SlideShare a Scribd company logo
1 of 14
Switching
Networking Essentials – Eric Vanderburg © 2005
Port Security
Switchport port security mac-address
mac-address
 Switchport port security mac-address
sticky – learn first MAC used and restrict
to that one

Switch modes
Store & forward – waits until entire frame
is analyzed to forward
 Fragment free – looks at first 64 bytes
before forwarding
 Cut through – forwards ASAP
 Adaptive cut through – acts like cut
through unless many errors are
encountered. If so, switches to store &
forward
 Switching-mode store-and-forward

STP
802.1d
 Used to reduce forwarding loops
 Allows redundancy without looping
 Elects root bridge based on lowest
bridge ID (MAC & priority)
 Root ports are put in forwarding state,
others in blocking
 Root switch enables all ports

Other features
EtherChannel – allows multiple trunk
links to be used as one (2-8 links)
 PortFast – ports connected to hosts can
be enabled at once as soon as the first
frame is received

RSTP
802.1w
 Faster convergance
 PortFast & Etherchannel are both built-in
 Does not work when hubs are on the
network
 Can negotiate a new path to root
automatically without a link going down
first

VLANs
Segment into multiple broadcast
domains
 Requires layer 3 device to send data
between VLANs
 Requires trunking to move data to
VLANs spread between switches

Trunking


ISL (Inter-Switch Link)




IEEE 802.1q





encapsulates
Default VLAN
Changes header

Trunk Types





On
Off
Desirable
Auto
VTP
VTP allows configuration changes to be
propagated to other switches in the
same domain
 VTP modes


Server mode
 Client mode
 Transparent mode




VTP pruning – does not send VTP info to
a switch that has no ports in that VLAN
Switch commands


Interface fastethernet 0/0









Duplex full / half / auto
Speed 10 / 100 / 1000 / auto
Spanning-tree cost cost – changes priority
Channel-group # - enables etherchannel

Show spanning-tree – view info on rootID,
bridgeID, & ports that are blocking or
forwarding
Show vtp status – shows number of VLANs,
operating mode for this device, & domain
name,
Trunking


interface fastethernet 0.1
encapsulation isl 1
 encapsulation dot1q 2 (do not set for main
interface because that will be default vlan)

VLAN comands


Vlan database








SW1(vlan)#
Vlan 1 name Test
Vlan 2 name Sample
Vtp domain SampleDomain
Exit – must exit for changes to take place

Vtp pruning – turns pruning on in global config


Interface fastethernet 0/0





Switchport mode access – not trunk
Switchport access vlan 1

Interface range fastethernet 0/1 – 10
1900 switch


Interface fastethernet 0/0
Vlan-membership static 2
 Exit




Set up vlans in configure terminal
instead of vlan database
Trunking commands


Interface fastethernet 0/0
Switchport mode dynamic desirable
 Switchport mode dynamic auto
 Switchport mode trunk
 Switchport mode access




Interface ethernet 0.2
Encapsulation isl vlan#
 Encapsulation dot1q vlan#


More Related Content

What's hot

Attacking the spanning tree protocol
Attacking the spanning tree protocolAttacking the spanning tree protocol
Attacking the spanning tree protocol
Asmadzakirah
 
Spannig tree
Spannig treeSpannig tree
Spannig tree
1 2d
 
Proper spanning tree.pptx
Proper spanning tree.pptxProper spanning tree.pptx
Proper spanning tree.pptx
Eoin Irwin
 
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
Week 9   VLAN, SISTIM INFORMASI MANAGEMENWeek 9   VLAN, SISTIM INFORMASI MANAGEMEN
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
Setyady Peace
 
07 module extending switched netwroks with virtual la ns
07  module extending switched netwroks with virtual la ns07  module extending switched netwroks with virtual la ns
07 module extending switched netwroks with virtual la ns
Asif
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
welcometofacebook
 
Odl010024 qin q laboratory exercise guide issue1
Odl010024 qin q laboratory exercise guide issue1Odl010024 qin q laboratory exercise guide issue1
Odl010024 qin q laboratory exercise guide issue1
jcbp_peru
 

What's hot (20)

Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
 
Attacking the spanning tree protocol
Attacking the spanning tree protocolAttacking the spanning tree protocol
Attacking the spanning tree protocol
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12Stp premdeep gill-lu045310-14aug12
Stp premdeep gill-lu045310-14aug12
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 
Composants et fonctionnement d'un Switch Cisco
Composants et fonctionnement d'un Switch Cisco Composants et fonctionnement d'un Switch Cisco
Composants et fonctionnement d'un Switch Cisco
 
Spannig tree
Spannig treeSpannig tree
Spannig tree
 
CCNA- part 9 vlan
CCNA- part 9 vlanCCNA- part 9 vlan
CCNA- part 9 vlan
 
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
 
Proper spanning tree.pptx
Proper spanning tree.pptxProper spanning tree.pptx
Proper spanning tree.pptx
 
RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)
 
Difference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTPDifference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTP
 
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
Week 9   VLAN, SISTIM INFORMASI MANAGEMENWeek 9   VLAN, SISTIM INFORMASI MANAGEMEN
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
 
07 module extending switched netwroks with virtual la ns
07  module extending switched netwroks with virtual la ns07  module extending switched netwroks with virtual la ns
07 module extending switched netwroks with virtual la ns
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
 
