0% found this document useful (0 votes)
19 views7 pages

Lab 2 complete

This document outlines a lab exercise for configuring basic VLANs and testing connectivity in a network environment. It includes a topology diagram, addressing table, learning objectives, and detailed step-by-step tasks for setting up and verifying VLAN configurations on switches and PCs. The lab aims to teach students how to cable a network, configure VLANs, assign ports, and verify connectivity between devices in different VLANs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views7 pages

Lab 2 complete

This document outlines a lab exercise for configuring basic VLANs and testing connectivity in a network environment. It includes a topology diagram, addressing table, learning objectives, and detailed step-by-step tasks for setting up and verifying VLAN configurations on switches and PCs. The lab aims to teach students how to cable a network, configure VLANs, assign ports, and verify connectivity between devices in different VLANs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

98877

Student Id: __________________

NTWK2012
Lab 2: Basic VLAN Configuration
Aim: To configure basic VLANs and test connectivity

Topology Diagram

Addressing Table
Device
Interface IP Address Subnet Mask Default Gateway
(Hostname)
S1 VLAN 99 172.17.99.11 255.255.255.0 N/A
S2 VLAN 99 172.17.99.12 255.255.255.0 N/A
S3 VLAN 99 172.17.99.13 255.255.255.0 N/A
PC1 NIC 172.17.10.21 255.255.255.0 172.17.10.1
PC2 NIC 172.17.20.22 255.255.255.0 172.17.20.1
PC3 NIC 172.17.30.23 255.255.255.0 172.17.30.1
PC4 NIC 172.17.10.24 255.255.255.0 172.17.10.1
PC5 NIC 172.17.20.25 255.255.255.0 172.17.20.1
PC6 NIC 172.17.30.26 255.255.255.0 172.17.30.1

Initial Port Assignments (Switches 2 and 3)


Ports Assignment Network
Fa0/1 – 0/5 802.1q Trunks (Native VLAN 99) 172.17.99.0 /24
Fa0/6 – 0/10 VLAN 30 – Guest (Default) 172.17.30.0 /24
Fa0/11 – 0/17 VLAN 10 – Faculty/Staff 172.17.10.0 /24
Fa0/18 – 0/24 VLAN 20 – Students 172.17.20.0 /24
Learning Objectives
Upon completion of this lab, you will be able to:
• Cable a network according to the topology diagram
• Erase the startup configuration and reload a switch to the default state
• Perform basic configuration tasks on a switch
• Create VLANs
• Assign switch ports to a VLAN
• Add, move, and change ports
• Verify VLAN configuration
• Enable trunking on inter-switch connections
• Verify trunk configuration
• Save the VLAN configuration

Task 1: Prepare the Network

Step 1: Cable a network that is similar to the one in the topology diagram.
You can use any current switch in your lab as long as it has the required interfaces shown in the topology.
Note: If you use 2900 or 2950 switches, the outputs may appear different. Also, certain commands may
be different or unavailable.

Task 2: Configure and Activate Ethernet Interfaces

Step 1: Configure the PCs.


Configure the IP addresses for PCs by referring to the addressing table at the beginning of the lab.

Step 2: Test connectivity.


Use ping command to test connectivity between the various PCs.
NO
Are all the pings successful? ___________________
Make a statement about the connectivity of the PCs.
Only hosts on the same gateway are able to ping each other
___________________________________________________________________________________

Task 3: Configure VLANs on the Switch

Step 1: Change default hostname of switch.


Use the hostname command to change the default name from switch to s1.
You need to be in the global configuration mode to perform these steps. Type these commands in CLI
mode

switch> enable
switch# config t
switch(config)# hostname S1

Step 2: Create VLANs on switch S1


Use the vlan vlan-id command in global configuration mode to add a VLAN to switch S1.
There are four VLANS configured for this lab: VLAN 10 (faculty/staff); VLAN 20 (students); VLAN 30
(guest); and VLAN 99 (management). After you create the VLAN, you will be in vlan configuration mode,
where you can assign a name to the VLAN with the name vlan name command.
S1(config# vlan 10
S1(config-vlan)# name faculty/staff

Type commands to create other VLANS


S1(config-vlan)# vlan 20
S1(config-vlan)# name students
S1(config-vlan)# vlan 30
S1(config-vlan)# name guest
S1(config-vlan)# vlan 99
S1(config-vlan)# name management

Type
S1(config-vlan)#end

Step 3: Verify that the VLANs have been created on S1.


Use the show vlan brief command to verify that the VLANs have been created.
S1#show vlan brief

VLAN Name Status Ports


---- ------------------------------- --------- -----------------------------
1 default active Fa0/1, Fa0/2, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12, Fa0/13
Fa0/14, Fa0/15, Fa0/16, Fa0/17
Fa0/18, Fa0/19, Fa0/20, Fa0/21
Fa0/22, Fa0/23, Fa0/24, Gi0/1
Gi0/2
10 faculty/staff active
20 students active
30 guest active
99 management active

Step 4: Configure and name VLANs on switches S2 and S3. Repeat steps as above.
Change the names for the respective switches and create and name VLANs 10, 20, 30, and 99 on S2
and S3 using the commands from Step 1/2/3. Verify the correct configuration with the show vlan brief
command.

Type commands for S2


switch > enable
switch # config t
switch (config)# hostname s2
S2(config)# vlan 20
S2(config-vlan)# name students
S2(config-vlan)# vlan 30
S2(config-vlan)# name guest
S2(config-vlan)#vlan 99
S2(config-vlan)# name management
S2(config-vlan)# vlan 10
S2(config-vlan)# faculty/staff
S2(config-vlan)#end

Type commands for S3


switch > enable
switch # config t
switch (config)# hostname s2
S3(config)# vlan 20
S3(config-vlan)# name students
S3(config-vlan)# vlan 30
S3(config-vlan)# name guest
S3(config-vlan)# vlan 99
S3(config-vlan)# name management
S3(config-vlan)# vlan 10
S3(config-vlan)# faculty/staff
S3(config-vlan)#end
What ports are currently assigned to the four VLANs you have created?

There are no ports assigned


_ to the four VLANs I have created. They were only created
______________________________________________________
not assigned.
______________________________________________________________________________________

______________________________________________________________________________________

______________________________________________________________________________________

Step 5: Assign switch ports to VLANs on S2 and S3.


Refer to the port assignment table on page 1. Ports are assigned to VLANs in interface configuration
mode, using the switchport access vlan vlan-id command. You can assign each port individually or you
can use the interface range command to simplify this task, as shown here. The commands are shown for
S3 only, but you should configure both S2 and S3 similarly. Save your configuration when done.

S3(config)#interface range fa0/6-10


S3(config-if-range)#switchport access vlan 30
S3(config-if-range)#interface range fa0/11-17
S3(config-if-range)#switchport access vlan 10
S3(config-if-range)#interface range fa0/18-24
S3(config-if-range)#switchport access vlan 20
S3(config-if-range)#end

Type the commands for s2


S2(config)# interface range fa0/6-10
S2(config-if-range)# switchport access vlan 30
S2(config-if-range)# interface range fa0/11-17
S2(config-if-range)# switchport access vlan 10
S2(config-if-range)# interface range fa0/18-24
S2(config-if-range)# switchport access vlan 20
S2(config-if-range)# end

Type
S3#copy running-config startup-config
Destination filename [startup-config]? [enter]
Building configuration...
[OK]

Step 6: Determine which ports have been added.


Use the show vlan id vlan-number command on S2 to see which ports are assigned to VLAN 10.
Which ports are assigned to VLAN 10?

fa0/11-17 _ _
Note: The show vlan id vlan-name displays the same output.
You can also view VLAN assignment information using the show interfaces interface switchport
command.

Step 7: Assign the management VLAN.


A management VLAN is any VLAN that you configure to access the management capabilities of a switch.
VLAN 1 serves as the management VLAN if you did not specifically define another VLAN. You assign the
management VLAN an IP address and subnet mask. A switch can be managed via HTTP, Telnet, SSH,
or SNMP. Because the out-of-the-box configuration of a Cisco switch has VLAN 1 as the default VLAN,
VLAN 1 is a bad choice as the management VLAN. You do not want an arbitrary user who is connecting
to a switch to default to the management VLAN. Recall that you configured the management VLAN as
VLAN 99 earlier in this lab.
From interface configuration mode, use the ip address command to assign the management IP address
to the switches.

S1(config)#interface vlan 99
S1(config-if)#ip address 172.17.99.11 255.255.255.0
S1(config-if)#no shutdown

Type the commands for s2


S2(config)# interface vlan 99
S2(config-if)# ip address 172.17.99.12 255.255.255.0
S2(config-if)# no shutdown
Type the commands for s3
S3(config)#interface vlan 99
S3(config-if)# ip address 172.17.99.13 255.255.255.0
S2(config-if)#no shutdown

Assigning a management address allows IP communication between the switches, and also allows any
host connected to a port assigned to VLAN 99 to connect to the switches. Because VLAN 99 is
configured as the management VLAN, any ports assigned to this VLAN are considered management
ports and should be secured to control which devices can connect to these ports.

Step 8: Configure trunking and the native VLAN for the trunking ports on all switches.
Trunks are connections between the switches that allow the switches to exchange information for all
VLANS. By default, a trunk port belongs to all VLANs, as opposed to an access port, which can only
belong to a single VLAN. If the switch supports both ISL and 802.1Q VLAN encapsulation, the trunks
must specify which method is being used. Because the 2960 switch only supports 802.1Q trunking, it is
not specified in this lab.
A native VLAN is assigned to an 802.1Q trunk port. In the topology, the native VLAN is VLAN 99. An
802.1Q trunk port supports traffic coming from many VLANs (tagged traffic) as well as traffic that does not
come from a VLAN (untagged traffic). The 802.1Q trunk port places untagged traffic on the native VLAN.
Untagged traffic is generated by a computer attached to a switch port that is configured with the native
VLAN. One of the IEEE 802.1Q specifications for Native VLANs is to maintain backward compatibility with
untagged traffic common to legacy LAN scenarios. For the purposes of this lab, a native VLAN serves as
a common identifier on opposing ends of a trunk link. It is a best practice to use a VLAN other than VLAN
1 as the native VLAN.
Use the interface range command in global configuration mode to simplify configuring trunking.

S1(config)#interface range fa0/1-5


S1(config-if-range)#switchport mode trunk
S1(config-if-range)#switchport trunk native vlan 99
S1(config-if-range)#no shutdown
S1(config-if-range)#end
Type commands for s2
S2(config)#interface range fa0/1-5
S2(config-if-range)# switchport mode trunk
S2(config-if-range)#switchport trunk native vlan 99
S2(config-if-range)# no shutdown
S2(config-if-range)#end

Type commands for s3


S3(config)#interface range fa0/1-5
S3(config-if-range)# switchport mode trunk
S3(config-if-range)# switchport trunk native vlan 99
S3(config-if-range)#no shutdown
S3(config-if-range)#end

Verify that the trunks have been configured with the show interface trunk command.
S1#show interface trunk

Port Mode Encapsulation Status Native vlan


Fa0/1 on 802.1q trunking 99
Fa0/2 on 802.1q trunking 99

Port Vlans allowed on trunk


Fa0/1 1-4094
Fa0/2 1-4094

Port Vlans allowed and active in management domain


Fa0/1 1,10,20,30,99
Fa0/2 1,10,20,30,99

Port Vlans in spanning tree forwarding state and not pruned


Fa0/1 1,10,20,30,99
Fa0/2 1,10,20,30,99

Step 9: Verify that the switches can communicate.


From S1, ping the management address on both S2 and S3.
S1#ping 172.17.99.12
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.99.12, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/9 ms
S1#ping 172.17.99.13
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.99.13, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms

Step 10: Ping several hosts from PC2.


Ping from host PC2 to host PC1 (172.17.10.21). Is the ping attempt successful? no _
Ping from host PC2 to the switch VLAN 99 IP address 172.17.99.12. Is the ping attempt successful?
no
Because these hosts are on different subnets and in different VLANs, they cannot communicate without a
Layer 3 device to route between the separate subnetworks.
Ping from host PC2 to host PC5. Is the ping attempt successful? yes
Because PC2 is in the same VLAN and the same subnet as PC5, the ping is successful

Step 11: Move PC1 into the same VLAN as PC2.


The port connected to PC2 (S2 Fa0/18) is assigned to VLAN 20, and the port connected to PC1 (S2
Fa0/11) is assigned to VLAN 10. Reassign the S2 Fa0/11 port to VLAN 20. You do not need to first
remove a port from a VLAN to change its VLAN membership. After you reassign a port to a new VLAN,
that port is automatically removed from its previous VLAN.
S2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
S2(config)#interface fastethernet 0/11
S2(config-if)#switchport access vlan 20
S2(config-if)#end

Ping from host PC2 to host PC1. Is the ping attempt successful? no
Even though the ports used by PC1 and PC2 are in the same VLAN, they are still in different
subnetworks, so they cannot communicate directly.
Step 12: Change the IP address and network on PC1.
Change the IP address on PC1 to 172.17.20.22. The subnet mask and default gateway can remain the
same. Once again, ping from host PC2 to host PC1, using the newly assigned IP address.
Is the ping attempt successful? yes _
Why was this attempt successful?

Both hosts are now within


_ the same subnet. The_ host can now use ARP to determine the MAC address

associated with the IP address of the target host. Despite the gateway being different. The gateway would

Mainly be used to target hosts outside of that given subnet.

You might also like