Huawei Related Exams
H12-831_V1.0 Exam
The figure shows the logical network architecture of a migration project. The purpose of the migration is to enable terminals in different geographical locations to communicate with each other and deploy the gateway of the terminals on the PE routers.
After the migration is complete, which of the following methods can be used by network engineers to preliminarily check the network connectivity?

Options:
On the OSPF network shown in the figure, area 1 is an NSSA, area 2 is a common area, and R4 imports an external route 10.0.4.4/32. The router ID of each router is 10.0.X.X, where X is the router number. If the asbr-summary 10.0.4.0 255.255.255.0 command is run in the OSPF processes of R1 and R3, which of the following routers have the route 10.0.4.0/24 in their routing tables?

To protect a device against the attacks of forged BGP messages, you can configure GTSM to check whether the TTL value in the IP message header is within the specified range. If the peer x.x.x.x valid-ttl-hops 100 command is configured on a device, the valid TTL value range of the detected message is [155, 255].