SRWE Module 3
SRWE Module 3
Instructor Materials
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
What to Expect in this Module
§ To facilitate learning, the following features within the GUI may be included in this module:
Feature Description
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
What to Expect in this Module (Cont.)
§ To facilitate learning, the following features may be included in this module:
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Check Your Understanding
• Check Your Understanding activities are designed to let students quickly determine if they
understand the content and can proceed, or if they need to review.
• Check Your Understanding activities do not affect student grades.
• There are no separate slides for these activities in the PPT. They are listed in the notes area
of the slide that appears before these activities.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Packet Tracer Physical Mode Activities
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Module 3: Activities
What activities are associated with this module?
Page # Activity Type Activity Name Optional?
3.1.4 Packet Tracer Who Hears the Broadcast? Recommended
3.1.5 Check Your Understanding Overview of VLANs Recommended
3.2.8 Packet Tracer Investigate a VLAN Implementation Recommended
3.2.9 Check Your Understanding VLANs in a Multi-Switched Environment Recommended
3.3.11 Syntax Checker VLAN Configuration Recommended
3.3.12 Packet Tracer VLAN Configuration Recommended
3.4.5 Packet Tracer Configure Trunks Recommended
Packet Tracer Physical Packet Tracer – Configure VLANs and Trunking – Physical
3.4.6 Recommended
Mode Mode
3.4.6 Lab Configure VLANs and Trunking Recommended
3.5.5 Packet Tracer Configure DTP Recommended
3.5.6 Check Your Understanding Dynamic Trunking Protocol Recommended
3.6.1 Packet Tracer Implement VLANs and Trunking Recommended
3.6.2 Lab Implement VLANs and Trunking Recommended
3.6.4 Module Quiz VLANs Recommended
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Module 3: Best Practices (Cont.)
Prior to teaching Module 3, the instructor should:
• Review the activities and assessments for this module.
• Try to include as many questions as possible to keep students engaged during classroom
presentation.
Topic 3.1
• Ask the class if they know what a VLAN is. A helpful analogy is that VLANs are like multiple
classes being conducted in one large common area. Layer 2 VLANs are like walls that can
be built around the groups. However, layer 2 cannot create doors. We will see layer 3 help
us with this. Layer 2 can create broadcast domains, but cannot route traffic between these
groups because layer 2 does not understand the IP addressing of each group.
• Explain that VLAN 1 is the default everything VLAN. The reason for this is that the switch
is designed to function by default with out extra configuration. This is not best practice, but
it can do this. We can buy a switch, plug it in and it will function fine passing LAN traffic.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Module 3: Best Practices (Cont.)
Topic 3.2
• Discuss the importance trunks compared to the legacy way of connecting. The legacy way
connected access ports for each VLAN between the switches. Obviously this could
consume a lot of ports.
• Tagging is critical for trunking to work. Many years ago Cisco supported isl trunking, dot1q
is preferred on todays network for many reasons, one of the biggest reasons is because
dot1q supports QoS and isl does not.
• Ask the class why Voice VLAN is tied to an access interface and not a trunk. There are
several reasons for this. Back in 2005 a VoIP was connected to a trunk interface. Back
then we did not have port-security, which requires the end device to be connected to an
access interface. Also understanding why the phone should be traffic should be separated
from the data traffic. First, UDP and TCP traffic do not mix well because of TCP starvation.
This is where TCP gets dropped when our buffers get full because it will be resent, but then
cuts it traffic in half. UDP takes more bandwidth and repeats the cycle (TCP is dropped
again and cuts it half by another half) until there is almost no TCP traffic.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Module 3: Best Practices (Cont.)
Topic 3.2 (Cont.)
• Voice traffic is some of the most sensitive traffic we have in regards to QoS compared to
data traffic.
• Also explaining how a VoIP phone boots up may help the class understand why voice and
data traffic are separated. When CDP tells the phone what VLAN it is on the phone will tag
its traffic for DHCP and request an IP address, but the DHCP server has some critical
information to pass onto the phone. Option 150 from the DHCP server tells the VoIP
phone where the TFTP server is located. The TFTP server has the firmware of the phone.
This firmware tells the phone what functions it can do, like transfer calls, park calls, do
conference calls, but more importantly what the buttons on the phone will do; for instance
the phone number(s) associated to the phone, what are the speed dials, etc. The phone
will actually fail to boot if it receives an IP for the data network instead of for voice.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Module 3: Best Practices (Cont.)
Topic 3.3
• Have the class tell you the difference between extended and normal VLANs.
• Have the class create both types of VLANs in Packet Tracer. You may need them to put the
switch into VTP transparent mode to create the extended VLANs.
Topic 3.4
• Have the class create a trunk in Packet Tracer between two switches. Have them change
the native VLAN and see if they start receiving CDP error messages.
• One practice good practice is to use the range command and shutdown all interfaces on all
switches before beginning the labs. This will help trunks to come up cleanly and without
CDP errors. Just remind the students to bring up all interfaces as they configure them for
use.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Module 3: Best Practices (Cont.)
Topic 3.5
• Explain the importance the importance of DTP issues and why Cisco recommends that we
make a trunk or an access interface statically on one or the other with use of DTP.
• Emphasize to the class that trunk and access configurations each side of a link will have no
communications.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Module 3: VLANs
Switching, Routing, and
Wireless Essentials v7.0
(SRWE)
Module Objectives
Module Title: Protocols and Models
Module Objective: Explain how network protocols enable devices to access local and remote
network resources.
Topic Title Topic Objective
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
3.1 Overview of VLANs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Overview of VLANs
VLAN Definitions
VLANs are logical connections with other similar
devices.
Placing devices into various VLANs have the
following characteristics:
• Provides segmentation of the various groups
of devices on the same switches
• Provide organization that is more
manageable
• Broadcasts, multicasts and unicasts are
isolated in the individual VLAN
• Each VLAN will have its own unique range
of IP addressing
• Smaller broadcast domains
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Overview of VLANs
Benefits of a VLAN Design
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Overview of VLANs
Types of VLANs (Cont.)
Data VLAN
• Dedicated to user-generated traffic (email and web traffic).
• VLAN 1 is the default data VLAN because all interfaces are assigned to this VLAN.
Native VLAN
• This is used for trunk links only.
• All frames are tagged on an 802.1Q trunk link except for those on the native VLAN.
Management VLAN
• This is used for SSH/Telnet VTY traffic and should not be carried with end user traffic.
• Typically, the VLAN that is the SVI for the Layer 2 switch.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Overview of VLANs
Types of VLANs (Cont.)
Voice VLAN
• A separate VLAN is required because Voice
traffic requires:
• Assured bandwidth
• High QoS priority
• Ability to avoid congestion
• Delay less that 150 ms from source to
destination
• The entire network must be designed to
support voice.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Overview of VLANs
Packet Tracer – Who Hears the Broadcast?
In this Packet Tracer activity, you will do the following:
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
3.2 VLANs in a
Multi-Switched Environment
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
VLANs in a Multi-Switched Environment
Defining VLAN Trunks
A trunk is a point-to-point link between
two network devices.
Cisco trunk functions:
• Allow more than one VLAN
• Extend the VLAN across the entire
network
• By default, supports all VLANs
• Supports 802.1Q trunking
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
VLANs in a Multi-Switched Environment
Networks without VLANs
Without VLANs, all devices connected to the switches will receive all unicast, multicast, and
broadcast traffic.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
VLANs in a Multi-Switched Environment
Networks with VLANs
With VLANs, unicast, multicast, and broadcast traffic is confined to a VLAN. Without a Layer 3
device to connect the VLANs, devices in different VLANs cannot communicate.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
VLANs in a Multi-Switched Environment
VLAN Identification with a Tag
• The IEEE 802.1Q header is 4 Bytes
• When the tag is created the FCS must be
recalculated.
• When sent to end devices, this tag must be removed
and the FCS recalculated back to its original number.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
VLANs in a Multi-Switched Environment
Native VLANs and 802.1Q Tagging
802.1Q trunk basics:
• Tagging is typically done on all VLANs.
• The use of a native VLAN was designed for
legacy use, like the hub in the example.
• Unless changed, VLAN1 is the native VLAN.
• Both ends of a trunk link must be configured
with the same native VLAN.
• Each trunk is configured separately, so it is
possible to have a different native VLANs on
separate trunks.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
VLANs in a Multi-Switched Environment
Voice VLAN Tagging
The VoIP phone is a three port switch:
• The switch will use CDP to inform the phone of the Voice
VLAN.
• The phone will tag its own traffic (Voice) and can set Cost
of Service (CoS). CoS is QoS for layer 2.
• The phone may or may not tag frames from the PC.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
VLANs in a Multi-Switched Environment
Voice VLAN Verification Example
The show interfaces fa0/18 switchport command can show us both data and voice
VLANs assigned to the interface.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
VLANs in a Multi-Switched Environment
Packet Tracer – Investigate a VLAN Implementation
In this Packet Tracer activity, you will:
• Part 1: Observe Broadcast Traffic in a VLAN Implementation
• Part 2: Observe Broadcast Traffic without VLANs
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
3.3 VLAN Configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
VLAN Configuration
VLAN Ranges on Catalyst Switches
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
VLAN Configuration
VLAN Creation Example
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
VLAN Configuration
VLAN Port Assignment Commands
Once the VLAN is created, we can then assign it to the correct interfaces.
Task Command
Enter global configuration mode. Switch# configure terminal
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
VLAN Configuration
VLAN Port Assignment Example
We can assign the VLAN to the port
interface.
• Once the device is assigned the
VLAN, then the end device will need
the IP address information for that
VLAN
Prompt Command
• Here, Student PC receives
172.17.20.22 S1# Configure terminal
S1(config)# Interface fa0/18
S1(config-if)# Switchport mode access
S1(config-if)# Switchport access vlan 20
S1(config-if)# end
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
VLAN Configuration
Data and Voice VLANs
An access port may only be
assigned to one data VLAN.
However it may also be assigned to
one Voice VLAN for when a phone
and an end device are off of the
same switchport.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
VLAN Configuration
Data and Voice VLAN Example
• We will want to create and name both Voice
and Data VLANs.
• In addition to assigning the data VLAN, we
will also assign the Voice VLAN and turn on
QoS for the voice traffic to the interface.
• The newer catalyst switch will automatically
create the VLAN, if it does not already exist,
when it is assigned to an interface.
Note: QoS is beyond the scope of this course.
Here we do show the use of the mls qos trust
[cos | device cisco-phone | dscp | ip-
precedence] command.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
VLAN Configuration
Verify VLAN
Information
Use the show vlan command. The
complete syntax is:
show vlan [brief | id vlan-id | name
vlan-name | summary]
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
VLAN Configuration
Delete VLANs
Delete VLANs with the no vlan vlan-id command.
Caution: Before deleting a VLAN, reassign all member ports to a different VLAN.
• Delete all VLANs with the delete flash:vlan.dat or delete vlan.dat commands.
• Reload the switch when deleting all VLANs.
Note: To restore to factory default – unplug all data cables, erase the startup-configuration
and delete the vlan.dat file, then reload the device.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
VLAN Configuration
Packet Tracer – VLAN Configuration
In this Packet Tracer activity, you will perform the following:
• Verify the Default VLAN Configuration
• Configure VLANs
• Assign VLANs to Ports
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
3.4 VLAN Trunks
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
VLAN Trunks
Trunk Configuration Commands
Configure and verify VLAN trunks. Trunks are layer 2 and carry traffic for all VLANs.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
VLAN Trunks
Reset the Trunk to the Default State
• Reset the default trunk settings with
the no command.
• All VLANs allowed to pass traffic
• Native VLAN = VLAN 1
• Verify the default settings with a
sh int fa0/1 switchport command.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
VLAN Trunks
Reset the Trunk to the Default State (Cont.)
Reset the trunk to an access mode with the
switchport mode access command:
• Is set to an access interface administratively
• Is set as an access interface operationally
(functioning)
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
VLAN Trunks
Packet Tracer – Configure Trunks
In this Packet Tracer activity, you will perform the following:
• Verify VLANs
• Configure Trunks
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
VLAN Trunks
Packet Tracer – Configure VLANs and Trunking – Physical Mode
Lab – Configure VLANs and Trunking
In this Packet Tracer Physical Mode activity and in the Lab, you will complete the
following objectives:
• Build the Network and Configure Basic Device Settings
• Create VLANs and Assign Switch Ports
• Maintain VLAN Port Assignments and the VLAN Database
• Configure an 802.1Q Trunk Between the Switches
• Delete the VLAN Database (In the Lab only.)
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
3.5 Dynamic Trunking Protocol
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Dynamic Trunking Protocol
Introduction to DTP
Dynamic Trunking Protocol (DTP) is a proprietary Cisco protocol.
DTP characteristics are as follows:
• On by default on Catalyst 2960 and 2950 switches
• Dynamic-auto is default on the 2960 and 2950 switches
• May be turned off with the nonegotiate command
• May be turned back on by setting the interface to dynamic-auto
• Setting a switch to a static trunk or static access will avoid negotiation issues with the
switchport mode trunk or the switchport mode access commands.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Dynamic Trunking Protocol
Negotiated Interface Modes
The switchport mode command has additional options.
Use the switchport nonegotiate interface configuration command to stop DTP negotiation.
Option Description
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Dynamic Trunking Protocol
Results of a DTP Configuration
Dynamic
Dynamic Auto Trunk Access
Desirable
Dynamic Auto Access Trunk Trunk Access
Dynamic
Trunk Trunk Trunk Access
Desirable
Limited
Trunk Trunk Trunk Trunk
connectivity
Limited
Access Access Access Access
connectivity
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Dynamic Trunking Protocol
Verify DTP Mode
The default DTP configuration is
dependent on the Cisco IOS version and
platform.
§ Use the show dtp interface command
to determine the current DTP mode.
§ Best practice recommends that the
interfaces be set to access or trunk and
to turnoff DTP
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Dynamic Trunking Protocol
Packet Tracer – Configure DTP
In this Packet Tracer activity, you will perform the following:
• Configure static trunking
• Configure and verify DTP
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
3.6 Module Practice and Quiz
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Module Practice and Quiz
Packet Tracer – Implement VLANs and Trunking
In this Packet Tracer activity, you will perform the following:
• Configure VLANs
• Assign Ports to VLANs
• Configure Static Trunking
• Configure Dynamic Trunking
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Module Practice and Quiz
Lab – Implement VLANs and Trunking
In this lab, you will perform the following:
• Build the Network and Configure Basic Device Settings
• Create VLANs and Assign Switch Ports
• Configure an 802.1Q Trunk between the Switches
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Module Practice and Quiz
What did I learn in this module?
• VLANs are based on logical instead of physical connections.
• VLANs can segment networks based on function, team, or application.
• Each VLAN is considered a separate logical network.
• A trunk is a point-to-point link that carries more than one VLAN.
• VLAN tag fields include the type, user priority, CFI and VID.
• A separate voice VLAN is required to support VoIP.
• Normal range VLAN configurations are stored in the vlan.dat file in flash.
• An access port can belong to one data VLAN at a time, but may also have a
Voice VLAN.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Module Practice and Quiz
What did I learn in this module? (Cont.)
• A trunk is a Layer 2 link between two switches that carries traffic for all VLANs.
• Trunks will need tagging for the various VLANs, typically 802.1q .
• IEEE 802.1q tagging makes provision for one native VLAN that will remain
untagged.
• An interface can be set to trunking or nontrunking.
• Trunk negotiation is managed by the Dynamic Trunking Protocol (DTP).
• DTP is a Cisco proprietary protocol that manages trunk negotiations.
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Module Practice and Quiz
New Terms and Commands
• VLAN • User Priority
• Logical broadcast domain • VLAN ID
• Data VLAN • Type
• Default VLAN • show interfaces int switchport
• Native VLAN
• Management VLAN
• show vlan brief
• Voice VLAN
• VLAN Trunk
• VLAN Segmentation
• IEEE 802.1Q
• VLAN Tagging
• Canonical Format Identifier (CFI)
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Module Practice and Quiz
New Terms and Commands
• Normal Range VLANs • delete vlan.dat • no switchport trunk native
• Extended Range VLANs • show vlan vlan
• vlan vlan-id • show interfaces • show interfaces
• name vlan-name • show vlan summary switchport
• switchport mode access • show interfaces vlan • no switchport access vlan
• switchport access vlan vlan_id vlan_id
vlan-id • switchport mode trunk • show interfaces trunk
• interface range • switchport trunk allowed • show interfaces int_id
• no switchport access vlan vlan vlan_list trunk
vlan-id • switchport trunk native
• no vlan vlan-id vlan vlan_id
• delete flash:vlan.dat • no switchport trunk
allowed vlan
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63