Verify vlans and trunking - ccna, Computer Networking

Assignment Help:

Verify VLANs and trunking.

Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VLANs exist. 

S1#show interface trunk

Port        Mode         Encapsulation  Status    Native vlan

Fa0/1       on           802.1q         trunking      1

Fa0/2       on           802.1q         trunking      1

Fa0/3       on           802.1q         trunking      1

Fa0/4       on           802.1q         trunking      1

Fa0/5       on           802.1q         trunking      1

Port      Vlans allowed on trunk

Fa0/1       1-4094

Fa0/2       1-4094

Fa0/3       1-4094

Fa0/4       1-4094

Fa0/5       1-4094

 

Port        Vlans allowed and active in management domain

Fa0/1       1,10,20,88

Fa0/2       1,10,20,88

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88   

Port        Vlans in spanning tree forwarding state and not pruned

 

Port        Vlans in spanning tree forwarding state and not pruned

Fa0/1       1,10,20,88

Fa0/2       none         A ← blocked due to spanning tree

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88>

 


Related Discussions:- Verify vlans and trunking - ccna

Explain dynamic domain name system, Q. Explain Dynamic Domain Name System? ...

Q. Explain Dynamic Domain Name System? DDNS - Dynamic Domain Name System automatically updates the DNS master file - Sent by DHCP to a primary DNS server; secondary se

Show the network criteria, Network Criteria - Performance - It is able...

Network Criteria - Performance - It is able to be measured by transit time and response time. Affected by type of medium, number of users and connected HW/SW - Reliability

Explain the types of security service, Q. Explain the Types of Security Ser...

Q. Explain the Types of Security Service? Security Services fall into one of the subsequent categories - Confidentiality: Confirms that the info in a system and transm

What are major types of networks and explain, What are major types of netwo...

What are major types of networks and explain? Server-based network: Give centralized control of network resources and depend on server computers to give security and network

What is region, What is region? When hierarchical routing is used, the ...

What is region? When hierarchical routing is used, the routers are separated into what we will call regions, with every router knowing all the details about how to route packet

Illustrate go back - N protocol, Q. Illustrate Go Back - N protocol? G...

Q. Illustrate Go Back - N protocol? Go Back - N - Sender window size - Receiver window size = 1 - Why the names go back- N? - When the frame is spoilt the sende

What is bit stuffing, What is Bit Stuffing? Bit stuffing is the process...

What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive is follow a 0 in the data, so that the receiver does not mistake the pattern 0

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd