SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
CCNA4.com

CCNA Quick Notes – VLANs
1. What are VLANs?
VLANs are broadcast domains in a Layer 2 network. Each broadcast domain is like a distinct
virtual bridge within the switch. Each virtual bridge you create in a switch defines a broadcast
domain. By default, traffic from one VLAN cannot pass to another VLAN. Each of the users
in a VLAN is also in the same IP subnet, and each switch port can belong to only one VLAN.

2. What are the three characteristics of a typical VLAN setup?
The three characteristics of a typical VLAN setup are:
Each logical VLAN is like a separate physical bridge.
VLANs can span multiple switches.
Trunks carry traffic for multiple VLANs.

3. What are trunk links?
By default, each port on a switch can belong to only one VLAN. For devices that are in
VLANs (that span multiple switches) to talk to other devices in the same VLAN, you must
use trunking or have a dedicated port per VLAN. Trunk links allow the switch to carry
multiple VLANs across a single link.

4. What are the two methods you can use to assign a port to a VLAN?
The two methods to assign a port to a VLAN are
Statically
Dynamically

5. What is Inter-Switch Link (ISL)?
ISL is a Cisco proprietary protocol used to interconnect switches that have multiple VLANs.
It maintains VLAN information as traffic goes between switches, allowing the traffic to enter
the correct VLAN. ISL operates in a point-to-point environment.

6. At which layer of the OSI model does ISL function?
ISL functions at Layer 2 of the OSI model. It encapsulates a data frame with a new ISL
header and CRC. Because ISL operates at Layer 2 of the OSI model, it is protocol-
independent.

7. What type of tagging method does ISL use?
Many network professions refer to the way ISL tags frames as an external tagging
mechanism. This is because ISL encapsulates each frame and does not modify the original
packet.
Many network professions refer to the way ISL tags frames as an external tagging
mechanism. This is because ISL encapsulates each frame and does not modify the original
packet.

8. How many extra bytes does ISL add to an existing Ethernet frame?
ISL adds a 26-byte ISL header and a 4-byte CRC to each frame, extending each Ethernet
frame by 30 bytes. ISL tagging is implemented in ASICs, so tagging is done at wire speed.

9. What is VTP?
VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN
configuration consistency throughout a common administrative domain by managing VLANs'
additions, deletions, and name changes across multiple switches. Without VTP, you would
have to add VLAN information in all switches in your network.

CCNA4.com
CCNA4.com

10. What is a VTP domain?
A VTP domain is one or more interconnected switches that share the same VTP environment.
A switch can be in only one VTP domain, and all VLAN information is propagated to all
switches in the same VTP domain.

11. What are the three VTP modes?
The three VTP modes are
Server
Client
Transparent

12. What is VTP server mode?
A switch in VTP server mode can add, delete, and modify VLANs and other configuration
parameters for the entire VTP domain. This is the default mode for all Catalyst switches.
VLAN configurations are saved in NVRAM. When you change VLAN configuration in
server mode, the change is dynamically propagated to all switches in the VTP domain.

13. What is VTP client mode?
In VTP client mode, a switch cannot create, delete, or modify VLANs. Also, a VTP client
does not save VLAN information and configuration in NVRAM. In client and server mode,
VLAN information is synchronized between switches in the VTP domain.

14. What is VTP transparent mode?
In transparent mode, a switch can add, modify, and delete VLANs. This information is not
transmitted to other switches in the VTP domain. They affect only the local switch. VTP
transparent mode is used when a switch does not need to participate in the VTP domain but
needs to propagate VTP information to other switches.

15. How often are VTP advertisements flooded throughout the management domain?
VTP advertisements are flooded throughout the management domain every 5 minutes or
whenever a change occurs in VLAN configuration.

16. What is included in VTP advertisements?
VTP advertisements include the following:
VTP revision number
VLAN names and numbers
Information about switches that have ports assigned to each VLAN

17. What is one of the most important components of the VTP advertisement?
The revision number is one of the most important components of the VTP advertisement.
Every time a VTP server modifies its VLAN configuration, it increments the configuration
number by 1. The largest configuration number in the VTP domain contains the most current
information. When a client receives a revision number higher than its current number, it
updates its VLAN configuration.

