Diplomado CCNP
Diplomado CCNP
(SWITCH).
208014_23
INTEGRANTES:
ALEXIS PEDROZA
COLOMBIA
2020
Contenido
INTRODUCCION3
1. ACTIVIDAD4
1.1 CCNPv7.1_SWITCH_Lab1_BASELINE_STUDENT.4
1.2 CCNPv7.1_SWITCH_Lab3-1_VLAN-TRUNK-VTP_STUDENT.11
1.3 CCNPv7.1_SWITCH_Lab3-2_ETHERCHANNEL_STUDENT.¡Error! Marcador no definido.
1.4 CCNPv7.1_SWITCH_Lab4-1_STP_STUDENT.57
1.5 CCNPv7.1_SWITCH_Lab4-2_MST_STUDENT.85
1.6 CCNPv7.1_SWITCH_Lab5-1_IVL-ROUTING_STUDENT.¡Error! Marcador no definido.
1.7 CCNPv7.1_SWITCH_Lab5-2_DHCP46_STUDENT130
2. CONCLUSIONES171
Referencias172
INTRODUCCION
En el siguiente documento, se configurarán switches mediante el uso de protocolos como STP y la configuración de Vlans,
en múltiples escenarios al interior de una red jerárquica convergente.
Temáticas a Desarrollar:
1.1 CCNPv7.1_SWITCH_Lab1_BASELINE_STUDENT.
CCNPv7.1 SWITCH
Topology.
Objectives
Clear the configuration of all the switches in your pod
Configure the database template used by all the switches in your pod
Save a baseline configuration for all the switches in your pod
Background
When working with a switch that has been previously configured, any new commands entered will be merged with the
existing configuration, causing unpredictable results. Additionally, if the switch is connected to other switches in the network,
you can remove the VLANs but they might be relearned from another switch via VTP. In this lab you prepare your switches
for use with future labs. This is accomplished by erasing the startup configuration from NVRAM and deleting the VLAN
database. You also ensure that VLANs will not be relearned from another switch after the VLAN database has been deleted.
Additionally, your switches may be required to support IPv6 traffic, which it does not by default. This is accomplished by
changing the database template used by the Switch Database Manager.
Note: This lab uses Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15.0(2)SE6 IP Services and LAN Base
images, respectively. The 3560 and 2960 switches are configured with the SDM templates “dual-ipv4-and-ipv6 routing” and
“lanbase-routing”, respectively. Depending on the switch model and Cisco IOS Software version, the commands available
and output produced might vary from what is shown in this lab. Catalyst 3650 switches (running any Cisco IOS XE release)
and Catalyst 2960-Plus switches (running any comparable Cisco IOS image) can be used in place of the Catalyst 3560
switches and the Catalyst 2960 switches.
Required Resources
You may use one of the following switches or a comparable one with this lab:
Cisco 2960 with the Cisco IOS Release 15.0(2)SE6 C2960-LANBASEK9-M or comparable
Cisco 3560v2 with the Cisco IOS Release 15.0(2)SE6 C3560-IPSERVICESK9-M or comparable
Console Cable
Computer with terminal emulation software
Step 1: Connect to the switch console port and enter privileged EXEC mode.
From a computer running a terminal emulation program, connect to the console port of the switch that you want to clear
using a console cable. You should see a console prompt that includes the switch’s hostname, followed by a > or #. The
default switch hostname is “Switch.”
Switch>
or
Switch#
If the prompt ends with a >, you are not in privileged EXEC mode. To enter privileged EXEC mode, type enable. This
might require a password. If you are in a configuration mode, type exit or end.
If not enabled:
Switch> enable
Switch#
In privileged EXEC mode, type delete flash:vlan.dat or delete vlan.dat (in the shorter form without the
flash: prefix, the <TAB> key completion does not work) and press Enter. If you are asked to confirm, press Enter until
you are back to the original prompt.
Switch# delete vlan.dat
Delete filename [vlan.dat]? ! Press Enter
Delete flash:vlan.dat? [confirm] ! Press Enter
Switch#
Files that appear to reside in NVRAM (use dir nvram: to display its contents) are in fact stored in FLASH. Some of
them are stored as standalone files in FLASH, such as flash:config.text that maps to nvram:startup-config, or
flash:private-config.text that maps to nvram:private-config and stores sensitive information such as RSA keys, master
password encryption key etc. Deleting any of these files from FLASH will cause the corresponding mapped file in
simulated NVRAM to also be deleted or its apparent length in NVRAM to be truncated to zero, and vice versa. Other
files in NVRAM, such as self-generated X.509 certificates, are all stored in the flash:multiple-fs file.
The erase startup-config command commonly used to remove the stored configuration will remove the
flash:config.text and flash:private-config.text. However, other contents of the simulated NVRAM, such as X.509
certificates that were automatically created for the HTTPS server run on the switch, will not be removed as they reside in
the flash:multiple-fs file unaffected by the erase startup-config command. Therefore, to completely erase the
simulated NVRAM contents, not only the erase startup-config command must be issued, but also the
flash:multiple-fs file must be removed.
In privileged EXEC mode, issue the delete flash:multiple-fs (or simply delete multiple-fs) command,
followed by the erase startup-config command. Press Enter on each prompt.
Switch# delete multiple-fs
Delete filename [multiple-fs]? ! Press Enter
Delete flash:/multiple-fs? [confirm] ! Press Enter
Switch# erase startup-config
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
! Press Enter
[OK]
Erase of nvram: complete
Switch#
*Mar 1 00:43:23.286: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram
Note: Historically, the write erase command was used to erase the startup configuration. This command has the
same effect as erase startup-config command that was implemented in later IOS versions, and is still being used
as its shortened version wr e is more convenient to write than erase startup-config.
Switch#
Notice in the output that there is NO memory allocated to IPv6 operations.
There are several different SDM templates available for use, each with different amounts of TCAM allocated to
different processes and protocols. Use the show sdm prefer template command to examine the details of a
particular database template.
Switch#
Because our switching network will need to support IPv6 traffic, the SDM template must be changed to one of the
dual-ipv4-and-ipv6 templates, using the sdm prefer dual-ipv4-and-ipv6 template global configuration
command.
The template options for dual IPv4 and IPv6 operation vary based on the model of switch. As of this writing, the
dual-ipv6-and-ipv4 template options on 3560s are default, routing, and VLAN, while the option on 2960s is default.
The 2960's lanbase-routing template also supports connected IPv6 hosts.
Note: The routing template is not a valid selection on switches running the LANBASE feature set, even though
routing may appear as an option at the command line.
As you can see in the output above, a restart is required for the change to be effective; the switch cannot re-allocate
the TCAM on the fly. You will restart the switch at the end of this lab.
Configure your 3560 switches for the dual-ipv4-and-ipv6 routing template, and your 2960 switches for the
lanbase-routing template.
Note: Several of the labs in the course end with instructions to reset the switch to its defaults. If you clear the switch
(delete vlan.dat, delete multiple-fs, write erase, reload), the selected SDM template will return to
the default, and could require reconfiguration (including a reboot).
Step 5: Reload the device, but do not save the system configuration if prompted.
After clearing the switch configuration, reload the switch by typing reload and pressing Enter. If you are asked whether
to save the current configuration, answer no. Press Enter to confirm. The switch starts reloading. Your output might look
different depending on the switch model that you are using. This step might take a few minutes, because the switch
needs time to reload.
Switch# reload
ALS1/ALS2:
tclsh
puts [ open "flash:reset.tcl" w+ ] {
typeahead "\n"
copy running-config startup-config
typeahead "\n"
erase startup-config
delete /force vlan.dat
delete /force multiple-fs
ios_config "sdm prefer lanbase-routing"
typeahead "\n"
puts "Reloading the switch in 1 minute, type reload cancel to halt"
typeahead "\n"
reload in 1 RESET.TCL SCRIPT RUN
}
tclquit
Now for any lab that requires clearing the switch, issue the privileged exec command tclsh reset.tcl and the switch
will be completely cleared and reload in the proper state.
1.2 CCNPv7.1_SWITCH_Lab3-1_VLAN-TRUNK-VTP_STUDENT.
Por: Diego Stiven Rubio Moreno Cod: 1056613510
CCNPv7.1 SWITCH
Objectives
2. Setup a VTP v2 Domain.
3. Create and maintain VLANs.
4. Configure 802.1Q Trunking.
5. Setup a VTP v3 Domain.
Background
VLANs logically segment a network by function, team, or application, regardless of the physical location of the users.
