1 what is private vlam
2 if there is a router which have two fast Ethernet from
from fa0/0 192.168.10.0/24 network is connected
from fa0/1 192.168.20.0/24 network is connected
all bacsic routing is done
will they communicate
3 what is difference between snmp v1 v2 and v3
what difference between name and stranded access list
Answers were Sorted based on User's Feedback
Answer / jitendera
A private VLAN is technique in computer networking where a
VLAN contains switch ports that are restricted, such that
they can only communicate with a given "uplink". The
restricted ports are called "private ports". Each private
VLAN typically contains many private ports, and a single
uplink. The uplink will typically be a port (or link
aggregation group) connected to a router, firewall, server,
provider network, or similar central resource.
The switch forwards all frames received on a private port
out the uplink port, regardless of VLAN ID or destination
MAC address. Frames received on an uplink port are
forwarded in the normal way (i.e., to the port hosting the
destination MAC address, or to all VLAN ports for unknown
destinations or broadcast frames). "Peer-to-peer" traffic
is blocked.
A typical application for a private VLAN is a hotel where
each room has a port for Internet access. Allowing direct
data link layer communication between customer nodes would
expose the local network to various security attacks, such
as ARP spoofing, as well as increasing the potential for
damage due to misconfiguration.
Another application of private VLANs is to simplify IP
address assignment. Ports can be isolated from each other
at the data link layer (for security, performance, or other
reasons), while belonging to the same IP subnet.
Note that while private VLANs provide isolation at the data
link layer, communication at higher layers may still be
possible, through the uplink connection.
yeah they will comunicate
3rd one is easy one try your self
Is This Answer Correct ? | 1 Yes | 2 No |
Answer / tatyasaheb
Privet vlan bydefoult in switch is 5
1
10001
20001
30001
40001
No-Auto summary ;
In name access list we can simply create access list
depending on name ;
in standed acces list we can create access list no starting
from 100
Is This Answer Correct ? | 2 Yes | 5 No |
Identify the command to determine if CDP is enabled? A.) show enable cdp B.) show cdp enabled C.) show cdp run D.) show cdp
When written <cr > what does it mean?
Which reserve port number talent use?
How we put NIC in promiscuous mode when using MS windows, can any one tell me in detail
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Which protocol for PPP provides load balancing across multiple links? A. Multilink Protocol (MP) B. Quality C. Magic Number D. Stacker E. Predictor
What is the terminal emulation, in which layer it comes?
What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.
Which protocols do periodically updates?
What are two ways IPX supports multiple logical networks on an individual underrate? (Choose two) A. network number B. routing protocol C. encapsulation type D. autonomous system number