A. BGP peers must be Layer 2-adjacent
B. EBGP multihop is not configured
C. The firewall is not configured to allow IP protocol 89
D. The firewall is not configured to allow UDP 179.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Users on the 199.155.24.0 network are unable to reach the 172.16.10.0 network. What is the most likely solution?()
A. Router ISP1 should be configured to peer with router B
B. Router ISP2 should be configured with no synchronization
C. Router ISP1 should be configured with no synchronization
D. Router ISP2 should be configured with no auto-summary.
E. Router ISP1 or IPS2 should be configured with network 176.16.10.0 mask 255.255.255.0
A.It relies on IPv6 to do the fragmenting.
B.It splits the LS Update packet into smaller packets.
C.It splits the LSA into smaller router LSA packets.
D.It produces an error.
Refer to the exhibit. Routers A and B are directly connected and running OSPF, but they are unable to form a neighbor relationship. What is the most likely cause?()
A. The routers are not on the same network.
B. The network statements do not match.
C. The process number does not match.
D. The MTU does not match.
E. The OSPF cost does not match.
F. There is a physical issue with the cable.
Refer to the exhibit. Routers A and B are directly connected and running EIGRP, but they are unable to form a neighbor relationship. What is the most likely cause? ()
A. The network statements are misconfigured.
B. The IP address statements are misconfigured.
C. The autonomous system is misconfigured.
D. There is a physical issue with the cable.
Refer to the exhibit. Routers A and B are directly connected. Given the configuration, how many EIGRP routes will router B see in its routing table?()
A. 0
B. 1
C. 2
D. 3
E. 4
最新試題
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()
What is true about Unicast RPF in strict mode?()
What is also called Type 0 authentication in OSPF on Cisco Routers?()
Which two EIGRP options will limit a query domain?()
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()
Which three protocols or applications should be placed in a class that is configured with WRED?()
Based on the exhibit presented. What will be the objective of this route map when applied to traffic passing through a router?()
Which two are differences between IGMPv2 and IGMPv3 reports?()
Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?()
Which command is used to enable SSM with the range 232.0.0.0 - 255.0.0.0?()