Explain the three modes of vtp switches, Computer Network Security

Assignment Help:

QUESTION

(a) What do you understand by a VLAN? Provide one advantage of using a VLAN.

(b) What is a trunk port in a VLAN?

(c) A VLAN will be created using one or more switches. Consider we have switch A and switch B. Analyse the given configurations of switch A and switch B.Show  a diagram to show the correct interpretation of the configurations for the creation of VLANs. Consider that switch A and B have twelve ports each.

SwitchA(config)#configure terminal
SwitchA(config)#vlan 2
SwitchA(config)#vlan 2 name marketing
SwitchA(config)#vlan 3
SwitchA(config)#vlan 3 name management
SwitchA(config)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/4
SwitchA(config-if)#switchport access vlan 2
SwitchA(config-if)#exit
SwitchA(config)#interface fastethernet 0/5
SwitchA(config-if)#switchport access vlan 2

SwitchA(config-if)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/11
SwitchA(config-if)#switchport access vlan 3
SwitchA(config-if)#exit
SwitchA(config)#interface fastethernet 0/12
SwitchA(config-if)#switchport access vlan 3
SwitchA(config-if)#exit

SwitchB(config)#configure terminal
SwitchB(config)#vlan 2
SwitchB(config)#vlan 2 name marketing
SwitchB(config)#vlan 3
SwitchB(config)#vlan 3 name management
SwitchB(config)#exit

SwitchB(config)#configure terminal
SwitchB(config)#interface fastethernet 0/2
SwitchB(config-if)#switchport access vlan 2
SwitchB(config-if)#exit
SwitchB(config)#interface fastethernet 0/3
SwitchB(config-if)#switchport access vlan 2

SwitchB(config-if)#exit

SwitchB(config)#configure terminal
SwitchB(config)#interface fastethernet 0/4
SwitchB(config-if)#switchport access vlan 3
SwitchB(config-if)#exit
SwitchB(config)#interface fastethernet 0/5
SwitchB(config-if)#switchport access vlan 3
SwitchB(config-if)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/1
SwitchA(config-if)#switchport mode trunk
SwitchA(config-if)#switchport trunk encapsulation isl
SwitchA(config-if)#end
SwitchB(config)#interface fastethernet 0/1
SwitchB(config-if)#switchport mode trunk
SwitchB(config-if)#switchport trunk encapsulation isl
SwitchB(config-if)#end

(d) VLAN trunking protocol is a Cisco proprietary protocol. Explain the three modes of VTP switches.


Related Discussions:- Explain the three modes of vtp switches

802.11 wireless lans and csma/ca, 802.11 WIRELESS LANs AND CSMA/CA:  ...

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

Packet filtering firewall-stateless packet filtering, Stateless Packet Filt...

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Spambot detection - spam mail, Spambot Detection: The  previous studie...

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

#title.TIPS., 1. For this project, assume that an organization has five ser...

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

Frame format and error detection, FRAME FORMAT AND ERROR DETECTION The...

FRAME FORMAT AND ERROR DETECTION The changed frame format also adds CRC. If there is an error happened in frame, then it typically causes receiver to removed frame. The frame

Address resolution techniques, Address resolution algorithms may be grouped...

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Deployment and implementing of an ids, DEPLOYMENT AND IMPLEMENTING OF AN ID...

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Public key infrastructure (pki)-cryptography, Public Key Infrastructure (PK...

Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

Threads and attacks-information security, THREADS AND ATTACKS Threat is ...

THREADS AND ATTACKS Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management s

routing information exchange and bellman-ford algorithm, You are free to d...

You are free to design the format and structure of the routing table kept locally by each node and exchanged among neighboring nodes. 1. Upon the activation of the program, each

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd