Configure the management interface- spanning tree protocol, Computer Networking

Assignment Help:

6_CCNA.png

Configure the management interface address on all three switches. 

S1(config)#interface vlan1

S1(config-if)#ip address 172.17.10.1 255.255.255.0

S1(config-if)#no shutdown

S2(config)#interface vlan1

S2(config-if)#ip address 172.17.10.2 255.255.255.0

S2(config-if)#no shutdown

S3(config)#interface vlan1

S3(config-if)#ip address 172.17.10.3 255.255.255.0

S3(config-if)#no shutdown

Verify that the switches are correctly configured by pinging among them. From S1, ping the management interface on S2 and S3. From S2, ping the management interface on S3. 

Were the pings successful?

If not, troubleshoot the switch configurations and try again.  

 

 

 


Related Discussions:- Configure the management interface- spanning tree protocol

Ip checksum, This code properly implements the IP checksum function on a 32...

This code properly implements the IP checksum function on a 32-bit machine: unsigned short cksum(unsigned short *buf, int count) { unsigned long sum = 0; while (count--) { sum += *

Logged into a router, You are logged into a router, what command would repr...

You are logged into a router, what command would represent you the IP addresses of routers linked to you? Ans)show cdp neighbors detail

Prototype Web Site for the Computer Superstores, Overview Create a proto...

Overview Create a prototype web site for the "Computer Superstores" company. Your site should use effective navigation features and demonstrate good structure for  accessibility

Fixed version of rdt , Fixed version of rdt 2.0 rdt 2.1 The  rdt 2.1 s...

Fixed version of rdt 2.0 rdt 2.1 The  rdt 2.1 sender and receiver  FSM each now  have  twice  as many  states  as before. This is because  the protocols  state must  now refle

Illustrate 802.11b HR DSSS, 802.11b HR DSSS a) High-rate DSSS using a ...

802.11b HR DSSS a) High-rate DSSS using a 2.4 GHz band b) Similar to DSSS excluding for encoding method c) Uses complementary code keying (CCK), encoding 4 or 8 bits to

Security control procedures , a) An Introduction/Overview of Network Securi...

a) An Introduction/Overview of Network Security issues. b) A Risk Assessment  analysis- to include:             Assets                                                         T

EHR, ONE TO MANY

ONE TO MANY

Differentiate between ipv4 and ipv6, Question 1 Write short notes on Re...

Question 1 Write short notes on Reserved IP addresses and Special use IP addresses 2 Explain about the packet switching mechanism based on Virtual Circuit 3 Explain about

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd