A leaf receives unicast traffic that is destined to an unknown source, and spine proxy is enabled in the corresponding bridge domain. Drag and drop the Cisco ACI forwarding operations from the left into the order the operation occurs on the right.
What does the VXLAN source port add to the overlay packet forwarding when it uses the hash of Layer 2, Layer 3, and Layer 4 headers of the inner packet?
What are two characteristics of Cisco ACI and Spanning Tree Protocol interaction? (Choose two.)
Cisco ACI fabric is migrated from network-centric mode to application-centric mode. What is possible in an application-centric design?
What are two characteristics of network-centric design in Cisco ACI? (Choose two.)
What are two characteristics of Cisco ACI interaction with MSTP? (Choose two.)
Refer to the exhibit.
An engineer wants to avoid connectivity problems for the endpoint EP1 when it reaches an external L3Out network through the gateway 10.2.2.254/24. Which two configurations must be implemented in BD-BD2? (Choose two.)
Refer to the exhibit.
A customer experiences resource overconsumption on one of its border leaf switches. Which action should be taken to reduce the consumption on this switch?