How to Assign switch ports to VLAN, Computer Networking

Assignment Help:

Assign switch ports to VLANs.

Refer to the port assignment table at the starting of the lab to assign ports to the VLANs. Use the interface range command to make simpler this task. Port assignments are not configured by VTP. Port assignments must be configured on every switch manually or dynamically using a VMPS server. The commands are shown for S3 only, but both S2 and S1 switches should be similarly configured. Save the configuration when you are done.

S3(config)#interface range fa0/6-10

S3(config-if-range)#switchport access vlan 30

S3(config-if-range)#interface range fa0/11-17

S3(config-if-range)#switchport access vlan 10

S3(config-if-range)#interface range fa0/18-24

S3(config-if-range)#switchport access vlan 20

S3(config-if-range)#end

S3#copy running-config startup-config

Destination filename [startup-config]? [enter]

Building configuration...

[OK]

 

 


Related Discussions:- How to Assign switch ports to VLAN

Dns - protocol attacks, DNS - Protocol Attacks Generally, in the DNS p...

DNS - Protocol Attacks Generally, in the DNS protocol, flaws are based on the implementation issues. The three common issues are generally, associated which can be of one of t

Uses of fragmentation and reassembly, Uses of fragmentation and reassembly ...

Uses of fragmentation and reassembly The More bit is used for fragmentation and reassembly. If this bit is 0, then either there has been no fragmentation of this packet or this

Enumerate about the traffic policing, Enumerate about the Traffic policing ...

Enumerate about the Traffic policing Traffic policing happens when a flow of data is regulated so that cells (or frames or packets) that exceed a performance level are discarde

Explain ring interconnection networks, Ring: It is a simple linear array w...

Ring: It is a simple linear array where end nodes are associated.  It is equal to a mesh with wrap around connections.  The data transfer in a ring is generally one direction. So,

What is primary and secondary ring - fddi, What is primary and secondary ri...

What is primary and secondary ring One of the two FDDI rings is known as the primary ring; the other is called the secondary ring. The primary ring is utilized for data tra

Document the switch configuration- ccna, Document the Switch Configuration ...

Document the Switch Configuration When you have done your troubleshooting, capture the output of the show run command and save it to a text document for each switch.

Explain imap, Short for Internet Message Access Protocol. This is another m...

Short for Internet Message Access Protocol. This is another most prevalent protocol of internet standard for email usage apart from POP. Usually all the modern email server and cli

Describe a typical dns system, Question: (a) With the help of a diagra...

Question: (a) With the help of a diagram, describe a typical DNS system. (b) Using signal sequence or state transition diagrams, illustrate the following scenarios: i.

What is authentication, Q. What is Authentication ? - Verification of s...

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd