New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The engineer notices frequent MAC and IP address moves between different leaf switch ports. Which action prevents this problem from occurring?

A.

Disable enforce subnet check.

B.

Enable endpoint loop protection.

C.

Enable rogue endpoint control.

D.

Disable IP bridge domain enforcement.

Refer to the exhibit. A client is configuring a new Cisco ACI fabric. All VLANs will be extended during the migration phase using the VPC connections on leaf switches 3. 4 and leaf switches toward the legacy network. The migration phase has these requirements;

* If The legacy switches must be able to transfer BPDUs through the ACI fabric.

* If the legacy switches fail to break a loop. Cisco ACI must break the loop.

Which group settings must be configured on VPC interface policy groups ipg_vpc-legacy_1 and ipg_vpc-legacy_2 to meet these requirements?

A.

MCP: enabled

BPDU Guard: enabled

BPDU Filter: disabled

B.

MCP: enabled

BPDU Guard: disabled

BPDU Filter: disabled

C.

MCP: disabled

BPDU Guard: disabled

BPDU Filter: enabled

D.

MCP: disabled

BPDU Guard: enabled

BPDU Filter enable

Which attribute should be configured for each user to enable RADIUS for external authentication in Cisco ACI?

A.

cisco-security domain

B.

cisco-auth-features

C.

cisco-aci-role

D.

cisco-av-pair

Refer to the exhibit. An engineer is migrating legacy servers into the Cisco ACI environment. The requirement is to ensure that all endpoints and MAC addresses are learned properly in legacy and Cisco ACI switches. Which configuration set must be configured under the bridge domain called bd__360 to accomplish this goal?

A.

L2 Unknown Unicast: Hardware Proxy ARP Flooding: Disabled

B.

L2 Unknown Unicast: Hardware Proxy ARP Flooding: Enabled

C.

L2 Unknown Unicast: Flood ARP Flooding: Disabled

D.

L2 Unknown Unicast: Flood

ARP Flooding: Enabled

Refer to the exhibit.

An application called App_1 is hosted on the server called S1. A silent host application. App_2. is hosted on S2. Both applications use the same VLAN encapsulation, which action forces Cisco ACI fabric to learn App_2 on ACI leaf 2?

A.

Set Multi-Destination Flooding to Drop.

B.

Set Unicast Routing to Hardware Proxy.

C.

Set L2 Unknown Unicast to Flood.

D.

Set L3 Unknown Multicast to Optimized flood.

A company must connect three Cisco ACI data centers by using Cisco ACI Multi-Site. An engineer must configure the Inter-Site Network (ISN) between the existing sites. Which two configuration steps must be taken to implement the ISN? (Choose two.)

A.

Configure OSPF on subinterfaces on routers that are directly connected with spine nodes.

B.

Configure ISN site extension on Cisco routers in the network.

C.

Configure OSPF on all ISN routers.

D.

Configure BIDIR-PIM on all ISN routers.

E.

Configure encapsulation VLAN-4 between the routers and spine nodes.

A network engineer must design a method to allow the Cisco ACI to redirect traffic to the firewalls. Only traffic that matches specific L4-L7 policy rules should be redirected. The load must be distributed across multiple firewalls to scale the performance horizontally. Which action must be taken to meet these requirements?

A.

Configure ACI Service Graph with Unidirectional PBR.

B.

Implement ACI Service Graph with GIPo.

C.

Implement ACI Service Graph Two Nodes with GIPo.

D.

Configure ACI Service Graph with Symmetric PBR.

A customer is deploying a new application across two ACI pods that is sensitive to latency and jitter. The application sets the DSCP values of packets to AF31 and CS6, respectively. Which configuration changes must be made on the APIC to support the new application and prevent packets from being delayed or dropped between pods?

A.

disable DSCP mapping on the IPN devices

B.

disable DSCP translation policy

C.

align the ACI QoS levels and IPN QoS policies

D.

align the custom QoS policy on the EPG site in the customer tenant

Refer to the exhibit. A Cisco ACI fabric displays this fault. Which set of actions modifies the event to be displayed as a warning in the future?

A.

Navigate to the ACI Events tab.

Create a new record.

B.

Navigate to the ACI Fault tab.

Create a new record.

C.

Navigate to the ACI Events tab.

Change the severity level.

D.

Navigate to the ACI Fault tab.

Change the severity level.

Refer to the exhibit. An engineer is configuring a production Multi-Site solution to provide connectivity from EPGs from a specific site to networks reachable through a remote site L3OUT. All required schema and template objects are already defined. Which additional configuration must be implemented in the Multi-Site Orchestrator to support the cross-site connectivity?

A.

Configure a routable TEP pool for SITE1.

B.

Enable CloudSec for intersite traffic encryption.

C.

Add a new stretched external EPG to the existing L3OUT.

D.

Implement a policy-based redirect using a service graph.