Refer to the exhibit.
Answer : D
Explanation: VLAN4 is configured to be a guest vlan.
Reference:ProCurve Network Security solutions,Guest VLANs: the interim solution http://www.hp.com/rnd/pdf_html/guest_vlan_paper.htm#interim_solution
A company has configured two switches as an HP Intelligent Resilient Framework (IRF) virtual device. The IRF port on each switch is bound to multiple physical links. How does the switch select the link for transmitting packets on that IRF port?
Answer : C
Explanation: IRF provides both link and node redundancy.
Reference:https://en.wikipedia.org/wiki/Intelligent_Resilient_Framework
Refer to the exhibit.
Answer : D
Refer to the exhibit.
Answer : C
Explanation: IGMP snooping enables Layer 2 switches to establish a Layer 2 multicast forwarding table instead of flooding all multicast packets. To populate the Layer 2 multicast forwarding table, IGMP snooping listens to IGMP messages exchanged between a Layer 3 multicast device and hosts.
Reference: 07-IP Multicast Configuration Guide, 02-IGMP snooping configuration http://www.h3c.com/portal/Technical_Support___Documents/Technical_Documents/Switch es/H3C_S12500_Series_Switches/Configuration/Operation_Manual/H3C_S12500_CG-
Release7128-6W710/07/201301/772657_1285_0.htm
A company needs a simple authenticate solution for guests. The HP Comware access layer switches will implement portal authentication (or Web-Auth). The network administrator wants the switch to host the login web page on an IP address that not used for any other purpose.
What should the administrator do to accomplish this goal?
Answer : C
Explanation: *Enable portal server on Onboarding VLAN Interface, this will activate the default Portal ACL (deny all, redirect tcp port 80 to TCP-Cheat)
[comware5]interface Vlan-interface 21
[comware5-Vlan-interface21]portal server uam method layer3
[comware5-Vlan-interface21]quit
[comware5]
*how the Portal redirect works. These are the basic steps:
-> Admin enables Portal authentication on the Onboarding VLAN L3 Interface, this will effectively block all traffic (default portal ACL)
-> User connects and “should” get an address through DHCP/DHCP Relay.
-> User opens browser, tries to access http://www.hp.com
-> User Device will send dns request for http://www.hp.com (to DNS IP Provided by
DHCP server)
-> DNS “should” respond with public IP of http://www.hp.com (default Portal ACL will block this by default!)
Reference:Comware Portal Redirect for BYOD use
http://abouthpnetworking.com/2014/01/30/comware-portal-redirect-for-byod-use/