Free 500-220 Exam Braindumps (page: 2)

Page 2 of 19

Refer to the exhibit.



Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)

  1. Change the primary uplink to "none".
  2. Add an internet traffic preference that defines the load-balancing ratio as 4:1.
  3. Enable load balancing.
  4. Set the speed of the cellular uplink to zero.
  5. Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.

Answer(s): C,E

Explanation:

To clarify, to optimize load balancing asymmetrically with a 4:1 ratio between links, two actions that are required are:
Enable load balancing: This option allows the MX to use both of its uplinks for load balancing.
When load balancing is enabled under Security & SD-WAN > Configure > SD-WAN & Traffic shaping, traffic flows will be distributed between the two uplinks proportional to the WAN 1 and WAN 2 bandwidths specified under Uplink configuration1.
Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1: The assigned speed of a WAN link is a value that indicates the bandwidth available on that link. By changing the assigned speeds of WAN 1 and WAN 2 so that they reflect the desired load-balancing ratio, the administrator can ensure that the MX uses both links efficiently and proportionally1. For example, if WAN 1 has a bandwidth of 100 Mbps and WAN 2 has a bandwidth of 25 Mbps, then setting their assigned speeds to 100 Mbps and 25 Mbps respectively will achieve a 4:1 load-balancing ratio.



Which Cisco Meraki best practice method preserves complete historical network event logs?

  1. Configuring the preserved event number to maximize logging.
  2. Configuring the preserved event period to unlimited.
  3. Configuring a syslog server for the network.
  4. Configuring Dashboard logging to preserve only certain event types.

Answer(s): C

Explanation:

Configuring a syslog server for the network is the Cisco Meraki best practice method to preserve complete historical network event logs. A syslog server can be configured to store messages for reporting purposes from MX Security Appliances, MR Access Points, and MS switches1. The syslog server can collect various types of events, such as VPN connectivity, uplink connectivity, DHCP leases, firewall rules, IDS alerts, and security events2. The syslog server can also help with troubleshooting and monitoring the network performance and security.



Which design requirement is met by implementing syslog versus SNMP?

  1. when automation capabilities are needed
  2. when proactive alerts for critical events must be generated
  3. when organization-wide information must be collected
  4. when information such as flows and client connectivity must be gathered

Answer(s): D

Explanation:

Implementing syslog versus SNMP can meet the design requirement of gathering information such as flows and client connectivity. Syslog can collect and report various types of events, such as VPN connectivity, uplink connectivity, DHCP leases, firewall rules, IDS alerts, and security events. Syslog can also provide detailed information about the flows and client connectivity on the network devices, such as source and destination IP addresses, ports, protocols, bytes transferred, etc. SNMP, on the other hand, can collect and report various statistics and information about the network devices, such as CPU utilization, interface status, memory usage, etc. However, SNMP does not provide as much information about the flows and client connectivity as syslog does.


Reference:

https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/ Meraki_Device_Reporting_-_Syslog%2C_SNMP%2C_and_API



Refer to the exhibit.



The VPN concentrator is experiencing issues.
Which action should be taken to ensure a stable environment?

  1. Add a deny any/any firewall rule to the end of the firewall rules.
  2. Remove the connection from Internet 1.
  3. Physically disconnect all LAN ports.
  4. Configure the MX appliance to Routed mode on the Addressing & VLANS page.

Answer(s): C

Explanation:

Before deploying MXs as one-arm VPN concentrators, place them into Passthrough or VPN Concentrator mode on the Addressing and VLANs page. In one-armed VPN concentrator mode, the units in the pair are connected to the network "only" via their respective `Internet' ports. Make sure they are NOT connected directly via their LAN ports. Each MX must be within the same IP subnet and able to communicate with each other, as well as with the Meraki dashboard. Only VPN traffic is routed to the MX, and both ingress and egress packets are sent through the same interface.

https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_ Design/Best_Practice_Design_-_MX_Security_and_SD-
WAN/Meraki_Auto_VPN_General_Best_Practices



Page 2 of 19



Post your Comments and Discuss Cisco® 500-220 exam with other Community members:

Pierre commented on August 01, 2022
The study product is well formatted and very useful. I recommend.
FRANCE
upvote