Chapter 4. Implementing and Configuring VLANs

<feature><title></title>

This chapter covers the following topics:

  • Implementing, Configuring, Verifying, and Troubleshooting VLANs, and the Benefits of VLANs in a Multilayer Switched Network

  • Understanding and Configuring Private VLANs

  • Implementing, Configuring, Verifying, and Troubleshooting VLAN Trunks in a Multilayer Switched Network

  • Configuring, Verifying, and Troubleshooting the VLAN Trunking Protocol

</feature>

Previous chapters have discussed the network architectures that are associated with Cisco multilayer switched networks and the basic configuration of multilayer switches. This and subsequent chapters discuss the features of multilayer switches in detail, along with each feature’s implementation and benefits to the multilayer switched network.

VLANs, trunking, and the VLAN Trunking Protocol (VTP) are significant features of multilayer switched networks, and implementation of these features in multilayer switched networks improves overall network performance, scalability, security, and availability. Cisco Systems, Inc. provides VLAN-capable solutions across its entire suite of internetworking switches and mid-range to high-end routers. VLANs not only solve many of the immediate problems associated with administrative changes, but they also provide for improved scalability, interoperability, and increased dedicated throughput.

A VLAN trunk is a physical point-to-point link that is primarily used to carry frames for multiple VLANs. VLAN trunks are common in any multilayer switched network; therefore, network architects need to understand VLANs to be able to implement and troubleshoot them appropriately.

Furthermore, Cisco switches use VTP to distribute and synchronize information about VLANs that are configured throughout a switched network. VTP reduces the manual configuration that is needed on each switch in the network. In a large switched network, VTP allows enterprises to manage the VLAN implementation consistently.

This chapter discusses VLANs, trunking, VTP, and their inherent advantages within a Cisco multilayer switched network. In brief, this chapter covers the following topics:

In terms of preparing for the CCNP BCMSN switching exam, focus on all the sections in this chapter except the section on VTP version 3. VTP version 3 is a new feature that is not widely deployed or covered on the CCNP BCMSN switching exam.

VLANs

A VLAN is a logical group of end devices with a common set of requirements independent of their physical location, as shown in Figure 4-1, where Sales, HR, and Engineering are three different VLANs spread on all three floors. End devices include end-user workstations, servers, routers, and the like.

VLAN Overview

Figure 4-1. VLAN Overview

Larger, flat networks generally consist of many end devices where broadcasts and unknown unicast packets are flooded on all ports in the network, as shown in the top portion of Figure 4-2. One advantage of using VLANs is the ability to segment the Layer 2 broadcast domain. All devices in a VLAN are members of the same broadcast domain. If an end device transmits a Layer 2 broadcast, all other members of the VLAN receive the broadcast. Switches filter the broadcast from all the ports or devices that are not part of the same VLAN, as shown in the bottom portion of Figure 4-2.

Layer 2 New Broadcast Domain Boundary with VLANs

Figure 4-2. Layer 2 New Broadcast Domain Boundary with VLANs

Although switches do not propagate Layer 2 broadcasts between VLANs, VLANs are slightly different from a physical subnet. A physical subnet consists of devices on a physical cable segment. A logical subnet consists of devices that communicate with each other regardless of their physical location. As a result, VLANs are a type of logical subnet where interconnectivity of end devices is not directly limited by physical location. Instead, switch configurations limit interconnectivity of VLANs. Furthermore, VLANs may exist anywhere in the switch network. Because a VLAN is a single broadcast domain, a VLAN generally belongs to one IP subnet. To communicate between VLANs, packets need to pass through a router or Layer 3 device.

End-to-end VLANs are VLANs that span throughout the entire network. Local VLANs are VLANs that are local to a specific domain, such as Building Access submodule switches and their respective Building Distribution submodule. An end-to-end VLAN may span several wiring closets or even several buildings. End-to-end VLANs are usually associated with a workgroup, such as a department or project team. For redundancy, end-to-end VLANs need the Spanning Tree Protocol (STP), which is discussed in subsequent chapters. As a result of large spanning-tree topologies and simplified network management and troubleshooting with the use of local VLANs compared to end-to-end VLANs, designs using local VLANS, illustrated in Chapters 1 and 2, are becoming more popular.

Because VLANs are an important aspect of any multilayer switched network, all Cisco Catalyst switches support VLANs. A Catalyst switch implements VLANs by virtually limiting data forwarding to ports within the same VLAN. For example, when a broadcast frame arrives on a switch port, the switch retransmits the frame only to ports that belong to the same VLAN. The implication is that using VLANs on Catalyst switches improves scalability by limiting the transmission of unicast, multicast, and broadcast traffic.

Generally, a port carries traffic only for the single VLAN. For a VLAN to span across multiple switches, Catalyst switches use trunks. A trunk carries traffic for multiple VLANs by using Inter-Switch Link (ISL) encapsulation or IEEE 802.1Q. This chapter discusses trunking in more detail in the “VLAN Trunking” section.

This section continues the discussion of VLAN by explaining the following topics related to the implementation and configuration of VLANs:

  • Implementing VLANs in multilayer switched networks

  • Mapping VLANS to a hierarchical network

  • Static and dynamic VLANs

  • VLAN ranges

  • Configuring VLANs

  • Verifying the VLAN configurations

  • Troubleshooting VLANs

Implementing VLANs in Multilayer Switched Networks

VLANs are helpful in improving the scalability of multilayer switched networks. The following subsections discuss the benefits and implementation of VLANs in multilayer switched networks.

Understanding the Role and Benefits of VLANs in the Multilayer Switched Network Design

Implementation of VLANs in multilayer switched networks provides scalability, improved performance, and higher availability. The following list details several benefits inherent to VLANs in multilayer switched networks:

  • Efficient bandwidth utilization—VLANs solve the scalability problems found in large, flat networks by dividing the network into smaller broadcast domains or subnets. Furthermore, end devices require the use of routers to route packets across VLANs.

  • Security—VLANs provide a basic level of security by allowing segregation of frames that contain sensitive or critical information from unauthorized users on separate VLANs. In addition, VLAN boundaries are marked by a Layer 3 interface where additional security measures, such as access lists, are applicable. In addition, several Catalyst switches support VLAN access lists for Layer 2 application.

  • Load balancing multiple paths—Combined with routing, VLANs intelligently determine the best path to a destination and offer the ability to load-balance when multiple paths to a destination exist.

  • Isolation of failure domains—One of the most important reasons to implement VLANs is to reduce the impact of network problems. In a flat network, a faulty device, a Layer 2 loop, or a broadcast-intensive application may potentially affect the entire network to the point of a total failure. One of the most effective measures against such network failures is to properly segment the network into VLANs with the use of a router. Using a router with VLANs effectively prevents these types of issues from being propagated from a VLAN to other segments or VLANs while maintaining the ability to route traffic between VLANs.

Benefits of End-to-End and Local VLANs in Campus Networks

An end-to-end VLAN spans the entire switched network, while a local VLAN is limited to a single switch or group of Building Access submodule and Building Distribution submodule switches.

A network that is deploying end-to-end VLANs has the following characteristics:

  • End devices such as workstations are grouped into VLANs regardless of physical location.

  • When the users and their workstations move around the campus, their VLAN membership typically remains the same.

  • Each VLAN has a common set of security and resource requirements for all members across the campus.

Mapping VLANs to a Hierarchical Network

As enterprises move to centralize their network resources, end-to-end VLANs are becoming more difficult to maintain. As a result, enterprise networks are now creating “local” VLAN boundaries around physical boundaries, such as Building Access submodules, rather than around commonality boundaries, such as organizations or departments. In addition, enterprise networks deploy applications that access many resources outside the local VLAN. These types of applications include storage applications, stock tickers, databases, and intranet web services. Although this design of creating local VLANs results in user traffic crossing a Layer 3 router or multilayer switch to reach network resources, this design still allows the network to provide for a deterministic, secure, and consistent method of transporting data, voice, and video. Nevertheless, the use of local VLANs for user end devices maintains the performance and efficiency advantages of VLANs, including collision and broadcast domain segmentation.

Local VLANs, typically used in the Building Access submodule, are also easier to manage and conceptualize than VLANs spanning different areas of the network. A typical VLAN organization configures the minimum number of VLANs on a single access switch within a wiring closet, rather than having VLANs from multiple departments configured on the same switch. Figure 4-3 shows that every Building Access submodule switch belongs to two VLANs, one for voice and one for data, which terminate at the Building Distribution submodule switches.

Local VLANs

Figure 4-3. Local VLANs

The goal of local VLANs is not to extend the VLANs beyond the Building Distribution submodule, as shown in Figure 4-3. Using the local VLAN structure to provide access into the network and to provide Layer 3 connectivity allows users to move from one VLAN to another without involving network administrators when using features such as DHCP. In addition, local VLANs provide users with the same level of performance regardless of their location, because Layer 3 devices also switch and route at wire rate due to hardware-switching.

Troubleshooting local VLANs that are contained within a single area is much easier than troubleshooting a VLAN and modules that span an entire functional area in the end-to-end design. In addition, because STP is configured for redundancy, the switch limits the STP to only the Building Access and Building Distribution submodules.

Static and Dynamic VLANs

Static VLANs constitute switch ports that are manually assigned to a particular VLAN, as shown in Figure 4-4. Dynamic VLANs, on the other hand, are VLANs that are assigned based on a source Media Access Control (MAC) address that has been entered into a VLAN Management Policy Server (VMPS).

Static VLANs

Figure 4-4. Static VLANs

Static VLAN configurations on switches require a VLAN-management application or the use of the command line to assign a specific switch port to a particular VLAN. Although static VLANs require manual entry changes, they are secure, easy to configure, and straightforward to monitor. This type of VLAN assignment method works well in networks where adds, moves, and changes are rare. As shown in Figure 4-4, with the manual configuration of ports with the proper VLAN, if a person who belongs in the Engineering VLAN on Floor 2 tries to connect to the port configured for the Marketing VLAN, that person will not be able to communicate with the members of the Engineering VLAN (as indicated by the “X”) until the Engineering VLAN uses Layer 3 routing.

Dynamic VLAN configuration is accomplished by using the VMPS. With dynamic VLANs, the switch assigns a VLAN to a host based on information in the MAC address-to-VLAN mapping on the VMPS. When a host moves from a port on one switch in the network to a port on another switch in the network, the switch assigns the new port to the proper VLAN for that host dynamically. The VMPS contains a database that maps the MAC addresses to VLAN assignments. When VMPS is enabled, the switch downloads a MAC address-to-VLAN mapping database from a Trivial File Transfer Protocol (TFTP) server and begins to service client requests. When a frame arrives on a dynamic port at the Catalyst access switch, the Catalyst switch queries the VMPS for the VLAN assignment based on the MAC address of the arriving frame. A dynamic port belongs to only one VLAN at a time. Multiple hosts may be active on a dynamic port only if they all belong to the same VLAN.

However, VMPS requires its own management overhead. Unless adds, moves, and changes create a significant management overhead, do not use VMPS to maintain end-station MAC addresses and custom filtering tables. Nonetheless, enterprises rarely deploy VMPS and opt for IEEE 802.1X as a security access feature instead. Chapter 14, “Securing Your Multilayer Switched Network to Minimize Service Loss and Data Theft,” discusses 802.1X in more detail.

The Catalyst 4000, 5000, and 6500 families of switches running Cisco CatOS support VMPS functionality. In addition, an external server may act as a VMPS. Note, however, that several switches, such as the Cisco Catalyst 2900XL, Catalyst 2950/3550/3560, and Cisco Catalyst 4000 and 4500 families of switches running Cisco IOS, do not support the VMPS functionality, but they do support VMPS client functionality.

This chapter discusses static VLANs in more detail but does not discuss dynamic VLANs any further. To learn more about dynamic VLANs, consult the document “Configuring Dynamic Port VLAN Membership with VMPS” on Cisco.com:

VLAN Ranges

Cisco Catalyst switches support up to 4096 VLANs depending on platform and software version. Table 4-1 illustrates the VLAN division for Cisco Catalyst switches.

Table 4-1. VLAN Ranges

VLAN Ranges

Range

Usage

Propagated via VTP

0, 4095

Reserved

For system use only. You cannot see or use these VLANs.

 

1

Normal

Cisco default. You can use this VLAN, but you cannot delete it.

Yes

2–1001

Normal

For Ethernet VLANs. You can create, use, and delete these VLANs.

Yes

1002–1005

Normal

Cisco defaults for FDDI and Token Ring. You cannot delete VLANs 1002–1005.

Yes

1006–1024

Reserved

For system use only. You cannot see or use these VLANS.

 

1025–4094

Extended

For Ethernet VLANs only.

Not supported in VTP versions 1 and 2. The switch must be in VTP transparent mode to configure extended-range VLANS. Only supported in version 3.

Configuring VLANs

All Cisco Catalyst switches support VLANs. That said, each Cisco Catalyst switch supports a different number of VLANs, with high-end Cisco Catalyst switches supporting as many as 4096 VLANs. Table 4-2 notes the maximum number of VLANs supported by each model of Catalyst switch.

Table 4-2. VLAN Support Matrix for Catalyst Switches

Type of Switch

Maximum No. of VLANs

VLAN IDs Range

Catalyst 2940

4

1–1005

Catalyst 2950/2955

250

1–4094

Catalyst 2960

255

1–4094

Catalyst 2970/3550/3560/3750

1005

1–4094

Catalyst 2848G/2980G/4000/4500

4094

1–4094

Catalyst 6500

4094

1–4094

Note

The Catalyst 2950 and 2955 support as many as 64 VLANs with the Standard Software image, and up to 250 VLANs with the Enhanced Software image. Cisco Catalyst switches do not support VLANs 1002 through 1005; these are reserved for Token Ring and FDDI VLANs. Furthermore, the Catalyst 4500 and 6500 families of switches do not support VLANs 1006 through 1024. In addition, several families of switches support more VLANs than the number of Spanning Tree instances. For example, the Cisco Catalyst 2970 supports 1005 VLANs but only 128 Spanning Tree instances. For information on the number of supported Spanning Tree instances, refer to Cisco Product Technical Documentation.

As mentioned in previous chapters, Catalyst switches use either Cisco CatOS or Cisco IOS. This section covers the configuration of VLANs with respect to both Cisco CatOS and Cisco IOS, with emphasis on Cisco IOS.

Understanding the VLAN Configuration Modes in Cisco IOS

In Cisco IOS, two methods exist to create VLANs:

  • Global configuration mode—A relatively new method to configure VLANs, this mode adds support for configuring extended VLANs not configurable by the VLAN database configuration mode.

  • VLAN database configuration mode—Another method to configure VLANs, this mode supports only the configuration of VLANs in normal VLAN range (from 1 to 1005).

To create a new VLAN in global configuration mode, follow these steps:

  1. Enter global configuration mode.

    Switch#configure terminal
  2. Create a new VLAN with a particular ID number.

    Switch(config)#vlan vlan-id
  3. (Optional.) Name the VLAN.

    Switch(config-vlan)#name vlan-name
  4. Exit global configuration mode.

    Switch(config-vlan)#exit

Example 4-1 shows how to configure a VLAN in global configuration mode.

Example 4-1. Creating a VLAN in Global Configuration Mode in Cisco IOS

Switch#configure terminal
Switch(config)#vlan 5
Switch(config-vlan)#name Engineering
Switch(config-vlan)#exit

To configure VLANs in the VLAN database configuration mode, you use the vlan database privileged EXEC command.

Note

The VLAN database command mode is different from other modes because it is session oriented. When you add, delete, or modify VLAN parameters, the switch does not apply the changes until you exit the session by entering the apply or exit command. Use the abort command to not apply the changes made to the VTP database.

To create a new VLAN in VLAN database configuration mode, follow these steps:

  1. Enter VLAN database configuration mode.

    Switch#vlan database
  2. Create a new VLAN with a particular ID number.

    Switch(vlan)#vlan vlan-id
  3. Name the VLAN.

    Switch(vlan)#vlan vlan-id name vlan-name
  4. Exit VLAN database configuration mode.

    Switch(vlan)#exit

Example 4-2 shows an example of creating a VLAN via the VLAN database configuration mode.

Example 4-2. Creating a VLAN in VLAN Database Configuration Mode

Switch#vlan database
Switch(vlan)#vlan 3
VLAN 3 added:
    Name: VLAN0003
Switch(vlan)#vlan 3 name Engineering
Switch(vlan)#exit
APPLY completed.
Exiting....

Note

Cisco recommends using global configuration mode to define VLANs. Future Cisco IOS releases for Catalyst switches may not support VLAN database configuration mode because it has been deemed an obsolete method of configuring VLANs.

To delete a VLAN in global configuration mode, follow these steps:

  1. Enter global configuration mode.

    Switch#configure terminal
  2. Delete the VLAN by referencing its ID number.

    Switch(config)#no vlan vlan-id
  3. Exit global configuration mode.

    Switch(config)#end

Note

After a VLAN is deleted, the access ports that belong to that VLAN move into the inactive state until the ports are moved to another VLAN. As a security measure, ports in the inactive state do not forward traffic.

Example 4-3 shows deletion of a VLAN in global configuration mode.

Example 4-3. Deleting a VLAN in Global Configuration Mode

Switch#configure terminal
Switch(config)#no vlan 3
Switch(config)#end

To delete an existing VLAN in VLAN database configuration mode, follow these steps:

  1. Enter VLAN database configuration mode.

    Switch#vlan database
  2. Delete the VLAN by referencing its ID number.

    Switch(vlan)#no vlan vlan-id
  3. Exit VLAN database configuration mode.

    Switch(vlan)#exit

To assign a switch port to a previously created VLAN, follow these steps:

  1. From global configuration mode, enter the configuration mode for the particular port you want to add to the VLAN.

    Switch(config)#interface {FastEthernet | GigabitEthernet} slot/port
  2. Specify the port as an access port.

    Switch(config-if)#switchport mode access
    
    Switch(config-if)#switchport host

    Note

    The switchport host command effectively configures a port for a host device such as a workstation or server. This feature is a macro for enabling Spanning Tree PortFast and disabling EtherChanneling on a per-port basis. These features are discussed in Chapters 57.

  3. Remove or place the port in a particular VLAN.

    Switch(config-if)#[no] switchport access vlan vlan-id

Example 4-4 illustrates configuration of an interface as an access port in VLAN 200.

Example 4-4. Assigning an Access Port to a VLAN

Switch#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Switch(config)#interface FastEthernet 5/6
Switch(config-if)#description PC A
Switch(config-if)#switchport
Switch(config-if)#switchport host
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 200
Switch(configif)#no shutdown
Switch(config-if)#end

Note

Use the switchport command with no keywords to configure interfaces as Layer 2 interfaces on Layer 3 switches. After configuring the interface as a Layer 2 interface, use additional switchport commands with keywords to configure Layer 2 properties such as access VLANs or trunking.

Configuring VLANs in Cisco CatOS

To configure a VLAN in Cisco CatOS, use the following command:

set vlan vlan-id [vlan-name]

vlan-id represents the VLAN number. The vlan-name is an optional description for the VLAN.

Note

In Cisco CatOS, Cisco Catalyst switches require the configuration of a VTP name or a change of the VTP mode to transparent before new VLANs can be created. This chapter discusses VTP in the “VLAN Trunking Protocol” section.

Example 4-5 shows creation of a VLAN in Cisco CatOS.

Example 4-5. Creating a VLAN in Cisco CatOS

Console> (enable) set vtp domain cisco
VTP domain cisco modified
Console> (enable) set vlan 3
VTP advertisements transmitting temporarily stopped,
and will resume after the command finishes.
Vlan 3 configuration successful

To assign ports to a VLAN in Cisco CatOS, use the following command:

set vlan vlan-id [mod/port]

Example 4-6 shows assigning of ports to a VLAN in Cisco CatOS.

Example 4-6. Assigning Ports to a VLAN in Cisco CatOS

Console> (enable) set vlan 3 2/1-4
VLAN 3 modified.
VLAN 1 modified.
VLAN  Mod/Ports
---- -----------------------
3     2/1-4

To delete VLANs in Cisco CatOS, use the clear vlan command, as shown in Example 4-7.

Example 4-7. Deleting VLANs in Cisco CatOS

Console> (enable) clear vlan 3
This command will deactivate all ports on vlan(s) 3
All ports on normal range vlan(s) 3
will be deactivated in the entire management domain.
Do you want to continue(y/n) [n]?y
VTP advertisements transmitting temporarily stopped,
and will resume after the command finishes.
Vlan 3 deleted

Verifying the VLAN Configuration

To verify the VLAN configuration of a Catalyst switch, use show commands. The show vlan command from privileged EXEC mode displays information about a particular VLAN. Table 4-3 documents the fields that are displayed by the show vlan command.

Table 4-3. show vlan Field Descriptions

Field

Description

VLAN

VLAN number

Name

Name, if configured, of the VLAN

Status

Status of the VLAN (active or suspended)

Ports

Ports that belong to the VLAN

Type

Media type of the VLAN

SAID

Security association ID value for the VLAN

MTU

Maximum transmission unit size for the VLAN

Parent

Parent VLAN, if one exists

RingNo

Ring number for the VLAN, if applicable

BrdgNo

Bridge number for the VLAN, if applicable

Stp

Spanning Tree Protocol type used on the VLAN

BrdgMode

Bridging mode for this VLAN

Trans1

Translation bridge 1

Trans2

Translation bridge 2

AREHops

Maximum number of hops for All-Routes Explorer frames

STEHops

Maximum number of hops for Spanning Tree Explorer frames

Example 4-8 displays information about a VLAN identified by number in Cisco IOS.

Example 4-8. Displaying Information About a VLAN by Number in Cisco IOS

Switch#show id vlan 3
VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
3    VLAN0003                         active
VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp BrdgMode  Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
3    enet  100003     1500  -      -      -        -    -        0      0
------- --------- ----------------- -------------------------------------------

Example 4-9 displays information about a VLAN identified by name in Cisco IOS.

Example 4-9. Displaying Information About a VLAN by Name in Cisco IOS

Switch#show vlan name VLAN0003
VLAN Name                             Status    Ports
---- -------------------------------- --------- ---------------------
3    VLAN0003                         active

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- ------ ------
3    enet  100003     1500  -      -      -        -    0      0

To display the current configuration of a particular interface, use the show running-config interface interface_type slot/port command. To display detailed information about a specific switch port, use the show interfaces command. The command show interface interface_type slot/port with the switchport keyword displays not only a switch port’s characteristics but also private VLAN and trunking information. The show-mac address-table interface interface_type slot/port command displays the MAC address table information for the specified interface in specific VLANs.

Example 4-10 displays the configuration of a particular interface.

Example 4-10. Displaying Information About an Interface

Switch#show running-config interface FastEthernet 5/6
Building configuration...
!
Current configuration :33 bytes
interface FastEthernet 5/6
 switchport access vlan 200
 switchport mode access
end

Example 4-11 displays detailed switch port information as the port VLAN and operation modes.

Example 4-11. Displaying Detailed Switch Port Information

BXB-6500-10:8A#show interfaces FastEthernet 4/1 switchport
Name: Fa4/1
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 2 (VLAN0002)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL

Voice VLAN: none (Inactive)
Appliance trust: none

Example 4-12 displays the MAC address table information for a specific interface in VLAN 1.

Example 4-12. Displaying MAC Address Table Information

Switch#show mac-address-table interface GigabitEthernet 0/1 vlan 1
          Mac Address Table
------------------------------------------

Vlan    Mac Address       Type       Ports
----    -----------       ----       -----
   1    0008.2199.2bc1    DYNAMIC    Gi0/1
Total Mac Addresses for this criterion: 1

Troubleshooting VLANs

When troubleshooting problems related to VLANs, always review the following items:

  • Physical connections

  • Switch configuration

  • VLAN configuration

Figure 4-5 shows, at a high level, VLAN problems that may occur on a switch.

Troubleshooting VLAN Problems

Figure 4-5. Troubleshooting VLAN Problems

The following sections cover several common VLAN issues and the action plan to troubleshoot these issues.

Troubleshooting Slow Throughput

To troubleshoot slow-throughput issues within the same VLAN, perform the following steps:

  1. A point-to-point switch link consists of two ports where the problem may exist on either side of a link. Make sure the speed and duplex settings are consistent on both link partners.

  2. Using show commands, check to see what types of errors exist on the suspected interfaces. Combinations of frame check sequence (FCS) errors, alignment errors, and runts generally point to a duplex mismatch; auto-negotiation is the usual culprit, but it could also be a mismatched manual setting.

  3. Determine which Layer 2 path the packet is taking if there are redundant paths using spanning tree. For additional information on troubleshooting Spanning Tree Protocol (STP), consult Chapter 5, “Understanding and Configuring the 802.1D, 802.1s, and 802.1w Spanning Tree Protocols,” and Chapter 6, “Adding Resiliency to Spanning Tree Using Advanced Features and Troubleshooting STP Issues.”

If you see from the output of the show interface command that the number of collisions is increasing rapidly, the problem may be an oversubscribed half-duplex link, faulty hardware, a bad cable, or a duplex mismatch.

Troubleshooting Communication Issues

When one device cannot communicate with another device within a VLAN, troubleshoot the problem by doing the following:

  1. Ensure that the VLAN membership of the switch ports is correct by using the show interface command.

  2. Make sure the switch ports are up and connected. Try to reset the port by doing shut and no shut under the switch interface.

Private VLANs

Private VLANs (pVLAN) are VLANs that provide isolation between ports within the same VLAN. Cisco introduced pVLANs to provide security, to reduce the number of IP subnets, and to reduce the VLANs’ utilization by isolating traffic between network devices residing in the same VLAN.

Service providers use pVLANs to deploy hosting services and network access where all devices reside in the same subnet but only communicate to a default gateway, backup servers, or another network. Service providers use pVLANs not only as a security feature but also as a method to minimize the use of IP address subnets.

In multilayer switching environments, enterprises generally use pVLANs to prevent network devices that are attached to interfaces or groups of interfaces from communicating between each other, but to allow communication to a default gateway such as a VLAN interface or router or to a particular group of devices. Although the network devices reside in different pVLANs, they use the same IP subnet. In this manner, network devices on the same VLAN can communicate only with the default gateway to reach networks beyond the default gateway or only to a particular group of devices if necessary.

Each pVLAN consists of two supporting VLANs:

  • A primary VLAN—The Primary pVLAN is the high-level VLAN of the pVLAN. A primary VLAN can be composed of many secondary VLANs with the secondary VLANs belonging to the same subnet of the primary VLAN.

  • A secondary VLAN—Every secondary VLAN is a child to a primary VLAN and is mapped to one primary VLAN. End devices are attached to secondary pVLANs. pVLANs define the use of promiscuous ports. All the devices in the pVLAN can communicate with the promiscuous ports. A promiscuous port is only part of one primary VLAN, but each promiscuous port can map to more than one secondary VLAN. Promiscuous ports are generally router ports, backup servers, or VLAN interfaces, as shown in Figure 4-6.

    pVLAN Port Structure

    Figure 4-6. pVLAN Port Structure

The following are the two types of secondary VLANs:

  • Community VLANs—Ports that belong to the community VLAN are able to communicate with the other ports in the same community and promiscuous ports of the pVLAN. In Figure 4-6, PC 1 and PC 2, which belong to community VLAN A, can communicate with each other but (as indicated by the “X”) not with PC 3 and PC 4, which belong to community VLAN B.

  • Isolated VLANs—Ports that belong to an isolated VLAN can only communicate with promiscuous ports. Isolated ports cannot communicate with other ports in the same isolated VLAN, as reflected in Figure 4-6, where PC 5 and PC 6, although in the same isolated VLAN, cannot communicate with each other but can communicate with the promiscuous ports. Each pVLAN has only one isolated VLAN.

Figure 4-7 illustrates an example of implementing pVLANs in a service-provider environment. Here, a service provider has three customers under one primary VLAN. Customer A belongs to community VLAN 100, Customer B belongs to community VLAN 200, and Customer C belongs to isolated VLAN 300. Despite belonging to the same subnet, Customer A’s, Customer B’s, and Customer C’s network devices cannot communicate with one another. All devices that reside in Customer A’s community VLANs can communicate with one another even though the devices are spread across multiple switches. In addition, all devices that reside in Customer B’s community VLANs can communicate with one another. However, devices in Customer C’s isolated VLAN cannot communicate with one another.

pVLAN Implementations

Figure 4-7. pVLAN Implementations

pVLANs can span multiple switches that support the pVLANs’ trunking feature.

The Cisco Catalyst 6500 and 4500 families of switches support all the features of the pVLANs mentioned earlier in this chapter, except that a Cisco 4500 running IOS does not support community VLANs at this time. The low-end Catalyst switches, such as the Catalyst 2950, and the Catalyst 3550/3560 family of switches support only the isolated port feature of pVLANs. These switches refer to isolated ports as pVLAN edge (protected ports). The protected port is a feature that has only local significance to the switch, and there is no isolation between two protected ports located on different switches. A protected port cannot forward traffic (unicast, multicast, or broadcast) to any other port that is also a protected port in the same switch, hence providing isolation.

Note

There are some restrictions and limitations with the configuration of pVLANs. A few limitations and restrictions are as follows:

  • pVLAN configuration requires VTP to be in transparent mode for VTP version 1 and 2.

  • You cannot configure Layer 3 VLAN interfaces for secondary VLANs.

  • Private VLANs are not supported on EtherChannels or span destination ports.

To view the complete list of restrictions and limitations, consult the following documents on the Cisco.com website.

For the Catalyst 4000 family of switches (Configuration Guide):

http://www.cisco.com/en/US/products/hw/switches/ps4324/products_configuration_guide_chapter09186a008062cf2f.html

For the Catalyst 6500 family of switches:

http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/swcg/pvlans.htm

Configuring PVLANs in Cisco IOS

To configure pVLANs in Cisco IOS, perform the following steps:

  1. Enter VLAN global configuration mode to configure the pVLANs.

    Switch(config)# vlan pVLAN-id
  2. Configure the VLANs as a type of pVLAN.

    Switch(config-vlan)# private-vlan {community | isolated | primary}
  3. Exit the configuration mode.

    Switch(config-vlan)# exit
  4. Enter the VLAN global configuration mode to configure primary VLAN.

    Switch(config)# vlan primary-vlan-id
  5. If it is a primary VLAN, make sure to associate the Layer 2 secondary VLAN to the primary VLAN.

    Switch(config-vlan)#private-vlan association {secondary-vlan-list | add
    secondary-vlan-list | remove secondary-vlan-list}
  6. Select the interface configuration mode for the primary VLAN.

    Switch(config)#interface vlan  primary-vlan-id
  7. Map secondary VLANs to the Layer 3 VLAN interface of a primary VLAN to allow Layer 3 switching of pVLAN ingress traffic.

    Switch(config-if)#private-vlan mapping {secondary-vlan-list | add
    secondary-vlan-list | remove secondary-vlan-list}
  8. Select the LAN port interface to configure as the pVLAN host or promiscuous port.

    Switch(config)#interface type slot/port
  9. Configure the LAN port for Layer 2 operation if the default behavior is Layer 3 operation.

    Switch(config-if)#switchport
  10. Configure the Layer 2 port as a pVLAN port either as host or promiscuous port.

    Switch(config-if)#switchport mode private-vlan {host | promiscuous}
  11. For access pVLAN ports, associate the community or isolated pVLAN to the pVLAN.

    Switch(config-if)#switchport private-vlan host-association primary-
    vlan-id secondary-vlan-id
  12. For promiscuous ports, configure the interface by mapping the port to the pVLAN.

    Switch(config-if)#switchport private-vlan mapping primary-vlan-id
    {secondary-vlan-list | add secondary-vlan-list | remove secondary-vlan-list}
  13. Exit the interface configuration mode.

    Switch(config)#end

Example 4-13 represents the configuration of one community VLAN 200 and one isolated VLAN 300 with a primary VLAN 100. Port 5/1 binds with community VLAN 200, and port 5/2 binds with isolated VLAN 300. The VLAN 100 interface permits routing of secondary VLAN ingress traffic from VLANs 200 and 300.

Example 4-13. Sample Configuration of pVLANs in Cisco IOS

Switch# configure terminal
Switch(config)# vlan 100
Switch(config-vlan)# private-vlan primary
Switch(config)# vlan 200
Switch(config-vlan)# private-vlan community
Switch(config)# vlan 300
Switch(config-vlan)# private-vlan isolated
Switch(config)# vlan 100
Switch(config-vlan)# private-vlan association 200,300
Switch(config-vlan)# exit
Switch(config)#interface vlan 100
Switch(config-if)#private-vlan mapping add 200,300
Switch(config-if)#exit
Switch(config)# interface FastEthernet 5/1
Switch(config-if)# switchport mode private-vlan host
Switch(config-if)# switchport private-vlan host-association 100 200
Switch(config)# interface FastEthernet 5/2
Switch(config-if)# switchport mode private-vlan host
Switch(config-if)# switchport private-vlan host-association 100 300
Switch(config-if)# end

Example 4-14 illustrates the commands used to verify the configuration of pVLANs in Cisco IOS.

Example 4-14. Verifying pVLAN Configuration in Cisco IOS

Switch# show vlan private-vlan
Primary Secondary Type Interfaces
------- --------- ----------------- ------------------------------------------
100 200 community
100 300 isolated

Switch# show interfaces FastEthernet 5/2 switchport
Name: Fa5/2
Switchport: Enabled
Administrative Mode: private-vlan host
Operational Mode: down
Administrative Trunking Encapsulation: negotiate
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Administrative private-vlan host-association: 100 (VLAN0200) 300 (VLAN0300)
Administrative private-vlan mapping: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled

Configuring pVLANs in Cisco/CatOS

To configure pVLANs on the Catalyst 6000 and 4000 families of switches that are running Cisco CatOS, perform the following steps:

  1. Create a primary VLAN.

    set vlan vlan-id pvlan-type primary
  2. Create secondary VLANs.

    set vlan vlan-id pvlan-type {isolated | community}
  3. Map the primary VLAN to the secondary VLANs.

    set pvlan primary-vlan-id {isolated-vlan-id | community-vlan-id}
  4. Bind ports to the primary and secondary pVLANs.

    set pvlan primary-vlan-id {isolated-vlan-id | community-vlan-id} mod/ports
  5. Specify which ports will act as promiscuous ports.

    set pvlan mapping primary-vlan-id {isolated-vlan-id | community-vlan-id}
    mod/ports
  6. Verify the pVLAN configuration.

    show pvlan [vlan-id]
    show pvlan mapping

Example 4-15 represents the configuration of one community VLAN 200 and an isolated VLAN 300 associated with the primary VLAN 100. Port 5/1 binds to the community VLAN, port 5/2 binds to the isolated VLAN 300, and port 15/1 is the promiscuous port, which is a Catalyst 6500 Multilayer Switch Feature Card (MSFC) acting as a default gateway. As a result, devices that are connected on ports 5/1 and 5/2 cannot communicate with one another, but they are able to communicate with the promiscuous port, which is the MSFC port. Using the VLAN 100 interface on the MSFC, these ports can communicate with the rest of the network.

Example 4-15. Sample Configuration of pVLANs

Console> (enable) set vlan 100 pvlan-type primary
Vlan 100 configuration successful
Console> (enable) set vlan 300 pvlan-type isolated
Vlan 300 configuration successful
Console> (enable) set vlan 200 pvlan-type community
Vlan 200 configuration successful
Console> (enable) set pvlan 100 200 5/1
Successfully set the following ports to Private Vlan 100,200: 5/1
Console> (enable) set pvlan 100 300 5/2
Successfully set the following ports to Private Vlan 100,300:5/2
Console> (enable) set pvlan mapping 100,200 15/1
Successfully set mapping between 100 and 200 on 15/1
Console> (enable) set pvlan mapping 100 300 15/1
Successfully set mapping between 100 and 300 on 15/1

Example 4-16 illustrates several commands for verifying the configuration of pVLANs in Cisco CatOS.

Example 4-16. Verifying pVLAN Configuration in Cisco CatOS

Console> (enable) show pvlan
Primary Secondary Secondary-Type Ports
------- --------- -------------- ------------
100 300 isolated 5/2
100 200 community 5/1
Console> (enable) show pvlan mapping
Port Primary Secondary
----- -------- ----------
15/1 100 200,300

VLAN Trunking

Trunks carry the traffic for multiple VLANs across a single physical link. Trunking is used to extend Layer 2 operations across an entire network, such as end-to-end VLANs, as shown in Figure 4-8. The host in VLAN 2 can communicate with the host in VLAN 2 in the other switch over the single trunk link the same as a host in VLAN 1 can communicate with a host in another switch in VLAN 1.

VLAN Trunking

Figure 4-8. VLAN Trunking

ISL and IEEE 802.1Q are two protocol-independent methods that Cisco Catalyst switches use to mark frames with a respective VLAN for transmission across the trunk interface. ISL is an encapsulation method for trunking, whereas 802.1Q trunking uses a tagging method. The 802.1Q frames place an additional 4-byte tag into the original packet. Catalyst switches add the tag before transmission on trunk lines and, as a result, compute a new FCS for each egress frame. At the receiving end, the link partners’ trunking interface removes the tag and forwards the packet to the correct destination in the respective VLAN. ISL is a Cisco proprietary protocol, but Cisco licensed its use to many NIC vendors, including Intel and Compaq, for interoperability. Nevertheless, 802.1Q is the standard-based IEEE protocol that is commonly found in network devices regardless of manufacturer. The current generation of low-end Catalyst switches no longer supports ISL. As a result, when deploying multilayer switched networks, opt for trunking using 802.1Q instead of ISL.

The following sections discuss trunking implementation, configuration, and troubleshooting in a multilayer switched network in more detail, including coverage of the following topics:

Implementing Trunking in Multilayer Switched Networks

Trunking is an important part of the multilayer switched network. The Campus Infrastructure module is hierarchical. The Building Distribution block is introduced to terminate local VLANs from many Building Access submodule switches using trunk links. Typically, several end-user nodes connect to single Building Access submodule switches with a selected number of access VLANs that provide basic connectivity to network resources, as shown in Figure 4-9.

Trunk Implementations

Figure 4-9. Trunk Implementations

Cisco design guides recommend using redundant links for each Building Access submodule switch. Redundant links from the Building Distribution submodule switches to the Campus Backbone switches are recommended to provide multihomed redundancy.

Trunking Protocols

This subsection covers the following two trunking protocols in more detail:

  • Inter-Switch Link (ISL)—A Cisco proprietary trunking encapsulation

  • IEEE 802.1Q—An industry-standard trunking method

ISL

As mentioned in a previous section, ISL is a Cisco proprietary protocol for interconnecting Layer 2–capable devices that carry VLAN traffic, as illustrated in Figure 4-10. The dotted and shaded lines between the switches in Figure 4-10 show the trunk carrying traffic for three VLANs. Every PC belongs to a separate VLAN and can communicate with the other PCs connected to the remote switch in the same VLAN over the trunk link. Besides specific models of Cisco Catalyst switches, high-end routers and network appliances support ISL. This chapter highlights trunking on Catalyst switches exclusively. For configuration information regarding trunking on Cisco IOS routers or other network devices, refer to the Cisco Systems, Inc. technical documentation.

ISL Implementations

Figure 4-10. ISL Implementations

A non-ISL device that receives ISL-encapsulated Ethernet frames may consider those frames to be transmission errors if the size of the header plus the data frame exceeds the MTU size. Furthermore, devices that do not support ISL simply drop ISL frames on ingress because they cannot decode the ISL encapsulation. Figure 4-11 illustrates the ISL frame; note that the header encapsulation is 26 bytes plus an additional 4 bytes for a header cyclic redundancy check (CRC).

ISL Frame

Figure 4-11. ISL Frame

When you are examining the frame formats for Layer 2 frames, notice that the ISL Layer 2 header is placed before the other Layer 2 field information in the frame.

The ISL frame contains two FCS fields. The original transmitting device generates one FCS field, and the ISL trunk port generates the other FCS field. ISL encapsulates the frame without modifying its contents.

The ISL Ethernet frame header contains additional fields; consult Cisco.com for more details on these fields.

IEEE 802.1Q

All Catalyst switches support 802.1Q tagging for multiplexing traffic from multiple VLANs onto a single physical link, as shown in Figure 4-12.

802.1Q Trunk Implementations

Figure 4-12. 802.1Q Trunk Implementations

IEEE 802.1Q trunk links employ the tagging mechanism to carry frames for multiple VLANs, in which each frame is tagged to identify the VLAN to which the frame belongs. The IEEE 802.1Q/802.1p standard provides inherent architectural advantages over ISL:

  • 802.1Q has smaller frame overhead than ISL. As a result, 802.1Q is more efficient than ISL, especially in the case of small frames. 802.1Q overhead is 4 bytes, whereas ISL is 30 bytes.

  • 802.1Q is a widely supported industry-standard protocol.

  • 802.1Q has the support for 802.1p fields for QoS.

Figure 4-13 describes the 802.1Q frame.

802.1Q Frame

Figure 4-13. 802.1Q Frame

The 802.1Q Ethernet frame header contains the following fields:

  • Dest—Destination MAC address (6 bytes)

  • Src—Source MAC address (6 bytes)

  • Tag—Inserted 802.1Q tag (4 bytes, detailed here)

    • EtherType(TPID)—Set to 0x8100 to specify that the 802.1Q tag follows.

    • CFI—Canonical Format Indicator is always set to 0 for Ethernet switches and to 1 for Token Ring-type networks.

    • PRI—3-bit 802.1p priority field.

    • VLAN ID—12-bit VLAN field. Of the 4096 possible VLAN IDs, the maximum number of possible VLAN configurations is 4094. A VLAN ID of 0 is used to indicate priority frames, and value 4095 (FFF) is reserved. CFI, PRI, and VLAN ID are represented as Tag Control information (TCI) fields.

  • Len/Etype—2-byte field specifying length (802.3) or type (Ethernet II).

  • Data—Data itself.

  • FCS—Frame check sequence (4 bytes).

IEEE 802.1Q uses an internal tagging mechanism that modifies the original frame (as shown by the “X” over FCS in the original frame in Figure 4-13), recalculates the CRC value for the entire frame with the tag, inserts the new CRC value in a new FCS. ISL, in comparison, wraps the original frame and adds a second FCS that is built only on the header information but does not modify the original frame FCS.

IEEE 802.1p redefined the three most significant bits in the 802.1Q tag to allow for prioritization of the Layer 2 frame.

The 802.1Q tagged frame supports Layer 2 compatibility on any Layer 2 device. Layer 2 devices, except those with 802.1Q trunk ports, do not have the capability to discern the EtherType field or the tag. If a non-802.1Q-enabled device or an access port receives a frame, the device ignores the tagged portion of the frame and switches the packet at Layer 2 as if it were a standard Ethernet frame. This allows for the placement of Layer 2 intermediate devices, such as other switches or bridges, on the 802.1Q trunk link.

Baby giants are frames that are larger than the standard MTU of 1500 bytes but less than 2000 bytes. Because ISL and 802.1Q tagged frames increase the MTU beyond 1500 bytes, switches consider both frames as baby giants. ISL-encapsulated packets over Ethernet have an MTU of 1548 bytes, whereas 802.1Q has an MTU of 1522 bytes.

Understanding Native VLAN in 802.1Q Trunking

802.1Q trunks define a native VLAN for frames that are not tagged by default. Switches transmit any Layer 2 frames from a native VLAN on the trunk port untagged, as shown in Figure 4-14. The receiving switch forwards all untagged packets to its native VLAN. The native VLAN is the default VLAN configuration of the port. When the port is not trunking, the access VLAN configuration defines the native VLAN. In the case of Cisco switches, the default VLAN is VLAN 1 and is configurable.

Native VLAN

Figure 4-14. Native VLAN

It is important that the 802.1Q trunk port between two devices has the same native VLAN configuration on both sides of the link. Misconfiguration of the native VLAN for 802.1Q trunk ports on the same trunk link might cause Layer 2 loops or black holes. With 802.1Q trunks, frames for the native VLAN are untagged, and if there is a native VLAN misconfiguration on peer switches, the untagged frames are received on the wrong VLAN on the peer switch. Furthermore, CDP issues a “VLAN mismatch” error message to any active consoles where native VLANs do not match. Note that there are some specific cases where CDP is either turned off or cannot be transmitted through an intermediate Layer 2 device in the same manner that 802.1Q frames are transmitted.

With an 802.1Q native VLAN, a switch forwards any Layer 2 frame that is received on a trunk port, whether tagged or not, to an intended VLAN. Compared to 802.1Q, ISL drops any unencapsulated frames that are received on a trunk port, and all frames that are transmitted from a trunk port are encapsulated, including the native VLAN.

Each physical port on the switch has a parameter called Port VLAN ID (PVID). Switches assign every 802.1Q port a PVID value based on its native VLAN ID. (The default is VLAN 1.) All switches assign all untagged frames to the VLAN that is specified in the PVID parameter. When a port receives a tagged frame, the tag is respected. If the frame is untagged, it is forwarded to the VLAN that is contained in the PVID. This allows the coexistence on the same Ethernet segment of VLAN-aware bridges or stations and VLAN-unaware bridges or stations.

Understanding DTP

All recent Cisco Catalyst switches, except for the Catalyst 2900XL and 3500XL, use a Cisco proprietary point-to-point protocol called Dynamic Trunking Protocol (DTP) on trunk ports to negotiate the trunking state. DTP negotiates the operational mode of directly connected switch ports to a trunk port and selects an appropriate trunking protocol. Negotiating trunking is a recommended practice in multilayer switched networks because it avoids network issues resulting from trunking misconfigurations.

VLAN Ranges and Mappings

ISL supports VLAN numbers in the range of 1 to 1005, whereas 802.1Q VLAN numbers are in the range of 1 to 4094. The default behavior of VLAN trunks is to permit all normal- and extended-range VLANs across the link if it is an 802.1Q interface and to permit normal VLANs in the case of an ISL interface. However, switches support configurations to restrict a single VLAN, range of VLANs, or group of VLANs across a trunk interface. Best practice is to limit the trunk to only the intended VLANs to reduce the possibility of loops and to improve bandwidth utilization by restricting unwanted VLAN data traffic from the link. Unnecessary VLANs can be limited by VTP pruning or manual removal of the VLANs from the trunk interfaces. This chapter discusses pruning later in the “VTP Pruning” section.

Cisco switches require VLAN mapping for the following reasons when traversing networks using both 802.1Q and ISL:

  • In a network environment with devices that are connected to Cisco switches through 802.1Q trunks, 802.1Q VLANs in the range of 1 to 1000 are automatically mapped to the corresponding ISL VLAN; however, 802.1Q VLAN numbers greater than 1000 must be mapped to an ISL VLAN to be recognized and forwarded by Cisco network devices.

  • In a network with non-Cisco devices that use reserved VLANs, VLANs must be mapped to nonreserved VLANs to work in Cisco networks.

The following restrictions apply when mapping 802.1Q VLANs to ISL VLANs:

  • Limited to eight 802.1Q-to-ISL VLAN mappings on a switch.

  • Limited to mapping 802.1Q VLANs to Ethernet-type ISL VLANs.

  • It is important not to enter the native VLAN of any 802.1Q trunk in the mapping table to avoid overlapping numbers.

  • Mapping an 802.1Q VLAN to an ISL VLAN blocks the traffic on the 802.1Q VLAN corresponding to the mapped ISL VLAN. For example, mapping 802.1Q VLAN 2000 to ISL VLAN 200 blocks the traffic on 802.1Q VLAN 200.

  • VLAN mappings are local to each switch. Configure the same VLAN mappings on all appropriate switches in the network.

Service Provider–Managed VLAN Services

Another feature of 802.1Q is its capability to support tunneling features, such as 802.1Q-in-Q tunneling, which allows service providers to transport VLANs within VLANs, preserving individual customer’s VLAN assignments without requiring them to be unique. Layer 2 protocol tunneling is a scaleable method for tunneling protocol data units (PDUs) through the service provider network, as shown in Figure 4-15. Chapter 16, “Designing, Building, and Connecting Cisco Multilayer Switched Networks Using Metro Solutions,” discusses 802.1Q-in-Q tunneling in more detail.

802.1Q-in-Q Tunneling

Figure 4-15. 802.1Q-in-Q Tunneling

Cisco Trunking Modes and Methods

Table 4-4 describes the different trunking modes supported by Cisco switches.

Table 4-4. Trunking Modes

Mode in Cisco CatOS

Mode in Cisco IOS

Function

Off

Access

Puts the interface into permanent nontrunking mode and negotiates to convert the link into a nontrunk link. The interface becomes a nontrunk interface even if the neighboring interface does not agree to the change.

On

Trunk

Puts the interface into permanent trunking mode and negotiates to convert the link into a trunk link. The interface becomes a trunk interface even if the neighboring interface does not agree to the change.

Nonegotiate

Nonegotiate

Puts the interface into permanent trunking mode but prevents the interface from generating DTP frames. You must configure the neighboring interface manually as a trunk interface to establish a trunk link. Use this mode when connecting to a device that does not support DTP.

Desirable

Dynamic desirable

Makes the interface actively attempt to convert the link to a trunk link. The interface becomes a trunk interface if the neighboring interface is set to trunk, desirable, or auto mode. This is the default mode for all Ethernet interfaces in Cisco IOS.

Auto

Dynamic auto

Makes the interface willing to convert the link to a trunk link. The interface becomes a trunk interface if the neighboring interface is set to trunk or desirable mode. This is the default mode in Cisco CatOS.

Table 4-5 lists the Ethernet trunking modes that Cisco switches support.

Table 4-5. Catalyst-Supported Ethernet Trunking Methods

Trunking Method

Description

ISL

Encapsulates headers and trailers with a VLAN-ID.

802.1Q

Tags 4 additional bytes in the Ethernet header and marks these bytes with a VLAN-ID.

Table 4-6 lists which Catalyst switches support ISL and 802.1Q.

Table 4-6. Cisco Catalyst Switches ISL and 802.1Q Support Matrix

Family of Switch

ISL

802.1Q

Catalyst 2940

No

Yes

Catalyst 2948G/2980G

No

Yes

Catalyst 2950/2955/2960

No

Yes

Catalyst 2970/3550/3560/3750

Yes

Yes

Cisco CatOS–based Catalyst 4000/4500

No

Yes

Cisco IOS–based Catalyst 4000/4500

Yes

Yes

Catalyst 6500

Yes

Yes

Note

The Cisco Catalyst 4000 and 4500 switches run Cisco IOS or Cisco CatOS depending on the Supervisor Engine model. The Supervisor Engine I and II only support 802.1Q. Furthermore, specific oversubscribed line modules for the Catalyst 4000 and 4500 do not support ISL encapsulation on a per-port basis. Refer to the product documentation on Cisco.com for more details.

Configuring ISL and 802.1Q Trunking in Cisco IOS

To configure a switch port as an ISL trunking port in Cisco IOS, use the following commands:

  1. Enter the interface configuration mode.

    Switch(config)#interface {FastEthernet | GigabitEthernet} slot/port
  2. Select the encapsulation type.

    Switch(config-if)#switchport trunk encapsulation {isl | dot1q | negotiate}

    Note

    The negotiate option specifies that the port negotiates with the neighboring port to become an ISL (preferred) or 802.1Q trunk, depending on the configuration and capabilities of the neighboring port.

  3. Configure the interface as a Layer 2 trunk.

    Switch(config-if)#switchport mode {dynamic {auto | desirable} | trunk}
  4. Specify the native VLAN.

    Switch(config-if)#switchport trunk native vlan vlan-id
  5. Configure the allowable VLANs for this trunk.

    Switch(config-if)#switchport trunk allowed vlan {add | except | all |
    remove} vlan-id[,vlan-id[,vlan-id[,...]]]

Note

With Cisco IOS Software Release 12.1(13)E and later, VLAN IDs may be in the range of 1 to 4094, except in the case of reserved VLANs. With Cisco IOS Release 12.1(11b)E or later, it is possible to remove VLAN 1 from a trunk port. Even after removing VLAN 1 from a trunk, the trunk interface continues to send and receive management traffic. For example, CDP, VTP, Port Aggregation Protocol (PAgP), and DTP all use VLAN 1, regardless of the existence of VLAN 1 on the port.

Example 4-17 shows configuration of a port for ISL trunking in Cisco IOS.

Example 4-17. Configuring a Port for ISL Trunking in Cisco IOS

Switch#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Switch(config)#interface FastEthernet 5/8
Switch(config)#switchport
Switch(config-if)#switchport trunk encapsulation isl
Switch(config-if)#switchport mode trunk
Switch(config-if)#end

Example 4-18 shows configuration of interface Fast Ethernet 5/8 for 802.1Q trunking in the desirable mode and allowing only VLANs 1 through 100 on the trunk.

Example 4-18. Configuring a Port for 802.1Q Trunking in Cisco IOS

Switch#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Switch(config)#interface FastEthernet 5/8
Switch(config-if)#switchport trunk encapsulation dot1q
Switch(config-if)#switchport mode dynamic desirable
Switch(config-if)#switchport trunk allowed vlan 1-100
Switch(config-if)#no shutdown
Switch(config-if)#end

Configuring VLAN Trunking in Cisco CatOS

To configure ISL trunks in Cisco CatOS, use the following commands in the privileged EXEC mode:

  1. The following command configures the trunking mode and method.

    set trunk mod/port [on | desirable | auto | nonegotiate] [isl | dot1q]
  2. (Optional.) If not specified, all VLANs are allowed on the trunk. To specifically add VLANs on the trunk, use this command:

    set trunk mod/port vlan-id1[,vlan-id[,vlan-id[,...]]]
  3. (Optional.) To remove VLANs from the trunk, use the following command:

    clear trunk mod/port vlan IDs

    clear also removes VLANs from the trunk. Another option to remove unnecessary VLANs is to use pruning with VTP, which this chapter discusses later in the “VTP Pruning” section.

  4. (Optional.) The following command tags all the VLANs including the native VLAN in 802.1Q. This is a global command.

    set dot1q-all-tagged enable [all]
  5. (Optional.) To tag native VLANs only on specific ports, do the following:

    set port dot1q-all-tagged mod/port enable | disable

Example 4-19 shows configuration of ISL trunking on Cisco CatOS to disallow VLANs 10 to 20 from the trunk.

Example 4-19. Configuring a Port for ISL Trunking in CatOS

Console> (enable) set trunk 1/2 desirable isl
Console> (enable) clear trunk 1/2 10-20

Example 4-20 shows configuration of 802.1Q trunking in Cisco CatOS.

Example 4-20. Configuring a Port for 802.1Q Trunking in CatOS

Console> (enable) set trunk 3/1 desirable dot1q

Verifying Trunking Configurations

To verify the trunk configuration in Cisco IOS, use the commands in Table 4-7.

Table 4-7. Cisco IOS Commands to Verify Trunk Configuration

Command

Notes

show running-config interface type slot/port

Displays the running configuration of the interface

show interfaces [type slot/port] switchport

Displays the switch port configuration of the interface

show interfaces [type slot/port] trunk

Displays the trunk configuration of the interface

Example 4-21 displays port configuration for trunking.

Example 4-21. Displaying Port Information for Trunking

Switch#show running-config interface FastEthernet 5/8
Building configuration...
Current configuration:
!
interface FastEthernet5/8
switchport mode dynamic desirable
switchport trunk encapsulation dot1q
end

Example 4-22 displays switchport information about interface FastEthernet 5/8, which is operating as an 802.1Q trunk.

Example 4-22. Displaying Switchport Information for Trunking

Switch#show interfaces FastEthernet 5/8 switchport
Name: Fa5/8
Switchport: Enabled
Administrative Mode: dynamic desirable
Operational Mode: trunk
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: Enabled
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001

Example 4-23 displays trunk information for a particular port.

Example 4-23. Displaying Trunk Information for a Particular Port

Switch#show interfaces FastEthernet 5/8 trunk

Port      Mode         Encapsulation  Status        Native vlan
Fa5/8     desirable    n-802.1q       trunking      1

Port      Vlans allowed on trunk
Fa5/8 1-1005

Port      Vlans allowed and active in management domain
Fa5/8 1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
02,850,917,999,1002-1005

Port      Vlans in spanning tree forwarding state and not pruned
Fa5/8 1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
02,850,917,999,1002-1005

To verify the trunking configuration in Cisco CatOS, use the following command:

show trunk [mod/port]

Example 4-24 shows verification of the trunking configuration in Cisco CatOS in which port 3/1 is an ISL trunk and allows only VLANs 1, 5, and 10 through 20.

Example 4-24. Verifying Trunking Configuration in Cisco CatOS

Console> (enable) show trunk 3/1
Port     Mode        Encapsulation Status       Native vlan
-------- ----------- ------------- ------------ -----------
3/1      desirable   n-isl         trunking     1
Port     Vlans allowed on trunk
-------- ---------------------------------------------------------------------
3/1      1,5,10-20
Port     Vlans allowed and active in management domain
-------- ---------------------------------------------------------------------
3/1      1,5,10-20
Port     Vlans in spanning tree forwarding state and not pruned
-------- ---------------------------------------------------------------------
3/1      1,5,10-20

Troubleshooting Trunking

To troubleshoot a problem with a trunk port, verify that the following configurations are correct:

  • Interface modes

  • Native VLAN

  • Encapsulation types

A common problem with VLANs is where a device cannot establish a connection across a trunk link. Suggested solutions to the problem are as follows:

  • Ensure that the Layer 2 interface mode configured on both ends of the link is valid. The trunk mode should be trunk or desirable for at least one side of the trunk. Use the show interface interface trunk command in Cisco IOS to verify the configuration.

  • Ensure that the trunk encapsulation type configured on both ends of the link is valid and compatible.

  • On IEEE 802.1Q trunks, make sure that the native VLAN is the same on both ends of the trunk.

VLAN Trunking Protocol

VTP is a protocol that is used to distribute and synchronize information about VLANs that are configured throughout a switched network. VTP minimizes misconfigurations and configuration inconsistencies that may result in various problems, such as duplicate VLAN names, incorrect VLAN-type specifications, and security violations. Switches transmit VTP messages only on 802.1Q or ISL trunks.

VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the additions, deletions, and name changes of VLANs within a VTP domain.

A VTP domain is one switch or several interconnected switches that share the same VTP environment. Catalyst switches support only a single VTP domain per switch.

By default, a Catalyst switch is in the “no-management-domain” state until it receives an advertisement for a VTP domain over a trunk link or until a VTP configuration is applied, as shown in Figure 4-16.

VTP Protocol

Figure 4-16. VTP Protocol

Configurations made to a single VTP server propagate across trunk links to all connected switches in the network in the following manner:

  1. An administrator adds a new VLAN definition.

  2. VTP propagates the VLAN information to all switches in the VTP domain.

  3. Each switch synchronizes its configuration to incorporate the new VLAN data.

VTP operates in one of the following modes: server mode, client mode, transparent mode, or off mode. Off mode currently is supported only in Cisco CatOS. The default VTP mode is server mode, but Catalyst switches do not propagate VTP information out trunk interfaces until a management domain name is specified or learned.

Table 4-8 describes the features of the VTP client, server, transparent, and off modes.

Table 4-8. VTP Modes of Operation

VTP Mode

Features

Client

Cannot create, change, or delete VLANs on command-line interface (CLI).

Forwards advertisements to other switches.

Synchronizes VLAN configuration with latest information received from other switches in the management domain.

Does not save VLAN configuration in nonvolatile RAM (NVRAM).

Server

Creates, modifies, and deletes VLANs.

Sends and forwards advertisements to other switches.

Synchronizes VLAN configuration with latest information received from other switches in the management domain.

Saves VLAN configuration in NVRAM.

Transparent

Creates, deletes, and modifies VLANs only on the local switch.

Forwards VTP advertisements received from other switches in the same management domain.

Does not synchronize its VLAN configuration with information received from other switches in the management domain.

Saves VLAN configuration in NVRAM.

Off

Similar to transparent mode except this version drops advertisements on trunk interface.

Note

In VTP version 3, there is a concept of a primary server and a secondary server. This chapter discusses VTP version 3 later in the “VTP Version 3” section.

Note

VTP off mode is supported in Cisco CatOS only in version 7.1 and later.

Switches flood VTP advertisements throughout the management domain over trunk interfaces. The switch sends the messages every 5 minutes or whenever there is a change in VLAN configurations. Cisco switches transmit VTP advertisements over the management VLAN (VLAN 1 by default) using a Layer 2 multicast frame.

A device that receives VTP advertisements checks various parameters before incorporating the received VLAN information. First, the management domain name and password in the advertisement must match those configured in the local switch. Next, if the configuration revision number indicates that the message was created after the configuration currently in use, the switch incorporates the advertised VLAN information if the switch is a VTP server or client.

One of the most critical components of VTP is the configuration revision number. Each time a VTP server modifies its VLAN information, it increments the configuration revision number by 1. It then sends out a VTP advertisement with the new configuration revision number. If the configuration revision number that is being advertised is higher than the number stored on the other switches in the VTP domain, the rest of the switches in the domain overwrite their VLAN configurations with the new information being advertised, as shown in Figure 4-17.

VTP Advertisements

Figure 4-17. VTP Advertisements

Because a VTP-transparent switch does not participate in VTP, that switch does not advertise its VLAN configuration or synchronize its VLAN database upon receipt of a VTP advertisement. Furthermore, a switch in VTP-transparent mode always has the configuration revision number of 0.

Note

The overwrite process means that if the VTP server deletes all VLANs and advertises with a higher revision number, the client devices in the VTP domain also delete their VLANs. Use this feature with caution.

The ensuing sections discuss the following properties of VTP:

VTP Pruning

VTP pruning uses VLAN advertisements to determine when a trunk connection is flooding traffic needlessly. By default, a trunk connection carries traffic for all VLANs in the VTP management domain. Commonly, some switches in an enterprise network do not have local ports configured in each VLAN. In Figure 4-18, switches 1 and 4 support ports statically configured in the red VLAN.

VTP Pruning

Figure 4-18. VTP Pruning

VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices. Figure 4-18 shows a switched network with VTP pruning enabled. The broadcast traffic from station A is not forwarded to switches 3, 5, and 6 because traffic for the red VLAN has been pruned on the links indicated on switches 2 and 4.

Note

Regardless of whether you use VTP pruning support, Catalyst switches run an instance of STP for each VLAN. An instance of STP exists for each VLAN even if there are no ports active in the VLAN or if VTP pruning removes the VLANs from an interface. As a result, VTP pruning prevents flooded traffic from propagating to switches that do not have members in specific VLANs. However, VTP pruning does not eliminate the switches’ knowledge of pruned VLANs.

VTP Versions

Cisco Catalyst switches support three different versions of VTP: versions 1, 2, and 3. It is important to decide which version to use because they are not interoperable. In addition, Cisco recommends running only one VTP version for network stability. This chapter emphasizes VTP versions 1 and 2 because VTP version 3 is relatively new.

VTP Versions 1 and 2

VTP version 1 is supported in Cisco CatOS version 2.1 or later and in all versions of Cisco IOS. VTP version 2 is supported in Cisco CatOS version 3.1(1) or later and in all versions of Cisco IOS.

VTP version 2 supports these features that are not implemented in VTP version 1:

  • Token Ring support—VTP version 2 supports Token Ring LAN switching and Token Ring VLANs.

  • Unrecognized Type-Length-Value (TLV) support—A VTP version 2 server or client propagates configuration changes to its other trunks even for TLVs that it cannot parse. VTP version 2 servers and clients are still able to save unrecognized TLVs in NVRAM.

  • Version-independent transparent mode—In VTP version 1, a VTP-transparent switch inspects VTP messages for the domain name and version and forwards a message only if the version and domain name match. Because only one domain is supported in the Supervisor Engine software, VTP version 2 forwards VTP messages in transparent mode—without checking the version.

  • Consistency checks—VTP version 2 performs VLAN consistency checks (such as VLAN names and values) only when you enter new information through the CLI or via the Simple Network Management Protocol (SNMP). VTP version 2 does not perform checks when new information is obtained from a VTP message or when information is read from NVRAM. If the message digest algorithm 5 (MD5) on a received VTP message is correct, VTP version 2 accepts the information. Use VTP version 2 in a Token Ring environment, because VTP version 1 does not support Token Ring VLANs.

If all switches in a domain are capable of running VTP version 2, enable VTP version 2 on one switch. The VTP server propagates the version number to the other VTP version 2–capable switches in the VTP domain.

VTP Version 3

VTP version 3 is supported in Cisco CatOS software versions 8.1 and above and is not currently available for Cisco IOS. VTP version 3 differs from earlier VTP versions in that it does not directly handle VLANs. Instead, it is responsible for distributing a list of opaque databases over an administrative domain. The following items are enhancements in VTP version 3:

  • Support for extended VLANs (1025 to 4094)

  • Support for the creation and advertising of pVLANs

  • Improved server authentication

  • Enhancements to a mechanism for protection from the “wrong” database accidentally being inserted into a VTP domain

  • Interaction with VTP versions 1 and 2

  • Configurable on a per-port basis

VTP version 3 has the same features as VTP versions 1 and 2 except for the addition of the modes of primary and secondary server and the concept of database consistency.

The primary server is the sole server in the VTP domain that is used to modify VTP configuration. A VTP domain may operate without an active primary server because the secondary servers ensure persistence of the configuration over reloads. The primary server may initiate or change the VTP configuration. A VTP domain may operate without a primary server for the following reasons:

  • If the switch reloads

  • If a high-availability switchover occurs between the active and redundant Supervisor Engines

  • If a forceful takeover from a secondary server occurs

  • If a change in the VTP mode, version, or password configuration occurs

In server mode, the switch becomes a secondary server by default. The secondary server is the same as a VTP client in VTP version 2 in that a secondary VTP server cannot modify the configuration. The only exception is that the VTP server can save the VTP configuration in NVRAM. A secondary server can be changed to the primary server by using the takeover command from the switch; this switchover to the primary server is propagated to the entire domain. All other potential primary servers in the domain resign to secondary server mode to ensure that only one primary server exists in the VTP domain at any given time. This method avoids VLAN inconsistencies and provides a higher degree of stability.

A switch that is running VTP version 3 can modify reserved VLANs 1002 through 1005; however, these VLANs are set to their default in the scaled-down database for VTP version 2 peers. A switch that is running VTP version 3 does not accept a configuration from VTP version 1 or VTP version 2 neighbors. As a result, it is highly recommended that you change all the modes of the switches that are running versions 1 and 2 to VTP clients and reset their respective VTP revision versions.

VTP Authentication

VTP domains can be secured by using the VTP password feature. It is important to make sure that all the switches in the VTP domain have the same password and domain name; otherwise, a switch will not become a member of the VTP domain. Cisco switches use MD5 to encode passwords in 16-byte words. These passwords propagate inside VTP summary advertisements. In VTP, passwords are case-sensitive and can be 8 to 64 characters in length. The use of VTP authentication is a recommended practice.

Configuring VTP

When a network device is in VTP server mode, you can change the VLAN configuration on one switch and have the VLAN configuration propagate to all switches throughout the network. VLAN configuration changes include adding, removing, or changing the name of a VLAN. Default VTP configuration values depend on the switch model and software version. For example, the default values for the Catalyst 4500 and 6500 families of switches are as follows:

  • VTP domain name—None

  • VTP mode—Server

  • VTP pruning—Disabled

  • VTP password—None

  • VTP trap—Disabled (SNMP traps communicating VTP status)

Cisco switches may learn or specify a VTP domain name. By default, the domain name is not set. To set a name and password for the VTP management domain, the name and password should be the same for all switches in the domain, and passwords are case-sensitive.

VTP pruning eligibility is one VLAN parameter that the VTP protocol advertises. Enabling or disabling VTP pruning with VTP versions 1 or 2 on a VTP server propagates the change throughout the management domain. However, in the case of VTP version 3, VTP pruning must be enabled manually on each switch.

Configuring VTP in Cisco IOS

To configure a VTP server in Cisco IOS in configuration mode for VTP versions 1 and 2, follow these steps from privileged EXEC mode:

  1. Enter global configuration mode.

    Switch#configure terminal
  2. Configure the VTP mode as server.

    Switch(config)#vtp server
  3. Configure the domain name.

    Switch(config)#vtp domain domain_name
  4. (Optional.) Enable VTP version 2.

    Switch(config)#vtp version 2
  5. (Optional.) Specify a VTP password.

    Switch(config)#vtp password password_string
  6. (Optional.) Enable VTP pruning in the management domain.

    Switch(config)#vtp pruning
  7. Exit global configuration mode.

    Switch(config)#exit

Note

Make sure the VTP password and VTP version are the same on all the switches that are part of the VTP domain.

Note

Use these same steps to configure the VTP in the database mode except the VTP version. To change the VTP version under database mode, issue the vtp v2-mode command.

Example 4-25 shows configuration of a Catalyst switch as a VTP server in Cisco IOS in global configuration mode.

Example 4-25. Configuring a Switch As a VTP Server in Cisco IOS

Switch#configure terminal
Switch(config)#vtp mode server
Setting device to VTP SERVER mode.
Switch(config)#vtp domain Lab_Network
Setting VTP domain name to Lab_Network
Switch(config)#end

Configuring VTP in Cisco CatOS

To configure a VTP server in Cisco CatOS, follow these steps from the privileged EXEC mode:

  1. Define the VTP domain name on the switch.

    set vtp domain name
  2. Define the VTP mode.

    set vtp mode client | off | server | transparent
  3. (Optional.) Specify the password for the VTP domain.

    set vtp passwd passwd
  4. (Optional.) Specify the version of VTP. The default is 1.

    set vtp version 1 | 2
  5. (Optional.) Enable VTP pruning in the whole VTP domain.

    set vtp pruning enable
  6. (Optional.) Disable VTP pruning on the VLANs.

    clear vtp pruneeligible vlan_range
  7. (Optional.) Add VLANs to the VTP pruning list.

    set vtp pruneeligible vlan_range

Example 4-26 shows configuration of a VTP domain named Lab_Network in server mode in Cisco CatOS.

Example 4-26. VTP Domain Configuration in Cisco CatOS

Console> (enable) set vtp domain Lab_Network
VTP domain Lab_Network modified
Console> (enable) set vtp mode server
Changing VTP mode for all features
VTP domain Lab_Network modified

Example 4-27 shows configuration of VTP pruning for a VTP domain named BCMSN in Cisco CatOS. In addition, the example illustrates the removal of VLANs 100 through 500 from the pruning list in Cisco CatOS.

Example 4-27. VTP Pruning in Cisco CatOS

Console> (enable) set vtp pruning enable
Cannot modify pruning mode unless in VTP SERVER mode.
Console> (enable) set vtp mode server
Changing VTP mode for all features
VTP domain BCMSN modified
Console> (enable) set vtp pruning enable
This command will enable the pruning function in the entire management domain.
All devices in the management domain should be pruning-capable before enabling.
Do you want to continue (y/n) [n]? y
VTP domain BCMSN modified
Console> (enable) clear vtp pruneeligible 100-500
Vlans 100-500 will not be pruned on this device.
VTP domain BCMSN modified.

Verifying the VTP Configuration

Use the show vtp status command to display information about the VTP configuration and current state in Cisco IOS. For Cisco CatOS, use the show vtp domain command to display similar information.

Example 4-28 shows how to verify the VTP configuration by using the show vtp status command. The output describes the VTP version, the number of VLANs supported locally, the VTP operating mode, the VTP domain name, and the VTP pruning mode.

Example 4-28. Displaying VTP Status

Switch#show vtp status

VTP Version                     : 2
Configuration Revision          : 247
Maximum VLANs supported locally : 1005
Number of existing VLANs        : 33
VTP Operating Mode              : Server
VTP Domain Name                 : Lab_Network
VTP Pruning Mode                : Enabled
VTP V2 Mode                     : Disabled
VTP Traps Generation            : Disabled
MD5 digest                      : 0x45 0x52 0xB6 0xFD 0x63 0xC8 0x49 0x80
Configuration last modified by 0.0.0.0 at 8-12-99 15:04:4

Use the show vtp counters command to display statistics about VTP operation. Example 4-29 displays VTP statistics in Cisco IOS.

Example 4-29. Displaying VTP Statistics in Cisco IOS

Switch# show vtp counters

VTP statistics:
Summary advertisements received    : 7
Subset advertisements received     : 5
Request advertisements received    : 0
Summary advertisements transmitted : 997
Subset advertisements transmitted  : 13
Request advertisements transmitted : 3
Number of config revision errors   : 0
Number of config digest errors     : 0
Number of V1 summary errors        : 0
VTP pruning statistics:

Trunk           Join Transmitted Join Received    Summary advts received from
                                           non-pruning-capable device
---------------- ---------------- ---------------- ------------------
Fa5/8               43071            42766            5

Example 4-30 shows the output of the show vtp domain command in Cisco CatOS.

Example 4-30. Verifying VTP Configuration in Cisco CatOS

Console> (enable) show vtp domain
Version : running VTP1 (VTP3 capable)
Domain Name : Lab_Network Password : configured (hidden)
Notifications: disabled Updater ID: 172.20.52.19
Feature Mode Revision
-------------- -------------- -----------
VLAN Off 0
Pruning : disabled
VLANs prune eligible: 2-1000

Troubleshooting VTP

Problems with VTP configuration are usually a result of improperly configured trunk links, domain names, VTP modes, or passwords.

Perform the following steps to troubleshoot VTP issues in which VTP is not updating the configuration on other switches when VLAN configuration changes occur:

  1. Make sure the switches are connected through trunk links. VTP updates are exchanged only over trunk links. Check to make sure all switch-to-switch connections are using the same trunking protocol. In addition, verify that the operation of each link partner’s operation speed and duplex is the same by using the show interface command in Cisco IOS.

  2. Make sure the VTP domain name, which is case-sensitive, is configured exactly the same way on the appropriate switches. Switches only exchange VTP updates between switches in the same VTP domain. Use the show vtp status command to verify these configurations.

  3. Check whether the switch is in VTP transparent mode. Only switches in VTP server or VTP client mode update their VLAN configuration based on VTP updates from other switches. Use the show vtp status command to verify the configured VTP modes.

  4. If you are using VTP passwords, make sure to use the same password and authentication on all switches in the VTP domain.

  5. Make a backup copy of VLAN.dat in Cisco IOS VLAN database configuration mode or the configuration in Cisco IOS by copying the configuration to a remote device such as a TFTP server before troubleshooting.

Case Study: Troubleshooting VLAN/Trunking Issues Across the Switches

If a particular host is not able to communicate with another host that is in the same VLAN but in a different switch, follow these steps:

  1. Make sure that a VLAN is created in the database by using the show vlan command.

  2. Check to determine if the hosts are members of the same VLAN by using the show interface command.

  3. Check to determine if the VLANs are active in the VLAN database by using the show vlan membership command. If this is not the problem, check to see if the VTP name and password, if configured, are correct or check to see that the VLAN is present in the VLAN database.

  4. Check to determine if the particular VLAN is active on the trunk interface. Even if active, if it is a dot1q trunk, check to see if the native VLAN is the same across both sides of the trunk interfaces by using the show interface trunk command.

Study Tips

The following bullets review important BCMSN exam preparation points of this chapter. The bullets only briefly highlight the important concepts. Table 4-9 lists and describes the functions of the important commands covered in this chapter. Consult the text of this chapter for additional information regarding these topics:

  • A VLAN is a logical broadcast domain that facilitates a group of end devices with common requirements, irrespective of their physical locations. A VLAN generally encompasses a single IP subnet.

  • In terms of configuring VLANs in Cisco IOS, make sure to define the VLAN before you assign the ports to the newly created VLAN.

  • Always use the global configuration mode to configure VLANs in Cisco IOS.

  • Recommended practice is to configure host ports to be static access ports using the switchport mode access command.

  • Use the switchport access vlan vlan command to configure interfaces for a specific VLAN.

  • Always use the switchport host command on the ports connected to a single host to disable EtherChanneling and to enable Spanning-Tree PortFast.

  • Because 802.1Q is an industry-standard trunking protocol that has support for extended VLANs (VLAN IDs 1025 to 4094) and uses 802.1p fields for QoS, recommended practice is to always implement 802.1Q trunking instead of ISL trunking in multilayer switched networks.

  • By default, the Native VLAN of an interface is 1.

  • The Native VLAN of a trunk port is the configured VLAN ID as if the port were not trunking in Cisco CatOS.

  • The Native VLAN is not tagged; therefore, the Native VLAN does not contain 802.1p fields for QoS. However, there is a configuration option in more recent Cisco IOS versions 12.1.13 or later to tag the Native VLAN on a trunk port (that is, tag all VLANs). With this option, the Native VLAN traffic is simply tagged with the associated VLAN ID, by default, VLAN 1. It is possible to remove VLAN 1 from a trunk; however, this only removes data traffic from VLAN 1. CDP, DTP, PAgP, and so on still transmit across VLAN 1.

  • Dynamic Trunking Protocol (DTP) is a protocol that negotiates the operational mode of directly connected switch ports to a trunk port and chooses an appropriate trunking protocol.

  • Always use the switchport mode trunk command to configure the trunk port in the on mode statically if the link partner (peer) does not support DTP or the desirable mode trunking configuration.

  • VTP is also one of the important Layer 2 messaging protocols that is used to circulate and synchronize the VLAN database throughout the network within a VTP domain.

  • VTP is configurable in server, client, and transparent modes within a particular domain. In server mode, the switch can add, delete, and update VLANs. In client mode, the switch cannot add or delete VLANs, but it can synchronize and forward VTP advertisements to other switches in a VTP domain. In transparent mode, the switch can add, delete, or modify VLANs only on a local switch, but it doesn’t synchronize its VLAN database. Switches can forward VTP advertisement to other switches in a VTP domain, even when operating in the VTP transparent mode.

  • The default VTP mode is the server mode.

  • Use VTP pruning to stop flooding of unnecessary traffic on trunk ports.

  • Configure switches in the VTP server or client mode to receive and synchronize the VLAN database using trunk links.

  • Always add a new switch in either VTP transparent mode in the same domain name or in server mode with a different domain name first. Later, change the switch to the correct domain or change from VTP transparent mode to VTP server or client mode after all trunk links are up to properly synchronize the VLAN database.

  • Private VLANs (pVLAN) are VLANs that provide Layer 2 isolation between end devices within the same VLAN. As such, private VLANs turn a single VLAN broadcast domain into multiple small broadcast domains to facilitate security and to reduce the number of IP subnets.

  • Private VLANs consist of a primary and one or multiple secondary VLANs. Each secondary VLAN is associated with a primary VLAN.

  • Isolated and community pVLANs are secondary pVLANs. Hosts that reside in isolated pVLANs can only converse with a promiscuous port (generally, a port with a connected router, whether it is logical, physical, or virtual), but they cannot communicate with hosts in the same isolated pVLAN. In community pVLANs, hosts that belong to the same community pVLAN can communicate with other ports in the same community VLAN and any promiscuous ports; however, the hosts in the community VLAN cannot communicate with hosts in the other community pVLANs or isolated pVLANs.

Table 4-9. Commands to Review

Command

Description

show vlan

Displays detailed information of all the VLANs configured on the switch.

show vlan brief

Displays brief information about the VLANs on the switch. This command describes the VLAN names, their status, and the ports assigned to the VLANs.

show vtp status

Provides information about VTP name, mode, version, and authentication.

show vlan vlan-id

Displays information about a particular VLAN by VLAN-ID.

show vlan summary

Displays a summary of active, suspended, and extended VLANs. This command is only available in Cisco CatOS.

show interfaces type slot/port switchport

Displays administrative and operational status of a switching interface, which includes VLAN information, pVLAN status, etc.

type = ethernet, fastethernet, gigabitethernet, or tengigabitethernet

show interfaces type slot/port trunk

Displays the trunk information of an interface.

(config-if)#description description

Configures an interface with a description. This option is useful for quickly identifying interfaces.

(config-if)#switchport host

This command enables Spanning-Tree PortFast and turns off channeling on an interface. This command prevents timeouts on boot for host workstations and servers.

(config)#interface type slot/port

Configures an interface.

(config-if)#switchport mode access

Configures an interface with nontrunking single VLAN interface.

(config-if)#switchport access vlan vlan_id

Configures an interface to a VLAN-ID.

(config-if)#switchport mode trunk

Configures an interface for trunking unconditionally.

(config-if)#switchport trunk encapsulation [dot1q | isl | negotiate]

Configures the trunking protocol on a trunk interface.

(config-if)#switchport trunk allowed vlan options

Configures VLANs allowed to pass traffic on a trunk interface.

(config-if)#switchport trunk native vlan vlan-id

Configures the native VLAN on a trunk interface.

Summary

This chapter discussed VLANs in detail, including coverage of trunking and VTP.

In review, a VLAN is a logical grouping of switch ports that connects nodes of virtually any type, regardless of physical location. A VLAN is usually defined as end-to-end or local. An end-to-end VLAN spans the entire switched network, whereas a local VLAN is limited to the switches in the Building Access and Building Distribution submodules. VLANs usually are defined statically by manually assigning the switch ports to particular VLANs.

Furthermore, a trunk is a Layer 2 point-to-point link between networking devices that is capable of carrying the traffic of multiple VLANs. ISL and 802.1Q are the two trunking protocols to connect two switches. ISL is a Cisco proprietary protocol used for VLAN trunking. The 802.1Q protocol is an open-standard protocol also used for VLAN trunking. ISL supports VLAN numbers 1 to 1005, whereas 802.1Q supports VLAN numbers 1 to 4094.

VTP is used to distribute and synchronize information about VLANs configured throughout a switched network. VTP pruning helps to stop flooding of unnecessary traffic on trunk links. Review the study tips section for additional summarization of this chapter.

Configuration Exercise: Configuring VLAN, Trunking, and VTP in Multilayer Switched Networks

Complete this configuration exercise to familiarize yourself with the initial configuration of VLANs, VTP, and trunking on Cisco IOS–based Catalyst switches.

Required Resources

The only resources that are required for this exercise are access to Cisco IOS–based Catalyst switches via the console or in-band access such as SSH.

Exercise Objective

The purpose of this configuration exercise is to demonstrate the configuration of VLANs, trunking, and VTP in the multilayer switched environment. After completing this exercise, you will be able to perform the following types of configurations on Catalyst switches that are running Cisco IOS:

  • Create a VTP management domain

  • Configure trunking

  • Configure VLANs

  • Associate VLANs with ports on your switch

  • Add a new switch to the existing network

  • Verify the VTP and VLAN status

  • Configure PVLANs

Network Diagram

Figure 4-19 shows the network layout for this exercise. In the multilayer switched network, the links between the Building Access submodule switch and the Building Distribution submodule switch (as well as the links between the distribution switches) are trunks, and all the switches belong to the same VTP domain. The access switches serve as VTP clients, while the distribution switches serve as VTP servers.

Network Layout for Configuration Exercise

Figure 4-19. Network Layout for Configuration Exercise

Command List

In this configuration exercise, you will use the commands listed in Table 4-10. The commands are in alphabetical order so that you can easily locate the information you need. Refer to this table if you need configuration-command assistance during the configuration exercise. The table includes only the specific parameters that are used in the example, not all the available options for the commands.

Table 4-10. Command List for Configuration Exercise

Command

Description

configure terminal

From privileged EXEC mode, enters global configuration mode

enable password password

Specifies a password used to authenticate a user to enter the privileged EXEC mode

exit

Exits the current mode

interface FastEthernet | GigabitEthernet slot/port

Enters the interface configuration mode for a Fast Ethernet or Gigabit Ethernet interface

interface range FastEthernet | GigabitEthernet slot/starting_port - ending_port

Moves a range of interfaces into the interface configuration mode for applying the same configuration to the range of interfaces

name vlan-name

Specifies a name for a VLAN in either the VLAN database or VLAN configuration mode

no interface vlan vlan-id type

Disables a VLAN interface

ping ip-address

Sends an ICMP echo to the designated IP address, using the default settings of size and response window time

private-vlan [primary | isolated | community]

Configures the VLAN as a pVLAN type

private-vlan association {secondary_vlan_list | add secondary_vlan_list | remove secondary_vlan_list}

Associates a secondary pVLAN to a primary pVLAN

private-vlan mapping {secondary_vlan_list | add secondary_vlan_list | remove secondary_vlan_list}

Maps the secondary pVLAN to the Layer 3 primary VLAN interface for routing

show interfaces [type slot/port] switchport

Displays the switchport configuration of the interface

show interfaces [type slot/port]trunk

Displays the trunk configuration of the interface

show vlan

Displays VLAN information

show vlan private-vlan

Displays the pVLAN configuration

show vtp status

Verifies the VTP configuration

shutdown/no shutdown

Shuts down or enables an interface

switchport access vlan vlan-id

Specifies the default VLAN, which is used if the interface stops trunking

switchport mode access

Puts the interface into permanent nontrunking mode and negotiates to convert the link into a nontrunk link

switchport mode private-vlan {host | promiscuous}

Configures an interface as a pVLAN host port or a promiscuous port

switchport mode trunk

Puts the interface into permanent trunking mode and negotiates to convert the link into a trunk link

switchport nonegotiate

Turns off DTP negotiation

switchport private-vlan host-association primary_vlan_ID secondary_vlan_ID

Associates a Layer 2 interface with a pVLAN

switchport trunk allowed vlan [remove] vlan-list

Configures the list of VLANs allowed on the trunk

switchport trunk encapsulation dot1q

Specifies 802.1Q encapsulation on the trunk link

switchport trunk encapsulation isl

Specifies ISL encapsulation on the trunk link

telnet ip-address

Starts a terminal-emulation program that permits you to access network devices remotely over the network

vlan database

Enters VLAN configuration mode

vlan vlan-id

Creates a VLAN in either VLAN database or configuration mode

vtp domain domain-name

Sets the VTP domain name in either the VLAN database or configuration mode

vtp mode [ client | server | transparent ]

Sets the VTP mode

Task 1: Create a VTP Management Domain

  1. Enter privileged EXEC mode using the enable command, and then enter global configuration mode using the configure terminal command.

  2. From global configuration mode, configure the Building Access submodule switches, AS1 and AS2:

    • Use the vtp domain domain-name command to configure the VTP domain name as “cisco.”

    • Use the vtp mode command to configure the switches as VTP clients.

    • Use the vtp password command to configure a VTP domain password.

    Also from global configuration mode, configure the Distribution layer switches, DS1 and DS2, with the same commands, except configure them as VTP servers.

    as1(config)#vtp domain cisco
    Changing VTP domain name from NULL to cisco
    as1(config)#vtp password cisco
    as1(config)#vtp mode client
    Setting device to VTP CLIENT mode.
  3. Do the same configuration on the Building Distribution submodule switches DS1 and DS2, but configure them as server.

    ds1(config)#vtp domain cisco
    Changing VTP domain name from NULL to cisco
    ds1(config)#vtp password cisco

Task 2: Configure Trunking

  1. Connect to your Building Access submodule switch AS1.

  2. Configure the interface on the Building Access submodule switches, AS1 and AS2, as 802.1Q trunk ports.

    Note

    If you need to configure the encapsulation type to dot-1Q on a switch that defaults to ISL, use the switchport trunk encapsulation dot1q command to configure the port as an 802.1Q trunk.

    The Catalyst 2950XL supports 802.1Q encapsulation only, and the Catalyst 3550XL/3560 supports both ISL and 802.1Q encapsulation.

    as1(config)#interface GigabitEthernet 1/1
    as1(config-if)#switchport
    as1(config-if)#switchport trunk encapsulation dot1q
    as1(config-if)#switchport mode trunk

    Note

    Use the switchport command to configure interfaces as Layer 2 interfaces in Cisco IOS. The Catalyst 6500 family of switches running Cisco IOS defaults to Layer 3 interfaces, whereas the Catalyst 2950, 3550, 3560, and 4500 default interface operation is Layer 2. Before applying trunking to interfaces on the Catalyst 6500 or to interfaces configured as Layer 3 interfaces, use the switchport command to force the interface into Layer 2 operation.