Configure vtp
Configure vtpConfigure vtp
Configure vtp
 
Vlan and vtp
Vlan and vtpVlan and vtp
Vlan and vtp
 
Alp Stp
Alp StpAlp Stp
Alp Stp
 
VTP
VTPVTP
VTP
 
Odl010024 qin q laboratory exercise guide issue1
Odl010024 qin q laboratory exercise guide issue1Odl010024 qin q laboratory exercise guide issue1
Odl010024 qin q laboratory exercise guide issue1
 

Viewers also liked

Viewers also liked (12)

CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
 
Vlan
VlanVlan
Vlan
 
VLAN
VLANVLAN
VLAN
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
 
Vlans
VlansVlans
Vlans
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
VLAN
VLANVLAN
VLAN
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Vlan
Vlan Vlan
Vlan
 

Similar to CCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg

Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Mike McLain
 
Ccna free chapter
Ccna free chapterCcna free chapter
Ccna free chapter
kvs062003
 
Lec1 lan switching
Lec1 lan switchingLec1 lan switching
Lec1 lan switching
karthiketrx
 
Cisco discovery drs ent module 3 - v.4 in english.
Cisco discovery   drs ent module 3 - v.4 in english.Cisco discovery   drs ent module 3 - v.4 in english.
Cisco discovery drs ent module 3 - v.4 in english.
igede tirtanata
 
Examen final ccna2
Examen final ccna2Examen final ccna2
Examen final ccna2
Juli Yaret
 

Similar to CCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg (20)

Switching
SwitchingSwitching
Switching
 
Switching
SwitchingSwitching
Switching
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
 
VLAN
VLANVLAN
VLAN
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 
Dc fabric path
Dc fabric pathDc fabric path
Dc fabric path
 
Switching
SwitchingSwitching
Switching
 
Ccna free chapter
Ccna free chapterCcna free chapter
Ccna free chapter
 
Lec1 lan switching
Lec1 lan switchingLec1 lan switching
Lec1 lan switching
 
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol ConceptsCCNA R&S-12-Spanning Tree Protocol Concepts
CCNA R&S-12-Spanning Tree Protocol Concepts
 
Cisco discovery drs ent module 3 - v.4 in english.
Cisco discovery   drs ent module 3 - v.4 in english.Cisco discovery   drs ent module 3 - v.4 in english.
Cisco discovery drs ent module 3 - v.4 in english.
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Vlan
VlanVlan
Vlan
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
 
Examen final ccna2
Examen final ccna2Examen final ccna2
Examen final ccna2
 

More from Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

CCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg

  • 1. Switching Networking Essentials – Eric Vanderburg © 2005
  • 2. Port Security Switchport port security mac-address mac-address  Switchport port security mac-address sticky – learn first MAC used and restrict to that one 
  • 3. Switch modes Store & forward – waits until entire frame is analyzed to forward  Fragment free – looks at first 64 bytes before forwarding  Cut through – forwards ASAP  Adaptive cut through – acts like cut through unless many errors are encountered. If so, switches to store & forward  Switching-mode store-and-forward 
  • 4. STP 802.1d  Used to reduce forwarding loops  Allows redundancy without looping  Elects root bridge based on lowest bridge ID (MAC & priority)  Root ports are put in forwarding state, others in blocking  Root switch enables all ports 
  • 5. Other features EtherChannel – allows multiple trunk links to be used as one (2-8 links)  PortFast – ports connected to hosts can be enabled at once as soon as the first frame is received 
  • 6. RSTP 802.1w  Faster convergance  PortFast & Etherchannel are both built-in  Does not work when hubs are on the network  Can negotiate a new path to root automatically without a link going down first 
  • 7. VLANs Segment into multiple broadcast domains  Requires layer 3 device to send data between VLANs  Requires trunking to move data to VLANs spread between switches 
  • 8. Trunking  ISL (Inter-Switch Link)   IEEE 802.1q    encapsulates Default VLAN Changes header Trunk Types     On Off Desirable Auto
  • 9. VTP VTP allows configuration changes to be propagated to other switches in the same domain  VTP modes  Server mode  Client mode  Transparent mode   VTP pruning – does not send VTP info to a switch that has no ports in that VLAN
  • 10. Switch commands  Interface fastethernet 0/0       Duplex full / half / auto Speed 10 / 100 / 1000 / auto Spanning-tree cost cost – changes priority Channel-group # - enables etherchannel Show spanning-tree – view info on rootID, bridgeID, & ports that are blocking or forwarding Show vtp status – shows number of VLANs, operating mode for this device, & domain name,
  • 11. Trunking  interface fastethernet 0.1 encapsulation isl 1  encapsulation dot1q 2 (do not set for main interface because that will be default vlan) 
  • 12. VLAN comands  Vlan database       SW1(vlan)# Vlan 1 name Test Vlan 2 name Sample Vtp domain SampleDomain Exit – must exit for changes to take place Vtp pruning – turns pruning on in global config  Interface fastethernet 0/0    Switchport mode access – not trunk Switchport access vlan 1 Interface range fastethernet 0/1 – 10
  • 13. 1900 switch  Interface fastethernet 0/0 Vlan-membership static 2  Exit   Set up vlans in configure terminal instead of vlan database
  • 14. Trunking commands  Interface fastethernet 0/0 Switchport mode dynamic desirable  Switchport mode dynamic auto  Switchport mode trunk  Switchport mode access   Interface ethernet 0.2 Encapsulation isl vlan#  Encapsulation dot1q vlan# 