Notifications
Clear all
Topic starter
25/05/2022 1:10 pm
Exhibit:
BGP is flapping after the Copp policy is applied .
What are the two solutions to fix the issue? (Choose two)
- A . Configure BGP in the COPP-CRITICAL-7600 ACL
- B . Configure a higher value for CIR under the default class to allow more packets during peak traffic
- C . Configure a higher value for CIR under the class COPP-CRITICAL-7600
- D . Configure a three-color policer instead of two-color policer under class COPP-CRITICAL-7600
- E . Configure IP CEF to CoPP policy and BGP to work
Suggested Answer: A,B
Explanation:
The policy-map COPP-7600 only rate-limit HTTP & HTTPS traffic (based on the ACL conditions) so any BGP packets will be processed in the class “class-default”, which drops exceeded BGP packets.
Therefore we have two ways to solve this problem:
+ Add BGP to the ACL with the statement “permit tcp any any eq bgp”
+ Configure higher value for CIR in default class as 2Mbps is too low for web traffic (http & https)
Explanation:
The policy-map COPP-7600 only rate-limit HTTP & HTTPS traffic (based on the ACL conditions) so any BGP packets will be processed in the class “class-default”, which drops exceeded BGP packets.
Therefore we have two ways to solve this problem:
+ Add BGP to the ACL with the statement “permit tcp any any eq bgp”
+ Configure higher value for CIR in default class as 2Mbps is too low for web traffic (http & https)