2025/December Latest Braindump2go 350-501 Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go 350-501 Real Exam Questions!
QUESTION 448
A mid-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company’s two sites across the service provider core. To meet service requirements, the service provider must extend the Layer 2 domain between the company’s two locations. Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?
A. interface TenGigE0/0/0/1.0 l2transport
encapsulation dot1q 12
rewrite ingress tag pop 13
B. interface TenGigE0/0/0/1.0 l2transport
encapsulation dot1q 12
C. interface TenGigE0/0/0/1.0 l2transport
encapsulation dot1q 12
rewrite ingress tag translate 1-to-1 dot1q 2
D. interface TenGigE0/0/0/1.0 l2transport
encapsulation dot1q 12
rewrite ingress tag push dot1q 21 symmetric
Answer: B
Explanation:
For connecting the two sites across the service provider core and extending the Layer 2 domain, the service provider needs to configure an attachment circuit with the specified VLAN tag (12). The configuration includes:
– interface TenGigE0/0/0/1.0 l2transport: Sets up the interface for Layer 2 transport mode.
– encapsulation dot1q 12: Configures the VLAN tag (12) for the attachment circuit, ensuring that the Layer 2 traffic is properly encapsulated and forwarded across the provider’s MPLS core.
QUESTION 449
According to RFC5305 on IS-IS extensions for traffic engineering, what is the 4-octet sub-TLV type 10 of extended IS-IS reachability TLV type 22?
A. TE default metric
B. maximum reservable link bandwidth
C. administrative group (color)
D. IPv4 neighbor address
Answer: B
Explanation:
According to RFC 5305, the 4-octet sub-TLV type 10 of the extended IS-IS reachability TLV type 22 represents the maximum reservable link bandwidth.
This sub-TLV contains the maximum amount of bandwidth that can be reserved in a given direction on a link and is expressed as a 32-bit IEEE floating point value in units of bytes per second. It may appear at most once per extended IS reachability TLV.
QUESTION 450
Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?
A. Configure transport connection-mod?passive on R2.
B. Configure neighbor 172.16.172.1 authentication on R1
C. Configure neighbor update-source lo0 on R2
D. Configure remote-as 16213 on R1.
Answer: C
QUESTION 451
The networking team must create a golden configuration to monitor and discover network devices, and also support the capability to configure network devices in the future. Not all devices on the network are capable of gRPC or REST-API calls. The solution should use a username and password, and data in transit should be highly secured. The modem NMS system has been configured with IP address 172.14.15.1, and the snmp-server view view iso included command has already been added to the template. Which two commands should the team add to the configuration template to enable SNMPv3 on network devices? (Choose two.)
A. snmp-server group group v3 authnopriv ro
B. snmp-server user Cisco group v3 auth sha Cisco123 priv aes 256 Cisco1234
C. snmp-server user Cisco group v3 auth she-aes Cisco123 authnopriv aes 128 Cisco1234
D. snmp-server group group v3 priv read view
E. snmp-server user Cisco group v3 auth md5 Cisco123 authpriw aes 192 Cisco1234
Answer: BD
Explanation:
To enable SNMPv3 on network devices and meet the requirements of secure communication, these commands provide authentication and encryption as follows:
snmp-server user Cisco group v3 auth sha Cisco123 priv aes 256 Cisco1234
This creates an SNMPv3 user named Cisco within the group group using SHA for authentication (auth sha Cisco123) and AES 256 for encryption (priv aes 256 Cisco1234), ensuring both authentication and privacy (encryption) are implemented.
snmp-server group group v3 priv read view
This creates an SNMPv3 group named group with the priv security level, which enables both authentication and encryption. The read view specifies which SNMP MIB objects the group can access.
QUESTION 452
Refer to the exhibit. A network engineer is implementing iBGP and eBGP between AS 600 and AS 500 with these requirements:
– R2 must establish eBGP peering on 192.168.3.0/30 with R5 for sending unicast and multicast traffic
– R2 must wait for 30 seconds before sending BGP updates to R5 for multicast traffic.
Which action must be taken on R2 to meet the requirements?
![]()
A. Configure advertisement-interval 30 In address-family ipv4 unicast
B. Configure advertisement-Interval 30 in address-family Ipv4 multicast
C. Apply timers bgp 30 in address-family ipv4 unicast
D. Apply timers bgp 30 in address-family ipv4 multicast.
Answer: B
![]()
A. Configure bgp maxas-limit 1 in the IPv4 address family urateUhe global BGP configuration.
B. Configure neighbor 10.163.83.54 enable-connected-check under the BGP IPv4 address family.
C. Configure neighbor 10.163.83.55 password Cisco under the global BGP IPv4 address family.
D. Configure neighbor 10.163.83.55 ttl-stcurity hops 2 under the global BGP configuration.
Answer: D
QUESTION 454
Refer to the exhibit. All BGP peering in AS 65101 and 65201 is enabled. The operations team is told that traffic destined to 192.168.1.1/32 from R4 does not use the path R3-R2-R1 as expected. An engineer debugs the issue and determines that 192.168.1.1/32 is advertised in the BGP routing table on R1. Which action resolves the issue?
![]()
A. Enable no synchronization on R2 m AS65101.
B. Apply route-map High-LP out for prefix 192.168.1.1/32 on R1 with R2 BGP peering.
C. Apply redistribute ospf 10 on R1 in BGP AS 65101.
D. Configure network 192.168.1.1 mask 255.255.255.255 in BGP AS 65101 on R2
Answer: A
QUESTION 455
Refer to the exhibit. A network engineer must deny access from spoofed addresses to the LAN. The edge router currently has two active BGP sessions established with Tier 1 ISP_A. Due to asymmetric routing, no ACL is configured on either interface. Which two configurations must the engineer perform on the edge router to complete the task? (Choose two.)
![]()
A. ip verify unicast source reachable-via tx under FA0/0
B. ip verify unicast source reachable-via under FA0/1
C. ip verify unicast source reachable-via any under FA0/1
D. ip verify unicast source reachable-via both under FA0/0
E. ip verify unicast source reachable-via any under FA0/0
Answer: CE
QUESTION 456
Refer to the exhibit. Four midsize service providers provide access to different customers that use Layer 3 VPN services to enable communication across geographic regions. The service providers are connected as shown in the exhibit, and the PEs have established eBGP relationships. PE4 has an IBGP relationship with PE5. The routes that PE4 learns from PE5 must reach the other PE routers, but they are absent from the routing tables on the other PES. Which action should the engineers take to correct the problem?
A. Configure a peering between all five Pes.
B. Disable BGP synchronization on PE4.
C. Enable BOP IPv4 unicast on PE4 and PE5
D. Advertise the route targets for PE5 to the other PEs
Answer: A
QUESTION 457
Which feature describes the weight parameter for BGP path selection?
A. Its value is local to the router
B. Its value is set either locally or globally.
C. Its default value is 0.
D. Its value is global to the router.
Answer: A
QUESTION 458
Refer to the exhibit. A company recently deployed a new network using OSPF in the core to share routes. The network administrator selected OSPF as the routing protocol because of its ability to maintain a route database. When the new network was started up, all routers booted normally, but the link between routers R1 and R2 failed to come up. The two routers are located in the same rack at the data center. Which task should an engineer perform to correct the problem?
![]()
A. Synchronize the dead timers.
B. Change one of the OSPF router IDs so that the router IDs are in different subnets
C. Change the OSPF process ID on one of the devices so that the two IDs match
D. Configure the MTUs on the interface to match.
Answer: D
QUESTION 459
Refer to the exhibit. A regional company is implementing a network-health monitoring solution on their Cisco ISR routers to monitor network performance metrics and gather real time data. The router R1 Ethernet interface, GigabitEthemet0/0, is assigned IP address 192.168.1.1/24, and basic IP addressing and connectivity to the data-collection server have already been configured. A network engineer must update R1 to ensure secure and reliable data transmission to the monitoring server, which is located at IP address 192.168.50.50 on port 50051. To achieve secure communication, the configuration must comply with RPC 5246, and to ensure reliable data transmission, it must follow RFC 793. Which command must the engineer execute to configure data collection?
![]()
A. telemetry ietf subscription 1 receiver ip address 192.168.50.50 50051 protocol grpc-tcp
B. grpc dialout address 192.168.50.50 port 50051
C. gnmi dialout address 192.168.50.50 port 50051
D. telemetry ietf subscription 1 source-address 10.1.1.1 50051 protocol grpc-icmp
Answer: A
Explanation:
The configuration specifies that the router must transmit telemetry data securely and reliably to the monitoring server. To achieve this:
gRPC-TCP (gRPC with Transport Layer Security) is compliant with RFC 5246 for secure communication using TLS.
Reliable transmission is ensured through TCP, as it adheres to RFC 793 for reliability.
The command telemetry ietf subscription 1 receiver ip address 192.168.50.50 50051 protocol grpc-tcp explicitly configures R1 to send telemetry data to the specified server and port using the required secure and reliable protocol.
QUESTION 460
Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?
![]()
A. It returns an AAA users with the last name CiscoTest.
B. It creates a class map named aaauser with traffic tagged from AAA.
C. It queries the local database to find a user named aaaUser.Json
D. It adds the user CiscoTest to the AAA database located at 192.168.201.10.
Answer: A
QUESTION 462
Which is the benefit of implementing model-driven telemetry in a service provider environment?
A. It reduces the number of network monitoring tools that are necessary to verify device statistics.
B. It increases the efficiency of SNMP by pulling system data to requesting servers.
C. It reduces or eliminates the need to monitor Layer 2 traffic between switches.
D. It uses reliable transport to push Information to network monitoring tools
Answer: D
QUESTION 464
SIMULATION 6
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
– Refer to the Tasks tab to view the tasks for this lab item.
– Refer to the Topology tab to access the device console(s) and perform the tasks.
– Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
– All necessary preconfigurations have been applied.
– Do not change the enable password or hostname for any device.
– Save your configurations to NVRAM before moving to the next item.
– Click Next at the bottom of the screen to submit this lab and move to the next question.
– When Next is clicked, the lab closes and cannot be reopened.
Topology
![]()
Tasks
![]()
Answer:
R1:
Config t
router isis 1
net 49.0001.0010.0001.0101.00
area-password C1sc0!
int et0/0
ip router isis 1
isis authen mode text level-2
isis circuit-type level-2
isis tag 1
int et1/0
ip router isis 1
isis authen mode text level-2
isis circuit-type level-2
isis tag 1
R2:
router isis 2
net 49.0001.0010.0002.0202.00
area-password C1sc0!
int et0/0
ip router isis 2
isis authen mode text level-2
isis circuit-type level-2
isis tag 2
int et1/0
ip router isis 2
isis authen mode text level-1
isis circuit-type level-1
isis tag 2
R3:
router isis 3
net 49.0001.0010.0003.0303.00
area-password C1sc0!
int et0/0
ip router isis 3
isis authen mode text level-1
isis circuit-type level-1
isis tag 3
int et1/0
ip router isis 3
isis authen mode text level-2
isis circuit-type level-2
isis tag 3
R1 Verification:
![]()
R1
Config t
Ipv6 unicast-routing
Router isis 1
Metric-style wide
Address-family ipv6 unicast
Multi-topology
Int loop0
Ip router isis 1
Ipv6 router isis 1
Isis tag 1
Int et0/0
Ipv6 router isis 1
Int et1/0
Ipv6 router isis 1
R2
Config t
Ipv6 unicast-routing
Router isis 2
Metric-style wide
Address-family ipv6 unicast
Multi-topology
Int loop0
Ip router isis 2
Ipv6 router isis 2
Isis tag 2
Int et0/0
Ipv6 router isis 2
Int et1/0
Ipv6 router isis 2
R3
Config t
Ipv6 unicast-routing
Router isis 3
Metric-style wide
Address-family ipv6 unicast
Multi-topology
Int loop0
Ip router isis 3
Ipv6 router isis 3
Isis tag 3
Int et0/0
Ipv6 router isis 3
Int et1/0
Ipv6 router isis 3
R1 Ipv6 Verification:
![]()
R1
Copy run start
R2
Copy run start
R3
Copy run start
QUESTION 465
SIMULATION 7
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
– Refer to the Tasks tab to view the tasks for this lab item.
– Refer to the Topology tab to access the device console(s) and perform the tasks.
– Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
– All necessary preconfigurations have been applied.
– Do not change the enable password or hostname for any device.
– Save your configurations to NVRAM before moving to the next item.
– Click Next at the bottom of the screen to submit this lab and move to the next question.
– When Next is clicked, the lab closes and cannot be reopened.
Topology
![]()
Tasks
R1 and R2 currently have an eBGP connection. Configure and verify these tasks on R1 and R2:
1. Apply the preconfigured route map R1-TO-R2 and R1 to receive the R2 Loopback address on R1.
2. Apply the preconfigured route map R2-TO-R1 and R2 to receive the R1 Loopback address on R1.
3. R1 must advertise network 10.1.1.1/32 toward R2. Redistribution is not allowed.
4. R2 must advertise network 10.2.2.2/32 toward R1. Redistribution is not allowed.
Answer:
R1:
router bgp 100
address-family ipv4
nei 172.16.0.2 route-map R1-TO-R2 in
network 10.1.1.1 mask 255.255.255.255
copy run start
R2:
router bgp 200
address-family ipv4
network 10.2.2.2 mask 255.255.255.255
nei 172.16.0.1 route-map R2-TO-R1 in
copy run start
QUESTION 466
SIMULATION 8
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
– Refer to the Tasks tab to view the tasks for this lab item.
– Refer to the Topology tab to access the device console(s) and perform the tasks.
– Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
– All necessary preconfigurations have been applied.
– Do not change the enable password or hostname for any device.
– Save your configurations to NVRAM before moving to the next item.
– Click Next at the bottom of the screen to submit this lab and move to the next question.
– When Next is clicked, the lab closes and cannot be reopened.
Topology
![]()
Tasks
![]()
Answer:
R3:
router bgp 65413
add ipv4
nei 2.2.2.2 allowas-in
nei 4.4.4.4 allowas-in
add ipv6
nei 2001:db8:4:4:4::4 allowas-in
end
copy run start
=======================
R2:
router bgp 65413
nei 1.1.1.1 as-override
nei 3.3.3.3 as-override
end
copy run start
=======================
R3:
router bgp 65413
nei 10.3.4.2 remot 65412
nei 2001:db8:3:4::2 remot 65412
nei 2001:db8:4:4:4:4::4 remot 65412
nei 2001:db8:4:4:4:4::4 ebgp-multihop 10
add ip4
nei 10.3.4.2 act
ex
add ipv6
nei 2001:db8:4:4:4:4::4 activate
nei 2001:db8:4:4:4:4::4 ebgp-multihop 10
nei 2001:db8:3:4::2 act
end
copy run start
===================
R4:
router bgp 65412
nei 10.3.4.1 remot 65413
nei 2001:db8:3:3:3:3::3 remot 65413
nei 2001:db8:3:3:3:3::3 ebgp-multihop 10
nei 2001:db8:3:4::1 remot 65413
add ipv4
nei 10.3.4.1 remot act
nei 10.3.4.1 prefix-limit 10
add ipv6
nei 2001:db8:3:3:3:3::3 activate
nei 2001:db8:3:3:3:3::3 ebgp-multihop 10
nei 2001:db8:3:3:3:3::3 prefix-limit 10
nei 2001:db8:3:4::1 activate
nei 2001:db8:3:4::1 prefix-limit 10
end
copy run start
QUESTION 467
What is the primary purpose of routed optical networks?
A. to provide redundancy for failed network connections by automatically switching to backup paths
B. to convert analog signals to digital signals for transmission over fiber-optic cables
C. to encrypt and secure data traveling across the network
D. to simplify network management by collapsing multiple layers into a single architecture
Answer: D
Explanation:
The primary purpose of routed optical networks is to simplify network operations by collapsing multiple layers (e.g., IP, MPLS, and optical layers) into a single unified architecture. This reduces complexity, improves scalability, and enhances efficiency in managing and operating the network.
Key features of routed optical networks include:
– Integration of routing and optical transport layers.
– Simplified network management and reduced operational costs.
– Enhanced performance by enabling direct communication between IP and optical layers without intermediate equipment.
QUESTION 468
Refer to the exhibit. A company uses PIM-SM multicast with IGMPv2 to stream training videos from a server in network 192.168.1.2/24 to hosts that reside in 192.168.4.0/24. The company is implementing SSM to improve efficiency within Layer 2. Which task should the engineer perform to allow hosts to dynamically register to a multicast group when reaching the server at 192.168.1.2?
![]()
A. Configure bidirectional PIM on R2
B. Configure an IGMP querier on R3
C. Implement PIM-DM on the interface between R2 and R3
D. Implement IGMPv3 on all routers
Answer: D
Explanation:
Source-Specific Multicast (SSM) improves multicast efficiency by allowing hosts to specify both the multicast group and the source from which they want to receive traffic. IGMPv3 is required for SSM because it supports source filtering, enabling hosts to dynamically register to a specific multicast group and source. In this scenario, enabling IGMPv3 on all routers ensures that the multicast traffic from the server at 192.168.1.2 can be delivered efficiently to the host network 192.168.4.0/24.
QUESTION 469
Refer to the exhibit. A junior network engineer has been configuring OSPF on two directly connected routers, R1 and R2, to establish a neighbor adjacency. The engineer also configured ip route 10.1.1.0 255.255.255.0 GigabitEthernet 0/1 10.10.10.1 on R1 to allow inbound management. After the initial configuration, the adjacency failed to form. The engineer changed the cost and area type under the OSPF configuration on R1, but the problem persists. Which action must the engineer take to resolve the issue?
![]()
A. Decrease the OSPF cost on R1 to match the cost on R2.
B. Set the OSPF process ID on R1 to match the OSPF process ID on R2.
C. Change the network type on R2 to point-to-multipoint.
D. Remove the static route on R1 and enable OSPF under the Gi0/1 interface.
Answer: C
Explanation:
From the exhibit, R1 is configured with a network type of Point-to-Multipoint, while R2 is configured with a network type of Broadcast. For OSPF adjacency to form, the network types on both sides must match. Changing the network type on R2 to Point-to-Multipoint will ensure compatibility with R1, resolving the adjacency issue.
QUESTION 470
Refer to the exhibit. An engineer with an employee ID: 1234:56:789 started to configure two routers for OSPF for a client. They are advertising their loopback addresses. Which additional configuration must the engineer perform so that the GigabitEthernet 1/1 link is preferred and the GigabitEthernet 2/1 link is a backup?
