Refer to the exhibit. BGP has been configured on the routers in the network. However, the IBGPpeers in autonomous system 65200 have not converged. In addition, this console message wasgenerated on router R2:
*Mar 1 03:09:07.729: %TCP-6-BADAUTH No MD5 digest from 10.10.23.2(179) to10.10.23.3(11002)
On the basis of the information that is provided, what is the cause of the problem?()
A.OSPF must be configured with the same MD5 authentication
B.BGP authentication can be used on iBGP peers when the connection is configured between theloopback interfaces
C.BGP authentication can be used on eBGP peers only
D.The password that is used for BGP authentication on both BGP peers in autonomous system65200 must be the same
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit diagram and configuration. RTB is summarizing its networks from AS 64100with the aggregate-address command. However, the show ip route command on RTA reveals theRTB individual networks as well as its summary route. Which option would ensure that only thesummary route would appear in the routing table of RTA?()
A.Add a static route with a prefix of 192.168.24.0 255.255.252.0 pointing to the null0 interface
B.Create a route map permitting only the summary address
C.Delete the four network statements and leave only the aggregate-address statement in theBGP configuration
D.Add the keyword summary-only to the aggregate-address command
A.The network was originated via redistribution of an interior gateway protocol into BGP
B.The network was defined by a static route
C.The network was learned via IBGP
D.The network was learned via EBGP
E.The network was originated via a network or aggregate command
A.Route reflectors
B.Route maps
C.Route redistribution
D.Peer groups
E.Aggregate addresses
A.Configure weight
B.Enable route reflector
C.Create a distribute list
D.Enable the Longer Autonomous System path option
E.All of the above
A.Router (config-router)#network 154.2.1.0
B.outer (config-router)#network 164.2.1.0
C.Router (config-router)#network-advertise 154.2.1.0
D.Router (config-router)#network 154.2.1.0 mask 255.255.255.0
E.None of the other alternatives apply
最新試題
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clickingthe numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible. To gain access to either thetopology or the SDK click on the button to left side of the screen that corresponds to the sectionyou wish to access. When you have finished viewing the topology the SDK you can return to yourquestions by clicking on the Questions button to the left.Which IPSec rule is used for the Olympia branch and what does it define?()
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()
Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()