A leaf receives unicast traffic that is destined to an unknown source, and spine proxy is enabled in the corresponding bridge domain. Drag and drop the Cisco ACI forwarding operations from the left into the order the operation occurs on the right.
Refer to the exhibit.
A network engineer configures a Layer 4 to Layer 7 device for an outside routed firewall that is connected to POD-1 inside a Cisco ACI fabric that consists of two pods. All traffic from POD-1 or POD-2 that uses the L3Out should pass through the routed firewall. Which Function Type must be implemented in the service graph for POD-2 to use L3Out?
An engineer configures a new Cisco ACI Multi-Pod setup. Which action should be taken for fabric discovery to be successful for the nodes in Pod 2?
Drag and drop the tenant implementation designs from the left onto the outcomes of the design when a greenfield Cisco ACI fabric is deployed on the right.
Refer to the exhibit.
Two application profiles are configured in the same tenant and different VRFs. Which contract scope is configured to allow communication between the two application profiles?