Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

VMware Exam 3V0-41.22 Topic 1 Question 7 Discussion

Actual exam question for VMware's 3V0-41.22 exam
Question #: 7
Topic #: 1
[All 3V0-41.22 Questions]

SIMULATION

Task 2

You are asked to deploy three Layer 2 overlay-backed segments to support a new 3-tier app and one Layer 2 VLAN-backed segment for support of a legacy application. The logical segments must block Server DHCP requests. Ensure three new overlay-backed segments and one new VLAN-backed logical segment are deployed to the RegionA01-COPMOI compute cluster. All configuration should be done utilizing the NSX UI.

You need to:

Complete the requested task.

Notes: Passwords are contained in the user_readme.txt. Task 2 is dependent on the completion of Task 1. Other tasks are dependent on completion of this task. You may want to move to the next tasks while waiting for configuration changes to be applied. This task should take approximately 10 minutes to complete.

Show Suggested Answer Hide Answer
Suggested Answer: A

To deploy three layer 2 overlay-backed segments and one layer 2 VLAN-backed segment, you need to follow these steps:

Log in to the NSX Manager UI with admin credentials. The default URL is https://<nsx-manager-ip-address>.

Navigate to Networking > Segments and click Add Segment.

Enter a name for the segment, such as Web-01.

Select Tier-1 as the connectivity option and choose an existing tier-1 gateway from the drop-down menu or create a new one by clicking New Tier-1 Gateway.

Enter the gateway IP address of the subnet in a CIDR format, such as 192.168.10.1/24.

Select an overlay transport zone from the drop-down menu, such as Overlay-TZ.

Optionally, you can configure advanced settings such as DHCP, Metadata Proxy, MAC Discovery, or QoS for the segment by clicking Set Advanced Configs.

Click Save to create the segment.

Repeat steps 2 to 8 for the other two overlay-backed segments, such as App-01 and DB-01, with different subnet addresses, such as 192.168.20.1/24 and 192.168.30.1/24.

To create a VLAN-backed segment, click Add Segment again and enter a name for the segment, such as Legacy-01.

Select Tier-0 as the connectivity option and choose an existing tier-0 gateway from the drop-down menu or create a new one by clicking New Tier-0 Gateway.

Enter the gateway IP address of the subnet in a CIDR format, such as 10.10.10.1/24.

Select a VLAN transport zone from the drop-down menu, such as VLAN-TZ, and enter the VLAN ID for the segment, such as 100.

Optionally, you can configure advanced settings such as DHCP, Metadata Proxy, MAC Discovery, or QoS for the segment by clicking Set Advanced Configs.

Click Save to create the segment.

To apply a segment security profile to block DHCP requests on the segments, navigate to Networking > Segments > Segment Profiles and click Add Segment Profile.

Select Segment Security as the profile type and enter a name and an optional description for the profile.

Toggle the Server Block and Server Block - IPv6 buttons to enable DHCP filtering for both IPv4 and IPv6 traffic on the segments that use this profile.

Click Save to create the profile.

Navigate to Networking > Segments and select the segments that you want to apply the profile to.

Click Actions > Apply Profile and select the segment security profile that you created in step 18.

Click Apply to apply the profile to the selected segments.

You have successfully deployed three layer 2 overlay-backed segments and one layer 2 VLAN-backed segment with DHCP filtering using NSX-T Manager UI.


Contribute your Thoughts:

Eloisa
10 hours ago
I think deploying those segments will be challenging.
upvoted 0 times
...
Melvin
4 days ago
That's a good idea, it will help us ensure we are following the correct process.
upvoted 0 times
...
Carey
5 days ago
This is gonna be a breeze. As long as I don't accidentally enable DHCP on the new segments, I should be good to go. Although, maybe I'll double-check that just to be safe.
upvoted 0 times
...
Nakita
7 days ago
I would definitely check the step by step instructions in the Complete Solution for guidance.
upvoted 0 times
...
Melvin
11 days ago
I agree, especially with the requirement to block Server DHCP requests.
upvoted 0 times
...
Elfrieda
22 days ago
Hmm, the images are a bit confusing. Guess I better read the instructions carefully to make sure I don't mess this up. Can't have the app going down on day one, you know?
upvoted 0 times
Dierdre
1 days ago
User1: Yeah, those images can be tricky. Best to follow the step by step instructions.
upvoted 0 times
...
...
Nakita
29 days ago
I think deploying the segments for the new app sounds challenging.
upvoted 0 times
...
Shawnta
1 months ago
Wait, so we need to set up the segments in the NSX UI? That's gonna be a piece of cake. I bet I can have this done in 5 minutes, tops!
upvoted 0 times
Beula
3 days ago
User1: Setting up the segments in NSX UI should be easy.
upvoted 0 times
...
...
Shasta
1 months ago
Looks like we need to create three overlay-backed segments and one VLAN-backed segment for the new app. The key is to make sure we block the DHCP requests from the servers. Gotta be careful with that legacy app!
upvoted 0 times
Aide
6 days ago
We should make sure to configure the segments to block Server DHCP requests.
upvoted 0 times
...
Samuel
8 days ago
Don't forget to also set up the VLAN-backed segment for the legacy application.
upvoted 0 times
...
Delmy
10 days ago
Let's start by deploying the three overlay-backed segments for the new app.
upvoted 0 times
...
Edna
17 days ago
User 3
upvoted 0 times
...
Matt
23 days ago
User 2
upvoted 0 times
...
Wade
27 days ago
User 1
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77