VLANS Flashcards

1
Q

LAN Designs

A

• The campus LAN should be designed for scalability, performance and security
To aid in a best practice design process, the network topology is split into access, distribution and core layers
The layers have their own design principles and characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Access Layer

A

• End hosts such as desktop computers, servers and IP phones connect into the network at the access layer
• It is designed to have a high port count at an affordable cost
• Desktops typically have only one Network Interface Card (NIC) so they connect into one switch or Wireless Access Point
• Servers will often have dual NICs and connect to a pair of redundant switches
• client access security measures are enabled at the Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Distribution Layer

A

• Access Layer switches uplink to Distribution Layer switches
• The Distribution Layer switches serve as an aggregation point for the Access Layer and provide scalability
• Distribution Layer switches are typically deployed in redundant pairs, with downstream Access Layer switches connected to both
• End hosts are not typically connected here
• Most software policy such as Qos is enabled at this laver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Core Layer

A

• Distribution Layer switches uplink to Core Layer switches
• Core Layer switches are typically deployed in redundant pairs, with downstream Distribution Layer switches connected to both
• Traffic between different parts of the campus travels through the core so it is designed for speed and resiliency
• Software policy slows the switch down so should be avoided in the
Core Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collapsed Distribution and Core

A

• Smaller campuses do not need the scalability of three separate layers
• In these cases a Collapsed Distribution and Core layer is used, where the Distribution and Core layer functions are performed on the same hardware device
Spine-Leaf Data Center Design
Tier 1 - Leaf
Tier 2 - Spine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Router Operations

A

• Routers operate at Layer 3 of the OSI stack
• Hosts in separate IP subnets must send traffic via a router to communicate
• Security rules on routers or firewalls can be used to easily control what traffic is allowed between different IP subnets at Layer 3
• Routers do not forward broadcast traffic by default
• They provide performance and security by splitting networks into smaller domains at Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Switch Operations

A

• Switches operate at Layer 2 of the OSI stack
• They do forward broadcast traffic by default
• By default a campus switched network is one large broadcast domain
• Switches flood broadcast traffic everywhere, including between different IP subnets
• This raises performance and security concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Broadcast traffic problem in switch

A

• Switches flood broadcast traffic everywhere, including between different IP subnets
• This affects security because the traffic bypasses router or firewall
Layer 3 security policies
• It affects performance because every end host has to process the traffic
• It also affects performance by using bandwidth on links where the traffic is not required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VLAN Virtual Local Area Networks solve the switch problems

A

• We can increase performance and security in the LAN by implementing
VLANs on our switches
• VLANs segment the LAN into separate broadcast domains at Layer 2
• There is typically a one-to-one relationship between an IP subnet and a VLAN
• Switches only allow traffic within the same VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VLAN Access Ports

A

• VLAN access ports are configured on switch interfaces where end hosts are plugged in
• Access ports are configured with one specific VLAN
• The configuration is all on the switch, the end host is not VLAN aware
• Switches only allow traffic within the same VLAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dot1Q Trunks

A

• An access port carries traffic for one specific VLAN
• Dot1Q trunks are configured on the links between switches where we need to carry traffic for multiple VLANS
• ISL (Inter-Switch Link) was a Cisco proprietary trunking protocol which is now obsolete
• When the switch forwards traffic to another switch, it tags the layer 2
Dot1Q header with the correct VLAN
• The receiving switch will only forward the traffic out ports that are in that VLAN
• The switch removes the Dot1Q tag from the Ethernet frame when it sends it to the end host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hypervisors - VLAN Aware Hosts

A

• End hosts are typically members of only one VLAN and are not VLAN aware
• A special case is virtualized hosts, where there are virtual machines in different IP subnets on the host
• In this case we need to trunk the VLANs down to the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trunk Port Configuration

A

SW1 (config)#interface FastEthernet 0/24
SWl (config-interface) #description Trunk to SW2
SW1 (config-interface) #switchport trunk encapsulation dotla
SW1 (config-interface) #switchport mode trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Voice VLAN Configuration

A

SW1 (config)#interface FastEthernet 0/10
SW1 (config-interface) #description IP Phone
SW1 (config-interface) #switchport mode access
SW1 (config-interface) #switchport access vlan 10
SW1 (config-interface) #switchport voice vlan 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Native VLAN

A

• The switch needs to know which VLAN to assign to any traffic which comes in untagged on a trunk port
• This used to be required for when a switch was connected to a hub.
Hubs are Layer 1 devices so are not VLAN aware
• The Native VLAN is used for this
• The default Native VLAN is VLAN 1
• There are some security issues with using VLAN 1 as the Native VLAN so best practice is to change it to an unused VLAN
• The Native VLAN must match on both sides of a trunk for it to come up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Native VLAN Configuration

A

SW1 (config) #vlan 199
SW1 (config-vlan) #name Native

SW1 (config) #interface GigabitEthernet 0/1
SW1 (config-interface) #description Trunk to SW2
SW1 (config-interface) #switchport trunk encapsulation dotlg
SW1 (config-interface) #switchport mode trunk
SW1 (config-interface) #switchport trunk native vian 199

17
Q

Allowed VLAN Configuration

A

SW1 (config) #interface GigabitEthernet 0/1
SW1 (config-if) #switchport trunk allowed vlan 10,30

18
Q

Dynamic Trunking Protocol DTP

A

• If two Cisco switches are cabled together they can negotiate a trunk connection using Cisco’s Dynamic Trunking Protocol DTP
• It is however recommended to manually configure switch ports
• Manual configuration:
• switchport mode access
• switchport mode trunk

19
Q

Dynamic Trunking Protocol DTP

A

• DTP configuration:
• Switchport mode dynamic auto: will form a trunk if the neighbour switch port is set to trunk or desirable. Trunk will not be formed if both sides are set to auto. Default on newer switches.
• Switchport mode dynamic desirable: will form a trunk if the neighbour switch port is set to trunk, desirable or auto. Default on older switches.
• Switchport nonegotiate: disables DTP.

20
Q

VLAN Trunking Protocol VTP

A

• The VLAN Trunking Protocol (VTP) allows you to add, edit or delete VLANs on switches configured as VTP Servers, and have other switches configured as VTP Clients synchronise their VLAN database with them
• This can be convenient if you manage a large campus
• You will still need to perform port level VLAN configuration on the switches

• Be careful if using VTP - if you accidentally introduce a switch with a higher VLAN database revision number into the domain it can wipe out all your production VLANS
• If using both DTP and VTP, the VTP domain name has to match on neighbour switches for trunks to be formed by DTP

22
Q

VTP Modes

A

• VTP Server: Can add, edit or delete VLANs. A VTP Server will synchronise its VLAN database from another Server with a higher revision number.
• VTP Client: Cannot add, edit or delete VLANs. A VTP Client will synchronise its VLAN database from the Server with the highest revision number.
• VTP Transparent: Does not participate in the VTP domain. Does not advertise or learn VLAN information but will pass it on. Can add, edit or delete VLANs in its own local VLAN database.

23
Q

VTP Configuration

A

SW1 (config)#vtp domain Flackbox
SW1 (config) #vtp mode server or
SW1 (config) #vtp mode client or
SW1 (config)#vtp mode transparent
SW1 (config) #vlan 20
SW1 (config-vlan) #name sales
(Cannot add VLAN if VTP Client)

24
Q

Verification - show vtp status

A

SWl#show vtp status
VTP Version : 2
Configuration Revision : 6
Maximum VLANs supported locally : 255
Number of existing VLANS : 8
VTP Operating Mode : Server
VTP Domain Name : Flackbox
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation: Disabled
MD5 digest: 0x82 0xED 0x2C 0x99 0×BE 0x8 0xEE 0x1
Configuration last modified by 0.0.0.0 at 3-1-93 00:07:47
Local updater ID is 0.0.0.0 (no valid interface found)

25
VLANs and IP subnets in the LAN
• There is typically a one-to-one relationship between an IP subnet and a VLAN in the LAN campus • For example Engineering hosts are in IP subnet 10.10.10.0/24 and VLAN 10, and Sales hosts are in IP subnet 10.10.20.0/24 and VLAN 20 • Hosts are segregated at Layer 3 by being in different IP subnets, and at Layer 2 by being in different VLANs • Hosts in different IP subnets need to send traffic via a router to communicate with each other
26
Router with separate interfaces - Disadvantages
• You need a separate physical interface for every VLAN- you are liable to run out of interfaces • Traffic being routed within the campus has to go up and down physical Ethernet cables to the router
27
Router on a stick configuration
R1 (config)#interface FastEthernet 0/1 R1 (config-interface) #no ip address R1 (config-interface) #no shutdown R1 (config) #interface FastEthernet 0/1.10 R1 (config-interface) #encapsulation dotla 10 R1 (config-interface) #ip address 10.10.10.1 255.255.255.0 R1 (config) #interface FastEthernet 0/1.20 R1 (config-interface) #encapsulation dotia 20 R1 (config-interface) #ip address 10.10.20.1 255 m255.255.0 R1 (config) #ip route 0.0.0.0 0. 0.0.0 203.0.113.2 SW1 (config) #interface FastEthernet 0/1 SW1 (config-if) #switchport mode trunk
28
Router on a Stick Considerations
• You do not need a separate physical interface for every VLAN - you are less likely to run out of interfaces • Traffic being routed within the campus has to go up and down the same physical Ethernet cable to the router - there is more contention for bandwidth than when using separate interfaces
29
What is a router on stick?
A Router on a Stick (also known as “Router-on-a-Stick”) is a network configuration used to enable inter-VLAN routing on a network with multiple VLANs using a single physical interface on the router. 🔧 How it works: 1. VLANs are created on a switch to segment the network. 2. A trunk link is established between the switch and the router. 3. The router’s single physical interface (e.g., Gig0/0) is divided into subinterfaces (e.g., Gig0/0.10, Gig0/0.20), with each subinterface assigned to a VLAN. 4. Each subinterface gets an IP address and is configured to handle traffic for its specific VLAN. 5. The router can now route traffic between VLANs using these subinterfaces. 📦 Example: Let’s say you have: • VLAN 10: HR • VLAN 20: IT On the router: interface Gig0/0.10 encapsulation dot1Q 10 ip address 192.168.10.1 255.255.255.0 interface Gig0/0.20 encapsulation dot1Q 20 ip address 192.168.20.1 255.255.255.0 On the switch: • Assign ports to VLANs • Configure the port connecting to the router as a trunk port ✅ Benefits: • Cost-effective (uses only one router interface) • Simple to implement for small-to-medium networks ⚠️ Limitations: • Not scalable for large networks (router’s interface can become a bottleneck) • Single point of failure