(1) What is the purpose of a VLAN trunk?
Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects
major switching centers or nodes in communication system. The transmitted data can be voice(as
in the conventinal telephone system) data, computer programs, images, video or control signals.
Trunks are used to interconnect switches to form nerwors, and to interconnect local area
nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often
consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and
the number of channels that can be accommodated. A trunk can also be a broadband wireless
link. The use and management of trunks in a communications system is known as trunking. It
minimizes the number of physical signal paths, and thus the total amount of cable hardware,
required to serve a given number of suscribers in a nerwork.
In Cisco networks, trunking is special function can be assigned to a port, making thar port
capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a
port is called a trunk port, in contrast to an access port, which carries traffic only to and from the
specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL
tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended
VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and
identiying markers are therefore unnecessary.
Trunking:-
1)VLANs are local to each swithc\'s database, and VLAN infromation is not passed between
switches.
2)Trunk linksprovies VLAN identification for frames travelling between switches.
3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q
4)certain types of switches can negotiate trunk links.
5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to
carry only specified VLAN traffic.
6)Trunk links must be configured to allow trunking on each end of the link
2)Will a router always choose a static route over an OSPF route?
Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
vectors for path selecation. OSPF propagates link-state advertisments rather than table updates.
Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more
quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication.
Authentiction should be used with all routing protocols when possible because route
redistribution between OSPF and other protocols when possible because route redistribution
between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
routing information. If NAT is used, if OSPF is operating on public and private areas, and if
address filtering is required, then you need to run two OSPF processes—one process for the
public areas and one .
(1) What is the purpose of a VLAN trunkAns) A trunk is a line or .pdf
1. (1) What is the purpose of a VLAN trunk?
Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects
major switching centers or nodes in communication system. The transmitted data can be voice(as
in the conventinal telephone system) data, computer programs, images, video or control signals.
Trunks are used to interconnect switches to form nerwors, and to interconnect local area
nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often
consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and
the number of channels that can be accommodated. A trunk can also be a broadband wireless
link. The use and management of trunks in a communications system is known as trunking. It
minimizes the number of physical signal paths, and thus the total amount of cable hardware,
required to serve a given number of suscribers in a nerwork.
In Cisco networks, trunking is special function can be assigned to a port, making thar port
capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a
port is called a trunk port, in contrast to an access port, which carries traffic only to and from the
specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL
tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended
VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and
identiying markers are therefore unnecessary.
Trunking:-
1)VLANs are local to each swithc's database, and VLAN infromation is not passed between
switches.
2)Trunk linksprovies VLAN identification for frames travelling between switches.
3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q
4)certain types of switches can negotiate trunk links.
5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to
carry only specified VLAN traffic.
6)Trunk links must be configured to allow trunking on each end of the link
2)Will a router always choose a static route over an OSPF route?
Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
vectors for path selecation. OSPF propagates link-state advertisments rather than table updates.
Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more
quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication.
Authentiction should be used with all routing protocols when possible because route
redistribution between OSPF and other protocols when possible because route redistribution
between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
2. routing information. If NAT is used, if OSPF is operating on public and private areas, and if
address filtering is required, then you need to run two OSPF processes—one process for the
public areas and one for the private areas. A router that has interfaces in multiple areas is called
an Area Border Router (ABR). A router that acts as a gateway to redistribute traffic between
routers using OSPF and routers using other routing protocols is called an Autonomous System
Boundary Router (ASBR).
An ABR uses LSAs to send information about available routes to other OSPF routers. Using
ABR type 3 LSA filtering, you can have separate private and public areas with the security
appliance acting as an ABR. Type 3 LSAs (inter-area routes) can be filtered from one area to
other. This lets you use NAT and OSPF together without advertising private networks.
If NAT is employed but OSPF is only running in public areas, then routes to public networks can
be redistributed inside the private network, either as default or type 5 AS External LSAs.
However, you need to configure static routes for the private networks protected by the security
appliance. Also, you should not mix public and private networks on the same security appliance
interface. You can have two OSPF routing processes and one RIP routing process running on the
security appliance at the same time. For more information about enabling and configuring OSPF,
1) Setup
2)Interface
3)Static Neighbor
4) Virtual Link
5)Filtering
6)Redistribution
7)Summary Address
3) What is the network address of 210.36.54.30/22?
Ans) ipcalc takes an IP address and netmask and calculates the resulting broadcast, network,
Cisco wildcard mask, and host range. By giving a second netmask, you can design subnets and
supernets.It is also intended to be a teaching tool and presents the subnetting results as easy-to-
understand binary values.
Enter your netmask(s) in CIDR notation (/25) or dotted decimals (255.255.255.0).
Inverse netmasks are recognized. If you omit the netmask ipcalc uses the default netmask for the
class of your network.
Look at the space between the bits of the addresses: The bits before it are the network part of the
address, the bits after it are the host part. You can see two simple facts: In a network address all
host bits are zero, in a broadcast address they are all set.
The class of your network is determined by its first bits.
If your network is a private internet according to RFC 1918 this is remarked. When displaying
3. subnets the new bits in the network part of the netmask are marked in a different color
The wildcard is the inverse netmask as used for access control lists in Cisco routers.
Do you want to split your network into subnets? Enter the address and netmask of your original
network and play with the second netmask until the result matches your needs.
Solution
(1) What is the purpose of a VLAN trunk?
Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects
major switching centers or nodes in communication system. The transmitted data can be voice(as
in the conventinal telephone system) data, computer programs, images, video or control signals.
Trunks are used to interconnect switches to form nerwors, and to interconnect local area
nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often
consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and
the number of channels that can be accommodated. A trunk can also be a broadband wireless
link. The use and management of trunks in a communications system is known as trunking. It
minimizes the number of physical signal paths, and thus the total amount of cable hardware,
required to serve a given number of suscribers in a nerwork.
In Cisco networks, trunking is special function can be assigned to a port, making thar port
capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a
port is called a trunk port, in contrast to an access port, which carries traffic only to and from the
specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL
tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended
VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and
identiying markers are therefore unnecessary.
Trunking:-
1)VLANs are local to each swithc's database, and VLAN infromation is not passed between
switches.
2)Trunk linksprovies VLAN identification for frames travelling between switches.
3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q
4)certain types of switches can negotiate trunk links.
5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to
carry only specified VLAN traffic.
6)Trunk links must be configured to allow trunking on each end of the link
2)Will a router always choose a static route over an OSPF route?
Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
4. vectors for path selecation. OSPF propagates link-state advertisments rather than table updates.
Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more
quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication.
Authentiction should be used with all routing protocols when possible because route
redistribution between OSPF and other protocols when possible because route redistribution
between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
routing information. If NAT is used, if OSPF is operating on public and private areas, and if
address filtering is required, then you need to run two OSPF processes—one process for the
public areas and one for the private areas. A router that has interfaces in multiple areas is called
an Area Border Router (ABR). A router that acts as a gateway to redistribute traffic between
routers using OSPF and routers using other routing protocols is called an Autonomous System
Boundary Router (ASBR).
An ABR uses LSAs to send information about available routes to other OSPF routers. Using
ABR type 3 LSA filtering, you can have separate private and public areas with the security
appliance acting as an ABR. Type 3 LSAs (inter-area routes) can be filtered from one area to
other. This lets you use NAT and OSPF together without advertising private networks.
If NAT is employed but OSPF is only running in public areas, then routes to public networks can
be redistributed inside the private network, either as default or type 5 AS External LSAs.
However, you need to configure static routes for the private networks protected by the security
appliance. Also, you should not mix public and private networks on the same security appliance
interface. You can have two OSPF routing processes and one RIP routing process running on the
security appliance at the same time. For more information about enabling and configuring OSPF,
1) Setup
2)Interface
3)Static Neighbor
4) Virtual Link
5)Filtering
6)Redistribution
7)Summary Address
3) What is the network address of 210.36.54.30/22?
Ans) ipcalc takes an IP address and netmask and calculates the resulting broadcast, network,
Cisco wildcard mask, and host range. By giving a second netmask, you can design subnets and
supernets.It is also intended to be a teaching tool and presents the subnetting results as easy-to-
understand binary values.
Enter your netmask(s) in CIDR notation (/25) or dotted decimals (255.255.255.0).
Inverse netmasks are recognized. If you omit the netmask ipcalc uses the default netmask for the
5. class of your network.
Look at the space between the bits of the addresses: The bits before it are the network part of the
address, the bits after it are the host part. You can see two simple facts: In a network address all
host bits are zero, in a broadcast address they are all set.
The class of your network is determined by its first bits.
If your network is a private internet according to RFC 1918 this is remarked. When displaying
subnets the new bits in the network part of the netmask are marked in a different color
The wildcard is the inverse netmask as used for access control lists in Cisco routers.
Do you want to split your network into subnets? Enter the address and netmask of your original
network and play with the second netmask until the result matches your needs.