Free Essay

Creating Vlans

In:

Submitted By abdsheikh
Words 642
Pages 3
Creating Vlans, first determine the ports range for each vlan?
If 3 vlans are to be created:
>> A Switch has ports from fa0/1 to fa0/24
>> Assign port ranges to each vlan: 1. Vlan 10 has fa0/2-7 (suppose net-id is: 10.0.0.0) 2. Vlan 20 has fa0/8-12 (suppose net-id is: 20.0.0.0) 3. Vlan 30 has fa0/13-18 (suppose net-id is: 30.0.0.0)
>> Reserve fa0/1 for switch-to-router connection and fa0/24 for switch-to-switch connection. Set trunk mode to both these ports early on: * Go to the switch. * Go in Enable mode and Configuration Terminal. * Write for both reserved ports the following: * Int fa0/1 * Switchport mode trunk * Exit * Int fa0/24 * Switchport mode trunk * Exit
>> Now create vlan on the switch: * In switch’s config terminal * Write vlan <vlan id> in this case we have vlan 10 * Do the following: * Vlan 10 * Name HR * Vlan 20 * Name admin * Vlan 30 * Name office
>> Once the vlan ids are created. It is time to set their interfaces for the port ranges we just mentioned at the top. * Inside switch’s config terminal * Write int range fa0/2-7 (in this case for vlan 10). Do the following * Int range fa0/2-7 * Switchport mode access * Switchport access vlan 10 * Exit * Int range fa0/8-12 * Switchport mode access * Switchport access vlan 20 * Exit * Int range fa0/13-18 * Switchport mode access * Switchport access vlan 30 * Exit
>> Now we have set the interfaces for the ranges of vlans. Simply provide the IP addresses to all the PCs connected with the switch (make sure you check the ports of each switch-to-PC connection).
>> You can only ping within one vlan. Vlan-to-Vlan ping is restricted.
>> Connect another switch with the previous switch. The connection line will be copper-crossover (dotted line). Make sure the connection of both switch is b/w their fa0/24 port.
>> Configure the above steps on the new switch.
>> Make sure you switchport mode trunk on the reserved ports.
>> Now you should be able to ping same vlans across the switches.

Switch-to-Router Configuration:
>> Set-up a router with the initial switch on fa0/1 port of the switch.
>> We have already trunk the reserved port on the switch so we skip this step.
>> Go to Router’s configuration terminal.
>>For each vlan, we need a separate gateway ip but we have only one connection with router-to-switch i.e. fa0/0 from Router.
>> First things first. Go to int fa0/0, and enter no shut command and exit.
>> We can assign each vlan ips on the same router’s port simply by the following sub-interface. Command: int fa0/0.<vlan-id> Encapsulation dot1Q <vlan-id> ip add … no shut exit
>> Do the following to setup the router interfaces: * Int fa0/0.10 * Encapsulation dot1Q 10 * Ip add 10.0.0.1 255.0.0.0 * No shut * Exit * Int fa0/0.20 * Encapsulation dot1Q 20 * Ip add 20.0.0.1 255.0.0.0 * No shut * Exit * Int fa0/0.30 * Encapsulation dot1Q 30 * Ip add 30.0.0.1 255.0.0.0 * No shut * Exit.

>> Configure Telnet on the router with line vty 0 15, password iba, login, exit.
>> Now you should be able to ping PCs with the router.
>> If you add multiple routers, make sure that you should enter all the vlan net ids on the router rip protocol of the router connected with vlans switch.

Similar Documents

Free Essay

Redes

...CURSO: Management Information Systems Investigar el concepto de redes de computadoras y sus diferentes tipos. Una red de computadoras, también llamada red de ordenadores, red de comunicaciones de datos o red informática, es un conjunto de equipos informáticos y software conectados entre sí por medio de dispositivos físicos que envían y reciben impulsos eléctricos, ondas electromagnéticas o cualquier otro medio para el transporte de datos, con la finalidad de compartir información, recursos y ofrecer servicios. Las redes se clasifican en 2 categorías por alcance y por conexión: Por alcance: • Una red de área local (LAN) se refiere a un grupo de dispositivos interconectados que se encuentran bajo el mismo control administrativo. • La red área metropolitana (MAN) es una red formada por un conjunto de redes LAN en las que se conectan equipos • Las redes de área extensa (WAN) constituyen redes que conectan redes LAN en ubicaciones que se encuentran geográficamente separadas. Internet es el ejemplo más común de una WAN • Red de área personal, o PAN (Personal Area Network), es una red de ordenadores usada para la comunicación entre los dispositivos de la computadora cerca de una persona. • WPAN (Wireless Personal Area Network), es una red de computadoras inalámbrica para la comunicación entre distintos dispositivos (tanto computadoras, puntos de acceso a internet, teléfonos celulares, PDA, dispositivos de audio, impresoras) cercanos al punto de acceso. Estas redes normalmente son de...

Words: 2428 - Pages: 10

Free Essay

Medium Network Design

...Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | | Luis Lugo 16 de enero de 2013 | Introducción En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red. Diseño Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera. El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear...

Words: 1290 - Pages: 6

Premium Essay

E Switching Lab Ccna

... | |S2 |VLAN 99 |172.17.99.12 |255.255.255.0 |N/A | |S3 |VLAN 99 |172.17.99.13 |255.255.255.0 |N/A | |PC1 |NIC |172.17.10.1 |255.255.255.0 | | |PC2 |NIC |172.17.20.1 |255.255.255.0 | | |PC3 |NIC |172.17.30.1 |255.255.255.0 | | |PC4 |NIC |172.17.10.2 |255.255.255.0 | | |PC5 |NIC |172.17.20.2 |255.255.255.0 | | |PC6 |NIC |172.17.30.2 |255.255.255.0 | | Port Assignments (Switches 2 and 3) |Ports |Assignment |Network | |Fa0/1 – 0/5 |802.1q Trunks | | |Fa0/11 – 0/17 |VLAN 10 – engineering ...

Words: 1364 - Pages: 6

Premium Essay

Ios Commands

...|Chapter |Task |Commands | |11.02: Command-Line Interface |Privilege EXCE Mode (Enable & Disable)|IOS> enable | |(CLI) | |IOS# | | | | | | | |IOS# disable | | | |IOS> | | |Login Out |IOS# logout | | | |-or- | | | |IOS# exit | |11.03: IOS Basics |Context-Sensitive Help |Router> ? | | | | | | | |Router#...

Words: 2715 - Pages: 11

Premium Essay

Ccna

...CISCO 640-802 Cisco Certified Network Associate 251 Q&A Looking for Real Exam Questions for IT Certification Exams! We guarantee you can pass any IT certification exam at your first attempt with just 10-12 hours study of our guides. Our study guides contain actual exam questions, you will get word to word same on your actual test; accurate answers with detailed explanation verified by experts and all graphics and drag-n-drop exhibits shown just as on the real test. To test the quality of our guides, you can download the one-fourth portion of any guide from http://www.certificationking.com absolutely free. Besides, we also offer complete version of following exams absolutely free. You can start your certification from these free guides and if you are satisfied you can buy the rest ♦ Microsoft: 70-270, 70-305, 70-526, MB2-421 ♦ Cisco 642-901, 642-502, 642-425 ♦ Oracle: 1Z0-001, 1Z0-007, 1Z0-040, 1Z0-200 ♦ Novell: 50-676, 50-565 ♦ Adobe: 9A0-019 ♦ Apple: 9L0-004, 9L0-505, 9L0-606 ♦ 3COM: 3M0-211 ♦ Citrix: 1Y0-223, 1Y0-256 ♦ CIW: 1D0-420 ♦ EMC: E20-001 ♦ Enterasys: 2B0-011 ♦ Exam Express: EE0-011 ♦ Foundry: FN0-100 ♦ Hyperion: 4H0-002 ♦ HP: HP0-045, HP0-052, HP0-055, HP0-090, HP0-216, HP0-417 ♦ Juniper: JN0-120, JN0-330 ♦ Lotus: 190-510 ♦ Network Appliances: NS0-121 ♦ Network General: 1T6-520 ♦ Nortel: 920-430, 920-803 ♦ OMG: UM0-100 ♦ Sybase: 510-015 ♦ SAIR: 3X0-101, 201 ♦ SAS: A00-201 ♦ Tibco: TB0-103 ….. For pricing and placing order, please visit http://certificationking...

Words: 5081 - Pages: 21

Premium Essay

Vtp Questions and Answers

...bits in the incoming frame are received. This does not allow the switch to discard frames that fail the FCS check. B. This is also same as A. But Switch waits 64 bytes to be received before forwarding the first bytes of the outgoing frame. Collisions may occur during first 64 bytes of the frame. Frames in error due to collision will not be forwarded. The FCS still cannot be checked. C,E,F : They are not related to Switch mode transport. QUESTION NO: 107 Which protocol admin overhead in a switch network by allowing the configuring of a new VLAN to be distributed to all the switches in a domain? A. STP B. VTP C. GVRP D. SNMP E. DHCP Answer: B Explanation : Sybex CCNA Study Guide 4th Edition (Page 359) ” The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network. VTP allows an administrator to add, delete, and rename VLANs—information that is then propagated to all other switches in the VTP domain.” QUESTION NO: 109 Which of the...

Words: 1609 - Pages: 7

Free Essay

Netw206

...Assessment on the Network’s Health Grading Rubric Categories Points and Grading Content Points and Grading Content Points and Grading Content Points and Grading Content Content and Terminal Course Objective 20 The network report contains the TCO with extensive detail for the network VLAN configuration. 15 The network report contains the TCO with basic detail regarding the network VLAN configuration. 10 The network report contains the TCO with limited detail regarding the network VLAN configuration. 5 The network report contains the TCO with little to no parts covered on the network VLAN configuration. Creativity 10 The network report has creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 8 The network report has few creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 6 The network report has one creative detail and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. 4 The network report contains no creative details and descriptions using the student’s own determination, experience, or knowledge to meet network requirements. Grammar and Punctuation 5 The network report contains fewer than two grammatical errors. 4 The network report contains fewer than four grammatical errors. 3 The network report contains fewer than six grammatical errors....

Words: 828 - Pages: 4

Free Essay

Vlan

...Assignment: VLAN By creating a Virtual Local Area Network (VLAN) for this company it would best fit their needs. Because the benefits of a VLAN are numerous, this would include decreased bandwidth usage, increased security and separation of location. Where the member user of a VLAN they do not have to be in the same location to be able to share resources. To reduce the network congestion it will be split logically into broadcast domains, this will increase to security. Then the different section of the network will be divided by the group functions which would include Marketing, engineering, operation and the call center each department will have their own section. By splitting the network in sections for each department, it will make the network more secure through compartmentalization. The segments will be logically divided from the rest of the network, access then can be restricted between the segments. By controlling access to indivual segments is going to be the best way of better security, this is going to be accomplished by creating user groups for each of the different segments. By creating a VLAN this will ensure the Marketing department will have access to the resources needed. This will also apply to the other departments and it will provide the security around the data that needs to be protected. By going with a Port assigned based VLAN the different groups are used to facilitate any future reorganization of the physical network layout will made easier...

Words: 532 - Pages: 3

Free Essay

Information Security

...VLAN Configuration This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership modes, VLAN configuration modes, VLAN trunks, and dynamic VLAN assignment from a VLAN Membership Policy Server (VMPS). Note For complete syntax and usage information for the commands used in this chapter, see the online Cisco IOS Interface Command Reference, Release 12.2. * Understanding VLANs * Creating and Modifying VLANs * Displaying VLANs * Configuring VLAN Trunks * Configuring VMPS Understanding VLANs A VLAN is a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment. Any switch module port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to end stations in the VLAN. Each VLAN is considered a logical network, and packets destined for stations that do not belong to the VLAN must be forwarded through a router, as shown in Figure 11-1. Because a VLAN is considered a separate logical network, it contains its own bridge MIB information and can support its own implementation of spanning tree. See Chapter 17, “Configuring STP” in the Cisco CGS 2520 Software Configuration...

Words: 11170 - Pages: 45

Free Essay

Vlan

...VLAN When setting up a VLAN you have to look at the benefit of having a VLAN. The benefits of creating a VLAN are flexibility, performance improvement, and savings on cost. With flexibility you can move users to new locations without reconfiguring the system. The VLAN improves performance by segmenting broadcast traffic into port groupings, this helps to preserve network bandwidth and save processor time. The last benefit is cost savings; VLANs will eliminate the need to use routers to partition LANs into multiple broadcast domains, thus reducing hardware costs. Let’s look at the security aspect of a VLAN; one way to improve security with the VLAN is by isolating groups. High-security users can be grouped into a VLAN, possibly on the same segment, and no users outside that VLAN can communicate with those users. Using a VLAN membership that is port assigned based will be used to help future reorganization of the physical layout of the network. This will help if there is relocation or reallocation since there will be a centralized administration of the network and the users of the network. This choice will provide for simpler administration than MAC address, User ID, or Network address VLAN membership when it comes to the placement and changing the personnel assignment of the groups (Regan, 2004). Now let’s talk about layers. You would think that since VLANs are created on Layer 2 switches that this would be the best layer to utilize, but using the layer 3 switch offers...

Words: 638 - Pages: 3

Free Essay

Wanlan

...* Classless routing in a network. * Examples of classless routing protocols are RIPv2, OSPF, IS-IS, EIGRP and BGPv4. The following protocols support the VLSM (variable length subnet mask) and CIDR (Classless inter-domain routing protocol). Classless routing protocols send the subnet mask as well as the network address in the routing update. If I was working for an established or new company that needed a lot of hosts, I would choose classless because you can set the amount of hosts. Unlike classful routing where the amount of hosts are automatically set. For example if you have an IP address of 192.165.1.2 and you need 1024 hosts then your subnet mask would be 255.255.252.0/22 the slash 22 is the CIDR. This says that I borrowed 22 network bits to come up with 1024 hosts. IP classless routing is used to tell the router: To not drop any packet when the default route is configured. Which Means to use classless addressing that is not bound to a network class A, B or C used by Classful routing. * SWITCHING IN ETHERNET (LAN’S) The most common used network is a local-area network (LAN). Ethernet is the most used and often shared-media of an LAN. Most if not all Apple computers and PCs come with 10/100 Ethernet ports for home use. The ports facilitate a user to create a small home bound network although connect to the Internet via a DSL. A 10/100 port means that the network interface supports both 10BASE-T at 10 megabits per second (Mbps) and 100BASE-T at 100 Mbps. In...

Words: 1410 - Pages: 6

Premium Essay

Information and Technology

...VLAN Plan Marcus D. Lewis It242 06/19/11 Ms. Latrea Shine The benefits of Creating VLAN VLAN’s enable the logical grouping and of end stations that are physically dispersed through a network. When users on a VLAN move to a new physical location but continue to perform the same job function, the end-stations of those users do not need to be reconfigured. Similarly, if users change their job function, they need not physically move: changing the VLAN membership of the end-stations to that of the new team makes the users' end-stations local to the resources of the new team. Since broadcasts frames are targeted and processed by all devices that create smaller domains to reduce overhead and limit resource utilization. Only those workstations in need of receiving specific broadcast or multicast traffic can exist on the domain, preventing other devices from receiving unnecessary traffic. The use of VLANs to create broadcast domains also eliminates the need for routers to handle this function, permitting operation at lower latencies compared to routers under heavy load. VLAN’s extends beyond conventional or single LAN’s to form a group of LAN’s. A VLAN can be created to provide groups of users who will be transmitting data among themselves at high volume, reducing the impact on all other workstations. These user workstations do not have to be physically moved or located near one another, since the workgroup is virtual environment and created within the switching software...

Words: 1150 - Pages: 5

Free Essay

It 242 Week 4 Vlan

...VLAN Student Name IT 242 January 30, 2011 VLAN Virtual Local Area Network (VLAN) is one of the latest network technologies that has been created in the past several years. The technology for VLAN is growing rapidly as well as the costs of the equipment used to implement the secure network that is often considered expensive. Virtual Local Area Networks were born out of the need for a cost effective network that did not compromise the need for high security and performance so the VLAN met all the requirements for the special network (Regan, 2004). The VLAN offers a great deal of functionality for any network as it was created to separated the network into separate broadcast while still allowing each network to still function in the different locations. An example of this process is if a business has different departments such as Operations, Sales, and Human Resources. The VLANs are implements specifically for each department making it an individual network within the business. When implementing a VLAN, it is important to know that to create the VLAN there is a need for layer 2 switch. One common misconception regarding VLANs is that there is a need to install separate software in order to implement the VLAN within the network. The fact is VLANs need special hardware that is built into the switch, which implements a separate network of the main network. Depending on what the network’s security policies and infrastructure, VLANs assignment can be implemented using one...

Words: 688 - Pages: 3

Premium Essay

Nt1310 Unit 1 Vlan Research Paper

...following theory: VLAN is a logical network, provides logical segmentation of network. Virtual LANs separate layer2 switch into multiple-broadcast domains. Each VLAN is its own individual broadcast domain, i.e. IP subnet. Here groups of ports or individual ports can be assigned to a specific VLAN and Only the ports which are belonging to the same VLAN can freely communicate; ports assigned to separate VLANs require a router to communicate, Broadcasts from one VLAN will never be sent ports belonging to another VLAN. A layer two switch that supports VLAN is not always necessarily a layer three switch, in addition to supporting VLANs, must also be capable of routing, and caching IP traffic flows. Layer 3 switches allows IP packets to be switched as opposed to routed, which reduces latency. VLANS work by handling tags to the network packets creating the functionality and aspect of network traffic, which is physically on one and only one network but acts as...

Words: 783 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 1

...While routers would normally be amongst the first IP elements to be advanced to upkeep both protocols, RFC 4554 is an informational RFC relating an innovative approach using VLANs to upkeep an overlay configuration deprived of necessitating instant router advancements. This method depend on VLAN tagging to permit Layer 2 switches to broadcast or trunk the Ethernet frames encompassing IPv6 payload to one or more IPv6 enabled routers. By advancement of one router to provision IPv6, the switch ports to which its interfaces are linked can be formed as the IPv6 VLAN. Further IPv6 or dual-stacked devices could then be constituted as members of the VLAN, and multiple VLANs could be constituted likewise. An example of this deployment is demonstrated in Figure 3....

Words: 556 - Pages: 3