Instructor & Todd Lammle

Slides:



Advertisements
Similar presentations
LAN Segmentation Virtual LAN (VLAN).
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Virtual LANs.
VLAN KRISHNAKUMAR RAJENDRAN NIKITA PATEL TEJENDRA PATEL Guided by Prof, Edmund Gean.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Instructor & Todd Lammle
VLANs- Chapter 3 CCNA Exploration Semester 3 Modified by Profs. Ward
Layer 2: Redundancy and High Availability Part 1: General Overview on Assignment 1.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 8: Virtual LANs (VLANs)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Sybex CCNA Chapter 9: VLAN’s Instructor & Todd Lammle.
Ch. 8 – VLANs (Virtual LANs)
VLANs.ppt CCNA Exploration Semester 3 Chapter 3
CCENT Study Guide Chapter 11 VLANs and Inter-VLAN Routing.
Voice VLANs Lecture 7 VLANs.ppt 21/04/ Apr-17
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Instructor & Todd Lammle
Sybex CCNA Chapter 11: VLAN’s Instructor & Todd Lammle.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VLANs.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
Chapter 8: Virtual LAN (VLAN)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Chapter 6 1 Chap 6 – Implement Inter-VLAN Routing Learning Objectives Explain to the satisfaction of a qualified instructor how network traffic is routed.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching 3.0.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
W&L Page 1 CCNA CCNA Training 2.7 Configure and verify trunking on Cisco switches Jose Luis Flores / Amel Walkinshaw Aug, 2015.
Switching Topic 2 VLANs.
Virtual Local Area Networks (VLANs) Part II
Configuring VLAN Chapter 14 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Understand basic concept of VLAN  Configure.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Instructor & Todd Lammle Sybex CCNA Chapter 9: VLAN’s 1.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
+ Lecture#8: VLAN Asma AlOsaimi Topics VLAN Segmentation VLAN Implementation VLAN Security and Design 3.0.
LAN Switching Virtual LANs. Virtual LAN Concepts A LAN includes all devices in the same broadcast domain. A broadcast domain includes the set of all LAN-connected.
Chapter 6 Thanks to the instructors at St. Clair College in Windsor, Ontario.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
Instructor Materials Chapter 2: Scaling VLANs
Instructor & Todd Lammle
Instructor & Todd Lammle
Instructor & Todd Lammle
Chapter 10 Layer 2 Switching
Switching and VLANs.
Chapter 11 VLANs and Inter-VLAN Routing
Switching and VLANs.
Instructor Materials Chapter 6: VLANs
VLANs: Virtual Local Area Networks
Chapter 5: Inter-VLAN Routing
Instructor: Mr Malik Zaib
Virtual LANs.
Chapter 2: Scaling VLANs
Instructor & Todd Lammle
VLAN BASIC
Implement Inter-VLAN Routing
Routing and Switching Essentials v6.0
CCNA Routing and Switching Routing and Switching Essentials v6.0
Switching and VLANs.
Chapter 3: Implementing VLAN Security
Switching and VLANs.
Implement Inter-VLAN Routing
Chapter 2: Scaling VLANs
Implement Inter-VLAN Routing
Implement Inter-VLAN Routing
Presentation transcript:

Instructor & Todd Lammle Sybex CCENT 100-101 Chapter 11: VLANs and Inter-VLAN Routing Instructor & Todd Lammle

Chapter 11 Objectives The CCENT Topics Covered in this chapter include: LAN Switching Technologies Describe how VLANs create logically separate networks and the need for routing between them. Explain network segmentation and basic traffic management concepts Configure and verify VLANs Configure and verify trunking on Cisco switches DTP Auto negotiation IP Routing Technologies Configure and verify interVLAN routing (Router on a stick) sub interfaces upstream routing encapsulation Configure SVI interfaces Troubleshooting Troubleshoot and Resolve VLAN problems identify that VLANs are configured port membership correct IP address configured Troubleshoot and Resolve trunking problems on Cisco switches correct trunk states correct encapsulation configured correct vlans allowed 2

What’s VLAN? By default, Switches break up collision domain and routers break up broadcast domain How to break up broadcast domain in a pure switched internetwork? – VLAN A VLAN is a logical grouping of network users and resources connected to administratively defined ports on a switch

Figure 11.1: Flat network structure With this configuration, every broadcast packet transmitted is seen by every device on the network regardless of whether the device needs to receive that data or not.

Figure 11.2: The benefit of a switched network Figure 11.2 pictures a switched network and shows Host A sending a frame with Host D as its destination. Clearly, the important factor here is that the frame is only forwarded out the port where Host D is located.

Figure 11.3: One switch, one LAN: Before VLANs, there was no separation between hosts. Figure 11.3 shows all hosts in this very small company connected to one switch, meaning all hosts will receive all frames, which is the default behavior of all switches. --- security issue!

Figure 11.4: One switch, two virtual LANs (logical separation between hosts): Still physically one switch, but this switch acts as many separate devices. In Figure 11.4, I configured the switch to be two separate LANs, two subnets, two broadcast domains, two VLANs—they all mean the same thing—without buying another switch.

VLANs simplify network management

Identifying VLANs Switch ports Layer 2-only interfaces that are associated with a physical port that can belong to One VLAN if it’s an access port Or all VLANs if it’s a trunk port There are access ports for each host and an access port between switches-on for each VLAN

Figure 11.5: Access ports

Access ports An access port belongs to and carries the traffic of only one VLAN. Traffic is both received and sent in native formats with no VLAN information (tagging) whatsoever. Anything arriving on an access port is simply assumed to belong to the VLAN assigned to the port. Because an access port doesn’t look at the source address, tagged traffic—a frame with added VLAN information—can be correctly forwarded and received only on trunk ports.

Trunk points Trunk ports carry multiple VLANs at a time A trunk link is a 100, 1000, or 10000 Mbps point-to-point link between two switches, between a switch and router, or even between a switch and server It carries the traffic of multiple VLANs—from 1 to 4,094 VLANs at a time. But the amount is really only up to 1,001 unless you’re going with something called extended VLANs.

Advantages of trunking Make a single port part of a whole bunch of different VLANs at the same time Set ports up to have a server in two separate broadcast domains simultaneously Users don’t have to cross a router to access it. Trunk links can carry the frames of various VLANs, but by default, if the links between your switches aren’t trunked, only information from the configure access VLAN will be switched across that link All VLANs send information on a trunked link unless you clear each VLAN by hank

Frame tagging VLANs can span multiple switches A switch needs to keep track of all the users and frames as they travel the switch fabric and VLANs Switch fabric: a group of switches that share the same VLAN information Frame tagging is a frame identification method Assigns a user-defined VLAN ID to each frame

How frame tagging works? Once within the switch fabric, each switch that the frame reaches must first identify the VLAN ID from the frame tag It then finds out what to do with the frame by looking at the information in the forward/filter table If the frame reaches a switch that has another trunked link, the frame will be forwarded out of the trunk-link port Once the frame reaches an exit that’s determined by the forward/filter table to be an access link matching the frame’s VLAN ID, the switch will remove the VLAN identification The destination device can receive the frames without being required to understand their VLAN identification information

Figure 11.6: 2 VLANs can span across 2 switches by using trunk links, which carry traffic for multiple VLANs.

VLAN identification methods Inter-Switch Link (ISL) A way of explicitly tagging VLAN information onto an Ethernet frame ISL is proprietary to Cisco switches IEEE 802.1q Inserts a field into the frame to identify the VLAN First designate each port that’s going to be a trunk with 802.1q encapsulation The other ports must be assigned a specific VLAN iD in order for them to communicate VLAN 1 is the default native VLAN, and when using 802.1q, all traffic for a native VLAN is untagged The ports that population the same trunk create a group with this native VLAN and each port gets tagged with and identification number reflecting that The native VLAN allows the trunks to accept information that was received without any VLAN identification or frame tag

Figure 11.7: IEEE 802.1q encapsulation with and without the 802.1q tag Created by the IEEE as a standard method of frame tagging, IEEE 802.1q actually inserts a field into the frame to identify the VLAN.

Routing between VLANs VLANs create network partitioning and traffic separation at layer 2. If you want hosts to communicate between VLANs, you must have a layer 3 device to provide routing You can use a router that has an interface for each VLAN or a router that supports ISL or 802.1q routing

Figure 11.8: Router connecting three VLANs together for inter-VLAN communication, one router interface for each VLAN What we see in Figure 11.8 is that each router interface is plugged into an access link. This means that each of the routers’ interface IP addresses would then become the default gateway address for each host in each respective VLAN.

