Preview

It-321 - Project 2 Script

Satisfactory Essays
Open Document
Open Document
791 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It-321 - Project 2 Script
switchport mode trunk int fa1/0 no shutdown exit int fa1/0.1 encapsulation dot1q 1 ip address 172.16.1.1 255.255.255.0 no shutdown exit int fa1/0.10 encapsulation dot1q 10 ip address 172.16.10.1 255.255.255.0 no shutdown exit int fa1/0.20 encapsulation dot1q 20 ip address 172.16.20.1 255.255.255.0 no shutdown exit vlan 10 name Accounting exit vlan 20 name Marketing exit int fa0/1 switchport mode trunk no shutdown exit int fa0/2 switchport mode trunk no shutdown exit int fa0/3 switchport mode trunk no shutdown exit int vlan 1 ip address 172.16.1.4 255.255.255.0 no shutdown ip default-gateway 172.16.1.1

int fa0/4 switchport mode access switchport access vlan 10 switchport port-security switchport port-security mac-address sticky switchport port-security maximum 1 switchport port-security violation shutdown no shutdown exit int fa0/5 switchport mode access switchport access vlan 10 switchport port-security switchport port-security mac-address sticky switchport port-security maximum 1 switchport port-security violation shutdown no shutdown exit int fa0/6 switchport mode access switchport access vlan 10 switchport port-security switchport port-security mac-address sticky switchport port-security maximum 1 switchport port-security violation shutdown no shutdown exit int fa0/7 switchport mode access switchport access vlan 20 switchport port-security switchport port-security mac-address sticky switchport port-security maximum 1 switchport port-security violation shutdown no shutdown exit int fa0/8 switchport mode access switchport access vlan 20 switchport port-security switchport port-security mac-address sticky switchport port-security maximum 1 switchport port-security violation shutdown no shutdown exit int fa0/9 switchport mode access switchport access vlan 20 switchport port-security switchport port-security mac-address sticky switchport port-security maximum 1

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    new egg. (2011). HP JD984A#ABA V1405-16 Switch. Retrieved october 3, 2011, from New egg.com: http://www.newegg.com/Product/Product.aspx?Item=N82E16833316171…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    It321 Week 1

    • 640 Words
    • 3 Pages

    A long distance switch routes traffic through the long distance network. The types of interfaces that terminate on a long distance switch are intermachine trunks (ITMT’s); they can also connect to databases that are used to validate calling card calls.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assume in the following diagram that switch 2 goes offline. What switch will be root and what will be the ports states for the reaming switches?…

    • 326 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    It Management Mgt2 Task 3

    • 4060 Words
    • 13 Pages

    Time is a risk for this project on several levels. 173 employees this will be affected as well as their customers. The company has agreed that this is a good move, however, if the process of setting up the equipment, managing the security and providing training goes on too long, then it will start to negatively affect the company over-all. Currently there is concern if the technology will be delivered due to an unforeseen fire, this set back will be costly in time and work. Also, a second part of time being a risk is managing faulty or dying equipment. Home offices will take longer to assess and fix in the long run. IT staff will either have travel to employee’s homes, or employees will be held up having to come into the home office for repairs.…

    • 4060 Words
    • 13 Pages
    Better Essays
  • Good Essays

    To know about the operations of access & trunk links, it is desirable to know the login that dictates the type of link and interface used. VLAN logically groups independent LAN stations independent to their physical locations within a bridged LAN infrastructure.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Good Essays

    (167) Command issued to upgrade an old version of the Cisco IOS software by downloading a new image from the TFTP server…

    • 469 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It210 Week 4 Psuedocode

    • 584 Words
    • 3 Pages

    Program Pseudocode Currency_Convertor Main Module Delcare USDollars As Float Declare Rate1 As Float Declare Rate2 As Float Declare Rate3 As Float Declare Rate4…

    • 584 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It320 Chapter 1

    • 473 Words
    • 2 Pages

    are normally routers that send information through the WAN at the rate set by the DCE.…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. WU HIPAA Security Policy requires procedures to ensure that access to a system that contains EPHI and is used to provide patient treatment is made available to any caregiver in the case of an emergency if the denial or strict access to that EPHI could inhibit or negatively affect patient care. During extreme emergency conditions, RO would rely upon BJH electronic access to the IMPAC electronic medical record as well as BJH Health Informations Management (HIM) for access to the physical medical record.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    It237 Week 2 Checkpoint

    • 414 Words
    • 2 Pages

    Throughout this paper I will be describing external, embedded, and inline types of cascading style sheets. Also, I will be providing a pro and a con for each type of cascading style sheet.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FOSS (Free and Open Source Software) had some trouble in 2006 when Microsoft submitted 235 patents that were allegedly violated by FOSS. Microsoft created these patents in order to collect royalties from companies in the “free world” (companies/people using free software). Eben Moglen of the Free Software Foundation contended that software is a mathematical algorithm and is not patentable. Moglen wrote, “It’s a tinderbox. As the commercial confrontation between free software and software-that’s-a-product becomes more fierce, patent law’s going to be the terrain on which a big piece of the war’s going to be fought.” FOSS has powerful corporate patrons and allies. So if Microsoft ever tried to sue Linux distributor Red Hat for patent infringement, for instance, OIN might sue Microsoft in retaliation, trying to enjoin distribution of Windows.…

    • 705 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Runner Chapter 9 Script

    • 689 Words
    • 3 Pages

    Voice over: i followed knuckles down the hall to the office and stepped in after him. Half a dozen men were gathered in the office. Squizzy among them. They were drinking a toast.…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    assignment 303 task c ci

    • 432 Words
    • 2 Pages

    I was always considered as being a bit of a 'soft touch' when I was younger, constantly letting others have their way. In my older life, and particularly within my job role, this has taught me that I can be emphatic and sympathetic towards people. I have always been interested in history, including my own family history. When I was young, I would sit for hours on end listening to grandmas stories of her own background and where she came from. This has given me a sense of my own self and has taught me how to be a good listener with the people that I care for in my working life.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    GEN ED 2 CA1 Script

    • 879 Words
    • 3 Pages

    Good afternoon to my lecturer and my fellow classmates. I am Zhi Qing from DACP 02 and I am going to present about a movie entitled 'The Hunchback of Notre Dame' released by Disney in the year 1996. Disney had been focusing on more fairytale-like stories such as Snow White, The Little Mermaid and Cinderella so in comparison this movie is quite unconventional as it highlights the theme of discrimination towards people with deformities.…

    • 879 Words
    • 3 Pages
    Satisfactory Essays

Related Topics