Sorry, all....I attached the IPExpert Solution not the Netmaster class.. Here is the link to the solution:
http://www.netmasterclass.net/site/articles/RS-NMC-1%20Extra%20Credit.%20Catalyst%203550%20VLAN%20configuration.pdf Thank you. >From: "Munit Singla" >Reply-To: "Munit Singla" >To: [EMAIL PROTECTED] >Subject: Re: newbie on 3550 - some questions? [7:59633] >Date: Fri, 20 Dec 2002 19:00:47 GMT > >Can You please update about this lab.Can I also test here...Please update >the new >joiness of this group regarding this. >Regards, >Munit > >Cisco Nuts wrote: > > > Hello,I've finally started studying the 3550's in my prep. for the Lab > > and I am very grateful to Bruce and Val for putting out a 3550 FREE lab > > to help us out ( NOT to forget IPExpert and NLI's)..... :-)Had a couple > > of questions on this Lab solution (if anyone has done it): 1. Vlan's 20 > > and 10 are part of int f0/2 and int f0/3 respectively but only int f0/3 > > has the switchport mode access on Switch 1. This is not the case on > > Switch 2.Question: Why? And when would I absolutely use the #switchport > > mode access cmd. on an intf? 2. Why is Switch 1's ip address configured > > for Vlan 20 and Switch 2's for Vlan 10? Why not the other way around? > > Could we possible use Vlan 30 or 40 for that matter? 3. Both the Switches > > are set to transparent? And both Vlans are created on both > > switches? Can VTP be created on one Switch and set to server mode? 4. On > > router R1, the #bridge irb cmd. is configured under Fe0/0 but not under > > Fe0/1? Should this cmd. also be configed under Fe0/1? Thank you for your > > help. I would appreciate any explanation as I continue to print 100's of > > pages from the CMD. and CONFIG guide and plough my way through it. Very > > soon, I hope to lay my hands on a 3550 but right now....lot's of writing, > > reading and diagrams!! :-) If there is anyone that will let me have a > > couple of hours on a 3550, please let me know. I am willing to kind of > > "trade" for a lot of router time on my rack of 10 routers at home. > > Sincerely,CN BTW: > > I have attached the solution along with this email for you to take a look > > at. > > ! > > version 12.1 > > no service pad > > service timestamps debug uptime > > service timestamps log uptime > > no service password-encryption > > ! > > hostname Switch > > ! > > aaa new-model > > aaa authentication dot1x default group radius local > > ! > > ip subnet-zero > > ip routing > > ! > > ! > > ! > > spanning-tree extend system-id > > spanning-tree vlan 70 priority 24576 > > ! > > ! > > ! > > interface FastEthernet0/1 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/2 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/3 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/4 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/5 > > switchport access vlan 56 > > switchport mode access > > switchport port-security > > switchport port-security mac-address sticky > > no ip address > > spanning-tree portfast > > spanning-tree guard root > > ! > > interface FastEthernet0/6 > > switchport access vlan 56 > > switchport mode access > > no ip address > > spanning-tree portfast > > spanning-tree guard root > > ! > > interface FastEthernet0/7 > > no switchport > > ip address 140.40.70.35 255.255.255.0 > > ! > > interface FastEthernet0/8 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/9 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/10 > > switchport access vlan 999 > > switchport mode access > > switchport block multicast > > no ip address > > storm-control broadcast level 78.00 > > storm-control multicast level 78.00 > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/11 > > switchport access vlan 999 > > switchport mode access > > switchport block multicast > > no ip address > > storm-control broadcast level 78.00 > > storm-control multicast level 78.00 > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/12 > > switchport access vlan 999 > > switchport mode access > > switchport block multicast > > no ip address > > storm-control broadcast level 78.00 > > storm-control multicast level 78.00 > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/13 > > switchport access vlan 999 > > switchport mode access > > switchport block multicast > > no ip address > > storm-control broadcast level 78.00 > > storm-control multicast level 78.00 > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/14 > > switchport access vlan 999 > > switchport mode access > > switchport block multicast > > no ip address > > storm-control broadcast level 78.00 > > storm-control multicast level 78.00 > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/15 > > switchport access vlan 999 > > switchport mode access > > switchport voice vlan 100 > > no ip address > > spanning-tree portfast > > spanning-tree guard root > > ! > > interface FastEthernet0/16 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/17 > > switchport trunk encapsulation dot1q > > switchport trunk allowed vlan 1,56,70,100,1002-1005 > > switchport mode trunk > > no ip address > > spanning-tree guard root > > ! > > interface FastEthernet0/18 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/19 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/20 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/21 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/22 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/23 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface FastEthernet0/24 > > switchport access vlan 999 > > switchport mode access > > no ip address > > dot1x port-control force-unauthorized > > spanning-tree guard root > > ! > > interface GigabitEthernet0/1 > > no ip address > > ! > > interface GigabitEthernet0/2 > > no ip address > > ! > > interface Vlan1 > > ip address 140.40.100.35 255.255.255.0 > > ! > > interface Vlan56 > > ip address 140.40.56.35 255.255.255.0 > > bridge-group 56 > > ! > > router ospf 1 > > log-adjacency-changes > > network 140.40.0.0 0.0.255.255 area 0 > > ! > > ip classless > > ip http server > > ! > > ! > > ! > > radius-server host 140.40.56.100 auth-port 1812 acct-port 1813 key c!5c0 > > radius-server retransmit 3 > > bridge 56 protocol vlan-bridge > > ! > > line con 0 > > line vty 5 15 > > ! > > ! > > monitor session 1 source interface Fa0/1 > > monitor session 1 destination interface Fa0/2 > > end > > > > Switch#s vtp stat > > VTP Version : 2 > > Configuration Revision : 2 > > Maximum VLANs supported locally : 1005 > > Number of existing VLANs : 9 > > VTP Operating Mode : Server > > VTP Domain Name : IPExpert > > VTP Pruning Mode : Enabled > > VTP V2 Mode : Disabled > > VTP Traps Generation : Disabled > > MD5 digest : 0x7F 0xD8 0x84 0x62 0xA6 0x1F 0xF1 0xE8 > > > > Switch#s ip ro > > Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP > > D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area > > N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 > > E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP > > i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter > > area > > * - candidate default, U - per-user static route, o - ODR > > P - periodic downloaded static route > > > > Gateway of last resort is not set > > > > 140.40.0.0/24 is subnetted, 3 subnets > > C 140.40.56.0 is directly connected, Vlan56 > > C 140.40.100.0 is directly connected, Vlan1 > > C 140.40.70.0 is directly connected, FastEthernet0/7 > > 20.0.0.0/32 is subnetted, 3 subnets > > O 20.20.20.5 [110/2] via 140.40.56.5, 00:01:18, Vlan56 > > O 20.20.20.6 [110/2] via 140.40.56.6, 00:01:18, Vlan56 > > O 20.20.20.7 [110/11] via 140.40.70.7, 00:01:18, FastEthernet0/7 > > > > Switch#ping 20.20.20.5 > > > > Type escape sequence to abort. > > Sending 5, 100-byte ICMP Echos to 20.20.20.5, timeout is 2 seconds: > > !!!!! > > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms > > Switch#ping 20.20.20.6 > > > > Type escape sequence to abort. > > Sending 5, 100-byte ICMP Echos to 20.20.20.6, timeout is 2 seconds: > > !!!!! > > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms > > Switch#ping 20.20.20.7 > > > > Type escape sequence to abort. > > Sending 5, 100-byte ICMP Echos to 20.20.20.7, timeout is 2 seconds: > > !!!!! > > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms > > Switch#ping 140.40.56.6 > > > > Type escape sequence to abort. > > Sending 5, 100-byte ICMP Echos to 140.40.56.6, timeout is 2 seconds: > > !!!!! > > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms > > Switch#ping 140.40.56.5 > > > > Type escape sequence to abort. > > Sending 5, 100-byte ICMP Echos to 140.40.56.5, timeout is 2 seconds: > > !!!!! > > Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms > > Switch#ping 140.40.70.7 > > > > Type escape sequence to abort. > > Sending 5, 100-byte ICMP Echos to 140.40.70.7, timeout is 2 seconds: > > !!!!! > > Success rate is 100 percent (5/5), misconduct and Nondisclosure violations to [EMAIL PROTECTED] ------------------------------------------------------------------------ The new MSN 8: smart spam protection and 3 months FREE*. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=59665&t=59633 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

