VLANs.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLANs LAN Switching and Wireless – Chapter 3.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Chapter 3: Link Aggregation
Implementing Inter-VLAN Routing
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
VLANs Module 2. 2 VLANs  VLANs  Trunking  VLAN Trunking Protocol (VTP)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
VLANs- Chapter 3 CCNA Exploration Semester 3 Modified by Profs. Ward
Layer 2: Redundancy and High Availability Part 1: General Overview on Assignment 1.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Configuring VLANs.
VLANs.ppt CCNA Exploration Semester 3 Chapter 3
CCENT Study Guide Chapter 11 VLANs and Inter-VLAN Routing.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—2-1 Implementing VLANs in Campus Networks Applying Best Practices for VLAN Topologies.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
Virtual LAN (VLAN) W.lilakiatsakun.
Voice VLANs Lecture 7 VLANs.ppt 21/04/ Apr-17
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Sybex CCNA Chapter 11: VLAN’s Instructor & Todd Lammle.
VLAN Trunking Protocol
Building Cisco Multilayer Switched Networks (BCMSN)
The University of Bolton School of Business & Creative Technologies MWD1014 Computer Networks Virtual Local Area Networks (VLANs) Martin Stanhope
Chapter 9 – Implementing Ethernet Virtual LANs
Chapter 9 Virtual LANs (VLANs). Setup 1 Setup 2.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Switch LAN Switching and Wireless – Chapter 3.
VLAN-1 Virtual Local Area Networks (VLANs). VLAN-2 Virtual Local Area Networks Introducing VLANs.
Medium-Sized Switched Network Construction NetPro-ITI Implementing VLANs and Trunks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Switching Basics and Intermediate Routing CCNA 3 Chapter 8.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching 3.0.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
VLAN Segmentation 1. It’s all about the IP Address 2 Rick Santa Cruz, Ca Emmalia Santa Cruz, Ca Emmalia, you are in my neighborhood so I can take the.
Switching Topic 2 VLANs.
Virtual LAN (VLAN) W.lilakiatsakun. VLAN Overview (1) A VLAN allows a network administrator to create groups of logically networked devices that act as.
Virtual Local Area Networks (VLANs) Part II
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Virtual LAN (VLAN) W.lilakiatsakun.
+ Lecture#8: VLAN Asma AlOsaimi Topics VLAN Segmentation VLAN Implementation VLAN Security and Design 3.0.
LAN Switching Virtual LANs. Virtual LAN Concepts A LAN includes all devices in the same broadcast domain. A broadcast domain includes the set of all LAN-connected.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
Instructor Materials Chapter 2: Scaling VLANs
Switching and VLANs.
Chapter 11 VLANs and Inter-VLAN Routing
© 2002, Cisco Systems, Inc. All rights reserved.
Instructor & Todd Lammle
Switching and VLANs.
Instructor Materials Chapter 6: VLANs
Virtual Local Area Networks (VLANs) Part I
LAN Switching and Wireless – Chapter 3
1-LAN design 2-Scaling VALNs
Extending Switched Networks with Virtual LANs
Chapter 5: Inter-VLAN Routing
Chapter 2: Scaling VLANs
Inter-VLAN Routing.
CIS 187 CCNP SWITCH Multilayer Switched Networks Rick Graziani
CIS 82 Routing and Switching Essentials Chapter 6 VLANs
Routing and Switching Essentials v6.0
CCNA Routing and Switching Routing and Switching Essentials v6.0
Switching and VLANs.
Chapter 3: Implementing VLAN Security
Switching and VLANs.
Chapter 2: Scaling VLANs
Presentation transcript:

VLANs

Chapter 3: Objectives Explain the purpose of VLANs in a switched network. Analyze how a switch forwards frames based on VLAN configuration in a multi-switched environment. Configure a switch port to be assigned to a VLAN based on requirements. Configure a trunk port on a LAN switch. Configure Dynamic Trunk Protocol (DTP). Troubleshoot VLAN and trunk configurations in a switched network. Configure security features to mitigate attacks in a VLAN-segmented environment. Explain security best practices for a VLAN-segmented environment. Chapter 1 Objectives

VLAN Segmentation 1.1 Hierarchical Network Design  Overview  

Understanding IP communications 192.168.10.0/24 Subnet A MAC aa.aa MAC bb.bb B 192.168.10.0/24 Subnet 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 Destination Address bb.bb Source Address aa.aa Type IP DA 192.168.10.11 FCS Devices can only communicate with other devices on the same subnet A knows that it is on the 192.168.10.0/24 subnet (AND operation with its IP address and subnet mask). (Same subnet = Same subnet mask) A knows that B (192.168.1.11) is on its same subnet (AND operation with B’s IP address and A’s subnet mask) SAME Subnet A can reach B directly without going through a router B 192.168.10.11 AND 255.255.255.0 -------------------- 192.168.10.0 A 192.168.10.10 AND 255.255.255.0 -------------------- 192.168.10.0

Understanding IP communications 192.168.10.0/24 Subnet A MAC aa.aa MAC cc.cc C 192.168.20.0/24 Subnet 192.168.10.10 255.255.255.0 192.168.20.12 255.255.255.0 Destination Address Source Address Type IP DA 192.168.20.12 FCS Devices can only communicate with other devices on the same subnet A knows that it is on the 192.168.10.0/24 subnet (AND operation with its IP address and subnet mask) (Same subnet = Same subnet mask) A knows that C (192.168.20.12) is on a different subnet (AND operation with B’s IP address and A’s subnet mask) – Can’t get there directly! DIFFERENT Subnets A can NOT reach B directly. Must go through a router B 192.168.20.12 AND 255.255.255.0 -------------------- 192.168.20.0 A 192.168.10.10 AND 255.255.255.0 -------------------- 192.168.10.0

The router will take care of it from there. 192.168.10.0/24 Subnet 192.168.20.0/24 Subnet A MAC aa.aa MAC 11.11 MAC 22.22 MAC cc.cc C 192.168.10.10 255.255.255.0 192.168.10.1 255.255.255.0 192.168.20.1 255.255.255.0 192.168.20.12 255.255.255.0 Destination Address 11.11 Source Address aa.aa Type IP DA 192.168.20.12 FCS Destination Address cc.cc Source Address 22.22 Type IP DA 192.168.20.12 FCS A sends packet to devices in a DIFFERENT subnet directly to a router which is on the same subnet as A. The router will take care of it from there. DIFFERENT Subnets A can NOT reach B directly. Must go through a router 192.168.20.11 AND 255.255.255.0 -------------------- 192.168.20.0 192.168.10.10 AND 255.255.255.0 -------------------- 192.168.10.0

Understanding IP communications B 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 A C 192.168.10.10 255.255.255.0 192.168.20.12 255.255.255.0 A C 192.168.10.10 255.255.255.0 192.168.10.1 255.255.255.0 192.168.20.1 255.255.255.0 192.168.20.12 255.255.255.0 Devices can only communicate with other devices on the same subnet Otherwise, they must go through a router, that is on its same subnet

Definition: VLAN “A VLAN is a virtual LAN that logically segments switched networks based on functions, project teams, or applications of the organization regardless of the physical location or connections to the network.”

TO CLEAR A SWITCH ALWAYS DO THE FOLLOWING TO CLEAR A SWITCH!! S1# delete vlan.dat Delete filename [vlan.dat]? Delete flash:/vlan.dat? [confirm] S1# erase startup-config Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] [OK] Erase of nvram: complete %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram S1# reload Proceed with reload? [confirm]

Default VLAN Assignment Default: All ports in the same VLAN (subnet) Switch# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gig0/1, Gig0/2 <output omitted>

Default VLAN Assignment Default: All ports in the same VLAN ARP Request Broadcast A B C D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.10.12 255.255.255.0 192.168.10.13 255.255.255.0 Hosts can communicate with each other because: Same IP subnet Switch ports are on the same VLAN (subnet) Can A, B, C and D ping each other? If A did an ARP request for B, who would see this Ethernet broadcast?

VLAN Definitions A VLAN is a logical partition of a Layer 2 network. Multiple partitions can be created, allowing for multiple VLANs to co-exist. Each VLAN is a broadcast domain, usually with its own IP network. VLANs are mutually isolated and packets can only pass between them via a router. The partitioning of the Layer 2 network takes place inside a Layer 2 device, usually via a switch. The hosts grouped within a VLAN are unaware of the VLAN’s existence. 3.1.1.1 VLAN Definitions

With a single VLANs (“no VLANs”) MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 You can do this but devices can only communicate with each other that are on the same IP subnet…. Unless you have a ….. ROUTER (coming) Who can A Ping? B ping? C ping? D ping?

A single VLAN (“no VLANs”) means no segmentation ARP Request Broadcast Wasted bandwidth MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 Who can A Ping? B ping? C ping? D ping? If A did an ARP request for B, who would see this Ethernet broadcast? If C did an ARP request for D, who would see this Ethernet broadcast? Remember: ARP requests are only when the source IP address and the destination IP address are on the SAME SUBNET.

A single VLAN (“no VLANs”) means no segmentation ARP Request Broadcast A B C D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 Who can A Ping? B ping? C ping? D ping? If A did an ARP request for B, who would see this Ethernet broadcast? If C did an ARP request for D, who would see this Ethernet broadcast? Remember: ARP requests are only when the source IP address and the destination IP address are on the SAME SUBNET.

VLANs and IP Addresses/Masks VLANs are configured on the switch port IP Addresses and subnet masks are configured on the devices that connect to the switch ports. VLAN on the switch must match the IP network address of the device.

VLANs are configured on the switch port Configured for VLAN 10 Configured for VLAN 10 Configured for VLAN 20 Configured for VLAN 20 MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 VLANs are configured on the switch port IP Addresses and subnet masks are configured on the devices that connect to the switch ports. VLAN on the switch must match the IP network address of the device.

BEFORE (DEFAULT CONFIGURATION) 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.10.12 255.255.255.0 192.168.10.13 255.255.255.0 Default: All ports in the same VLAN (subnet) Switch# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gig0/1, Gig0/2

AFTER CONFIGURATION A B C D 192.168.10.10 255.255.255.0 192.168.10.11 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 Switch# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 10 active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12, Gig0/1 20 active Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24, Gig0/2

VLANs give proper segmentation – Like having separate switches VLANs do not have to be configured contiguously on the switch. ARP Request Broadcast ARP Request Broadcast A B C D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 VLANs segment switches in to different VLANs or Subnets Think of it like having separate switches Who can A Ping? B ping? C ping? D ping? If A did an ARP request for B, who would see this Ethernet broadcast? If C did an ARP request for D, who would see this Ethernet broadcast?

Router and subnets/VLANs MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 Router is required to connect (route) between subnets/VLANs

MAC 22.22 192.168.20.1 255.255.255.0 PCA> ping 192.168.20.12 MAC 11.11 192.168.10.1 255.255.255.0 MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 Router is required to connect (route) between subnets/VLANs In this example, a single router with two IP addresses, one on each subnet, is connected to the switch. Each of the router’s interfaces is connected to a proper VLAN port on the switch to match it’s IP subnet. (Just like the host computers!)

A does an ARP Request for 192.168.10.1 (Default gateway). MAC 22.22 192.168.20.1 255.255.255.0 PCA> ping 192.168.20.12 MAC 11.11 192.168.10.1 255.255.255.0 MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 ARP Cache 192.168.10.1 <-> 11.11 A does an ARP Request for 192.168.10.1 (Default gateway). Gets ARP Reply A adds MAC and IP to ARP Cache

A sends Ethernet frame to default gateway, the router MAC 22.22 192.168.20.1 255.255.255.0 PCA> ping 192.168.20.12 MAC 11.11 192.168.10.1 255.255.255.0 MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 Destination Address 11.11 Source Address aa.aa Type IP (ICMP) DA 192.168.20.12 FCS A sends Ethernet frame to default gateway, the router

Router does an ARP Request for 192.168.20.12 (Destination IP). ARP Cache 192.168.20.12 <-> cc.cc MAC 22.22 192.168.20.1 255.255.255.0 MAC 11.11 192.168.10.1 255.255.255.0 MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 PCA> ping 192.168.20.12 Router does an ARP Request for 192.168.20.12 (Destination IP). Gets ARP Reply Router adds MAC and IP to ARP Cache

Router sends Ethernet frame to final destination, PC-C MAC 22.22 192.168.20.1 255.255.255.0 PCA> ping 192.168.20.12 MAC 11.11 192.168.10.1 255.255.255.0 MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 Destination Address cc.cc Source Address 22.22 Type IP (ICMP) DA 192.168.20.12 FCS Router sends Ethernet frame to final destination, PC-C

MAC 22.22 192.168.20.1 255.255.255.0 PCA> ping 192.168.20.12 .!!!! MAC 11.11 192.168.10.1 255.255.255.0 MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 Destination Address 22.22 Source Address cc.cc Type IP (ICMP) DA 192.168.10.10 FCS Destination Address aa.aa Source Address 11.11 Type IP (ICMP) DA 192.168.10.10 FCS

Benefits of VLANs Security: Improved by isolating user access to sensitive data and applications. Cost reduction: Reduces the need for expensive network upgrades and more efficient use of existing bandwidth and uplinks. Smaller Broadcast Domains: Divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms. Better performance: Divides the flat Layer 2 networks into multiple broadcast domains reducing unnecessary traffic on the network and boosts performance. Improved IT staff efficiency: Makes the network easier to manage. Benefits of a VLAN User productivity and network adaptability are key drivers for business growth and success. Implementing VLAN technology enables a network to more flexibly support business goals. The primary benefits of using VLANs are as follows: Security - Groups that have sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches. Faculty computers are on VLAN 10 and completely separated from student and guest data traffic. Cost reduction - - Broadcast storm mitigation - Dividing a network into VLANs reduces the number of devices that may participate in a broadcast storm. As discussed in the "Configure a Switch" chapter, LAN segmentation prevents a broadcast storm from propagating to the whole network. In the figure you can see that although there are six computers on this network, there are only three broadcast domains: Faculty, Student, and Guest. Improved IT staff efficiency - VLANs make it easier to manage the network because users with similar network requirements share the same VLAN. When you provision a new switch, all the policies and procedures already configured for the particular VLAN are implemented when the ports are assigned. It is also easy for the IT staff to identify the function of a VLAN by giving it an appropriate name. In the figure, for easy identification VLAN 20 has been named "Student", VLAN 10 could be named "Faculty", and VLAN 30 "Guest." Simpler project or application management - VLANs aggregate users and network devices to support business or geographic requirements. Having separate functions makes managing a project or working with a specialized application easier, for example, an e-learning development platform for faculty. It is also easier to determine the scope of the effects of upgrading network services.

How many VLANs can you configure on a switch? It depends…. on the switch and the switch’s capabilities and what you require.

Default VLAN Assignment Switch# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gig0/1, Gig0/2 1002 fddi-default act/unsup 1003 token-ring-default act/unsup 1004 fddinet-default act/unsup 1005 trnet-default act/unsup VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------ 1 enet 100001 1500 - - - - - 0 0 1002 fddi 101002 1500 - - - - - 0 0 1003 tr 101003 1500 - - - - - 0 0 1004 fdnet 101004 1500 - - - ieee - 0 0 1005 trnet 101005 1500 - - - ibm - 0 0 Switch#

Normal Range VLANs Switch# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gig0/1, Gig0/2 1002 fddi-default act/unsup 1003 token-ring-default act/unsup 1004 fddinet-default act/unsup 1005 trnet-default act/unsup Used in small- and medium-sized business and enterprise networks. VLAN Range: 1 – 1005 Reserved VLANs: VLANs 1, 1002 – 1005 Configurations stored in vlan.dat in flash memory. Note: VLAN Trunking Protocol (VTP) can manage normal range VLANs. 1002-1005 reserved for Token Ring and FDDI VLAN 1 can’t be deleted

Extended Range VLANs More on VTP in Chapter 4 Used in Service Provider networks (great number of customers) or large, global enterprises. VLAN Range: 1006 - 4094. Support fewer VLAN features than normal range VLANs. Saved in the running configuration file.

It can support up to 255 normal range and extended range VLANs.

Types of VLANs Default VLAN (VLAN 1 by default) Native VLAN (VLAN 1 by default) Used for untagged traffic (later) User VLANs Each IP subnet is a separate VLAN Management VLAN VLAN to connect to infrastructure devices such a switches Voice VLAN VLAN used to connect IP phones Guest VLAN For to connect guests and others who do not have access to internal resources, perhaps Internet access only Garbage VLAN For unused ports not yet configured for a specific VLAN

User VLAN examples VLAN = Subnet Business VLANs IT VLAN HR VLAN Sales VLAN College Student VLAN Faculty VLAN Guest VLAN

Default VLAN VLAN 1 Default VLAN Native VLAN Un-tagged (If trunking there is no 802.1Q or ISL encapsulation) CDP, VTP, PAgP, LACP, DTP, BPDUs By default all traffic is carried across VLAN 1. By default all ports are on VLAN 1 VLAN 1 is: The default VLAN (all user traffic) Native VLAN: No trunking encapsulation even if configured as a trunk coming). All Layer 2 control traffic (e.g., DTP, VTP, STP BPDUs, PAgP, LACP, CDP, etc.), are associated with VLAN 1

Default VLAN 1 VLAN 1 cannot be deleted Security best practices: S1# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gi0/1, Gi0/2 VLAN 1 cannot be deleted Security best practices: Avoid using VLAN 1 for all VLANs other that control traffic which must be on VLAN1 In other words, create additional VLANs

User or Data VLANs MAC aa.aa MAC bb.bb MAC cc.cc A B C MAC dd.dd D 192.168.10.10 255.255.255.0 192.168.10.11 255.255.255.0 192.168.20.12 255.255.255.0 192.168.20.13 255.255.255.0 HR Department Sales Department These are VLANs used for different user VLANs/subnets For user data traffic What about the ports not in the Red or Blue VLAN? They are still in VLAN 1 (default VLAN) Change them to the Voice (VoIP) VLAN later.

Creating Static User VLANs S1# configure terminal S1(config)# vlan 10 S1(config-vlan)# name HR S1(config-vlan)# exit S1(config)# interface fastethernet 0/2 S1(config-if)# switchport mode access S1(config-if)# switchport access vlan 10 S1(config-if)# end S1# VLAN name is optional Single host attached, not another switch (trunk)… later VLAN 10 assigned to the port Ports on a switch are manually assigned (CLI) to a VLAN. If you assign an interface to a VLAN that does not exist, the new VLAN is created for you. Note: Dynamic VLANs can be configured using a special server called a VLAN Membership Policy Server (VMPS). Beyond the scope of this course.

Configuring a Range of Ports S1(config)# interface range fastethernet 0/1 - 10 S1(config-if-range)# switchport mode access S1(config-if-range)# switchport access vlan 10 S1(config-if-range)# exit S1(config)# interface gigabitethernet 0/1 S1(config-if)# switchport mode access S1(config-if)# switchport access vlan 10 S1(config-if)# end S1#

Configuring a Range of Ports S1(config)# vlan 20 S1(config-vlan)# name SALES S1(config-vlan)# exit S1(config)# interface range fastethernet 0/13 - 22 S1(config-if-range)# switchport mode access S1(config-if-range)# switchport access vlan 20 S1(config-if-range)# exit S1(config)# interface gigabitethernet 0/2 S1(config-if)# switchport mode access S1(config-if)# switchport access vlan 20 S1(config-if)# end S1#

Configuring a Range of Ports S1# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/11, Fa0/12, Fa0/23, Fa0/24 10 HR active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Gi0/1 20 SALES active Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Gi0/2

Verifying VLAN Port Parameters S1# show interface fa 0/1 switchport Name: Fa0/1 Switchport: Enabled Administrative Mode: static access Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: Off Access Mode VLAN: 10 (HR) Trunking Native Mode VLAN: 1 (default) Administrative Native VLAN tagging: enabled Voice VLAN: none Operational private-vlan: none Trunking VLANs Enabled: ALL <some output omitted> S1#

Verifying VLAN Port Parameters S1# show interface fa 0/11 switchport Name: Fa0/11 Switchport: Enabled Administrative Mode: dynamic auto Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Administrative Native VLAN tagging: enabled Voice VLAN: none

Verifying VLANs S1# show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/11, Fa0/12, Fa0/23, Fa0/24 10 HR active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Gi0/1 20 SALES active Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Gi0/2 1002 fddi-default act/unsup 1003 token-ring-default act/unsup 1004 fddinet-default act/unsup 1005 trnet-default act/unsup S1#

Verifying VLANs S1# show vlan id 10 VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 10 HR active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Gi0/1 <output omitted> S1# show vlan name SALES 20 SALES active Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Gi0/2 S1#

Verifying VLANs S1(config)# vlan 444 S1(config-vlan)# end S1# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/11, Fa0/12, Fa0/23, Fa0/24 10 HR active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Gi0/1 20 SALES active Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Gi0/2 444 VLAN0444 active <output omitted> S1# conf t S1(config)# no vlan 444 S1(config)# end S1# show vlan id 444 VLAN id 444 not found in current VLAN database S1#

Management VLAN 1 VLAN 1 192.168.10.254 SSH to 192.168.10.254 S1(config)# inter vlan 1 S1(config-if)# description Management VLAN S1(config-if)# ip address 192.168.10.254 255.255.255.0 S1(config-if)# no shutdown A switch can be managed via HTTP, Telnet, SSH, or SNMP. A management VLAN is used to manage the infrastructure devices including switches, routers, AP, etc. Security best practice is to change the management VLAN to a VLAN other than VLAN 1. We will discuss this later, because we will need to route to the management VLAN.

Native VLAN A native VLAN is assigned to an IEEE 802.1Q trunk port (later). Incoming traffic can be tagged (VLAN) or untagged traffic. Native VLANs are set out in the IEEE 802.1Q specification to maintain backward compatibility with untagged traffic. Security best practice is to change the native VLAN to a VLAN other than VLAN 1. We will come back to this later…

Voice VLAN VoIP traffic requires: Assured bandwidth to ensure voice quality. Transmission priority over other types of network traffic. Ability to be routed around congested areas on the network. Delay of less than 150 milliseconds (ms) across the network. Security best practice is that voice traffic must be placed in a separate VLAN.

Power over Ethernet Cisco IP Phone like other devices requires power to operate. Power can come from one of two sources: An external AC adapter Power over Ethernet (DC) using the network data cable.

External Adapters External Adapters External adapter are also known as wall warts. Disadvantage of IP Phones: If power failure the IP Phone will fail. Unlike the old days.

Power over Ethernet Inline power or Power over Ethernet (PoE) Advantages of PoE: Power where power may not be easily found. Managed Monitored Offered only to selected devices

switchport voice vlan vvid Tagged as vvid 802.1Q trunk CoS in 802.1p bits Data: Untagged: Native VLAN Recommended Option Switch(config)# interface type mod/num Switch(config-if)# switchport voice vlan vlan-id Instructs the Cisco IP phone to forward all voice traffic through the specified VLAN. By default, the Cisco IP phone forwards the voice traffic with an 802.1Q priority of 5. Creates a special 802.1Q trunk (so called trunk later) Negotiated by DTP and CDP (provisioning of the vvid) CoS (Class of Service) in 802.1p bits (later) vvid puts: Voice packets on voice VLAN Voice VLAN is configured. Data packets in Native VLAN VLAN 1 by default unless modified on the switch Can configure the data VLAN to be a a VLAN other than Native or Voice. (coming)

Configuring Voice VLAN Operation Tagged as voice VLAN 100 802.1Q trunk CoS in 802.1p bits Data: Untagged: Native VLAN Tagged as VLAN 20 Recommended Option Switch(config)# interface FastEthernet0/24 Switch(config-if)# switchport voice vlan 100 Switch(config-if)# switchport access vlan 20 Portfast is automatically enabled with voice VLAN. Switch# show run interface FastEthernet0/24 switchport voice vlan 100 switchport access vlan 20 spanning-tree portfast More to come!

VLAN Trunks VLAN 1 VLAN 10 VLAN 20 VLAN 100 VLAN 155 VLAN 199 VLAN 200 Default VLAN VLAN 1 Control traffic (STP, DTP, VTP, CDP, …) User VLAN VLAN 10 HR – 192.168.10.0/24 VLAN 20 User VLAN Sales– 192.168.20.0/24 VLAN 100 Voice VLAN VoIP– 192.168.100.0/24 VLAN 155 Management VLAN Guests – 192.168.150.0/24 VLAN 199 Garbage/Guest VLAN Garbage – 192.168.199.0/24 VLAN 200 Native VLAN Untagged traffic A point-to-point link that carries more than one VLAN. Extend VLANs across multiple switches Cisco supports 802.1Q standard Some older switches support legacy Cisco ISL

A Z The TAG is added by the switch before it goes over a trunk link. The TAG is removed by the switch at the other end of the trunk link.

Tag protocol ID (TPID) Ethernet is 0x8100. Priority Used for QoS (802.1p standard) specifies how to expedite transmission of Layer 2 frames Canonical Format Identifier (CFI) Enables Token Ring frames to be carried across Ethernet links VLAN ID (VID) VLAN identification number that supports up to 4096 VLAN IDs

Native VLAN Native VLAN For devices that do not support tagging. All trunks must have a native VLAN Native VLAN must be the same on both ends (both switches). Can be modified to be a VLAN other than VLAN 1. Should not be used for user VLAN or Management VLAN. Control traffic (CDP, VTP, PAgP, DTP) still transmitted over VLAN 1. If Native VLAN is other than VLAN 1 then control traffic on VLAN 1 is sent tagged. It is fine to leave VLAN 1 as the Native VLAN but should only carry control traffic and not user or management traffic.

Inter-switching links: Default and Trunking VLAN 1 VLAN 1 All ports on VLAN 1 All ports on VLAN 1 VLAN Trunk VLAN Trunk VLAN 1, 10, 20, 100, 155, 200 VLAN 1, 10, 20, 100, 155, 200

Configuring VLAN Trunks VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1# show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/11, Fa0/12, Fa0/23, Fa0/24 10 HR active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Gi0/1 20 SALES active Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Gi0/2 S2# show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gi0/1, Gi0/2 10 VLAN0010 active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10 20 VLAN0020 active Fa0/11, Fa0/12, Fa0/13, Fa0/14 Fa0/15, Fa0/16, Fa0/17, Fa0/18 Fa0/19, Fa0/20

Configuring VLAN Trunks VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1(config)# inter fa 0/1 S1(config-if)# no switchport access vlan 10 S1(config-if)# switchport trunk encapsulation dot1q ! Only needed on switches that also support ISL S1(config-if)# switchport mode trunk S1(config-if)# S2(config)# inter fa 0/1 S2(config-if)# no switchport access vlan 10 S2(config-if)# switchport mode trunk S2(config-if)# Minimum configuration.

Configuring VLAN Trunks VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/11, Fa0/12, Fa0/23, Fa0/24 10 HR active Fa0/2, Fa0/3, Fa0/4, Fa0/5 Fa0/6, Fa0/7, Fa0/8, Fa0/9 Fa0/10, Gi0/1 20 SALES active Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Gi0/2 No trunking information. Fa 0/1 no longer included in VLAN 10

Configuring VLAN Trunks VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1# show interfaces trunk Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 1 Port Vlans allowed on trunk Fa0/1 1-4094 Port Vlans allowed and active in management domain Fa0/1 1,10,20 Port Vlans in spanning tree forwarding state and not pruned Fa0/1 none S1#

Configuring VLAN Trunks VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S2#show interfaces trunk Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 1 Port Vlans allowed on trunk Fa0/1 1-4094 Port Vlans allowed and active in management domain Fa0/1 1,10,20 Port Vlans in spanning tree forwarding state and not pruned S2#

Configuring the Native VLAN VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1(config)# inter fa 0/1 S1(config-if)# switchport trunk native vlan 200 *Mar 1 01:59:34.927: %CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on FastEthernet0/1 (200), with S2 FastEthernet0/1 (1) S1(config-if)# *Mar 1 02:00:39.267: %CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on FastEthernet0/1 (1), with S1 FastEthernet0/1 (200). S2(config)# inter fa 0/1 S2(config-if)# switchport trunk native vlan 200 S2(config-if)# VLAN 200 (Native VLAN) does not need to be created on either switch but… It must match on both ends of the trunk! Control data (CDP, STP, etc.) is still sent across VLAN 1 but is now tagged.

Configuring the Native VLAN VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1# show interfaces trunk Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 200 Port Vlans allowed on trunk Fa0/1 1-4094 S2# show interfaces trunk Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 200 Port Vlans allowed on trunk Fa0/1 1-4094 Happy native VLANs now! How about limiting which VLANs are allowed on the trunk?

Configuring Allowed VLANs Fa0/1 Fa0/1 S1 S2 S1(config)# inter fa 0/1 S1(config-if)# switchport trunk allowed vlan 10,20,200 S2(config)# inter fa 0/1 S2(config-if)# switchport trunk allowed vlan 10,20,200 No space between VLANs. If the native VLAN (200) is not on the list, it is not a problem. The trunk will not allow any data traffic for the native VLAN.

Configuring Allowed VLANs Fa0/1 Fa0/1 S1 S2 S1# show interfaces trunk Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 200 Port Vlans allowed on trunk Fa0/1 10,20,200 S2# show interfaces trunk Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 200 Port Vlans allowed on trunk Fa0/1 10,20,200

What’s in the running-config? VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 interface FastEthernet0/1 switchport trunk native vlan 200 switchport trunk allowed vlan 10,20,200 switchport mode trunk ! interface FastEthernet0/2 switchport access vlan 10 switchport mode access interface FastEthernet0/3 <continued> Trunk link VLAN 10 access port

What’s in the running-config? VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 ! interface FastEthernet0/11 interface FastEthernet0/12 interface FastEthernet0/13 switchport access vlan 20 switchport mode access interface FastEthernet0/14 interface FastEthernet0/15 No configuring…. Default VLAN 1 (Should be in garbage, temporary VLAN if port is not in use) VLAN 20 access port

What’s in the running-config? VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 ! interface Vlan1 no ip address shutdown SVI (Switched Virtual Interface) Management VLAN No current IP Address Still in VLAN 1

Configuring Management VLAN 192.168.155.1/24 VLAN 155 192.168.155.2/24 VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1(config)# interface vlan 155 S1(config-if)# ip address 192.168.155.1 255.255.255.0 S1(config-if)# no shutdown S1(config-if)# exit S1(config)# vlan 155 S1(config-vlan)# name MANAGEMENT S1(config-vlan)# S2(config)# interface vlan 155 S2(config-if)# ip add 192.168.155.2 255.255.255.0 S2(config-if)# no shutdown S2(config-if)# exit S2(config)# vlan 155 S2(config-vlan)# name MANAGMENT S2(config-vlan)# end S2# ping 192.168.155.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.158.155.2, timeout is 2 seconds: ..... Success rate is 0 percent (0/5) ???

Configuring Management VLAN 192.168.155.1/24 VLAN 155 192.168.155.2/24 VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1(config)# inter fa 0/1 S1(config-if)# switchport trunk allowed vlan 10,20,200,155 S1(config)# inter fa 0/1 S1(config-if)# switchport trunk allowed vlan 10,20,200,155 S1(config-if)# end S2# ping 192.168.155.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.155.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/4/9 ms S2#

Verifying VLANs Once More 192.168.155.1/24 VLAN 155 192.168.155.2/24 VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1# show vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/11, Fa0/12, Fa0/23, Fa0/24 10 HR active Fa0/2, Fa0/3, Fa0/4, Fa0/5 Fa0/6, Fa0/7, Fa0/8, Fa0/9 Fa0/10, Gi0/1 20 SALES active Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Gi0/2 MANAGEMENT active

Verifying VLANs Once More 192.168.155.1/24 VLAN 155 192.168.155.2/24 VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1# show interfaces trunk Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 200 Port Vlans allowed on trunk Fa0/1 10,20,155,200 S1# show interface vlan 155 Vlan155 is up, line protocol is up Hardware is EtherSVI, address is 189c.5dff.fac1 (bia 189c.5dff.fac1) Internet address is 192.168.155.1/24 MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive not supported <output omitted>

Verifying VLANs Once More 192.168.155.1/24 VLAN 155 192.168.155.2/24 VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 S1# show interface fa0/1 switchport Name: Fa0/1 Switchport: Enabled Administrative Mode: trunk Operational Mode: trunk Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 200 (Inactive) Administrative Native VLAN tagging: enabled Voice VLAN: none <output omitted> Trunking VLANs Enabled: 10,20,155,200

Dynamic Trunk Protocol

Switch Ethernet Port Type VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 Switch Ethernet ports can be set to: Access port: Non-trunking port used to connect to end-devices. Trunking: Trunking port to carry VLAN information to another switch. By default, Layer 2 switch ports want to trunk.

Access Port S1(config-if) # switchport mode access Forces the link into access port. It will never become a trunk! Use to connect a host, server, printer, …

Dynamic Trunking Protocol - DTP By default, Catalyst 2960 and Catalyst 3560 Series switches have Dynamic Trunking Protocol (DTP) enabled. DTP is a Cisco proprietary protocol that negotiates trunking parameters between switches. Operates on a point-to-point basis only, between network devices. Designed to make interconnecting switches with VLANs easier. DTP is only available on Cisco switches and not supported by other vendors.

Four DTP Trunking Modes S1(config-if)# switchport mode ? access Set trunking mode to ACCESS unconditionally dynamic Set trunking mode to dynamically negotiate access or trunk mode trunk Set trunking mode to TRUNK unconditionally S1(config-if)# switchport mode dynamic ? auto Set trunking mode dynamic negotiation parameter to AUTO desirable Set trunking mode dynamic negotiation parameter to DESIRABLE S1(config-if)# switchport mode dynamic On (default): Default mode. It’s locked into TRUNK mode. switchport mode trunk Dynamic Desirable: (default mode on Catalyst 2950 / 3550) switchport mode dynamic desirable Dynamic Auto: switchport mode dynamic auto Disabled: Nonegotiate. Turns off DTP. switchport nonegotiate

Non-trunking by default S2# show interfaces fastethernet 0/21 switchport Name: Fa0/21 Switchport: Enabled Administrative Mode: dynamic auto Operational Mode: static access Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: native Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) How the port was configured. How the is operating. VLANs 10, 20 VLANs 10, 20 Fa0/1 Fa0/1 S1 S2 Dynamic auto Dynamic auto Ports on the 2960 and 3560 are set to dynamic auto by default. Does not trunk if both sides default to dynamic auto This results in the interface being in access mode (non-trunking)

Dynamic Trunking Protocol (DTP) S1(config-if)# switchport mode ? Dynamic Trunking Protocol (DTP) Access - Puts the interface into permanent non-trunking mode and negotiates to convert the link into a non-trunk link. The interface becomes a non-trunk interface even if the neighboring interface does not agree to the change. Trunk - Puts the interface into permanent trunking mode and negotiates to convert the link into a trunk link. The interface becomes a trunk interface even if the neighboring interface does not agree to the change. Nonegotiate - Puts the interface into permanent trunking mode but prevents the interface from generating DTP frames. You must configure the neighboring interface manually as a trunk interface to establish a trunk link. Use this mode when connecting to a device that does not support DTP. Dynamic desirable - Makes the interface actively attempt to convert the link to a trunk link. The interface becomes a trunk interface if the neighboring interface is set to trunk, desirable, or auto mode. Dynamic auto - Makes the interface willing to convert the link to a trunk link. The interface becomes a trunk interface if the neighboring interface is set to trunk or desirable mode. This is the default mode for all Ethernet interfaces in Cisco IOS. All recent Cisco Catalyst switches, except for the Catalyst 2900XL and 3500XL, use a Cisco proprietary point-to-point protocol called Dynamic Trunking Protocol (DTP) on trunk ports to negotiate the trunking state. DTP negotiates the operational mode of directly connected switch ports to a trunk port and selects an appropriate trunking protocol. Nego­tiating trunking is a recommended practice in multilayer switched networks because it avoids network issues resulting from trunking misconfigurations for initial configuration, but best practice is when the network is stable, change to trunk mode. The default interface trunking mode is dynamic auto.

Trunk Modes Must be Compatible

DTP Mode: On (default) S1(config-if) # switchport mode trunk Forces the link into permanent trunking (even if the neighbor doesn't agree) Enables DTP and exchanges DTP frames. Will trunk if remote is configured with: On switchport mode trunk Desirable switchport mode dynamic desirable Dynamic Auto switchport mode dynamic auto Will not trunk if remote is configured with: Non-negotiate switchport nonegotiate Access switchport mode access

DTP Dynamic Desirable S1(config-if) # switchport mode dynamic desirable Causes the port to proactively attempt to become a trunk. Enables DTP and exchanges DTP frames. Will trunk if remote is configured with: On switchport mode trunk Desirable switchport mode dynamic desirable Dynamic Auto switchport mode dynamic auto Will not trunk if remote is configured with: Non-negotiate switchport nonegotiate Access switchport mode access

DTP Dynamic Auto S1(config-if) # switchport mode dynamic auto Causes the port to passively be willing to convert to trunking. Enables DTP and exchanges DTP frames. Will trunk if remote is configured with: On switchport mode trunk Desirable switchport mode dynamic desirable Will not trunk if remote is configured with: Dynamic Auto switchport mode dynamic auto Non-negotiate switchport nonegotiate Access switchport mode access

DTP Disabled S1(config-if) # switchport nonegotiate Forces the port to permanently trunk. Disables DTP and does not exchange any DTP frames. Use to trunk with a different vendor’s switch.

#1 - “Trunk ” or “No Trunk”  #1 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode trunk F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode trunk Will the ports trunk automatically?

#2 - “Trunk ” or “No Trunk”  #2 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode trunk F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode dynamic desirable Will the ports trunk automatically?

#3 - “Trunk ” or “No Trunk”  #3 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode trunk F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode dynamic auto Will the ports trunk automatically?

#4 - “Trunk ” or “No Trunk” X #4 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode trunk F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport nonegotiate Will the ports trunk automatically?

#5 - “Trunk ” or “No Trunk”  #5 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode dynamic desirable F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode trunk Will the ports trunk automatically?

#6 - “Trunk ” or “No Trunk”  #6 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode dynamic desirable F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode dynamic desirable Will the ports trunk automatically?

#7 - “Trunk ” or “No Trunk”  #7 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode dynamic desirable F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode dynamic auto Will the ports trunk automatically?

#8 - “Trunk ” or “No Trunk” X #8 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode dynamic desirable F0/1 F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport nonegotiate Will the ports trunk automatically?

#9 - “Trunk ” or “No Trunk”  #9 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode dynamic auto F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode trunk Will the ports trunk automatically?

#10 - “Trunk ” or “No Trunk”  #10 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode dynamic auto F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode dynamic desirable Will the ports trunk automatically?

#11 - “Trunk ” or “No Trunk” X #11 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode dynamic auto F0/1 F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode dynamic auto Will the ports trunk automatically?

#12 - “Trunk ” or “No Trunk” X #12 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport mode dynamic auto F0/1 F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport nonegotiate Will the ports trunk automatically?

#13 - “Trunk ” or “No Trunk” X #13 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport nonegotiate F0/1 F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode trunk Will the ports trunk automatically?

#14 - “Trunk ” or “No Trunk” X #14 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport nonegotiate F0/1 F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode dynamic desirable Will the ports trunk automatically?

#15 - “Trunk ” or “No Trunk” X #15 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport nonegotiate F0/1 F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport mode dynamic auto Will the ports trunk automatically?

#16 - “Trunk ” or “No Trunk”  #16 - “Trunk ” or “No Trunk” S1(config)# interface fa0/1 S1(config-if)# switchport nonegotiate F0/1 F0/1 S1 S2 S2(config)# interface fa0/1 S2(config-if)# switchport nonegotiate Will the ports trunk automatically?

Verifying DTP Trunk Links S1# show dtp interface f0/1 DTP information for FastEthernet0/1: TOS/TAS/TNS: TRUNK/ON/TRUNK TOT/TAT/TNT: 802.1Q/802.1Q/802.1Q Neighbor address 1: 0CD996D23F81 Neighbor address 2: 000000000000 Hello timer expiration (sec/state): 12/RUNNING Access timer expiration (sec/state): never/STOPPED Negotiation timer expiration (sec/state): never/STOPPED Multidrop timer expiration (sec/state): never/STOPPED FSM state: S6:TRUNK # times multi & trunk 0 Enabled: yes In STP: no   <output omitted>

TO CLEAR A SWITCH ALWAYS DO THE FOLLOWING TO CLEAR A SWITCH!! S1# delete vlan.dat Delete filename [vlan.dat]? Delete flash:/vlan.dat? [confirm] S1# erase startup-config Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] [OK] Erase of nvram: complete %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram S1# reload Proceed with reload? [confirm]

Troubleshooting VLANs

Troubleshooting VLANs and Trunks IP Addressing Issues with VLAN It is a common practice to associate a VLAN with an IP network. Because different IP networks only communicate through a router, all devices within a VLAN must be part of the same IP network to communicate. The figure displays that PC1 cannot communicate to the server because it has a wrong IP address configured. 3.2.4.1 IP Addressing Issues with VLAN

Troubleshooting VLANs and Trunks Missing VLANs If all the IP addresses mismatches have been solved, but the device still cannot connect, check if the VLAN exists in the switch. 3.2.4.2 Missing VLANs

Troubleshooting VLANs and Trunks Introduction to Troubleshooting Trunks

Troubleshooting VLANs and Trunks Common Problems with Trunks Trunking issues are usually associated with incorrect configurations. The most common type of trunk configuration errors are: Native VLAN mismatches Trunk mode mismatches  Allowed VLANs on trunks If a trunk problem is detected, the best practice guidelines recommend to troubleshoot in the order shown above. 3.2.4.4 Common Problems With Trunks

Troubleshooting VLANs and Trunks Trunk Mode Mismatches If a port on a trunk link is configured with a trunk mode that is incompatible with the neighboring trunk port, a trunk link fails to form between the two switches. Use the show interfaces trunk command to check the status of the trunk ports on the switches. To fix the problem, configure the interfaces with proper trunk modes. 3.2.4.5 Trunk Mode Mismatches

Troubleshooting VLANs and Trunks Incorrect VLAN List VLANs must be allowed in the trunk before their frames can be transmitted across the link. Use the switchport trunk allowed vlan command to specify which VLANs are allowed in a trunk link. Use the show interfaces trunk command to ensure the correct VLANs are permitted in a trunk. 3.2.4.6 Incorrect VLAN List

Troubleshooting VLAN Security

Attacks on VLANs Switch Spoofing Attack To prevent a basic switch spoofing attack, turn off trunking on all ports, except the ones that specifically require trunking.

Attacks on VLANs Double-Tagging Attack The best approach to mitigating double-tagging attacks is to ensure that the native VLAN of the trunk ports is different from the VLAN of any user ports.

Attacks on VLANs PVLAN Edge The Private VLAN (PVLAN) Edge feature, also known as protected ports, ensures that there is no exchange of unicast, broadcast, or multicast traffic between protected ports on the switch.

Summary Introduced VLANs and their types Described the connection between VLANs and broadcast domains Discussed IEEE 802.1Q frame tagging and how it enables differentiation between Ethernet frames associated with distinct VLANs as they traverse common trunk links. Examined the configuration, verification, and troubleshooting of VLANs and trunks using the Cisco IOS CLI and explored basic security and design considerations. Chapter 3 Summary

Thank to Rick Graziani for using many of his lecture slides