Question 5.1. Every port on a switch is a collision domain. Every port on a router is a collision domain.

Similar documents
Netw 3000 VLAN 1 LAB Darlene Redmond Ryan Gamblin January 19 th 2012

Lab Catalyst 2950T and 3550 Series VTP Domain and VLAN Trunking

Lab - Configuring VLANs and Trunking (Solution)

STUDENT LAB GUIDE CCNA ( )

Lab Catalyst 2950T and 3550 Series Static VLANS

Lab Catalyst 2950T and 3550 Series VTP Domain and VLAN Trunking

Lab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab)

Note: Use two 2960 switches for ALS1 and ALS2 and two 3560 switches for DLS1 and DLS2

Lab 9.1.5a Trunking with ISL 2924XL Series

Lab Inter-VLAN Routing with the Internal Route Processor

Lab - Configuring VLANs and Trunking

Lab Configuring Fast EtherChannel

Chapter 2 Lab 2-1, Static VLANS, VLAN Trunking, and VTP Domains and Modes

VLANs. Traditional Campus Networks. Performance Issues. Broadcast Issues. Bridges terminate collision domains

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Internetwork Expert s CCNP Bootcamp. VLANs, Trunking, & VTP. VLANs Overview

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1

ISP /24. Fas0/0. Fas1/0/1. Fas1/0/22 NYCORE1. Cisco PS. Fas0/1. Lab Nic /24

PT Activity 4.4.1: Basic VTP Configuration

Lab - Configuring VLANs and Trunking

IEEE 802.1Q Configuration

All Transparent VTP Domain to Server Client VTP Domain Migration Configuration Example

Lab 5.5.2: Challenge Spanning Tree Protocol

EtherSwitch Service Module (ES) Configuration Example

Lab 8-2 Securing Spanning Tree Protocol

Behavior of Cisco Discovery Protocol between Routers and Switches

Lab 6.4.1: Basic Inter-VLAN Routing

1 of :22

CONFIGURATION DU SWITCH

CCNP SWITCH 6.0 Student Lab Manual

Lab Configuring Per-Interface Inter-VLAN Routing (Solution)

Lab Configuring Per-Interface Inter-VLAN Routing (Instructor Version)

Lab Configuring Basic Switch Settings (Solution)

Lab 5: Inter-VLANs Routing

Advanced Troubleshooting CCIE Routing & Switching v5.0

Chapter 4 Lab 4-1, Inter-VLAN Routing with an External Router

Buy full file at

Basic switch configuration

Lecture (04) VTP Ports Security

Lab Configuring 802.1Q Trunk-Based Inter-VLAN Routing (Instructor Version Optional Lab)

VLANs. CCNA Exploration Semester 3 Chapter Sep-13

Lab 1. CLI Navigation. Scenario. Initial Configuration for R1

Lab Configure Extended VLANs, VTP, and DTP

PT Activity 2.5.1: Basic Switch Configuration

CCNA Semester 3 labs. Labs for chapters 2 10

Table of Contents. isco Configuring 802.1q Trunking Between a Catalyst 3550 and Catalyst Switches Running Integrated Cisco IOS (Nativ

Device Interface IP Address Subnet Mask Default Gateway. Ports Assignment Network

Route between VLANs using a 3560 switch with an internal route processor using Cisco Express Forwarding (CEF).

BASIC CONFIGURATION CISCO SWITCH

Table of Contents. co Configuring InterVLAN Routing and ISL/802.1Q Trunking on a Catalyst 2900XL/3500XL/2950 Switch Using An Extern

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS

Lab Routing Between an External Router and an Internal Route Processor

Basics of GNS3 and Cisco IOS

VLAN Commands. Command Reference, Cisco IOS XE Denali 16.3.x (Catalyst 3650 Switches) 1

Lab Catalyst 2950T and 3550 Series Basic Setup

CS IT ports switch basic configuration. Lecture (01) Introduction to 24 ports managed switches By: Dr. Ahmed ElShafee.

Lab Configuring EtherChannel

CCNA Routing & Switching Lab Workbook - Full-Scale Lab 1

Chapter 3 Lab 3-1 Static VLANS, Trunking, and VTP

Lab Configuring the Management VLAN on a Single Switch

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER

SWITCH Lab Guide Labs powered by

VLAN. Command Reference, Cisco IOS XE Everest 16.6.x (Catalyst 3850 Switches) 1

LAN Troubleshooting. Ethernet Troubleshooting

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER

CCENT Study Guide. Chapter 11 VLANs and Inter-VLAN Routing

Configuring ISL Trunking Between Catalyst Switches Running CatOS and Cisco IOS System Software

Lecture (06) Design and Configuration LAN Practicing, working on CISCO equipment. By: Dr. Ahmed ElShafee

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and a Router (InterVLAN Routing)

Configuring VLANs. Understanding VLANs CHAPTER

CCNP Bootcamp. Introduction

This chapter describes how to configure VLANs on the Cisco 7600 series routers.

configuring and connecting 24

Lecture (01) configuring and connecting 24 ports switch

CCNP SWITCH Lab Manual

Document Configurations for Standardization across the Camera. Network. Kevin O Neal. DeVry University. NETW206: Introduction to Switching

Chapter 3 Lab 3-3, Per-VLAN Spanning Tree Behavior

VLAN Configuration. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

RealCiscoLAB.com. Multiple Spanning Tree. Topology. Objective. Background. CCNPv6 SWITCH. Observe the behavior of multiple spanning tree (MST).

Configuring VLANs. Understanding VLANs CHAPTER

Lab 5: Basic VLAN Configuration

Lab Analyzing a Test Plan and Performing a Test

PT Activity 4.3.3: Configure VTP

RealCiscoLAB.com. Observe the behavior of a separate spanning tree instance per VLAN. Change spanning tree mode to rapid spanning tree.

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

Troubleshooting VLANs and Trunks

Configuring VLANs. Understanding VLANs CHAPTER

Lab - Configuring a Switch Management Address

Chapter 5 Lab 5-1 Inter-VLAN Routing INSTRUCTOR VERSION

RealCiscoLAB.com. Observe what happens when the default spanning tree behavior is modified.

Lab 3-2 Modifying Default Spanning Tree Behavior

Configuring a LAN with DHCP and VLANs

CCNA Semester 3 labs. Part 1 of 1 Labs for chapters 1 8

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking

Device Interface IP Address Subnet Mask Default Gateway. Ports Assignment Network

Transcription:

Question 5.1 Q 5.1.1 Number of Collision Domains: = 14 Every port on a switch is a collision domain. Every port on a router is a collision domain. Number of Broadcast Domains: = 5 Every port on a router is a broadcast domain.

Q 5.1.2 Number of Collision Domains: = 7 Every port on a switch is a collision domain. Every port on a router is a collision domain. Everything connected to a hub is in one collision domain. Number of Broadcast Domains: = 3 Every port on a router is a broadcast domain. Bridges separate segments into different broadcast domains. Hubs don t do anything to separate collisions or broadcasts. They just multiply the signal and send it to every port.

Question 5.2 Q 5.2.6a: How many Fast Ethernet interfaces does the switch have? 24 Q 5.2.6b: How many Gigabit Ethernet interfaces does the switch have? 2 Q 5.2.6c: What is the range of values shown for the VTY lines? 0 4 and 5-15 Q 5.2.6d: Is an IP address set on the switch? no Q 5.2.7a Record commands and results Switch>enable Switch#conf t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname doug_switch doug_switch(config)# %SYS-5-CONFIG_I: Configured from console by console Q 5.2.8a: What is the IOS version that the switch is running? 12.2 Q 5.2.8b: What is the system image filename? C2960-LANBASE-M Q 5.2.8c: What is the base MAC address of this switch? 0007.EC82.B1ED Q 5.2.8c: What is the size of NVRAM (Non-Volatile Memory)? 63488K of non-volatile RAM Q 5.2.9a Try logging from the user mode to the privileged mode and record the results doug_switch#enable Password: After typing cisco1 I was allowed to enter the privileged mode. doug_switch(config)# 5.2.10 doug_switch#enable Password: After typing cisco1 I was allowed to enter the privileged mode. doug_switch(config)# enable secret cisco2 CTRL + Z doug_switch#enable Password: After typing cisco2 (the elevated secret password) I was allowed to enter the privileged mode.

Question 5.3 For the following questions, everything I typed/entered is in blue. The CLI output is in black. Q. 5.3.1 Please execute example 9-1 commands and record the results SW1>show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gig1/1, Gig1/2 1002 fddi-default active 1003 token-ring-default active 1004 fddinet-default active 1005 trnet-default active SW1>enable SW1#conf t Enter configuration commands, one per line. End with CNTL/Z. SW1(config)#vlan 2 SW1(config-vlan)#name Freda-vlan SW1(config-vlan)#exit SW1(config)#int range fastethernet 0/13-14 SW1(config-if-range)#switchport access vlan 2 SW1(config-if-range)#end SW1# %SYS-5-CONFIG_I: Configured from console by console SW1#show running-config Note: The name Freda was accepted and applied, but it didn t show up when I ran show running-config at this point. Ports 13 and 14 are shown as being part of vlan 2, though. Building configuration...

Current configuration : 1082 bytes version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname SW1 spanning-tree mode pvst interface FastEthernet0/1 interface FastEthernet0/2 interface FastEthernet0/3 interface FastEthernet0/4 interface FastEthernet0/5 interface FastEthernet0/6 interface FastEthernet0/7 interface FastEthernet0/8 interface FastEthernet0/9 interface FastEthernet0/10 interface FastEthernet0/11 interface FastEthernet0/12 interface FastEthernet0/13 switchport access vlan 2 interface FastEthernet0/14 switchport access vlan 2 interface FastEthernet0/15 interface FastEthernet0/16 interface FastEthernet0/17 interface FastEthernet0/18 interface FastEthernet0/19

interface FastEthernet0/20 interface FastEthernet0/21 interface FastEthernet0/22 interface FastEthernet0/23 interface FastEthernet0/24 interface GigabitEthernet1/1 interface GigabitEthernet1/2 interface Vlan1 no ip address shutdown line con 0 line vty 0 4 login line vty 5 15 login End SW1#show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/15, Fa0/16, Fa0/17, Fa0/18 Fa0/19, Fa0/20, Fa0/21, Fa0/22 Fa0/23, Fa0/24, Gig1/1, Gig1/2 2 Freda-vlan active Fa0/13, Fa0/14 1002 fddi-default active 1003 token-ring-default active 1004 fddinet-default active 1005 trnet-default active SW1#show vlan id 2 VLAN Name Status Ports

---- -------------------------------- --------- ------------------------------- 2 Freda-vlan active Fa0/13, Fa0/14 VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------ 2 enet 100002 1500 - - - - - 0 0 Q. 5.3.2 Please execute example 9-2 commands and record the results SW1>enable SW1#conf t Enter configuration commands, one per line. End with CNTL/Z. SW1(config)#int range fastethernet 0/15-16 SW1(config-if-range)#switchport access vlan 3 % Access VLAN does not exist. Creating vlan 3 SW1(config-if-range)#^Z SW1# %SYS-5-CONFIG_I: Configured from console by console SW1#show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gig1/1, Gig1/2 2 Freda-vlan active Fa0/13, Fa0/14 3 VLAN0003 active Fa0/15, Fa0/16 1002 fddi-default active 1003 token-ring-default active 1004 fddinet-default active 1005 trnet-default active Q. 5.3.3 Please execute example 9-3 commands and record the results SW1# show interfaces gigabit 1/1 switchport Note: SW1 in the file didn t have a gigabit port on 0/1. I checked show running-config to find the gigabit ports are 1/1 and 1/2. Port 1/1 did work.

Name: Gig1/1 Switchport: Enabled Administrative Mode: dynamic auto Operational Mode: static access Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: native Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Voice VLAN: none Administrative private-vlan host-association: none Administrative private-vlan mapping: none Administrative private-vlan trunk native VLAN: none Administrative private-vlan trunk encapsulation: dot1q Administrative private-vlan trunk normal VLANs: none Administrative private-vlan trunk private VLANs: none Operational private-vlan: none Trunking VLANs Enabled: ALL Pruning VLANs Enabled: 2-1001 Capture Mode Disabled Capture VLANs Allowed: ALL Protected: false Appliance trust: none SW1#show interface trunk SW1# Q. 5.3.4 Please execute example 9-4 commands and record the results SW1#show interface gigabit 0/1 switchport %Invalid interface type and number SW1# show interfaces gigabit 1/1 switchport Note: SW1 in the file didn t have a gigabit port on 0/1. I checked show running-config to find the gigabit ports are 1/1 and 1/2. Port 1/1 did work. SW1#conf t Enter configuration commands, one per line. End with CNTL/Z. SW1(config)#int gigabit 0/1 %Invalid interface type and number SW1(config)#int gigabit 1/1 SW1(config-if)#switchport mode dynamic desirable

^Z SW1# %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/1, changed state to up SW1(config-if)# %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/1, changed state to down %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/1, changed state to up %SYS-5-CONFIG_I: Configured from console by console SW1#show interfaces gigabit 1/1 switchport Name: Gig1/1 Switchport: Enabled Administrative Mode: dynamic desirable Operational Mode: trunk Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Voice VLAN: none Administrative private-vlan host-association: none Administrative private-vlan mapping: none Administrative private-vlan trunk native VLAN: none Administrative private-vlan trunk encapsulation: dot1q Administrative private-vlan trunk normal VLANs: none Administrative private-vlan trunk private VLANs: none Operational private-vlan: none Trunking VLANs Enabled: ALL Pruning VLANs Enabled: 2-1001 Capture Mode Disabled Capture VLANs Allowed: ALL Protected: false Appliance trust: none SW1# show interfaces trunk Port Mode Encapsulation Status Native vlan Gig1/1 auto n-802.1q trunking 1 Port Vlans allowed on trunk Gig1/1 1-1005 Port Vlans allowed and active in management domain Gig1/1 1,2,3 Port Vlans in spanning tree forwarding state and not pruned Gig1/1 1,2,3

SW1#show vlan id 2 VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 2 Freda-vlan active Fa0/13, Fa0/14 VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------ 2 enet 100002 1500 - - - - - 0 0 Q. 5.3.5 Please execute example 9-5 commands and record the results SW1>enable SW1#show interfaces trunk Port Mode Encapsulation Status Native vlan Gig1/1 auto n-802.1q trunking 1 Port Vlans allowed on trunk Gig1/1 1-1005 Port Vlans allowed and active in management domain Gig1/1 1,2,3,4 Port Vlans in spanning tree forwarding state and not pruned Gig1/1 1,2,3,4 SW1#conf t Enter configuration commands, one per line. End with CNTL/Z. SW1(config)#vlan 4 SW1(config-vlan)#interface vlan 2 Note: The commands given on page 258 include an error. Since shutdown is an interface command, we needed to add interface before the vlan 2 in this statement, as shown in the assignment document. SW1(config-if)#shutdown SW1(config-if)# %LINK-5-CHANGED: Interface Vlan2, changed state to administratively down %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan2, changed state to down SW1(config-if)#int gig 1/1 Note: SW1 in the file didn t have a gigabit port on 0/1. I checked show running-config to find the gigabit ports are 1/1 and 1/2. Port 1/1 did work. SW1(config-if)#switchport trunk allowed vlan remove 3

SW1(config-if)#^Z SW1# %SYS-5-CONFIG_I: Configured from console by console SW1#show interfaces trunk Port Mode Encapsulation Status Native vlan Gig1/1 auto n-802.1q trunking 1 Port Vlans allowed on trunk Gig1/1 1-2,4-1005 Note: VLAN 2 has been shutdown, but it still shows in this list. That is a due to a bug in Packet Tracer. Port Vlans allowed and active in management domain Gig1/1 1,2,4 Port Vlans in spanning tree forwarding state and not pruned Gig1/1 1,2,4