18. On a Catalyst 1900 switch, how do you reset the configuration number?
To reset the configuration numbers on a Catalyst 1900, use the delete vtp privileged EXEC
command, and then reset the switch.

19. What is VTP pruning?
By default, a trunk link carries traffic for all VLANs in the VTP domain. Even if a switch

CCNA4.com
CCNA4.com
does not have any ports in a specific VLAN, traffic for that VLAN is carried across the trunk
link. VTP pruning uses VLAN advertisements to determine when a trunk connection is
needlessly flooding traffic to the trunk links that the traffic must use to access the appropriate
network device.

20. How many VLANs with a separate spanning tree per VLAN does the Catalyst 1900
support?
The Catalyst 1900 supports 64 VLANs with a separate spanning tree per VLAN.

21. What VLAN number are CDP and VTP advertisements sent across?
CDP and VTP advertisements are sent on VLAN 1, which is also known as the management
VLAN.

22. What must you remember before you create VLANs on a Catalyst switch?
Before you create VLANs on a Catalyst 1900 switch, the switch must be in VTP server mode
or VTP transparent mode.

23. How do you configure the VTP operation mode on a Catalyst 1900?
To configure VTP on a Catalyst 1900, use the vtp [server transparent client] global
configuration command:
Cat1900(config)#vtp server

24. How do you configure a VTP domain on a Catalyst 1900 switch?
To configure a VTP domain on a Catalyst 1900 switch, use the vtp domain domain-name
global command:
Cat1900(config)#vtp domain cisco

25. How do you configure a VTP domain password on a Catalyst 1900?
Use the vtp password password global command to configure a VTP domain password. This
example sets the VTP password to cisco:
Cat1900(config)#vtp password cisco

26. What does the show vtp privileged EXEC command display?
The show vtp privileged EXEC command displays the following:
VTP version
The number of existing VLANs on a switch and the maximum number of locally supported
VLANs
VTP domain name, password, and operating mode
Whether VTP pruning is enabled
The last time VLAN configuration was modified.
Here's an example of show vtp output:
Cat1900#show vtp
VTP version: 1
Configuration revision: 0
Maximum VLANs supported locally: 1005
Number of existing VLANs: 5
VTP domain name : cisco
VTP password : cisco
VTP operating mode : Server
VTP pruning mode : Disabled
VTP traps generation : Enabled
Configuration last modified by: 192.168.0.2 at 00-00-0000 00:00:00

CCNA4.com
CCNA4.com

27. What command do you use to add a VLAN on a Catalyst switch?
To add a VLAN on a Catalyst switch, use the vlan vlan-number [name vlan_name] global
command. The following example adds VLAN 10 with a name of Sales:
Cat1900(config)#vlan 10 name Sales

28. What Catalyst 1900 command can you use to verify VLAN information?
To verify VLAN information, use the show vlan vlan-number privileged EXEC command.

29. How do you view spanning tree information for a particular VLAN?
A Catalyst 1900 switch can have a maximum of 64 VLANs with a separate instance of
spanning tree per VLAN. To view spanning tree information for a particular VLAN use the
"show spandtree vlan-id" command.

                                                                            By testinside




CCNA4.com

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

At8000 s configurando vla_ns
At8000 s configurando vla_nsAt8000 s configurando vla_ns
At8000 s configurando vla_ns
 
Ccna 3 chapter 4 v4.0 answers 2011
Ccna 3 chapter 4 v4.0 answers 2011Ccna 3 chapter 4 v4.0 answers 2011
Ccna 3 chapter 4 v4.0 answers 2011
 
Confi vtp vlan
Confi vtp vlanConfi vtp vlan
Confi vtp vlan
 
Ccna3 mod9-vtp
Ccna3 mod9-vtpCcna3 mod9-vtp
Ccna3 mod9-vtp
 
vlan
vlanvlan
vlan
 
Tn 310 vlan-trunking
Tn 310 vlan-trunkingTn 310 vlan-trunking
Tn 310 vlan-trunking
 
Quick Guide VLANs
Quick Guide   VLANsQuick Guide   VLANs
Quick Guide VLANs
 
Day 14.2 configuringvla ns
Day 14.2 configuringvla nsDay 14.2 configuringvla ns
Day 14.2 configuringvla ns
 
Chapter 4 vtp
Chapter 4   vtpChapter 4   vtp
Chapter 4 vtp
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
 
VLAN
VLANVLAN
VLAN
 
CCNA- part 9 vlan
CCNA- part 9 vlanCCNA- part 9 vlan
CCNA- part 9 vlan
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
VLAN Network for Extreme Networks
VLAN Network for Extreme NetworksVLAN Network for Extreme Networks
VLAN Network for Extreme Networks
 
VTP Configuration
VTP ConfigurationVTP Configuration
VTP Configuration
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
 
VXLAN
VXLANVXLAN
VXLAN
 
Ch4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wirelessCh4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wireless
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
 
Vlan
VlanVlan
Vlan
 

Destacado (20)

Jeremy CCNA Notes
Jeremy CCNA NotesJeremy CCNA Notes
Jeremy CCNA Notes
 
CCNA Notes
CCNA NotesCCNA Notes
CCNA Notes
 
Useful Linux and Unix commands handbook
Useful Linux and Unix commands handbookUseful Linux and Unix commands handbook
Useful Linux and Unix commands handbook
 
Cv Chenna 2017
Cv Chenna 2017Cv Chenna 2017
Cv Chenna 2017
 
Useful linux-commands
Useful linux-commandsUseful linux-commands
Useful linux-commands
 
Chennai Guide
Chennai GuideChennai Guide
Chennai Guide
 
Ccna
CcnaCcna
Ccna
 
Cloud computing e gov-12
Cloud computing e gov-12Cloud computing e gov-12
Cloud computing e gov-12
 
The itil foundation_certificate_syllabus (2) (1)
The itil foundation_certificate_syllabus (2) (1)The itil foundation_certificate_syllabus (2) (1)
The itil foundation_certificate_syllabus (2) (1)
 
Cctns trg syllabus
Cctns trg syllabusCctns trg syllabus
Cctns trg syllabus
 
Ccna read
Ccna readCcna read
Ccna read
 
Physical terminations
Physical terminationsPhysical terminations
Physical terminations
 
certificate
certificatecertificate
certificate
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Training development382
Training development382Training development382
Training development382
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 

Similar a Ccna Quick Notes –VLANs

Virtual LAN and Vlan Trunking Protocol.pptx
Virtual LAN and Vlan Trunking Protocol.pptxVirtual LAN and Vlan Trunking Protocol.pptx
Virtual LAN and Vlan Trunking Protocol.pptxmarunkumareee77
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANSanilinvns
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANSanilinvns
 
Sca nv6 instructorppt_chapter2
Sca nv6 instructorppt_chapter2Sca nv6 instructorppt_chapter2
Sca nv6 instructorppt_chapter2newbie2019
 
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjfvlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjfpeterhaile1
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking ProtocolNetwax Lab
 
ccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxGiyaShefin
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptxBOURY1
 
Crear vlan
Crear vlanCrear vlan
Crear vlan1 2d
 
Лекц 9
Лекц 9Лекц 9
Лекц 9Muuluu
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
Guia completa vlan
Guia completa vlanGuia completa vlan
Guia completa vlan1 2d
 

Similar a Ccna Quick Notes –VLANs (20)

Virtual LAN and Vlan Trunking Protocol.pptx
Virtual LAN and Vlan Trunking Protocol.pptxVirtual LAN and Vlan Trunking Protocol.pptx
Virtual LAN and Vlan Trunking Protocol.pptx
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANS
 
Sca nv6 instructorppt_chapter2
Sca nv6 instructorppt_chapter2Sca nv6 instructorppt_chapter2
Sca nv6 instructorppt_chapter2
 
Scaling-VLANs-PPT.pptx
Scaling-VLANs-PPT.pptxScaling-VLANs-PPT.pptx
Scaling-VLANs-PPT.pptx
 
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjfvlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
ccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptx
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
Crear vlan
Crear vlanCrear vlan
Crear vlan
 
Chapter 8 .vlan.pdf
Chapter 8 .vlan.pdfChapter 8 .vlan.pdf
Chapter 8 .vlan.pdf
 
mod8-VLANs.ppt
mod8-VLANs.pptmod8-VLANs.ppt
mod8-VLANs.ppt
 
Mod8 vlans
Mod8 vlansMod8 vlans
Mod8 vlans
 
ENCOR_Capitulo 5.pptx
ENCOR_Capitulo 5.pptxENCOR_Capitulo 5.pptx
ENCOR_Capitulo 5.pptx
 
Лекц 9
Лекц 9Лекц 9
Лекц 9
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
Guia completa vlan
Guia completa vlanGuia completa vlan
Guia completa vlan
 
ENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptxENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptx
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 

Más de CCNAResources

Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)CCNAResources
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Subneting And Summarization
Subneting And  SummarizationSubneting And  Summarization
Subneting And SummarizationCCNAResources
 
Subneting And Summarization
Subneting And SummarizationSubneting And Summarization
Subneting And SummarizationCCNAResources
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And AnswersCCNAResources
 
Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 SwitchingCCNAResources
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip RoutingCCNAResources
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless ResourcesCCNAResources
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 MinutesCCNAResources
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)CCNAResources
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)CCNAResources
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)CCNAResources
 

Más de CCNAResources (16)

Iscw Cram Sheet
Iscw Cram SheetIscw Cram Sheet
Iscw Cram Sheet
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study Guide
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
Subneting And Summarization
Subneting And  SummarizationSubneting And  Summarization
Subneting And Summarization
 
Subneting And Summarization
Subneting And SummarizationSubneting And Summarization
Subneting And Summarization
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 Switching
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip Routing
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless Resources
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Ccna Quick Notes –VLANs

  • 1. CCNA4.com CCNA Quick Notes – VLANs 1. What are VLANs? VLANs are broadcast domains in a Layer 2 network. Each broadcast domain is like a distinct virtual bridge within the switch. Each virtual bridge you create in a switch defines a broadcast domain. By default, traffic from one VLAN cannot pass to another VLAN. Each of the users in a VLAN is also in the same IP subnet, and each switch port can belong to only one VLAN. 2. What are the three characteristics of a typical VLAN setup? The three characteristics of a typical VLAN setup are: Each logical VLAN is like a separate physical bridge. VLANs can span multiple switches. Trunks carry traffic for multiple VLANs. 3. What are trunk links? By default, each port on a switch can belong to only one VLAN. For devices that are in VLANs (that span multiple switches) to talk to other devices in the same VLAN, you must use trunking or have a dedicated port per VLAN. Trunk links allow the switch to carry multiple VLANs across a single link. 4. What are the two methods you can use to assign a port to a VLAN? The two methods to assign a port to a VLAN are Statically Dynamically 5. What is Inter-Switch Link (ISL)? ISL is a Cisco proprietary protocol used to interconnect switches that have multiple VLANs. It maintains VLAN information as traffic goes between switches, allowing the traffic to enter the correct VLAN. ISL operates in a point-to-point environment. 6. At which layer of the OSI model does ISL function? ISL functions at Layer 2 of the OSI model. It encapsulates a data frame with a new ISL header and CRC. Because ISL operates at Layer 2 of the OSI model, it is protocol- independent. 7. What type of tagging method does ISL use? Many network professions refer to the way ISL tags frames as an external tagging mechanism. This is because ISL encapsulates each frame and does not modify the original packet. Many network professions refer to the way ISL tags frames as an external tagging mechanism. This is because ISL encapsulates each frame and does not modify the original packet. 8. How many extra bytes does ISL add to an existing Ethernet frame? ISL adds a 26-byte ISL header and a 4-byte CRC to each frame, extending each Ethernet frame by 30 bytes. ISL tagging is implemented in ASICs, so tagging is done at wire speed. 9. What is VTP? VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN configuration consistency throughout a common administrative domain by managing VLANs' additions, deletions, and name changes across multiple switches. Without VTP, you would have to add VLAN information in all switches in your network. CCNA4.com
  • 2. CCNA4.com 10. What is a VTP domain? A VTP domain is one or more interconnected switches that share the same VTP environment. A switch can be in only one VTP domain, and all VLAN information is propagated to all switches in the same VTP domain. 11. What are the three VTP modes? The three VTP modes are Server Client Transparent 12. What is VTP server mode? A switch in VTP server mode can add, delete, and modify VLANs and other configuration parameters for the entire VTP domain. This is the default mode for all Catalyst switches. VLAN configurations are saved in NVRAM. When you change VLAN configuration in server mode, the change is dynamically propagated to all switches in the VTP domain. 13. What is VTP client mode? In VTP client mode, a switch cannot create, delete, or modify VLANs. Also, a VTP client does not save VLAN information and configuration in NVRAM. In client and server mode, VLAN information is synchronized between switches in the VTP domain. 14. What is VTP transparent mode? In transparent mode, a switch can add, modify, and delete VLANs. This information is not transmitted to other switches in the VTP domain. They affect only the local switch. VTP transparent mode is used when a switch does not need to participate in the VTP domain but needs to propagate VTP information to other switches. 15. How often are VTP advertisements flooded throughout the management domain? VTP advertisements are flooded throughout the management domain every 5 minutes or whenever a change occurs in VLAN configuration. 16. What is included in VTP advertisements? VTP advertisements include the following: VTP revision number VLAN names and numbers Information about switches that have ports assigned to each VLAN 17. What is one of the most important components of the VTP advertisement? The revision number is one of the most important components of the VTP advertisement. Every time a VTP server modifies its VLAN configuration, it increments the configuration number by 1. The largest configuration number in the VTP domain contains the most current information. When a client receives a revision number higher than its current number, it updates its VLAN configuration. 18. On a Catalyst 1900 switch, how do you reset the configuration number? To reset the configuration numbers on a Catalyst 1900, use the delete vtp privileged EXEC command, and then reset the switch. 19. What is VTP pruning? By default, a trunk link carries traffic for all VLANs in the VTP domain. Even if a switch CCNA4.com
  • 3. CCNA4.com does not have any ports in a specific VLAN, traffic for that VLAN is carried across the trunk link. VTP pruning uses VLAN advertisements to determine when a trunk connection is needlessly flooding traffic to the trunk links that the traffic must use to access the appropriate network device. 20. How many VLANs with a separate spanning tree per VLAN does the Catalyst 1900 support? The Catalyst 1900 supports 64 VLANs with a separate spanning tree per VLAN. 21. What VLAN number are CDP and VTP advertisements sent across? CDP and VTP advertisements are sent on VLAN 1, which is also known as the management VLAN. 22. What must you remember before you create VLANs on a Catalyst switch? Before you create VLANs on a Catalyst 1900 switch, the switch must be in VTP server mode or VTP transparent mode. 23. How do you configure the VTP operation mode on a Catalyst 1900? To configure VTP on a Catalyst 1900, use the vtp [server transparent client] global configuration command: Cat1900(config)#vtp server 24. How do you configure a VTP domain on a Catalyst 1900 switch? To configure a VTP domain on a Catalyst 1900 switch, use the vtp domain domain-name global command: Cat1900(config)#vtp domain cisco 25. How do you configure a VTP domain password on a Catalyst 1900? Use the vtp password password global command to configure a VTP domain password. This example sets the VTP password to cisco: Cat1900(config)#vtp password cisco 26. What does the show vtp privileged EXEC command display? The show vtp privileged EXEC command displays the following: VTP version The number of existing VLANs on a switch and the maximum number of locally supported VLANs VTP domain name, password, and operating mode Whether VTP pruning is enabled The last time VLAN configuration was modified. Here's an example of show vtp output: Cat1900#show vtp VTP version: 1 Configuration revision: 0 Maximum VLANs supported locally: 1005 Number of existing VLANs: 5 VTP domain name : cisco VTP password : cisco VTP operating mode : Server VTP pruning mode : Disabled VTP traps generation : Enabled Configuration last modified by: 192.168.0.2 at 00-00-0000 00:00:00 CCNA4.com
  • 4. CCNA4.com 27. What command do you use to add a VLAN on a Catalyst switch? To add a VLAN on a Catalyst switch, use the vlan vlan-number [name vlan_name] global command. The following example adds VLAN 10 with a name of Sales: Cat1900(config)#vlan 10 name Sales 28. What Catalyst 1900 command can you use to verify VLAN information? To verify VLAN information, use the show vlan vlan-number privileged EXEC command. 29. How do you view spanning tree information for a particular VLAN? A Catalyst 1900 switch can have a maximum of 64 VLANs with a separate instance of spanning tree per VLAN. To view spanning tree information for a particular VLAN use the "show spandtree vlan-id" command. By testinside CCNA4.com