Which of the following scenarios can an AS-path-filter be used for?

Last Updated on September 26, 2021 by Admin Which of the following scenarios can an AS-path-filter be used for? Apply clauses in a route-policy  Filtering the routes received from a BGP peer based on the as-path attributes of the routes, for example, peer X.X.X.X as path-filter import  Filtering the routes sent to a BGP peer […]
Continue reading…

 

You must configure a router for Policy Based Routing (PBR). PBR allows network administrators to implement routing policies to allow or deny paths on which of the following?

Last Updated on September 26, 2021 by Admin You must configure a router for Policy Based Routing (PBR). PBR allows network administrators to implement routing policies to allow or deny paths on which of the following? Protocol  Identification of a particular end system  Application  Throughput Size of packets 
Continue reading…

 

Authentication can be configured in the IS-IS protocol to enhance IS-IS security. The IS-IS authentication functions include interface authentication, area authentication, and routing domain authentication.

Last Updated on September 26, 2021 by Admin Authentication can be configured in the IS-IS protocol to enhance IS-IS security. The IS-IS authentication functions include interface authentication, area authentication, and routing domain authentication. FALSE TRUE 
Continue reading…

 

What is a good first test to see if BGP will work across the firewall?

Last Updated on September 26, 2021 by Admin Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP session endpoint addresses and the correct BGP session hop-count limit […]
Continue reading…