=en_US