Free JN0-280 Exam Braindumps (page: 5)

Page 4 of 18

Which signaling protocol is used for EVPN?

  1. OSPF
  2. PIM
  3. IS-IS
  4. BGP

Answer(s): D

Explanation:

EVPN (Ethernet Virtual Private Network) is a standard protocol used for building Layer 2 and Layer 3 VPNs over an IP or MPLS network. The signaling protocol used for EVPN is BGP (Border Gateway Protocol).
Step-by-Step Breakdown:
BGP as the EVPN Signaling Protocol:
EVPN uses BGP to exchange MAC address reachability information between routers (PE devices). This enables devices to learn which MAC addresses are reachable through which PE devices, facilitating Layer 2 forwarding across an IP or MPLS core.
BGP Extensions for EVPN:
BGP is extended with new address families (e.g., EVPN NLRI) to carry both MAC and IP address information, allowing for scalable and efficient multi-tenant network solutions.


Reference:

Junos EVPN Configuration: Juniper uses BGP as the control plane for EVPN to exchange MAC and IP route information between different data center devices.



Which operation mode command will display the mapping between the VLAN ID and ports on a switch?

  1. show route
  2. show ethernet-switching table
  3. show interfaces terse
  4. show vlans

Answer(s): D

Explanation:

To display the mapping between VLAN IDs and ports on a Juniper switch, the show vlans command is used.
Step-by-Step Breakdown:
VLAN Information:
The show vlans command displays detailed information about VLAN configurations, including the VLAN ID, associated interfaces (ports), and VLAN membership.
Command Example:
show vlans

This command will provide an output listing each VLAN, its ID, and the interfaces associated with the VLAN, enabling network engineers to quickly verify VLAN to port mappings.


Reference:

VLAN Verification: Use the show vlans command to verify which VLANs are configured on the switch and the ports that are members of those VLANs.



Within your router, you want to verify that you are learning routes from a remote BGP peer at IP address 10.10.100.1.
Which command would satisfy the requirement?

  1. show route receive-protocol bgp 10.10.100.1
  2. show route protocol bgp table inet.0 10.10.100.1
  3. show route advertise-protocol bgp 10.10.100.1
  4. show route protocol bgp source-gateway 10.10.100.1

Answer(s): A

Explanation:

To verify that your router is learning routes from a remote BGP peer at a specific IP address (e.g., 10.10.100.1), the correct command to use is show route receive-protocol bgp.
Step-by-Step Breakdown:
BGP Route Learning:
The show route receive-protocol bgp command displays the routes that have been received from a specified BGP peer. This helps in confirming that the remote peer is sending routes correctly and that your router is receiving them.
Command Example:
show route receive-protocol bgp 10.10.100.1

This will show all routes that have been received from the BGP peer with IP address 10.10.100.1.


Reference:

BGP Route Verification: Use this command to troubleshoot and verify that routes from a specific BGP peer are being received.



When a MAC limiting violation occurs, the switch performs which two actions by default? (Choose two.)

  1. No logging takes place.
  2. It causes Layer 2 loops.
  3. The port is disabled.
  4. It drops the packet.

Answer(s): C,D

Explanation:

When a MAC limiting violation occurs on a Juniper switch, the switch will perform the following actions by default:

Step-by-Step Breakdown:
Port Disabled:
When the number of MAC addresses on an interface exceeds the configured limit, the port is automatically disabled to prevent further violations. This is a protective mechanism to prevent MAC address flooding.
Packet Dropped:
Additionally, packets from the violating MAC address are dropped to prevent any further communication from that address. This ensures that only valid MAC addresses are allowed to communicate through the interface.
Example Configuration:

set ethernet-switching-options secure-access-port interface <interface-name> mac-limit 5

If more than five MAC addresses are learned, the port is disabled, and excess packets are dropped.


Reference:

MAC Limiting: When the switch detects a MAC limiting violation, it disables the port and drops further packets from the violating MAC addresses to maintain network security.






Post your Comments and Discuss Juniper JN0-280 exam with other Community members:

JN0-280 Discussions & Posts