Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


1 what is private vlam


2 if there is a router which have two fast Ethernet from
from fa0/0 192.168.10.0/24 network is connected
from fa0/1 192.168.20.0/24 network is connected
all bacsic routing is done
will they communicate
3 what is difference between snmp v1 v2 and v3

what difference between name and stranded access list

Answers were Sorted based on User's Feedback



1 what is private vlam 2 if there is a router which have two fast Ethernet from from fa0/0 192..

Answer / jitendera

A private VLAN is technique in computer networking where a
VLAN contains switch ports that are restricted, such that
they can only communicate with a given "uplink". The
restricted ports are called "private ports". Each private
VLAN typically contains many private ports, and a single
uplink. The uplink will typically be a port (or link
aggregation group) connected to a router, firewall, server,
provider network, or similar central resource.

The switch forwards all frames received on a private port
out the uplink port, regardless of VLAN ID or destination
MAC address. Frames received on an uplink port are
forwarded in the normal way (i.e., to the port hosting the
destination MAC address, or to all VLAN ports for unknown
destinations or broadcast frames). "Peer-to-peer" traffic
is blocked.

A typical application for a private VLAN is a hotel where
each room has a port for Internet access. Allowing direct
data link layer communication between customer nodes would
expose the local network to various security attacks, such
as ARP spoofing, as well as increasing the potential for
damage due to misconfiguration.

Another application of private VLANs is to simplify IP
address assignment. Ports can be isolated from each other
at the data link layer (for security, performance, or other
reasons), while belonging to the same IP subnet.

Note that while private VLANs provide isolation at the data
link layer, communication at higher layers may still be
possible, through the uplink connection.


yeah they will comunicate


3rd one is easy one try your self

Is This Answer Correct ?    1 Yes 2 No

1 what is private vlam 2 if there is a router which have two fast Ethernet from from fa0/0 192..

Answer / tatyasaheb

Privet vlan bydefoult in switch is 5

1
10001
20001
30001
40001

No-Auto summary ;

In name access list we can simply create access list
depending on name ;

in standed acces list we can create access list no starting
from 100

Is This Answer Correct ?    2 Yes 5 No

Post New Answer

More CCNA Interview Questions

Identify the following components of the IPX address 2e.0000.0065.ed43 A.) Not a valid IPX address B.) Network = 2e, Subnet = 0000, Node = 0065.ed43 C.) Network = 2e.0000, Node = 0065.ed43 D.) Network = 2e, Node = 0000.0065.ed43

1 Answers  


Explain the difference between routable and non- routable protocols?

0 Answers  


What are the three phases of PPP session establishment? A. Link establishment phase B. Authentication phase C. Network layer protocol phase D. Handshake phase E. Dial-in phase

2 Answers  


What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging

3 Answers  


In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0? A. host B. any C. all D. include

1 Answers  


What is the difference between half duplex and full duplex?

0 Answers  


hello sir , if i finish this certification is the job is conform ?? and in chennai were i can do this ??

1 Answers  


Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP

2 Answers  


What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet

2 Answers  


what is the binary value of loop back address

13 Answers  


Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199

1 Answers  


Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector

2 Answers  


Categories