vlan

advertisement
Chapter 8
VLAN
&
VPNs
By Dr.Sukchatri P.
VLAN & VPNs
Objectives
Upon completion of this chapter, you will
be able to perform the following tasks:
• Configure a VLAN
• Configure VLAN Trunking Protocol (VTP)
• Configure a switch for trunking
• Verify VLAN connectivity
• Verify spanning-tree operations
VLAN & VPNs
Contents
• A switch connecting three segments
• Configuration VLAN (Cisco)
• Private network
• Hybrid network
• Virtual private networks
• VPN techniques
• Authentication
• Encryption
• Tunneling
• Addressing in VPN
VLAN & VPNs
VLAN Overview
• Segmentation
3rd floor
• Flexibility
2nd floor
• Security
1st floor
SALES
HR
ENG
A VLAN = A broadcast domain = Logical network (subnet)
VLAN & VPNs
A switch connecting three segments
VLAN & VPNs
A switch using VLAN software
VLAN & VPNs
Two switches
in a backbone
using VLAN
software
VLAN & VPNs
VLAN Operations
Switch A
Red
VLAN
Black
VLAN
Green
VLAN
• Each logical VLAN is like a separate physical bridge
VLAN & VPNs
VLAN Operations
Switch A
Switch B
Trunk
Fast Ethernet
Red
VLAN
Black
VLAN
Green
VLAN
Red
VLAN
Black
VLAN
Green
VLAN
• Each logical VLAN is like a separate physical bridge
• VLANs can span across multiple switches
• Trunks carries traffic for multiple VLANs
VLAN & VPNs
VLAN Membership Modes
Static VLAN
Dynamic VLAN
Trunk
Port e0/4
Port e0/9
VLAN5
VLAN10
VMPS
1111.1111.1111 = vlan 10
MAC = 1111.1111.1111
VLAN & VPNs
ISL Tagging
ISL trunks enable VLANs across a backbone
• Performed with ASIC
VLAN Tag added
by incoming
port
• Not intrusive to client
stations, client does not see
the ISL header
Inter-Switch
Link carries
VLAN identifier
• Effective between switches,
routers and switches,
switches and servers with
ISL network interface cards
VLAN Tag
stripped by
forwarding port
VLAN & VPNs
ISL Encapsulation
ISL Header
26 bytes
DA
Type User
Encapsulated Ethernet frame
CRC
4 bytes
SA LEN AAAA03 HSA VLAN BPDU
BPDU INDEX RES
VLAN
BPDU
• Frames encapsulated with ISL header and CRC
• Support for many VLANs (1024)
• VLAN field
• BPDU bit
VLAN & VPNs
VLAN Trunking Protocol (VTP)
• A messaging system that advertises VLAN configuration information
• Maintains VLAN configuration consistency throughout a common
administrative domain
• VTP sends advertisements on trunk ports only
• Support mixed media trunks (Fast Ethernet, FDDI, ATM)
VTP Domain “ICND”
3.Sync to the latest vlan information
2
1.“new vlan added”
VLAN & VPNs
VTP Modes
• Create vlans
• Modify vlans
• Delete vlans
• Sends/forwards
advertisements
• Synchronize
• Saved in NVRAM
• Sends/forwards
advertisements
• Synchronize
• Not saved in
NVRAM
Transparent
VLAN & VPNs
• Create vlans
• Modify vlans
• Delete vlans
• Forwards
advertisements
• Does not
synchronize
• Saved in NVRAM
How VTP Works
• VTP advertisements are sent as multicast frames
• VTP servers and clients synchronized to latest revision number
• VTP advertisement are sent every five minutes or when there is a change
VLAN & VPNs
How VTP Works
• VTP advertisements are sent as multicast frames
• VTP servers and clients synchronized to latest revision number
• VTP advertisement are sent every five minutes or when there is a change
1.Add new VLAN
2.Rev 3 --> Rev 4
3
Server
3
4.Rev 3 --> Rev 4
5.Sync new vlan info
4.Rev 3 --> Rev 4
5.Sync new vlan info
Client
Client
VLAN & VPNs
VTP Pruning
•
Increases available bandwidth by reducing unnecessary flooded traffic
•
Example: Station A sends broadcast, broadcast is only flooded toward
any switch with ports assigned to the red VLAN
Port 2
Switch 4
Flooded
traffic is
pruned
B
Switch 2
Red
VLAN
Switch 5
Port 1
Switch 6
Switch 3
VLAN & VPNs
Switch 1
A
VLAN Configuration
Guidelines
• Maximum number of VLANs is switch-dependent
• Catalyst 1900 supports 64 VLANs with a separate
spanning tree per VLAN
• VLAN1 is One of the factory default VLANs
• CDP and VTP advertisements are sent on VLAN1
• Catalyst 1900 IP address is in the VLAN1 broadcast
domain
• Must be in VTP server or transparent mode to
create, add, or delete VLANs
VLAN & VPNs
VLAN Configuration Steps
• Enable VTP (optional)
• Enable trunking
• Create VLANs
• Assign VLAN to ports
VLAN & VPNs
VTP Configuration Guidelines
• VTP domain name
• VTP mode (server/client/transparent)—VTP server
mode is the default
• VTP pruning
• VTP password
• VTP trap
Use caution when adding a new switch into an existing domain.
A new switch should be added in client mode to prevent the new
switch from propagating incorrect VLANs information
Use the delete vtp command to reset the VTP revision number
VLAN & VPNs
Creating a VTP Domain
wg_sw_a(config)#
vtp [server | transparent] [domain domain-name] [trap {enable | disable}]
[password password] [pruning {enable | disable}
VLAN & VPNs
Creating a VTP Domain
wg_sw_a(config)#
vtp [server | transparent] [domain domain-name] [trap {enable | disable}]
[password password] [pruning {enable | disable}
wg_sw_a#conf terminal
Enter configuration commands, one per line. End with CNTL/Z
wg_sw_a(config)#vtp transparent
wg_sw_a(config)#vtp domain switchlab
VLAN & VPNs
Verifying VTP Configurations
wg_sw_a#show vtp
VLAN & VPNs
Verifying VTP Configurations
wg_sw_a#show vtp
wg_sw_a#show vtp
VTP version: 1
Configuration revision: 4
Maximum VLANs supported locally: 1005
Number of existing VLANs: 6
VTP domain name
: switchlab
VTP password
:
VTP operating mode : Transparent
VTP pruning mode
: Enabled
VTP traps generation : Enabled
Configuration last modified by: 10.1.1.40 at 00-00-0000 00:00:00
VLAN & VPNs
Defining a Trunk
wg_sw_a(config-if)#
trunk [on | off | desirable | auto | nonegotiate]
• On = Set trunk on and negotiate with other side
• Off = Set trunk off and negotiate with other side
• Desirable = Negotiate with other side.
Trunk on if other side is on, desirable, or auto
• Auto = Will be a trunk only if the other side is on or desirable
• Non-negotiate = Set trunk on and will not negotiate
VLAN & VPNs
Defining a Trunk
wg_sw_a(config-if)#
trunk [on | off | desirable | auto | nonegotiate]
• On = Set trunk on and negotiate with other side
• Off = Set trunk off and negotiate with other side
• Desirable = Negotiate with other side.
Trunk on if other side is on, desirable, or auto
• Auto = Will be a trunk only if the other side is on or desirable
• Non-negotiate = Set trunk on and will not negotiate
wg_sw_a#conf terminal
Enter configuration commands, one per line. End with CNTL/Z
wg_sw_a(config)#interface f0/26
wg_sw_a(config-if)#trunk on
First trunk port(Port A)
VLAN & VPNs
Verifying a Trunk
wg_sw_a#show trunk [A | B]
VLAN & VPNs
Verifying a Trunk
wg_sw_a#show trunk [A | B]
wg_sw_a#show trunk a
DISL state: On, Trunking: On, Encapsulation type: ISL
VLAN & VPNs
Adding a VLAN
wg_sw_a(config)#
vlan vlan#
[name vlan-name]
VLAN & VPNs
Adding a VLAN
wg_sw_a(config)#
vlan vlan#
[name vlan-name]
wg_sw_a#conf terminal
Enter configuration commands, one per line. End with CNTL/Z
wg_sw_a(config)#vlan 9 name switchlab2
VLAN & VPNs
Verifying a VLAN
wg_sw_a#show vlan [vlan#]
VLAN & VPNs
Verifying a VLAN
wg_sw_a#show vlan [vlan#]
wg_sw_a#sh vlan 9
VLAN Name
Status Ports
------------------------------------------------9 switchlab2
Enabled
------------------------------------------------VLAN Type
SAID MTU Parent RingNo BridgeNo Stp Trans1 Trans2
------------------------------------------------------------------------------------------------------9 Ethernet
100009 1500
0
1
1
Unkn 0
0
--------------------------------------------------------------------------------------------------------
VLAN & VPNs
Modifying a VLAN Name
wg_sw_a(config)#
vlan vlan# name vlan-name
wg_sw_a#conf terminal
Enter configuration commands, one per line. End with CNTL/Z
wg_sw_a(config)#vlan 9 name switchlab90
wg_sw_a#show vlan 9
VLAN Name
Status Ports
-----------------------------------------------9 switchlab90
Enabled
------------------------------------------------
VLAN & VPNs
Assigning Switch Ports to a
VLAN
wg_sw_a(config-if)#
vlan-membership {static {vlan#} | dynamic}
VLAN & VPNs
Assigning Switch Ports to a
VLAN
wg_sw_a(config-if)#
vlan-membership {static {vlan#} | dynamic}
wg_sw_a#conf terminal
Enter configuration commands, one per line. End with CNTL/Z
wg_sw_a(config)#interface ethernet 0/8
wg_sw_a(config-if)#vlan-membership static 9
VLAN & VPNs
Verifying VLAN Membership
wg_sw_a#show vlan-membership
VLAN & VPNs
Verifying VLAN Membership
wg_sw_a#show vlan-membership
wg_sw_a#show vlan-membership
Port VLAN Membership Type
-------------------------------------------1
5
Static
2
1
Static
3
1
Static
4
1
Static
5
1
Static
6
1
Static
7
1
Static
8
9
Static
Port VLAN Membership Type
----------------------------------------13
1
Static
14
1
Static
15
1
Static
16
1
Static
17
1
Static
18
1
Static
19
1
Static
20
1
Static
Note: port 1=e0/1, port 2=e0/2 .....
VLAN & VPNs
Verifying Spanning Tree
wg_sw_a#show spantree {vlan number}
VLAN & VPNs
Verifying Spanning Tree
wg_sw_a#show spantree {vlan number}
wg_sw_a#show spantree 1
VLAN1 is executing the IEEE compatible Spanning Tree Protocol
Bridge Identifier has priority 32768, address 0050.F037.DA00
Configured hello time 2, max age 20, forward delay 15
Current root has priority 0, address 00D0.588F.B600
Root port is FastEthernet 0/26, cost of root path is 10
Topology change flag not set, detected flag not set
Topology changes 53, last topology change occured 0d00h17m14s ago
Times: hold 1, topology change 8960
hello 2, max age 20, forward delay 15
Timers: hello 2, topology change 35, notification 2
Port Ethernet 0/1 of VLAN1 is Forwarding
Port path cost 100, Port priority 128
Designated root has priority 0, address 00D0.588F.B600
Designated bridge has priority 32768, address 0050.F037.DA00
Designated port is Ethernet 0/1, path cost 10
Timers: message age 20, forward delay 15, hold 1
VLAN & VPNs
Visual Objective
SUBNET
10.1.1.0
10.2.2.0
10.3.3.0
10.4.4.0
10.5.5.0
10.6.6.0
10.7.7.0
10.8.8.0
10.9.9.0
10.10.10.0
10.11.11.0
10.12.12.0
10.13.13.0
VLAN
1
2
3
4
5
6
7
8
9
10
11
12
13
POD
wg_ro_x, wg_sw_x, core_sw_a
wg_pc_a, core_server
wg_pc_b, core_server
wg_pc_c, core_server
wg_pc_d, core_server
wg_pc_e, core_server
wg_pc_f, core_server
wg_pc_g, core_server
wg_pc_h, core_server
wg_pc_i, core_server
wg_pc_j, core_server
wg_pc_k, core_server
wg_pc_l, core_server
ISL
VLAN2
wg_pc_a
10.2.2.12
fa0/26 e0/1
(port A)
e0/2
wg_sw_a
10.1.1.10
VLAN13
fa0/26 e0/1
(port A)
...
fa0/1
fa0/24
core_ server ISL
10.x.x.1
e0
core_sw_a
10.1.1.2
VLAN & VPNs
wg_sw_l
ISL 10.1.1.120
fa0/12
wg_ro_a
10.1.1.11
wg_pc_l
10.13.13.12
e0/2
e0
wg_ro_l
10.1.1.121
Visual Objective
SUBNET
10.1.1.0
10.2.2.0
10.3.3.0
10.4.4.0
10.5.5.0
10.6.6.0
10.7.7.0
10.8.8.0
10.9.9.0
10.10.10.0
10.11.11.0
10.12.12.0
10.13.13.0
VLAN
1
2
3
4
5
6
7
8
9
10
11
12
13
POD
wg_ro_x, wg_sw_x, core_sw_a, core_sw_b
wg_pc_a, core_server
wg_pc_b, core_server
wg_pc_c, core_server
wg_pc_d, core_server
wg_pc_e, core_server
wg_pc_f, core_server
wg_pc_g, core_server
wg_pc_h, core_server
wg_pc_i, core_server
wg_pc_j, core_server
wg_pc_k, core_server
wg_pc_l, core_server
wg_pc_a
10.2.2.12
VLAN2
fa0/26 e0/1
(port A)
fa0/27
(port B)
wg_sw_a
10.1.1.10
wg_pc_l
10.13.13.12
VLAN13
fa0/26
(port A) e0/1
fa0/27
(port B)
wg_sw_l
10.1.1.120
...
ISL
fa0/1
fa0/24
core_ server
10.x.x.1
ISL
core_sw_a
10.1.1.2
VLAN & VPNs
ISL
...
fa0/12
fa0/13
fa0/1
ISL
fa0/12
fa0/13
fa0/14
ISL fa0/14
core_sw_b
10.1.1.4
ISL
Private network
VLAN & VPNs
Hybrid network
VLAN & VPNs
Virtual private networks
VLAN & VPNs
VPN techniques
VLAN & VPNs
Authentication
VLAN & VPNs
Encryption
VLAN & VPNs
Tunneling
VLAN & VPNs
Addressing in VPN
VLAN & VPNs
Summary
After completing this chapter, you should
be able to perform the following tasks:
• Configuring VLAN
• Configuring VTP
• Configuring a trunk
• Verifing Spanning Tree Operations
VLAN & VPNs
Review Questions
1. What are the three VTP modes?
2. Over what type of port can VTP
advertisements be sent?
3. VLAN ID is carried in the ________
header.
4. How do we assign a VLAN to a port?
VLAN & VPNs
Download