| 1 comments ]

Overview

This chapter reviews the purpose of VLANs and describes how VLAN implementation can simplify network management and troubleshooting, and can improve network performance. It reviews the end-to-end VLAN architecture where VLANs span switches and local VLANs connected via Layer 3 switching used in the Campus Enterprise Architecture. In addition to this, trunking and VLAN Trunking Protocol (VTP) that are also the significant features of deploying VLANs are discussed.

This chapter addresses how design considerations determine which VLANs span all the switches in a network and which VLANs remain local to a switch block. The configuration components of this chapter describe how individual switch ports can carry traffic for one or more VLANs, depending on their configuration as access or trunk ports. In addition, this chapter explains both why and how VLAN implementation occurs in an enterprise network.

In some scenarios, devices must belong to the same VLAN but still be prevented from communicating with one another. A specific feature, private VLANs, is useful for fine-tuning which devices can be reached by all VLAN members and which devices should be isolated. This chapter also describes how to use and configure private VLANs.

Finally, when several physical links connect the same devices, network designers can create a specific configuration to join those physical links in a common virtual connection using EtherChanneling. This chapter also explains the various possible technologies available to configure EtherChannel.

This chapter covers the following topics:

  • Given a large enterprise network, design, plan, and implement VLANs based on business and technical requirements and constraints.

  • Given a large enterprise network design, plan, implement and verify trunking based on business and technical requirements and constraints.

  • Design, plan, and implement and verify VTP based on business and technical requirements and constraints.

  • Plan, implement, and verify private VLANs.

  • Plan, implement, and verify EtherChannel in a Layer 2 topology based on business and technical requirements and constraints.


Implementing VLAN Technologies in a Campus Network

Add a note hereA VLAN is a logical group of end devices with a common set of requirements independent of their physical location, as shown in Figure 2-1, in which sales, human resources, and engineering are three different VLANs spread across all three floors.

Click to collapse
Add a note hereFigure 2-1: VLAN Overview

Add a note hereAlthough switches do not propagate Layer 2 broadcasts between VLANs, VLANs can exist anywhere in the switch network. Because a VLAN is a single broadcast domain, campus design best practices recommend mapping a VLAN generally to one IP subnet. To communicate between VLANs, packets need to pass through a router or Layer 3 device.

Add a note here Generally, a port carries traffic only for the single VLAN. For a VLAN to span multiple switches, Catalyst switches use trunks. A trunk carries traffic for multiple VLANs by using Inter-Switch Link (ISL) encapsulation or IEEE 802.1Q. This chapter discusses trunking in more detail in later sections. Because VLANs are an important aspect of any campus design, almost all Cisco devices support VLANs and trunking.


Note

Add a note hereMost of the Cisco products support only 802.1Q trunking because 802.1Q is the industry standard. This book focuses only on 802.1Q.

Add a note hereWhen a network architect hands off a design, you need to create an implementation plan based on the knowledge of VLANs and trunks.

Add a note hereThis section discusses in detail how to plan, implement, and verify VLAN technologies and address schemes to meet the given business and technical requirements and constraints. This ability includes being able to meet these objectives:

  • Add a note hereDescribe the different VLAN segmentation models.

  • Add a note hereDiscuss VLAN implementation in a hierarchical network.

  • Add a note hereGiven an enterprise VLAN network design, describe the information needed to create an implementation plan and the choices that need to be made and analyze the consequences of those choices.

  • Add a note hereDiscuss best practices for VLAN implementation.

  • Add a note hereGiven an enterprise VLAN network design, configure, verify, and troubleshoot VLANs.

Add a note here VLAN Segmentation Model

Add a note hereLarger, flat networks generally consist of many end devices in which broadcasts and unknown unicast packets are flooded on all ports in the network One advantage of using VLANs is the capability to segment the Layer 2 broadcast domain. All devices in a VLAN are members of the same broadcast domain. If an end device transmits a Layer 2 broadcast, all other members of the VLAN receive the broadcast. Switches filter the broadcast from all the ports or devices that are not part of the same VLAN.

Add a note hereIn a campus design, a network administrator can design a campus network with one of two models: end-to-end VLANs or local VLANs. Business and technical requirements, past experience, and political motivations can influence the design chosen. Choosing the right model initially can help create a solid foundation upon which to grow the business. Each model has its own advantages and disadvantages. When configuring a switch for an existing network, try to determine which model is used so that you can understand the logic behind each switch configuration and position in the infrastructure.

End-to-End VLAN

Add a note here The term end-to-end VLAN refers to a single VLAN that is associated with switch ports widely dispersed throughout an enterprise network on multiple switches. A Layer 2 switched campus network carries traffic for this VLAN throughout the network, as shown in Figure 2-2 where VLANs 1, 2 and 3 are spread across all three switches.

Click to collapse
Add a note hereFigure 2-2: End-to-End VLANs

Add a note hereIf more than one VLAN in a network is operating in the end-to-end mode, special links (Layer 2 trunks) are required between switches to carry the traffic of all the different VLANs.

Add a note hereAn end-to-end VLAN model has the following characteristics:

  • Add a note hereEach VLAN is dispersed geographically throughout the network.

  • Add a note hereUsers are grouped into each VLAN regardless of the physical location.

  • Add a note hereAs a user moves throughout a campus, the VLAN membership of that user remains the same, regardless of the physical switch to which this user attaches.

  • Add a note hereUsers are typically associated with a given VLAN for network management reasons. This is why they are kept in the same VLAN, therefore the same group, as they move through the campus.

  • Add a note hereAll devices on a given VLAN typically have addresses on the same IP subnet.

  • Add a note here Switches commonly operate in a server/client VTP mode.

Local VLAN

Add a note hereThe Campus Enterprise Architecture is based on the local VLAN model. In a local VLAN model, all users of a set of geographically common switches are grouped into a single VLAN, regardless of the organizational function of those users. Local VLANs are generally confined to a wiring closet, as shown in Figure 2-3, that VLANs are local to one access switch and trunking to the distribution switch. If users move from one location to another in the campus, their connection changes to the new VLAN at the new physical location.

Click to collapse
Add a note hereFigure 2-3: Local VLANs

Add a note hereIn the local VLAN model, Layer 2 switching is implemented at the access level and routing is implemented at the distribution and core level, as shown in Figure 2-3, to enable users to maintain access to the resources they need.

Add a note hereThe following are some local VLAN characteristics and user guidelines:

  • Add a note hereThe network administrator should create local VLANs with physical boundaries in mind rather than the job functions of the users on the end devices.

  • Add a note hereGenerally, local VLANs exist between the access and distribution levels.

  • Add a note hereTraffic from a local VLAN is routed at the distribution and core levels to reach destinations on other networks.

  • Add a note hereConfigure the VTP mode in transparent mode because VLANs on a given access switch should not be advertised to all other switches in the network, nor do they need to be manually created in any other switch’s VLAN database.

  • Add a note here A network that consists entirely of local VLANs can benefit from increased convergence times offered via routing protocols, instead of a spanning tree for Layer 2 networks. It is usually recommended to have one to three VLANs per access layer switches.

Comparison of End-to-End VLANs and Local VLANs

Add a note hereThis subsection describes the benefits and drawbacks of local VLANs versus end-to-end VLANs.

Add a note hereBecause a VLAN usually represents a Layer 3 segment, each end-to-end VLAN enables a single Layer 3 segment to be dispersed geographically throughout the network. The following could be some of the reasons for implementing the end-to-end design:

  • Add a note here Grouping users: Users can be grouped on a common IP segment, even though they are geographically dispersed. Recently the trend has been moving toward virtualization. Solutions such as VMWARE need end-to-end VLANs to be spread across segments of the campus.

  • Add a note here Security: A VLAN can contain resources that should not be accessible to all users on the network, or there might be a reason to confine certain traffic to a particular VLAN.

  • Add a note here Applying quality of service (QoS): Traffic can be a higher or lower access priority to network resources from a given VLAN.

  • Add a note here Routing avoidance: If much of the VLAN user traffic is destined for devices on that same VLAN, and routing to those devices is not desirable, users can access resources on their VLAN without their traffic being routed off the VLAN, even though the traffic might traverse multiple switches.

  • Add a note here Special purpose VLAN: Sometimes a VLAN is provisioned to carry a single type of traffic that must be dispersed throughout the campus (for example, multicast, voice, or visitor VLANs).

  • Add a note here Poor design: For no clear purpose, users are placed in VLANs that span the campus or even span WANs. Sometimes when a network is already configured and running, organizations are hesitant to improve the design because of downtime or other political reasons.

Add a note hereFollowing are some items that the network admin should consider when implementing end-to-end VLANs:

  • Add a note hereSwitch ports are provisioned for each user and associated with a given VLAN. Because users on an end-to-end VLAN can be anywhere in the network, all switches must be aware of that VLAN. This means that all switches carrying traffic for end-to-end VLANs are required to have those specific VLANs defined in each switch’s VLAN database.

  • Add a note here Also, flooded traffic for the VLAN is, by default, passed to every switch even if it does not currently have any active ports in the particular end-to-end VLAN.

  • Add a note hereFinally, troubleshooting devices on a campus with end-to-end VLANs can be challenging because the traffic for a single VLAN can traverse multiple switches in a large area of the campus, and that can easily cause potential spanning-tree problems.

Mapping VLANs to a Hierarchical Network

Add a note hereIn the past, network designers have attempted to implement the 80/20 rule when designing networks. The rule was based on the observation that, in general, 80 percent of the traffic on a network segment was passed between local devices, and only 20 percent of the traffic was destined for remote network segments. Therefore, network architecture used to prefer end-to-end VLANs. To avoid the complications of end-to-end VLANs, designers now consolidate servers in central locations on the network and provide access to external resources, such as the Internet, through one or two paths on the network because the bulk of traffic now traverses a number of segments. Therefore, the paradigm now is closer to a 20/80 proportion, in which the greater flow of traffic leaves the local segment, so local VLANs have become more efficient.

Add a note hereIn addition, the concept of end-to-end VLANs was attractive when IP address configuration was a manually administered and burdensome process; therefore, anything that reduced this burden as users moved between networks was an improvement. However, given the ubiquity of DHCP, the process of configuring an IP address at each desktop is no longer a significant issue. As a result, there are few benefits to extending a VLAN throughout an enterprise; for example, if there are some clustering and other requirements.

Add a note hereLocal VLANs are part of the enterprise campus architecture design, as shown in Figure 2-4, in which VLANs used at the access layer should extend no further than their associated distribution switch. For example VLANs 1, 10 and VLANs 2, 20 are confined to only a local access switch. Traffic is routed from the local VLAN as it is passed from the distribution layer into the core. It is usually recommended to have two to three VLANs per access block rather than span all the VLANs across all access blocks. This design can mitigate Layer 2 troubleshooting issues that occur when a single VLAN traverses the switches throughout a campus network. In addition, because STP is configured for redundancy, the switch limits the STP to only the access and distribution switches that help to reduce the network complexity in times of failure.

Click to collapse
Add a note hereFigure 2-4: VLAN Implementation in Campus Architecture Design

Add a note hereImplementing the enterprise campus architecture design using local VLANs provides the following benefits:

  • Add a note here Deterministic traffic flow: The simple layout provides a predictable Layer 2 and Layer 3 traffic path. If a failure occurs that was not mitigated by the redundancy features, the simplicity of the model facilitates expedient problem isolation and resolution within the switch block.

  • Add a note here Active redundant paths: When implementing Per VLAN Spanning Tree (PVST) or Multiple Spanning Tree Protocol (MSTP) because there is no loop, all links can be used to make use of the redundant paths.

  • Add a note here High availability: Redundant paths exist at all infrastructure levels. Local VLAN traffic on access switches can be passed to the building distribution switches across an alternative Layer 2 path if a primary path failure occurs. Router redundancy protocols can provide failover if the default gateway for the access VLAN fails. When both the Spanning Tree Protocol (STP) instance and VLAN are confined to a specific access and distribution block, Layer 2 and Layer 3 redundancy measures and protocols can be configured to failover in a coordinated manner.

  • Add a note here Finite failure domain: If VLANs are local to a switch block, and the number of devices on each VLAN is kept small, failures at Layer 2 are confined to a small subset of users.

  • Add a note here Scalable design: Following the enterprise campus architecture design, new access switches can be easily incorporated, and new submodules can be added when necessary.

Add a note here Planning VLAN Implementation

Add a note hereThe type of VLAN module used in the network affects how the implementation and verification plan is developed and executed. In this section, we focus only on implementing the Layer 2 end-to-end VLAN model. In later sections, we focus on the local VLAN model used by the campus enterprise architecture.

Add a note hereThis section describes the steps necessary to create a plan for the implementation of VLANs in a campus environment. In general, planning end-to-end VLAN implementation involves the following tasks:

Add a note here Step 1

Add a note here Understand the existing network flow. Unless you design the network, designers usually present the network infrastructure VLAN layout with defined groups. These groups usually represent subnets and associated VLANs. It is important to collect the VLAN numbers, names, purposes, and associate VLAN to the IP mapping scheme.

Add a note here Step 2

Add a note hereWhen you have the VLAN list, document which part of the campus needs what VLANs. This determines the traffic flow between switches and which VLANs should be present in which switches.

Add a note here Step 3

Add a note hereVLANs are commonly assigned statically on a port basis. Some network implementations use a different method based, for example, on dot1x authentication. The configuration tasks depend on the assignment method. You also need to know what you should do with unused ports on a switch. Should they be left to their default configuration, assigned to an unused VLAN for security purposes, or assigned to a default VLAN?


Note

Add a note hereThis book focuses only on configuring VLANs statically.

Add a note here Step 4

Add a note hereAfter you gather all the information about VLANs, the next important step is trunk configuration. If there is inter-switch communication, trunks will be required. Regarding trunk configuration, you need to know where the trunks should be placed. Should all VLANs be allowed on these trunks? And what should the native VLAN be?

Add a note here Step 5

Add a note hereVTP can help simplify VLAN configuration and pruning. You should also know whether it is useful in the current network case. For VTP implementation, you need to gather where it should be implemented. Which switch should be the server, which should be clients, and which (if any)should be transparent?


Note

Add a note hereVTP is discussed in more detail later in this chapter.

Add a note here Step 6

Add a note hereMost important to all, create a test plan to implement the VLANs and verify whether it suits the traffic flow requirements and future growth.

Add a note here Best Practices for VLAN Design

Add a note hereUsually, network designers design and implement the VLANs and their components depending on the business needs and requirements, but this section provides general best practices for implementing VLAN in a campus network.

Add a note hereFollowing are some of the practices for VLAN design:

  • Add a note here For the Local VLANs model, it is usually recommended to have only one to three VLANs per access module and, as discussed, limit those VLANs to a couple of access switches and the distribution switches.

  • Add a note hereAvoid using VLAN 1 as the “blackhole” for all unused ports. Use any other VLAN except 1 to assign all the unused ports to it.

  • Add a note hereTry to always have separate voice VLANs, data VLANs, management VLANs, native VLANs, blackhole VLANs, and default VLANs (VLAN 1).

  • Add a note hereIn the local VLANs model, avoid VTP; it is feasible to use manually allowed VLANs in a network on trunks.

  • Add a note hereFor trunk ports, turn off DTP and configure it manually. Use IEEE 802.1Q rather than ISL because it has better support for QoS and is a standard protocol.

  • Add a note hereManually configure access ports that are not specifically intended for a trunk link.

  • Add a note herePrevent all data traffic from VLAN 1; only permit control protocols to run on VLAN 1 (DTP, VTP, STP BPDUs, PAgP, LACP, CDP, and such.).

  • Add a note hereAvoid using Telnet because of security risks; enable SSH support on management VLANs.

Add a note here Configuring VLANs

Add a note hereAll Cisco Catalyst switches support VLANs. That said, each Cisco Catalyst switch supports a different number of VLANs, with high-end Cisco Catalyst switches supporting as many as 4096 VLANs. Table 2-1 notes the maximum number of VLANs supported by each model of Catalyst switch.

Add a note here Table 2-1: VLAN Support Matrix for Catalyst Switches
Open table as spreadsheet

Add a note hereType of Switch

Add a note hereMaximum No. of VLANs

Add a note hereVLAN ID Range

Add a note hereCatalyst 2940

Add a note here4

Add a note here1–1005

Add a note hereCatalyst 2950/2955

Add a note here250

Add a note here1–4094

Add a note hereCatalyst 2960

Add a note here255

Add a note here1–4094

Add a note hereCatalyst 2970/3550/3560/3750

Add a note here1005

Add a note here1–4094

Add a note hereCatalyst 2848G/2980G/4000/4500

Add a note here4094

Add a note here1–4094

Add a note hereCatalyst 6500

Add a note here4094

Add a note here1–4094

VLAN Ranges

Add a note hereCisco Catalyst switches support up to 4096 VLANs depending on the platform and software version. Table 2-2 illustrates the VLAN division for Cisco Catalyst switches.

Add a note here Table 2-2: VLAN Ranges
Open table as spreadsheet

Add a note hereVLAN Range

Add a note hereRange

Add a note hereUsage

Add a note herePropagated via VTP

Add a note here0, 4095

Add a note hereReserved

Add a note hereFor system use only. You cannot see or use these VLANs.

Add a note here

Add a note here1

Add a note hereNormal

Add a note hereCisco default. You can use this VLAN, but you cannot delete it.

Add a note hereYes

Add a note here2–1001

Add a note hereNormal

Add a note hereFor Ethernet VLANs. You can create, use, and delete these VLANs.

Add a note hereYes

Add a note here1002–1005

Add a note hereNormal

Add a note hereCisco defaults for FDDI and Token Ring. You cannot delete VLANs 1002–1005.

Add a note hereYes

Add a note here1006–1024

Add a note hereReserved

Add a note hereFor system use only. You cannot see or use these VLANS.

Add a note here

Add a note here1025–4094

Add a note hereExtended

Add a note hereFor Ethernet VLANs only.

Add a note hereNot supported in VTP versions 1 and 2. The switch must be in VTP transparent mode to configure extended-range VLANS. Only supported in version 3.


Note

Add a note hereThe Catalyst 2950 and 2955 support as many as 64 VLANs with the Standard Software image, and up to 250 VLANs with the Enhanced Software image. Cisco Catalyst switches do not support VLANs 1002 through 1005; these are reserved for Token Ring and FDDI VLANs. Furthermore, the Catalyst 4500 and 6500 families of switches do not support VLANs 1006 through 1024. In addition, several families of switches support more VLANs than the number of spanning-tree instances. For example, the Cisco Catalyst 2970 supports 1005 VLANs but only 128 spanning-tree instances. For information on the number of supported spanning-tree instances, refer to the Cisco Product Technical Documentation.

Add a note here To create a new VLAN in global configuration mode, follow these steps:

Add a note here Step 1

Add a note here Enter global configuration mode:

Add a note hereSwitch# configure terminal

Add a note here Step 2

Add a note hereCreate a new VLAN with a particular ID number:

Add a note hereSwitch(config)# vlan vlan-id

Add a note here Step 3

Add a note here(Optional.) Name the VLAN:

Add a note hereSwitch(config-vlan)# name vlan-name

Add a note here Example 2-1 shows how to configure a VLAN in global configuration mode.

Add a note here Example 2-1: Creating a VLAN in Global Configuration Mode in Cisco IOS

Add a note hereSwitch# configure terminal
Switch(config)# vlan 5
Switch(config-vlan)# name Engineering
Switch(config-vlan)# exit

Add a note hereTo delete a VLAN in global configuration mode, follow these steps:

Add a note here Step 1

Add a note hereEnter global configuration mode:

Add a note hereSwitch# configure terminal

Add a note here Step 2

Add a note hereDelete the VLAN by referencing its ID number:

Add a note hereSwitch(config)# no vlan vlan-id

Note

Add a note hereAfter a VLAN is deleted, the access ports that belong to that VLAN move into the inactive state until the ports are moved to another VLAN. As a security measure, ports in the inactive state do not forward traffic.

Add a note here Example 2-2 shows deletion of a VLAN in global configuration mode.

Add a note here Example 2-2: Deleting a VLAN in Global Configuration Mode

Add a note hereSwitch# configure terminal
Switch(config)# no vlan 3
Switch(config)# end

Add a note hereTo assign a switch port to a previously created VLAN, follow these steps:

Add a note here Step 1

Add a note here From global configuration mode, enter the configuration mode for the particular port you want to add to the VLAN:

Add a note hereSwitch(config)# interface interface_id

Add a note here Step 2

Add a note hereSpecify the port as an access port:

Add a note hereSwitch(config-if)# switchport mode access
Switch(config-if)# switchport host

Note

Add a note hereThe switchport host command effectively configures a port for a host device, such as a workstation or server. This feature is a macro for enabling Spanning Tree PortFast and disabling EtherChanneling on a per-port basis. These features are discussed in later chapters.

Add a note hereThe switchport mode access command is needed so that the interface doesn’t attempt to negotiate trunking.

Add a note here Step 3

Add a note hereRemove or place the port in a particular VLAN:

Add a note hereSwitch(config-if)# [no] switchport access vlan vlan-id

Add a note here Example 2-3 illustrates configuration of an interface as an access port in VLAN 200.

Add a note here Example 2-3: Assigning an Access Port to a VLAN

Add a note hereSwitch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# interface FastEthernet 5/6
Switch(config-if)# description PC A
Switch(config-if)# switchport
Switch(config-if)# switchport host
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 200
Switch(configif)# no shutdown
Switch(config-if)# end


Note

Add a note hereUse the switchport command with no keywords to configure interfaces as Layer 2 interfaces on Layer 3 switches. After configuring the interface as a Layer 2 interface, use additional switchport commands with keywords to configure Layer 2 properties, such as access VLANs or trunking.

Add a note here Verifying the VLAN Configuration

Add a note hereAs previously discussed, after you configure the VLANs, one of the important step of PPDIOO is to able to verify the configuration. To verify the VLAN configuration of a Catalyst switch, use show commands. The show vlan command from privileged EXEC mode displays information about a particular VLAN. Table 2-3 documents the fields displayed by the show vlan command.

Add a note here Table 2-3: show vlan Field Descriptions
Open table as spreadsheet

Add a note here Field

Add a note hereDescription

Add a note hereVLAN

Add a note hereVLAN number

Add a note hereName

Add a note hereName, if configured, of the VLAN

Add a note hereStatus

Add a note hereStatus of the VLAN (active or suspended)

Add a note herePorts

Add a note herePorts that belong to the VLAN

Add a note hereType

Add a note hereMedia type of the VLAN

Add a note hereSAID

Add a note hereSecurity association ID value for the VLAN

Add a note hereMTU

Add a note hereMaximum transmission unit size for the VLAN

Add a note hereParent

Add a note hereParent VLAN, if one exists

Add a note hereRingNo

Add a note hereRing number for the VLAN, if applicable

Add a note hereBridgNo

Add a note hereBridge number for the VLAN, if applicable

Add a note hereStp

Add a note hereSpanning Tree Protocol type used on the VLAN

Add a note hereBrdgMode

Add a note hereBridging mode for this VLAN

Add a note hereTrans1

Add a note hereTranslation bridge 1

Add a note hereTrans2

Add a note hereTranslation bridge 2

Add a note hereAREHops

Add a note hereMaximum number of hops for All-Routes Explorer frames

Add a note hereSTEHops

Add a note hereMaximum number of hops for Spanning Tree Explorer frames


Note

Add a note herePPDIOO stands for Prepare, Plan, Design, Implement, Operate, and Optimize. In this chapter, our focus is also to follow the model to design the VLAN implementation in a campus architecture. PPDIOO is discussed in detailed in Chapter 1, “Analyzing the Cisco Enterprise Campus Architecture.”

Add a note here Example 2-4 displays information about a VLAN identified by number in Cisco IOS.

Add a note here Example 2-4: Displaying Information About a VLAN by Number in Cisco IOS

Add a note hereSwitch# show vlan id 3
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
3 VLAN0003 active
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
3 enet 100003 1500 - - - - - 0 0
------- --------- ----------------- -------------------------------------------

Add a note here Example 2-5 displays information about a VLAN identified by name in Cisco IOS.

Add a note here Example 2-5: Displaying Information About a VLAN by Name in Cisco IOS

Add a note hereSwitch# show vlan name VLAN0003
VLAN Name Status Ports
---- -------------------------------- --------- ---------------------
3 VLAN0003 active

VLAN Type SAID MTU Parent RingNo BridgeNo Stp Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- ------ ------
3 enet 100003 1500 - - - - 0 0

Add a note here To display the current configuration of a particular interface, use the show running-config interface interface_type slot/port command. To display detailed information about a specific switch port, use the show interfaces command. The command show interface interface_type slot/port with the switchport keyword displays not only a switch port’s characteristics but also private VLAN and trunking information. The show-mac address-table interface interface_type slot/port command displays the MAC address table information for the specified interface in specific VLANs. During troubleshooting, this command is helpful in determining whether the attached devices are sending packets to the correct VLAN.

Add a note here Example 2-6 displays the configuration of a particular interface. Example 2-6 shows that the interface Ethernet 5/6 is configured with the VLAN 200 and in an access mode so that the port doesn’t negotiate for trunking.

Add a note here Example 2-6: Displaying Information About the Interface Config

Add a note hereSwitch# show running-config interface FastEthernet 5/6
Building configuration...
!
Current configuration :33 bytes
interface FastEthernet 5/6
switchport access vlan 200
switchport mode access
switchport host
end

Add a note here Example 2-7 displays detailed switch port information as the port VLAN and operation modes. As shown in Example 2-7, the fastethernet port 4/1 is configured as the switchport port means Layer 2 port, working as an access port in VLAN 2.

Add a note here Example 2-7: Displaying Detailed Switch Port Information

Add a note hereBXB-6500-10:8A# show interfaces FastEthernet 4/1 switchport
Name: Fa4/1
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 2 (VLAN0002)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL

Voice VLAN: none (Inactive)
Appliance trust: none

Add a note here Example 2-8 displays the MAC address table information for a specific interface in VLAN 1.

Add a note here Example 2-8: Displaying MAC Address Table Information

Add a note hereSwitch# show mac-address-table interface GigabitEthernet 0/1 vlan 1
Mac Address Table
------------------------------------------
Vlan Mac Address Type Ports
---- ----------- ---- -----
1 0008.2199.2bc1 DYNAMIC Gi0/1
Total Mac Addresses for this criterion: 1

Add a note here Troubleshooting VLANs

Add a note here When troubleshooting problems related to VLANs, always review the following items:

  • Add a note herePhysical connections

  • Add a note hereSwitch configuration

  • Add a note hereVLAN configuration

Add a note here Figure 2-5 shows, at a high level, VLAN problems that can occur on a switch.

Click to collapse
Add a note hereFigure 2-5: Troubleshooting VLAN Problems

Add a note hereThe following sections cover several common VLAN issues and the action plan to troubleshoot these issues.

Troubleshooting Slow Throughput

Add a note hereTo troubleshoot slow-throughput issues within the same VLAN, perform the following steps:

Add a note here Step 1

Add a note hereA point-to-point switch link consists of two ports where the problem may exist on either side of a link. Make sure the speed and duplex settings are consistent on both link partners.

Add a note here Step 2

Add a note hereUsing show interface commands, check to see what types of errors exist on the suspected interfaces. Combinations of frame check sequence (FCS) errors, alignment errors, and runts generally point to a duplex mismatch; auto-negotiation is the usual culprit, but it could also be a mismatched manual setting.

Add a note here Step 3

Add a note hereDetermine which Layer 2 path the packet is taking if there are redundant paths using spanning tree. For additional information on troubleshooting Spanning Tree Protocol (STP), read Chapter 3, “Implementing Spanning Tree.”

Add a note hereIf you see from the output of the show interface command that the number of collisions is increasing rapidly, the problem might be an oversubscribed half-duplex link, faulty hardware, a bad cable, or a duplex mismatch.

Troubleshooting Communication Issues

Add a note here When one device cannot communicate with another device within a VLAN, troubleshoot the problem by doing the following:

  • Add a note hereEnsure that the VLAN membership of the switch ports is correct by using the show interface, show mac, and show running commands, as discussed in the previous “Verifying VLAN” section.

  • Add a note hereMake sure the switch ports are up and connected using the show interface command. Try to reset the port by using the shut and no shut commands under the switch interface.

1 comments

Unknown said... @ August 9, 2016 at 11:00 PM

Thank you for great post really it help us , please visit once at http://www.qosnetworking.com/ 

Post a Comment