what are the 3ree way for implementing vlan on cisco switches
what is the layer hierarchy of the cisco
what is the best place of implementing standard access list
what is q stand for isdn
these are the challanging question for me
i am waiting for jitendera sinha answer(it is challenge for
u i have seen lots of answer given by u )it is a challenge
in the frendshipmode plz donot take other wise
Answer Posted / jitendera kumar sinha
ok sohaan
i am always ready to accept challenge.i am trying to give
answer one by one.
your first question is how to implement v lan on cisco switches
then the way are
1 port centric
2 static vlan
3 dynamic vlan
if you are asking about cisco hierarchy layer then here it is
1 core layer
2 asses layer
3 distributed layer
yours 3rd question is where we should placed standard access
list
then the answer is we should placed slandered access list as
source as possible
and your last questions about :q: protocol in isdn the
answer is
q satnd for handling the switching and signaling
hope i have fulfill yours challenge and this will help you more
dear sohan u can send me your challenging problem on my
gmail id that is
jitenderasinha.it@gmail.com
waiting for your and other responce
jitendera sinha
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Differentiate User Mode from Privileged Mode?
What is the difference between ‘bit rate’ and ‘baud rate’?
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
Define logical topology.
What is trigger rip and from which ios version it starts?
Briefly explain the conversion steps in data encapsulation.
Explain the difference between tracert and traceroute?
What is Route Poisoning?
How do you depict an IP address?
Which cable called roll-over?
What is topology in ccna?
What is the network subnet?
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
What is the Difference Between Windows 2003 And Windows 2008 Server?
how we update the IOS version with the help of TFTP?