In the VPC interworking scenario, traffic is checked and filtered only by the firewall in the source or destination VPC.
In ZTP networking, which of the following addresses can be delivered by a DHCP server? (Select All that Apply)
VXLAN is a network virtualization technology that uses MAC-in-UDP encapsulation. What is the destination port number used during UDP encapsulation?
Assume that a VXLAN tunnel is monitored on a Huawei CE series switch and that the tunnel status is Down or the tunnel fails to be dynamically established. In this scenario, which of the following statements are true about how to check the cause of the fault? (Select All that Apply)
After an M-LAG works properly, the two member devices synchronize information with each other in real time. Which of the following pieces of information are synchronized between devices? (Select All that Apply)
Which of the following statements are true about the tenant service model? (Select All that Apply)
In an M-LAG, two CE series switches send M-LAG synchronization packets through the peer-link to synchronize information with each other in real time. Which of the following entries need to be included in the M-LAG synchronization packets to ensure that traffic forwarding is not affected if either device fails? (Select All that Apply)
Which of the following technologies are Layer 4 load balancing technologies? (Select All that Apply)
iMaster NCE-Fabric is Huawei's DC controller. Tenants can use it to create VPCs and deploy logical networks as required. After logical NEs are deployed, the corresponding network configurations are delivered to underlying network devices. Which of the following statements is false about the delivered network configurations?
Which of the following protocols is used to back up session tables between the active and standby firewalls in the hot standby scenario?
Which of the following nodes connects computing resources such as virtual and physical servers to a VXLAN fabric?
Which of the following statements are false about heartbeat link faults in an M-LAG? (Select All that Apply)
Which of the following statements is false about VM service traffic in the computing scenario?
M-LAG configuration consistency check classifies device configurations into key configurations (Type 1) and common configurations (Type 2). This check can be performed in strict or loose mode based on the processing mode when key configurations are inconsistent. Which of the following statements is false about M-LAG configuration consistency check?
Which of the following statements are true about the Easy mode? (Select All that Apply)