Your company is designing a new data center in a remote location that must be connected to your local data center. You have a service provider connection between the CE devices at each site. You want to implement EVPN with VXLAN services between sites, but the service provider does not offer EVPN services.
Which two statements are true in this scenario? (Choose two ) A . The provider’s edge devices must map your VXLAN VNIs to MPLS LSPs within the provider network at each site B . The customer’s edge devices within your data center can act as VXLAN Layer 2 gateways C . You can still implement EVPN service across the service provider as long as there is IP reachability between the sites. D . The service provider must provide an MPLS-based VPN connection between sites
You are designing a service provider core network As part of the design, you must ensure that the MPLS network utilizes the traffic engineering database (TED) for path selection and resiliency. You have chosen OSPF as the IGP for your design.
In this scenario which statement is correct? A . You must enable traffic engineering in OSPF to populate the TE C . OSPF cannot be used to populate the TE E . You must disable traffic engineering in OSPF to use the TE G . OSPF populates the TED by default.
Which two statements about BFD are correct? (Choose two) A . BFD provides link failure detection for static routes. B . BFD modifies each protocol timer to improve link failure detection. C . NSR maintains BFD sessions during Routing Engine switchover. D . GRES is required for BFD sessions to be established.
You work for service provider B that wants to implement a hot potato routing policy on the network so that router C uses link C-A to reach service provider A’s advertised routes and router D uses link D-B to reach Service Provider A’s advertised routes Currently traffic from router C is traversing the core to exit the network on router B.
Referring to the exhibit, what are two design actions that would satisfy the requirements? (Choose two.) A . Implement BGP-ORR B . Configure new IBGP neighbors between routers C and A and routers D and B C . Implement BGP-LS D . Configure the route reflector to send multiple copies of a route learned from different IBGP peers to its clients.
Your applications are migrating from a legacy data center to an EVPN over a VXLAN-based VM environment. A few critical legacy applications not support this environment and must remain on bare metal servers and the applications must be able to access the Internet.
What must be included in the VXLAN design to satisfy these requirements? A . VTEP tunneling B . VXLAN gateway C . SR-IOV D . nested VM capability
Your customer is paying for traffic prioritization and you must ensure that all traffic from their 172.27. 10.0/24 network receives top priority through your network.
Which action will satisfy this requirement? A . Apply a behavior aggregate classifier to the egress interface. B . Apply a custom rewrite rule to the ingress interface. C . Apply a multifield classifier to the ingress interfaces. D . Apply a custom scheduler map to the ingress interface.
We would need MF to match the address and set the forwarding class.
Your customer’s enterprise is adding geographically-dispersed branch offices and requires new WAN connections. The primary design consideration for this expansion is low cost but the branches must remain secure with low latency.
Which type of Internet access model satisfies the customer’s requirement in this scenario? A . distributed model with security at the hub B . centralized model with security at the hub C . centralized model with security at each branch D . distributed model with security at each branch
You are asked to ensure that most traffic that traverses your network is load balanced over all of the equal cost links between the routers in your network. However, you must also ensure that traffic from ISP A that is destined for ISP D must traverse the R1-R2-R3-R4-R5 path.
Referring to the exhibit how would you accomplish this task? A . Force the ISP A to ISP D traffic over RSVP-signaled LSPs. B . Adjust the BGFs LOCAL PREF attribute to ensure that the raw IP packets follow the required path. C . Adjust the OSPF metrics of each link so that the raw IP packets follow the required path. D . Force the ISP A to ISP D traffic over LDP-signaled LSPs.
Which security implementation does Juniper Networks recommend for all core routers in a service provider network? A . intrusion and detection prevention B . unified threat management C . application firewall D . stateless loopback firewall filter