Explain the three modes of vtp switches, Computer Network Security

Assignment Help:

QUESTION

(a) What do you understand by a VLAN? Provide one advantage of using a VLAN.

(b) What is a trunk port in a VLAN?

(c) A VLAN will be created using one or more switches. Consider we have switch A and switch B. Analyse the given configurations of switch A and switch B.Show  a diagram to show the correct interpretation of the configurations for the creation of VLANs. Consider that switch A and B have twelve ports each.

SwitchA(config)#configure terminal
SwitchA(config)#vlan 2
SwitchA(config)#vlan 2 name marketing
SwitchA(config)#vlan 3
SwitchA(config)#vlan 3 name management
SwitchA(config)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/4
SwitchA(config-if)#switchport access vlan 2
SwitchA(config-if)#exit
SwitchA(config)#interface fastethernet 0/5
SwitchA(config-if)#switchport access vlan 2

SwitchA(config-if)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/11
SwitchA(config-if)#switchport access vlan 3
SwitchA(config-if)#exit
SwitchA(config)#interface fastethernet 0/12
SwitchA(config-if)#switchport access vlan 3
SwitchA(config-if)#exit

SwitchB(config)#configure terminal
SwitchB(config)#vlan 2
SwitchB(config)#vlan 2 name marketing
SwitchB(config)#vlan 3
SwitchB(config)#vlan 3 name management
SwitchB(config)#exit

SwitchB(config)#configure terminal
SwitchB(config)#interface fastethernet 0/2
SwitchB(config-if)#switchport access vlan 2
SwitchB(config-if)#exit
SwitchB(config)#interface fastethernet 0/3
SwitchB(config-if)#switchport access vlan 2

SwitchB(config-if)#exit

SwitchB(config)#configure terminal
SwitchB(config)#interface fastethernet 0/4
SwitchB(config-if)#switchport access vlan 3
SwitchB(config-if)#exit
SwitchB(config)#interface fastethernet 0/5
SwitchB(config-if)#switchport access vlan 3
SwitchB(config-if)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/1
SwitchA(config-if)#switchport mode trunk
SwitchA(config-if)#switchport trunk encapsulation isl
SwitchA(config-if)#end
SwitchB(config)#interface fastethernet 0/1
SwitchB(config-if)#switchport mode trunk
SwitchB(config-if)#switchport trunk encapsulation isl
SwitchB(config-if)#end

(d) VLAN trunking protocol is a Cisco proprietary protocol. Explain the three modes of VTP switches.


Related Discussions:- Explain the three modes of vtp switches

Explain the terms used in network security, Question 1 (a) Explain b...

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Growth of lan technology, GROWTH OF LAN TECHNOLOGY The production of s...

GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

Functional areas in network management, Question 1 a) Explain how CSMA...

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

Explain major differences between wpa and wpa2, Question: Suppose the f...

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Wireless sensor networks, The project will be involving a design and a repo...

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Security protocol, which security protocols are predominantly used in web-b...

which security protocols are predominantly used in web-based e-commerce

Looking for data network security assignment, I am ryan, i am looking for d...

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

What is the size of the initialization vector n wpa, Question : Wi-Fi p...

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

Udp encapsulation, UDP ENCAPSULATION As given in the figure below, UDP...

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd