1 what is private vlam
2 if there is a router which have two fast Ethernet from
from fa0/0 192.168.10.0/24 network is connected
from fa0/1 192.168.20.0/24 network is connected
all bacsic routing is done
will they communicate
3 what is difference between snmp v1 v2 and v3
what difference between name and stranded access list
Answers were Sorted based on User's Feedback
Answer / jitendera
A private VLAN is technique in computer networking where a
VLAN contains switch ports that are restricted, such that
they can only communicate with a given "uplink". The
restricted ports are called "private ports". Each private
VLAN typically contains many private ports, and a single
uplink. The uplink will typically be a port (or link
aggregation group) connected to a router, firewall, server,
provider network, or similar central resource.
The switch forwards all frames received on a private port
out the uplink port, regardless of VLAN ID or destination
MAC address. Frames received on an uplink port are
forwarded in the normal way (i.e., to the port hosting the
destination MAC address, or to all VLAN ports for unknown
destinations or broadcast frames). "Peer-to-peer" traffic
is blocked.
A typical application for a private VLAN is a hotel where
each room has a port for Internet access. Allowing direct
data link layer communication between customer nodes would
expose the local network to various security attacks, such
as ARP spoofing, as well as increasing the potential for
damage due to misconfiguration.
Another application of private VLANs is to simplify IP
address assignment. Ports can be isolated from each other
at the data link layer (for security, performance, or other
reasons), while belonging to the same IP subnet.
Note that while private VLANs provide isolation at the data
link layer, communication at higher layers may still be
possible, through the uplink connection.
yeah they will comunicate
3rd one is easy one try your self
| Is This Answer Correct ? | 1 Yes | 2 No |
Answer / tatyasaheb
Privet vlan bydefoult in switch is 5
1
10001
20001
30001
40001
No-Auto summary ;
In name access list we can simply create access list
depending on name ;
in standed acces list we can create access list no starting
from 100
| Is This Answer Correct ? | 2 Yes | 5 No |
Identify the following components of the IPX address 2e.0000.0065.ed43 A.) Not a valid IPX address B.) Network = 2e, Subnet = 0000, Node = 0065.ed43 C.) Network = 2e.0000, Node = 0065.ed43 D.) Network = 2e, Node = 0000.0065.ed43
Explain the difference between routable and non- routable protocols?
What are the three phases of PPP session establishment? A. Link establishment phase B. Authentication phase C. Network layer protocol phase D. Handshake phase E. Dial-in phase
What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging
In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0? A. host B. any C. all D. include
What is the difference between half duplex and full duplex?
hello sir , if i finish this certification is the job is conform ?? and in chennai were i can do this ??
Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP
What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet
what is the binary value of loop back address
Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199
Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector