Explain the three modes of vtp switches, Computer Network Security

Assignment Help:

QUESTION

(a) What do you understand by a VLAN? Provide one advantage of using a VLAN.

(b) What is a trunk port in a VLAN?

(c) A VLAN will be created using one or more switches. Consider we have switch A and switch B. Analyse the given configurations of switch A and switch B.Show  a diagram to show the correct interpretation of the configurations for the creation of VLANs. Consider that switch A and B have twelve ports each.

SwitchA(config)#configure terminal
SwitchA(config)#vlan 2
SwitchA(config)#vlan 2 name marketing
SwitchA(config)#vlan 3
SwitchA(config)#vlan 3 name management
SwitchA(config)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/4
SwitchA(config-if)#switchport access vlan 2
SwitchA(config-if)#exit
SwitchA(config)#interface fastethernet 0/5
SwitchA(config-if)#switchport access vlan 2

SwitchA(config-if)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/11
SwitchA(config-if)#switchport access vlan 3
SwitchA(config-if)#exit
SwitchA(config)#interface fastethernet 0/12
SwitchA(config-if)#switchport access vlan 3
SwitchA(config-if)#exit

SwitchB(config)#configure terminal
SwitchB(config)#vlan 2
SwitchB(config)#vlan 2 name marketing
SwitchB(config)#vlan 3
SwitchB(config)#vlan 3 name management
SwitchB(config)#exit

SwitchB(config)#configure terminal
SwitchB(config)#interface fastethernet 0/2
SwitchB(config-if)#switchport access vlan 2
SwitchB(config-if)#exit
SwitchB(config)#interface fastethernet 0/3
SwitchB(config-if)#switchport access vlan 2

SwitchB(config-if)#exit

SwitchB(config)#configure terminal
SwitchB(config)#interface fastethernet 0/4
SwitchB(config-if)#switchport access vlan 3
SwitchB(config-if)#exit
SwitchB(config)#interface fastethernet 0/5
SwitchB(config-if)#switchport access vlan 3
SwitchB(config-if)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/1
SwitchA(config-if)#switchport mode trunk
SwitchA(config-if)#switchport trunk encapsulation isl
SwitchA(config-if)#end
SwitchB(config)#interface fastethernet 0/1
SwitchB(config-if)#switchport mode trunk
SwitchB(config-if)#switchport trunk encapsulation isl
SwitchB(config-if)#end

(d) VLAN trunking protocol is a Cisco proprietary protocol. Explain the three modes of VTP switches.


Related Discussions:- Explain the three modes of vtp switches

The security systems development life cycle (secsdlc), The Security Systems...

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its

Elliptic curve encryption - decryption scheme, (a) (i) If m = p·q·r where...

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

Data classification and management, Data Classification and Management C...

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

RESPONSE, Dropbox’s tool shows how chatbots could be future of cybersecurit...

Dropbox’s tool shows how chatbots could be future of cybersecurity

Write a note on digital signature, Question 1 Explain the types of threats...

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur

Security clearances-information security, Security Clearances For a secu...

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

Describe phishing attacks, QUESTION (a) (i) Describe Phishing attacks. ...

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Emulation, In this section, you should create a program that emulates a GBN...

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Computer security, Assume that the RSA problem is hard, prove that the RSA ...

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

Define byte stuffing, Sometimes the special character may see in data and a...

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd