Author: Bill Buchanan. 1. Broadcast: What is the MAC address of this network address? 2. Requested host: All the hosts read the broadcast and checks.

Slides:



Advertisements
Similar presentations
LAN Segmentation Virtual LAN (VLAN).
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Virtual LANs.
VLAN KRISHNAKUMAR RAJENDRAN NIKITA PATEL TEJENDRA PATEL Guided by Prof, Edmund Gean.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
VLANs Virtual LANs CIS 278.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
1 Inter-VLAN routing Chapter 6 CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino.
VLANs (Virtual LANs) CS 158B Elaine Lim Allison Nham.
VLANs Semester 3, Chapter 3 Allan Johnson Website:
VLANs- Chapter 3 CCNA Exploration Semester 3 Modified by Profs. Ward
Layer 2: Redundancy and High Availability Part 1: General Overview on Assignment 1.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 8: Virtual LANs (VLANs)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Connecting LANs, Backbone Networks, and Virtual LANs
Sybex CCNA Chapter 9: VLAN’s Instructor & Todd Lammle.
Ch. 8 – VLANs (Virtual LANs)
VLANs.ppt CCNA Exploration Semester 3 Chapter 3
CCENT Study Guide Chapter 11 VLANs and Inter-VLAN Routing.
Ethernet Errors and Problems
1 Lecture #6 Switch – VLAN Asst.Prof. Dr.Anan Phonphoem Department of Computer Engineering, Faculty of Engineering, Kasetsart University, Bangkok, Thailand.
Advanced Computer Networks
Voice VLANs Lecture 7 VLANs.ppt 21/04/ Apr-17
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Semester 3, v Chapter 3: Virtual LANs
Sybex CCNA Chapter 11: VLAN’s Instructor & Todd Lammle.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VLANs.
CN2668 Routers and Switches (V2) Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Chapter 9 Virtual LANs (VLANs). Setup 1 Setup 2.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
Chapter 8: Virtual LAN (VLAN)
© 1999, Cisco Systems, Inc. Module 9: Understanding Virtual LANs.
CCNA 3 Week 9 VLAN Trunking. Copyright © 2005 University of Bolton Origins Dates back to radio and telephone Trunk carries multiple channels over a single.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
Switching Topic 2 VLANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Configuring VLAN Chapter 14 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Understand basic concept of VLAN  Configure.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Instructor & Todd Lammle Sybex CCNA Chapter 9: VLAN’s 1.
W&L Page 1 CCNA CCNA Training 2.5 Describe how VLANs create logically separate networks and the need for routing between them Jose Luis.
OSI Model Topology Patch cable Flow control Common layer 2 device Best path Purpose of Layer 2 devices.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Presented BY Kanav Dev Singh B.Tech I.T (8 Th sem)
LAN Switching Virtual LANs. Virtual LAN Concepts A LAN includes all devices in the same broadcast domain. A broadcast domain includes the set of all LAN-connected.
Chapter 6 Thanks to the instructors at St. Clair College in Windsor, Ontario.
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 8 – Virtual LANs Virtual LANs VLAN Concepts VLAN Configuration.
Virtual Local Area Networks In Security By Mark Reed.
Instructor Materials Chapter 2: Scaling VLANs
Virtual Local Area Networks or VLANs
Instructor & Todd Lammle
Link Layer 5.1 Introduction and services
HELLO WORLD!!! Run Project 2: WELCOME Subject: Virtual LAN’s
Chapter 5: Inter-VLAN Routing
Virtual LANs.
Chapter 2: Scaling VLANs
Routing and Switching Essentials v6.0
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
Chapter 2: Scaling VLANs
Presentation transcript:

Author: Bill Buchanan

1. Broadcast: What is the MAC address of this network address? 2. Requested host: All the hosts read the broadcast and checks if it relates to them. If it does then they respond back with their MAC address. 3. Updated ARP table: All the hosts update their ARP table with the correct IP and MAC address for the host.

Author: Bill Buchanan Bridge Router Broadcast Repeaters: Forward broadcasts Bridges: Forward broadcasts Routers: Block broadcasts

Author: Bill Buchanan Repeater Bridge Router Network segment (repeater extends the network segment) Bridge only forwards if the MAC address is not on the current segment. Router only forwards if the network address is not on the current segment.

Author: Bill Buchanan Switch Repeater A B C D Hub EF G H Repeater Bridge I J K Repeater Switch Broadcast domains

Author: Bill Buchanan Switch Repeater A B C D Hub EF G H Repeater Bridge I J K Repeater Switch Broadcast domains

Author: Bill Buchanan Switch Repeater A B C D Hub EF G H Repeater Bridge I J K Repeater Switch Broadcast domains

Author: Bill Buchanan Switch Repeater A B C D Hub EF G H Repeater Bridge I J K Repeater Switch Broadcast domains

Author: Bill Buchanan Switch Repeater A B C D Hub EF G H Repeater Bridge I J K Repeater Switch Collision domains

Author: Bill Buchanan IP and TCP... The Greatest of the Protocols!

Author: Bill Buchanan

Network Data Link Physical IP address is used to route data around the Internet TCP part allows applications to communicate over the network

Author: Bill Buchanan

Why VLANs? VLAN1 VLAN2 Server1 Server2 PC1 PC8 PC9 PC16

Author: Bill Buchanan Why VLANs? VLAN1 VLAN2

Author: Bill Buchanan VLAN1 VLAN2 Broadcast domain

Author: Bill Buchanan Why VLANs? Microsegmentation. This involves dividing a network into smaller segments, which will increase the overall bandwidth available to networked devices. Enhanced security. vLANs help to isolate network traffic so that traffic which stays within a vLAN will not be transmitted outside it. Thus it is difficult for an external user to ‘listen’ to any of the data that is transmitted across the vLAN, unless they can get access to one of the ports of the vLAN device. Relocate servers into secured locations. vLANs allows for servers to be put in a physical location in which they cannot be tampered with. This will typically be in a secure room, which is under lock and key. The vLAN can be used to map hosts to servers. Easy creation of IP subnets. vLANs allow the creation of IP subnets, which are not dependent on the physical location of a node. Users can also remain part of a subnet, even if they move their computer. Microsegmentation. This involves dividing a network into smaller segments, which will increase the overall bandwidth available to networked devices. Enhanced security. vLANs help to isolate network traffic so that traffic which stays within a vLAN will not be transmitted outside it. Thus it is difficult for an external user to ‘listen’ to any of the data that is transmitted across the vLAN, unless they can get access to one of the ports of the vLAN device. Relocate servers into secured locations. vLANs allows for servers to be put in a physical location in which they cannot be tampered with. This will typically be in a secure room, which is under lock and key. The vLAN can be used to map hosts to servers. Easy creation of IP subnets. vLANs allow the creation of IP subnets, which are not dependent on the physical location of a node. Users can also remain part of a subnet, even if they move their computer.

Author: Bill Buchanan Why VLANs? Creation of virtual networks. Just as many organizations build open-plan offices which can be changed when required, vLANs can be used to reconfigure the logical connections to a network without actually having to physically move any of the resources. Ease of administration. vLANs allow networks to be easily configured, possibly at a distance from the configured networks. In the past reconfiguration has meant recabling and the movement of networked resources. Improved bandwidth usage. Normally users who work in a similar area share resources. This is typically known as a workgroup. If workgroups can be isolated from other workgroups then traffic which stays within each of the workgroups does not affect other workgroups. A vLAN utilizes this concept by grouping users who share information and configuring the networked resources around them. Creation of virtual networks. Just as many organizations build open-plan offices which can be changed when required, vLANs can be used to reconfigure the logical connections to a network without actually having to physically move any of the resources. Ease of administration. vLANs allow networks to be easily configured, possibly at a distance from the configured networks. In the past reconfiguration has meant recabling and the movement of networked resources. Improved bandwidth usage. Normally users who work in a similar area share resources. This is typically known as a workgroup. If workgroups can be isolated from other workgroups then traffic which stays within each of the workgroups does not affect other workgroups. A vLAN utilizes this concept by grouping users who share information and configuring the networked resources around them.

Author: Bill Buchanan

VLAN Types Static VLANs. These are ports on a switch that are statically assigned to a VLAN. These remain permanently assigned, until they are changed by the administrator. Static vLANs are secure and easy to configure, and are useful where vLANs are fairly well defined. Dynamic VLANs. These are ports on a switch which automatically determine their VLAN assignments. This is achieved with intelligent management software, using MAC addresses, logical addressing, or the protocol type of the data packets. Initially, where a node connects to the switch, the switch detects its MAC address entry in the VLAN management database and dynamically configures the port with the corresponding VLAN configuration. The advantage of dynamic vLANs is that they require less setup from the administrator (but the database must be initially created). Static VLANs. These are ports on a switch that are statically assigned to a VLAN. These remain permanently assigned, until they are changed by the administrator. Static vLANs are secure and easy to configure, and are useful where vLANs are fairly well defined. Dynamic VLANs. These are ports on a switch which automatically determine their VLAN assignments. This is achieved with intelligent management software, using MAC addresses, logical addressing, or the protocol type of the data packets. Initially, where a node connects to the switch, the switch detects its MAC address entry in the VLAN management database and dynamically configures the port with the corresponding VLAN configuration. The advantage of dynamic vLANs is that they require less setup from the administrator (but the database must be initially created).

Author: Bill Buchanan Static VLAN configuration

Author: Bill Buchanan VLAN types Port-Based VLAN. Port defines the VLAN. MAC-based VLAN. MAC addresses define the membership. Protocol-based VLAN. Defined by Layer 3 protocol, such as for IP or IPX. SSID-based. This defines that certain nodes which authenticate to a certain SSID are part of a VLAN. ATM VLAN. This maps Ethernet packets into ATM cells. Port-Based VLAN. Port defines the VLAN. MAC-based VLAN. MAC addresses define the membership. Protocol-based VLAN. Defined by Layer 3 protocol, such as for IP or IPX. SSID-based. This defines that certain nodes which authenticate to a certain SSID are part of a VLAN. ATM VLAN. This maps Ethernet packets into ATM cells.

Author: Bill Buchanan Dynamic VLANs

Author: Bill Buchanan VMPS (VLAN Management Policy Server)

Author: Bill Buchanan InterVLAN VLAN1 VLAN2 A B C VLANs intercommunicate through the router. IP addresses used to route.

Author: Bill Buchanan VLAN1 VLAN2 A B C VLANs intercommunicate through the Layer 3 switching

Author: Bill Buchanan SSID: VLAN1SSID: VLAN2 SSID: VLAN3 VLAN3 VLAN2

Author: Bill Buchanan

IEEE 802.1Q VLAN1 VLAN2 Data Frame VLAN1 Data Frame

Author: Bill Buchanan Ethernet Data frame

Author: Bill Buchanan Ethernet Data frame

Author: Bill Buchanan IEEE 802.1Q encapsulation

Author: Bill Buchanan ISL Trunks

Author: Bill Buchanan Trunking between VLANs

Author: Bill Buchanan

(config)# dot11 ssid Scotland (config-ssid)# authentication open (config-ssid)# vlan 1 (config-ssid)# guest-mode (config-ssid)# exit (config)# dot11 ssid England (config-ssid)# authentication open (config-ssid)# vlan 2 (config-ssid)# exit (config)# interface BVI1 (config-if)# ip address (config)# interface Dot11Radio0 (config-if)# channel 1 (config-if)# ssid Scotland (config-if)# ssid England (config-if)# no shutdown (config-if)# int fa0 (config-if)# no shutdown

Author: Bill Buchanan (config)# interface Dot11Radio0.1 (config-subif)# ? Interface configuration commands:... encapsulationSet encapsulation type for an interface... (config-subif)# encapsulation ? dot1Q IEEE 802.1Q Virtual LAN (config-subif)# encapsulation dot1q ? IEEE 802.1Q VLAN ID (config-subif)# encapsulation dot1q 1 ? native Make this as native vlan (config-if)# encapsulation dot1q 1 native (config-if)# bridge-group 1 (config-if)# interface Dot11Radio0.2 (config-if)# encapsulation dot1q 2 (config-if)# bridge-group 2

Author: Bill Buchanan # show vlan Virtual LAN ID: 1 (IEEE 802.1Q Encapsulation) vLAN Trunk Interfaces: Dot11Radio0.1 Virtual-Dot11Radio0.1 This is configured as native Vlan for the following int(s): Dot11Radio0 Virtual-Dot11Radio0 Protocols Configured: Address: Received: Transmitted: Bridging Bridge Group Virtual LAN ID: 2 (IEEE 802.1Q Encapsulation) vLAN Trunk Interfaces: Dot11Radio0.2 Virtual-Dot11Radio0.2 Protocols Configured: Address: Received: Transmitted: Bridging Bridge Group 2 1 0

Author: Bill Buchanan VLAN1 VLAN2

Author: Bill Buchanan # config t (config)# int vlan 1 (config-vlan)# exit (config)# int vlan 2 (config-vlan)# exit (config)# int fa0/1 (config-if)# switchport trunk encapsulation dot1q (config-if)# switchport trunk native vlan 1 (config-if)# switchport trunk allowed vlan 1,2 (config-if)# switchport mode trunk (config-if)# switchport nonegotiate (config-if)# int fa0/2 (config-if)# switchport trunk encapsulation dot1q (config-if)# switchport trunk native vlan 1 (config-if)# switchport trunk allowed vlan 1,2 (config-if)# switchport mode trunk (config-if)# switchport nonegotiate (config-if)# int fa0/3 (config-if)# switchport trunk encapsulation dot1q (config-if)# switchport trunk native vlan 1 (config-if)# switchport trunk allowed vlan 1,2 (config-if)# switchport mode trunk (config-if)# switchport nonegotiate

Author: Bill Buchanan (config)# dot11 ssid Scotland (config-ssid)# mbssid guest-mode (config-ssid)# authentication open (config-ssid)# vlan 1 (config-ssid)# exit (config)# dot11 ssid England (config-ssid)# mbssid guest-mode (config-ssid)# authentication open (config-ssid)# vlan 2 (config-ssid)# exit (config)# int d0 (config-if)# mbssid (config-if)# ssid Scotland (config-if)# ssid England (config-if)# channel 1 (config-if)# no shut (config-if)# exit (config)# int d0.1 (config-if)# encapsulation dot1q 1 native (config-if)# int fa0.1 (config-if)# encapsulation dot1q 1 native (config-if)# int d0.2 (config-if)# encapsulation dot1q 2 (config-if)# bridge-group 2 (config-if)# int fa0.2 (config-if)# encapsulation dot1q 2 (config-if)# bridge-group 2

Author: Bill Buchanan VTP

Author: Bill Buchanan VTP Domain

Author: Bill Buchanan

Applications

Author: Bill Buchanan SSID: ScotlandSSID: England SSID: Ireland VLAN3 VLAN2

Author: Bill Buchanan VLAN3 VLAN2 SSID: ScotlandSSID: England SSID: Ireland

Author: Bill Buchanan VLAN3 VLAN2 SSID: ScotlandSSID: England SSID: Ireland