what behavior should be expected?

Click the Exhibit button. Observing the shown configuration, assume PE1 and PE2 already have IP connectivity, what behavior should be expected?

Click the Exhibit button. Observing the shown configuration, assume PE1 and PE2 already have IP connectivity, what behavior should be expected?

A.
This configuration is valid. L2TPv3 will come up and CE1 will be able to communicate with CE2.

B.
This is not a valid design because Crypto does not have any relationship to L2TPv3.

C.
The configuration will not work for L2TP3 because to work it would require MPLS to be enabled in the core.

D.
L2TPv3 will not come up and Crypto IPSec will not come up either because there is a misconfigured protocol type for L2TPv3.

E.
This will not work because Crypto is misconfigured on PE1 and PE2.

F.
This will not work because it is not possible to encrypt L2TPv3 session in IPSec.



Leave a Reply 0

Your email address will not be published. Required fields are marked *