krish1986
Level 1
Level 1
Member since ‎06-03-2018
‎02-10-2021

User Statistics

  • 6 Posts
  • 0 Solutions
  • 30 Helpful votes Given
  • 0 Helpful votes Received

User Activity

[ client]port1----------port2[snooper]port3_trusted--------port4[server] This is my topology and DHCP snooping is enabled on snooper. Assume we have some bind entry in the snooper which is as follows, MacAddress :0001.0002.0003Ip : 30.30.30.2Lease : ...
When switch receives unknown unicast, it will flood it out all ports except the receiving port of the frame. 1. How this is happening? 2. This will flood with a destination mac of FF:FF:FF:FF:FF:FF ? 3. And packet will not flood to the port where the...
Hi all, We can do policing/shaping at ingress traffic. If the traffic is already rate limited/shaped at ingress, then what’s the use of WRED-Weighted random early detection? How the congestion can happen, because already the traffic flow is policed. ...
Hi all,   The scenario is, in an L3 switch the inter-vlan ip traffic should be passed. Suppose pc1 connected to port1 ipvlan subinterface (10.1.1.1/24, vlan id 10 configured). Pc2 is connected to port2 ipvlan sub interface(20.1.1.1/24, vlan 20). And ...
I have 2 switches connected each other (switch A and switch B). Switch A and B is connected to Ixia also. Assume that, I send l2 Ethernet traffic from Ixia to Switch A, and my destination mac is for Switch B(some port). Traffic is only only unidirect...
Community Statistics
Member Since ‎06-03-2018 10:32 PM
Date Last Visited ‎02-10-2021 12:15 AM
Posts 6