Sorry, all....I attached the IPExpert Solution not the Netmaster class..

Here is the link to the solution:

http://www.netmasterclass.net/site/articles/RS-NMC-1%20Extra%20Credit.%20Catalyst%203550%20VLAN%20configuration.pdf

Thank you.

 

 

>From: "Munit Singla" >Reply-To: "Munit Singla" >To: [EMAIL PROTECTED]
>Subject: Re: newbie on 3550 - some questions? [7:59633] >Date: Fri, 20
Dec 2002 19:00:47 GMT > >Can You please update about this lab.Can I also
test here...Please update >the new >joiness of this group regarding this.
>Regards, >Munit > >Cisco Nuts wrote: > > > Hello,I've finally started
studying the 3550's in my prep. for the Lab > > and I am very grateful to
Bruce and Val for putting out a 3550 FREE lab > > to help us out ( NOT to
forget IPExpert and NLI's)..... :-)Had a couple > > of questions on this
Lab solution (if anyone has done it): 1. Vlan's 20 > > and 10 are part of
int f0/2 and int f0/3 respectively but only int f0/3 > > has the
switchport mode access on Switch 1. This is not the case on > > Switch
2.Question: Why? And when would I absolutely use the #switchport > > mode
access cmd. on an intf? 2. Why is Switch 1's ip address configured > >
for Vlan 20 and Switch 2's for Vlan 10? Why not the other way around? > >
Could we possible use Vlan 30 or 40 for that matter? 3. Both the Switches
> > are set to transparent? And both Vlans are created on both > >
switches? Can VTP be created on one Switch and set to server mode? 4. On
> > router R1, the #bridge irb cmd. is configured under Fe0/0 but not
under > > Fe0/1? Should this cmd. also be configed under Fe0/1? Thank you
for your > > help. I would appreciate any explanation as I continue to
print 100's of > > pages from the CMD. and CONFIG guide and plough my way
through it. Very > > soon, I hope to lay my hands on a 3550 but right
now....lot's of writing, > > reading and diagrams!! :-) If there is
anyone that will let me have a > > couple of hours on a 3550, please let
me know. I am willing to kind of > > "trade" for a lot of router time on
my rack of 10 routers at home. > > Sincerely,CN BTW: > > I have attached
the solution along with this email for you to take a look > > at. > > ! >
> version 12.1 > > no service pad > > service timestamps debug uptime > >
service timestamps log uptime > > no service password-encryption > > ! >
> hostname Switch > > ! > > aaa new-model > > aaa authentication dot1x
default group radius local > > ! > > ip subnet-zero > > ip routing > > !
> > ! > > ! > > spanning-tree extend system-id > > spanning-tree vlan 70
priority 24576 > > ! > > ! > > ! > > interface FastEthernet0/1 > >
switchport access vlan 999 > > switchport mode access > > no ip address >
> dot1x port-control force-unauthorized > > spanning-tree guard root > >
! > > interface FastEthernet0/2 > > switchport access vlan 999 > >
switchport mode access > > no ip address > > dot1x port-control
force-unauthorized > > spanning-tree guard root > > ! > > interface
FastEthernet0/3 > > switchport access vlan 999 > > switchport mode access
> > no ip address > > dot1x port-control force-unauthorized > >
spanning-tree guard root > > ! > > interface FastEthernet0/4 > >
switchport access vlan 999 > > switchport mode access > > no ip address >
> dot1x port-control force-unauthorized > > spanning-tree guard root > >
! > > interface FastEthernet0/5 > > switchport access vlan 56 > >
switchport mode access > > switchport port-security > > switchport
port-security mac-address sticky > > no ip address > > spanning-tree
portfast > > spanning-tree guard root > > ! > > interface FastEthernet0/6
> > switchport access vlan 56 > > switchport mode access > > no ip
address > > spanning-tree portfast > > spanning-tree guard root > > ! > >
interface FastEthernet0/7 > > no switchport > > ip address 140.40.70.35
255.255.255.0 > > ! > > interface FastEthernet0/8 > > switchport access
vlan 999 > > switchport mode access > > no ip address > > dot1x
port-control force-unauthorized > > spanning-tree guard root > > ! > >
interface FastEthernet0/9 > > switchport access vlan 999 > > switchport
mode access > > no ip address > > dot1x port-control force-unauthorized >
> spanning-tree guard root > > ! > > interface FastEthernet0/10 > >
switchport access vlan 999 > > switchport mode access > > switchport
block multicast > > no ip address > > storm-control broadcast level 78.00
> > storm-control multicast level 78.00 > > dot1x port-control
force-unauthorized > > spanning-tree guard root > > ! > > interface
FastEthernet0/11 > > switchport access vlan 999 > > switchport mode
access > > switchport block multicast > > no ip address > > storm-control
broadcast level 78.00 > > storm-control multicast level 78.00 > > dot1x
port-control force-unauthorized > > spanning-tree guard root > > ! > >
interface FastEthernet0/12 > > switchport access vlan 999 > > switchport
mode access > > switchport block multicast > > no ip address > >
storm-control broadcast level 78.00 > > storm-control multicast level
78.00 > > dot1x port-control force-unauthorized > > spanning-tree guard
root > > ! > > interface FastEthernet0/13 > > switchport access vlan 999
> > switchport mode access > > switchport block multicast > > no ip
address > > storm-control broadcast level 78.00 > > storm-control
multicast level 78.00 > > dot1x port-control force-unauthorized > >
spanning-tree guard root > > ! > > interface FastEthernet0/14 > >
switchport access vlan 999 > > switchport mode access > > switchport
block multicast > > no ip address > > storm-control broadcast level 78.00
> > storm-control multicast level 78.00 > > dot1x port-control
force-unauthorized > > spanning-tree guard root > > ! > > interface
FastEthernet0/15 > > switchport access vlan 999 > > switchport mode
access > > switchport voice vlan 100 > > no ip address > > spanning-tree
portfast > > spanning-tree guard root > > ! > > interface
FastEthernet0/16 > > switchport access vlan 999 > > switchport mode
access > > no ip address > > dot1x port-control force-unauthorized > >
spanning-tree guard root > > ! > > interface FastEthernet0/17 > >
switchport trunk encapsulation dot1q > > switchport trunk allowed vlan
1,56,70,100,1002-1005 > > switchport mode trunk > > no ip address > >
spanning-tree guard root > > ! > > interface FastEthernet0/18 > >
switchport access vlan 999 > > switchport mode access > > no ip address >
> dot1x port-control force-unauthorized > > spanning-tree guard root > >
! > > interface FastEthernet0/19 > > switchport access vlan 999 > >
switchport mode access > > no ip address > > dot1x port-control
force-unauthorized > > spanning-tree guard root > > ! > > interface
FastEthernet0/20 > > switchport access vlan 999 > > switchport mode
access > > no ip address > > dot1x port-control force-unauthorized > >
spanning-tree guard root > > ! > > interface FastEthernet0/21 > >
switchport access vlan 999 > > switchport mode access > > no ip address >
> dot1x port-control force-unauthorized > > spanning-tree guard root > >
! > > interface FastEthernet0/22 > > switchport access vlan 999 > >
switchport mode access > > no ip address > > dot1x port-control
force-unauthorized > > spanning-tree guard root > > ! > > interface
FastEthernet0/23 > > switchport access vlan 999 > > switchport mode
access > > no ip address > > dot1x port-control force-unauthorized > >
spanning-tree guard root > > ! > > interface FastEthernet0/24 > >
switchport access vlan 999 > > switchport mode access > > no ip address >
> dot1x port-control force-unauthorized > > spanning-tree guard root > >
! > > interface GigabitEthernet0/1 > > no ip address > > ! > > interface
GigabitEthernet0/2 > > no ip address > > ! > > interface Vlan1 > > ip
address 140.40.100.35 255.255.255.0 > > ! > > interface Vlan56 > > ip
address 140.40.56.35 255.255.255.0 > > bridge-group 56 > > ! > > router
ospf 1 > > log-adjacency-changes > > network 140.40.0.0 0.0.255.255 area
0 > > ! > > ip classless > > ip http server > > ! > > ! > > ! > >
radius-server host 140.40.56.100 auth-port 1812 acct-port 1813 key c!5c0
> > radius-server retransmit 3 > > bridge 56 protocol vlan-bridge > > ! >
> line con 0 > > line vty 5 15 > > ! > > ! > > monitor session 1 source
interface Fa0/1 > > monitor session 1 destination interface Fa0/2 > > end
> > > > Switch#s vtp stat > > VTP Version : 2 > > Configuration Revision
: 2 > > Maximum VLANs supported locally : 1005 > > Number of existing
VLANs : 9 > > VTP Operating Mode : Server > > VTP Domain Name : IPExpert
> > VTP Pruning Mode : Enabled > > VTP V2 Mode : Disabled > > VTP Traps
Generation : Disabled > > MD5 digest : 0x7F 0xD8 0x84 0x62 0xA6 0x1F 0xF1
0xE8 > > > > Switch#s ip ro > > Codes: C - connected, S - static, I -
IGRP, R - RIP, M - mobile, B - BGP > > D - EIGRP, EX - EIGRP external, O
- OSPF, IA - OSPF inter area > > N1 - OSPF NSSA external type 1, N2 -
OSPF NSSA external type 2 > > E1 - OSPF external type 1, E2 - OSPF
external type 2, E - EGP > > i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS
level-2, ia - IS-IS inter > > area > > * - candidate default, U -
per-user static route, o - ODR > > P - periodic downloaded static route >
> > > Gateway of last resort is not set > > > > 140.40.0.0/24 is
subnetted, 3 subnets > > C 140.40.56.0 is directly connected, Vlan56 > >
C 140.40.100.0 is directly connected, Vlan1 > > C 140.40.70.0 is directly
connected, FastEthernet0/7 > > 20.0.0.0/32 is subnetted, 3 subnets > > O
20.20.20.5 [110/2] via 140.40.56.5, 00:01:18, Vlan56 > > O 20.20.20.6
[110/2] via 140.40.56.6, 00:01:18, Vlan56 > > O 20.20.20.7 [110/11] via
140.40.70.7, 00:01:18, FastEthernet0/7 > > > > Switch#ping 20.20.20.5 > >
> > Type escape sequence to abort. > > Sending 5, 100-byte ICMP Echos to
20.20.20.5, timeout is 2 seconds: > > !!!!! > > Success rate is 100
percent (5/5), round-trip min/avg/max = 1/2/4 ms > > Switch#ping
20.20.20.6 > > > > Type escape sequence to abort. > > Sending 5, 100-byte
ICMP Echos to 20.20.20.6, timeout is 2 seconds: > > !!!!! > > Success
rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms > >
Switch#ping 20.20.20.7 > > > > Type escape sequence to abort. > > Sending
5, 100-byte ICMP Echos to 20.20.20.7, timeout is 2 seconds: > > !!!!! > >
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms > >
Switch#ping 140.40.56.6 > > > > Type escape sequence to abort. > >
Sending 5, 100-byte ICMP Echos to 140.40.56.6, timeout is 2 seconds: > >
!!!!! > > Success rate is 100 percent (5/5), round-trip min/avg/max =
1/3/4 ms > > Switch#ping 140.40.56.5 > > > > Type escape sequence to
abort. > > Sending 5, 100-byte ICMP Echos to 140.40.56.5, timeout is 2
seconds: > > !!!!! > > Success rate is 100 percent (5/5), round-trip
min/avg/max = 1/3/4 ms > > Switch#ping 140.40.70.7 > > > > Type escape
sequence to abort. > > Sending 5, 100-byte ICMP Echos to 140.40.70.7,
timeout is 2 seconds: > > !!!!! > > Success rate is 100 percent (5/5),
misconduct and Nondisclosure violations to [EMAIL PROTECTED]

------------------------------------------------------------------------

The new MSN 8: smart spam protection and 3 months FREE*.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=59665&t=59633
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to