SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
CCNA3-1 Chapter 3-2
Virtual Local Area NetworksVirtual Local Area Networks
VLAN TrunkingVLAN Trunking
CCNA3-2 Chapter 3-2
VLAN TrunkingVLAN Trunking
• Concept trunking pertama kali digunakan di perusahaan
telephone.
• Multiple calls dipindahkan antara customers dan central
offices atau antar offices, dengan 1 physical connection.
CCNA3-3 Chapter 3-2
VLAN TrunkingVLAN Trunking
• Dengan prinsip yang sama, trunking diterapkan pada dataDengan prinsip yang sama, trunking diterapkan pada data
communications untuk memaksimalkan pemakaian jalur communicationcommunications untuk memaksimalkan pemakaian jalur communication
yang lebih baik secara bersama-sama.yang lebih baik secara bersama-sama.
• Keuntungan lainnya adalah penghematan cost, karena menggunakanKeuntungan lainnya adalah penghematan cost, karena menggunakan
jalur yang sama untuk komunikasi data dan voice.jalur yang sama untuk komunikasi data dan voice.
24 Channel T1 Line
with Data and Voice
CCNA3-4 Chapter 3-2
VLAN TrunkingVLAN Trunking
• Dengan prinsip yang sama juga, trunking diterapkan pada network yangDengan prinsip yang sama juga, trunking diterapkan pada network yang
menggunakan teknologi switching.menggunakan teknologi switching.
• TrunkTrunk merupakanmerupakan physical dan logicalphysical dan logical connections antara 2 switchesconnections antara 2 switches
yang melewatkan traffik network dari beberapan vlan network.yang melewatkan traffik network dari beberapan vlan network.
No trunkNo trunkNo trunkNo trunk
TrunkTrunkTrunkTrunk
CCNA3-5 Chapter 3-2
VLAN TrunkingVLAN Trunking
• Perlu diketahui link trunkPerlu diketahui link trunk
bukan milikbukan milik VLAN idVLAN id
tertentu.tertentu.
• Tanggungjawab dariTanggungjawab dari
link trunk adalah sebagailink trunk adalah sebagai
conduit/saluranconduit/saluran untukuntuk
VLANs.VLANs.
• DiantaraDiantara switchesswitches dandan
routersrouters, atau, atau
• DiantaraDiantara switchesswitches
dandan switchesswitches..
CCNA3-6 Chapter 3-2
VLAN TrunksVLAN Trunks
• What problem does it solve?What problem does it solve?
Network 172.17.10.0/24Network 172.17.10.0/24Network 172.17.10.0/24Network 172.17.10.0/24
Network 172.17.20.0/24Network 172.17.20.0/24Network 172.17.20.0/24Network 172.17.20.0/24
Network 172.17.99.0/24Network 172.17.99.0/24Network 172.17.99.0/24Network 172.17.99.0/24
Network 172.17.30.0/24Network 172.17.30.0/24Network 172.17.30.0/24Network 172.17.30.0/24
CCNA3-7 Chapter 3-2
IEEE 802.1Q Frame TaggingIEEE 802.1Q Frame Tagging
• Harus kita ingat bahwa switches adalah device Layer 2.
• Hanya menggunakan Ethernet frame header information untuk
berkomunikasi.
• Frame header tidak mengandung information mengenai VLAN
membership.
• Untuk itu VLAN membership (i.e. VLAN ID or VLAN Number) harus di
identifikasikan untuk setiap frame yang di lewatkan melalui trunk.
• Process ini dinamakan: “802.1Q VLAN Tagging”.
CCNA3-8 Chapter 3-2
IEEE 802.1Q Frame TaggingIEEE 802.1Q Frame Tagginghttp://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094665.shtmlhttp://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094665.shtml
6 6 2 1500 4
Destination
Address
Source
Address
Type /
Length
Data
Max of 1500 Bytes
FCS
6 6 2 2 2 1500 4
Destination
Address
Source
Address
802.1Q Tag
Type/
Length
Data
Max of 1500 Bytes
New
FCS8100 Tag
Length 1518 BytesLength 1518 BytesLength 1518 BytesLength 1518 Bytes
Length 1522 BytesLength 1522 BytesLength 1522 BytesLength 1522 Bytes
CCNA3-9 Chapter 3-2
IEEE 802.1Q Frame TaggingIEEE 802.1Q Frame Tagginghttp://en.wikipedia.org/wiki/IEEE_802.1Qhttp://en.wikipedia.org/wiki/IEEE_802.1Q
http://en.wikipedia.org/wiki/MAC_address#Bit-reversed_notationhttp://en.wikipedia.org/wiki/MAC_address#Bit-reversed_notation
Length 1522 BytesLength 1522 BytesLength 1522 BytesLength 1522 Bytes
CCNA3-10 Chapter 3-2
Native VLANsNative VLANs
• Configure identifikasi trunk menggunakanConfigure identifikasi trunk menggunakan default vlandefault vlan oror
native vlannative vlan yaituyaitu VLAN 1VLAN 1..
• Configure identifikasi trunk menggunakanConfigure identifikasi trunk menggunakan native vlannative vlan keke
VLAN 99VLAN 99..
CCNA3-11 Chapter 3-2
Native VLANsNative VLANs
• Verify the configuration.Verify the configuration.
• VLAN 50 is a voice VLAN.VLAN 50 is a voice VLAN.
CCNA3-12 Chapter 3-2
Trunking OperationTrunking Operation
PC1 and PC3PC1 and PC3
send a broadcast.send a broadcast.
PC1 and PC3PC1 and PC3
send a broadcast.send a broadcast.
10101010
20202020
30303030
10101010
20202020
30303030
S2 receives the frames andS2 receives the frames and
‘tags’ them with the VLAN ID.‘tags’ them with the VLAN ID.
S2 receives the frames andS2 receives the frames and
‘tags’ them with the VLAN ID.‘tags’ them with the VLAN ID.
The tagged frames are sentThe tagged frames are sent
across the trunk links betweenacross the trunk links between
S2 and S1 and S1 and S3.S2 and S1 and S1 and S3.
The tagged frames are sentThe tagged frames are sent
across the trunk links betweenacross the trunk links between
S2 and S1 and S1 and S3.S2 and S1 and S1 and S3.
S3 strips the tags andS3 strips the tags and
forwards to the destination.forwards to the destination.
S3 strips the tags andS3 strips the tags and
forwards to the destination.forwards to the destination.
CCNA3-13 Chapter 3-2
Trunking ModesTrunking Modes
• A Cisco switch can be configured to supportA Cisco switch can be configured to support two typestwo types ofof
trunk ports:trunk ports:
• IEEE 802.1QIEEE 802.1Q
• ISLISL (Inter-Switch Link)(Inter-Switch Link)
• Supported by all catalyst switches except 29XX seriesSupported by all catalyst switches except 29XX series
• Today only 802.1Q is used.Today only 802.1Q is used.
• Legacy networks may still use ISL.Legacy networks may still use ISL.
CCNA3-14 Chapter 3-2
Trunking ModesTrunking Modes
• IEEE 802.1Q trunk port is:
• Mendukung tagged dan untagged traffic secara simultan.
• Dilakukan oleh default PVID. (Port VLAN ID)
• Untagged traffic:
• Di assosiasikan dengan port default PVID.
• Null atau untagged VLAN ID traffic merupakan milik
default PVID.
• VLAN ID sama dengan port default PVID dikirim
keluar sebagai untagged.
• Tagged traffic:
• Semua traffic lainnya dikirim dengan VLAN tag.
CCNA3-15 Chapter 3-2
Trunking ModesTrunking Modes
• ISL (Inter-Switch Link):
• Semua paket yang diterima akan di-encapsulated dengan
ISL header.
• Semua transmitted packets dikirim dengan ISL header.
• Untagged frames yang dikirim dari ISL trunk port akan di
dropped.
• No longer recommended or supported.
• 30 bytes of overhead for each frame…..
CCNA3-16 Chapter 3-2
Trunking ModesTrunking Modes
• Dynamic Trunking Protocol (DTP):
• Cisco proprietary protocol.
• Negosiasi both status & trunk encapsulation dari trunk
ports
• Switches dari vendors lain tidak support DTP.
• Secara auto akan enable pada port switch ketika mode
trunking tertentu dikonfigurasi pada port switch tersebut.
• DTP manages trunk negotiation only if the port on the
other switch is configured in a trunk mode that supports
DTP.
• DTP supports both ISL and 802.1Q trunks.
• Some Cisco switches and routers (older versions) do not
support DTP.
CCNA3-17 Chapter 3-2
Trunking ModesTrunking Modeshttp://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/layer2.htmlhttp://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/layer2.html
Mode Dynamic Trunking Protocol (DTP):Mode Dynamic Trunking Protocol (DTP):
•Dynamic Auto: (switchport mode dynamic auto)
• The switch port periodically sends DTP frames to the
remote port. Dan mengiklankan ke remote port bahwa dia
bisa berubah ke mode trunk, tetapi tidak meminta remote
port untuk berubah ke trunk state. (enable on default)
•On (default/standart): (switchport mode trunk)
• Periodically sends DTP advertisements to the remote port
and remote port dynamically changing to a trunking state.
•Dynamic Desirable: (switchport mode dynamic desirable)
• DTP frames are sent periodically to the remote port. It
advertises to the remote switch port that it is able to trunk and
asks the remote switch port to go to the trunking state.
CCNA3-18 Chapter 3-2
Trunking ModesTrunking Modes
• Dynamic Trunking Protocol (DTP):Dynamic Trunking Protocol (DTP):
• Turn off DTP:Turn off DTP: ((switchport nonegogiateswitchport nonegogiate))
• The local port does not send out DTP frames to theThe local port does not send out DTP frames to the
remote port.remote port.
• Mengakibatkan Local port akan berada pada kondisiMengakibatkan Local port akan berada pada kondisi
Unconditional TrunkingUnconditional Trunking state.state.
• Use this feature when you need to configure a trunkUse this feature when you need to configure a trunk
with a switch from another switch vendorwith a switch from another switch vendor..
CCNA3-19 Chapter 3-2
Virtual Local Area NetworksVirtual Local Area Networks
Configure VLANs and TrunksConfigure VLANs and Trunks
““Let's look at the lab”Let's look at the lab”
CCNA3-20 Chapter 3-2
Configure VLANs and TrunksConfigure VLANs and Trunks
• Overview:Overview:
1.1. Create the VLANs.Create the VLANs.
2.2. Assign switch ports to VLANs statically.Assign switch ports to VLANs statically.
3.3. Verify VLAN configuration.Verify VLAN configuration.
4.4. Enable trunking on the inter-switch connections.Enable trunking on the inter-switch connections.
5.5. Verify trunk configuration.Verify trunk configuration.
CCNA3-21 Chapter 3-2
Configure a VLANConfigure a VLAN
• Command Syntax:Command Syntax:
S1#S1#configure terminalconfigure terminal
S1(config)#S1(config)#vlanvlan vlan idvlan id
S1(config-vlan)#S1(config-vlan)#namename vlan namevlan name
S1(config-vlan)#S1(config-vlan)#endend
CCNA3-22 Chapter 3-2
Configure a VLANConfigure a VLAN
Configure a VLANConfigure a VLANConfigure a VLANConfigure a VLAN
CCNA3-23 Chapter 3-2
Configure a VLANConfigure a VLAN
Assign switch ports to a VLANAssign switch ports to a VLANAssign switch ports to a VLANAssign switch ports to a VLAN
CCNA3-24 Chapter 3-2
Configure a VLANConfigure a VLAN
Verify VLAN configurationVerify VLAN configurationVerify VLAN configurationVerify VLAN configuration
CCNA3-25 Chapter 3-2
Managing VLANsManaging VLANs
OtherOther show vlanshow vlan command optionscommand optionsOtherOther show vlanshow vlan command optionscommand options
CCNA3-26 Chapter 3-2
Managing VLANsManaging VLANs
show interfacesshow interfaces commandcommandshow interfacesshow interfaces commandcommand
CCNA3-27 Chapter 3-2
Managing VLANsManaging VLANs
Manage VLAN MembershipsManage VLAN MembershipsManage VLAN MembershipsManage VLAN Memberships
Remove port VLAN membership.Remove port VLAN membership.Remove port VLAN membership.Remove port VLAN membership.
CCNA3-28 Chapter 3-2
• If you remove the VLANIf you remove the VLAN before removing the portbefore removing the port
membershipmembership assignments, the portsassignments, the ports become unusablebecome unusable untiluntil
you issue theyou issue the no switchport access vlanno switchport access vlan command.command.
Managing VLANsManaging VLANs
Manage VLAN MembershipsManage VLAN MembershipsManage VLAN MembershipsManage VLAN Memberships
Remove a VLANRemove a VLANRemove a VLANRemove a VLAN
Remove port VLAN membership.Remove port VLAN membership.Remove port VLAN membership.Remove port VLAN membership.
CCNA3-29 Chapter 3-2
Managing VLANsManaging VLANs
• Restoring to Factory Defaults:Restoring to Factory Defaults:
• To remove all VLAN configuration:To remove all VLAN configuration: VLANVLAN
configurationconfiguration
stored here.stored here.
VLANVLAN
configurationconfiguration
stored here.stored here.
CCNA3-30 Chapter 3-2
Configure a TrunkConfigure a Trunk
• Command Syntax:Command Syntax:
S1#S1#configure terminalconfigure terminal
S1(config)#S1(config)#interfaceinterface interface-idinterface-id
S1(config-if)#S1(config-if)#switchport mode trunkswitchport mode trunk
S1(config-if)#S1(config-if)#switchport trunk native vlanswitchport trunk native vlan
vlan-idvlan-id
S1(config-if)#S1(config-if)#switchport trunk allowed vlanswitchport trunk allowed vlan
addadd vlan-listvlan-list
S1(config-vlan)#S1(config-vlan)#endend
CCNA3-31 Chapter 3-2
Configure a TrunkConfigure a Trunk
CCNA3-32 Chapter 3-2
Configure a Trunk (p149)Configure a Trunk (p149)
The native VLAN mustThe native VLAN must
match onmatch on bothboth switches.switches.
The native VLAN mustThe native VLAN must
match onmatch on bothboth switches.switches.
CCNA3-33 Chapter 3-2
Verify Trunk ConfigurationVerify Trunk Configuration
CCNA3-34 Chapter 3-2
Managing a Trunk ConfigurationManaging a Trunk Configuration
CCNA3-35 Chapter 3-2
Managing a Trunk ConfigurationManaging a Trunk Configuration
• Pruning:Pruning:
• The process of specifying the traffic that will be allowed toThe process of specifying the traffic that will be allowed to
traverse the trunk link.traverse the trunk link.
• Use the command:Use the command:
switchport trunk allowed vlan addswitchport trunk allowed vlan add vlan-listvlan-list
• TheThe vlan-listvlan-list is a list of the VLAN IDs, separated byis a list of the VLAN IDs, separated by
commas, that will be allowed to use the trunk link.commas, that will be allowed to use the trunk link.
• The lists must match on both switches.The lists must match on both switches.
CCNA3-36 Chapter 3-2
Common Problems with TrunksCommon Problems with Trunks
• Native VLAN mismatches:Native VLAN mismatches:
• Trunk ports are configured with different native VLANs.Trunk ports are configured with different native VLANs.
• Trunk Mode mismatches:Trunk Mode mismatches:
• One trunk port is configured with trunk modeOne trunk port is configured with trunk mode offoff and theand the
other with trunk modeother with trunk mode onon..
• VLANs and IP Subnets:VLANs and IP Subnets:
• End user devices configured with incorrect IP addressesEnd user devices configured with incorrect IP addresses
will not have network connectivity. Each VLAN is awill not have network connectivity. Each VLAN is a
logically separate IP subnetwork. Devices within thelogically separate IP subnetwork. Devices within the
VLAN must be configured with the correct IP settings.VLAN must be configured with the correct IP settings.
• Allowed VLANs on trunks:Allowed VLANs on trunks:
• The list of allowed VLANs on a trunk does not match onThe list of allowed VLANs on a trunk does not match on
both ends of the trunk.both ends of the trunk.

Contenu connexe

Tendances

Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN RoutingNetwax Lab
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingMuhd Mu'izuddin
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switchingMuhd Mu'izuddin
 
Tn 310 vlan-trunking
Tn 310 vlan-trunkingTn 310 vlan-trunking
Tn 310 vlan-trunkingsali Ibrahimu
 
At8000 s configurando vla_ns
At8000 s configurando vla_nsAt8000 s configurando vla_ns
At8000 s configurando vla_nsNetPlus
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2samis
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
 
VXLAN Distributed Service Node
VXLAN Distributed Service NodeVXLAN Distributed Service Node
VXLAN Distributed Service NodeDavid Lapsley
 
Inter-VLAN Routing
Inter-VLAN RoutingInter-VLAN Routing
Inter-VLAN Routingrmosate
 
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingAmir Jafari
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Azad Kaki
 
Vlans
VlansVlans
Vlans1 2d
 

Tendances (20)

Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
 
Tn 310 vlan-trunking
Tn 310 vlan-trunkingTn 310 vlan-trunking
Tn 310 vlan-trunking
 
Day 14.2 inter vlan
Day 14.2 inter vlanDay 14.2 inter vlan
Day 14.2 inter vlan
 
At8000 s configurando vla_ns
At8000 s configurando vla_nsAt8000 s configurando vla_ns
At8000 s configurando vla_ns
 
Vlans
VlansVlans
Vlans
 
Day 14.2 configuringvla ns
Day 14.2 configuringvla nsDay 14.2 configuringvla ns
Day 14.2 configuringvla ns
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
Vlan
Vlan Vlan
Vlan
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
CCNA- part 10 wan link-isdn
CCNA- part 10 wan link-isdnCCNA- part 10 wan link-isdn
CCNA- part 10 wan link-isdn
 
Hacking L2 Switches
Hacking L2 SwitchesHacking L2 Switches
Hacking L2 Switches
 
Xpress path vxlan_bgp_evpn_appricot2019-v2_
Xpress path vxlan_bgp_evpn_appricot2019-v2_Xpress path vxlan_bgp_evpn_appricot2019-v2_
Xpress path vxlan_bgp_evpn_appricot2019-v2_
 
VXLAN Distributed Service Node
VXLAN Distributed Service NodeVXLAN Distributed Service Node
VXLAN Distributed Service Node
 
Inter-VLAN Routing
Inter-VLAN RoutingInter-VLAN Routing
Inter-VLAN Routing
 
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
 
Vlans
VlansVlans
Vlans
 

En vedette

En vedette (6)

Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Chapter13ccna
Chapter13ccnaChapter13ccna
Chapter13ccna
 
Expl sw chapter_04_vtp-full
Expl sw chapter_04_vtp-fullExpl sw chapter_04_vtp-full
Expl sw chapter_04_vtp-full
 
VTP
VTPVTP
VTP
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 

Similaire à Expl sw chapter_03_vla_ns_part_ii

Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area NetworkAtakan ATAK
 
Chapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfChapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfBuntha Chhay
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3Chaing Ravuth
 
ccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxGiyaShefin
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptxBOURY1
 
Vlan.pdf
Vlan.pdfVlan.pdf
Vlan.pdfitwkd
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiMR. VIKRAM SNEHI
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manualnudicixox
 
Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ questionsufi1248
 
Vlan and vtp
Vlan and vtpVlan and vtp
Vlan and vtpRaj sekar
 
Vlan and vtp
Vlan and vtpVlan and vtp
Vlan and vtpRaj sekar
 
CCN3Switching_lab_5_5_2
CCN3Switching_lab_5_5_2CCN3Switching_lab_5_5_2
CCN3Switching_lab_5_5_2alan moreno
 
Campas network design overview
Campas network design overviewCampas network design overview
Campas network design overviewAnushka Hapuhinna
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 

Similaire à Expl sw chapter_03_vla_ns_part_ii (20)

Dot1qtnl
Dot1qtnlDot1qtnl
Dot1qtnl
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
Chapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfChapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdf
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
ENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptxENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptx
 
ccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptxccna3mod9_VLAN Trunking Protocol (1).pptx
ccna3mod9_VLAN Trunking Protocol (1).pptx
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
Vlan.pdf
Vlan.pdfVlan.pdf
Vlan.pdf
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
 
Ccna 9
Ccna  9Ccna  9
Ccna 9
 
Tema3
Tema3Tema3
Tema3
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 
Exercise 4c stp rapid pvst+ question
Exercise 4c   stp rapid pvst+ questionExercise 4c   stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
 
Vlan and vtp
Vlan and vtpVlan and vtp
Vlan and vtp
 
Vlan and vtp
Vlan and vtpVlan and vtp
Vlan and vtp
 
ENCOR_Capitulo 5.pptx
ENCOR_Capitulo 5.pptxENCOR_Capitulo 5.pptx
ENCOR_Capitulo 5.pptx
 
Switching
SwitchingSwitching
Switching
 
CCN3Switching_lab_5_5_2
CCN3Switching_lab_5_5_2CCN3Switching_lab_5_5_2
CCN3Switching_lab_5_5_2
 
Campas network design overview
Campas network design overviewCampas network design overview
Campas network design overview
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 

Plus de aghacrom

Expl sw chapter_07_wireless rev.01(additional)
Expl sw chapter_07_wireless rev.01(additional)Expl sw chapter_07_wireless rev.01(additional)
Expl sw chapter_07_wireless rev.01(additional)aghacrom
 
Expl sw chapter_07_wireless rev.01
Expl sw chapter_07_wireless rev.01Expl sw chapter_07_wireless rev.01
Expl sw chapter_07_wireless rev.01aghacrom
 
Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.aghacrom
 
Expl sw chapter_07_wireless rev.01(additional)
Expl sw chapter_07_wireless rev.01(additional)Expl sw chapter_07_wireless rev.01(additional)
Expl sw chapter_07_wireless rev.01(additional)aghacrom
 
Expl sw chapter_05_stp_part_ii-rev2.
Expl sw chapter_05_stp_part_ii-rev2.Expl sw chapter_05_stp_part_ii-rev2.
Expl sw chapter_05_stp_part_ii-rev2.aghacrom
 
Expl sw chapter_03_vla_ns_part_i
Expl sw chapter_03_vla_ns_part_iExpl sw chapter_03_vla_ns_part_i
Expl sw chapter_03_vla_ns_part_iaghacrom
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1aghacrom
 
Expl sw chapter_01_lan_design - class
Expl sw chapter_01_lan_design - classExpl sw chapter_01_lan_design - class
Expl sw chapter_01_lan_design - classaghacrom
 
Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2aghacrom
 

Plus de aghacrom (9)

Expl sw chapter_07_wireless rev.01(additional)
Expl sw chapter_07_wireless rev.01(additional)Expl sw chapter_07_wireless rev.01(additional)
Expl sw chapter_07_wireless rev.01(additional)
 
Expl sw chapter_07_wireless rev.01
Expl sw chapter_07_wireless rev.01Expl sw chapter_07_wireless rev.01
Expl sw chapter_07_wireless rev.01
 
Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.
 
Expl sw chapter_07_wireless rev.01(additional)
Expl sw chapter_07_wireless rev.01(additional)Expl sw chapter_07_wireless rev.01(additional)
Expl sw chapter_07_wireless rev.01(additional)
 
Expl sw chapter_05_stp_part_ii-rev2.
Expl sw chapter_05_stp_part_ii-rev2.Expl sw chapter_05_stp_part_ii-rev2.
Expl sw chapter_05_stp_part_ii-rev2.
 
Expl sw chapter_03_vla_ns_part_i
Expl sw chapter_03_vla_ns_part_iExpl sw chapter_03_vla_ns_part_i
Expl sw chapter_03_vla_ns_part_i
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
 
Expl sw chapter_01_lan_design - class
Expl sw chapter_01_lan_design - classExpl sw chapter_01_lan_design - class
Expl sw chapter_01_lan_design - class
 
Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2
 

Dernier

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Dernier (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Expl sw chapter_03_vla_ns_part_ii

  • 1. CCNA3-1 Chapter 3-2 Virtual Local Area NetworksVirtual Local Area Networks VLAN TrunkingVLAN Trunking
  • 2. CCNA3-2 Chapter 3-2 VLAN TrunkingVLAN Trunking • Concept trunking pertama kali digunakan di perusahaan telephone. • Multiple calls dipindahkan antara customers dan central offices atau antar offices, dengan 1 physical connection.
  • 3. CCNA3-3 Chapter 3-2 VLAN TrunkingVLAN Trunking • Dengan prinsip yang sama, trunking diterapkan pada dataDengan prinsip yang sama, trunking diterapkan pada data communications untuk memaksimalkan pemakaian jalur communicationcommunications untuk memaksimalkan pemakaian jalur communication yang lebih baik secara bersama-sama.yang lebih baik secara bersama-sama. • Keuntungan lainnya adalah penghematan cost, karena menggunakanKeuntungan lainnya adalah penghematan cost, karena menggunakan jalur yang sama untuk komunikasi data dan voice.jalur yang sama untuk komunikasi data dan voice. 24 Channel T1 Line with Data and Voice
  • 4. CCNA3-4 Chapter 3-2 VLAN TrunkingVLAN Trunking • Dengan prinsip yang sama juga, trunking diterapkan pada network yangDengan prinsip yang sama juga, trunking diterapkan pada network yang menggunakan teknologi switching.menggunakan teknologi switching. • TrunkTrunk merupakanmerupakan physical dan logicalphysical dan logical connections antara 2 switchesconnections antara 2 switches yang melewatkan traffik network dari beberapan vlan network.yang melewatkan traffik network dari beberapan vlan network. No trunkNo trunkNo trunkNo trunk TrunkTrunkTrunkTrunk
  • 5. CCNA3-5 Chapter 3-2 VLAN TrunkingVLAN Trunking • Perlu diketahui link trunkPerlu diketahui link trunk bukan milikbukan milik VLAN idVLAN id tertentu.tertentu. • Tanggungjawab dariTanggungjawab dari link trunk adalah sebagailink trunk adalah sebagai conduit/saluranconduit/saluran untukuntuk VLANs.VLANs. • DiantaraDiantara switchesswitches dandan routersrouters, atau, atau • DiantaraDiantara switchesswitches dandan switchesswitches..
  • 6. CCNA3-6 Chapter 3-2 VLAN TrunksVLAN Trunks • What problem does it solve?What problem does it solve? Network 172.17.10.0/24Network 172.17.10.0/24Network 172.17.10.0/24Network 172.17.10.0/24 Network 172.17.20.0/24Network 172.17.20.0/24Network 172.17.20.0/24Network 172.17.20.0/24 Network 172.17.99.0/24Network 172.17.99.0/24Network 172.17.99.0/24Network 172.17.99.0/24 Network 172.17.30.0/24Network 172.17.30.0/24Network 172.17.30.0/24Network 172.17.30.0/24
  • 7. CCNA3-7 Chapter 3-2 IEEE 802.1Q Frame TaggingIEEE 802.1Q Frame Tagging • Harus kita ingat bahwa switches adalah device Layer 2. • Hanya menggunakan Ethernet frame header information untuk berkomunikasi. • Frame header tidak mengandung information mengenai VLAN membership. • Untuk itu VLAN membership (i.e. VLAN ID or VLAN Number) harus di identifikasikan untuk setiap frame yang di lewatkan melalui trunk. • Process ini dinamakan: “802.1Q VLAN Tagging”.
  • 8. CCNA3-8 Chapter 3-2 IEEE 802.1Q Frame TaggingIEEE 802.1Q Frame Tagginghttp://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094665.shtmlhttp://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094665.shtml 6 6 2 1500 4 Destination Address Source Address Type / Length Data Max of 1500 Bytes FCS 6 6 2 2 2 1500 4 Destination Address Source Address 802.1Q Tag Type/ Length Data Max of 1500 Bytes New FCS8100 Tag Length 1518 BytesLength 1518 BytesLength 1518 BytesLength 1518 Bytes Length 1522 BytesLength 1522 BytesLength 1522 BytesLength 1522 Bytes
  • 9. CCNA3-9 Chapter 3-2 IEEE 802.1Q Frame TaggingIEEE 802.1Q Frame Tagginghttp://en.wikipedia.org/wiki/IEEE_802.1Qhttp://en.wikipedia.org/wiki/IEEE_802.1Q http://en.wikipedia.org/wiki/MAC_address#Bit-reversed_notationhttp://en.wikipedia.org/wiki/MAC_address#Bit-reversed_notation Length 1522 BytesLength 1522 BytesLength 1522 BytesLength 1522 Bytes
  • 10. CCNA3-10 Chapter 3-2 Native VLANsNative VLANs • Configure identifikasi trunk menggunakanConfigure identifikasi trunk menggunakan default vlandefault vlan oror native vlannative vlan yaituyaitu VLAN 1VLAN 1.. • Configure identifikasi trunk menggunakanConfigure identifikasi trunk menggunakan native vlannative vlan keke VLAN 99VLAN 99..
  • 11. CCNA3-11 Chapter 3-2 Native VLANsNative VLANs • Verify the configuration.Verify the configuration. • VLAN 50 is a voice VLAN.VLAN 50 is a voice VLAN.
  • 12. CCNA3-12 Chapter 3-2 Trunking OperationTrunking Operation PC1 and PC3PC1 and PC3 send a broadcast.send a broadcast. PC1 and PC3PC1 and PC3 send a broadcast.send a broadcast. 10101010 20202020 30303030 10101010 20202020 30303030 S2 receives the frames andS2 receives the frames and ‘tags’ them with the VLAN ID.‘tags’ them with the VLAN ID. S2 receives the frames andS2 receives the frames and ‘tags’ them with the VLAN ID.‘tags’ them with the VLAN ID. The tagged frames are sentThe tagged frames are sent across the trunk links betweenacross the trunk links between S2 and S1 and S1 and S3.S2 and S1 and S1 and S3. The tagged frames are sentThe tagged frames are sent across the trunk links betweenacross the trunk links between S2 and S1 and S1 and S3.S2 and S1 and S1 and S3. S3 strips the tags andS3 strips the tags and forwards to the destination.forwards to the destination. S3 strips the tags andS3 strips the tags and forwards to the destination.forwards to the destination.
  • 13. CCNA3-13 Chapter 3-2 Trunking ModesTrunking Modes • A Cisco switch can be configured to supportA Cisco switch can be configured to support two typestwo types ofof trunk ports:trunk ports: • IEEE 802.1QIEEE 802.1Q • ISLISL (Inter-Switch Link)(Inter-Switch Link) • Supported by all catalyst switches except 29XX seriesSupported by all catalyst switches except 29XX series • Today only 802.1Q is used.Today only 802.1Q is used. • Legacy networks may still use ISL.Legacy networks may still use ISL.
  • 14. CCNA3-14 Chapter 3-2 Trunking ModesTrunking Modes • IEEE 802.1Q trunk port is: • Mendukung tagged dan untagged traffic secara simultan. • Dilakukan oleh default PVID. (Port VLAN ID) • Untagged traffic: • Di assosiasikan dengan port default PVID. • Null atau untagged VLAN ID traffic merupakan milik default PVID. • VLAN ID sama dengan port default PVID dikirim keluar sebagai untagged. • Tagged traffic: • Semua traffic lainnya dikirim dengan VLAN tag.
  • 15. CCNA3-15 Chapter 3-2 Trunking ModesTrunking Modes • ISL (Inter-Switch Link): • Semua paket yang diterima akan di-encapsulated dengan ISL header. • Semua transmitted packets dikirim dengan ISL header. • Untagged frames yang dikirim dari ISL trunk port akan di dropped. • No longer recommended or supported. • 30 bytes of overhead for each frame…..
  • 16. CCNA3-16 Chapter 3-2 Trunking ModesTrunking Modes • Dynamic Trunking Protocol (DTP): • Cisco proprietary protocol. • Negosiasi both status & trunk encapsulation dari trunk ports • Switches dari vendors lain tidak support DTP. • Secara auto akan enable pada port switch ketika mode trunking tertentu dikonfigurasi pada port switch tersebut. • DTP manages trunk negotiation only if the port on the other switch is configured in a trunk mode that supports DTP. • DTP supports both ISL and 802.1Q trunks. • Some Cisco switches and routers (older versions) do not support DTP.
  • 17. CCNA3-17 Chapter 3-2 Trunking ModesTrunking Modeshttp://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/layer2.htmlhttp://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/layer2.html Mode Dynamic Trunking Protocol (DTP):Mode Dynamic Trunking Protocol (DTP): •Dynamic Auto: (switchport mode dynamic auto) • The switch port periodically sends DTP frames to the remote port. Dan mengiklankan ke remote port bahwa dia bisa berubah ke mode trunk, tetapi tidak meminta remote port untuk berubah ke trunk state. (enable on default) •On (default/standart): (switchport mode trunk) • Periodically sends DTP advertisements to the remote port and remote port dynamically changing to a trunking state. •Dynamic Desirable: (switchport mode dynamic desirable) • DTP frames are sent periodically to the remote port. It advertises to the remote switch port that it is able to trunk and asks the remote switch port to go to the trunking state.
  • 18. CCNA3-18 Chapter 3-2 Trunking ModesTrunking Modes • Dynamic Trunking Protocol (DTP):Dynamic Trunking Protocol (DTP): • Turn off DTP:Turn off DTP: ((switchport nonegogiateswitchport nonegogiate)) • The local port does not send out DTP frames to theThe local port does not send out DTP frames to the remote port.remote port. • Mengakibatkan Local port akan berada pada kondisiMengakibatkan Local port akan berada pada kondisi Unconditional TrunkingUnconditional Trunking state.state. • Use this feature when you need to configure a trunkUse this feature when you need to configure a trunk with a switch from another switch vendorwith a switch from another switch vendor..
  • 19. CCNA3-19 Chapter 3-2 Virtual Local Area NetworksVirtual Local Area Networks Configure VLANs and TrunksConfigure VLANs and Trunks ““Let's look at the lab”Let's look at the lab”
  • 20. CCNA3-20 Chapter 3-2 Configure VLANs and TrunksConfigure VLANs and Trunks • Overview:Overview: 1.1. Create the VLANs.Create the VLANs. 2.2. Assign switch ports to VLANs statically.Assign switch ports to VLANs statically. 3.3. Verify VLAN configuration.Verify VLAN configuration. 4.4. Enable trunking on the inter-switch connections.Enable trunking on the inter-switch connections. 5.5. Verify trunk configuration.Verify trunk configuration.
  • 21. CCNA3-21 Chapter 3-2 Configure a VLANConfigure a VLAN • Command Syntax:Command Syntax: S1#S1#configure terminalconfigure terminal S1(config)#S1(config)#vlanvlan vlan idvlan id S1(config-vlan)#S1(config-vlan)#namename vlan namevlan name S1(config-vlan)#S1(config-vlan)#endend
  • 22. CCNA3-22 Chapter 3-2 Configure a VLANConfigure a VLAN Configure a VLANConfigure a VLANConfigure a VLANConfigure a VLAN
  • 23. CCNA3-23 Chapter 3-2 Configure a VLANConfigure a VLAN Assign switch ports to a VLANAssign switch ports to a VLANAssign switch ports to a VLANAssign switch ports to a VLAN
  • 24. CCNA3-24 Chapter 3-2 Configure a VLANConfigure a VLAN Verify VLAN configurationVerify VLAN configurationVerify VLAN configurationVerify VLAN configuration
  • 25. CCNA3-25 Chapter 3-2 Managing VLANsManaging VLANs OtherOther show vlanshow vlan command optionscommand optionsOtherOther show vlanshow vlan command optionscommand options
  • 26. CCNA3-26 Chapter 3-2 Managing VLANsManaging VLANs show interfacesshow interfaces commandcommandshow interfacesshow interfaces commandcommand
  • 27. CCNA3-27 Chapter 3-2 Managing VLANsManaging VLANs Manage VLAN MembershipsManage VLAN MembershipsManage VLAN MembershipsManage VLAN Memberships Remove port VLAN membership.Remove port VLAN membership.Remove port VLAN membership.Remove port VLAN membership.
  • 28. CCNA3-28 Chapter 3-2 • If you remove the VLANIf you remove the VLAN before removing the portbefore removing the port membershipmembership assignments, the portsassignments, the ports become unusablebecome unusable untiluntil you issue theyou issue the no switchport access vlanno switchport access vlan command.command. Managing VLANsManaging VLANs Manage VLAN MembershipsManage VLAN MembershipsManage VLAN MembershipsManage VLAN Memberships Remove a VLANRemove a VLANRemove a VLANRemove a VLAN Remove port VLAN membership.Remove port VLAN membership.Remove port VLAN membership.Remove port VLAN membership.
  • 29. CCNA3-29 Chapter 3-2 Managing VLANsManaging VLANs • Restoring to Factory Defaults:Restoring to Factory Defaults: • To remove all VLAN configuration:To remove all VLAN configuration: VLANVLAN configurationconfiguration stored here.stored here. VLANVLAN configurationconfiguration stored here.stored here.
  • 30. CCNA3-30 Chapter 3-2 Configure a TrunkConfigure a Trunk • Command Syntax:Command Syntax: S1#S1#configure terminalconfigure terminal S1(config)#S1(config)#interfaceinterface interface-idinterface-id S1(config-if)#S1(config-if)#switchport mode trunkswitchport mode trunk S1(config-if)#S1(config-if)#switchport trunk native vlanswitchport trunk native vlan vlan-idvlan-id S1(config-if)#S1(config-if)#switchport trunk allowed vlanswitchport trunk allowed vlan addadd vlan-listvlan-list S1(config-vlan)#S1(config-vlan)#endend
  • 31. CCNA3-31 Chapter 3-2 Configure a TrunkConfigure a Trunk
  • 32. CCNA3-32 Chapter 3-2 Configure a Trunk (p149)Configure a Trunk (p149) The native VLAN mustThe native VLAN must match onmatch on bothboth switches.switches. The native VLAN mustThe native VLAN must match onmatch on bothboth switches.switches.
  • 33. CCNA3-33 Chapter 3-2 Verify Trunk ConfigurationVerify Trunk Configuration
  • 34. CCNA3-34 Chapter 3-2 Managing a Trunk ConfigurationManaging a Trunk Configuration
  • 35. CCNA3-35 Chapter 3-2 Managing a Trunk ConfigurationManaging a Trunk Configuration • Pruning:Pruning: • The process of specifying the traffic that will be allowed toThe process of specifying the traffic that will be allowed to traverse the trunk link.traverse the trunk link. • Use the command:Use the command: switchport trunk allowed vlan addswitchport trunk allowed vlan add vlan-listvlan-list • TheThe vlan-listvlan-list is a list of the VLAN IDs, separated byis a list of the VLAN IDs, separated by commas, that will be allowed to use the trunk link.commas, that will be allowed to use the trunk link. • The lists must match on both switches.The lists must match on both switches.
  • 36. CCNA3-36 Chapter 3-2 Common Problems with TrunksCommon Problems with Trunks • Native VLAN mismatches:Native VLAN mismatches: • Trunk ports are configured with different native VLANs.Trunk ports are configured with different native VLANs. • Trunk Mode mismatches:Trunk Mode mismatches: • One trunk port is configured with trunk modeOne trunk port is configured with trunk mode offoff and theand the other with trunk modeother with trunk mode onon.. • VLANs and IP Subnets:VLANs and IP Subnets: • End user devices configured with incorrect IP addressesEnd user devices configured with incorrect IP addresses will not have network connectivity. Each VLAN is awill not have network connectivity. Each VLAN is a logically separate IP subnetwork. Devices within thelogically separate IP subnetwork. Devices within the VLAN must be configured with the correct IP settings.VLAN must be configured with the correct IP settings. • Allowed VLANs on trunks:Allowed VLANs on trunks: • The list of allowed VLANs on a trunk does not match onThe list of allowed VLANs on a trunk does not match on both ends of the trunk.both ends of the trunk.