An engineer deployed a Cisco ACI fabric and noticed that the fabric learns endpoints from subnets that are not configured on a bridge domain. To meet strict security requirements, the engineer must prevent this behavior. Which action must be taken to prevent this behavior?
What is the advantage of implementing an active-active firewall cluster that is stretched across separate pods when anycast services are configured?
Refer to the exhibit.
Which configuration mode must be selected for the VMM vSwitch Port Channel policy to avoid MAC flapping on the Cisco UCS Fls and Cisco ACI leaf switches?
What is a use of the Overlay Multicast TEP in Cisco ACI Multi-Site communication?
Refer to the exhibit.
Which two configuration steps are required in ISN for Cisco ACI Multi-Site setup? (Choose two.)