• 4.9/5.0
  • 71 Questions
  • Updated on: 7-Apr-2026
  • Data Center Professional (JNCIP-DC) Exam
  • 171+ Prepared
  • Valid Worldwide

Free JN0-683 Practice Test Questions | Know You're Ready for Data Center Professional (JNCIP-DC) Exam


In your EVPN-VXAN environment, you want to prevent a multihomed server from receiving multiple copies ofBUM traffic in active/active scenarios. Which EVPN route type would satisfy this requirement?

A. Type 8

B. Type 7

C. Type 4

D. Type 5

C.   Type 4

Explanation:

Understanding the Scenario:

In an EVPN-VXLAN environment, when using multi-homing in active/active scenarios, there's a risk that a multihomed server might receive duplicate copies of Broadcast, Unknown unicast, and Multicast (BUM) traffic. This is because multiple VTEPs might forward the same BUM traffic to the server.

EVPN Route Types:

Type 4 Route (Ethernet Segment Route):This route type is used to advertise the Ethernet Segment (ES) to which the device is connected. It is specifically used in multi-homing scenarios to signal the ES and its associated Ethernet Tag to all the remote VTEPs. The Type 4 route includes information that helps prevent BUM traffic duplication in active/active multi-homing by using a split-horizon mechanism, which ensures that traffic sent to a multihomed device does not get looped back.

Explanation:

The Type 4 route is crucial for ensuring that in a multi-homed setup, particularly in an active/active configuration, BUM traffic does not result in duplication at the server. The route helps coordinate which VTEP is responsible for forwarding the BUM traffic to the server, thereby preventing duplicate traffic.

Data Center References:

Type 4 routes are essential for managing multi-homing in EVPN to avoid the issues of BUM traffic duplication, which could otherwise lead to inefficiencies and potential network issues.

What are three actions available tor MAC move limiting? (Choose three.)

A. drop

B. filter

C. enable

D. log

E. shutdown

A.   drop
D.   log
E.   shutdown

Explanation:

MAC Move Limiting:

MAC move limiting is a security feature used in network switches to detect and mitigate rapid changes in MAC address locations, which could indicate a network issue or an attack such as MAC flapping or spoofing.

When a MAC address is learned on a different interface than it was previously learned, the switch can take various actions to prevent potential issues.

Available Actions:

A. drop:This action drops packets from the MAC address if it violates the move limit, effectively blocking communication from the offending MAC address.

D. log:This action logs the MAC move event without disrupting traffic, allowing network administrators to monitor and investigate the event.

E. shutdown:This action shuts down the interface on which the MAC address violation occurred, effectively stopping all traffic on that interface to prevent further issues.

Other Actions (Not Correct):

B. filter:Filtering is not typically associated with MAC move limiting; it generally refers to applying ACLs or other mechanisms to filter traffic.

C. enable:This is not an action related to MAC move limiting, as it does not represent a specific reaction to a MAC move event.

Data Center References:

MAC move limiting is crucial for maintaining network stability and security, particularly in environments with dynamic or large-scale Layer 2 networks where MAC addresses might frequently change locations.

You are preparing an sFlow monitoring system configuration. In this scenario, what Information will be included in the datagram sent to the sFlow collector? (Choose two.)

A. the interlace through which the packets entered the agent

B. the sending device's serial number

C. the CRC from the sampled packet

D. the source and destination VLAN for sampled packets

A.   the interlace through which the packets entered the agent
D.   the source and destination VLAN for sampled packets

Explanation:

Understanding sFlow Monitoring:

sFlow is a packet sampling technology used to monitor traffic in a network. It sends sampled packet data and interface counters to an sFlow collector, which analyzes the traffic patterns.

Information Included in sFlow Datagram:

Option A:The datagram sent to the sFlow collector includes information about the interface through which the packets entered the agent (the switch or router). This is crucial for understanding where in the network the traffic was captured.

Option D:sFlow datagrams also include the source and destination VLAN for the sampled packets. This allows for detailed analysis of the traffic flow within different VLANs.

Conclusion:

Option A:Correct—The ingress interface is included in the sFlow datagram.

Option D:Correct—The source and destination VLANs are also included, providing context for the sampled traffic.

You are asked to deploy 100 QFX Series devices using ZTP Each OFX5120 requires a different configuration. In this scenario, what are two components that you would configure on the DHCP server? (Choose two.)

A. the IP address of the FTP server

B. the MAC address for each OFX5120

C. the MAC address of the FTP server

D. the management IP address for each OFX5120

B.   the MAC address for each OFX5120
D.   the management IP address for each OFX5120

Explanation:

Zero Touch Provisioning (ZTP):

ZTP allows for the automated configuration of network devices, like QFX Series switches, without manual intervention. During ZTP, a switch will obtain its configuration from a DHCP server and then download the required software and configuration files from a specified server (e.g., FTP, HTTP).

DHCP Server Configuration:

Option B:The DHCP server needs to know theMAC address for each QFX5120to provide a specific configuration based on the device identity. By mapping the MAC address to a particular configuration, the DHCP server can ensure that each switch gets the correct configuration.

Option D:Themanagement IP address for each QFX5120must also be assigned by the DHCP server. This IP address allows the device to communicate on the network and access the configuration files and other required resources during the ZTP process.

Conclusion:

Option B:Correct—MAC addresses allow the DHCP server to identify each QFX5120 and assign the appropriate configuration.

Option D:Correct—Management IP addresses are essential for network communication during ZTP.

Which three statements are correct about symmetric IRB routing with EVPN Type 2 routes? (Choose three.)

A. An L3 interface (IRB) is required for each local VLAN.

B. Symmetric routing requires MAC-VRF.

C. Symmetric routing supports the EVPN service VLAN bundle.

D. Symmetric routing requires an extra transit VNI for each VRF.

E. Symmetric routing is less efficient than asymmetric routing.

A.   An L3 interface (IRB) is required for each local VLAN.
B.   Symmetric routing requires MAC-VRF.
D.   Symmetric routing requires an extra transit VNI for each VRF.

Symmetric IRB Routing with EVPN Type 2 Routes:

Symmetric Routing: In symmetric IRB (Integrated Routing and Bridging), routing occurs in both directions at the ingress and egress leaf nodes using the same routing logic. This is contrasted with asymmetric routing, where different routing logic is used depending on the direction of the traffic.

Required Components:

Option A:An L3 IRB interface is necessary for each VLAN that participates in routing, as it handles the Layer 3 processing for the VLAN.

Option B:MAC-VRF is required for symmetric routing to maintain a mapping of MAC addresses to the appropriate VRF, ensuring correct forwarding within the EVPN.

Option D:A transit VNI (Virtual Network Identifier) is required for each VRF to encapsulate the Layer 3 traffic as it traverses the network, allowing the IP traffic to be appropriately forwarded.

Conclusion:

Option A:Correct—Each local VLAN needs an IRB interface for L3 processing.
Option B:Correct—MAC-VRF is necessary for handling MAC address resolution in symmetric routing.
Option D:Correct—Transit VNIs are required for routing VRF-specific traffic across the network.
OptionsCandEare incorrect because:

C:Symmetric routing can work with various VLAN models, including single or multiple VLANs within an EVPN instance.
E:Symmetric routing is generally more efficient than asymmetric routing as it uses consistent routing logic in both directions.

You are asked to build redundant gateways in your EVPN-VXLAN environment, but you must conserve address space because these gateways must span across seven PES. What should you implement on the PEs lo satisfy these requirements?

A. Use IRB interfaces with the same IP address and different MAC addresses.

B. Use IRB interfaces with the same IP and VGA.

C. Use IRB interfaces with the same IP and MAC address.

D. Use IRB interfaces with different IP addresses and the same VGA.

C.   Use IRB interfaces with the same IP and MAC address.

Redundant Gateways in EVPN-VXLAN:

In an EVPN-VXLAN environment, providing redundant gateway functionality typically involves the use of Anycast Gateway. This allows multiple PEs (Provider Edge devices) to use the same IP address and MAC address for the gateway, enabling seamless failover and redundancy without IP conflicts.

Conserving Address Space:

Using the same IP address across multiple PEs conserves address space because only one IP address is needed for the gateway function, regardless of the number of PEs. The shared MAC address ensures that ARP resolution and forwarding behavior are consistent across all the PEs.

Conclusion:

Option C:Correct—Using IRB interfaces with the same IP and MAC address across all PEs satisfies the need for redundancy while conserving address space.

OptionsA, B,andDintroduce unnecessary complexity or do not fully utilize the efficient Anycast Gateway approach, which is best practice for conserving IP space and providing redundancy.

You are designing an IP fabric tor a large data center, and you are concerned about growth and scalability. Which two actions would you take to address these concerns? (Choose two.)

A. Design a five-stage Clos IP fabric.

B. Design a three-stage Clos IP fabric.

C. Use EX4300 Series devices as the spine devices.

D. Use OFX5700 Series devices as the super spines.

B.   Design a three-stage Clos IP fabric.
D.   Use OFX5700 Series devices as the super spines.

Clos IP Fabric Design:

A Clos fabric is a network topology designed for scalable, high-performance data centers. It is typically arranged in multiple stages, providing redundancy, high bandwidth, and low latency.

Three-Stage Clos Fabric:

Option B:A three-stage Clos fabric, consisting of leaf, spine, and super spine layers, is widely used in data centers. This design scales well and allows for easy expansion by adding more leaf and spine devices as needed.

Super Spines for Scalability:

Option D:Using high-capacity devices like the QFX5700 Series as super spines can handle the increased traffic demands in large data centers and support future growth. These devices provide the necessary bandwidth and scalability for large-scale deployments.

Conclusion:

Option B:Correct—A three-stage Clos fabric is a proven design that addresses growth and scalability concerns in large data centers.

Option D:Correct—QFX5700 Series devices are suitable for use as super spines in large-scale environments due to their high performance.

You are asked to set up an IP fabric thatsupports Al or ML workloads. You have chosen to use lossless Ethernet in this scenario, which statement is correct about congestion management?

A. The switch experiencing the congestion notifies the source device.

B. Only the source and destination devices need ECN enabled.

C. ECN marks packets based on WRED settings.

D. ECN is negotiated only among the switches that make up the IP fabric for each queue.

A.   The switch experiencing the congestion notifies the source device.

Understanding Lossless Ethernet and Congestion Management:

Lossless Ethernet is crucial for AI and ML workloads, where packet loss can significantly degrade performance. To implement lossless Ethernet, congestion management protocols like ECN (Explicit Congestion Notification) are used.

Role of ECN in Congestion Management:

Option A:In an IP fabric that supports lossless Ethernet, when a switch experiences congestion, it can mark packets using ECN. This marking notifies the source device of the congestion, allowing the source to reduce its transmission rate, thereby preventing packet loss.

Conclusion:

Option A:Correct—The switch experiencing congestion notifies the source device via ECN marking.

Page 2 out of 9 Pages