Hello,I've finally started studying the 3550's in my prep. for the Lab
and I am very grateful to Bruce and Val for putting out a 3550 FREE lab
to help us out ( NOT to forget IPExpert and NLI's).....  :-)Had a couple
of questions on this Lab solution (if anyone has done it): 1. Vlan's 20
and 10 are part of int f0/2 and int f0/3 respectively but only int f0/3
has the switchport mode access on Switch 1. This is not the case on
Switch 2.Question: Why? And when would I absolutely use the #switchport
mode access cmd. on an intf? 2. Why is Switch 1's  ip address configured
for Vlan 20 and Switch 2's for Vlan 10? Why not the other way around?
Could we possible use Vlan 30 or 40 for that matter? 3. Both the Switches
are set to transparent? And both Vlans are created on both
switches?  Can VTP be created on one Switch and set to server mode? 4. On
router R1, the #bridge irb cmd. is configured under Fe0/0 but not under
Fe0/1? Should this cmd. also be configed under Fe0/1? Thank you for your
help. I would appreciate any explanation as I continue to print 100's of
pages from the CMD. and CONFIG guide and plough my way through it. Very
soon, I hope to lay my hands on a 3550 but right now....lot's of writing,
reading  and diagrams!!  :-) If there is anyone that will let me have a
couple of hours on a 3550, please let me know. I am willing to kind of
"trade" for a lot of router time on my rack of 10 routers  at home.
Sincerely,CN BTW:
I have attached the solution along with this email for you to take a look
at.
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch
!
aaa new-model
aaa authentication dot1x default group radius local
!
ip subnet-zero
ip routing
!
!
!
spanning-tree extend system-id
spanning-tree vlan 70 priority 24576
!
!
!
interface FastEthernet0/1
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/2
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/3
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/4
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/5
switchport access vlan 56
switchport mode access
switchport port-security
switchport port-security mac-address sticky
no ip address
spanning-tree portfast
spanning-tree guard root
!
interface FastEthernet0/6
switchport access vlan 56
switchport mode access
no ip address
spanning-tree portfast
spanning-tree guard root
!
interface FastEthernet0/7
no switchport
ip address 140.40.70.35 255.255.255.0
!
interface FastEthernet0/8
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/9
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/10
switchport access vlan 999
switchport mode access
switchport block multicast
no ip address
storm-control broadcast level 78.00
storm-control multicast level 78.00
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/11
switchport access vlan 999
switchport mode access
switchport block multicast
no ip address
storm-control broadcast level 78.00
storm-control multicast level 78.00
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/12
switchport access vlan 999
switchport mode access
switchport block multicast
no ip address
storm-control broadcast level 78.00
storm-control multicast level 78.00
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/13
switchport access vlan 999
switchport mode access
switchport block multicast
no ip address
storm-control broadcast level 78.00
storm-control multicast level 78.00
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/14
switchport access vlan 999
switchport mode access
switchport block multicast
no ip address
storm-control broadcast level 78.00
storm-control multicast level 78.00
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/15
switchport access vlan 999
switchport mode access
switchport voice vlan 100
no ip address
spanning-tree portfast
spanning-tree guard root
!
interface FastEthernet0/16
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/17
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,56,70,100,1002-1005
switchport mode trunk
no ip address
spanning-tree guard root
!
interface FastEthernet0/18
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/19
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/20
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/21
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/22
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/23
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface FastEthernet0/24
switchport access vlan 999
switchport mode access
no ip address
dot1x port-control force-unauthorized
spanning-tree guard root
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/2
no ip address
!
interface Vlan1
ip address 140.40.100.35 255.255.255.0
!
interface Vlan56
ip address 140.40.56.35 255.255.255.0
bridge-group 56
!
router ospf 1
log-adjacency-changes
network 140.40.0.0 0.0.255.255 area 0
!
ip classless
ip http server
!
!
!
radius-server host 140.40.56.100 auth-port 1812 acct-port 1813 key c!5c0
radius-server retransmit 3
bridge 56 protocol vlan-bridge
!
line con 0
line vty 5 15
!
!
monitor session 1 source interface Fa0/1
monitor session 1 destination interface Fa0/2
end

Switch#s vtp stat
VTP Version                     : 2
Configuration Revision          : 2
Maximum VLANs supported locally : 1005
Number of existing VLANs        : 9
VTP Operating Mode              : Server
VTP Domain Name                 : IPExpert
VTP Pruning Mode                : Enabled
VTP V2 Mode                     : Disabled
VTP Traps Generation            : Disabled
MD5 digest                      : 0x7F 0xD8 0x84 0x62 0xA6 0x1F 0xF1 0xE8


Switch#s ip ro
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
       i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter
area
       * - candidate default, U - per-user static route, o - ODR
       P - periodic downloaded static route

Gateway of last resort is not set

     140.40.0.0/24 is subnetted, 3 subnets
C       140.40.56.0 is directly connected, Vlan56
C       140.40.100.0 is directly connected, Vlan1
C       140.40.70.0 is directly connected, FastEthernet0/7
     20.0.0.0/32 is subnetted, 3 subnets
O       20.20.20.5 [110/2] via 140.40.56.5, 00:01:18, Vlan56
O       20.20.20.6 [110/2] via 140.40.56.6, 00:01:18, Vlan56
O       20.20.20.7 [110/11] via 140.40.70.7, 00:01:18, FastEthernet0/7


Switch#ping 20.20.20.5

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 20.20.20.5, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Switch#ping 20.20.20.6

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 20.20.20.6, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Switch#ping 20.20.20.7

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 20.20.20.7, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Switch#ping 140.40.56.6

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 140.40.56.6, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms
Switch#ping 140.40.56.5

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 140.40.56.5, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms
Switch#ping 140.40.70.7

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 140.40.70.7, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=59633&t=59633
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to