SlideShare a Scribd company logo
1 of 49
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 14: VLANs
Routing & Switching
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 3
3.1 VLAN Segmentation
3.2 VLAN Implementation
3.3 VLAN Security and Design
3.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 3: Objectives
 Explain the purpose of VLANs in a switched network.
 Analyze how a switch forwards frames based on VLAN configuration
in a multi-switched environment.
 Configure a switch port to be assigned to a VLAN based on
requirements.
 Configure a trunk port on a LAN switch.
 Configure Dynamic Trunk Protocol (DTP).
 Troubleshoot VLAN and trunk configurations in a switched network.
 Configure security features to mitigate attacks in a VLAN-segmented
environment.
 Explain security best practices for a VLAN-segmented environment.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
3.1 VLAN Segmentation
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview of VLANs
VLAN Definitions
 A VLAN is a logical partition of a Layer 2 network.
 Multiple partitions can be created, allowing for multiple VLANs to
co-exist.
 Each VLAN is a broadcast domain, usually with its own IP network.
 VLANs are mutually isolated and packets can only pass between
them via a router.
 The partitioning of the Layer 2 network takes place inside a Layer
2 device, usually via a switch.
 The hosts grouped within a VLAN are unaware of the VLAN’s
existence.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview of VLANs
VLAN Definitions (cont.)
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview of VLANs
Benefits of VLANs
 Security
 Cost reduction
 Better performance
 Shrink broadcast domains
 Improved IT staff efficiency
 Simpler project and application management
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview of VLANs
Types of VLANs
 Data VLAN
 Default VLAN
 Native VLAN
 Management VLAN
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview of VLANs
Types of VLANs (cont.)
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview of VLANs
Voice VLANs
 VoIP traffic is time-sensitive and requires:
• Assured bandwidth to ensure voice quality.
• Transmission priority over other types of network traffic.
• Ability to be routed around congested areas on the network.
• Delay of less than 150 ms across the network.
 The voice VLAN feature enables access ports to carry IP voice traffic
from an IP phone.
 The switch can connect to a Cisco 7960 IP phone and carry IP voice
traffic.
 The sound quality of an IP phone call can deteriorate if the data is
unevenly sent; the switch supports quality of service (QoS).
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview of VLANs
Voice VLANs (cont.)
 The Cisco 7960 IP phone has two RJ-45 ports that each
support connections to external devices.
• Network Port (10/100 SW) - Use this port to connect the
phone to the network. The phone can also obtain inline power
from the Cisco Catalyst switch over this connection.
• Access Port (10/100 PC) - Use this port to connect a network
device, such as a computer, to the phone.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview of VLANs
Voice VLANs (cont.)
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLANs in a Multi-Switched Environment
VLAN Trunks
 A VLAN trunk carries more than one VLAN.
 A VLAN trunk is usually established between switches so same-
VLAN devices can communicate, even if physically connected to
different switches.
 A VLAN trunk is not associated to any VLANs; neither is the trunk
ports used to establish the trunk link.
 Cisco IOS supports IEEE802.1q, a popular VLAN trunk protocol.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLANs in a Multi-Switched Environment
VLAN Trunks (cont.)
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLANs in a Multi-Switched Environment
Controlling Broadcast Domains with VLANs
 VLANs can be used to limit the reach of broadcast frames.
 A VLAN is a broadcast domain of its own.
 A broadcast frame sent by a device in a specific VLAN is forwarded
within that VLAN only.
 VLANs help control the reach of broadcast frames and their impact in
the network.
 Unicast and multicast frames are forwarded within the originating
VLAN.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLANs in a Multi-Switched Environment
Tagging Ethernet Frames for VLAN Identification
 Frame tagging is the process of adding a VLAN identification
header to the frame.
 It is used to properly transmit multiple VLAN frames through a trunk
link.
 Switches tag frames to identify the VLAN to that they belong.
Different tagging protocols exist; IEEE 802.1Q is a vey popular
example.
 The protocol defines the structure of the tagging header added to
the frame.
 Switches add VLAN tags to the frames before placing them into
trunk links and remove the tags before forwarding frames through
nontrunk ports.
 When properly tagged, the frames can transverse any number of
switches via trunk links and still be forwarded within the correct
VLAN at the destination.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLANs in a Multi-Switched Environment
Tagging Ethernet Frames for VLAN Identification
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLANs in a Multi-Switched Environment
Native VLANs and 802.1Q Tagging
 Frames that belong to the native VLAN are not tagged.
 Frames received untagged remain untagged and are placed in the
native VLAN when forwarded.
 If there are no ports associated to the native VLAN and no other
trunk links, an untagged frame is dropped.
 In Cisco switches, the native VLAN is VLAN 1, by default.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLANs in a Multi-Switched Environment
Voice VLAN Tagging
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20
3.2 VLAN Implementations
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
VLAN Ranges on Catalyst Switches
 Cisco Catalyst 2960 and 3560 Series switches support over 4,000
VLANs.
 VLANs are split into two categories:
• Normal range VLANs
• VLAN numbers from 1 to 1,005
• Configurations stored in the vlan.dat (in the flash memory)
• VTP can only learn and store normal range VLANs
• Extended Range VLANs
• VLAN numbers from 1,006 to 4,096
• Configurations stored in the running configuration (NVRAM)
• VTP does not learn extended range VLANs
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Creating a VLAN
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Assigning Ports to VLANs
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Assigning Ports to VLANs (cont.)
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Changing VLAN Port Membership
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Changing VLAN Port Membership (cont.)
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Deleting VLANs
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Verifying VLAN Information
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Verifying VLAN Information (cont.)
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Configuring IEEE 802.1q Trunk Links
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Resetting the Trunk To Default State
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Resetting the Trunk To Default State (cont.)
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VLAN Assignment
Verifying Trunk Configuration
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Trunking Protocol
Introduction to DTP
 Switch ports can be manually configured to form trunks.
 Switch ports can also be configured to negotiate and establish a
trunk link with a connected peer.
 The Dynamic Trunking Protocol (DTP) manages trunk negotiation.
 DTP is a Cisco proprietary protocol and is enabled, by default, in
Cisco Catalyst 2960 and 3560 switches.
 If the port on the neighbor switch is configured in a trunk mode that
supports DTP, it manages the negotiation.
 The default DTP configuration for Cisco Catalyst 2960 and 3560
switches is dynamic auto.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Trunking Protocol
Negotiated Interface Modes
 Cisco Catalyst 2960 and 3560 support the following trunk modes:
• Switchport mode dynamic auto
• Switchport mode dynamic desirable
• Switchport mode trunk
• Switchport nonegotiate
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting VLANs and Trunks
IP Addressing Issues with VLAN
 It is a common practice to associate a VLAN with an IP network.
 Because different IP networks only communicate through a router,
all devices within a VLAN must be part of the same IP network to
communicate.
 The figure displays that PC1 cannot communicate to the server
because it has a wrong IP address configured.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting VLANs and Trunks
Missing VLANs
 If all the IP addresses mismatches have been solved, but the
device still cannot connect, check if the VLAN exists in the switch.
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting VLANs and Trunks
Introduction to Troubleshooting Trunks
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting VLANs and Trunks
Common Problems with Trunks
 Trunking issues are usually associated with incorrect configurations.
 The most common type of trunk configuration errors are:
1. Native VLAN mismatches
2. Trunk mode mismatches
3. Allowed VLANs on trunks
 If a trunk problem is detected, the best practice guidelines
recommend to troubleshoot in the order shown above.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting VLANs and Trunks
Trunk Mode Mismatches
 If a port on a trunk link is configured with a trunk mode that is
incompatible with the neighboring trunk port, a trunk link fails to form
between the two switches.
 Use the show interfaces trunk command to check the status of the
trunk ports on the switches.
 To fix the problem, configure the interfaces with proper trunk modes.
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting VLANs and Trunks
Incorrect VLAN List
 VLANs must be allowed in the trunk before their frames can be
transmitted across the link.
 Use the switchport trunk allowed vlan command to specify which
VLANs are allowed in a trunk link.
 Use the show interfaces trunk command to ensure the correct
VLANs are permitted in a trunk.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 42
3.3 VLAN Security and
Design
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Attacks on VLANs
Switch Spoofing Attack
 There are a number of different types of VLAN attacks in modern
switched networks; VLAN hopping is one example.
 The default configuration of the switch port is dynamic auto.
 By configuring a host to act as a switch and form a trunk, an attacker
could gain access to any VLAN in the network.
 Because the attacker is now able to access other VLANs, this is
called a VLAN hopping attack.
 To prevent a basic switch spoofing attack, turn off trunking on all
ports, except the ones that specifically require trunking.
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Attacks on VLANs
Double-Tagging Attack
 Double-tagging attack takes advantage of the way that hardware on
most switches de-encapsulate 802.1Q tags.
 Most switches perform only one level of 802.1Q de-encapsulation,
allowing an attacker to embed a second, unauthorized attack header
in the frame.
 After removing the first and legit 802.1Q header, the switch forwards
the frame to the VLAN specified in the unauthorized 802.1Q header.
 The best approach to mitigating double-tagging attacks is to ensure
that the native VLAN of the trunk ports is different from the VLAN of
any user ports.
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Attacks on VLANs
Double-Tagging Attack (cont.)
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Attacks on VLANs
PVLAN Edge
 The Private VLAN (PVLAN) Edge
feature, also known as protected
ports, ensures that there is no
exchange of unicast, broadcast, or
multicast traffic between protected
ports on the switch.
 Local relevancy only.
 A protected port only exchanges
traffic with unprotected ports.
 A protected port does not exchange
traffic with another protected port.
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Design Best Practices for VLANs
VLAN Design Guidelines
 Move all ports from VLAN 1 and assign them to a not-in-use VLAN
 Shut down all unused switch ports.
 Separate management and user data traffic.
 Change the management VLAN to a VLAN other than VLAN 1.
(The same goes to the native VLAN.)
 Ensure that only devices in the management VLAN can connect to
the switches.
 The switch should only accept SSH connections.
 Disable autonegotiation on trunk ports.
 Do not use the auto or desirable switch port modes.
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 3: Summary
This chapter:
 Introduced VLANs and their types
 Described the connection between VLANs and broadcast domains
 Discussed IEEE 802.1Q frame tagging and how it enables
differentiation between Ethernet frames associated with distinct
VLANs as they traverse common trunk links.
 Examined the configuration, verification, and troubleshooting of
VLANs and trunks using the Cisco IOS CLI and explored basic
security and design considerations.
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4Chaing Ravuth
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF ConfigurationNetwax Lab
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkAutomating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkCisco Canada
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLANnewbie2019
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6Chaing Ravuth
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksAPNIC
 
Vlan Types
Vlan TypesVlan Types
Vlan TypesIT Tech
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking ProtocolNetwax Lab
 
Implémentation de la QoS au sein d'un IP/MPLS - Rapport
Implémentation de la QoS au sein d'un IP/MPLS - RapportImplémentation de la QoS au sein d'un IP/MPLS - Rapport
Implémentation de la QoS au sein d'un IP/MPLS - RapportRihab Chebbah
 

What's hot (20)

Voice over MPLS
Voice over MPLSVoice over MPLS
Voice over MPLS
 
VXLAN
VXLANVXLAN
VXLAN
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF Configuration
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkAutomating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS Network
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
Protection contre l'ARP poisoning et MITM
Protection contre l'ARP poisoning et MITMProtection contre l'ARP poisoning et MITM
Protection contre l'ARP poisoning et MITM
 
Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)Virtual Local Area Network (VLAN)
Virtual Local Area Network (VLAN)
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building Blocks
 
Vlan final
Vlan finalVlan final
Vlan final
 
Vlans
VlansVlans
Vlans
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
 
Vlan
Vlan Vlan
Vlan
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
Implémentation de la QoS au sein d'un IP/MPLS - Rapport
Implémentation de la QoS au sein d'un IP/MPLS - RapportImplémentation de la QoS au sein d'un IP/MPLS - Rapport
Implémentation de la QoS au sein d'un IP/MPLS - Rapport
 
Vlan
VlanVlan
Vlan
 

Similar to Chapter 14 : vlan

CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6Waqas Ahmed Nawaz
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingYaser Rahmati
 
KPUCC-Rs instructor ppt_chapter5_final
KPUCC-Rs instructor ppt_chapter5_finalKPUCC-Rs instructor ppt_chapter5_final
KPUCC-Rs instructor ppt_chapter5_finalFisal Anwari
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingVuz Dở Hơi
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptxBOURY1
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2Chaing Ravuth
 
CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3Irsandi Hasan
 
VLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxVLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxmuhammadFaheem656405
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5Chaing Ravuth
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationAmir Jafari
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area NetworkAtakan ATAK
 
Week4(1)(1)
Week4(1)(1)Week4(1)(1)
Week4(1)(1)trayyoo
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3Chaing Ravuth
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayVuz Dở Hơi
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalLeoo Romo
 

Similar to Chapter 14 : vlan (20)

CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN Routing
 
KPUCC-Rs instructor ppt_chapter5_final
KPUCC-Rs instructor ppt_chapter5_finalKPUCC-Rs instructor ppt_chapter5_final
KPUCC-Rs instructor ppt_chapter5_final
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
CCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptxCCNA_RSE_Chp6.pptx
CCNA_RSE_Chp6.pptx
 
Day 14.1 vlan
Day 14.1 vlanDay 14.1 vlan
Day 14.1 vlan
 
CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3
 
VLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptxVLAN chapters for networking CCNA_RSE_Chp6.pptx
VLAN chapters for networking CCNA_RSE_Chp6.pptx
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
Week4(1)(1)
Week4(1)(1)Week4(1)(1)
Week4(1)(1)
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
Icnd210 s02l01
Icnd210 s02l01Icnd210 s02l01
Icnd210 s02l01
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_final
 

More from teknetir

آموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapآموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapteknetir
 
CEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyCEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyteknetir
 
CEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingCEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingteknetir
 
CEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsCEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsteknetir
 
CEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksCEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksteknetir
 
CEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsCEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsteknetir
 
CEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionCEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionteknetir
 
CEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsCEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsteknetir
 
CEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversCEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversteknetir
 
CEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingCEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingteknetir
 
CEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceCEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceteknetir
 
CEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringCEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringteknetir
 
CEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingCEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingteknetir
 
CEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsCEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsteknetir
 
CEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingCEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingteknetir
 
CEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksCEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksteknetir
 
CEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceCEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceteknetir
 
CEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingCEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingteknetir
 
Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4teknetir
 
Chapter 21 : DHCP
Chapter 21 : DHCPChapter 21 : DHCP
Chapter 21 : DHCPteknetir
 

More from teknetir (20)

آموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapآموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmap
 
CEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyCEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptography
 
CEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingCEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computing
 
CEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsCEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypots
 
CEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksCEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networks
 
CEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsCEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platforms
 
CEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionCEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injection
 
CEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsCEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applications
 
CEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversCEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web servers
 
CEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingCEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijacking
 
CEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceCEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of service
 
CEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringCEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineering
 
CEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingCEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffing
 
CEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsCEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threats
 
CEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingCEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hacking
 
CEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksCEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networks
 
CEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceCEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissance
 
CEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingCEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hacking
 
Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4
 
Chapter 21 : DHCP
Chapter 21 : DHCPChapter 21 : DHCP
Chapter 21 : DHCP
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

Chapter 14 : vlan

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 14: VLANs Routing & Switching
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 3 3.1 VLAN Segmentation 3.2 VLAN Implementation 3.3 VLAN Security and Design 3.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 3: Objectives  Explain the purpose of VLANs in a switched network.  Analyze how a switch forwards frames based on VLAN configuration in a multi-switched environment.  Configure a switch port to be assigned to a VLAN based on requirements.  Configure a trunk port on a LAN switch.  Configure Dynamic Trunk Protocol (DTP).  Troubleshoot VLAN and trunk configurations in a switched network.  Configure security features to mitigate attacks in a VLAN-segmented environment.  Explain security best practices for a VLAN-segmented environment.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 3.1 VLAN Segmentation
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview of VLANs VLAN Definitions  A VLAN is a logical partition of a Layer 2 network.  Multiple partitions can be created, allowing for multiple VLANs to co-exist.  Each VLAN is a broadcast domain, usually with its own IP network.  VLANs are mutually isolated and packets can only pass between them via a router.  The partitioning of the Layer 2 network takes place inside a Layer 2 device, usually via a switch.  The hosts grouped within a VLAN are unaware of the VLAN’s existence.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview of VLANs VLAN Definitions (cont.)
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview of VLANs Benefits of VLANs  Security  Cost reduction  Better performance  Shrink broadcast domains  Improved IT staff efficiency  Simpler project and application management
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview of VLANs Types of VLANs  Data VLAN  Default VLAN  Native VLAN  Management VLAN
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview of VLANs Types of VLANs (cont.)
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview of VLANs Voice VLANs  VoIP traffic is time-sensitive and requires: • Assured bandwidth to ensure voice quality. • Transmission priority over other types of network traffic. • Ability to be routed around congested areas on the network. • Delay of less than 150 ms across the network.  The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone.  The switch can connect to a Cisco 7960 IP phone and carry IP voice traffic.  The sound quality of an IP phone call can deteriorate if the data is unevenly sent; the switch supports quality of service (QoS).
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview of VLANs Voice VLANs (cont.)  The Cisco 7960 IP phone has two RJ-45 ports that each support connections to external devices. • Network Port (10/100 SW) - Use this port to connect the phone to the network. The phone can also obtain inline power from the Cisco Catalyst switch over this connection. • Access Port (10/100 PC) - Use this port to connect a network device, such as a computer, to the phone.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview of VLANs Voice VLANs (cont.)
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLANs in a Multi-Switched Environment VLAN Trunks  A VLAN trunk carries more than one VLAN.  A VLAN trunk is usually established between switches so same- VLAN devices can communicate, even if physically connected to different switches.  A VLAN trunk is not associated to any VLANs; neither is the trunk ports used to establish the trunk link.  Cisco IOS supports IEEE802.1q, a popular VLAN trunk protocol.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLANs in a Multi-Switched Environment VLAN Trunks (cont.)
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLANs in a Multi-Switched Environment Controlling Broadcast Domains with VLANs  VLANs can be used to limit the reach of broadcast frames.  A VLAN is a broadcast domain of its own.  A broadcast frame sent by a device in a specific VLAN is forwarded within that VLAN only.  VLANs help control the reach of broadcast frames and their impact in the network.  Unicast and multicast frames are forwarded within the originating VLAN.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLANs in a Multi-Switched Environment Tagging Ethernet Frames for VLAN Identification  Frame tagging is the process of adding a VLAN identification header to the frame.  It is used to properly transmit multiple VLAN frames through a trunk link.  Switches tag frames to identify the VLAN to that they belong. Different tagging protocols exist; IEEE 802.1Q is a vey popular example.  The protocol defines the structure of the tagging header added to the frame.  Switches add VLAN tags to the frames before placing them into trunk links and remove the tags before forwarding frames through nontrunk ports.  When properly tagged, the frames can transverse any number of switches via trunk links and still be forwarded within the correct VLAN at the destination.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLANs in a Multi-Switched Environment Tagging Ethernet Frames for VLAN Identification
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLANs in a Multi-Switched Environment Native VLANs and 802.1Q Tagging  Frames that belong to the native VLAN are not tagged.  Frames received untagged remain untagged and are placed in the native VLAN when forwarded.  If there are no ports associated to the native VLAN and no other trunk links, an untagged frame is dropped.  In Cisco switches, the native VLAN is VLAN 1, by default.
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLANs in a Multi-Switched Environment Voice VLAN Tagging
  • 20. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20 3.2 VLAN Implementations
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment VLAN Ranges on Catalyst Switches  Cisco Catalyst 2960 and 3560 Series switches support over 4,000 VLANs.  VLANs are split into two categories: • Normal range VLANs • VLAN numbers from 1 to 1,005 • Configurations stored in the vlan.dat (in the flash memory) • VTP can only learn and store normal range VLANs • Extended Range VLANs • VLAN numbers from 1,006 to 4,096 • Configurations stored in the running configuration (NVRAM) • VTP does not learn extended range VLANs
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Creating a VLAN
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Assigning Ports to VLANs
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Assigning Ports to VLANs (cont.)
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Changing VLAN Port Membership
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Changing VLAN Port Membership (cont.)
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Deleting VLANs
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Verifying VLAN Information
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Verifying VLAN Information (cont.)
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Configuring IEEE 802.1q Trunk Links
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Resetting the Trunk To Default State
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Resetting the Trunk To Default State (cont.)
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential VLAN Assignment Verifying Trunk Configuration
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Trunking Protocol Introduction to DTP  Switch ports can be manually configured to form trunks.  Switch ports can also be configured to negotiate and establish a trunk link with a connected peer.  The Dynamic Trunking Protocol (DTP) manages trunk negotiation.  DTP is a Cisco proprietary protocol and is enabled, by default, in Cisco Catalyst 2960 and 3560 switches.  If the port on the neighbor switch is configured in a trunk mode that supports DTP, it manages the negotiation.  The default DTP configuration for Cisco Catalyst 2960 and 3560 switches is dynamic auto.
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Trunking Protocol Negotiated Interface Modes  Cisco Catalyst 2960 and 3560 support the following trunk modes: • Switchport mode dynamic auto • Switchport mode dynamic desirable • Switchport mode trunk • Switchport nonegotiate
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting VLANs and Trunks IP Addressing Issues with VLAN  It is a common practice to associate a VLAN with an IP network.  Because different IP networks only communicate through a router, all devices within a VLAN must be part of the same IP network to communicate.  The figure displays that PC1 cannot communicate to the server because it has a wrong IP address configured.
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting VLANs and Trunks Missing VLANs  If all the IP addresses mismatches have been solved, but the device still cannot connect, check if the VLAN exists in the switch.
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting VLANs and Trunks Introduction to Troubleshooting Trunks
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting VLANs and Trunks Common Problems with Trunks  Trunking issues are usually associated with incorrect configurations.  The most common type of trunk configuration errors are: 1. Native VLAN mismatches 2. Trunk mode mismatches 3. Allowed VLANs on trunks  If a trunk problem is detected, the best practice guidelines recommend to troubleshoot in the order shown above.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting VLANs and Trunks Trunk Mode Mismatches  If a port on a trunk link is configured with a trunk mode that is incompatible with the neighboring trunk port, a trunk link fails to form between the two switches.  Use the show interfaces trunk command to check the status of the trunk ports on the switches.  To fix the problem, configure the interfaces with proper trunk modes.
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting VLANs and Trunks Incorrect VLAN List  VLANs must be allowed in the trunk before their frames can be transmitted across the link.  Use the switchport trunk allowed vlan command to specify which VLANs are allowed in a trunk link.  Use the show interfaces trunk command to ensure the correct VLANs are permitted in a trunk.
  • 42. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 42 3.3 VLAN Security and Design
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Attacks on VLANs Switch Spoofing Attack  There are a number of different types of VLAN attacks in modern switched networks; VLAN hopping is one example.  The default configuration of the switch port is dynamic auto.  By configuring a host to act as a switch and form a trunk, an attacker could gain access to any VLAN in the network.  Because the attacker is now able to access other VLANs, this is called a VLAN hopping attack.  To prevent a basic switch spoofing attack, turn off trunking on all ports, except the ones that specifically require trunking.
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Attacks on VLANs Double-Tagging Attack  Double-tagging attack takes advantage of the way that hardware on most switches de-encapsulate 802.1Q tags.  Most switches perform only one level of 802.1Q de-encapsulation, allowing an attacker to embed a second, unauthorized attack header in the frame.  After removing the first and legit 802.1Q header, the switch forwards the frame to the VLAN specified in the unauthorized 802.1Q header.  The best approach to mitigating double-tagging attacks is to ensure that the native VLAN of the trunk ports is different from the VLAN of any user ports.
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Attacks on VLANs Double-Tagging Attack (cont.)
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Attacks on VLANs PVLAN Edge  The Private VLAN (PVLAN) Edge feature, also known as protected ports, ensures that there is no exchange of unicast, broadcast, or multicast traffic between protected ports on the switch.  Local relevancy only.  A protected port only exchanges traffic with unprotected ports.  A protected port does not exchange traffic with another protected port.
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Design Best Practices for VLANs VLAN Design Guidelines  Move all ports from VLAN 1 and assign them to a not-in-use VLAN  Shut down all unused switch ports.  Separate management and user data traffic.  Change the management VLAN to a VLAN other than VLAN 1. (The same goes to the native VLAN.)  Ensure that only devices in the management VLAN can connect to the switches.  The switch should only accept SSH connections.  Disable autonegotiation on trunk ports.  Do not use the auto or desirable switch port modes.
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 3: Summary This chapter:  Introduced VLANs and their types  Described the connection between VLANs and broadcast domains  Discussed IEEE 802.1Q frame tagging and how it enables differentiation between Ethernet frames associated with distinct VLANs as they traverse common trunk links.  Examined the configuration, verification, and troubleshooting of VLANs and trunks using the Cisco IOS CLI and explored basic security and design considerations.
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential