Can You please update about this lab.Can I also test  here...Please update
the new
joiness of this group regarding this.
Regards,
Munit

Cisco Nuts wrote:

> Hello,I've finally started studying the 3550's in my prep. for the Lab
> and I am very grateful to Bruce and Val for putting out a 3550 FREE lab
> to help us out ( NOT to forget IPExpert and NLI's).....  :-)Had a couple
> of questions on this Lab solution (if anyone has done it): 1. Vlan's 20
> and 10 are part of int f0/2 and int f0/3 respectively but only int f0/3
> has the switchport mode access on Switch 1. This is not the case on
> Switch 2.Question: Why? And when would I absolutely use the #switchport
> mode access cmd. on an intf? 2. Why is Switch 1's  ip address configured
> for Vlan 20 and Switch 2's for Vlan 10? Why not the other way around?
> Could we possible use Vlan 30 or 40 for that matter? 3. Both the Switches
> are set to transparent? And both Vlans are created on both
> switches?  Can VTP be created on one Switch and set to server mode? 4. On
> router R1, the #bridge irb cmd. is configured under Fe0/0 but not under
> Fe0/1? Should this cmd. also be configed under Fe0/1? Thank you for your
> help. I would appreciate any explanation as I continue to print 100's of
> pages from the CMD. and CONFIG guide and plough my way through it. Very
> soon, I hope to lay my hands on a 3550 but right now....lot's of writing,
> reading  and diagrams!!  :-) If there is anyone that will let me have a
> couple of hours on a 3550, please let me know. I am willing to kind of
> "trade" for a lot of router time on my rack of 10 routers  at home.
> Sincerely,CN BTW:
> I have attached the solution along with this email for you to take a look
> at.
> !
> version 12.1
> no service pad
> service timestamps debug uptime
> service timestamps log uptime
> no service password-encryption
> !
> hostname Switch
> !
> aaa new-model
> aaa authentication dot1x default group radius local
> !
> ip subnet-zero
> ip routing
> !
> !
> !
> spanning-tree extend system-id
> spanning-tree vlan 70 priority 24576
> !
> !
> !
> interface FastEthernet0/1
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/2
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/3
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/4
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/5
> switchport access vlan 56
> switchport mode access
> switchport port-security
> switchport port-security mac-address sticky
> no ip address
> spanning-tree portfast
> spanning-tree guard root
> !
> interface FastEthernet0/6
> switchport access vlan 56
> switchport mode access
> no ip address
> spanning-tree portfast
> spanning-tree guard root
> !
> interface FastEthernet0/7
> no switchport
> ip address 140.40.70.35 255.255.255.0
> !
> interface FastEthernet0/8
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/9
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/10
> switchport access vlan 999
> switchport mode access
> switchport block multicast
> no ip address
> storm-control broadcast level 78.00
> storm-control multicast level 78.00
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/11
> switchport access vlan 999
> switchport mode access
> switchport block multicast
> no ip address
> storm-control broadcast level 78.00
> storm-control multicast level 78.00
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/12
> switchport access vlan 999
> switchport mode access
> switchport block multicast
> no ip address
> storm-control broadcast level 78.00
> storm-control multicast level 78.00
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/13
> switchport access vlan 999
> switchport mode access
> switchport block multicast
> no ip address
> storm-control broadcast level 78.00
> storm-control multicast level 78.00
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/14
> switchport access vlan 999
> switchport mode access
> switchport block multicast
> no ip address
> storm-control broadcast level 78.00
> storm-control multicast level 78.00
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/15
> switchport access vlan 999
> switchport mode access
> switchport voice vlan 100
> no ip address
> spanning-tree portfast
> spanning-tree guard root
> !
> interface FastEthernet0/16
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/17
> switchport trunk encapsulation dot1q
> switchport trunk allowed vlan 1,56,70,100,1002-1005
> switchport mode trunk
> no ip address
> spanning-tree guard root
> !
> interface FastEthernet0/18
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/19
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/20
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/21
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/22
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/23
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface FastEthernet0/24
> switchport access vlan 999
> switchport mode access
> no ip address
> dot1x port-control force-unauthorized
> spanning-tree guard root
> !
> interface GigabitEthernet0/1
> no ip address
> !
> interface GigabitEthernet0/2
> no ip address
> !
> interface Vlan1
> ip address 140.40.100.35 255.255.255.0
> !
> interface Vlan56
> ip address 140.40.56.35 255.255.255.0
> bridge-group 56
> !
> router ospf 1
> log-adjacency-changes
> network 140.40.0.0 0.0.255.255 area 0
> !
> ip classless
> ip http server
> !
> !
> !
> radius-server host 140.40.56.100 auth-port 1812 acct-port 1813 key c!5c0
> radius-server retransmit 3
> bridge 56 protocol vlan-bridge
> !
> line con 0
> line vty 5 15
> !
> !
> monitor session 1 source interface Fa0/1
> monitor session 1 destination interface Fa0/2
> end
>
> Switch#s vtp stat
> VTP Version                     : 2
> Configuration Revision          : 2
> Maximum VLANs supported locally : 1005
> Number of existing VLANs        : 9
> VTP Operating Mode              : Server
> VTP Domain Name                 : IPExpert
> VTP Pruning Mode                : Enabled
> VTP V2 Mode                     : Disabled
> VTP Traps Generation            : Disabled
> MD5 digest                      : 0x7F 0xD8 0x84 0x62 0xA6 0x1F 0xF1 0xE8
>
> Switch#s ip ro
> Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
>        D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
>        N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
>        E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
>        i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter
> area
>        * - candidate default, U - per-user static route, o - ODR
>        P - periodic downloaded static route
>
> Gateway of last resort is not set
>
>      140.40.0.0/24 is subnetted, 3 subnets
> C       140.40.56.0 is directly connected, Vlan56
> C       140.40.100.0 is directly connected, Vlan1
> C       140.40.70.0 is directly connected, FastEthernet0/7
>      20.0.0.0/32 is subnetted, 3 subnets
> O       20.20.20.5 [110/2] via 140.40.56.5, 00:01:18, Vlan56
> O       20.20.20.6 [110/2] via 140.40.56.6, 00:01:18, Vlan56
> O       20.20.20.7 [110/11] via 140.40.70.7, 00:01:18, FastEthernet0/7
>
> Switch#ping 20.20.20.5
>
> Type escape sequence to abort.
> Sending 5, 100-byte ICMP Echos to 20.20.20.5, timeout is 2 seconds:
> !!!!!
> Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
> Switch#ping 20.20.20.6
>
> Type escape sequence to abort.
> Sending 5, 100-byte ICMP Echos to 20.20.20.6, timeout is 2 seconds:
> !!!!!
> Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
> Switch#ping 20.20.20.7
>
> Type escape sequence to abort.
> Sending 5, 100-byte ICMP Echos to 20.20.20.7, timeout is 2 seconds:
> !!!!!
> Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
> Switch#ping 140.40.56.6
>
> Type escape sequence to abort.
> Sending 5, 100-byte ICMP Echos to 140.40.56.6, timeout is 2 seconds:
> !!!!!
> Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms
> Switch#ping 140.40.56.5
>
> Type escape sequence to abort.
> Sending 5, 100-byte ICMP Echos to 140.40.56.5, timeout is 2 seconds:
> !!!!!
> Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms
> Switch#ping 140.40.70.7
>
> Type escape sequence to abort.
> Sending 5, 100-byte ICMP Echos to 140.40.70.7, timeout is 2 seconds:
> !!!!!
> Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=59642&t=59633
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to