Routing and Switching Essentials 6.0 Chapter 6 Name Click Here to Enter Text

Routing and Switching Essentials 6.0 Chapter 6 Name Click here to enter text.

VLANs

6.1.1.1

VLANs provide Click here to enter text. and Click here to enter text...

VLANs are based on Click here to enter text. connections, instead of Click here to enter text. connections.

Unicast, broadcast, and multicast packets are Click here to enter text. and Click here to enter text. only to end devices within the VLAN where the packets are sourced.

VLANs do not forward Click here to enter text.

VLANs enable the implementation of Click here to enter text. and Click here to enter text. policies according to specific groupings of users.

Each Click here to enter text. can be assigned to only one VLAN (with the exception of a port connected to an IP phone or to another switch).

6.1.1.2

Describe how each of the following provides benefits to the network.

·  Security- Click here to enter text.

·  Cost reduction- Click here to enter text.

·  Better performance- Click here to enter text.

·  Reduce the size of broadcast domains- Click here to enter text.

·  Improved IT staff efficiency- Click here to enter text.

·  Simpler project and application management- Click here to enter text.

Each VLAN in a switched network corresponds to an Click here to enter text.

6.1.1.3

A data VLAN is a VLAN that is configured to carry Click here to enter text..

A VLAN carrying Click here to enter text. or Click here to enter text. traffic would not be a data VLAN.

It is common practice to separate Click here to enter text. and Click here to enter text. from data traffic.

All switch ports become a part of the Click here to enter text. VLAN which is VLAN Click here to enter text.

A native VLAN is assigned to a trunk port. What is a trunk port? Click here to enter text.

What is untagged traffic? Click here to enter text.

What is a management VLAN? Click here to enter text.

The management VLAN is assigned an Click here to enter text. and is the Click here to enter text. of the switch.

Why is VLAN 1 a bad choice for the management VLAN? Click here to enter text.

6.1.1.4

A separate VLAN is required to support voice over IP (VOIP) because it requires:

·  Click here to enter text.

·  Click here to enter text.

·  Click here to enter text.

·  Click here to enter text.

6.1.2.1

What is a VLAN trunk? Click here to enter text.

VLAN trunks allow traffic to propagate between switches without the intervention of a Click here to enter text.

A VLAN trunk is a Click here to enter text. for multiple VLANs between routers and switches.

6.1.2.2

When a switch receives a broadcast from a device assigned to VLAN 20, what happens to the frame? Click here to enter text.

6.1.2.3

When a frame belongs to a VLAN and that frame enters a switch on a trunk port, what must be done to that frame? Click here to enter text.

After the switch inserts the Type and tag control information fields, it recalculates the Click here to enter text. values and inserts the new Click here to enter text. into the frame.

6.1.2.4

Click here to enter text. should not be tagged.

What happens to untagged frames? Click here to enter text.

If the native VLAN has not been reconfigured, the native VLAN is Click here to enter text.

6.1.2.5

A separate Click here to enter text. is required to support VoIP.

An access port that is used to connect a Cisco IP phone can be configured to use two separate VLANs, one VLAN for Click here to enter text. and another VLAN for Click here to enter text. from a device attached to the phone.

6.2.1.1

The Catalyst 2960 and 3560 Series switches support over Click here to enter text. VLANs.

Normal Range VLANS are identified by VLAN IDs of 1 and 1005. They are used for Click here to enter text.

Normal Range VLAN data is stored in the Click here to enter text. located in flash.

Extended range VLANs are numbered from 1006 to to 4094 and are used by Click here to enter text. to enable service providers to extend their infrastructure to a greater number of customers.

Extended Range VLANs are stored in Click here to enter text.

6.2.1.2

What is the command to display the contents of vlan.dat? Click here to enter text.

Do the syntax checker.

6.2.1.3

After creating a VLAN, the next step is to Click here to enter text.

TheClick here to enter text. command is optional, but strongly recommended as a security best practice.

When a device is connected to port that has a VLAN assigned to it, the device becomes Click here to enter text.

When a VLAN is assigned to a port on a switch, all other devices assigned to that VLAN must be in the same Click here to enter text..

An access port can be assigned to only one VLAN. What is the exception? Click here to enter text..

Do the syntax checker.

6.2.1.4

What command is used to change VLAN membership? Click here to enter text.

When this command is used, the port becomes a member of Click here to enter text..

How do you assign a port to a different VLAN? Click here to enter text.

Do the syntax checker.

6.2.1.5

What command is used to delete a VLAN? Click here to enter text.

What should be done before deleting a VLAN? Click here to enter text.

What command will effectively return the switch to factory default condition? Click here to enter text.

6.2.1.6

Do the syntax checker.

6.2.2.1

Enter the commands to configure FA/11 as a trunk link.

S1# Click here to enter text.

S1#(config) Click here to enter text.

S1#(config-if) Click here to enter text.

Enter the command to configure VLAN 99 as the native VLAN.

S1#(config-if) Click here to enter text.

Enter the command to allow VLANs 10,15,and 30 on this trunk.

S1#(config-if) Click here to enter text.

6.2.2.2

What command removes allowed VLANs on a trunk line? Click here to enter text.

When reset to the default state, the trunk allows all VLANs and uses Click here to enter text. as the native VLAN.

6.2.2.3

Do the syntax checker.

6.2.3.1

Two devices on the same VLAN cannot have different Click here to enter text. or they cannot communicate.

What is the most common VLAN error? Click here to enter text.

6.2.3.2

If ip addressing is ruled out briefly describe the steps to follow to find the error.

·  Step 1 - Click here to enter text.

·  Step 2 - Click here to enter text.

What happens to a port if the VLAN that it belongs to is deleted? Click here to enter text.

6.2.3.3

What is VLAN leaking? Click here to enter text.

What causes VLAN leaking? Click here to enter text.

6.2.3.4

What are native VLAN mismatches? Click here to enter text.

What are trunk mode mismatches? Click here to enter text.

What can cause unexpected traffic or no traffic to be sent on a trunk? Click here to enter text.

6.2.3.5

What is “mismatched port modes”? Click here to enter text.

6.2.3.6

What is “incorrect VLAN list?” Click here to enter text.

6.3.1.1

Forwarding network traffic from one VLAN to another VLAN using routing is known Click here to enter text.

6.3.1.2

Legacy inter-VLAN routing is performed by connecting different physical Click here to enter text. interfaces to different physical Click here to enter text. ports.

Legacy inter-VLAN routing is not Click here to enter text. and is generally no longer implemented in switched networks.

6.3.1.3

Frames cannot go to a different VLAN unless they go through a Click here to enter text.

In Router-on-a-Stick inter-VLAN routing, the connection between the switch and router must be a Click here to enter text..

What are subinterfaces? Click here to enter text.

Each subinterface is configured with an Click here to enter text. and Click here to enter text..

After a routing decision is made based on the destination VLAN, the data frames are Click here to enter text. and sent back out the physical interface.

Router-on-a-Stick does not scale well beyond Click here to enter text. VLANs.

6.3.2.1

Study the diagram.

6.3.2.2

In Legacy Inter-VLAN routing, each port on the router is assigned Click here to enter text. VLAN.

The switch must have two ports assigned to the VLAN, one for Click here to enter text. frames and one for Click here to enter text. frames.

The router must be assigned the same Click here to enter text. as the VLAN which is assigned to the interface.

6.3.3.1

Why are subinterfaces used in Router-on-a-Stick? Click here to enter text.

Each subinterface is assigned an Click here to enter text. that is in the same subnet as the VLAN subnet.

When configuring inter-VLAN routing using the router-on-a-stick model, the physical interface of the router must be connected to a Click here to enter text. on the adjacent switch.

Each router subinterface is configured to Click here to enter text. frames for that VLAN.

6.3.3.2

To enable inter-VLAN routing using router-on-a stick, start by enabling Click here to enter text. on the switch port that is connected to the router.

What command is used to configure a switchport as a trunk line? Click here to enter text.

6.3.3.3

Enter the commands to configure a subinterface on g0/0 to VLAN 20 with an ip address of 172.50.20.1 and VLAN30 with an ip address 172.50.30.1.

R1(config)# Click here to enter text.

R1(config-subif)# Click here to enter text.

R1(config-subif)# Click here to enter text.

R1(config-subif)# Click here to enter text.

R1(config)# Click here to enter text.

R1(config-if)# Click here to enter text.

Subinterfaces do not need to be activated with the Click here to enter text. command.

If the interface is activated with no shutdown, all the Click here to enter text. are also activated.

Individual subinterfaces can be administratively shut down with the Click here to enter text. command. Also, individual subinterfaces can be enabled independently with the Click here to enter text. command in the subinterface configuration mode.

6.3.3.4

Do the syntax checker.

6.3.3.5

What two commands can be used to verify connectivity in Router-on-a-Stick? Click here to enter text.