Configuring 802.1Q Trunking Between a Catalyst 3550/3560/3750 and Catalyst Switches That Run Cisco IOS Software
|
|
|
- Chrystal Rice
- 9 years ago
- Views:
Transcription
1 Configuring 802.1Q Trunking Between a Catalyst 3550/3560/3750 and Catalyst Switches That Run Cisco IOS Software Document ID: Contents Introduction Prerequisites Requirements Components Used Background Theory Configure Network Diagram Configurations Verify Sample show Command Output Troubleshoot Related Information Introduction This document provides a sample configuration of IEEE 802.1Q (dot1q) trunking between a Cisco Catalyst 3550/3560/3750 switch that runs Cisco IOS Software and a Catalyst 6500/6000 series switch or Catalyst 4500/4000 series switch that runs Cisco IOS Software. Trunking is a way to carry traffic from several VLANs over a point to point link between the two devices. Two ways in which you can implement Ethernet trunking are: Inter Switch Link Protocol (ISL)A Cisco proprietary protocol 802.1QAn IEEE standard Prerequisites Requirements Ensure that you meet these requirements before you attempt this configuration: Knowledge of IEEE 802.1Q trunking Knowledge of the configuration of Catalyst 3560 and Catalyst 6500/6000 series switches with use of command line interface (CLI) Components Used The information in this document is based on these software and hardware versions: Catalyst 3560 switch that runs Cisco IOS Software Release 12.2(25)SEA Catalyst 6509 switch that runs Cisco IOS Software Release 12.1(26)E1
2 The Catalyst 3560 configuration in this document is also applicable to Catalyst 3550/3750 switches that run Cisco IOS Software. The Catalyst 6500/6000 configuration in this document is also applicable to Catalyst 4500/4000 series switches that run Cisco IOS Software. Note: Refer to this document to learn about the trunking methods that are supported by various Catalyst switches: System Requirements to Implement Trunking on Catalyst switches The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Note: This document includes only the configuration files from the switches and the output from the related sample show commands. For details on how to configure an 802.1Q trunk between Catalyst switches, refer to these documents: Configuring VLAN Trunks section of Configuring VLANs Catalyst 3560 series switches Understanding VLAN Trunks section of Configuring LAN Ports for Layer 2 SwitchingCatalyst 6500 series switches that run Cisco IOS Software Understanding VLAN Trunks section of Configuring Layer 2 Ethernet InterfacesCatalyst 4500 series switches that run Cisco IOS Software Background Theory IEEE 802.1Q uses an internal tagging mechanism. The trunking device inserts a 4 byte tag in order to identify the VLAN to which a frame belongs and then recomputes the frame check sequence (FCS). For more information, refer to these documents: InterSwitch Link and IEEE 802.1Q Frame Format Basic Characteristics of 802.1Q Trunking section of Trunking Between Catalyst 4500/4000, 5500/5000, and 6500/6000 Series Switches Using 802.1Q Encapsulation with Cisco CatOS System Software Note: Here are some important notes to remember during this configuration: Any Ethernet interface on a Catalyst 3550/3560/3750 series switch can support 802.1Q and ISL encapsulation. The Ethernet interface on a Catalyst 3550 switch is a Layer 2 (L2) port, by default. Any Ethernet port on a Catalyst 6500/6000 series switch can support 802.1Q and ISL encapsulation. By default, the Catalyst 4500 series switch that runs Cisco IOS Software supports both ISL and 802.1Q trunking modes. The support is on all interfaces except blocking Gigabit ports on the WS X4418 GB and WS X4412 2GB T modules. These ports do not support ISL and only support 802.1Q trunking. Ports 3 through 18 are blocking Gigabit ports on the WS X4418 GB module. Ports 1 through 12 are blocking Gigabit ports on the WS X4412 2GB T module. Note: A port is a blocking port if its connection to the backplane is oversubscribed. The main difference between the Catalyst 6500/6000 and the Catalyst 4500 platforms is the default interface configuration. The Catalyst 6500/6000 switch that runs Cisco IOS Software has interfaces in shutdown mode that are Layer 3 (L3) routed ports by default. The Catalyst 4500/4000 switch that runs Cisco IOS Software has all the interfaces enabled. The interfaces are L2 switch ports by default. When 802.1Q encapsulation is used on a trunk interface on the Catalyst 3750 Switches, runts can be seen on show interface output because valid 802.1Q encapsulated packets which are bytes including the q tag are counted by the Catalyst 3750 Switch as undersized frames, even though these packets are forwarded correctly. Refer to Cisco bug ID CSCec14238 (registered customers only)
3 for more details. Configure In this section, you are presented with the information to configure the features described in this document. Note: Use the Command Lookup Tool commands used in this section. (registered customers only) to obtain more information on the Network Diagram This document uses this network setup: Note: The Gigabit Ethernet interface on the Catalyst 3560 is a 10/100/1000 Mbps negotiated Ethernet interface. Therefore, the Gigabit port on the Catalyst 3560 is connected to a Fast Ethernet (100 Mbps) port on the Catalyst 6500 in this network diagram. Configurations This document uses these configurations: Catalyst 3560 Switch Catalyst 6500 Switch Catalyst 3560 Switch Note: This example creates VLAN 1 and VLAN 2 and sets the VLAN Trunk Protocol (VTP) mode to transparent. Use your network as a basis and set the VTP mode accordingly. For more details, refer to Configuring VLANs. version 12.2 no service pad service timestamps debug uptime service timestamps log uptime no service password encryption
4 hostname 3560 This is the privileged mode password for the example. enable password mysecret ip subnet zero vtp mode transparent VLAN 2 is created. This is visible only when you set VTP mode to transparent. vlan 2 The Gigabit Ethernet interface on the Catalyst 3560 is a 10/100/1000 Mbps negotiated Ethernet interface. Therefore, the Gigabit port on the Catalyst 3560 is connected to a Fast Ethernet port on the Catalyst Configure the trunk on the Gigabit Ethernet 0/1 interface. interface GigabitEthernet0/1 Configure trunk encapsulation as dot1q. For details on trunking, refer to Configuring VLANs. switchport trunk encapsulation dot1q Enable trunking on the interface. switchport mode trunk snmp trap link status Interfaces Gigabit Ethernet 0/2 through 0/5 are placed in VLAN 1. In order to configure the interface as an L2 port, refer to the Configuring Ethernet Interfaces section of Configuring Interface Characteristics. All L2 ports are placed in VLAN 1, by default. interface GigabitEthernet0/2 snmp trap link status interface GigabitEthernet0/3 snmp trap link status interface GigabitEthernet0/4 snmp trap link status interface GigabitEthernet0/5
5 snmp trap link status Interfaces Gigabit Ethernet 0/6 through 0/12 are placed in VLAN 2. interface GigabitEthernet0/6 switchport access vlan 2 snmp trap link status Output suppressed. interface GigabitEthernet0/12 switchport access vlan 2 snmp trap link status interface Vlan1 This is the IP address for management. ip address ip classless ip http server line con 0 transport input none line vty 0 4 This is the privileged mode password for the example. password mysecret login line vty 5 15 login end Catalyst 6500 Switch Note: This example creates VLAN 1 and VLAN 2 and sets the VTP mode to transparent. Use your network as a basis and set the VTP mode accordingly. For more details, refer to Configuring VLANs. Current configuration : 4812 bytes version 12.1 service timestamps debug uptime service timestamps log uptime no service password encryption hostname Cat6500 vtp mode transparent ip subnet zero
6 mls flow ip destination mls flow ipx destination This is the privileged mode password for the example. enable password mysecret redundancy mode rpr plus main cpu auto sync running config auto sync standard This enables VLAN 2. vlan 2 interface GigabitEthernet1/1 shutdown interface GigabitEthernet1/2 shutdown The Gigabit Ethernet interface on the Catalyst 3560 is a 10/100/1000 Mbps negotiated Ethernet interface. Therefore, the Gigabit port on the Catalyst 3560 is connected to a Fast Ethernet port on the Catalyst interface FastEthernet3/1 You must issue the switchport command once, without any keywords, in order to configure the interface as an L2 port for the Catalyst 6500 series switch that runs Cisco IOS Software. On a Catalyst 4500 series switch that runs Cisco IOS Software, all ports are L2 ports by default. Therefore, if you do not change the default configuration, you do not need to issue the switchport command. For more details, refer to Configuring Layer 2 Ethernet Interfaces for the Catalyst 4500 series switch that runs Cisco IOS Software. switchport Configure trunk encapsulation as dot1q. For more details on trunking, refer to Configuring LAN Ports for Layer 2 Switching for the Catalyst 6500 series switch that runs Cisco IOS Software, or Configuring Layer 2 Ethernet Interfaces for the Catalyst 4500/4000 series switch that runs Cisco IOS Software. switchport trunk encapsulation dot1q Enable trunking on the interface. switchport mode trunk
7 Configure interfaces Fast Ethernet 3/2 through 3/24 to be in access mode. By default, all access ports are configured in VLAN 1. For more details, refer to Configuring LAN Ports for Layer 2 Switching for the Catalyst 6500 series switch that runs Cisco IOS Software, or Configuring Layer 2 Ethernet Interfaces for the Catalyst 4500/4000 series switch that runs Cisco IOS Software. interface FastEthernet3/2 switchport Output suppressed. interface FastEthernet3/24 switchport Fast Ethernet 3/25 through 3/48 are placed in VLAN 2. For more details, refer to Configuring LAN Ports for Layer 2 Switching for the Catalyst 6500 series switch that runs Cisco IOS Software, or Configuring Layer 2 Ethernet Interfaces for the Catalyst 4500/4000 series switch that runs Cisco IOS Software. interface FastEthernet3/25 switchport switchport access vlan 2 Output suppressed. interface FastEthernet3/48 switchport switchport access vlan 2 interface Vlan1 This is the IP address for management. ip address ip classless no ip http server ip classless ip http server line con 0 exec timeout 0 0 transport input none
8 line vty 0 4 This is the Telnet password for the example. password mysecret login end Note: If you assign an interface to a VLAN that does not exist, the interface shuts down until you create the VLAN in the VLAN database. For details, refer to the Creating or Modifying an Ethernet VLAN section of Configuring VLANs. Verify Use this section to confirm that your configuration works properly. The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT to view an analysis of show command output. On Catalyst 3550/3560/3750/6500/4500 switches, use these commands: show interfaces interface_type module/port trunk show interfaces interface_type module/port switchport show vlan show vtp status Sample show Command Output Catalyst 3560 Switch show interfaces interface_type module/port trunk This command displays the trunk configuration of the interface along with the VLAN numbers for which traffic is able to be carried over the trunk. 3560# show interface gigabitethernet 0/1 trunk Port Mode Encapsulation Status Native vlan Gi0/1 on 802.1q trunking 1 Port Vlans allowed on trunk Gi0/ Port Gi0/1 Vlans allowed and active in management domain 1 2 Port Vlans in spanning tree forwarding state and not pruned Gi0/1 1 2 show interfaces interface_type module/port switchport This command displays the switch port configuration of the interface. In the display, check the Operational Mode and the Operational Trunking Encapsulation fields. 3560# show interface gigabitethernet 0/1 switchport Name: Gi0/1 Switchport: Enabled Administrative Mode: trunk
9 Operational Mode: trunk Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Voice VLAN: none Administrative private vlan host association: none Administrative private vlan mapping: none Administrative private vlan trunk native VLAN: none Administrative private vlan trunk encapsulation: dot1q Administrative private vlan trunk normal VLANs: none Administrative private vlan trunk private VLANs: none Operational private vlan: none Trunking VLANs Enabled: ALL Pruning VLANs Enabled: Capture Mode Disabled Capture VLANs Allowed: ALL Protected: false Unknown unicast blocked: disabled Unknown multicast blocked: disabled Appliance trust : none show vlan This command gives information about the VLANs and the ports that belong to a particular VLAN. 3560# show vlan VLAN Name Status Ports 1 default active Gi0/2, Gi0/3, Gi0/4, Gi0/5 2 VLAN0002 active Gi0/6, Gi0/7, Gi0/8, Gi0/9 Gi0/10, Gi0/11, Gi0/ fddi default act/unsup 1003 token ring default act/unsup 1004 fddinet default act/unsup 1005 trnet default act/unsup Output suppressed. Note: The ports that are displayed in the output are only access ports. But the ports that are configured to be trunk and that are in the 'notconnected' status also show up in the show vlan output. show vtp status This command displays general information about the VTP management domain, status, and counters. 3560# show vtp status VTP Version : 2 Configuration Revision : 0 Maximum VLANs supported locally : 1005 Number of existing VLANs : 6 VTP Operating Mode : Transparent VTP Domain Name : VTP Pruning Mode : Disabled VTP V2 Mode : Disabled VTP Traps Generation : Disabled MD5 digest : 0x4A 0x55 0x17 0x84 0xDB 0x99 0x3F 0xD1 Configuration last modified by at :00: # ping Type escape sequence to abort. Sending 5, 100 byte ICMP Echos to , timeout is 2 seconds: Success rate is 100 percent (5/5), round trip min/avg/max = 1/1/4 ms
10 3560# Catalyst 6500 Switch show interfaces interface_type module/port trunk This command displays the trunk configuration of the interface along with the VLAN numbers for which traffic is able to be carried over the trunk. Cat6500# show interfaces fastethernet 3/1 trunk Port Mode Encapsulation Status Native vlan Fa3/1 on 802.1q trunking 1 Port Vlans allowed on trunk Fa3/ Port Fa3/1 Vlans allowed and active in management domain 1 2 Port Vlans in spanning tree forwarding state and not pruned Fa3/1 1 2 show interfaces interface_type module/port switchport This command displays the switch port configuration of the interface. In the display, check the Operational Mode and the Operational Trunking Encapsulation fields. cat6500# show interface fastethernet 3/1 switchport Name: Fa3/1 Switchport: Enabled Administrative Mode: trunk Operational Mode: trunk Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Voice VLAN: none Administrative private vlan host association: none Administrative private vlan mapping: none Administrative private vlan trunk native VLAN: none Administrative private vlan trunk encapsulation: dot1q Administrative private vlan trunk normal VLANs: none Administrative private vlan trunk private VLANs: none Operational private vlan: none Trunking VLANs Enabled: ALL Pruning VLANs Enabled: Capture Mode Disabled Capture VLANs Allowed: ALL show vlan This command gives information about the VLANs and the ports that belong to a particular VLAN. Cat6500# show vlan VLAN Name Status Ports 1 default active Fa3/2, Fa3/3, Fa3/4, Fa3/5 Fa3/6, Fa3/7, Fa3/8, Fa3/9 Fa3/10, Fa3/11, Fa3/12, Fa3/13 Fa3/14, Fa3/15, Fa3/16, Fa3/17 Fa3/18, Fa3/19, Fa3/20, Fa3/21 Fa3/22, Fa3/23, Fa3/24 2 VLAN0002 active Fa3/25, Fa3/26, Fa3/27, Fa3/28 Fa3/29, Fa3/30, Fa3/31, Fa3/32
11 Fa3/33, Fa3/34, Fa3/35, Fa3/36 Fa3/37, Fa3/38, Fa3/39, Fa3/40 Fa3/41, Fa3/42, Fa3/43, Fa3/44 Fa3/45, Fa3/46, Fa3/47, Fa3/ fddi default act/unsup 1003 token ring default act/unsup 1004 fddinet default act/unsup 1005 trnet default act/unsup Output suppressed. Note: The ports that display are only those ports that you have configured as Layer 2 nontrunk (access) ports. The ports that are configured to be trunk and that are in the 'notconnected' status also show up in the show vlan output. For details, refer to the Configuring LAN Interfaces for Layer 2 Switching section of Configuring LAN Ports for Layer 2 Switching. show vtp status This command displays general information about the VTP management domain, status, and counters. ping Cat6500# show vtp status VTP Version : 2 Configuration Revision : 0 Maximum VLANs supported locally : 1005 Number of existing VLANs : 6 VTP Operating Mode : Transparent VTP Domain Name : VTP Pruning Mode : Disabled VTP V2 Mode : Disabled VTP Traps Generation : Disabled MD5 digest : 0xBF 0x86 0x94 0x45 0xFC 0xDF 0xB5 0x70 Configuration last modified by at :00:00 Troubleshoot Cat6500# ping Type escape sequence to abort. Sending 5, 100 byte ICMP Echos to , timeout is 2 seconds: Success rate is 100 percent (5/5), round trip min/avg/max = 1/1/4 ms There is currently no specific troubleshooting information available for this configuration. For common problems that relate to trunking and 802.1Q configuration, refer to the Common Errors section of the document Trunking Between Catalyst 4500/4000, 5500/5000, and 6500/6000 Series Switches Using 802.1Q Encapsulation with Cisco CatOS System Software. Related Information Configuring VLAN Trunks on Fast Ethernet and Gigabit Ethernet Ports Configuring LAN Ports for Layer 2 Switching Configuring VTP Using PortFast and Other Commands to Fix Workstation Startup Connectivity Delays Catalyst 3560 Series Switches Configuration Guides Catalyst 4500 Series Switches Configuration Guides Catalyst 6500 Series Switches Configuration Guides LAN Product Support Pages
12 LAN Switching Support Page Technical Support & Documentation Cisco Systems Contacts & Feedback Help Site Map Cisco Systems, Inc. All rights reserved. Terms & Conditions Privacy Statement Cookie Policy Trademarks of Cisco Systems, Inc. Updated: Dec 12, 2006 Document ID: 10599
Configuring InterVLAN Routing and ISL/802.1Q Trunking on Catalyst 2900XL/3500XL/2940/2950/2970 Series Switches Using an External Router
Configuring InterVLAN Routing and ISL/802.1Q Trunking on Catalyst 2900XL/3500XL/2940/2950/2970 Series Switches Using an External Router Document ID: 14976 Introduction Before You Begin Conventions Prerequisites
Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS
Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS Document ID: 23408 Contents Introduction Prerequisites Requirements Components
Lab 3.5.1: Basic VLAN Configuration (Instructor Version)
(Instructor Version) Topology Diagram Addressing Table Device (Hostname) Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 172.17.99.11 255.255.255.0 N/A S2 VLAN 99 172.17.99.12 255.255.255.0
How To Configure InterVLAN Routing on Layer 3 Switches
How To Configure InterVLAN Routing on Layer 3 Switches Document ID: 41860 Contents Introduction Prerequisites Requirements Components Used Conventions Configure InterVLAN Routing Task Step by Step Instructions
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
Managing vlan.dat in Cisco Catalyst Switches Running Cisco IOS Software
Managing vlan.dat in Cisco Catalyst Switches Running Cisco IOS Software Document ID: 109304 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Background Information
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version
Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version Topology Objective Background Configure EtherChannel. Four switches have just been installed. The distribution layer switches are Catalyst
Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example
Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Lab 3.10.2 Use Network Inspector to Observe STP Behavior
Lab 3.10.2 Use Network Inspector to Observe STP Behavior Objective The purpose of this lab is to observe STP behavior with the Network Inspector switch trace feature. Scenario A new switched network has
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Configuring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000
Configuring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000 Document ID: 19642 Contents Introduction Before You Begin Conventions Prerequisites Components Used Background Theory Difference
Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access
Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2
Configuring DNS on Cisco Routers
Configuring DNS on Cisco Routers Document ID: 24182 Contents Introduction Prerequisites Requirements Components Used Conventions Setting Up a Router to Use DNS Lookups Troubleshooting You Can Ping a Web
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Device Interface IP Address Subnet Mask Default Gateway
Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support Topology Objectives Background Configure auto QoS to support IP phones. Configure CoS override for data frames. Configure the distribution
Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)
Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched
Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
Lab 7-1 Configuring Switches for IP Telephony Support
Lab 7-1 Configuring Switches for IP Telephony Support Learning Objectives Configure auto QoS to support IP phones Configure CoS override for data frames Configure the distribution layer to trust access
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Configuring Port Security
CHAPTER 62 This chapter describes how to configure the port security feature. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL:
- Virtual LANs (VLANs) and VTP -
1 - Virtual LANs (VLANs) and VTP - Collision vs. Broadcast Domains A collision domain is simply defined as any physical segment where a collision can occur. Hubs can only operate at half-duplex, and thus
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 113336 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
Lab - Using IOS CLI with Switch MAC Address Tables
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 70031 Contents Introduction Prerequisites Requirements Components Used Conventions Related Products
Basic Wireless Configuration
Basic Wireless Configuration Topology Diagram Learning Objectives Configure options in the Linksys Setup tab. Configure options in the Linksys Wireless tab. Configure options in the Linksys Administration
Sample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
Configuring Port Security
32 CHAPTER This chapter describes how to configure port security on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples. Note For complete syntax and usage information
Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram
Felix Rohrer PT Activity 7.5.3: Troubleshooting Wireless WRT300N Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Configuring IPS High Bandwidth Using EtherChannel Load Balancing
Configuring IPS High Bandwidth Using EtherChannel Load Balancing This guide helps you to understand and deploy the high bandwidth features available with IPS v5.1 when used in conjunction with the EtherChannel
TotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
CT5760 Controller and Catalyst 3850 Switch Configuration Example
CT5760 Controller and Catalyst 3850 Switch Configuration Example Document ID: 116342 Contributed by Antoine KMEID and Serge Yasmine, Cisco TAC Engineers. Aug 13, 2013 Contents Introduction Prerequisites
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
Configuring Link Aggregation
10 CHAPTER This chapter describes how to configure link aggregation for the ML-Series cards, both EtherChannel and packet-over-sonet/sdh (POS) channel. For additional information about the Cisco IOS commands
Configuring Traffic Storm Control
39 CHAPTER This chapter describes how to configure the traffic storm control feature on the Catalyst 6500 series switches. For complete syntax and usage information for the commands used in this chapter,
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series
BLADE PVST+ Spanning Tree and Interoperability with Cisco
BLADE PVST+ Spanning Tree and Interoperability with Cisco Technical Brief Industry-standard PVST+ Spanning Tree Protocol with Cisco interoperability Introduction...1 Spanning Tree Protocol (IEEE 802.1d)...1
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram
VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R
VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R Executive Summary The virtual switches in ESX Server 3 support VLAN (IEEE 802.1Q) trunking. Using VLANs, you can enhance security and leverage
Lab 8: Confi guring QoS
Lab 8: Objective Implement QoS, mark traffi c, and display and interpret QoS output. Lab Topology For this lab, your network design will include two pods of devices. You will be responsible for confi guring
Fundamentals of Switching
1 CCNA 640-801 Exam Notes - Fundamentals of Switching CCNA 640-801 Exam Notes Fundamentals of Switching 1. LAN Segmentation 1.1 In a collision domain, a frame sent by a device can cause collision with
Sample Configuration Using the ip nat outside source list C
Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Lab 5.5 Configuring Logging
Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In
Troubleshooting an Enterprise Network
Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco
How to Create VLANs Within a Virtual Switch in VMware ESXi
How to Create VLANs Within a Virtual Switch in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support
Configuring DHCP Snooping and IP Source Guard
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and IP Source Guard on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration
Configuring the Switch with the CLI-Based Setup Program
APPENDIX D Configuring the Switch with the CLI-Based Setup Program This appendix provides a command-line interface (CLI)-based setup procedure for a standalone switch. For product overview information,
This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and
This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNP: Implementing
Switching in an Enterprise Network
Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Configuring EtherChannels
CHAPTER 12 This chapter describes how to configure EtherChannels on the Cisco 7600 series router Layer 2 or Layer 3 LAN ports. For complete syntax and usage information for the commands used in this chapter,
How To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4
Cisco - Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switch...Page 1 of 10 Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switches Document ID: 12023 Contents
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
Sampled NetFlow. Feature Overview. Benefits
Sampled NetFlow This feature module describes the Sampled NetFlow feature. It includes information on the benefits of the new feature, supported platforms, supported standards, and the commands necessary
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Firewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)
CNAP @ VCC 1 of 8 LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes) Objectives: Understand the function of a T1 Service Unit (TSU) in network telecommunications Connect routers
Configuring the Switch for the Firewall Services Module
CHAPTER 2 Configuring the Switch for the Firewall Services Module This chapter describes how to configure the Catalyst 6500 series switch or the Cisco 7600 series router for use with the FWSM. Before completing
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones
6/8/2011. Document ID: 12023. Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Introduction
Page 1 of 9 Products & Services Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switches Document ID: 12023 Contents Introduction Prerequisites Requirements Components Used Conventions
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500 Objective Use Cisco Discovery Protocol (CDP) commands to get information about neighboring network devices. Background/Preparation CDP
Document ID: 45741. Introduction
Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4
Network Detector Setup and Configuration
339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net MODE SYST RPS MASTR STAT SPEDUPLX STACK 1 2 3 4 5 6 7 8 91 0 11 12 1X 2X 11X 12X 13 14 15 16 1718 19 20 2122 23 24 13X
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Configuring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
ProCurve / Cisco Interoperability Guide
ProCurve Networking ProCurve / Cisco Interoperability Guide Introduction... 3 Discovery protocols: LLDP & CDP... 4 VLAN configuration... 7 Introduction... 7 VLAN configuration on Cisco Catalyst... 8 VLAN
Configuring Redundancy
7 CHAPTER This chapter describes how to configure redundancy and contains these sections: Configuring Fault Tolerance, page 7-1 Configuring HSRP, page 7-5 Configuring Interface and Device Tracking, page
VLAN Interoperability
PowerConnect Application Note #4 November 2003 VLAN Interoperability This Application Notes relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect 52xx Abstract This Application
Configuring EtherChannels
25 CHAPTER This chapter describes how to configure EtherChannel interfaces. For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst 2950 Desktop Switch Command
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
VLAN Workshop. Presenter: Paul Eriksson. VLAN Workshop 2009 RoamingNet Sweden (www.roamingnet.com) 1
VLAN Workshop. Presenter: Paul Eriksson VLAN Workshop 2009 RoamingNet Sweden (www.roamingnet.com) 1 About this presentation A seed from the forum by Randy (Graham)?: http://forum.mikrotik.com/viewtopic.php?f=2&t=24352
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Welcome to Todd Lammle s CCNA Bootcamp
Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot
Network Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
Router Lab Reference Guide
Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and
CISCO STUDY GUIDE. Building Cisco Multilayer Switched Networks (BCMSN) 640-504 Edition 2
CISCO STUDY GUIDE Building Cisco Multilayer Switched Networks (BCMSN) 640-504 Edition 2 Congratulations!! You have purchased a Testkiller, Ltd Study Guide. This study guide is a selection of keypoints
LANs and VLANs A Simplified Tutorial
Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name
isco Connecting Routers Back to Back Through the AUX P
isco Connecting Routers Back to Back Through the AUX P Table of Contents Connecting Routers Back to Back Through the AUX Ports...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Configuring NetFlow-lite
CHAPTER 55 Note NetFlow-lite is only supported on Catalyst 4948E Ethernet Switch. This chapter describes how to configure NetFlow-lite on the Catalyst 4948E switch. NetFlow-lite provides traffic monitoring
Flow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
Lab 5-5 Configuring the Cisco IOS DHCP Server
Lab 5-5 Configuring the Cisco IOS DHCP Server Learning Objectives Configure and verify the operation of the Cisco IOS DHCP server Configure an IP Helper address Review the EIGRP configuration Topology
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Chapter 2 Reading Organizer
Chapter 2 Reading Organizer After completion of this chapter, you should be able to: Explain the advantages and disadvantages of static routing Configure initial settings on a Cisco switch Configure switch
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Proposal for implementation of VoIP at XYZ hospital.
Proposal for implementation of VoIP at XYZ hospital. Introduction Management committee of XYZ hospital wants to implement an internal voice communication system for their hospital. At present they are
Link Aggregation Interoperability of the Dell PowerConnect 5316M with Cisco IOS or Cisco CatOS based Switches. By Bruce Holmes
Link Aggregation Interoperability of the Dell PowerConnect 5316M with Cisco IOS or Cisco CatOS based Switches By Bruce Holmes August 2005 Contents Introduction...3 Link Aggregation with Gigabit Ethernet
Configuring PROFINET
CHAPTER 9 This chapter describes how to configure the PROFINET feature on the Cisco IE 3000 switch. Understanding PROFINET, page 9-1, page 9-4 Displaying the PROFINET Configuration, page 9-5 Troubleshooting
Lab 4.2.4 Advanced Telnet Operations
Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
ICND1-100-101 IOS CLI Study Guide (CCENT)
ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:
