Campus Topology Design
- Access Layer: PC, IP Phones, and Printers are at this layer that is designed for high port count and affordable cost. Client access security measures are enabled at this Access Layer.
- Distribution Layer: access layer switches uplink to 'typically' redundant distribution switches, thus providing scalability. No host at this layer and most software policy like Qos is enabled here.
- Core Layer: distribution switches uplink here to typically redundant core switches, it is designed for speed and resiliency so rarely are software policies enable here --> this would slow the core.
- Collapsed Design for smaller campuses (LETU)
- Access Layer is the same as above.
- Distribution/Core Layer
VLAN- Virtual Local Area Network
- VLANs increase performance and security within a network
- They segment the LAN into separate broadcast domains at Layer 2
- typically a one-to-one relationship between an IP subnet and a VLAN
- Types of VLANs:
- Default VLAN- initial startup VLAN - Cisco default is VLAN 1
- Data VLAN - referred to as the user VLAN
- Management VLAN - for admins to manage the switch
- Voice VLAN - for voice traffic
- Native VLAN - is assigned to a 802.1Q trunk for untagged traffic
- Access Ports
- Access ports are configured on switch interfaces for end-hosts and end-host are not aware of the VLAN
- Access ports are configured with one specific VLAN
- VLAN1 by default, which is also the Native VLAN
- SW1(config)#vlan 10
- SW1(config-vlan)#name Engineering
- SW1(config)# interface Fa0/1
- SW1(config-if)#switchport mode access (dynamic by default)
- SW1(config-if)#switchport access vlan 10
- SW1(config-if)#interface range FastEthernet 0/3 -12
- SW1(config-if)#switchport mode access
- SW1(config-if)#switchport access vlan 10
- Verification
- #show vlan brief (brief stats of all ports)
- #show interface Fa0/1 switchport (stats individual port)
- Trunk Ports:
- Links that carry traffic for multiple VLANs between switches
- Dot1Q is the current trunking protocol - ISL(Inter-Switch Link) is cisco proprietary trunking protocol that is obsolete
- Dot1Q - when traffic traversed switch to switch it tags the layer 2 header with the Dot1Q info (correct VLAN). The receiving switch only forwards traffic to ports in the same VLAN, and it removes the Dot1Q tag from the Ethernet frame.
- Note: with a server running multiple virtual machines (like VMware or HyperV), that port would also be a truck as it may need to be in multiple LANs.
- SW1(config)#interface fa0/24
- SW1(config-if)#description Trunk to SW2 (optional)
- SW1(config-if)#switchport trunk encapsulation dot1q (command for old switches)
- SW1(config-if)#switchport mode trunk
- SW1(config-if)#switchport trunk native vlan 199 (199 unused)
- Native VLAN - this was assigned to any traffic that was not VLAN tagged coming from a trunked port (Hub to Switch: hubs are only layer 1 and not VLAN aware).
- The default Native VLAN is 1, however, there are security issues here so the best practice is to change it to an unused VLAN.
- The Native VLAN must match on both sides of the trunk.
- Verification
- SW1#sho interface fa0/1 switchport
- Limiting Allowed VLANs - you can specifically limit the VLANs that can traverse a trunk for security and performance reasons. This must be set on both sides of the trunk, and if not set, all VLANs will traverse the link.
- SW1(config)#interface fa0/24
- SW1(config-if)#switchport trunk allowed vlan 10,30
- DTP - Dynamic Trunking Protocol
- If connecting two Cisco switches, they can negotiate the trunk connection using DTP, however, this is not recommended.
- Switchport mode dynamic auto: if the neighboring switch port is set to trunk or desirable, the link will automatically form a trunk. However, if both sides are set to auto, a trunk will not form.
- Switchport mode dynamic desirable: will form a trunk if the neighbor switch is set to trunk, desirable, or auto
- Swichport nonegotiate: disables DTP
- VTP - VLAN Trunking Protocol
- allows you to add, edit or delete VLANs on switches configured as VTP Servers, and all other VTP Client switches will synchronize their VLAN databases with it.
- Note: port level VLAN assignments must still be made
- If you have multiple VTP Servers, the one with the highest revision number on the domain will be king
- VTP Server: can add, edit, or delete VLANs
- VTP Client: not able to add, edit, or delete. Looks for highest revisioned VTP Server on domain
- VTP Transparent: does not participate in the Server/Client VTP but will pass the database updates through the switch. It can maintain its own VLAN database. NOTE: if you want tagged traffic to flow through the switch, it must have the VLAN in the database.
- SW1(config)#vtp domain LETU ('LETU' must be on all switches)
- SW1(config)#vtp mode server or
- SW1(config)#vtp mode client or
- SW1(config)#vtp mode transparent
- Verification: SW1#show vtp status
No comments:
Post a Comment