SlideShare a Scribd company logo
1 of 31
Cisco Network Proposal Part 1
by Jesse Holmes
Submission dat e : 12- No v- 2017 09:15AM (UT C- 0500)
Submission ID: 87 7 204 057
File name : Cisco _Netwo rk_Pro po
sal_Part_1_Updated_Jesse_Ho lmes.do cx (21.17 K)
Word count : 7 58
Charact e r count : 5134
90%
SIMILARIT Y INDEX
22%
INT ERNET SOURCES
0%
PUBLICAT IONS
90%
ST UDENT PAPERS
1 90%
Exclude quo tes Of f
Exclude biblio graphy Of f
Exclude matches Of f
Cisco Network Proposal Part 1
ORIGINALITY REPORT
PRIMARY SOURCES
Submitted to University of Maryland, University
College
St udent Paper
Cisco Network Proposal Part 1by Jesse HolmesCisco Network
Proposal Part 1ORIGINALITY REPORTPRIMARY SOURCES
Jesse HolmesComment by Jeanette: IEEE format is required for
this assignment. IEEE include a Table of Content, Introduction
and Abstract.
November 12th 2017
CMIT 350 7982: Interconnecting Cisco Devices
Professor Jeanette Boyd
Cisco Network Proposal Part 1: Springfield Device and STP
Configurations
Springfield Site Device and STP Configurations
The Springfield site requirements are innovating device
hostnames by implementing, banners and secure device
passwords. These are all basic initial configurations that should
be made prior to connecting the switch. Spanning-Tree Protocol
prevents loops from forming when switches or bridges are
interconnected. The advantages are that you can add another
link between the switches or bridges that provides fault
tolerance. The link can also provide port bundling that will
increase the speed by twice its capacity. Whenever you are
configuring spanning tree after the adding the additional link, it
stops switching loop by making sure there is only one active
path between the links. Switching loop will keep the circling
around the network which can take down. Since the
administrators are having some problems placing switch 1 as the
root, there will be a reconfiguration to the spanning tree
configurations. The mode best suited for the environment will
be chosen. Also, there will a test of multiple security measures
that can be implemented to protect the devices. Comment by
Jeanette: Why? Don’t just make statements, explain why they
are the basic initial configurations that should be made prior to
connecting the switch? These have nothing to do with the
switches operation so why do you think this?Comment by
Jeanette: What do you mean by “the best mode suited for the
environment will be chosen?
Device Configurations
To correctly word Message of the Day and login banners, it is
best to consult with the legal department first before
proceeding. Once the verbiage is approved and carefully
considered, it can be implemented into these banners. Switch 2
is configured as the root. In order to fix the problem the
administrators are having, there will need to be configuration of
switch 1 by changing the priority number to force it to become
the root switch. Comment by Jeanette: Why does someone need
the MOTD? Why problem are the administrators having?
Currently PVST is enabled on switches 1, 3 and 4 while Switch
2 has RSTP enabled. Spanning tree protocol will be changed on
switches 1, 3 and 4 from the default mode of PVST to RSTP in
order to take advantage of the benefits of RSTP. RSTP improves
processing times by using port roles, using a method of sending
messages between bridges on designated ports, calculating
alternate paths, and using faster timers. This feature ensures
that a bridging loop cannot form, because the switch's shutting
down the port removes the possibility for a loop forming. Root
guard is a feature that will be enabled to prevent unauthorized
switches from becoming the root bridge. Uplink Fast will be
disabled because RSTP has a similar function built into it that
will work the same.Comment by Jeanette: Way too many
acronyms! Don’t assume that your reader will know what these
acronyms meanComment by Jeanette: Don’t spend a lot of time
providing definitions about these protocols, this is probably
why your Turnitin grade is so high. Why are you
recommending that the admins implement change from PVST to
RSTP? Which of the identified problems will this fix.
Message of the Day banner:Comment by Jeanette: You have not
provided any explanation of Banner MOTD, what value it will
provide the Admins.
Springfield – Switch1 >enable
Springfield – Switch1 #configure terminal
Springfield – Switch1 (config)#banner motd
Unauthorized Use or Access Prohibited: You must have
permission to access or configure this device. All activities
performed on this device may be logged, and violations of this
policy may result in disciplinary action, and| may be reported to
law enforcement authorities. There is no right to privacy on this
device.# [4]Comment by Jeanette: Banner MOTD requires
delimiters to indicate the beginning and end of a Banner.
Where are your delimiters? This is something you would to
explain to your readers.
Springfield – Switch1 (config)#exit
Springfield – Switch1#copy run start
Login banner:Comment by Jeanette: What’s the difference
between a Banner MOTD and a Login Banner and why would
the Admins want to use 1 or both at the same time?
Springfield – Switch1>enable
Springfield – Switch1#conf t
Springfield – Switch1(config)#banner login # Only
administrators are allowed access. Please login now.#
Springfield – Switch1(config)#exit
Springfield – Switch1#copy run start
Implementing device passwords on both console port and
VTY:Comment by Jeanette: Don’t assume that the reader will
know that your are configuring Telnet. You don’t provide any
explanations for these configurations. Why do the admins want
to configure Telnet?
Springfield – Switch1>enable
Springfield – Switch1#configure terminal
Springfield – Switch1 (config)#line con 0
Springfield – Switch1 (config-line)#password $UpeR$eCrEt
Springfield – Switch1 (config-line)#login
Springfield – Switch1 (config-line)#line vty 1
Springfield – Switch1 (config-line)#password $UpeR$eCrEt
Springfield – Switch1 (config-line)#login
Springfield – Switch1 (config-line)#exit
Springfield – Switch1 (config)#service password-encryption
Springfield – Switch1 (config)#exit
Implementing RSPT on the switch:
Springfield – Switch1>enable
Springfield – Switch1#conf t
Springfield – Switch1(config)#spanning-tree mode rapid-pvst
Springfield – Switch1(config)#spanning-tree vlan 1 priority
4096
Springfield – Switch1(config)#no spanning-tree uplinkfast
Springfield – Switch1(config)#int range gi0/1 – 2
Springfield – Switch1(config-if)#spanning-tree guard root
Springfield – Switch1(config)#int range gi0/96Springfield –
Switch1(config-if)#spanning-tree bpduguard enable
Springfield – Switch1(config)#end
Springfield – Switch1#copy run start
Supporting Tables/Diagrams
DevicesComment by Jeanette: What is the importance of this?
What value do they bring to the Admins? Which objective are
you meeting?All tables must be labeled and referenced
somewhere in your document.
Hostname
Router
Springfield - Router
Switch
Springfield – SW1
Switch
Springfield – SW2
Switch
Springfield – SW3
Switch
Springfield – SW4
Banner
Template
Message of the day (MOTD)
Unauthorized Use or Access Prohibited| You must have
permission to access this device. All activities performed on
this device may be logged, and violations of this policy may
result in disciplinary action, and may be reported to law
enforcement authorities.
Login
Only administrator users are allowed access. Please login now.
ReferencesComment by Jeanette: Where were these used in the
body of your text?
Cisco, "Spanning Tree Protocol," Cisco, [Online]. Available:
http://www.cisco.com/c/en/us/tech/lan-switching/spanning-tree-
protocol/index.html. [Accessed 5 October 2015].
S. Hogg, "Core Networking and Security," Network World, 2
January 2013. [Online]. Available:
http://www.networkworld.com/article/2223757/cisco-
subnet/cisco-subnet-9-common-spanning-tree-mistakes.html.
[Accessed 6 October 2015].
J. Menga, in CCNP Practical Studies: Switching, Indianapolis,
Cisco Press, 2004, p. 984.
Cisco Networking Center, "How to setup login banner on Cisco
devices (router, switch, asa) - example," [Online]. Available:
http://cisconetworkingcenter.blogspot.com/2013/02/how-to-
setup-login-banner-on-cisco.html.
TestOut Corporation, "STP Design and Implementation Facts,"
TestOut Corporation, [Online]. Available:
http://testoutlivecontent.blob.core.windows.net/client-v5-1-10-
160/startlabsim.html?culture=en-us&uselivecontent=true.
[Accessed 7 October 2015].
SpringfieldSw1#show spanning-tree active
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 16385
Address 0050.0F3B.03DA
Cost 4
Port 01(GigabitEthernet0/1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Address 000C.CF6B.86EE
Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec
Aging Time 20
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------
-
Gi0/2 Desg LRN 4 128.26 P2p
Gi0/1 Root LRN 4 128.25 P2p
SpringfieldSw1#
SpringfieldSw1#show spanning-tree summary
Switch is in pvst mode
Root bridge for:
Extended system ID is enabled
Portfast Default is disabled
PortFast BPDU Guard Default is disabled
Portfast BPDU Filter Default is disabled
Loopguard Default is disabled
EtherChannel misconfig guard is disabled
UplinkFast is disabled
BackboneFast is disabled
Configured Pathcost method used is short
Name Blocking Listening Learning Forwarding STP
Active
---------------------- -------- --------- -------- ---------- ----------
VLAN0001 0 0 0 2 2
---------------------- -------- --------- -------- ---------- ----------
5 vlans 0 0 0 2 2
SpringfieldSw1#
SpringfiledSw3#show spanning-tree active
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 16385
Address 0050.0F3B.03DA
Cost 4
Port 02(GigabitEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Address 0090.21C4.B04C
Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec
Aging Time 20
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------
-
Gi0/1 Desg FWD 4 128.25 P2p
Gi0/2 Root FWD 4 128.26 P2p
SpringfiledSw3#
SpringfiledSw3#show spanning-tree summary
Switch is in pvst mode
Root bridge for:
Extended system ID is enabled
Portfast Default is disabled
PortFast BPDU Guard Default is disabled
Portfast BPDU Filter Default is disabled
Loopguard Default is disabled
EtherChannel misconfig guard is disabled
UplinkFast is disabled
BackboneFast is disabled
Configured Pathcost method used is short
Name Blocking Listening Learning Forwarding STP
Active
---------------------- -------- --------- -------- ---------- ----------
VLAN0001 0 0 0 2 2
---------------------- -------- --------- -------- ---------- ----------
5 vlans 0 0 0 2 2
SpringfiledSw3#
SpringfieldSw2#show spanning-tree active
VLAN0001
Spanning tree enabled protocol rstp
Root ID Priority 16385
Address 0050.0F3B.03DA
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec
Bridge ID Priority 16385 (priority 16384 sys-id-ext 1)
Address 0050.0F3B.03DA
Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec
Aging Time 20
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------
-
Gi0/1 Desg FWD 4 128.25 P2p
Gi0/2 Desg FWD 4 128.26 P2p
SpringfieldSw2#
SpringfieldSw2#show spanning-tree summary
Switch is in rapid-pvst mode
Root bridge for: default
Extended system ID is enabled
Portfast Default is disabled
PortFast BPDU Guard Default is disabled
Portfast BPDU Filter Default is disabled
Loopguard Default is disabled
EtherChannel misconfig guard is disabled
UplinkFast is disabled
BackboneFast is disabled
Configured Pathcost method used is short
Name Blocking Listening Learning Forwarding STP
Active
---------------------- -------- --------- -------- ---------- ----------
VLAN0001 2 0 0 0 2
---------------------- -------- --------- -------- ---------- ----------
5 vlans 2 0 0 0 2
SpringfieldSw2#
SpringfieldSw4#show spanning-tree active
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 16385
Address 0050.0F3B.03DA
Cost 8
Port 01(GigabitEthernet0/1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Address 00E0.B04D.D00E
Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec
Aging Time 20
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------
-
Gi0/1 Root FWD 4 128.25 P2p
Gi0/2 Altn BLK 4 128.26 P2p
SpringfieldSw4#
SpringfieldSw4#show spanning-tree summary
Switch is in pvst mode
Root bridge for:
Extended system ID is enabled
Portfast Default is disabled
PortFast BPDU Guard Default is disabled
Portfast BPDU Filter Default is disabled
Loopguard Default is disabled
EtherChannel misconfig guard is disabled
UplinkFast is disabled
BackboneFast is disabled
Configured Pathcost method used is short
Name Blocking Listening Learning Forwarding STP
Active
---------------------- -------- --------- -------- ---------- ----------
VLAN0001 1 0 0 1 2
---------------------- -------- --------- -------- ---------- ----------
5 vlans 1 0 0 1 2
SpringfieldSw4#
11/7/2017 Cisco Network Proposal Part 1 -Submit Files - CMIT
350 7982 Interconnecting Cisco Devices (2178) - UMUC
Learning Management System
~~
UniversiryaFMarytand CMIT 350 7982 Interconnecting Cisco
Devices (2178)
University College
Course Home Content Discussions Assignments My Tools
Resources Classlist Help
Cisco Network Proposal Part 1 -Submit Files
Hide Submission Folderinformation
Submission Folder
Cisco Network Proposal Part 1
Instructions
You have the opportunity to resubmit this assignment for
feedback before receiving a final grade.
Remember to submit your paper to Turnitln first before
submitting it here.
Hide Rubrics
Rubric Name: Cisco Network Proposal Part 1
~s~ig~rur=. ~xeell~~ai: Oustanding Aceeptable (Minimally
Proficient) Needs Improvement : fVe~cis Sie~niF~an~
Improveanent Missing ar Unaccepi
Assess the need ' -
for network
Provided an I Provided an Provided a description of the
Provided a Identified the appropriate The appropriate
excellent outstanding appropriate device/technology description
of the device/technology device/technoloc
(hardware to
description of the description of the configuration and
management appropriate configuration and management
configuration an
support the appropriate appropriate information for alL sites.
device/technology information far all sites management
organization. device technology device technology ~
configuration, but ~ technical, but tacked detail 'information for
ally
configuration and configuration and ,lacked management and/or
was not well supported were off topic or fa
management management
i
i ! information for all for both. to provide required
information for all information for aU sites. of detail.
sites. sites. ~i
~PI~2Yld
_... __ -
~XC~~~211~L Ouse~nc3iorg Aese~4abl.e (dNir~ienal~y
€~va4i~ienb:) {~G'tii~5
~iPiE➢[email protected]"[email protected]: {~L'~'6,~5
~I~Y91~IC~Yi''+~ 0f~i~3Y~VL'6'fiG'f1t ' f~lsSlf9f~ SPY
P)i4%;.9EC~~71
Assess the need
[car nrttNx~rk:
Provided excellent Provided Provided a description of the
Provided protocol P~~iided protocol The protocol
protocol outstanding protocol configuration configuration
wnfigu~dtion~~~~'ormationfor configuration
i services to configuration protocol information for all sites to
information for atl most but not all sites to include !,
information for atl
support the information for aU configuration include STP,
VLAN, ROS, and sites to include STP, STP, VLAN, ROS, and
DHCP. to include STP, VL
organization sites to include ', information for all DHCP.
VLAN, ROS, and ~ ROS, and DHCP wer
• STP, VLAN, ROS, sites to include DHCP, but the ;topic or
failed to prc
and DHCP. STP, VLAN, ROS, '~ details were not 'required
level of de
and DHCP. ~ correct ~
Criteria Excellene Q~~standing ~ Acceptable (Minimaltp
Proficient) P",eels Improvement Needs Significant
Improverra~n~'Missing or Unaccepl
Apply and ~
implement
Provided an ~ Provided an Provided a description of the the
Provided a Listed some security-related The security-relat
excellent outstanding appropriate security-related description of
the protocol configuration protocolconflgural
appropriate
description of the description of the protocol configuration
appropriate security- information, but was not information were
security appropriate i appropriate i information. related protocol
complete and lacked topic or failed to prc
measures on a security-related security-related I configuration
appropriate level of detail, required level of de
(network to
li
I protocol protocol information, but 'i
support the configuration configuration lacked supporting i
organization information. ~i information. details.
Criteria i Excellent Oustanding ' NCLL'~$~1bL~
(P~NIPiIGV1~lI~ ~YQi~ICICPik, f~8eeds Improvemr~rotc
P3e~cie ~ignirfiear~& Im~rodemen& WVissing or Unaeeep9
Follow proper ' I~
procedures and
Provided an Provided an Provided a description of the best
Provided a Attempted but lacked a The best practices
