Switches (VLANs, Trunks, Inter-VLAN Routing Flashcards

(31 cards)

1
Q

How does a switch learn what entries to place in its MAC addressing table?

A

A switch learns MAC addresses by examining the source MAC address of incoming frames and associating it with the port the frame arrived on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between an access link and a trunk link? When is each used?

A

Access links connect end devices to switches and carry traffic for only one VLAN with no tagging.

Trunk links connect switches or switches to routers and carry traffic for multiple VLANs using tagging, allowing VLANs to span the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when the two switches at the ends of a trunk link, are using different VLAN numbers as their native VLAN for that link?

A

It causes a VLAN mismatch, leading to traffic being misrouted or dropped.

Untagged frames sent on the native VLAN may be incorrectly interpreted, resulting in connectivity issues and potential security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a Management VLAN and a Native VLAN? When is each used?

A

Management VLAN is used to remotely access and manage the switch (e.g., via SSH or Telnet).

Native VLAN is used to carry untagged traffic across a trunk link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a VLAN? What are the characteristics of a VLAN?

A

VLANs are logical groupings of devices that act like they’re on the same network, even if they’re on different physical LANs.

They’re configured on switch ports, not on end-devices, and keep traffic separate between VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the benefits of VLANs?

A
  1. Improved Security
    • Devices in different VLANs can’t communicate without a router, limiting access between departments (e.g., HR can’t directly access Finance).
  2. Better Network Performance
    • Reduces broadcast traffic by limiting broadcast domains to smaller groups.
  3. Logical Grouping
    • Users/devices can be grouped by function (not physical location), making networks more flexible and easier to manage.
  4. Simplified Administration
    • Moves, adds, and changes are easier because you don’t need to rewire — just assign the port to a different VLAN.
  5. Improved Troubleshooting & Containment
    • Problems like broadcast storms are contained within a VLAN, making them easier to isolate and fix
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different types of VLANs?

A

VLAN 1
- VLAN 1 became a special VLAN as Layer 2 devices needed to have a default VLAN to assign to their ports.

Default VLAN
- All devices default to VLAN 1.

Native VLAN
- This is for trunk links only.
- All frames are tagged on a trunk link except for those on the native VLAN.

Management VLAN
- This is used for SSH/Telnet VTY traffic and should not be used to carry user/data traffic.

User VLAN
- What is normally thought of when we think of VLANs. A user VLAN is created to segment a group of users, either geographically or logically, from the rest of the network.

Data VLAN
- Dedicated to user-generated traffic (email, web traffic, …).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is VLAN 1?

A

By default, all Layer 2 control traffic is associated with VLAN 1. VLAN 1 is:
- The default VLAN.
- The default Native VLAN.
- The default Management VLAN.
- Cannot be deleted or renamed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why should a Management VLAN be used?

A

A separate management VLAN lets admins still access and fix the network during problems like broadcast storms. It also keeps trusted devices (like switches/routers) separate from users, reducing the risk of accidental or intentional access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens in a network without VLANs?

A

Without VLANs, all devices connected to the switches will receive all unicast, multicast, and broadcast traffic.

With VLANs, that traffic stays only within each VLAN. Devices in different VLANs can’t communicate unless a Layer 3 device (like a router) connects them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are VLAN tags added to frames? What is frame tagging?

A

Ethernet frames don’t normally show which VLAN they belong to. So, when sent over trunk links carrying multiple VLANs, a VLAN tag is added to each frame (called frame tagging).

Switches add these tags on trunk ports and remove them before sending frames to regular (non-trunk) ports, because end devices don’t understand VLAN tags. The frame’s error-checking info (FCS) is updated accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should a Native VLAN be used?

A

Native VLANs are defined to maintain backward compatibility with untagged traffic common in legacy LAN scenarios to support devices that do not possess native VLAN tagging capabilities. Unlike other VLANs, the native VLAN does not carry a tag in the network, making it easily understandable by older devices when trunk links are transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Dynamic Trunking Protocol (DTP)? How and why should it be disabled?

A

DTP is Cisco’s protocol to auto-negotiate trunk links between switches. It helps configure VLAN trunking automatically.

It can be disabled for better security and control using the “switchport nonegotiate” command.

A malicious device could spoof DTP and trick your switch into forming a trunk, giving access to all VLANs. Disabling DTP ensures only intended trunk links are formed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different DTP modes? What are their purposes?

A

Access - Permanent access mode and negotiates to convert the neighboring link into an access link.

Trunk - Permanent trunking mode and negotiates to convert the neighboring link into a trunk link.

Dynamic Auto - Will become a trunk interface if the neighboring interface is set to trunk or desirable mode.

Dynamic Desirable - Actively seeks to become a trunk by negotiating with other auto or desirable interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Inter-VLAN routing?

A

Hosts in one VLAN cannot communicate with hosts in another VLAN unless there is a router or a Layer 3 switch to provide routing services. Inter-VLAN routing is the process of forwarding network traffic from one VLAN to another VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three Inter-VLAN routing options?

A

Legacy Inter-VLAN Routing - This is a legacy solution. It does not scale well.

Router-on-a-Stick - This is an acceptable solution for a small to medium-sized network.

Layer 3 Switch Using Switched Virtual Interfaces (SVIs) - This is the most scalable solution for medium to large organisations.

All three inter-VLAN routing options work for both IPv4 and IPv6 addressing. For IPv6 routing, the router must be configured with the “ipv6 unicast-routing” command.

17
Q

What is Legacy Inter-VLAN Routing? What are its limitations?

A

Legacy inter-VLAN routing solution relies on using a router with multiple Ethernet interfaces.

Each router interface is connected to a switch port in different VLANs. The router interfaces serve as the default gateways to the local hosts on the VLAN subnet.

Packets would arrive on the router through one interface, be routed and leave through another.

Limitations:
- Requires one physical interface per VLAN on the router.
- Not scalable — limited by the number of physical ports.
- Expensive and complex cabling setup.
- Slower, as traffic leaves the switch, goes to the router, then comes back.

18
Q

What is Router-on-a-Stick Inter-VLAN Routing?

A

Router-on-a-stick uses one physical router interface with multiple sub-interfaces to route and tag frames between different VLANs. Each sub-interface is assigned a VLAN and IP address, and the main interface is set as an 802.1Q trunk. Traffic is tagged by VLAN, routed by the sub-interface, and sent back out with the correct VLAN tag.

Limitations:
- Single point of failure — one physical link handles all VLAN traffic.
- Bandwidth bottleneck — limited to the speed of one interface.
- Requires proper trunk configuration on both switch and router.
- Slightly more complex setup and troubleshooting than Layer 3 switching.

19
Q

What is Inter-VLAN Routing on a Layer 3 Switch? What are the benefits and limitations?

A

Layer 3 switches (or multilayer switches) perform inter-VLAN routing using switched virtual interfaces (SVIs). Each VLAN gets an SVI, which acts like a router interface to route traffic between VLANs—all within the switch itself.

Benefits:
- Faster performance – Routing is done in hardware (no need to leave the switch).
- Lower latency – Data stays within the switch.
- No external router needed – Routing happens on the switch itself.
- Supports multiple trunk links – EtherChannel boosts bandwidth.
- Reduces bottlenecks – More efficient than router-on-a-stick.

Limitations:
- The only disadvantage is that Layer 3 switches are more expensive.

20
Q

What are common Inter-VLAN Routing issues? How do you troubleshoot this?

A

Missing VLANs
- Create (or re-create the VLAN if it does not exist).

Switch Trunk Port Issues
- Ensure trunks are configured correctly and enabled.

Switch Access Port Issues
- Assign correct VLAN to access port.
- Host is incorrectly configured in the wrong subnet.

Router Configuration Issues
- Router sub-interface assigned to the wrong VLAN ID.
- If the physical interface is disabled, all sub-interfaces are disabled.

21
Q

What happens when a VLAN is deleted?

A

Any ports assigned to that VLAN become inactive. They remain associated with the VLAN (and thus inactive) until you assign them to a new VLAN or recreate the missing VLAN. Recreating the missing VLAN would automatically reassign the hosts to it.

22
Q

What is the format of the IEEE 802.1Q header?

A

The IEEE 802.1Q header is 4 Bytes.
- Type: Marks the frame as VLAN-tagged so devices recognises it uses 802.1Q.
- User Priority: Supports QoS.
- Canonical Format Identifier (CFI): Used in older bridging that can support token ring frames on Ethernet.
- VLAD ID (VID): Identifies the VLAN the frame belongs to.

23
Q

What is the frame forwarding process on a switch?

A
  1. Receives a frame on an interface (ingress port).
  2. Checks the source MAC address:
    a. Adds it to the MAC address table if it’s new.
    b. Associates the MAC address with the incoming port.
  3. Checks the destination MAC address:
    a. If the destination MAC is in the MAC address table:
    i. Forwards the frame only out the port associated with that MAC (unicast).
    b. If the destination MAC is not known:
    i. Floods the frame out all ports except the one it came in on (unknown unicast).
    c. If it’s a broadcast or multicast:
    i. Floods the frame out all ports in the same VLAN.
  4. The switch continues learning and updating its MAC address table dynamically.
24
Q

What are the two switch forwarding methods?

A

Store-and-Forward Switching: Receives the entire frame and ensures the frame is valid. This is Cisco’s preferred switching method.

Cut-Through Switching: Forwards the frame immediately after reading the destination MAC address of an incoming frame.

25
What are the characteristics of Store-and-Forward Switching?
Error Checking: The switch checks the whole frame for errors using the Frame Check Sequence (FCS) to ensure that the frame is free of physical and data-link errors. If errors are found, the frame is dropped. Buffering: The ingress port will store the frame temporarily while the switch checks the FCS. This also allows the switch to adjust speed differences between the ingress and egress ports.
26
What are the characteristics of Cut-Through Switching?
It is appropriate for switches needing latency to be under 10 microseconds. Does not check the FCS, so it can propagate errors. May lead to bandwidth issues if the switch propagates too many errors. It cannot support ports with differing speeds going from ingress to egress.
27
What is a broadcast domain?
A collection of interconnected switches forms a single broadcast domain. The broadcast domain consists of all devices on the LAN that receive the broadcast traffic. A broadcast domain extends across all Layer 1 or Layer 2 devices on a LAN. Only a Layer 3 device (router) will break the broadcast domain as routers do not forward broadcast traffic.
28
What is the purpose of a default gateway?
To allow devices on one network to communicate with devices on another network. If a device wants to send data to an IP address that is outside its local network, it sends the traffic to the default gateway, which is typically a router. The router then forwards that traffic toward the destination network. To manage a switch from a remote network, the default gateway must be configured.
29
What are the differences between Telnet and SSH?
Telnet is an older protocol that uses unsecure plaintext transmission of both the login authentication (username and password) and the data transmitted between the communicating devices. Secure Shell (SSH) is a secure protocol that provides a secure (encrypted connection to a remote device.
30
What is the difference between half-duplex and full-duplex communication?
Half-duplex communication is unidirectional. Half-duplex communication creates performance issues because data can flow in only one direction at a time, often resulting in collisions. Full-duplex communication increases bandwidth efficiency by allowing both ends of a connection to transmit and receive data simultaneously.
31
What is Auto-MDIX
Allows devices to automatically detect the type of Ethernet cable (straight-through or crossover) and adjust their transmit/receive signals accordingly—so the connection works no matter what type of cable you use.