Part2 Cmit 350

3528 words 15 pages
CMIT 350 WAN and SOHO Skills Implementation

Winter 2015
Springfield Site Configuration:
Required Implementation: Device hostnames, banners, secured passwords and spanning tree protocol.

* Device Configurations: Implement device hostnames to match the xACME educational topology labels. Provide a template and sample configuration for the MOTD banner and login banner (wording and implementation) for one of the switches. Keep this generic, as it will be implemented on all switches in the xACME educational topology. Lastly, include the configuration steps for implementing device passwords on both console port (out-of-band communications) and VTY (Telnet/in-band communications). All passwords should be encrypted.

…show more content…

Each message/frame passes through the bridge before being forwarded to its intended destination. A bridge looks at the message’s destination and forwards it to the appropriate segment of the network. Segmenting networks this way greatly reduces the competition for the use of a network path.

In building a network, is typical to use two or more bridges or switches between segments in case the primary fails. Those bridges need to understand who is the primary bridge and the layout of the network continually, even if only one is forwarding the messages. In order to accomplish this the bridges, have separate connection paths between them where they exchange information using bridge protocol data units (BPDUs).
The spanning tree algorithm allows a bridge to determine how to avoid bridge loops; a condition where broadcast messages are forwarded out of every port and the receiving switch or switches will repeatedly rebroadcast the messages flooding the network. Since the Layer 2 header does have a time to live (TTL) value, the messages can loop forever.
The spanning tree algorithm determines the network path to route the message in two steps:
1. The algorithm evaluates the configuration messages it has received and chooses the best bridge it can be sent by.
2. Once the bridge is selected to send a message, it compares this choice with other