Put the highest level at the top and the lowest level at the bottom.
Drag the choices on the left to the boxes on the right that should be included when creating a VLAN-based impl
You have been tasked with planning a VLAN solution that will connect a server in one building to serveral host
You are required to accomplish the following tasks:
SIMULATION
LAB
Refer to the Exhibit.
The information of the question
You will configure FastEthernet ports 0/12 through 0/24 for users who belong to VLAN 20.
Also, all VLAN and VTP configurations are to be completed in global configuration mode as
VLAN database mode is being deprecated by Cisco. You are required to accomplish the
following tasks:
1. Ensure the switch does not participate in VTP but forwards VTP advertisements received
on trunk ports.
2. Ensure all non-trunking interfaces (Fa0/1 to Fa0/24) transition immediately to the
forwarding state of Spanning-Tree.
3. Ensure all FastEthernet interfaces are in a permanent non-trunking mode.
4. Place FastEthernet interfaces 0/12 through 0/24 in VLAN 20
You must accomplish the following tasks?
Which port state is interface Fa0/2 of switch SW-B in for VLANs 1 and 175?
Which Spanning Tree Protocol has been implemented on switch SW-B?
Which port role has Interface Fa0/2 of switch SW-A adopted for VLAN 44?
which is the recommended method of providing interVLAN routing?
You have been tasked with implementing the above access control as a pre-condition to installing the servers.
SIMULATION
AAAdot1x Lab
Acme is a small shipping company that has an existing enterprise network comprised of 2
switches;DSW1 and
ASW2. The topology diagram indicates their layer 2 mapping. VLAN 40 is a new VLAN that
will be used to provide the shipping personnel access to the server. For security reasons, it
is necessary to restrict access to
VLAN 20 in the following manner:
– Users connecting to ASW1’s port must be authenticate before they are given access to the network.
-Authentication is to be done via a Radius server:
– Radius server host: 172.120.39.46
– Radius key: rad123
– Authentication should be implemented as close to the host device possible.
– Devices on VLAN 20 are restricted to in the address range of 172.120.40.0/24.
– Packets from devices in the address range of 172.120.40.0/24 should be passed on VLAN 20.
– Packets from devices in any other address range should be dropped on VLAN 20.
– Filtering should be implemented as close to the server farm as possible.
The Radius server and application servers will be installed at a future date. You have been
tasked with implementing the above access control as a pre-condition to installing the
servers. You must use the available
IOS switch features.