Verify vlans and trunking - ccna, Computer Networking

Assignment Help:

Verify VLANs and trunking.

Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VLANs exist. 

S1#show interface trunk

Port        Mode         Encapsulation  Status    Native vlan

Fa0/1       on           802.1q         trunking      1

Fa0/2       on           802.1q         trunking      1

Fa0/3       on           802.1q         trunking      1

Fa0/4       on           802.1q         trunking      1

Fa0/5       on           802.1q         trunking      1

Port      Vlans allowed on trunk

Fa0/1       1-4094

Fa0/2       1-4094

Fa0/3       1-4094

Fa0/4       1-4094

Fa0/5       1-4094

 

Port        Vlans allowed and active in management domain

Fa0/1       1,10,20,88

Fa0/2       1,10,20,88

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88   

Port        Vlans in spanning tree forwarding state and not pruned

 

Port        Vlans in spanning tree forwarding state and not pruned

Fa0/1       1,10,20,88

Fa0/2       none         A ← blocked due to spanning tree

Fa0/3       1,10,20,88

Fa0/4       1,10,20,88

Fa0/5       1,10,20,88>

 


Related Discussions:- Verify vlans and trunking - ccna

Function of the transport system and workbench organizer, What is the funct...

What is the function of the transport system and workbench organizer? The function of the transport system and the Workbench Organizer is to handle any changes made to objects

Explain process management and transaction management, TP Monitor does main...

TP Monitor does mainly two things extremely well. They are Process management and Transaction management? They were originally introduced to run classes of applications that co

What are the advantages and disadvantages of routing table, What are the ad...

What are the advantages and disadvantages of the three types of routing tables? The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be

Describe techniques used in location based services, Question: a) Comp...

Question: a) Compare Bluetooth and WIFI based networks over the following factors: Data rate, Range, Application Focus, Battery Power, Frequency Band, Security. b) Differe

virtual private network - virtual private network vpns, Virtual private ne...

Virtual private network The virtual  private  networks takes the  user data  encrypts them and sends them  to their  destination over  the internet. the sender  and the receiv

Statements about ppp and slip for wan communications, State the statements ...

State the statements about PPP and SLIP for WAN communications?  Ans)    a) PPP uses its Network Control Programs (NCPs) component to encapsulate many protocols.  b) SLIP

Commands and responses - application layer, Commands SMTP uses comma...

Commands SMTP uses commands  and response  to transfer  message between a client  and a  server.  Each  commands  or reply  is terminated by a two character ( carriage re

Byte number - transport layer, Byte Number TCP number all data  bytes ...

Byte Number TCP number all data  bytes that  are transmitted  in a connection. Numbering  is independent  in each direction when TCP receives bytes of data  a process. It stor

CLIENT SERVER BLACKJACK, So for this project, we’re going to make a game. ...

So for this project, we’re going to make a game. This game will make use of a server to join two clients together for a modified game of Blackjack.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd