M-LAG configuration consistency check classifies device configurations into key configurations (Type 1) and common configurations (Type 2). This check can be performed in strict or loose mode based on the processing mode when key configurations are inconsistent. Which of the following statements is false about M-LAG configuration consistency check?
In loose mode, if Type 1 configurations of the two M-LAG member devices are inconsistent, the member interface on the M-LAG backup device is in Error-Down state and an alarm is generated, indicating that Type 1 configurations on the two devices are inconsistent.
If Type 1 configurations of the two M-LAG member devices are inconsistent, certain problems may occur, such as loops and long-period packet loss when the status is normal.
If Type 2 configurations of the two M-LAG member devices are inconsistent, the M-LAG running status may be abnormal. Compared with Type 1 configuration problems, Type 2 configuration problems are more likely to be detected and have less impact on the network.
If Type 2 configurations of the two M-LAG member devices are inconsistent, an alarm that indicates key and common configuration inconsistencies is generated.
To identify the false statement, we evaluate each option based on standard M-LAG documentation, such as Huawei’s and Arista’s guidelines, which are commonly referenced in HCIP-Data Center Network training.
Option A: In loose mode, if Type 1 configurations of the two M-LAG member devices are inconsistent, the member interface on the M-LAG backup device is in Error-Down state and an alarm is generated, indicating that Type 1 configurations on the two devices are inconsistent.
Evaluation: This statement is true. In loose mode, inconsistencies in Type 1 (key) configurations are still critical, as they can affect M-LAG operation. According toHuawei M-LAG Configuration Guide, when Type 1 configurations are inconsistent in loose mode, the system may place the member interface on the backup device into an Error-Down state and generate an alarm to alert administrators. This ensures that critical issues are flagged, even in loose mode, to prevent loops or packet loss.
Conclusion: True.
Option B: If Type 1 configurations of the two M-LAG member devices are inconsistent, certain problems may occur, such as loops and long-period packet loss when the status is normal.
Evaluation: This statement is true. Type 1 configurations are essential for M-LAG operation, and inconsistencies can lead to severe network issues. For example, mismatched LACP settings or VLAN mappings can create loops or cause packet loss, as noted inArista M-LAG Documentation. These problems can persist even when the system appears normal, making consistency checks critical for troubleshooting and O&M.
Conclusion: True.
Option C: If Type 2 configurations of the two M-LAG member devices are inconsistent, the M-LAG running status may be abnormal. Compared with Type 1 configuration problems, Type 2 configuration problems are more likely to be detected and have less impact on the network.
Evaluation: This statement is true. Type 2 (common) configurations, such as QoS or STP settings, are less critical but can still affect network performance. According toHuawei M-LAG Best Practices, Type 2 inconsistencies are often detected during consistency checks but have a lower impact on M-LAG operation compared to Type 1 issues. They are also more likely to be flagged during monitoring, as they are less severe and easier to resolve.
Conclusion: True.
Option D: If Type 2 configurations of the two M-LAG member devices are inconsistent, an alarm that indicates key and common configuration inconsistencies is generated.
Evaluation: This statement is false. While Type 2 (common) configuration inconsistencies are detected during consistency checks, they do not typically triggeralarms, especially alarms that specifically indicate both key and common configuration inconsistencies. According toHuawei M-LAG Configuration GuideandArista M-LAG Documentation, Type 2 inconsistencies may be logged or reported in system logs but are not severe enough to generate critical alarms unless they significantly impact network operation. Alarms are more commonly associated with Type 1 (key) configuration inconsistencies, as they pose a higher risk to M-LAG functionality.
Conclusion: False.
Which of the following servers are built into iMaster NCE-Fabric to provide related services? (Select All that Apply)
DNS server
RADIUS authentication server
DHCP server
Version file server
Huawei’s iMaster NCE-Fabric is an SDN controller for the CloudFabric Solution, providing network orchestration and management. It includes built-in servers to support its operations. Let’s evaluate each option:
A. DNS server:This is false. iMaster NCE-Fabric does not include a built-in DNS server; it relies on external DNS services for name resolution, configured during deployment.FALSE.
B. RADIUS authentication server:This is false. RADIUS authentication is typically handled by external AAA servers; iMaster NCE-Fabric integrates with them but does not embed a RADIUS server.FALSE.
C. DHCP server:This is true. iMaster NCE-Fabric includes a built-in DHCP server to assign temporary IP addresses during Zero Touch Provisioning (ZTP) or initial device configuration.TRUE.
D. Version file server:This is true. A version file server is built into iMaster NCE-Fabric to store and deliver software images or configuration files for device upgrades and management.TRUE.
Thus,C (DHCP server) and D (Version file server)are built into iMaster NCE-Fabric.References:Huawei CloudFabric Data Center Network Solution – iMaster NCE-Fabric Features; HCIP-Data Center Network Training – Controller Services.
Which of the following statements are true about the Easy mode? (Select All that Apply)
This mode has low networking requirements.
iMaster NCE-Fabric automatically generates configuration script files.
On iMaster NCE-Fabric, you need to manually create and configure fabric resource pools, managed devices, device groups, device roles, tenants, and VPCs one by one in the Configuration Wizard menu.
Layer 2 and Layer 3 basic services in a VPC are orchestrated on the Easy page.
TheEasy modein Huawei’s iMaster NCE-Fabric simplifies network deployment for basic VXLAN fabrics. Let’s evaluate each statement:
A. This mode has low networking requirements:This is true. Easy mode is designed for simple topologies (e.g., small spine-leaf networks) with minimal configuration complexity.TRUE.
B. iMaster NCE-Fabric automatically generates configuration script files:This is true. Easy mode automates script generation based on user inputs, reducing manual effort.TRUE.
C. On iMaster NCE-Fabric, you need to manually create and configure fabric resource pools, managed devices, device groups, device roles, tenants, and VPCs one by one in the Configuration Wizard menu:This is false. Easy mode automates these tasks, minimizing manual configuration compared to advanced modes.FALSE.
D. Layer 2 and Layer 3 basic services in a VPC are orchestrated on the Easy page:This is true. Easy mode supports automated orchestration of L2 (e.g., BDs) and L3 (e.g., gateways) services within a VPC.TRUE.
Thus,A, B, and Dare true statements about Easy mode.References:Huawei CloudFabric Data Center Network Solution – iMaster NCE-Fabric Easy Mode; HCIP-Data Center Network Training – Deployment Modes.
In the VPC interworking scenario, traffic is checked and filtered only by the firewall in the source or destination VPC.
TRUE
FALSE
In Huawei’s CloudFabric Solution, Virtual Private Clouds (VPCs) enable isolated network environments, and interworking scenarios involve traffic between VPCs. The statement claims that traffic is checked and filtered only by the firewall in the source or destination VPC. Let’s evaluate:
VPC Interworking:Traffic between VPCs can be routed via a gateway (e.g., a Layer 3 gateway or centralized router) and may involve multiple security checkpoints depending on the design. Firewalls can be deployed in the source VPC, destination VPC, or a centralized location (e.g., a service chain or border gateway).
Firewall Role:The statement implies exclusivity (only one firewall), but in practice, traffic may be filtered by firewalls at both ends, a centralized firewall, or additional security devices (e.g., VAS nodes) in the path. For example, inter-VPC traffic might pass through a firewall in the source VPC for egress filtering and another in the destination VPC for ingress filtering, or a shared firewall in a hub-and-spoke model. Huawei’s security architecture (e.g., with SecoManager) supports distributed or centralized filtering, not limited to a single VPC’s firewall.
The statement isFALSE (B)because traffic is not restricted to being checked and filtered only by the firewall in the source or destination VPC; multiple firewalls or security devices may be involved.References:Huawei CloudFabric Data Center Network Solution – VPC Interworking; HCIP-Data Center Network Training – Security Design.
Which of the following is not included in the physical architecture of a server?
Application
VMmonitor
OS
Hardware
The physical architecture of a server refers to the tangible and low-level components that constitute the server itself, distinct from logical or software layers. Let’s evaluate each option:
A. Application:Applications are software running on top of an operating system or virtual machine, not part of the server’s physical architecture. They belong to the logical or user layer, not the physical structure.Not Included.
B. VMmonitor (Hypervisor):Assuming “VMmonitor†refers to a hypervisor (e.g., KVM or Xen), it’s a software layer, but in Type-1 hypervisor scenarios, it runs directly on hardware, managing VMs. In Huawei’s context, it’s considered part of the server’s operational architecture when deployed physically.Included.
C. OS (Operating System):The OS (e.g., Linux, Windows) runs directly on server hardware or within a VM. In bare-metal servers, it’s a core component of the physical deployment.Included.
D. Hardware:Hardware (e.g., CPU, RAM, NICs, disks) is the foundational physical architecture of a server, providing the physical resources for all operations.Included.
Thus,A (Application)is not part of the physical architecture, as it’s a higher-level software entity, not a physical component.References:Huawei HCIP-Data Center Network Training – Server Architecture; FusionCompute Physical Architecture Overview.
Assume that a VXLAN tunnel is monitored on a Huawei CE series switch and that the tunnel status is Down or the tunnel fails to be dynamically established. In this scenario, which of the following statements are true about how to check the cause of the fault? (Select All that Apply)
Run the display vxlan statistics command to check the cause of the fault.
Run the display vxlan peer command to check the cause of the fault on the peer device of the tunnel.
Run the display vxlan troubleshooting command to check the causes of at most the latest five failures to dynamically establish a VXLAN tunnel.
Run the display vxlan troubleshooting command to check at most the latest five reasons why a VXLAN tunnel goes Down.
On Huawei CloudEngine (CE) series switches, VXLAN tunnel monitoring and troubleshooting involve specific commands to diagnose issues such as tunnel Down status or failed dynamic establishment. Let’s evaluate each option:
A. Run the display vxlan statistics command to check the cause of the fault:This command provides statistics on VXLAN tunnel traffic, including packet drops, encapsulation/decapsulation counts, and errors. It helps identify issues like misconfiguration or network congestion, making it a valid troubleshooting tool.TRUE.
B. Run the display vxlan peer command to check the cause of the fault on the peer device of the tunnel:This command displays information about VXLAN peers, including their IP addresses, VNIs, and reachability status. Checking the peer device’s status can reveal connectivity or configuration mismatches, aiding fault diagnosis.TRUE.
C. Run the display vxlan troubleshooting command to check the causes of at most the latest five failures to dynamically establish a VXLAN tunnel:This command logs and displays troubleshooting details, including the latest five failure reasons for dynamic tunnel setup (e.g., BGP EVPN issues or reachability problems). This is a standard feature on Huawei CE switches.TRUE.
D. Run the display vxlan troubleshooting command to check at most the latest five reasons why a VXLAN tunnel goes Down:This command also tracks reasons for tunnel Down events (e.g., underlay failure, peer unreachability), limited to the latest five incidents. This is consistent with Huawei’s troubleshooting capabilities.TRUE.
All optionsA, B, C, and Dare true, as they represent valid commands and approaches to troubleshoot VXLAN tunnel issues on Huawei CE switches.References:Huawei CloudEngine Series Switch Command Reference – VXLAN Commands; HCIP-Data Center Network Training – Troubleshooting VXLAN.
Which of the following statements is false about the overlay technology and VXLAN protocol?
A VXLAN tunnel endpoint that performs encapsulation is called a VNI.
VXLAN uses ECMP of the underlay network to improve network forwarding performance.
A VXLAN network is built based on UDP.
VXLAN expands the number of subnets to 16 million and supports multi-tenancy.
VXLAN is an overlay technology that encapsulates Layer 2 frames within UDP packets to create scalable virtual networks, widely used in Huawei’s data center architectures. Let’s evaluate each statement:
A. A VXLAN tunnel endpoint that performs encapsulation is called a VNI:This is incorrect. A VXLAN Tunnel Endpoint (VTEP) is the device (physical or virtual) that performs encapsulation and decapsulation. The VNI (VXLAN Network Identifier) is a 24-bit field in the VXLAN header that identifies the virtual network, not the endpoint.FALSE.
B. VXLAN uses ECMP of the underlay network to improve network forwarding performance:Equal-Cost Multi-Path (ECMP) routing in the underlay network allows VXLAN to distribute traffic across multiple paths, enhancing load balancing and performance. This is a standard feature in Huawei’s VXLAN implementations.TRUE.
C. A VXLAN network is built based on UDP:VXLAN encapsulates Ethernet frames within UDP packets (using port 4789), making it a UDP-based overlay protocol. This is a core characteristic of VXLAN.TRUE.
D. VXLAN expands the number of subnets to 16 million and supports multi-tenancy:With a 24-bit VNI, VXLAN supports up to 16 million (2^24) unique network identifiers, enabling extensive subnet segmentation and multi-tenancy, a key advantage over traditionalVLANs (4096 limit).TRUE.
Thus,Ais the false statement because a VTEP, not a VNI, is the tunnel endpoint that performs encapsulation.References:Huawei CloudFabric Data Center Network Solution – VXLAN Overview; HCIP-Data Center Network Training – VXLAN Protocol.
Which of the following are advantages of iMaster NCE-FabricInsight's telemetry-based performance metric collection? (Select All that Apply)
Efficient transmission
Quasi-real-time data collection
Intelligent data analysis and automated troubleshooting
One-off subscription and continuous data push
iMaster NCE-FabricInsight uses telemetry for performance metric collection, offering advanced monitoring in Huawei’s CloudFabric Solution. Let’s evaluate each option:
A. Efficient transmission:This is true. Telemetry uses streaming data (e.g., gRPC) to reduce overhead compared to traditional polling, enabling efficient transmission of metrics.TRUE.
B. Quasi-real-time data collection:This is true. Telemetry provides near-real-time data (e.g., sub-second updates), improving responsiveness over periodic SNMP polling.TRUE.
C. Intelligent data analysis and automated troubleshooting:This is false. While FabricInsight performs intelligent analysis, automated troubleshooting is a feature of the broader iMaster NCE platform, not specifically a telemetry advantage. Telemetry enables data collection, not the automation itself.FALSE.
D. One-off subscription and continuous data push:This is true. Telemetry operates on a subscription model where a one-time setup leads to continuous data push from devices, reducing manual intervention.TRUE.
Thus,A, B, and Dare advantages of telemetry-based performance metric collection.References:Huawei CloudFabric Data Center Network Solution – FabricInsight Telemetry; HCIP-Data Center Network Training – Performance Monitoring.
In EVPN Type 3 routes, the MPLS Label field carries a Layer 3 VNI.
TRUE
FALSE
EVPN (Ethernet VPN) is a control plane technology used with VXLAN in Huawei’s data center networks to provide Layer 2 and Layer 3 connectivity. EVPN routes are advertised using BGP, with different types serving specific purposes. Type 3 routes (Inclusive Multicast Ethernet Tag routes) are used for multicast or BUM (Broadcast, Unknown Unicast, Multicast) traffic handling in VXLAN networks.
MPLS Label Field:In MPLS (Multiprotocol Label Switching), the label field is used to identify the forwarding equivalence class (FEC) or virtual circuit. In EVPN with VXLAN, MPLS labels can be used in underlay networks, but VXLAN itself relies on a VNI (VXLAN Network Identifier) in the VXLAN header for overlay segmentation.
Layer 3 VNI:A Layer 3 VNI is associated with inter-subnet routing in EVPN, typically carried in Type 5 routes (IP Prefix routes) for Layer 3 forwarding. Type 3 routes, however, focus on multicast distribution and carry a Layer 2 VNI or multicast group information, not a Layer 3 VNI.
MPLS Label in Type 3 Routes:The MPLS label in Type 3 routes, if used, identifies the VXLAN tunnel or multicast group, not a Layer 3 VNI. The Layer 3 VNI is specific to Type 5 routes for routing between subnets, not Type 3’s multicast focus.
Thus, the statement isFALSE (B)because the MPLS Label field in EVPN Type 3 routes does not carry a Layer 3 VNI; it relates to Layer 2 multicast or tunnel identification.References:Huawei HCIP-Data Center Network Training – EVPN and VXLAN; CloudFabric EVPN Configuration Guide.
Which of the following statements is false about M-LAG deployment?
Multi-level M-LAG is mainly used to construct a large Layer 2 network in a DCN or directly connect DCNs at Layer 2.
In multi-level M-LAG networking, you can manually configure the root bridge to prevent STP loops.
Multi-level M-LAG must be configured based on V-STP.
M-LAG networking can be classified into single-level M-LAG networking and multi-level M-LAG networking.
M-LAG (Multi-Chassis Link Aggregation) on Huawei CE series switches enhances high availability and load balancing by making two switches appear as one. Let’s evaluate each statement:
A. Multi-level M-LAG is mainly used to construct a large Layer 2 network in a DCN or directly connect DCNs at Layer 2:This is true. Multi-level M-LAG extends the topology across multiple layers or data centers, facilitating large Layer 2 domains, a common use case in Huawei DCNs.TRUE.
B. In multi-level M-LAG networking, you can manually configure the root bridge to prevent STP loops:This is true. Manual configuration of the root bridge (e.g., using STP priority) is supported to optimize path selection and prevent loops, especially in complex M-LAG setups.TRUE.
C. Multi-level M-LAG must be configured based on V-STP:This is false. While V-STP can be used to prevent loops, M-LAG does not require V-STP specifically. Standard STP, RSTP, or MSTP can also be configured, depending on the network design. The requirement is loop prevention, not a mandatory V-STP dependency.FALSE.
D. M-LAG networking can be classified into single-level M-LAG networking and multi-level M-LAG networking:This is true. Single-level M-LAG connects two switches directly to devices, while multi-level M-LAG extends across additional layers or devices, a recognized classification in Huawei documentation.TRUE.
Thus,Cis the false statement because multi-level M-LAG does not mandate V-STP configuration.References:Huawei CloudEngine Series Switch Configuration Guide – M-LAG; HCIP-Data Center Network Training – M-LAG Deployment.
In EVPN, Type 5 routes are used only by hosts on a VXLAN network to access external networks.
TRUE
FALSE
EVPN (Ethernet VPN) is a control plane technology used with VXLAN to provide Layer 2 and Layer 3 services in data center networks, including Huawei’s implementations. EVPN routes are categorized into types, with Type 5 routes (IP Prefix routes) serving a specific purpose:
Type 5 Routes:These routes advertise IP prefixes and are used for inter-subnet routing, allowing communication between different VXLAN Virtual Network Identifiers (VNIs) or between VXLAN networks and external networks. They carry a Layer 3 VNI and IP prefix information, enabling routers or gateways to perform Layer 3 forwarding.
Usage Scope:Type 5 routes are not limited to hosts on a VXLAN network accessing external networks. They are also used by network devices (e.g., gateways, routers) within the EVPN domain to facilitate routing between subnets, including intra-VXLANcommunication. For example, a centralized gateway or distributed gateway can use Type 5 routes to route traffic within the data center or to external networks, not just host-initiated access.
The statement isFALSE (B)because Type 5 routes are not exclusively for hosts on a VXLAN network to access external networks; they support broader Layer 3 routing functions across the EVPN domain.References:Huawei HCIP-Data Center Network Training – EVPN Routing; CloudFabric EVPN Configuration Guide.
Which of the following statements are true about the tenant service model? (Select All that Apply)
A tenant can apply for independent compute, storage, and network resources.
One logical router is mapped to one VRF.
An EPG can have only one subnet.
A subnet supports the access of only one VM.
The tenant service model in Huawei’s data center networks (e.g., CloudFabric with SDN) organizes resources for multi-tenancy. Let’s evaluate each statement:
A. A tenant can apply for independent compute, storage, and network resources:This is true. Tenants in a multi-tenant environment can request isolated compute (VMs), storage (volumes), and network (VLANs/VXLAN VNIs) resources, a core feature of Huawei’s tenant isolation model.TRUE.
B. One logical router is mapped to one VRF:This is true. A Virtual Routing and Forwarding (VRF) instance is associated with a logical router to provide isolated Layer 3 routing for a tenant, a standard practice in Huawei’s network virtualization.TRUE.
C. An EPG can have only one subnet:This is false. An Endpoint Group (EPG) in Huawei’s ACI-like models can span multiple subnets, grouping endpoints (e.g., VMs) based on policies, not limited to a single subnet.FALSE.
D. A subnet supports the access of only one VM:This is false. A subnet can support multiple VMs, as it defines an IP address range for a network segment, not a one-to-one VM mapping.FALSE.
Thus,A and Bare true statements about the tenant service model.References:Huawei CloudFabric Data Center Network Solution – Tenant Model; HCIP-Data Center Network Training – Multi-Tenancy.
Which of the following statements are true about a routing design that employs OSPF on the underlay network of a DC? (Select All that Apply)
Typically, the IP address of Loopback0 is configured as the VTEP IP address and the same IP address is planned for active-active leaf nodes in the same group.
The network type of spine and leaf nodes can be set to P2P in order to accelerate convergence.
This routing design is recommended when the DC has more than 300 switches.
It is recommended that all devices be planned in Area 0.
OSPF (Open Shortest Path First) is a routing protocol used in the underlay network of Huawei’s CloudFabric DCNs. Let’s evaluate each statement:
A. Typically, the IP address of Loopback0 is configured as the VTEP IP address and the same IP address is planned for active-active leaf nodes in the same group:This is true. Loopback0 IP is commonly used as the VTEP IP for stability, and in active-active leaf node groups (e.g., M-LAG), the same IP can be configured with VRRP or anycast to ensure consistency.TRUE.
B. The network type of spine and leaf nodes can be set to P2P in order to accelerate convergence:This is true. Setting OSPF network type to Point-to-Point (P2P) on spine-leaf links reduces overhead (e.g., no DR/BDR election) and speeds up convergence, a recommended practice in Huawei DCNs.TRUE.
C. This routing design is recommended when the DC has more than 300 switches:This is false. OSPF is suitable for smaller to medium-sized DCNs (e.g., up to 200-300 switches). For larger networks (>300 switches), EBGP is preferred due to better scalability and reduced complexity.FALSE.
D. It is recommended that all devices be planned in Area 0:This is false. While a single Area 0 is possible for small DCNs, multi-area OSPF is recommended for larger networks to manage scalability and reduce routing table size, avoiding a flat Area 0 design.FALSE.
Thus,A and Bare true statements about OSPF routing design in a DC underlay.References:Huawei CloudFabric Data Center Network Solution – Underlay Design; HCIP-Data Center Network Training – OSPF in DCN.
V-STP prevents loops caused by incorrect configurations or connections in an M-LAG.
TRUE
FALSE
V-STP (Virtual Spanning Tree Protocol) is a Huawei-specific enhancement of the Spanning Tree Protocol (STP) designed to prevent Layer 2 loops in complex network topologies, including Multi-Chassis Link Aggregation (M-LAG) deployments on Huawei CloudEngine (CE) series switches.
M-LAG Overview:M-LAG allows two switches to appear as a single logical device, connecting to downstream devices via Link Aggregation Groups (LAGs). Without proper loop prevention, incorrect configurations (e.g., misconfigured ports) or physical connections (e.g., redundant links) can cause broadcast storms.
V-STP Role:V-STP extends STP to handle virtualized environments and M-LAG scenarios. It ensures that only one path is active in a loop-prone topology by blocking redundant links, preventing loops caused by misconfigurations or unintended connections. In M-LAG, V-STP coordinates with the peer-link to maintain a loop-free topology.
The statement isTRUE (A)because V-STP is designed to prevent loops in M-LAG deployments due to incorrect configurations or connections.References:Huawei CloudEngine Series Switch Configuration Guide – V-STP and M-LAG; HCIP-Data Center Network Training – Loop Prevention.
Which of the following statements is false about VXLAN tunnel establishment?
A VXLAN tunnel is identified by a pair of VTEPs.
After a tunnel is established, if one end of the tunnel goes Down, the other end may not go Down.
For a static tunnel, you need to manually configure the local and remote VNIs.
Dynamic tunnels depend on EVPN Type 5 routes to transmit information.
VXLAN (Virtual Extensible LAN) tunnels are used to encapsulate Layer 2 traffic over a Layer 3 network, a key component in Huawei’s CloudFabric data center solutions. Let’s evaluate each statement:
A. A VXLAN tunnel is identified by a pair of VTEPs:This is true. A VXLAN tunnel is identified by the pair of VXLAN Tunnel Endpoint (VTEP) IP addresses (local and remote), along with the VNI (VXLAN Network Identifier). This ensures unique tunnel identification.TRUE.
B. After a tunnel is established, if one end of the tunnel goes Down, the other end may not go Down:This is true. VXLAN tunnels are unidirectional, and the status of one end does not automatically affect the other unless the underlay network connectivity (e.g., Layer 3 reachability) is lost. The remote VTEP may remain operational if it can still encapsulate/decapsulate traffic.TRUE.
C. For a static tunnel, you need to manually configure the local and remote VNIs:This is true. In a static VXLAN tunnel, administrators must manually configure the VNI and VTEP IP addresses on both ends, as there is no dynamic control plane (e.g., BGP EVPN) to automate the process.TRUE.
D. Dynamic tunnels depend on EVPN Type 5 routes to transmit information:This is false. Dynamic VXLAN tunnels rely on BGP EVPN as the control plane, but Type 5 routes (IP Prefix routes) are specifically used for advertising host IP routes and external network routes, not for general tunnel establishment. Dynamic tunnel setup primarily uses Type 2 (MAC/IP Advertisement) and Type 3 (Multicast) routes to exchange VNI and VTEP information. Type 5 routes are relevant for Layer 3 routing, not the initial tunnel setup.FALSE.
Thus,Dis the false statement because dynamic tunnels depend on EVPN Type 2 and Type 3 routes, not Type 5, for initial establishment.References:Huawei CloudFabric Data Center Network Solution – VXLAN Configuration Guide; HCIP-Data Center Network Training – VXLAN Tunneling.
TESTED 30 Apr 2025