This document discusses inter-VLAN routing and different methods for implementing it. It introduces inter-VLAN routing as a process of forwarding traffic between VLANs using a router. There are three main methods discussed: traditional routing using one interface per VLAN, router-on-a-stick using subinterfaces on a single router interface, and switch-based routing using switch virtual interfaces. The document provides detailed explanations and configurations for router-on-a-stick inter-VLAN routing.
This document provides instructions for configuring basic inter-VLAN routing between VLANs on switches and a router. It includes:
- Configuring VLANs, trunk ports, and IP addresses on switches to segment traffic into VLANs 10, 20, 30, and 99.
- Assigning switch ports, PCs, and a server to the appropriate VLANs and IP subnets.
- Clearing the configuration on a router and preparing it to route between the VLANs.
This document discusses inter-VLAN routing and two common methods: using a router on a stick configuration or an internal router within a multilayer switch. With a router on a stick, subinterfaces are used to separate VLANs on the router and 802.1Q trunking passes traffic between VLANs. Alternatively, some switches have an internal router module that can perform inter-VLAN routing without subinterfaces by configuring VLAN routing and trunking interfaces. The document provides examples of configuring both approaches and discusses their application in campus network designs.
Inter-VLAN routing is the process of forwarding network traffic from one VLAN to another VLAN using a
router.
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to
communicate with hosts in another VLAN, the traffic must be routed between them. This is known as
inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces (Switch virtual
interfaces (SVI)).
This document provides instructions for configuring inter-VLAN routing on a network with three switches and one router. It describes preparing the network topology, configuring basic settings on the devices, creating VLANs on the switches, configuring trunk links and EtherChannels, and using 802.1Q encapsulation on the router interfaces to route between the VLANs. Verification steps are provided to test the configuration at each stage.
This document provides an overview of VLAN concepts, configuration, and troubleshooting. It discusses VLAN types and tagging, communicating between VLANs, verifying and saving VLAN configurations, deleting VLANs, and troubleshooting issues such as preventing broadcast storms, establishing trunk links, propagating VLAN changes with VTP, and dropped packets or loops.
VLAN allows logical separation of broadcast domains by tagging Ethernet frames with VLAN IDs. It divides a physical network into virtual LANs to improve security, manageability and flexibility. VLAN configuration involves assigning ports to VLANs either statically by port number or dynamically by MAC address. Frame tagging standards like IEEE 802.1Q are used to identify VLANs on trunk links that carry traffic for multiple VLANs between switches.
- VLAN Trunking Protocol (VTP) allows VLAN configurations to be consistently maintained across a common administrative domain to reduce complexity and inconsistencies when changes are made. VTP advertisements containing VLAN information are transmitted over trunk links and switches inherit the sending switch's VTP domain name. VTP uses revision numbers, starting at 0 and incrementing with each change, to determine if received information is more recent than the local configuration.
This document discusses inter-VLAN routing, including using a router to enable communication between devices on different VLANs, configuring inter-VLAN routing on a router, and troubleshooting common inter-VLAN connectivity issues. It explains that inter-VLAN routing requires a router or layer 3 switch to route traffic between VLANs and that a traditional method uses multiple router interfaces connected to separate VLANs, while router-on-a-stick uses router subinterfaces connected to a layer 2 switch, with each subinterface needing an IP address and associated VLAN number.
This document discusses managing redundant links and spanning tree protocols. It describes spanning tree protocol (STP) operations including electing a root bridge, path cost calculations, port states and BPDU timers. It also covers spanning tree in VLAN environments, such as per-VLAN STP (PVST), and techniques for scaling STP, including modifying root selection, path costs, port priorities and timers. Other topics include Fast EtherChannel, PortFast and UplinkFast for improving convergence times.
VLANs logically divide the LAN into separate broadcast domains without using routers. Switches with VLAN capability allow ports to be configured as access, trunk, or general ports. Access ports belong to one VLAN and use untagged frames. Trunk ports can belong to multiple VLANs and use tagged frames, with a native VLAN using untagged frames. Ingress filtering ensures frames are tagged with an associated VLAN.
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
Ìý
This document discusses the VLAN Trunking Protocol (VTP). VTP allows network managers to centrally manage VLAN configurations across multiple switches in a domain. It maintains consistency by propagating VLAN changes between switches. The document covers VTP domains, advertisements, modes, pruning, configuration and troubleshooting.
This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
VTP allows for synchronization of VLAN information between switches to reduce administration. It uses advertisements sent over trunk links to exchange VLAN configuration details. A switch can be configured as a VTP server to manage VLANs for a domain, as a client to receive updates, or as transparent to only use local VLAN data. VTP pruning helps optimize traffic flow by restricting broadcasts only to necessary trunks.
This document discusses configuring VLANs on Cisco switches. It covers VLAN configuration topics like configuring VTP, creating and modifying VLANs, assigning ports to VLANs, configuring trunking, and troubleshooting VLAN issues. The document provides examples of Cisco IOS commands used to configure these features on Catalyst 1900 and Catalyst 2950 switches. It also describes show commands used to verify proper VLAN, VTP, and trunking operation.
A WAN connects sites over long distances using leased lines or circuits to exchange information between locations. Key WAN technologies include T1/E1 circuits, frame relay, ATM, and MPLS. Circuit-switched technologies like ISDN provide temporary connections when bandwidth is needed, while dedicated leased lines offer constant connectivity but are more expensive. Common WAN protocols are HDLC, PPP, Frame Relay, and ATM used with CSU/DSU equipment to connect to telephone networks.
The document discusses VLAN tagging, trunking, DTP, and inter-VLAN routing. It provides information on:
1) VLAN tagging which allows a single link to carry traffic for more than one VLAN by adding a unique packet identifier within each header to designate the VLAN membership of each packet.
2) Methods of frame tagging including Cisco's ISL and IEEE 802.1Q standards.
3) Configuring trunking on interfaces using commands like switchport trunk encapsulation and switchport mode trunk.
4) Dynamic Trunking Protocol (DTP) and its various trunking modes like desirable, auto and trunk that allow interfaces to automatically or manually negotiate trunk links.
Layer 2 switching provides four key advantages: hardware-based bridging at wire speed and low latency and cost. Layer 2 switches perform three main functions: address learning, forward/filter decisions using the MAC address table, and loop avoidance using the Spanning Tree Protocol. Configuring Layer 2 switches involves setting the hostname, enable secret password, interface descriptions, VLANs, trunking, and protocols like VTP for consistent VLAN configuration across switches in the same management domain.
1) Describe the three primary options for enabling inter-VLAN routing.
2) Configure legacy inter-VLAN routing.
3) Configure router-on-a-stick inter-VLAN routing.
4) Troubleshoot common inter-VLAN configuration issues.
5) Troubleshoot common IP addressing issues in an inter-VLAN-routed environment.
6) Configure inter-VLAN routing using Layer 3 switching.
7) Troubleshoot inter-VLAN routing in a Layer 3-switched environment.
This document discusses VLANs and trunking in converged networks. It begins by explaining the objectives and then defines VLANs, describing how they segment broadcast domains and reduce costs. It also discusses trunking, how trunks allow communication between VLANs using tagging, and common trunking protocols. Finally, it addresses configuring and troubleshooting VLANs and trunks on Cisco switches.
Packet switching provides virtual circuits between sites with contracted traffic rates. It shares bandwidth across these circuits more cost effectively than dedicated lines. Frame relay uses packet switching to multiplex logical data conversations over a single physical link using connection identifiers (DLCIs) assigned to each pair of connected devices. It establishes permanent or switched virtual circuits (PVCs or SVCs) between sites connected through a frame relay switch, which routes frames based on their DLCIs.
This document discusses VLAN Trunking Protocol (VTP) which allows switches to exchange VLAN configuration information and manage VLANs across multiple switches. It describes VTP domains, modes, advertisements and pruning. VTP is configured on switches to synchronize VLAN information and eliminate incorrect configurations. Troubleshooting tools like "show vtp status" and "show interfaces trunk" are used to verify proper VTP configuration and trunking.
This document describes the configuration of basic VLANs on Cisco switches. It provides instructions to:
1. Cable a network topology with three switches and six PCs according to a diagram. Clear the switch configurations and initialize ports.
2. Perform basic switch configurations including hostname, passwords and port assignments.
3. Create VLANs 10, 20, 30 and 99 on the switches and assign names. Assign switch ports on S2 and S3 to the appropriate VLANs.
4. Configure trunking between the switches, setting VLAN 99 as the native VLAN. Verify trunk configuration and switch connectivity.
5. Test connectivity between PCs on different VLANs and subnets before and after moving a PC to
VLAN allows logical segmentation of networks even if they are physically connected. It divides a physical broadcast domain into multiple broadcast domains to reduce broadcast traffic and increase security. VLAN uses tagging to identify which VLAN a frame belongs to and switches use filtering tables to determine how to handle each frame. Routers are needed to route between VLANs since they are separate broadcast domains.
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
Ìý
This document discusses inter-VLAN routing and layer 3 switching. It describes the different options for enabling inter-VLAN routing including legacy routing, router-on-a-stick, and layer 3 switching. It provides instructions for configuring each method and troubleshooting common issues like incorrect switch port configurations, IP addressing errors, and VLAN mismatches. Layer 3 switching allows high-performance switches to perform routing internally at wire speed.
The document discusses Virtual Trunking Protocol (VTP). It describes VTP as a Cisco proprietary protocol that exchanges VLAN information across trunk links, allowing network managers to distribute VLAN configurations to all switches in the same domain. The document outlines the key components of VTP, including domains, advertisements, and pruning. It also details the different VTP modes of server, client, and transparent and how they operate. The benefits of using VTP for VLAN management are presented, along with some common VTP configuration issues.
This document discusses VLANs and their implementation in Cisco switches. It covers VLAN segmentation and types of VLANs, how switches use 802.1Q tagging to identify VLAN traffic on trunk links between switches, and best practices for VLAN security and design including mitigating VLAN hopping and double-tagging attacks. Configuration topics include creating VLANs, assigning ports, configuring trunks, and troubleshooting. The objectives are to explain VLAN purposes, switch forwarding based on VLANs, and configure and secure VLAN environments.
VLANs logically segment networks based on functions or projects regardless of physical connections. This document defines VLANs, lists benefits like improved security and easier network changes, and explains how VLANs create broadcast domains separated by routers. It also covers configuring static VLANs on Catalyst switches by assigning ports to VLANs, creating VLANs, and verifying configurations with commands like show vlan. Dynamic VLANs assign membership based on device MAC addresses.
This document discusses managing redundant links and spanning tree protocols. It describes spanning tree protocol (STP) operations including electing a root bridge, path cost calculations, port states and BPDU timers. It also covers spanning tree in VLAN environments, such as per-VLAN STP (PVST), and techniques for scaling STP, including modifying root selection, path costs, port priorities and timers. Other topics include Fast EtherChannel, PortFast and UplinkFast for improving convergence times.
VLANs logically divide the LAN into separate broadcast domains without using routers. Switches with VLAN capability allow ports to be configured as access, trunk, or general ports. Access ports belong to one VLAN and use untagged frames. Trunk ports can belong to multiple VLANs and use tagged frames, with a native VLAN using untagged frames. Ingress filtering ensures frames are tagged with an associated VLAN.
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
Ìý
This document discusses the VLAN Trunking Protocol (VTP). VTP allows network managers to centrally manage VLAN configurations across multiple switches in a domain. It maintains consistency by propagating VLAN changes between switches. The document covers VTP domains, advertisements, modes, pruning, configuration and troubleshooting.
This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
VTP allows for synchronization of VLAN information between switches to reduce administration. It uses advertisements sent over trunk links to exchange VLAN configuration details. A switch can be configured as a VTP server to manage VLANs for a domain, as a client to receive updates, or as transparent to only use local VLAN data. VTP pruning helps optimize traffic flow by restricting broadcasts only to necessary trunks.
This document discusses configuring VLANs on Cisco switches. It covers VLAN configuration topics like configuring VTP, creating and modifying VLANs, assigning ports to VLANs, configuring trunking, and troubleshooting VLAN issues. The document provides examples of Cisco IOS commands used to configure these features on Catalyst 1900 and Catalyst 2950 switches. It also describes show commands used to verify proper VLAN, VTP, and trunking operation.
A WAN connects sites over long distances using leased lines or circuits to exchange information between locations. Key WAN technologies include T1/E1 circuits, frame relay, ATM, and MPLS. Circuit-switched technologies like ISDN provide temporary connections when bandwidth is needed, while dedicated leased lines offer constant connectivity but are more expensive. Common WAN protocols are HDLC, PPP, Frame Relay, and ATM used with CSU/DSU equipment to connect to telephone networks.
The document discusses VLAN tagging, trunking, DTP, and inter-VLAN routing. It provides information on:
1) VLAN tagging which allows a single link to carry traffic for more than one VLAN by adding a unique packet identifier within each header to designate the VLAN membership of each packet.
2) Methods of frame tagging including Cisco's ISL and IEEE 802.1Q standards.
3) Configuring trunking on interfaces using commands like switchport trunk encapsulation and switchport mode trunk.
4) Dynamic Trunking Protocol (DTP) and its various trunking modes like desirable, auto and trunk that allow interfaces to automatically or manually negotiate trunk links.
Layer 2 switching provides four key advantages: hardware-based bridging at wire speed and low latency and cost. Layer 2 switches perform three main functions: address learning, forward/filter decisions using the MAC address table, and loop avoidance using the Spanning Tree Protocol. Configuring Layer 2 switches involves setting the hostname, enable secret password, interface descriptions, VLANs, trunking, and protocols like VTP for consistent VLAN configuration across switches in the same management domain.
1) Describe the three primary options for enabling inter-VLAN routing.
2) Configure legacy inter-VLAN routing.
3) Configure router-on-a-stick inter-VLAN routing.
4) Troubleshoot common inter-VLAN configuration issues.
5) Troubleshoot common IP addressing issues in an inter-VLAN-routed environment.
6) Configure inter-VLAN routing using Layer 3 switching.
7) Troubleshoot inter-VLAN routing in a Layer 3-switched environment.
This document discusses VLANs and trunking in converged networks. It begins by explaining the objectives and then defines VLANs, describing how they segment broadcast domains and reduce costs. It also discusses trunking, how trunks allow communication between VLANs using tagging, and common trunking protocols. Finally, it addresses configuring and troubleshooting VLANs and trunks on Cisco switches.
Packet switching provides virtual circuits between sites with contracted traffic rates. It shares bandwidth across these circuits more cost effectively than dedicated lines. Frame relay uses packet switching to multiplex logical data conversations over a single physical link using connection identifiers (DLCIs) assigned to each pair of connected devices. It establishes permanent or switched virtual circuits (PVCs or SVCs) between sites connected through a frame relay switch, which routes frames based on their DLCIs.
This document discusses VLAN Trunking Protocol (VTP) which allows switches to exchange VLAN configuration information and manage VLANs across multiple switches. It describes VTP domains, modes, advertisements and pruning. VTP is configured on switches to synchronize VLAN information and eliminate incorrect configurations. Troubleshooting tools like "show vtp status" and "show interfaces trunk" are used to verify proper VTP configuration and trunking.
This document describes the configuration of basic VLANs on Cisco switches. It provides instructions to:
1. Cable a network topology with three switches and six PCs according to a diagram. Clear the switch configurations and initialize ports.
2. Perform basic switch configurations including hostname, passwords and port assignments.
3. Create VLANs 10, 20, 30 and 99 on the switches and assign names. Assign switch ports on S2 and S3 to the appropriate VLANs.
4. Configure trunking between the switches, setting VLAN 99 as the native VLAN. Verify trunk configuration and switch connectivity.
5. Test connectivity between PCs on different VLANs and subnets before and after moving a PC to
VLAN allows logical segmentation of networks even if they are physically connected. It divides a physical broadcast domain into multiple broadcast domains to reduce broadcast traffic and increase security. VLAN uses tagging to identify which VLAN a frame belongs to and switches use filtering tables to determine how to handle each frame. Routers are needed to route between VLANs since they are separate broadcast domains.
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
Ìý
This document discusses inter-VLAN routing and layer 3 switching. It describes the different options for enabling inter-VLAN routing including legacy routing, router-on-a-stick, and layer 3 switching. It provides instructions for configuring each method and troubleshooting common issues like incorrect switch port configurations, IP addressing errors, and VLAN mismatches. Layer 3 switching allows high-performance switches to perform routing internally at wire speed.
The document discusses Virtual Trunking Protocol (VTP). It describes VTP as a Cisco proprietary protocol that exchanges VLAN information across trunk links, allowing network managers to distribute VLAN configurations to all switches in the same domain. The document outlines the key components of VTP, including domains, advertisements, and pruning. It also details the different VTP modes of server, client, and transparent and how they operate. The benefits of using VTP for VLAN management are presented, along with some common VTP configuration issues.
This document discusses VLANs and their implementation in Cisco switches. It covers VLAN segmentation and types of VLANs, how switches use 802.1Q tagging to identify VLAN traffic on trunk links between switches, and best practices for VLAN security and design including mitigating VLAN hopping and double-tagging attacks. Configuration topics include creating VLANs, assigning ports, configuring trunks, and troubleshooting. The objectives are to explain VLAN purposes, switch forwarding based on VLANs, and configure and secure VLAN environments.
VLANs logically segment networks based on functions or projects regardless of physical connections. This document defines VLANs, lists benefits like improved security and easier network changes, and explains how VLANs create broadcast domains separated by routers. It also covers configuring static VLANs on Catalyst switches by assigning ports to VLANs, creating VLANs, and verifying configurations with commands like show vlan. Dynamic VLANs assign membership based on device MAC addresses.
Router-on-a-stick is a method of inter-VLAN routing where a single router interface acts as a trunk link to a switch. This interface is divided into multiple logical subinterfaces, each tied to a VLAN and assigned an IP address. When a host in one VLAN sends traffic to a different VLAN, the switch tags it with the VLAN ID. The router routes the traffic to the correct subinterface and VLAN based on the IP addresses and switch port VLAN configurations. This allows a router to interconnect multiple VLANs using only one physical interface, reducing hardware costs compared to using one interface per VLAN.
VLANs logically group users and resources together without being restricted by physical network segments. There are static and dynamic VLANs, with static VLAN port assignments always remaining fixed while dynamic VLANs are created through management software. Frame tagging allows VLANs to span multiple switches by uniquely assigning a VLAN ID to each frame. The VLAN Trunking Protocol (VTP) manages VLAN configurations across switches to provide benefits like consistent VLAN setup, accurate monitoring, and dynamic reporting of new VLANs. Configuring VLANs involves creating VLANs, assigning switch ports, configuring trunk ports between switches, and setting up inter-VLAN routing using subinterfaces on a router interface.
Virtual LANs (VLANs) logically segment a network to increase performance and security. VLANs can be static or dynamic and identify devices using frame tagging. VLAN trunking protocol (VTP) manages VLAN configurations across switches and has different modes like server, client, and transparent. VLANs are configured by creating them, assigning ports, setting up trunks, and configuring inter-VLAN routing. Troubleshooting involves checking the VTP status to ensure all switches are in the same domain and have the correct configuration revision.
This document discusses inter-VLAN routing and two methods for implementing it: using an external router connected to a switch (router on a stick), and using an internal router within a multilayer switch. For a router on a stick configuration, subinterfaces on the router are used to terminate VLANs and 802.1Q trunking is configured to pass traffic between them. An internal router approach does not require subinterfaces but instead configures VLAN routing and trunking directly on the multilayer switch.
This document discusses inter-VLAN routing and two common methods: using an external router connected to a switch (router on a stick) and using an internal router within a multilayer switch. With a router on a stick, subinterfaces configured for each VLAN with 802.1Q trunking enable the router to pass traffic between VLANs. Alternatively, some switches have an internal router module which can perform inter-VLAN routing without subinterfaces by configuring VLAN routing and trunk ports.
intervlan routing using different m.pptxRexious Huka
Ìý
The document discusses different methods for implementing inter-VLAN routing, including traditional routing, router-on-a-stick, and multilayer switch routing. It defines inter-VLAN routing as enabling communication between devices on different VLANs within the same network. The methods are compared based on their advantages and disadvantages. Configuration steps are provided for router-on-a-stick and multilayer switch inter-VLAN routing.
Lecture_Network Design, InterVlan Routing and Trunking_.pptxSaqibAhmedKhan4
Ìý
This document discusses VLAN trunking and inter-VLAN routing using routers. It provides an overview of VLANs and how they segment networks logically without regard to physical location. It then describes how VLAN trunks carry multiple VLANs between switches to allow inter-VLAN communication. The document outlines different approaches to inter-VLAN routing, including legacy routing using separate router interfaces per VLAN, and router-on-a-stick which uses a single router interface trunked to multiple VLAN subinterfaces to route between VLANs. It also provides configuration examples for router-on-a-stick inter-VLAN routing and how to verify the configurations.
VLANs logically segment networks based on functions or project teams, regardless of physical connections. VLANs create broadcast domains by assigning switch ports to VLANs. Routers are used for communication between VLANs. Common VLAN types include port-based VLANs where a device assumes the VLAN of its connected port, and dynamic VLANs where software assigns VLANs based on MAC addresses. VLAN tagging allows a link to carry multiple VLANs by adding a tag to frames to designate VLAN membership.
The document provides an overview of VLANs including:
1. VLANs logically segment networks based on functions, project teams, or applications regardless of physical location or connections.
2. VLANs are created to provide segmentation services traditionally provided by physical routers and address scalability, security, and network management.
3. Switches may not bridge traffic between VLANs as this would violate the VLAN broadcast domain integrity. Traffic should only be routed between VLANs.
VLANs logically segment devices on the same physical network to improve security, performance and manageability. Trunks allow VLANs to extend across multiple switches by carrying traffic for all VLANs over a single link. This module explains how to configure VLANs and trunks on Cisco switches including creating VLANs, assigning ports, setting trunk modes and verifying configurations. Hands-on packet tracer activities and a lab are included to reinforce the concepts.
A VLAN (virtual LAN) is a logical grouping of devices on a network that are not restricted by their physical location. VLANs allow network administrators to segment networks for security and performance reasons. The document defines a VLAN, explains how VLANs are created using switch ports, and discusses trunk ports for carrying traffic between VLANs. It also covers when VLANs are needed and how devices in different VLANs communicate via a router or Layer 3 switch.
This document discusses inter-VLAN routing and the router on a stick configuration. With router on a stick, a single physical interface on a router is used to route traffic between multiple VLANs by using sub-interfaces configured with unique VLAN IDs and IP addresses to segregate traffic. The configuration involves setting the connected switch port as a trunk to allow multiple VLANs and assigning sub-interfaces on the router with matching VLAN IDs and IP subnets to route between the VLANs.
The document provides planning information for instructors teaching a chapter on VLANs, including:
- A list of optional and recommended activities for students, along with associated chapter pages and activity types.
- Best practices for instructors such as ensuring students complete assessments and having them troubleshoot additional problems.
- An overview of the chapter sections on VLAN segmentation, implementation, and inter-VLAN routing.
The document discusses VLAN configuration for a group project. It defines VLAN as a broadcast domain within a switch that divides a broadcast domain into multiple broadcast domains. It provides details on LANs, creating VLANs, VLAN types (static and dynamic), and commands used for VLAN configuration like show vlan brief, vlan database, and switchport access vlan. Benefits of VLAN discussed are broadcast control, security, and performance.
A VLAN allows devices on different LAN segments to communicate as if they were on the same LAN. VLANs logically segment LANs into broadcast domains to limit broadcast traffic. Frame tagging and filtering methods are used to associate devices with VLANs and control broadcast domains. Common frame tagging protocols are IEEE 802.1Q and Cisco's ISL which add identifiers to frames to associate them with VLANs.
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiMR. VIKRAM SNEHI
Ìý
A VLAN allows computers on different physical LAN segments to communicate as if they were on the same LAN. VLANs logically segment LANs into different broadcast domains by using frame tagging to identify which VLAN a frame belongs to. There are two main types of VLAN configurations - static, where ports are manually assigned to VLANs, and dynamic, where assignments are made via network management software based on device MAC addresses.
This document discusses VLANs (virtual local area networks). It defines LANs and VLANs, explaining that VLANs logically segment networks based on functions or teams rather than physical connections. It describes static and dynamic VLAN implementation methods and port-based, MAC address-based, and protocol-based VLAN types. Finally, it outlines benefits of VLANs such as easy network changes, traffic control, and improved security.
Bab 7-1 membahas tentang jarak antara titik A dan P yang sama dengan jarak antara titik B dan P dengan mengubah nilai panjang gelombang. Persamaan dijelaskan untuk menghitung nilai maksimum radius zon Fresnel pertama dengan mengkonversi frekuensi dan jarak total ke GHz dan Km. Diuraikan pula tentang grid antenna vertikal dan horizontal serta gelombang vertikal dan horizontal. Terakhir dijelaskan tentang radio point to point tanpa gangguan dan dengan gangguan p
This document discusses basic concepts of wireless networking and wireless LAN configuration. It begins by explaining how wireless networking allows for mobile productivity as users can access the network from any location. It then discusses why wireless networking is used, including flexibility and reduced costs compared to wired networks. Finally, it covers wireless LAN components like wireless access points that connect wireless clients to the wired LAN, and wireless network interface cards that allow devices to connect to the network wirelessly.
Redundant layer 2 topologies can create loops in the network. Spanning Tree Protocol (STP) controls this by logically blocking ports on switches to ensure only a single path exists between devices. STP elects a root bridge and designates root, designated and blocked ports to break up loops while maintaining connectivity. It prevents issues like broadcast storms and duplicate unicast frames that can occur due to loops in the network.
VTP allows VLAN configurations to be synchronized across multiple switches, simplifying network management. It operates by electing a switch as the VTP server, where VLANs can be created and modified. This information is then propagated through VTP advertisements to other switches operating as clients or in transparent mode. Troubleshooting may involve checking the VTP domain name, revision number, and that at least one switch is operating as a server.
VLAN trunking allows traffic from multiple VLANs to travel across the same link between two switches. This reduces the number of required physical links and saves on infrastructure costs. VLAN trunks use tagging to identify which VLAN each frame belongs to as switches forward frames based on MAC addresses only. Common trunking modes are 802.1Q, which is now the standard, and ISL, which was used in older Cisco switches but is no longer recommended. Dynamic Trunking Protocol (DTP) can be used to automatically negotiate trunking settings between switches.
Dokumen tersebut membahas tentang VLAN (Virtual Local Area Network) yang merupakan teknologi jaringan untuk membagi logis jaringan switch menjadi beberapa subnet virtual. VLAN memungkinkan pembagian jaringan berdasarkan fungsi, tim proyek, aplikasi, atau koneksi ke jaringan lain. Komunikasi antar VLAN memerlukan router namun hanya membutuhkan satu koneksi fisik. Dokumen juga menjelaskan tipe-tipe VLAN seperti data VLAN, default VLAN
This document discusses key concepts of Ethernet and switch configuration. It describes Ethernet frame formats, MAC addresses, switch port settings including auto-negotiation and auto-MDIX. It explains how switches use MAC address tables to forward traffic, providing examples of entries being added to the table. Design considerations for Ethernet like bandwidth and collisions are also covered.
This document discusses switch security configuration and common security attacks. It covers topics such as configuring passwords, console access, virtual terminal access, banners, telnet/SSH, and port security. Various security attacks are also described like MAC address flooding, spoofing attacks, CDP attacks, and telnet attacks. The document provides configuration examples for securing switch access and interfaces using passwords, banners, telnet/SSH, and port security features.
2. CCNA3-2 Chapter 6
• What is Inter-VLAN Routing?
• Setiap VLAN memiliki unique broadcast domain.
• Computers yang terdiri dari VLANs yang terpisah,
secara default, tidak dapat berkomunikasi.
• Setiap VLAN memiliki unique IP subnetwork.
• Agar VLANs dapat saling berkomunikasi, kita
membutuhkan router untuk menghubungkan broadcast
domains dan unique IP subnetworks yang berbeda.
• Oleh karena itu Inter-VLAN routing, merupakan sebuah
process untuk melakukan forwarding traffic dari VLAN yang
satu ke VLAN lainnya dengan menggunakan router.
Introducing Inter-VLAN Routing
3. CCNA3-3 Chapter 6
• Ada beberapa Methods dari Inter-Vlan Routing ini, yaitu:
1. Traditional Inter-VLAN Routing.
2. Router-on-a-stick Inter-VLAN Routing.
3. Switch Based Inter-VLAN Routing.
Introducing Inter-VLAN Routing
4. CCNA3-4 Chapter 6
• Traditional Inter-VLAN Routing:
• One router interface per VLAN.
Introducing Inter-VLAN Routing
VLANVLAN
TaggedTagged
VLANVLAN
TaggedTagged
Internally Routed toInternally Routed to
the proper subnet.the proper subnet.
Internally Routed toInternally Routed to
the proper subnet.the proper subnet.
TagTag
removedremoved
TagTag
removedremoved
5. CCNA3-5 Chapter 6
• Traditional Inter-VLAN Routing:
• Traditional routing membutuhkan routers yang memiliki
multiple physical interfaces untuk memfasilitasi inter-
VLAN routing.
• Masing-masing interface di configured dengan IP address
dengan subnetnya sendiri yang terkait pada VLAN
tertentu.
• Dalam configuration ini, network devices dapat
menggunakan router sebagai gateway untuk
mengaccess devices yang terhubung ke VLANs lainnya.
Interfaces and Subinterfaces
6. CCNA3-6 Chapter 6
Traditional Inter-VLAN RoutingTraditional Inter-VLAN RoutingTraditional Inter-VLAN RoutingTraditional Inter-VLAN Routing
Interfaces and Subinterfaces
TaggedTagged
VLAN 10VLAN 10
TaggedTagged
VLAN 10VLAN 10
TagTag
RemovedRemoved
TagTag
RemovedRemoved
RouterRouter
RespondsResponds
RouterRouter
RespondsResponds
Routing table:Routing table:
172.17.10.0 – F0/0172.17.10.0 – F0/0
172.17.30.0 – F0/1172.17.30.0 – F0/1
Routing table:Routing table:
172.17.10.0 – F0/0172.17.10.0 – F0/0
172.17.30.0 – F0/1172.17.30.0 – F0/1
Router tagsRouter tags
the framethe frame
for VLAN 30for VLAN 30
And switches itAnd switches it
to Port F0/1.to Port F0/1.
Router tagsRouter tags
the framethe frame
for VLAN 30for VLAN 30
And switches itAnd switches it
to Port F0/1.to Port F0/1.
7. CCNA3-7 Chapter 6
Interfaces and Subinterfaces
Traditional Inter-VLAN RoutingTraditional Inter-VLAN RoutingTraditional Inter-VLAN RoutingTraditional Inter-VLAN Routing
8. CCNA3-8 Chapter 6
• Traditional Inter-VLAN Routing:
• Traditional inter-VLAN
routing menggunakan
1 physical interfaces
per vlan.
• Hal ini akan mengakibatkan keterbatasan dalam
penggunaannya, semakin banyak vlan yang digunakan
maka semakin banyak interface yang diperlukan.
• Sementara routers memiliki batasan jumlah dari physical
interfaces yang bisa digunakan.
• Dan hal tersebut akan membutuhkan biaya yang mahal
karena keperluan penambahan modul
Ethernet/Fastethernet Interface.
Interfaces and Subinterfaces
9. CCNA3-9 Chapter 6
• Router-on-a-stick Inter-VLAN Routing:
• One router interface for all VLANs.
Introducing Inter-VLAN Routing
VLANVLAN
TaggedTagged
VLANVLAN
TaggedTagged
Internally Routed toInternally Routed to
the proper subnet.the proper subnet.
Internally Routed toInternally Routed to
the proper subnet.the proper subnet.
TagTag
removedremoved
TagTag
removedremoved
10. CCNA3-10 Chapter 6
• Router-on-a-stick Inter-VLAN Routing:
• Subinterfaces:
• Overcomes the hardware limitation of a router.
• Subinterfaces are software-based virtual interfaces
that are assigned to physical interfaces.
• Each subinterface is configured with its own IP
address, subnet mask, and unique VLAN assignment.
• Connected to a switch trunk link.
• Functionally the same as using the traditional routing
model.
Interfaces and Subinterfaces
12. CCNA3-12 Chapter 6
• Router-on-a-stick Inter-VLAN Routing:
• Configuring Subinterfaces:
• Similar to configuring physical interfaces.
• Create the subinterface.
• Assign it to a VLAN.
• Assign an IP Address.
• Enable the interface.
Interfaces and Subinterfaces
13. CCNA3-13 Chapter 6
• Router-on-a-stick Inter-VLAN Routing:
• Create the subinterface:
• The syntax for the subinterface is always the physical
interface followed by a period and a subinterface
number.
• The subinterface number is configurable, but it is
typically associated to reflect the VLAN number.
R1(config)#interface [interface].nn
NOTE: The management VLAN must also be
configured if you wish to use it on multiple switches
that are not directly connected by trunk links.
Interfaces and Subinterfaces
14. CCNA3-14 Chapter 6
• Router-on-a-stick Inter-VLAN Routing:
• Assign it to a VLAN:
• Before assigning an IP Address, the interface must to
be configured to operate on a specific VLAN using the
proper encapsulation.
R1(config-subif)#encapsulation dot1q vlan-id
Interfaces and Subinterfaces
15. CCNA3-15 Chapter 6
• Router-on-a-stick Inter-VLAN Routing:
• Assign an IP Address:
• The IP Address assigned here will become the default
gateway for that VLAN.
R1(config-subif)#ip address [address] [mask]
Interfaces and Subinterfaces
16. CCNA3-16 Chapter 6
• Router-on-a-stick Inter-VLAN Routing:
• Enable the interface:
• Subinterfaces are not enabled individually.
• When the physical interface is enabled, all associated
subinterfaces are enabled.
R1(config-if)#no shutdown
Interfaces and Subinterfaces
21. CCNA3-21 Chapter 6
Inter-VLAN Routing
Configuring Inter-VLAN RoutingConfiguring Inter-VLAN Routing
(Putting It All Together)(Putting It All Together)