excellent outstanding practices in implementing the description
of the I description and justification of implementing th
protocols in
description of the description of the network design, and
justification. best practices in ~ the best practices in network
design wer
completing IT- I best practices in best practices in
implementing the li implementing the network topic or failed to
prc
it related tasks !implementing the implementing the i network
design, but design. required Level of de
network design, network design, I lacked the ' ',
and justification. and justification. I appropriate
~I justification.
~i Criteria Excellent ~ Oustanding Acceptable (Minimally
Proficient) ~ Pdeeds Ompr~veroienc feeds Signifiea~~~
improveenenc Missing or Unaceepl
Develop a
------ - -
Provided an Provided an Provided a description of Provided a
Attempted a description of the The subnetting ai
etails w
Submit Cancel ~r failed
https://learn.umuc.edu/d21/Ims/dropbox/user/folder_submit_file
s.d21?db=511302&grpid=0&isprv=0&bp=0&ou=253642 1/2
11/7/2017 Cisco Network Proposal Part 1 -Submit Files - CMIT
350 7982 Interconnecting Cisco Devices (2178) - UMUC
Learning Management System
organizational
needs
CriYerd~ ~;;~elle~~S: ,.,ending Acceptable (P9ir~irnaLQy
P6's~Ga:ieiatp f`.9ee~ls ~rsrpr~vrorraenc Needs 5ia~nificant
Improvemene Mi~sirie~ was V ~ -.~~~~~t39
Use of
Iii
I Authoritative
Work contains a Work contains a Work contains a reference list
Work contains a Work attempts to credit sources ~ Reference
list is mis
reference list reference list containing entries for all cited
reference List but demonstrates a Work demonstrate
~ Sources /
containing entries containing entries sources. No more than 5
minor containing entries fundamental failure to overall failure
t<
Resources for a0. cited for all cited errors in IEEE format for
in-text for cited sources. ,understand and apply the IEEE
incorporate and/~
sources. Reference sources. One or two citations and/or
reference List Work contains no formatting standard. credit
authoritati~
list entries and in- minor errors in entries. The description more
than 5 minor sources for informa
The descriptiontext citations are IEEE format for in-
appropriately used information errors in IEEE format
appropriately used in the pape
~~ correctly formatted text citations ~ from 3 or more
authoritative for in-text citations
used information from 1 or
using the and/or reference ' sources, i.e. joumat articles, and/or
reference list more
authoritative sources, i.e.
appropriate IEEE List entries. The industry or trade
publications, entries. The
joumaL articles, industry or
style for each type description
~
news articles, industry or description trade publications, news
of resource. The appropriately used government white papers
and appropriately used
articles, industry or
description information from 4 authoritative Web sites.
information from 2 government
white papers and
appropriately used or more or more authoritative Web sites.
information from 5 authoritative authoritative
or more sources, i.e.journaL' sources, i.e. journal ',
authoritative articles, industry or articles, industry or
~ sources, i.e. journal trade publications, ' trade publications,
' articles, industry or news articles, news articles, i~
trade publications, ' industry or industry or
newsartides, 'government white government white
industry or papers and papers and
government white authoritative Web authoritative Web
papers and sites. sites.
authoritative Web ~
~sites.
€;uo~~~aH •celAene O~astandirrg i Acceptable (Rlinimally
Peofficien~)
---
fw~~ds Omprovement Needs Significant Improverra~n4
NJu:~ong or Unaccep9
Satisfy
- - —
No formatting, Work contains Errors in formatting, spelling,
Submitted work has Submitted work is difficult to No work
submitted
standards of
grammar, spelling, minor errors in grammar, or punctuation
which numerous errors in read /understand and has this
assignment
writing style
or unctuation
P
formattin 9. detract from rofessionalP formattin s elfin9, P 9, si
nificant errors in formattin9 9,
and errors. grammar, spelling i appearance of the submitted
grammar, or spelling, grammar, punctuation,
grammatical or punctuation I work. punctuation. Work is or
word usage.
correctness i which do not unprofessional in
significantly impact appearance.
~ professional ~
appearance. I
Overall Score Excellent
Submit Files
Oustanding Acceptable (Minimally Proficient) Needs
Improvement Needs Significant Improvement Missing or
Unacept;
Files to submit
(0) files) to submit
After uploading, you must click Submit to complete the
submission.
Add a File Record Audio
Comments
- ~
~
ParagraE
~' Cancel
L—
https://learn.umuc.edu/d21/Ims/dropbox/user/folder_submit_file
s.d21?db=511302&grpid=0&isprv=0&bp=0&ou=253642 2/2
CMIT 350 WAN and SOHO Skills ImplementationUse this
document as a guide for formatting and organizing your CMIT
350 Skills Implementation challenge.Title Page
Professionalism will be key to your success and advancement in
your academic and professional career. Use the title page to
identify relevant information such as your name, the course,
professor, and submission/completion date.Document
Index/Contents
Organization will allow your document to be divided into key
areas of consideration and allows an overall structure to be
placed over the submission.Sample text:
I. Site “XXXXXXXX” Challenges and Implementation
II. Site “XXXXXXXX” Challenges and Implementation
III. Site “XXXXXXXX” Challenges and Implementation
IV. Bibliography
Site “XXXXXXXXXX” Challenge and Implementation
(Provide a section for each site, as suggested in your table of
contents.)Site Details and Challenges (Summary)
Here, you will simply summarize the site requirements and/or
challenges you are attempting to overcome. You will not need
to implement solutions or discuss your approach at this point.
This information is provided to you and can simply be
organized and restated as you understand it. Think of this area
as what needs to be corrected. Suggested length would be one or
two paragraphs.
Sample text:
As described in the scenario, the xUMUC site was developed
without any VLAN structure, and administrators have found the
need to isolate broadcast traffic from a layer-2 perspective.Site
Solution
(s) and Technologies
With the challenges stated, you will be able to clearly define
your approach to solving those challenges and can state the
technologies you will be implementing. Be sure to use this area
to justify your approach and selection of technologies as well.
The specific length and details of this area will vary based on
the specifics and depth of the challenge you are facing. Your
justification would be your selection of a specific technology or
approach over another and why you chose the approach you are
taking. Show off your knowledge in the foundational skills
here!
Sample text:
In order to relieve the administrative tasks surrounding the
implementation of manual IP addressing per device, we will
configure and implement a DHCP (dynamic host configuration
protocol) server, per site requirements. The DHCP allows for
devices to identify, request and implement IP configurations as
well as other settings….
Since this area may call for facts and details around
technologies and approaches, you will most likely find yourself
using in-text citations, which would appear as follows:
Open Shortest Path First is an open standard routing protocol
that’s been implemented by a wide variety of network vendors,
including Cisco [1].Sample Configuration
Understanding the technologies will satisfy a portion of the
documents' requirements. You will also need to display how the
solutions you are suggesting would be implemented. This will
include the specific commands used to configure the devices.
Instructions will state when sample configurations are required,
and any sample configurations should be limited to the devices
provided, per the site topology. Device syntax to be used can be
found in your training suite, TestOut’s LabSim. Show off your
technical competency here!
Sample text:
Sample Device Configuration 1Supporting Tables/Diagrams
When structuring solutions per certain sites, you may find it
helpful or even necessary to structure information with tables
and/or diagrams. These items can be used to support and display
your understood solutions located in the “Site

More Related Content

Similar to Cisco Network Proposal Part 1 Device and STP Configurations

Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ questionsufi1248
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxgalerussel59292
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
 
Untangling the Knots in Your Digitization Implementation
Untangling the Knots in Your Digitization ImplementationUntangling the Knots in Your Digitization Implementation
Untangling the Knots in Your Digitization ImplementationSafetyChain Software
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationAmir Jafari
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_PresentationJoseph Baca
 
operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS devicescooby_doo
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
 
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMHamesKellor
 
Next Generation Campus Switching: Are You Ready
Next Generation Campus Switching: Are You ReadyNext Generation Campus Switching: Are You Ready
Next Generation Campus Switching: Are You ReadyCisco Canada
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rulesFreddy Buenaño
 
Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.comWilliamsTaylor65
 
Manual cisco 2950
Manual cisco 2950Manual cisco 2950
Manual cisco 2950liviuisr
 
Innovation in SDN Tools and Platforms
Innovation in SDN Tools and PlatformsInnovation in SDN Tools and Platforms
Innovation in SDN Tools and PlatformsUmesh Krishnaswamy
 

Similar to Cisco Network Proposal Part 1 Device and STP Configurations (20)

Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
 
CCNA Icnd110 s04l04
CCNA Icnd110 s04l04CCNA Icnd110 s04l04
CCNA Icnd110 s04l04
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
 
En35793797
En35793797En35793797
En35793797
 
Rsockets ofa12
Rsockets ofa12Rsockets ofa12
Rsockets ofa12
 
PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)
 
Untangling the Knots in Your Digitization Implementation
Untangling the Knots in Your Digitization ImplementationUntangling the Knots in Your Digitization Implementation
Untangling the Knots in Your Digitization Implementation
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
 
3DConsulting_Presentation
3DConsulting_Presentation3DConsulting_Presentation
3DConsulting_Presentation
 
Tp link error codes
Tp link error codesTp link error codes
Tp link error codes
 
operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS device
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docx
 
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
 
Next Generation Campus Switching: Are You Ready
Next Generation Campus Switching: Are You ReadyNext Generation Campus Switching: Are You Ready
Next Generation Campus Switching: Are You Ready
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.com
 
Manual cisco 2950
Manual cisco 2950Manual cisco 2950
Manual cisco 2950
 
Innovation in SDN Tools and Platforms
Innovation in SDN Tools and PlatformsInnovation in SDN Tools and Platforms
Innovation in SDN Tools and Platforms
 

More from clarebernice

Consider the vision for a successful Southwest Transit marketing tea.docx
Consider the vision for a successful Southwest Transit marketing tea.docxConsider the vision for a successful Southwest Transit marketing tea.docx
Consider the vision for a successful Southwest Transit marketing tea.docxclarebernice
 
Consider the various ways to create effective communication in teams.docx
Consider the various ways to create effective communication in teams.docxConsider the various ways to create effective communication in teams.docx
Consider the various ways to create effective communication in teams.docxclarebernice
 
consider the unique and varied forms of slaveryenslavement in Afric.docx
consider the unique and varied forms of slaveryenslavement in Afric.docxconsider the unique and varied forms of slaveryenslavement in Afric.docx
consider the unique and varied forms of slaveryenslavement in Afric.docxclarebernice
 
Consider the types of digital technology advances that exist and how.docx
Consider the types of digital technology advances that exist and how.docxConsider the types of digital technology advances that exist and how.docx
Consider the types of digital technology advances that exist and how.docxclarebernice
 
Consider the two following statements Photosynthesis and cellular .docx
Consider the two following statements Photosynthesis and cellular .docxConsider the two following statements Photosynthesis and cellular .docx
Consider the two following statements Photosynthesis and cellular .docxclarebernice
 
Consider the study on Ethnography you described last week, Remind us.docx
Consider the study on Ethnography you described last week, Remind us.docxConsider the study on Ethnography you described last week, Remind us.docx
Consider the study on Ethnography you described last week, Remind us.docxclarebernice
 
Consider the role of HR in a rapidly-changing world. What cha.docx
Consider the role of HR in a rapidly-changing world. What cha.docxConsider the role of HR in a rapidly-changing world. What cha.docx
Consider the role of HR in a rapidly-changing world. What cha.docxclarebernice
 
Consider the scenarios involving the unwilling moral agents of J.docx
Consider the scenarios involving the unwilling moral agents of J.docxConsider the scenarios involving the unwilling moral agents of J.docx
Consider the scenarios involving the unwilling moral agents of J.docxclarebernice
 
Consider the scenario below.A toxic waste dump company wants to .docx
Consider the scenario below.A toxic waste dump company wants to .docxConsider the scenario below.A toxic waste dump company wants to .docx
Consider the scenario below.A toxic waste dump company wants to .docxclarebernice
 
Consider the role of interest groups in the policy-making process, w.docx
Consider the role of interest groups in the policy-making process, w.docxConsider the role of interest groups in the policy-making process, w.docx
Consider the role of interest groups in the policy-making process, w.docxclarebernice
 
Consider the role of stakeholders in addressing a health problem a.docx
Consider the role of stakeholders in addressing a health problem a.docxConsider the role of stakeholders in addressing a health problem a.docx
Consider the role of stakeholders in addressing a health problem a.docxclarebernice
 
Consider the quote by Adam Fuss in this module in which he describes.docx
Consider the quote by Adam Fuss in this module in which he describes.docxConsider the quote by Adam Fuss in this module in which he describes.docx
Consider the quote by Adam Fuss in this module in which he describes.docxclarebernice
 
Consider the obstacles that Phoenix Jackson had to overcome on h.docx
Consider the obstacles that Phoenix Jackson had to overcome on h.docxConsider the obstacles that Phoenix Jackson had to overcome on h.docx
Consider the obstacles that Phoenix Jackson had to overcome on h.docxclarebernice
 
Consider the nurse leader’s role in achieving the IHI Quadruple Ai.docx
Consider the nurse leader’s role in achieving the IHI Quadruple Ai.docxConsider the nurse leader’s role in achieving the IHI Quadruple Ai.docx
Consider the nurse leader’s role in achieving the IHI Quadruple Ai.docxclarebernice
 
Consider the music business as a supply network. How has music d.docx
Consider the music business as a supply network. How has music d.docxConsider the music business as a supply network. How has music d.docx
Consider the music business as a supply network. How has music d.docxclarebernice
 
Consider the mean of a cluster of objects from a binary transact.docx
Consider the mean of a cluster of objects from a binary transact.docxConsider the mean of a cluster of objects from a binary transact.docx
Consider the mean of a cluster of objects from a binary transact.docxclarebernice
 
Consider the importance of using a variety of assessments in the.docx
Consider the importance of using a variety of assessments in the.docxConsider the importance of using a variety of assessments in the.docx
Consider the importance of using a variety of assessments in the.docxclarebernice
 
Consider the importance of visuals in connecting with an audienc.docx
Consider the importance of visuals in connecting with an audienc.docxConsider the importance of visuals in connecting with an audienc.docx
Consider the importance of visuals in connecting with an audienc.docxclarebernice
 
Consider the imagery you created in your mind as you interacted with.docx
Consider the imagery you created in your mind as you interacted with.docxConsider the imagery you created in your mind as you interacted with.docx
Consider the imagery you created in your mind as you interacted with.docxclarebernice
 
Consider the followingContrast Soviet and post-Soviet migration.docx
Consider the followingContrast Soviet and post-Soviet migration.docxConsider the followingContrast Soviet and post-Soviet migration.docx
Consider the followingContrast Soviet and post-Soviet migration.docxclarebernice
 

More from clarebernice (20)

Consider the vision for a successful Southwest Transit marketing tea.docx
Consider the vision for a successful Southwest Transit marketing tea.docxConsider the vision for a successful Southwest Transit marketing tea.docx
Consider the vision for a successful Southwest Transit marketing tea.docx
 
Consider the various ways to create effective communication in teams.docx
Consider the various ways to create effective communication in teams.docxConsider the various ways to create effective communication in teams.docx
Consider the various ways to create effective communication in teams.docx
 
consider the unique and varied forms of slaveryenslavement in Afric.docx
consider the unique and varied forms of slaveryenslavement in Afric.docxconsider the unique and varied forms of slaveryenslavement in Afric.docx
consider the unique and varied forms of slaveryenslavement in Afric.docx
 
Consider the types of digital technology advances that exist and how.docx
Consider the types of digital technology advances that exist and how.docxConsider the types of digital technology advances that exist and how.docx
Consider the types of digital technology advances that exist and how.docx
 
Consider the two following statements Photosynthesis and cellular .docx
Consider the two following statements Photosynthesis and cellular .docxConsider the two following statements Photosynthesis and cellular .docx
Consider the two following statements Photosynthesis and cellular .docx
 
Consider the study on Ethnography you described last week, Remind us.docx
Consider the study on Ethnography you described last week, Remind us.docxConsider the study on Ethnography you described last week, Remind us.docx
Consider the study on Ethnography you described last week, Remind us.docx
 
Consider the role of HR in a rapidly-changing world. What cha.docx
Consider the role of HR in a rapidly-changing world. What cha.docxConsider the role of HR in a rapidly-changing world. What cha.docx
Consider the role of HR in a rapidly-changing world. What cha.docx
 
Consider the scenarios involving the unwilling moral agents of J.docx
Consider the scenarios involving the unwilling moral agents of J.docxConsider the scenarios involving the unwilling moral agents of J.docx
Consider the scenarios involving the unwilling moral agents of J.docx
 
Consider the scenario below.A toxic waste dump company wants to .docx
Consider the scenario below.A toxic waste dump company wants to .docxConsider the scenario below.A toxic waste dump company wants to .docx
Consider the scenario below.A toxic waste dump company wants to .docx
 
Consider the role of interest groups in the policy-making process, w.docx
Consider the role of interest groups in the policy-making process, w.docxConsider the role of interest groups in the policy-making process, w.docx
Consider the role of interest groups in the policy-making process, w.docx
 
Consider the role of stakeholders in addressing a health problem a.docx
Consider the role of stakeholders in addressing a health problem a.docxConsider the role of stakeholders in addressing a health problem a.docx
Consider the role of stakeholders in addressing a health problem a.docx
 
Consider the quote by Adam Fuss in this module in which he describes.docx
Consider the quote by Adam Fuss in this module in which he describes.docxConsider the quote by Adam Fuss in this module in which he describes.docx
Consider the quote by Adam Fuss in this module in which he describes.docx
 
Consider the obstacles that Phoenix Jackson had to overcome on h.docx
Consider the obstacles that Phoenix Jackson had to overcome on h.docxConsider the obstacles that Phoenix Jackson had to overcome on h.docx
Consider the obstacles that Phoenix Jackson had to overcome on h.docx
 
Consider the nurse leader’s role in achieving the IHI Quadruple Ai.docx
Consider the nurse leader’s role in achieving the IHI Quadruple Ai.docxConsider the nurse leader’s role in achieving the IHI Quadruple Ai.docx
Consider the nurse leader’s role in achieving the IHI Quadruple Ai.docx
 
Consider the music business as a supply network. How has music d.docx
Consider the music business as a supply network. How has music d.docxConsider the music business as a supply network. How has music d.docx
Consider the music business as a supply network. How has music d.docx
 
Consider the mean of a cluster of objects from a binary transact.docx
Consider the mean of a cluster of objects from a binary transact.docxConsider the mean of a cluster of objects from a binary transact.docx
Consider the mean of a cluster of objects from a binary transact.docx
 
Consider the importance of using a variety of assessments in the.docx
Consider the importance of using a variety of assessments in the.docxConsider the importance of using a variety of assessments in the.docx
Consider the importance of using a variety of assessments in the.docx
 
Consider the importance of visuals in connecting with an audienc.docx
Consider the importance of visuals in connecting with an audienc.docxConsider the importance of visuals in connecting with an audienc.docx
Consider the importance of visuals in connecting with an audienc.docx
 
Consider the imagery you created in your mind as you interacted with.docx
Consider the imagery you created in your mind as you interacted with.docxConsider the imagery you created in your mind as you interacted with.docx
Consider the imagery you created in your mind as you interacted with.docx
 
Consider the followingContrast Soviet and post-Soviet migration.docx
Consider the followingContrast Soviet and post-Soviet migration.docxConsider the followingContrast Soviet and post-Soviet migration.docx
Consider the followingContrast Soviet and post-Soviet migration.docx
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Cisco Network Proposal Part 1 Device and STP Configurations

  • 1. Cisco Network Proposal Part 1 by Jesse Holmes Submission dat e : 12- No v- 2017 09:15AM (UT C- 0500) Submission ID: 87 7 204 057 File name : Cisco _Netwo rk_Pro po sal_Part_1_Updated_Jesse_Ho lmes.do cx (21.17 K) Word count : 7 58 Charact e r count : 5134 90% SIMILARIT Y INDEX 22%
  • 2. INT ERNET SOURCES 0% PUBLICAT IONS 90% ST UDENT PAPERS 1 90% Exclude quo tes Of f Exclude biblio graphy Of f Exclude matches Of f Cisco Network Proposal Part 1 ORIGINALITY REPORT PRIMARY SOURCES Submitted to University of Maryland, University College St udent Paper Cisco Network Proposal Part 1by Jesse HolmesCisco Network Proposal Part 1ORIGINALITY REPORTPRIMARY SOURCES Jesse HolmesComment by Jeanette: IEEE format is required for
  • 3. this assignment. IEEE include a Table of Content, Introduction and Abstract. November 12th 2017 CMIT 350 7982: Interconnecting Cisco Devices Professor Jeanette Boyd Cisco Network Proposal Part 1: Springfield Device and STP Configurations Springfield Site Device and STP Configurations The Springfield site requirements are innovating device hostnames by implementing, banners and secure device passwords. These are all basic initial configurations that should be made prior to connecting the switch. Spanning-Tree Protocol prevents loops from forming when switches or bridges are interconnected. The advantages are that you can add another link between the switches or bridges that provides fault tolerance. The link can also provide port bundling that will increase the speed by twice its capacity. Whenever you are configuring spanning tree after the adding the additional link, it stops switching loop by making sure there is only one active path between the links. Switching loop will keep the circling around the network which can take down. Since the administrators are having some problems placing switch 1 as the root, there will be a reconfiguration to the spanning tree
  • 4. configurations. The mode best suited for the environment will be chosen. Also, there will a test of multiple security measures that can be implemented to protect the devices. Comment by Jeanette: Why? Don’t just make statements, explain why they are the basic initial configurations that should be made prior to connecting the switch? These have nothing to do with the switches operation so why do you think this?Comment by Jeanette: What do you mean by “the best mode suited for the environment will be chosen? Device Configurations To correctly word Message of the Day and login banners, it is best to consult with the legal department first before proceeding. Once the verbiage is approved and carefully considered, it can be implemented into these banners. Switch 2 is configured as the root. In order to fix the problem the administrators are having, there will need to be configuration of switch 1 by changing the priority number to force it to become the root switch. Comment by Jeanette: Why does someone need the MOTD? Why problem are the administrators having? Currently PVST is enabled on switches 1, 3 and 4 while Switch 2 has RSTP enabled. Spanning tree protocol will be changed on switches 1, 3 and 4 from the default mode of PVST to RSTP in order to take advantage of the benefits of RSTP. RSTP improves processing times by using port roles, using a method of sending messages between bridges on designated ports, calculating alternate paths, and using faster timers. This feature ensures that a bridging loop cannot form, because the switch's shutting down the port removes the possibility for a loop forming. Root guard is a feature that will be enabled to prevent unauthorized switches from becoming the root bridge. Uplink Fast will be disabled because RSTP has a similar function built into it that will work the same.Comment by Jeanette: Way too many acronyms! Don’t assume that your reader will know what these acronyms meanComment by Jeanette: Don’t spend a lot of time providing definitions about these protocols, this is probably
  • 5. why your Turnitin grade is so high. Why are you recommending that the admins implement change from PVST to RSTP? Which of the identified problems will this fix. Message of the Day banner:Comment by Jeanette: You have not provided any explanation of Banner MOTD, what value it will provide the Admins. Springfield – Switch1 >enable Springfield – Switch1 #configure terminal Springfield – Switch1 (config)#banner motd Unauthorized Use or Access Prohibited: You must have permission to access or configure this device. All activities performed on this device may be logged, and violations of this policy may result in disciplinary action, and| may be reported to law enforcement authorities. There is no right to privacy on this device.# [4]Comment by Jeanette: Banner MOTD requires delimiters to indicate the beginning and end of a Banner. Where are your delimiters? This is something you would to explain to your readers. Springfield – Switch1 (config)#exit Springfield – Switch1#copy run start Login banner:Comment by Jeanette: What’s the difference between a Banner MOTD and a Login Banner and why would the Admins want to use 1 or both at the same time? Springfield – Switch1>enable Springfield – Switch1#conf t Springfield – Switch1(config)#banner login # Only administrators are allowed access. Please login now.# Springfield – Switch1(config)#exit Springfield – Switch1#copy run start Implementing device passwords on both console port and VTY:Comment by Jeanette: Don’t assume that the reader will know that your are configuring Telnet. You don’t provide any explanations for these configurations. Why do the admins want to configure Telnet?
  • 6. Springfield – Switch1>enable Springfield – Switch1#configure terminal Springfield – Switch1 (config)#line con 0 Springfield – Switch1 (config-line)#password $UpeR$eCrEt Springfield – Switch1 (config-line)#login Springfield – Switch1 (config-line)#line vty 1 Springfield – Switch1 (config-line)#password $UpeR$eCrEt Springfield – Switch1 (config-line)#login Springfield – Switch1 (config-line)#exit Springfield – Switch1 (config)#service password-encryption Springfield – Switch1 (config)#exit Implementing RSPT on the switch: Springfield – Switch1>enable Springfield – Switch1#conf t Springfield – Switch1(config)#spanning-tree mode rapid-pvst Springfield – Switch1(config)#spanning-tree vlan 1 priority 4096 Springfield – Switch1(config)#no spanning-tree uplinkfast Springfield – Switch1(config)#int range gi0/1 – 2 Springfield – Switch1(config-if)#spanning-tree guard root Springfield – Switch1(config)#int range gi0/96Springfield – Switch1(config-if)#spanning-tree bpduguard enable Springfield – Switch1(config)#end Springfield – Switch1#copy run start Supporting Tables/Diagrams DevicesComment by Jeanette: What is the importance of this? What value do they bring to the Admins? Which objective are you meeting?All tables must be labeled and referenced somewhere in your document. Hostname Router
  • 7. Springfield - Router Switch Springfield – SW1 Switch Springfield – SW2 Switch Springfield – SW3 Switch Springfield – SW4 Banner Template Message of the day (MOTD) Unauthorized Use or Access Prohibited| You must have permission to access this device. All activities performed on this device may be logged, and violations of this policy may result in disciplinary action, and may be reported to law enforcement authorities. Login Only administrator users are allowed access. Please login now.
  • 8. ReferencesComment by Jeanette: Where were these used in the body of your text? Cisco, "Spanning Tree Protocol," Cisco, [Online]. Available: http://www.cisco.com/c/en/us/tech/lan-switching/spanning-tree- protocol/index.html. [Accessed 5 October 2015]. S. Hogg, "Core Networking and Security," Network World, 2 January 2013. [Online]. Available: http://www.networkworld.com/article/2223757/cisco- subnet/cisco-subnet-9-common-spanning-tree-mistakes.html. [Accessed 6 October 2015]. J. Menga, in CCNP Practical Studies: Switching, Indianapolis, Cisco Press, 2004, p. 984. Cisco Networking Center, "How to setup login banner on Cisco devices (router, switch, asa) - example," [Online]. Available: http://cisconetworkingcenter.blogspot.com/2013/02/how-to- setup-login-banner-on-cisco.html. TestOut Corporation, "STP Design and Implementation Facts," TestOut Corporation, [Online]. Available: http://testoutlivecontent.blob.core.windows.net/client-v5-1-10- 160/startlabsim.html?culture=en-us&uselivecontent=true. [Accessed 7 October 2015].
  • 9. SpringfieldSw1#show spanning-tree active VLAN0001 Spanning tree enabled protocol ieee Root ID Priority 16385 Address 0050.0F3B.03DA Cost 4 Port 01(GigabitEthernet0/1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 32769 (priority 32768 sys-id-ext 1) Address 000C.CF6B.86EE Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 20
  • 10. Interface Role Sts Cost Prio.Nbr Type ---------------- ---- --- --------- -------- ------------------------------- - Gi0/2 Desg LRN 4 128.26 P2p Gi0/1 Root LRN 4 128.25 P2p SpringfieldSw1# SpringfieldSw1#show spanning-tree summary Switch is in pvst mode Root bridge for: Extended system ID is enabled Portfast Default is disabled PortFast BPDU Guard Default is disabled Portfast BPDU Filter Default is disabled Loopguard Default is disabled EtherChannel misconfig guard is disabled UplinkFast is disabled
  • 11. BackboneFast is disabled Configured Pathcost method used is short Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0001 0 0 0 2 2 ---------------------- -------- --------- -------- ---------- ---------- 5 vlans 0 0 0 2 2 SpringfieldSw1# SpringfiledSw3#show spanning-tree active VLAN0001 Spanning tree enabled protocol ieee Root ID Priority 16385 Address 0050.0F3B.03DA Cost 4 Port 02(GigabitEthernet0/2)
  • 12. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 32769 (priority 32768 sys-id-ext 1) Address 0090.21C4.B04C Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 20 Interface Role Sts Cost Prio.Nbr Type ---------------- ---- --- --------- -------- ------------------------------- - Gi0/1 Desg FWD 4 128.25 P2p Gi0/2 Root FWD 4 128.26 P2p SpringfiledSw3# SpringfiledSw3#show spanning-tree summary Switch is in pvst mode
  • 13. Root bridge for: Extended system ID is enabled Portfast Default is disabled PortFast BPDU Guard Default is disabled Portfast BPDU Filter Default is disabled Loopguard Default is disabled EtherChannel misconfig guard is disabled UplinkFast is disabled BackboneFast is disabled Configured Pathcost method used is short Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0001 0 0 0 2 2 ---------------------- -------- --------- -------- ---------- ---------- 5 vlans 0 0 0 2 2
  • 14. SpringfiledSw3# SpringfieldSw2#show spanning-tree active VLAN0001 Spanning tree enabled protocol rstp Root ID Priority 16385 Address 0050.0F3B.03DA This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 16385 (priority 16384 sys-id-ext 1) Address 0050.0F3B.03DA Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 20 Interface Role Sts Cost Prio.Nbr Type ---------------- ---- --- --------- -------- ------------------------------- -
  • 15. Gi0/1 Desg FWD 4 128.25 P2p Gi0/2 Desg FWD 4 128.26 P2p SpringfieldSw2# SpringfieldSw2#show spanning-tree summary Switch is in rapid-pvst mode Root bridge for: default Extended system ID is enabled Portfast Default is disabled PortFast BPDU Guard Default is disabled Portfast BPDU Filter Default is disabled Loopguard Default is disabled EtherChannel misconfig guard is disabled UplinkFast is disabled BackboneFast is disabled Configured Pathcost method used is short
  • 16. Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0001 2 0 0 0 2 ---------------------- -------- --------- -------- ---------- ---------- 5 vlans 2 0 0 0 2 SpringfieldSw2# SpringfieldSw4#show spanning-tree active VLAN0001 Spanning tree enabled protocol ieee Root ID Priority 16385 Address 0050.0F3B.03DA Cost 8 Port 01(GigabitEthernet0/1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
  • 17. Bridge ID Priority 32769 (priority 32768 sys-id-ext 1) Address 00E0.B04D.D00E Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 20 Interface Role Sts Cost Prio.Nbr Type ---------------- ---- --- --------- -------- ------------------------------- - Gi0/1 Root FWD 4 128.25 P2p Gi0/2 Altn BLK 4 128.26 P2p SpringfieldSw4# SpringfieldSw4#show spanning-tree summary Switch is in pvst mode Root bridge for: Extended system ID is enabled Portfast Default is disabled
  • 18. PortFast BPDU Guard Default is disabled Portfast BPDU Filter Default is disabled Loopguard Default is disabled EtherChannel misconfig guard is disabled UplinkFast is disabled BackboneFast is disabled Configured Pathcost method used is short Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0001 1 0 0 1 2 ---------------------- -------- --------- -------- ---------- ---------- 5 vlans 1 0 0 1 2 SpringfieldSw4#
  • 19. 11/7/2017 Cisco Network Proposal Part 1 -Submit Files - CMIT 350 7982 Interconnecting Cisco Devices (2178) - UMUC Learning Management System ~~ UniversiryaFMarytand CMIT 350 7982 Interconnecting Cisco Devices (2178) University College Course Home Content Discussions Assignments My Tools Resources Classlist Help Cisco Network Proposal Part 1 -Submit Files Hide Submission Folderinformation Submission Folder Cisco Network Proposal Part 1 Instructions You have the opportunity to resubmit this assignment for feedback before receiving a final grade. Remember to submit your paper to Turnitln first before submitting it here. Hide Rubrics Rubric Name: Cisco Network Proposal Part 1
  • 20. ~s~ig~rur=. ~xeell~~ai: Oustanding Aceeptable (Minimally Proficient) Needs Improvement : fVe~cis Sie~niF~an~ Improveanent Missing ar Unaccepi Assess the need ' - for network Provided an I Provided an Provided a description of the Provided a Identified the appropriate The appropriate excellent outstanding appropriate device/technology description of the device/technology device/technoloc (hardware to description of the description of the configuration and management appropriate configuration and management configuration an support the appropriate appropriate information for alL sites. device/technology information far all sites management organization. device technology device technology ~ configuration, but ~ technical, but tacked detail 'information for ally configuration and configuration and ,lacked management and/or was not well supported were off topic or fa management management i i ! information for all for both. to provide required information for all information for aU sites. of detail. sites. sites. ~i ~PI~2Yld
  • 21. _... __ - ~XC~~~211~L Ouse~nc3iorg Aese~4abl.e (dNir~ienal~y €~va4i~ienb:) {~G'tii~5 ~iPiE➢[email protected]"[email protected]: {~L'~'6,~5 ~I~Y91~IC~Yi''+~ 0f~i~3Y~VL'6'fiG'f1t ' f~lsSlf9f~ SPY P)i4%;.9EC~~71 Assess the need [car nrttNx~rk: Provided excellent Provided Provided a description of the Provided protocol P~~iided protocol The protocol protocol outstanding protocol configuration configuration wnfigu~dtion~~~~'ormationfor configuration i services to configuration protocol information for all sites to information for atl most but not all sites to include !, information for atl support the information for aU configuration include STP, VLAN, ROS, and sites to include STP, STP, VLAN, ROS, and DHCP. to include STP, VL organization sites to include ', information for all DHCP. VLAN, ROS, and ~ ROS, and DHCP wer • STP, VLAN, ROS, sites to include DHCP, but the ;topic or failed to prc and DHCP. STP, VLAN, ROS, '~ details were not 'required level of de and DHCP. ~ correct ~ Criteria Excellene Q~~standing ~ Acceptable (Minimaltp Proficient) P",eels Improvement Needs Significant
  • 22. Improverra~n~'Missing or Unaccepl Apply and ~ implement Provided an ~ Provided an Provided a description of the the Provided a Listed some security-related The security-relat excellent outstanding appropriate security-related description of the protocol configuration protocolconflgural appropriate description of the description of the protocol configuration appropriate security- information, but was not information were security appropriate i appropriate i information. related protocol complete and lacked topic or failed to prc measures on a security-related security-related I configuration appropriate level of detail, required level of de (network to li I protocol protocol information, but 'i support the configuration configuration lacked supporting i organization information. ~i information. details. Criteria i Excellent Oustanding ' NCLL'~$~1bL~ (P~NIPiIGV1~lI~ ~YQi~ICICPik, f~8eeds Improvemr~rotc P3e~cie ~ignirfiear~& Im~rodemen& WVissing or Unaeeep9 Follow proper ' I~ procedures and
  • 23. Provided an Provided an Provided a description of the best Provided a Attempted but lacked a The best practices excellent outstanding practices in implementing the description of the I description and justification of implementing th protocols in description of the description of the network design, and justification. best practices in ~ the best practices in network design wer completing IT- I best practices in best practices in implementing the li implementing the network topic or failed to prc it related tasks !implementing the implementing the i network design, but design. required Level of de network design, network design, I lacked the ' ', and justification. and justification. I appropriate ~I justification. ~i Criteria Excellent ~ Oustanding Acceptable (Minimally Proficient) ~ Pdeeds Ompr~veroienc feeds Signifiea~~~ improveenenc Missing or Unaceepl Develop a ------ - - Provided an Provided an Provided a description of Provided a Attempted a description of the The subnetting ai etails w Submit Cancel ~r failed
  • 24. https://learn.umuc.edu/d21/Ims/dropbox/user/folder_submit_file s.d21?db=511302&grpid=0&isprv=0&bp=0&ou=253642 1/2 11/7/2017 Cisco Network Proposal Part 1 -Submit Files - CMIT 350 7982 Interconnecting Cisco Devices (2178) - UMUC Learning Management System organizational needs CriYerd~ ~;;~elle~~S: ,.,ending Acceptable (P9ir~irnaLQy P6's~Ga:ieiatp f`.9ee~ls ~rsrpr~vrorraenc Needs 5ia~nificant Improvemene Mi~sirie~ was V ~ -.~~~~~t39 Use of Iii I Authoritative Work contains a Work contains a Work contains a reference list Work contains a Work attempts to credit sources ~ Reference list is mis reference list reference list containing entries for all cited reference List but demonstrates a Work demonstrate ~ Sources / containing entries containing entries sources. No more than 5 minor containing entries fundamental failure to overall failure t< Resources for a0. cited for all cited errors in IEEE format for in-text for cited sources. ,understand and apply the IEEE incorporate and/~
  • 25. sources. Reference sources. One or two citations and/or reference List Work contains no formatting standard. credit authoritati~ list entries and in- minor errors in entries. The description more than 5 minor sources for informa The descriptiontext citations are IEEE format for in- appropriately used information errors in IEEE format appropriately used in the pape ~~ correctly formatted text citations ~ from 3 or more authoritative for in-text citations used information from 1 or using the and/or reference ' sources, i.e. joumat articles, and/or reference list more authoritative sources, i.e. appropriate IEEE List entries. The industry or trade publications, entries. The joumaL articles, industry or style for each type description ~ news articles, industry or description trade publications, news of resource. The appropriately used government white papers and appropriately used articles, industry or description information from 4 authoritative Web sites. information from 2 government white papers and
  • 26. appropriately used or more or more authoritative Web sites. information from 5 authoritative authoritative or more sources, i.e.journaL' sources, i.e. journal ', authoritative articles, industry or articles, industry or ~ sources, i.e. journal trade publications, ' trade publications, ' articles, industry or news articles, news articles, i~ trade publications, ' industry or industry or newsartides, 'government white government white industry or papers and papers and government white authoritative Web authoritative Web papers and sites. sites. authoritative Web ~ ~sites. €;uo~~~aH •celAene O~astandirrg i Acceptable (Rlinimally Peofficien~) --- fw~~ds Omprovement Needs Significant Improverra~n4 NJu:~ong or Unaccep9 Satisfy - - — No formatting, Work contains Errors in formatting, spelling,
  • 27. Submitted work has Submitted work is difficult to No work submitted standards of grammar, spelling, minor errors in grammar, or punctuation which numerous errors in read /understand and has this assignment writing style or unctuation P formattin 9. detract from rofessionalP formattin s elfin9, P 9, si nificant errors in formattin9 9, and errors. grammar, spelling i appearance of the submitted grammar, or spelling, grammar, punctuation, grammatical or punctuation I work. punctuation. Work is or word usage. correctness i which do not unprofessional in significantly impact appearance. ~ professional ~ appearance. I Overall Score Excellent Submit Files Oustanding Acceptable (Minimally Proficient) Needs Improvement Needs Significant Improvement Missing or Unacept; Files to submit
  • 28. (0) files) to submit After uploading, you must click Submit to complete the submission. Add a File Record Audio Comments - ~ ~ ParagraE ~' Cancel L— https://learn.umuc.edu/d21/Ims/dropbox/user/folder_submit_file s.d21?db=511302&grpid=0&isprv=0&bp=0&ou=253642 2/2 CMIT 350 WAN and SOHO Skills ImplementationUse this document as a guide for formatting and organizing your CMIT 350 Skills Implementation challenge.Title Page Professionalism will be key to your success and advancement in your academic and professional career. Use the title page to identify relevant information such as your name, the course, professor, and submission/completion date.Document Index/Contents Organization will allow your document to be divided into key areas of consideration and allows an overall structure to be placed over the submission.Sample text: I. Site “XXXXXXXX” Challenges and Implementation II. Site “XXXXXXXX” Challenges and Implementation III. Site “XXXXXXXX” Challenges and Implementation IV. Bibliography Site “XXXXXXXXXX” Challenge and Implementation
  • 29. (Provide a section for each site, as suggested in your table of contents.)Site Details and Challenges (Summary) Here, you will simply summarize the site requirements and/or challenges you are attempting to overcome. You will not need to implement solutions or discuss your approach at this point. This information is provided to you and can simply be organized and restated as you understand it. Think of this area as what needs to be corrected. Suggested length would be one or two paragraphs. Sample text: As described in the scenario, the xUMUC site was developed without any VLAN structure, and administrators have found the need to isolate broadcast traffic from a layer-2 perspective.Site Solution (s) and Technologies With the challenges stated, you will be able to clearly define your approach to solving those challenges and can state the technologies you will be implementing. Be sure to use this area to justify your approach and selection of technologies as well. The specific length and details of this area will vary based on the specifics and depth of the challenge you are facing. Your justification would be your selection of a specific technology or approach over another and why you chose the approach you are taking. Show off your knowledge in the foundational skills here! Sample text:
  • 30. In order to relieve the administrative tasks surrounding the implementation of manual IP addressing per device, we will configure and implement a DHCP (dynamic host configuration protocol) server, per site requirements. The DHCP allows for devices to identify, request and implement IP configurations as well as other settings…. Since this area may call for facts and details around technologies and approaches, you will most likely find yourself using in-text citations, which would appear as follows: Open Shortest Path First is an open standard routing protocol that’s been implemented by a wide variety of network vendors, including Cisco [1].Sample Configuration Understanding the technologies will satisfy a portion of the documents' requirements. You will also need to display how the solutions you are suggesting would be implemented. This will include the specific commands used to configure the devices. Instructions will state when sample configurations are required, and any sample configurations should be limited to the devices provided, per the site topology. Device syntax to be used can be found in your training suite, TestOut’s LabSim. Show off your technical competency here! Sample text:
  • 31. Sample Device Configuration 1Supporting Tables/Diagrams When structuring solutions per certain sites, you may find it helpful or even necessary to structure information with tables and/or diagrams. These items can be used to support and display your understood solutions located in the “Site