
While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command. The ttl-security hops 2 command sets the accepted Time to Live (TTL) value for BGP packets received from a neighbor. It is used to protect against BGP session hijacking by ensuring that BGP packets come from an expected number of router hops away. In this case, the command specifies that BGP packets from neighbor 2.2.2.2 must have a TTL of at least 253, which means they can only be 1 hop away (255 - 2 = 253) to be accepted. Reference: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) training material1.After you issue this command, which BGP packets does the PE accept?
wants the service provider to connect the company’s two sites across the service provider core. To meet
service requirements, the service provider must extend the layer 2 domain between the company’s two
locations. Which configuration must the engineer apply to implement an attachment circuit between the two
sites using a VLAN tag of 12?
Refer to the exhibit. Company A is running OSPF within its network, comprised of routers R2, R3, R4, andR5 and consisting of two areas. Company A just acquired Company B, which uses EIGRP on its own R1. R1has several routes in its routing table. The network engineering team at Company A needs access to theCompany B network to manage network devices there, but each company will otherwise operateindependently. R2 will serve as the ASBR between the two networks. Which action must the team take toreduce the number of EIGRP routes received on R2 and include only the necessary routes in the routing table?

© Copyrights DumpsEngine 2026. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsEngine.
