Which statement about a BGP peer group is correct?

Master RIPE BGP Security with our comprehensive test. Understand the Border Gateway Protocol, explore multiple choice questions, and get ready for your exam with detailed hints and explanations.

Multiple Choice

Which statement about a BGP peer group is correct?

Explanation:
Grouping BGP peers into a peer group is about applying the same policy settings to many neighbors at once. By placing peers with similar requirements in the same group, you can configure timers, update-source, route-maps, and other attributes once for the whole group, which keeps the configuration consistent and much easier to manage in large networks. Peer groups do not store routing tables; the BGP routing information base is global to the BGP process and isn’t kept per group. So using a group doesn’t create a separate per-group routing table. They also don’t replace the need for neighbor statements. You still define each neighbor, but you reference the neighbor group to inherit its shared settings. Encryption isn’t handled automatically by peer groups either; BGP sessions use TCP, and any security like authentication or IPsec must be configured separately if encryption is required.

Grouping BGP peers into a peer group is about applying the same policy settings to many neighbors at once. By placing peers with similar requirements in the same group, you can configure timers, update-source, route-maps, and other attributes once for the whole group, which keeps the configuration consistent and much easier to manage in large networks.

Peer groups do not store routing tables; the BGP routing information base is global to the BGP process and isn’t kept per group. So using a group doesn’t create a separate per-group routing table.

They also don’t replace the need for neighbor statements. You still define each neighbor, but you reference the neighbor group to inherit its shared settings. Encryption isn’t handled automatically by peer groups either; BGP sessions use TCP, and any security like authentication or IPsec must be configured separately if encryption is required.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy