Verify vlans and trunking - ccna, Computer Networking

Assignment Help:

Verify VLANs and trunking.

Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VLANs exist. 

S1#show interface trunk

Port        Mode         Encapsulation  Status    Native vlan

Fa0/1       on           802.1q         trunking      1

Fa0/2       on           802.1q         trunking      1

Fa0/3       on           802.1q         trunking      1

Fa0/4       on           802.1q         trunking      1

Fa0/5       on           802.1q         trunking      1

Port      Vlans allowed on trunk

Fa0/1       1-4094

Fa0/2       1-4094

Fa0/3       1-4094

Fa0/4       1-4094

Fa0/5       1-4094

 

Port        Vlans allowed and active in management domain

Fa0/1       1,10,20,88

Fa0/2       1,10,20,88

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88   

Port        Vlans in spanning tree forwarding state and not pruned

 

Port        Vlans in spanning tree forwarding state and not pruned

Fa0/1       1,10,20,88

Fa0/2       none         A ← blocked due to spanning tree

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88>

 


Related Discussions:- Verify vlans and trunking - ccna

Analyze snort or pcap data from a public wifi hotspot, The project idea is ...

The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r

Define about unix systems and windows servers, What protocol can be applied...

What protocol can be applied when you need to transfer files between different platforms, such among UNIX systems and Windows servers? Use FTP (File Transfer Protocol) for file

traffic flow mapping , Develop traffic flow mapping and performance requir...

Develop traffic flow mapping and performance requirements for flows. A) Traffic Flow Mapping B) Performance Requirements

State the fundamental principles of 3gpp security, Question : a) What ...

Question : a) What does association refer to in IEEE 802.11? b) State the fundamental principles of 3GPP security. c) Explain the term "binding" in Mobile IPv6 d)

Explain simple mail transfer protocol, Q. Explain Simple Mail Transfer Prot...

Q. Explain Simple Mail Transfer Protocol? Electronic Mail -Simple Mail Transfer Protocol (SMTP) is used to support email on the Internet -Addressing consists of two pa

Clock-driven scheme , Assume that the clock-driven scheme for generating st...

Assume that the clock-driven scheme for generating starting sequence numbers is used with a 16-bit wide clock counter (that is, sequence numbers range from 0 to 2^16).  The clock t

Networking, What is the implication of increasing and decreasing subnet Bit...

What is the implication of increasing and decreasing subnet Bits?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd