Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Configuration and Management of Network equipment-- using VTP to implement extended VLAN configuration

2025-02-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Theoretical study

Question 1: what is the difference between a local VLAN and an extended VLAN?

There is no need to implement VLAN trunking across switches, all VLAN configurations work only on the local switch, and this VLAN configuration is local VLAN.

The technology that needs to use VLAN relay technology to achieve unified host communication within VLAN across switches is called extended VLAN.

Question 2: what are the ways to extend VLAN?

1 PVLAN Technology (Private VLAN)

2 SuperVLAN Technology (SuperVLAN)

3 SVLAN Technology (Stack VLAN)

What is the meaning of the question 3:VTP and what are its characteristics?

VTP is a Cisco proprietary messaging protocol used to synchronize VLAN information (such as the addition, deletion, or renaming of VLAN) within a domain. After configuring VTP, as long as the VLAN information is configured on one switch, the synchronization of VLAN information in all switches in the network can be completed automatically with the help of VTP, so as to achieve the consistency of VLAN configuration and reduce the complexity of network management transactions.

Characteristics of VTP

L ① VTP follows the Cramp S structure and adopts the domain management mode. The VTP server is used to establish, manage, and maintain VLAN information. VTP clients can automatically receive and use VLAN information after joining the domain, but cannot manage VLAN (add, modify, delete).

L ② VTP protocol transmits VLAN information to the switches in the domain through multicast.

L ③ uses VTP pruning to reduce unnecessary VLAN information sent to other switches, which is turned off by default.

Question: what is the working mode of 4:VTP? What's the meaning of each?

In the VTP domain, the switch can operate in the following three modes.

① Server mode: the switch is configured in VTP Server mode to establish, modify, and delete VLAN information and other configuration parameters for the entire VTP domain. The VTP server announces its VLAN configuration to other switches in the same VTP domain, which is the default VTP mode of the switch.

② Client mode: switches acting as VTP Client mode cannot establish, modify, or delete VLAN information, but can query and use VLAN information.

③ Transparent mode: VTP transparent mode in which a switch configured for this mode does not join the VLAN domain and does not receive VLAN information or declare VTP information. However, in VTP version 2, the Transparent switch can forward the VTP announcement information it receives to its relay interface.

Job task description

The existing network of an enterprise is a two-layer network structure, there is a layer 3 switch as the core switch, and then two layer 2 switches are connected through the Trunk link as access layer switches. Among them, the accounting office and the business part have a computer connected to two layer 2 switches, and the management department has a computer connected to the core switch. now the company stipulates that network communication cannot be carried out between various departments, and communication can be carried out within the department. consider how to implement the network.

Task implementation

Network topology design (paste the topology diagram of PT)

Specific configuration

(1) VTP configuration of each switch

RS:

RS > en

RS#conf t

Enter configuration commands, one per line. End with CNTL/Z.

RS (config) # h RS

RS (config) # vlan 2

RS (config-vlan) # vlan 3

RS (config-vlan) # vlan 4

RS (config-vlan) # e

RS (config) # vtp m

RS (config) # vtp m

RS (config) # vtp mode s

RS (config) # vtp mode server

Device mode already VTP SERVER.

RS (config) # vtp d

RS (config) # vtp domain vtp1

Domain name already set to vtp1.

RS (config) # int f0amp 22

RS (config-if) # sw

RS (config-if) # switchport m

RS (config-if) # switchport mode a

RS (config-if) # switchport mode access

RS (config-if) # sw

RS (config-if) # switchport a

RS (config-if) # switchport access vlan 4

RS (config-if) # int f0bin23

RS (config-if) # sw

RS (config-if) # switchport t

RS (config-if) # switchport trunk e

RS (config-if) # switchport trunk encapsulation d

RS (config-if) # switchport trunk encapsulation dot1q

RS (config-if) # sw

RS (config-if) # switchport m

RS (config-if) # switchport mode r

RS (config-if) # switchport mode t

RS (config-if) # switchport mode trunk

RS (config-if) # int f0and24

RS (config-if) # sw

RS (config-if) # switchport t

RS (config-if) # switchport trunk e

RS (config-if) # switchport trunk encapsulation d

RS (config-if) # switchport trunk encapsulation dot1q

RS (config-if) # sw

RS (config-if) # switchport m

RS (config-if) # switchport mode t

RS (config-if) # switchport mode trunk

RS (config-if) #

SW1:

Switch > en

Switch#conf t

Enter configuration commands, one per line. End with CNTL/Z.

