USG A and USG B are configured with a static BFD session. The following is true about the process of
establishing and tearing down a BFD session.
C, D
Explanation:
Note: 1. USG A and USG B each start the BFD state machine. The initial state is Down and the BFD
packet is Down. For a static BFD session, the value of the Your Discriminator is specified by the user.
For the dynamic BFD session, the value of the Your Discriminator is 0. 2. After receiving the BFD
packet whose status is Down, the USG B switches to Init. And send a BFD packet with the status of
Init. 3. If the local BFD state of USG B is Init, the packets of the received state are Down. 4. The BFD
state of USG A is the same as that of USG B. 5. After receiving the BFD packet in the Init state, the
local state is switched to Up. 6. The BFD status of USG A changes with USG B. 7. After the state
transition of "DOWN-->INIT" occurs on USG A and USG B, a timeout timer is started. If the BFD packet
is in the Init or Up state, the local state is automatically switched back to Down.
An administrator can view the status of the device components by the following command: The
status of the Slot3 board is Abnormal. What are the possible causes of the following faults?
A B, C
The constraints of the policy in the traffic limiting policy include quintuple, time period, user identity,
and application protocol.
A
When using the optical bypass interface, the Bypass link has two working modes, automatic mode
and forced mode.
A
In the application scenario of the virtual firewall technology, the more common service is to provide
rental services to the outside. If the virtual firewall VFW1 is leased to enterprise A and the virtual
firewall VFW2 is leased to enterprise B, what is the following statement incorrect?
D
What are the scenarios in which the USG series firewall service port sends gratuitous ARPs when the
following configurations are performed?
C
In the application scenario of IPSec traversal by NAT, the active initiator of the firewall must configure
NAT traversal, and the firewall at the other end can be configured without NAT traversal.
B
The NAT/ASPF log in the session log and the DPI traffic monitoring log provide a binary output
technology for this type of log. The use of binary input output can greatly reduce the impact on
system performance, but The binary form output needs to be configured with the elog log
management system.
A
The network administrator of a company discards traffic that exceeds the throughput of the device.
The USG discards the traffic that exceeds the device throughput. The USG discards the traffic that
exceeds the device throughput. The following command can achieve this function?
B
Which of the following is not a message sent during ip-link detection?
B, D
Explanation:
Answer : BD Note: ip-link will periodically improve icmp and arp detection messages to
Explanation: the target host.