Which of these actions could solve this problem?
You have recently deployed DMVPN Phase 3 for your WAN. Each of the spokes has a static IP assigned to it by the ISP, except one, which gets a dynamic IP . After a recent power loss during the day, the router rebooted, but was unable to bring the tunnel up to the hub immediately. The log on the spoke shows an NHRP registration reply from the hub indicationg an error. %NHRP-3-PAKREPLY: Receive Registration Reply packet with error unique address registered already(14)
inerface Tunnel0
ip address 17216.1.1.255.255.255.255.0
no ip redirects
ip nhrp authentication cisco
ip nhrp map multicast dynamic
ip nhrp network-id 10
ip nhrp holdtime 3600
ip nhrp redirect
tunnel source FastEthermet0/0
tunnel mode gre multipoint
Below is the configuration of the tunnel interface of Spoke 1 Interface Tunnel 0
ip address 17216.1.2.255.255.255.255.0
no ip redirects
ip nhrp authentication cisco
ip nhrp map multicast 1.1.1.2
ip nhrp map 172.16.1.1 1.1.1.2
ip nhrp network-id 20
ip nhrp holdtime 3600
ip nhrp nhs 172.16.1.1
ip nhrp shortcut
tunnel source FastEthermet0/0
tunnel mode gre multipoint
Which of these actions could solve this problem?
what is the function of the switch(config-if)#switchport port-security mac-address sticky command?
what is the function of the switch(config-if)#switchport port-security mac-address sticky command?
which one?
Cisco Secure ACS server will forward the events for all of these log files to Cisco Security MARS except which one?
which of these protocols?
NHRP functionality is very similar to which of these protocols?
which mode would be the Cisco Security Manager administrator use?
To provide a separation of duties within Cisco Security Manager, which mode would be the Cisco Security Manager administrator use?
Which of these command sequences will send an email to holly@invalid.com using SMTP?
Which of these command sequences will send an email to holly@invalid.com using SMTP?
Which four types of violations can be investigated using a security forensic process?
Which four types of violations can be investigated using a security forensic process? (Choose four.)
Which IPv6 Interior Gateway Protocol (IGP) relies entirely on IPsec to secure communications between neighbors
Which IPv6 Interior Gateway Protocol (IGP) relies entirely on IPsec to secure communications between neighbors?
which of these?
A DNS server that responds to query messages with information stored in Resource Records (RRs) for a domain name space stored on the server is known as which of these?
which of these?
Cisco ASA 5500 series adaptive security appliance application layer protocol inspection is implemented using which of these?