Switch (config) # h SW1

SW1 (config) #

SW1 (config) # vtp d

SW1 (config) # vtp domain c

SW1 (config) # vtp domain c

Changing VTP domain name from vtp1 to c

SW1 (config) # vtp d

SW1 (config) # vtp domain vtp1

Changing VTP domain name from c to vtp1

SW1 (config) # int f0and24

SW1 (config-if) # sw

SW1 (config-if) # switchport m

SW1 (config-if) # switchport mode t

SW1 (config-if) # switchport mode trunk

SW1 (config-if) # e

SW1 (config) # int f0bin1

SW1 (config-if) # sw

SW1 (config-if) # switchport m

SW1 (config-if) # switchport mode a

SW1 (config-if) # switchport mode access

SW1 (config-if) # sw

SW1 (config-if) # switchport a

SW1 (config-if) # switchport access vl

SW1 (config-if) # switchport access vlan 2

SW1 (config-if) # e

SW1 (config) # int f0bin2

SW1 (config-if) # sw

SW1 (config-if) # switchport m

SW1 (config-if) # switchport mode a

SW1 (config-if) # switchport mode access

SW1 (config-if) # sw

SW1 (config-if) # switchport a

SW1 (config-if) # switchport access v

SW1 (config-if) # switchport access vlan 3

SW1 (config-if) #

SW2:

Switch > en

Switch#conf t

Enter configuration commands, one per line. End with CNTL/Z.

Switch (config) # h SW2

SW2 (config) # vtp d

SW2 (config) # vtp domain c

SW2 (config) # vtp domain c

Changing VTP domain name from vtp1 to c

SW2 (config) # vtp 00:03:42% DTP-5-DOMAINMISMATCH: Unable to perform trunk negotiation on port Fa0/24 because of VTP domain mismatch.

M

SW2 (config) # vtp mode c

SW2 (config) # vtp mode client

Device mode already VTP CLIENT.

SW2 (config) # vtp d

SW2 (config) # vtp domain vtp1

Changing VTP domain name from c to vtp1

SW2 (config) # int f0and24

SW2 (config-if) # sw

SW2 (config-if) # switchport

SW2 (config-if) # switchport m t

SW2 (config-if) # int f0bin1

SW2 (config-if) # sw m a

SW2 (config-if) # sw a v2

^

% Invalid input detected at'^ 'marker.

SW2 (config-if) # sw a v 2

SW2 (config-if) # int f0bin2

SW2 (config-if) # sw m a

SW2 (config-if) # sw a v 3

SW2 (config-if) #

(2) VLAN test

PC > ping 192.168.1.3

Pinging 192.168.1.3 with 32 bytes of data:

Reply from 192.168.1.3: bytes=32 time=234ms TTL=128

Reply from 192.168.1.3: bytes=32 time=125ms TTL=128

Reply from 192.168.1.3: bytes=32 time=109ms TTL=128

Reply from 192.168.1.3: bytes=32 time=93ms TTL=128

Ping statistics for 192.168.1.3:

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)

Approximate round trip times in milli-seconds:

Minimum = 93ms, Maximum = 234ms, Average = 140ms

(3) VTP view

Rs

RS#show vtp status

VTP Version: 2

Configuration Revision: 0

Maximum VLANs supported locally: 1005

Number of existing VLANs: 8

VTP Operating Mode: Server

VTP Domain Name: vtp1

VTP Pruning Mode: Disabled

VTP V2 Mode: Disabled

VTP Traps Generation: Disabled

MD5 digest: 0x6F 0xC6 0x69 0xD0 0x95 0x73 0x0F 0xAA

Configuration last modified by 0.0.0.0 at 3-1-93 00:23:34

Local updater ID is 0.0.0.0 (no valid interface found)

SW1

Switch2#show vtp status

VTP Version: 2

Configuration Revision: 0

Maximum VLANs supported locally: 255

Number of existing VLANs: 8

VTP Operating Mode: Client

VTP Domain Name: vtp1

VTP Pruning Mode: Disabled

VTP V2 Mode: Disabled

VTP Traps Generation: Disabled

MD5 digest: 0x6F 0xC6 0x69 0xD0 0x95 0x73 0x0F 0xAA

Configuration last modified by 0.0.0.0 at 3-1-93 00:23:34

SW2

Switch3#show vtp status

VTP Version: 2

Configuration Revision: 0

Maximum VLANs supported locally: 255

Number of existing VLANs: 8

VTP Operating Mode: Client

VTP Domain Name: vtp1

VTP Pruning Mode: Disabled

VTP V2 Mode: Disabled

VTP Traps Generation: Disabled

MD5 digest: 0x6F 0xC6 0x69 0xD0 0x95 0x73 0x0F 0xAA

Configuration last modified by 0.0.0.0 at 3-1-93 00:23:34

Work expansion

Extend the configuration of ACL

If the above task requires global management of all switches through a VLAN implementation (such as using telnet debugging), consider how to implement it?

Specific configuration:

Rs

Building configuration...

Current configuration: 1492 bytes

!

Version 12.2

No service timestamps log datetime msec

No service timestamps debug datetime msec

No service password-encryption

!

Hostname RS

!

!

!

Enable password cisco

!

!

!

Ip routing

!

!

!

Spanning-tree mode pvst

!

Interface FastEthernet0/1

!

(omit.)

!

Interface FastEthernet0/21

!

Interface FastEthernet0/22

Switchport access vlan 4

Switchport mode access

!

Interface FastEthernet0/23

Switchport trunk encapsulation dot1q

Switchport mode trunk

!

Interface FastEthernet0/24

Switchport trunk encapsulation dot1q

Switchport mode trunk

!

Interface GigabitEthernet0/1

!

Interface GigabitEthernet0/2

!

Interface Vlan1

Ip address 192.168.100.1 255.255.255.0

!

Interface Vlan2

Ip address 192.168.1.254 255.255.255.0

!

Interface Vlan3

Ip address 192.168.2.254 255.255.255.0

!

Interface Vlan4

Ip address 192.168.3.254 255.255.255.0

!

Ip classless

!

!

Line con 0

!

Line aux 0

!

Line vty 0 4

Password cisco

Login

!

End

Sw1

Building configuration...

Current configuration: 1181 bytes

!

Version 12.1

No service timestamps log datetime msec

No service timestamps debug datetime msec

No service password-encryption

!

Hostname Sw1

!

Enable password cisco

!

!

Spanning-tree mode pvst

!

Interface FastEthernet0/1

Switchport access vlan 2

Switchport mode access

!

Interface FastEthernet0/2

Switchport access vlan 3

Switchport mode access

!

Interface FastEthernet0/3

!

(omit.)

!

Interface FastEthernet0/23

!

Interface FastEthernet0/24

Switchport mode trunk

!

Interface Vlan1

Ip address 192.168.100.2 255.255.255.0

!

Ip default-gateway 192.168.100.1

!

!

Line con 0

!

Line vty 0 4

Password cisco

Login

Line vty 5 15

Login

!

!

End

Sw2

Building configuration...

Current configuration: 1181 bytes

!

Version 12.1

No service timestamps log datetime msec

No service timestamps debug datetime msec

No service password-encryption

!

Hostname Sw2

!

Enable password cisco

!

!

Spanning-tree mode pvst

!

Interface FastEthernet0/1

Switchport access vlan 2

Switchport mode access

!

Interface FastEthernet0/2

Switchport access vlan 3

Switchport mode access

!

Interface FastEthernet0/3

!

(omit.)

!

Interface FastEthernet0/23

!

Interface FastEthernet0/24

Switchport mode trunk

!

Interface Vlan1

Ip address 192.168.100.3 255.255.255.0

!

Ip default-gateway 192.168.100.1

!

!

Line con 0

!

Line vty 0 4

Password cisco

Login

Line vty 5 15

Login

!

!

End

Telnet RS

Telnet Sw1

Telnet Sw2

Think about the question:

Question1: what is the job of managing VLAN?

For remote management, there is no need for the administrator to run to the machine during the later maintenance. you can log on to any network management switch on any computer in the network.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report