The document describes the initial configuration of two Cisco routers and one switch. It summarizes the steps taken to configure basic settings such as hostname, passwords, interfaces and IP addresses on each device. It also describes creating VLANs 10, 20 and 30 on the switch and assigning ports to each VLAN.
This document contains the output of configuring interfaces on a Cisco router. It shows:
1. The GigabitEthernet 0/0 interface being configured with IP address 192.168.0.130/26 and being brought up.
2. The GigabitEthernet 0/1 interface being configured with an invalid IP address and mask, then being brought up with no IP address configured.
3. Router interface, IP address, and configuration commands being entered to set up the router interfaces.
This document provides instructions for installing the SY-D6IBA motherboard. It begins by listing the necessary hardware needed for installation, including the CPU, memory modules, computer case, power supply, drives, and peripherals. It then describes unpacking the motherboard package and checking for all included items. The document proceeds with a step-by-step guide to installing the CPU into the retention module and mounting the module onto the motherboard. Further steps will cover installing memory, drives, and adding expansion cards before final system assembly.
This document provides a system report for a Windows XP computer named DUVAN. It details the machine's specifications including operating system, processor, memory, storage, graphics card, sound card, and other hardware. All drivers and devices were found to be working properly with no issues reported from hardware tests.
This document contains technical specifications and diagrams for a motherboard. It includes a block diagram of the motherboard components and their connections, as well as pinout diagrams and specifications for the Intel CPU socket and signals. Component details provided include the Intel 865GV chipset, DDR memory support of up to 2GB, PCI and AGP expansion slots, and on-board audio and LAN connectivity.
The document describes the configuration of a Cisco 7200 router. It connects to a Dynamips VM and boots up IOS. It then configures loopback, FastEthernet and static routes. It pings addresses to verify connectivity and traces routes to test routing.
The document contains block diagrams and schematics for the clock generator and memory controller of the Quanta Computer ZE7 motherboard. The clock generator diagram shows the various clock signals generated from the crystal oscillator and PLL, and their routing to different components like the CPU, PCIe, SATA, and memory controller. The memory controller diagram depicts the connections between the memory slots and memory controller, including address, data and control signal lines.
This document provides a security policy for the Motorola GGM 8000 Gateway cryptographic module. It summarizes the module's validation under FIPS 140-2 as a level 2 device. The document outlines the module's approved and non-approved cryptographic algorithms, modes of operation, and steps required to enter FIPS compliant mode. Physical security measures and roles are also described.
The document provides an overview of fit-PC Industrial PCs product line. It describes several products including the IPC2, Intense PC, fit-PC4, fit-PC3/3i, and fit-PC2/2i. For each product, it summarizes the key specifications such as the processor, memory, storage, connectivity features, expansion options, and supported operating systems. It also includes block diagrams showing the system architecture and component layout for some of the products.
This document contains the output of configuring interfaces on a Cisco router. It shows:
1. The GigabitEthernet 0/0 interface being configured with IP address 192.168.0.130/26 and being brought up.
2. The GigabitEthernet 0/1 interface being configured with an invalid IP address and mask, then being brought up with no IP address configured.
3. Router interface, IP address, and configuration commands being entered to set up the router interfaces.
This document provides instructions for installing the SY-D6IBA motherboard. It begins by listing the necessary hardware needed for installation, including the CPU, memory modules, computer case, power supply, drives, and peripherals. It then describes unpacking the motherboard package and checking for all included items. The document proceeds with a step-by-step guide to installing the CPU into the retention module and mounting the module onto the motherboard. Further steps will cover installing memory, drives, and adding expansion cards before final system assembly.
This document provides a system report for a Windows XP computer named DUVAN. It details the machine's specifications including operating system, processor, memory, storage, graphics card, sound card, and other hardware. All drivers and devices were found to be working properly with no issues reported from hardware tests.
This document contains technical specifications and diagrams for a motherboard. It includes a block diagram of the motherboard components and their connections, as well as pinout diagrams and specifications for the Intel CPU socket and signals. Component details provided include the Intel 865GV chipset, DDR memory support of up to 2GB, PCI and AGP expansion slots, and on-board audio and LAN connectivity.
The document describes the configuration of a Cisco 7200 router. It connects to a Dynamips VM and boots up IOS. It then configures loopback, FastEthernet and static routes. It pings addresses to verify connectivity and traces routes to test routing.
The document contains block diagrams and schematics for the clock generator and memory controller of the Quanta Computer ZE7 motherboard. The clock generator diagram shows the various clock signals generated from the crystal oscillator and PLL, and their routing to different components like the CPU, PCIe, SATA, and memory controller. The memory controller diagram depicts the connections between the memory slots and memory controller, including address, data and control signal lines.
This document provides a security policy for the Motorola GGM 8000 Gateway cryptographic module. It summarizes the module's validation under FIPS 140-2 as a level 2 device. The document outlines the module's approved and non-approved cryptographic algorithms, modes of operation, and steps required to enter FIPS compliant mode. Physical security measures and roles are also described.
The document provides an overview of fit-PC Industrial PCs product line. It describes several products including the IPC2, Intense PC, fit-PC4, fit-PC3/3i, and fit-PC2/2i. For each product, it summarizes the key specifications such as the processor, memory, storage, connectivity features, expansion options, and supported operating systems. It also includes block diagrams showing the system architecture and component layout for some of the products.
The motherboard supports Intel Celeron and Pentium III processors with front side bus speeds of 66MHz, 100MHz, and 133MHz. It has three DIMM slots supporting up to 1GB of SDRAM memory. Expansion slots include one 32-bit AGP slot and three 32-bit PCI slots. Additional features include onboard audio, LAN, USB, serial, parallel, and floppy disk connectors.
This document provides instructions for configuring and testing the Alcatel-Lucent virtualized Simulator (vSim) on GNS3. It includes:
1) Installation and setup requirements for the vSim virtual machine and GNS3.
2) Steps to connect the vSim ports to Linux core hosts in GNS3 and configure network connectivity between the ports.
3) A procedure for testing OSPF authentication between the vSim and a Cisco CSR1000v router configured in GNS3, including the OSPF configurations on each device.
This chapter discusses installing the motherboard components. It describes safety precautions when handling components and installing the motherboard into the computer case. It also covers checking jumper settings, installing the processor, memory modules, expansion cards, hard drives, and connecting front panel connectors. Ensuring correct jumper settings is important for proper system configuration.
This document provides hardware configuration recommendations for a GMX system from GreekSoft Technologies Pvt. Ltd., including:
- An application and database server with dual quad-core Intel Xeon processors, 8GB RAM, 8x DVD-ROM drive, 160GB hard drives, and Microsoft SQL Server 2005.
- An admin desktop with an Intel Core 2 Duo processor, 4GB RAM, 80GB hard drive, and Windows 7.
- Client desktops with Intel Core 2 Duo processors, 4GB RAM, 80GB hard drives, and either Windows XP or Windows 7.
This document provides information about purchasing a Cisco WIC-2T, including:
- Contact information for purchasing the Cisco WIC-2T and links to documentation
- Details about same day shipping and tracking, payment options, and warranty support
- An overview of additional services provided by Launch 3 Telecom like repairs, maintenance contracts, and de-installation of equipment
Máy tính công nghiệp Quanmax Ubiq-100
Ứng dụng IoT cho Smart Home, Tự động hóa, Smart Grid, Nông nghiệp...
Máy tính công nghiệp Quanmax được phân phối bởi:
Công ty TNHH Công Nghệ Milo
http://www.milotech.vn - sales.milotech@gmail.com
This document provides an overview of the major features and specifications of an Intel Desktop Board DB85FL microATX motherboard, including:
- Support for 4th generation Intel Core processors up to 95W TDP, integrated graphics, DDR3 memory, and Intel B85 chipset.
- Connectivity includes USB 3.0, SATA 6Gb/s and 3Gb/s ports, gigabit Ethernet, and 8-channel HD audio.
- Expansion includes one PCIe x16, two PCIe x1 slots, and various fan and front panel connectors.
- Other features are Intel security technologies, ACPI support, and hardware monitoring through an Nuvoton controller
This document summarizes the major features of a microATX motherboard. It includes support for Intel Core i7, i5, and i3 processors with up to 16GB of DDR3 memory. It has integrated graphics, HD audio, gigabit Ethernet, USB and SATA ports. The board layout diagram shows the location of the processor, memory, expansion slots, connectors and other components.
This document provides a 3-page overview of a computer mainboard, including:
1. Features like hardware components, BIOS, and package contents
2. Layout and component descriptions
3. Configuration details for CPU, RAM, ports, fans, and jumpers
Tri aoi training-supplementary_2011.01Ralph Nguyen
This document provides information on installing and configuring TRI-AOI inspection equipment, including:
- Installation modes for different production environments such as inline, offline, and standalone
- Network configuration details for connecting multiple AOI and SPI devices across 9 lines
- Specifications for main machines, main PCs, repair PCs, and SPC computers including model numbers, serial numbers, IP addresses, and other network settings
This document provides information about computer motherboards, including:
- It defines what a motherboard is and lists some of its key components like the chipset.
- It discusses different motherboard formats like ATX, microATX, and ITX.
- It explains concepts related to motherboards like buses, bus frequency, the chipset, northbridge and southbridge.
- It provides links to videos about motherboards and chipsets.
- It lists some common motherboard manufacturers like ASUS, Gigabyte, and MSI.
In under 3 sentences, it summarizes the purpose of the document, which is to explain concepts and components related to computer motherboards.
This document summarizes the evolution of computer motherboards from early processors like the 8086 to later Pentium models. It provides specifications for each board including the processor, manufacturer, memory capacity, and BIOS. It also describes user configurable settings like memory and I/O configurations through jumpers and switches.
This document contains log entries from Nero software running on a Windows system. It is logging information about a burning process using an HP CD/DVD burner. The process was canceled by the user after the software was unable to detect a disc in the drive and prompted the user to insert a blank CD-R/RW disc.
The document is a datasheet for the W5100 chip that provides:
- An overview of the chip which is a single-chip Ethernet controller with an embedded TCP/IP stack.
- Pin assignments and descriptions of the chip's interfaces.
- Memory maps and descriptions of the chip's common and socket registers.
- Descriptions of the chip's functionality in various networking modes like TCP, UDP, and IP raw.
- Details on initialization and usage of the different interface modes like direct bus, indirect bus and SPI.
- Electrical specifications and package information.
The document discusses managing hardware on X64 systems including AMD CPU types, system upgrades involving CPUs and memory, identifying M2 and non-M2 systems, updating ILOM and FRUID data, and current issues. It provides details on AMD CPU architectures, models, sockets and steps. It also outlines procedures for identifying M2 systems, updating firmware, replacing components, and correcting FRUID information.
Track record Ioan Tudosa fleet management dev board demoIoan Tudosa
This document contains a schematic diagram for an embedded system printed circuit board (PCB). The diagram shows the various components of the system connected by pins and labels, including a microcontroller, memory, power regulators, oscillators, connectors and ports for interfaces like USB, JTAG and CAN. Descriptions of the component signals and voltage levels are provided. The document also includes the title, size, number, revision, date and page number in a header.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The motherboard supports Intel Celeron and Pentium III processors with front side bus speeds of 66MHz, 100MHz, and 133MHz. It has three DIMM slots supporting up to 1GB of SDRAM memory. Expansion slots include one 32-bit AGP slot and three 32-bit PCI slots. Additional features include onboard audio, LAN, USB, serial, parallel, and floppy disk connectors.
This document provides instructions for configuring and testing the Alcatel-Lucent virtualized Simulator (vSim) on GNS3. It includes:
1) Installation and setup requirements for the vSim virtual machine and GNS3.
2) Steps to connect the vSim ports to Linux core hosts in GNS3 and configure network connectivity between the ports.
3) A procedure for testing OSPF authentication between the vSim and a Cisco CSR1000v router configured in GNS3, including the OSPF configurations on each device.
This chapter discusses installing the motherboard components. It describes safety precautions when handling components and installing the motherboard into the computer case. It also covers checking jumper settings, installing the processor, memory modules, expansion cards, hard drives, and connecting front panel connectors. Ensuring correct jumper settings is important for proper system configuration.
This document provides hardware configuration recommendations for a GMX system from GreekSoft Technologies Pvt. Ltd., including:
- An application and database server with dual quad-core Intel Xeon processors, 8GB RAM, 8x DVD-ROM drive, 160GB hard drives, and Microsoft SQL Server 2005.
- An admin desktop with an Intel Core 2 Duo processor, 4GB RAM, 80GB hard drive, and Windows 7.
- Client desktops with Intel Core 2 Duo processors, 4GB RAM, 80GB hard drives, and either Windows XP or Windows 7.
This document provides information about purchasing a Cisco WIC-2T, including:
- Contact information for purchasing the Cisco WIC-2T and links to documentation
- Details about same day shipping and tracking, payment options, and warranty support
- An overview of additional services provided by Launch 3 Telecom like repairs, maintenance contracts, and de-installation of equipment
Máy tính công nghiệp Quanmax Ubiq-100
Ứng dụng IoT cho Smart Home, Tự động hóa, Smart Grid, Nông nghiệp...
Máy tính công nghiệp Quanmax được phân phối bởi:
Công ty TNHH Công Nghệ Milo
http://www.milotech.vn - sales.milotech@gmail.com
This document provides an overview of the major features and specifications of an Intel Desktop Board DB85FL microATX motherboard, including:
- Support for 4th generation Intel Core processors up to 95W TDP, integrated graphics, DDR3 memory, and Intel B85 chipset.
- Connectivity includes USB 3.0, SATA 6Gb/s and 3Gb/s ports, gigabit Ethernet, and 8-channel HD audio.
- Expansion includes one PCIe x16, two PCIe x1 slots, and various fan and front panel connectors.
- Other features are Intel security technologies, ACPI support, and hardware monitoring through an Nuvoton controller
This document summarizes the major features of a microATX motherboard. It includes support for Intel Core i7, i5, and i3 processors with up to 16GB of DDR3 memory. It has integrated graphics, HD audio, gigabit Ethernet, USB and SATA ports. The board layout diagram shows the location of the processor, memory, expansion slots, connectors and other components.
This document provides a 3-page overview of a computer mainboard, including:
1. Features like hardware components, BIOS, and package contents
2. Layout and component descriptions
3. Configuration details for CPU, RAM, ports, fans, and jumpers
Tri aoi training-supplementary_2011.01Ralph Nguyen
This document provides information on installing and configuring TRI-AOI inspection equipment, including:
- Installation modes for different production environments such as inline, offline, and standalone
- Network configuration details for connecting multiple AOI and SPI devices across 9 lines
- Specifications for main machines, main PCs, repair PCs, and SPC computers including model numbers, serial numbers, IP addresses, and other network settings
This document provides information about computer motherboards, including:
- It defines what a motherboard is and lists some of its key components like the chipset.
- It discusses different motherboard formats like ATX, microATX, and ITX.
- It explains concepts related to motherboards like buses, bus frequency, the chipset, northbridge and southbridge.
- It provides links to videos about motherboards and chipsets.
- It lists some common motherboard manufacturers like ASUS, Gigabyte, and MSI.
In under 3 sentences, it summarizes the purpose of the document, which is to explain concepts and components related to computer motherboards.
This document summarizes the evolution of computer motherboards from early processors like the 8086 to later Pentium models. It provides specifications for each board including the processor, manufacturer, memory capacity, and BIOS. It also describes user configurable settings like memory and I/O configurations through jumpers and switches.
This document contains log entries from Nero software running on a Windows system. It is logging information about a burning process using an HP CD/DVD burner. The process was canceled by the user after the software was unable to detect a disc in the drive and prompted the user to insert a blank CD-R/RW disc.
The document is a datasheet for the W5100 chip that provides:
- An overview of the chip which is a single-chip Ethernet controller with an embedded TCP/IP stack.
- Pin assignments and descriptions of the chip's interfaces.
- Memory maps and descriptions of the chip's common and socket registers.
- Descriptions of the chip's functionality in various networking modes like TCP, UDP, and IP raw.
- Details on initialization and usage of the different interface modes like direct bus, indirect bus and SPI.
- Electrical specifications and package information.
The document discusses managing hardware on X64 systems including AMD CPU types, system upgrades involving CPUs and memory, identifying M2 and non-M2 systems, updating ILOM and FRUID data, and current issues. It provides details on AMD CPU architectures, models, sockets and steps. It also outlines procedures for identifying M2 systems, updating firmware, replacing components, and correcting FRUID information.
Track record Ioan Tudosa fleet management dev board demoIoan Tudosa
This document contains a schematic diagram for an embedded system printed circuit board (PCB). The diagram shows the various components of the system connected by pins and labels, including a microcontroller, memory, power regulators, oscillators, connectors and ports for interfaces like USB, JTAG and CAN. Descriptions of the component signals and voltage levels are provided. The document also includes the title, size, number, revision, date and page number in a header.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This document provides information about router configuration. It discusses router components, operating systems, startup sequences, configuration modes and commands. Key points include:
- Routers have internal components like the CPU, RAM and flash memory and external components like Ethernet ports and console ports.
- The IOS operating system controls router functions. Routers boot by running POST checks, loading the IOS, and then loading the configuration file from NVRAM.
- Router configuration modes include setup, user exec, privilege exec, global configuration and interface configuration. Commands configure settings like interfaces, passwords and DHCP services.
How to recover the password for cisco 2900 integrated services router3Anetwork com
1. The document provides steps to recover the password for a Cisco 2900 Integrated Services Router when password recovery is disabled, which involves changing the configuration register and rebooting the router.
2. Upon rebooting, the configuration must be backed up and interfaces configured before resetting the configuration register to the original value.
3. Additional information is provided on password recovery and an overview of the Cisco router and licensing.
The document discusses the startup process of a Cisco router. It describes how the router performs POST and loads the IOS image at startup. It then lists the interfaces found and their status before configuration. It walks through configuring global parameters such as the hostname, passwords, and IP settings. Finally it recaps how to access privileged EXEC mode, check configurations, and verify a router's initial startup status using show commands.
The document provides instructions for initial configuration of a Cisco switch and router. It describes the boot up processes, including observing LEDs and output text. It also explains how to access different command modes, set the switch and router names, configure IP addresses, and review the running configuration. Help features like context sensitive help and command history are also summarized.
The document provides instructions for installing Cisco Business Edition 6000, which includes deploying virtual machines, configuring the ESXi host, and installing collaboration applications. Key steps include collecting network information, powering on and customizing the ESXi host for remote access, deploying virtual machines using preloaded OVA template files, and installing applications on the virtual machines.
This document provides instructions for installing and configuring Cisco Business Edition 6000 (BE6000). The key steps include:
1. Collecting required network information such as IP addresses, subnet mask, gateway, and DNS before installation.
2. Powering on the BE6000 server, connecting monitors and keyboards, and accessing the Cisco Integrated Management Controller (CIMC) for remote management if needed.
3. Customizing the ESXi hypervisor by changing passwords, assigning static IP addresses, and enabling remote access via vSphere client.
4. Accessing and configuring the ESXi host using the vSphere client.
The document discusses Cisco Discovery Protocol (CDP) and how it can be used to gather information about neighboring and remote network devices. CDP discovers information like device identifiers, address lists, port identifiers, and capabilities without needing to know the data link layer protocol. The summary also describes how to use commands like show cdp neighbor, show cdp entry, ping, and telnet to view CDP information and connect to remote devices.
This document provides information about Cisco router configuration and operation. It describes the internal and external components of Cisco routers, how to establish a console connection to configure a router, and explains the different modes of the Cisco IOS including user mode, privileged mode, and how to get context sensitive help. It also covers the initial startup process and configuration of a router through the setup command.
ARM Linux Booting Process
One must be wondering How this Embedded Devices come to life? What goes into this devices that will tune to users Commands. We are going to explain about Embedded Arm based devices in general as The ARM architecture is a widely used 32-bit RISC processor architecture. In fact, the ARM family accounts for about 75% of all 32-bit CPUs, and about 90% of all embedded 32-bit CPUs.
Upon reading the document, the key steps in a router's start-up process can be summarized as follows:
1. When power is applied, the router performs a power-on self-test and loads the bootstrap code from ROM to initialize hardware and find the IOS image.
2. The IOS image is then loaded from flash memory or another source such as TFTP into RAM where it is decompressed and executed.
3. The startup configuration is loaded, typically from NVRAM. If no configuration is present, the router enters setup mode to configure initial settings.
The document discusses the startup process and initial configuration of Cisco Catalyst switches. It describes how the switch software initiates at startup, the LED indicators, and the initial bootup output. It then covers entering configuration modes, setting the switch ID and IP address, saving configurations, and commands to view switch status including show version, show running-config, and show interfaces.
Issuing the show version command on a Cisco network router displays hardware unique information. Review the output of the show version command on a router and try to locate the following information. The output gives you insight into the router’s capabilities, and overall gives you practice reading the output of many Cisco commands:
This document describes the configuration of VLANs on a Cisco switch. The key steps are:
1. Six VLANs are created and named for different departments.
2. Ports on the switch are assigned to each VLAN to segregate network traffic for each department.
3. IP addresses are configured for each VLAN interface and routing is enabled with RIP to allow communication between VLANs.
4. Ping tests confirm connectivity between devices on different VLANs, showing the VLAN configuration is functioning properly.
This document contains system information for a Toshiba Satellite A300 laptop running Windows 7 including:
- Details on the operating system, hardware specifications, drivers, and devices
- A listing of components like the processor, memory, graphics card, sound devices, and attached peripherals
- Notes on display functionality and capabilities of the integrated ATI Mobility Radeon HD 3400 graphics card
Similar to Vlan configuration by amare simachew (20)
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
1. to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
Cisco CISCO1941/K9 (revision 1.0) with 491520K/32768K bytes of memory.
Processor board ID FTX152400KS
2 Gigabit Ethernet interfaces
DRAM configuration is 64 bits wide with parity disabled.
255K bytes of non-volatile configuration memory.
249856K bytes of ATA System CompactFlash 0 (Read/Write)
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]: System Bootstrap, Version
15.1(4)M4, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2010 by cisco Systems, Inc.
Total memory size = 512 MB - On-board = 512 MB, DIMM0 = 0 MB
CISCO1941/K9 platform with 524288 Kbytes of main memory
Main memory is configured to 64/-1(On-board/DIMM0) bit mode with ECC disabled
Readonly ROMMON initialized
program load complete, entry point: 0x80803000, size: 0x1b340
2. program load complete, entry point: 0x80803000, size: 0x1b340
IOS Image Load Test
___________________
Digitally Signed Release Software
program load complete, entry point: 0x81000000, size: 0x2bb1c58
Self decompressing the image :
####System Bootstrap, Version 15.1(4)M4, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2010 by cisco Systems, Inc.
Total memory size = 512 MB - On-board = 512 MB, DIMM0 = 0 MB
CISCO1941/K9 platform with 524288 Kbytes of main memory
Main memory is configured to 64/-1(On-board/DIMM0) bit mode with ECC disabled
Readonly ROMMON initialized
program load complete, entry point: 0x80803000, size: 0x1b340
program load complete, entry point: 0x80803000, size: 0x1b340
IOS Image Load Test
___________________
Digitally Signed Release Software
program load complete, entry point: 0x81000000, size: 0x2bb1c58
Self decompressing the image :
##########################################################################
[OK]
Smart Init is enabled
smart init is sizing iomem
TYPE MEMORY_REQ
3. HWIC Slot 0 0x00200000
HWIC Slot 1 0x00200000 Onboard devices &
buffer pools 0x01E8F000
-----------------------------------------------
TOTAL: 0x02E8F000
Rounded IOMEM up to: 48Mb.
Using 6 percent iomem. [48Mb/512Mb]
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M), Version 15.1(4)M4,
RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Thurs 5-Jan-12 15:41 by pt_team
Image text-base: 0x2100F918, data-base: 0x24729040
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
4. third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
Cisco CISCO1941/K9 (revision 1.0) with 491520K/32768K bytes of memory.
Processor board ID FTX152400KS
2 Gigabit Ethernet interfaces
4 Low-speed serial(sync/async) network interface(s)
DRAM configuration is 64 bits wide with parity disabled.
255K bytes of non-volatile configuration memory.
249856K bytes of ATA System CompactFlash 0 (Read/Write)
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]: n
Press RETURN to get started!
5. Router>en
Router>enable
Router#
Router#confi
Router#configure
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#host
Router(config)#hostname R2
R2(config)#
R2(config)#
R2(config)#user
R2(config)#username Group6 secr
R2(config)#username Group6 secret 12345
R2(config)#ena
R2(config)#enable secr
R2(config)#enable secret 12345
R2(config)#line cons
R2(config)#line console 0
R2(config-line)#login loca
R2(config-line)#login local
R2(config-line)#line vty 0 15
R2(config-line)#pas
R2(config-line)#password 12345
R2(config-line)#login
R2(config-line)#exit
6. R2(config)#ban
R2(config)#banner mot
R2(config)#banner motd &
Enter TEXT message. End with the character '&'.
**************Router Two*********************&
R2(config)#inter
R2(config)#interface ser
R2(config)#interface serial 0/1/1
R2(config-if)#ip ad
R2(config-if)#ip address 192.168.1.6 255.255.255.252
R2(config-if)#no shu
R2(config-if)#no shutdown
R2(config-if)#
%LINK-5-CHANGED: Interface Serial0/1/1, changed state to up
R2(config-if)#
R2(config-if)#do write
Building configuration...
[OK]
R2(config-if)#
R2(config-if)#int g0/0
R2(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/1/1, changed state to up
R2(config-if)#ip ad
R2(config-if)#ip address 192.168.5.1 255.255.255.0
7. R2(config-if)#no shu
R2(config-if)#no shutdown
R2(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to
up
R2(config-if)#
R2(config-if)#
R2(config-if)#do write
Building configuration...
[OK]
R2(config-if)#int g0/1
R2(config-if)#ip ad
R2(config-if)#ip address 192.168.3.1 255.255.255.0
R2(config-if)#no shu
R2(config-if)#no shutdown
R2(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to
up
R2(config-if)#
R2(config-if)#
R2(config-if)#do write
8. Building configuration...
[OK]
R2(config-if)#
R2(config-if)#
R2(config-if)#
//////////////////////////////////////////////
Copyright (c) 2010 by cisco Systems, Inc.
Total memory size = 512 MB - On-board = 512 MB, DIMM0 = 0 MB
CISCO1941/K9 platform with 524288 Kbytes of main memory
Main memory is configured to 64/-1(On-board/DIMM0) bit mode with ECC disabled
Readonly ROMMON initialized
program load complete, entry point: 0x80803000, size: 0x1b340
program load complete, entry point: 0x80803000, size: 0x1b340
IOS Image Load Test
___________________
Digitally Signed Release Software
program load complete, entry point: 0x81000000, size: 0x2bb1c58
Self decompressing the image :
##########################################################################
[OK]
Smart Init is enabled
smart init is sizing iomem
TYPE MEMORY_REQ
Onboard devices &
buffer pools 0x01E8F000
-----------------------------------------------
9. TOTAL: 0x01E8F000
Rounded IOMEM up to: 32Mb.
Using 6 percent iomem. [32Mb/512Mb]
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M), Version 15.1(4)M4,
RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Thurs 5-Jan-12 15:41 by pt_team
Image text-base: 0x2100F918, data-base: 0x24729040
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
10. to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
Cisco CISCO1941/K9 (revision 1.0) with 491520K/32768K bytes of memory.
Processor board ID FTX152400KS
2 Gigabit Ethernet interfaces
DRAM configuration is 64 bits wide with parity disabled.
255K bytes of non-volatile configuration memory.
249856K bytes of ATA System CompactFlash 0 (Read/Write)
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]: n
Press RETURN to get started!
Router>
Router>ena
Router>enable
11. Router#
Router#
Router#confi
Router#configure
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#host
Router(config)#hostname ROUTER1
ROUTER1(config)#use
ROUTER1(config)#username Group6 secr
ROUTER1(config)#username Group6 secret 12345
ROUTER1(config)#ena
ROUTER1(config)#enable secr
ROUTER1(config)#enable secret 12345
ROUTER1(config)#
ROUTER1(config)#line
ROUTER1(config)#line con
ROUTER1(config)#line console 0
ROUTER1(config-line)#login loca
ROUTER1(config-line)#login local
ROUTER1(config-line)#
ROUTER1(config-line)#line vty 0 15
ROUTER1(config-line)#pas
ROUTER1(config-line)#password 12345
ROUTER1(config-line)#login
ROUTER1(config-line)#login
ROUTER1(config-line)#
ROUTER1(config-line)#exit
12. ROUTER1(config)#ba
ROUTER1(config)#banner mo
ROUTER1(config)#banner motd &
Enter TEXT message. End with the character '&'.
*****************DHCP ROUTER****************&
ROUTER1(config)#do writ
ROUTER1(config)#do wr
Building configuration...
[OK]
ROUTER1(config)#
ROUTER1(config)#
ROUTER1(config)#inter
ROUTER1(config)#interface g
ROUTER1(config)#interface gigabitEthernet 0/0
ROUTER1(config-if)#ip ad
ROUTER1(config-if)#exit
ROUTER1(config)#ip
ROUTER1(config)#ip dh
ROUTER1(config)#ip dhcp exc
ROUTER1(config)#ip dhcp excluded-address 192.168.0.1 192.168.0.10
ROUTER1(config)#ip dhcp excluded-address 192.168.1.1 192.168.1.10
ROUTER1(config)#do write
Building configuration...
[OK]
ROUTER1(config)#
ROUTER1(config)#ip dh
ROUTER1(config)#ip dhcp po
13. ROUTER1(config)#ip dhcp pool VLAN10
ROUTER1(dhcp-config)#netw
ROUTER1(dhcp-config)#network 192.168.1.0 255.255.255.0
ROUTER1(dhcp-config)#def
ROUTER1(dhcp-config)#default-router 192.168.1.1
ROUTER1(dhcp-config)#dns
ROUTER1(dhcp-config)#dns-server 209.165.200.225
ROUTER1(dhcp-config)#dom
ROUTER1(dhcp-config)#domain-name asu.edu.com
ROUTER1(dhcp-config)#lea
ROUTER1(dhcp-config)#lease 2
^
% Invalid input detected at '^' marker.
ROUTER1(dhcp-config)#do write
ROUTER1(dhcp-config)#?
default-router Default routers
dns-server Set name server
domain-name Domain name
exit Exit from DHCP pool configuration mode
network Network number and mask
no Negate a command or set its defaults
option Raw DHCP options
ROUTER1(dhcp-config)#exit
ROUTER1(config)#le
ROUTER1(config)#lease 2
^
% Invalid input detected at '^' marker.
14. ROUTER1(config)#
ROUTER1(config)#
ROUTER1(config)#do write
Building configuration...
[OK]
ROUTER1(config)#
ROUTER1(config)#
ROUTER1(config)#ip dh
ROUTER1(config)#ip dhcp po
ROUTER1(config)#ip dhcp pool20
^
% Invalid input detected at '^' marker.
ROUTER1(config)#ip dh
ROUTER1(config)#ip dhcp po
ROUTER1(config)#ip dhcp pool 20
ROUTER1(dhcp-config)#ip dhcp pool VLAN20
ROUTER1(dhcp-config)#netw
ROUTER1(dhcp-config)#network 192.168.0.0 255.255.255.0
ROUTER1(dhcp-config)#def
ROUTER1(dhcp-config)#default-router 192.168.0.1
ROUTER1(dhcp-config)#dns
ROUTER1(dhcp-config)#dns-server 209.165.200.225
ROUTER1(dhcp-config)#dom
ROUTER1(dhcp-config)#domain-name asu.edu.com
ROUTER1(dhcp-config)#lease 2
^
15. % Invalid input detected at '^' marker.
ROUTER1(dhcp-config)#
ROUTER1(dhcp-config)#exit
ROUTER1(config)#do write
Building configuration...
[OK]
ROUTER1(config)#
ROUTER1(config)#
ROUTER1(config)#
/////////////////////////////////////////////////////////////////////////////////////VLAN
CONFIGURATION//////////////////////////////
AT Swich1(fIRST)
Switch>
Switch>
Switch>ena
Switch>enable
Switch#
Switch#confi
16. Switch#configure
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#
Switch(config)#
Switch(config)#
Switch(config)#vlan 10
Switch(config-vlan)#nam
Switch(config-vlan)#name lab1
Switch(config-vlan)#vlan 20
Switch(config-vlan)#name lab2
Switch(config-vlan)#vlan 30
Switch(config-vlan)#name lab3
Switch(config-vlan)#do write
Building configuration...
[OK]
Switch(config-vlan)#
Switch(config-vlan)#
Switch(config-vlan)#
Switch(config-vlan)#exit
Switch(config)#interface range fastEthernet0/1-2
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 10
Switch(config-if-range)#int range f0/3-4
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 20
Switch(config-if-range)#int range f0/5-6
Switch(config-if-range)#switchport mode access
17. Switch(config-if-range)#switchport access vlan 30
Switch(config-if-range)#do wr
Building configuration...
[OK]
Switch(config-if-range)#
Switch(config-if-range)#
Switch(config-if-range)#exit
Switch(config)#
Switch(config)#
Switch(config)#
Switch(config)#do sho
Switch(config)#do show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/18
Fa0/19, Fa0/20, Fa0/21, Fa0/22
Fa0/23, Fa0/24, Gig0/1, Gig0/2
10 lab1 active Fa0/1, Fa0/2
20 lab2 active Fa0/3, Fa0/4
30 lab3 active Fa0/5, Fa0/6
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
18. VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
30 enet 100030 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
Remote SPAN VLANs
------------------------------------------------------------------------------
Primary Secondary Type Ports
------- --------- ----------------- ------------------------------------------
We are now going to create communication (to carry communication from first to second)
We use trunk
Switch(config)#
Switch(config)#interface range gigabitEthernet 0/1-2
Switch(config-if-range)#switchport mode trunk
Switch(config-if-range)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to
down
19. %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to
up
Switch(config-if-range)#
Switch(config-if-range)#switchport trunk native vlan 5
Switch(config-if-range)#
Switch(config-if-range)#
%CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on
GigabitEthernet0/1 (5), with Switch GigabitEthernet0/1 (1).
do wr
Building configuration...
[OK]
Switch(config-if-range)#do show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/18
Fa0/19, Fa0/20, Fa0/21, Fa0/22
Fa0/23, Fa0/24, Gig0/2
10 lab1 active Fa0/1, Fa0/2
20 lab2 active Fa0/3, Fa0/4
30 lab3 active Fa0/5, Fa0/6
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
21. Switch#
Switch#
Switch#
Switch#confi
Switch#configure
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#
Switch(config)#
Switch(config)#
%CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on
GigabitEthernet0/1 (1), with Switch GigabitEthernet0/1 (5).
Switch(config)#
Switch(config)#
Switch(config)#host
Switch(config)#hostname S1
S1(config)#interface range fastEthernet 0/1-24
S1(config-if-range)#switchport mode trunk
S1(config-if-range)#switchport trunk native vlan
%CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on
GigabitEthernet0/1 (1), with Switch GigabitEthernet0/1 (5).
% Incomplete command.
S1(config-if-range)#switchport trunk native vlan 5
S1(config-if-range)#
S1(config-if-range)#do write
Building configuration...
[OK]
22. S1(config-if-range)#
S1(config-if-range)#exit
S1(config)#interface range gigabitEthernet 0/1-2
S1(config-if-range)#switchport mode trunk
S1(config-if-range)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/2, changed state to
down
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/2, changed state to
up
S1(config-if-range)#
S1(config-if-range)#switchport trunk native vlan
S1(config-if-range)#switchport trunk native vlan 5
S1(config-if-range)#
S1(config-if-range)#do wr
Building configuration...
[OK]
S1(config-if-range)#
S1(config-if-range)#
%CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on
GigabitEthernet0/2 (5), with Switch GigabitEthernet0/2 (1).
%CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on
GigabitEthernet0/2 (5), with Switch GigabitEthernet0/2 (1).
%CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on
GigabitEthernet0/2 (5), with Switch GigabitEthernet0/2 (1).
S1(config-if-range)#