The network administrator is adding a new N1Kv to the vCenter, however, the administrator does not see the new switch under the networking tab of vCenter.
The administrator issues the following command on the VSM to troubleshoot:
VSM# show svs connections
connection VC:
ip address: 10.10.10.30
remote port: 80
protocol: vmware-vim https
certificatE. default
datacenter namE. DC1
DVS uuiD. 67 32 30 50 a6 d2 49 64-9e 1c 5f 49 e3 af 55 99
config status: Disabled
operational status: Disconnected sync status: -
version: -
When attempting to fix the issue, the following error is seen:
VSM-PRI-188# conf
VSM-PRI-188(config)# svs connection VC
VSM-PRI-188(config-svs-conn)# connect
ERROR: [VMWARE-VIM] Extension key was not registered before its use
What is the cause of the error?()
A. Missing control VLAN in VSM configuration
B. Missing packet VLAN in VSM configuration
C. VSM has no network connection to vCenter
D. VSM extension key is not installed on vCenter
E. vCenter extension key is not installed on VSM
您可能感興趣的試卷
你可能感興趣的試題
Given the following configuration:
port-profile type ethernet DATA-UPLINK
vmware port-group
switchport trunk allowed vlan 1-3967,4048-4093
channel-group auto mode on
no shutdown
state enabled
port-profile type ethernet MGMT-UPLINK
vmware port-group
switchport trunk allowed vlan 10-12
channel-group auto mode on
no shutdown
state enabled
VEMs are seen to be joining and then are lost from the Cisco VSM. How would you resolve this issue?()
A. Remove second NIC from each port profile
B. Remove VEM from VSM (no vem X), remove NICs, and reinsert
C. Ensure that VLANs on uplink profiles are not overlapping
D. Reinstall VEM
E. Issue the command "module vem X execute vemcmd set pinning module vsm 1"
A. Send monitored traffic to a VLAN
B. Send monitored traffic to a remote VEM over L2
C. Receive monitored traffic on a vEthernet interface
D. Send monitored traffic to an IP destination
A. Source and destination interface must be on the same host
B. Source and destination interfaces can be on different hosts
C. Destination vEthernet interface can be on a different VLAN than the source
D. Destination interface can be a physical port
E. Destination interface cannot be a physical port
Given a host with two NICs assigned to a N1k profile,which topologies are suitable for this type of configuration ()
port-profile type Ethernet name VM-Data
vmware port-group
switchport mode trunk
switchport allowed vlan 400-410
channel-group auto mode active
no shut
state enabled
A. Cisco UCS fabric interconnects
B. Pair of N5K’s in VPC
C. Standalone N5K
D. Pair of N5K’s in non-VPC
E. Cisco Catalyst 6000 Switch in VSS
A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? ()
VSM-PRI-188# sh int vethernet 5
Vethernet5 is up
Port description is VM001, Network Adapter 2
HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e)
Owner is VM "VM001", adapter is Network Adapter 2
Active on module 5
VMware DVS port 484
Port-Profile is VM-vlan-10
Port mode is access
VSM-PRI-188# sh int vethernet 6
Vethernet6 is up
Port description is VM002, Network Adapter 1
HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020)
Owner is VM "VM002", adapter is Network Adapter 1
Active on module 5
VMware DVS port 485
Port-Profile is VM-vlan-10
Port mode is access
A. Monitor session 1 type span Source interface veth5 both Destination interface veth6 No shut
B. monitor session 1 source vlan 10 destination interface veth6 no shut
C. monitor session 1 type er-span source interface vlan 10 destination ip 10.1.1.10 no shut
D. VM002 must be removed from the Nk1V
E. Move VM002 to Module 5
F. Restart the VEM on module 5
A. validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
B. intercepts all ARP requests and responses on untrusted ports
C. builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
D. uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
E. limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry
A Cisco switch has this configuration for a port channel connecting to an ESXi using dual NICs and is intended for use with an N1Kv.
Interface fastethernet 1/10
Switchport mode trunk
Switchport trunk allowed vlan all
Channel-group 10 mode on
No shut
Interface fastethernet 1/11
Switchport mode trunk
Switchport trunk allowed vlan all
Channel-group 10 mode on
No shut
Interface port-channel 10
Switchport mode trunk
Switchport allowed vlan all
No shut
Which Port Channel configuration must be used on the Nexus 1000v port-profile?()
A. MAC pinning
B. Cisco Discovery Protocol pinning
C. Mode On
D. Mode Active
E. No port channel configuration
A. perform flow lookups
B. intercept packets on service enabled ports
C. run packets through the vPath flow manager
D. classify the packets
E. flow manager emits an action for the packets
F. enforce the action determined by the flow manager
Given the following configuration, what command can be used to determine the physical path that traffic will be sent out upon?()
Port-profile type Ethernet name vm-data
Switchport mode trunk
Switchport trunk allowed vlan 200-210
Channel-group auto mode on mac-pinning
State enabled
Vmware port-group
No shut
Port-profile type vethernet name vlan-200
Switchport mode access Switchport vlan 200
State enabled Vmware port-group No shut
A. module vem X execute vemcmd show trunk
B. show module 3 internal pinning
C. module vem X execute vemcmd show port
D. show module vem mapping
E. show interface vethX pinning
A. Upstream switch
B. Virtual Supervisor Module
C. VMware distributed switch
D. VMware vSwitch
E. Service virtual machine
最新試題
Which two statements about end-host mode in SAN connectivity in a Cisco UCS environment are true? ()
Given a Cisco Unified Computing System, which is a valid port type in end-host mode?()
Which statement is true about "full state backup" in a Cisco Unified Computing System?()
Which statements are true regarding the Cisco UCS fabric failover feature? ()
What is the purpose of this command in a Cisco Application Control Engine?() switch/Admin# show np 1 me-stats "-F0 v"
Your company wants Server 1/eth0 (vNIC 1) configured so that it always uses Fabric Interconnect A Port Channel 1 (Po1) when it communicates with anything outside of the Cisco UCS domain. However, if vNIC 1 fails over to Fabric Interconnect B using fabric failover, then vNIC 1 can any uplink port on Fabric Interconnect B. Which statements are true? ()
Given the following output: san-port-channel 12 is up Hardware is Fibre Channel Port WWN is 24:0c:00:0d:ec:d3:5c:00 Admin port mode is NP, trunk mode is on Port mode is NP Port vsan is 1 Speed is 8 Gbps Member[1] : fc2/3 Member[2] : fc2/4 What does "Speed is 8 Gbps" indicate?()
Which is true when describing a connection replication in Cisco ACE?()
Which of the following are supported in Cisco Global Site Selector? ()
In the event of a GSS failure in a GSS cluster, which is true?()