What are three settings the administrator should investigate while troubleshooting the connectivity issue?

An administrator is experiencing network connectivity issues between virtual machines. The virtual machines and hosts are configured as follows:
VM1 is running on Host1
VM2 is running on Host2
Both Host1 and Host2 are attached to the vSphere Distributed Switch dvSwitch1
Both Host1 and Host2 are using vmnic0 and vmnic1 on dvSwitch1
Both virtual machines are using the default portgroup for network traffic
What are three settings the administrator should investigate while troubleshooting the connectivity issue? (Choose three.)

An administrator is experiencing network connectivity issues between virtual machines. The virtual machines and hosts are configured as follows:
VM1 is running on Host1
VM2 is running on Host2
Both Host1 and Host2 are attached to the vSphere Distributed Switch dvSwitch1
Both Host1 and Host2 are using vmnic0 and vmnic1 on dvSwitch1
Both virtual machines are using the default portgroup for network traffic
What are three settings the administrator should investigate while troubleshooting the connectivity issue? (Choose three.)

A.
VLANs of the physical NICs

B.
Failover order of the uplinks

C.
Virtual NIC connectivity to the dvSwitch

D.
Security policy of the portgroup

E.
Traffic shaping on the portgroup

Explanation:



Leave a Reply 14

Your email address will not be published. Required fields are marked *


RC

RC

Correct Answers: A, C, E

RC

RC

Meant to say A, C, D

Kevin De Leeneer

Kevin De Leeneer

I have to agree with RC. I do not see how Failover order can impact you in such a way unless someone changed them all to “unused”, while Security policies can definitely cause blockages.

Anyone have any insight?

yul

yul

For me it’s A,C,E

RC

Dasher

Dasher

I also think A, B, C. The Failover Order can bite people like me who choose to put all of our uplinks under one vDS. If I accidently set my vMotion Uplink as Active for my Management port group, I might be in for a bad day. That’s why a lot of people just choose to create separate vDS for each type of traffic. VMware supports both as best practices though. So B is definitely a possible answer.

D could possibly cause a network issue if a VM was trying to forge it’s MAC but the Security Policy wasn’t set to allow it. That makes me a bit torn but this doesn’t seem as likely to occur as the others.

SomeDude

SomeDude

Exactly, I’d like to see this question to have a little more information. D seems like a long shot.

andy75

andy75

Of course there’s always a possibility to do smth silly. That’s why VMware introduced the roll-back feature for DVS in 5.x.
I dare to say the arguments for ‘C’ are mostly based on knowing that it’s the “correct” answer from the exam dumps. However, objectively, ‘D’ (forged transmits as you reasonably note) makes far more sense.

rc

rc

Here is where Answer C can come into play:

vSphere 4-distributed virtual switches used a static quantity of virtual ports. When you ran out of virtual ports, you’d have to increase the quantity using the graphical user interface (GUI) or a script. It was not fun!

With version 5.x of vSphere, however, the distributed virtual ports are now elastic ports by default. Elastic means that the virtual switch will manage the quantity of virtual ports automatically – creating and deleting them as needed – without user intervention.

gari

gari

default port group in dvs have policy reject for all 3 security policy (proc, mac, forged).

therefore I go with ABD