You are on page 1of 9

Lab 120: Configuring VLANs

CCNA v6 Labs January 11, 2018


Rate this post
Introduction to VLAN
VLANs are used to segment a large physical LAN into multiple small virtual LANs for better
management and greater security. VLANs provide a number advantages and features.

Some of the key features provided by VLANs are:

 VLANs allow to add, move, and change networks with ease by just configuring a port
into the appropriate VLAN.
 VLANs allow to create a logical group of users by function.
 VLANs are typically independent from their physical or geographic locations.
 VLANs enhance network security.
 VLANs increase the number of broadcast domains.
Each VLAN is identified by a unique identification number called VLAN ID. The range of
VLAN ID can vary from 1-1005. VLAN 1 is the default VLAN (native VLAN) that is used for
the administrative purpose.

Cisco manageable switches allows you to configure VLANs as per your network
requirements. There are two methods that can be used to configure VLANs.

Static VLAN
An administrator need to configure and update VLAN database manually each time. This
method is preferred for a small network.

Dynamic VLAN
VLANs database can be configured and updated with the help of a protocol called VTP
(VLAN Trunking Protocol) automatically or with the least user interaction. This method is
preferred for the large networks.

VTP Switch Modes


Before configuring the VLANs, we would like to explain the types of VLAN switch modes. A
switch can be configured in any of the following three modes:

Server
Switch in this mode can create, modify, and delete VLANs. These VLANs will be updated
throughout the VLAN domain.

Transparent
Switch in this mode can also create, modify, and delete VLANs. However, these VLANs will
only be applied on the transparent switch (on which the VLANs have been created).
Transparent switches pass the VLAN database from one trunk port to another trunk port
without compromising the transmitting VLAN database with their own VLAN database.

Client
Switch in this mode cannot create, modify, or delete any VLAN. They can only receive the
VLAN database and update their database accordingly.

Configuring VLANs
To configure VLANs on a Cisco switch, use the vlan global configuration command. In
addition, one can also use the vlan database command at the privileged mode.

In this exercise, we will configure VLANs on Switch1 and Switch2. The following table lists
the details of topology that we will use.

Switch1 Switch2 VLAN ID VLAN Name

PC name: PC0 PC name: PC2


IP address: 10.0.0.1 IP address: 10.0.0.3
Switch interface: Fa0/ 1 Interface: Fa0/ 1 10 Sales

PC name: PC1 PC name: PC3


IP address: 10.0.0.2 IP address: 10.0.0.4
Switch interface: Fa0/ 2 Interface: Fa0/ 2 20 Account
We will use the following topology to demonstrate how to configure VLANs.
1. Create the preceding topology in Cisco Packet Tracer. Once you have created the
preceding topology, configure the appropriate IP addresses on each PCs. After configuring
IP addresses, let’s have a look at the command syntaxes used to configure VLANs.

Switch( config)# vlan < vlan number >

Switch( config-vlan)# vlan < name of vlan

2. Once you created the desired VLANs, next you need to assign the interfaces to the
desired VLANs. To do so, the following commands are used at the interface configuration
mode.

Switch( config-if)# switchport mode access

Switch( config-if)# switchport access vlan < VLAN ID >

Configure VLANs Step By Step


1. Execute the following commands on Switch1 to configure a VLAN named Sales with the
VLAN ID as 10.

Switch1( config)# vlan 10

Switch1( config-vlan)# name Sales

Switch1( config-vlan)# exit


2. Execute the following commands on Switch1 to configure a VLAN named Account with
the VLAN ID as 20.

Switch1( config)# vlan 20

Switch1( config-vlan)# name Account

Switch1( config-vlan)# exit

3. The following figure shows how to configure VLANs.

4. Once you have configured the desired VLANs, execute the following commands to
assign the Fa0/ 1 interface to Sales VLAN and Fa0/ 2 interface to Account VLAN.

Switch1( config)# interface fa0/ 1

Switch1( config-if)# switchport mode access

Switch1( config-if)# switchport access vlan 10

Switch1( config-if)# exit

Switch1( config)# interface fa0/ 2

Switch1( config-if)# switchport mode access

Switch1( config-if)# switchport access vlan 20

Switch1( config-if)# exit


Switch1( config)# exit

5. Once you have assigned the appropriate interfaces to the appropriate VLANs, verify the
VLAN configuration by executing the following command.

Switch1# show vlan brief

6. The following figure shows that the VLANs are configured on Switch1.

7. After configuring VLANs on Switch1, next configure the same VLANs (Sales and
Account) and assigned the same interfaces (Fa0/ 1 and fa0/ 2) to the respective VLANs. If
you have any issue, refer the above-mentioned table.

Switch( config)# hostname Switch2

Switch2( config)# vlan 10

Switch2( config-vlan)# name Sales

Switch2( config-vlan)# exit

Switch2( config)# vlan 20

Switch2( config-vlan)# name Account


Switch2( config-vlan)# exit

Switch2( config)# interface fa0/ 1

Switch2( config-if)# switchport mode access

Switch2( config-if)# switchport access vlan 10

Switch2( config-if)# exit

Switch2( config)# interface fa0/ 2

Switch2( config-if)# switchport access vlan 20

Switch2( config-if)# exit

Switch2( config)# exit

8. Verify your configuration by executing the following command.

Switch2# show vlan brief

9. Now, you have done the VLAN configurations on both the switches. To verify your VLAN
configuration, open Command Prompt on PC0 and type the following command:

Ping 10.0.0.2

10. You should not be able to ping even both the PCs are in the same network. The reason
is that PC0 (IP 10.0.0.1, interface Fa0/ 1) and PC1 (IP 10.0.0.2, interface Fa0/ 2) belong to
different VLAN IDs.

Ping 10.0.0.3

11. You should not be able to ping, because we still have not configured VLAN trunking
(covered in the next section) between both the switches.
Configuring VLAN Trunking
VLAN trunking carries VLAN traffic from switch to another switch using the trunk port. A
trunk port is simply a switch port that is used to interconnect switches. In order to forward
VLAN traffic from one switch to another switch, you need to enable trunking on the trunk
ports of both the switches. To do so, the following command syntaxes are used.

Switch( config-if)# interface < interface name/ number >

Switch( config-if)# switchport mode trunk

In the topology that we have used to configure VLANs, we need to execute the following
commands on both the switches.

1. On Switch1, execute the following commands:

Switch1( config-if)# interface Fa0/ 3

Switch1( config-if)# switchport mode trunk

2. On Switch2, execute the following commands:

Switch2( config-if)# interface Fa0/ 3

Switch2( config-if)# switchport mode trunk

3. Verify that the trunking is configured. On Switch1, execute the following command to
verify VLAN trunking.
Show interface fa0/ 3 switchport

4. Once you have enabled VLAN trunking on the respective ports on the switches, verify
your VLAN configuration. To do so, execute the following command on PC0.

 ping 10.0.0.2
5. You should not be able to ping even both the PCs are in the same network. The reason
is that PC0 (IP 10.0.0.1, interface Fa0/ 1) and PC1 (IP 10.0.0.2, interface Fa0/ 2) belong to
different VLAN IDs.

 ping 10.0.0.3
6. Now you should be able to ping, because we have enabled VLAN trunking between both
the switches. Further, PC0 (IP 10.0.0.1, interface Fa0/ 1 of Switch1) and PC2 (IP 10.0.0.3,
interface F0/ 1 of Switch2) both belong to the same VLAN ID (Sales 10).

 ping 10.0.0.4
7. You should not be able to ping because PC0 (IP 10.0.0.1, interface Fa0/ 1 of Switch1)
and PC3 (IP 10.0.0.4, interface Fa0/ 2 of Switch2) belong to the different VLAN IDs.

You might also like