SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
CCNA4.com
VLANs

Vlans are a logical grouping of devices, grouped together regardless of physical location. This
limits broadcasts, improves security, stability, and management. To communicate between
VLANs, traffic must pass through a layer 3 device.

Static Vlans are assigned to ports, regardless of what device is plugged into them. Dynamic
Vlans are assigned to a MAC address, so you can actually move the device around without it
changing Vlans.

Vlan 1 is the default Vlan on Cisco switches
Vlans 2-1001 are for ethernet vlans.
Vlans 1002-1005 are for FDDI
Vlans 1006-1024 are for system use
Vlans 1025-4094 are for ethernet vlans

Private Vlans (pVLANs) are isolated ports within a Vlan while still being on the same subnet.
The primary vlan is the main vlan that encompasses the secondary vlans. Secondary vlans can
have community vlans, which can communicate which other devices within it, or the can be
isolated, which cannot communicate with anything but promiscuous ports. Promiscuous ports
can be reached by community vlans as well, and are usually servers and routers that everyone
needs access to.

Trunking

Trunking allows VLANs to span multiple switches. ISL is a Cisco proprietary encapsulation
for vlan traffic. 802.1q is an industry standard that tags the traffic with the vlan information.
ISL is being phased out by Cisco.

Native VLANs are a default vlans that 802.1q trunks tag when there is no vlan specified.

Dynamic Trunking Protocol (DTP) is a cisco proprietary protocol that negotiates trunk ports
between switches, and selects the trunking protocol to be used.

Vlan mapping allows to limit vlans across a trunk, and allows you to control what is dropped.
This can improve bandwidth and processor utilization. It also automatically will map
extended 802.1q vlans to ISL vlan numbers if necessary.

802.1q also supports a feature called 802.1q-in-q tunneling. This allows service providers to
transport Vlan traffic across their network, without the vlan information having to be unique.

VTP

Vlan Trunking Protocol is used to distribute and synchronize vlan information throughout the
network. When a switch is configured as a Server in a vtp domain, it is able to create, modify
and send vlan information to other switches using the latest information it receives from other
switches. In transparent mode, a switch is able to modify vlan information and forward it, but
it does not synchronize with other switches. When in client mode, a switch will receive and
synchronize with the vtp information it receives, but it will not save them in nvram, and
cannot modify them. When VTP is turned off, it simply drops vtp information.

By default, VTP is flooded every 5 minutes, or whenever a change occurs.

CCNA4.com
CCNA4.com

VTP pruning is when a switch determines certain information from the vtp floods does not
need to go out. If a switch does not have any vlans from an advertisement, it will not be
forwarded the unnecessary information.

To secure vtp you can use authenticated passwords inside of vtp advertisements.

-Configuration

To configure a new VLAN use vlan 2 where 2 is the vlan ID to use
You can name the vlan with name department
You need to type exit to save the configs

To assign a device port to a VLAN use switchport access vlan 2

To configure a trunk port, from the interface assign switchport trunk encapsulation dot1q
Then switchport mode trunk
To set the native vlan, switchport trunk native vlan 3

To configure VTP mode to server, use vtp server
To set the domain, use vtp domain myname
For authentication, use vtp password mypass
And vtp pruning to enable pruning

-Show Commands

show id vlan 2 – displays information about a vlan
show int fasteth 0/1 switchport – shows detained switchport information

show int eth0/1 trunk – displays trunk information for the port

show vtp status – displays vtp configurations
show vtp counters – displays statistics on the vtp process
                                                                                    By gt-rob

Read more




CCNA4.com

Mais conteúdo relacionado

Mais de CCNAResources

Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Subneting And Summarization
Subneting And  SummarizationSubneting And  Summarization
Subneting And SummarizationCCNAResources
 
Subneting And Summarization
Subneting And SummarizationSubneting And Summarization
Subneting And SummarizationCCNAResources
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And AnswersCCNAResources
 
Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 SwitchingCCNAResources
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip RoutingCCNAResources
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless ResourcesCCNAResources
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANsCCNAResources
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 MinutesCCNAResources
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)CCNAResources
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)CCNAResources
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)CCNAResources
 

Mais de CCNAResources (16)

Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study Guide
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
Subneting And Summarization
Subneting And  SummarizationSubneting And  Summarization
Subneting And Summarization
 
Subneting And Summarization
Subneting And SummarizationSubneting And Summarization
Subneting And Summarization
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Quick Guide VLANs
Quick Guide   VLANsQuick Guide   VLANs
Quick Guide VLANs
 
Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 Switching
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip Routing
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless Resources
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANs
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Vlans, Trunking, And Vtp, Short Guide

  • 1. CCNA4.com VLANs Vlans are a logical grouping of devices, grouped together regardless of physical location. This limits broadcasts, improves security, stability, and management. To communicate between VLANs, traffic must pass through a layer 3 device. Static Vlans are assigned to ports, regardless of what device is plugged into them. Dynamic Vlans are assigned to a MAC address, so you can actually move the device around without it changing Vlans. Vlan 1 is the default Vlan on Cisco switches Vlans 2-1001 are for ethernet vlans. Vlans 1002-1005 are for FDDI Vlans 1006-1024 are for system use Vlans 1025-4094 are for ethernet vlans Private Vlans (pVLANs) are isolated ports within a Vlan while still being on the same subnet. The primary vlan is the main vlan that encompasses the secondary vlans. Secondary vlans can have community vlans, which can communicate which other devices within it, or the can be isolated, which cannot communicate with anything but promiscuous ports. Promiscuous ports can be reached by community vlans as well, and are usually servers and routers that everyone needs access to. Trunking Trunking allows VLANs to span multiple switches. ISL is a Cisco proprietary encapsulation for vlan traffic. 802.1q is an industry standard that tags the traffic with the vlan information. ISL is being phased out by Cisco. Native VLANs are a default vlans that 802.1q trunks tag when there is no vlan specified. Dynamic Trunking Protocol (DTP) is a cisco proprietary protocol that negotiates trunk ports between switches, and selects the trunking protocol to be used. Vlan mapping allows to limit vlans across a trunk, and allows you to control what is dropped. This can improve bandwidth and processor utilization. It also automatically will map extended 802.1q vlans to ISL vlan numbers if necessary. 802.1q also supports a feature called 802.1q-in-q tunneling. This allows service providers to transport Vlan traffic across their network, without the vlan information having to be unique. VTP Vlan Trunking Protocol is used to distribute and synchronize vlan information throughout the network. When a switch is configured as a Server in a vtp domain, it is able to create, modify and send vlan information to other switches using the latest information it receives from other switches. In transparent mode, a switch is able to modify vlan information and forward it, but it does not synchronize with other switches. When in client mode, a switch will receive and synchronize with the vtp information it receives, but it will not save them in nvram, and cannot modify them. When VTP is turned off, it simply drops vtp information. By default, VTP is flooded every 5 minutes, or whenever a change occurs. CCNA4.com
  • 2. CCNA4.com VTP pruning is when a switch determines certain information from the vtp floods does not need to go out. If a switch does not have any vlans from an advertisement, it will not be forwarded the unnecessary information. To secure vtp you can use authenticated passwords inside of vtp advertisements. -Configuration To configure a new VLAN use vlan 2 where 2 is the vlan ID to use You can name the vlan with name department You need to type exit to save the configs To assign a device port to a VLAN use switchport access vlan 2 To configure a trunk port, from the interface assign switchport trunk encapsulation dot1q Then switchport mode trunk To set the native vlan, switchport trunk native vlan 3 To configure VTP mode to server, use vtp server To set the domain, use vtp domain myname For authentication, use vtp password mypass And vtp pruning to enable pruning -Show Commands show id vlan 2 – displays information about a vlan show int fasteth 0/1 switchport – shows detained switchport information show int eth0/1 trunk – displays trunk information for the port show vtp status – displays vtp configurations show vtp counters – displays statistics on the vtp process By gt-rob Read more CCNA4.com