*CONCLUSION: We have full reachability despite the vlan mismatch.*
*
*
*
Three routers and one switch.
*
*
R2811(Fa0/0.1)-------------TRUNK-LINK-----------------------Cat3550 (Fa0/1)
*
*
native vlan 20
native vlan 10
R3825
(Gi0/0.1)
-------------
TRUNK-LINK
-----------------------
Cat3550 (Gi0/2)
native vlan 30
native vlan 10
*R2811-forvlan10(Fa0/0)--*
ACCESS-LINK
*-----*
Cat3550 (Fa0/4)
*
*
explicitly configured in vlan 10 as access port
I included the third link to clear all doubts about expected behaviour of
vlan 10 connected devices.
*
*Catalyst 3550 Swicth Spec*
Cat3550(config)#do sh vers | i Model num|RELEA
Cisco IOS Software, C3550 Software (C3550-IPSERVICESK9-M), Version
12.2(44)SE3, RELEASE SOFTWARE (fc2)
Model number: WS-C3550-24-SMI
*
*
*2811 Router Spec*
Router(config)#do sh ver | i image
System image file is "flash:c2800nm-adventerprisek9-mz.124-24.T2.bin"
*
*
*3825 Router Spec*
*
*
R3825(config-subif)#do sh ver | i Software
Cisco IOS Software, 3800 Software (C3825-ADVENTERPRISEK9-M), Version
12.4(24)T2, RELEASE SOFTWARE (fc2)
*2811 (for vlan 10 ) Router Spec *
*
*
R2811-forvlan10(config)#do sh ver | i Software
Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version
12.4(24)T2, RELEASE SOFTWARE (fc2)
*CDP *(so we have Fas 0/1 connected to 2811and we have Gig 0/2 connected
to 3825 and Fa0/4 Connected to R2811-forvlan10)
Cat3550(config-if)#do sh cdp nei | i R2811|R3825|ID
Device ID Local Intrfce Holdtme Capability Platform Port ID
R2811-forvlan10 Fas 0/4 123 R S I 2811 Fas 0/0
R2811 Fas 0/1 139 R S I 2811 Fas 0/0
R3825 Gig 0/2 129 R S I 3825 Gig 0/0
*INTERFACE CONFIG*
*
*
Cat3550(config-if)#do sh run int *fa0/1*
interface FastEthernet0/1
description *TRUNK to R2811*
switchport trunk encapsulation dot1q
switchport trunk native vlan 10
switchport mode trunk
end
Cat3550(config-if)#do sh run int fa0/4
interface FastEthernet0/4
description *ACCESS LINK TO R2811-forvlan10*
switchport access vlan 10
switchport mode access
end
Cat3550(config-if)#do sh run int gi0/2
interface GigabitEthernet0/2
description *TRUNK to R3825*
switchport trunk encapsulation dot1q
switchport trunk native vlan 10
switchport mode trunk
end
Cat3550(config-if)#do sh run int vlan 10
interface Vlan10
ip address 10.1.1.2 255.255.255.0
end
Cat3550(config-if)#do sh int status
Port Name Status Vlan Duplex Speed Type
Fa0/1 TRUNK to R2811 connected trunk a-full a-100
10/100BaseTX
Fa0/4 ACCESS LINK TO R28 connected 10 a-full a-100
10/100Base
Gi0/2 TRUNK to R3825 connected trunk a-full a-1000
1000BaseSX
*VLANS*
*
*
VLAN Name Status Ports
---- -------------------------------- ---------
-------------------------------
1 default active Fa0/2, Fa0/3, Fa0/5, Fa0/6
Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/13,
Fa0/14
Fa0/15, Fa0/16, Fa0/17,
Fa0/18
Gi0/1
10 VLAN0010 active Fa0/4
20 VLAN0020 active
30 VLAN0030 active
R2811(config-subif)#do sh run int fa0/0.1
interface FastEthernet0/0.1
description "MISMATCHED NATIVE VLAN 20/10"
encapsulation dot1Q 20 native
ip address 10.1.1.1 255.255.255.0
end
R3825(config-subif)#do sh run int gi0/0.1
interface GigabitEthernet0/0.1
description "MISMATCHED NATIVE VLAN 30/10"
encapsulation dot1Q 30 native
ip address 10.1.1.3 255.255.255.0
end
R2811-forvlan10(config-if)#do sh run int fa0/0
interface FastEthernet0/0
description "THIS ONE IS AN ACCESS LINK WHICH WE WILL PUT IN VLAN 10 ON
THE SWITCH"
ip address 10.1.1.4 255.255.255.0
duplex auto
speed auto
end
Cat3550(config-if)#do ping 10.1.1.255
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.255, timeout is 2 seconds:
Reply to request 0 from 10.1.1.3, 1 ms
Reply to request 0 from 10.1.1.1, 1 ms
Reply to request 0 from 10.1.1.4, 1 ms
R2811(config-subif)#do ping 10.1.1.255
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.255, timeout is 2 seconds:
Reply to request 0 from 10.1.1.3, 1 ms
Reply to request 0 from 10.1.1.2, 1 ms
Reply to request 0 from 10.1.1.4, 1 ms
R3825(config-subif)#do ping 10.1.1.255
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.255, timeout is 2 seconds:
Reply to request 0 from 10.1.1.2, 4 ms
Reply to request 0 from 10.1.1.1, 4 ms
Reply to request 1 from 10.1.1.2, 1 ms
Reply to request 1 from 10.1.1.1, 1 ms
Reply to request 1 from 10.1.1.4, 1 ms
R2811-forvlan10(config-if)#do ping 10.1.1.255
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.255, timeout is 2 seconds:
Reply to request 0 from 10.1.1.3, 4 ms
Reply to request 0 from 10.1.1.1, 4 ms
Reply to request 0 from 10.1.1.2, 4 ms
*CONCLUSION: So we have full reachability despite the vlan mismatch.*
Olugbenga Oyebande
> On Fri, Dec 9, 2011 at 7:38 PM, Oluwagbenga Oyebande <
> [email protected]> wrote:
>
>> Hi CCIE Kid
>>
>> I agree with Narottam. I would like to add something to Q2
>>
>>
>> Answ to Q1. The trunk will form as you have already seen.
>>
>> Answ to Q2. If by user traffic you mean IP traffic, then the answer
>> depends on the IP configuration of your switch's *VLAN 10 SVI. *If you
>> have 10.1.1.0/24 subnet configured on the switch's SVI then IP traffic
>> should pass in spite of native vlan mismatch. If you have another subnet
>> (or no ip address) configured on it then IP traffic will not pass.
>> *
>> *
>>
>>
>> On Fri, Dec 9, 2011 at 7:45 AM, Narottam Prajapati
>> <[email protected]>wrote:
>>
>>> HI
>>>
>>> Native VLAN numbering mismatch will not affect to trunk forming
>>> process. Trunk will form between both devics.
>>>
>>> Regarding Traffic forwarding traffic will forward without any tagigng due
>>> to default behaviour of dot1q encapsulation.
>>>
>>> When router try to forward traffic to switch frames forwards up to switch
>>> and switch 2 assume that this traffic is for native VLAN traffic because
>>> frames are untaged.
>>>
>>> Hi Group
>>>
>>> make me correct if any thing is wrong.
>>>
>>> Regards,
>>> Narottam Prajapati
>>>
>>> On Fri, Dec 9, 2011 at 11:25 AM, Shaughn Smith <[email protected]>
>>> wrote:
>>>
>>> > Your question was answered. A few times.
>>> >
>>> > CCIE # 23962 (SP)
>>> >
>>> > Sent from my iPhone 4
>>> >
>>> > On 09 Dec 2011, at 7:40 AM, CCIE KID <[email protected]> wrote:
>>> >
>>> > > Hi all,
>>> > >
>>> > > Still my question has not been answered. What will happen if a router
>>> > > connected to a switch is placed in two different native Vlans. U
>>> guys are
>>> > > all talking about connecting two switches and incorporating two
>>> different
>>> > > native vlans.
>>> > >
>>> > > My scenario is simple. R1-----------------------Sw1
>>> > >
>>> > > I m using two different native vlans from R1 to Sw1 . Whether trunk
>>> will
>>> > > form.? Or if the trunk forms, whether user traffic will be able to
>>> pass
>>> > > through or not.
>>> > >
>>> > > Please reply to my questions
>>> > >
>>> > > Thank You
>>> > >
>>> > > On Fri, Dec 9, 2011 at 4:23 AM, George J. Sanchez <
>>> [email protected]
>>> > >wrote:
>>> > >
>>> > >> I've seen plenty of customers networks with native vlan mismatches,
>>> > >> traffic will pass. With that being said, newer code may fix
>>> different
>>> > >> "features" that previous codes had issues with.
>>> > >>
>>> > >> Regards,
>>> > >> Joe Sanchez
>>> > >>
>>> > >> On Dec 8, 2011, at 1:28 PM, Narbik Kocharians <[email protected]>
>>> > wrote:
>>> > >>
>>> > >>> This is what i was referring to:
>>> > >>>
>>> > >>>
>>> > >>> R1 s F0/0 is connected to SW1 s port F0/1
>>> > >>>
>>> > >>> R2 s F0/1 is connected to SW2 s port F0/2
>>> > >>>
>>> > >>>
>>> > >>> SW1 s F0/19 is connected to SW2 s F0/19
>>> > >>>
>>> > >>>
>>> > >>> *SW1#sh run int f0/19 | B inter*
>>> > >>>
>>> > >>> interface FastEthernet0/19
>>> > >>>
>>> > >>> switchport trunk encapsulation dot1q
>>> > >>>
>>> > >>> switchport trunk native vlan 10
>>> > >>>
>>> > >>> switchport mode trunk
>>> > >>>
>>> > >>> end
>>> > >>>
>>> > >>> *
>>> > >>> *
>>> > >>>
>>> > >>> *SW2#sh run int f0/19 | B inter*
>>> > >>>
>>> > >>> interface FastEthernet0/19
>>> > >>>
>>> > >>> switchport trunk encapsulation dot1q
>>> > >>>
>>> > >>> switchport mode trunk
>>> > >>>
>>> > >>> end
>>> > >>>
>>> > >>>
>>> > >>> *NOTE: The trunk is UP*
>>> > >>>
>>> > >>>
>>> > >>> *SW1#Show int trunk*
>>> > >>>
>>> > >>>
>>> > >>> Port Mode Encapsulation Status Native vlan
>>> > >>>
>>> > >>> Fa0/19 on 802.1q trunking 10
>>> > >>>
>>> > >>>
>>> > >>> Port Vlans allowed on trunk
>>> > >>>
>>> > >>> Fa0/19 1-4094
>>> > >>>
>>> > >>>
>>> > >>> Port Vlans allowed and active in management domain
>>> > >>>
>>> > >>> Fa0/19 1,10,80
>>> > >>>
>>> > >>>
>>> > >>> Port Vlans in spanning tree forwarding state and not pruned
>>> > >>>
>>> > >>> Fa0/19 1,10,80
>>> > >>>
>>> > >>>
>>> > >>>
>>> > >>> *SW2#sh spanning-tree blockedports *
>>> > >>>
>>> > >>>
>>> > >>> Name Blocked Interfaces List
>>> > >>>
>>> > >>> -------------------- ------------------------------------
>>> > >>>
>>> > >>> VLAN0001 Fa0/19
>>> > >>>
>>> > >>> VLAN0010 Fa0/19
>>> > >>>
>>> > >>>
>>> > >>> Number of blocked ports (segments) in the system : 2
>>> > >>>
>>> > >>>
>>> > >>> *All Traffic is blocked for the two Vlans.*
>>> > >>>
>>> > >>> *And sure you can get around it, and one way to do this is to
>>> filter
>>> > >> BPDUs
>>> > >>> that carry the VLANs as you mentioned:*
>>> > >>>
>>> > >>>
>>> > >>> SW1(config)#int f0/19
>>> > >>>
>>> > >>> SW1(config-if)#spanning-tree bpdufilter en
>>> > >>>
>>> > >>>
>>> > >>> *SW1#sh spannin blockedports *
>>> > >>>
>>> > >>>
>>> > >>> Name Blocked Interfaces List
>>> > >>>
>>> > >>> -------------------- ------------------------------------
>>> > >>>
>>> > >>>
>>> > >>> Number of blocked ports (segments) in the system : 0
>>> > >>>
>>> > >>>
>>> > >>> *And I am sure there are other ways. But remember this is the
>>> default
>>> > >>> behavior BUT not on all IOSes, on some IOSes, it will complain that
>>> > there
>>> > >>> is a Native VLAN mismatch, but it will NOT block the VLANs
>>> configured
>>> > as
>>> > >>> Native*
>>> > >>>
>>> > >>>
>>> > >>> On Thu, Dec 8, 2011 at 10:35 AM, Narbik Kocharians <
>>> [email protected]
>>> > >>> wrote:
>>> > >>>
>>> > >>>> Yes, you are correct, you can get around it, i was referring to
>>> the
>>> > >>>> default behavior.
>>> > >>>>
>>> > >>>>
>>> > >>>> On Thu, Dec 8, 2011 at 9:23 AM, Paul Cocker <[email protected]>
>>> > >> wrote:
>>> > >>>>
>>> > >>>>> Spanning-tree...
>>> > >>>>>
>>> > >>>>> I'm guessing the vlan is in the bpdu.
>>> > >>>>>
>>> > >>>>> with this config...
>>> > >>>>>
>>> > >>>>> SW1
>>> > >>>>> interface FastEthernet0/13
>>> > >>>>> switchport trunk encapsulation dot1q
>>> > >>>>> switchport trunk native vlan 10
>>> > >>>>> switchport mode trunk
>>> > >>>>> switchport nonegotiate
>>> > >>>>>
>>> > >>>>> SW2
>>> > >>>>> interface FastEthernet0/13
>>> > >>>>> switchport access vlan 20
>>> > >>>>> switchport trunk encapsulation dot1q
>>> > >>>>> switchport trunk native vlan 20
>>> > >>>>> switchport mode trunk
>>> > >>>>> switchport nonegotiate
>>> > >>>>> no cdp enable
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> you get this...
>>> > >>>>>
>>> > >>>>> *Mar 1 00:18:26.994: %SPANTREE-2-RECV_PVID_ERR: Received BPDU
>>> with
>>> > >>>>> inconsistent peer vlan id 10 on FastEthernet0/13 VLAN20.
>>> > >>>>> *Mar 1 00:18:26.994: %SPANTREE-2-BLOCK_PVID_LOCAL: Blocking
>>> > >>>>> FastEthernet0/13 on VLAN0020. Inconsistent local vlan.
>>> > >>>>>
>>> > >>>>> You can disable spanning tree, or use bpdufilter to get around
>>> it.
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> On 08/12/2011 16:58, Carlos G Mendioroz wrote:
>>> > >>>>>
>>> > >>>>>> What mechanism is responsible for such blocking ?
>>> > >>>>>>
>>> > >>>>>> -Carlos
>>> > >>>>>>
>>> > >>>>>> Narbik Kocharians @ 08/12/2011 13:34 -0300 dixit:
>>> > >>>>>>
>>> > >>>>>>> Between any two switch if the Native VLAN is mismatched the
>>> trunk
>>> > >> will
>>> > >>>>>>> come up but you won't be able to pass any traffic through it,
>>> and
>>> > you
>>> > >>> can
>>> > >>>>>>> see that with a "Show spanning block".
>>> > >>>>>>> On Thu, Dec 8, 2011 at 4:31 AM, David Bass
>>> > >>> <[email protected]<mailto:
>>> > >>>>>>> [email protected]**>> wrote:
>>> > >>>>>>>
>>> > >>>>>>> We are talking about CCIE lab, so best practice and "working"
>>> > >> status
>>> > >>>>>>> all go out the window :). In his scenario he's talking about
>>> > >> router
>>> > >>>>>>> to switch trunk, so no VTP or STP (if you do this switch to
>>> switch
>>> > >>>>>>> you'll definitely have issues though, so very good to
>>> know)...CDP
>>> > >>>>>>> will definitely bark non-stop though which is very irritating.
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>> On Dec 8, 2011, at 6:08 AM, Carlos G Mendioroz wrote:
>>> > >>>>>>>
>>> > >>>>>>>> May be depending on the equipment, the trunk will "form" just
>>> > fine,
>>> > >>>>>>>> if VLAN hopping is not considered to be a problem :)
>>> > >>>>>>>> CDP may barf. If VLAN 1 is involved, other griefs will pop.
>>> > >>>>>>>>
>>> > >>>>>>>> Different problems:
>>> > >>>>>>>> -framing: no problem, but "native VLAN" frames do not signal
>>> > >>>>>>> which VLAN
>>> > >>>>>>>> they belong to, so if they do not match, frames will hop from
>>> one
>>> > >>>>>>> VLAN
>>> > >>>>>>>> to the other.
>>> > >>>>>>>>
>>> > >>>>>>>> -signalling (DTP): AFAIK, VLANs are not part of the info
>>> > >>>>>>> interchanged, so the trunk will form even if native is not the
>>> > >> same.
>>> > >>>>>>>>
>>> > >>>>>>>> -control: (CDP/VTP/STP/...): well, you may have a problem
>>> here.
>>> > >>>>>>>> In particular, CDP/VTP go on VLAN 1, so if this is one of the
>>> > VLANs
>>> > >>>>>>>> involved in the crossing, it won't work.
>>> > >>>>>>>>
>>> > >>>>>>>> -Others ?
>>> > >>>>>>>>
>>> > >>>>>>>> -Carlos
>>> > >>>>>>>>
>>> > >>>>>>>>
>>> > >>>>>>>> David Bass @ 08/12/2011 08:25 -0300 dixit:
>>> > >>>>>>>>> The trunk will come up fine, but you won't have IP
>>> connectivity
>>> > >>>>>>> between the 2 devices on the VLANs/subnets you are expecting
>>> > >> because
>>> > >>>>>>> the 2 native VLANs are being bridged. Do some research on how
>>> > >> dot1q
>>> > >>>>>>> trunks work and you should be able to figure it out. On Dec 7,
>>> > >> 2011,
>>> > >>>>>>> at 11:40 PM, CCIE KID <[email protected]
>>> > >>>>>>> <mailto:[email protected]>> wrote:
>>> > >>>>>>>>>> Hi fellas,
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> I tested a scenario where the Native vlan differs from the
>>> > >>>>>>> router port to
>>> > >>>>>>>>>> the switch port. I understood that if the NAtive vlan
>>> > >>>>>>> mismatches on a trunk
>>> > >>>>>>>>>> port , then appropriate trunking wont be formed.
>>> > >>>>>>>>>> But when i connect my router to a switch and in the router
>>> > >>>>>>> subinterface . I
>>> > >>>>>>>>>> am having a native vlan of 20 and in the switch port it is
>>> > >>>>>>> having a native
>>> > >>>>>>>>>> vlan of 10 , but still the trunk is forming perfectly
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> Can someone correct me
>>> > >>>>>>>>>> fa0/1.1 fa0/1
>>> > >>>>>>>>>>
>>> Router1-----------------------**------------------------Switch 1
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> Router 1
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> inter fa 0/1.1
>>> > >>>>>>>>>> encap dot1q 20 native
>>> > >>>>>>>>>> ip add 10.1.1.1 255.255.255.0
>>> > >>>>>>>>>> no sh
>>> > >>>>>>>>>>
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> Switch 1
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> int fa 0/1
>>> > >>>>>>>>>> enc dot1q 10 native
>>> > >>>>>>>>>> swi trunk enc dot
>>> > >>>>>>>>>> swi mo trunk
>>> > >>>>>>>>>> no sh
>>> > >>>>>>>>>>
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> But s
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> --
>>> > >>>>>>>>>> With Warmest Regards,
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> CCIE KID
>>> > >>>>>>>>>> CCIE#29992 (Security)
>>> > >>>>>>>>>>
>>> > >>>>>>>>>>
>>> > >>>>>>>>>> Blogs and organic groups at http://www.ccie.net
>>> > >>>>>>>>>>
>>> > >>>>>>>>>>
>>> > >>>>>>>
>>> ______________________________**______________________________**
>>> > >>>>>>> ___________
>>> > >>>>>>>>>> Subscription information may be found at:
>>> > >>>>>>>
>>> > >>> http://www.groupstudy.com/**list/CCIELab.html<
>>> > >> http://www.groupstudy.com/list/
>>> > >>> CCIELab.html>
>>> > >>>>>>>>> Blogs and organic groups at http://www.ccie.net
>>> > >>>>>>>>>
>>> > >>>>>>>
>>> ______________________________**______________________________**
>>> > >>>>>>> ___________
>>> > >>>>>>>>> Subscription information may be found at:
>>> > >>>>>>>
>>> > >>> http://www.groupstudy.com/**list/CCIELab.html<
>>> > >> http://www.groupstudy.com/list/
>>> > >>> CCIELab.html>
>>> > >>>>>>>>
>>> > >>>>>>>> --
>>> > >>>>>>>> Carlos G Mendioroz <[email protected] <mailto:[email protected]
>>> >>
>>> > >>>>>>> LW7 EQI Argentina
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>> Blogs and organic groups at http://www.ccie.net
>>> > >>>>>>>
>>> > >>>>>>>
>>> ______________________________**______________________________**
>>> > >>>>>>> ___________
>>> > >>>>>>> Subscription information may be found at:
>>> > >>>>>>>
>>> > >>> http://www.groupstudy.com/**list/CCIELab.html<
>>> > >> http://www.groupstudy.com/list/
>>> > >>> CCIELab.html>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>> --
>>> > >>>>>>> *Narbik Kocharians
>>> > >>>>>>> *CCSI#30832, CCIE# 12410 (R&S, SP, Security)
>>> > >>>>>>> *www.MicronicsTraining.com*
>>> > >>> <http://www.micronicstraining.**com/<
>>> http://www.micronicstraining.com/
>>> > >
>>> > >>>>>>>>
>>> > >>>>>>> Sr. Technical Instructor
>>> > >>>>>>> YES! We take Cisco Learning Credits!
>>> > >>>>>>> Training & Remote Racks available
>>> > >>>>>>>
>>> > >>>>>>
>>> > >>>>>
>>> > >>>>> Blogs and organic groups at http://www.ccie.net
>>> > >>>>>
>>> > >>>>> ______________________________**______________________________**
>>> > >>>>> ___________
>>> > >>>>> Subscription information may be found at:
>>> > http://www.groupstudy.com/**
>>> > >>>>> list/CCIELab.html <http://www.groupstudy.com/list/CCIELab.html>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>
>>> > >>>>
>>> > >>>> --
>>> > >>>> *Narbik Kocharians
>>> > >>>> *
>>> > >>>> CCSI#30832, CCIE# 12410 (R&S, SP, Security)
>>> > >>>> *www.MicronicsTraining.com* <http://www.micronicstraining.com/>
>>> > >>>> Sr. Technical Instructor
>>> > >>>> YES! We take Cisco Learning Credits!
>>> > >>>> Training & Remote Racks available
>>> > >>>>
>>> > >>>>
>>> > >>>
>>> > >>>
>>> > >>> --
>>> > >>> *Narbik Kocharians
>>> > >>> *CCSI#30832, CCIE# 12410 (R&S, SP, Security)
>>> > >>> *www.MicronicsTraining.com* <http://www.micronicstraining.com/>
>>> > >>> Sr. Technical Instructor
>>> > >>> YES! We take Cisco Learning Credits!
>>> > >>> Training & Remote Racks available
>>> > >>>
>>> > >>>
>>> > >>> Blogs and organic groups at http://www.ccie.net
>>> > >>>
>>> > >>>
>>> _______________________________________________________________________
>>> > >>> Subscription information may be found at:
>>> > >>> http://www.groupstudy.com/list/CCIELab.html
>>> > >>
>>> > >>
>>> > >> Blogs and organic groups at http://www.ccie.net
>>> > >>
>>> > >>
>>> _______________________________________________________________________
>>> > >> Subscription information may be found at:
>>> > >> http://www.groupstudy.com/list/CCIELab.html
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >
>>> > >
>>> > > --
>>> > > With Warmest Regards,
>>> > >
>>> > > CCIE KID
>>> > > CCIE#29992 (Security)
>>> > >
>>> > >
>>> > > Blogs and organic groups at http://www.ccie.net
>>> > >
>>> > >
>>> _______________________________________________________________________
>>> > > Subscription information may be found at:
>>> > > http://www.groupstudy.com/list/CCIELab.html
>>> >
>>> >
>>> > Blogs and organic groups at http://www.ccie.net
>>> >
>>> > _______________________________________________________________________
>>> > Subscription information may be found at:
>>> > http://www.groupstudy.com/list/CCIELab.html
>>>
>>>
>>> Blogs and organic groups at http://www.ccie.net
>>>
>>> _______________________________________________________________________
>>> Subscription information may be found at:
>>> http://www.groupstudy.com/list/CCIELab.html
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>
>>
>> --
>> --
>> Olugbenga Oyebande
>> MD, DAIT
>> 234-803-302-5287
>> http://www.dait-ng.com
>> Cisco Unified Network, VPN
>> DAIT Enterprise Network Servers
>> Broadband Internet Deployment & ISP Consultancy
>>
>>
>
--
--
Olugbenga Oyebande
MD, DAIT
234-803-302-5287
http://www.dait-ng.com
Cisco Unified Network, VPN
DAIT Enterprise Network Servers
Broadband Internet Deployment & ISP Consultancy
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com
Are you a CCNP or CCIE and looking for a job? Check out
www.PlatinumPlacement.com
http://onlinestudylist.com/mailman/listinfo/ccie_rs