The newest Juniper JN0-661 dumps are available from PassLeader, you can get both JN0-661 VCE dumps and JN0-661 PDF dumps from PassLeader! PassLeader have added the newest JN0-661 exam questions into its JN0-661 VCE and PDF dumps now, the new JN0-661 braindumps will help you 100% passing the JNCIP-SP JN0-661 exam. Welcome to download the valid PassLeader JN0-661 dumps VCE and PDF here: https://www.passleader.com/jn0-661.html (138 Q&As Dumps)
Besides, download that PassLeader JN0-661 braindumps from Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpUmhnOVlfdm5YMjQ (FREE VERSION!!!)
Your customer requires a Layer 2 VPN service (draft-kompella-mpls-l2vpn). You are asked to describe the operational requirements on the PE router supporting this service. Which two statements are true in this scenario? (Choose two.)
A. The ingress PE router associates multiple MPLS labels with the corresponding traffic flows.
B. The ingress PE router for a traffic flow maintains the data-link connection identifier.
C. The ingress PE router for a traffic flow removes the data-link connection identifier.
D. The ingress PE router associates a single MPLS label with the corresponding traffic flows.
A: When a packet arrives at a PE from a CE in a Layer 2 VPN, the Layer 2 address of the packet identifies to which remote attachment circuit (and thus remote CE) the packet is destined. The procedure installs a route that maps the Layer 2 address to a tunnel (which identifies the PE to which the destination CE is attached) and a VPN label (which identifies the destination AC). If the egress PE is the same as the ingress PE, no tunnel or VPN label is needed.
C: In case of IP-only Layer 2 interworking, the Layer 2 header is completely stripped off till the IP header.
During a network migration window, an engineer issues the set protocols isis overload timeout 1200 command. In this scenario, which effect does this have on the IS-IS operations of the router?
A. After the first IS-IS adjacency forms, the overload bit is set for 1200 seconds.
B. When the IS-IS protocol starts, the overload bit is set after the timer of 1200 seconds expires.
C. When the IS-IS protocol starts, the overload bit is set for 1200 seconds.
D. After the first IS-IS adjacency forms, the overload bit is set after the timer of 1200 seconds expires.
With a timeout, overload mode is set if the time elapsed since the IS-IS instance started is less than the specified timeout. To specify the number of seconds at which overload is reset, include the timeout option when specifying the overload statement:
overload timeout seconds;
The time can range from 60 through 1800 seconds.
What is the final component of CoS processing on a Junos device?
A. drop profile map
B. behavior aggregate classifier
C. rewrite marker
D. multifield classifier
The following steps describe the CoS process:
1. A logical interface has one or more classifiers of different types applied to it.
2. The classifier assigns the packet to a forwarding class and a loss priority.
3. Each forwarding class is assigned to a queue.
4. Input (and output) policers meter traffic and might change the forwarding class and loss priority if a traffic flow exceeds its service level.
5. The physical or logical interface has a scheduler map applied to it.
6. The scheduler defines how traffic is treated in the output queue — for example, the transmit rate, buffer size, priority, and drop profile.
7. The scheduler map assigns a scheduler to each forwarding class.
8. The drop-profile defines how aggressively to drop packets that are using a particular scheduler.
9. The rewrite rule takes effect as the packet leaves a logical interface that has a rewrite rule configured. The rewrite rule writes information to the packet (for example, EXP or DSCP bits) according to the forwarding class and loss priority of the packet.
You are connecting your OSPF router to your customer’s RIP router and redistributing the customer’s routes into your OSPF domain. Your OSPF routes is part of an NSSA and the ABR is injecting an OSPF default route, which you have advertised to your customer. After committing the configuration, you notice a routing loop between your OSPF router and the customer’s RIP router. Which action must you perform on your OSPF router to solve this problem?
A. Enable Type 7-to-Type 5 LSA conversion.
B. Set the customer-facing interface to passive.
C. Convert the area to a stub area.
D. Change the OSPF external route preference.
Avoid routing loops by changing the OSPF external route preference.
A: If multiple NSSA ABR routers are present, it is recommended that not all ABRs perform Type 7-to-5 translation to avoid routing loops.
B: We would have to make the interface on the RIP router, the customer router, passive, not the customer-facing interface on the OSPF router.
By default RIP broadcasts are sent from all interfaces. RIP allows us to control this behavior. We can configure which interface should send RIP broadcast or which not. Once we mark any interface as passive interface, RIP will stop sending updates from that interface.
Referring to the exhibit button, you are asked to ensure that traffic destined for the 188.8.131.52/24 network must use the LSP named Top.
Which two actions would you perform to accomplish this task? (Choose two.)
A. Apply the policy as an import policy for BGP on R1.
B. Create a routing policy that matches the route 184.108.40.206/24 with an action of install-nexthop lsp Top.
C. Create a routing policy that matches the route 220.127.116.11/24 with an action of next-hop Top.
D. Apply the policy to the forwarding table on R1.
B: The install-nexthop command selects a specific label-switched path (LSP), or select an LSP from a set of similarly named LSPs as the traffic destination for the configured community.
D: You can apply an export routing policy to a forwarding table. You include the export statement:
export [ policy-names ];
A PE provides VLAN VPLS service to a CE attached with two links. You want to prevent Layer 2 loops and provide link redundancy. Which two actions will accomplish this task? (Choose two.)
A. Place both interfaces in a link aggregation group.
B. Configure different VLANs on each interface.
C. Configure all VLANs on both interfaces, on the PE, and on the CE.
D. Configure Spanning Tree Protocol between the PE and the CE.
D: To prevent the formation of Layer 2 loops between the CE devices and the multihomed PE routers, Juniper recommends that you employ the Spanning Tree Protocol (STP) on your CE devices. Layer 2 loops can form due to incorrect configuration. Temporary Layer 2 loops can also form during convergence after a change in the network topology.
When a BGP router reports itself as the next hop, whether because of an explicit neighbor next-hop-self configuration or implicitly as a result of participating in an EBGP session, BGP allocates a new in label and adds an entry to the MPLS forwarding table, creating a label-to-next-hop mapping.
When a BGP router does not report itself as the next hop, whether because of an explicit neighbor next-hop-unchanged configuration or implicitly as a result of a participating in an IBGP session, BGP does not allocate a new in label. Instead, if the route is advertised as a labeled route, BGP uses the existing out label. This feature is used mainly on route reflectors.
You work for a service provider and need to build EVPN service which provides an active/active multihoming topology using a single CE at each site. In this scenario, which two statements are true? (Choose two.)
A. An Ethernet segment appears as a LAG to the CE device.
B. A backup designated forwarder is elected for forwarding BUM traffic to the CE device.
C. The Ethernet segment identifier must be an all zeros identifier.
D. A designated forwarder is elected for forwarding BUM traffic to the CE device.
A: When a CE device is multihomed to two or more PE routers, the set of Ethernet links constitutes an Ethernet segment. An Ethernet segment appears as a link aggregation group (LAG) to the CE device .
B: When a CE device is multihomed to two or more PE routers, either one or all of the multihomed PE routers are used to reach the customer site depending on the multihoming mode of operation. The PE router that assumes the primary role for forwarding BUM traffic to the CE device is called the designated forwarder (DF).
C: An Ethernet segment must have a unique nonzero identifier, called the Ethernet segment identifier (ESI). The ESI is encoded as a 10 octet integer.
Which two statements are true regarding the CSPF algorithm? (Choose two.)
A. The selected path for a given LSP is passed to the TED in the form of an ERO.
B. LSPs with lower numerical setup priorities are computed before LSPs with higher setup priority values.
C. The selected path for a given LSP is passed to RSVP in the form of an ERO.
D. LSPs with higher numerical setup priorities are computed before LSPs with lower setup priority values.
The CSPF algorithm first calculates the highest-priority LSP (the one with the lowest setup priority value). Do I need to enable CSPF to control where to send my traffic? The answer is no. You can manually configure an Explicit Route Objects (ERO) list, and let RSVP doing the job. In the presence of the ERO object, the RSVP Path messages will follow the path specified, thus the Resv messages carrying the labels in the opposite direction.
You have a strict-high queue configured. You notice that under bursty traffic conditions, there are tail drops on the strict-high queue. Which action would solve this problem?
A. Assign a policer on ingress to assign a low packet loss priority to the strict-high queue.
B. Decrease the buffer size of the strict-high queue.
C. Assign a policer on egress to assign a low packet loss priority to the strict-high queue.
D. Increase the buffer size of the strict-high queue.
A queue with strict-high priority is assured unlimited transmission bandwidth but is not actually assigned a large delay buffer. Not configuring a transmit-rate or an explicit buffer-size on a strict-high priority queue only ensures that the queue gets assigned a default minimum delay buffer, making it possible, under bursty conditions, to see tail-drops on strict-high priority queues. Assigning a small transmit-rate or an explicit temporal or percentage buffer-size to the queue ensures that the queue has a large enough buffer to hold bursts and protect against tail-drops.
Thanks for reading the newest JN0-661 exam dumps! We recommend you to try the PREMIUM PassLeader JN0-661 dumps in VCE and PDF here: https://www.passleader.com/jn0-661.html (138 Q&As Dumps)
Also, you can download that PassLeader JN0-661 braindumps from Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpUmhnOVlfdm5YMjQ (FREE VERSION!!!)