Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A network engineer typed the following command on a switch hostname S1 and obser

ID: 3759684 • Letter: A

Question

A network engineer typed the following command on a switch hostname S1 and observed the output below. Explain each entry in the output and the possible source for each MAC address in the MAC Address Table. (10 points)


SW1#sh mac-address-table

Mac Address Table

----------------------------------------------------------------------

Vlan Mac Address Type Ports

----------------------------------------------------------------------

10 0001.c7ad.cd5a STATIC Fa0/2

1 00d0.5883.5001 DYNAMIC Fa0/1

1 00d0.5883.5002 DYNAMIC Fa0/4
45 00d0.d3aa.ec3a STATIC Fa0/15















Explain the significance of each of the following types of VLAN: Data, Management, Native, and Blackhole. Explain where each type of VLAN fits into a LAN network. In addition, what is the default VLAN on a Cisco switch for Data, Management, and Native frames? Justify your answer (10 points)



List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range. What, if any, VLANs are reserved in that range? (10 points)

Explanation / Answer

Data, Management, Native, and Blackhole

Once VLANs are created, their names and descriptions are stored in a VLAN database, with the exception of specific VLANs such as VLANs in the extended range in Cisco IOS for the Catalyst 6500. A mechanism called VLAN Trunking Protocol (VTP) dynamically distributes this information between switches. However, even if network administrators do not plan to enable VTP, it is important to consider its consequences.Within the switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs help administrators to have the end node or workstations group that are segmented logically by functions, project teams, and applications, without regard to the physical location of the users.

In a controller-based solution, management, control, deployment, and security functions are moved to a central point: the wireless controller, as shown in Figure 3-14. Controllers are combined with lightweight APs that perform only the real-time wireless operation. Controllers can be standalone devices, integrated into a switch, or a WLC can be virtualized.

the network administrator wants to ensure that all the office computers share the same security features and bandwidth controls. Creating a large LAN and wiring each department together will constitute a huge task and definitely won’t be easy when it comes to managing the network.

This where VLAN switching comes in, it will be easier to group offices and departments with the resources they use regardless of their location, and certainly easier to manage their specific security and bandwidth needs.

Opting for a switched VLAN allows the network administrator to create groups of logically networked devices that act as if they are on their own independent network, even if they share a common infrastructure with other VLANs. When you configure a VLAN, you can name it to describe the primary role of the users for that VLAN.

Default VLAN: This is basically where ALL ports belongs to by default, this is tecnically VLAN 1 and it can't be deleted from the switch. On some (old )Catalyst switches you can't even disallow VLAN 1 from trunk ports.

Data VLAN: This is the "normal" VLAN where the traffic is carried and where the client data goes through the LAN.

Native VLAN: The native VLAN is an 802.1Q only concept. Traffic belonging to the native VLAN is not tagged. Note that by default VLAN 1 (which is the default VLAN) is the native VLAN on ALL Catalyst switches. You can designate any VLAN as your native on your switch and note that it need to match on both ends of the trunk connection.

Voice VLAN: The voice VLAN is where the QoS policies are applied in order to prioritize this traffic to send it through the LAN. The voice traffic it's always distinguished from the data traffic on the LAN.

Management VLAN: This is used on a LAN for management purporses. Example of this would be to use it on a Out-of-Band (OOB) implementations. This VLAN normally carries sensitive traffic from a control perspective; some of the protocols that are carried on this VLAN are: FTP, TFTP, Telnet, SSH, SCP, and others.

Special VLANs: These VLANs are basically used for special cases on your LAN. An example of a special case VLAN would be VLAN 0, which is used in conjunction with 802.1p. I would say that VLAN 1 fits in this "special" category too.

Reserved VLANs: There are some VLANs that are reserved internally on your switch in order to use them on other enviroments like FDDI, Token Ring. The specific VLANs used for these two types of networks are from 1002 - 1005.

List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range.

Normal Range IDs

-                     1 – 1005

-                     1002 – 1005 are reserved for Token Ring and FDDI VLANs

-                     1 and 1002 to 1005 are automatically created and cannot be removed

-                     Normal rage VLANs IS store in the vlan.dat file in the flash memory.

Extended Range IDs

-                     1006 – 4094

-                     Designed for service providers

-                     Have fewer options than normal range VLANs

-                     Stored in the running configuration file

                     Cisco catalyst 2960 switch supports 255 normal and extended range VLANs.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote