{"id":68,"date":"2014-06-22T06:32:49","date_gmt":"2014-06-22T06:32:49","guid":{"rendered":"http:\/\/feralpacket.org\/?p=68"},"modified":"2015-01-03T11:19:51","modified_gmt":"2015-01-03T11:19:51","slug":"v5-written-and-lab-vlans","status":"publish","type":"post","link":"https:\/\/feralpacket.org\/?p=68","title":{"rendered":"v5 Written and Lab:  VLAN Notes"},"content":{"rendered":"<p><code>v5 Written: 2.1.c Implement and troubleshoot VLAN<br \/>\n2.1.c [i] Access ports<br \/>\n2.1.c [ii] VLAN database<br \/>\n2.1.c [iii] Normal, extended VLAN, voice VLAN<\/code><\/p>\n<p>v5 Lab: 1.1.c Implement and troubleshoot VLAN<br \/>\n1.1.c [i] Access Ports<br \/>\n1.1.c [ii] VLAN database<br \/>\n1.1.c [iii] Normal, extended VLAN, voice VLAN<\/p>\n<p>Documents:<\/p>\n<p>Catalyst 3750-X and 3560-X Software Configuration Guide, Release 15.0(1)SE,<br \/>\nChapter 15: Configuring VLANs, pgs. 15-1 to 15-14<\/p>\n<p>Catalyst 3750-X and 3560-X Software Configuration Guide, Release 15.0(1)SE,<br \/>\nChapter 17: Configuring Voice VLAN, pgs. 17-1 to 17-8<\/p>\n<p>Catalyst 3750-X and 3560-X Software Configuration Guide, Release 15.0(1)SE,<br \/>\nChapter 14: Configuring Interface Characteristics, pgs. 14-1 to 14-52<\/p>\n<p>LAN Switching Configuration Guide, Cisco IOS Release 15M&amp;T,<br \/>\nChapter 3: Configuring Routing Between VLANs, pgs. 119 &#8211; 192<\/p>\n<p>Books:<\/p>\n<p>Cisco LAN Switching; Chapter 5: VLANs, pgs. 112 &#8211; 152<\/p>\n<p>CCIE Routing and Switching Exam Certification Guide 4th Ed; Chapter 2 Virtual LANs and VLAN<\/p>\n<p>Trunking, pgs. 31 &#8211; 48<\/p>\n<p>INE:<\/p>\n<p>A VLAN is a switched network that is logically segmented<\/p>\n<p>Packets destined for systems that do not belong to the VLAN must be forwarded through a<\/p>\n<p>router or a switch supporting fallback bridging<\/p>\n<p>VLANs are often associated with IP subnetworks<\/p>\n<p>Interface VLAN membership is configured manually on an interface-by-interface basis<\/p>\n<p>A switch can route traffic between VLANs by using siwtch virtual interfaces (SVIs)<\/p>\n<p>An SVI must be assigned an IP address to route traffic between VLANs<\/p>\n<p>A switch supports VLANs in VTP client, server, and transparent modes<br \/>\n&#8211; there must be at least one trunk port to participate in VTP<\/p>\n<p>Normal-range VLANs: 1 &#8211; 1005<br \/>\n&#8211; 1002 &#8211; 1005 are reserved for TOken Ring and FDDI VLANs<br \/>\n&#8211; VTP version 1 and 2<\/p>\n<p>Extended-range VLANs: 1006 &#8211; 4094<br \/>\n&#8211; in VTP versions 1 and 2, VTP transparent mode must be configured<\/p>\n<p>VTP version 3 supports the entire VLAN range (1 &#8211; 4094)<br \/>\n&#8211; supported in both VTP server and transparent modes<\/p>\n<p>IP base or IP Services feature set<br \/>\n&#8211; supports a total of 1005 VLANs<br \/>\n&#8211; routed ports count toward the total number of VLANs<\/p>\n<p>LAN base feature set<br \/>\n&#8211; supports a total of 255 VLANs<br \/>\n&#8211; routed ports count toward the total number of VLANs<\/p>\n<p>Switches support PVST+ or rapid-PVST+ with a maximum of 128 spanning-tree instances<br \/>\n&#8211; STP will be disabled on any VLANs over 128<br \/>\n&#8211; STP is enabled on extended-range VLANs by default<\/p>\n<p>VLAN port membership modes:<br \/>\n&#8211; static-access<br \/>\n&#8211; trunk<br \/>\n&#8211; dynamic access<br \/>\n&#8211; voice VLAN<\/p>\n<p>Static-access:<br \/>\n&#8211; one VLAN<br \/>\n&#8211; manually configured<br \/>\n&#8211; VTP not required<\/p>\n<p>Trunk:<br \/>\n&#8211; ISL or 802.1Q<br \/>\n&#8211; member of all VLANs by default, including the extended-range VLANs<br \/>\n&#8211; VTP recommended but not required<\/p>\n<p>Dynamic access:<br \/>\n&#8211; belong to one VLAN and is dynamically assigned by a VMPS (VLAN Membership Policy Server)<br \/>\n&#8211; VTP is required<br \/>\n&#8211; configure the VMPS and the client with the same VTP domain name<\/p>\n<p>Voice VLAN:<br \/>\n&#8211; used with Cisco IP Phones<br \/>\n&#8211; a port can be configured for one voice VLAN and one data VLAN<br \/>\n&#8211; VTP is not required<\/p>\n<p>Configurations for VLAN IDs 1 &#8211; 1005 are written to a file vlan.dat<br \/>\n&#8211; VLAN database<br \/>\n&#8211; stored in flash<br \/>\n&#8211; flash:\/vlan.dat<\/p>\n<p>In VTP transparent mode, the VTP and VLAN configurations are also saved in the running-<\/p>\n<p>config<br \/>\n&#8211; also called VTP disabled<br \/>\n&#8211; extended-range VLANs are not saved in the VLAN database and are not propogated<\/p>\n<p>VLAN types:<br \/>\n&#8211; ethernet<br \/>\n&#8211; FDDI<br \/>\n&#8211; token ring<br \/>\n&#8211; token ring-net<br \/>\n&#8211; TrBRF<br \/>\n&#8211; TrCRF<\/p>\n<p>Parameters that can be set for a normal-range VLAN:<br \/>\n&#8211; VLAN ID<br \/>\n&#8211; VLAN name<br \/>\n&#8211; VLAN type<br \/>\n&#8211; VLAN state (active or suspended)<br \/>\n&#8211; MTU<br \/>\n&#8211; Security Association Identifier (SAID)<br \/>\n&#8211; Bridge indentification number for TrBRF VLANs<br \/>\n&#8211; Ring number for FDDI and TrCRF VLANs<br \/>\n&#8211; Parent VLAN number for TrCRF VLANs<br \/>\n&#8211; STP type for TrCRF VLANs<br \/>\n&#8211; VLAN number to used when translating from one VLAN type to another<\/p>\n<p>To create a VLAN, the switch must be in VTP server or transparent mode<\/p>\n<p>VTP server mode, the VTP domain must be configured for VTP to function<\/p>\n<p>Since the switch supports Ethernet interfaces exclusively, only FDDI and Tolken Ring<\/p>\n<p>media-specific characteristics are supported for VTP global advertisements to other<\/p>\n<p>switches<\/p>\n<p>conf t<br \/>\nvlan 20<br \/>\nname test20<\/p>\n<p>show vlan<\/p>\n<p>Deleting a VLAN in VTP server mode, the VLAN is removed from the VLAN database for all<\/p>\n<p>switches in the VTP domain<\/p>\n<p>Deleting a VLAN in VTP transparent mode, the VLAN is deleted only from that switch<\/p>\n<p>When a VLAN is deleted, any ports assigned to that VLAN become inactive.<\/p>\n<p>conf t<br \/>\nno vlan 20<\/p>\n<p>sh vlan brief<\/p>\n<p>If a VLAN is configured on an interface and the VLAN does not exist, the new VLAN is<\/p>\n<p>created<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nswitchport mode access<br \/>\nswithport access vlan 20<\/p>\n<p>show run int fa0\/1<br \/>\nshow int fa0\/1 switchport<\/p>\n<p>To return an interface to it&#8217;s default configuration:<\/p>\n<p>conf t<br \/>\ndefault int fa0\/1<\/p>\n<p>Each routed port on the switch creates an internal VLAN for use. These internal VLANs use<\/p>\n<p>extended-range VLAN numbers. This internal VLAN cannot be configured for an extended-range<\/p>\n<p>VLAN.<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nno switchport<br \/>\nip address 1.1.1.1 255.255.255.252<\/p>\n<p>show vlan internal usage<\/p>\n<p>To change the behavior of internal VLANs, whether they start at 1006 and ascend or start at<\/p>\n<p>4094 and descend, use:<\/p>\n<p>conf t<br \/>\nvlan internal allocation policy ascending<\/p>\n<p>Or:<\/p>\n<p>vlan internal allocation policy descending<\/p>\n<p>If necessary, the routed port can be shutdown, which frees up the internal VLAN. The<\/p>\n<p>Extended-range VLAN can then be created using that VLAN ID. Then re-enable the port.<\/p>\n<p>Routed ports count toward the total number of VLANs on the switch. If the total number of<\/p>\n<p>VLANs is reached, an error message is created<\/p>\n<p>Before creating an extended-range VLAN, use:<\/p>\n<p>show vlan internal usage<\/p>\n<p>Entended-range VLANs:<\/p>\n<p>conf t<br \/>\nvtp mode transparent<br \/>\nvlan 200<br \/>\nname test<\/p>\n<p>show vlan id 200<\/p>\n<p>To delete an extended-range VLAN:<\/p>\n<p>conf t<br \/>\nno vlan 200<\/p>\n<p>Switches running the LAN Base feature set support only static routing on SVIs.<\/p>\n<p>The voice VLAN enables access ports to carry IP voice traffic from an IP phone<\/p>\n<p>The IP phone sends voice traffic with:<br \/>\n&#8211; Layer 3 IP precedence; default value of 5<br \/>\n&#8211; Layer 2 class of service (CoS); default value of 5<\/p>\n<p>The switch can be configured to trust or override the traffic priority assigned by the IP<\/p>\n<p>phone<\/p>\n<p>The IP phone has an integrated 3 port switch<br \/>\n&#8211; Port 1 connects to the switch<br \/>\n&#8211; Port 2 is an internal interface<br \/>\n&#8211; Port 3 connects to a PC or other device<\/p>\n<p>An access port can be configured for one voice VLAN and one data VLAN<\/p>\n<p>CDP must be enabled on the switch port<\/p>\n<p>CDP is used to configure the IP phone to send voice traffic in any of these ways:<br \/>\n&#8211; voice VLAN tagged with Layer 2 CoS priority value<br \/>\n&#8211; access VLAN tagged with Layer 2 CoS priority value<br \/>\n&#8211; access VLAN untagged and no Layer 2 CoS priority value<\/p>\n<p>Voice traffic Layer 3 IP precedence<br \/>\n&#8211; voice traffic, default value of 5<br \/>\n&#8211; voice control traffic, default value of 3<\/p>\n<p>CDP is used to configure the IP phone&#8217;s access port<br \/>\n&#8211; trusted mode, all traffic received passes through unchanged<br \/>\n&#8211; untrusted mode, all 802.1Q and 802.1p frames receive a configured Layer 2 CoS value;<br \/>\n&#8211; the default CoS value is 0<br \/>\n&#8211; untrusted mode is the default<br \/>\n&#8211; untagged traffic passes through the phone unchanged, regardless of the trust state of<\/p>\n<p>the access port on the phone<\/p>\n<p>Do not configure a voice VLAN on a private VLAN port<\/p>\n<p>Power over Ethernet (PoE) switches are capable of automatically providing power to devices<br \/>\n&#8211; Cisco pre-standard<br \/>\n&#8211; 802.3af compliant<\/p>\n<p>It is recommended to enable QoS on switches before enabling a voice VLAN<br \/>\n&#8211; mls qos; global configuration<br \/>\n&#8211; mls qos trust cos; interface configuration<br \/>\n&#8211; the auto-QoS feature configures both<\/p>\n<p>The Port Fast feature is automatically enabled when the voice VLAN is configured<br \/>\n&#8211; when the voice VLAN is disabled, the Port Fast feature is not automatically disabled<\/p>\n<p>If the IP phone and the device attached to the phone are in the same VLAN, they must be in<\/p>\n<p>the same IP subnet<\/p>\n<p>Voice VLAN can be configured on the following port types:<br \/>\n&#8211; dynamic access port<br \/>\n&#8211; IEEE 802.1X authenticated port<br \/>\n&#8211; protected port<br \/>\n&#8211; the source or destination of a SPAN or RSPAN session<br \/>\n&#8211; secure port<\/p>\n<p>Port security<br \/>\n&#8211; You must set the maximum allowed addresses on the port 2, plus the number allowed on the<\/p>\n<p>access VLAN<br \/>\n&#8211; the MAC address of the IP phone may be learned on both the voice and access VLANs<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nmls qos trust cos<br \/>\nswitchport voice {detect cisco-phone [full-duplex] | vlan {vlan-id | dot1p | none |<\/p>\n<p>untagged}}<\/p>\n<p>switchport voice vlan dot1p<br \/>\n&#8211; configures the switch to access voice and data IEEE 802.1p priority frames tagged with<\/p>\n<p>VLAN ID 0 (the native VLAN)<br \/>\n&#8211; by default, the switch drops all voice and data traffic tagged with VLAN 0<\/p>\n<p>sh int fa0\/1 switchport<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nswitchport priority extend {cos | trust}<\/p>\n<p>On a router, VLANs need to be configured on subinterfaces.<\/p>\n<p>conf t<br \/>\nip routing<br \/>\nint fa0\/1.2<br \/>\nencapsulation dot1q 2<br \/>\nip address 1.1.1.1 255.255.255.0<\/p>\n<p>conf t<br \/>\nint fa0\/1.2<br \/>\nencapsulation dot1q 2 native<br \/>\nip address 1.1.1.1 255.255.255.0<\/p>\n<p>Configuring a VLAN for a Bridge Group<\/p>\n<p>conf t<br \/>\nint fa0\/1.2<br \/>\nencapsulation dot1q 2<br \/>\nbridge-group 2<\/p>\n<p>Each VLAN has its own MAC address table<\/p>\n<p>Switch ports are Layer 2-only interafaces associated with a physical port<br \/>\n&#8211; a switch port can be an access port, a trunk port, or a tunnel port<br \/>\n&#8211; switch ports do not handle routing or bridging<\/p>\n<p>If an access port receives a tagged packet (ISL or dot1q), the packet is dropped<\/p>\n<p>Port VLAN ID (PVID)<\/p>\n<p>Tunnel ports are used in 802.1Q tunneling to segregate the traffic of customers in a<\/p>\n<p>service-provider network from other customers who are using the same VLAN number<\/p>\n<p>A routed port is a physical port that acts like a port on a router<br \/>\n&#8211; behaves like a regular router interface, except that it does not support VLAN<\/p>\n<p>subinterfaces<\/p>\n<p>A switched virtual interface (SVI) represents a VLAN of switch ports as one interface to<\/p>\n<p>the routing and bridging functions in the system<br \/>\n&#8211; only one SVI can be associated with a VLAN<br \/>\n&#8211; must be configured to route between VLANs or use fallback-bridging for nonroutable<\/p>\n<p>protocols between VLANs<br \/>\n&#8211; by default, an SVI is created for VLAN 1<br \/>\n&#8211; the SVI for VLAN 1 cannot be deleted<br \/>\n&#8211; the SVI does not become active until it is associated with a physical port and that port<\/p>\n<p>is up up state<\/p>\n<p>SVI autostate exclusion<br \/>\n&#8211; configures a port to not be included in the calculation to determine whether the VLAN is<\/p>\n<p>up<br \/>\n&#8211; if the port configured for SVI autostate exclusion is the only port state is up in the<\/p>\n<p>VLAN, the SVI will be in the down state<\/p>\n<p>conf t<br \/>\nint gi0\/1<br \/>\nswitchport autostate exclude<\/p>\n<p>show run int gi0\/1<br \/>\nshow int gi0\/1 switchport<\/p>\n<p>10-Gigabit Ethernet interfaces only operate in the full-duplex mode<\/p>\n<p>PoE capable switch ports automatically supply power to connected devices for:<br \/>\n&#8211; Cisco pre-standard powered devices (Cisco IP Phones)<br \/>\n&#8211; IEEE 802.3af compliant powered devices<br \/>\n&#8211; IEEE 802.3at compliant powered devices<\/p>\n<p>The switch uses these protocols to support PoE:<br \/>\n&#8211; CDP with power consumption<br \/>\n&#8211; Cisco intelligent power management<br \/>\n&#8211; IEEE 802.3af<br \/>\n&#8211; IEEE 802.3at &#8211; POE+<\/p>\n<p>Power management modes<br \/>\n&#8211; auto<br \/>\n&#8211; static<br \/>\n&#8211; never<\/p>\n<p>Macros can be used to define interface ranges<\/p>\n<p>conf t<br \/>\ndefine interface-range ALL_PORTS fa0\/1 &#8211; 24<br \/>\nint range macro ALL_PORTS<\/p>\n<p>show run | in define<\/p>\n<p>Management port<br \/>\n&#8211; a Layer 3 host port used to connect a PC<br \/>\n&#8211; by default, the management port is enabled<br \/>\n&#8211; the switch cannot route packets from the management port to a routed port<br \/>\n&#8211; the switch cannot route packets from a routed port to the management port<br \/>\n&#8211; routing protocols can be enabled on the port<\/p>\n<p>If the management port and routed port are associated to the same routing process<br \/>\n&#8211; the routes from the management port are propogated through the routed ports<br \/>\n&#8211; the routes from the routed ports are propogated through the management port<\/p>\n<p>Supported features on the management port:<br \/>\n&#8211; Express Setup<br \/>\n&#8211; Network Assitant<br \/>\n&#8211; telnet<br \/>\n&#8211; TFTP<br \/>\n&#8211; SSH<br \/>\n&#8211; DHCP<br \/>\n&#8211; SNMP<br \/>\n&#8211; IP ping<br \/>\n&#8211; CDP<br \/>\n&#8211; DHCP relay agent<br \/>\n&#8211; IPv4 and IPv6 ACLs<br \/>\n&#8211; routing protocols<\/p>\n<p>If the management port LED is amber, the switch failed POST<\/p>\n<p>TFTP and the management port<br \/>\n&#8211; arp<br \/>\n&#8211; mgmt_clr<br \/>\n&#8211; mgmt_init<br \/>\n&#8211; mgmt_show<br \/>\n&#8211; ping<br \/>\n&#8211; boot tftp:\/<br \/>\n&#8211; copy tftp:\/<\/p>\n<p>Default Layer 2 Ethernet Interface Configuration<br \/>\n&#8211; Operating mode: Layer 2 (switchport)<br \/>\n&#8211; Allowed VLAN range: 1 &#8211; 4094<br \/>\n&#8211; Default VLAN: VLAN 1<br \/>\n&#8211; Native VLAN: VLAN 1<br \/>\n&#8211; VLAN trunking: switchport mode dynamic auto (supports DTP)<br \/>\n&#8211; Port enabled state: all ports are enabled<br \/>\n&#8211; Port description: none defined<br \/>\n&#8211; Speed: autonegotiate<br \/>\n&#8211; Duplex mode: autonegotiate<br \/>\n&#8211; Flow control: set to receive off<br \/>\n&#8211; EtherChannel (PAgP): disabled on all ports<br \/>\n&#8211; port blocking (unknown multicast and unknown unicast): disabled<br \/>\n&#8211; Broadcast, multicast, unicast storm: disabled<br \/>\n&#8211; Portected port: disabled<br \/>\n&#8211; Port security: disabled<br \/>\n&#8211; Port fast: disabled<br \/>\n&#8211; Auto-MDIX: enabled<br \/>\n&#8211; Power over Ethernet: enabled<\/p>\n<p>Interface speed and duplex mode<br \/>\n&#8211; 10 Mb\/s ports normally operate in half-duplex mode<br \/>\n&#8211; Gigabit Ethernet ports operating at 1000 Mb\/s do not support half-duplex mode<br \/>\n&#8211; SFP ports (1000BASE-x, where x is -BX, -CWDM, -LX, -SX, or -ZX) support the nonegotiate<\/p>\n<p>and speed interface commands<br \/>\n&#8211; SFP ports (1000BASE-x, where x is -BX, -CWDM, -LX, -SX, or -ZX) do not support duplex<\/p>\n<p>options<br \/>\n&#8211; SFP ports (1000BASE-T) support speed and duplex options<\/p>\n<p>Changing the interface speed and duplex mode might shut down and re-enable the interface<\/p>\n<p>conf t<br \/>\nint gi0\/1<br \/>\nspeed { 10 | 100 | 1000 | auto | nonegotiate }<br \/>\nduplex { auto | full | half }<\/p>\n<p>show int gi0\/1<\/p>\n<p>IEEE 802.3x flow control<br \/>\n&#8211; enables connected port to control traffic rates during congestion<br \/>\n&#8211; node sends pause link operation to the other end<br \/>\n&#8211; 3750-X and 3560-X ports can receive, but do not send pause frames<\/p>\n<p>conf t<br \/>\nint gi0\/1<br \/>\nflowcontrol { on | off | desired }<\/p>\n<p>show int gi0\/1<\/p>\n<p>Auto-MDIX<br \/>\n&#8211; Automatic Medium-Dependent Interface Crossover<br \/>\n&#8211; allows either a straight through or crossover cable to be connected<br \/>\n&#8211; enabled by default<br \/>\n&#8211; the interface speed and duplex must be set to auto<br \/>\n&#8211; not supported on 1000BASE-SX or -LX SFPs<\/p>\n<p>conf t<br \/>\nint gi0\/1<br \/>\nspeed auto<br \/>\nduplex auto<br \/>\nmdix auto<\/p>\n<p>show controllers ethernet-controller gi0\/1 phy<\/p>\n<p>PoE management on an interface<\/p>\n<p>conf t<br \/>\nint gi0\/1<br \/>\npower inline { auto | never | static }<\/p>\n<p>show power inline<\/p>\n<p>The switch supports these types of Layer 3 interfaces<br \/>\n&#8211; SVIs<br \/>\n&#8211; Routed ports<br \/>\n&#8211; Layer 3 EhterChannel ports<\/p>\n<p>All Layer 3 interfaces require an IP address to route traffic<\/p>\n<p>conf t<br \/>\nint gi0\/1<br \/>\nno switchport<br \/>\nip add 1.1.1.1 255.255.255.0<br \/>\nno shut<\/p>\n<p>show int gi0\/1<br \/>\nshow ip int gi0\/1<\/p>\n<p>System MTU<br \/>\n&#8211; the default maximum transmission unit (MTU) size for frames received and sent on all<\/p>\n<p>interfaces si 1500 bytes<br \/>\n&#8211; jumbo frames can be configured on Gigabit and 10-Gigabit ethernet ports<br \/>\n&#8211; system mtu jumbo<br \/>\n&#8211; system routing MTU applies only to routed packets on all routed ports<br \/>\n&#8211; system mtu routing<br \/>\n&#8211; the switch does not support MTU settings on a per-interface bassis<br \/>\n&#8211; the command &#8220;system mtu &#8221; can be configured on a 3750-X, but the<\/p>\n<p>setting only applies to 3750 switches in the switch stack<br \/>\n&#8211; after changing MTU settings, the switch must be reset to take effect<br \/>\n&#8211; the system MTU settings is saved in the switch environmental variable in NVRAM<br \/>\n&#8211; the system MTU settings are not saved in the configuration file<br \/>\n&#8211; the maximum MTU size varies depending on if there are 3750 switches present in the<\/p>\n<p>switch stack<\/p>\n<p>conf t<br \/>\nsystem mtu jumbo 9198<br \/>\nsystem mtu routing 9198<br \/>\nsystem mtu 1998<\/p>\n<p>reload<\/p>\n<p>show system mtu<\/p>\n<p>Monitoring Interface Status<\/p>\n<p>show env power switch<br \/>\nshow env ps<br \/>\nshow int gi0\/1<br \/>\nshow int gi0\/1 status<br \/>\nsh int status<br \/>\nshow int gi0\/1 status err-disabled<br \/>\nshow int gi0\/1 switchport<br \/>\nshow int gi0\/1 description<br \/>\nshow ip int gi0\/1<br \/>\nshow ip int brief<br \/>\nshow int gi0\/1 stats<br \/>\nshow int transceiver dom-supported-list<br \/>\nshow int transceiver properties<br \/>\nshow controllers ethernet-controller gi0\/1<br \/>\nshow power inline<br \/>\nshow power inline consumption<br \/>\nshow power inline police<\/p>\n<p>Clearing and resetting interface counters<\/p>\n<p>clear counters gi0\/1<br \/>\nclear int gi0\/1<br \/>\nclear line vty 1<br \/>\nclear line console<\/p>\n","protected":false},"excerpt":{"rendered":"<p>v5 Written: 2.1.c Implement and troubleshoot VLAN 2.1.c [i] Access ports 2.1.c [ii] VLAN database 2.1.c [iii] Normal, extended VLAN, voice VLAN v5 Lab: 1.1.c Implement and troubleshoot VLAN 1.1.c [i] Access Ports 1.1.c [ii] VLAN database 1.1.c [iii] Normal, extended VLAN, voice VLAN Documents: Catalyst 3750-X and 3560-X Software Configuration Guide, Release 15.0(1)SE, Chapter [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[30,11,19],"class_list":["post-68","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-ccie","tag-route-switch","tag-vlan"],"_links":{"self":[{"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/posts\/68","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/feralpacket.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=68"}],"version-history":[{"count":5,"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/posts\/68\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/posts\/68\/revisions\/231"}],"wp:attachment":[{"href":"https:\/\/feralpacket.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=68"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/feralpacket.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=68"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/feralpacket.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}