Prepare the network of spanning tree protocol -ccna, Computer Networking

Assignment Help:

626_CCNA.png

Prepare the Network 

Step 1: Disable all ports by using the shutdown command.

Ensure that the initial switch port states are inactive with the shutdown command. Use the interface-

range command to simplify this task.

S1(config)#interface range fa0/1-24

S1(config-if-range)#shutdown

S1(config-if-range)#interface range gi0/1-2

S1(config-if-range)#shutdown

S2(config)#interface range fa0/1-24

S2(config-if-range)#shutdown

S2(config-if-range)#interface range gi0/1-2

S2(config-if-range)#shutdown

S3(config)#interface range fa0/1-24

S3(config-if-range)#shutdown

S3(config-if-range)#interface range gi0/1-2

S3(config-if-range)#shutdown

 

Step 2: Re-enable the user ports on S1 and S2 in access mode.

Refer to the topology diagram to determine which switch ports on S2 are activated for end-user device

access. These three ports will be configured for access mode and enabled with the no shutdown

command.

S1(config)#interface fa0/3

S1(config-if)#switchport mode access

S1(config-if)#no shutdown  

S2(config)#interface range fa0/6, fa0/11, fa0/18

S2(config-if-range)#switchport mode access

S2(config-if-range)#no shutdown  

 

 


Related Discussions:- Prepare the network of spanning tree protocol -ccna

Define the term - hot swapping, Define the term - Hot swapping The rel...

Define the term - Hot swapping The reliability of the machine can be dramatically improved by installing the best components. Hot swapping is a concept through which component

Prototype Web Site for the Computer Superstores, Overview Create a proto...

Overview Create a prototype web site for the "Computer Superstores" company. Your site should use effective navigation features and demonstrate good structure for  accessibility

Dynamic process groups in parallel virtual machine , Dynamic Process Groups...

Dynamic Process Groups To generate and manage dynamic groups, a separate library libgpvm3.a must be connected with the user programs that make use of any of the set functions.

The received message - application layer , The Received Message If  we...

The Received Message If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message wit

Cipher password guess-cryptography, a. If a password to a cipher is exactly...

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

Shortest path - network layer and routing , Shortest path  The  dijkst...

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

Set cookies 1178345 - application layer, Set Cookies 1178345 When  Hus...

Set Cookies 1178345 When  Hussan  browser receives  the HTTP response  message it sees the set cookies header. The  browser then appends  a line to the special cookie file  th

Networking device, what is the best time to use brouter rather than router?...

what is the best time to use brouter rather than router? what are advantages of using brouter over router?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd