Perritest
![]() |
![]() |
![]() |
Título del Test:![]() Perritest Descripción: Test de prueba primera parte |




Comentarios |
---|
NO HAY REGISTROS |
What is the difference between a RIB and a FIB?. The FIB is populated based on RIB content. The RIB maintains a mirror image of the FIB. The RIB is used to make IP source prefix-based switching decisions. The FIB is where all IP routing information is stored. The FIB is where all IP routing information is stored. policing. classification. marking. shaping. Drag and drop the descriptions from the left onto the correct QoS components on the right. Select and Place: 1. 2. Which statement about Cisco Express Forwarding is true?. The CPU of a router becomes directly involved with packet-switching decisions. It uses a fast cache that is maintained in a router data plane. It maintains two tables in the data plane: the FIB and adjacency table. It makes forwarding decisions by a process that is scheduled through the IOS scheduler. What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?. ability to quickly increase compute power without the need to install additional hardware. less power and cooling resources needed to run infrastructure on-premises. faster deployment times because additional infrastructure does not need to be purchased. lower latency between systems that are physically located near each other. Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right. Select and Place: 1. 2. How does QoS traffic shaping alleviate network congestion?. It drops packets when traffic exceeds a certain bitrate. It buffers and queues packets above the committed rate. It fragments large packets and queues them for delivery. It drops packets randomly from lower priority queues. An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.). Policing should be performed as close to the source as possible. Policing adapts to network congestion by queuing excess traffic. Policing should be performed as close to the destination as possible. Policing drops traffic that exceeds the defined rate. Policing typically delays the traffic, rather than drops it. Which component handles the orchestration plane of the Cisco SD-WAN?. vBond. vSmart. vManage. WAN Edge. What are two device roles in Cisco SD-Access fabric? (Choose two.). edge node. vBond controller. access switch. core switch. border node. What is the role of the vSmart controller in a Cisco SD-WAN environment?. It performs authentication and authorization. It manages the control plane. It is the centralized network management system. It manages the data plane. When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network?. edge node. Identity Services Engine. RADIUS server. control-plane node. Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?. virtualization. supported systems. storage capacity. efficient scalability. Which action is the vSmart controller responsible for in a Cisco SD-WAN deployment?. onboard WAN Edge nodes into the Cisco SD-WAN fabric. gather telemetry data from WAN Edge routers. distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric. handle, maintain, and gather configuration and status for nodes within the Cisco SD-WAN fabric. Where is radio resource management performed in a Cisco SD-Access wireless solution?. DNA Center. control plane node. wireless controller. Cisco CMX. DRAG DROP - Drag and drop the characteristics from the left onto the infrastructure types on the right. Select and Place: 1. 2. How does the RIB differ from the FIB?. The FIB maintains network topologies and routing tables. The RIB is a list of routes to particular network destinations. The FIB includes many routes to a single destination. The RIB is the best route to a single destination. The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations. The RIB includes many routes to the same destination prefix. The FIB contains only the best route. Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?. underlay network. VPN routing/forwarding. easy virtual network. overlay network. What is the difference between CEF and process switching?. CEF processes packets that are too complex for process switching to manage. Process switching is faster than CEF. CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet. CEF is more CPU-intensive than process switching. What are two considerations when using SSO as a network redundancy feature? (Choose two.). requires synchronization between supervisors in order to guarantee continuous connectivity. the multicast state is preserved during switchover. must be combined with NSF to support uninterrupted Layer 3 operations. both supervisors must be configured separately. must be combined with NSF to support uninterrupted Layer 2 operations. Drag and drop the characteristics from the left onto the correct infrastructure deployment type on the right. Select and Place: 1. 2. In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints?. DHCP. VXLAN. SXP. LISP. What are two differences between the RIB and the FIB? (Choose two.). FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet. The FIB is derived from the data plane, and the RIB is derived from the FIB. The RIB is a database of routing prefixes, and the FIB is the information used to choose the egress interface for each packet. The RIB is derived from the control plane, and the FIB is derived from the RIB. The FIB is derived from the control plane, and the RIB is derived from the FIB. Which two network problems indicate a need to implement QoS in a campus network? (Choose two.). port flapping. excess jitter. misrouted network packets. duplicate IP addresses. bandwidth-related packet loss. In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings?. fabric control plane node. fabric wireless controller. fabric border node. fabric edge node. DRAG DROP - Drag and drop the QoS mechanisms from the left onto their descriptions on the right. Select and Place: 1. 2. Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?. TCP. OMP. UDP. BGP. In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?. provide QoS prioritization services such as marking, queueing, and classification for critical network traffic. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence. provide advanced network security features such as 802.1X, DHCP snooping, VACLs, and port security. provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP. What is a VPN in a Cisco SD-WAN deployment?. common exchange point between two different services. attribute to identify a set of services offered in specific places in the SD-WAN fabric. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric. virtual channel used to carry control plane information. Which function does a fabric edge node perform in an SD-Access deployment?. Connects endpoints to the fabric and forwards their traffic. Encapsulates end-user data traffic into LISP. Connects the SD-Access fabric to another fabric or external Layer 3 networks. Provides reachability between border nodes in the fabric underlay. What is the role of a fusion router in an SD-Access solution?. acts as a DNS server. provides additional forwarding capacity to the fabric. performs route leaking between user-defined virtual networks and shared services. provides connectivity to external networks. Which action is the vSmart controller responsible for in an SD-WAN deployment?. onboard vEdge nodes into the SD-WAN fabric. gather telemetry data from vEdge routers. distribute security information for tunnel establishment between vEdge routers. manage, maintain, and gather configuration and status for nodes within the SD-WAN fabric. What is one fact about Cisco SD-Access wireless network deployments?. The access point is part of the fabric overlay. The wireless client is part of the fabric overlay. The access point is part of the fabric underlay. The WLC is part of the fabric underlay. In a Cisco SD-Access solution, what is the role of a fabric edge node?. to connect external Layer 3 networks to the SD-Access fabric. to connect wired endpoints to the SD-Access fabric. to advertise fabric IP address space to external networks. to connect the fusion router to the SD-Access fabric. What are two reasons a company would choose a cloud deployment over an on-prem deployment? (Choose two.). Cloud costs adjust up or down depending on the amount of resources consumed. On-prem costs for hardware, power, and space are on-going regardless of usage. Cloud resources scale automatically to an increase in demand. On-prem requires additional capital expenditure. In a cloud environment, the company is in full control of access to their data. On-prem risks access to data due to service provider outages. In a cloud environment, the company controls technical issues. On-prem environments rely on the service provider to resolve technical issues. Cloud deployments require long implementation times due to capital expenditure processes. On-prem deployments can be accomplished quickly using operational expenditure processes. What is the difference between the MAC address table and TCAM?. TCAM is used to make L2 forwarding decisions. CAM is used to build routing tables. Router prefix lookups happen in CAM. MAC address table lookups happen in TCAM. The MAC address table supports partial matches. TCAM requires an exact match. The MAC address table is contained in CAM. ACL and QoS information is stored in TCAM. Which controller is the single plane of management for Cisco SD-WAN?. vBond. vSmart. vManage. vEdge. A company plans to implement intent-based networking in its campus infrastructure. Which design facilitates a migration from a traditional campus design to a programmable fabric design?. two-tier. Layer 2 access. three-tier. routed access. Which statement about a fabric access point is true?. It is in local mode and must be connected directly to the fabric edge switch. It is in local mode and must be connected directly to the fabric border node. It is in FlexConnect mode and must be connected directly to the fabric border node. It is in FlexConnect mode and must be connected directly to the fabric edge switch. A customer requests a network design that supports these requirements: ✑ FHRP redundancy ✑ multivendor router environment ✑ IPv4 and IPv6 hosts Which protocol does the design include?. VRRP version 2. VRRP version 3. GLBP. HSRP version 2. While configuring an IOS router for HSRP with a virtual IP of 10.1.1.1, an engineer sees this log message. Jan 1 12:12:12.111 : %HSRP-4-DIFFVIP1: GigabitEthernet0/0 Grp 1 active routers virtual IP address 10.1.1.1 is different to the locally configured address 10.1.1.25 Which configuration change must the engineer make?. Change the HSRP group configuration on the local router to 1. Change the HSRP virtual address on the local router to 10.1.1.1. Change the HSRP virtual address on the remote router to 10.1.1.1. Change the HSRP group configuration on the remote router to 1. A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allow every end host in a VLAN to use both gateways? (Choose two.). VRRP. GLBP. VSS. MHSRP. HSRP. Refer to the exhibit. On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?. G0/0 and G0/1 on Core. G0/0 on Edge-01 and G0/0 on Edge-02. G0/1 on Edge-01 and G0/1 on Edge-02. G0/0 and G0/1 on ASW-01. Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?. under traffic classification and marking conditions. under interface saturation conditions. under all network conditions. under network convergence conditions. An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?. standby version 2 standby 300 priority 110 standby 300 preempt. standby 300 priority 110 standby 300 timers 1 110. standby version 2 standby 300 priority 90 standby 300 preempt. standby 300 priority 90 standby 300 preempt. What is the function of a fabric border node in a Cisco SD-Access environment?. To collect traffic flow information toward external networks. To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks. To attach and register clients to the fabric. To handle an ordered list of IP addresses and locations for endpoints in the fabric. In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one AP to another on a different access switch using a single WLC?. Layer 3. inter-xTR. auto anchor. fast roam. What is the recommended MTU size for a Cisco SD-Access Fabric?. 4464. 17914. 9100. 1500. What is the function of the fabric control plane node in a Cisco SD-Access deployment?. It is responsible for policy application and network segmentation in the fabric. It performs traffic encapsulation and security profiles enforcement in the fabric. It holds a comprehensive database that tracks endpoints and networks in the fabric. It provides integration with legacy nonfabric-enabled environments. What is the data policy in a Cisco SD-WAN deployment?. list of ordered statements that define node configurations and authentication used within the SD-WAN overlay. set of statements that defines how data is forwarded based on IP packet information and specific VPNs. detailed database mapping several kinds of addresses with their corresponding location. group of services tested to guarantee devices and links liveliness within the SD-WAN overlay. In Cisco SD-WAN, which protocol is used to measure link quality?. IPsec. OMP. RSVP. BFD. What is used to perform QoS packet classification?. the Type field in the Layer 2 frame. the Options field in the Layer 3 header. the TOS field in the Layer 3 header. the Flags field in the Layer 3 header. How do cloud deployments differ from on-premises deployments?. Cloud deployments require longer implementation times than on-premises deployments. Cloud deployments are more customizable than on-premises deployments. Cloud deployments have lower upfront costs than on-premises deployments. Cloud deployments require less frequent upgrades than on-premises deployments. Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?. vBond. vSmart. vManage. PNP Server. How is 802.11 traffic handled in a fabric-enabled SSID?. centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC. converted by the AP into 802.3 and encapsulated into VXLAN. centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC. converted by the AP into 802.3 and encapsulated into a VLAN. An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router, the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?. configure matching hold and delay timers. configure matching key-strings. configure matching priority values. configure unique virtual IP addresses. Router1 is currently operating as the HSRP primary with a priority of 110. Router1 fails and Router2 takes over the forwarding role. Which command on Router1 causes it to take over the forwarding role when it returns to service?. standby 2 priority. standby 2 preempt. standby 2 track. standby 2 timers. An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172 16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I- E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows: Network 172.16.100.0 255.255.255.0 Default Router 172.16.100.1 - Option 43 ASCII 172.16.50.5 - The access points are failing to join the wireless LAN controller. Which action resolves the issue?. configure option 43 Hex F104.AC10.3205. configure option 43 Hex F104.CA10.3205. configure dns-server 172.16.50.5. configure dns-server 172. 16.100.1. What is the role of vSmart in a Cisco SD-WAN environment?. to establish secure control plane connections. to monitor, configure, and maintain SD-WAN devices. to provide secure data plane connectivity over WAN links. to perform initial authentication of devices. Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?. It determines which switch becomes active or standby. It determines if the hardware is compatible to form the StackWise Virtual domain. It rejects any unidirectional link traffic forwarding. It discovers the StackWise domain and brings up SVL interfaces. What are two reasons why broadcast radiation is caused in the virtual machine environment? (Choose two.). vSwitch must interrupt the server CPU to process the broadcast packet. The Layer 2 domain can be large in virtual machine environments. Virtual machines communicate primarily through broadcast mode. Communication between vSwitch and network switch is broadcast based. Communication between vSwitch and network switch is multicast based. Which two GRE features are configured to prevent fragmentation? (Choose two.). TCP window size. IP MTU. TCP MSS. DF bit clear. MTU ignore. Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?. ETR. MR. ITR. MS. Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?. default VRF. VRF VPN_A. VRF VPN_B. management VRF. What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.). reduced rack space, power, and cooling requirements. smaller Layer 2 domain. increased security. speedy deployment. reduced IP and MAC address requirements. Which statement about route targets is true when using VRF-Lite?. Route targets control the import and export of routes into a customer routing table. When BGP is configured, route targets are transmitted as BGP standard communities. Route targets allow customers to be assigned overlapping addresses. Route targets uniquely identify the customer routing table. Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving non-LISP traffic with a LISP site destination?. PITR. map resolver. map server. PETR. Which statement explains why Type 1 hypervisor is considered more efficient than Type2 hypervisor?. Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques. Type 1 hypervisor relies on the existing OS of the host machine to access CPU, memory, storage, and network resources. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS. Type 1 hypervisor enables other operating systems to run on it. Which statement about VXLAN is true?. VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries. VXLAN uses the Spanning Tree Protocol for loop prevention. VXLAN extends the Layer 2 Segment ID field to 24-bits, which allows up to 4094 unique Layer 2 segments over the same network. VXLAN uses TCP as the transport protocol over the physical data center network. Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?. MSS. MTU. MRU. window size. Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?. Virtual machines do not require a unique IP or unique MAC. They share the IP and MAC address of the physical server. Each virtual machine requires a unique IP address but shares the MAC address with the physical server. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes. Each virtual machine requires a unique MAC address but shares the IP address with the physical server. Which two namespaces does the LISP network architecture and protocol use? (Choose two.). TLOC. RLOC. DNS. VTEP. EID. Which two entities are Type 1 hypervisors? (Choose two.). Oracle VM VirtualBox. Microsoft Hyper-V. VMware server. VMware ESXi. Microsoft Virtual PC. DRAG DROP - Drag and drop the LISP components from the left onto the functions they perform on the right. Not all options are used. Select and Place: 1. 2. Which action is a function of VTEP in VXLAN?. tunneling traffic from IPv6 to IPv4 VXLANs. allowing encrypted communication on the local VXLAN Ethernet segment. encapsulating and de-encapsulating VXLAN Ethernet frames. tunneling traffic from IPv4 to IPv6 VXLANs. Which two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.). Use a virtual switch provided by the hypervisor. Use a virtual switch running as a separate virtual machine. Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines. Use a single routed link to an external router on stick. Use a single trunk link to an external Layer2 switch. What is a Type 1 hypervisor?. runs directly on a physical server and depends on a previously installed operating system. runs directly on a physical server and includes its own operating system. runs on a virtual server and depends on an already installed operating system. runs on a virtual server and includes its own operating system. Refer to the exhibit. A network engineer configures a GRE tunnel and enters the show interface tunnel command. What does the output confirm about the configuration?. The keepalive value is modified from the default value. The physical interface MTU is 1476 bytes. The tunnel mode is set to the default. Interface tracking is configured. What it the purpose of the LISP routing and addressing architecture?. It creates two entries for each network node, one for its identity and another for its location on the network. It allows LISP to be applied as a network virtualization overlay though encapsulation. It allows multiple instances of a routing table to co-exist within the same router. It creates head-end replication used to deliver broadcast and multicast frames to the entire network. What function does VXLAN perform in a Cisco SD-Access deployment?. policy plane forwarding. control plane forwarding. data plane forwarding. systems management and orchestration. MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?. The packet is discarded on router B. The packet arrives on router C without fragmentation. The packet arrives on router C fragmented. The packet is discarded on router A. Which entity is responsible for maintaining Layer 2 isolation between segments in a VXLAN environment?. VNID. switch fabric. VTEP. host switch. What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?. mainframe. host. virtual machine. container. DRAG DROP - Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used. Select and Place: 1. 2. Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?. bridge domain. VLAN. VNI. VRF. Refer to the exhibit. An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthernet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two.). Router(config-if)#ip address 192.168.1.1 255.255.255.0. Router(config-vrf)#address-family ipv4. Router(config-vrf)#ip address 192.168.1.1 255.255.255.0. Router(config-if)#address-family ipv4. Router(config-vrf)#address-family ipv6. The following system log message is presented after a network administrator configures a GRE tunnel: %TUN-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing Why is Tunnel 0 disabled?. Because dynamic routing is not enabled. Because the tunnel cannot reach its tunnel destination. Because the best path to the tunnel destination is through the tunnel itself. Because the router cannot recursively identify its egress forwarding interface. What is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?. better application performance. improved security because the underlying OS is eliminated. improved density and scalability. ability to operate on hardware that is running other OSs. Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two). Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24. What is a benefit of a virtual machine when compared with a physical server?. Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware. Virtual machines increase server processing performance. The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines. Deploying a virtual machine is technically less complex than deploying a physical server. What is required for a virtual machine to run?. a Type 1 hypervisor and a host operating system. a hypervisor and physical server hardware. only a Type 1 hypervisor. only a Type 2 hypervisor. Which entity is a Type 1 hypervisor?. Oracle VM VirtualBox. Citrix XenServer. VMware server. Microsoft Virtual PC. What are two benefits of virtual switching when compared to hardware switching? (Choose two.). increased MTU size. VM-level isolation. extended 802.1Q VLAN range. hardware independence. increased flexibility. What is a characteristic of a virtual machine?. It must run the same operating system as its host. It is deployable without a hypervisor to host it. It must be aware of other virtual machines, in order to allocate physical resources for them. It relies on hypervisors to allocate computing resources for it. Which LISP component is required for a LISP site to communicate with a non-LISP site?. Proxy ITR. ITR. ETR. Proxy ETR. Which two components are supported by LISP? (Choose two.). proxy ETR. egress tunnel router. route reflector. HMAC algorithm. spoke. What is the function of a VTEP in VXLAN?. provide the routing underlay and overlay for VXLAN headers. dynamically discover the location of end hosts in a VXLAN fabric. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric. statically point to end host locations of the VXLAN fabric. Refer to the exhibit. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?. interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf bank network 172.16.0.0 255.255.0.0. interface Ethernet0/0 vrf forwarding hotel ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf Hotel network 172.16.0.0 0.0.255.255 area 0. interface Ethernet0/0 vrf forwarding bank ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf bank network 172.16.0.0 0.0.255.255 area 0. interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf hotel network 172.16.0.0 255.255.0.0. Refer to the exhibit. Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 global ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 global ip route 192.168.1.0 255.255.255.0 Vlan10 ip route 172.16.1.0 255.255.255.0 Vlan20. ip route vrf Customer1 172.16.1.1 255.255.255.255 172.16.1.1 global ip route vrf Customer2 192.168.1.200 255.255.255.0 192.168.1.1 global ip route 192.168.1.0 255.255.255.0 Vlan10 ip route 172.16.1.0 255.255.255.0 Vlan20. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 Customer2 ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 Customer1. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 Customer1 ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 Customer2. Refer to the exhibit. A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?. The tunnel keepalive is configured incorrectly because they must match on both sites. The tunnel destination will be known via the tunnel interface. The tunnel will be established and work as expected. The default MTU of the tunnel interface is 1500 bytes. |