1 what is private vlam
2 if there is a router which have two fast Ethernet from
from fa0/0 192.168.10.0/24 network is connected
from fa0/1 192.168.20.0/24 network is connected
all bacsic routing is done
will they communicate
3 what is difference between snmp v1 v2 and v3
what difference between name and stranded access list
Answers were Sorted based on User's Feedback
Answer / jitendera
A private VLAN is technique in computer networking where a
VLAN contains switch ports that are restricted, such that
they can only communicate with a given "uplink". The
restricted ports are called "private ports". Each private
VLAN typically contains many private ports, and a single
uplink. The uplink will typically be a port (or link
aggregation group) connected to a router, firewall, server,
provider network, or similar central resource.
The switch forwards all frames received on a private port
out the uplink port, regardless of VLAN ID or destination
MAC address. Frames received on an uplink port are
forwarded in the normal way (i.e., to the port hosting the
destination MAC address, or to all VLAN ports for unknown
destinations or broadcast frames). "Peer-to-peer" traffic
is blocked.
A typical application for a private VLAN is a hotel where
each room has a port for Internet access. Allowing direct
data link layer communication between customer nodes would
expose the local network to various security attacks, such
as ARP spoofing, as well as increasing the potential for
damage due to misconfiguration.
Another application of private VLANs is to simplify IP
address assignment. Ports can be isolated from each other
at the data link layer (for security, performance, or other
reasons), while belonging to the same IP subnet.
Note that while private VLANs provide isolation at the data
link layer, communication at higher layers may still be
possible, through the uplink connection.
yeah they will comunicate
3rd one is easy one try your self
| Is This Answer Correct ? | 1 Yes | 2 No |
Answer / tatyasaheb
Privet vlan bydefoult in switch is 5
1
10001
20001
30001
40001
No-Auto summary ;
In name access list we can simply create access list
depending on name ;
in standed acces list we can create access list no starting
from 100
| Is This Answer Correct ? | 2 Yes | 5 No |
how can we block remote desktop for some user from cisco router through aaccess-list
What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort
Explain what is route poisoning?
Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor
Hi all, Sorry, but i want to say that right now i have around two years experience and doing the job as a network engineer(ccna certified).but i want switch job so please can tell me any opportunity.
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
What is an advantage of local area network (LAN) segmentation? A. smaller collision domains B. elimination of broadcasts C. decreased cost of implementation D. larger number of users within the same domain
Identify the command to run 'setup'? A.) Router(config)#setup B.) Router?setup C.) Router#setup D.) Router>setup
Identify the 3 guidelines for routers in the same autonomous system? A.) Must be configured for IGRP or RIP B.) Interconnected C.) Assigned the same autonomous system number D.) Configured for the same routing protocol E.) Must be same model of router
Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored
What is the mac address?