- 积分
- 174
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
发表于 2017-6-2 21:11:27
|
显示全部楼层
1. What is the Ethernet frame size for 802.1Q?0 d5 U, @- Q8 x- _6 l
a. 64& G; H7 I6 r0 h/ ?, V6 [
b. 128% r. {" o- L4 B6 i9 ]2 Q! B1 f! ^% E u
c. 1518, T4 V, S" B5 m' v d( v& ]# X! I
& k& I8 _( O ~( R: ?4 L( id. 1522 **3 A/ H) |7 p+ I: Z/ [0 F6 I6 I
' }6 E, P% f+ p. L/ gAns: D! T: v- a' K/ D" ~, R7 C+ H7 f$ Q- _: h5 e; x: F9 G
————————————————————————————————————————————————————————————% x2 D3 i1 {% M1 Q, I8 }$ p9 I. ~* r* ^
2. How will the traffic reach the core switch from AS switch to DS core switch?
+ j( l6 N4 d3 A8 x, N8 r4 B(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)1 {/ F( }9 U7 V) m F3 l
a. ASW1 to DWS1 to core" |& U& h: U( s" P P) M# y3 ~! M- _* `; _1 ^$ V
b. ASW1 to DWS2 to core **
& ]9 D6 B4 q5 pc. ???: ] Z8 m$ d8 }0 H3 |
d. ???9 G( v6 J/ w1 B0 w) |- c* H9 b1 M8 X4 C3 |- l; t+ u: S
Ans: B
7 O8 e; s& |+ e% l# H( g. Q————————————————————————————————————————————————————————————# q& M0 M% [6 K$ k9 p7 m- V! ~# \/ t/ n3 X, d. ? p* ?
3. If HSRP group number is 45 what would be the MAC address?
3 R v( X7 v- @(Basically conversion of digit to hexadecimal with group of 16.)9 K( J$ R. D, U3 b; l$ X/ A
a. 00-00-0c-07-ac-2D9 Z7 n* c* H( Y
b. ???
& [9 N+ @/ U h/ \" o6 W, M7 b9 G/ ^c. ???7 j" n; L6 `4 ~0 _, k4 _: C1 {9 X* e1 r4 r Q0 K4 ]
d. ???1 T, R% o" e9 f1 h2 }
4 E7 F1 ^5 o' ?: f8 m8 ^" jAns: A2 M+ A' l5 F% O3 M Z3 F8 p- |( G2 v! f$ ^
Explanation:4 e1 T% S) S* j" c i4 M: u6 s% L# m3 F2 P: I8 W" I7 U/ e
00-00-0c- 07-ac-2D1 E+ L' Q% e6 O1 f1 W2 w1 X7 f/ v
CISCO_ID :HSRP_ID:GROUP_ID! l3 M: d* H, c8 [" v
2d=45
: |+ A' g3 c. m————————————————————————————————————————————————————————————
5 c4 s+ Q6 p4 a& k- M) M* |# }; r4 A question on EtherChannel misconfiguration…….3 y: }) c# ? @3 A
7 d3 p8 E' k5 J3 M1 S$ la. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **
6 e0 i2 k d' y* Z& g; A+ Cb. ???/ J9 {" l+ U5 L2 W; r: T% M3 k8 m, I
c. ???
! B4 H! m# f) C9 dd. ???
- b w2 I8 a& [, K( VAns: A7 o$ P, J3 n; W V; j1 I7 r' r9 U% ?' t, z. u" O1 ]: N
————————————————————————————————————————————————————————————% R$ Q8 h' u1 l: R3 |# Y1 F
5. Select a valid VRRP configuration from a list of possible configurations.. r$ h! ~; u9 W) _. f7 @0 G1 E* B( g0 m' F3 v. f- c `8 {) h' k
a. vrrp [group-number] ip [ip-address] **0 M$ N: h2 K v ]' j
* G" x6 X D( `; X6 jb. vrrp [group-number] priority [priority] **! G& E1 L7 G& G+ X- r) t
c. vrrp [group-number] preempt **
0 B; b0 z/ a, f# b2 L" \d. ???7 K ~( |- S' W3 [* F
" a+ A5 E$ P4 D2 x f3 t: le. ???
, u# o) j- E: I2 o) \, F" gAns: A,B,C
- S) Q0 d. R9 {3 zExplanation:
[' V% m: M5 |( K8 NYou can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones., I& j ~+ W1 j9 p
! P1 {/ O, V; A2 Y; V9 l# |————————————————————————————————————————————————————————————
n8 t: T) h J7 l' `/ ^8 W6. Private VLANs (PVLANs) have two secondary VLAN types.) _8 r. A) {, }/ c+ e4 t) A2 C# d
a. community **4 o& E) F5 c% M" ^/ p/ ^
4 L/ |8 v/ ~4 d% H5 B7 wb. isolated **0 F# d3 _+ c0 y
c. ???
* v3 m% I& I# Y2 A3 Ud. ???. o0 s2 N S ~( |; I3 j- ^
e. ???) Q4 a6 Z* W% H. N/ b9 }
. t7 ~& F; B: T9 MAns: A,B a f# j, A% U% g. O1 }9 Z6 {
____________________________________________________________/ N6 l! v7 h/ k, Z3 ]; n
7. What types of SDM templates you can use in switch? (Choose three)) g% d1 H o+ H5 B6 q. w! d6 D- Z! ~+ T/ E
a. Access **- @3 r* E7 L, g8 G* c
3 X- z# ?: B( T" Z `4 t, [0 Mb. Default **0 z i r8 ?9 |! b6 X* t" F) l6 E) i- i8 [7 t0 C( r3 f1 a
c. Routing **# e5 r3 K X7 v9 _! T( ]' \7 A' W; e A# K
d. VLANs **
; K* R0 O& z% w' w he. ???8 c3 N# u9 m) ^7 _$ \9 |) }! @6 E+ o! {( {0 X, n" {
f. ???8 b6 a. Y: c0 e" O
Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)
" k# y5 G7 l! O0 k- ~) _6 KExplanation:6 a& J( `( K/ w+ Z3 @+ v
% X! o: H8 W* i( f# n B* o" r$ k+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.7 |# X; m a+ ]3 I& J
$ O9 l: u! K6 s+ o: d+ Default – The default template gives balance to all functions.8 y! e' A8 [9 _# f: k" g
. S& M7 x$ o6 G' W" ^/ }6 _+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network., W' {' ]0 N0 O- k6 d- B$ _9 d* J
1 }: ?# n$ g/ u+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.! w, }. u" b0 |& V+ k5 u$ \$ }' U+ q. Y: ]+ `( W" P; h2 ]
____________________________________________________________3 }' Z, \+ G0 B8 w+ A' x4 x& D+ _
8. EtherChannel – what is the process to configure EtherChannel.. T" }/ Q) E: T) w% f2 L$ _9 u" ~- d& F+ Z
a. shutdown both interface ports **
" P4 ^8 }' v. p% f* c6 U4 o" Fb. shutdown the interface on one side only0 `% p# b7 O- T# \' @) [( L1 m) y+ B( ], {% S
c. ???; G* s, C3 C2 n
6 B! e: _! z H+ i% Q& {! h4 ed. ???5 f: Q, k9 }" l( @/ V x+ L# |* `$ e! W3 r
Ans: A; e. [1 T. y& d; y9 t6 B$ G; x: F" k
____________________________________________________________) o$ y9 O/ y2 j& M( z; u) A
" f, {9 _2 E0 P0 b2 ^% E# A9. A question about spanning-tree port-priority.: k, a- u. G- C/ h1 c- y2 e+ h
! w# @$ W6 [8 m, U+ t% Fa. 127 **
2 C; x& M% V3 {" G8 w& Ab. 129$ b; m+ x( ]- N
7 f, M% Y; s) M0 n1 Ac. ???4 P3 E- q0 T, H8 }" I7 u6 n9 f2 U: D8 J9 F+ X
d. ???1 A- q' b, j- w3 ], U4 i' K+ `
* Z0 a1 w+ V. E! @' rAns: A2 p' _. b- N" U# U3 i5 @8 E2 u5 q
____________________________________________________________
. c; H4 v D( T: s: w+ j10. Question about EtherChannel based on STP EtherChannel misconfig……: F& F; @; r$ E8 r3 @ Z! u7 v* C8 \6 r! d9 K
a. (config)# spanning-tree etherchannel guard misconfig **, |+ I3 E% _7 i( P. X& V" y
b. (config-if)# spanning-tree etherchannel guard misconfig% D5 x! V" `4 s6 ]9 N+ x
3 U9 E0 t7 a |$ D0 o( A- j, w/ ec. ???
4 c6 R5 l# Z, `d. ???- u0 P& H$ o- g q j! ^$ n9 }
Ans: A
) g0 b- t' L2 K7 V) m S# t________________________' `- F1 ^* j: `5 {9 b- a n8 c- N# H7 e3 U
$ b9 f3 c7 k$ R# u* j6 z# z& {2 m
7 P* v5 l3 t$ l! i4 X___________________________________6 h+ L2 G3 P* e% J& ]. U; o
11. If HSRP group number is 37, what would be the MAC address?: z0 a C; U% x {! O2 V4 Q
3 K. ^& m$ d0 e$ f1 U" ?a. 00-00-0c-07-ac-25: ^0 S; X; [5 q w6 E( z4 ^* h$ ~9 x( p
b. ???" y; E# m" n% T7 I, C& K3 ], V# F+ [1 Z" ?+ P& C
c. ???' u! o- C' J7 o2 p K: }- r
@( ?* S- f( ]" q, h+ ]8 }/ vd. ???' v: w) W2 m z6 @, u1 v
Ans: A! ~* k3 k8 O) V& l, K" W+ E& c8 y+ H7 u' Q
____________________________________________________________
9 n1 E4 A0 v& l. h; Y* e12. What is the default value for spanning-tree port-priority?) L0 U' f2 {, _2 a6 v7 i7 a/ P- t# ]- d4 Z% R+ D
a. 128( s. O+ U* S$ [4 m6 z- L$ T; \/ s9 c" ~1 u
b. ???$ b' t Q2 V' B D6 T9 }/ @
* j) i5 ~/ v3 i( R9 hc. ???; D9 O1 y) r1 F% a! D) U
1 B, E" i! K. ~$ ~d. ???) M7 j0 p8 P/ B# p& `5 T
, c% g( `, D5 J& OAns: A; w/ G+ a2 J, B4 T! a' E
$ I L. Z8 ~ y q6 [' {" d; ~$ p9 g____________________________________________________________! m$ u6 w3 F- l/ p& i& e/ R1 Z# J# F8 m- Q6 G7 Y
13. Which information does CDP supply from connected devices?/ p7 p+ t; e: f6 B
a. hardware platform, interface ID, hostname' l/ i9 ]9 U. O$ u* Y$ K5 @ h% m' z- Z
b. ??? n- E( G* q7 f R. c' S$ W
c. ???: P( @- s$ b N+ e* @6 T- K5 ?, O L+ R: D: c$ U3 O
d. ???
6 S1 o7 ]$ s6 t/ t* M0 k+ T" X$ HAns: A8 F% i4 l4 r: S: T( c A* ~
____________________________________________________________
2 o. g4 C9 K5 e' a3 r14. If EtherChannel guard is configured, how the interface status is (or looks like) if misconfigured?, j: s# a8 L$ K! `2 L! r C9 C% l: w: s5 `2 q0 c8 w; V7 E( |
a. errdisabled* `& t. Y8 |5 P
b. shutdown$ ?4 W3 ?, |( H
) Z5 R$ a* y4 t# E Z% s/ `5 I! ]c. ???5 \, q4 E( a* {5 c$ D" e
# `9 L* |$ i* j1 K9 q2 md. ???
6 _ F7 c: g$ O: C; G& B% eAns: A# Q4 _9 B) G9 H0 ^' w# F1 V4 H( ?/ \; B; ]6 U( y/ ]9 Z
____________________________________________________________& }6 c# A- _9 E0 z' x- Z
- H# S+ E5 ~8 q6 q' e/ c4 q15. When you configure PVLAN to the portal facing to the router what kind of ….. should be?! m: l% }" ]2 A
a. isolated6 T; N- b, u: K+ y! ?: T4 C2 A
\! j c' R: Z4 I/ r, a) M( Jb. promiscuous% N3 W$ N% h9 ~, o# b8 z% S
c. ???0 g( | F! K+ m) k; v& b; {" j
d. ???- j. L- C% f; R1 ?. O) i+ W/ W$ U" U/ J# F6 k6 u/ `, K4 m
Ans: B& c6 | Z: A; W) o1 s4 Q
____________________________________________________________# J8 I* b$ ^2 `5 D& p3 ^# r0 k8 Q/ ?, j: Y( e0 o$ c* k, @
16. A question with an exhibit./ k8 m5 y3 |3 y0 S
9 b+ N- `: K' g/ A& Q& E. Q6 \There are 2 SW and 2 PCs. There is a trunk with VLAN 1 and 5 allowed. Question is if you do “switchport trunk allowed vlan 2,3,4” on SW2, what happens. Ports towards PCs are in mode access VLAN 5.: t: {1 k) C: b( c
a. The connection is lost between PCs, because you will remove VLANs 1 and 5 from trunk with this command. You should use “switchport trunk allowed vlan” to add additional VLANs into trunk.
& u! Z2 N& C- k7 m. ^! Zb. ???$ @( r! z; t' D( T1 P3 U! R% ?8 W, @7 {, e! K
c. ???# U/ |0 z6 o% A# F8 [
4 ]2 f, ?% i. ^% ud. ???, Q( C, t) E8 v" L5 s- d3 j8 ?5 G* P- E* h
Ans: A* Z5 e, E5 ? p2 ^! U! I5 x
( Q* c6 g. b- O8 p1 I____________________________________________________________$ n6 r$ |: O' `: s* _! J; r. {9 [1 H& A7 i' Q
17 Which option TPI 802.1Q tag?
5 \. v% E! c- ]; ?! s. U6 H7 Ua. 0x0806 z4 T% G0 ~1 J( n, R( h0 b
b. 0x888E8 L6 D& O# q: A) a" {) K
c. 0x08009 n9 N/ e; m: `$ Y
9 A: ]; K8 O: Pd. 0x8100 **6 G! R0 z8 A/ i1 A4 D5 G* x; |
: X8 a- V4 ?$ iAns: D6 E( Y+ d5 O7 a' V: |1 k# U; y( {2 o; {
____________________________________________________________9 g- H Q: V1 n" }$ s9 V
1 y& x" n; z- w18. MAC address filter?! K& i6 S4 C- v: Z6 G, i$ R6 u1 j+ V) S
a. CPU-destined( r& T! c E+ O6 g( {
. T- O& D& u7 U& n3 pb. router9 b& i0 y6 v- R7 s" b: o( g- g/ C4 o3 i' d0 f
c. unicast **" }5 G, Y4 M4 k- b8 H) I: R7 v ?7 H0 u0 O
d. multicast* ~( v' X3 K2 ]
Ans: C
' u7 X8 P `" Z \____________________________________________________________2 _6 E: G1 j* s# E6 a3 N }
19. Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember properly)
. a! v# O5 f( n4 }4 @3 na. trunk port will be immediately) }! |5 X- s; J* I! {3 G1 o
b. trunk port can be portfast mode5 w+ ]" T) y" |+ Z s
c. BDPU turn this port to err-disabled **+ ?. m5 Z" q2 O7 H% P
d. ???
7 o# F* v; K! O5 XAns: C5 V2 K% \4 r6 g5 G
3 [0 E# c; a/ E+ h b& c1 U# k0 V____________________________________________________________
3 Q: N/ E/ i! Q! J6 c20. Question about root guard…." [- Z( H5 A' r* M; I9 T: B9 I4 T, n* q7 Z' \
a. Prevent unknown switch be a root port0 C8 C& s/ M5 f2 t# F# ^1 f% f
% f( f2 l: G- s- q. E9 Lb. Root-inconsistent **, i5 Y. t6 r7 o
' H& C2 s7 D- g3 U% v# t* Uc. ???. S+ A; A6 ?3 l$ k+ ]" ^1 t4 v
d. ???
: E% Q, x8 O" Y. l! iAns: B
0 ]; U6 F1 Y# B3 q7 a____________________________________________________________1 O1 S* E. `* R: j
21 Question about Loop guard configure……..
; k+ ]/ U, p1 |# ga. (config)#spanning-tree loop guard default
. }& O9 g; |4 _; {9 @b. (config-if)#spanning-tree loop
# k1 M1 Y& ?1 v! j4 i3 U+ k3 qc. (config)#spanning-tree loop-guard default
0 s7 y' z+ ~/ C4 z( F zd. (config-if)#spanning-tree guard loop **
. m5 i# N; m1 A6 m9 ye. (config-if)#spanning-tree ??????% v/ w: O* } @) S, C1 |7 \7 n. I8 ^
Ans: D: ?$ F _7 P* l' P5 J1 g0 r
____________________________________________________________% I( o) p/ n2 e: N7 E
$ ]* `8 J( n; d# Y7 l" f4 H' i22. VMPS question – a dynamic access port is member of which VLAN by default?" T6 N* M; [6 u: g
a. VLAN 1 is the default VLAN **
: ~' J( A& U# C% |. s ~; q, y0 \b. none until the port VLAN is determined) }# m6 C& L" M4 k& r% w5 k9 \
7 X. e% c$ @* L/ Y! v& x8 H+ P& a2 s9 Cc. ???
% w5 a m: C$ T3 @d. ???
* `8 r" _+ a/ v, J, _! m, GAns: A L) h( u0 t7 F
; T/ L. o2 I3 h+ u____________________________________________________________* y ]: j0 t/ A! S8 ?4 B
23. Question about the behavior of an access port when a tagged packet is received.3 }( S- ?7 Q- W8 a9 q" E) Q
a. packet is dropped.3 |$ ?; c V \ I- [- o) a0 c* V1 I+ |& b; ]9 y
b. tag is removed and packet is forwarded on the VLAN of the access port. **) @( S4 e( R4 j3 m8 z" d, i
c. tag is removed and packet is forwarded to the VLAN mentioned in the tag.
$ }8 s; D( N" r6 y. V& r4 vd. ???% E9 @( D4 [1 Z/ S1 ]
t1 w H4 ]; \8 r7 L7 E ]Ans: B
+ d- L* w) G s0 u" f2 X! l1 b3 X0 N____________________________________________________________) p2 L; r* r1 C5 M
24. What is an extension of HSRP that allows load sharing between two or more HSRP groups?' ^+ k L4 z2 _
& o% u; w1 X! E. t4 Ya. ???' k8 _2 g3 k& P9 S& Z, j
) q2 E2 q) m3 u i5 H- |% Kb. GHSRP
4 f" h% z" C2 A! A/ S P# z# Nc. MHSRP **0 l2 K1 `3 b; U4 T" r7 I
d. GLBP
# Y9 |" Y6 _0 W5 C: {' Pe. ???+ {1 [4 O, I& t _* a0 N$ E. o+ ~% d$ |0 _* g* \2 Q
f. ???+ ?" |! y% u4 ] @8 E4 `
6 l7 ^, W8 e0 t; zAns: C4 S' B" ^3 o" o; D
3 h* z4 Y( G# z____________________________________________________________ k# d! U7 R* @4 i5 f
25 A question about RSPAN.7 F0 a) n7 d3 ^8 H* c: N4 u
, F6 H% a. G+ H+ ja. vlan 4029 remote span( }: o8 @! c6 M+ a& x$ u' Q5 h* f9 w3 w1 h
b. vlan 510 remote span **5 U" U7 v& \5 Q( A) G6 y
' s* h5 S" D0 l$ Vc. vlan 510 span
6 I! z. Y2 p! A* I. Ud. vlan 4029 span* r3 p# c' z% n0 D" |5 H" d. z" G+ Q$ d5 B
Ans: B5 |# z1 z- {0 c' Q
____________________________________________________________
4 |! P0 {, E4 Q& ~% L& p; e26. A question about configuring spanning-tree port-priority based on a diagram.+ y/ T$ l. A7 K+ g+ C6 u+ D, O2 j. r Z( L f! Q
a. (config)# spanning-tree port-priority 127; p* f( \/ ^0 f# [+ E" U( n8 V( G' v
b. (config-if)# spanning-tree port-priority 127 **5 ]. T% o: A7 [, k" [
c. (config)# spanning-tree port-priority 129; b8 |: V% k1 t0 m3 L) l+ g( k' N. f& s9 v
d. (config-if)# spanning-tree port-priority 129& q0 p; r1 V) A m1 J5 \, K
Ans: B, {2 t0 B- Y& I( P$ f2 }% Y) h/ P& c/ h2 h% {( e, V3 o4 ?
____________________________________________________________- M6 S: K3 G, @+ X# @. F! f) l
" }1 C9 y6 Y' a9 f27 . A question on EtherChannel misconfiguration.
: b) u) j1 q' N2 [a. PortFast
/ c# @; @) @6 \8 }: @+ i4 cb. PAGP9 C& Y- u% Y7 [, |7 H
c. LACP
4 m* C4 ^5 C/ f% C B" `$ [6 K5 td. STP **6 Z* _4 A# v2 }- l' X. [* g" N+ G# {/ l. V5 N7 k3 [- w
Ans: D2 L |9 U2 c1 t) S, R3 ]2 W' _7 T3 H1 S' e( p
____________________________________________________________
$ p6 A5 V# n3 K" ?7 {- A' R28. A question on local database for consoling to network devices. (Choose two.). H/ G5 W' g8 d7 d1 x ?7 p. r6 \7 _* J" x; A
a. Console is a backup authentication method **/ `' M; ^: T- m3 x' ^0 f7 I; |: J8 G& d2 M
b. Console is the only backup authentication method# w ~. Z" a/ v$ C9 R! Z1 ]* j/ s9 n
c. You can set user privileged levels **
1 Y9 O1 r& Q3 U( J/ y8 r7 bd. ???8 W. I0 X& o% R6 B" F6 k. O. a* ~5 E2 f( z2 @! Q3 \
Ans: A & C8 d) h, D5 S9 y2 |# i2 b) w5 B6 V8 n, o; s: t
29. Drag and Drop – STP Timers3 c' f* D1 x5 [, {2 b' E
Hello
( C1 e. C# \$ w5 S– 10 seconds9 Q! |# h3 t% u4 T9 y) d0 |- C4 f! u5 q$ X/ h9 g4 \6 @* i
– new BDPU
7 H$ h' N& {+ B& d$ vForward
% O& N" T# P6 R; O0 s– 15 seconds8 B/ C9 K0 s6 ^* \8 J) ?) V
– listening or learning! t4 E$ G0 N+ A& p; h% Y1 A/ W' _, ?3 Q7 k! j2 `8 H
Hold0 d; B# O& h; R/ g) g' s+ v! ?7 a1 b4 Q$ x' i
– 20 seconds8 X6 a: R1 n Y, [" d* c
– time when BDPU expires. j0 Q, \8 U- D" o- x
____________________________________________________________
. d3 u9 c8 ~. l5 V" r* b7 t30. Three reasons for err-disable. (Choose three), g& M# Y. d: ^
a. storm control **7 R, V0 P! M* G% X8 q- p& y
b. security violation **
/ }) ^: ?( D3 c4 j6 Kc. configuration ports into EtherChannel. y1 I( Y& [ i/ F0 m: U9 S; }2 {: \; X
d. BPDUguard **8 S; ~+ m/ ~8 v% u% h+ g5 [1 w9 L _$ `
e. ???; P% Q4 b; J( M7 Q& K6 x/ l" a) P9 f& s( u$ S
f. ???) C% G% u" {/ S3 y6 X) D
. Z# k; T3 N7 Z, @% v+ h fAns: A,B,D/ O/ N% ]- Z) l0 r8 }* G
+ v/ q( h6 |- ^' h& N% L3 l# y____________________________________________________________, w" ?/ `3 R. i S+ O% A" }4 e
2 a$ M4 w" i: W& b+ q" q" H31. RSPAN what happen after configuration.
; h3 g- A$ S9 T( g7 d- Ja. destination port is unusable for normal use **# J! @ w) W+ Y) C; P
D+ ?8 ~# u0 \0 p4 Y8 n& r* Vb. traffic in network is doubled2 {* ]# v$ w' S# C$ Y8 m* Q6 l0 J& x, N8 R9 a. E
c. ???, { g4 Z1 _, ?$ B. J. _1 S; R( ]+ b/ J3 l* f* q. j; p
d. ???# t1 w% z9 S: O/ c; I
Ans: A4 i+ E! @: a) \% ~9 I3 U3 g9 u& N4 p B
____________________________________________________________" F3 r" J: H/ ^% H0 R5 q- y2 o4 Y5 d0 y7 T
32. A question on local user database for login to network devices. (Choose two.)
* Q l" k. N) b% y) t3 j& D- oa. Local user dbs can be main and also backup authentication method **: b4 c. o- H7 P, Y7 @% S+ m9 X$ W3 U* X7 w
b. Local user dbs is the only backup authentication method/ \+ T/ Z, q4 u, v& [/ V. v) L3 s. `: y: G
c. You can set user privileged levels **2 i/ C3 ?) W! \* |: @8 T+ B/ P% j
d. Local user dbs is used after 3 unsuccessful logins via RADIUS server9 S" g, `9 `7 m8 g3 n7 w
e. ??? H! a8 R" N, L& r
% u+ L( C- u6 N9 XAns: A,C9 m) Q, W" y4 u- v4 Q$ n3 b9 s0 H: z, H$ |
____________________________________________________________) r) y' R4 Q/ T+ ~) Z- X8 A
33 Which switchport feature will block the packet with unknown MAC address from sending it via port.5 q, B( {/ v+ v. n7 U! U/ N# T. P4 k
a. switchport protect8 ~' v( f$ B1 {6 U" G7 C
" N+ ~) v& X" R& h U( ob. switchport block unicast **3 x, h8 H& E( f# Z
' {% P O% r- { Y2 O; b; `& R& lc. switchport portfast
, u% s* F( M2 y [d. packet with unknown MAC will be dropped$ d4 R9 S" M# B7 i8 \
Ans: B
* N% X$ W! Z4 Z" k' P; l' c, J____________________________________________________________. D$ Z# o; f, t7 a9 C& n/ J
* z/ j* B' S# D, p" \34. What are the two ways to configure loop guard?
1 a. j& d- e% ^" d& ]a. (config)# spanning-tree loopguard default **$ s4 \4 F- o! o; H) X. w- r2 L6 B6 Z, E- P0 X+ K0 n
b. (config-if)# spanning-tree guard loop **5 a; f" T# O9 }, x/ k* ~: I
c. ???
5 a- L3 E3 m2 O: Fd. ???
( B; {$ Q! Q1 F2 h0 n: ~8 ^, Oe. ???/ K* C, n5 k/ W3 t2 n& v3 j
% K0 W) H N" M) v0 ]! m) K1 _+ XAns: A,B( b3 `3 S: ]4 ]1 Y: k* T
. M, c! ^8 [- x: i/ f$ |2 ]____________________________________________________________8 a" U7 X$ J% X% `4 Q% [& H5 O. a! n
35. Question about action of DAI with invalid IP-to-MAC. (Choose three)8 `4 ~1 R" o" k! y8 A6 Y8 }
a. Intercept **
* R; O/ j( r. y7 c( Eb. Drops **
1 F, D) h7 |+ x( M& ~3 W0 [" Wc. Log **+ ^0 M4 y8 ~+ t1 j
d. ???. P; Q) d- ]( D0 ^" ]7 Y
e. ???" B0 k: z! D8 g+ L6 U
Ans: A,B,C; e: ?$ w$ P1 A: b; w3 z" m# x+ l' z6 E: L! `( c# T; {' V
____________________________________________________________
- ~, M5 U. h% b+ `4 V2 r" X36. Question about what are RADIUS server responses. (Choose three)* g. |- e& G: T$ o/ j. {* v1 L. @! n5 _ v; ^. m8 E
a. Accept **
1 U* T8 \6 p: V! Lb. Reject **$ G4 o. C: I9 _: f: x! ^ S* A
c. Challenge **5 H5 S B+ B% ^' w3 ` `, q5 P6 ]0 x6 |! N8 F( e5 x
d. Get Password
4 B. P: ~3 b9 ]' O' @e. Cancel/ G8 H* f, z* r. t3 ^" }; u% j$ b V8 ?- f' c* A% w. `
f. ???8 C8 w: ^( w$ E9 k0 p# W
6 n+ Q# r- d3 {- U$ ?Ans: A,B,C
' {' H2 R4 z. O" S; g( w; B% i! m- |" V+ m$ _1 }, O, G6 z- x
, A0 V3 r2 ?/ B" V M3 t6 _9 b
' N+ J6 l! j$ ?6 C5 u/ ?! t+ w( V# E9 ^! `6 X5 M& s) `) Y: [7 [, W
6 P* ~: f7 r6 \. b6 L x; G; M
37 What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?8 w: R; f5 a; q4 `' c7 m
a. Drop0 p% {2 k; h" y/ |6 R( f/ h( a# @; M: q$ S# k. x
b. Remove 82 and forward **2 S% @' V- b) o$ i3 l+ A
c. Proxy ARP8 Z7 d2 b V% P
6 M# F- z/ P; |% x# A! O" K' X5 dd. ???& [- ^* S5 v' `0 A7 `" u
# Q. l/ x0 t6 c7 }9 ?' NAns: B
7 F$ z# r$ f& Q1 L( N5 C8 h____________________________________________________________6 P% w5 g0 k0 j
* N9 J5 j2 @, i2 X8 \38 Option 82 question with two choices. (Choose two.)5 W! M5 O, W* M, x6 F
a. Layer 2 ingress **0 m3 N1 Z$ y. D! X# H) L0 L0 L M7 b
b. Layer 3 egress **7 d& ^6 i1 A7 D$ i1 k2 y7 @
c. ???# D4 z! c5 }) P& s6 R5 p& f n: _/ G6 P6 _4 H, f; h' j
d. ???
$ c( n. p+ i8 V7 z1 K! F+ ?1 t# zAns: A,B% F) P, }* |* O+ B- V+ z7 R( p
____________________________________________________________/ M# B+ `7 F [& l) J
- O% y, S/ | ?6 z0 l3 Q) a) c0 K+ [39 . Drag and Drop – Port Priority/Switch Priority/Path Cost8 o f; T( r; V# \8 i3 ?6 x6 k( N, y- u) i
Port Priority% \0 p$ _/ ]& h5 }' R
$ K0 c8 N" k/ a– By default port priority is 128" {1 Z! g2 a- H2 b* I* Y0 \, L
% c V+ J# V+ x– Lower port priority most preferred path to root* K' j3 _2 ~% ?+ P; c* x8 o
– Value from 0-240 e8 }: R) N7 s2 O5 J% j
– Multiple of 16 <—– this was there7 x7 d' l2 n; C9 p+ }* q' e8 w* N! h! r) m: \0 q7 _/ c- X
Switch Priority( H7 u5 r, r. z7 ~5 R; b2 C" h$ M/ f8 H! k& J6 ]! M
– Lower priority is better to be root bridge* P; f+ [7 b3 Y3 ^6 v# |; ]$ n7 T+ P6 Z' V9 ~6 M" ]' A% k
– Multiple of 4069 <—– this was there
, \: S8 z6 d. P: Y1 `/ s, F– Lower bridge priority is root bridge
1 Z2 C3 V9 k) v. W3 [5 ]8 @4 `! ?Path Cost
& o7 H% u" k! w& q7 z; |1 c8 X6 r– Cost depends of link bandwidth <—– this was there8 q6 ^ d' z3 \& U8 r1 u# `% z
/ O& Q M0 I) l6 V/ ^– Lower cost value is better <—– this was there but it can be draged to any of them) w. B; v7 i& G# T Z( U' x
– If you change the cost on an interface of SW1 then only SW1 will learn the change- z5 \, r9 G- P
– Short range — The range is from 1 to 65536.7 r% V; Q- D; Q& B3 b2 I- j: @- `
– Long range — The range is from 1 to 200,000,000.( D; ~" e! `9 {) K' a; Z' K/ x5 \7 f) p. w! P
____________________________________________________________8 N- g' R6 P0 a& n0 z9 b) S' V& @* M" Y. v. N
40 . Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.): P$ W- a% g1 n7 E: ?# y5 a3 P
a. deletes% m; p: s$ ~# v$ K; g9 p9 u2 B
! a0 n" O2 a9 L: c) T/ e+ x2 _b. logs **' N! q/ L6 {) x2 i4 `$ E, m! J1 i6 M
! u4 B7 G9 S% l/ u# s9 fc. accepts( q' i+ C4 Z, [7 @! c+ M2 W
d. intercepts **( k2 t, M/ K! L9 [7 x
% h% }9 W& }; w* J& K0 Ye. discards ** V" ?: ?0 F0 I7 R8 o
f. bypasses; c- u: g3 q: N U! g7 G. h
Ans: B,D,E* ]" R% F, q- g6 s4 n( s! K( l. C) d
____________________________________________________________9 O, B: n+ u, I: h! A7 \1 ]
41 . Which three features can be optimized by using SDM templates? (Choose three.): H; c& j7 c( F6 ~7 F% _5 m3 m6 p8 P( `' _9 ?' o+ Y' s( L
a. port security- `0 U! c' ], e
b. trunk3 x% c% I% W Z9 i, A! r+ h2 V8 \; h* a; E
c. VLAN **& b( u0 O0 a! @" i0 h9 `2 i) L% H: Y# ^ S) ]5 x' {, W
d. access **
5 P3 l: H% j: f4 ze. DHCP snooping
3 Q; L+ _. B% M3 u& gf. routing **; h0 `# r, ]1 _% [1 c
( ?9 o/ I1 c( x, m+ NAns: C,D,F
3 H. r( o, t# u' d* j J- N____________________________________________________________
9 K3 G5 V1 t% ]( s) j42 . If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)5 e5 j& Q- @# O$ V
a. destination-MAC
! s1 y t" j% Sb. dest-source-MAC8 Q$ ]% }! I* h6 }1 `" U" z
( v! o- V, G) f6 \" cc. destination-IP& [3 I& I; b* T9 u6 D2 k3 T0 `; v3 v7 A0 V p" o1 }0 k
d. source-MAC **$ I: z" I0 q) d. a% l+ s* |
l b0 F2 j/ ^$ `+ qe. source-IP **
% t* y1 P5 E$ t# @8 y; gAns: D,E
( s& N' `' S0 ^1 [2 N$ X# A; n8 ?& I____________________________________________________________9 Y; T- f* F1 H7 N h
43 Which command is used to verify trunk native VLANs?0 y. t" B( |3 C5 l" d4 D# F* j
+ i6 S. P' v/ V2 Va. show access ports/ |: v( {% p' b4 O
b. show interfaces trunk **0 i# w7 h d# ?3 Q3 U
& p! I6 e0 Q% o) B9 Vc. ???1 @1 X. A, x3 u" s* I ]/ s0 T0 v2 w1 D3 _; k2 b1 H
d. ???
+ j& ^2 B% ~6 ^Ans: B
5 B- U/ L" \# Z0 x6 _! u____________________________________________________________% i; p8 r$ r) S. @
$ w5 G" n# }% x) E. v5 A44. Question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose two.), D* p2 o4 ^; b
a. spanning-tree vlan 10 root primary **) ?2 B9 @) P0 [' C( ?+ l7 C+ M* J( I+ }* F
b. spanning-tree vlan 10 priority 4096 **5 m, d* G. Q" J- t
c. ??? _+ O& n: q* b& S5 w, A$ w
6 q& f5 ?* A! S' N3 td. ???+ _) Y: A6 U. B, p, j0 i) ]: B
E) G) c8 o: j' qe. ???5 `4 Q3 S- P# P6 X k
" L) z+ d9 J% \! y! hf. ???
" T. }+ `' r: _% Y- p" Q+ j2 }Ans: A,B, D/ g; S1 V" G% s, z* x9 [% X6 i/ z% s% @+ B6 J
____________________________________________________________7 j- Z2 `7 \7 S: [2 j& B9 _& v$ r& H$ n9 [
45. Which information does CDP supply from connected devices? (Choose three.)3 V5 e& A: |0 t5 s/ @/ U% X: H
a. Hardware Platform **/ q: m3 T1 f8 h. m' U4 a9 \( T* t" x! \/ o# Q- @/ Z
b. Interface ID **; j9 g8 m5 @* K( }
c. Hostname **
+ h' T* S5 C, M# F+ Y R8 _: cd. Config Register3 m% j& D' K' p9 V0 I8 B' D; G% f) j0 q% w
Ans: A,B,C
, P, [ C6 `$ ^. u) H, H4 g& B____________________________________________________________5 g8 J' ^ P# Y
8 R# ~2 a- m S% b6 k) j; D7 Z9 Y- G" B! r# ~5 T5 ~ R+ |) g9 ~
, X0 `( X( v' L9 g) m: t8 [& _1 F+ t0 H& |6 L0 K2 e% p) _; M a7 H
46 Question about voice VLAN.4 m9 z3 F, k. n' ?
a. Disabled by default **9 C& r, Z. ` s$ I/ @ d
b. Enters on untrusted port: b3 v2 n) g. c5 k
4 r; p% V+ J7 X- Mc. Default CoS value of 5 for untagged….. **! J# v# A4 z7 w0 V7 O) |8 }5 h+ D( V9 H& ?2 ~- D) X# Z" ]5 o* i# U
d. Needs manual enable of portfast.# s b* t) O3 Z" o4 A
Ans: A,C6 e& @/ \7 G/ O8 G1 {
9 l9 I* Q2 H f, _. z; A____________________________________________________________, K. h0 G8 _1 C/ ?- L: v
8 N- V+ G; g$ C47 . Question about UDLD aggressive. (Choose two.)- S0 s f* A4 B) T
; t7 F, @: D" S0 X+ e. pa. UDLD messages are sent every 15 seconds. **
/ B" ?5 f' C( u1 M: K' Lb. UDLD tries to reestablish link once before declaring the link down.) K/ W. X$ U- Q0 o
c. When unidirectional fail is detected, port state is determined by spanning tree.. x2 d" g1 L2 g4 p
% @: W8 e+ R- Q" A0 {, ]- ^. Hd. When unidirectional fail is detected, port is turned to errdisable. **6 z/ G1 N. p3 v1 s: G# |: g
e. UDLD sends messages four times the message interval by default.
( N( @/ R1 j; Z, u/ ?f. UDLD automatically … message interval based on configured timers.
# r& |& k; Y6 w8 LAns: A,D
2 D/ H) j, n4 E5 D____________________________________________________________1 G( g! X' ]+ Q; A
48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2." R0 m# p( b9 J* k: P
/ N: X4 b! G' y1 G/ V8 ]& B' A8 A3 yQuestion is how to make DSW1 the primary root for VLAN 10. (Choose two.)/ L$ \, K8 {1 d$ Q/ i, m0 R! K% [( ~; C3 K: W1 e* ~4 q
a. DSW2: change bridge priority to 61440 (highest). **7 X8 @# x: k6 f4 d# U' |8 H1 ]
b. DSW1: change bridge priority to 4096 (lowest). **' Y* `7 L% T$ P) x4 l* `6 ]: U8 G+ O2 D3 Y0 N' Z0 p3 \
c. DSW1: change port priority but in global configuration mode.6 W$ z, b/ A1 b
7 R) w5 C6 K- O% N- Z1 qd. DSW1: change bridge priority but value is 0.0 Z1 L: L! F/ B, s- n2 j7 G" l8 S, T0 G7 M9 K' V' V/ J& J
e. DSW1: change bridge priority but command is priority root.& o' m9 a+ x8 k" h* B) ~# Z+ t' _$ R' e
Ans: A,B
8 K+ J3 D+ b' ]: h* E. k+ P____________________________________________________________+ k: o/ U7 J6 d3 C7 T: r, o# J/ P" @- m4 |/ i7 D* @
49 . How to configure dynamic ARP inspection on a VLAN?
2 O; @, Z: Y* q! M# la. (config-if)# ip arp inspection vlan: G4 v! m1 c' w) R, q2 Q/ [
b. ???
( a8 p2 y% \7 ~ Gc. ???
, H+ v, O. ~+ l3 Y0 v5 `% k: yd. ???( E7 O& T7 D6 S2 l
9 s9 V# o' ^# `0 C7 ]% `Ans: A7 a; q! C, L L& Y4 _( Y
____________________________________________________________+ k2 G7 b, o8 b0 I8 R+ q
* r4 t' z0 K6 a5 K, }% V* ^$ I50. Drag and Drop – Port Priorities
% f+ j; k2 i! j+ \Port Cost0 e$ n( }) v+ p: A# N
– 8 default is being the interface value" O- A% n9 c2 u& F2 ]0 _) v3 {0 Y" a6 A3 d! t$ a6 v, }" A* r
– range 1 – 200k (200,000)
+ [5 p N) E6 sSwitch Port Priority
! r$ c. p9 r$ F1 J. [– default value is 128
$ [. e! ^- }5 ]% E& M* @1 q3 c3 D– multiple of 16 Z! M( T# R) d$ b" h P4 g
4 e K; o4 I0 @* Z" l% _5 oSwitch Priority
: u8 L) E [1 h) C& Q– lower the better) g' O* a0 B+ Z
& x" K' y: Q1 J& T' v1 ?– multiple of 4096
; x: c9 o; ]+ f: ~ldq_china,如果您要查看本帖隐藏内容请回复; y' S, m$ q3 W) P: P- V0 d% A
_________________________________________________________; ~" ^+ Q. F2 h" E$ u
96. A question about the priority of a Stackwise switch.4 O3 L6 H/ \9 c9 U
(CONCEPT ONLY)6 G; [; B2 v7 \* \6 d! v2 C9 @; p6 w* g! h. ~+ _
a. Master member is selected based on member’s priority. **
. W4 K6 O1 w& X6 ~7 A- \% x% Z$ Qb. ???* D2 R8 d, h2 r8 `7 K4 M" o, \: z* @1 G3 _5 }; l
c. ???, v8 \5 A& ` j( B
d. ???
/ L* N! T4 ^4 d' QAns: A8 l& ^, Y. ?; @3 L: a
}8 y! y, X4 C* `' A+ v: M: m% K7 r, ?5 e2 U; }
U6 e& x# k' f& ?0 F7 V97. What is the benefit of UDLD?* X5 J7 R* H: n, q- L4 ?9 z* B" z( l2 C$ Z/ Z" ~. d( |$ g& m3 v
a. provides backup for fiber* J! d5 Z" A+ \6 i$ K
b. help in preventing loops **. y1 P2 h% ]6 |7 Y9 j
' e: y# Y7 z4 L* j& nc. removes loops/ s/ C, Z0 c: j5 o
d. determines switch path# @. B1 N; B4 D! q3 q8 C% p" v9 I: d' f$ c$ c! ^$ a
Ans: B) b: T# J+ }3 C* ?
% ?' o' R0 d' n7 G____________________________________________________________7 n' m6 ^" @; |9 `2 ]
98. When no spanning-tree bpdu guard enable is configured in f0/7, which is true?7 u& A6 O9 p: m; i7 {& J. r# K0 }3 ]0 ~0 c2 E" l2 M8 f
(There’s an exhibit that shows f0/7 receive BPDU.)1 z, B6 v" x. I
a. We have to configure shutdown and no shutdown.! q' ?9 z, c( X
0 d4 B- C0 s& O3 w/ fb. Have to use errdisable recovery.4 C) j! g" L& D( _7 _. b* E
c. ???' x' H; E; ^1 C5 F; U- d x0 o6 |. C% D# x4 j" @
d. ???- F+ p4 P, v9 a+ {& z T
Ans: A
! o6 o" \. z7 |( D, t1 b, J+ j# M/ x拖图题汇总:& l# Y2 I3 ` w" M% L
1. CDP / LLDP- P+ I" K6 a: q: d4 Y
CDP+ l1 C, O. u4 R& ?& W
• Default time between protocol frames is 60 seconds1 A A- v, T; a2 {! m
• Supports IEEE 802.2 and 802.3 encapsulation% @0 V+ q! g0 n' D6 i2 H
, ]* }, P7 e2 \& _. T9 u# u• Uses multicast address 0100.0ccc.cccc
/ D3 p! W+ U0 m% u) p- H: T7 w3 ^LLDP! {6 S1 z0 M' B' g. u
# g0 x ~6 m e0 a6 ?+ ]• Default time between protocol frames is 30 seconds: a; e! }7 _0 q9 a& L6 q
5 s7 V* I2 [6 p, k• Sends topology change notification
% J2 [2 r" Z) J* f6 X; t• Uses multicast address 01-80-C2-00-00-0E+ C# i* E0 d6 f& k3 [! Y& S2 I2 Y" @( L4 x6 `0 c8 w! I. x' r7 ]
==========================================================6 |: r8 q z/ f1 F( O8 z7 n, m3 }3 K! K3 h1 R! B [3 l
2. BPDU Filter / BPDU Guard / PortFast
$ x+ Y3 J* H. y0 Z H% S; l. _BPDU Filter
2 f% W. g7 Y$ H6 h8 z; A1 t* D• Disables Spanning Tree on a configured interface, z7 \" \9 v- Y* K2 b) {9 r
• Protects configured interfaces from sending and receiving unauthorised BPDU frames# M7 u/ X" L$ i# v
Z+ D- v3 n, ]0 i, m2 I TBPDU Guard- _' U6 g/ z u' e& \# M' O0 z6 b; j4 a! K. w" ~
• Protects configured interface from receiving unauthorised BPDU frames. z( q, Q+ g4 m6 `$ E1 _
* s" ?) H1 W- y4 y W; B3 d) {• Shuts down port and places it in err-disabled mode, ~* q) X3 \2 y
PortFast
8 f, }- U+ Y2 M7 J0 S• Configured on access ports with a single host device
# D( G3 X- D, V4 n4 f6 v• Configured trunk interface goes immediately to forwarding state from blocking state
& f. ?. n/ U C3 U7 x0 p==========================================================( x* a9 \; v# c2 t ^) P) q0 d0 e
5 W2 c1 E+ l( {% D3. MSTP / PVST+ / Rapid-PVST+/ D! `: n) P/ I; K- Z9 b
# q4 U) i4 R6 Q! ?5 CMSTP$ ^! e. f8 i+ @$ T& x
• Based on 802.1S7 v+ e' B- X0 b# B' g6 B3 C+ j( r( B& s% n' B! a3 v* z- v
• Maps VLANs to instances u/ d, H+ \" R( r1 L# f5 M* ~7 o: i" u
PVST+
2 `8 D& Q- _0 z% d• Based on IEEE 802.1D% d p4 U- @3 ]3 ]# D, [$ `: ?' U% L" X& U
• Default STP mode8 [ Q/ Z6 {* z3 L$ O! J$ \) E- k3 f! z# K4 M
Rapid-PVST+ g; O; ?/ V" [
) Y, K9 b; y! _+ G C4 [8 R( x• Based on IEEE 802.1W p* u! g# _( }) W& ]- \
& P- s! ~$ y3 H4 i• Discarding port state4 \2 ?- @( E# T
==========================================================+ k" p: r0 k$ I/ \8 H, H
# d! L0 p. g8 C4. Forward / Hello / Hold( @! [9 u8 v, \2 E: l
Forward; R. N, V; C b5 F* L$ U- Z, e0 e* `) N5 N) C- G4 J
• 15 seconds& _- `! @; ]! L/ F( R5 g9 L! P* w$ u d% b$ H/ _+ {
• Listening or learning* J7 u4 \+ ~# X" l% s" H: C( D% j& r. e5 {0 h# @" U# b' t
Hello Y8 ]8 [& [* T: T2 i' ~4 [9 u6 X b4 p2 J
• 10 seconds5 \% K$ h, |% E' i/ P$ B- D! U1 _" h+ ^. w7 _4 w
• New BPDU7 k: }5 c% U2 u/ n( s6 M
Hold- E. u6 {1 L; x2 A- F
& P; Y' y1 c% L% m0 o0 v• 20 seconds
! S, Z2 k( h. I* M1 Z$ {• Time when BPDU expires( I y5 i' E7 P( k. Z0 D1 X
==========================================================' ]$ I( j8 e! K4 H3 X+ D( S/ _
, ?; h M. i, o- m2 I7 u5. Port Cost / Switch Port Priority / Switch Priority6 U9 Q" K- M5 Q0 h1 f3 W* v) w" w ~( m; l0 M! z
Port Cost- {, g/ L! b# P
• 8 default is being the interface value9 v3 Q5 D6 N' N9 ]! d- I& `4 q& {# A1 S3 w9 f7 m4 u
• Range 1 – 200k (200,000)' o2 \3 Q# Z+ f3 i* u+ w; `: V$ }4 V$ x: D# [
Switch Port Priority" ?/ U! k- A, e; l( ^" D
8 E* R# l1 Y' ]9 S, ^• Default value is 1282 m2 r. V- U- D/ c( N0 D8 F
• Multiple of 16
, b- H5 O" D0 x* \8 ?. USwitch Priority+ Q: f% Y/ z$ K9 v7 b/ c* ]; ], i1 A9 K" Z
• Lower the better
/ ^% C) J, }6 |3 }4 R• Multiple of 4096: b! x$ T* p! M ?
! I) J' k. |; ^2 @2 F' u==========================================================' F; ^" @0 ]% |' ]# \# r" ^( u" B
6. Guard Loop / Guard Root
/ E: z# ~0 F7 o& WGuard Loop
) X/ Z% h6 S) [6 \' B9 u$ f- x( A8 g ]• Detecting unidirectional switching links% C6 A+ \6 V1 o+ `4 @
/ w3 M t/ ]3 m; H• Port self-recovery' a4 h. f3 y) h6 ^% L2 |7 N4 |& z" Q6 ^3 b) F, u
Guard Root; C5 @4 F: o, v( f/ Q
$ R9 D) s5 z7 ]% y& v; C* J2 K0 f" [5 P• A better BPDU disables the port as err-disabled
- c* D/ v2 C* \5 v0 X0 t0 ?) i• Protect designated port from recei |
|