Jump to content
  • Create New...


  • Posts

  • Joined

About thomisus

Recent Profile Visitors

3,806 profile views

thomisus's Achievements

Grand Master

Grand Master (14/14)

  • One Year In
  • Well Followed Rare
  • One Month Later
  • Posting Machine Rare
  • Reacting Well

Recent Badges



  1. have look at these questions, if you have any comments please share An engineer must advertise a selection of external networks learned from a BGP neighbor into the ACI fabric. Which L3Out subnet configuration option creates an inbound route map for route filtering? A. External Subnets for the External EPG B. Shared Route Control Subnet C. Import Route Control Subnet D. Shared Security Import Subnet An engineer must set up a Cisco ACI fabric to send Syslog messages related to hardware events, such as chassis line card failures. The messages should be sent to a dedicated Syslog server. Where in the Cisco APIC should the policy be configured to meet this requirement? A. uni/tn-common/monepg-default B. uni/infra/monifra-default C. uni/fabric/monfab-default D. uni/fabric/moncommon An engineer must implement management policy and data plane separation in the Cisco ACI fabric. Which ACI object must be created in Cisco APIC to accomplish this goal? A. Application profile B. Tenant C. Contract D. Bridge domain An engineer wants to monitor all configuration changes, threshold crossing, and link-state transitions in a Cisco ACI fabric. Which action must be taken to receive the required messages? A. Add Faults and Events to the monitor policy. B. Add Session Logs and Audit Logs to the monitor policy. C. Include Audit Logs and Events in the Syslog source policy. D. Include Events and Session Logs in the Syslog source policy. An organization has encountered many STP-related issues in the past due to failed hardware components. They are in the process of long-term migration to a newly deployed ACI fabric. Senior engineers are worried that spanning-tree loops in the existing network may be extended to the ACI fabric. Which feature must be enabled on the ACI leaf ports to protect the fabric from spanning-tree loops? A. BPDU Guard B. per-VLAN MCP C. Storm Control D. BPDU Filter A network engineer must design a method to allow the Cisco ACI to redirect traffic to the firewalls. Only traffic that matches specific L4-L7 policy rules should be redirected. The load must be distributed across multiple firewalls to scale the performance horizontally. Which action must be taken to meet these requirements? A. Configure ACI Service Graph with Unidirectional PBR. B. Implement ACI Service Graph with GIPo. C. Implement ACI Service Graph Two Nodes with GIPo. D. Configure ACI Service Graph with Symmetric PBR. An engineer created two interface protocol policies called Pol_CDP40275332 and Pol_LLDP46783451. The policies must be used together in a single policy. Which ACI object must be used? A. interface policy group B. switch policy group C. switch profile D. interface profile A systems engineer is implementing the Cisco ACI fabric. However, the Server2 information is missing from the Leaf 101 endpoint table and the COOP database of the spine. The requirement is for the bridge domain configuration to enforce the ACI fabric to forward the unicast packets generated by Server1 destined to Server2. Which action must be taken to meet these requirements? A. Enable ARP Flooding B. Set L2 Unknown Unicast to Flood C. Set IP Data-Plane Learning to No D. Enable Unicast Routing An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action should the engineer take to assign the prefix to the class ID of the external Endpoint Group? B9670B295EC4724B7AC7AF37296A4809 A. Enable the Export Route Control Subnet for the External Endpoint Group flag. B. Enable an L3Out with Shared Route Control Subnet. C. Configure subnets with the External Subnets for External EPG flag enabled. D. Configure subnets with the Import Route Control Subnet flag enabled. An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change notification message is received in an MST domain. Which three steps are required to accomplish this goal? (Choose three.) A. Enable the BPDU interface controls under the spanning tree interface policy. B. Configure a new STP interface policy. C. Bind the spanning tree policy to the switch policy group. D. Associate the STP interface policy to the appropriate interface policy group. E. Create a new region policy under the spanning tree policy. F. Map VLAN range to MAT instance number. A Cisco ACI bridge domain and VRF are configured with a default data-plane learning configuration. Which two endpoint attributes are programmed in the leaf switch when receiving traffic? (Choose two.) A. Remote MAC, IP B. Remote Subnet C. Local IP, not MAC D. Local MAC, IP E. Local Subnet F. Remote IP An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented from taking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these requirements? A. Set L2 Unknown Unicast to Flood. B. Set L2 Unknown Unicast to Hardware Proxy. C. Disable Unicast Routing. D. Enable ARP Flooding. An engineer must configure a group of servers with a contract that uses TCP port 80. The EGP that contains the web servers requires an external Layer 3 cloud to initiate communication. Which action must be taken to meet these requirements? A. Configure the EGP as a provider and L3 out as consumer of the contract. B. Configure OSPF to exchange routes between the L3 out and EGP. C. Configure a taboo contract and apply it to the EPG. D. Configure the EPG as a consumer and L3 out as a provider of the contract. The unicast routing feature is enabled on the bridge domain. Which two conditions enable the Cisco ACI B9670B295EC4724B7AC7AF37296A4809 leaf to learn a source IP as a local endpoint? (Choose two.) A. Through Ethernet traffic received in a bridge domain. B. IP traffic routed through an SVI. C. Through VXLAN traffic received on the uplink. D. IP traffic routed through a Layer 3 Out. E. Through ARP received on an SVI. When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint? A. When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out EPG subnet range. B. When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge domain subnets range. C. When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out EPG subnet range. D. When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge domain subnets range. The company ESXi infrastructure is hosted on the Cisco UCS-B Blade Servers. The company decided to take advantage of ACI VMM integration to enable consistent enforcement of policies across virtual and physical workloads. The requirement is to prevent the packet loss between the distributed virtual switch and the ACI fabric. Which setting must be implemented on a vSwitch policy to accomplish this goal? A. Static Channel B. MAC Pinning C. LACP D. LLDP An engineer is configuring ACI VMM domain integration with Cisco UCS-B Series. Which type of port channel policy must be configured in the vSwitch policy? A. LACP Active B. MAC Pinning C. LACP Passive D. MAC Pinning-Physical-NIC-load In-band is currently configured and used to manage the Cisco ACI fabric. The requirement is for leaf and spine switches to use out-of-band management for NTP protocol. Which action accomplishes this goal? A. Select Out-of-Band as Management EPG in the default DateTimePolicy. B. Create an Override Policy with NTP Out-of-Band for leaf and spine switches. C. Change the interface used for APIC external connectivity to ooband. D. Add a new filter to the utilized Out-of-Band-Contract to allow NTP protocol. An administrator must migrate the vSphere Management VMkernel of all ESXi hosts in the production cluster from the standard default virtual switch to a VDS that is integrated with APIC in a VMM domain. Which action must be completed in this scenario? A. The Management VMkernel EPG resolution must be set to Pre-Provosion. B. The administrator must create an in-band VMM Management EPG before performing the migration. C. The administrator must set the Management VMkernel BD resolution immediacy to On-Demand. D. The VMkernel Management BD must be located under the Management Tenant. A customer implements RBAC on a Cisco APIC using a Windows RADIUS server that is configured with network control policies. The APIC is as follows: Tenant = TenantX Security Domain = Tenantx-SD User = X The customer requires User X to have access to TenantX only, without any extra privilege in the Cisco ACI fabric domain. Which Cisco AV pair must be implemented on the RADIUS server to meet these requirement? A. shell:domains = TenantX-SD/fabric-admin/,common//read-all B. shell:domains = TenantX-SD/tenant-admin B9670B295EC4724B7AC7AF37296A4809 C. shell:domains = TenantX-SD/tenant-ext-admin/,common//read-all D. shell:domains = TenantX-SD/tenant-admin/,common//read-all An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must be transferred over a secure and encrypted transport. The backup file must contain all user and password related information. The engineer also wants to process and confirm the backup file validity by using a Python script. This requires the data structure to have a format similar to a Python dictionary. Which configuration set must be used to meet these requirements? A. Under the Create Remote location settings, select Protocol: FTP Under the Export policy, select - Format: XML - Modify Global AES Encryption Settings: Enabled B. Under the Create Remote location settings, select Protocol: FTP Under the Export policy, select - Format: XML - Modify Global AES Encryption Settings: Disabled C. Under the Create Remote location settings, select Protocol: SCP Under the Export policy, select - Format: JSON - Modify Global AES Encryption Settings: Disabled D. Under the Create Remote location settings, select Protocol: SCP Under the Export policy, select - Format: JSON - Modify Global AES Encryption Settings: Enabled An application team tells the Cisco ACI network administrator that it wants to monitor the statistics of the unicast and BUM traffic that are seen in a certain EPG. Which statement describes the collection statistics? A. All EPGs in the Cisco ACI tenant object must be enabled for statistics to be collected. B. Cisco ACI does not capture statistics at the EPG level. Only statistics that pass through ACI contracts can be monitored. C. EPG statistics can be collected only for VMM domains. If a physical domain exists, statistics are not collected. D. The collection of statistics is enabled on the EPG level by enabling the statistics for unicast and BUM traffic. Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod environment? A. OSPF B. IS-IS C. BGP D. EIGRP An engineer must deploy Cisco ACI across 10 geographically separated data centers. Which ACI site deployment feature enables the engineer to control which bridge domains contain Layer 2 flooding? A. GOLF B. Multi-Site C. Multi-Pod D. Stretched Fabric
  2. do you have any links about these tutorials? any names, any vendor?
  3. There were no books directly named as CCNP SP but there are bunch of books related to service provider track. no new ciscopress book has been released lately. If you want to follow that track, I recommend you to watch CCNA level SPNGN1&2 courses first.
  4. direct links, not zippy 🙂 [Hidden Content]
  5. [Hidden Content] the images mentioned in the link above is available in these torrents 213GB + 45GB [Hidden Content] EVE-NG - Cisco, Juniper, Palo Alto - 213GB.torrent EVE-NG - Cisco, Juniper, Palo Alto - 213GB.torrent
  6. My funny company policy does not let me use gdrive or torrent.
  7. New versions are not available for free. I will upload if I can newer ones.
  8. I am trying to upload at my spare time at work. These are from my archive with old and new materials. Some old materials are really good to follow, some are not. I have downloaded this dump from tutdl and i do not know if it is updated or not. That site states it is actual test latest dumps. As you follow, dumps have been too dynamic even ballistic to follow. I recommend you to follow chinese sites. As manu times i stated under my shares, i have been banned manu times from mega. And from my working place, torrent or gdrive are not allowed. I used to use anonfiles in CC before but anonfiles are not available so i prefer zippyshare. It is fast to upload. Besides i recommended to use jdownloader. I also wanted help from those good souls who can download materials to upload to mega or so. If you warn me about the materials i upload, i will do corrections. Happy learning to you all.