Exhibit.
Referring to the exhibit, what needs to change in the IP fabric to make it a valid IP fabric?
The IP fabric must consist of only one device model throughout the fabric.
The connection between the two spine nodes must be increased to 40 Gbps.
The IP fabric connections must be increased to a speed greater than 10 Gbps.
The connection between the two spine nodes must be removed.
To make the IP fabric a valid IP fabric, the connection between the two spine nodes must be removed. This is because an IP fabric is a network topology that uses a spine-leaf architecture, where the spine devices are only connected to the leaf devices, and the leaf devices are only connected to the spine devices. This creates a non-blocking, high-performance, and scalable network that supports Layer 3 routing protocols such as BGP or OSPF. The connection between the two spine nodes in the exhibit violates the spine-leaf design principle and introduces unnecessary complexity and potential loops in the network. The other options are incorrect because:
When editing a device configuration to install some manual changes, which procedure should be followed?
Edit the configuration on the device directly by the CLI; the changes will automatically be adjusted in the Juniper Apstra configuration
Edit the pristine configuration of the device.
Add a persistent change to a device configuration with a configlet.
Delete the device from the Juniper Apstra system, change the configuration, then re-import the device.
A configlet is a small piece of configuration that can be applied to a device or a group of devices to make persistent changes that are not overwritten by Apstra. Configlets can be used to install manual changes that are not part of the Apstra rendered configuration, such as custom commands, scripts, or features. Configlets can be created, edited, and deleted from the Apstra GUI or CLI12. References:
Exhibit.
You are working to build an ESI-LAG for a multihomed server. The ESI-LAG is not coming up as multihomed.
Referring to the exhibit, what are two solutions to this problem? (Choose two.)
The gateway IP addresses on both devices must be different.
The LACP system ID on both devices must be the same.
The loopback IP addresses on both devices must be the same.
The ESI ID on both devices must be the same.
According to the Juniper documentation1, an ESI-LAG is a link aggregation group (LAG) that spans two or more devices and is identified by an Ethernet segment identifier (ESI). An ESI-LAG provides redundancy and load balancing for a multihomed server in an EVPN-VXLAN network. To configure an ESI-LAG, you need to ensure that the following requirements are met:
In the exhibit, the LACP system ID and the ESI ID on both devices are different, which prevents the ESI-LAG from coming up as multihomed. Therefore, the correct answer is B and D. The LACP system ID on both devices must be the same and the ESI ID on both devices must be the same. References: ESI-LAG Made Easier with EZ-LAG, Example: Configuring an ESI on a Logical Interface With EVPN-MPLS Multihoming, Introduction to EVPN LAG Multihoming
InJuniper Apstra. which three modes are available fordevices? (Choose three.)
Deploy
Active
Stopped
Drain
Ready
Juniper Apstra supports three deploy modes for devices: Deploy, Drain, and Ready. These modes determine the configuration and state of the devices in the data center fabric12.
Exhibit.
Which two statements ate correct about the graph query output shown in the exhibit? (Choose two.)
The interface has an IP address assigned to it.
The output shows a LAG connection.
The switch in the output is a Juniper device.
The interface has tags assigned to it.
The graph query output shown in the exhibit is a JSON representation of an interface node and its properties in the Apstra graph database. Based on the output, we can infer the following statements:
You use Juniper Apstra to enable a new VXLAN virtual network.
Which two components would be automatically derived in this situation? (Choose two.)
IP subnet
VLAN-ID
VXLAN VNI
Route Zone
According to the Juniper documentation1, a VXLAN virtual network is a collection of Layer 2 forwarding domains that span multiple racks in a fabric. A VXLAN virtual network requires a name and a VXLAN network identifier (VNI), which is a 24-bit number that identifies the virtual network. The VNI can be either explicitly assigned or auto-assigned from a resource pool. A VXLAN virtual network can also have Layer 3 connectivity, which enables routing between different VNIs within a routing zone. A routing zone is an L3 domain that isolates the IP traffic of different tenants. A routing zone can have one or more VNIs associated with it. To enable Layer 3 connectivity, a VXLAN virtual network needs an IP subnet, which is a range of IP addresses that can be assigned to the hosts in the virtual network. The IP subnet can be either explicitly assigned or auto-assigned from a resource pool. Therefore, the correct answer is A and C. IP subnet and VXLAN VNI are two components that would be automatically derived when enabling a new VXLAN virtual network using Juniper Apstra. References: Virtual Networks | Apstra 4.1 | Juniper Networks
Which statement about Juniper Apstra role-based access control is correct?
The viewer role is predefined and can be deleted.
The administrator role can see all permissions.
The user role can create roles.
The administrator role is the only predefined role.
Juniper Apstra role-based access control (RBAC) is a feature that allows you to specify access permissions for different users based on their roles. RBAC servers are remote network servers that authenticate and authorize network access based on roles assigned to individual users within an enterprise1. Juniper Apstra has four predefined user roles: administrator, device_ztp, user, and viewer2. The administrator role is the most powerful role, and it can see all permissions and perform all actions in the Apstra software application. The administrator role can also create, clone, edit, and delete user roles, except for the four predefined user roles, which cannot be modified2. Therefore, the statement that the administrator role can see all permissions is correct.
The following three statements are incorrect in this scenario:
References:
You are installing a Juniper Apstra server in your data center. You have multiple users that will be expected to configure, manage, and carry out operational tasks in your data center. You have decided to implement remote user authentication for the role-based access control of your Apstra server.
In this scenario, which three methods are supported? (Choose three.)
TACACS+
LDAP
RADIUS
SAML
Auth0
To implement remote user authentication for the role-based access control of your Apstra server, you can use one of the following methods: TACACS+, LDAP, or RADIUS. These are the protocols that Juniper Apstra supports to authenticate and authorize users based on roles assigned to individual users within an enterprise. You can configure the Apstra server to use one or more of these protocols as the authentication sources and specify the order of preference. You can also configure the Apstra server to use local user accounts as a fallback option if the remote authentication fails. The other options are incorrect because:
What is the purpose of a Juniper Apstra rack?
It stores information on how pods connect to super spines.
It stores information on how leaf nodes connect to generic devices
It stores IP address and ASN pool information.
It stores device port data rates and vendor information.
A Juniper Apstra rack is a physical entity that contains one or more network devices, such as leaf nodes, access switches, or generic systems. A rack is used to organize and manage the network devices in the Apstra software application. A rack has the following characteristics:
The following three statements are incorrect in this scenario:
References:
What is the function of the Revert button in the Juniper Apstra Ul?
The Revert button will rollback to the previous configuration of a specified device.
The Revert button deletes any uncommitted changes within Apstra.
The Revert button performs a rollback 0 on Juniper devices in the fabric.
The Revert button will undo the last change made to the configuration.
According to the Juniper documentation1, the Revert button is located on the Uncommitted tab of the blueprint page. The Uncommitted tab shows the changes that have been staged but not yet committed to the network. The Revert button allows you to discard any uncommitted changes and revert to the last committed state of the blueprint. This is useful if you want to cancel the changes that you have made or if you want to start over with a fresh slate. Therefore, the correct answer is B. The Revert button deletes any uncommitted changes within Apstra. References: Commit / Revert Changes to Blueprint | Apstra 4.2 | Juniper Networks
Using Juniper Apstra. which component is defined in a template?
the leaf-to-spine interconnection
the speed of the links between the spine devices and the leaf devices
the number of spine devices in a topology
the definition of IP pools
According to the Juniper documentation1, a template is a configuration template that defines a network’s policy intent and structure. A template can be either rack-based or pod-based, depending on the type and number of racks and pods in the network design. A template includes the following details:
Therefore, the correct answer is A. the leaf-to-spine interconnection. This is a component that is defined in a template, as it determines the physical connectivity of the network. The speed of the links, the number of spine devices, and the definition of IP pools are not components that are defined in a template, as they are either derived from the device profiles, the resource pools, or the blueprint settings. References: Templates Introduction | Apstra 4.2 | Juniper Networks
Which attribute enables Juniper Apstra to scale and manage thousands of devices with a single server instance?
Apstra is installed as a cloud resource.
Apstra is based on NGINX.
Apstra is available as an OVA.
Apstra is a distributed state system.
The attribute that enables Juniper Apstra to scale and manage thousands of devices with a single server instance is that Apstra is a distributed state system. This means that Apstra uses a graph database to store the network topology and configuration data in a distributed and replicated manner across multiple server nodes. This allows Apstra to handle large-scale networks with high performance, reliability, and availability. Apstra also uses a stateful orchestration engine that ensures the network state is always consistent with the intent of the blueprint, which is the logical representation of thenetwork design and behavior. Apstra can automatically detect and resolve any discrepancies between the desired and actual network state, as well as handle any changes or failures in the network. The other options are incorrect because:
Juniper Apstra has indicated an anomaly with respect to cabling.
What are two ways to remediate the issue? (Choose two.)
Manually edit the cabling map.
Redeploy the errant device.
Set the invalid ports to a disabled state.
Have Apstra autoremediate the cabling map using LLDP.
A cabling anomaly is an issue that occurs when the physical connections between the devices in the data center fabric do not match the expected connections based on the Apstra Reference Design. A cabling anomaly can cause problems such as incorrect routing, suboptimal traffic flow, or device isolation. To remediate the issue, you can use one or both of the following methods:
Which two statements about VXLAN VNIs are correct? (Choose two.)
VNIs can have over 16 million unique values.
VNIs identify a collision domain.
VNIs identify a broadcast domain
VNIs are alphanumeric values.
VXLAN VNIs are virtual network identifiers that are used to identify and isolate Layer 2 segments in the overlay network. VXLAN VNIs have the following characteristics:
The following two statements are incorrect in this scenario:
References:
Exhibit.
Which two statements about ESI values are correct for the server connections to the fabric shown in the exhibit? (Choose two.)
A valid ESI value for Server A is 0x00.00.00.00.00.00.00.00.00.00.
A valid ESI value for Server B is 0x00.20.20.20.20.20.20.20.20.20.
A valid ESI value for Server A is 0x00.10.10.10.10.10.10.10.10.10.
A valid ESI value for Server B is 0x00.00.00.00.00.00.00.00.00.00.
To answer this question, we need to understand the concept of ESI values in EVPN LAGs. An ESI is a 10-byte value that identifies an Ethernet segment, which is a set of links that connect a multihomed device (such as a server) to one or more PE devices (such as leaf switches) in an EVPN network. The same ESI value must be configured on all the PE devices that connect to the same Ethernet segment. This allows the PE devices to form an EVPN LAG, which supports active-active or active-standby multihoming for the device. The ESI value can be manually configured (type 0) or automatically derived from LACP (type 1) or other methods. In the exhibit, Server A is connected to two leaf switches (QFX 5210) using a LAG with LACP enabled. Server B is connected to three leaf switches (QFX 5120) using a LAG with LACP enabled. Based on this information, the following statements are correct about ESI values for the server connections to the fabric:
What is the purpose of using a routing zone inside Juniper Apstra software?
A routing zone is used to enable L4-L7 inspection inside the fabric.
A routing zone is defined to secure the routing protocols.
A routing zone defined at the Apstra manager level requires firewalls to be deployed.
A routing zone is used to enable the communication between two VNIs within a VRF.
According to the Juniper documentation1, a routing zone is an L3 domain, the unit of tenancy in multi-tenant networks. You create routing zones for tenants to isolate their IP traffic from one another, thus enabling tenants to re-use IP subnets. In addition to being in its own VRF, each routing zone can be assigned its own DHCP relay server and external system connections. You can create one or more virtual networks within a routing zone, which means a tenant can stretch its L2 applications across multiple racks within its routing zone. For virtual networks with Layer 3 SVI, the SVI is associated with a Virtual Routing and Forwarding (VRF) instance for each routing zone isolating the virtual network SVI from other virtual network SVIs in other routing zones. Therefore, the correct answer is D. A routing zone is used to enable the communication between two VNIs within a VRF. A routing zone is not used for L4-L7 inspection, securing routing protocols, or requiring firewalls. Those are not the purposes of a routing zone in Juniper Apstra software. References: Routing Zones