Components Supported by LISP - Exam 350-401-ENCOR - Cisco

Supported Components by LISP

Question

Which two components are supported by LISP? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

AB.

LISP stands for Locator/ID Separation Protocol and is used to separate endpoint identifiers and their location. It is a network architecture protocol that was initially developed by Cisco Systems.

LISP has two main components:

  1. Endpoint Identifier (EID): It represents the IP address of the endpoint device that initiates or receives network traffic. EID is used as the identifier of the device in the network.

  2. Routing Locator (RLOC): It represents the IP address of the device that connects the endpoint device to the network. RLOC is used as the locator of the device in the network.

With LISP, EID and RLOC are separated, which makes it possible to move a device without changing its IP address. This is accomplished by assigning a unique identifier to each device, called an Endpoint ID (EID). The device's location is then determined by a separate address, called the Routing Locator (RLOC).

The two components supported by LISP are:

  1. Egress Tunnel Router (ETR): It is a device that receives packets from the LISP network and forwards them to the destination endpoint device. ETRs are responsible for encapsulating packets with the correct RLOC address and forwarding them to the next hop.

  2. Spoke: It is an endpoint device that communicates with the LISP network through an ETR. Spokes are responsible for sending packets to the ETR, which then forwards them to the destination endpoint device.

Therefore, the correct answers are B. egress tunnel router and E. spoke.

The other options are not components supported by LISP. A proxy ETR is a type of ETR that is used in LISP to provide redundancy and load balancing. A route reflector is a network device that helps to improve the scalability and efficiency of a routing protocol. HMAC algorithm is a cryptographic hash function used to verify the integrity of data.