Verify vlans and trunking - ccna, Computer Networking

Assignment Help:

Verify VLANs and trunking.

Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VLANs exist. 

S1#show interface trunk

Port        Mode         Encapsulation  Status    Native vlan

Fa0/1       on           802.1q         trunking      1

Fa0/2       on           802.1q         trunking      1

Fa0/3       on           802.1q         trunking      1

Fa0/4       on           802.1q         trunking      1

Fa0/5       on           802.1q         trunking      1

Port      Vlans allowed on trunk

Fa0/1       1-4094

Fa0/2       1-4094

Fa0/3       1-4094

Fa0/4       1-4094

Fa0/5       1-4094

 

Port        Vlans allowed and active in management domain

Fa0/1       1,10,20,88

Fa0/2       1,10,20,88

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88   

Port        Vlans in spanning tree forwarding state and not pruned

 

Port        Vlans in spanning tree forwarding state and not pruned

Fa0/1       1,10,20,88

Fa0/2       none         A ← blocked due to spanning tree

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88>

 


Related Discussions:- Verify vlans and trunking - ccna

Full form of httpd, Full form of HTTPd It stands for HTTP daemon. HT...

Full form of HTTPd It stands for HTTP daemon. HTTPd is the program run on a UNIX platform to establish a Web server. On other platforms, such as Microsoft Windows NT, the We

Types of wires, TYPES OF WIRES:  Cable used for wiring would match the...

TYPES OF WIRES:  Cable used for wiring would match the following: The intended speed The distance between computers The amount of noise Anticipated future r

What is piggy backing, What is Piggy Backing? A process called piggybac...

What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also

Why is the authentication and key agreement of 3gpp weak, Question 1: a...

Question 1: a) How is the four-way exchange employed for mutual authentication in WPA/RSN? b) Elaborate on how inquiry attacks and traffic monitoring attacks can be u

Encoding process, Encoding Process c= uG u: binary da...

Encoding Process c= uG u: binary data sequence of length 4( input) G: Generator matrix which is 7*4 c: Codeword     D

Networking, Discuss the interdependence of networking hardware and software...

Discuss the interdependence of networking hardware and software. Is it possible to have one without the other?

Describe the specific ip-qos schemes, State how the different IP-QoS needs ...

State how the different IP-QoS needs for controling traffic, data and voice applications can be supported in your technology choice from Q7. Describe the specific IP-QoS schemes -

Network laye - fundamentals of networks , Network Laye The network  la...

Network Laye The network  layer provides  communication  between the multiple networks. Whereas the  data link  layer provides the  communication between  two systems on the s

State token ring implementation, Token Ring Implementation Sequence...

Token Ring Implementation Sequence of 150-ohm shielded twisted-pairs sections Output port on every station connected to input port on the next Frame is passed to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd