Can You please update about this lab.Can I also test here...Please update the new joiness of this group regarding this. Regards, Munit
Cisco Nuts wrote: > Hello,I've finally started studying the 3550's in my prep. for the Lab > and I am very grateful to Bruce and Val for putting out a 3550 FREE lab > to help us out ( NOT to forget IPExpert and NLI's)..... :-)Had a couple > of questions on this Lab solution (if anyone has done it): 1. Vlan's 20 > and 10 are part of int f0/2 and int f0/3 respectively but only int f0/3 > has the switchport mode access on Switch 1. This is not the case on > Switch 2.Question: Why? And when would I absolutely use the #switchport > mode access cmd. on an intf? 2. Why is Switch 1's ip address configured > for Vlan 20 and Switch 2's for Vlan 10? Why not the other way around? > Could we possible use Vlan 30 or 40 for that matter? 3. Both the Switches > are set to transparent? And both Vlans are created on both > switches? Can VTP be created on one Switch and set to server mode? 4. On > router R1, the #bridge irb cmd. is configured under Fe0/0 but not under > Fe0/1? Should this cmd. also be configed under Fe0/1? Thank you for your > help. I would appreciate any explanation as I continue to print 100's of > pages from the CMD. and CONFIG guide and plough my way through it. Very > soon, I hope to lay my hands on a 3550 but right now....lot's of writing, > reading and diagrams!! :-) If there is anyone that will let me have a > couple of hours on a 3550, please let me know. I am willing to kind of > "trade" for a lot of router time on my rack of 10 routers at home. > Sincerely,CN BTW: > I have attached the solution along with this email for you to take a look > at. > ! > version 12.1 > no service pad > service timestamps debug uptime > service timestamps log uptime > no service password-encryption > ! > hostname Switch > ! > aaa new-model > aaa authentication dot1x default group radius local > ! > ip subnet-zero > ip routing > ! > ! > ! > spanning-tree extend system-id > spanning-tree vlan 70 priority 24576 > ! > ! > ! > interface FastEthernet0/1 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/2 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/3 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/4 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/5 > switchport access vlan 56 > switchport mode access > switchport port-security > switchport port-security mac-address sticky > no ip address > spanning-tree portfast > spanning-tree guard root > ! > interface FastEthernet0/6 > switchport access vlan 56 > switchport mode access > no ip address > spanning-tree portfast > spanning-tree guard root > ! > interface FastEthernet0/7 > no switchport > ip address 140.40.70.35 255.255.255.0 > ! > interface FastEthernet0/8 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/9 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/10 > switchport access vlan 999 > switchport mode access > switchport block multicast > no ip address > storm-control broadcast level 78.00 > storm-control multicast level 78.00 > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/11 > switchport access vlan 999 > switchport mode access > switchport block multicast > no ip address > storm-control broadcast level 78.00 > storm-control multicast level 78.00 > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/12 > switchport access vlan 999 > switchport mode access > switchport block multicast > no ip address > storm-control broadcast level 78.00 > storm-control multicast level 78.00 > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/13 > switchport access vlan 999 > switchport mode access > switchport block multicast > no ip address > storm-control broadcast level 78.00 > storm-control multicast level 78.00 > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/14 > switchport access vlan 999 > switchport mode access > switchport block multicast > no ip address > storm-control broadcast level 78.00 > storm-control multicast level 78.00 > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/15 > switchport access vlan 999 > switchport mode access > switchport voice vlan 100 > no ip address > spanning-tree portfast > spanning-tree guard root > ! > interface FastEthernet0/16 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/17 > switchport trunk encapsulation dot1q > switchport trunk allowed vlan 1,56,70,100,1002-1005 > switchport mode trunk > no ip address > spanning-tree guard root > ! > interface FastEthernet0/18 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/19 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/20 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/21 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/22 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/23 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface FastEthernet0/24 > switchport access vlan 999 > switchport mode access > no ip address > dot1x port-control force-unauthorized > spanning-tree guard root > ! > interface GigabitEthernet0/1 > no ip address > ! > interface GigabitEthernet0/2 > no ip address > ! > interface Vlan1 > ip address 140.40.100.35 255.255.255.0 > ! > interface Vlan56 > ip address 140.40.56.35 255.255.255.0 > bridge-group 56 > ! > router ospf 1 > log-adjacency-changes > network 140.40.0.0 0.0.255.255 area 0 > ! > ip classless > ip http server > ! > ! > ! > radius-server host 140.40.56.100 auth-port 1812 acct-port 1813 key c!5c0 > radius-server retransmit 3 > bridge 56 protocol vlan-bridge > ! > line con 0 > line vty 5 15 > ! > ! > monitor session 1 source interface Fa0/1 > monitor session 1 destination interface Fa0/2 > end > > Switch#s vtp stat > VTP Version : 2 > Configuration Revision : 2 > Maximum VLANs supported locally : 1005 > Number of existing VLANs : 9 > VTP Operating Mode : Server > VTP Domain Name : IPExpert > VTP Pruning Mode : Enabled > VTP V2 Mode : Disabled > VTP Traps Generation : Disabled > MD5 digest : 0x7F 0xD8 0x84 0x62 0xA6 0x1F 0xF1 0xE8 > > Switch#s ip ro > Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP > D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area > N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 > E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP > i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter > area > * - candidate default, U - per-user static route, o - ODR > P - periodic downloaded static route > > Gateway of last resort is not set > > 140.40.0.0/24 is subnetted, 3 subnets > C 140.40.56.0 is directly connected, Vlan56 > C 140.40.100.0 is directly connected, Vlan1 > C 140.40.70.0 is directly connected, FastEthernet0/7 > 20.0.0.0/32 is subnetted, 3 subnets > O 20.20.20.5 [110/2] via 140.40.56.5, 00:01:18, Vlan56 > O 20.20.20.6 [110/2] via 140.40.56.6, 00:01:18, Vlan56 > O 20.20.20.7 [110/11] via 140.40.70.7, 00:01:18, FastEthernet0/7 > > Switch#ping 20.20.20.5 > > Type escape sequence to abort. > Sending 5, 100-byte ICMP Echos to 20.20.20.5, timeout is 2 seconds: > !!!!! > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms > Switch#ping 20.20.20.6 > > Type escape sequence to abort. > Sending 5, 100-byte ICMP Echos to 20.20.20.6, timeout is 2 seconds: > !!!!! > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms > Switch#ping 20.20.20.7 > > Type escape sequence to abort. > Sending 5, 100-byte ICMP Echos to 20.20.20.7, timeout is 2 seconds: > !!!!! > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms > Switch#ping 140.40.56.6 > > Type escape sequence to abort. > Sending 5, 100-byte ICMP Echos to 140.40.56.6, timeout is 2 seconds: > !!!!! > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms > Switch#ping 140.40.56.5 > > Type escape sequence to abort. > Sending 5, 100-byte ICMP Echos to 140.40.56.5, timeout is 2 seconds: > !!!!! > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms > Switch#ping 140.40.70.7 > > Type escape sequence to abort. > Sending 5, 100-byte ICMP Echos to 140.40.70.7, timeout is 2 seconds: > !!!!! > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=59642&t=59633 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]