Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.

Slides:



Advertisements
Similar presentations
Virtual Trunk Protocol
Advertisements

LAN Segmentation Virtual LAN (VLAN).
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Virtual LANs.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Ch. 9 – VLANs (Virtual LANs)
VLANs (Virtual LANs) CS 158B Elaine Lim Allison Nham.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Course 301 – Secured Network Deployment and IPSec VPN
VLANs- Chapter 3 CCNA Exploration Semester 3 Modified by Profs. Ward
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Configuring VLANs.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Ch. 8 – VLANs (Virtual LANs)
VLANs.ppt CCNA Exploration Semester 3 Chapter 3
VLANs (Virtual LANs) CIS 83 Fall 2006 CCNA 3 Rick Graziani Cabrillo College.
Voice VLANs Lecture 7 VLANs.ppt 21/04/ Apr-17
Starting the switch Configuring the Switch
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VLANs.
VLAN Trunking Protocol (VTP)
CN2668 Routers and Switches (V2) Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Building Cisco Multilayer Switched Networks (BCMSN)
Chapter 3 test.  VLANS group hosts _____________________ logically or physically?  Logically—regardless of physical location  Devices in one VLAN do.
Ch. 6 – Switch Configuration
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
Chapter 8: Virtual LAN (VLAN)
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Author: Bill Buchanan. 1. Broadcast: What is the MAC address of this network address? 2. Requested host: All the hosts read the broadcast and checks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless VLANs Chapter 3 Modified by Pete Brierley.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs.
Switching Basics and Intermediate Routing CCNA 3 Chapter 8.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
W&L Page 1 CCNA CCNA Training 2.7 Configure and verify trunking on Cisco switches Jose Luis Flores / Amel Walkinshaw Aug, 2015.
Switching Topic 2 VLANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Virtual Local Area Networks (VLANs) Part II
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 VLAN Trunking Protocol Cisco Networking Academy.
Configuring VLAN Chapter 14 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Understand basic concept of VLAN  Configure.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
VLAN Trunking Protocol
Cisco 3 - Switch Perrine. J Page 12/4/2016 Chapter 9 Which protocol is Cisco proprietary and designed to carry traffic from multiple VLANs? A Q.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
VTP VLAN Trunking Protocol Create once and send to the other switches. VTP is a messaging protocol that uses Layer 2 trunk frames to manage the addition,
LAN Switching Virtual LANs. Virtual LAN Concepts A LAN includes all devices in the same broadcast domain. A broadcast domain includes the set of all LAN-connected.
CCNP Routing and Switching Exam Pass4sure.
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 8 – Virtual LANs Virtual LANs VLAN Concepts VLAN Configuration.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
100% Exam Passing Guarantee & Money Back Assurance
CCNA Practice Exam Questions
Switching and VLANs.
Virtual Local Area Networks or VLANs
Switching and VLANs.
Instructor Materials Chapter 6: VLANs
Chapter 5: Inter-VLAN Routing
Virtual LANs.
Routing and Switching Essentials v6.0
CCNA Routing and Switching Routing and Switching Essentials v6.0
Switching and VLANs.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
Switching and VLANs.
Chapter 2: Scaling VLANs
Presentation transcript:

Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They default back to the management VLAN. 3.They automatically become a part of VLAN1. 4.They must be assigned to another VLAN before the original VLAN can be deleted. 5.They remain a part of that VLAN until the switch is rebooted. They then become members of the management VLAN.

Cisco 3 - Switch Perrine. J Page 25/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They default back to the management VLAN. 3.They automatically become a part of VLAN1. 4.They must be assigned to another VLAN before the original VLAN can be deleted. 5.They remain a part of that VLAN until the switch is rebooted. They then become members of the management VLAN.

Cisco 3 - Switch Perrine. J Page 35/8/2015 Chapter 8 Which of the following devices is needed for a packet to be passed from one VLAN to another? 1.Bridge 2.Router 3.Switch 4.Hub

Cisco 3 - Switch Perrine. J Page 45/8/2015 Chapter 8 Which of the following devices is needed for a packet to be passed from one VLAN to another? 1.Bridge 2.Router 3.Switch 4.Hub

Cisco 3 - Switch Perrine. J Page 55/8/2015 Chapter 8 Which of the following describe networks in which the use of static VLANs is appropriate? (Choose three.) 1.Workstations, departments, and network resources are seldom moved. 2.VLAN port membership frequently changes. 3.Robust VLAN management software is available to the network administrator. 4.The overhead required to manage VLAN MAC address and custom filtering tables is not desirable. 5.VLANs are often added, deleted, and modified.

Cisco 3 - Switch Perrine. J Page 65/8/2015 Chapter 8 Which of the following describe networks in which the use of static VLANs is appropriate? (Choose three.) 1.Workstations, departments, and network resources are seldom moved. 2.VLAN port membership frequently changes. 3.Robust VLAN management software is available to the network administrator. 4.The overhead required to manage VLAN MAC address and custom filtering tables is not desirable. 5.VLANs are often added, deleted, and modified.

Cisco 3 - Switch Perrine. J Page 75/8/2015 Chapter 8 A network administrator has configured a switch with three VLANs: VLAN1, VLAN2, and VLAN3. Port 10 is to be assigned to VLAN3. Which of the following commands are needed to assign port 10 to VLAN3? (Choose three.) 1.Switch_1(config)# switchport interface fastethernet 0/10 2.Switch_1(config-if)# switchport mode access 3.Switch_1(config-if)# switchport access 4.Switch_1(config-if)# switchport access vlan 3 5.Switch_1(config)# interface fastethernet 0/10 6.Switch_1# vlan database

Cisco 3 - Switch Perrine. J Page 85/8/2015 Chapter 8 A network administrator has configured a switch with three VLANs: VLAN1, VLAN2, and VLAN3. Port 10 is to be assigned to VLAN3. Which of the following commands are needed to assign port 10 to VLAN3? (Choose three.) 1.Switch_1(config)# switchport interface fastethernet 0/10 2.Switch_1(config-if)# switchport mode access 3.Switch_1(config-if)# switchport access 4.Switch_1(config-if)# switchport access vlan 3 5.Switch_1(config)# interface fastethernet 0/10 6.Switch_1# vlan database

Cisco 3 - Switch Perrine. J Page 95/8/2015 Chapter 8 What does the phrase microsegmentation with scalability mean? 1.The ability to increase network size without creating collisions domains 2.The ability to put a huge number of hosts on one switch 3.The ability to broadcast to more nodes at once 4.All of the above

Cisco 3 - Switch Perrine. J Page 105/8/2015 Chapter 8 What does the phrase microsegmentation with scalability mean? 1.The ability to increase network size without creating collisions domains 2.The ability to put a huge number of hosts on one switch 3.The ability to broadcast to more nodes at once 4.All of the above

Cisco 3 - Switch Perrine. J Page 115/8/2015 Chapter 8 What needs to be done when deleting an entire VLAN? (Choose three.) 1.Enter database configuration mode. 2.Reboot the switch in order for the changes to take effect. 3.Use the negative form of the command that was used to create the VLAN. 4.Reassign the switch ports from the deleted VLAN to other VLANs if they are to be used. 5.Use the erase vlan command in global configuration mode. 6.Delete the vlan.dat file from flash.

Cisco 3 - Switch Perrine. J Page 125/8/2015 Chapter 8 What needs to be done when deleting an entire VLAN? (Choose three.) 1.Enter database configuration mode. 2.Reboot the switch in order for the changes to take effect. 3.Use the negative form of the command that was used to create the VLAN. 4.Reassign the switch ports from the deleted VLAN to other VLANs if they are to be used. 5.Use the erase vlan command in global configuration mode. 6.Delete the vlan.dat file from flash.

Cisco 3 - Switch Perrine. J Page 135/8/2015 Chapter 8 Which approach to assigning VLAN membership maximizes forwarding performance? 1.membership by MAC address 2.membership by logical address 3.membership by protocol 4.membership by port 5.membership by operating system

Cisco 3 - Switch Perrine. J Page 145/8/2015 Chapter 8 Which approach to assigning VLAN membership maximizes forwarding performance? 1.membership by MAC address 2.membership by logical address 3.membership by protocol 4.membership by port 5.membership by operating system

Cisco 3 - Switch Perrine. J Page 155/8/2015 Chapter 8 How does a bridge handle the frames that it receives? (Choose three.) 1.If the source is unknown, the source port is shutdown. 2.If the source port of a frame is unknown, a bridge will issue an ARP request. 3.If the destination is on another segment, the bridge forwards the frame only to the correct interface. 4.A bridge forwards frames for unknown destinations to the default gateway. 5.If the destination port is unknown, a bridge will flood the frame to all ports in the broadcast domain, except for the source port. 6.If the destination of the frame is on the same segment as the source, a bridge will not forward the frame.

Cisco 3 - Switch Perrine. J Page 165/8/2015 Chapter 8 How does a bridge handle the frames that it receives? (Choose three.) 1.If the source is unknown, the source port is shutdown. 2.If the source port of a frame is unknown, a bridge will issue an ARP request. 3.If the destination is on another segment, the bridge forwards the frame only to the correct interface. 4.A bridge forwards frames for unknown destinations to the default gateway. 5.If the destination port is unknown, a bridge will flood the frame to all ports in the broadcast domain, except for the source port. 6.If the destination of the frame is on the same segment as the source, a bridge will not forward the frame.

Cisco 3 - Switch Perrine. J Page 175/8/2015 Chapter 8 A network administrator is attempting to configure routing between VLANs over a trunked link. A trunk link cannot be established between a switch and a router. Which of the following are possible sources of this problem? (Choose two.) 1.The router IOS does not support trunking. 2.The port is connected and is not receiving alignment and FCS errors. 3.The switch duplex and speed are not set properly. 4.The router and switch are running different versions of STP. 5.The switch IP address is incorrectly configured.

Cisco 3 - Switch Perrine. J Page 185/8/2015 Chapter 8 A network administrator is attempting to configure routing between VLANs over a trunked link. A trunk link cannot be established between a switch and a router. Which of the following are possible sources of this problem? (Choose two.) 1.The router IOS does not support trunking. 2.The port is connected and is not receiving alignment and FCS errors. 3.The switch duplex and speed are not set properly. 4.The router and switch are running different versions of STP. 5.The switch IP address is incorrectly configured.

Cisco 3 - Switch Perrine. J Page 195/8/2015 Chapter 8 Which of the following statements are true regarding a root bridge in a spanning tree topology? (Choose two.) 1.The root bridge timers control BPDU traffic on the network. 2.Only the show commands on the switch can display root bridge information. 3.It is the central point of a spanning tree topology. 4.Storm control is enabled by default. 5.VLANs cannot be trunked between switches until the root bridge has been elected.

Cisco 3 - Switch Perrine. J Page 205/8/2015 Chapter 8 Which of the following statements are true regarding a root bridge in a spanning tree topology? (Choose two.) 1.The root bridge timers control BPDU traffic on the network. 2.Only the show commands on the switch can display root bridge information. 3.It is the central point of a spanning tree topology. 4.Storm control is enabled by default. 5.VLANs cannot be trunked between switches until the root bridge has been elected.

Cisco 3 - Switch Perrine. J Page 215/8/2015 Chapter 8 Which factors influence the number of VLANs that may be required on a switch? (Choose three.) 1.the physical addressing scheme 2.traffic patterns in the network 3.types of applications in use 4.the adaptability of the network 5.workgroup functions and commonality 6.the tagging option used for VLAN identification

Cisco 3 - Switch Perrine. J Page 225/8/2015 Chapter 8 Which factors influence the number of VLANs that may be required on a switch? (Choose three.) 1.the physical addressing scheme 2.traffic patterns in the network 3.types of applications in use 4.the adaptability of the network 5.workgroup functions and commonality 6.the tagging option used for VLAN identification

Cisco 3 - Switch Perrine. J Page 235/8/2015 Chapter 8 What is true of the method by which VLAN membership is identified in Ethernet frames? (Choose two.) 1.The frame header is in its original format when it reaches the endpoint device. 2.The VLAN membership of frames does not need to be identified unless ISL is in use. 3.The Ethernet frame is encapsulated or modified with the VLAN ID information. 4.The VLAN ID is removed by the endpoint device upon delivery of the frame.

Cisco 3 - Switch Perrine. J Page 245/8/2015 Chapter 8 What is true of the method by which VLAN membership is identified in Ethernet frames? (Choose two.) 1.The frame header is in its original format when it reaches the endpoint device. 2.The VLAN membership of frames does not need to be identified unless ISL is in use. 3.The Ethernet frame is encapsulated or modified with the VLAN ID information. 4.The VLAN ID is removed by the endpoint device upon delivery of the frame.

Cisco 3 - Switch Perrine. J Page 255/8/2015 Chapter 8 Which of the following commands are used to verify VLAN configuration? (Choose two.) 1.Switch# show vlan id id_number 2.Switch# show vlan 3.Switch# show config vlan id_number 4.Switch# show vlan config id_number 5.Switch# show interface vlan id_number

Cisco 3 - Switch Perrine. J Page 265/8/2015 Chapter 8 Which of the following commands are used to verify VLAN configuration? (Choose two.) 1.Switch# show vlan id id_number 2.Switch# show vlan 3.Switch# show config vlan id_number 4.Switch# show vlan config id_number 5.Switch# show interface vlan id_number

Cisco 3 - Switch Perrine. J Page 275/8/2015 Chapter 8 VLAN 10 needs to be removed from a switch. Which command must the administrator enter in order to accomplish this task? 1.Switch(config-if)# no switchport access vlan 10 2.Switch(config-if)# erase switchport access vlan 10 3.Switch(vlan)# no vlan 10 4.Switch(vlan)# no vlan database 10

Cisco 3 - Switch Perrine. J Page 285/8/2015 Chapter 8 VLAN 10 needs to be removed from a switch. Which command must the administrator enter in order to accomplish this task? 1.Switch(config-if)# no switchport access vlan 10 2.Switch(config-if)# erase switchport access vlan 10 3.Switch(vlan)# no vlan 10 4.Switch(vlan)# no vlan database 10