To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.
Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device's managed object?
AH is an IP-based transport-layer protocol. The protocol number is _____. (Enter only digits.)
The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)
Theon-premise modeis recommended for controller deployment onsmall and midsize campus networks.
In SSP packages, Jinja2 templates are used to implement mapping. In the Jinja2 syntax, {% ... %} contains control structures, for example, a 'for' loop.
gRPC (Google Remote Procedure Call)is a language-neutral, platform-neutral, and open-source remote RPC system that supportsunary RPCs and streaming RPCs.
Which of the following service methodsare NOT supportedby gRPC?
Exhibit:
A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?
Which of the following can be used to transmit traffic to a VXLAN network and implement intra-subnet communication on the same VXLAN network?
Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)