You are asked to interconnect Iwo data centers using a method that provides EVPN Type 2 connectivity, is highly scalable, and limits VXLAN tunnels between border leafdevices. What will satisfy these requirements?
A. over the top full-mesh interconnect
B. EVPN Type 2 stretch
C. IP VPN
D. Type 2 seamless stitching
Explanation:
In a Data Center Interconnect (DCI) scenario, the primary goal is to provide Layer 2 extension (Type 2 routes) while maintaining a scalable control plane. Seamless stitching satisfies these requirements by acting as a gateway function on border leaf or spine devices.
Instead of creating a flat, end-to-end VXLAN tunnel between every leaf in both data centers, seamless stitching terminates the local EVPN-VXLAN domain at the border and "stitches" it to a separate DCI EVPN-VXLAN domain. This architecture limits the number of VXLAN tunnels to only those between border devices and prevents the "tunnel explosion" that occurs in full-mesh designs. It provides a clean demarcation point for troubleshooting and policy enforcement, making it the most scalable choice for Type 2 connectivity.
Analysis of Incorrect Options
A. Over the top full-mesh interconnect:
This method requires every leaf in DC1 to establish a VXLAN tunnel with every leaf in DC2. While it provides Type 2 connectivity, it is not scalable due to the $N^2$ tunnel requirement and high control plane overhead on every leaf node.
B. EVPN Type 2 stretch:
This is a general description of the desired outcome (extending MAC/IP reachability) rather than a specific architectural method. Without the stitching mechanism, a standard "stretch" usually implies a non-scalable, single-domain extension.
C. IP VPN:
While highly scalable, IP VPNs (L3VPNs) are inherently Layer 3 constructs. They are used for routing IP prefixes (Type 5) and do not natively provide the Type 2 (MAC/IP) connectivity required to bridge Layer 2 broadcast domains without additional encapsulation layers.
References
Juniper Networks TechLibrary: "User Guide: EVPN-VXLAN Seamless Stitching."
Juniper Networks: "Data Center Interconnect Design Guide" (Section on EVPN-VXLAN DCI).
Your organization is implementing EVPN-VXLAN and requires multiple overlapping VLAN-IDs. You decide to use a routing-instance type mac-vrf to satisfy this request. Which two statements are correct in this scenario? (Choose two.)
A. Host-facing interfaces must be configured using a service-provider style configuration.
B. Host-facing interfaces must be configured using enterprise-style configuration.
C. Spine-facing interfaces must be configured using an enterprise-styleconfiguration.
D. The routing-instance service type can be VLAN-based.
Explanation:
Understanding the Scenario:
EVPN-VXLAN deployments often involve scenarios where multiple tenants or applications require overlapping VLAN IDs, which can be managed using the mac-vrf routing instance type. This allows you to segregate traffic within the same VLAN ID across different tenants.
Host-facing Interface Configuration:
A. Host-facing interfaces must be configured using a service-provider style configuration:
This is correct. In mac-vrf configurations, host-facing interfaces (those connecting end devices) typically follow a service-provider style configuration, where each customer or tenant's traffic is isolated even if overlapping VLAN IDs are used.
B. Host-facing interfaces must be configured using enterprise-style configuration:
This is incorrect for mac-vrf instances because enterprise-style configurations are more common in simpler, less segmented networks.
Routing Instance Service Type:
D. The routing-instance service type can be VLAN-based:
This is correct. The service type in mac-vrf can indeed be VLAN-based, which is particularly useful in scenarios where VLAN ID overlap is needed between different tenants or services.
References:
The mac-vrf instance type is powerful for handling complex multi-tenant environments in EVPN-VXLAN, especially when dealing with overlapping VLAN IDs across different segments of the network.
You are asked for TX and RX traffic statistics for each interface to which an application server is attached. The statistics need to be reported every five seconds. Using the Junos default settings, which telemetry method would accomplish this request?
A. gNMI
B. SNMP
C. Native Sensors
D. OpenConfig
Explanation:
The key phrase in the question is "using the Junos default settings."
Native Sensors refer to Juniper's built-in telemetry sensors that can be configured via the Junos CLI to stream data at intervals as low as 1 second (or 5 seconds as requested).
When you configure a native sensor with a reporting-rate of 5 seconds, Junos will stream the interface statistics without needing external protocols like gNMI or SNMP polling.
This method is lightweight, supported by default on many Juniper devices (especially for data center platforms like QFX/EX series), and does not require additional software agents or complex gRPC setups.
Why gNMI (A) is incorrect in this context?
gNMI is highly capable of 5-second streaming, but it is not enabled by default. It requires explicit configuration of gRPC services, certificates, and often additional licensing or system processes.
The question specifically says "using the Junos default settings" — gNMI is not active by default.
Why SNMP (B) is incorrect?
SNMP polling at 5-second intervals is possible but impractical and not a default configuration. Default SNMP polling intervals are much longer (e.g., 30–60 seconds). High-frequency SNMP can overwhelm CPU and is not recommended.
Why OpenConfig (D) is incorrect?
OpenConfig is a data model, not a telemetry method. It can be used with gNMI or other transports, but it is not a telemetry method by itself and not a default configuration.
Reference
From Juniper documentation on Junos Telemetry Interface (JTI):
"Native sensors are configured using the sensor statement at the edit services analytics hierarchy. You can specify a reporting rate (for example, reporting-rate 5) to stream data every 5 seconds. This capability is available in standard Junos OS without enabling gRPC services."
Which two statements are correct about an IP fabric? (Choose two.)
A. All leaf devices can use the same AS number in an IP fabric without making any adjustments to the EBGP configuration
B. The multipath multiple-as statement is required to enable ECMP if every device has a different AS number.
C. Only a single point to point EBGP session is required between peers in an IP fabric.
D. FBGP is only required to route mostrouting information to external devices outside the fabric.
Explanation:
In a standard 3-stage or 5-stage IP fabric, EBGP is the preferred routing protocol for the underlay due to its scalability and loop-prevention mechanisms.
B. multipath multiple-as:
By default, BGP only allows load balancing (ECMP) across paths learned from the same Autonomous System. In a common IP fabric design where every spine has one AS and every leaf has its own unique AS, a leaf device will receive routes to a destination from multiple spines (different ASNs). To utilize all available links and achieve hardware-level ECMP, the multipath multiple-as statement must be configured under the BGP hierarchy.
C. Single point-to-point EBGP session:
Unlike iBGP, which traditionally requires a full mesh or route reflectors, EBGP peers only require a single direct session between the physical interfaces of the leaf and spine. This simplifies the configuration and ensures that the physical topology matches the logical routing topology.
Analysis of Incorrect Options
A. All leaf devices can use the same AS number:
If all leaf devices use the same AS without adjustments, BGP's default loop prevention (AS_PATH check) will cause them to reject updates from each other. To make this work, you would need to use as-override or loops configurations; it is not possible "without making adjustments."
D. EBGP is only required for external routing:
This is incorrect. In a modern IP fabric (specifically a Clos architecture), EBGP is typically used as the underlay protocol to provide reachability for the VTEP addresses within the fabric itself, not just for external connectivity.
References
Juniper Networks TechLibrary: "Example: Configuring an EBGP Underlay for an EVPN-VXLAN Fabric."
Junos OS Routing Protocols Reference: "multipath (Protocols BGP)."
You are deploying an IP fabric using EBGP and notice that your leaf devices areadvertising and receiving all the routes. However, the routes are not installed in the routing table and are marked as hidden. Which two statements describe how to solve the issue? (Choose two.)
A. You need to configure as-override.
B. You need to configure a next-hop self policy.
C. You need to configure loops 2.
D. You need to configure multipath multiple-as.
Explanation:
Issue Overview:
The leaf devices in an IP fabric using eBGP are advertising and receiving all routes, but the routes are not being installed in the routing table and are marked as hidden. Thistypically indicates an issue with the BGP configuration, particularly with next-hop handling or AS path concerns.
Corrective Actions:
B. You need to configure a next-hop self policy:
This action ensures that the leaf devices modify the next-hop attribute to their own IP address before advertising routes to their peers. This is particularly important in eBGP setups where the next-hop may not be directly reachable by other peers.
D. You need to configure multipath multiple-as:
This setting allows the router to accept multiple paths from different autonomous systems (ASes) and use them for load balancing. Without this, the BGP process might consider only one path and mark others as hidden.
Incorrect Statements:
A. You need to configure as-override:
AS-override is used to replace the AS number in the AS-path attribute to prevent loop detection issues in MPLS VPNs, not in a typical eBGP IP fabric setup.
C. You need to configure loops 2:
There is no specific BGP command loops 2 relevant to resolving hidden routes in this context. It might be confused with allowas-in, which is used to allow AS path loops under certain conditions.
References:
Proper BGP configuration is crucial in IP fabrics to ensure route propagation and to prevent routes from being marked as hidden. Configuration parameters like next-hop self and multipath multiple-as are common solutions to ensure optimal route installation and load balancing in a multi-vendor environment.
You manage an IP fabric with an EVPN-VXLAN overlay. You have multiple tenants separated using multiple unique VRF instances. You want to determine the routing information that belongs in each routing instance's routing table. In this scenario, which property is used for this purpose?
A. the VRF target community
B. the routing instance type
C. the VRF table label
D. the route distinguisher value
Explanation:
In an EVPN-VXLAN environment with multiple tenants (multi-tenancy), the Route Target (RT) extended community is the mechanism used to control the import and export of routing information between the EVPN control plane and the specific VRF routing instances.
When a PE (leaf) device advertises a route, it attaches an export Route Target specific to that VRF. Receiving leaf devices check the attached RT against their local import policies. If the RT matches the import configuration of a local VRF, the route is placed into that instance’s routing table. This process ensures logical separation and determines exactly which routing information belongs in which tenant's table.
Analysis of Incorrect Options
B. the routing instance type:
While the instance type must be set to vrf to support a Layer 3 VPN/EVPN overlay, the type itself does not determine which specific routes are populated into the table; it only defines the behavior and capabilities of the instance.
C. the VRF table label:
The VRF table label (or VXLAN Network Identifier/VNI in this context) is used in the data plane to encapsulate and direct traffic to the correct routing instance upon arrival at a PE. It is an identifier for forwarding, not for the control plane selection of routing information.
D. the route distinguisher (RD) value:
The RD is used to make IP prefixes unique within the BGP control plane (turning a standard IPv4 prefix into a unique VPN-IPv4 or EVPN route). While essential for distinguishing between identical prefixes from different tenants, it is not used to decide which VRF a route should be imported into.
References
Juniper Networks TechLibrary: "Understanding EVPN Route Targets and Route Distinguishers."
RFC 7432:"BGP MPLS-Based Ethernet VPN" (Section on Route Target usage).
You are adding a server lo a tenant's network within your data center and must limit access to a specific traffic type within the tenant network without pushing all tenant traffic through a firewall. What will satisfy this requirement?
A. Use route leaking with EVPN and a routing policy.
B. Use filter-based forwarding.
C. Put the new server on a unique subnet within the tenant's network.
D. Use a static route in the tenant VRF with a firewall as the next hop for traffic to the new server.
Explanation:
Filter-Based Forwarding (FBF) allows you to classify traffic based on specific criteria (such as source/destination IP or specific traffic type/protocol) and steer that specific traffic to a different next-hop or routing instance.
In this scenario, FBF satisfies the requirement because it provides granular control. You can apply a firewall filter to the interface where the server is attached that identifies only the "specific traffic type" you wish to secure. That specific traffic is then redirected to a firewall (the next hop), while all other tenant traffic continues to be forwarded normally through the standard routing table. This avoids the inefficiency of "hairpinning" or "service chaining" the entire tenant's traffic through the firewall.
Analysis of Incorrect Options
A. Use route leaking with EVPN and a routing policy:
Route leaking is typically used to share reachability between different VRFs (e.g., sharing a shared services VRF with a tenant VRF). It does not provide the granular, protocol-level traffic steering required to isolate a "specific traffic type."
C. Put the new server on a unique subnet within the tenant's network:
While placing the server on a unique subnet allows for subnet-level routing, standard routing still forwards all traffic for that subnet the same way. To restrict access to a specific traffic type (like allowing HTTP but inspecting SSH), you would still need an additional mechanism like a filter or a gateway.
D. Use a static route in the tenant VRF with a firewall as the next hop:
A static route is based solely on the destination IP address. This would force all traffic destined for that server to go through the firewall, which violates the requirement to only limit a "specific traffic type."
References
Juniper Networks TechLibrary: "Configuring Filter-Based Forwarding (Policy-Based Routing)."
Junos OS Feature Guide: "Routing Policies, Firewall Filters, and Traffic Policers."
You are selling up an EVPN-VXLAN architecture (or your new data center. thisinitial deployment will be less than 50 switches: however, it could scale up to 250 switches over time supporting 1024 VLANs. You are still deciding whether to use symmetric or asymmetric routing. In this scenario, which two statements are correct? (Choose two.)
A. Symmetric routing needs an extra VLAN with an IRB interface for each L3 VRF instance.
B. Asymmetric routing is easier lo monitor because of the transit VNI.
C. Symmetric routing supports higher scaling numbers.
D. Asymmetric routing routes traffic on the egress switch.
Explanation:
Symmetric vs. Asymmetric Routing in EVPN-VXLAN:
Symmetric Routing:Traffic enters and exits the VXLAN network through the same VTEP, regardless of the source or destination. This approach simplifies routing decisions, especially in large networks, and is generally more scalable.
Asymmetric Routing:The routing occurs on the egress VTEP. This method can be simpler to deploy in smaller environments but becomes complex as the network scales, particularly with larger numbers of VNIs and VLANs.
Correct Statements:
C. Symmetric routing supports higher scaling numbers:
Symmetric routing is preferred in larger EVPN-VXLAN deployments because it centralizes routing decisions, which can be more easily managed and scaled.
D. Asymmetric routing routes traffic on the egress switch:
This is accurate, as asymmetric routing means the routing decision is made at the final hop, i.e., the egress VTEP before the traffic reaches its destination.
Incorrect Statements:
A. Symmetric routing needs an extra VLAN with an IRB interface for each L3 VRF instance:
This is not accurate. Symmetric routing does not require an extra VLAN per VRF; rather, it uses the same VLAN/VNI across the network, simplifying routing and VLAN management.
B. Asymmetric routing is easier to monitor because of the transit VNI:
Asymmetric routing is not necessarily easier to monitor; in fact, it can add complexity due to the split routing logic between ingress and egress points.
References:
The choice between symmetric and asymmetric routing in an EVPN-VXLAN environment depends on network size, complexity, and specific operational requirements. Symmetric routing is generally more scalable and easier to manage in large-scale deployments.
In your EVPN-VXAN environment, you want to prevent a multihomed server from receiving multiple copies ofBUM traffic in active/active scenarios. Which EVPN route type would satisfy this requirement?
A. Type 8
B. Type 7
C. Type 4
D. Type 5
Explanation:
In an EVPN-VXLAN multihoming environment (Active/Active), Type 4 routes (Ethernet Segment routes) are used to perform Designated Forwarder (DF) Election.
BUM (Broadcast, Unknown Unicast, and Multicast) traffic must only be forwarded to a multihomed device by one of the connected switches to prevent loops and duplicate packets. When multiple leaf devices are connected to the same server via an Ethernet Segment (ES), they exchange Type 4 routes to discover each other. Based on the information in these routes, the leaf devices run a DF election algorithm. The device elected as the Designated Forwarder for a specific VLAN/VNI is the only one authorized to forward BUM traffic to the server, while the Non-Designated Forwarders (Non-DFs) drop such traffic to avoid duplicates.
Analysis of Incorrect Options
A. Type 8:
In the EVPN standard, Type 8 routes are typically associated with IGMP/MLD Join synchronization. While related to multicast, they are not the primary mechanism for the initial DF election that prevents basic BUM duplication in multihoming.
B. Type 7:
Type 7 routes are used for IGMP/MLD Leave synchronization to ensure that multicast state is consistent across multihomed peers.
D. Type 5:
Type 5 routes are IP Prefix routes. These are used to advertise Layer 3 reachability (routing) between different subnets or VRFs within the EVPN fabric and have no role in Layer 2 BUM traffic management or DF election.
References
Juniper Networks TechLibrary: "EVPN Type 4 Routes and Designated Forwarder Election."
RFC 7432: "BGP MPLS-Based Ethernet VPN" (Section 8.5: Designated Forwarder Election).
What are three actions available tor MAC move limiting? (Choose three.)
A. drop
B. filter
C. enable
D. log
E. shutdown
Explanation:
MAC Move Limiting:
MAC move limiting is a security feature used in network switches to detect and mitigate rapid changes in MAC address locations, which could indicate a network issue or an attack such as MAC flapping or spoofing.
When a MAC address is learned on a different interface than it was previously learned, the switch can take various actions to prevent potential issues.
Available Actions:
A. drop:This action drops packets from the MAC address if it violates the move limit, effectively blocking communication from the offending MAC address.
D. log:This action logs the MAC move event without disrupting traffic, allowing network administrators to monitor and investigate the event.
E. shutdown:This action shuts down the interface on which the MAC address violation occurred, effectively stopping all traffic on that interface to prevent further issues.
Other Actions (Not Correct):
B. filter:Filtering is not typically associated with MAC move limiting; it generally refers to applying ACLs or other mechanisms to filter traffic.
C. enable:This is not an action related to MAC move limiting, as it does not represent a specific reaction to a MAC move event.
References:
MAC move limiting is crucial for maintaining network stability and security, particularly in environments with dynamic or large-scale Layer 2 networks where MAC addresses might frequently change locations.
You are preparing an sFlow monitoring system configuration. In this scenario, what Information will be included in the datagram sent to the sFlow collector? (Choose two.)
A. the interlace through which the packets entered the agent
B. the sending device's serial number
C. the CRC from the sampled packet
D. the source and destination VLAN for sampled packets
Explanation:
sFlow is a sampling technology that provides a continuous stream of flow samples and interface counters to a collector. When a packet is sampled by the sFlow agent (the switch), the agent creates an sFlow datagram containing metadata about that packet.
A. Interface Information:
sFlow datagrams include the input interface (ingress) and output interface (egress) indices. This is critical for the collector to map traffic flows to specific physical or logical ports on the network device.
D. VLAN Information:
The sFlow agent provides Layer 2 header information, which includes the source VLAN (the VLAN the packet arrived on) and the destination VLAN (where the packet was forwarded). This allows the monitoring system to analyze traffic patterns across different segments of the IP fabric.
Analysis of Incorrect Options
B. The sending device's serial number:
While the sFlow datagram includes the Agent IP address to identify which device sent the data, it does not include hardware-specific identifiers like the chassis serial number.
C. The CRC from the sampled packet:
sFlow typically takes a "snapshot" of the packet header (usually the first 128 bytes). During this process, the original frame's Cyclic Redundancy Check (CRC) is stripped or ignored because the focus is on the header data for traffic analysis, not on validating the frame's integrity for the collector.
References
Juniper Networks TechLibrary: "Configuring sFlow Technology for Network Monitoring."
sFlow.org: "RFC 3176 - sFlow: A Method for Monitoring Traffic in Switched and Routed Networks."
You are asked to deploy 100 QFX Series devices using ZTP Each OFX5120 requires a different configuration. In this scenario, what are two components that you would configure on the DHCP server? (Choose two.)
A. the IP address of the FTP server
B. the MAC address for each OFX5120
C. the MAC address of the FTP server
D. the management IP address for each OFX5120
Explanation:
Zero Touch Provisioning (ZTP) relies on the DHCP process to provide a boot file and configuration to a new device. When deploying a large number of devices where each requires a unique configuration, the DHCP server must be able to distinguish between them to assign the correct parameters.
B. The MAC address:
To ensure that each specific QFX5120 receives its unique configuration file, the DHCP server uses the device's MAC address (or Client ID) as a unique identifier. This allows the administrator to create "static reservations" or "host statements" in the DHCP configuration.
D. The management IP address:
Within these host statements, the DHCP server is configured to provide a specific management IP address to each device. By mapping a specific MAC address to a specific IP, the ZTP process ensures the device can be reached for further management and that it downloads the correct configuration file (often named based on the IP or hostname provided).
Analysis of Incorrect Options
A. The IP address of the FTP server:
While the DHCP server does need to provide the location of the file server (using DHCP Option 66 or 150), this is typically a global option for the entire scope, not a unique component per-device that distinguishes 100 different configurations.
C. The MAC address of the FTP server:
The DHCP client (the QFX) needs the IP address of the FTP server to initiate a download. It does not need the FTP server's MAC address, as standard routing/ARP handles Layer 2 resolution once the IP is known.
References
Juniper Networks TechLibrary: "Zero Touch Provisioning (ZTP) Overview."
Junos OS Installation and Upgrade Guide: "Components of the ZTP Environment."
| Page 1 out of 6 Pages |
| 12 |
Real-World Scenario Mastery: Our JN0-683 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Data Center Professional (JNCIP-DC) Exam exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive JN0-683 practice exam questions pool covering all topics, the real exam feels like just another practice session.