![]()
A. router1(config)# router ospf 1
Router1 (config-router)# auto-cost reference-bandwidth 1000
router2(config)# router ospf 1
router2(config-router)# auto-cost reference-bandwidth 1000
B. router1(config)# router ospf 1
router1(config-router)# auto-cost reference-bandwidth 100
router2(config)# router ospf 1
router2(config-router)# auto-cost reference-bandwidth 100
C. router1(config)# interface gigabitethernet 1/1
router1(config-if)/# ip ospf cost 64
router2(config)# interface gigabitethernet 1/1
router2(config-if)# ip ospf cost 64
D. router1(config)# interface gigabitethernet 2/1
router1(config-if)# ip ospf cost 5
router2(config)# interface gigabitethernet 2/1
router2(config-if)# ip ospf cost 5
Answer: C
Explanation:
In OSPF, the link with the lower cost is preferred for routing traffic. By manually setting the OSPF cost of the GigabitEthernet 1/1 interface to 64 on both Router 1 and Router 2, the engineer ensures that this link is preferred for routing traffic. The GigabitEthernet 2/1 interface will act as a backup because it retains the default cost, which is higher than 64. This achieves the desired configuration where the GigabitEthernet 1/1 link is the primary path, and the GigabitEthernet 2/1 link is a backup.
QUESTION 471
Company A must increase throughput between two non-IEEE 802.3ad switches located in the access and distribution layers. A network engineer must create a link group with the same speed and duplex. The STP protocol must not block any of the group ports. Which action completes the implementation?
A. Bundle the physical interfaces with mode lacp configured on each of them.
B. Enable Port Aggregation Protocol with mode auto under the logical group interface.
C. Configure a group logical interface with mode active enabled.
D. Group Ethernet interfaces with mode desirable under the physical interfaces.
Answer: D
Explanation:
“Desirable” mode is for PAgP, Cisco’s proprietary aggregation protocol.
If one side is set to desirable and the other to auto (or desirable), the EtherChannel forms successfully.
Spanning Tree Protocol (STP) will treat the bundle as one logical link, so no ports are blocked.
QUESTION 472
Refer to the exhibit. During the last maintenance window, the network engineering team performed multiple software upgrades and enabled OSPFv3 for future use. However, when the network came up, the connection between HQ and the remote branch failed. A network engineer determined that routers R1 and R2 failed to establish an OSPFv2 adjacency. R1 was preconfigured with the point-to-point OSPF network type, and R2 as broadcast. The engineer confirmed that all connected interfaces are up, and the routers can reach one another via ICMP. Which action must the engineer take to resolve the issue?
![]()
A. Change the hello and dead intervals on the interfaces on R1 and R2 to the same values respectively.
B. Configure R1 and R2 with the same OSPFv3 router ID.
C. Set the same network statement under the OSPFv2 configuration on R1 and R2.
D. Set the R1 OSPFv2 process ID to match the R2 OSPFv2 process ID.
Answer: A
Explanation:
For OSPFv2 adjacencies to form, the hello and dead intervals must match on both routers. The issue in this scenario is that R1 is configured with a point-to-point network type, while R2 is configured as broadcast. These network types have different default hello and dead interval values, causing the adjacency to remain in the INIT state.
QUESTION 473
Refer to the exhibit, R1 is connected to multiple BGP-enabled routers that are located in different autonomous systems. R1 has been configured with a BGP neighbor configuration, and all next hops are reachable with the ICMP protocol. A network engineer is examining traffic flow to the FTP server with IP address 134.44.14.10 to support a policy map implementation. The solution should require the minimum possible configuration changes. What should the engineer do to influence the best path route selection algorithm to forward all traffic from R1 via next-hop R2 with IP address 10.114.21.1?
![]()
A. Implement BGP local preference on R2
B. Implement BGP weight capabilities on R1
C. Implement BGP MED metrics on R2
D. Implement BGP in the default configuration on R1
Answer: B
Explanation:
BGP weight is a local attribute used by Cisco routers to influence the best path selection process. It is applied locally on a router and does not propagate to other routers. By assigning a higher weight to the path via R2 (next-hop 10.114.21.1), R1 can be configured to prefer this path for forwarding traffic to the FTP server at 134.44.14.10.
This approach requires minimal changes since the weight attribute is only configured locally on R1 and does not affect the BGP configuration or routing behavior of other routers in the network.
QUESTION 474
Under which circumstance does BGP ignore the best-path algorithm after receiving multiple routes to a destination?
A. when the routes have local-preference values less than 100
B. when the route’s first hop has a different AS number
C. when the route’s next hop is unreachable
D. when the routes are synchronized
Answer: C
Explanation:
BGP ignores the best-path algorithm if the next hop of a route is unreachable. BGP relies on the IGP to verify the reachability of the next hop. If the next hop is not reachable, the route is not considered for selection, regardless of the other attributes.
This ensures that the router does not advertise or attempt to use routes that are invalid due to an unreachable next hop.
QUESTION 475
What is the characteristic of the TI-LFA?
A. It guarantees a loop-free path for all areas configured in OSPF
B. It guarantees a loop-free path for all interfaces in the OSPF super backbone
C. It applies only on the instance and makes all the interfaces inherit the configuration
D. It applies on the area and instance and makes all the interfaces inherit the configuration
Answer: D
Explanation:
TI-LFA can be configured on the instance, area, or interface. When configured on the instance or area, all interfaces in the instance or area inherit the configuration.
QUESTION 476
How do CSC VPN services use BGP to support connectivity between customer sites?
A. BGP uses address families for IPv6 support in networks that use IPv4 and IPv6 between customers in different geographies
B. BGP eliminates the need for an IGP to run within the backbone earner core and provides more efficient label distribution
C. The BGP AS-Override feature allows the CSC network to use the same autonomous system number
D. BGP sends labels to the CSG-PE router so that traffic can traverse the backbone carrier
Answer: D
Explanation:
CSC (Carrier Supporting Carrier) VPN services leverage BGP to exchange labeled routes between the customer service provider’s PE routers and the backbone carrier’s PE routers. BGP is used to distribute labels for the customer prefixes, enabling MPLS label switching across the backbone carrier.
This allows seamless traffic flow between customer sites while maintaining scalability and efficiency.
QUESTION 477
Refer to the exhibit. OSPF is configured within the core of the service provider network. Connectivity between CE1 and CE2 is provided through the core. An engineer is implementing MPLS to support traffic exchange between customer sites using Layer 3 VPNs. Which task must the engineer perform to secure VPN traffic to meet the SLA of continuous uptime?
