Instructor Planning Guide
What activities are associated with this chapter?
Students should complete Chapter 6, “Assessment” after completing Chapter 6.
Quizzes, labs, Packet Tracers and other activities can be used to informally assess student progress.
Sections & Objectives
6.1 VLAN Segmentation
Explain the purpose of VLANs in a switched network.
Explain how a switch forwards frames based on VLAN configuration in a multi-switch environment.
6.2 VLAN Implementations
Configure a switch port to be assigned to a VLAN based on requirements.
Configure a trunk port on a LAN switch.
Troubleshoot VLAN and trunk configurations in a switched network.
6.3 Inter-VLAN Routing Using Routers
Describe the two options for configuring Inter-VLAN routing.
Configure legacy Inter-VLAN Routing.
Configure Router-on-a-Stick Inter-VLAN Routing
Chapter 6: VLANs
6.1 – VLAN Segmentation
6.1.1 – Overview of VLANs
22.214.171.124 – VLAN Definitions
VLANs can segment LAN devices without regard for the physical location of the user or device.
- In the figure, IT users on the first, second, and third floors are all on the same LAN segment. The same is true for HR and Sales users.
A VLAN is a logical partition of a Layer 2 network.
- Multiple partitions can be created and multiple VLANs can co-exist.
- The partitioning of the Layer 2 network takes place inside a Layer 2 device, usually via a switch.
- Each VLAN is a broadcast domain that can span multiple physical LAN segments.
- Hosts on the same VLAN are unaware of the VLAN’s existence.
VLANs are mutually isolated and packets can only pass between VLANs via a router.
126.96.36.199 – Benefits of VLANs
188.8.131.52 – Types of VLANs
Common types of VLANs:
- Default VLAN – Also known as VLAN 1. All switch ports are members of VLAN 1 by default.
- Data VLAN – Data VLANs are commonly created for specific groups of users or devices. They carry user generated traffic.
- Native VLAN – This is the VLAN that carries all untagged traffic. This is traffic that does not originate from a VLAN port (e.g., STP BPDU traffic exchanged between STP enabled switches). The native VLAN is VLAN 1 by default.
- Management VLAN – This is a VLAN that is created to carry network management traffic including SSH, SNMP, Syslog, and more. VLAN 1 is the default VLAN used for network management.
184.108.40.206 – Voice VLANs
To support time-sensitive voice traffic, Cisco switches support a voice VLAN that requires:
- Assured bandwidth
- Delay of less than 150 ms across the network to ensure voice quality
- Transmission priority over other types of network traffic
- Ability to be routed around congested areas on the network.
The voice VLAN feature enables access ports to carry user and IP voice traffic.
- In the figure, the S3 F0/18 interface has been configured to tag student traffic on VLAN 20 and voice traffic on VLAN 150.
220.127.116.11 – Packet Tracer – Who Hears the Broadcast?
6.1.2 – VLANs in a Multi-Switched Environment
18.104.22.168 – VLAN Trunks
A VLAN trunk is a point-to-point link that carries more than one VLAN.
- Usually established between switches to support intra VLAN communication.
- A VLAN trunk or trunk ports are not associated to any VLANs.
Cisco IOS supports IEEE 802.1q, a popular VLAN trunk protocol.
The links between switches S1 and S2, and S1 and S3 are configured to transmit traffic coming from VLANs 10, 20, 30, and 99 across the network.
22.214.171.124 – Controlling Broadcast Domains with VLANs
If a switch port receives a broadcast frame, it forwards it out all ports except the originating port.
- Eventually the entire network receives the broadcast because the network is one broadcast domain.
VLANs can be used to limit the reach of broadcast frames because each VLAN is a broadcast domain.
- VLANs help control the reach of broadcast frames and their impact in the network.
In the figure, PC1 on VLAN 10 sends a broadcast frame.
- Trunk links between S2 – S1 and S1 – S3 propagate the broadcast to other devices in VLAN 10.
- Only devices in the same VLAN receive the broadcast therefore, PC4 would receive the broadcast.
126.96.36.199 – Tagging Ethernet Frames for VLAN Identification
Before a frame is forwarded across a trunk link, it must be tagged with its VLAN information.
- Frame tagging is the process of adding a VLAN identification header to the frame.
- It is used to properly transmit multiple VLAN frames through a trunk link.
IEEE 802.1Q is a vey popular VLAN trunking protocol that defines the structure of the tagging header added to the frame.
- Switches add VLAN tagging information after the Source MAC address field.
- The fields in the 802.1Q VLAN tag includes VLAN ID (VID).
- Trunk links add the tag information before sending the frame and then remove the tags before forwarding frames through non-trunk ports.
188.8.131.52 – Native VLANs and 802.1Q Tagging
Control traffic sent on the native VLAN should not be tagged.
Frames received untagged, remain untagged and are placed in the native VLAN when forwarded.
If there are no ports associated to the native VLAN and no other trunk links, an untagged frame is dropped.
When configuring a switch port on a Cisco switch, configure devices so that they do not send tagged frames on the native VLAN.
In Cisco switches, the native VLAN is VLAN 1, by default.
184.108.40.206 – Voice VLAN Tagging
An access port connecting a Cisco IP phone can be configured to use two separate VLANs:
- A VLAN for voice traffic
- A VLAN for data traffic from a device attached to the phone.
The link between the switch and the IP phone behaves like a trunk to carry traffic from both VLANs.
Cisco IP Phone contains an integrated three-port 10/100 switch dedicated to these devices:
- Port 1 connects to the switch or other VoIP device.
- Port 2 is an internal 10/100 interface that carries the IP phone traffic.
- Port 3 (access port) connects to a PC or other device.
220.127.116.11 – Packet Tracer – Investigating a VLAN Implementation
6.2 – VLAN Implementations
6.2.1 – VLAN Assignment
18.104.22.168 – VLAN Ranges on Catalyst Switches
VLANs are split into two categories:
Normal range VLANs
- VLAN numbers from 1 to 1,005
- Configurations stored in the vlan.dat (in the flash memory)
- IDs 1002 through 1005 are reserved for legacy Token Ring and Fiber Distributed Data Interface (FDDI) VLANs, automatically created and cannot be removed.
Extended Range VLANs
- VLAN numbers from 1,006 to 4,096
- Configurations stored in the running configuration (NVRAM)
- VLAN Trunking Protocol (VTP) does not learn extended VLANs
Cisco Catalyst 2960 and 3560 Series switches support over 4,000 VLANs.
22.214.171.124 – Creating a VLAN
126.96.36.199 – Assigning Ports to VLANs
188.8.131.52 – Changing VLAN Port Membership
Remove VLAN Assignment
184.108.40.206 – Deleting VLANs
Use the no vlan vlan-id global configuration mode command to remove VLAN.
To delete the entire vlan.dat file, use the delete flash:vlan.dat privileged EXEC mode command.
- delete vlan.datcan be used if the vlan.dat file has not been moved from its default location.
220.127.116.11 – Verifying VLAN Information
VLAN configurations can be validated using the Cisco IOS show vlan and show interfaces command options.
18.104.22.168 – Packet Tracer – Configuring VLANs
6.2.2 – VLAN Trunks
22.214.171.124 – Configuring IEEE 802.1q Trunk Links
126.96.36.199 – Resetting the Trunk to Default State
188.8.131.52 – Verifying Trunk Configuration
184.108.40.206 – Packet Tracer – Configuring Trunks
220.127.116.11 – Lab – Configuring VLANs and Trunks
6.2.3 – Troubleshoot VLANs and Trunks
18.104.22.168 – IP Addressing Issues with VLANs
Common practice to associate a VLAN with an IP network.
- Different IP networks must communicate through a router.
- All devices within a VLAN must be part of the same IP network to communicate.
In the figure, PC1 cannot communicate to the server because it has a wrong IP address configured.
22.214.171.124 – Missing VLANs
If all the IP address mismatches have been solved, but the device still cannot connect, check if the VLAN exists in the switch.
126.96.36.199 – Introduction to Troubleshooting Trunks
188.8.131.52 – Common Problems with Trunks
Trunking issues are usually associated with incorrect configurations.
The most common type of trunk configuration errors are:
When a trunk problem is suspected, it is recommended to troubleshoot in the order shown above.
184.108.40.206 – Incorrect Port Mode
In this example, PC4 cannot reach the Web server.
- The trunk links on S1 and S3 are verified and reveal that the S3 trunk port has been configured as an access port.
220.127.116.11 – Incorrect VLAN List
In this example, PC5 cannot reach the Student Email server.
- The output of the switchport trunk allowed vlan command reveals S1 is not allowing VLAN 20.
18.104.22.168 – Packet Tracer – Troubleshooting a VLAN Implementation – Scenario 1
22.214.171.124 – Packet Tracer – Troubleshooting a VLAN Implementation – Scenario 2
126.96.36.199 – Lab – Troubleshooting VLAN Configurations
6.3 – Inter-VLAN Routing Using Routers
6.3.1 – Inter-VLAN Routing Operation
188.8.131.52 – What is Inter-VLAN Routing?
Layer 2 switches cannot forward traffic between VLANs without the assistance of a router.
Inter-VLAN routing is a process for forwarding network traffic from one VLAN to another, using a router.
There are three options for inter-VLAN routing:
- Legacy inter-VLAN routing
- Layer 3 switching using SVIs
184.108.40.206 – Legacy Inter-VLAN Routing
In the past:
- Router interfaces were used to route between VLANs.
- Each VLAN was connected to a different physical router interface.
- Packets would arrive on the router through one interface, be routed and leave through another.
- Because the router interfaces were connected to VLANs and had IP addresses from that specific VLAN, routing between VLANs was achieved.
- Large networks with large number of VLANs required many router interfaces.
In this example, the router was configured with two separate physical interfaces to interact with the different VLANs and perform the routing.
220.127.116.11 – Router-on-a-Stick Inter-VLAN Routing
The router-on-a-stick approach uses only one of the router’s physical interface.
- One of the router’s physical interfaces is configured as a 802.1Q trunk port so it can understand VLAN tags.
- Logical subinterfaces are created; one subinterface per VLAN.
- Each subinterface is configured with an IP address from the VLAN it represents.
- VLAN members (hosts) are configured to use the subinterface address as a default gateway.
In this example, the R1 interface is configured as a trunk link and connects to the trunk F0/4 port on S1.
- Router accepts VLAN-tagged traffic on the trunk interface
- Router internally routes between the VLANs using subinterfaces.
- Router then forwards the routed traffic as VLAN-tagged for the destination VLAN out the trunk link.
6.3.2 – Configure Legacy Inter-VLAN Routing
18.104.22.168 – Configure Legacy Inter-VLAN Routing: Preparation
Legacy inter-VLAN routing requires routers to have multiple physical interfaces.
Each one of the router’s physical interfaces is connected to a unique VLAN.
Each interface is also configured with an IP address for the subnet associated with the particular VLAN.
Network devices use the router as a gateway to access the devices connected to the other VLANs.
22.214.171.124 – Configure Legacy Inter-VLAN Routing: Switch Configuration
Configure the VLANs on the switch and then assign the ports to their respective VLANs.
In this example, the S1 ports are configured as follows:
- Ports F0/4 and F0/11 of S1 are on VLAN 10
- Ports F0/5 and F0/16 ports are on VLAN 30.
126.96.36.199 – Configure Legacy Inter-VLAN Routing: Router Interface Configuration
Next configure the router interfaces.
188.8.131.52 – Lab – Configuring Per-Interface Inter-VLAN Routing
6.3.3 – Configure Router-on-a-Stick Inter-VLAN Routing
184.108.40.206 – Configure Router-on-a Stick: Preparation
An alternative to legacy inter-VLAN routing is to use VLAN trunking and subinterfaces.
VLAN trunking allows a single physical router interface to route traffic for multiple VLANs.
The physical interface of the router must be connected to a trunk link on the adjacent switch.
On the router, subinterfaces are created for each unique VLAN.
Each subinterface is assigned an IP address specific to its subnet or VLAN and is also configured to tag frames for that VLAN.
220.127.116.11 – Configure Router-on-a Stick: Switch Configuration
To enable inter-VLAN routing using router-on-a stick, start by enabling trunking on the switch port that is connected to the router.
18.104.22.168 – Configure Router-on-a Stick: Router Subinterface Configuration
The router-on-a-stick method requires subinterfaces to be configured for each routable VLAN.
- The subinterfaces must be configured to support VLANs using the encapsulation dot1Q VLAN-ID interface configuration command.
22.214.171.124 – Configure Router-on-a Stick: Verifying Subinterfaces
By default, Cisco routers are configured to route traffic between local subinterfaces.
- As a result, routing does not specifically need to be enabled.
Use the show vlan and show ip route commands to verify the subinterface configurations.
126.96.36.199 – Configure Router-on-a Stick: Verifying Routing
Remote VLAN device connectivity can be tested using the pingcommand.
- The command sends an ICMP echo request and when a host receives an ICMP echo request, it responds with an ICMP echo reply.
Tracert is a useful utility for confirming the routed path taken between two devices.
188.8.131.52 -Packet Tracer – Configuring Router-on-a-Stick Inter-VLAN Routing
184.108.40.206 -Lab – Configuring 801.2Q Trunk-Based Inter-VLAN Routing
220.127.116.11 -Packet Tracer – Inter-VLAN Routing Challenge
6.4 – Summary
6.4.1 – Conclusion
18.104.22.168 – Packet Tracer – Skills Integration Challenge
22.214.171.124 – Chapter 6: VLANs
Explain how VLANs segment broadcast domains in a small to medium-sized business network.
Implement VLANs to segment a small to medium-sized business network..
Configure routing between VLANs in a small to medium-sized business network.
New Terms and Commands
•Logical broadcast domain
•show vlan brief
•Canonical Format Identifier (CFI)
•show interfaces int switchport
|•Normal Range VLANs
•Extended Range VLANs
•switchport mode access
•switchport access vlan vlan-id
•no switchport access vlan vlan-id
•no vlan vlan-id
•show vlan summary
•show interfaces vlan vlan_id
•switchport mode trunk
•switchport trunk allowed vlan vlan_list
•switchport trunk native vlan vlan_id
•no switchport trunk allowed vlan
•no switchport trunk native vlan
•show interfaces switchport
|•no switchport access vlan vlan_id
•show interfaces trunk
•show interfaces int_id trunk
|•Legacy Inter-VLAN Routing
•Router-on-a-Stick Inter-VLAN Routing
•encapsulation dot1q vlan_id