Preview

networking lab

Powerful Essays
Open Document
Open Document
1052 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
networking lab
1. Network Topology

3. Configuration Command Listings
3.1.
3.2. Switch – SWA

enable configure terminal hostname SWA enable secret hello

interface gigabitEthernet 0/1 switchport mode trunk switchport trunk native vlan 1 interface gigabitEthernet 0/2 switchport mode trunk switchport trunk native vlan 1 exit vlan 2 name Accouting vlan 3 name Finance vlan 4 name Marketing exit ip routing interface vlan 1 ip address 139.254.1.1 255.255.255.0 no shutdown interface vlan 2 ip address 139.254.2.1 255.255.255.0 no shutdown interface vlan 3 ip address 139.254.3.1 255.255.255.0 no shutdown interface vlan 4 ip address 139.254.4.1 255.255.255.0 no shutdown exit vtp domain ISAM5636 vtp mode server

ip domain-name uhcl.org ip dhcp pool VLAN1 network 139.254.1.0 255.255.255.0 default-router 139.254.1.1 dns-server 139.254.1.2 exit ip dhcp excluded-address 139.254.1.1 139.254.1.10 ip dhcp pool VLAN2 network 139.254.2.0 255.255.255.0 default-router 139.254.2.1 dns-server 139.254.1.2 exit ip dhcp excluded-address 139.254.2.1 255.255.255.0 ip dhcp excluded-address 139.254.2.1 139.254.2.10 ip dhcp pool VLAN3 network 139.254.3.0 255.255.255.0 default-router 139.254.3.1 dns-server 139.254.1.2 exit ip dhcp excluded-address 139.254.3.1 139.254.3.10

ip dhcp pool VLAN4 network 139.254.4.0 255.255.255.0 default-router 139.254.4.1 dns-server 139.254.1.2 exit ip dhcp excluded-address 139.254.4.1 139.254.4.10 line vty 0 15 password howdy login exit copy running-config startup-config

3.3. Switch - SWB

enable configure terminal hostname SWB enable secret hello vtp domain ISAM5636 vtp mode client interface gigabitEthernet 1/1 switchport mode trunk switchport trunk native vlan 1 exit interface vlan 1 ip address 139.254.1.11 255.255.255.0 no shutdown interface fa0/1 switchport access vlan 1 interface fa0/2 switchport access vlan 2 interface fa0/3 switchport access vlan 3

You May Also Find These Documents Helpful

  • Powerful Essays

    4. When setting a local Cisco switchport to initiate the negotiation of a trunk link with the remote…

    • 901 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    VLAN Trunking Protocol (VTP) will add speed and efficiency to the network while reducing overhead and building the strength of the network. Switches on the network must be configured in two ways for VTP to work properly. There must be at least one VTP Server and VTP clients. Changes to the VTP must be made in VTP Server mode and will be communicated to all other VTP client switches. Also, the network needs to be physically laid out in a star topology as a backup to the VLAN to ensure that the network continues to operate during a…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    VLAN Trunking protocols (VTP) is a Layer 2 messaging protocol which is used to add, remove or modify VLANs on a Network.VTP provides automatic distribution of definitions from the core switch to the distribution switches. This allowed the customer to define the VLANs once, on the core switch, and have that VLAN definition automatically propagate to all distribution switches on the network. Once the VLAN definition had propagated to the distribution switch, it was then possible to begin assigning ports to the VLAN (Regan, 2004).…

    • 682 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Task 1, Step 5: Paste a screenshot showing the sequence of commands that you used to configure the management VLAN on NYCORE1. (1 point)…

    • 708 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco switch:…

    • 920 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    8) How many total IP hosts dod you find on the server farm VLAN using the Nessus Lab #4 server farm scan?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The total number of network and subnet bits equal an address’s prefix. If a Class A address of 10.10.33.46 has a mask of 255.255.224.0, then all of the 1s in the binary form of that mask, which totals 19, would be the prefix. In CIDR notation, the address would be seen as 10.10.33.46/19.…

    • 2698 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    3. Figure 3 shows screen shot of entire contents of the file properties dialog box.…

    • 664 Words
    • 3 Pages
    Better Essays
  • Good Essays

    When a CPU is composed of two or more processors, each one is referred to as a(n) ________.…

    • 2490 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Networking Event 1

    • 555 Words
    • 3 Pages

    Part A) CPA Australia held an event related to the changes in Fringe Benefit Tax. As I am a member of CPA Australia, they sent me an invitation to attend the event. It was an important event for me to attend as the changes were major and related to the clients business.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Lan Technologies

    • 974 Words
    • 4 Pages

    Fred Jones, a distant relative of yours and president of Deals-R-Us Brokers (DRUB), has come to you for advice. DRUB is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional orders by phone or fax. DRUB has just decided to offer a set of stock analysis tools that will help its clients more easily pick winning stocks, or so Fred tells you. Fred’s information systems department has presented him with two alternatives for developing the new tools. The first alternative will have a special tool developed in C++ that clients will download onto their computers to run. The tool will communicate with the DRUB server to select data to analyze. The second alternative will have the C++ program running on the server, the client will use his or her browser to interact with the server.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    d. True or False: A common way to share resources on a client/server network is by modifying the file-sharing controls via the computer’s operating system.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays