IT Questions and Answers :)

Monday, December 30, 2019

What command do you use if you have 2 stacked 48 port Enterasys/Extreme B5 switches and you wish to set port 41 on the second switch to vlan 4?

What command do you use if you have 2 stacked 48 port Enterasys/Extreme B5 switches and you wish to set port 41 on the second switch to vlan 4?

  • set port vlan ge.2.41 4
  • set port vlan ge.1.41 4
  • set vlan ge.2.41 4
  • set port vlan 4 ge.2.41 


EXPLANATION

When utilizing this command the structure is set up as {set port vlan} then the port(s) on the switch you wish to set, in this case switch 2 port 41 so ge.2.41 followed by the vlan you want to set the port to, in this case 4 (further commands can follow this if needed, but in this example it was not) For a more detailed look at the procedure you can go to https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-Configure-VLAN-on-EOS-Switches

How to Configure VLAN on EOS Switches

Information

TitleHow to Configure VLAN on EOS Switches
Objective
The following shows how to configure  VLANs and verify the configuration.   
Environment
  • SecureStack
  • K-Series
  • 7100-Series
  • S-Series
  • I - Series
Procedure
1.  Create the VLAN
Command:
set vlan create <vlan-id>
Example:
set vlan create 100

2.  Optionally name the VLAN 
Command:
set vlan name <vlan-id> <name>
Example:
set vlan name 100 vlan-blue

3.  Add ports to the VLAN Untagged
Set the Port VLAN ID (PVID) to egress the VLAN untagged to connect to devices that are not tagging (workstations, etc) 

Command:
set port vlan <port-string> <vlan-id> modify-egress

Example:
set port vlan ge.1.1 100 modify-egress
4.  Configure the port to egress tagged traffic  for devices that require tags/ Remove a tagged VLAN from a port.

Command:
set vlan egress vlan <vlan-id> <port-string> tagged

Example:
set vlan egress 100 ge.1.2 tagged

Command:
clear vlan egress vlan <vlan-id> <port-string> 

Example:
clear vlan egress 100 ge.1.2 

Tagged is the default, so the VLAN will be tagged on the port unless untagged is specified with "modify-egress."

Warning EOS allows multiple VLANs to be sent out the same port untagged which is not recommended because of the  potential to have traffic switched to the wrong VLAN on uplinks with multiple VLANs.
5.  Verifying VLAN Config
show VLAN information on a port

Show  vlan portinfo port ge.1.1
 Port           VLAN      Ingress   Egress
                          Filter     Vlan
-----------------------------------------------------------------
ge.1.1         1          N          untagged: 1 tagged: 2


6.  Type show vlan, to see information about VLANs with at least one active link; VLANs with no link will not display. 

C5(su)->show vlan static 
 VLAN: 1             NAME: DEFAULT VLAN
 VLAN Type: Default
 Egress Ports
ge.1.1, ge.1.46
 Forbidden Egress Ports
None.
 Untagged ports
ge.1.1, ge.1.46

7.  To see information about  all configured ports regardless if they have a link, add static to the end of the command.

C5(su)->show vlan static

 VLAN: 1             NAME: DEFAULT VLAN
 VLAN Type: Default
 Egress Ports
ge.1.1-48, tg.1.49-50, lag.0.1-6
 Forbidden Egress Ports
None.
 Untagged ports
ge.1.1-48, tg.1.49-50, lag.0.1-6

Share:

What kind of information about your e-mail environment is not stored in DNS?

What kind of information about your e-mail environment is not stored in DNS?

  • SPF record
  • Certificate expiration date
  • MX
  • DKIM selector 
What kind of information about your e-mail environment is not stored in DNS?

EXPLANATION

DNS servers create a DNS record to provide important information about a domain or hostname, particularly its current IP address. The most common DNS record types are:
  • Address Mapping record (A Record)—also known as a DNS host record, stores a hostname and its corresponding IPv4 address.
  • IP Version 6 Address record (AAAA Record)—stores a hostname and its corresponding IPv6 address.
  • Canonical Name record (CNAME Record)—can be used to alias a hostname to another hostname. When a DNS client requests a record that contains a CNAME, which points to another hostname, the DNS resolution process is repeated with the new hostname.
  • Mail exchanger record (MX Record)—specifies an SMTP email server for the domain, used to route outgoing emails to an email server.
  • Name Server records (NS Record)—specifies that a DNS Zone, such as “example.com” is delegated to a specific Authoritative Name Server, and provides the address of the name server.
  • Reverse-lookup Pointer records (PTR Record)—allows a DNS resolver to provide an IP address and receive a hostname (reverse DNS lookup).
  • Certificate record (CERT Record)—stores encryption certificates—PKIX, SPKI, PGP, and so on.
  • Service Location (SRV Record)—a service location record, like MX but for other communication protocols.
  • Text Record (TXT Record)—typically carries machine-readable data such as opportunistic encryption, sender policy framework, DKIM, DMARC, etc.
  • Start of Authority (SOA Record)—this record appears at the beginning of a DNS zone file, and indicates the Authoritative Name Server for the current DNS zone, contact details for the domain administrator, domain serial number, and information on how frequently DNS information for this zone should be refreshed.

 


Share:

What is the largest key length for the Blowfish symmetric-key block cipher?

What is the largest key length for the Blowfish symmetric-key block cipher?

  • 512 bits
  • 448 bits
  • 224 bits
  • 256 bits 
What is the largest key length for the Blowfish symmetric-key block cipher?

EXPLANATION

The maximum size of the key in blowfish algorithm is 56 bytes or 448 bits. Explanation: The size of the blocks of the plaintext is 64 bits each.
Share:

What response code shows that an Amazon ELB instance is healthy?

What response code shows that an Amazon ELB instance is healthy?

  • 404
  • 403
  • 500
  • 200 

EXPLANATION

A healthy EC2 instance is one that issues a response to a health check call with a 200 response code. Healthy machines are given a balanced portion of the traffic being directed through the ELB

Share:

CHAP stands for?

CHAP stands for?

  • Circuit Hardware authentication protocol
  • Circuit Handshake authentication protocol
  • Challenge Handshake authentication protocol
  • Challenge Hardware authentication protocol 

EXPLANATION

CHAP. Short for Challenge Handshake Authentication Protocol, a type of authentication in which the authentication agent (typically a network server) sends the client program a random value that is used only once and an ID value. Both the sender and peer share a predefined secret.

 



Share:

What Command in "Command Prompt" is used to check hard disk issues

What Command in "Command Prompt" is used to check hard disk issues

  • net stop wuauserv
  • chkdsk c:\
  • dir
  • sfc /scannow 
What Command in "Command Prompt" is used to check hard disk issues

EXPLANATION

Short for "check disk," the chkdsk command is a Command Prompt command used to check a specified disk and repair or recover data on the drive if necessary. Chkdsk also marks any damaged or malfunctioning sectors on the hard drive or disk as "bad" and recovers any information still intact.
 C:\WINDOWS\system32>chkdsk
The type of the file system is NTFS.

WARNING!  /F parameter not specified.
Running CHKDSK in read-only mode.

Stage 1: Examining basic file system structure ...
  450816 file records processed.
File verification completed.
  8733 large file records processed.
  0 bad file records processed.

Stage 2: Examining file name linkage ...
  650 reparse records processed.
Progress: 495796 of 585112 done; Stage: 84%; Total: 76%; ETA:   0:00:06 .
 


Share:

On an class C IPv4 network, which of these IPs is used for broadcast traffic

On an class C IPv4 network, which of these IPs is used for broadcast traffic

  • 192.168.0.254
  • 192.168.0.0
  • 192.168.0.1
  • 192.168.0.255

EXPLANATION


It is very similar to the network broadcast we just talked about but varies slightly in the sense that its IP broadcast is not set to 255.255.255.255 , but is set to the subnet broadcast address. For example, my home network is a Class C network : 192.168.0.0 with a subnetmask of 255.255.255.0 or, if you like to keep it simple, : 192.168.0.0/24.
This means that the available valid hosts for this network are from 192.168.0.1 to 192.168.0.254. In this Class C network, as in every other network, there are 2 addresses which I can't use. The first one is preserved to identify the network (192.168.0.0) and the second one for the subnet broadcast (192.168.0.255).
Share:

Popular Posts