Simulation1
SOLUTION:-
R1
Config t
router isis 1
net 49.0001.0010.0001.0101.00
area-password C1sc0!
int et0/0
ip router isis 1
isis authen mode text level-2
isis circuit-type level-2
isis tag 1
int et1/0
ip router isis 1
isis authen mode text level-2
isis circuit-type level-2
isis tag 1
R2
router isis 2
net 49.0001.0010.0002.0202.00
area-password C1sc0!
int et0/0
ip router isis 2
isis authen mode text level-2
isis circuit-type level-2
isis tag 2
int et1/0
ip router isis 2
isis authen mode text level-1
isis circuit-type level-1
isis tag 2
R3
router isis 3
net 49.0001.0010.0003.0303.00
area-password C1sc0!
int et0/0
ip router isis 3
isis authen mode text level-1
isis circuit-type level-1
isis tag 3
int et1/0
ip router isis 3
isis authen mode text level-2
isis circuit-type level-2
isis tag 3
R1 Verification: -
R1
Config t
Ipv6 unicast-routing
Router isis 1
Metric-style wide
Address-family ipv6 unicast
Multi-topology
Int loop0
Ip router isis 1
Ipv6 router isis 1
Isis tag 1
Int et0/0
Ipv6 router isis 1
Int et1/0
Ipv6 router isis 1
R2
Config t
Ipv6 unicast-routing
Router isis 2
Metric-style wide
Address-family ipv6 unicast
Multi-topology
Int loop0
Ip router isis 2
Ipv6 router isis 2
Isis tag 2
Int et0/0
Ipv6 router isis 2
Int et1/0
Ipv6 router isis 2
R3
Config t
Ipv6 unicast-routing
Router isis 3
Metric-style wide
Address-family ipv6 unicast
Multi-topology
Int loop0
Ip router isis 3
Ipv6 router isis 3
Isis tag 3
Int et0/0
Ipv6 router isis 3
Int et1/0
Ipv6 router isis 3
R1 Ipv6 Verification: -
R1
Copy run start
R2
Copy run start
R3
Copy run start
Simulation 6
Refer to the exhibit.
R1
router bgp 100
address-family ipv4
nei 172.16.0.2 route-map R1-TO-R2 in
network 10.1.1.1 mask 255.255.255.255
copy run start
R2
router bgp 200
address-family ipv4
network 10.2.2.2 mask 255.255.255.255
nei 172.16.0.1 route-map R2-TO-R1 in
copy run start
Simulation 7
Refer to the exhibit.
R1
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 15
Copy run start
R2
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 20
Copy run start
R3
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 25
Copy run start
A mod-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company's two sites across the service provider core. To meet service requirements, the service provider must extend the layer 2 domain between the company's two locations. Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?
Refer to the exhibit.
Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?
Currently there are no comments in this discussion, be the first to comment!