Can you explain the broader steps of how L2F establishes the
tunnel?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What will you do if ur IOS in coorrupt/deleted/Wrong Type/No IOS image ?

3 Answers   Allied Group,


Which statement should you use to deny FTP access (only) from network 210 93 105 0 to network 223 8 151 0? A. access list 1 deny 210 93 105 0 0 0 0 0 any eq ftp access list 1 permit any B. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp C. access list 100 deny ip 223 8 151 0 0 0 0 255 any eq ftp access list 100 permit hp any any D. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp access list 100 permit ip any any

1 Answers  


Which type of switching is considered to be 'wire speed?' A.) Cut-Through B.) Multiplexed C.) Inverted D.) Layer 4 E.) Store and Forward F.) Layer 3

2 Answers  


Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II

1 Answers  


What do we check while configuring the server?

0 Answers  






how to troubleshoot when protocols is down and link is not getting up

7 Answers   HCL, Sify,


Which two steps are part of the process of creating Frame Relay subinterfaces on a point to point connection? (Choose two) A. configure the router to forward all broadcast packets B. remove any network address assigned to the physical interface C. configure the local data link connection identifier (DICI) for the subinterfaces D. cartoon the total committed information rate (CIP) available among the subinterfaces

1 Answers  


Explain the draw back of ospf protocol?

0 Answers  


What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) Gandalf5 B.) Q933A C.) Cisco D.) IETF E.) ARPA F.) SAP

2 Answers  


When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes

2 Answers  


When the router runs out of buffer space, this is called ________. A. Source Quench B. Redirect C. Information Request D. Low Memory

2 Answers  


The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network

3 Answers  


Categories