SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
8 Aug 2014 S Ward Abingdon and Witney College 1
VLANs
CCNA Exploration Semester 3
Chapter 3
8 Aug 2014 S Ward Abingdon and
Witney College
2
Topics
 The role of VLANs in a network
 Trunking VLANs
 Configure VLANs on switches
 Troubleshoot common VLAN problems
8 Aug 2014 S Ward Abingdon and
Witney College
3
Semester 3
LAN Design
Basic Switch
Concepts
VLANs
VTP
STP
Inter-VLAN
routing
Wireless
8 Aug 2014 S Ward Abingdon and
Witney College
4
Some requirements of LANs
 Need to split up broadcast domains to make
good use of bandwidth
 People in the same department may need to
be grouped together for access to servers
 Security: restrict access by certain users to
some areas of the LAN
 Provide a way for different areas of the LAN
to communicate with each other
8 Aug 2014 S Ward Abingdon and
Witney College
5
Solution using routers
 Divide the LAN into
subnets
 Use routers to link
the subnets
8 Aug 2014 S Ward Abingdon and
Witney College
6
Solution using routers
BUT
 Routers are expensive
 Routers are slower than switches
 Subnets are restricted to limited physical
areas
 Subnets are inflexible
8 Aug 2014 S Ward Abingdon and
Witney College
7
Solution using VLANs
 VLAN membership can
be by function and not
by location
 VLANs managed by
switches
 Router needed for
communication
between VLANs
8 Aug 2014 S Ward Abingdon and
Witney College
8
VLANs
 All hosts in a VLAN have addresses in the
same subnet. A VLAN is a subnet.
 Broadcasts are kept within the VLAN. A VLAN
is a broadcast domain.
 The switch has a separate MAC address table
for each VLAN. Traffic for each VLAN is kept
separate from other VLANs.
 Layer 2 switches cannot route between VLANs.
8 Aug 2014 S Ward Abingdon and
Witney College
9
VLAN numbers
 VLAN 1: default Ethernet LAN, all ports start in
this VLAN.
 VLANs 1002 – 1005 automatically created for
Token Ring and FDDI
 Numbers 2 to 1001 can be used for new VLANs
 Up to 255 VLANs on Catalyst 2960 switch
 Extended range 1006 – 4094 possible but fewer
features
8 Aug 2014 S Ward Abingdon and
Witney College
10
VLAN information
 VLAN information is stored in the VLAN
database.
 vlan.dat in the flash memory of the switch.
8 Aug 2014 S Ward Abingdon and
Witney College
11
Port based
 Each switch port intended for an end device
is configured to belong to a VLAN.
 Any device connecting to that port belongs to
the port’s VLAN.
 There are other ways of assigning VLANs but
this is now the normal way.
 Ports that link switches can be configured to
carry traffic for all VLANs (trunking)
8 Aug 2014 S Ward Abingdon and
Witney College
12
Types of VLAN
 Data or user VLAN
 Voice VLAN
 Management VLAN
 Native VLAN
 Default VLAN
8 Aug 2014 S Ward Abingdon and
Witney College
13
Data VLAN
 Carry files, e-mails, shared application traffic,
most user traffic.
 Separate VLAN for each group of users.
8 Aug 2014 S Ward Abingdon and
Witney College
14
Voice VLAN
 Use with IP phone.
 Phone acts as a switch too.
 Voice traffic is tagged, given priority.
 Data not tagged, no priority.
8 Aug 2014 S Ward Abingdon and
Witney College
15
Management VLAN
 Has the switch IP address.
 Used for telnet/SSH or web access for
management purposes.
 Better not to use VLAN 1 for security
reasons.
8 Aug 2014 S Ward Abingdon and
Witney College
16
Native VLAN
 For backward compatibility with older
systems.
 Relevant to trunk ports.
 Trunk ports carry traffic from multiple VLANs.
 VLAN is identified by a “tag” in the frame.
 Native VLAN does not have a tag.
8 Aug 2014 S Ward Abingdon and
Witney College
17
Default VLAN
 VLAN 1 on Cisco switches.
 Carries CDP and STP (spanning tree
protocol) traffic.
 Initially all ports are in this VLAN.
 Do not use it for data, voice or management
traffic for security reasons.
8 Aug 2014 S Ward Abingdon and
Witney College
18
Static VLAN
 The normal type. Port configured to be on a
VLAN. Connected device is on this VLAN.
 VLAN can be created using CLI command,
given number and name.
 VLAN can be learned from another switch.
 If a port is put on a VLAN and the VLAN does
not exist, then the VLAN is created.
8 Aug 2014 S Ward Abingdon and
Witney College
19
Static VLAN (Port-centric)
 If VLAN 20 did not exist before – then it does
now.
8 Aug 2014 S Ward Abingdon and
Witney College
20
Voice VLAN
 Configured for voice VLAN and data VLAN.
8 Aug 2014 S Ward Abingdon and
Witney College
21
Dynamic VLAN
 Not widely used.
 Use a VLAN Membership Policy Server
(VMPS).
 Assign a device to a VLAN based on its MAC
address.
 Connect device, server assigns VLAN.
 Useful if you want to move devices around.
8 Aug 2014 S Ward Abingdon and
Witney College
22
Traffic between VLANs
 Layer 2 switch keeps VLANs separate.
 Router can route between VLANs. It needs to
provide a default gateway for each VLAN as
VLANs are separate subnets.
 Layer 3 switch has a switch virtual interface
(SVI) configured for each VLAN. These act
like router interfaces to route between
VLANs.
8 Aug 2014 S Ward Abingdon and
Witney College
23
Trunking
 Both switches have the same 5 VLANs.
 Do you have a link for each VLAN?
 More efficient for them to share a link.
8 Aug 2014 S Ward Abingdon and
Witney College
24
Trunking
 Traffic for all the VLANs travels between the
switches on a shared trunk or backbone
8 Aug 2014 S Ward Abingdon and
Witney College
25
Tag to identify VLAN
 Tag is added to the frame when it goes on to the
trunk
 Tag is removed when it leaves the trunk
8 Aug 2014 S Ward Abingdon and
Witney College
26
Frame tagging IEEE 802.1Q
Dest Add Source Add Type/Len Data FCS
Dest Add Source Add Type/Len Data FCSTag
Normal
frame
Add 4-byte tag,
recalculate FCS
Tag protocol
ID 0x8100
Priority CFI for token
ring
VLAN ID
1 - 4096
8 Aug 2014 S Ward Abingdon and
Witney College
27
Native VLAN
 Untagged frames received on a trunk port are
forwarded on to the native VLAN.
 Frame received from the native VLAN should
be untagged.
 Switch will drop tagged frames received from
the native VLAN. This can happen if non-
Cisco devices are connected.
8 Aug 2014 S Ward Abingdon and
Witney College
28
Configure trunk port
 Make a port into a trunk port and tell it which
VLAN is native.
 SW1(config)#int fa0/1
 SW1(config-if)switchport mode trunk
 SW1(config-if)switchport trunk native vlan
99
 By default native VLAN is 1.
8 Aug 2014 S Ward Abingdon and
Witney College
29
Dynamic trunking protocol
Mode
trunk
Dynamic
auto/des
Mode
access
access
trunk
accessDynamic
auto
Dynamic
auto
trunk Dynamic
desirable
Dynamic
desirable
Dynamic
auto/des
Dynamic
desirable
Dynamic
auto
trunk
8 Aug 2014 S Ward Abingdon and
Witney College
30
Create a VLAN
 SW1(config)#vlan 20
 SW1(config-vlan)#name Finance
 SW1(config-vlan)#end
 VLAN will be saved in VLAN database rather
than running config.
 If you do not give it a name then it will be
called vlan0020.
8 Aug 2014 S Ward Abingdon and
Witney College
31
Assign port to VLAN
 SW1(config)#int fa 0/14
 SW1(config-if)#switchport mode access
 SW1(config-if)#switchport access vlan 20
 SW1(config-if)#end
8 Aug 2014 S Ward Abingdon and
Witney College
32
show vlan brief
 List of VLANs with ports
8 Aug 2014 S Ward Abingdon and
Witney College
33
Show commands
 show vlan brief (list of VLANs and ports)
 show vlan summary
 show interfaces vlan (up/down, traffic etc)
 Show interfaces fa0/14 switchport (access
mode, trunking)
8 Aug 2014 S Ward Abingdon and
Witney College
34
Remove port from VLAN
 SW1(config)#int fa 0/14
 SW1(config-if)#no switchport access vlan
 SW1(config-if)#end
 The port goes back to VLAN 1.
 If you assign a port to a new VLAN, it is
automatically removed from its existing
VLAN.
8 Aug 2014 S Ward Abingdon and
Witney College
35
Delete a VLAN
 SW1(config)#no vlan 20
 SW1(config)#end
 VLAN 20 is deleted.
 Any ports still on VLAN 20 will be inactive –
not on any VLAN. They need to be
reassigned.
8 Aug 2014 S Ward Abingdon and
Witney College
36
Delete VLAN database
 Erasing the startup configuration does not get
rid of VLANs because they are saved in a
separate file.
 SW1#delete flash:vlan.dat
 Switch goes back to the default with all ports
in VLAN 1.
 You cannot delete VLAN 1.
8 Aug 2014 S Ward Abingdon and
Witney College
37
Configure trunk
 SW1(config)#int fa0/1
 SW1(config-if)#switchport mode trunk
 SW1(config-if)#switchport trunk native vlan
99
 SW1(config-if)#switchport trunk allowed
vlan add 10, 20, 30
 SW1(config-if)#end
8 Aug 2014 S Ward Abingdon and
Witney College
38
Trunk problems
 Both ends must have the same native VLAN.
 Both ends must be configured with trunking
on or so that trunking is negotiated with the
other end and comes on.
 Subnetting and addressing must be right.
 The right VLANs must be allowed on the
trunk.
8 Aug 2014 S Ward Abingdon and Witney College 39
The End

Contenu connexe

Tendances

Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)Kanishk Raj
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLANIndonesia Network Operators Group
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routingWilfredzeng
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicEricsson
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking ProtocolNetwax Lab
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONAswini Badatya
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)KHNOG
 
VIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptxVIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptxKISHOYIANKISH
 

Tendances (20)

VTP
VTPVTP
VTP
 
Vpc notes
Vpc notesVpc notes
Vpc notes
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
vlan
vlanvlan
vlan
 
CCNA
CCNACCNA
CCNA
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
 
VXLAN
VXLANVXLAN
VXLAN
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
Vlan final
Vlan finalVlan final
Vlan final
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
 
VIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptxVIRTUAL LANS (VLANS).pptx
VIRTUAL LANS (VLANS).pptx
 
VLAN Network for Extreme Networks
VLAN Network for Extreme NetworksVLAN Network for Extreme Networks
VLAN Network for Extreme Networks
 

Similaire à Vlans

Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlanskratos2424
 
VLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxVLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxmuhammadFaheem656405
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptxBOURY1
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsAmir Jafari
 
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
Week 9   VLAN, SISTIM INFORMASI MANAGEMENWeek 9   VLAN, SISTIM INFORMASI MANAGEMEN
Week 9 VLAN, SISTIM INFORMASI MANAGEMENSetyady Peace
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area NetworkAtakan ATAK
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized networkArnold Derrick Kinney
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3Chaing Ravuth
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLANnewbie2019
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaRahul Kumar
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccnaRahul Kumar
 
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxSaqibAhmedKhan4
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccnarobertoxe
 
Config vlans
Config vlansConfig vlans
Config vlansamri am
 
Vlan Types
Vlan TypesVlan Types
Vlan TypesIT Tech
 

Similaire à Vlans (20)

CCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptxCCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptx
 
Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlans
 
VLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxVLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptx
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
 
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
Week 9   VLAN, SISTIM INFORMASI MANAGEMENWeek 9   VLAN, SISTIM INFORMASI MANAGEMEN
Week 9 VLAN, SISTIM INFORMASI MANAGEMEN
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
Chapter 8 .vlan.pdf
Chapter 8 .vlan.pdfChapter 8 .vlan.pdf
Chapter 8 .vlan.pdf
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Config vlans
Config vlansConfig vlans
Config vlans
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
 

Dernier

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 

Dernier (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 

Vlans

  • 1. 8 Aug 2014 S Ward Abingdon and Witney College 1 VLANs CCNA Exploration Semester 3 Chapter 3
  • 2. 8 Aug 2014 S Ward Abingdon and Witney College 2 Topics  The role of VLANs in a network  Trunking VLANs  Configure VLANs on switches  Troubleshoot common VLAN problems
  • 3. 8 Aug 2014 S Ward Abingdon and Witney College 3 Semester 3 LAN Design Basic Switch Concepts VLANs VTP STP Inter-VLAN routing Wireless
  • 4. 8 Aug 2014 S Ward Abingdon and Witney College 4 Some requirements of LANs  Need to split up broadcast domains to make good use of bandwidth  People in the same department may need to be grouped together for access to servers  Security: restrict access by certain users to some areas of the LAN  Provide a way for different areas of the LAN to communicate with each other
  • 5. 8 Aug 2014 S Ward Abingdon and Witney College 5 Solution using routers  Divide the LAN into subnets  Use routers to link the subnets
  • 6. 8 Aug 2014 S Ward Abingdon and Witney College 6 Solution using routers BUT  Routers are expensive  Routers are slower than switches  Subnets are restricted to limited physical areas  Subnets are inflexible
  • 7. 8 Aug 2014 S Ward Abingdon and Witney College 7 Solution using VLANs  VLAN membership can be by function and not by location  VLANs managed by switches  Router needed for communication between VLANs
  • 8. 8 Aug 2014 S Ward Abingdon and Witney College 8 VLANs  All hosts in a VLAN have addresses in the same subnet. A VLAN is a subnet.  Broadcasts are kept within the VLAN. A VLAN is a broadcast domain.  The switch has a separate MAC address table for each VLAN. Traffic for each VLAN is kept separate from other VLANs.  Layer 2 switches cannot route between VLANs.
  • 9. 8 Aug 2014 S Ward Abingdon and Witney College 9 VLAN numbers  VLAN 1: default Ethernet LAN, all ports start in this VLAN.  VLANs 1002 – 1005 automatically created for Token Ring and FDDI  Numbers 2 to 1001 can be used for new VLANs  Up to 255 VLANs on Catalyst 2960 switch  Extended range 1006 – 4094 possible but fewer features
  • 10. 8 Aug 2014 S Ward Abingdon and Witney College 10 VLAN information  VLAN information is stored in the VLAN database.  vlan.dat in the flash memory of the switch.
  • 11. 8 Aug 2014 S Ward Abingdon and Witney College 11 Port based  Each switch port intended for an end device is configured to belong to a VLAN.  Any device connecting to that port belongs to the port’s VLAN.  There are other ways of assigning VLANs but this is now the normal way.  Ports that link switches can be configured to carry traffic for all VLANs (trunking)
  • 12. 8 Aug 2014 S Ward Abingdon and Witney College 12 Types of VLAN  Data or user VLAN  Voice VLAN  Management VLAN  Native VLAN  Default VLAN
  • 13. 8 Aug 2014 S Ward Abingdon and Witney College 13 Data VLAN  Carry files, e-mails, shared application traffic, most user traffic.  Separate VLAN for each group of users.
  • 14. 8 Aug 2014 S Ward Abingdon and Witney College 14 Voice VLAN  Use with IP phone.  Phone acts as a switch too.  Voice traffic is tagged, given priority.  Data not tagged, no priority.
  • 15. 8 Aug 2014 S Ward Abingdon and Witney College 15 Management VLAN  Has the switch IP address.  Used for telnet/SSH or web access for management purposes.  Better not to use VLAN 1 for security reasons.
  • 16. 8 Aug 2014 S Ward Abingdon and Witney College 16 Native VLAN  For backward compatibility with older systems.  Relevant to trunk ports.  Trunk ports carry traffic from multiple VLANs.  VLAN is identified by a “tag” in the frame.  Native VLAN does not have a tag.
  • 17. 8 Aug 2014 S Ward Abingdon and Witney College 17 Default VLAN  VLAN 1 on Cisco switches.  Carries CDP and STP (spanning tree protocol) traffic.  Initially all ports are in this VLAN.  Do not use it for data, voice or management traffic for security reasons.
  • 18. 8 Aug 2014 S Ward Abingdon and Witney College 18 Static VLAN  The normal type. Port configured to be on a VLAN. Connected device is on this VLAN.  VLAN can be created using CLI command, given number and name.  VLAN can be learned from another switch.  If a port is put on a VLAN and the VLAN does not exist, then the VLAN is created.
  • 19. 8 Aug 2014 S Ward Abingdon and Witney College 19 Static VLAN (Port-centric)  If VLAN 20 did not exist before – then it does now.
  • 20. 8 Aug 2014 S Ward Abingdon and Witney College 20 Voice VLAN  Configured for voice VLAN and data VLAN.
  • 21. 8 Aug 2014 S Ward Abingdon and Witney College 21 Dynamic VLAN  Not widely used.  Use a VLAN Membership Policy Server (VMPS).  Assign a device to a VLAN based on its MAC address.  Connect device, server assigns VLAN.  Useful if you want to move devices around.
  • 22. 8 Aug 2014 S Ward Abingdon and Witney College 22 Traffic between VLANs  Layer 2 switch keeps VLANs separate.  Router can route between VLANs. It needs to provide a default gateway for each VLAN as VLANs are separate subnets.  Layer 3 switch has a switch virtual interface (SVI) configured for each VLAN. These act like router interfaces to route between VLANs.
  • 23. 8 Aug 2014 S Ward Abingdon and Witney College 23 Trunking  Both switches have the same 5 VLANs.  Do you have a link for each VLAN?  More efficient for them to share a link.
  • 24. 8 Aug 2014 S Ward Abingdon and Witney College 24 Trunking  Traffic for all the VLANs travels between the switches on a shared trunk or backbone
  • 25. 8 Aug 2014 S Ward Abingdon and Witney College 25 Tag to identify VLAN  Tag is added to the frame when it goes on to the trunk  Tag is removed when it leaves the trunk
  • 26. 8 Aug 2014 S Ward Abingdon and Witney College 26 Frame tagging IEEE 802.1Q Dest Add Source Add Type/Len Data FCS Dest Add Source Add Type/Len Data FCSTag Normal frame Add 4-byte tag, recalculate FCS Tag protocol ID 0x8100 Priority CFI for token ring VLAN ID 1 - 4096
  • 27. 8 Aug 2014 S Ward Abingdon and Witney College 27 Native VLAN  Untagged frames received on a trunk port are forwarded on to the native VLAN.  Frame received from the native VLAN should be untagged.  Switch will drop tagged frames received from the native VLAN. This can happen if non- Cisco devices are connected.
  • 28. 8 Aug 2014 S Ward Abingdon and Witney College 28 Configure trunk port  Make a port into a trunk port and tell it which VLAN is native.  SW1(config)#int fa0/1  SW1(config-if)switchport mode trunk  SW1(config-if)switchport trunk native vlan 99  By default native VLAN is 1.
  • 29. 8 Aug 2014 S Ward Abingdon and Witney College 29 Dynamic trunking protocol Mode trunk Dynamic auto/des Mode access access trunk accessDynamic auto Dynamic auto trunk Dynamic desirable Dynamic desirable Dynamic auto/des Dynamic desirable Dynamic auto trunk
  • 30. 8 Aug 2014 S Ward Abingdon and Witney College 30 Create a VLAN  SW1(config)#vlan 20  SW1(config-vlan)#name Finance  SW1(config-vlan)#end  VLAN will be saved in VLAN database rather than running config.  If you do not give it a name then it will be called vlan0020.
  • 31. 8 Aug 2014 S Ward Abingdon and Witney College 31 Assign port to VLAN  SW1(config)#int fa 0/14  SW1(config-if)#switchport mode access  SW1(config-if)#switchport access vlan 20  SW1(config-if)#end
  • 32. 8 Aug 2014 S Ward Abingdon and Witney College 32 show vlan brief  List of VLANs with ports
  • 33. 8 Aug 2014 S Ward Abingdon and Witney College 33 Show commands  show vlan brief (list of VLANs and ports)  show vlan summary  show interfaces vlan (up/down, traffic etc)  Show interfaces fa0/14 switchport (access mode, trunking)
  • 34. 8 Aug 2014 S Ward Abingdon and Witney College 34 Remove port from VLAN  SW1(config)#int fa 0/14  SW1(config-if)#no switchport access vlan  SW1(config-if)#end  The port goes back to VLAN 1.  If you assign a port to a new VLAN, it is automatically removed from its existing VLAN.
  • 35. 8 Aug 2014 S Ward Abingdon and Witney College 35 Delete a VLAN  SW1(config)#no vlan 20  SW1(config)#end  VLAN 20 is deleted.  Any ports still on VLAN 20 will be inactive – not on any VLAN. They need to be reassigned.
  • 36. 8 Aug 2014 S Ward Abingdon and Witney College 36 Delete VLAN database  Erasing the startup configuration does not get rid of VLANs because they are saved in a separate file.  SW1#delete flash:vlan.dat  Switch goes back to the default with all ports in VLAN 1.  You cannot delete VLAN 1.
  • 37. 8 Aug 2014 S Ward Abingdon and Witney College 37 Configure trunk  SW1(config)#int fa0/1  SW1(config-if)#switchport mode trunk  SW1(config-if)#switchport trunk native vlan 99  SW1(config-if)#switchport trunk allowed vlan add 10, 20, 30  SW1(config-if)#end
  • 38. 8 Aug 2014 S Ward Abingdon and Witney College 38 Trunk problems  Both ends must have the same native VLAN.  Both ends must be configured with trunking on or so that trunking is negotiated with the other end and comes on.  Subnetting and addressing must be right.  The right VLANs must be allowed on the trunk.
  • 39. 8 Aug 2014 S Ward Abingdon and Witney College 39 The End