SlideShare una empresa de Scribd logo
1 de 39
8 Aug 2014 S Ward Abingdon and Witney College 1
VLANs
CCNA Exploration Semester 3
Chapter 3
8 Aug 2014 S Ward Abingdon and
Witney College
2
Topics
 The role of VLANs in a network
 Trunking VLANs
 Configure VLANs on switches
 Troubleshoot common VLAN problems
8 Aug 2014 S Ward Abingdon and
Witney College
3
Semester 3
LAN Design
Basic Switch
Concepts
VLANs
VTP
STP
Inter-VLAN
routing
Wireless
8 Aug 2014 S Ward Abingdon and
Witney College
4
Some requirements of LANs
 Need to split up broadcast domains to make
good use of bandwidth
 People in the same department may need to
be grouped together for access to servers
 Security: restrict access by certain users to
some areas of the LAN
 Provide a way for different areas of the LAN
to communicate with each other
8 Aug 2014 S Ward Abingdon and
Witney College
5
Solution using routers
 Divide the LAN into
subnets
 Use routers to link
the subnets
8 Aug 2014 S Ward Abingdon and
Witney College
6
Solution using routers
BUT
 Routers are expensive
 Routers are slower than switches
 Subnets are restricted to limited physical
areas
 Subnets are inflexible
8 Aug 2014 S Ward Abingdon and
Witney College
7
Solution using VLANs
 VLAN membership can
be by function and not
by location
 VLANs managed by
switches
 Router needed for
communication
between VLANs
8 Aug 2014 S Ward Abingdon and
Witney College
8
VLANs
 All hosts in a VLAN have addresses in the
same subnet. A VLAN is a subnet.
 Broadcasts are kept within the VLAN. A VLAN
is a broadcast domain.
 The switch has a separate MAC address table
for each VLAN. Traffic for each VLAN is kept
separate from other VLANs.
 Layer 2 switches cannot route between VLANs.
8 Aug 2014 S Ward Abingdon and
Witney College
9
VLAN numbers
 VLAN 1: default Ethernet LAN, all ports start in
this VLAN.
 VLANs 1002 – 1005 automatically created for
Token Ring and FDDI
 Numbers 2 to 1001 can be used for new VLANs
 Up to 255 VLANs on Catalyst 2960 switch
 Extended range 1006 – 4094 possible but fewer
features
8 Aug 2014 S Ward Abingdon and
Witney College
10
VLAN information
 VLAN information is stored in the VLAN
database.
 vlan.dat in the flash memory of the switch.
8 Aug 2014 S Ward Abingdon and
Witney College
11
Port based
 Each switch port intended for an end device
is configured to belong to a VLAN.
 Any device connecting to that port belongs to
the port’s VLAN.
 There are other ways of assigning VLANs but
this is now the normal way.
 Ports that link switches can be configured to
carry traffic for all VLANs (trunking)
8 Aug 2014 S Ward Abingdon and
Witney College
12
Types of VLAN
 Data or user VLAN
 Voice VLAN
 Management VLAN
 Native VLAN
 Default VLAN
8 Aug 2014 S Ward Abingdon and
Witney College
13
Data VLAN
 Carry files, e-mails, shared application traffic,
most user traffic.
 Separate VLAN for each group of users.
8 Aug 2014 S Ward Abingdon and
Witney College
14
Voice VLAN
 Use with IP phone.
 Phone acts as a switch too.
 Voice traffic is tagged, given priority.
 Data not tagged, no priority.
8 Aug 2014 S Ward Abingdon and
Witney College
15
Management VLAN
 Has the switch IP address.
 Used for telnet/SSH or web access for
management purposes.
 Better not to use VLAN 1 for security
reasons.
8 Aug 2014 S Ward Abingdon and
Witney College
16
Native VLAN
 For backward compatibility with older
systems.
 Relevant to trunk ports.
 Trunk ports carry traffic from multiple VLANs.
 VLAN is identified by a “tag” in the frame.
 Native VLAN does not have a tag.
8 Aug 2014 S Ward Abingdon and
Witney College
17
Default VLAN
 VLAN 1 on Cisco switches.
 Carries CDP and STP (spanning tree
protocol) traffic.
 Initially all ports are in this VLAN.
 Do not use it for data, voice or management
traffic for security reasons.
8 Aug 2014 S Ward Abingdon and
Witney College
18
Static VLAN
 The normal type. Port configured to be on a
VLAN. Connected device is on this VLAN.
 VLAN can be created using CLI command,
given number and name.
 VLAN can be learned from another switch.
 If a port is put on a VLAN and the VLAN does
not exist, then the VLAN is created.
8 Aug 2014 S Ward Abingdon and
Witney College
19
Static VLAN (Port-centric)
 If VLAN 20 did not exist before – then it does
now.
8 Aug 2014 S Ward Abingdon and
Witney College
20
Voice VLAN
 Configured for voice VLAN and data VLAN.
8 Aug 2014 S Ward Abingdon and
Witney College
21
Dynamic VLAN
 Not widely used.
 Use a VLAN Membership Policy Server
(VMPS).
 Assign a device to a VLAN based on its MAC
address.
 Connect device, server assigns VLAN.
 Useful if you want to move devices around.
8 Aug 2014 S Ward Abingdon and
Witney College
22
Traffic between VLANs
 Layer 2 switch keeps VLANs separate.
 Router can route between VLANs. It needs to
provide a default gateway for each VLAN as
VLANs are separate subnets.
 Layer 3 switch has a switch virtual interface
(SVI) configured for each VLAN. These act
like router interfaces to route between
VLANs.
8 Aug 2014 S Ward Abingdon and
Witney College
23
Trunking
 Both switches have the same 5 VLANs.
 Do you have a link for each VLAN?
 More efficient for them to share a link.
8 Aug 2014 S Ward Abingdon and
Witney College
24
Trunking
 Traffic for all the VLANs travels between the
switches on a shared trunk or backbone
8 Aug 2014 S Ward Abingdon and
Witney College
25
Tag to identify VLAN
 Tag is added to the frame when it goes on to the
trunk
 Tag is removed when it leaves the trunk
8 Aug 2014 S Ward Abingdon and
Witney College
26
Frame tagging IEEE 802.1Q
Dest Add Source Add Type/Len Data FCS
Dest Add Source Add Type/Len Data FCSTag
Normal
frame
Add 4-byte tag,
recalculate FCS
Tag protocol
ID 0x8100
Priority CFI for token
ring
VLAN ID
1 - 4096
8 Aug 2014 S Ward Abingdon and
Witney College
27
Native VLAN
 Untagged frames received on a trunk port are
forwarded on to the native VLAN.
 Frame received from the native VLAN should
be untagged.
 Switch will drop tagged frames received from
the native VLAN. This can happen if non-
Cisco devices are connected.
8 Aug 2014 S Ward Abingdon and
Witney College
28
Configure trunk port
 Make a port into a trunk port and tell it which
VLAN is native.
 SW1(config)#int fa0/1
 SW1(config-if)switchport mode trunk
 SW1(config-if)switchport trunk native vlan
99
 By default native VLAN is 1.
8 Aug 2014 S Ward Abingdon and
Witney College
29
Dynamic trunking protocol
Mode
trunk
Dynamic
auto/des
Mode
access
access
trunk
accessDynamic
auto
Dynamic
auto
trunk Dynamic
desirable
Dynamic
desirable
Dynamic
auto/des
Dynamic
desirable
Dynamic
auto
trunk
8 Aug 2014 S Ward Abingdon and
Witney College
30
Create a VLAN
 SW1(config)#vlan 20
 SW1(config-vlan)#name Finance
 SW1(config-vlan)#end
 VLAN will be saved in VLAN database rather
than running config.
 If you do not give it a name then it will be
called vlan0020.
8 Aug 2014 S Ward Abingdon and
Witney College
31
Assign port to VLAN
 SW1(config)#int fa 0/14
 SW1(config-if)#switchport mode access
 SW1(config-if)#switchport access vlan 20
 SW1(config-if)#end
8 Aug 2014 S Ward Abingdon and
Witney College
32
show vlan brief
 List of VLANs with ports
8 Aug 2014 S Ward Abingdon and
Witney College
33
Show commands
 show vlan brief (list of VLANs and ports)
 show vlan summary
 show interfaces vlan (up/down, traffic etc)
 Show interfaces fa0/14 switchport (access
mode, trunking)
8 Aug 2014 S Ward Abingdon and
Witney College
34
Remove port from VLAN
 SW1(config)#int fa 0/14
 SW1(config-if)#no switchport access vlan
 SW1(config-if)#end
 The port goes back to VLAN 1.
 If you assign a port to a new VLAN, it is
automatically removed from its existing
VLAN.
8 Aug 2014 S Ward Abingdon and
Witney College
35
Delete a VLAN
 SW1(config)#no vlan 20
 SW1(config)#end
 VLAN 20 is deleted.
 Any ports still on VLAN 20 will be inactive –
not on any VLAN. They need to be
reassigned.
8 Aug 2014 S Ward Abingdon and
Witney College
36
Delete VLAN database
 Erasing the startup configuration does not get
rid of VLANs because they are saved in a
separate file.
 SW1#delete flash:vlan.dat
 Switch goes back to the default with all ports
in VLAN 1.
 You cannot delete VLAN 1.
8 Aug 2014 S Ward Abingdon and
Witney College
37
Configure trunk
 SW1(config)#int fa0/1
 SW1(config-if)#switchport mode trunk
 SW1(config-if)#switchport trunk native vlan
99
 SW1(config-if)#switchport trunk allowed
vlan add 10, 20, 30
 SW1(config-if)#end
8 Aug 2014 S Ward Abingdon and
Witney College
38
Trunk problems
 Both ends must have the same native VLAN.
 Both ends must be configured with trunking
on or so that trunking is negotiated with the
other end and comes on.
 Subnetting and addressing must be right.
 The right VLANs must be allowed on the
trunk.
8 Aug 2014 S Ward Abingdon and Witney College 39
The End

Más contenido relacionado

La actualidad más candente

Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadMehtabRohela
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)Kanishk Raj
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)Netwax Lab
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)Netwax Lab
 
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer   layer 2 vlan security instructor6.5.1.3 packet tracer   layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructorSalem Trabelsi
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansVuz Dở Hơi
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer) Arz Sy
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingBisrat Girma
 

La actualidad más candente (20)

Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
 
VLAN
VLANVLAN
VLAN
 
Vlan
VlanVlan
Vlan
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
VTP
VTPVTP
VTP
 
VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)
 
6.5.1.3 packet tracer layer 2 vlan security instructor
6.5.1.3 packet tracer   layer 2 vlan security instructor6.5.1.3 packet tracer   layer 2 vlan security instructor
6.5.1.3 packet tracer layer 2 vlan security instructor
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
200 301-ccna
200 301-ccna200 301-ccna
200 301-ccna
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
vlan
vlanvlan
vlan
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Campus Network Design version 8
Campus Network Design version 8Campus Network Design version 8
Campus Network Design version 8
 
MPLS
MPLSMPLS
MPLS
 

Similar a Vlans

Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlanskratos2424
 
VLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxVLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxmuhammadFaheem656405
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptxBOURY1
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsAmir Jafari
 
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
Week 9   VLAN, SISTIM INFORMASI MANAGEMENWeek 9   VLAN, SISTIM INFORMASI MANAGEMEN
Week 9 VLAN, SISTIM INFORMASI MANAGEMENSetyady Peace
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area NetworkAtakan ATAK
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized networkArnold Derrick Kinney
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3Chaing Ravuth
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLANnewbie2019
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaRahul Kumar
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaRahul Kumar
 
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxSaqibAhmedKhan4
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccnarobertoxe
 
Config vlans
Config vlansConfig vlans
Config vlansamri am
 

Similar a Vlans (20)

CCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptxCCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptx
 
Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlans
 
VLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxVLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptx
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
 
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
Week 9   VLAN, SISTIM INFORMASI MANAGEMENWeek 9   VLAN, SISTIM INFORMASI MANAGEMEN
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
Chapter 8 .vlan.pdf
Chapter 8 .vlan.pdfChapter 8 .vlan.pdf
Chapter 8 .vlan.pdf
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Vlan
Vlan Vlan
Vlan
 
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Config vlans
Config vlansConfig vlans
Config vlans
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Vlans

  • 1. 8 Aug 2014 S Ward Abingdon and Witney College 1 VLANs CCNA Exploration Semester 3 Chapter 3
  • 2. 8 Aug 2014 S Ward Abingdon and Witney College 2 Topics  The role of VLANs in a network  Trunking VLANs  Configure VLANs on switches  Troubleshoot common VLAN problems
  • 3. 8 Aug 2014 S Ward Abingdon and Witney College 3 Semester 3 LAN Design Basic Switch Concepts VLANs VTP STP Inter-VLAN routing Wireless
  • 4. 8 Aug 2014 S Ward Abingdon and Witney College 4 Some requirements of LANs  Need to split up broadcast domains to make good use of bandwidth  People in the same department may need to be grouped together for access to servers  Security: restrict access by certain users to some areas of the LAN  Provide a way for different areas of the LAN to communicate with each other
  • 5. 8 Aug 2014 S Ward Abingdon and Witney College 5 Solution using routers  Divide the LAN into subnets  Use routers to link the subnets
  • 6. 8 Aug 2014 S Ward Abingdon and Witney College 6 Solution using routers BUT  Routers are expensive  Routers are slower than switches  Subnets are restricted to limited physical areas  Subnets are inflexible
  • 7. 8 Aug 2014 S Ward Abingdon and Witney College 7 Solution using VLANs  VLAN membership can be by function and not by location  VLANs managed by switches  Router needed for communication between VLANs
  • 8. 8 Aug 2014 S Ward Abingdon and Witney College 8 VLANs  All hosts in a VLAN have addresses in the same subnet. A VLAN is a subnet.  Broadcasts are kept within the VLAN. A VLAN is a broadcast domain.  The switch has a separate MAC address table for each VLAN. Traffic for each VLAN is kept separate from other VLANs.  Layer 2 switches cannot route between VLANs.
  • 9. 8 Aug 2014 S Ward Abingdon and Witney College 9 VLAN numbers  VLAN 1: default Ethernet LAN, all ports start in this VLAN.  VLANs 1002 – 1005 automatically created for Token Ring and FDDI  Numbers 2 to 1001 can be used for new VLANs  Up to 255 VLANs on Catalyst 2960 switch  Extended range 1006 – 4094 possible but fewer features
  • 10. 8 Aug 2014 S Ward Abingdon and Witney College 10 VLAN information  VLAN information is stored in the VLAN database.  vlan.dat in the flash memory of the switch.
  • 11. 8 Aug 2014 S Ward Abingdon and Witney College 11 Port based  Each switch port intended for an end device is configured to belong to a VLAN.  Any device connecting to that port belongs to the port’s VLAN.  There are other ways of assigning VLANs but this is now the normal way.  Ports that link switches can be configured to carry traffic for all VLANs (trunking)
  • 12. 8 Aug 2014 S Ward Abingdon and Witney College 12 Types of VLAN  Data or user VLAN  Voice VLAN  Management VLAN  Native VLAN  Default VLAN
  • 13. 8 Aug 2014 S Ward Abingdon and Witney College 13 Data VLAN  Carry files, e-mails, shared application traffic, most user traffic.  Separate VLAN for each group of users.
  • 14. 8 Aug 2014 S Ward Abingdon and Witney College 14 Voice VLAN  Use with IP phone.  Phone acts as a switch too.  Voice traffic is tagged, given priority.  Data not tagged, no priority.
  • 15. 8 Aug 2014 S Ward Abingdon and Witney College 15 Management VLAN  Has the switch IP address.  Used for telnet/SSH or web access for management purposes.  Better not to use VLAN 1 for security reasons.
  • 16. 8 Aug 2014 S Ward Abingdon and Witney College 16 Native VLAN  For backward compatibility with older systems.  Relevant to trunk ports.  Trunk ports carry traffic from multiple VLANs.  VLAN is identified by a “tag” in the frame.  Native VLAN does not have a tag.
  • 17. 8 Aug 2014 S Ward Abingdon and Witney College 17 Default VLAN  VLAN 1 on Cisco switches.  Carries CDP and STP (spanning tree protocol) traffic.  Initially all ports are in this VLAN.  Do not use it for data, voice or management traffic for security reasons.
  • 18. 8 Aug 2014 S Ward Abingdon and Witney College 18 Static VLAN  The normal type. Port configured to be on a VLAN. Connected device is on this VLAN.  VLAN can be created using CLI command, given number and name.  VLAN can be learned from another switch.  If a port is put on a VLAN and the VLAN does not exist, then the VLAN is created.
  • 19. 8 Aug 2014 S Ward Abingdon and Witney College 19 Static VLAN (Port-centric)  If VLAN 20 did not exist before – then it does now.
  • 20. 8 Aug 2014 S Ward Abingdon and Witney College 20 Voice VLAN  Configured for voice VLAN and data VLAN.
  • 21. 8 Aug 2014 S Ward Abingdon and Witney College 21 Dynamic VLAN  Not widely used.  Use a VLAN Membership Policy Server (VMPS).  Assign a device to a VLAN based on its MAC address.  Connect device, server assigns VLAN.  Useful if you want to move devices around.
  • 22. 8 Aug 2014 S Ward Abingdon and Witney College 22 Traffic between VLANs  Layer 2 switch keeps VLANs separate.  Router can route between VLANs. It needs to provide a default gateway for each VLAN as VLANs are separate subnets.  Layer 3 switch has a switch virtual interface (SVI) configured for each VLAN. These act like router interfaces to route between VLANs.
  • 23. 8 Aug 2014 S Ward Abingdon and Witney College 23 Trunking  Both switches have the same 5 VLANs.  Do you have a link for each VLAN?  More efficient for them to share a link.
  • 24. 8 Aug 2014 S Ward Abingdon and Witney College 24 Trunking  Traffic for all the VLANs travels between the switches on a shared trunk or backbone
  • 25. 8 Aug 2014 S Ward Abingdon and Witney College 25 Tag to identify VLAN  Tag is added to the frame when it goes on to the trunk  Tag is removed when it leaves the trunk
  • 26. 8 Aug 2014 S Ward Abingdon and Witney College 26 Frame tagging IEEE 802.1Q Dest Add Source Add Type/Len Data FCS Dest Add Source Add Type/Len Data FCSTag Normal frame Add 4-byte tag, recalculate FCS Tag protocol ID 0x8100 Priority CFI for token ring VLAN ID 1 - 4096
  • 27. 8 Aug 2014 S Ward Abingdon and Witney College 27 Native VLAN  Untagged frames received on a trunk port are forwarded on to the native VLAN.  Frame received from the native VLAN should be untagged.  Switch will drop tagged frames received from the native VLAN. This can happen if non- Cisco devices are connected.
  • 28. 8 Aug 2014 S Ward Abingdon and Witney College 28 Configure trunk port  Make a port into a trunk port and tell it which VLAN is native.  SW1(config)#int fa0/1  SW1(config-if)switchport mode trunk  SW1(config-if)switchport trunk native vlan 99  By default native VLAN is 1.
  • 29. 8 Aug 2014 S Ward Abingdon and Witney College 29 Dynamic trunking protocol Mode trunk Dynamic auto/des Mode access access trunk accessDynamic auto Dynamic auto trunk Dynamic desirable Dynamic desirable Dynamic auto/des Dynamic desirable Dynamic auto trunk
  • 30. 8 Aug 2014 S Ward Abingdon and Witney College 30 Create a VLAN  SW1(config)#vlan 20  SW1(config-vlan)#name Finance  SW1(config-vlan)#end  VLAN will be saved in VLAN database rather than running config.  If you do not give it a name then it will be called vlan0020.
  • 31. 8 Aug 2014 S Ward Abingdon and Witney College 31 Assign port to VLAN  SW1(config)#int fa 0/14  SW1(config-if)#switchport mode access  SW1(config-if)#switchport access vlan 20  SW1(config-if)#end
  • 32. 8 Aug 2014 S Ward Abingdon and Witney College 32 show vlan brief  List of VLANs with ports
  • 33. 8 Aug 2014 S Ward Abingdon and Witney College 33 Show commands  show vlan brief (list of VLANs and ports)  show vlan summary  show interfaces vlan (up/down, traffic etc)  Show interfaces fa0/14 switchport (access mode, trunking)
  • 34. 8 Aug 2014 S Ward Abingdon and Witney College 34 Remove port from VLAN  SW1(config)#int fa 0/14  SW1(config-if)#no switchport access vlan  SW1(config-if)#end  The port goes back to VLAN 1.  If you assign a port to a new VLAN, it is automatically removed from its existing VLAN.
  • 35. 8 Aug 2014 S Ward Abingdon and Witney College 35 Delete a VLAN  SW1(config)#no vlan 20  SW1(config)#end  VLAN 20 is deleted.  Any ports still on VLAN 20 will be inactive – not on any VLAN. They need to be reassigned.
  • 36. 8 Aug 2014 S Ward Abingdon and Witney College 36 Delete VLAN database  Erasing the startup configuration does not get rid of VLANs because they are saved in a separate file.  SW1#delete flash:vlan.dat  Switch goes back to the default with all ports in VLAN 1.  You cannot delete VLAN 1.
  • 37. 8 Aug 2014 S Ward Abingdon and Witney College 37 Configure trunk  SW1(config)#int fa0/1  SW1(config-if)#switchport mode trunk  SW1(config-if)#switchport trunk native vlan 99  SW1(config-if)#switchport trunk allowed vlan add 10, 20, 30  SW1(config-if)#end
  • 38. 8 Aug 2014 S Ward Abingdon and Witney College 38 Trunk problems  Both ends must have the same native VLAN.  Both ends must be configured with trunking on or so that trunking is negotiated with the other end and comes on.  Subnetting and addressing must be right.  The right VLANs must be allowed on the trunk.
  • 39. 8 Aug 2014 S Ward Abingdon and Witney College 39 The End