Configuring basic VTP on CISCO Switches

Page 1

Configuring basic VTP on CISCO Switches networkingguruji1.com/2020/02/configuring-basic-vtp-on-cisco-switches.html

Configuring basic VTP on CISCO Switches My Dear Friend in today’s article, I will tell you “Configuring basic VTP on CISCO Switches” If you any problem after reading this article, you can see the video below. Please don't forget to Like, Share, Comment & Subscribe to our Networking Guruji Channel for more video.

Scroll Down for Details Video VTP "Configuring basic VTP on CISCO Switches” VTP is VLAN Trunking Protocol, it makes easier of VLAN management in L2 switches. It is actually replicating VLAN from server mode switch to all client mode switches. NOTE: - It is not a broadcast domain. VTP packets are sent in either inter-switch link (ISL) frames or IEEE 802.1q (dot1q) frames. These packets are sent to the destination MAC Address 01-00-0C-CC-CC-CC with a logical link control (LLC) code of subnetwork Access Protocol (SNAP) There are three different modes of VTP (VLAN Trunking Protocol) Server 1/14


Client Transparent Server Mode: - This is the default mode of Cisco Switches. In this mode, you can create, modify and remove VLAN. It is also can generate a VTP update message and if it receives an update from other server switches then it can install a VTP update in its VLAN database, actually, it can change its own VLAN database. Client Mode: - In this mode you cannot add, remove or modify VLAN, it can receive the update from server switch, once receive it will change/update its own VLAN database, then can pass the update over the trunk port if any other switches are connected. Transparent Mode: - VTP Transparent switches do not participate in VTP. A VTP transparent switch does not advertise its VLAN Configuration and does not synchronize its VLAN configuration based on received advertisement, but transparent switches do forward VTP advertisements that they receive out their trunk port. Previous post: - What is a Virtual Local Area Network (VLAN) And Configuring ISL Trunking Cisco Catalyst Switch

“VLAN Trunking Protocol (VTP)� There are three different versions VTP. VTP protocol 2/14


version: 1, 2 and 3. VTP V3 not covered in CCNA Syllabus. New CCNA (200-301) Syllabus totally removed VTP. VTP V2 is not much different than VTP V1. The Major difference is that VTP V2 introduces support for token ring VLANs. If you use Token Ring VLANS, you must enable VTP V2. Otherwise, there is no reason to use VTP V2. Changing the VTP Version from 1 to 2 will not cause a switch to reload. “VTP Configuration – Revision Cisco Switch” Configuration Revision Number Sequence the number for the database Highest number wins A domain is synchronized when revision number matches everywhere Potential problems in VTP Wrong database with a high configuration revision number can overwrite the database True for both VTP servers and clients Reason that VTP v1/v2 is rarely used in production How we can make Revision number 0 Change the switch mode to Transparent Delete vlan.dat file and reload the switch Change the VTP domain name. What will you check before connecting a switch to a running network? I will make configuration revision number “0” before I connect a switch to running network.

3/14


“VTP Authentication – CCNA” Used for validation of VTP updates - Configuring / Verifying VTP password show vtp password show vtp status compare MD5 hashes NOTE: - Switch to switch link must be a trunk to propagate/replicate VLAN information or VTP Update. Previous post: - Disabling Dynamic Trunking Protocol (DTP) And Cisco Dynamic Trunking Protocol Modes DTP “Configure VTP in CISCO Switches” Configure all inter-switch link on SW-1, SW-2, and SW-3 in Dynamic desirable mode. Configure all inter-switch link on SW-4 in Dynamic auto mode Configure SW-1 as VTP Server mode and VTP domain CCNA Configure SW-2, SW-3, and SW-4 as VTP Client and VTP domain CCNA Configure VLAN ID 10,20 and 30 SW-1 4/14


Assign VLAN ID 10 SW-3 port Fa0/1 and assign VLAN ID 20 on SW-3 port FA0/4 Assign VLAN ID 10 SW-4 port Fa0/1 and assign VLAN ID 20 on SW-4 port FA0/4 Configure IP as bellow on PC’s PC -1 = 172.16.10.1/24 PC -2 = 172.16.20.2/24 PC -3 = 172.16.10.2/24 PC -4 = 172.16.20.2/24 Test Ping from PC-1 to PC-3 and test ping from PC-2 to PC-4

SW-1 We are using Interface range command to configure Fa0/1 and Fa0/2 at the Same time. Sw-1(config)#Interface range FastEthernet 0/1-2 SW-1(config-if-range)#switchport mode dynamic desirable Sw-1(config)#vtp mode server 5/14


Sw-1(config)#vtp domain CCNA Sw-1(config)#vlan 10 Sw-1(config)#exit Sw-1(config)#vlan 20 Sw-1(config)#exit Sw-1(config)#vlan 30 Sw-1(config)#exit SW-2 We are using Interface range command to configure Fa0/1 and Fa0/2 at the Same time. Sw-2(config)#Interface range fatstethernet 0/1-2 SW-2(config-if-range)#switchport mode dynamic desirable Sw-2(config)#vtp domain CCNA Sw-2(config)#vtp mode server SW-3 We are using Interface range command to configure Fa0/1 and Fa0/2 at the Same time. Sw-3(config)#Interface range FastEthernet 0/1-2 SW-1(config-if-range)#switchport mode dynamic desirable Sw-2(config)#vtp domain CCNA Sw-2(config)#vtp mode client SW-3(config)#interface fastethernet 0/3 SW-3(config-if)#switchport access vlan 10 SW-3(config-if)#interface fastethernet 0/4 SW-3(config-if)#switcport access vlan 20 SW-4 We are using Interface range command to configure Fa0/1 and Fa0/2 at the Same time. Sw-1(config)#Interface range fatstethernet 0/1-2 SW-1(config-if-range)#switchport mode dynamic auto SW-1(config)#vtp domain CCNA Sw-2(config)#vtp mode client SW-4(config)#interface fatsethernet 0/3 SW-4(config-if)#switchport access vlan 10 SW-4(config-if)#interface fastethernet 0/4 SW-4(config-if)#switchport access vlan 20

6/14


First check trunk link between switches to make sure that VTP update message can replicate throughout the L2 switching network. SW-1#show interfaces trunk Port Fa0/1 Fa0/2

Mode Encapsulation desirable n-isl desirable n-isl

Status Native Vlan trunking 1 trunking 1

Port Fa0/1 Fa0/2

Vlans allowed on trunk 1-1005 1-1005

Port Fa0/1 Fa0/2

Vlans allowed and active in management domain 1,10,20,30 1,10,20,30

Port Fa0/1 Fa0/2

Vlans in spanning tree forwarding state and not pruned 1,10,20,30 1,10,20,30

SW-2#show interfaces trunk Port Fa0/1 Fa0/2

Mode Encapsulation desirable n-isl desirable n-isl

Status Native Vlan trunking 1 trunking 1

Port Fa0/1 Fa0/2

Vlans allowed on trunk 1-1005 1-1005

Port Fa0/1 Fa0/2

Vlans allowed and active in management domain 1,10,20,30 1,10,20,30

Port Fa0/1 Fa0/2

Vlans in spanning tree forwarding state and not pruned 1,10,20,30 1,10,20,30

7/14


SW-3#show interfaces trunk Port Fa0/1 Fa0/2

Mode Encapsulation desirable n-isl desirable n-isl

Status Native Vlan trunking 1 trunking 1

Port Fa0/1 Fa0/2

Vlans allowed on trunk 1-1005 1-1005

Port Fa0/1 Fa0/2

Vlans allowed and active in management domain 1,10,20,30 1,10,20,30

Port Fa0/1 Fa0/2

Vlans in spanning tree forwarding state and not pruned 1,10,20,30 1,10,20,30

SW-4#show interfaces trunk Port

Mode

Encapsulation

Status

Native Vlan 8/14


Fa0/1 Fa0/2

auto auto

n-isl n-isl

trunking trunking

1 1

Port Fa0/1 Fa0/2

Vlans allowed on trunk 1-1005 1-1005

Port Fa0/1 Fa0/2

Vlans allowed and active in management domain 1,10,20,30 1,10,20,30

Port Fa0/1 Fa0/2

Vlans in spanning tree forwarding state and not pruned none 1,10,20,30

Now we will verify the VTP configuration. Let’s start from SW-1 SW-1#Show vtp status VTP Version 2 Configuration Revision 12 Maximum VLAN’s supported locally 255 Number of existing VLAN’s 8 VTP operating Mode Server VTP Domain Name CCNA VTP Pruning Mode Disabled VTP V2 Mode Disabled VTP Traps Generation Disabled MD5 digest 0xF7 0xB6 0x8d 0x7D 0x61 0xA0 0xF0 Configuration last modification by 0.0.0.0 at 3-1-93 01:15:21 Local updater ID is 0.0.0.0 (no valid interface found) SW-2#Show vtp status VTP Version Configuration Revision Maximum VLAN’s supported locally Number of existing VLAN’s VTP operating Mode VTP Domain Name VTP Pruning Mode

2 12 255 8 Client CCNA Disabled 9/14


VTP V2 Mode Disabled VTP Traps Generation Disabled MD5 digest 0xF7 0xB6 0x8d 0x7D 0x61 0xA0 0xF0 Configuration last modification by 0.0.0.0 at 3-1-93 01:15:21 SW-3#Show vtp status VTP Version 2 Configuration Revision 12 Maximum VLAN’s supported locally 255 Number of existing VLAN’s 8 VTP operating Mode Client VTP Domain Name CCNA VTP Pruning Mode Disabled VTP V2 Mode Disabled VTP Traps Generation Disabled MD5 digest 0xF7 0xB6 0x8d 0x7D 0x61 0xA0 0xF0 Configuration last modification by 0.0.0.0 at 3-1-93 01:15:21 SW-4#Show vtp status VTP Version 2 Configuration Revision 12 Maximum VLAN’s supported locally 255 Number of existing VLAN’s 8 VTP operating Mode Client VTP Domain Name CCNA VTP Pruning Mode Disabled VTP V2 Mode Disabled VTP Traps Generation Disabled MD5 digest 0xF7 0xB6 0x8d 0x7D 0x61 0xA0 0xF0 Configuration last modification by 0.0.0.0 at 3-1-93 01:15:21 From the above output, we can see SW-1 is in VTP server mode and SW-2, SW-3 and SW-4 is in VTP client mode. Also, all the switches have VTP domain name CCNA. Number of Existing VLAN we can see in all switches 8, where all the switches had a total number of default VLAN 5 (VLAN ID 1 and VLAN ID 1002 to 1005). We have created three VLAN (VLAN ID 10,20 and 30) in SW-1. SW-1 has replicated newly created three VLAN’s to SW-2, SW-3, and SW-4, Now all switches have total VLAN’s 8 (Default VLAN 5 + newly created 3) = 8

10/14


Extra Part: Transparent Mode Configuration Any switch configuration in the diagram. SW-3, SW-4 Sw-4(config)#vtp mode transparent Just 1 command apply to transparent mode in VTP Now we will see the VLAN database on all four switches. SW-1#show vlan brief VLAN

Name

1 10 20 30 1002 1003 1004 1005

default VLAN0010 VLAN0020 VLAN0030 fddi-default token-ring-default fddinet-default trnet-default

Status active active active active active active active active

Ports Fa0/3 to Gi0/2

SW-2#show vlan brief VLAN

Name

1 10 20 30 1002 1003 1004 1005

default VLAN0010 VLAN0020 VLAN0030 fddi-default token-ring-default fddinet-default trnet-default

Status active active active active active active active active

Ports Fa0/3 to Gi0/2

SW-3#show vlan brief VLAN

Name

Status

Ports

11/14


1 10 20 30 1002 1003 1004 1005

default VLAN0010 VLAN0020 VLAN0030 fddi-default token-ring-default fddinet-default trnet-default

active active active active active active active active

Fa0/5 to Gi0/2 Fa0/3 Fa0/4

SW-4#show vlan brief VLAN

Name

1 10 20 30 1002 1003 1004 1005

default VLAN0010 VLAN0020 VLAN0030 fddi-default token-ring-default fddinet-default trnet-default

Status active active active active active active active active

Ports Fa0/5 to Gi0/2 Fa0/3 Fa0/4

In show VTP the status output we can see configuration Revision Number, a configuration revision number is a 32-bit number that indicates the level of revision for the VTP packet. It is nothing but sequence number of VTP update used to keep track of VTP update. Each time the VTP server sends an update it includes configuration Revision number and incremented by one. If you see configuration revision number the same in all switches in the same VTP domain, that means The VTP update was synchronized and good to go.

12/14


Now we will do the ping test PC-1 PC>ping 172.16.10.2 Pinging 172.16.10.2 with 32 bytes of date Reply from 172.16.10.2: bytes=32 time=2ms TTL=128 Reply from 172.16.10.2: bytes=32 time=2ms TTL=128 Reply from 172.16.10.2: bytes=32 time=2ms TTL=128 Reply from 172.16.10.2: bytes=32 time=2ms TTL=128 Ping statistics for 172.16.10.2 Packets: sent =4, Received =4, Lost = 0 (0% loss) Approximate round trip times in milli-seconds; Minimum =0ms, Maximum = 2ms, Average =0ms PC-2 PC>ping 172.16.20.2 Pinging 172.16.20.2 with 32 bytes of date Reply from 172.16.20.2: bytes=32 time=2ms TTL=128 13/14


Reply from 172.16.20.2: bytes=32 time=2ms TTL=128 Reply from 172.16.20.2: bytes=32 time=2ms TTL=128 Reply from 172.16.20.2: bytes=32 time=2ms TTL=128 Ping statistics for 172.16.20.2 Packets: sent =4, Received =4, Lost = 0 (0% loss) Approximate round trip times in milli-seconds; Minimum =0ms, Maximum = 11ms, Average =2ms Conclusion Full article “Configuring basic VTP on CISCO Switches” Thank you for the full reading of the article. If you find this post helpful, then help others by sharing it on social media. “

14/14


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.