Configure the management interface- spanning tree protocol, Computer Networking

Assignment Help:

6_CCNA.png

Configure the management interface address on all three switches. 

S1(config)#interface vlan1

S1(config-if)#ip address 172.17.10.1 255.255.255.0

S1(config-if)#no shutdown

S2(config)#interface vlan1

S2(config-if)#ip address 172.17.10.2 255.255.255.0

S2(config-if)#no shutdown

S3(config)#interface vlan1

S3(config-if)#ip address 172.17.10.3 255.255.255.0

S3(config-if)#no shutdown

Verify that the switches are correctly configured by pinging among them. From S1, ping the management interface on S2 and S3. From S2, ping the management interface on S3. 

Were the pings successful?

If not, troubleshoot the switch configurations and try again.  

 

 

 


Related Discussions:- Configure the management interface- spanning tree protocol

What are the drawbacks of wireless devices, What are the drawbacks of wirel...

What are the drawbacks of wireless devices One drawback is security. Every random delivery man who happens to be in building can listen on network. Another weakness is reliabil

Explain 10base-T- twisted pair ethernet, 10Base-T: Twisted Pair Ethernet ...

10Base-T: Twisted Pair Ethernet Most popular standard simplest to install and reconfigure Star topology LAN utilize UTP cable no need for AUI It supports data rag

Aaa, explain layered protocol architecture

explain layered protocol architecture

Error detection in lrc - performance, LRC - Performance Detects ev...

LRC - Performance Detects every burst errors up to length n (number of columns) If two bits in one data unit are damaged as well as two bits in exactly same positions

Medium earth orbiting satellite, Medium Earth Orbiting satellite is an orbi...

Medium Earth Orbiting satellite is an orbit which is located just above the few hundred miles to a few thousands above the earth surface. It is of higher advantage than Low orbit s

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Network management assignment, One of the key roles of a System/Network Adm...

One of the key roles of a System/Network Administrator is to monitor log files. This usually requires helper scripts (i.e. Perl programs) so a summary of large log files can be qui

Configure vtp on the switches - ccna, Configure VTP on the Switches VTP...

Configure VTP on the Switches VTP permits the network administrator to control the instances of VLANs on the network by creating VTP domains. Within each VTP domain, one or mor

Briefly write functionalities of different osi layers, Briefly write functi...

Briefly write functionalities of different OSI layers? The OSI Reference Model includes seven layers. Basic functionality of each of them is as follows: 1. Physical Layer:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd