VXLAN Flashcards
Witch two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)
A. Use a single trunk link to an external Layer2 switch.
B. Use a virtual switch provided by the hypervisor.
C. Use a virtual switch running as a separate virtual machine.
D. Use a single routed link to an external router on stick.
E. Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines.
Correct Answer: AB
In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints?
https://itexamanswers.net/ccie-ccnp-350-401-encor-dumps-full-questions-vce-pdf.html
A. DHCP
B. VXLAN
C. SXP
D. LISP
Correct Answer: D
in a Cisco SD-Access solution, what is the role of the Identity Service Engine?
A. It is leveraged for dynamic endpoint to group mapping and policy definition.
B. It provides GUI management and abstraction via apps that share context.
C. it is used to analyze endpoint to app flows and monitor fabric status.
https://itexamanswers.net/ccie-ccnp-350-401-encor-dumps-full-questions-vce-pdf.html
D. It manages the LISP EID database.
Correct Answer: A
On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric? A. VXLAN B. LISP C. Cisco TrustSec D. IS-IS
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
The tunneling technology used for the fabric data plane is based on Virtual Extensible LAN (VXLAN). VXLAN encapsulation is UDP based,
meaning that it can be forwarded by any IP-based network (legacy or third party) and creates the overlay network for the SD-Access fabric.
Although LISP is the control plane for the SD-Access fabric, it does not use LISP data encapsulation for the data plane; instead, it uses VXLAN encapsulation because it is capable of encapsulating the original Ethernet header to perform MAC-in-IP encapsulation, while LISP does not.
Using VXLAN allows the SD-Access fabric to support Layer 2 and Layer 3 virtual topologies (overlays) and the ability to operate over any IPbased network with built-in network segmentation (VRF instance/VN) and built-in group-based policy