Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


1 what is private vlam


2 if there is a router which have two fast Ethernet from
from fa0/0 192.168.10.0/24 network is connected
from fa0/1 192.168.20.0/24 network is connected
all bacsic routing is done
will they communicate
3 what is difference between snmp v1 v2 and v3

what difference between name and stranded access list

Answers were Sorted based on User's Feedback



1 what is private vlam 2 if there is a router which have two fast Ethernet from from fa0/0 192..

Answer / jitendera

A private VLAN is technique in computer networking where a
VLAN contains switch ports that are restricted, such that
they can only communicate with a given "uplink". The
restricted ports are called "private ports". Each private
VLAN typically contains many private ports, and a single
uplink. The uplink will typically be a port (or link
aggregation group) connected to a router, firewall, server,
provider network, or similar central resource.

The switch forwards all frames received on a private port
out the uplink port, regardless of VLAN ID or destination
MAC address. Frames received on an uplink port are
forwarded in the normal way (i.e., to the port hosting the
destination MAC address, or to all VLAN ports for unknown
destinations or broadcast frames). "Peer-to-peer" traffic
is blocked.

A typical application for a private VLAN is a hotel where
each room has a port for Internet access. Allowing direct
data link layer communication between customer nodes would
expose the local network to various security attacks, such
as ARP spoofing, as well as increasing the potential for
damage due to misconfiguration.

Another application of private VLANs is to simplify IP
address assignment. Ports can be isolated from each other
at the data link layer (for security, performance, or other
reasons), while belonging to the same IP subnet.

Note that while private VLANs provide isolation at the data
link layer, communication at higher layers may still be
possible, through the uplink connection.


yeah they will comunicate


3rd one is easy one try your self

Is This Answer Correct ?    1 Yes 2 No

1 what is private vlam 2 if there is a router which have two fast Ethernet from from fa0/0 192..

Answer / tatyasaheb

Privet vlan bydefoult in switch is 5

1
10001
20001
30001
40001

No-Auto summary ;

In name access list we can simply create access list
depending on name ;

in standed acces list we can create access list no starting
from 100

Is This Answer Correct ?    2 Yes 5 No

Post New Answer

More CCNA Interview Questions

Can you explain IKE (Internet Key Exchange)?

1 Answers   CCIE, IBM,


What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.

2 Answers  


What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards

1 Answers  


In static route, what is the difference between next hop ip address and local interface address, except the Administrative Distance.

5 Answers   HCL,


Hello Mr.Jitendera Kuamr Sinha, how is every thing going on? Thanks for your reply. Dear Friend if you can Explain it little bit deeper i will be realy thanks full. Wish you all the Best.

1 Answers  


Identify the 2 items that TCP and UDP share in common? A.) Both use port numbers to identify upper level applications B.) Operate at the Network layer C.) Both are Transport protocols D.) Both are reliable communications

1 Answers  


Which IP host address range is allowable given an IP address of 172.37.2.56 and 12 bits of subnetting A. 172.37.2.48 to 172.37.2.63 B. 172.37.2.48 to 172.37.2.62 C. 172.37.2.49 to 172.37.2.62 D. 172.37.2.49 to 172.37.2.63 E. 172.37.2.55 to 172.37.2.126

1 Answers  


Which of the following are ways to provide login access to a router? A.) HTTP B.) Console C.) Telnet D.) Aux Port E.) SNMP F.) LLC

3 Answers  


Tell me which multicast ip eigrp protocol use?

0 Answers  


Which two steps are part of the process of creating Frame Relay subinterfaces on a point to point connection? (Choose two) A. configure the router to forward all broadcast packets B. remove any network address assigned to the physical interface C. configure the local data link connection identifier (DICI) for the subinterfaces D. cartoon the total committed information rate (CIP) available among the subinterfaces

1 Answers  


In the setup dialog, what do the square brackets indicate? A. current or default spores B. hard coded values that cannot be modified C. values entered by the administrator but not saved D. values that must be written to PAVRAM before becoming enabled

1 Answers  


What are the two types of transmission technology available in ccna?

1 Answers  


Categories