Exam Code : JN0-664
Exam Name : Service Provider Routing and Switching, Professional (JNCIP-SP)
Vendor Name :
"Juniper"
JN0-664 Dumps
JN0-664 Braindumps JN0-664 Real Questions JN0-664 Practice Test
JN0-664 Actual Questions
Service Provider Routing and Switching, Professional (JNCIP-SP)
https://killexams.com/pass4sure/exam-detail/JN0-664
Exhibit
Referring to the exhibit, CE-1 is providing NAT services for the hosts at Site 1 and you must provide Internet access for those hosts
Which two statements are correct in this scenario? (Choose two.)
You must configure a static route in the main routing instance for the 10 1 2.0/24 prefix that uses the VPN-
inet.0 table as the next hop
You must configure a static route in the main routing instance for the 203.0.113.1/32 prefix that uses the VPN-
inet.0 table as the next hop.
You must configure a RIB group on PE-1 to leak a default route from the inet.0 table to the VPN-
inet.0 table.
You must configure a RIB group on PE-1 to leak the 10 1 2.0/24 prefix from the VPN-
inet.0 table to the inet.0 table.
Explanation:
To provide Internet access for the hosts at Site 1, you need to configure static routes in the main routing instance on PE-1 that point to the VPN-A.inet.0 table as the next hop. This allows PE-1 to forward traffic from the Internet to CE- 1 using MPLS labels and vice versa. You need to configure two static routes: one for the 10.1.2.0/24 prefix that represents the private network of Site 1, and one for the 203.0.113.1/32 prefix that represents the public IP address of CE-1.
Which three mechanisms are used by Junos platforms to evaluate incoming traffic for CoS purposes? (Choose three )
rewrite rules
behavior aggregate classifiers
traffic shapers
fixed classifiers
multifield classifiers
Explanation:
Junos platforms use different mechanisms to evaluate incoming traffic for CoS purposes, such as:
â Behavior aggregate classifiers: These classifiers use a single field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined or user-defined values.
â Fixed classifiers: These classifiers use a fixed field in a packet header to classify traffic into different forwarding classes and loss priorities based on predefined values.
â Multifield classifiers: These classifiers use multiple fields in a packet header to classify traffic into different forwarding classes and loss priorities based on user-defined values and filters.
Rewrite rules and traffic shapers are not used to evaluate incoming traffic for CoS purposes, but rather to modify or shape outgoing traffic based on CoS policies.
Exhibit
You are asked to exchange routes between R1 and R4 as shown in the exhibit. These two routers use the same AS number.
Which two steps will accomplish this task? (Choose two.)
Configure the BGP group with the advertise-peer-as parameter on R1 and R4.
Configure the BGP group with the as-override parameter on R2 and R3
Configure the BGP group with the advertise-peer-as parameter on R2 and R3.
Configure the BGP group with the as-override parameter on R1 and R4
Explanation:
The advertise-peer-as parameter allows a router to advertise its peerâs AS number as part of the AS path attribute when sending BGP updates to other peers. This parameter is useful when two routers in the same AS need to exchange routes through another AS, such as in the case of R1 and R4. By configuring this parameter on R1 and R4, they can advertise each otherâs AS number to R2 and R3, respectively.
The as-override parameter allows a router to replace the AS number of its peer with its own AS number when receiving BGP updates from that peer. This parameter is useful when two routers in different ASes need to exchange routes through another AS that has the same AS number as one of them, such as in the case of R2 and R3. By configuring this parameter on R2 and R3, they can override the AS number of R1 and R4 with their own AS number when sending BGP updates to each other.
You want to ensure that L1 IS-IS routers have only the most specific routes available from L2 IS-IS routers. Which action accomplishes this task?
Configure the ignore-attached-bit parameter on all L2 routers.
Configure all routers to allow wide metrics.
Configure all routers to be L1.
Configure the ignore-attached-bit parameter on all L1 routers
Explanation:
The attached bit is a flag in an IS-IS LSP that indicates whether a router is connected to another area or level (L2) of the network. By default, L2 routers set this bit when they advertise their LSPs to L1 routers, and L1 routers use this bit to select a default route to reach other areas or levels through L2 routers. However, this may result in suboptimal routing if there are multiple L2 routers with different paths to other areas or levels. To ensure that L1 routers have only the most specific routes available from L2 routers, you can configure the ignore-attached-bit parameter on all L1 routers. This makes L1 routers ignore the attached bit and install all interarea routes learned from L2 routers in their routing tables.
Exhibit
CE-1 must advertise ten subnets to PE-1 using BGP Once CE-1 starts advertising the subnets to PE-1, the BGP peering state changes to Active.
Referring to the CLI output shown in the exhibit, which statement is correct?
CE-1 is advertising its entire routing table.
CE-1 is configured with an incorrect peer AS
The prefix limit has been reached on PE-1
CE-1 is unreachable
Explanation:
The problem in this scenario is that CE-1 is configured with an incorrect peer AS number for its BGP session with PE-
1. The CLI output shows that CE-1 is using AS 65531 as its local AS number and AS 65530 as its peer AS number. However, PE-1 is using AS 65530 as its local AS number and AS 65531 as its peer AS number. This causes a mismatch in the BGP OPEN messages and prevents the BGP session from being established. To solve this problem, CE-1 should configure its peer AS number as 65530 under [edit protocols bgp group external] hierarchy level.
By default, which statement is correct about OSPF summary LSAs?
All Type 2 and Type 7 LSAs will be summanzed into a single Type 5 LSA
The area-range command must be installed on all routers.
Type 3 LSAs are advertised for routes in Type 1 LSAs.
The metric associated with a summary route will be equal to the lowest metric associated with an individual
contributing route
Answer: C
Explanation:
OSPF uses different types of LSAs to describe different aspects of the network topology. Type 1 LSAs are also known
as router LSAs, and they describe the links and interfaces of a router within an area. Type 3 LSAs are also known as summary LSAs, and they describe routes to networks outside an area but within the same autonomous system (AS). By default, OSPF will summarize routes from Type 1 LSAs into Type 3 LSAs when advertising them across area boundaries.
When building an interprovider VPN, you notice on the PE router that you have hidden routes which are received from your BGP peer with family inet labeled-unica3t configured.
Which parameter must you configure to solve this problem?
Under the family inet labeled-unicast hierarchy, add the explicit null parameter.
Under the protocols ospf hierarchy, add the traffic-engineering parameter.
Under the family inet labeled-unicast hierarchy, add the resolve-vpn parameter.
Under the protocols mpls hierarchy, add the traffic-engineering parameter
Explanation:
The resolve-vpn parameter is a BGP option that allows a router to resolve labeled VPN-IPv4 routes using unlabeled IPv4 routes received from another BGP peer with family inet labeled-unicast configured. This option enables interprovider VPNs without requiring MPLS labels between ASBRs or using VRF tables on ASBRs. In this scenario, you need to configure the resolve-vpn parameter under [edit protocols bgp group external family inet labeled-unicast] hierarchy level on both ASBRs.
Which two EVPN route types are used to advertise a multihomed Ethernet segment? (Choose two )
Type 1
Type 3
Type 4
Type 2
Explanation:
EVPN is a solution that provides Ethernet multipoint services over MPLS networks. EVPN uses BGP to distribute endpoint provisioning information and set up pseudowires between PE devices. EVPN uses different route types to
convey different information in the control plane. The following are the main EVPN route types:
â Type 1 - Ethernet Auto-Discovery Route: This route type is used for network-wide messaging and discovery of other PE devices that are part of the same EVPN instance. It also carries information about the redundancy mode and load balancing algorithm of the PE devices.
â Type 2 - MAC/IP Advertisement Route: This route type is used for MAC and IP address learning and advertisement between PE devices. It also carries information about the Ethernet segment identifier (ESI) and the label for forwarding traffic to the MAC or IP address.
â Type 3 - Inclusive Multicast Ethernet Tag Route: This route type is used for broadcast, unknown unicast, and multicast (BUM) traffic forwarding. It also carries information about the multicast group and the label for forwarding BUM traffic.
â Type 4 - Ethernet Segment Route: This route type is used for multihoming scenarios, where a CE device is connected to more than one PE device. It also carries information about the ESI and the designated forwarder (DF) election process.
Exhibit
A network designer would like to create a summary route as shown in the exhibit, but the configuration is not working. Which three configuration changes will create a summary route? (Choose three.)
set policy-options policy-statement leak-v6 term DC-routes then reject
delete policy-options policy-statement leak-v6 term DC-routes from route-filter 2001: db9:a: fa00 : :/6l longer
set policyâoptions policy-statement leak-v term DCâroutes from route-filter 2001:db9:a:faOO::/61 exact
delete protocols isis export summary-v6
set protocols isis import summary-v6
Explanation:
To create a summary route for IS-IS, you need to configure a policy statement that matches the prefixes to be summarized and sets the next-hop to discard. You also need to configure a summary-address statement under the IS- IS protocol hierarchy that references the policy statement. In this case, the policy statement leak-v6 is trying to match the prefix 2001:db9:a:fa00::/61 exactly, but this prefix is not advertised by any router in the network. Therefore, no summary route is created. To fix this, you need to delete the longer keyword from the route-filter term and change the prefix length to /61 exact. This will match any prefix that falls within the /61 range. You also need to delete the export statement under protocols isis, because this will export all routes that match the policy statement to other IS-IS routers, which is not desired for a summary route.
An interface is configured with a behavior aggregate classifier and a multifield classifier How will the packet be processed when received on this interface?
The packet will be discarded.
The packet will be processed by the BA classifier first, then the MF classifier.
The packet will be forwarded with no classification changes.
The packet will be processed by the MF classifier first, then the BA classifier.
Explanation:
behavior aggregate (BA) classifiers and multifield (MF) classifiers are two types of classifiers that are used to assign packets to a forwarding class and a loss priority based on different criteria. The forwarding class determines the output queue for a packet. The loss priority is used by a scheduler to control packet discard during periods of congestion.
A BA classifier maps packets to a forwarding class and a loss priority based on a fixed-length field in the packet header, such as DSCP, IP precedence, MPLS EXP, or IEEE
Exhibit
A network is using IS-IS for routing.
In this scenario, why are there two TLVs shown in the exhibit?
There are both narrow and wide metric devices in the topology
The interface specified a metric of 100 for L2.
Wide metrics have specifically been requested
Both IPv4 and IPv6 are being used in the topology
Explanation:
TLVs are tuples of (Type, Length, Value) that can be advertised in IS-IS packets. TLVs can carry different kinds of information in the Link State Packets (LSPs). IS-IS supports both narrow and wide metrics for link costs. Narrow metrics use a single octet to encode the link cost, while wide metrics use three octets. Narrow metrics have a maximum value of 63, while wide metrics have a maximum value of 16777215. If there are both narrow and wide metric devices in the topology, IS-IS will advertise two TLVs for each link: one with the narrow metric and one with the wide metric. This allows backward compatibility with older devices that only support narrow metrics12.
In IS-IS, which two statements are correct about the designated intermediate system (DIS) on a multi-access network segment? (Choose two)
A router with a priority of 10 wins the DIS election over a router with a priority of 1.
A router with a priority of 1 wins the DIS election over a router with a priority of 10.
On the multi-access network, each router forms an adjacency to every other router on the segment
On the multi-access network, each router only forms an adjacency to the DI
Explanation:
In IS-IS, a designated intermediate system (DIS) is a router that is elected on a multi-access network segment (such as Ethernet) to perform some functions on behalf of other routers on the same segment. A DIS is responsible for sending network link-state advertisements (LSPs), which describe all the routers attached to the network. These LSPs are flooded throughout a single area. A DIS also generates pseudonode LSPs, which represent the multi-access network as a single node in the link-state database. A DIS election is based on the priority value configured on each routerâs interface connected to the multi-access network. The priority value ranges from 0 to 127, with higher values indicating higher priority. The router with the highest priority becomes the DIS for the area (Level 1, Level 2, or both). If routers have the same priority, then the router with the highest MAC address is elected as the DIS. By default, routers have a priority value of 64. On a multi-access network, each router only forms an adjacency to the DIS, not to every other router on the segment. This reduces the amount of hello packets and LSP
Exhibit
You are attempting to summarize routes from the 203.0.113.128/25 IP block on R8 to AS 64500. You implement the export policy shown in the exhibit and all routes from the routing table stop being advertised.
In this scenario, which two steps would you take to summarize the route in BGP? (Choose two.)
Remove the from protocol bgp command from the export policy.
Add the set protocols bgp family inet unicast add-path command to allow additional routes to the RIB tables.
Add the set routing-options static route 203.0.113.123/25 discard command.
Replace exact in the export policy with orlonger.
Explanation:
To summarize routes from the 203.0.113.128/25 IP block on R8 to AS 64500, you need to do the following:
â Add the set routing-options static route 203.0.113.128/25 discard command. This creates a static route for the summary prefix and discards any traffic destined to it. This is necessary because BGP can only advertise routes that
are present in the routing table.
â Replace exact in the export policy with orlonger. This allows R8 to match and advertise any route that is equal or more specific than the summary prefix. The exact term only matches routes that are exactly equal to the summary prefix, which is not present in the routing table.
Exhibit
You must ensure that the VPN backbone is preferred over the back door intra-area link as long as the VPN is available. Referring to the exhibit, which action will accomplish this task?
Configure an import routing policy on the CE routers that rejects OSPF routes learned on the backup intra-area link.
Enable OSPF traffic-engineering.
Configure the OSPF metric on the backup intra-area link that is higher than the L3VPN link.
Create an OSPF sham link between the PE routers.
Explanation:
A sham link is a logical link between two PE routers that belong to the same OSPF area but are connected through an L3VPN. A sham link makes the PE routers appear as if they are directly connected, and prevents OSPF from preferring an intra-area back door link over the VPN backbone. To create a sham link, you need to configure the local and remote addresses of the PE routers under the [edit protocols ospf area area-id] hierarchy level1.
Exhibit
Which two statements about the output shown in the exhibit are correct? (Choose two.)
The PE is attached to a single local site.
The connection has not flapped since it was initiated.
There has been a VLAN ID mismatch.
The PE router has the capability to pop flow labels
Explanation:
According to 1 and 2, BGP Layer 2 VPNs use BGP to distribute endpoint provisioning information and set up pseudowires between PE devices. BGP uses the Layer 2 VPN (L2VPN) Routing Information Base (RIB) to store endpoint provisioning information, which is updated each time any Layer 2 virtual forwarding instance (VFI) is configured. The prefix and path information is stored in the L2VPN database, which allows BGP to make decisions about the best path.
In the output shown in the exhibit, we can see some information about the L2VPN RIB and the pseudowire state. Based on this information, we can infer the following statements:
â The PE is attached to a single local site. This is correct because the output shows only one local site ID (1) under the L2VPN RIB section. A local site ID is a unique identifier for a site within a VPLS domain. If there were multiple local
sites attached to the PE, we would see multiple local site IDs with different prefixes.
â The connection has not flapped since it was initiated. This is correct because the output shows that the uptime of the pseudowire is equal to its total uptime (1w6d). This means that the pseudowire has been up for one week and six days without any interruption or flap.
â There has been a VLAN ID mismatch. This is not correct because the output shows that the remote and local VLAN IDs are both 0 under the pseudowire state section. A VLAN ID mismatch occurs when the remote and local VLAN IDs are different, which can cause traffic loss or misdelivery. If there was a VLAN ID mismatch, we would see different values for the remote and local VLAN IDs.
â The PE router has the capability to pop flow labels. This is correct because the output shows that the flow label pop bit is set under the pseudowire state section. The flow label pop bit indicates that the PE router can pop (remove) the MPLS flow label from the packet before forwarding it to the CE device. The flow label is an optional MPLS label that can be used for load balancing or traffic engineering purposes.