Compare cert salaries and plan your next career move
Bl8ckr0uter wrote: » Great information! I am going to have to give this a once over. Since our meeting about network design has been pushed back til Monday, i'll have more time to prepare my design. Ok I still haven't been able to figure this out. Say I have switches set up like this: 3560>>3560>>3550 or like this: 3560>>3550>>3560 or even like this: 3550>>2950>>3560 Could I still deploy private vlans between the two 3560s? Like if at any frames have to traverse a path that doesn't read private vlans does that negate the ability to use private vlans? Also if the direct path of the switches can read private vlans but they all terminate into switches that either don't read private vlans or aren't configured for them, does that negate the ability to use them? I hope my question makes sense lol
Note Multiple PVLAN pairs can be specified using this command so that a PVLAN trunk port can carry multiple secondary VLANs. If an association is specified for the existing primary VLAN, the existing association is replaced. If there is no trunk association, any packets received on secondary VLANs are dropped.
In this illustration, a Catalyst 4500 switch is being used to connect a downstream switch that does not support PVLANs. Traffic being sent in the downstream direction towards host1 from the router is received by the Catalyst 4500 series switch on the promiscuous port and in the primary VLAN (VLAN 10). The packets are then switched out of the isolated PVLAN trunk, but rather than being tagged with the primary VLAN (VLAN 10) they are instead transmitted with the isolated VLAN's tag (VLAN 11). In this way, when the packets arrive on the non-PVLAN switch, they can be bridged to the destination hosts' access port. Traffic in the upstream direction is sent by host1 to the non-PVLAN switch, arriving in VLAN 11. The packets are then transmitted to the Catalyst 4500 series switch tagged with that VLAN's tag (VLAN 11) over the trunk port. On the Catalyst 4500 series switch, VLAN 11 is configured as the isolated VLAN, and the traffic is forwarded as if it came from an isolated host port.
Bl8ckr0uter wrote: » Well we had our discussion today and we are basically going to go with a blend of what the other guy and I said. So now I get to roll out a pfsense firewall w/ snort plug ins. I purchased this book: Amazon.com: pfSense: The Definitive Guide (9780979034282): Christopher M. Buechler, Jim Pingle, Michael W. Lucas: Books I plan to play with it tonight on my main network.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.