Figure 11.9: “Router on a stick”: Single router interface connecting all three VLANs together for inter-VLAN communication Instead of using a router interface for each VLAN, you can use one FastEthernet interface and run ISL or 802.1q trunking. Figure 11.9 shows how a FastEthernet interface on a router will look when configured with ISL or 802.1q trunking. This allows all VLANs to communicate through one interface. Cisco calls this a “router on a stick (ROAS)”.

Figure 11.10: A router creates logical interfaces. Figure 11.10 shows how we would create a router on a stick using a router’s physical interface by creating logical interfaces—one for each VLAN.

Figure 11.11: With IVR, routing runs on the backplane of the switch, and it appears to the hosts that a router is present. To implement IVR on a multilayer switch, we just need to create logical interfaces in the switch configuration for each VLAN. Instead of using an external router interface for each VLAN, or an external router on a stick, we can configure logical interfaces on the backplane of the layer 3 switch; this is called inter-VLAN routing (IVR).

Creating VLANs example The example shows how to create VLANs on the S1 switch by creating 3 vlans for three different departments.

Creating VLAN’s S1(config)#vlan ? WORD ISL VLAN IDs 1-4094 access-map Create vlan access-map or enter vlan access-map command mode dot1q dot1q parameters filter Apply a VLAN Map group Create a vlan group internal internal VLAN S1(config)#vlan 2 S1(config-vlan)#name Sales S1(config-vlan)#vlan 3 S1(config-vlan)#name Marketing S1(config-vlan)#vlan 4 S1(config-vlan)#name Accounting S1(config-vlan)#^Z S1# Decides how many vlans to create Which users belong to which vlan?

Viewing Access Ports Once the VLANs are created, verify your configuration with the show vlan command (sh vlan for short): S1#sh vlan   VLAN Name Status Ports ---- ------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Gi0/1 Gi0/2 2 Sales active 3 Marketing active 4 Accounting active [output cut]

View Trunk Ports S1# show interfaces trunk Port Mode Encapsulation Status Native vlan Fa0/15 desirable n-isl trunking 1 Fa0/16 desirable n-isl trunking 1 Fa0/17 desirable n-isl trunking 1 Fa0/18 desirable n-isl trunking 1   Port Vlans allowed on trunk Fa0/15 1-4094 Fa0/16 1-4094 Fa0/17 1-4094 Fa0/18 1-4094 [output cut]

Sho interface interface switchport Another helpful command, which is also part of the Cisco exam objectives, is the show interfaces interface switchport command. S1#sh interfaces FastEthernet0/15 switchport Name: Fa0/15 Switchport: Enabled Administrative Mode: dynamic desirable Operational Mode: trunk Administrative Trunking Encapsulation: negotiate Operational Trunking Encapsulation: isl Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Administrative Native VLAN tagging: enabled Voice VLAN: none [output cut]

Assigning access ports S3(config-if)#int fa0/3 S3(config-if)#switchport mode ? access Set trunking mode to ACCESS unconditionally dot1q-tunnel set trunking mode to TUNNEL unconditionally dynamic Set trunking mode to dynamically negotiate access or trunk mode private-vlan Set private-vlan mode trunk Set trunking mode to TRUNK unconditionally   S3(config-if)#switchport mode access S3(config-if)#switchport access vlan 3 By starting with the switchport mode access command, you’re telling the switch that this is a nontrunking layer 2 port.

Assigning access ports cont.

Configuring Trunk ports The following switch output shows the trunk configuration on interfaces Fa0/15–18 as set to trunk: S1(config)#int range f0/15-18 S1(config-if-range)#switchport trunk encapsulation dot1q S1(config-if-range)#switchport mode trunk

Defining the allowed VLANs on a trunk

Figure 11.16: Inter-VLAN routing with a multilayer switch config)#ip routing S1(config)#int vlan 10 S1(config-if)#ip address 192.168.10.1 255.255.255.0 S1(config-if)#int vlan 20 S1(config-if)#ip address 192.168.20.1 255.255.255.0 Set your hosts to the IP address associated to their VLAN, and that’s it takes!

Written Labs and Review Questions Read through the Exam Essentials section together in class Open your books and go through all the written labs and the review questions. Review the answers in class. 34