ExamGecko
Home Home / Cisco / 300-415

Cisco 300-415 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

What is a key element used in a vBond Orchestrator redundancy topology?

A.

fully qualified domain name

A.

fully qualified domain name

Answers
B.

DHCP server

B.

DHCP server

Answers
C.

load-balancer with health probes

C.

load-balancer with health probes

Answers
D.

stun server

D.

stun server

Answers
Suggested answer: A

Explanation:

In Cisco SD-WAN architecture, the vBond Orchestrator plays a crucial role in the initial device onboarding and control plane security. Ensuring redundancy for vBond Orchestrators is essential for maintaining high availability and reliability in the SD-WAN network.

1.Fully Qualified Domain Name (FQDN): The use of an FQDN is a key element in vBond Orchestrator redundancy. By configuring multiple vBond Orchestrators with the same FQDN, the SD-WAN devices can resolve this domain name to different IP addresses corresponding to the different vBond Orchestrator instances. This allows for automatic failover and load balancing among the vBond Orchestrators.

1.Redundancy Mechanism: The DNS mechanism will resolve the FQDN to a list of IP addresses, and in case one vBond is unreachable, another can be contacted. This approach ensures continuous availability and redundancy without requiring manual reconfiguration of the devices.

1.Reference:

oCisco SD-WAN Design Guide

oCisco SD-WAN Configuration and Deployment Guide

Exhibit.

The SD-WAN network Is configured with a default full-mesh topology. The network engineer wants the Rome WAN Edge to use the MPLS TLOC as the preferred TLOC when ..... Telnet traffic as long as me MPLS Ink has these, characteristics:

Loss: 5%

Latency: 100ms

Jitter: 100 ms

Which configuration must the network engineer use to create a list that that classifies the MPLS link characteristics?

A)

B)

C)

D)

A.

Option

A.

Option

Answers
B.

Option

B.

Option

Answers
C.

Option

C.

Option

Answers
D.

Option

D.

Option

Answers
Suggested answer: C

Explanation:

* Configuration Analysis: The configurations provided in the images must be evaluated to determine which option correctly classifies the MPLS link based on the given criteria of loss, latency, and jitter.

* Preferred TLOC Configuration: The network engineer needs to configure the SD-WAN policy to prefer the MPLS transport for Telnet traffic, ensuring the link characteristics match the specified thresholds.

*

Reference:

*Cisco SD-WAN Policy Configuration Guide

*Cisco SD-WAN Transport and TLOC Configuration Guide

*

Refer to the Exhibit.

An engineer configures Rome WAN Edge 10 use MPLS cloud as the preferred link to reach Paris WAN Edge and use biz-internet as a backup. Which policy configuration must be led in the outbound direction toward Rome to accomplish the task?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

To configure Rome WAN Edge to prefer the MPLS cloud for reaching Paris WAN Edge, and use biz-internet as a backup, the policy must be set correctly to define the preference for each transport link.

1.Understanding TLOCs (Transport Locator): TLOCs represent the transport network paths (MPLS, Internet, etc.) available for SD-WAN. The preference values assigned to TLOCs determine their priority. A lower preference value indicates a higher priority.

1.Policy Configuration Analysis:

oOption A: This option correctly configures the TLOC list for the system IPs representing the MPLS and biz-internet links with the appropriate preferences (500 for MPLS and 400 for biz-internet).

oOther options either repeat the TLOC configuration incorrectly or reference wrong system IPs.

1.Policy Configuration:

policy

lists

tloc-list TLOC-1

tloc 10.1.1.102 color mpls encap ipsec preference 500

tloc 10.1.1.102 color biz-internet encap ipsec preference 400

1.Reference:

oCisco SD-WAN Policy Framework Guide

oCisco SD-WAN Transport Locator Configuration Documentation

What do receivers request to join multicast streams in a Cisco SO-WAN network?

A.

IGMP membership reports directly with a multicast router.

A.

IGMP membership reports directly with a multicast router.

Answers
B.

Multicast service routes with the vSmart controller

B.

Multicast service routes with the vSmart controller

Answers
C.

IGMP membership reports directly with the vBond orchestrator.

C.

IGMP membership reports directly with the vBond orchestrator.

Answers
D.

PIM messages with the nearest neighboring multicast router.

D.

PIM messages with the nearest neighboring multicast router.

Answers
Suggested answer: B

Explanation:

In a Cisco SD-WAN network, multicast traffic management is handled differently compared to traditional IP multicast methods due to the nature of the overlay architecture.

1.Multicast Service Routes: In Cisco SD-WAN, multicast receivers use the vSmart controller to request multicast streams. This is done via multicast service routes which the vSmart controller manages. The vSmart controller is responsible for maintaining and distributing multicast routing information to all edge devices in the network.

1.Process:

oWhen a multicast receiver wants to join a multicast stream, it sends an IGMP join request.

oThe WAN Edge device forwards this request to the vSmart controller.

oThe vSmart controller then updates the multicast service routes to include the new receiver, ensuring that multicast traffic is appropriately forwarded to the joining receiver.

1.Reference:

oCisco SD-WAN Multicast Configuration Guide

oCisco SD-WAN vSmart Controller Documentation

Which control policy assigned to Drenches in the out direction establishes a strict hub-and-spoke topology tor VPN2?

A)

B)

C)

D)

A.

Option

A.

Option

Answers
B.

Option

B.

Option

Answers
C.

Option

C.

Option

Answers
D.

Option

D.

Option

Answers
Suggested answer: A

Explanation:

To establish a strict hub-and-spoke topology in Cisco SD-WAN for a specific VPN, such as VPN2, a control policy must be configured. This control policy dictates how traffic flows between sites, ensuring that all branch traffic is routed through the hub site.

1.Control Policy Components:

oSite Lists: Define which sites are considered hubs and which are branches.

oVPN Lists: Identify the VPNs to which the policy applies.

oControl Policy: Use sequences to match routes and specify actions to accept or reject traffic based on the defined topology.

1.Policy Analysis:

oOption A: Correctly defines site lists for hub sites (site-id 1-2) and creates a control policy that matches routes for VPN2, accepting routes from hub sites and rejecting routes from others. This ensures that traffic from branches (other sites) is only accepted if it routes through the hubs.

oOther options either incorrectly define the site lists or do not properly match and set the routes to enforce the strict hub-and-spoke topology.

1.Policy Configuration:

policy

lists

vpn-list VPN2

vpn 2

site-list hub_sites

site-id 1-2

!

control-policy vpn_multi_topology

sequence 10

match route

site-list hub_sites

vpn-list VPN2

!

action accept

!

sequence 20

match route

vpn-list VPN2

!

action reject

!

default-action accept

1.Reference:

oCisco SD-WAN Control Policy Configuration Guide

oCisco SD-WAN Hub-and-Spoke Topology Deployment Guide

Customer has two branch silos with overlapping IPs How must the data policy be configured to establish communication between the sites and server to avoid overlapping?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

When dealing with overlapping IP addresses in different branch sites, it's crucial to use NAT (Network Address Translation) to avoid IP conflicts and establish proper communication.

1.NAT Configuration:

oSource NAT: This involves translating the source IP addresses of the packets as they leave a specific interface. This can help avoid IP conflicts by ensuring that the IP addresses used within the network are unique.

oData Policy: A data policy must be created that matches the source IP addresses and applies the NAT pool to translate these addresses.

1.Option A Analysis:

oPolicy Definition: The data policy Srvc_Plane_NAT includes a sequence that matches the source IP 10.0.0.1/32 and accepts the action to apply NAT using nat pool 1.

oInterface Configuration: The interface ge0/0/0 is configured with the IP address 192.168.1.1/32 and is not shut down, ensuring it is active and can handle the NAT translation.

1.Reference:

oCisco SD-WAN NAT Configuration Guide

An application team is getting ready to deploy a new business-critical application to the network. To protect the traffic, the network team must add another queue to the QoS map and then deploy the map to fabric Which configuration slop must be completed prior to adding the queue to the QoS map and applying If

A.

The relationship between die new QoS class and the hardware queue must be configured from the 'lists' page of the Local Policy section of vManage. The QoS map is then applied to the WAN interface

A.

The relationship between die new QoS class and the hardware queue must be configured from the 'lists' page of the Local Policy section of vManage. The QoS map is then applied to the WAN interface

Answers
B.

The relationship between The new QoS class and the hardware queue must be configured from the 'lists' page of the Local Policy section of vManage. The QoS map is then applied to the service-side interface.

B.

The relationship between The new QoS class and the hardware queue must be configured from the 'lists' page of the Local Policy section of vManage. The QoS map is then applied to the service-side interface.

Answers
C.

The relationship between the new QoS class and the hardware queue must be configured from the 'lisla' page of the Centralized Policy section of vManage. The QoS map is then applied to the WAN interface.

C.

The relationship between the new QoS class and the hardware queue must be configured from the 'lisla' page of the Centralized Policy section of vManage. The QoS map is then applied to the WAN interface.

Answers
D.

The relationship between the new QoS class and the hardware queue must be configured from the 'lists' page of the Centralized Policy section of vManage. The QoS map is then applied to the service-side interface.

D.

The relationship between the new QoS class and the hardware queue must be configured from the 'lists' page of the Centralized Policy section of vManage. The QoS map is then applied to the service-side interface.

Answers
Suggested answer: A

Explanation:

Adding a new QoS queue to handle business-critical application traffic involves several specific steps in Cisco SD-WAN's vManage:

1.Configure QoS Class and Hardware Queue Relationship:

oNavigate to the 'lists' page within the Local Policy section of vManage.

oDefine the relationship between the new QoS class and the appropriate hardware queue. This step is crucial as it ensures that the new traffic class is mapped correctly to the underlying hardware resources, which are responsible for enforcing the QoS policies.

1.Applying the QoS Map:

oOnce the new QoS class and hardware queue relationship is configured, the updated QoS map must be applied to the relevant interfaces.

oSpecifically, the QoS map should be applied to the WAN interface. This ensures that the new QoS policies are enforced on the traffic as it traverses the WAN, which is typically where QoS management is most critical due to bandwidth constraints and variable network conditions.

1.Reference:

oCisco SD-WAN Quality of Service Configuration Guide

oCisco SD-WAN vManage Policy Configuration Documentation

DRAG DROP

Drag and drop the alarm slates from the left onto the corresponding alarm descriptions on the right.


Question 378
Correct answer: Question 378

Explanation:

*Cisco SD-WAN Monitoring and Troubleshooting Guide

*Cisco vManage Alarm Severity Levels Documentation

Which VPNs must be configured outside the workflow to complete the SD-WAN overlay setup when using the Quick Connect workflow?

A.

service and transport VPNs

A.

service and transport VPNs

Answers
B.

service VPNs

B.

service VPNs

Answers
C.

transport VPNs

C.

transport VPNs

Answers
D.

management VPNs

D.

management VPNs

Answers
Suggested answer: D

Explanation:

The Quick Connect workflow in Cisco SD-WAN simplifies the initial setup process by automating many configuration steps. However, certain configurations still need to be performed outside of this automated workflow to ensure a complete and operational SD-WAN overlay.

1.Management VPNs: Management VPNs, specifically VPN 512, are used for device management and are critical for the proper operation and management of the SD-WAN devices. These VPNs are typically configured outside of the Quick Connect workflow to ensure that all devices can be properly managed and monitored.

1.Service and Transport VPNs: While service and transport VPNs are also important, they are often included within the Quick Connect workflow, which sets up the necessary configurations to enable data transport across the SD-WAN fabric.

1.Reference:

oCisco SD-WAN Quick Connect Guide

oCisco SD-WAN Management and Monitoring Guide

Which application list is preconfigured?

A.

Google_Apps

A.

Google_Apps

Answers
B.

Cisco Apps

B.

Cisco Apps

Answers
C.

Microsoft_Office365

C.

Microsoft_Office365

Answers
D.

P2P_Apps

D.

P2P_Apps

Answers
Suggested answer: C

Explanation:

In Cisco SD-WAN, application lists are used to identify and manage specific types of application traffic. Preconfigured application lists are provided by Cisco to simplify the management and configuration of common applications.

1.Preconfigured Application Lists: Among the preconfigured application lists provided by Cisco SD-WAN, Microsoft_Office365 is one of them. This list helps in easily identifying and managing traffic related to Microsoft Office 365 applications.

1.Usage: These preconfigured lists can be used in policies to ensure optimized routing and performance for critical applications like Microsoft Office 365, which are widely used in enterprise environments.

1.Reference:

oCisco SD-WAN Application-Aware Routing Configuration Guide

Cisco SD-WAN Policy Framework Documentation

Total 382 questions
Go to page: of 39