Home > Share your ROUTE v2.0 Experience

Share your ROUTE v2.0 Experience

January 22nd, 2015 in ROUTE 300-101 Go to comments
Note: The last day to take this ROUTE 300-101 exam is February 23, 2020. After this day you have to take new Enterprise exams to get new CCNP Enterprise certification. If you want to find out more about the new exams please visit here.

The ROUTE 300-101 (ROUTE v2.0) exam has been used to replace the old ROUTE 642-902 exam so this article is devoted for candidates who took this exam sharing their experience.

Please tell with us what are your materials, the way you learned, your feeling and experience after taking the ROUTE v2.0 exam… But please DO NOT share any information about the detail of the exam or your personal information, your score, exam date and location, your email…

Note: Posting email is not allowed in the comment section.

Your posts are warmly welcome!

Comments
Comment pages
1 259 260 261 262 263 391 1008
  1. pjsousa
    December 3rd, 2018

    @ALL, anyone here taking the exam this week?

  2. The IrishLad
    December 3rd, 2018

    @pjsousa
    Taking it mid December.

  3. hhhhhhhhh
    December 3rd, 2018

    please send me the 227 question. {email not allowed}

  4. Balha
    December 3rd, 2018

    @RouteRider

    http and https is a tcp traffic a web trafic use tcp port LIKE (FTP AND SMTP).
    but udp is a user datagram protocol like (TFTP AND dns)

  5. hhhhhh
    December 3rd, 2018

    please send me the 227 question
    {email not allowed}

  6. hhhhhhhhhhhh
    December 3rd, 2018

    please send me the 227 question
    hani93nabeel@g

  7. Anonymous
    December 3rd, 2018

    whats the answer anybody? an others if you know– A or D?

    when unicast reverse path fowarding is configured on an interface, which action does the interface take first when it receives its packet

    a. it verifies the source has a valid cef adjacency
    b. it checks the ingress access lists
    c. it checks the egress access lists
    d. it verifies a reverse path via the FIB to the source

  8. RouteRider
    December 3rd, 2018

    @Balha
    I wrote it too
    So the correct answer A. First ACL of B doesn’t filter TCP 80! So the users can use TCP 80 this time interval.

  9. Balha
    December 3rd, 2018

    @RouteRider

    A. time-range SATSUN periodic Saturday Sunday 1:00 to 23:59
    access-list 102 deny tcp any any eq 80 time-range SATSUN
    access-list 102 deny tcp any any eq 443 time-range SATSUN
    interface VLAN303
    ip address 10.9.5.3 255.255.255.0
    ip-access-group 102 in

    B. time-range SATSUN periodic Saturday Sunday 1:00 to 23:59
    access-list 102 deny udp any any eq 80 time-range SATSUN
    access-list 102 deny tcp any any eq 443 time-range SATSUN
    interface VLAN303
    ip address 10.9.5.3 255.255.255.0
    ip-access-group 102 out

    – in A deny tcp in inbound traffic.
    – in B deny udp in outbound traffic .

    extended acl must be applied to the port closest to the user , in inbound trafic so logically A is the right answer

  10. Balha
    December 3rd, 2018

    @RouteRider

    I confirm your analisys

  11. RouteRider
    December 3rd, 2018

    I wrote this earlier…
    :-)

  12. Balha
    December 3rd, 2018

    @Anonymous

    whats the answer anybody? an others if you know– A or D?

    when unicast reverse path fowarding is configured on an interface, which action does the interface take first when it receives its packet

    a. it verifies the source has a valid cef adjacency
    b. it checks the ingress access lists
    c. it checks the egress access lists
    d. it verifies a reverse path via the FIB to the source

    D is the right answer , It checks the ingress access lists.

    https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfrpf.html

    When a packet is received at the interface where Unicast RPF and ACLs have been configured, the following actions occur:

    Step 1 Input ACLs configured on the inbound interface are checked.

    Step 2 Unicast RPF checks to see if the packet has arrived on the best return path to the source, which it does by doing a reverse lookup in the FIB table.

    Step 3 CEF table (FIB) lookup is carried out for packet forwarding.

    Step 4 Output ACLs are checked on the outbound interface.

    Step 5 The packet is forwarded.

  13. Balha
    December 3rd, 2018

    @Anonymous

    excuse me C is the right answer not D

    c. it checks the egress access lists

  14. Balha
    December 3rd, 2018

    @Anonymous

    I fault again hhhhhh

    B not C

    b. it checks the ingress access lists

  15. RouteRider
    December 3rd, 2018

    @balha @Anonymus
    Only if the question says about ACL…
    In my opinion, if there isn’t ACL D is the correct answer.

  16. Anonymous
    December 3rd, 2018

    @balha are u sure… i will try study it again– please confirm answer with little details..appreciate

  17. Balha
    December 3rd, 2018

    @RouteRider

    D is fault the time not configured correctly

    time-range SATSUN absolute Saturday Sunday 1:00 to 2359

    2359 time of mars :)))))

  18. Balha
    December 3rd, 2018

    @RouteRider

    excuse me :)))) i think you spoke about Acl in other question

  19. Balha
    December 3rd, 2018
  20. ikim
    December 3rd, 2018

    pls can someone share the 227 dump for the email below
    i d a n k i m h i 1@ g m a i l.com
    without the space
    thank :)

  21. Anonymous
    December 3rd, 2018

    yes routerrider seems correct– D

  22. Balha
    December 3rd, 2018

    @Routerrider @Anonymous

    B is the correct answer see this :

    Unicast RPF checks to see if any packet received at a router interface arrives on the best return path (return route) to the source of the packet. Unicast RPF does this by doing a reverse lookup in the CEF table. If the packet was received from one of the best reverse path routes, the packet is forwarded as normal. If there is no reverse path route on the same interface from which the packet was received, it might mean that the source address was modified. If Unicast RPF does not find a reverse path for the packet, the packet is dropped or forwarded, depending on whether an access control list (ACL) is specified in the ip verify unicast reverse-path interface configuration command.

  23. Balha
    December 3rd, 2018

    @Routerrider @Anonymous

    the unicast rpf work throught acl

    Step 1 Input ACLs configured on the inbound interface are checked.

    Step 2 Unicast RPF checks to see if the packet has arrived on the best return path to the source, which it does by doing a reverse lookup in the FIB table.

    Step 3 CEF table (FIB) lookup is carried out for packet forwarding.

    Step 4 Output ACLs are checked on the outbound interface.

    Step 5 The packet is forwarded.

  24. Anonymous
    December 3rd, 2018

    @balha..good job—

  25. RouteRider
    December 3rd, 2018

    @balha
    I don’t agree with you. The question doesn’t say if there is an ACL.
    If not, the first step is “the router examines all packets received as input on that interface to make sure that the source address and source interface appear in the routing table and match the interface on which the packet was received. This “look backwards” ability is available only when Cisco express forwarding (CEF) is enabled on the router, because the lookup relies on the presence of the Forwarding Information Base (FIB). CEF generates the FIB as part of its operation.”

  26. Bigbox
    December 3rd, 2018

    Can you send me the dumps bank sygm@ gmail.com
    cheers

  27. Balha
    December 3rd, 2018

    @RouteRider

    Prerequisites to Configuring Unicast Reverse Path Forwarding
    Prior to configuring Unicast RPF, configure ACLs:

    Configure standard or extended ACLs to mitigate transmission of invalid IP addresses (perform egress filtering). Permit only valid source addresses to leave your network and get onto the Internet. Prevent all other source addresses from leaving your network for the Internet.

    Configure standard or extended ACLs entries to drop (deny) packets that have invalid source IP addresses (perform ingress filtering). Invalid source IP addresses include the following types:
    Reserved addresses
    Loopback addresses
    Private addresses (RFC 1918, Address Allocation for Private Internets)
    Broadcast addresses (including multicast addresses)
    Source addresses that fall outside the range of valid addresses associated with the protected network
    Configure standard or extended ACL entries to forward (permit) packets that fail the Unicast RPF checks to allow specific traffic from known asymmetric routed sources.

    Configure ACLs to track Unicast RPF events by adding the logging option into the ACL command. During network attacks, judicious logging of dropped or forwarded packets (suppressed drops) can provide additional information about network attacks.

  28. hhhhhhhhhhhhh
    December 4th, 2018

    please send me the 227 question
    hani93nabeel@g

  29. hhhhhhhhhhhh
    December 4th, 2018

    please send me the 227 question
    hani93nabeel@g

  30. hhhhhhhhhhhh
    December 4th, 2018

    please send me the 227 question …..
    hani93nabeel@g

  31. hhhhhhhhhhhh
    December 4th, 2018

    please send me the 227 question……………….
    hani93nabeel@g

  32. jack
    December 4th, 2018

    Don’t believe in the 227 dump.
    I’ve got the mail and asked me to pay.

  33. Raj
    December 4th, 2018

    contacted Spoto, 248 questions now.

  34. Please share the 227 questions
    December 4th, 2018

    please send me the 227 question, for the Route, my exam is this friday, share please

    {email not allowed}

  35. CCNP latest share
    December 4th, 2018

    Hi Guys
    please send me the new spoto 227 question, for the Route, my exam is this friday, share please

    chloe dot ackwell at gmail dot com

  36. CCNP dipen
    December 4th, 2018

    @multiple kindly send me new dump spoto 248 / spoto 227 at
    dipen 6085 @ gmail . com

  37. J Philipp
    December 4th, 2018

    @jack then you should go to Site number 261 and download the dumps.
    So there is no scammer who knows your E-Mail address.
    I hate this lazy people. Download it!

  38. pjsousa
    December 4th, 2018

    @Raj, dod u have the new 248 Q from Spoto then?

  39. RouteRider
    December 4th, 2018

    Features of Netflow version 9? (CHOOSE TWO)
    A. Cisco proprietary
    B. IEEE standard
    C. IETF
    D. ingress/egress
    E. ingress
    F. egress
    In my opinion, the right answer C D

  40. Chucky
    December 4th, 2018

    Can anyone please share me 227 dump -> email ID {email not allowed}

  41. Anonymous
    December 4th, 2018

    Can anyone please share me 227 dump -> email ID : razgani*52@g*m*ail*.com

  42. pjsousa
    December 4th, 2018

    @ Routerider, i agree.

    NetFlow version 9 is the IETF standard mechanism for information export. It was CISCO proprietary back in the days but now it is not.
    (https://www.cisco.com/c/en/us/products/ios-nx-os-software/netflow-version-9/index.html)

    Netflow v9 brought support to the Egress flow (not supported by previous version NFv5). There is a field called Dirrection where DIRECTION supporting both flows ( 0 – ingress flow, 1 – egress flow).

  43. CCNP_passed
    December 4th, 2018

    HI Guys,

    I passed 890/1000 exam yesterday. If you want, I can confirm questions from valid dumps for other people.

    my email: robrexal @ gmail .com

  44. DAYAX
    December 4th, 2018

    PLEASE CAN ANY ONE SEND FOR ME THE NEW 227 DUMP ON

    {email not allowed}

  45. CCNP_ROUTE TO BE
    December 4th, 2018

    Thanks @ RouterRider

  46. DAYAX
    December 4th, 2018

    CAN NY ONE SHARE ME 227 DUMP

    DAYAXEEY#1973#@G *M*IAL*.COM

  47. fulltimes
    December 4th, 2018

    Please send me the new dump spoto 227 to fudongbin @ gmail .com
    thanks thanks thanks thanks thanks thanks thanks thanks thanks

  48. Alisaad .,:(*ب*):,.
    December 4th, 2018

    Can anyone please share me 227 dump

    Alisadd1990@ Gmail.com

  49. Alisaad .,:(*ب*):,..
    December 4th, 2018

    Can anyone please share me 227 dump

    Alisaadd1990@ Gmail.com.

    ,:(*ب*):,

    Please


  50. Note: Please do not open any suspicious links (especially short links and links that need to remove some words to open) in the comment section above as they are usually spams and may harm your computer.
Comment pages
1 259 260 261 262 263 391 1008
  1. No trackbacks yet.