  3. Configure the Distribution switches DS1 and DS2 by repeating the preceding step.

    ds1(config)#interface GigabitEthernet 1/1
    ds1(config-if)#switchport
    ds1(config-if)#switchport trunk encapsulation dot1q
    ds1(config-if)#switchport mode trunk
    ds1(config-if)#end

Task 3: Configure VLANs

  • Configure VLANs 10, 20, and 30.

    ds1#configure terminal
    09:04:30: %SYS-5-CONFIG_I: Configured from console by console
    Enter configuration commands, one per line.  End with CNTL/Z.
    ds1(config)#vlan 10,20,30
    ds1(config-vlan)#

Task 4: Assign VLANs with Ports on Your Switch

  1. Assign your PC port to its primary VLAN by using the switchport access vlan vlan-id command while in interface configuration mode.

    as1(config)#interface FastEthernet 4/1
    as1(config-if)#switchport
    as1(config-if)#switchport mode access
    as1(config-if)#switchport access vlan 10
    as1(config-if)#exit
  2. Verify that your PC has connectivity with devices in the right VLAN by issuing a ping command.

Task 5: Add a New Switch to the Existing Network

To add the new switch, DS-new, to the existing network, as shown with the dotted lines in Figure 4-19, perform the steps that follow. Make sure the interfaces connecting to existing network are shut down before physically connecting the new switch.

  1. Change the VTP mode to transparent (or make it part of a temporary domain).

    DS-new(config)#vtp mode transparent
    Setting device to VTP TRANSPARENT mode.
  2. Configure the DS-new switch ports connected to the other switch as trunks ports with the static on setting and force 802.1Q encapsulation. Note that if the link partner is configured for dynamic trunking, the port may have already negotiated to a trunk.

    DS-new(config)#interface gigabitEthernet 1/1
    DS-new(config-if)#switchport
    DS-new(config-if)#switchport trunk encapsulation dot1q
    DS-new(config-if)#switchport mode trunk
    DS-new(config-if)#no shutdown
  3. Configure the VTP mode to participate as client in the VTP domain.

    DS-new(config)#vtp domain cisco
    Changing VTP domain name from NULL to cisco
    DS-new(config)#vtp mode client
    Setting device to VTP CLIENT mode.

Task 6: Verify the VLAN and VTP Status

Use the show running-config interface mod/port commands to verify the interface config, show vtp status to verify the VTP configuration, and show vlan to verify the VLAN configuration:

as1#show running-config interface FastEthernet 4/1
Building configuration...
Current configuration : 141 bytes
!
interface FastEthernet4/1
 no ip address
 no logging event link-status
 switchport
 switchport access vlan 10
 switchport mode access
end

as1#show running-config interface GigabitEthernet  1/1
Current configuration : 154 bytes
!
interface GigabitEthernet1/1
 no ip address
 no logging event link-status
 switchport
 switchport trunk encapsulation dot1q
 switchport mode trunk
end
as1#show vtp status
VTP Version                      : 2
Configuration Revision           : 0
Maximum VLANs supported locally  : 1005
Number of existing VLANs         : 6
VTP Operating Mode               : Client
VTP Domain Name                  : cisco
VTP Pruning Mode                 : Disabled
VTP V2 Mode                      : Disabled
VTP Traps Generation             : Disabled
MD5 digest                       : 0x8C 0x59 0x58 0x5C 0xF6 0x03 0x51 0x9E
Configuration last modified by  0.0.0.0 at 0-0-00 00:00:00
as1#
as1#show vlan
VLAN Name                             Status     Ports
---- -------------------------------- --------- -------------------------------
1    default                          active     Gi1/1
10   VLAN0010                         active     Fa4/1
20   VLAN0020                         active
30   VLAN0030                         active
1002 fddi-default                     act/unsup
1003 token-ring-default               act/unsup
1004 fddinet-default                  act/unsup
1005 trnet-default                    act/unsup
VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1    enet  100001     1500  -      -      -        -    -        0      0
10   enet  100010     1500  -      -      -        -    -        0      0
20   enet  100020     1500  -      -      -        -    -        0      0
30   enet  100030     1500  -      -      -        -    -        0      0
1002 fddi  101002     1500  -      -      -        -    -        0      0
1003 tr    101003     1500  -      -      -        -    -        0      0
1004 fdnet 101004     1500  -      -      -        ieee -        0      0
1005 trnet 101005     1500  -      -      -        ibm  -        0      0

Remote SPAN VLANs
------------------------------------------------------------------------------

Primary Secondary Type              Ports
------- --------- ----------------- ------------------------------------------

Task 7: Configure pVLANs

For this task, the first step is to configure the VTP mode to transparent because pVLANs are supported only in VTP transparent mode:

  1. Configure the VTP mode to transparent to configure pVLANs.

    DS1(config-vlan)#vtp mode transparent
  2. Create a primary pVLAN 100, a community pVLAN 101, and an isolated pVLAN 102 on switches AS1 and DS1. In addition, associate the secondary pVLANs to the primary pVLAN.

    DS1(config-vlan)#vlan 100
    DS1(config-vlan)#private-vlan primary
    DS1(config-vlan)#private-vlan association 101-102
    DS1(config-vlan)#vlan 101
    DS1(config-vlan)#private-vlan community
    DS1(config-vlan)#vlan 102
    DS1(config-vlan)#private-vlan isolated
  3. Configure an interface VLAN 100 for the primary pVLAN, and map the secondary pVLAN 101.

    DS1(config)#interface vlan 100
    DS1(config-if)#no shutdown
    DS1(config-if)#private-vlan mapping 101,102
  4. Configure the Host’s A interface as a member of pVLAN 101 and the Host’s B interface as a member of pVLAN 102 on switch DS1.

    DS1(config)#interface fastEthernet 2/3
    DS1(config-if)#description Host_A
    DS1(config-if)#switchport
    DS1(config-if)#switchport mode private-vlan host
    DS1(config-if)#switchport private-vlan host-association 100 101
    DS1(config-if)#no shutdown
    DS1(config-if)# interface fastEthernet 2/4
    DS1(config-if)#description Host_B
    DS1(config-if)#switchport
    DS1(config-if)#switchport mode private-vlan host
    DS1(config-if)#switchport private-vlan host-association 100 102
    DS1(config-if)#no shutdown
  5. Verify the Private VLAN configuration, and make sure Host A is not able to send an ICMP ping to Host B.

    DS1#show vlan private-vlan
    Primary Secondary Type              Ports
    ------- --------- --------- ------------------------------------------
    100     101       community          Fa2/1, Fa2/3
    100     102       isolated           Fa2/2, Fa2/4

Review Questions

For multiple-choice questions, there might be more than one correct answer.

1

True or False: It is important to have the same native VLAN on both switch link partners for ISL trunking.

2

True or False: The Cisco Catalyst 6500 supports up to 1024 VLANs in the most recent software releases.

3

True or False: When removing the native VLAN from a trunk port, CDP, Port Aggregation Protocol (PaGP), and DTP then use the lowest-numbered VLAN to send traffic.

4

True or False: Hosts that are members of different community VLANs are able to communicate to each other but not to members of isolated VLANs.

5

True or False: In VTP client mode, switches can add and delete VLANs.

6

True or False: Token Ring support is available in VTP version 1.

Questions 7 through 9 are based on the configuration in Example 4-31.

Example 4-31. Configuration Example for Questions 7 through 9

Catalyst6500-IOS#show run interface gigabitEthernet 3/9
Building configuration...

Current configuration : 137 bytes
!
interface GigabitEthernet3/9
 mtu 9216
 no ip address
 switchport
 switchport access vlan 5
 switchport trunk encapsulation dot1q
end

7

If the interface in Example 4-31 negotiates trunking, what would be the Native VLAN?

  1. VLAN 1

  2. VLAN 5

  3. VLAN 9216

  4. There would be no Native VLAN if the port negotiated trunking.

8

Under what condition can the interface in Example 4-31 negotiate ISL trunking?

  1. If the port is a member of an EtherChannel.

  2. If the link partner defaults to ISL trunking for negotiated ports.

  3. If the link partner is configured for trunking in the on mode.

  4. The interface cannot negotiate trunking because it is configured statically for 802.1Q trunking.

9

Which statements are true in regards to the configuration of the interface in Example 4-31?

  1. The interface is a member of VLAN 5 and may negotiate to a trunk port.

  2. The interface may negotiate to an ISL trunk with a Native VLAN of 5.

  3. The interface may negotiate to an 802.1Q trunk and operate with a Native VLAN of 1.

  4. The interface will not negotiate to a trunk port because it is configured in access VLAN 5.

  5. If a host workstation is connected to the interface, it must be configured for trunking.

Questions 10 through 12 are based on the configuration in Example 4-32.

Example 4-32. Configuration Example for Questions 10 Through 12

svs-san-6509-2#show interfaces gigabitEthernet 3/9 switchport
Name: Gi3/9
Switchport: Enabled
Administrative Mode: dynamic auto
Operational Mode: down
Administrative Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 2 (VLAN0002)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL

10

What is trunk Native VLAN based on configuration Example 4-32?

  1. VLAN 1

  2. VLAN 2

  3. VLAN 5

  4. There would be no Native VLAN if the port negotiated trunking.

11

Based on the configuration Example 4-32, what statement is true if the link partner (peer switch) is configured for the dynamic trunking mode?

  1. The interface cannot negotiate to a trunk port because it is configured for dot1q encapsulation.

  2. The interface cannot negotiate to a trunk port because the Native VLAN and access VLANs are mismatched.

  3. The interface can negotiate to a trunk port if the peer is configured for the dynamic desirable trunking mode.

  4. The interface can negotiate to a trunk port if access VLAN is the same on both sides.

12

What is the interface’s access mode VLAN in configuration Example 4-32?

  1. VLAN 1

  2. VLAN 2

  3. VLAN 5

  4. VLAN 1001

13

How does implementing VLANs help improve the overall performance of the network?

  1. By isolating problem employees

  2. By constraining broadcast traffic

  3. By grouping switch ports into logical communities

  4. By forcing the Layer 3 routing process to occur between VLANs

14

What are two advantages of using local VLANs over end-to-end VLANs? (Choose two.)

  1. Eases anagement

  2. Eliminates the need for Layer 3 devices

  3. Allows for a more deterministic network

  4. Groups users by logical commonality

  5. Keeps users and resources on the same VLAN

15

Which prompt indicates that you are in VLAN database configuration mode of Cisco IOS?

  1. Switch#

  2. Switch(vlan)#

  3. Switch(config)#

  4. Switch(config-vlan)#

16

Which switch port mode unconditionally sets the switch port to Access mode regardless of any other DTP configurations?

  1. Access

  2. Nonegotiate

  3. Dynamic auto

  4. Dynamic desirable

17

What information is contained in the FCS of an ISL-encapsulated frame?

  1. CRC calculation

  2. Header encapsulation

  3. ASIC implementation

  4. Protocol-independence

18

802.1Q uses an internal tagging mechanism, where a tag is inserted after the _____ field.

  1. Type

  2. SA

  3. Data

  4. CRC

19

Which command correctly configures a port with ISL encapsulation in Cisco IOS?

  1. Switch(config-if)#switchport mode trunk isl

  2. Switch(config-if)#switchport mode encapsulation isl

  3. Switch(config-if)#switchport trunk encapsulation isl

  4. Switch(config-if)#switchport mode trunk encapsulation isl

20

Which command correctly sets the native VLAN to VLAN 5?

  1. switchport native vlan 5

  2. switchport trunk native 5

  3. switchport native trunk vlan 5

  4. switchport trunk native vlan 5

21

If the Layer 2 interface mode on one link partner is set to dynamic auto, a trunk will be established if the link partner is configured for which two types of interface modes in Cisco IOS? (Choose two.)

  1. Trunk

  2. Access

  3. Nonegotiate

  4. Dynamic auto

  5. Dynamic desirable

22

What is the default VTP mode for a Catalyst switch?

  1. Client

  2. Access

  3. Server

  4. Transparent

23

When is a consistency check performed with VTP version 2?

  1. When information is read from NVRAM

  2. When the digest on a received VTP message is correct

  3. When new information is obtained from a VTP message

  4. When you enter new information through the CLI or SNMP

24

Which command correctly sets the VTP version to version 1 in Cisco IOS global configuration mode?

  1. vtp v1-mode

  2. vtp v2-mode

  3. no vtp version

  4. no vtp version 2

25

Which of the following are valid VTP version 1 and 2 modes? (Check all that apply.)

  1. Primary server mode

  2. Server mode

  3. Client mode

  4. Transparent mode

26

After you complete the VTP configuration, which command should you use to verify your configuration?

  1. show vtp status

  2. show vtp counters

  3. show vtp statistics

  4. show vtp status counters

27

What command might correct a problem with incorrect VTP passwords?

  1. password vtp 0

  2. clear vtp password

  3. clear password vtp

  4. vtp password password_string

28

What is the purpose of pruning?

29

What are the advantages of pVLANs?

30

Suppose you have two workstations, A and B. If both workstations A and B are members of the same community pVLAN, can they communicate to each other? If they are members of different community pVLANs, can they communicate? If they are members of the same isolated pVLAN, can they communicate? Can they both communicate to the same promiscuous ports? Explain all your answers.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.188.146.77