A. Implement OSPF stub routing to eliminate routes from being shared over the VPN
B. Implement BGP as the PE-CE routing protocol to support labels for faster data transfer
C. Implement LDP sync to prevent packet loss
D. Implement IS-IS in the core to segregate critical traffic between different areas
Answer: C
Explanation:
LDP (Label Distribution Protocol) sync ensures that IGP (OSPF in this case) does not advertise a route into the network until the LDP label bindings for that route are established. This prevents blackholing of traffic during convergence events or label setup. By synchronizing LDP with OSPF, MPLS Layer 3 VPN traffic can flow seamlessly without interruptions, meeting SLA requirements for continuous uptime.
QUESTION 478
Refer to the exhibit. Company A is connected to multiple upstream ISPs, with ISP_A serving as the primary upstream ISP. The company A subnet 172.43.232.0 should be announced to the secondary ISP_B only when the FTP server with IP address 10.10.1.1 is not accessible via the primary ISP. Which configuration must be applied on R1?
![]()
A. neighbor 10.182.213.3 advertise-map Advertise-route non-exist-map Non-RIB
B. neighbor 10.182.213.3 prefix-map Non-RIB Condition-map Advertise-route
C. neighbor 10.182.213.3 route-map Advertise-route Condition-map Non-RIB
D. neighbor 10.182.213.2 Condition-map Non-RIB prefix-map Advertise-route
Answer: A
Explanation:
advertise-map and non-exist-map BGP commands are used. The
To control the advertisement of the 172.43.232.0/23 subnet to ISP_B, the
advertise-map specifies the route to advertise (in this case, the route-map Advertise-route), and the non-exist-map defines the condition under which the route is advertised (in this case, when the FTP server with IP 10.10.1.1 is not accessible via ISP_A).
Advertise-route route-map matches the subnet 172.43.232.0/23.
The
Non-RIB route-map matches the FTP server IP address 10.10.1.1. If the route to the FTP server is absent in the routing table (indicating The
inaccessibility), the subnet will be advertised to ISP_B.
QUESTION 479
Refer to the exhibit. Customer C-101 in ASN 65123 requested that the ISP blackholes a host route 198.19.44.195, to which the customer is receiving a significant amount of malicious traffic. Which configuration must the network engineer implement on the trigger router TR-1 to fulfill the request without affecting other IP destinations in the customer’s block?
![]()
A. configure terminal
ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.0/24 le 32
ip route 198.19.44.195 255.255.255.255 Null0 tag 9090
end
B. configure terminal
ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.195/32
ip route 198.19.44.195 255.255.255.255 Null0 tag 9090
end
C. configure terminal
ip prefix-list BLACKHOLE-PERMIT permit 198.19.44.0/24 le 32
ip route 198.19.44.195 255.255.255.255 Null0 tag 9090
end
D. configure terminal
ip prefix-list BLACKHOLE-PERMIT permit 198.19.44.195/24
ip route 198.19.44.195 255.255.255.255 Null0 tag 9090
end
Answer: B
Explanation:
To implement a blackhole for the specific host route 198.19.44.195/32, the network engineer must:
1. Define a prefix list: The prefix list BLACKHOLE-PERMIT must allow only the specific IP 198.19.44.195/32 to avoid affecting other destinations in the 198.19.44.0/24 block.
2. Static route to Null0: The IP route for 198.19.44.195/32 must point to Null0, ensuring that traffic destined for this host is dropped. The tag 9090 is used for tracking and redistributing this blackhole route in BGP.
QUESTION 480
A service provider is in the process of implementing Unified MPLS on an enterprise network with many nodes. After the migration, several new customers will be added to the environment. RFC 3107 is used to build BGP LSPs across the domains. Which action must the networking team take to reduce the full-mesh requirement for iBGP?
A. Implement a confederation with each ABR serving as a gateway between secondary AS numbers.
B. Implement a confederation with the network segmented according to business units.
C. Implement route reflectors on all ABRs.
D. Implement route reflectors on all P routers.
Answer: C
Explanation:
In a Unified MPLS architecture, using route reflectors (RRs) is a common way to reduce the full-mesh iBGP requirement. Deploying RRs on all Area Border Routers (ABRs) allows them to manage BGP routes within their respective areas or domains, avoiding the need for a full iBGP mesh between all routers. RFC 3107, which defines carrying label information in BGP, complements this setup by enabling labeled BGP LSPs across the domains efficiently. By implementing route reflectors on ABRs, scalability is improved, and management complexity is reduced.
QUESTION 481
Refer to the exhibit. A network engineer is implementing iBGP and eBGP between AS 600 and AS 500 with these requirements:
– R2 must establish eBGP peering on 192.168.3,0/30 with R5 for sending unicast and multicast traffic.
– R2 must wait for 30 seconds before sending BGP updates to R5 for multicast traffic.
Which action must be taken on R2 to meet the requirement?
![]()
A. Apply timers bgp 30 in address-family ipv4 unicast.
B. Apply timers bgp 30 in address-family ipv4 multicast.
C. Configure advertisement-interval 30 in address-family ipv4 unicast.
D. Configure advertisement-interval 30 in address-family ipv4 multicast.
Answer: D
Explanation:
The advertisement-interval command in the BGP configuration is used to set the minimum interval (in seconds) between sending BGP updates for a specific address family. To meet the requirement of waiting 30 seconds before sending multicast BGP updates from R2 to R5, the engineer must configure the advertisement-interval 30 under the address-family ipv4 multicast on R2.
QUESTION 482
How does TI-LFA reduce packet loss in segment routing?
A. It enables path selection in SR-ТЕ to support MPLS label allocation.
B. It establishes multiple labels per path using more than one IGP.
C. It calculates loop-free backup paths that are rapidly implemented in case of a link failure.
D. It determines which link to use when load balancing to prevent packet fragmentation loss.
Answer: C
Explanation:
TI-LFA (Topology Independent Loop-Free Alternate) reduces packet loss in segment routing by precomputing loop-free backup paths for each possible link or node failure. These backup paths are calculated using the network topology and are immediately implemented upon detection of a failure. This ensures near-instantaneous traffic rerouting without requiring full reconvergence of the IGP, significantly minimizing packet loss during failures.
QUESTION 483
Refer to the exhibit. IS-IS is running as the IGP in the network, and the routers have established BGP peering relationships. Because the network carries mission-critical data, the routers must be able to operate with minimal downtime. The networking team decided to implement graceful restart to improve network stability. Which action must the team take so that all BGP peers can use their BGP routes during a failover?
A. Deploy BGP with traffic steering to provide automated paths during a failover.
B. Enable NSF globally on all BGP peers.
C. Mutually redistribute IS-IS and BGP.
D. Implement MPLS within the network with Cisco Express Forwarding enabled.
Answer: B
Explanation:
Graceful Restart (GR) with Non-Stop Forwarding (NSF) ensures that during a router failover or software upgrade, BGP peers retain their routing table and continue forwarding traffic based on preexisting routes. By enabling NSF globally on all BGP peers, the routers can maintain their BGP routes during a failover, reducing downtime and ensuring the stability of mission-critical data traffic. This approach minimizes the impact of control plane disruptions on the data plane.
QUESTION 484
What is the primary purpose of the flexible algorithm in a segment-routing environment?
A. to distribute designated-path information for certain traffic classes to maintain routing information in accordance with current network-performance indicators
B. to integrate with legacy routing protocols to ensure backward compatibility and a smooth transition in mixed network environments
C. to support adaptive path selection, optimizing network performance based on real-time network metrics
D. to determine and assign labels for specific types of traffic, ensuring that routes maintain a valid backup path as network conditions change
Answer: C
Explanation:
The flexible algorithm in a segment-routing environment enables the network to adaptively select paths based on predefined optimization criteria, such as latency, bandwidth, or administrative constraints. This allows traffic to be routed dynamically in response to real-time network conditions, improving overall performance and efficiency. By enabling this functionality, flexible algorithms help meet application-specific requirements while maximizing resource utilization.
QUESTION 485
Refer to the exhibit. MPLS is configured within the network. The routers use OSPF to exchange routing information. Hosts that are connected to routers R1 and R3 use routers R2 and R4 to access servers that run a variety of intranet applications. A network engineer must ensure that R1 and R3 maintain an LDP session between them to support the flow of traffic between hosts and servers. Which task should the engineer perform to provide LDP bindings in case of failure on the path between R1 and R3?
![]()
A. Implement session protection to send targeted hellos between R1 and R3.
B. Implement multicast in the network to share data between hosts and servers without targeted routing.
C. Implement BFD to monitor and detect link failures between R1 and R3.
D. Implement LDP sync on the four devices to give MPLS and OSPF the ability to maintain continuous uptime.
Answer: A
Explanation:
LDP (Label Distribution Protocol) session protection ensures that LDP sessions are maintained even if the direct path between two LSRs (Label Switch Routers) is lost. By enabling session protection, targeted hellos are sent between routers R1 and R3, allowing them to maintain their LDP session via alternate paths (through R2 and R4) in case of a link failure. This guarantees that MPLS label bindings remain intact, ensuring uninterrupted traffic flow between hosts and servers.
QUESTION 486
Refer to the exhibit. MPLS is running in the network with OSPF as the IGP. Full routes are shared between the routers, and each connected link has an MPLS neighbor relationship. A network engineer must update the network configuration so that it will maintain LDP neighbor relationships if a directly connected link goes down. Which action must the engineer take as part of the process?
![]()
A. Implement LDP session protection on the network.
B. Implement LDP sync on links with a greater risk of faults.
C. Implement Unified MPLS to unify the OSPF areas.
D. Implement MPLS OAM with BFDP on the links.
Answer: A
Explanation:
LDP session protection ensures that Label Distribution Protocol (LDP) neighbor relationships are maintained even if a directly connected link goes down. This is achieved by enabling targeted LDP hellos, allowing the LDP session to persist over an alternate path if a direct link fails. This configuration is particularly useful in MPLS networks where maintaining label bindings during failures is critical for uninterrupted service. By implementing LDP session protection, the network can provide enhanced resilience and prevent disruption to MPLS traffic.
QUESTION 487
Refer to the exhibit. Routers R1 and R2 support traffic between multiple departments at a company’s remote office and exchange routes using OSPF. The link between R1 and R2 has been providing inconsistent performance, particularly during times of peak usage. To help Identify the cause, an engineer was asked to implement BFD to detect failures on the link. Which task must the engineer perform?
![]()
A. Configure echo mode on both devices to support asymmetry.
B. Configure IS-IS to share routes between the routers.
C. Configure the session parameters individually on each interface.
D. Change the network between R1 and R2 to a /30 prefix.
Answer: A
Explanation:
Bidirectional Forwarding Detection (BFD) is used to detect failures on links quickly. Echo mode is a feature of BFD that can detect failures in asymmetric routing environments by sending echo packets between the devices. This mode operates independently of the control plane and ensures accurate detection even during high traffic or network asymmetries. Enabling echo mode on both R1 and R2 will help identify and resolve the inconsistency in link performance during peak usage.
QUESTION 488
Refer to the exhibit. AS 65517 is running OSPF within the core. BGP is running between all four autonomous systems, interconnecting several ISPs that provide intranet and extranet services. All of the PE routers are connected, and eBGP peering relationships have been established. A network engineer also configured an IBGP peering between PE1 and P1, and the peering is up. However, P1 cannot reach routes outside of AS 65517. Which action must the engineer take so that P1 reaches external routes?
![]()
A. Synchronize BGP and OSPF with AS 65517.
B. Configure P1 as a route-reflector-client to PE1.
C. Install route targets on alt PE routers under the VRF configuration for intranet services.
D. Add the next-hop-self attribute under the BGP neighbor configuration for P1 on PE3.
Answer: B
Explanation:
In this scenario, P1 cannot reach external routes because it is not receiving all the required BGP routes. To resolve this, configuring P1 as a route- reflector-client to PE1 will allow PE1 to reflect external routes learned from other PEs (e.g., PE2, PE3, PE4) to P1. This avoids the need for a full mesh of iBGP sessions within AS 65517, simplifying the configuration while ensuring P1 has visibility to external routes.
Route reflectors are a common solution to reduce the iBGP full-mesh requirement and ensure proper route dissemination within an AS.
QUESTION 489
Refer to the exhibit. The NOC is configuring PE router R4 in the network for BGP-originated traffic. R4 is connected to a CE device at a customer location. The customer provided these requirements:
– BGP peers must establish a neighborship with NSR and NSF capability.
– BGP must maintain the state with the CE device and provide continuous packet forwarding during ISSU and RP switchover events.
Which action meets the NSR requirement on PE routers?
![]()
A. Set the BGP peering with ha-mode sso.
B. Set the BGP stalepath-time to 360 seconds.
C. Set the BGP administrative distance to 15 for BGP neighbors.
D. Set the BGP restart-time to 120 seconds.
Answer: A
Explanation:
To meet the Non-Stop Routing (NSR) requirement and ensure continuous packet forwarding during events like ISSU (In-Service Software Upgrade) or RP (Route Processor) switchover, enabling BGP high-availability mode with Stateful Switchover (SSO) is required. Setting ha-mode sso ensures that the BGP session is seamlessly maintained between R4 and the CE device without interruptions during control plane failovers, while the data plane continues forwarding traffic.
QUESTION 490
What is one of the main functions of 6RD?
A. It provides stateful session translation with the 2002::/16 prefix.
B. It allows customers IPv6 traffic to be tunneled over IPv4 network infrastructure.
C. It translates RFC 1918 IP addresses into public IP addresses.
D. It provides native reachability between IPv4-only hosts and 6RD-enabled IPv6 hosts.
Answer: B
Explanation:
6RD (IPv6 Rapid Deployment) is a mechanism that allows service providers to deliver IPv6 connectivity to customers by tunneling IPv6 traffic over their existing IPv4 infrastructure. This approach uses encapsulation to carry IPv6 packets within IPv4 packets, enabling a smooth transition to IPv6 without requiring native IPv6 support throughout the entire network infrastructure.
QUESTION 491
What should a network engineer consider before implementing segment routing?
A. It is an MPLS-based routing technique.
B. It is a multicast-based routing technique.
C. It is a destination-based routing technique.
D. It is a source-based routing technique.
Answer: D
Explanation:
Segment Routing (SR) is a source-based routing technique where the source node defines the entire path that a packet should take through the network. This is achieved by encoding the path as a list of segments in the packet header, eliminating the need for per-flow state in intermediate nodes.
It provides scalability, flexibility, and simplified traffic engineering compared to traditional MPLS. Before implementing SR, network engineers must ensure the network supports the necessary protocols and configurations for SR.
QUESTION 492
Refer to the exhibit. A growing company wants to ensure high availability and redundancy for its critical web servers, which are located in an offsite data center. The network architect decided to implement BGP so that the network can use redundant paths for outbound traffic toward the destination subnet 10.2.2.0/24. A network engineer already configured basic BGP settings on edge router R1, which is a Cisco ASR-1001X router. The engineer also confirmed loopback reachability to routers R2 and R3, and the AS path length toward the destination is the same via R2 and R3. Which action must the engineer take on R1 to complete the implementation?
![]()
A. Implement as-path multipath under the BGP neighbor configuration.
B. Implement bestpath as-path multipath-relax under the BGP global configuration.
C. Implement maximum-paths multipath ibgp 2 under the BGP neighbor configuration.
D. Implement maximum-paths 2 under the BGP global configuration.
Answer: D
Explanation:
The maximum-paths command in BGP allows a router to use multiple paths for load sharing when the AS path length and other BGP best-path criteria are the same. By configuring maximum-paths 2 under the BGP global configuration, R1 can forward traffic across both paths (via R2 and R3) to ensure high availability and redundancy toward the destination subnet 10.2.2.0/24.
QUESTION 493
Refer to the exhibit. An engineer working for a private service provider with an employee ID: 1234:56:789 is configuring BGP in AS 400, AS 500, and AS 600 to set up BGP peering. The engineer reported that 172.16.10.0/24 is not installed in the R2 RIB. RI and R5 receive the prefix 172.16.10.0/24 in the BGP routing table. Which configuration must be implemented to stop receiving prefix 172.16.10.0/24 in the BGP table?
![]()
A. Configure bgp suppress-inactive under BGP address-family ipv4 unicast on R2.
B. Configure bgp suppress-inactive under BGP address-family ipv4 unicast on R1 and R5.
C. Configure route-map blockprefix out under BGP on R2.
D. Configure route-map blockprefix in under BGP on R1 and R5.
Answer: D
Explanation:
To stop receiving the prefix 172.16.10.0/24 in the BGP routing table on R1 and R5, a route-map should be applied with the appropriate filtering logic. By configuring the route-map blockprefix as an inbound filter on R1 and R5, the prefix will be blocked as it is advertised to these routers.
This ensures that R1 and R5 do not install the unwanted prefix in their BGP tables, effectively preventing its propagation across the network. Inbound filtering is a standard approach to control what routes are accepted by a BGP peer.
QUESTION 494
What is the primary purpose of NAT64?
A. allow lPv4-addressed and IPv6-addressed devices to access cloud services using a VPN tunnel
B. allow an IPv4-addressed device to access the internet using an IPv6 address
C. allow an IPv6-addressed device to communicate with an IPv4-addressed device
D. allow IPv4-addressed and IPv6-addressed devices to communicate with each other only if they exist within the same geographic location
Answer: C
Explanation:
NAT64 (Network Address Translation IPv6-to-IPv4) is a technology that enables IPv6-addressed devices to communicate with IPv4-addressed devices by translating IPv6 packets into IPv4 packets and vice versa. This is particularly useful during the transition from IPv4 to IPv6, as it allows interoperability between the two protocols without requiring full dual-stack implementation on both ends.
QUESTION 495
Refer to the exhibit. The four PE routers in the network are connected and running OSPF to share routes. MPLS is enabled on the four routers. The routers are connected and configured to use /30 networks. A network engineer must implement Layer 3 VPN support for traffic between customer sites.
Which task must the engineer perform?
![]()
A. Configure the devices to establish LDP neighbor relationships to share label information.
B. Deploy IGP in the network to exchange intranet data between the PEs.
C. Update the subnet between each router to a /24 prefix.
tunnels between each router to provide dedicated bandwidth for Layer 3 VPN traffic.
D. Implement MPLS
Answer: A
Explanation:
To support Layer 3 VPNs in an MPLS environment, Label Distribution Protocol (LDP) is required to establish label-switched paths (LSPs) between the Provider Edge (PE) routers. These LSPs are used to forward labeled traffic through the network. Configuring LDP neighbor relationships ensures that:
– Label information is exchanged between adjacent routers.
– MPLS forwarding tables are populated to enable end-to-end transport of VPN traffic.
Tasks like deploying IGP (already done here via OSPF) or creating MPLS TE tunnels are unnecessary for basic MPLS Layer 3 VPN functionality.
Updating the subnet to /24 is not relevant for MPLS VPNs, as /30 subnets are sufficient for point-to-point links.
QUESTION 496
What happens when a segment-routing TE tunnel loses the link and there is no secondary path in place?
A. The headend router generates a new path to the tail-end router using bandwidth to determine the best path.
B. The headend router starts the invalidation timer to bring the tunnel down.
C. The tail-end router sends an alert to the syslog server that the tunnel and the secondary route are inaccessible.
D. The headend and tail-end routers revalidate SID hops to determine the proper label stack to reroute the traffic.
Answer: A
Explanation:
In a Segment Routing Traffic Engineering (SR-TE) environment, when a TE tunnel loses its link and no secondary path is in place, the headend router dynamically computes a new path to the tail-end router. This computation considers available bandwidth and other constraints specified in the SR policy to determine the most optimal path. The Segment Routing mechanism then updates the label stack to reflect the new path, ensuring minimal disruption to traffic.
This dynamic path computation and rerouting capability is a key feature of SR-TE, improving resiliency and efficiency in the network.
QUESTION 497
Refer to the exhibit. Routers R1 and R2 are part of a large enterprise network. The two devices are running BGP to advertise routes between them. The R1 Gi0/1 interface, which is connected to R2. is configured with the next hop for all advertised prefixes’ IP addresses. A network engineer noticed that R2 is not receiving certain routes from R1, which is causing connectivity issues. The engineer confirmed that the R2 IP address is reachable, and R2 is not filtering routes. Which action must the engineer take on R1 to resolve the issue?
![]()
A. Add set metric 100 to the DENY_ROUTES route map.
B. Apply route-map DENY_ROUTES under the BGP configuration.
C. Remove sequence 10 from the BLOCKED_ROUTES prefix list.
D. Change the sequence 10 action in the DENY_ROUTES route map to block.
Answer: B
Explanation:
The route-map DENY_ROUTES and prefix-list BLOCKED_ROUTES are correctly configured to filter specific routes (e.g., 10.3.3.0/24). However, the route map has not been applied under the BGP configuration on R1. This means the filtering logic is not in effect, allowing all routes to be sent to R2.
To resolve the issue, the engineer must apply the route-map DENY_ROUTES under the BGP configuration on R1 using the command neighbor <R2 IP> route-map DENY_ROUTES out
This ensures that the route-map is applied to outgoing BGP updates, filtering the specified routes as intended. Other actions (e.g., modifying sequence 10 or adding metrics) do not address the lack of route-map application.
QUESTION 498
In MPLS traffic engineering, which FRR operation swaps the label and pushes the backup label?
A. Point of Local Repair
B. Mid-Point
C. Branch Point
D. Merge Point
Answer: A
Explanation:
In MPLS Traffic Engineering (TE) with Fast Reroute (FRR), the Point of Local Repair (PLR) is the router where a failure is detected. The PLR immediately swaps the current label and pushes the backup label onto the packet stack to reroute traffic to a precomputed backup path. This operation ensures near-instantaneous recovery from link or node failures by directing traffic to the backup path without waiting for IGP convergence.
QUESTION 499
Refer to the exhibit. OSPF is running in the network, which is segmented into three areas. MPLS is enabled on all routers to support Layer 3 VPN. The network architect Is concerned about potential packet loss when new OSPF adjacencies form. Which two tasks should the architect perform to implement MPLS LDP synchronization? (Choose two.)
![]()
A. Establish MPLS targeted sessions for connected LDP neighbors only.
B. Enable LDP sync under the OSPF process.
C. Configure OSPF to use the same router ID for each router that is involved in MPLS.
D. Enable MPLS functionality on all interfaces that are involved in MPLS.
E. Establish a virtual link between the areas to support LDP sync between segments.
Answer: BD
Explanation:
Enable LDP sync under the OSPF process:
LDP synchronization ensures that MPLS Label Distribution Protocol (LDP) is fully operational before OSPF considers the link operational. This prevents traffic from being forwarded over a link that lacks MPLS labels, thus avoiding potential packet loss during OSPF adjacency formation.
Enable MPLS on all interfaces involved in MPLS:
All interfaces participating in MPLS forwarding must have MPLS enabled. This ensures that MPLS LDP labels are distributed properly across all paths in the network.
QUESTION 500
Refer to the exhibit. A service provider is running MPLS in the core to support Layer 3 VPN. OSPF is configured to support dynamic routing, and BGP is enabled throughout the network. A network engineer is adding a new P router to the infrastructure and is connecting it to P1 and P3. Which task must the engineer perform on the new router to allow it to participate in the Layer 3 VPN?
![]()
A. Establish an LDP neighbor relationship with P1 and P3.
B. Enable LDP sync under the OSPF routing process.
C. Enable LDP and establish an OSPF adjacency in a new area.
D. Configure OSPF and BGP to support MPLS.
Answer: D
Explanation:
To integrate the new P router into the existing MPLS Layer 3 VPN infrastructure, the following steps are necessary:
Configure OSPF:
– Ensure the new router establishes OSPF adjacencies with its neighbors (P1 and P3) in the same OSPF area.
– OSPF will handle the IGP routing within the MPLS core.
Enable MPLS:
– Enable MPLS on all interfaces participating in the core to allow Label Distribution Protocol (LDP) to establish label-switched paths (LSPs).
BGP Configuration:
– Although the new router is a P (Provider) router and does not directly interact with customer routes, it needs to support MPLS forwarding for BGP-labeled routes between PE routers. BGP is used to advertise VPN routes among PE routers, and the P router ensures the MPLS labels are forwarded correctly.
This configuration ensures that the new P router can participate in the MPLS core and forward VPN traffic without disrupting the existing Layer 3 VPN.
Options like LDP sync and new OSPF areas are not necessary in this context.
Resources From:
1.2025 Latest Braindump2go 350-601 Exam Dumps (PDF & VCE) Free Share:
https://www.braindump2go.com/350-501.html
2.2025 Latest Braindump2go 350-601 PDF and 350-601 VCE Dumps Free Share:
https://drive.google.com/drive/folders/1DRhL9-RXciswyuF0Mtum6o8JlQET1RiO?usp=sharing
3.2025 Free Braindump2go 350-601 Exam Questions Download:
https://www.braindump2go.com/free-online-pdf/350-501-VCE-Dumps(448-500).pdf
Free Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams!