Top Banner
VLANs, Trunking, VTP, Port Aggregation Part 2 CIS 187 Multilayer Switched Networks CCNP SWITCH Rick Graziani Spring 2011
129
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: R.G.-SWITCH-2-VLANs-Part2

VLANs, Trunking, VTP, Port AggregationPart 2

CIS 187 Multilayer Switched NetworksCCNP SWITCHRick GrazianiSpring 2011

Page 2: R.G.-SWITCH-2-VLANs-Part2

2

Storing VLAN information

Storage of VLAN information is model dependent. Cisco: “The memory location name where the vlan.dat file is stored varies

from device to device. Refer to the respective product documentation before you issue the copy command.”

VLAN information for 29xx and 35xx switches is automatically stored in vlan.dat file in flash. VTP information: Domain Name, Configuration Revision Number VLAN information (configured or via VTP): VLAN Number, VLAN Name

DLS1(config)# vtp domain WestDLS1(config)# vlan 10DLS1(config-vlan)# name WestSalesDLS1(config-vlan)# vlan 11DLS1(config-vlan)# name WestEng

vlan.dat

Page 3: R.G.-SWITCH-2-VLANs-Part2

3

Storing VLAN information

Interface commands are stored in running-config and will need to be saved to startup-config in NVRAM

DLS1(config)# inter fa 0/1DLS1(config-if)#switchport mode accessDLS1(config-if)# switchport access vlan 10DLS1(config-if)# copy running-config startup-config

vlan.datrunning-config

startup-config

Page 4: R.G.-SWITCH-2-VLANs-Part2

4

Storing VLAN information - No longer recommendedDLS1# vlan database% Warning: It is recommended to configure VLAN from config mode,

as VLAN database mode is being deprecated. Please consult user

documentation for configuring VTP/VLAN in config mode.

DLS1(vlan)# exitAPPLY completed.

Exiting....

DLS1#

Note: The vlan database command is no longer recommended by Cisco.

One less thing we need to remember!

Page 5: R.G.-SWITCH-2-VLANs-Part2

VLAN Trunking Protocol

Page 6: R.G.-SWITCH-2-VLANs-Part2

VLAN Trunking Protocol (VTP)

Cisco-proprietary protocol Automates the propagation of VLAN information between switches via

trunk links. Minimizes misconfigurations and configuration inconsistencies. VTP domains define sets of interconnected switches sharing the same

VTP configuration.

Page 7: R.G.-SWITCH-2-VLANs-Part2

VTP ModesMode DescriptionClient • Cannot create, change, or delete VLANs on command-line interface

(CLI).• Forwards advertisements to other switches.• Synchronizes VLAN configuration with latest information received from

other switches in the management domain.• Does not save VLAN configuration in nonvolatile RAM (NVRAM).

Server • Can create, modify, and delete VLANs.• Sends and forwards advertisements to other switches.• Synchronizes VLAN configuration with latest information received from

other switches in the management domain.• Saves VLAN configuration in NVRAM.

Transparent • Can create, modify, and delete VLANs only on the local switch.• Forwards VTP advertisements received from other switches in the same

management domain.• Does not synchronize its VLAN configuration with information received

from other switches in the management domain.• Saves VLAN configuration in NVRAM.

Page 8: R.G.-SWITCH-2-VLANs-Part2

VTP Versions

Three VTP versions: V1, V2, V3. Versions are not interoperable

V2 supports token ring VLANs but V1 does not

Page 9: R.G.-SWITCH-2-VLANs-Part2

9

VTP version 3

Not part of CCNP SWITCH Only available on CatOS no IOS “With 12.2(33)SXI VTP version 3 will be supported by IOS, closing

the feature gap in this area compared to CAT OS. VTP version 3 will be available within all IOS feature sets. “

Features: Supports ISL VLAN range from 1 to 1001, Supports 802.1Q VLAN range up to 4095. Can transfer information regarding Private VLAN (PVLAN)

structures. http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/

solution_guide_c78_508010.html

Page 10: R.G.-SWITCH-2-VLANs-Part2

VTP Messages

Page 11: R.G.-SWITCH-2-VLANs-Part2

VTP Message Types

Summary Advertisements Subset Advertisements Advertisement Requests

Page 12: R.G.-SWITCH-2-VLANs-Part2

VTP Summary Advertisements

By default, Catalyst switches issue summary advertisements in 5-minute increments.

Informs adjacent switches of: • VTP domain name • Configuration revision number

When the switch receives a summary advertisement packet, the switch compares the VTP domain name to its own VTP domain name.

• If the name is different, the switch ignores the packet. • If the name is the same, the switch then compares the configuration

revision to its own revision. • If its own configuration revision is higher or equal, the packet is ignored.

• If it is lower, an advertisement request is sent.

Page 13: R.G.-SWITCH-2-VLANs-Part2

VTP Subset Advertisements

When you add, delete, or change a VLAN: The VTP server where the changes are made increments the configuration

revision and issues a summary advertisement. One or more subset advertisements follow the summary advertisement.

• Contains a list of VLAN information.

Page 14: R.G.-SWITCH-2-VLANs-Part2

VTP Advertisement Requests

A switch issues a VTP advertisement request in these situations: The switch has been reset. The VTP domain name has been changed. The switch has received a VTP summary advertisement with a

higher configuration revision than its own. Upon receipt of an advertisement request, a VTP device sends a

summary advertisement. One or more subset advertisements follow the summary

advertisement.

Page 15: R.G.-SWITCH-2-VLANs-Part2

15

VTP Messages

VTP Summary advertisements By default, sent every five-minutes. Inform adjacent switches of the current VTP domain name and the configuration

revision number. Receiving switch compares the VTP domain name to its own VTP domain name.

If the name is different, the switch simply ignores the packet. Same or Different?

If the name is the same, the switch then compares the configuration revision to its own revision. If its own configuration revision is higher or equal, the packet is ignored.

Own Config Rev higher or equal than sender’s? Otherwise, it is lower and a VTP Advertisement Request is sent.

VTP Domain = CiscoVTP Mode = ServerConfig Rev = 0VLANs = 1

VTP Domain = CiscoVTP Mode = ServerConfig Rev = 2VLANs = 1, 2, 3

Same

No, it is lower

NOTE: Whenever you add, delete, or change (name) a VLAN on a VTP server, it increments the configuration revision number and a summary advertisement is sent.

Summary

Subset

Page 16: R.G.-SWITCH-2-VLANs-Part2

16

VTP Messages

VTP Subset advertisements Sent in response to a VTP Advertisement Request Also, sent whenever there is a change to VLAN information on a VTP

server. First the server sends a VTP Summary Advertisement Then the server sends a VTP Subset Advertisement

One or several subset advertisements follow the summary advertisement.

A subset advertisement contains a list of VLAN information.

VTP Domain = CiscoVTP Mode = ServerConfig Rev = 0VLANs = 1

VTP Domain = CiscoVTP Mode = ServerConfig Rev = 0VLANs = 1

22, 3

Summary

Subset

22, 3

Page 17: R.G.-SWITCH-2-VLANs-Part2

17

VTP Domain = nullVTP Mode = ServerConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = ServerConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = ServerConfig Rev = 0VLANs = 1

No Trunks Configured Let’s take a look at VTP

Messages and Server, Client and Transparent Switches.

By default all switches are VTP Servers.

Page 18: R.G.-SWITCH-2-VLANs-Part2

18

VTP Domain = nullVTP Mode = ServerConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = TransparentConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = ClientConfig Rev = 0VLANs = 1

Switch B is now a Client Switch C is now Transparent VLAN servers maintain a list of all

VLANs in NVRAM. Client cannot add, delete or

rename VLANs. Client does not store VLAN

information in NVRAM. If a client reboots it loses VLAN

information and relying on a VTP server to restore the information.

Page 19: R.G.-SWITCH-2-VLANs-Part2

19

VTP Domain = nullVTP Mode = ServerConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = TransparentConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = ClientConfig Rev = 0VLANs = 1

Transparent mode switches must have their VLANs configured manually.

Does not participate in VTP or advertise their VLANs.

Ideal for switches with VLANs which should be local to that switch.

Page 20: R.G.-SWITCH-2-VLANs-Part2

20

VTP Domain = nullVTP Mode = ServerConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = TransparentConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = ClientConfig Rev = 0VLANs = 1

VTP server: Domain Name configured as

Cisco VLANs 2 and 3 added Config Rev increased to 2

(one for each VLAN added)

Cisco

2, 32

Page 21: R.G.-SWITCH-2-VLANs-Part2

21

VTP Domain = nullVTP Mode = TransparentConfig Rev = 0VLANs = 1

VTP Domain = nullVTP Mode = ClientConfig Rev = 0VLANs = 1

VTP works only over trunk links. Switch A (Server) sends summary

advertisement over trunk links on VLAN 1 Includes Domain and Revision Number Multicast 01-00-0C-CC-CC-CC

Switch B updates its Domain Because of the higher revision number in

the Summary, B replies with Advertisement Request

Switch A sends a VTP Subset advertisementSwitch B updates its VLAN configuration revision number and VLANs. (May be preceeded by another Summary advertisement.)

VTP Domain = CiscoVTP Mode = ServerConfig Rev = 2VLANs = 1, 2, 3

Cisco

1, 2, 32

Page 22: R.G.-SWITCH-2-VLANs-Part2

22

VTP Domain = nullVTP Mode = TransparentConfig Rev = 0VLANs = 1

VTP Domain = CiscoVTP Mode = ClientConfig Rev = 2VLANs = 1, 2, 3

VTP advertisements sent to Transparent switch. (Shown together)

Switch C does not make any changes based on these advertisements.

Now, lets say Switch C is configured with: Domain name Cisco VLANs 2, 3, 4, 5, 6

Even though in same domain, Switch C does not advertise these VLANs to other switches.

The Configuration Revision number remains at 0 even when VLAN configuration is changed.

Transparent switches will relay VTP messages it receives to other switches if it is in the same domain or in a null domain (let take a look…).

VTP Domain = CiscoVTP Mode = ServerConfig Rev = 2VLANs = 1, 2, 3

Cisco

1, 2, 3, 4, 5, 6

Page 23: R.G.-SWITCH-2-VLANs-Part2

23

VTP Domain = CiscoVTP Mode = TransparentConfig Rev = 0VLANs = 1, 2, 3, 4, 5, 6

VTP Domain = CiscoVTP Mode = ClientConfig Rev = 2VLANs = 1, 2, 3

VTP Client Switch D added to the network. Switch A (Server) sends summary advertisement

over trunk links on VLAN 1 Switch D updates its Domain

Replies with Advertisement Request Switch A sends a VTP Subset advertisement Switch

D updates its VLAN configuration revision number and VLANs

VTP Domain = CiscoVTP Mode = ServerConfig Rev = 2VLANs = 1, 2, 3

VTP Domain = nullVTP Mode = ClientConfig Rev = 0VLANs = 1

Relays VTP Advertisements

No changes to Rev or VLANs

Cisco

1, 2, 32

Page 24: R.G.-SWITCH-2-VLANs-Part2

Understanding and Troubleshooting Common VTP Issues

Page 25: R.G.-SWITCH-2-VLANs-Part2

25

VTP Domain = WestVTP Mode = ServerConfig Rev = 3VLANs = 1, 20, 21, 22

VTP Domain = WestVTP Mode = ServerConfig Rev = 3VLANs = 1, 10, 11, 12

Both switches are VTP Servers and in the same Domain, but different VLAN information. Let’s see what happens when trunking is enabled between the switches…

We both have the same Config Rev number so no

changes

We both have the same Config Rev number so no

changes

, 30

When two switches with same Domain Name and same Configuration Revision Numbers exchange VTP information: No change

If Switch A adds a new VLAN, VLAN 30, Config Rev is increased by 1. Switch A will send VTP information to Switch B who will synchronize its

VLAN information with Switch A, losing current “local” VLANs

4 410, 11, 12, 30

Page 26: R.G.-SWITCH-2-VLANs-Part2

26

Example: Using DLS1 (Switch A) and DLS2 (Switch B)DLS1(config)# inter range fa 0/1 - 24DLS1(config-if-range)# switchport mode dynamic auto

DLS2(config)# inter range fa 0/1 - 24DLS2(config-if-range)# switchport mode dynamic autoDLS1# show inter trunk

DLS1#

Note: Because Pod2 2690’s and 3560’s are incorrectly defaulting to dynamic desirable they will trunk by default, which we do not want in this example.

This was also done on ALS1 and ALS2 to prevent any trunking.

Page 27: R.G.-SWITCH-2-VLANs-Part2

27

When DLS1 gets a higher Config Rev Number…

DLS1# show vlan

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

Fa0/5, Fa0/6, Fa0/9, Fa0/13

Fa0/14, Fa0/15, Fa0/16, Fa0/17

Fa0/18, Fa0/19, Fa0/20, Fa0/21

Fa0/22, Fa0/23, Fa0/24, Gi0/1

Gi0/2

1002 fddi-default active

1003 token-ring-default active

1004 fddinet-default active

1005 trnet-default active

Default VLANs

Page 28: R.G.-SWITCH-2-VLANs-Part2

28

When DLS1 gets a higher Config Rev Number…

DLS1#show vtp status

VTP Version : 2

Configuration Revision : 0

Maximum VLANs supported locally : 1005

Number of existing VLANs : 5

VTP Operating Mode : Server

VTP Domain Name :

VTP Pruning Mode : Disabled

VTP V2 Mode : Disabled

VTP Traps Generation : Disabled

MD5 digest : 0x57 0xCD 0x40 0x65 0x63 0x59 0x47 0xBD

Configuration last modified by 0.0.0.0 at 0-0-00 00:00:00

Local updater ID is 0.0.0.0 (no valid interface found)

DLS1#

Default VTP information: Configuration Revision Number = 0

Increased by 1 whenever VLAN is added or deleted VTP Mode = Server VTP Domain Name = <blank> (null)

Page 29: R.G.-SWITCH-2-VLANs-Part2

29

When DLS1 gets a higher Config Rev Number…DLS2# show vlan

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Gi0/1, Gi0/2

1002 fddi-default active

1003 token-ring-default active

1004 fddinet-default active

1005 trnet-default active

DLS2# show vtp statusVTP Version : 2

Configuration Revision : 0

Maximum VLANs supported locally : 1005

Number of existing VLANs : 5

VTP Operating Mode : Server

VTP Domain Name :

<output omitted>

Same on DLS2.

Page 30: R.G.-SWITCH-2-VLANs-Part2

30

When DLS1 gets a higher Config Rev Number…

DLS1(config)# vtp domain WestDLS1(config)# vlan 10DLS1(config-vlan)# name WestSalesDLS1(config-vlan)# vlan 11DLS1(config-vlan)# name WestEngDLS1(config-vlan)# vlan 12DLS1(config-vlan)# name WestAdmin

DLS1# show vtp statusVTP Version : 2Configuration Revision : 3Maximum VLANs supported locally : 1005Number of existing VLANs : 8VTP Operating Mode : ServerVTP Domain Name : West<output omitted>

Add VTP Domain Name and configure VLANs Configuration Revision changed to 3 (one for each VLAN) Remember, no trunking (yet)

Page 31: R.G.-SWITCH-2-VLANs-Part2

31

When DLS1 gets a higher Config Rev Number…

DLS1# show vlan

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Gi0/1, Gi0/2

10 WestSales active

11 WestEng active

12 WestAdmin active

Verified.

Page 32: R.G.-SWITCH-2-VLANs-Part2

32

When DLS1 gets a higher Config Rev Number…

DLS2(config)# vtp domain WestDLS2(config)# vlan 20DLS2(config-vlan)# name WestAcctDLS2(config-vlan)# vlan 21DLS2(config-vlan)# WestMngtDLS2(config-vlan)# name WestMngtDLS2(config-vlan)# vlan 22DLS2(config-vlan)# name WestManuf

DLS2# show vtp statusVTP Version : 2Configuration Revision : 3Maximum VLANs supported locally : 1005Number of existing VLANs : 8VTP Operating Mode : ServerVTP Domain Name : West<output omitted>

Now on DLS2: Add VTP Domain Name and configure different VLANs Configuration Revision changed to 3 Still no trunking

Page 33: R.G.-SWITCH-2-VLANs-Part2

33

When DLS1 gets a higher Config Rev Number…

DLS2# show vlan

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Gi0/1, Gi0/2

20 WestAcct active

21 WestMngt active

22 WestManuf active

Verified.

Page 34: R.G.-SWITCH-2-VLANs-Part2

34

When DLS1 gets a higher Config Rev Number…

DLS1(config)# inter range fa 0/11 - 12DLS1(config-if-range)# switchport trunk encap dot1qDLS1(config-if-range)# switchport mode trunk

DLS1# show inter trunk

Port Mode Encapsulation Status Native vlan

Fa0/11 on 802.1q trunking 1

Fa0/12 on 802.1q trunking 1

Trunking configured between DLS1 and DLS2. VTP messages can now be sent but no changes because

Configuration Revision numbers are the same.

Page 35: R.G.-SWITCH-2-VLANs-Part2

35

When DLS1 gets a higher Config Rev Number…

DLS1# show vtp statusVTP Version : 2

Configuration Revision : 3

Maximum VLANs supported locally : 1005

Number of existing VLANs : 8

VTP Operating Mode : Server

VTP Domain Name : West

<output omitted>

DLS2# show vtp statusVTP Version : 2

Configuration Revision : 3

Maximum VLANs supported locally : 1005

Number of existing VLANs : 8

VTP Operating Mode : Server

VTP Domain Name : West

<output omitted>

Configuration Revision still 3 Number of existing VLANs (known by each switch) still 8

Page 36: R.G.-SWITCH-2-VLANs-Part2

36

When DLS1 gets a higher Config Rev Number…DLS1# show vlanVLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Fa0/23, Fa0/24, Gi0/1, Gi0/2

10 WestSales active

11 WestEng active

12 WestAdmin active

DLS2# show vlanVLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Fa0/23, Fa0/24, Gi0/1, Gi0/2

20 WestAcct active

21 WestMngt active

22 WestManuf active

Verify that there are no DLS2 VLANs on DLS1. Verify that there are no DLS1 VLANs on DLS2.

Page 37: R.G.-SWITCH-2-VLANs-Part2

37

When DLS1 gets a higher Config Rev Number…

DLS1(config)# vlan 30DLS1(config-vlan)# name Guest

DLS1# show vtp statusVTP Version : 2

Configuration Revision : 4

Maximum VLANs supported locally : 1005

Number of existing VLANs : 9

VTP Operating Mode : Server

VTP Domain Name : West

<output omitted>

VLAN 30 added on DLS1. Configuration Revision increased by 1 to 4. DLS1 now has the higher Configuration Revision number between the

two servers (the highest in the Domain).

Page 38: R.G.-SWITCH-2-VLANs-Part2

38

When DLS1 gets a higher Config Rev Number…

DLS1# show vlan

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Fa0/23, Fa0/24, Gi0/1, Gi0/2

10 WestSales active

11 WestEng active

12 WestAdmin active

30 Guest active

Verified.

Page 39: R.G.-SWITCH-2-VLANs-Part2

39

When DLS1 gets a higher Config Rev Number…

DLS2# show vtp statusVTP Version : 2

Configuration Revision : 4

Maximum VLANs supported locally : 1005

Number of existing VLANs : 9

VTP Operating Mode : Server

VTP Domain Name : West

<output omitted>

DLS2 receives VTP update from DLS1 with higher Configuration Revision Number.

DLS2 synchronizes its VLAN database with DLS1’s information including Configuration Revision Number and VLAN information.

Page 40: R.G.-SWITCH-2-VLANs-Part2

40

When DLS1 gets a higher Config Rev Number…

DLS2# show vlanVLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>Fa0/23, Fa0/24, Gi0/1, Gi0/2

20 WestAcct active 21 WestMngt active 22 WestManuf active

DLS2# show vlanVLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>Fa0/23, Fa0/24, Gi0/1, Gi0/2

10 WestSales active 11 WestEng active 12 WestAdmin active 30 Guest active

DLS2 lost previous VLANs 20, 21, and 22. DLS2’s VLAN database overwritten with DLS1’s information. Good news: Both Servers both in sync (identical) so any changes will mean the VLAN

information is the same on both.

Previous VLANS

Current VLANS sync’d with DLS1

Page 41: R.G.-SWITCH-2-VLANs-Part2

41

When DLS1 gets a higher Config Rev Number…

DLS2(config)# vlan 20 DLS2(config-vlan)# name WestAcctDLS2(config-vlan)# vlan 21DLS2(config-vlan)# name WestMngtDLS2(config-vlan)# vlan 22DLS2(config-vlan)# name WestManuf

DLS2# show vtp statusVTP Version : 2

Configuration Revision : 7

Maximum VLANs supported locally : 1005

Number of existing VLANs : 12

VTP Operating Mode : Server

VTP Domain Name : West

To correct this we need to add the VLANs back to DLS2. DLS2 will send VTP update to DLS1 so VLAN information will be the

same.

Page 42: R.G.-SWITCH-2-VLANs-Part2

42

When DLS1 gets a higher Config Rev Number…

DLS2# show vlan

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Fa0/23, Fa0/24, Gi0/1, Gi0/2

10 WestSales active

11 WestEng active

12 WestAdmin active

20 WestAcct active

21 WestMngt active

22 WestManuf active

30 Guest active

Verified.

Page 43: R.G.-SWITCH-2-VLANs-Part2

43

When DLS1 gets a higher Config Rev Number…DLS1# show vtp statusVTP Version : 2

Configuration Revision : 7

Maximum VLANs supported locally : 1005

Number of existing VLANs : 12

VTP Operating Mode : Server

VTP Domain Name : West

<output omittd>

DLS1# show vlanVLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Fa0/23, Fa0/24, Gi0/1, Gi0/2

10 WestSales active

11 WestEng active

12 WestAdmin active

20 WestAcct active

21 WestMngt active

22 WestManuf active

30 Guest active

DLS1 receives VTP update and updates VLAN information including Configuration Revision number.

Domain is still in sync.

Page 44: R.G.-SWITCH-2-VLANs-Part2

44

What happens when Client/Server enters with higher Configuration Revision number?

Both switches are in the same domain. Switch C can be Client OR Server Switch C has Higher Configuration Revision number Even if Switch C is a Client when enters VTP domain it will overwrite

DLS1’s VLAN information because it has higher Configuration Revision number.

VTP Domain = WestVTP Mode = Client (or Server)Config Rev = 13VLANs = 1, 20, 21, 22, 30

VTP Domain = WestVTP Mode = ServerConfig Rev = 10VLANs = 1, 10, 11, 12, 20, 21, 22, 30

13

Page 45: R.G.-SWITCH-2-VLANs-Part2

45

Client/Server enters with Higher RevisionDLS1(config)# inter fa 0/1DLS1(config-if)# switchport mode accessDLS1(config-if)# switchport access vlan 10DLS1(config-if)# exitDLS1(config)# inter fa 0/2DLS1(config-if)# switchport mode accessDLS1(config-if)# switchport access vlan 11DLS1# show vlanVLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6

<output omitted>

Gi0/1, Gi0/2

10 WestSales active Fa0/1

11 WestEng active Fa0/2

12 WestAdmin active

20 WestAcct active

21 WestMngt active

22 WestManuf active

30 Guest active

Assign VLANs to interfaces. (no specific reason)

Page 46: R.G.-SWITCH-2-VLANs-Part2

46

DLS1(config)# inter range fa 0/11 -12DLS1(config-if-range)# shutdown

Shutdown interface so we can modify DLS2 (Switch B) We will adding the trunk back to simulate a switch being entered into

the network.

Client/Server enters with Higher Revision

Page 47: R.G.-SWITCH-2-VLANs-Part2

47

Client/Server enters with Higher Revision

DLS1# show vtp statusVTP Version : 2Configuration Revision : 10Maximum VLANs supported locally : 1005Number of existing VLANs : 12VTP Operating Mode : ServerVTP Domain Name : West<output omitted>

DLS2#show vtp statusVTP Version : 2Configuration Revision : 10Maximum VLANs supported locally : 1005Number of existing VLANs : 12VTP Operating Mode : ServerVTP Domain Name : West

Right now both switches have same Configuration Revision number, let’s change that.

Note: Configuration Revision numbers not necessarily the same as previous example due to this was done in a different session.

Page 48: R.G.-SWITCH-2-VLANs-Part2

48

Client/Server enters with Higher Revision

DLS2#show vlan

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Gi0/1, Gi0/2

10 WestSales active

11 WestEng active

12 WestAdmin active

20 WestAcct active

21 WestMngt active

22 WestManuf active

30 Guest active

We are going to remove these three VLANs on DLS2 so it has different VLANs and a higher Configuration Revision Number.

Remember, DLS1 has same VLAN information and also has: Fa0/1 in VLAN 10 Fa0/2 in VLAN 11

Page 49: R.G.-SWITCH-2-VLANs-Part2

49

Client/Server enters with Higher Revision

DLS2(config)# no vlan 10DLS2(config)# no vlan 11DLS2(config)# no vlan 12

DLS2(config)# vtp mode clientSetting device to VTP CLIENT mode.

DLS2# show vtp statusVTP Version : 2

Configuration Revision : 13

Maximum VLANs supported locally : 1005

Number of existing VLANs : 9

VTP Operating Mode : Client

VTP Domain Name : West

<output omitted>

Three VLANs deleted. Change VTP mode to Client Configuration Revision updated from 10 to 13

Page 50: R.G.-SWITCH-2-VLANs-Part2

50

Client/Server enters with Higher Revision

DLS2# show vlan

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>Gi0/1, Gi0/2

20 WestAcct active 21 WestMngt active 22 WestManuf active 30 Guest active

Verify VLANs 10, 11, and 12 were deleted.

Page 51: R.G.-SWITCH-2-VLANs-Part2

51

Client/Server enters with Higher Revision

DLS1# show vtp statusVTP Version : 2

Configuration Revision : 10

Maximum VLANs supported locally : 1005

Number of existing VLANs : 12

VTP Operating Mode : Server

VTP Domain Name : West

<output omitted>

DLS1 has a lower Configuration Revision number 10. DLS2’s Configuration Revision number is 13.

Page 52: R.G.-SWITCH-2-VLANs-Part2

52

DLS1(config)# inter range fa 0/11 -12DLS1(config-if-range)# no shutdown

DLS1# show vtp statusVTP Version : 2

Configuration Revision : 13

Maximum VLANs supported locally : 1005

Number of existing VLANs : 9

VTP Operating Mode : Server

VTP Domain Name : West

<output omitted>

DLS2# show vtp statusVTP Version : 2

Configuration Revision : 13

Maximum VLANs supported locally : 1005

Number of existing VLANs : 9

VTP Operating Mode : Client

VTP Domain Name : West

<output omitted>

DLS2 (Switch B) is brought online (no shutdown on DLS1).

DLS2 (Client) has higher Configuration Revision number 13.

DLS1 (Switch A) with lower revision number (10) updates its VLAN information to be in sync with DLS2 including its Configuration Revision number to 13.

Page 53: R.G.-SWITCH-2-VLANs-Part2

53

VTP Revision NumberDLS1# show vlanVLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6

<output omitted>Gi0/1, Gi0/2

10 WestSales active Fa0/111 WestEng active Fa0/212 WestAdmin active 20 WestAcct active 21 WestMngt active 22 WestManuf active 30 Guest active

DLS1# show vlan

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6

<output omitted>Gi0/1, Gi0/2

20 WestAcct active 21 WestMngt active 22 WestManuf active 30 Guest active

Missing VLANs 10, 11, and 12.

Previous VLANS

Current VLANS sync’d with DLS2

Page 54: R.G.-SWITCH-2-VLANs-Part2

54

Fix itDLS1(config)# vlan 10DLS1(config-vlan)# name WestSalesDLS1(config-vlan)# vlan 11DLS1(config-vlan)# name WestEngDLS1(config-vlan)# vlan 12DLS1(config-vlan)# name WestAdmin

DLS1# show vlanVLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6

<output omitted>

Gi0/1, Gi0/2

10 WestSales active Fa0/1

11 WestEng active Fa0/2

12 WestAdmin active

20 WestAcct active

21 WestMngt active

22 WestManuf active

30 Guest active

To fix it must reconfigure VLANs on DLS1. Interfaces Fa0/1 and Fa0/2 brought from inactive to active

Page 55: R.G.-SWITCH-2-VLANs-Part2

55

DLS2# show vlan

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4

<output omitted>

Fa0/23, Fa0/24, Gi0/1, Gi0/2

10 WestSales active

11 WestEng active

12 WestAdmin active

20 WestAcct active

21 WestMngt active

22 WestManuf active

30 Guest active

DLS2(config)# no vlan 10VTP VLAN configuration not allowed when device is in CLIENT mode.

DLS2(config)#

DLS2 gets VLANS 10, 11, 12 in VTP update from DLS1. DLS2 is a Client and can no longer delete (or add) VLANs.

Page 56: R.G.-SWITCH-2-VLANs-Part2

56

DLS1# show vtp statusVTP Version : 2

Configuration Revision : 16

Maximum VLANs supported locally : 1005

Number of existing VLANs : 12

VTP Operating Mode : Server

VTP Domain Name : West

DLS2# show vtp status

VTP Version : 2

Configuration Revision : 16

Maximum VLANs supported locally : 1005

Number of existing VLANs : 12

VTP Operating Mode : Client

VTP Domain Name : West

Still in sync!

VTP Domain = WestVTP Mode = Client (or Server)Config Rev = 16VLANs = 1, 10, 11, 12, 20, 21, 22, 30

VTP Domain = WestVTP Mode = ServerConfig Rev = 16VLANs = 1, 10, 11, 12, 20, 21, 22, 30

Page 57: R.G.-SWITCH-2-VLANs-Part2

57

How to make sure switch has Lower Config Rev: VTP Mode

Setting a switch to Transparent mode reset the configuration to 0. Then set it back to Client or Server.

VTP Domain = WestVTP Mode = ClientConfig Rev = 16VLANs = 1

VTP Domain = WestVTP Mode = ServerConfig Rev = 10VLANs = 1, 10, 11, 12, 20, 21, 22, 30

0TransparentClient

1, 10, 11, 12, 20, 21, 22, 3010

DLS2(config)# vtp mode ?client Set the device to client mode.

server Set the device to server mode.

transparent Set the device to transparent mode.

DLS2(config)#

Not all VTP Messages shown

Page 58: R.G.-SWITCH-2-VLANs-Part2

58

How to make sure switch has Lower Config Rev: VTP Domain

Changing the Domain Name on a switch will reset the configuration to 0. Then set it back to the correct Domain Name.

VTP Domain = WestVTP Mode = ClientConfig Rev = 16VLANs = 1

VTP Domain = WestVTP Mode = ServerConfig Rev = 16VLANs = 1, 10, 11, 12, 20, 21, 22, 30

0

EastWest

1, 10, 11, 12, 20, 21, 22, 3016

DLS2(config)# vtp domain WestChanging VTP domain name from East to West

Not all VTP Messages shown

Page 59: R.G.-SWITCH-2-VLANs-Part2

VTP Pruning

Page 60: R.G.-SWITCH-2-VLANs-Part2

VTP Pruning

Prevents flooded traffic from propagating to switches that do not have members in specific VLANs.

VTP pruning uses VLAN advertisements to determine when a trunk connection is flooding traffic needlessly.

Page 61: R.G.-SWITCH-2-VLANs-Part2

61

VTP Pruning

How would VLANs affect the ARP broadcast? Host C and Host D would not receive the ARP Request. But broadcast would be transmitted across all trunk links.

If VTP pruning is enabled, ALS1 would not send broadcasts for VLAN 120 to DLS1 or DLS2 (dashed lines).

VTP pruning increases the available bandwidth by restricting flooded traffic to those trunk links that traffic must use to access the appropriate network devices.

XX

No access ports on VLAN 120

No access ports on VLAN 120

Page 62: R.G.-SWITCH-2-VLANs-Part2

62

VTP Pruning is disabled by default

DLS1# show vtp statusVTP Version : 2Configuration Revision : 2Maximum VLANs supported locally : 1005Number of existing VLANs : 9VTP Operating Mode : ServerVTP Domain Name : CabrilloVTP Pruning Mode : DisabledVTP V2 Mode : DisabledVTP Traps Generation : DisabledMD5 digest : 0xAB 0x0C 0xEB 0xDE 0x6A 0x89

0x0C 0xAD Configuration last modified by 10.1.1.101 at 3-1-93 00:17:55Local updater ID is 10.1.1.101 on interface Vl1 (lowest numbered

VLAN interface found)DLS1#

Page 63: R.G.-SWITCH-2-VLANs-Part2

63

It is easy to configure

DLS1(config)# vtp pruningDLS1(config)# end

DLS1# show vtp statusVTP Version : 2Configuration Revision : 2Maximum VLANs supported locally : 1005Number of existing VLANs : 9VTP Operating Mode : ServerVTP Domain Name : CabrilloVTP Pruning Mode : EnabledVTP V2 Mode : DisabledVTP Traps Generation : DisabledMD5 digest : 0xAB 0x0C 0xEB 0xDE 0x6A 0x89

0x0C 0xAD Configuration last modified by 10.1.1.101 at 3-1-93 00:17:55Local updater ID is 10.1.1.101 on interface Vl1 (lowest numbered

VLAN interface found)DLS1#

Enable VTP pruning on all switches.

Page 64: R.G.-SWITCH-2-VLANs-Part2

VTP Authentication

VTP domains can be secured by using the VTP password feature. Passwords and domain name must be the same otherwise, a switch

will not become a member of the VTP domain. Cisco switches use MD5 to encode passwords in 16-byte words.

Propagated inside VTP summary advertisements. Case-sensitive and can be 8 to 64 characters in length.

VTP authentication is a recommended practice. Default: No VTP password

Switch(config)# vtp password password_string

Page 65: R.G.-SWITCH-2-VLANs-Part2

VTP Troubleshooting Check that switches are interconnected by active trunk links. Check that the trunking protocol matches on opposite ends of a

trunk link. Check VTP domain name (case-sensitive) and password. Check the VTP mode of the switches. Check the VTP versions of the switches.

Page 66: R.G.-SWITCH-2-VLANs-Part2

Default, Native and Management VLANs

FLAN: Predecessor to the VLAN

Page 67: R.G.-SWITCH-2-VLANs-Part2

67

Extended VLANs

VLANs are typically from VLAN 1 through VLAN 1005. The IEEE 802.1Q standard provides for support of up to 4096 VLANs.

VLANs 0 and 4095 are reserved by the IEEE 802.1Q standard and you cannot create, delete, or modify them (not displayed).

Beginning with Cisco IOS Release 12.4(15)T, you can configure VLAN IDs in the range from 1006 to 4094 on specified routers. There are some configuration restrictions, for example may only be able

to configure on VTP Transparent and Client switches, For more information:

http://www.cisco.com/en/US/docs/ios/12_4t/12_4t15/ht_xvlan.html

Extended VLANS

1 - 1005Normal VLANS

1006 – 4095

Page 68: R.G.-SWITCH-2-VLANs-Part2

68

Native VLAN

By default all traffic is carried across VLAN 1. VLAN 1 is:

The default VLAN (all user traffic) Native VLAN: No trunking encapsulation even if configured as a trunk. VLAN for CDP, VTP, PAgP (Port Aggregation Protocol), LACP (Link

Aggregation Control Protocol), and DTP A topic that causes considerable confusion is the native VLAN.

VLAN 1

Native VLANUn-tagged (If trunking there is no 802.1Q or ISL encapsulation)

CDP, VTP, PAgP, LACP, DTP

Default VLAN

Page 69: R.G.-SWITCH-2-VLANs-Part2

69

Native VLAN

The IEEE committee that defined 802.1Q decided to support a native VLAN for backwards compatibility: Allows 802.1Q capable ports to talk to old 802.3 ports directly by

sending and receiving untagged traffic. Loss of identification also means a loss of classification.

You should avoid using VLAN 1 (or whatever your Native VLAN is) for data traffic, so it can be classified for QoS.

We will see examples later with IP Telephony.

Note: We have not yet discussed routing between these VLANS. (But we will!)

Common VLAN configuration

Page 70: R.G.-SWITCH-2-VLANs-Part2

70

Best Practices

Native VLAN Can be modified to be a VLAN other than VLAN 1. Must be the same on both ends, both switches. Should not be used for user VLAN or Management VLAN. Control traffic (CDP, VTP, PAgP, DTP) still transmitted over VLAN 1.

If Native VLAN is other than VLAN 1 then control traffic is sent tagged. It is fine to leave VLAN 1 as the Native VLAN but should only carry control

traffic and not user or management traffic. Note: Router uses subinterfaces for trunking and the native VLAN is

configured using the native option. (Discussed later)

Page 71: R.G.-SWITCH-2-VLANs-Part2

71

Best Practices

Management VLAN The Management VLAN is the VLAN used to reach (ping, telnet)

devices.

Switch(config)# hostname DLS2DLS2(config)# interface vlan 99DLS2(config-if)# ip address 10.0.99.1 255.255.255.0

Page 72: R.G.-SWITCH-2-VLANs-Part2

72

Best Practices

Garbage VLAN This is the VLAN you can assign to all switch ports until it is assigned to

a user or management VLAN. A way of isolating or managing all non-business traffic. You may wish to limit this VLAN as an access port and not include this

VLAN across trunk links.

DLS2(config)# interface range fa 0/1 - 24DLS2(config-if)# switchport mode access DLS2(config-if)# switchport access vlan 222

Page 73: R.G.-SWITCH-2-VLANs-Part2

73

Best Practices

Limiting VLANs on a trunk You can manually configure which VLANs should be allowed on a trunk. If you remove VLAN 1 from a trunk port, the interface continues to send

and receive management traffic, CDP, PAgP, LACP, DTP and VTP in VLAN 1. Sometimes done to reduce the risk of VLAN 1 STP loops or storms

usually due to misconfiguration. (CCIE stuff)

DLS2(config)# interface fa 0/11DLS2(config-if)# switchport trunk allowed vlan 1, 10-99DLS2(config-if)# switchport trunk allowed vlan remove 20

Page 74: R.G.-SWITCH-2-VLANs-Part2

74

Best Practices

Looking at a complete configuration for a trunk link

DLS2(config)# interface fa 0/11DLS2(config-if)# switchport trunk encapsulation dot1qDLS2(config-if)# switchport mode trunkDLS2(config-if)# switchport trunk native vlan 2DLS2(config-if)# switchport trunk allowed vlan 1, 10-99DLS2(config-if)# switchport trunk allowed vlan remove 20

Page 75: R.G.-SWITCH-2-VLANs-Part2

Private VLAN

Page 76: R.G.-SWITCH-2-VLANs-Part2

76

Private VLANs

Private VLANs (pVLAN) provide isolation between ports within the same VLAN.

pVLANs require VTP switches to be in transparent mode. pVLANs can go across trunks.

Community VLAN A Ports

Community VLAN B Ports

Isolated VLAN C Ports

Promiscuous Ports

VTP Transparent

Page 77: R.G.-SWITCH-2-VLANs-Part2

77

Private VLANs

pVlans: Provide security Reduce the number of IP subnets

Service providers use pVLANs to deploy hosting services and network access where all devices reside in the same subnet but only communicate to a default gateway, servers or another network.

Same subnet but different pVLANs

Promiscuous Ports

Page 78: R.G.-SWITCH-2-VLANs-Part2

78

Private VLANs

pVlans consist of two supporting VLANs: Primary VLAN

High-level VLAN Can have many secondary VLANs Secondary VLANs belong to same subnet as Primary VLAN

Secondary VLAN Child to a Primary End devices belong to a secondary VLAN

Secondary VLANs

Primary VLANs Promiscuous Ports

Page 79: R.G.-SWITCH-2-VLANs-Part2

79

Private VLANs

Two types of secondary VLANs Community VLANs

These ports communicate with other ports in the same community and promiscuous ports

Isolated VLANs These ports can only communicate with promiscuous ports.

Community VLANs

Isolated VLANs

Promiscuous Ports

Page 80: R.G.-SWITCH-2-VLANs-Part2

80

Community VLANs ports communicate with other ports in the same community and promiscuous ports. What devices can Community VLAN A PCs communicate with? What devices can Community VLAN B PCs communicate with?

Isolated VLANs ports can only communicate with promiscuous ports. What devices can Isolated VLAN C PCs communicate with?

Community VLAN A Ports

Community VLAN B Ports

Isolated VLAN C Ports

Promiscuous Ports

Private VLANs

Page 81: R.G.-SWITCH-2-VLANs-Part2

81

Configuring pVLANs: Creating the pVLANs

Switch(config)# vlan 100Switch(config-vlan)# private-vlan primarySwitch(config)# vlan 200Switch(config-vlan)# private-vlan communitySwitch(config)# vlan 201Switch(config-vlan)# private-vlan communitySwitch(config)# vlan 300Switch(config-vlan)# private-vlan isolated

Switch(config)# vlan 100Switch(config-vlan)# private-vlan association 200,201,300

Switch(config)# interface vlan 100Switch(config-if)# private-vlan mapping add 200,201,300

Configure Primary VLAN Configure Secondary VLANs (two community, one isolated) Associate secondary VLANs to primary VLAN Map secondary VLANs to Layer 3 VLAN interface of primary VLAN to

allow Layer 3 switching (later).

Secondary VLANs

Primary VLANs

Page 82: R.G.-SWITCH-2-VLANs-Part2

82

Community VLAN A Ports

Community VLAN B Ports

Isolated VLAN C Ports

Promiscuous PortsPrivate VLANs

Switch(config)# vlan 100Switch(config-vlan)# private-vlan primarySwitch(config)# vlan 200Switch(config-vlan)# private-vlan communitySwitch(config)# vlan 201Switch(config-vlan)# private-vlan communitySwitch(config)# vlan 300Switch(config-vlan)# private-vlan isolatedSwitch(config)# vlan 100Switch(config-vlan)# private-vlan association 200,201,300Switch(config)# interface vlan 100Switch(config-if)# private-vlan mapping add 200,201,300

VLAN 100

VLAN 200VLAN 201

VLAN 300

Page 83: R.G.-SWITCH-2-VLANs-Part2

83

Configuring pVLANs: Port AssociationSwitch(config)# interface range fa 0/1 – 5Switch(config-if)# switchport mode private-vlan promiscuousSwitch(config-if)# exitSwitch(config)# interface range fa 0/10 – 12Switch(config-if)# switchport mode private-vlan hostSwitch(config-if)# switchport private-vlan host-association 100 200Switch(config-if)# exitSwitch(config)# interface range fa 0/15 – 18Switch(config-if)# switchport mode private-vlan hostSwitch(config-if)# switchport private-vlan host-association 100 201Switch(config-if)# exitSwitch(config)# interface range fa 0/20 – 25Switch(config-if)# switchport mode private-vlan hostSwitch(config-if)# switchport private-vlan host-association 100 300Switch(config-if)# exit

Configure access ports for promiscuous mode. Configure access ports for community pVLANs. Configure access ports for isolated pVLANs.

Primary Secondary

Page 84: R.G.-SWITCH-2-VLANs-Part2

84

Switch(config)# vlan 100Switch(config-vlan)# private-vlan primarySwitch(config)# vlan 200Switch(config-vlan)# private-vlan communitySwitch(config)# vlan 201Switch(config-vlan)# private-vlan communitySwitch(config)# vlan 300Switch(config-vlan)# private-vlan isolatedSwitch(config)# vlan 100Switch(config-vlan)# private-vlan association 200,201,300Switch(config)# interface vlan 100Switch(config-if)# private-vlan mapping add 200,201,300

Configuring pVLANs - Review

Page 85: R.G.-SWITCH-2-VLANs-Part2

85

Switch(config)# interface range fa 0/1 – 5Switch(config-if)# switchport mode private-vlan promiscuousSwitch(config-if)# exitSwitch(config)# interface range fa 0/10 – 12Switch(config-if)# switchport mode private-vlan hostSwitch(config-if)# switchport private-vlan host-association 100 200Switch(config-if)# exitSwitch(config)# interface range fa 0/15 – 18Switch(config-if)# switchport mode private-vlan hostSwitch(config-if)# switchport private-vlan host-association 100 201Switch(config-if)# exitSwitch(config)# interface range fa 0/20 – 25Switch(config-if)# switchport mode private-vlan hostSwitch(config-if)# switchport private-vlan host-association 100 300Switch(config-if)# exit

Primary Secondary

VLAN 200

VLAN 201

VLAN 300

Page 86: R.G.-SWITCH-2-VLANs-Part2

Port Aggregation (EtherChannel)

CIS 187 Multilayer Switched NetworksCCNP SWITCHRick GrazianiSpring 2010

Page 87: R.G.-SWITCH-2-VLANs-Part2

Configuring Link Aggregation with Etherchannel

Page 88: R.G.-SWITCH-2-VLANs-Part2

88

Spanning Tree and EtherChannel

Spanning Tree only allows a single link between switches to prevent bridging loops.

Cisco’s EtherChannel technology allows for the scaling of link bandwidth by aggregating or bundling parallel links. Treated as a single, logical link. Access or Trunk link Allows you to expand the link’s capacity without having to

purchase new hardware (modules, devices).

Etherchannel Bundle

Page 89: R.G.-SWITCH-2-VLANs-Part2

89

EtherChannel

EtherChannel allows for two to eight links. Fast Ethernet (FE) Fast EtherChannel Up to 1600 Mbps Gigabit Ethernet (GE) Gigabit EtherChannel Up to 16 Gbps 10-Gigabit Ethernet (10GE) 10 Gigabit EtherChannel Up to 160

Gbps

This does not mean the total bandwidth of the bundle equals the sum of the links. The load is not always distributed evenly (coming).

Page 90: R.G.-SWITCH-2-VLANs-Part2

90

EtherChannel

The Cisco Catalyst family of switches supports two types of link aggregation: Port Aggregation Protocol (PAgP) - Cisco proprietary

Default when port channel is created (coming) Link Aggregation Control Protocol (LACP) - Industry standard

802.3ad-based protocol EtherChannel provides redundancy.

If one link fails traffic is automatically moved to an active link. Transparent to end user. LACP (coming) also allows for standby links (coming).

Page 91: R.G.-SWITCH-2-VLANs-Part2

91

The key is consistency for all links in the bundle: Media

Same media type and speed Same duplex

VLANs – All ports within the bundle must be configure with: Same VLAN (if access) Same trunking encapsulation and mode (if trunk)

Mode on opposite switches do not have to be the same as long as it still forms a trunk.

Same Native VLAN Pass the same set of VLANs

Fast EthernetFull duplexDot1q autoNative = VLAN 2VLANs 1 thru 100

Fast EthernetFull duplexDot1q autoNative = VLAN 2VLANs 1 thru 100

Page 92: R.G.-SWITCH-2-VLANs-Part2

92

Distribution of Traffic and Load Balancing

Load is not balanced equally across links. EtherChannel uses a hashing algorithm.

Single input is used (such as Source IP address), the hash will only look at the bits associated with this input. (coming)

Two inputs are used (such as Source IP address and Destination IP address), the hash will perform an exclusive OR (XOR) operation on both inputs. (coming!)

Both of these will compute a binary number that selects a link number in the bundle to carry the frame. (coming!!!)

Page 93: R.G.-SWITCH-2-VLANs-Part2

93

Load Balancing

Let’s take a brief look at how this works. We will focus on the 2, 4 and 8 link possibilities as this is easier to

understand and the only options that provide more ideal load balancing. A 2 link EtherChannel bundle requires a 1-bit index using an XOR.

If the index is 0, link 0 is selected If the index is 1, link 1 is selected

A 4 link EtherChannel bundle requires a 2-bit index using an XOR. 4 possible links: 00, 01, 10, 11

An 8 link EtherChannel bundle requires a 3-bit index using an XOR. 8 possible links: 000, 001, 010, 011, 100, 101, 110, 111

Page 94: R.G.-SWITCH-2-VLANs-Part2

94

Boolean Operations - XOR

XOR (Exclusive OR) operation 0 = FALSE 1 = TRUE If both bits have the same value (both 0, both 1), the XOR will result in a 0

Otherwise, if they differ (one is a 0 and the other a 1) the result will be 1. One and ONLY one input value can be TRUE for output to be TRUE Rick is going to surf the Hook XOR Liquor Stores at noon I cannot surf BOTH spots. If I did this would not be TRUE.

XOR = TRUETRUE False

Page 95: R.G.-SWITCH-2-VLANs-Part2

95

Boolean Operations – XOR Gate

0 = FALSE1 = TRUEXOR operation Only one input value is

TRUE for output to be TRUE

Truth Table

Inputs Output

0 0

0 1

1 0

1 1

0

00

00

11 1

1

01

1

1

10

0

Page 96: R.G.-SWITCH-2-VLANs-Part2

96

Load Balancing

Example: 2 Link EtherChannel. Packet sent from 172.16.1.1 to 10.10.10.16 The chosen hash uses Source IP and Destination IP address

At most there can only be 8 links in bundle, so only the last 3 rightmost bits (least-significant) of the addresses will ever need to be indexed or examined. 3 bits will give us 8 choices (8 links max in a bundle) 172.16.1.1 => 00000001 10.10.10.46 => 00101110

In our example we have 2 links in the EtherChannel (1 bit index): The XOR is performed only on the rightmost bit 1 XOR 0 1 XOR 0 = 1 Link 1 is used

01

Page 97: R.G.-SWITCH-2-VLANs-Part2

97

Load Balancing

Example: 2 Link EtherChannel. Our hash used the Source IP and Destination IP address

The XOR on the rightmost bit of our Source IP and Destination IPaddress could result in Link 0 or Link 1 being used. Depends on the last bit of each address! 172.16.1.1 => 00000001 10.10.10.46 => 00101110

If XOR of the two bits result in 0, then link 0 is used. If XOR of the two bits result in 1, then link 1 is used.

01

Page 98: R.G.-SWITCH-2-VLANs-Part2

98

Load Balancing

Example: 4 Link EtherChannel Packet sent from 172.16.1.1 to 10.10.10.16 Our hash used the Source IP and Destination IP address 172.16.1.1 => 00000001 10.10.10.46 => 00101110

If there are 4 links in the EtherChannel (2 bit index): The XOR is performed only on 2 rightmost bits 01 XOR 10 Each bit is computed separately 01 XOR 10 = 11

1 XOR 0 = 10 XOR 1 = 1

Link 3 (112) is used

0

3

Page 99: R.G.-SWITCH-2-VLANs-Part2

99

Load Balancing

Example: 8 Link EtherChannel Packet sent from 172.16.1.1 to 10.10.10.16 Our hash used the Source IP and Destination IP address 172.16.1.1 => 00000001 10.10.10.46 => 00101110

If there are 8 links in the EtherChannel (3 bit index): The XOR is performed only on the 3 rightmost bits 001 XOR 110 Each bit is computed separately 001 XOR 110 = 111

1 XOR 0 = 10 XOR 1 = 10 XOR 1 = 1

Link 7 (1112) is used

0

7

Page 100: R.G.-SWITCH-2-VLANs-Part2

100

For more information

For information about load balancing the number of links other than 2, 4 or 8: Understanding EtherChannel Load Balancing and

Redundancy on Catalyst Switches http://www.cisco.com/en/US/tech/tk389/tk213/technologies_tech

_note09186a0080094714.shtml

Page 101: R.G.-SWITCH-2-VLANs-Part2

Configuring EtherChannel

Page 102: R.G.-SWITCH-2-VLANs-Part2

102

Configuring EtherChannel Load Balancing

Switch(config)# port-channel load-balance method

The load balancing method is configured in global configuration mode.

Page 103: R.G.-SWITCH-2-VLANs-Part2

103

Load BalancingSwitch(config)# port-channel load-balance ?dst-ip Dst IP Addr bitsdst-mac Dst Mac Addr bitssrc-dst-ip Src XOR Dst IP Addr XORsrc-dst-mac Src XOR Dst Mac Addr XORsrc-ip Src IP Addr bitssrc-mac Src Mac Addr bits

6500 and 4500 switches also allow hash input to be based on: dst-port (destination port) src-dst-port (source and destination ports)

Dafaults for 29xx and 35xx (this may vary so check documentation) Layer 2 switching (switched port) is src-mac (coming) Layer 3 switching (routed port) is src-dst-ip (coming)

For non-IP traffic the switch will distribute frames based on MAC addresses.

Multicasts and broadcasts sent over one link in the EtherChannel are not sent back over other links in the EtherChannel.

Hash Operation

default

Page 104: R.G.-SWITCH-2-VLANs-Part2

104

Load Balancing

Switch(config)# port-channel load-balance src-dst-ip

Normally, the default Source IP and Destination IP addresses will result in a fair statistical distribution of frames.

This is because of the random nature of multiple Source and Destination IP addresses.

However, if a single server’s destination IP address is receiving most of the traffic this may cause one link to be overused in a two link EtherChannel. Two links in a four link EtherChannel Four links in an eight link EtherChannel.

Use only Source IP address or include MAC addresses to create a more balanced load across the bundle.

Switch(config)# port-channel load-balance ?dst-ip Dst IP Addr bitsdst-mac Dst Mac Addr bitssrc-dst-ip Src XOR Dst IP Addr XORsrc-dst-mac Src XOR Dst Mac Addr XORsrc-ip Src IP Addr bitssrc-mac Src Mac Addr bits

Page 105: R.G.-SWITCH-2-VLANs-Part2

105

EtherChannel Protocols

The Cisco Catalyst family of switches supports both: Port Aggregation Protocol (PAgP) - Cisco proprietary

Default when port channel is created (coming) Link Aggregation Control Protocol (LACP) - Industry standard

802.3ad-based protocol Not many differences. When a Cisco switch is connected to a non-Cisco switch use LACP. Must be the same on both ends!

PAgP PAgPLACP LACP

Page 106: R.G.-SWITCH-2-VLANs-Part2

106

EtherChannel Protocols

DLS1(config)# interface range fa 0/1 - 4DLS1(config-if-range)# channel-protocol ?lacp Prepare interface for LACP protocol

pagp Prepare interface for PAgP protocol

DLS1(config-if-range)# channel-protocol pagp

PAgP requres identical static VLANs or trunking encapsulation with same allowed VLANs.

If the VLAN, speed or duplex on a port in the bundle is changed PAgP automatically reconfigures the rest of the ports in that bundle.

Fa0/1

Fa0/4

Page 107: R.G.-SWITCH-2-VLANs-Part2

107

EtherChannel Protocols

DLS1(config)# interface range fa 0/1 - 4DLS1(config-if-range)# channel-protocol ?lacp Prepare interface for LACP protocol

pagp Prepare interface for PAgP protocol

DLS1(config-if-range)# channel-group number mode {active | on | {auto [non-silent]} | {desirable [non-silent]} | passive}

Channel-group number: 1 – 64 Does not need to be the same on both switches but its

recommended that it usually is.

Fa0/1

Fa0/4

Channel Group

Page 108: R.G.-SWITCH-2-VLANs-Part2

108

No PAgP or LACP negotiation

DLS1(config)# interface range fa 0/1 - 4DLS1(config-if-range)# channel-protocol pagp DLS1(config-if-range)# channel-group 1 mode ?

active Enable LACP unconditionallyauto Enable PAgP only if a PAgP device is detecteddesirable Enable PAgP unconditionallyon Enable Etherchannel onlypassive Enable LACP only if a LACP device is detected

on – Forces port to channel without PAgP negotiation. Both ends must be on. All ports channeling

You can use channel-group # mode on when the connecting device does not support PAgP and you need to set up the channel unconditionally.

on on

EtherChannel

Page 109: R.G.-SWITCH-2-VLANs-Part2

109

PAgP modes

DLS1(config)# interface range fa 0/1 - 4DLS1(config-if-range)# channel-protocol pagp DLS1(config-if-range)# channel-group 1 mode ?

active Enable LACP unconditionallyauto Enable PAgP only if a PAgP device is detecteddesirable Enable PAgP unconditionallyon Enable Etherchannel onlypassive Enable LACP only if a LACP device is detected

An interface in desirable mode can form an EtherChannel with another interface that is in desirable or auto mode. Desirable (Active) - Actively asks to form a channel

desirable desirableEtherChannel

auto

Page 110: R.G.-SWITCH-2-VLANs-Part2

110

PAgP modes

DLS1(config)# interface range fa 0/1 - 4DLS1(config-if-range)# channel-protocol pagp DLS1(config-if-range)# channel-group 1 mode ?

active Enable LACP unconditionallyauto Enable PAgP only if a PAgP device is detecteddesirable Enable PAgP unconditionallyon Enable Etherchannel onlypassive Enable LACP only if a LACP device is detected

An interface in auto mode can form an EtherChannel with another interface in desirable mode. Auto (default, passive) - Waits to be asked to form a channel.

An interface in auto mode cannot form an EtherChannel with another interface that is also in auto mode because neither interface starts PAgP negotiation.

auto

EtherChannel

desirable

Page 111: R.G.-SWITCH-2-VLANs-Part2

111

PAgP Silent FYI

DLS1(config)# interface range fa 0/1 - 4DLS1(config-if-range)# channel-protocol pagp DLS1(config-if-range)# channel-group 1 mode ?

active Enable LACP unconditionally

auto Enable PAgP only if a PAgP device is detecteddesirable Enable PAgP unconditionallyon Enable Etherchannel onlypassive Enable LACP only if a LACP device is detected

DLS1(config-if-range)# channel-group 1 mode auto ?non-silent Start negotiation only after data packets received

By default PAgP uses the silent submode for desirable and auto. If you expect a switch to be on the other end you should use non-silent. “Use the non-silent keyword when you connect to a device that transmits bridge protocol data units

(BPDUs) or other traffic.” “Use the silent keyword when you connect to a silent partner (which is a device that does not generate

BPDUs or other traffic).” Either will work between switches. For more information on when to use silent or non-silent: http://www.cisco.com/en/US/tech/tk389/tk213/technologies_configuration_example09186a0080094953.s

html

EtherChannel

Page 112: R.G.-SWITCH-2-VLANs-Part2

112

LACP modes

DLS1(config)# interface range fa 0/1 - 4DLS1(config-if-range)# channel-protocol lacp DLS1(config-if-range)# channel-group 1 mode ?

active Enable LACP unconditionallyauto Enable PAgP only if a PAgP device is detecteddesirable Enable PAgP unconditionallyon Enable Etherchannel onlypassive Enable LACP only if a LACP device is detected

An interface in the active mode can form an EtherChannel with another interface that is in the active or passive mode.

active activeEtherChannel

passive

Page 113: R.G.-SWITCH-2-VLANs-Part2

113

LACP modes

DLS1(config)# interface range fa 0/1 - 4DLS1(config-if-range)# channel-protocol lacp DLS1(config-if-range)# channel-group 1 mode ?

active Enable LACP unconditionallyauto Enable PAgP only if a PAgP device is detecteddesirable Enable PAgP unconditionallyon Enable Etherchannel onlypassive Enable LACP only if a LACP device is detected

An interface in the passive mode can form an EtherChannel with another interface that is in the active mode.

An interface in the passive mode cannot form an EtherChannel with another interface that is also in the passive mode because neither interface starts LACP negotiation.

passive

EtherChannel

active

Page 114: R.G.-SWITCH-2-VLANs-Part2

114

Forming EtherChannelsEtherChannel

on on

PAgP Negotiated EtherChannel

desirable desirable

auto

LACP Negotiated EtherChannelactive active

passive

Page 115: R.G.-SWITCH-2-VLANs-Part2

115

Configuring PAgPDLS1(config)# port-channel load-balance dst-ipDLS1(config)# interface range fa 0/11 - 12DLS1(config-if-range)# switchport trunk encapsulation dot1qDLS1(config-if-range)# switchport mode trunkDLS1(config-if-range)# channel-protocol pagp DLS1(config-if-range)# channel-group 1 mode desirable

Notice: Load balancing does not have to match but usually it does. DTP on DLS2 is dyanmic auto (result is trunk with DLS1) PAgP configured on both ends

DLS2(config)# port-channel load-balance src-dst-ipDLS2(config)# interface range fa 0/11 - 12DLS2(config-if-range)# switchport trunk encapsulation dot1qDLS2(config-if-range)# channel-protocol pagp DLS2(config-if-range)# channel-group 1 mode auto

Page 116: R.G.-SWITCH-2-VLANs-Part2

116

VerifyingDLS1#show run!port-channel load-balance dst-ip!interface Port-channel1switchport trunk encapsulation dot1qswitchport mode trunk

!interface FastEthernet0/1! ...interface FastEthernet0/11switchport trunk encapsulation dot1qswitchport mode trunkchannel-group 1 mode desirable

!interface FastEthernet0/12switchport trunk encapsulation dot1qswitchport mode trunkchannel-group 1 mode desirable

DLS2#show run!port-channel load-balance src-dst-ip!interface Port-channel1switchport trunk encapsulation dot1q

!!interface FastEthernet0/1! ...interface FastEthernet0/11switchport trunk encapsulation dot1qchannel-group 1 mode auto

!!interface FastEthernet0/12switchport trunk encapsulation dot1qchannel-group 1 mode auto

We will discuss the significance of the Port-channel interface with MLS.

Page 117: R.G.-SWITCH-2-VLANs-Part2

117

VerifyingDLS1# show etherchannel protocol

Group: 1

----------

Protocol: PAgP

DLS1# show etherchannel load-balanceEtherChannel Load-Balancing Operational State (dst-ip):

Non-IP: Destination MAC address

IPv4: Destination IP address

IPv6: Destination IP address

DLS1# DLS1(config)# port-channel load-balance dst-ipDLS1(config)# interface range fa 0/11 - 12DLS1(config-if-range)# channel-protocol pagp DLS1(config-if-range)# channel-group 1 mode desirable

Page 118: R.G.-SWITCH-2-VLANs-Part2

118

DLS1# show etherchannel summaryFlags: D - down P - in port-channel

I - stand-alone s - suspended

H - Hot-standby (LACP only)

R - Layer3 S - Layer2U - in use f - failed to allocate aggregator

u - unsuitable for bundling

w - waiting to be aggregated

d - default port

Number of channel-groups in use: 1

Number of aggregators: 1

Group Port-channel Protocol Ports

------+-------------+-----------+-------------------------------

1 Po1(SU) PAgP Fa0/11(P) Fa0/12(P)

DLS1# DLS1(config)# port-channel load-balance dst-ipDLS1(config)# interface range fa 0/11 - 12DLS1(config-if-range)# channel-protocol pagp DLS1(config-if-range)# channel-group 1 mode desirable

Page 119: R.G.-SWITCH-2-VLANs-Part2

119

DLS1# show etherchannel port

Group: 1 ----------

Port: Fa0/11------------

Port state = Up Mstr In-Bndl Channel group = 1 Mode = Desirable-Sl Gcchange = 0Port-channel = Po1 GC = 0x00010001 Pseudo port-channel = Po1Port index = 0 Load = 0x00 Protocol = PAgP

Flags: S - Device is sending Slow hello. C - Device is in Consistent state.<output omitted>

Timers: H - Hello timer is running. Q - Quit timer is running.<output omitted>

Local information:Hello Partner PAgP Learning Group

Port Flags State Timers Interval Count Priority Method IfindexFa0/11 SC

Partner's information:

Partner Partner Partner Partner GroupPort Name Device ID Port Age Flags Cap.Fa0/11 DLS2 001b.8fc8.0080

Age of the port in the current state: 00d:00h:35m:29s

Port: Fa0/12------------...

DLS1(config)# port-channel load-balance dst-ipDLS1(config)# interface range fa 0/11 - 12DLS1(config-if-range)# channel-protocol pagp DLS1(config-if-range)# channel-group 1 mode desirable

Can help determine if the load balancing is being distributed equally across the links

Page 120: R.G.-SWITCH-2-VLANs-Part2

120

Configuring LACPDLS1(config)# port-channel load-balance dst-ipDLS1(config)# lacp system-priority 11111DLS1(config)# interface range fa 0/11 - 12DLS1(config-if-range)# switchport trunk encapsulation dot1qDLS1(config-if-range)# switchport mode trunkDLS1(config-if-range)# channel-protocol lacp DLS1(config-if-range)# channel-group 1 mode activeDLS1(config-if-range)# lacp port-priority 99

DLS1(config)# interface range fa 0/13 - 14DLS1(config-if-range)# switchport trunk encapsulation dot1qDLS1(config-if-range)# switchport mode trunkDLS1(config-if-range)# channel-protocol lacp DLS1(config-if-range)# channel-group 1 mode active

Port Priority - (Optional for LACP) LACP uses the port priority to decide which ports should be put in standby mode. Not typically used (more with hardware limitation). Ports with lower priority are active, rest are standby. (Default is 32,768)

System Priority - (Optional for LACP) Valid values are 1 through 65535. Higher numbers have lower priority. (Default is 32768, switch MAC is tiebreaker) Recommended only when some ports are in standby.

Fa0/13-14 has a higher port priority so these will become the standby links should something happen to any of the active links.

Default port-priority = 32,768

Page 121: R.G.-SWITCH-2-VLANs-Part2

121

Configuring LACP: DLS1 and DLS2

DLS2(config)# port-channel load-balance src-dst-ip

DLS2(config)# interface range fa 0/11 - 12DLS2(config-if-range)# switchport trunk encapsulation dot1qDLS2(config-if-range)# channel-protocol lacp DLS2(config-if-range)# channel-group 1 mode passive

DLS1(config)# interface range fa 0/13 - 14DLS2(config-if-range)# switchport trunk encapsulation dot1qDLS2(config-if-range)# switchport mode trunkDLS2(config-if-range)# channel-protocol lacp DLS2(config-if-range)# channel-group 1 mode active

DLS1(config)# port-channel load-balance dst-ipDLS1(config)# lacp system-priority 11111

DLS1(config)# interface range fa 0/11 - 12DLS1(config-if-range)# switchport trunk encapsulation dot1qDLS1(config-if-range)# switchport mode trunkDLS1(config-if-range)# channel-protocol lacp DLS1(config-if-range)# channel-group 1 mode activeDLS1(config-if-range)# lacp port-priority 99

DLS1(config)# interface range fa 0/13 - 14DLS1(config-if-range)# switchport trunk encapsulation dot1qDLS1(config-if-range)# switchport mode trunkDLS1(config-if-range)# channel-protocol lacp DLS1(config-if-range)# channel-group 1 mode active

Page 122: R.G.-SWITCH-2-VLANs-Part2

122

Verifying (only showing DLS1)DLS1#show run!port-channel load-balance dst-ip!interface Port-channel1switchport trunk encapsulation dot1qswitchport mode trunk

!interface FastEthernet0/11switchport trunk encapsulation dot1qswitchport mode trunklacp port-priority 99channel-group 1 mode active

!interface FastEthernet0/12switchport trunk encapsulation dot1qswitchport mode trunklacp port-priority 99channel-group 1 mode active

!

interface FastEthernet0/13switchport trunk encapsulation dot1qswitchport mode trunkchannel-group 1 mode active

!interface FastEthernet0/14switchport trunk encapsulation dot1qswitchport mode trunkchannel-group 1 mode active

Page 123: R.G.-SWITCH-2-VLANs-Part2

123

VerifyingDLS1# show etherchannel protocol

Group: 1

----------

Protocol: LACP

DLS1# show etherchannel load-balanceEtherChannel Load-Balancing Operational State (dst-ip):

Non-IP: Destination MAC address

IPv4: Destination IP address

IPv6: Destination IP address

DLS1# DLS1(config)# port-channel load-balance dst-ipDLS1(config)# interface range fa 0/11 - 12DLS1(config-if-range)# switchport trunk encapsulation dot1qDLS1(config-if-range)# switchport mode trunkDLS1(config-if-range)# channel-protocol lacp DLS1(config-if-range)# channel-group 1 mode activeDLS1(config-if-range)# lacp port-priority 99<output imitted>

Page 124: R.G.-SWITCH-2-VLANs-Part2

124

VerifyingDLS1# show etherchannel summaryFlags: D - down P - in port-channel

I - stand-alone s - suspended

H - Hot-standby (LACP only)R - Layer3 S - Layer2

U - in use f - failed to allocate aggregator

u - unsuitable for bundling

w - waiting to be aggregated

d - default port

Number of channel-groups in use: 1

Number of aggregators: 1

Group Port-channel Protocol Ports

------+-------------+-----------+-----------------------------------------

1 Po1(SU) LACP Fa0/11(P) Fa0/12(P) Fa0/13(H) Fa0/14(H)

DLS1#

Page 125: R.G.-SWITCH-2-VLANs-Part2

125

Odds and Ends (FYI)

Trunk ports send and receive PAgP and LACP protocol data units (PDUs) on the lowest numbered VLAN.

Spanning tree sends packets over the first interface in the EtherChannel.

For more information on Configuring EtherChannel http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/soft

ware/release/12.1_13_ea1/configuration/guide/swethchl.html

Page 126: R.G.-SWITCH-2-VLANs-Part2

Troubleshooting Trunk Links

Ensure that the Layer 2 interface mode configured on both ends of the link is valid.

The trunk mode should be trunk or desirable for at least one side of the trunk.

Ensure that the trunk encapsulation type configured on both ends of the link is valid and compatible.

On IEEE 802.1Q trunks, make sure the native VLAN is the same on both ends of the trunk.

When using DTP, ensure that both ends of the link are in the same VTP domain.

Page 127: R.G.-SWITCH-2-VLANs-Part2

Chapter 2 Summary A VLAN is a logical grouping of switch ports independent of physical location. Local

VLANs are now recommended over end-to-end VLAN implementations.

A trunk is a Layer 2 point-to-point link between networking devices carry the traffic of multiple VLANs.

ISL and 802.1Q are the two trunking protocols that can connect two switches.

VTP is used to distribute and synchronize information about VLANs configured throughout a switched network.

VTP pruning helps to stop flooding of unnecessary traffic on trunk links.

Device communication within the same VLAN can be fine-tuned using pVLANs. A pVLAN is associated to a primary VLAN, and then mapped to one or several ports. A primary VLAN can map to one isolated and several community VLANs. pVLANs can span across several switches using regular 802.1q trunks or pVLAN trunks.

Use EtherChannel by aggregating individual, similar links between switches. EtherChannel can be dynamically configured between switches using either the Cisco-proprietary PAgP or the IEEE 802.3ad LACP. EtherChannel load balances traffic over all the links in the bundle. The method that is chosen directly impacts the efficiency of this load-balancing mechanism.

Page 128: R.G.-SWITCH-2-VLANs-Part2

Best Practices for VLAN Design One to three VLANs per access module and limit those VLANs to a couple

of access switches and the distribution switches. Avoid using VLAN 1 as the "blackhole" for all unused ports. Use a dedicated

VLAN separate from VLAN 1 to assign all the unused ports. Separate the voice VLANs, data VLANs, the management VLAN, the native

VLAN, blackhole VLANs, and the default VLAN (VLAN 1). Avoid VTP when using local VLANs; use manually allowed VLANs on

trunks. For trunk ports, turn off Dynamic Trunking Protocol (DTP) and configure

trunking. Use IEEE 802.1Q rather than ISL because it has better support for QoS and is a standard protocol.

Manually configure access ports that are not specifically intended for a trunk link.

Prevent all data traffic from VLAN 1; only permit control protocols to run on VLAN 1 (DTP, VTP, STP BPDUs, PAgP, LACP, CDP, etc.).

Avoid using Telnet because of security risks; enable SSH support on management VLANs.

Page 129: R.G.-SWITCH-2-VLANs-Part2

VLANs, Trunking, VTP, Port AggregationPart 2

CIS 187 Multilayer Switched NetworksCCNP SWITCHRick GrazianiSpring 2011