Four HP 3800 Series Switches have formed a backplane stack in aringtopology. Member 1 is the commander the two stacking links on the member 1 fail. What happens?
Answer : C
Explanation:
Inactive Stack fragment - The switches in this fragment do not actively switch packets.
They are powered on, however, the network
ceases to carry traffic. All user ports are disabled. Only the OOBM and stack ports remain active.
Note:Results of Disconnecting a Stacking Cable
If a stacking cable becomes disconnected from one of the switches in the stack, the effect depends on the stacking topology that is being used:
MeshThe stack topology is temporarily changed to a ring. To recover, simply reconnect the stacking cable; the mesh topology and the previous stack configuration is restored.
RingThere is little effect. The stack topology is temporarily changed to a chain topology.
To recover, simply reconnect the stacking cable; the ring topology and the previous stack configuration is restored.
ChainThe following occurs:
The smaller section (fragment) of the stack that results from the disconnection becomes Inactive(the Stack Status value shown in the output of the show stacking command is Inactive).
If the two resulting fragments are the same size, the fragment that contains the
Commander will be Active, and the other fragment becomes Inactive.
Both fragments will have a Commander and a Standby selected (if there is more than one switch in each fragment).
When the stacking cable is reconnected to reform the chain:
The Commander and Standby of the Active fragment retain those roles for the resulting stack. If the original Commander was not in that fragment, then the stack will have a new
Commander when the stack is reformed.
The switches in the Inactive fragment reboot and assume their new roles in the reformed chain.Stack fragment - A stack that previously had more members (that is, some of its previous members are now missing). The fragment can be Active or Inactive based on the rules described.
Active Stack fragment- When a stack becomes fragmented, only one fragment remains
Active; the other fragments become Inactive
(all network ports are disabled). The active stack fragment inherits the MAC address and IP addressing of the stack for management.The fragment that has more switches in it will be the Active fragment. This allows more of the network ports to remain operational. If the fragments have the same number of switches in them, then the fragment that has the original Commander will be the Active fragment.
Inactive Stack fragment - The switches in this fragment do not actively switch packets.
They are powered on, however, the network
ceases to carry traffic. All user ports are disabled. Only the OOBM and stack ports remain active.
Reference:Advanced Traffic Management Guide,3800 Switches
http://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c03018186
How does virtual output queuing (VoQ) help switches avoid head-of-line blocking and enhance throughput?
Answer : A
Explanation: A Virtual Output Queue (VOQ) is the technique used in input-queued switches where rather than keeping all traffic in a single queue, separate queues are maintained for each possible output location. It addresses a common problem known as head-of-line blocking.
In VOQ each input port maintains a separate queue for each output port. It has been shown that VOQ can achieve 100% throughput performance with an effective scheduling algorithm. This scheduling algorithm should be able to provide a high speed mapping of packets from inputs to outputs on a cycle-to-cycle basis
Reference:https://en.wikipedia.org/wiki/Virtual_Output_Queues
In which components of HP FlexNetwork solutions can Intelligent Resilient Framework
(IRF) play a role?
Answer : D
Explanation: HP FlexNetwork Architecture provides a common and consistent environment for enterprise data centers, campus and branch networks.
FlexCampus is based on a flat two-tieralso described as two-levelarchitecture.
Reference:https://en.wikipedia.org/wiki/HP_FlexNetwork_Architecture
What distinguishes an HP switch with a CLOS fabric from an HP switch with a crossbar fabric?
Answer : D
Explanation: Ina modernClos topology, every lower-tier switch is connected to each of the top-tier switches in a full-mesh topology. If there isn't any oversubscription taking place between the lower-tier switches and their uplinks, then a non-blocking architecture can be achieved. The advantage of the Clos network is you can use a set of identical and inexpensive devices to create the tree and gain high performance and resilience that would otherwise cost must more to construct. To prevent any one uplink path from being chosen, the path is randomly chosen so that the traffic load is evenly distributed between the top- tier switches. If one of the top tier switches were to fail, it only slightly degrades performance through the data center.
Reference: Clos Networks: What's Old Is New Again, What goes around, comes around
Clos Networks are back -
http://www.networkworld.com/article/2226122/cisco-subnet/clos-networks--what-s-old-is- new-again.html
Refer to the exhibit.
Answer : C
The network administrator is configuring Unidirectional Link Detection (UDLD) on trk1 on an HP Provision witch. The trk1 link aggregation group has these settings:
Interfaces = 48 and 49 -
Untagged VLAN = 1 -
Tagged VLANs = 2-4 -
How should the administrator complete the setup?
Answer : C
Explanation: * The following commands allow you to configure UDLD via the CLI.
Syntax: [no] interface <port-list> link-keepalive
Enables UDLD on a port or range of ports
* Ports enabled for UDLD exchange health-check packets once every five seconds (the link-keepalive interval). If a port does not receive a health-check packet from the port at the other end of the link within the keepalive interval, the port waits for four more intervals. If the port still does not receive a healthcheck packet after waiting for five intervals, the port concludes that the link has failed and blocks the UDLD-enabled port.
Reference:Port Status and Basic Configuration
ftp://ftp.hp.com/pub/networking/software/2900yl-MCG-0207-T_12_XX-Chap10-PrtStat-
BasicCfg.pdf -
Refer to the exhibits.
Exhibit 1 -
Answer : C
Explanation:
Switch2 has priority 255, because Switch2(10.1.3.2) - MAster is up during 50 min, preempt is on in VRRP.SowhenSwitch1 comes online after 120min and trying to preeemtit will become theBackup Router
A network administrator wants to configure Open Shortest Path (OSPF) MD5 authentication on VLAN 100 on an HP ProVision switch. The administrator has created a global MD5 key chain with an ID and key string that matchesthe neighbors. which additional step must the administrator complete to accomplish this?
Answer : D
Explanation: Authentication-key: OSPF supports three methods of authentication for each interfacenone, simple password,and MD5. Only one method of authentication can be active on an interface at a time.
The MD5 method of authentication requires you to configure a key ID and an MD5 Key
Reference:Chapter 8,Configuring OSPF
http://www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_Ch8_OSPF.pdf
A company has a network with HP Provision switches. The network administrator is establishing remote mirroring session between two of the switches. The remote does not use the truncation option.
What must the administrator check on any switches between the mirror source and destination?
Answer : D
Explanation: Configuring Jumbo Frame Support on ProCurve switches.
Details -
For remote traffic mirroring, enable jumbo frames to mirror Ethernet frames larger than
1464 bytes.
On both source and destination switches and any infrastructure switches in between
Mirrored frames sent to remote switch include an additional 54-byte mirror encapsulation header
5406zl(config)#vlan 10 jumbo Source switch
5412zl(config)#vlan 10 jumbo Intermediate switch
3500yl(config)#vlan 10 jumb0 Destination switch
When the source switch sends the mirrored data stream to the destination switch, it adds a
54-byte proprietary ("mirror encapsulation") header to the Layer 2 frame, increasing the total size of the frame.
Reference: ProCurve Switches - Remote Traffic Mirroring: Configuring Jumbo Frame
Support -
http://h20565.www2.hp.com/hpsc/doc/public/display?sp4ts.oid=82374&docId=emr_na- c02587751&docLocale=en_US
A network administrator is configuring several HP Comware switches as an HP Intelligent
Resilient Framework(IRF) virtual device. According to best practices at, which point during the IRF configuration process should the administrator activate the IRF ports?
Answer : A
Explanation:
(see steps 5 and 6 below)
Use theirf-port-configuration activecommand to activate configurations on all IRF ports on the device.
When you physically connect members of an IRF virtual device and bind physical IRF port(s) to an IRF port whose link state isDISorDOWN, which you can display with the display irf topologycommand, execution of this command is required to establish the IRF virtual device.
Note that activating IRF port configurations may cause merge of IRF virtual devices and automatic device reboot. Therefore, to avoid configuration loss you are recommended to set the member ID for the device in the following way:
1)Plan the network and member IDs in advance. Determine the number of IRF ports to be created, and which physical IRF ports is used for IRF virtual device establishment.
2)Change member IDs. (Member ID change takes effective after device reboot, so change member IDs before executing theirf-port-configuration activecommand.)
3)Connect SFP+ cables or fibers and make sure that the physical IRF ports are well connected.
4)Create IRF ports.
5)Bind physical IRF ports to IRF ports.
6)Save the current configurations to the configuration file to be used at the next startup.
7)Activate configurations on all IRF ports.
When the system starts up, if you bind a physical IRF port to an IRF port through the configuration file, or add a new physical port, configurations on IRF ports are automatically activated without the need to execute this command again.
Reference:IRF Configuration Commands
http://www.h3c.com/portal/Technical_Support___Documents/Technical_Documents/Voice_
Products/H3C_VG_Series_Voice_Gateway/Command/Command/0708test2/10/
Refer to the exhibit.
Answer : D
Explanation: LLDPmust beenabled on thisEthernet ports and are configured to advertise the voice VLAN ID and QoSinformation using the Network Policy LLDP TLV.
Reference:Application Notesfor using Link Layer DiscoveryProtocol (LLDP) with HP
ProCurve Switches and Avaya IPTelephones - Issue 1.0
http://h17007.www1.hp.com/docs/interoperability/Avaya/ProCurve-lldp.pdf
A company wants to enforce source-specific multicasting (SSM) for several multicast streams.
This is the configuration:
-> Some multicast receivers support IGMPv3.
-> Other receivers that need to stream support IGMPv2 only.
-> The multicast receivers' default routers enable IGMPv3 on the interfaces associated with their subnets.
-> The routers are correctly configured to enable the IGMPv3 receivers to receive the stream from the correct source
Which setting do the receivers' routers require to support the IGMPV2 devices?
Answer : D
Explanation: IGMP SSM mapping -
The IGMP SSM mapping feature provides SSM support for receiver hosts that are running
IGMPv1 or IGMPv2. This feature is implemented by configuring static IGMP SSM mappings on the IGMP-enabled routers.
The SSM model assumes that the IGMP-enabled routers have identified the desired multicast sources when receivers join multicast groups.
A host running IGMPv3 can explicitly specify multicast source addresses in its reports.
A host running IGMPv1 or IGMPv2, however, cannot specify multicast source addresses in its reports. In this case, you must configure the IGMP SSM mapping feature to translate the (*, G) information in the IGMPv1 or IGMPv2 reports into (G, INCLUDE, (S1, S2...)) information
Reference:HP MSR Router Series, IP Multicast Configuration Guide(V7) http://h20565.www2.hp.com/hpsc/doc/public/display?sp4ts.oid=6796027&docId=emr_na- c04412136&docLocale=en_US
A company is determining whether HP IMC User Access manager (UAM) meets its needs for a RADIUS server. The company requires a solution for dynamic access control lists based on user identity and location (connected switch ID). Which statement correctly describes UAM support for this requirement?
Answer : D
Explanation: Endpoint Admission Defensecandynamically deploy ACLs to access devices for dynamic access control.
Endpoint Admission Defensee requires that a fullylicensed version of the HP IMC User
Access Management (UAM) software module be installed.
Reference:HP IMC Endpoint AdmissionDefense Software
http://h20195.www2.hp.com/V2/GetPDF.aspx/4AA3-0700ENW.pdf
Match the characteristic to the routing protocol.
Answer :
Refer to the exhibits.
Exhibit1 -
Answer : C
Explanation:
want to now create a more secure user, with SHA and AES-128
snmpv3 userimcauth shamysecurepasswordpriv aesmyprivpassword
Add the user to the managerpriv group
snmpv3 group managerpriv userimcsec-model ver3
Reference:SNMPv3 and IMC -
http://www.networktasks.co.uk/environments/hp/provision/snmpv3-and-imc
Have any questions or issues ? Please dont hesitate to contact us