6.4.1 Packet Tracer – Basic Inter-VLAN Routing Answers

6.4.1 Packet Tracer – Basic Inter-VLAN Routing Answers


6.4.1 Packet Tracer - Basic Inter-VLAN Routing Answers 2

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway
S1 VLAN 99
S2 VLAN 99
S3 VLAN 99
R1 Fa0/0 See Interface Configuration Table N/A
Fa0/1 N/A
Server NIC

Port Assignments – S2

Ports Assignment Network
Fa0/1 – 0/5 802.1q Trunks (Native VLAN 99) /24
Fa0/6 – 0/10 VLAN 30 – Guest (Default) /24
Fa0/11 – 0/17 VLAN 10 – Faculty/Staff /24
Fa0/18 – 0/24 VLAN 20 – Students /24

Subinterface Configuration Table – R1

Interface Assignment IP Address
Fa0/0.1 VLAN 1 /24
Fa0/0.10 VLAN 10 /24
Fa0/0.20 VLAN 20 /24
Fa0/0.30 VLAN 30 /24
Fa0/0.99 VLAN 99 /24

Learning Objectives

  • Perform basic switch configurations
  • Configure the Ethernet interfaces on the host PCs
  • Configure VTP on the switches
  • Configure the router and the remote server LAN


In this activity, you will perform basic switch configurations, configure addressing on PCs, configure VTP and inter-VLAN routing.

Task 1: Perform Basic Switch Configurations

Configure the S1, S2, and S3 switches according to the addressing table and the following guidelines:

  • Configure the switch hostname.
  • Disable DNS lookup.
  • Configure the default gateway.
  • Configure an EXEC mode password of class.
  • Configure a password of cisco for console connections.
  • Configure a password of cisco for vty connections.
  • Configure the default gateway on each switch.
Switch#config term
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname S1
S1(config)#enable secret class
S1(config)#no ip domain-lookup
S1(config)#ip default-gateway 
S1(config)#line console 0
S1(config-line)#password cisco
S1(config-line)#line vty 0 15
S1(config-line)#password cisco
%SYS-5-CONFIG_I: Configured from console by console
S1#copy running-config startup-config 
Destination filename [startup-config]? [enter]
Building configuration...

Task 2: Configure the Ethernet Interfaces on the Host PCs

Configure the Ethernet interfaces of PC1, PC2 and PC3 with the IP addresses from the addressing table.

Task 3: Configure VTP on the Switches

Step 1. Enable the user ports on S2 in access mode.

S2(config)#interface fa0/6
S2(config-if)#switchport mode access
S2(config-if)#no shutdown
S2(config-if)#interface fa0/11
S2(config-if)#switchport mode access
S2(config-if)#no shutdown
S2(config-if)#interface fa0/18
S2(config-if)#switchport mode access
S2(config-if)#no shutdown

Step 2. Configure VTP.

Configure VTP on the three switches using the following table. Remember that VTP domain names and passwords are case-sensitive.

Switch Name VTP Operating Mode VTP Domain VTP Password
S1 Server Lab6 cisco
S2 Client Lab6 cisco
S3 Client Lab6 cisco
S1(config)#vtp mode server
Device mode already VTP SERVER.
S1(config)#vtp domain Lab6
Changing VTP domain name from NULL to Lab6
S1(config)#vtp password cisco
Setting device VLAN database password to cisco

S2(config)#vtp mode client
Setting device to VTP CLIENT mode
S2(config)#vtp domain Lab6
Changing VTP domain name from NULL to Lab6
S2(config)#vtp password cisco
Setting device VLAN database password to cisco

S3(config)#vtp mode client
Setting device to VTP CLIENT mode
S3(config)#vtp domain Lab6
Changing VTP domain name from NULL to Lab6
S3(config)#vtp password cisco
Setting device VLAN database password to cisco

Step 3. Configure trunking ports and designate the native VLAN for the trunks.

Configure Fa0/1 through Fa0/5 as trunking ports, and designate VLAN 99 as the native VLAN for these trunks. When this activity was started, these ports were disabled and must be re-enabled now using the no shutdown command.

Only the commands for the FastEthernet0/1 interface on each switch are shown, but the commands should be applied up to the FastEthernet0/5 interface.

S1(config)#interface fa0/1
S1(config-if)#switchport mode trunk
S1(config-if)#switchport trunk native vlan 99
S1(config-if)#no shutdown

S2(config)#interface fa0/1
S2(config-if)#switchport mode trunk
S2(config-if)#switchport trunk native vlan 99
S2(config-if)#no shutdown

S3(config)#interface fa0/1
S3(config-if#switchport mode trunk 
S3(config-if)#switchport trunk native vlan 99
S3(config-if)#no shutdown

Step 4. Configure the VTP server with VLANs.

Configure the following VLANS on the VTP server:

VLAN 99 management
VLAN 10 faculty-staff
VLAN 20 students
VLAN 30 guest
S1(config)#vlan 99
S1(config-vlan)#name management
S1(config)#vlan 10
S1(config-vlan)#name faculty-staff
S1(config)#vlan 20 
S1(config-vlan)#name students
S1(config)#vlan 30
S1(config-vlan)#name guest

Verify that the VLANs have been created on S1 with the show vlan brief command.

Step 5. Verify that the VLANs created on S1 have been distributed to S2 and S3.

Use the show vlan brief command on S2 and S3 to verify that all four VLANs have been distributed to the client switches.

S2#show vlan brief

VLAN Name                             Status    Ports
---- -------------------------------- --------- -----------------------------
1    default                          active    Fa0/1, Fa0/2, Fa0/4, Fa0/5
                                                Fa0/6, Fa0/7, Fa0/8, Fa0/9
                                                Fa0/10, Fa0/11, Fa0/12,Fa0/13
                                                Fa0/14, Fa0/15, Fa0/16,Fa0/17
                                                Fa0/18, Fa0/19, Fa0/20,Fa0/21
                                                Fa0/22, Fa0/23, Fa0/24, Gi0/1
10   faculty/staff                    active
20   students                         active
30   guest                            active
99   management                       active

S3#show vlan brief

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Fa0/5, Fa0/6, Fa0/7, Fa0/8
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24
                                                Gig1/1, Gig1/2
10   faculty-staff                    active 
20   students                         active 
30   guest                            active 
99   management                       active 
1002 fddi-default                     active 
1003 token-ring-default               active 
1004 fddinet-default                  active 
1005 trnet-default                    active

Step 6. Configure the management interface address on all three switches.

S1(config)#interface vlan99
S1(config-if)#ip address

S2(config)#interface vlan99
S2(config-if)#ip address

S3(config)#interface vlan99
S3(config-if)#ip address

Verify that the switches are correctly configured by pinging between them. From S1, ping the management interface on S2 and S3. From S2, ping the management interface on S3.

Were the pings successful? If not, troubleshoot the switch configurations and try again.

Step 7. Assign switch ports to VLANs on S2.

Port assignments are listed in the table at the beginning of the activity. However, since Packet Tracer 4.11 does not support the interface range command, only assign the first port from each range.

S2(config)#interface fa0/6
S2(config-if)#switchport access vlan 30
S2(config-if)#interface fa0/11
S2(config-if)#switchport access vlan 10
S2(config-if)#interface fa0/18
S2(config-if)#switchport access vlan 20
S2#copy running-config startup-config
Destination filename [startup-config]? [enter]
Building configuration...

Step 8. Check connectivity between VLANs.

Open the Command Prompt on the three PCs.

  • Ping from PC1 to PC2 (
  • Ping from PC2 to PC3 (
  • Ping from PC3 to PC1 (

Are the pings successful?

If not, why do these pings fail?

Task 4: Configure the Router and the Remote Server LAN

Step 1. Create a basic configuration on the router.

  • Configure the router with hostname R1.
  • Disable DNS lookup.
  • Configure an EXEC mode password of class.
  • Configure a password of cisco for console connections.
  • Configure a password of cisco for vty connections.

Step 2. Configure the trunking interface on R1.

You have demonstrated that connectivity between VLANs requires routing at the network layer, exactly like connectivity between any two remote networks. There are a couple of options for configuring routing between VLANs.

The first is something of a brute force approach. An L3 device, either a router or a Layer 3 capable switch, is connected to a LAN switch with multiple connections–a separate connection for each VLAN that requires inter-VLAN connectivity. Each of the switch ports used by the L3 device are configured in a different VLAN on the switch. After IP addresses are assigned to the interfaces on the L3 device, the routing table has directly connected routes for all VLANs, and inter-VLAN routing is enabled. The limitations to this approach are the lack of sufficient Fast Ethernet ports on routers, under-utilization of ports on L3 switches and routers, and excessive wiring and manual configuration. The topology used in this lab does not use this approach.

An alternative approach is to create one or more Fast Ethernet connections between the L3 device (the router) and the distribution layer switch, and to configure these connections as dot1q trunks. This allows all inter-VLAN traffic to be carried to and from the routing device on a single trunk. However, it requires that the L3 interface be configured with multiple IP addresses. This can be done by creating virtual interfaces, called subinterfaces, on one of the router Fast Ethernet ports and configuring them to be dot1q aware.

Using the subinterface configuration approach requires these steps:

  • Enter subinterface configuration mode
  • Establish trunking encapsulation
  • Associate a VLAN with the subinterface
  • Assign an IP address from the VLAN to the subinterface

The commands are as follows:

R1(config)#interface fastethernet 0/0
R1(config-if)#no shutdown 
R1(config-if)#interface fastethernet 0/0.1 
R1(config-subif)#encapsulation dot1q 1 
R1(config-subif)#ip address 
R1(config-if)#interface fastethernet 0/0.10
R1(config-subif)#encapsulation dot1q 10 
R1(config-subif)#ip address 
R1(config-if)#interface fastethernet 0/0.20
R1(config-subif)#encapsulation dot1q 20 
R1(config-subif)#ip address 
R1(config-if)#interface fastethernet 0/0.30
R1(config-subif)#encapsulation dot1q 30 
R1(config-subif)#ip address 
R1(config-if)#interface fastethernet 0/0.99
R1(config-subif)#encapsulation dot1q 99 native
R1(config-subif)#ip address

Note the following points in this configuration:

  • The physical interface is enabled using the no shutdown command, because router interfaces are down by default. The subinterface will then be up by default.
  • The subinterface can use any number that can be described with 32 bits, but it is good practice to assign the number of the VLAN as the interface number, as has been done here.
  • The native VLAN is specified on the L3 device so that it is consistent with the switches. Otherwise, VLAN 1 is native by default, and there is no communication between the router and the management VLAN on the switches.

Step 3. Configure the server LAN interface on R1.

R1(config)#interface FastEthernet0/1
R1(config-if)#ip address
R1(config-if)#description server interface
R1(config-if)#no shutdown

There are now six networks configured. Verify that you can route packets to all six by checking the routing table on R1.

R1#show ip route
<output omitted>

Gateway of last resort is not set is subnetted, 6 subnets
C is directly connected, FastEthernet0/0.1
C is directly connected, FastEthernet0/0.10
C is directly connected, FastEthernet0/0.20
C is directly connected, FastEthernet0/0.30
C is directly connected, FastEthernet0/1
C is directly connected, FastEthernet0/0.99

If your routing table does not show all six networks, troubleshoot your configuration and resolve the problem before proceeding.

Step 4. Verify Inter-VLAN routing.

From PC1, verify that you can ping the remote server ( and the other two hosts ( and It may take a couple of pings before the end-to-end path is established.

These pings should be successful. If not, troubleshoot your configuration. Check to make sure that the default gateways have been set on all PCs and all switches.

Task 5: Reflection

In Task 4, you configured VLAN 99 as the native VLAN in the router Fa0/0.99 interface configuration. Why would packets from the router or hosts fail when trying to reach the switch management interfaces if the native VLAN were left in default?

Download Packet Tracer (.pka) file:

Notify of

Inline Feedbacks
View all comments
Would love your thoughts, please comment.x