Which statement is correct about access ports?
They are assigned to a single VLAN.
They are assigned to multiple VLANs.
They must be connected to a router.
They must be connected to a firewall.
An access port is a Layer 2 switch interface mode intended for an endpoint that belongs to a single VLAN. Traffic on an access port is associated with exactly one VLAN, and frames are typically transmitted and received untagged on the wire. The switch internally maps that untagged traffic into the configured access VLAN, placing the endpoint into the correct broadcast domain. This behavior is widely used for server access, management ports, out of band devices, and any endpoint that does not tag VLANs.
By contrast, trunk ports are designed to carry multiple VLANs simultaneously, usually with 802.1Q tagging, and are typically used between switches, to routers, to virtualization hosts, or to appliances that handle multiple VLANs. That is why assigning multiple VLANs to an access port is not the standard access mode behavior.
An access port does not have to connect to a router or a firewall. It can connect directly to any Ethernet endpoint. Routing between VLANs is provided by a Layer 3 interface such as an IRB interface on the switch or an external routed device, but that is independent of whether the endpoint connects on an access port.
Verification sources from Juniper documentation
https://www.juniper.net/documentation/us/en/software/junos/multicast-l2/topics/topic-map/bridging-and-vlans.html
https://www.juniper.net/documentation/us/en/software/junos/multicast-l2/topics/task/interfaces-configuring-ethernet-switching-access.html
You are troubleshooting BGP routing and want to verify that you are sending a default route to peer address 10.100.25.6. Which command would satisfy the requirement?
show route protocol bgp 0.0.0.0
show route receive-protocol bgp 10.100.25.6 0.0.0.0
show route protocol static 0.0.0.0
show route advertising-protocol bgp 10.100.25.6 0.0.0.0
To confirm that your router is sending a specific route to a particular BGP neighbor, you must inspect the outbound advertisements toward that neighbor. In Junos, the command that shows routes being advertised to a peer is show route advertising-protocol bgp with the neighbor address specified. Adding 0.0.0.0 to the command filters the output to the default route, making it the most direct way to validate that the default route is actually being exported to peer 10.100.25.6. This is especially important in data center deployments where default route advertisement is often controlled by policy, conditional origination, or specific export terms, and where you want to verify the real operational result rather than just configuration intent.
The receive-protocol variant shows what you are learning from that neighbor, not what you are sending to it. The show route protocol bgp 0.0.0.0 command only confirms that the default route exists in your local routing table as a BGP-learned route, which does not prove it is being exported to the neighbor. The show route protocol static 0.0.0.0 command would confirm the presence of a static default route locally, but again it does not confirm that it is being advertised over BGP. Therefore, the outbound advertisement command is the correct verification method.
You want to enable routing between VLAN 10 and VLAN 20.

Which two configuration statements must be included in the configuration shown in the exhibit to accomplish this task? Choose two.
set vlans default vlan-id 20
set vlans vlan-10 l3-interface irb.10
set vlans vlan-20 l3-interface irb.20
set vlans default vlan-id 10
Inter-VLAN routing on Junos switching platforms is typically implemented by associating each VLAN or bridge domain with an IRB interface that provides the Layer 3 gateway for that VLAN. In the exhibit, VLAN 10 and VLAN 20 are defined with vlan-id values, and IRB logical units 10 and 20 already have IPv4 addresses assigned. However, the VLAN definitions do not yet reference the IRB interfaces. Without that association, hosts in the VLANs have no routed gateway on the switch, and the switch cannot perform Layer 3 forwarding between the two VLAN subnets.
To enable routing, each VLAN must include an l3-interface statement that binds the VLAN to the corresponding IRB logical unit. Adding l3-interface irb.10 under vlan-10 makes irb.10 the default gateway interface for VLAN 10 and enables the device to route traffic sourced from that VLAN. Adding l3-interface irb.20 under vlan-20 does the same for VLAN 20. Once both VLANs are bound to their IRB interfaces, the switch can route packets between 172.16.1.0/24 and 172.16.2.0/24 using its routing table, while still switching Layer 2 traffic within each VLAN.
The default VLAN settings are unrelated to enabling routing between these two specific VLANs. They control the behavior of the default VLAN, not the creation of Layer 3 gateways for VLAN 10 and VLAN 20.
Which two statements about overlay networks are correct? Choose two.
An overlay network is a public network that runs on top of a private network.
An overlay network carries only Layer 3 traffic.
An overlay network is a virtual network that runs on top of a physical network.
An overlay network carries Layer 2 and Layer 3 traffic
In modern data center architectures, an overlay network is a logical or virtual network built on top of an underlay, where the underlay is the physical IP fabric that provides basic Layer 3 transport and reachability between fabric nodes. The overlay abstracts the physical topology and delivers tenant connectivity and segmentation services. This makes the statement that an overlay is a virtual network running on top of a physical network correct.
In EVPN VXLAN based data centers, overlays commonly carry both Layer 2 and Layer 3 services. Layer 2 extension is achieved by encapsulating Ethernet frames inside VXLAN so that a VLAN like segment can span multiple leaf switches across a routed underlay. Layer 3 services are delivered either through symmetric routing at the VTEPs or by advertising IP prefixes and host routes through the overlay control plane. As a result, overlays are not limited to Layer 3 traffic only, and statement D is correct.
The overlay is not defined by being public versus private. It can be built for private multi tenant segmentation inside a single data center, across multiple data centers, or to connect to external services, but public network is not a defining attribute.
Verification sources from Juniper documentation
https://www.juniper.net/documentation/us/en/software/junos/evpn-vxlan/topics/topic-map/evpn-vxlan-overview.html
https://www.juniper.net/documentation/us/en/software/junos/vxlan/topics/topic-map/vxlan-overview.html
Which state in the adjacency process do OSPF routers check the MTU size?
Init
Exchange
Done
ExStart
In OSPF, routers exchange link-state information in different stages to establish full adjacency. The MTU size is checked during the Exchange state.
Step-by-Step Breakdown:
1. OSPF Adjacency Process:
o OSPF routers go through multiple stages when forming an adjacency: Down, Init, 2-Way, ExStart, Exchange, Loading, and Full.
2. Exchange State:
o During the Exchange state, OSPF routers exchange Database Description (DBD) packets to describe their link-state databases. The MTU size is checked at this stage to ensure both routers can successfully exchange these packets without fragmentation.
o If there is an MTU mismatch, the routers may fail to proceed past the Exchange state.
Juniper Reference:
· MTU Checking in OSPF: Junos uses the Exchange state to check for MTU mismatches, ensuring that routers can properly exchange database information without packet fragmentation issues.
Which high availability feature permits you to combine multiple Ethernet interfaces into a single link layer interface?
graceful Routing Engine switchover
link aggregation groups
nonstop bridging
nonstop active routing
Link aggregation groups, implemented on Junos as aggregated Ethernet interfaces, allow multiple physical Ethernet links to operate as one logical Layer 2 interface. This increases available bandwidth and provides link level resiliency because member links can fail without taking down the logical interface, as long as at least one member remains operational. In data center leaf spine designs, link aggregation is commonly used for server dual homing, uplinks to appliances, or inter switch connectivity where parallel links are desired with a single logical adjacency.
From a forwarding perspective, the device distributes traffic across member links using a hashing algorithm based on packet header fields so that individual flows remain in order while the aggregate uses multiple links. Control plane operation can be static or negotiated with LACP. With LACP, both sides exchange protocol information to ensure consistent bundling and to remove failed or miswired members automatically. This makes link aggregation a core high availability building block at the link layer, independent of Routing Engine redundancy features.
Graceful Routing Engine switchover, nonstop bridging, and nonstop active routing are control plane redundancy features. They are designed to minimize disruption during Routing Engine failover or preserve protocol state, but they do not combine multiple physical Ethernet interfaces into one logical link layer interface.
Verification sources from Juniper documentation
https://www.juniper.net/documentation/us/en/software/junos/interfaces-ethernet/topics/topic-map/understanding-lacp.html
https://www.juniper.net/documentation/us/en/software/junos/interfaces-ethernet/topics/topic-map/aggregated-ethernet-interfaces-overview.html

Referring to the exhibit, which type of protocol session will be established?
OSPF
IS-IS
EBGP
IBGP
The configuration shown is under protocols bgp and defines a BGP group named service-pod with the statement type internal. In Junos, the BGP group type determines whether the sessions formed by neighbors in that group are treated as internal BGP or external BGP. When the group is set to type internal, the router establishes an iBGP session to the configured neighbor address. That means both peers are expected to be in the same autonomous system, and the session is used to exchange routes within that single AS.
The local-address statement sets the source address that the router will use when initiating the TCP connection for BGP. In data center designs, this is commonly a loopback address so the session can be resilient and independent of any single physical interface. The neighbor statement identifies the remote peer address. With type internal, the session is iBGP even if the neighbor is directly connected, because the relationship is defined by AS scope rather than topology.
OSPF and IS-IS are different routing protocols entirely and are not established through BGP configuration. EBGP would require type external and typically involves different AS numbers across the peering. Therefore, the only correct answer is IBGP.
Which two statements about VLANs are true? Choose two.
By default, ports in a VLAN operate in trunk mode.
A single VLAN is limited to only half of a switch's physical ports.
A single VLAN can include all of a switch's physical ports.
By default, ports in a VLAN operate in access mode.
In Junos Ethernet switching, a VLAN is a Layer 2 broadcast domain and can include any set of switch ports that you assign to it. There is no generic rule that limits a VLAN to only half of a switch’s physical ports. Practically, a single VLAN can include all physical ports on the switch if that is how the environment is designed, for example in a flat Layer 2 segment for a specific purpose or during a migration. This makes statement C correct.
For interface mode behavior, access mode is the default expectation for endpoint-facing Layer 2 ports where traffic is normally untagged. In Junos, when an interface is configured for Ethernet switching and no explicit trunk configuration is applied, the operational intent aligns with access behavior: the port is associated with a single VLAN and forwards frames as untagged on the wire. Trunk mode must be explicitly configured when the link needs to carry multiple VLANs using 802.1Q tagging, such as switch-to-switch uplinks or server connections that tag multiple VLANs. Therefore, statement D is correct and statement A is incorrect because trunk mode is not the default behavior.
This distinction is important in data center operations because misidentifying an access port as a trunk can lead to dropped traffic, VLAN mismatch, or unexpected flooding behavior.
Verification sources from Juniper documentation
https://www.juniper.net/documentation/us/en/software/junos/multicast-l2/topics/topic-map/bridging-and-vlans.html
https://www.juniper.net/documentation/us/en/software/junos/multicast-l2/topics/task/interfaces-configuring-ethernet-switching-access.html
What is the behavior of the default export policy for OSPF?
Accept all routes.
Reject all routes.
Redistribute all routes.
Forward all routes.
In Junos, the default export policy for OSPF is to reject all routes from being exported.
Step-by-Step Breakdown:
Default Export Policy:By default, OSPF in Junos does not export any routes to other routing protocols or neighbors. This is a safety mechanism to prevent unintended route advertisements.
Custom Export Policies:
If you need to export routes, you must create a custom export policy that explicitly defines which routes to advertise.
Example: You can create an export policy to redistribute static or connected routes into OSPF.
Juniper Reference:
OSPF Export Behavior: In Juniper devices, the default policy for OSPF is to reject route advertisements unless explicitly configured otherwise through custom policies.
What is the purpose of implementing a link aggregation group LAG in a network?
to provide redundancy and load balancing across multiple links
to encrypt traffic between switches
to increase the speed of a single physical interface
to assign IP addresses automatically to devices on a network
A link aggregation group combines multiple physical Ethernet interfaces into one logical link layer interface, called an aggregated Ethernet interface on Junos. The primary purpose is to improve availability and increase usable bandwidth between two devices without changing the logical topology. If one member link fails, the aggregate can remain up and continue forwarding traffic over the remaining active members, providing redundancy at the link layer. This is especially valuable in data center designs where loss of a single optic or cable should not interrupt server connectivity, leaf to spine uplinks, or connections to service appliances.
LAG also enables load balancing. Instead of forcing all traffic over one physical link, the forwarding plane distributes flows across member links using a hashing algorithm. This allows the aggregate to use the sum of member bandwidth for multiple concurrent flows while keeping packets for a given flow in order. In leaf spine fabrics, this complements ECMP at Layer 3 by delivering parallelism both at the routed path level and within a single adjacency when multiple physical links exist.
LAG does not encrypt traffic. Encryption is provided by separate security features and protocols. It also does not increase the speed of a single physical interface; rather, it increases the total capacity of the logical bundle across multiple links. Finally, it does not assign IP addresses, which is the role of services like DHCP, not link aggregation.
Which two statements are correct about configuring VLANs? Choose two.
You must assign an IRB interface to each VLAN.
You must assign a VLAN name or ID and a Layer 2 interface to the VLAN.
You can assign one or more VLANs to a trunk mode interface.
You can assign one or more VLANs to an access mode interface.
On Junos switching platforms commonly used in data centers, a VLAN is a Layer 2 construct that defines a broadcast domain. To make a VLAN usable, you define the VLAN using a name and typically a VLAN ID, then associate Layer 2 interfaces with it so traffic entering those interfaces is placed into that VLAN. Without membership on interfaces, the VLAN exists in configuration but does not carry user traffic, because no ports participate in that broadcast domain.
Trunk mode interfaces are specifically designed to carry traffic for multiple VLANs over a single physical link, such as between switches, to servers using tagging, or to other network devices that understand VLAN tags. In Junos, trunking is implemented by allowing a list of VLAN IDs on the trunk so the interface accepts and forwards frames for those VLANs. This makes statement C correct.
An IRB interface is not mandatory for every VLAN. IRB is used when you want Layer 3 routing for a VLAN, typically to provide a default gateway and enable inter VLAN routing. Pure Layer 2 VLANs do not require IRB, which makes statement A incorrect.
Access mode interfaces are intended to connect to a single endpoint and carry traffic for a single VLAN, so assigning multiple VLANs to an access interface is not correct in standard access mode behavior, making statement D incorrect.
A switch receives an Ethernet frame that contains source and destination MAC addresses that are not in the Ethernet switching table. In this scenario, which two actions does the switch perform? Choose two.
The switch floods the frame out every port in the broadcast domain except the ingress port.
The switch adds the source MAC address to the Ethernet switching table.
The switch drops the frame.
The switch forwards the frame to the Routing Engine.
On Junos-based Ethernet switching platforms used in data centers, Layer 2 forwarding is handled primarily in the forwarding plane. When a switch receives a frame, it first performs source MAC learning. If the source MAC address is not already present in the Ethernet switching table for that VLAN or bridge domain, the switch creates a new entry that maps the source MAC to the ingress interface and the associated VLAN context. This learning step is fundamental to building the MAC table dynamically and enables efficient forwarding for subsequent frames destined back to that source.
Next, the switch attempts to forward the frame based on the destination MAC lookup in the same VLAN or bridge domain. Because the destination MAC is also not in the Ethernet switching table, the frame is treated as an unknown unicast. The default behavior for unknown unicast in a Layer 2 broadcast domain is to flood the frame out all other interfaces that belong to that VLAN or bridge domain, excluding the ingress interface. Flooding ensures the frame has the best chance of reaching the correct destination host. When the destination responds, the switch then learns that MAC address as a source on the return traffic, allowing future traffic to be forwarded as known unicast instead of flooded.
The switch does not drop the frame by default, and it does not forward the frame to the Routing Engine because this is normal Layer 2 bridging behavior, not a control-plane routing decision.
You are creating an IP fabric underlay and want to use OSPF as your routing protocol.
In this scenario, which statement is correct?
All leaf devices must be configured in separate OSPF areas.
All leaf and spine devices must be the same model to ensure the proper load-balancing behavior.
Interface speeds should be the same throughout the fabric to ensure that all links are utilized.
All spine devices must use the same router ID.
When creating an IP fabric underlay using OSPF as the routing protocol, consistent interface speeds are important to ensure optimal traffic distribution and utilization of all links.
Step-by-Step Breakdown:
OSPF and Interface Speeds:OSPF calculates the cost of a link based on its bandwidth. The default cost calculation in OSPF is:

If interface speeds vary significantly, OSPF may choose paths with lower cost (higher bandwidth), resulting in some links being underutilized.
Equal Utilization:To ensure that all links are equally utilized in an IP fabric, it is recommended to maintain uniform interface speeds across the fabric. This ensures balanced load sharing across all available paths.
Juniper Reference:
IP Fabric with OSPF: Juniper recommends consistent interface speeds to maintain even traffic distribution and optimal link utilization in IP fabric underlay designs.
What are three examples of martian addresses? Choose three.
224.0.0.0/4
172.36.0.0/24
192.0.0.0/24
198.60.0.0/16
127.0.0.0/8
In Junos routing and security contexts, martian addresses are IP prefixes that should not appear as valid, routable sources or destinations on normal interfaces because they are reserved, special-purpose, or otherwise not usable for general unicast forwarding. Treating these as invalid helps protect the control plane and prevents leakage of nonsensical routes into the fabric. This is especially relevant in data center underlays where strict routing hygiene is expected and where improper advertisements can cause blackholing or policy confusion.
The multicast range 224.0.0.0/4 is a classic martian example for unicast routing. These addresses are reserved for multicast and should not be accepted as ordinary unicast sources or carried as typical unicast reachability in an IP fabric. The loopback range 127.0.0.0/8 is also martian on physical networks because it is reserved for host self-reference and must never be forwarded by routers. Seeing it on an interface implies misconfiguration or spoofing.
The prefix 192.0.0.0/24 is reserved for special protocol and IETF assignments and is not intended for general use on public or private networks. As a result, it is commonly treated as martian in routing policy and input validation. By contrast, 172.36.0.0/24 and 198.60.0.0/16 are ordinary globally routable unicast space, so they are not martian by definition.
What are two challenges of traditional data center architectures? Choose two.
inefficient resource usage
inefficient network path selection
isolated user devices
increased latency
Traditional data center networks are often built using a layered three-tier design with access, aggregation, and core. These designs frequently rely on Layer 2 domains and spanning tree to prevent loops. One major drawback is inefficient resource usage. Spanning tree typically blocks redundant links, which means installed bandwidth and expensive uplinks can sit idle during normal operation. To compensate, organizations overbuild capacity or use complex workarounds, raising cost and operational burden. In addition, scaling tends to be vertical, adding bigger chassis or more complex aggregation, which can concentrate risk and reduce flexibility.
Another common challenge is increased latency. In a three-tier model, traffic between servers in different access blocks often traverses multiple tiers, adding hops and delay. Even when traffic stays within the same facility, the path is not consistently short, and application performance can suffer, especially for east-west workloads such as distributed databases and microservices where frequent server-to-server communication is normal. Modern leaf spine IP fabrics reduce these issues by using a routed underlay with predictable one-spine-hop paths between leaves and by keeping all links active with multipath routing.
While traditional architectures can also experience suboptimal path behavior, the most consistently cited challenges are idle capacity due to blocked links and additional hop count that increases latency.
Referring to the exhibit,

what is indicated by the OpenConfirm state?
BGP is waiting to receive an open message from the peer.
BGP is waiting for the transport protocol connection to be completed.
BGP is waiting for a start event.
BGP is waiting to receive a keepalive or notification message.
In the BGP finite state machine, OpenConfirm indicates that the TCP session is already established and the BGP OPEN message exchange has successfully completed. At this point, both peers have agreed on critical session parameters such as BGP version, autonomous system numbers, hold time, and the BGP identifier. Because the OPEN messages have been processed, BGP transitions from OpenSent to OpenConfirm and then waits for the next control message that validates the session is operational.
Specifically, in OpenConfirm the local BGP process is waiting to receive a KEEPALIVE message from the neighbor, which confirms that the neighbor accepted the OPEN and is ready to bring the session to the Established state. If instead a NOTIFICATION message is received, it indicates an error condition and the session will be torn down. This is why option D is correct.
Option A describes OpenSent, where the router is waiting to receive an OPEN after sending its own OPEN. Option B aligns more closely with Connect, where BGP is still trying to complete the transport connection. Option C relates to Idle, where BGP waits for a start event or configuration to initiate the session. In data center BGP underlays and EVPN control planes, being stuck in OpenConfirm commonly points to policy mismatch, capability negotiation issues, or keepalive handling problems, rather than basic IP reachability.
In a three-stage IP fabric, what is the sequence of fabric node stages that a packet passes through?
leaf to spine to spine to leaf
spine to leaf to spine
leaf to spine to leaf
superspine to spine to leaf
A three-stage IP fabric is a scaled leaf-spine design that adds an additional layer above the spine layer to increase port scale and bandwidth. In common data center terminology, the stages are leaf, spine, and an upper spine layer often referred to as superspine. Traffic sourced from an endpoint attached to a leaf switch first enters the fabric at that leaf. If the destination is attached to a different leaf and the fabric is truly three-stage, the packet typically traverses from the source leaf up to a spine, then continues upward to the upper layer spine, then down to a destination spine, and finally down to the destination leaf. The option that best represents this stage progression is leaf to spine to spine to leaf, where the second spine in the sequence corresponds to the upper layer spine tier in a three-stage design.
By contrast, leaf to spine to leaf describes a two-tier leaf-spine fabric where a single spine hop connects any two leaves. The other options do not represent the standard end-to-end progression for traffic between leaves in a three-stage fabric. In practice, the underlay uses routed links with equal-cost multipath, so there can be multiple equal paths that still follow the same stage order. This preserves predictable forwarding behavior while allowing the fabric to scale beyond what a two-tier topology can support.
According to Juniper Networks, the bridge table is more commonly known as a _________.
forwarding table
forwarding bridge
bridging information table
forwarding information table
In Ethernet switching, the bridge table is the data structure that maps MAC addresses to the switch interfaces where those MAC addresses were learned. Juniper commonly describes this function as the Ethernet switching table and also refers to it as the forwarding table in Layer 2 contexts. The concept is the same: the switch learns source MAC addresses from incoming frames, associates them with an ingress port and VLAN or bridge domain, and then uses that learned information to forward future frames to the correct egress port as known unicast.
Calling it a forwarding table is accurate because its primary operational purpose is deciding how to forward Layer 2 frames efficiently. When a destination MAC is present in the table, the switch performs a unicast forward to the learned port. When a destination MAC is not present, the switch treats it as unknown unicast and floods it within the VLAN or bridge domain, while still learning the source MAC for future use.
The term forwarding information table is more strongly associated with Layer 3 routing, where a FIB represents resolved next hops for IP prefixes in the forwarding plane. That is a different structure than the Layer 2 bridge or MAC table. The other options are not standard Juniper terms for this function.
Verification sources from Juniper documentation
https://www.juniper.net/documentation/us/en/software/junos/multicast-l2/topics/topic-map/ethernet-switching-components.html
https://www.juniper.net/documentation/us/en/software/junos/multicast-l2/topics/concept/ethernet-switching-table-understanding.html

Referring to the exhibit, which statement is correct about the 192.168.1.0/24 route?
The 192.168.1.0/24 route is load balanced across both next hops.
The 192.168.1.0/24 route will select 10.20.20.254 as the next hop.
The 192.168.1.0/24 route will select 10.20.20.253 as the next hop.
The 192.168.1.0/24 route is not installed in the routing table.
The configuration defines a static route for 192.168.1.0/24 with a primary next hop of 10.20.20.254 and a qualified-next-hop of 10.20.20.253 with preference 25. In Junos, qualified next hop is used to create preference-ranked redundancy for a static route, typically primary and backup forwarding. The key behavior is that the best, lowest preference path is selected as active. For static routes, the default preference for the route and its primary next hop is lower than 25 unless you explicitly raise it. Because the qualified-next-hop is configured with preference 25, it is less preferred than the primary next hop, so 10.20.20.254 remains the selected next hop during normal operation.
This is not load balancing. Junos does not automatically install both next hops for forwarding simply because more than one next hop is configured when one is qualified with a higher preference. Instead, the qualified next hop is held in reserve and is used only when the primary next hop becomes unusable, such as when it is no longer resolvable or the associated forwarding condition fails. Therefore, the route is expected to be installed and active using 10.20.20.254 under normal conditions, with 10.20.20.253 acting as a backup path.
Which BGP attribute is used to prevent routing loops in a network?
MED
LOCAL_PREF
NEXT_HOP
AS_PATH
BGP prevents inter-domain routing loops primarily through the AS_PATH attribute. Each time a route advertisement crosses an autonomous system boundary, the advertising router prepends its own AS number to the AS_PATH before sending the route onward. When a router receives a BGP update, it can inspect the AS_PATH and reject routes that already contain its own AS number. This simple rule blocks the route from circulating back into the same AS, which is the fundamental loop prevention behavior in BGP.
In data center IP fabrics that use EBGP for the underlay, AS_PATH still plays an important role even though private AS numbers are used. The fabric can be designed so that leaf and spine devices are in distinct private ASs or use structured AS assignment, and AS_PATH tracking ensures clean propagation and helps operators understand where a route has traveled. It also supports policy decisions, such as preferring shorter paths or applying policy based on specific AS sequences.
The other attributes serve different purposes. MED influences inbound path selection into an AS, LOCAL_PREF is used within an AS to influence outbound selection, and NEXT_HOP indicates the forwarding next hop and is validated for reachability. None of those attributes provide the explicit “contains my AS” loop detection that AS_PATH does.
Copyright © 2014-2026 Certensure. All Rights Reserved