Which three elements can you use to identify an IPv6 packet via its header, in order to filter future attacks?

The enterprise network WAN link has been receiving several denial of service attacks from both IPv4 and IPv6 sources. Which three elements can you use to identify an IPv6 packet via its header, in order to filter future attacks? (Choose three.)
A. Traffic Class
B. Source address
C. Flow Label
D. Hop Limit
E. Destination Address
F. Fragment Offset

cisco-exams

8 thoughts on “Which three elements can you use to identify an IPv6 packet via its header, in order to filter future attacks?

  1. No, The question is basically asks what headers of IPv6 are different from IPv4.
    Read the questions carefully!

    So its is most definitively A C D.
    because those headers are IPv6 only.

  2. the ipv6 header also has the source and destination addresses in it…. All the answers are in the ipv6 header. The question is asking which fields can be filtered on the WAN interface.

    R1(config)#ipv6 access-list outbound
    R1(config-ipv6-acl)#deny a::a/32 a::a/32 ? <— source and destination
    dscp Match packets with given dscp value
    flow-label Flow label <— flow label
    fragments Check non-initial fragments
    log Log matches against this entry
    log-input Log matches against this entry, including input
    routing Routing header
    sequence Sequence number for this entry
    time-range Specify a time-range
    undetermined-transport Transport cannot be determined or is missing

    I believe the answer is BCE

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.