Verify vlans and trunking - ccna, Computer Networking

Assignment Help:

Verify VLANs and trunking.

Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VLANs exist. 

S1#show interface trunk

Port        Mode         Encapsulation  Status    Native vlan

Fa0/1       on           802.1q         trunking      1

Fa0/2       on           802.1q         trunking      1

Fa0/3       on           802.1q         trunking      1

Fa0/4       on           802.1q         trunking      1

Fa0/5       on           802.1q         trunking      1

Port      Vlans allowed on trunk

Fa0/1       1-4094

Fa0/2       1-4094

Fa0/3       1-4094

Fa0/4       1-4094

Fa0/5       1-4094

 

Port        Vlans allowed and active in management domain

Fa0/1       1,10,20,88

Fa0/2       1,10,20,88

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88   

Port        Vlans in spanning tree forwarding state and not pruned

 

Port        Vlans in spanning tree forwarding state and not pruned

Fa0/1       1,10,20,88

Fa0/2       none         A ← blocked due to spanning tree

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88>

 


Related Discussions:- Verify vlans and trunking - ccna

Arrays pointers for parallel algorithms, Arrays Pointers An array is a ...

Arrays Pointers An array is a set of the same type of data. Arrays are very well-liked data structures in parallel programming due to their easiness of use and declaration. At

Application layer - computer network, Application Layer The  applicati...

Application Layer The  application layer is where  network  applications and their  application layer protocols  reside. The internet application layer includes many protocols

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

Connection, how to connect two pc in lan?

how to connect two pc in lan?

Concept of internetwork and intranetwork routing protocols, Describe the co...

Describe the concept of internetwork and intranetwork routing protocols?

State the disadvantages of ring topology, Point out the disadvantages of Ri...

Point out the disadvantages of Ring Topology. The drawbacks of ring topologies are: a. It is considerably complex to install and reconfigure ring topology b. Media failur

What is ipconfig, What is ipconfig? Ipconfig is a utility program that ...

What is ipconfig? Ipconfig is a utility program that is commonly used to recognize the addresses information of a computer on a network. It can show the physical address as wel

What rate rtcp will limit, Consider an RTP session consisting of five users...

Consider an RTP session consisting of five users, all of which are sending and receiving RTP packets into the same multicast address. Each user sends video at 200kbps. a)  What

Which type for communication switch do, In case of any new event switch do ...

In case of any new event switch do broadcast, after that always do Unicast.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd