Exhibit.
Referring to the exhibit, how do you display the IPv6 subnets lot all of the listed VXLANs?
IPv6 subnets ate shown when each VXLAN is selected individually.
Select Columns, then select IPv6 Subnet.
Select all VXLANs. and the IPv6 Subnets column will appear
An IPv6 Subnets column is not shown, indicating that no VXLAN has an assigned IPv6 subnet
Referring to the exhibit, the image shows a user interface of the Juniper Apstra software application, which is used for network management and configuration. The image shows the Virtual Networks table under the Resources menu, which displays the details of the VLANs and VXLANs in the network. The table has 11 columns, but only 9 are visible in the image. The other two columns are IPv6 Connectivity and IPv6 Subnet, which are hidden by default. To display the IPv6 subnets for all of the listed VXLANs, the user needs to select Columns, then select IPv6 Subnet. This will show the IPv6 Subnet column in the table, which will display the IPv6 addresses assigned to the VXLANs from the IPv6 pools. For more information, see Virtual Networks (Resources). References:
Exhibit.
In the EVPN-VXLAN data center fabric bridged overlay architecture shown in the exhibit, the servers are connected to Lead and Leat6 using the same virtual network identifier (VNI).
Which two statements are correct in this scenario? (Choose two.)
The underlay must use IRB interfaces.
The underlay must be provisioned with PIMv2.
Loopback IPv4 addresses must be advertised into the EBGP underlay from leaf and spine devices.
The underlay EBGPpeering’smust be established between leaf and spine devices.
In the EVPN-VXLAN data center fabric bridged overlay architecture shown in the exhibit, the servers are connected to Leaf1 and Leaf6 using the same virtual network identifier (VNI). This means that the servers belong to the same Layer 2 domain and can communicate with each other using VXLAN tunnels across the fabric. The underlay network provides the IP connectivity between the leaf and spine devices, and it uses EBGP as the routing protocol. Therefore, the following two statements are correct in this scenario:
The following two statements are incorrect in this scenario:
References:
Which protocol is used to advertise EVPN routes?
OSPF
BGP
IS-IS
RIP
BGP is the protocol used to advertise EVPN routes. EVPN routes are a new type of BGP network layer reachability information (NLRI) that carry MAC address and IP prefix information for Ethernet VPNs. EVPN routes are exchanged between PEs using BGP multiprotocol extensions (MP-BGP) over MPLS, VXLAN, SR, or SRv6 tunnels. EVPN routes enable PEs to learn the reachability of MAC addresses and IP prefixes of different sites within the same EVPN instance. EVPN routes also support various features such as fast convergence, redundancy, aliasing, and inter-subnet routing. The other options are incorrect because:
You are working with a three-stage IP fabric using EBGP for peering.
In this scenario, which two actions are required to implement ECMP? (Choose two.)
Usea load balancing policy applied to the forwarding table as an export policy.
Use a load balancing policy applied to BGP as an export policy.
Use the multipath multiple-as BGP parameter.
Use a load balancing policy applied lo BGP as an import policy.
To implement ECMP in IP fabric using EBGP, you need to enable BGP to install multiple equal-cost paths in the routing table and to advertise them to the peers. The following actions are required to achieve this:
policy-statement load-balance { term 1 { from { route-filter 192.168.0.0/16 exact; } then { multipath; accept; } } } protocols { bgp { group ebgp { type external; neighbor 10.10.10.1 { export load-balance; } } } }
protocols { bgp { group ebgp { type external; multipath multiple-as; } } }
The following options are incorrect because:
Exhibit.
Which two statements about ESI values are correct for the server connections to the fabric shown in the exhibit? (Choose two.)
A valid ESI value for Server A is 0x00.00.00.00.00.00.00.00.00.00.
A valid ESI value for Server B is 0x00.20.20.20.20.20.20.20.20.20.
A valid ESI value for Server A is 0x00.10.10.10.10.10.10.10.10.10.
A valid ESI value for Server B is 0x00.00.00.00.00.00.00.00.00.00.
To answer this question, we need to understand the concept of ESI values in EVPN LAGs. An ESI is a 10-byte value that identifies an Ethernet segment, which is a set of links that connect a multihomed device (such as a server) to one or more PE devices (such as leaf switches) in an EVPN network. The same ESI value must be configured on all the PE devices that connect to the same Ethernet segment. This allows the PE devices to form an EVPN LAG, which supports active-active or active-standby multihoming for the device. The ESI value can be manually configured (type 0) or automatically derived from LACP (type 1) or other methods. In the exhibit, Server A is connected to two leaf switches (QFX 5210) using a LAG with LACP enabled. Server B is connected to three leaf switches (QFX 5120) using a LAG with LACP enabled. Based on this information, the following statements are correct about ESI values for the server connections to the fabric:
Exhibit.
The 10.100.0.0/16 route is being advertised into your BGP IP fabric. ECMP load balancing has been properly enabled on all devices
In this scenario, how many routes will the leaf device in AS 65000 receive for the 10.100.0.0/16 prefix?
3
1
2
4
The leaf device in AS 65000 will receive three routes for the 10.100.0.0/16 prefix, one from each spine device in AS 65001, AS 65002, and AS 65003. Since ECMP load balancing is enabled, the leaf device will install all three routes in its routing table and distribute the traffic among them. The other options are incorrect because:
You want to add a configuration that is not supported by Juniper Apstra reference architecture using a configlet.
Which two configurations would be applicable in this scenario? (Choose two.)
static route configuration
policy configuration
syslog configuration
NTP configuration
According to the Juniper documentation1, a configlet is a configuration template that augments Apstra’s reference design with non-native device configuration. They consist of one or more generators. Each generator specifies a NOS type (config style), when to render the configuration, and CLI commands (and file name as applicable). Some applications for configlets include the following:
Therefore, the correct answer is C and D. syslog configuration and NTP configuration. These are examples of non-native device configuration that can be added using a configlet. Static route configuration and policy configuration are not applicable in this scenario, because they are part of the reference design configuration that should not be replaced or modified by a configlet. References: Configlets (Datacenter Design), Configlet Examples (Design)
In the Juniper Apstra Ul. you are creating a VNI pool for virtual networks.
In this scenario, which VNI range is acceptable?
Any range is acceptable for the VNI pool.
The valid VNI range is 4096 through 16777214.
The valid VNI range is 2 through 4096.
The valid VNI range is 1 through 10000.
In the Juniper Apstra UI, you can create VNI pools for virtual networks that use VXLAN encapsulation in the overlay network. A VNI pool is a resource pool that contains a range of VNIs that can be assigned to the virtual networks. The valid VNI range for a VNI pool is 4096 through 16777214, according to the VXLAN standard1. Therefore, the statement B is correct in this scenario.
The following three statements are incorrect in this scenario:
References:
Exhibit.
Referring to the exhibit, which role does Device A serve in an IP fabric?
leaf
spine
super spine
server
Device A serves as a spine in an IP fabric. An IP fabric is a network architecture that uses a spine-leaf topology to provide high performance, scalability, and reliability for data center networks. A spine-leaf topology consists of two layers of devices: spine devices and leaf devices. Spine devices are the core devices that interconnect all the leaf devices using equal-cost multipath (ECMP) routing. Leaf devices are the edge devices that connect to the servers, storage, or other network devices. In the exhibit, Device A is connected to four leaf devices using multiple links, which indicates that it is a spine device. The other options are incorrect because:
Which two statements are correct about repairing a Juniper Apstra cabling map before deploying your blueprint? (Choose two.)
You must manually change the cabling map to update spine-to-leaf fabric links.
Apstra can use LLDP data from the spine-to-lea! fabric devices to update the connections in the cabling map.
Apstra can use LLDP data from the leaf devices to update the leaf-to-generic connections in the cabling map.
You must manually change the cabling map to update leaf-to-generic links.
The cabling map is a graphical representation of the physical connections between the devices in the data center fabric. It shows the status of the cables, interfaces, and BGP sessions for each device. You can use the cabling map to verify and repair the cabling before deploying your blueprint. Based on the web search results, we can infer the following statements:
You are installing a Juniper Apstra server in your data center. You have multiple users that will be expected to configure, manage, and carry out operational tasks in your data center. You have decided to implement remote user authentication for the role-based access control of your Apstra server.
In this scenario, which three methods are supported? (Choose three.)
TACACS+
LDAP
RADIUS
SAML
Auth0
To implement remote user authentication for the role-based access control of your Apstra server, you can use one of the following methods: TACACS+, LDAP, or RADIUS. These are the protocols that Juniper Apstra supports to authenticate and authorize users based on roles assigned to individual users within an enterprise. You can configure the Apstra server to use one or more of these protocols as the authentication sources and specify the order of preference. You can also configure the Apstra server to use local user accounts as a fallback option if the remote authentication fails. The other options are incorrect because:
Exhibit.
Which two statements ate correct about the graph query output shown in the exhibit? (Choose two.)
The interface has an IP address assigned to it.
The output shows a LAG connection.
The switch in the output is a Juniper device.
The interface has tags assigned to it.
The graph query output shown in the exhibit is a JSON representation of an interface node and its properties in the Apstra graph database. Based on the output, we can infer the following statements:
Which two actions are required during Juniper Apstra's deploy phase? (Choose two.)
Assign device profiles to the blueprint.
Assign user roles to the blueprint.
Assign interlace maps to the blueprint.
Assign resources to the blueprint.
The deploy phase is the final step in the Juniper Apstra data center fabric design and deployment process. In this phase, you apply the Apstra-rendered configuration to the devices and verify the intent of the blueprint. Based on the web search results, we can infer the following actions are required during the deploy phase12:
Which three statements describe intent-based analytics? (Choose three.)
It indicates when device operating versions require updating.
It is a real-time information processing pipeline.
It is used to establish network performance baselines.
It alerts the network operator when network performance moves away from the baseline.
It collects information from vendor websites.
Intent-based analytics (IBA) is a feature of Juniper Apstra that allows you to combine intent from the network design with current and historic data from devices to reason about the network at-large1. IBA has the following characteristics:
The following two statements are incorrect in this scenario:
References:
You are using Juniper Apstra to design a data center fabric.
In this scenario, which object type associates a specific vendor model to a logical device?
templates
device profiles
agent profiles
interface map
Device profiles are objects that associate a specific vendor model to a logical device in Juniper Apstra. Device profiles contain extensive hardware model details, such as form factor, ASIC, CPU, RAM, ECMP limit, and supported features. Device profiles also define how configuration is generated, how telemetry commands are rendered, and how configuration is deployed on a device. Device profiles enable the Apstra system to render and deploy the configuration according to the Apstra Reference Design12. References:
When editing a device configuration to install some manual changes, which procedure should be followed?
Edit the configuration on the device directly by the CLI; the changes will automatically be adjusted in the Juniper Apstra configuration
Edit the pristine configuration of the device.
Add a persistent change to a device configuration with a configlet.
Delete the device from the Juniper Apstra system, change the configuration, then re-import the device.
A configlet is a small piece of configuration that can be applied to a device or a group of devices to make persistent changes that are not overwritten by Apstra. Configlets can be used to install manual changes that are not part of the Apstra rendered configuration, such as custom commands, scripts, or features. Configlets can be created, edited, and deleted from the Apstra GUI or CLI12. References:
What is the purpose of using a routing zone inside Juniper Apstra software?
A routing zone is used to enable L4-L7 inspection inside the fabric.
A routing zone is defined to secure the routing protocols.
A routing zone defined at the Apstra manager level requires firewalls to be deployed.
A routing zone is used to enable the communication between two VNIs within a VRF.
According to the Juniper documentation1, a routing zone is an L3 domain, the unit of tenancy in multi-tenant networks. You create routing zones for tenants to isolate their IP traffic from one another, thus enabling tenants to re-use IP subnets. In addition to being in its own VRF, each routing zone can be assigned its own DHCP relay server and external system connections. You can create one or more virtual networks within a routing zone, which means a tenant can stretch its L2 applications across multiple racks within its routing zone. For virtual networks with Layer 3 SVI, the SVI is associated with a Virtual Routing and Forwarding (VRF) instance for each routing zone isolating the virtual network SVI from other virtual network SVIs in other routing zones. Therefore, the correct answer is D. A routing zone is used to enable the communication between two VNIs within a VRF. A routing zone is not used for L4-L7 inspection, securing routing protocols, or requiring firewalls. Those are not the purposes of a routing zone in Juniper Apstra software. References: Routing Zones
InJuniper Apstra. which three modes are available fordevices? (Choose three.)
Deploy
Active
Stopped
Drain
Ready
Juniper Apstra supports three deploy modes for devices: Deploy, Drain, and Ready. These modes determine the configuration and state of the devices in the data center fabric12.
You have recently committed a change after creating a new blueprint in Juniper Apstra. In the main dashboard, you see a number of anomalies related to BGR What is a likely cause of these anomalies?
You have misconfigured ASNs.
The fabric has not converged yet.
Spine-leaf links are incorrectly set.
A generic system has not been configured.
In Juniper Apstra, a blueprint is a logical representation of the network design and configuration. When you create a new blueprint, you need to commit the changes to apply them to the network devices. However, committing the changes does not mean that the network is immediately updated and operational. It may take some time for the network to converge and reflect the new state of the blueprint. During this time, you may see some anomalies related to BGP in the main dashboard, which indicate that the BGP sessions are not established or stable between the devices. These anomalies are usually temporary and will disappear once the network converges and the BGP sessions are up and running. Therefore, the statement B is the most likely cause of these anomalies in this scenario.
The following three statements are less likely causes of these anomalies in this scenario:
References:
Copyright © 2021-2024 CertsTopics. All Rights Reserved