{"id":72,"date":"2014-06-23T11:32:12","date_gmt":"2014-06-23T11:32:12","guid":{"rendered":"http:\/\/feralpacket.org\/?p=72"},"modified":"2015-01-03T11:19:22","modified_gmt":"2015-01-03T11:19:22","slug":"v5-written-and-lab-trunk-and-vtp-notes","status":"publish","type":"post","link":"https:\/\/feralpacket.org\/?p=72","title":{"rendered":"v5 Written and Lab:  Trunk and VTP Notes"},"content":{"rendered":"<p><code>v5 Written:<br \/>\n2.1.d Implement and troubleshoot trunking<br \/>\n2.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning<br \/>\n2.1.d [ii] dot1Q<br \/>\n2.1.d [iii] Native VLAN<br \/>\n2.1.d [iv] Manual pruning<\/code><\/p>\n<p>v5 Lab:<br \/>\n1.1.d Implement and troubleshoot trunking<br \/>\n1.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning<br \/>\n1.1.d [ii] dot1Q<br \/>\n1.1.d [iii] Native VLAN<br \/>\n1.1.d [iv] Manual pruning<\/p>\n<p>Documentation:<\/p>\n<p>Catalyst 3750-X and 3560-X Software Configuration Guide, Release 15.0(1)SE,<br \/>\nChapter 15: Configuring VLANs, pgs. 15-14 to 15-32<\/p>\n<p>Catalyst 3750-X and 3560-X Software Configuration Guide, Release 15.0(1)SE,<br \/>\nChapter 16: Configuring VTP, pgs. 16-1 to 16-18<\/p>\n<p>Books:<\/p>\n<p>Cisco LAN Switching; Chapter 8: Trunking Technologies and Applications, pgs. 291 &#8211; 331<\/p>\n<p>CCIE Routing and Switching Exam Certification Guide 4th Ed; Chapter 2 Virtual LANs and VLAN Trunking, pgs. 42 &#8211; 62<\/p>\n<p>INE:<\/p>\n<p>A trunk is a point-to-point link between one or more Ethernet switch interfaces and another network device such as a router or switch.<\/p>\n<p>Trunkinng encapsulations:<br \/>\n&#8211; Inter-Switch Link (ISL) &#8211; Ciscro proprietary<br \/>\n&#8211; IEEE 802.1Q &#8211; industry standard<\/p>\n<p>Trunk negotiation is managed by the Dynamic Trunking Protocol (DTP)<br \/>\n&#8211; some network devices might forward DTP frames improperly, which could cause some misconfigurations<br \/>\n&#8211; for interfaces connected to devices that do not support DTP, disable DTP<\/p>\n<p>If you do not intend to trunk across a link, use:<br \/>\n&#8211; switchport mode access<\/p>\n<p>To enable trunking to a device that does not support DTP, use:<br \/>\n&#8211; switchport trunk encapsulation {isl|dot1q}<br \/>\n&#8211; switchport mode trunk<br \/>\n&#8211; switchport nonegotiate<\/p>\n<p>DTP is not supported on private-LAN ports or tunnel por<br \/>\nts<\/p>\n<p>Layer 2 interface modes:<br \/>\n&#8211; switchport mode access<br \/>\n&#8211; switchport mode dynamic auto<br \/>\n&#8211; switchport mode dynamic desirable<br \/>\n&#8211; switchport mode trunk<br \/>\n&#8211; switchport nonegotiate<br \/>\n&#8211; switchport mode dot1q-tunnel<\/p>\n<p>switchport mode access<br \/>\n&#8211; puts the interface into permanet non-trunking mode<br \/>\n&#8211; access port<\/p>\n<p>switchport mode dynamic auto<br \/>\n&#8211; makes the interface able to convert the linkg to a trunk link<br \/>\n&#8211; neighboring interface must be set to:<br \/>\n&#8211; trunk mode<br \/>\n&#8211; desirable mode<\/p>\n<p>switchport mode dynamic desirable<br \/>\n&#8211; makes the interface actively attempt to convert the link to a trunk link<br \/>\n&#8211; neighboring interface must be set to:<br \/>\n&#8211; trunk mode<br \/>\n&#8211; desirable mode<br \/>\n&#8211; auto mode<\/p>\n<p>switchport mode trunk<br \/>\n&#8211; puts the interface into permanent trunking mode<br \/>\n&#8211; negotiates to convert the neighboring interface into a trunk link<\/p>\n<p>switchport nonegotiate<br \/>\n&#8211; prevents the interface from generating DTP frames<\/p>\n<p>switchport mode dot1q-tunnel<br \/>\n&#8211; configures the interface as a tunnel (nontrunking) port to connect to an asymmetric link with an IEEE 802.1Q trunk port<\/p>\n<p>Ethernet trunk encapsulation types:<br \/>\n&#8211; switchport trunk encapsulation isl<br \/>\n&#8211; switchport trunk encapsulation dot1q<br \/>\n&#8211; switchport trunk encapsulation negotiate<\/p>\n<p>switchport trunk encapsulation negotiate<br \/>\n&#8211; the interface negotiates with the neighboring interface to become:<br \/>\n&#8211; ISL (preferred)<br \/>\n&#8211; dot1q<\/p>\n<p>The switch does not support Layer 3 trunks<\/p>\n<p>802.1Q trunks<br \/>\n&#8211; Cisco switches maintain one STP instance for each VLAN<br \/>\n&#8211; non-Cisco devices may support one STP instance for all VLANs<\/p>\n<p>If the Native VLAN for one end of a trunk link is different from the Native VLAN on the other end, spanning-tree loops might result<\/p>\n<p>Disabling STP on the Native VLAN can potentially cause spanning-tree loops<\/p>\n<p>By default, an interface on a switch is in Layer 2 mode<\/p>\n<p>Default Layer 2 Ethernet Interface VLAN Configuration:<br \/>\n&#8211; switchport mode dynamic auto<br \/>\n&#8211; switchport trunk encapsulation negotiate<br \/>\n&#8211; Allowed VLANs: 1 &#8211; 4094<br \/>\n&#8211; VLANs eligible for pruning: 2 &#8211; 1001<br \/>\n&#8211; Default VLAN (access ports): 1<br \/>\n&#8211; Native VLAN (for dot1q trunks): 1<\/p>\n<p>To use VTP, at least one trunk port is configured on the switch has to be connected to a trunk port on a second switch<\/p>\n<p>Trunk ports:<br \/>\n&#8211; cannot be a secure port<br \/>\n&#8211; cannot be a tunnel port<br \/>\n&#8211; for EtherChannel port groups, all interfaces must have the same configuration<br \/>\n&#8211; recommended that no more than 24 trunk ports in PVST mode<br \/>\n&#8211; recommended that no more than 40 trunk ports in MST mode<br \/>\n&#8211; switchport access vlan &#8211; specifies a default VLAN to be used if the interface stops trunking<br \/>\n&#8211; for 8021q, can received tagged and untagged (native VLAN) traffic<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nswitchport trunk encapsulation {ils|dot1q|negotiate}<br \/>\nswitchport mode {dynamic {auto|desirable} | trunk}<br \/>\nswitchport access vlan<\/p>\n<p>show int fa0\/1 switchport<br \/>\nshow int fa0\/1 trunk<br \/>\nshow int trunk<\/p>\n<p>By default, a trunk port sends traffic to and receives traffic from all VLANs, 1 &#8211; 4094<br \/>\n&#8211; to restrict the traffic a trunk carries:<br \/>\n&#8211; switchport trunk allowed vlan remove<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nswitchport trunk allowed vlan remove 2<\/p>\n<p>Cisco use to have a requirement that VLAN 1 always be enabled on every trunk link<\/p>\n<p>To reduce the risk of spanning-tree loops or storms, you can disable VLAN 1 on any individual trunk port by removing VLAN 1 from the allowed list<br \/>\n&#8211; the interface continues to send and receive management traffic<br \/>\n&#8211; CDP<br \/>\n&#8211; PAgP<br \/>\n&#8211; LACP<br \/>\n&#8211; DTP<br \/>\n&#8211; VTP<\/p>\n<p>The pruning-eligible list applies only to trunk ports<br \/>\n&#8211; each trunk port has its own eligibility list<br \/>\n&#8211; VTP pruning must be enabled for this to take effect<br \/>\n&#8211; VLANs that are pruning-ineligible receive flooded traffic<br \/>\n&#8211; the default VLANs allowed to be pruned are 2 &#8211; 1001<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nswitchport trunk pruning vlan remove 2<\/p>\n<p>Native VLAN<br \/>\n&#8211; untagged traffic<br \/>\n&#8211; default VLAN 1<br \/>\n&#8211; the switch forwards all untagged traffic to the native VLAN<br \/>\n&#8211; can be assigned any VLAN ID<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nswitchport trunk native vlan 2<\/p>\n<p>show int fa0\/1 switchport<\/p>\n<p>Load sharing divides the bandwidth between parallel trunks connecting switches<br \/>\n&#8211; use STP port priorities<br \/>\n&#8211; for links connected to the same switch<br \/>\n&#8211; use STP path costs<br \/>\n&#8211; for linkgs connected to the same switch or two different switches<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nspanning-tree vlan 8-10 port-priority 16<br \/>\nint fa0\/2<br \/>\nspanning-tree vlan 3-6 port-priority 16<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nspanning-tree vlan 2-4 cost 30<br \/>\nint fa0\/2<br \/>\nspanning-tree vlan 8-9 cost 30<\/p>\n<p>VLAN Trunking Protocol (VTP)<br \/>\n&#8211; Layer 2 protocol<br \/>\n&#8211; maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis<br \/>\n&#8211; default version is 1<\/p>\n<p>Cisco IOS 12.2(52)SE and later support VTPv3<\/p>\n<p>A VTP domain consists of one switch or several interconnected switches or switch stacks under the same administrative responsibility sharing the same VTP domain name<\/p>\n<p>By default, a switch is in the VTP no-management-domain state<br \/>\n&#8211; no VTP domain name is configured<\/p>\n<p>If a switch receives a VTP advertisement over a trunk line, it inherits the management domain name and the VTP configuration revision number<\/p>\n<p>Before adding a VTP client to a VTP domain, ALWAYS verify that its VTP configuration number is lower than the configuration revision number of the other switches in the VTP domain<br \/>\n&#8211; if you add a switch that has a higher revision numbeer, it can erase all VLAN information from the VTP server and VTP domain<\/p>\n<p>VTP modes:<br \/>\n&#8211; VTP server<br \/>\n&#8211; VTP client<br \/>\n&#8211; VTP transparent<br \/>\n&#8211; VTP off<\/p>\n<p>VTP server<br \/>\n&#8211; can create modify, and delete VLANS<br \/>\n&#8211; specify configuration parameters for the entire VTP domain<br \/>\n&#8211; advertise and synchronize VLAN configuration<br \/>\n&#8211; default mode for switches<br \/>\n&#8211; VLAN configuration is saved in NVRAM<br \/>\n&#8211; in version 1 and 2, cannot create private VLANs<\/p>\n<p>If a switch detects a failure while writing to NVRAM, the VTP mode automatically changes to client mode<\/p>\n<p>VTP client<br \/>\n&#8211; transmits and receives VTP updates on trunk links<br \/>\n&#8211; cannot create, modify, or delete VLANs<br \/>\n&#8211; in version 1 or 2, the VLAN configuration is not saved in NVRAM<br \/>\n&#8211; in version 3, the VLAN configuration is saved in NVRAM<\/p>\n<p>VTP transparent<br \/>\n&#8211; does not participate in VTP<br \/>\n&#8211; does not advertise VLAN configuration<br \/>\n&#8211; does not synchronize VLAN configuration based on received advertisements<br \/>\n&#8211; in version 2 and 3, VTP advertisements are forwarded through trunk links<br \/>\n&#8211; can create, modify, delete VLANs<br \/>\n&#8211; can create private VLANs<br \/>\n&#8211; VTP and VLAN configurations are saved to NVRAM and running-config<\/p>\n<p>VTP off<br \/>\n&#8211; functions in the same manner as a VTP transparent switch<br \/>\n&#8211; does not forward VTP advertisements on trunk links<\/p>\n<p>VTP adversitements<br \/>\n&#8211; sent periodically from each trunk line<br \/>\n&#8211; sent to a reserved multicast address<\/p>\n<p>VTP advertisements distribute the following information<br \/>\n&#8211; VTP domain name<br \/>\n&#8211; VTP configuration revision number<br \/>\n&#8211; update identity and update timestamp<br \/>\n&#8211; MD5 digest of VLAN configuration<br \/>\n&#8211; MTU for each VLAN<br \/>\n&#8211; Frame format<br \/>\n&#8211; VLAN IDs<br \/>\n&#8211; VLAN names<br \/>\n&#8211; VLAN types<br \/>\n&#8211; VLAN states<br \/>\n&#8211; additional VLAN configuration information<br \/>\n&#8211; in version 3, primary server ID, instance number, start index<\/p>\n<p>VTP version 2 features not in version 1:<br \/>\n&#8211; Token Ring support<br \/>\n&#8211; Unrecognized Type-Length-Value (TLV) support<br \/>\n&#8211; Version-Dependent Transparent Mode<br \/>\n&#8211; Consistency Checks<\/p>\n<p>VTP version 3 features not in version 1 or 2:<br \/>\n&#8211; enhanced authentication<br \/>\n&#8211; support for extended range VLAN (1006 &#8211; 4094) database propagation<br \/>\n&#8211; VTP pruning still applies only to VLANs 1 &#8211; 1005<br \/>\n&#8211; VLANs 1002 &#8211; 1005 are still reserved and cannot be modified<br \/>\n&#8211; support for private VLANs<br \/>\n&#8211; can propagate Multiple Spanning Tree (MST) protocol database information<br \/>\n&#8211; VTP primary server and VTP secondary servers<br \/>\n&#8211; in version 3 by default, all devices are secondary servers<br \/>\n&#8211; turn VTP on or off on a per-trunk<\/p>\n<p>VTP pruning increases the available network bandwidth by restricting flooded traffic<br \/>\n&#8211; disabled by default<br \/>\n&#8211; blocked unneeded flooded traffic to VLANs on trunk ports<br \/>\n&#8211; only VLANs included in the pruning-eligible list can be pruned, 2 &#8211; 1001 by default<br \/>\n&#8211; VLANs 1002 &#8211; 1005 and extended-range VLANs are pruning-ineligible<br \/>\n&#8211; if a VLAN is configured as pruning-ineligible, flooded traffic continues<br \/>\n&#8211; supported in all VTP versions<\/p>\n<p>Enabling VTP pruning on a VTP server enables pruning for the entire management domain<\/p>\n<p>VTP pruning is not designed to function in VTP transparent mode<\/p>\n<p>Default VTP configuration:<br \/>\n&#8211; VTP domain name: null<br \/>\n&#8211; VTP mode: server<br \/>\n&#8211; VTP version: 1<br \/>\n&#8211; MST database mode: transparent<br \/>\n&#8211; VTP version 3 server type: secondary<br \/>\n&#8211; VTP password: none<br \/>\n&#8211; VTP pruning: disabled<\/p>\n<p>conf t<br \/>\nvtp domain<br \/>\nvtp mode { client | server | transparent | off } { vlan | mst | unkown }<br \/>\nvtp password<\/p>\n<p>show vtp status<\/p>\n<p>conf t<br \/>\nvtp password [ hidden | secret ]<br \/>\nvtp primary-server [ vlan | mst | force ]<br \/>\nvtp version { 1 | 2 | 3 }<br \/>\nvtp pruning<\/p>\n<p>show vtp password<br \/>\nshow vtp status<br \/>\nshow vtp counters<br \/>\nshow vtp devices [ conflict ]<br \/>\nshot vtp interface fa0\/1<\/p>\n<p>When the VTP primary server is configured, it starts a takeover operation<\/p>\n<p>When you enable VTP version on a switch, every VTP version 2 capable switch in the VTP domain enables version 2<br \/>\n&#8211; VTP version 3 must be manually configured on each switch<br \/>\n&#8211; VTP version 1 and VTP version 2 are not interoperable in the same VTP domain<\/p>\n<p>Configuring VTP version 3 on a per-port basis:<\/p>\n<p>conf t<br \/>\nint fa0\/1<br \/>\nvtp<\/p>\n<p>show vtp status<\/p>\n<p>To reset the configuration revision number, change the VTP domain name to something else and then change it back to the original VTP domain name<\/p>\n","protected":false},"excerpt":{"rendered":"<p>v5 Written: 2.1.d Implement and troubleshoot trunking 2.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning 2.1.d [ii] dot1Q 2.1.d [iii] Native VLAN 2.1.d [iv] Manual pruning v5 Lab: 1.1.d Implement and troubleshoot trunking 1.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning 1.1.d [ii] dot1Q 1.1.d [iii] Native VLAN 1.1.d [iv] Manual pruning Documentation: Catalyst 3750-X and 3560-X [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[30,11,17,18],"class_list":["post-72","post","type-post","status-publish","format-standard","hentry","category-ccie","tag-ccie","tag-route-switch","tag-trunk","tag-vtp"],"_links":{"self":[{"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/posts\/72","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/feralpacket.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=72"}],"version-history":[{"count":2,"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/posts\/72\/revisions"}],"predecessor-version":[{"id":230,"href":"https:\/\/feralpacket.org\/index.php?rest_route=\/wp\/v2\/posts\/72\/revisions\/230"}],"wp:attachment":[{"href":"https:\/\/feralpacket.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=72"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/feralpacket.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=72"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/feralpacket.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=72"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}