In which two ways d...
 
Notifications
Clear all

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

1 Posts
1 Users
0 Likes
240 Views
(@hevesywilber)
Noble Member
Joined: 2 years ago
Posts: 682
Topic starter  

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

  • A . by IPv6 routing protocols to securely build neighborships without the need of authentication
  • B . by the recovery mechanism to recover the binding table in the event of a device reboot
  • C . by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways
  • D . by various IPv6 guard features to validate the data link layer address
  • E . by storing hashed keys for IPsec tunnels for the built-in IPsec features

Show Answer Hide Answer

Suggested Answer: B,D

Explanation:

Overview of the IPv6 First-Hop Security Binding Table A database table of IPv6 neighbors connected to the device is created from information sources such as NDP snooping. This database, or binding table, is used by variousIPv6 guard features to validate the link-layer address (LLA), the IPv4 or IPv6 address, and the prefix binding of the neighbors to prevent spoofing and redirect attacks.

IPv6 First-Hop Security Binding Table Recovery MechanismThe IPv6 first-hop security binding table recovery mechanism enables the binding table to recover in the event of a device reboot.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/15-s/ip6-fhs-bind-table.html

   
Quote

Latest Cisco 300-410 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: