Beruflich Dokumente
Kultur Dokumente
Intruduction
Intruduction
Intruduction
Intruduction
Intruduction
Objectives
Compare the types of switches used in an
enterprise network. Explain how Spanning Tree Protocol prevents switching loops. Describe and configure VLANs on a Cisco switch. Describe and configure trunking and InterVLAN routing. Maintain VLANs in an enterprise networks.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Multilayer Switching
Multilayer Switching
Layer 3 switching, or multilayer switching, combines hardware-based switching and hardware-based routing in the same device. A multilayer switch combines the features of a Layer 2 switch and a Layer 3 router. Layer 3 switching occurs in special application-specific integrated circuit (ASIC) hardware. Multilayer switches often save, or cache, source and destination routing information from the first packet of a conversation. Subsequent packets do not have to execute a routing lookup, because they find the routing information in memory.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Multilayer Switching
Types of Switching
Types of Switching
Types of Switching
Types of Switching
There are two variants of cut-through switching: Fast-forward switching: Fast-forward switching offers the lowest level of latency. Fast-forward switching immediately forwards a packet after reading the destination address. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors. This occurs infrequently, and the destination network adapter discards the faulty packet upon receipt. In fast-forward mode, latency is measured from the first bit received to the first bit transmitted. Fast-forward switching is the typical cut-through method of switching. Fragment-free switching: In fragment-free switching, the switch stores the first 64 bytes of the frame before forwarding. Fragment-free switching can be viewed as a compromise between store-and-forward switching and cutthrough switching. The reason fragment-free switching stores only the first 64 bytes of the frame is that most network errors and collisions occur during the first 64 bytes. Fragment-free switching tries to enhance cut-through switching by performing a small error check on the first 64 bytes of the frame to ensure that a collision has not occurred before forwarding the frame. Fragment-free switching is a compromise between the high latency and high integrity of store-and-forward switching, and the low latency and reduced integrity of cutHc through switching. vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Types of Switching
Switch Security
Switch Security
Spanning Tree Protocol (STP) provides a mechanism for disabling redundant links in a switched network. STP provides the redundancy required for reliability without creating switching loops. STP is an open standard protocol, used in a switched environment to create a loop-free logical topology. Switches detecting a potential loop block some of the connecting ports, while leaving other ports active to forward frames.
Without STP
With STP
To prevent switching loops, STP: Forces certain interfaces into a standby or blocked state Leaves other interfaces in a forwarding state Reconfigures the network by activating the appropriate standby path, if the forwarding path becomes unavailable. In STP terminology, the term bridge is frequently used to refer to a switch. The Root Bridge is the primary switch or focal point in the STP topology. The root bridge communicates with the other switches using Bridge Protocol Data Units (BPDUs).
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Root Bridges
STP uses this focal point, called a root bridge or root switch, to determine which ports to block and which ports to put into forwarding state. The root bridge sends out BPDUs containing network topology information to all other switches There is only one root bridge on each network. The root bridge is based on the lowest BID value.
Root Bridges
STP designates three types of ports: root ports, designated ports, and blocked ports. Root Port: The port that provides the least cost path back to the root bridge becomes the root port. Switches calculate the least cost path using the bandwidth cost of each link required to reach the root bridge. Designated Port: A designated port is a port that forwards traffic toward the root bridge but does not connect to the least cost path. Blocked Port: A blocked port is a port that does not forward traffic.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Root Bridges
Root Bridges
To set priority: S3(config)#bridge priority 4096 To restore priority to default: S3(config)#no bridge priority
PortFast STP PortFast causes an access port to enter the forwarding state immediately, bypassing the listening and learning states.
Uplink Fast: STP UplinkFast accelerates the choice of a new root port when a link or switch fails or when STP reconfigures itself. The root port transitions to the forwarding state immediately without going through the listening and learning states, as it would do with normal STP procedures. BackboneFast BackboneFast provides fast convergence after a spanning tree topology change occurs. It quickly restores backbone connectivity. BackboneFast is used at the Distribution and Core Layers, where multiple switches connect.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
There are several useful commands used to verify spanning tree operation. show spanning-tree - Displays root ID, bridge ID, and port states show spanning-tree summary - Displays a summary of port states show spanning-tree root - Displays the status and configuration of the root bridge show spanning-tree detail - Displays detailed port information show spanning-tree interface - Displays STP interface status and configuration show spanning-tree blockedports - Displays blocked ports
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Configuring VLANs
Virtual LAN
A VLAN is a logical broadcast domain that can span multiple physical LAN segments.
Virtual LAN
Virtual LAN
A VLAN has two major functions: A VLAN contains broadcasts. A VLAN groups devices. Devices located on one VLAN are not visible to devices located on another VLAN. Traffic requires a Layer 3 device to move between VLANs.
Static VLAN membership requires an administrator to manually assign each switch port to a specific VLAN.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Virtual LAN
Dynamic VLAN membership requires a VLAN management policy server (VMPS). The VMPS contains a database that maps MAC addresses to VLAN assignments. When a device plugs into a switch port, the VMPS searches the database for a match of the MAC address and temporarily assigns that port to the appropriate VLAN.
Virtual LAN
The following commands are used to verify and maintain VLANs: show vlan Displays a detailed list of all of the VLAN numbers and names currently active on the switch, along with the ports associated with each one Displays STP statistics if configured on a per VLAN basis show vlan brief Displays a summarized list showing only the active VLANs and the ports associated with each one show vlan id id_number: Displays information pertaining to a specific VLAN, based on ID number show vlan name vlan_name www.bkacad.com Hc vin cng ngh thng tin Bach Khoa - Website:
To delete a VLAN: Switch(config)#no vlan vlan_number To disassociate a port from a specific VLAN: Switch(config)#interface fa#/# Switch(config-if)#no switchport access vlan vlan_number
Identifying VLANs
As a frame enters that port, the switch inserts the VLAN ID (VID) into the Ethernet frame. The addition of the VLAN ID number into the Ethernet frame is called frame tagging. The most commonly used frame tagging standard is IEEE 802.1Q.
Identifying VLANs
Identifying VLANs
An access port belongs to only one VLAN. A trunk port is a point-to-point link between the switch and another networking device. Trunks carry the traffic of multiple VLANs over a single link and allow VLANs to reach across an entire network.
Identifying VLANs
No Trunking
Trunking
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Identifying VLANs
To configure a switch port as a trunk port, use the following commands: Switch(config)#interface fa(controler # / port #) Switch(config-if)#switchport mode trunk Switch(config-if)#switchport trunk encapsulation {dot1q | isl | negotiate}
The negotiate parameter is the default mode on many Cisco switches. This parameter automatically detects the encapsulation type of the neighbor switch.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Identifying VLANs
Based on the attached device, the link configures itself as either a trunk port or an access port. Switch(config-if)#switchport mode dynamic {desirable | auto} In desirable mode, the port becomes a trunk port if the other end is set to either trunk, desirable, or auto. In auto mode, the port becomes a trunk port if the other end is set to either trunk or desirable. To return a trunk port to an access port, issue either of the following commands: Switch(config)#interface fa(controler # / port #) Switch(config-if)#no switchport mode trunk Or Switch(config-if)#switchportWebsite: www.bkacad.com mode access Hc vin cng ngh thng tin Bach Khoa -
Trunk Ports
Switch ports can be configured for two different roles Access Port An access port belongs to only one VLAN. Typically, single devices such as PCs or servers connect to this type of port. If a hub connects multiple PCs to the single access port, each device connected to the hub is a member of the same VLAN. Trunk Port A trunk port is a point-to-point link between the switch and another networking device. Trunks carry the traffic of multiple VLANs over a single link and allow VLANs to reach across an entire Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com network.
Trunk Ports
Trunk Ports
No VLAN Tagging
VLAN Tagging is used when a link needs to carry traffic for more than one VLAN.
Trunk Ports
There are two major methods of frame tagging, Cisco proprietary Inter-Switch Link (ISL) and IEEE 802.1Q. ISL used to be the most common, but is now being replaced by 802.1Q frame tagging. Cisco recommends using 802.1Q. VLAN Tagging and Trunking will be discussed in the next chapter.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Trunk Ports
Trunk Ports
Inter-VLAN Routing
A Layer 3 device provides connectivity between different VLANs. One method of accomplishing the inter-VLAN routing requires a separate interface connection to the Layer 3 device for each VLAN.
Inter-VLAN Routing
Switch Configure the switch interface as an 802.1Q trunk link. Router Select a router interface with a minimum of a 100Mbps FastEthernet Configure subinterfaces that support 802.1Q encapsulation. Configure one subinterface for each VLAN.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Inter-VLAN Routing
If the destination VLAN is on the same switch as the source VLAN, the router forwards the traffic back down to the source switch using the subinterface parameters of the destination VLAN ID. This type of configuration is often referred to as a routeron-a-stick.
Inter-VLAN Routing
To configure inter-VLAN routing, use the following steps: 1. Configure a trunk port on the switch. Switch(config)#interface fa0/2 Switch(config-if)#switchport mode trunk 2. On the router, configure a FastEthernet interface with no IP address or subnet mask. Router(config)#interface fa0/1 Router(config-if)#no ip address Router(config-if)#no shutdown 3. On the router, configure one subinterface with an IP address and subnet mask for each VLAN. Each subinterface has an 802.1Q encapsulation.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
Inter-VLAN Routing
Router(config)#interface fa0/0.10 Router(config-subif)#encapsulation dot1q 10 Router(config-subif)#ip address 192.168.10.1 255.255.255.0 4. Use the following commands to verify the interVLAN routing configuration and functionality. Switch#show trunk Router#show ip interfaces Router#show ip interfaces brief Router#show ip route
VTP Domain-Consists of one or more interconnected switches. All switches in a domain share VLAN configuration details using VTP advertisements. A router or Layer 3 switch defines the boundary of each domain.
Configuring VTP
Step 1: Configure VTP off-line (version 1) Step 2: Verify the VTP configuration. Step 3: Reboot the switch.
Some best practices for configuring VLANs in an enterprise network are: Organizing server placement Disabling unused ports Configuring the management VLAN as a number other than 1 Using VLAN Trunking Protocol Configuring VTP Domains Reboot any new switch entering an established network
Summary
Switch forward traffic. Spanning Tree Protocol STP). Rapid STP. VLAN. Inter-VLAN. VLAN Trunking Protocol (VTP).