Which two statements are true in this scenario?
Your company is designing a new data center in a remote location that must be connected to your local data center. You have a service provider connection between the CE devices at each site. You want to implement EVPN with VXLAN services between sites, but the service provider does not...
In this scenario which statement is correct?
You are designing a service provider core network As part of the design, you must ensure that the MPLS network utilizes the traffic engineering database (TED) for path selection and resiliency. You have chosen OSPF as the IGP for your design. In this scenario which statement is correct?A . You...
Which two statements about BFD are correct? (Choose two)
Which two statements about BFD are correct? (Choose two)A . BFD provides link failure detection for static routes.B . BFD modifies each protocol timer to improve link failure detection.C . NSR maintains BFD sessions during Routing Engine switchover.D . GRES is required for BFD sessions to be established.View AnswerAnswer: A,...
Referring to the exhibit, what are two design actions that would satisfy the requirements?
Exhibit. You work for service provider B that wants to implement a hot potato routing policy on the network so that router C uses link C-A to reach service provider A's advertised routes and router D uses link D-B to reach Service Provider A's advertised routes Currently traffic from router...
What must be included in the VXLAN design to satisfy these requirements?
Your applications are migrating from a legacy data center to an EVPN over a VXLAN-based VM environment. A few critical legacy applications not support this environment and must remain on bare metal servers and the applications must be able to access the Internet. What must be included in the VXLAN...
Which action will satisfy this requirement?
Your customer is paying for traffic prioritization and you must ensure that all traffic from their 172.27. 10.0/24 network receives top priority through your network. Which action will satisfy this requirement?A . Apply a behavior aggregate classifier to the egress interface.B . Apply a custom rewrite rule to the ingress...
Which type of Internet access model satisfies the customer's requirement in this scenario?
Your customer's enterprise is adding geographically-dispersed branch offices and requires new WAN connections. The primary design consideration for this expansion is low cost but the branches must remain secure with low latency. Which type of Internet access model satisfies the customer's requirement in this scenario?A . distributed model with security...
Referring to the exhibit how would you accomplish this task?
Exhibit. You are asked to ensure that most traffic that traverses your network is load balanced over all of the equal cost links between the routers in your network. However, you must also ensure that traffic from ISP A that is destined for ISP D must traverse the R1-R2-R3-R4-R5 path....
What are three components of a class-of-service scheduler? (Choose three.)
What are three components of a class-of-service scheduler? (Choose three.)A . transmit rateB . forwarding classC . queue priorityD . delay buffer sizeE . policing rateView AnswerAnswer: A, C, D Explanation: Junos OS schedulers allow you to define the priority, bandwidth, delay buffer size, rate control status, and RED drop...
Which security implementation does Juniper Networks recommend for all core routers in a service provider network?
Which security implementation does Juniper Networks recommend for all core routers in a service provider network?A . intrusion and detection preventionB . unified threat managementC . application firewallD . stateless loopback firewall filterView AnswerAnswer: D