Question 13

You must move from acampus fabric core-distribution centrally-routed bridging (CRB)network to anedge-routed bridging (ERB)network.
In this scenario, where does the gateway for the networkmove?

Correct Answer:C

Question 14

In a Juniper Mistcampus fabric deploymentusingEVPN-VXLAN, which component performs the VXLAN encapsulation and de-encapsulation functions?

Correct Answer:B

Question 15

You are experiencing issues with your video streams. In this scenario, which SLE and classifier should you inspect to see if BUM traffic is a problem?

Correct Answer:C
According to Juniper Mist documentation, theThroughput Service Level Expectation (SLE)is the primary metric used to measure the ability of wired clients to pass traffic across the physical network without impedance. This SLE is critical for diagnosing issues with real-time, high-bandwidth applications such asvideo streams, which are highly sensitive to packet loss and latency. Within the Throughput SLE, theStorm Controlclassifier is specifically designed to identify "bad user minutes" caused by the suppression ofBroadcast, Unknown Unicast, and Multicast (BUM) traffic.
Storm control is a mechanism that enables the switch to monitor traffic levels and drop BUM packets when a specified traffic level—known as the storm control level—is exceeded. This prevents a "traffic storm" from proliferating and degrading the overall performance of the LAN. While this is a vital security feature to prevent network meltdowns, it can inadvertently impact legitimate traffic. For instance, if multicast-based video streams or other heavy BUM traffic exceed the configured bandwidth percentage on a port, the switch will drop those packets to protect the rest of the network.
When troubleshooting video stream issues, network administrators should inspect the Storm Control classifier to see if it is triggering "bad user minutes". If the Mist dashboard indicates failures under this classifier, it signifies that the switch hardware is actively dropping packets because the BUM traffic limit has been reached. This provides immediate root-cause evidence, allowing the administrator to determine if they need to adjust the storm control thresholds within thePort Profileor investigate the source of the excessive broadcast traffic. By correlating these hardware-level events with the end-user experience, Mist AI simplifies the resolution of complex performance problems that traditional "up/down" monitoring would miss.

Question 16

You are asked to configure switch ports to VLANs depending on which type of device is connected to it. Which Mist feature will accomplish this task?

Correct Answer:B
According to Juniper Mist documentation,Dynamic Port Configuration (DPC)—also referred to asDynamic Port Profiles—is the feature specifically designed to automate the assignment of VLANs and port settings based on the type of device connected to a switch. This technology enables the concept of "colorless ports," where any device (such as a Juniper Mist Access Point, an IP camera, or a VoIP phone) can be plugged into any available switch port without prior manual configuration.
The system functions by using "port assignment rules" that leverage various device properties to identify the connected hardware. These properties includeLLDP attributes(System Name, Chassis ID, or Description),MAC addresses(including specific OUI ranges), andRADIUS attributes. For example, a rule can be configured to detect an LLDP System Description starting with "Mist Systems" and automatically apply a "Wireless AP" port profile. This profile typically includes the management VLAN, PoE settings, and Spanning Tree Protocol (STP) parameters required for an access point to function.
The primary benefit of DPC is the reduction of manual labor and the elimination of configuration errors in large-scale deployments. In traditional environments, an administrator would have to manually assign a VLAN to a specific physical port; with DPC, the Juniper Mist cloud detects the device and pushes the relevant configuration to the switch in real-time. If the device is disconnected, the port can be configured to revert to a "restricted" or "guest" VLAN, ensuring that the network remains secure against unauthorized access. This AI-driven approach drives consistency across multiple sites while significantly streamlining the onboarding of new hardware.

START JN0-460 EXAM