End stations in a particular IP subnet are often associated with a specific VLAN. VLAN membership on a switch that is
assigned manually for each interface is known as static VLAN membership.
Trunking, or connecting switches, and the VLAN Trunking Protocol (VTP) are technologies that support VLANs. VTP
manages the addition, deletion, and renaming of VLANs on the entire network from a single switch.
Note: This lab uses Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15.0(2)SE6 IP Services and LAN Base
images, respectively. The 3560 and 2960 switches are configured with the SDM templates “dual-ipv4-and-ipv6 routing”
and “lanbase-routing”, respectively. Depending on the switch model and Cisco IOS Software version, the commands
available and output produced might vary from what is shown in this lab. Catalyst 3650 switches (running any Cisco IOS
XE release) and Catalyst 2960-Plus switches (running any comparable Cisco IOS image) can be used in place of the
Catalyst 3560 switches and the Catalyst 2960 switches.
Required Resources
Part 2: 2 Cisco 2960 with the Cisco IOS Release 15.0(2)SE6 C2960-LANBASEK9-M or comparable
Part 3: 2 Cisco 3560v2 with the Cisco IOS Release 15.0(2)SE6 C3560-IPSERVICESK9-M or comparable
Part 4: Computer with terminal emulation software
Part 5: Ethernet and console cables
DLS1 example:
DLS1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# interface vlan 99
DLS1(config-if)# ip address 10.1.99.101 255.255.255.0
DLS1(config-if)# no shutdown
The interface VLAN 99 will not come up immediately, because the broadcast domain it is associated with (VLAN 99)
doesn’t exist on the switch. We will fix that in a few moments.
(Optional) On each switch, create an enable secret password and configure the VTY lines to allow remote access from
other network devices.
DLS1 example:
DLS1(config)# enable secret class
DLS1(config)# line vty 0 15
DLS1(config-line)# password cisco
DLS1(config-line)# login
Note: The passwords confiured here are required for NETLAB compatibility only and are NOT recommended for use in
a live environment.
Note(2): For purely lab environment purposes, it is possible to configure the VTY lines so that they accept any
Telnet connection immediately, without asking for a password, and place the user into the privileged EXEC
mode directly. The configuration would be similar to the following example for DLS1:
DLS1(config)# enable secret class
DLS1(config)# line vty 0 15
DLS1(config-line)# no login
DLS1(config-line)# privilege level 15
VTP Server You can create, modify, and delete VLANs and specify other configuration parameters,
such as VTP version and VTP pruning, for the entire VTP domain. VTP servers
advertise their VLAN configuration to other switches in the same VTP domain and
synchronize their VLAN configuration with other switches based on advertisements
received over trunk links. VTP server is the default mode.
In VTP Server mode, VLAN configurations are only stored in the flash:vlan.dat file.
While VLANs are manipulated in the configuration mode, the configuration commands
do not appear in the running-config.
A VTP client behaves like a VTP server and transmits and receives VTP updates on its
VTP Client trunks, but you cannot create, change, or delete VLANs on a VTP client. VLANs are
configured on another switch in the domain that is in server mode.
In VTP Client mode, VLAN configurations are only stored in the flash:vlan.dat file. The
configuration of VLANs does not appear in the running-config.
VTP Transparent VTP transparent switches do not participate in VTP. A VTP transparent switch does not
advertise its VLAN database nor synchronize its VLAN database based on received
advertisements. However, transparent switches forward received VTP messages under
two circumstances: either the VTP domain name of the transparent switch is empty (not
yet configured), or it matches the domain name in the received VTP messages.
In VTP Transparent mode, VLAN configurations are stored both in flash:vlan.dat file and
also are present in the running-config. If extended range VLANs are used, however,
they are stored in the flash:vlan.dat only if the switch is running VTP version 3.
VTP Off A switch in VTP Off mode functions in the same manner as a VTP transparent switch,
except that it does not forward VTP advertisements on trunks. VTP off is only available
on switches that support VTP version 3 although it is not necessary to run VTP version
3 on the switch to be able to put it into the Off mode.
In VTP Off mode, VLAN configurations are stored both in flash:vlan.dat file and also are
present in the running-config. If extended range VLANs are used, however, they are
stored in the flash:vlan.dat only if the switch is running VTP version 3.
In this lab we will demonstrate the configuration and operation of both VTP versions 2 and 3. We will do this by first
configuring VTP version 2 between DLS1 and ALS1, and then configuring DLS1, DLS2 and ALS2 with VTP version 3.
Topology
o Verify VTP status
Issue the show vtp status command on DLS1
DLS1# show vtp status
VTP Version capable : 1 to 3
VTP version running : 1
VTP Domain Name :
VTP Pruning Mode : Disabled
VTP Traps Generation : Disabled
Device ID : 64a0.e72a.2200
Configuration last modified by 0.0.0.0 at 0-0-00 00:00:00
Feature VLAN:
--------------
VTP Operating Mode : Transparent
Maximum VLANs supported locally : 1005
Number of existing VLANs : 5
Configuration Revision : 0
MD5 digest : 0x57 0xCD 0x40 0x65 0x63 0x59 0x47 0xBD
0x56 0x9D 0x4A 0x3E 0xA5 0x69 0x35 0xBC
Because no VLAN configurations were made, all settings except the VTP mode that was changed in Lab 1 are the
defaults. This switch is capable of running version 1, 2 or 3 of VTP and runs version 1 by default. All switches in the VTP
domain must run the same VTP version. The VTP mode is set to transparent as a result of steps performed in Lab 1.
The number of existing VLANs is the five built-in VLANs. Different switches in the Catalyst family support different
numbers of local VLANs. The 3560 switch used in this lab supports a maximum of 1,005 VLANs locally, while the 2960
switch used in this lab supports at most 255 VLANs. Lastly, note that the configuration revision is 0.
As you should recall from CCNA, the configuration revision number is compared amongst VTPv1 or VTPv2 switches
and the VLAN database from the switch with the highest revision number is adopted by all the other switches in the
VLAN management domain. Every time VLAN information is modified and saved in the VLAN database (vlan.dat), the
revision number is increased by one when the user exits from VLAN configuration mode.
In VTPv3, revision numbers are still used but they no longer determine the switch whose database is going to apply to
the entire domain. Instead, a single designated switch in a VTP domain called the primary server is allowed to assert its
database in the entire VTP domain, even if its own revision number is lower. Other switches that are not primary servers
are not allowed to assert their databases even if their revision numbers are higher.
Multiple switches in the VTP domain can be in VTP server mode. In VTPv1 and VTPv2, any of these server switches
can be used to manage all other switches in the VTP domain. In VTPv3, a single primary server for a particular VTP
domain is designated to control where changes originate from in the switched network. This enables careful
management and protection of the VLAN database.
Verify these settings by using the show vtp status command again.
DLS1# show vtp status
VTP Version capable : 1 to 3
VTP version running : 2
VTP Domain Name : SWLAB
VTP Pruning Mode : Disabled
VTP Traps Generation : Disabled
Device ID : 64a0.e72a.2200
Configuration last modified by 0.0.0.0 at 0-0-00 00:00:00
Local updater ID is 0.0.0.0 (no valid interface found)
Feature VLAN:
--------------
VTP Operating Mode : Server
Maximum VLANs supported locally : 1005
Number of existing VLANs : 5
Configuration Revision : 0
MD5 digest : 0xA7 0xE6 0xAF 0xF9 0xFE 0xA0 0x88 0x6B
0x21 0x6D 0x70 0xEE 0x04 0x6D 0x90 0xF3
o Configure VLANs on DLS1
Next configure the VLANs that will be required to support the network. There are two ways to create VLANs, either
directly via the vlan command or by assigning an interface to a non-existent VLAN. For now, you will create the VLANs
directly on the switch. Create:
6. VLAN 99 to enable the management interface.
7. VLAN 999 as a “parking lot” VLAN for unused access ports
7.1 Suspend this VLAN to prevent ports in the VLAN from every communicating with each other.
8. The VLANs required for network operations, which are VLANs 100, 110, and 120.
Suspending a VLAN deserves a special mention. Each VLAN has an operational state associated with it: it can be either
active (the default state) or suspended. A suspended VLAN exists but it does not operate. Access ports assigned to a
suspended VLAN drop all frames and are unable to communicate, similar to ports put into a nonexistent VLAN. Putting a
suspended VLAN back into the active state reinstates normal communication on ports in that VLAN.
To globally suspend a VLAN, use the state suspend command in the VLAN configuration mode. This state is
propagated by VTP to all other switches in the VTP domain if VTP is in use.
To locally shut down a VLAN, use the shutdown command in the VLAN configuration mode. This setting is not
propagated through VTP.
Do not confuse the shutdown command in the VLAN configuration mode with the same command available under
interface Vlan mode, which has a different and unrelated meaning. Further discussion on suspending and
reactivating VLANs can be found in Part 3, Step 7 of this lab.
DLS1(config)# vlan 99
DLS1(config-vlan)# name MANAGEMENT
DLS1(config-vlan)# vlan 100
DLS1(config-vlan)# name SERVERS
DLS1(config-vlan)# vlan 110
DLS1(config-vlan)# name GUEST
DLS1(config-vlan)# vlan 120
DLS1(config-vlan)# name OFFICE
DLS1(config-vlan)# vlan 999
DLS1(config-vlan)# name PARKING_LOT
DLS1(config-vlan)# state suspend
DLS1(config-vlan)# vlan 666
DLS1(config-vlan)# name NATIVE_DO_NOT_USE
DLS1(config-vlan)# exit
The VLANs will not appear in the VLAN database until the exit command is issued.
After configuring the VLANs, issue the show vtp status command and you will see that the all-important
configuration revision number has increased based on these changes to the VLAN database. Note that the revision
number you have when performing this lab may be different.
DLS1#show vtp status | include Configuration Revision
Configuration Revision : 6
Switches that are interconnected and have DTP enabled can form a trunk automatically if either end is in the dynamic
desirable mode or static trunk mode on the condition that either both switches use the same VTP domain name or at
least one of the switches does not yet have the VTP domain name configured.
The dynamic auto mode on both ends will prevent a trunk from automatically forming; however, this is not really a valid
safeguard against unintentional trunk connections as the port can become a trunk if the other side changes to dynamic
desirable or static trunk mode.
As a best practice you should configure each interface into either access or trunk mode and use the switchport
nonegotiate interface configuration command to disable the propagation of DTP messages. Never leave ports to
operate in the dynamic mode.
Validate these settings by examining the switchport configuration for one of the trunk interfaces:
Feature VLAN:
--------------
VTP Operating Mode : Client
Maximum VLANs supported locally : 255
Number of existing VLANs : 5
Configuration Revision : 0
MD5 digest : 0x57 0xCD 0x40 0x65 0x63 0x59 0x47 0xBD
0x56 0x9D 0x4A 0x3E 0xA5 0x69 0x35 0xBC
Set the VTP password on ALS1 and the VLAN database will be synchronized. However, before you can set the
password, the VTP domain name must be manually configured.
ALS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
ALS1(config)# vtp domain SWLAB
Changing VTP domain name from NULL to SWLAB
ALS1(config)# vtp password cisco123
Setting device VTP password to cisco123
ALS1(config)# end
*Mar 1 00:27:21.902: %SW_VLAN-6-VTP_DOMAIN_NAME_CHG: VTP domain name changed to SWLAB.
Now check the VTP status and you will see a revision number matching that of DLS1, and that VLANs 99, 100, 110,
120, 666 and 999 are all in the local VLAN database.
Feature VLAN:
--------------
VTP Operating Mode : Client
Maximum VLANs supported locally : 255
Number of existing VLANs : 11
Configuration Revision : 6
MD5 digest : 0xF3 0x8A 0xEA 0xFA 0x9B 0x39 0x6D 0xF5
0xA6 0x03 0x2F 0xB8 0x16 0xC1 0xE6 0x8C
ALS1#
show vlan
brief |
incl
active
1
default
active
Fa0/1, Fa0/2, Fa0/3, Fa0/4
99 MANAGEMENT active
100 SERVERS active
110 GUEST active
120 OFFICE active
666 NATIVE_DO_NOT_USE active
ALS1#
Because ALS1 is in VTP Client mode, local changes to the VLAN database cannot be made:
At this point, VTP version 2 is working and secured between DLS1 and ALS1. You should now be able to ping DLS1
from ALS1 and vice versa.
DLS1 Configuration:
Feature VLAN:
--------------
VTP Operating Mode : Server
Number of existing VLANs : 5
Number of existing extended VLANs : 0
Maximum VLANs supported locally : 1005
Configuration Revision : 0
Primary ID : 0000.0000.0000
Primary Description :
MD5 digest :
Feature MST:
--------------
VTP Operating Mode : Transparent
Feature UNKNOWN:
--------------
VTP Operating Mode : Transparent
DLS2#
Notice that the configuration revision number is zero and the number of local VLANs is the default of 5. There has been
no update because DLS1’s configuration revision number was reset to zero when the VTP version was changed, so at
this point DLS2 and ALS2 will not learn about the configured VLANs because as far as they are concerned, they have
the same database as DLS1.
If we attempt to add VLANs at DLS1, or any of the other VTP version 3 switches, our attempt will not work and we will
be told that we cannot add VLANs.
DLS1(config)# vlan 111
VTP VLAN configuration not allowed when device is not the primary server for vlan database.
DLS1(config)#
The promotion of DLS1 to primary increments its configuration revision number to 1, so the VLANs that were previously
created on DLS1 are propagated to DLS2 and ALS2 automatically.
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# vlan 510
DLS1(config-vlan)# name TEST510
DLS1(config-vlan)# exit
DLS1(config)# vlan 511
DLS1(config-vlan)# name TEST511
DLS1(config-vlan)# exit
DLS1(config)# vlan 512
DLS1(config-vlan)# name TEST512
DLS1(config-vlan)# exit
DLS1(config)# vlan 513
DLS1(config-vlan)# name TEST513
DLS1(config-vlan)# exit
DLS1(config)# vlan 514
DLS1(config-vlan)# name TEST514
DLS1(config-vlan)# exit
DLS1(config)# vlan 515
DLS1(config-vlan)# name TEST515
DLS1(config-vlan)# exit
DLS1(config)# vlan 1500
DLS1(config-vlan)# name TEST-EXT-1500
DLS1(config-vlan)# exit
DLS1(config)# no vlan 510-514
DLS1(config)# end
DLS1#
As discussed and demonstrated in Part 2, Step 3 of this lab, you can put a VLAN into suspended status by using the
state suspend command while in VLAN configuration mode on a VTPv2 server switch or on the VTPv3 primary
server switch. In a mixed VTP version network, the suspension only works network-wide if it originates from the VTPv3
primary server. Suspending a VLAN causes all ports in that VLAN throughout the VTP domain to stop transferring data.
Suspend Guest VLAN 110 on DLS1, wait a few moments, exit VLAN configuration mode and then issue the show vlan
brief | include suspended command. The status should change show the VLAN as suspended.
DLS1(config)# vlan 110
DLS1(config-vlan)# state ?
active VLAN Active State
suspend VLAN Suspended State
Reactivate VLAN 110 using the state active command in VLAN configuration mode.
DLS1(config)# vlan 110
DLS1(config-vlan)# state active
DLS1(config-vlan)# exit
DLS1(config)#
Issue the show vlan brief | include suspended command on another switch in the network, and you will see that
the VLAN status is no longer listed.
DLS2# show vlan brief | include suspended
999 PARKING_LOT suspended Fa0/1, Fa0/2, Fa0/3, Fa0/4
DLS2#
o End of Lab
Save your configurations.
The equipment should be in
the correct end state from
this lab for Lab 3-2,
EtherChannel.
CONCLUSIONS
Topology.
Objectives
Create EtherChannel Links.
Configure and test load balancing options
Background
Four switches have just been installed. The distribution layer switches are Catalyst 3560 switches, and the access layer
switches are Catalyst 2960 switches. There are redundant uplinks between the access layer and distribution layer.
Usually, only one of these links could be used; otherwise, a bridging loop might occur. However, using only one link
utilizes only half of the available bandwidth. EtherChannel allows up to eight redundant links to be bundled together into
one logical link. In this lab, you configure Port Aggregation Protocol (PAgP), a Cisco EtherChannel protocol, and Link
Aggregation Control Protocol (LACP), an IEEE 802.3X (formerly IEEE 802.1ad) open standard version of EtherChannel.
LACP and PAgP are signaling protocols allowing two switches to negotiate the use of selected physical ports as
members of a single EtherChannel bundle. Throughout this lab, we will be using the term EtherChannel to refer to a
logical bundling of multiple physical links, and the term Port-channel to refer to a virtual interface that represents an
EtherChannel bundle in the Cisco IOS configuration.
Note: This lab uses Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15.0(2)SE6 IP Services and LAN Base
images, respectively. The 3560 and 2960 switches are configured with the SDM templates “dual-ipv4-and-ipv6 routing”
and “lanbase-routing”, respectively. Depending on the switch model and Cisco IOS Software version, the commands
available and output produced might vary from what is shown in this lab. Catalyst 3650 switches (running any Cisco IOS
XE release) and Catalyst 2960-Plus switches (running any comparable Cisco IOS image) can be used in place of the
Catalyst 3560 switches and the Catalyst 2960 switches.
Required Resources
2 Cisco 2960 with the Cisco IOS Release 15.0(2)SE6 C2960-LANBASEK9-M or comparable
2 Cisco 3560v2 with the Cisco IOS Release 15.0(2)SE6 C3560-IPSERVICESK9-M or comparable
Computer with terminal emulation software
Ethernet and console cables
<output omitted>
Note: When configuring EtherChannels, it can be helpful to shut down the physical interfaces being grouped on both
devices before configuring them into channel groups. Otherwise, the EtherChannel Misconfig Guard may place these
interfaces into error disabled state. The interfaces and port channel can be re-enabled after the EtherChannel is
configured.
On ALS1, bundle interfaces Fa0/11 and Fa0/12 under the Port-Channel 1 interface with the channel-group 1 mode
desirable command. The mode desirable option indicates that you want the switch to actively negotiate to form a
PAgP link. The Port-Channel interface numbers are locally-significant only. On the 2960, the number can be anything
between 1 and 6, and they do not have to match end to end. If it is possible, use the same number on both sides of a
port-channel so that coordinating troubleshooting is less complicated. At the very least, clearly document the
configuration.
ALS1(config-if-range)# no shutdown
<output omitted - interfaces logged as coming up>
ALS1(config-if-range)# exit
ALS1(config)#
<the following output is seen after ALS2 configuration is complete>
*Mar 1 00:14:01.570: %LINK-3-UPDOWN: Interface Port-channel1, changed state to up
*Mar 1 00:14:02.576: %LINEPROTO-5-UPDOWN: Line protocol on Interface Port-channel1,
changed state to up
After you configure an EtherChannel, a virtual port channel interface is created automatically that represents a logical
link consisting of the bundled physical interfaces. The Port-channel interface will automatically inherit the configuration of
the first physical interface that was added to the EtherChannel. All configuration changes applied to the port channel
interface will then apply to all the physical ports bundled under this interface.
The configuration of the physical interfaces that are bundled into an EtherChannel must be consistent. Otherwise, the
bundle may never form or individual links in the bundle may be suspended. Once physical interfaces are added to the
EtherChannel bundle, the administrator should not make any configuration changes directly to the physical interfaces.
Any necessary adjustments should be made to the appropriate port channel interface.
Therefore, unless explicitly asked to do so in these labs, after physical ports have been bundled in an EtherChannel,
apply all further commands to the corresponding port channel interface only.
Before configuring the EtherChannel bundle on ALS2, issue the command show etherchannel summary on ALS1
and notice the status of both the bundle and the individual interfaces:
ALS1#
PAgP is preventing the bundle from forming because the other end is not speaking the PAgP protocol.
Using the same commands as above, configure interfaces F0/11 and F0/12 on ALS2 to be in an EtherChannel, and then
verify that it is working by issuing the show etherchannel summary command on both switches. This command
displays the type of EtherChannel, the ports utilized, and port states.
ALS1#
ALS2#
At this point, the system does not consider interfaces FastEthernet 0/11 and 0/12 as individual trunks, but as a
components of interface Port-Channel 1. The output of show interface trunk illustrates this; F0/11 and F0/12 are
not shown while the Port-channel is operational.
ALS1# show interfaces trunk
DLS1(config-if-range)# no shutdown
<output omitted - interfaces logged as coming up>
DLS1(config-if-range)# end
DLS1#
<the following output is seen after ALS1 configuration is complete>
*Mar 1 00:31:29.752: %LINK-3-UPDOWN: Interface Port-channel2, changed state to up
*Mar 1 00:31:30.758: %LINEPROTO-5-UPDOWN: Line protocol on Interface Port-channel2, changed
state to up
Verify that EtherChannel is working by issuing the show etherchannel summary command on both switches. This
command displays the type of EtherChannel, the ports utilized, and port states.
DLS1#
ALS1# show etherchannel summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - Layer3 S - Layer2
U - in use f - failed to allocate aggregator
ALS1#
Step 4: Explore Misconfiguration
In this step, you will intentionally misconfigure an EtherChannel bundle on DLS2 with parameters that do not match the
distant end switches to observe the results.
To do this, you will configure the interfaces on DLS1 and ALS1 as they should be configured for our final desired
configuration. Then you will misconfigure DLS2 by bundling an interface that is connected to DLS1 and an interface that
is connected to ALS1 into a single EtherChannel. Because different protocols are being used on the two distant ends,
misconfiguration guard will force the interfaces into an error disabled state.
To begin, configure an EtherChannel using LACP on ALS1 interfaces F0/9 and F0/10. Assign this EtherChannel to Port-
channel number 3.
ALS1(config)# interface range f0/9-10
ALS1(config-if-range)# shutdown
ALS1(config-if-range)# channel-group 3 mode active
Creating a port-channel interface Port-channel 3
ALS1(config-if-range)# no shut
ALS1(config-if-range)# exit
ALS1(config)#
Next configure an EtherChannel in "on" mode on DLS1 interfaces F0/11 and F0/12. Assign this EtherChannel to Port-
channel number 12.
DLS1(config)# interface range f0/11-12
DLS1(config-if-range)# shutdown
DLS1(config-if-range)# channel-group 12 mode on
Creating a port-channel interface Port-channel 12
DLS1(config-if-range)# no shut
DLS1(config-if-range)# exit
DLS1(config)#
Now go to DLS2 and configure an EtherChannel using PAgP on interfaces F0/10 and F0/11. Assign this EtherChannel
to Port-channel number 40.
DLS2(config)# interface range f0/10-11
DLS2(config-if-range)# shutdown
DLS2(config-if-range)# channel-group 40 mode desirable
Creating a port-channel interface Port-channel 40
DLS2(config-if-range)# no shut
DLS2(config-if-range)# exit
DLS2(config)#
Wait about three minutes, then issue the command show etherchannel summary on DLS2. Notice the difference in
the individual interface status'.
DLS2#
Interface F0/10 is attempting to communicate with a distant interface that is configured for LACP. This results in the
interface being in a stand-alone state. Interface F0/11 is attempting to communicate with a distant interface that is
configured not to use a signaling protocol, so the interface is in a down state.
On DLS1, the configuration mismatch caused Etherchannel Misconfig Guard to put F0/11, F0/12, and Port-channel 12
into an error-disabled state. The messages that displayed at DLS1's console when this happened:
*Mar 1 05:43:12.639: %PM-4-ERR_DISABLE: channel-misconfig (STP) error detected on Fa0/11,
putting Fa0/11 in err-disable state
*Mar 1 05:43:12.664: %PM-4-ERR_DISABLE: channel-misconfig (STP) error detected on Fa0/12,
putting Fa0/12 in err-disable state
*Mar 1 05:43:12.698: %PM-4-ERR_DISABLE: channel-misconfig (STP) error detected on Po12,
putting Fa0/11 in err-disable state
*Mar 1 05:43:12.698: %PM-4-ERR_DISABLE: channel-misconfig (STP) error detected on Po12,
putting Fa0/12 in err-disable state
*Mar 1 05:43:12.698: %PM-4-ERR_DISABLE: channel-misconfig (STP) error detected on Po12,
putting Po12 in err-disable state
*Mar 1 05:43:13.654: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed
state to down
*Mar 1 05:43:13.679: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/12, changed
state to down
*Mar 1 05:43:13.688: %LINEPROTO-5-UPDOWN: Line protocol on Interface Port-channel12, changed
state to down
To fix all of this, remove Port-channel 40 on DLS2 and create EtherChannels with the proper configurations to match the
distant ends.
DLS2(config)# interface range f0/10-11
DLS2(config-if-range)# shut
DLS2(config-if-range)# no channel-group 40 mode desirable
DLS2(config-if-range)# exit
DLS2(config)# interface range f0/9-10
DLS2(config-if-range)# channel-group 3 mode active
Creating a port-channel interface Port-channel 3
DLS2(config-if-range)# no shut
DLS2(config-if-range)# exit
DLS2(config)# interface range f0/11-12
DLS2(config-if-range)# channel-group 12 mode on
Creating a port-channel interface Port-channel 12
DLS2(config-if-range)# no shut
DLS2(config-if-range)# exit
DLS2(config)# no interface port-channel 40
DLS2(config)# exit
DLS2#
Challenge
The topology still has redundant links that you can combine. Experiment with the other port channel modes using the
question mark on the physical interface command channel-group number mode ?. Look at the descriptions and
implement the remaining EtherChannels in different ways.
You may find the desirable, auto, active, and passive keywords cumbersome and unintuitive to associate with
the particular signaling protocol. Try using the channel-protocol physical interface command, which limits the
keywords in the channel-group number mode command so that only the keywords appropriate to the selected
signaling protocol will be accepted.
Using channel-protocol pagp will make sure that in subsequent channel-group number mode command, only
desirable and auto keywords are accepted. Conversely, using channel-protocol lacp will make sure that in
subsequent channel-group number mode command, only active and passive keywords are accepted.
The end state from this part of the lab is that there are NO single interface trunks; all connections between
switches will be port-channel interfaces consisting of two members.
DLS1#
ALS1#
Change the load balancing configuration on ALS1 and ALS2 to src-dst-ip, which is ideal for most environments.
Example from ALS2:
ALS2(config)# port-channel load-balance ?
dst-ip Dst IP Addr
dst-mac Dst Mac Addr
src-dst-ip Src XOR Dst IP Addr
src-dst-mac Src XOR Dst Mac Addr
src-ip Src IP Addr
src-mac Src Mac Addr
ALS1#
CCNPv7.1 SWITCH
Objectives
Observe default Spanning Tree behavior
Implement Rapid Spanning Tree
Implement STP tool kit components
Background
The potential effect of a loop in the layer 2 network is significant. Layer 2 loops could impact connected hosts as well as
the network equipment. Layer 2 loops can be prevented by following good design practices and careful implementation
of the Spanning Tree Protocol. In this lab you will observe and manipulate the operation of spanning tree protocols to
help secure the layer 2 network from loops and topology disruptions. The terms "switch" and "bridge" will be used
interchangeably throughout the lab.
Note: This lab uses Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15.0(2)SE6 IP Services and LAN Base
images, respectively. The 3560 and 2960 switches are configured with the SDM templates “dual-ipv4-and-ipv6 routing”
and “lanbase-routing”, respectively. Depending on the switch model and Cisco IOS Software version, the commands
available and output produced might vary from what is shown in this lab. Catalyst 3650 switches (running any Cisco IOS
XE release) and Catalyst 2960-Plus switches (running any comparable Cisco IOS image) can be used in place of the
Catalyst 3560 switches and the Catalyst 2960 switches.
Required Resources
2 Cisco 2960 with the Cisco IOS Release 15.0(2)SE6 C2960-LANBASEK9-M or comparable
2 Cisco 3560v2 with the Cisco IOS Release 15.0(2)SE6 C3560-IPSERVICESK9-M or comparable
Computer with terminal emulation software
Ethernet and console cables
1 Windows 7 PC with Wireshark, TCPDump, or another comparable packet capture utility installed
Observe default Spanning Tree behavior
Load base config and configure trunks
Use the reset.tcl script you created in Lab 1 “Preparing the Switch” to set your switches up for this lab. Then load
the file BASE.CFG into the running-config with the command copy flash:BASE.CFG running-config.
Perform this step on all four switches. An example from DLS1:
DLS1# tclsh reset.tcl
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
[OK]
Erase of nvram: complete
Reloading the switch in 1 minute, type reload cancel to halt
Next, enable interfaces F0/7 through F0/12 as 802.1Q trunk ports. Perform this step on all four switches. An example
from DLS1:
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# int ran f0/7-12
DLS1(config-if-range)# switchport trunk encap dot1q
DLS1(config-if-range)# switchport trunk native vlan 666
DLS1(config-if-range)# switchport trunk allowed vlan except 1,999
DLS1(config-if-range)# switchport mode trunk
DLS1(config-if-range)# switchport nonegotiate
DLS1(config-if-range)# no shut
DLS1(config-if-range)# exit
DLS1(config)#
Finally, configure all four switches as VTP version 3 servers in domain SWLAB with no password. An example from
DLS1:
DLS1(config)# vtp mode server
Setting device to VTP Server mode for VLANS.
DLS1(config)# vtp domain SWLAB
Changing VTP domain name from NULL to SWLAB
DLS1(config)# vtp version 3
DLS1(config)#
Configure VLANs
Configure DLS1 as the VTP primary server for VLANs, and then create VLANs. The VLAN database will propagate to
the other switches in the network.
DLS1# vtp primary vlan
This system is becoming primary server for feature vlan
No conflicting VTP3 devices found.
Do you want to continue? [confirm]
DLS1#
*Mar 1 01:35:22.917: %SW_VLAN-4-VTP_PRIMARY_SERVER_CHG: e840.406f.7280 has become the primary
server for the VLAN VTP feature
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# vlan 99
DLS1(config-vlan)# name MANAGEMENT
DLS1(config-vlan)# vlan 100
DLS1(config-vlan)# name SERVERS
DLS1(config-vlan)# vlan 110
DLS1(config-vlan)# name GUEST
DLS1(config-vlan)# vlan 120
DLS1(config-vlan)# name OFFICE
DLS1(config-vlan)# vlan 999
DLS1(config-vlan)# name PARKING_LOT
DLS1(config-vlan)# state suspend
DLS1(config-vlan)# vlan 666
DLS1(config-vlan)# name NATIVE_DO_NOT_USE
DLS1(config-vlan)# exit
DLS1(config)#
ALS2# show vtp status
VTP Version capable : 1 to 3
VTP version running : 3
VTP Domain Name : SWLAB
VTP Pruning Mode : Disabled
VTP Traps Generation : Disabled
Device ID : 5017.ff84.0a80
Feature VLAN:
--------------
VTP Operating Mode : Server
Number of existing VLANs : 11
Number of existing extended VLANs : 0
Maximum VLANs supported locally : 255
Configuration Revision : 7
Primary ID : e840.406f.7280
Primary Description : DLS1
MD5 digest : 0xF3 0xD5 0xF7 0x62 0x3F 0x7C 0x84 0x86
0x41 0xC0 0x4E 0xCA 0x36 0xB8 0x15 0x47
<output omitted>
ALS2# show vlan brief | i active
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4
99 MANAGEMENT active
100 SERVERS active
110 GUEST active
120 OFFICE active
666 NATIVE_DO_NOT_USE active
ALS2#
Identify and modify the root bridge
Use the show span root command on all of the switches to find the root switch for all of the VLANs. Note: Your
results may vary from the examples.
DLS1# show span root
Root Hello Max Fwd
Vlan Root ID Cost Time Age Dly Root Port
---------------- -------------------- --------- ----- --- --- ------------
VLAN0099 32867 5017.ff84.0a80 19 2 20 15 Fa0/9
VLAN0100 32868 5017.ff84.0a80 19 2 20 15 Fa0/9
VLAN0110 32878 5017.ff84.0a80 19 2 20 15 Fa0/9
VLAN0120 32888 5017.ff84.0a80 19 2 20 15 Fa0/9
VLAN0666 33434 5017.ff84.0a80 19 2 20 15 Fa0/9
DLS1#
Compare the output of the show span command on all of the switches; why did the current root get elected?
DLS2#show span vlan 99
VLAN0099
Spanning tree enabled protocol ieee
Root ID Priority 32867
Address 5017.ff84.0a80
Cost 19
Port 11 (FastEthernet0/9)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
The current root bridge was elected based on the lowest Bridge ID (consisting of the Priority, extended system ID equal
to the VLAN ID, and base MAC address values). In the output above, the root’s MAC is 5017.ff84.0a80; the local bridge
MAC is e840.406f.7280.
With the priority and extended system IDs being identical, the root bridge's MAC is numerically smaller than the local
bridge’s MAC. The end result is that in a completely un-configured network, one single switch will be elected as the root
bridge. The resulting choice of switch may or may not be desirable.
There are two basic ways to manipulate the configuration to control the location of the root bridge.
The spanning-tree vlan vlan-id priority value command can be used to manually set a priority
value
The spanning-tree vlan vlan-id root { primary | secondary } command can be used to
automatically set a priority value.
The difference between the two is the priority command will set a specific number (multiple of 4096) as the priority,
while the root primary command will set the local bridge's priority to 24,576 (if the local bridge MAC is lower than the
current root bridge's MAC) or 4096 lower than the current root's priority (if the local bridge MAC is higher than the current
root bridge's MAC).
The logic behind this operation is straight-forward. The root primary command tries to lower the priority only as
much as is needed to win the root election, while leaving priorities between 24576 and the default 32768 for use by
secondary bridges. The command always takes the entire Bridge ID into account when computing the resulting priority
value.
The spanning-tree vlan vlan-id root secondary command will statically set the local bridge’s priority to
28,672. In an otherwise unconfigured network where all switch priorities default to 32,768, the root primary
command will set the priority on the switch to 24,576 (two “steps” lower than the default priority) while the root
secondary command will set the priority on the secondary root to the 28,672 (one “step” lower than the default priority).
Modify DLS1 and DLS2 so that DLS 1 is elected the primary root bridge for VLANs 99 and 100 and DLS2 is elected the
primary root bridge for VLAN 110 and 120. DLS1 should be elected as the secondary root bridge for VLAN 110 and 120,
and DLS2 should be elected as the secondary root bridge for VLANs 99, and 100.
You will need to make configuration changes on both DLS1 and DLS2.
An example from DLS1:
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# spanning-tree vlan 99,100 root primary
DLS1(config)# spanning-tree vlan 110,120 root secondary
DLS1(config)# exit
DLS1#
Verification from DLS1:
DLS1# show spanning-tree root
Root Hello Max Fwd
Vlan Root ID Cost Time Age Dly Root Port
---------------- -------------------- --------- ----- --- --- ------------
VLAN0099 24675 e840.406f.7280 0 2 20 15
VLAN0100 24676 e840.406f.7280 0 2 20 15
VLAN0110 24686 e840.406f.6e00 19 2 20 15 Fa0/11
VLAN0120 24696 e840.406f.6e00 19 2 20 15 Fa0/11
VLAN0666 33434 5017.ff84.0a80 19 2 20 15 Fa0/9
DLS1#
The show spanning-tree bridge command also provides detailed information about the current configuration of
the local bridge:
DLS1# show spanning-tree bridge ?
address Mac address of this bridge
detail Detailed of the status and configuration
forward-time Forward delay interval
hello-time Hello time
id Spanning tree bridge identifier
max-age Max age
priority Bridge priority of this bridge
protocol Spanning tree protocol
| Output modifiers
<cr>
VLAN0110
Spanning tree enabled protocol ieee
Root ID Priority 24686
Address e840.406f.6e00
Cost 19
Port 13 (FastEthernet0/11)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
As you can see, VLAN 110 has its Root Port on Fa0/11 and Fa0/12 is an Alternate Blocking Port. Note that despite the
switch not yet running Rapid STP, it recognizes the port roles as known by RSTP.
It is possible to manipulate which port becomes the Root Port on non-root bridges by manipulating the port cost value, or
by changing the port priority value. Remember that this change could have an impact on downstream switches as well.
For this example, we will examine both options.
Note: The changes you are about to implement are considered topology changes and could have a significant impact on
the overall structure of the spanning tree in your switch network. Do not make these changes in a production network
without careful planning and prior coordination.
The first change you will make will influence the Root Port election based on a change to the port cost. We will further
examine the impact of the changes to downstream switches.
To do this, issue the shutdown command on interfaces Fa0/9 and Fa0/10 on DLS1 and DLS2. Example from DLS1:
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# int ran f0/9-10
DLS1(config-if-range)# shut
DLS1(config-if-range)# exit
DLS1(config)#
Then, examine the VLAN 110 root values on ALS1:
The election of the Root Port is based on the lowest total path cost to the root bridge. The root path cost is a sum of all
of the Root Port costs between the local bridge and the root bridge. If the total path cost to the root bridge is the same
over multiple ports, then the port towards the neighbor switch that has the lowest Bridge ID is chosen as the Root Port.
If the local bridge has multiple connections to a neighbor bridge that is in the lowest-cost path, BDPUs sent from that
neighbor are examined and the BPDU containing the lowest sending Port-ID is chosen as the Root Port. In this case the
term "sending" refers to the switch and its port that forwarded the BPDU.
Notice in the output above that the root bridge for VLAN110 is reachable from ALS1 via Fa0/7 with a total root path cost
of 38 (19 for the Fa0/7 trunk between ALS1 and DLS1, and 19 for the trunk between DLS1 and DLS2).
On ALS2, change the spanning tree cost on interface Fa0/7 to 12.
ALS1's Root Port changed to F0/11, and the path cost to the Root Bridge changed to 31 (19 + 12).
The change you just made on ALS2 did not impact the Root Port from its perspective; it is still Fa0/7.
Next you will use port priority to modify which port is selected as the Root Port. For this exercise, we will focus on VLAN
100.
On DLS1, use show span vlan 100 to see what the priorities are (default to 128)
VLAN0100
Spanning tree enabled protocol ieee
Root ID Priority 24676
Address e840.406f.7280
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Next, examine ALS1 to find the root port for VLAN 100:
VLAN0100
Spanning tree enabled protocol ieee
Root ID Priority 24676
Address e840.406f.7280
Cost 19
Port 8 (FastEthernet0/8)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Notice that the priority value at ALS1 doesn't change, but the Root Port did, based on DLS1's advertised port priorities.
VLAN0110
Spanning tree enabled protocol ieee
Root ID Priority 24686
Address e840.406f.6e00
Cost 19
Port 14 (FastEthernet0/12)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
As you can see from the timestamps, it took a full 30 seconds for PVST to settle on Fa0/12 as the root port and move to
the Forwarding state on the Designated Ports. When Fa0/11 is reactivated:
DLS1(config-if)#no shut
*Mar 1 02:12:28.902: set portid: VLAN0110 Fa0/11: new port id 800D
*Mar 1 02:12:28.902: STP: VLAN0110 Fa0/11 -> listening
*Mar 1 02:12:29.900: STP: VLAN0110 new root port Fa0/11, cost 19
*Mar 1 02:12:29.900: STP: VLAN0110 sent Topology Change Notice on Fa0/11
*Mar 1 02:12:29.900: STP [110]: Generating TC trap for port FastEthernet0/12
*Mar 1 02:12:29.900: STP: VLAN0110 Fa0/12 -> blocking
*Mar 1 02:12:43.909: STP: VLAN0110 Fa0/11 -> learning
*Mar 1 02:12:58.916: STP[110]: Generating TC trap for port FastEthernet0/11
*Mar 1 02:12:58.916: STP: VLAN0110 sent Topology Change Notice on Fa0/11
*Mar 1 02:12:58.916: STP: VLAN0110 Fa0/11 -> forwarding
The re-convergence process took another full 30 seconds.
The running configuration shows you the protocol being used
DLS1# show run | inc spanning-tree mode
spanning-tree mode pvst
DLS1#
The issue with PVST is that its convergence is quite slow. The time for the transition between port states is called
forward-delay and by default, it is 15 seconds. In addition, the time until a BPDU stored on a port expires is called max-
age and is 20 seconds by default. Depending on the nature of a topological change, STP requires between 30 and 50
seconds to converge on a new loop-free topology.
Rapid Spanning Tree significantly reduces the time it takes to go from the Discarding (PVST: Blocking) to the
Forwarding state.
Configure Rapid Spanning Tree Protocol on DLS1. Use the clear spanning-tree detected-protocols
privileged EXEC command to flush any stored PVST information.
DLS1# conf t
DLS1(config)# spanning-tree mode rapid-pvst
DLS1(config)# end
DLS1#clear spanning-tree detected-protocols
DLS1#
Then verify the protocol. Use the show span vlan 110 command:
DLS1# show span vlan 110
VLAN0110
Spanning tree enabled protocol rstp
Root ID Priority 24686
Address e840.406f.6e00
Cost 19
Port 13 (FastEthernet0/11)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Take note of the Type field in the output. All of the other switches are still running PVST, which is noted here by the
entry Peer(STP).
Configure the rest of the switches to use Rapid Spanning Tree Protocol, then verify the protocol is running. An example
from DLS2:
DLS2# show span vlan 99
VLAN0099
Spanning tree enabled protocol rstp
To examine the impact of Rapid Spanning Tree on convergence time, use the debug spanning-tree events
command on DLS1 and watch how long re-convergence takes when interface Fa0/11 on DLS1 is shut down (Fa0/11 is
DLS1’s Root Port for VLAN 110). The output below has been manually filtered for VLAN 110 related messages only:
DLS1# debug spanning-tree events
Spanning Tree event debugging is on
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# int f0/11
DLS1(config-if)# shut
DLS1(config-if)#
*Mar 1 02:18:53.201: RSTP(110): updt roles, root port Fa0/11 going down
*Mar 1 02:18:53.201: RSTP(110): Fa0/12 is now root port
*Mar 1 02:18:53.201: RSTP(110): syncing port Fa0/7
*Mar 1 02:18:53.201: RSTP(110): syncing port Fa0/8
*Mar 1 02:18:53.226: STP[110]: Generating TC trap for port FastEthernet0/12
*Mar 1 02:18:53.242: RSTP(110): transmitting a proposal on Fa0/7
*Mar 1 02:18:53.242: RSTP(110): transmitting a proposal on Fa0/8
*Mar 1 02:18:55.189: %LINK-5-CHANGED: Interface FastEthernet0/11, changed state to
administratively down
*Mar 1 02:18:56.195: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed
state to down
In the output above, the change of Root Port and synchronization to interfaces Fa0/7 and Fa0/8 took less than six-tenths
of a second
DLS1(config-if)# no shut
DLS1(config-if)#
*Mar 1 02:22:38.368: RSTP(110): initializing port Fa0/11
*Mar 1 02:22:38.368: RSTP(110): Fa0/11 is now designated
*Mar 1 02:22:38.393: RSTP(110): transmitting a proposal on Fa0/11
*Mar 1 02:22:38.401: RSTP(110): updt roles, received superior bpdu on Fa0/11
*Mar 1 02:22:38.401: RSTP(110): Fa0/11 is now root port
*Mar 1 02:22:38.401: RSTP(110): Fa0/12 blocked by re-root
*Mar 1 02:22:38.409: RSTP(110): syncing port Fa0/7
*Mar 1 02:22:38.409: RSTP(110): syncing port Fa0/8
*Mar 1 02:22:38.409: RSTP(110): synced Fa0/11
*Mar 1 02:22:38.409: RSTP(110): Fa0/12 is now alternate
*Mar 1 02:22:38.418: STP[110]: Generating TC trap for port FastEthernet0/11
*Mar 1 02:22:38.435: RSTP(110): transmitting an agreement on Fa0/11 as a response to a
proposal
*Mar 1 02:22:38.435: RSTP(110): transmitting a proposal on Fa0/7
*Mar 1 02:22:38.435: RSTP(110): transmitting a proposal on Fa0/8
*Mar 1 02:22:38.653: %LINK-3-UPDOWN: Interface FastEthernet0/11, changed state to up
*Mar 1 02:22:39.659: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed
state to up
In the output above, Fa0/11 is brought back up, and the change of root port and synchronization to interfaces Fa0/7 and
Fa0/8 took one half second. This is a significant improvement from standard spanning tree.
As you can see in the output above, RSTP sees the interface come up, recognizes it as a Designated port, and starts
sending proposals. Now we will add the spanning-tree portfast command to the interface (the debug is still
running):
Note(1): PortFast should never be enabled on ports connected to another switches. Doing so could cause a switching
loop. RSTP and MSTP have their own mechanisms to put inter-switch links into Forwarding state rapidly.
Note(2): On trunk interfaces, configuring the spanning-tree portfast command will have no effect. This is a safety
precaution, as trunks are usually connected to other switches. However, in situations like inter-VLAN routing using a
router-on-stick, or when a trunk is being connected to a server that operates on multiple VLANs simultaneously, it may
still be advantageous, and safe, to allow this trunk to be treated as an edge port and become Forwarding as soon as it is
connected. In these cases, you can use the spanning-tree portfast trunk command on a trunk port to force a
switch to treat it as an edge port regardless of its operating mode. Be absolutely sure that the device connected to such
port is not performing Layer2 switching before using this command.
Note(3): Because the proper configuration of edge ports in RSTP and MSTP is of such great importance for proper
network performance, Cisco also provides the way of globally configuring the PortFast on all access ports using the
spanning-tree portfast default global configuration command. With this command configured, each port that
operates in the access mode will automatically have PortFast enabled. Trunk ports will not be affected. The logic of this
behavior is simple: Usually, trunk ports connect to other switch where PortFast should never be enabled, while access
ports usually connect to end devices.
Implement and Observe BPDU Guard
PortFast causes an interface to go into Forwarding state immediately. There is a risk that if two PortFast-enabled ports
are inadvertently or maliciously connected together, they will both come up as Forwarding ports, immediately creating a
switching loop.
The default, expected behavior of a PortFast port that receives a BPDU is for that port to revert to a normal spanning-
tree non-edge port. There is the potential that the load on a given switch might be too great to handle the received
BPDU properly, prolonging the loop condition.
BPDU Guard adds another layer of protection. Whenever a port protected by BPDU Guard unexpectedly receives a
BPDU, it is immediately put into err-disabled state. Any interfaces can be protected with BPDU Guard, but its typical use
in on PortFast-enabled ports.
BPDU Guard can be configured globally, or on a per-interface basis. If the BPDU Guard is configured on the global level
using the spanning-tree portfast bpduguard default command, the BPDU Guard will be automatically
enabled on all PortFast-enabled ports of the switch. If the BPDU Guard is configured on a particular interface using the
spanning-tree bpduguard enable command, it will apply to this port unconditionally, regardless of whether it is a
PortFast-enabled port.
For this example, we will configure BPDU guard on a trunking interface that is a non-root port on ALS2. Configuring
BPDU Guard on an interface that is intended to be a trunk is not a recommended practice; we are doing this just to
demonstrate the functionality of the tool.
ALS2# conf t
Enter configuration commands, one per line. End with CNTL/Z.
ALS2(config)# int f0/11
ALS2(config-if)# spanning-tree bpduguard enable
ALS2(config-if)# exit
ALS2(config)#
*Mar 1 02:30:57.792: %SPANTREE-2-BLOCK_BPDUGUARD: Received BPDU on port Fa0/11 with BPDU Guard
enabled. Disabling port.
*Mar 1 02:30:57.792: %PM-4-ERR_DISABLE: bpduguard error detected on Fa0/11, putting Fa0/11 in
err-disable state
*Mar 1 02:30:58.798: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed
state to down
*Mar 1 02:30:59.813: %LINK-3-UPDOWN: Interface FastEthernet0/11, changed state to down
As you can see, the interface is almost immediately err-disabled. Revert the configuration settings and issue the
shutdown and no shutdown commands on Fa0/11 to bring it back up.
You should see a BPDU being received at your host every 2 seconds.
Clear the Wireshark display filter and observe your packet capture window; you will have stopped receiving BPDUs.
From the ALS1 side of things, the root port is interface F0/8. Normally it would be F0/7, but we changed the port priority
of F0/8 to 112, and this impacts root port selection at ALS1 when all interfaces are operational:
ALS1# show span root | inc VLAN0100
VLAN0100 24676 e840.406f.7280 19 2 20 15 Fa0/8
Configure Root Guard on DLS1 interface Fa0/8 (you may immediately see errors with another VLAN, like 666. Ignore
these as we are focusing on VLAN 100):
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# int f0/8
DLS1(config-if)# spanning-tree guard root
DLS1(config-if)# exit
DLS1(config)#
Then go to ALS1 and configure it to be the root for VLAN 100 using the priority 16384
ALS1(config)# spanning-tree vlan 100 priority 16384
Then back at DLS1, check the spanning tree interface status for Fa0/8:
DLS1# show spanning-tree interface f0/8 | inc VLAN0100
VLAN0100 Desg BKN*19 112.10 P2p *ROOT_Inc
DLS1#
This output has two indicators of the issue. First BKN* is short for "BROKEN", and *ROOT_Inc represents the Root
Inconsistent message. A list of all STP inconsistent ports including the reason for their inconsistency can also be
requested with the command show spanning-tree inconsistentports.
DLS1#
To clear this, go back to ALS1 and issue the command no spanning-tree vlan 100 priority 16384. Once
you do this, you will see the following SYSLOG message at DLS1, and the interface will become consistent again.
DLS1#
*Mar 1 02:54:06.761: %SPANTREE-2-ROOTGUARD_UNBLOCK: Root guard unblocking port FastEthernet0/8
on VLAN0100.
DLS1# show spanning-tree interface f0/7 | inc VLAN0100
VLAN0100 Desg FWD 19 128.9 P2p
DLS1#
VLAN0100
Spanning tree enabled protocol rstp
Root ID Priority 24676
Address e840.406f.7280
Cost 31
Port 7 (FastEthernet0/7)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Here ALS2 tells us that its path to the root is via Fa0/7 (connected to DLS2) with a total cost of 31, while Fa0/11 and 12
(connected to ALS1) are Alternate ports. Fa0/11 and Fa0/12 are alternate ports because the interface cost plus the cost
advertised by ALS1 equals 39, which is greater than the local interface cost plus the cost advertised by DLS2. Fa0/7 has
a locally configured cost of 12. That plus the 19 advertised by DLS2 equals 31. You can see these details in the output
of show spanning-tree detail
Configure Loop Guard on ALS2s Fa0/11 interface:
Modify the corresponding interface (Fa0/11) on ALS1 to stop sending BPDUs:
ALS1(config)# int f0/11
ALS1(config-if)# spanning-tree bpdufilter enable
ALS1(config-if)# exit
Shortly after doing this, you should receive the following SYSLOG message on ALS2 for every VLAN that had Fa0/11 as
an Alternate port:
ALS2#
*Mar 1 03:22:36.795: %SPANTREE-2-LOOPGUARD_BLOCK: Loop guard blocking port FastEthernet0/11 on
VLAN0100.
*Mar 1 03:22:37.802: %SPANTREE-2-LOOPGUARD_BLOCK: Loop guard blocking port FastEthernet0/11 on
VLAN0099.
ALS2# show spanning-tree inconsistentports
ALS2#
End of Lab
Do not save your configurations. The equipment will be reset for the next lab.
8.2 CCNPv7.1_SWITCH_Lab4-2_MST_STUDENT.
LAB4-2_MST_STUDENT
Topology
Objectives
Background
Cisco’s Per VLAN Spanning Tree (PVST) provides a significant step up from standard spanning tree in terms
of flexibility, allowing each VLAN to have its own independent spanning tree, thereby make better use of
available links in the network. A drawback to PVST is that there is an instance of PVST running for each
VLAN in the network, regardless of whether there are actually different spanning-tree topologies required.
This presents the potential for overwhelming the switch CPU and memory. Additionally, Cisco switches
like those used in these labs allow only a limited number of PVST instances – usually 128. If more than
128 VLANs are created, some of them will not have any STP running, and therefore not have any
switching loop protection. PVST and Rapid PVST are simply unusable in that kind of environment. Lastly,
PVST and Rapid PVST are Cisco-proprietary protocols and generally unusable in mixed vendor environments.
Cisco was involved in the early development of Multiple Spanning Tree. MST was standardized as IEEE
802.1s in 2002 and merged into 802.1Q in 2005. MST is an open protocol derived from RSTP, sharing all its
rapid convergence properties, and in fact, the only standardized spanning- tree protocol for VLAN-based
networks supported by multiple vendors. MST is a compromise between common spanning-tree and per-
VLAN spanning tree. An MST instance represents a unique spanning-tree topology. Multiple MST instances
can be created to account for each of the required spanning-tree topologies in a network, and an
arbitrary number of VLANs can be mapped to a single MST instance.
In this lab you will set up two instances of MST, one for VLANs 99 and 100 and the other for VLANs 110
and 120. All other VLANs will be mapped to the default MST instance (also referred to as IST or Internal
Spanning Tree).
Note: This lab uses Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15.0(2)SE6 IP Services and LAN
Base images, respectively. The 3560 and 2960 switches are configured with the SDM templates “dual-ipv4-
and-ipv6 routing” and “lanbase-routing”, respectively. Depending on the switch model and Cisco IOS
Software version, the commands available and output produced might vary from what is shown in this lab.
Catalyst 3650 switches (running any Cisco IOS XE release) and Catalyst 2960-Plus switches (running any
comparable Cisco IOS image) can be used in place of the Catalyst 3560 switches and the Catalyst 2960
switches.
Required Resources
2 Cisco 2960 with the Cisco IOS Release 15.0(2)SE6 C2960-LANBASEK9-M or
comparable
2 Cisco 3560v2 with the Cisco IOS Release 15.0(2)SE6 C3560-IPSERVICESK9-M or
comparable
Computer with terminal emulation software
Ethernet and console cables
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# vtp domain SWLAB
DLS1(config)# vlan 99
DLS1(config- vlan)# name MANAGEMENT
DLS1(config- vlan)# vlan 100
DLS1(config- vlan)# name SERVERS
DLS1(config- vlan)# vlan 110
DLS1(config- vlan)# name GUEST
DLS1(config- vlan)# vlan 120
DLS1(config- vlan)# name OFFICE
DLS1(config- vlan)# vlan 999
DLS1(config- vlan)# name PARKING_LOT
DLS1(config- vlan)# state suspend
DLS1(config- vlan)# vlan 666
Verify that all of the VLANs propagate and that there is a single root bridge for all of the VLANs.
DLS1(config)#exit
MST0
----- -
DLS1#
For MST to work, the region must be named and given a revision number (this revision number does
not work like VTP, it is just an administrator-assigned value). All the switches in the same region must
have the same region name and revision number, and have the same VLAN-to-instance mapping.
MST region configuration is performed in a special mode under the global configuration that is
entered using the spanning-tree mst configuration command. You have to make the changes and exit
from configuration mode to have the changes applied; the changes are not applied until you exit. While in
MST configuration mode, you can use the show current and show pending commands to see how the
configuration stands. From DLS1:
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# spanning-tree mst configuration
----- -
0 1-4094
----- -
DLS1(config- mst)#
----- -
0 1-98,101-4094
1 99-100
----- -
DLS1(config- mst)#
DLS1(config- mst)#exit
DLS1(config)#end DLS1#
----- -
0 1-98,101-4094
1 99-100
----- - -
DLS1#
Wait a moment to let the topology settle and then issue the show spanning-tree mst
command on DLS1:
DLS1# show spanning-tree mst
----- -- - - - --
Fa0/7 Desg BLK 200000 128.9 P2p Bound(PVST)
Fa0/8 Desg BLK 200000 128.10 P2p Bound(PVST)
Fa0/9 Desg BLK 200000 128.11 P2p Bound(PVST)
Fa0/10 Desg BLK 200000 128.12 P2p Bound(PVST)
Fa0/11 Root FWD 200000 128.13 P2p
Fa0/12 Altn BLK 200000 128.14 P2p
----- -- - - - --
Fa0/7 Desg BLK 200000 128.9 P2p Bound(PVST)
Fa0/8 Desg BLK 200000 128.10 P2p Bound(PVST)
Fa0/9 Desg BLK 200000 128.11 P2p Bound(PVST)
Fa0/10 Desg BLK 200000 128.12 P2p Bound(PVST)
Fa0/11 Root FWD 200000 128.13 P2p
Fa0/12 Altn BLK 200000 128.14 P2p
DLS1
As you can see from the output above, the VLANs are mapped to the correct instance and the root
bridge for instance 1 is not the local switch (it is DLS2 in this case).
Notice the type entry P2p Bound(PVST). This is the entry shown when the device connected at the
other end of the given interface is not running MST; in this case, ALS1 and ALS2 are running the default
PVST.
From DLS2:
DLS2# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS2(config)# vtp version 3
DLS2(config)#
*Mar 1 00:49:27.386: %SW_VLAN-6-OLD_CONFIG_FILE_READ: Old version 2
VLAN configuration file detected and read OK. Version 3 files will
be written in the future.
DLS2(config)#
Note: An identical MST region configuration will be propagated to all switches within a VTPv3
domain, and consequently they will all form a single region. As a result, there is always a one-to-
one mapping between a VTPv3 domain and an MST region.
Step 14: Verify Initial MST Configuration
After the entire configuration is done, VTP version 3 will propagate the MST configuration to the other
switches. Verify this by checking ALS2:
ALS2# show spanning-tree mst configuration
Name [CCNP]
----- -
0 1-98,101-4094
1 99-100
----- -
Operational hello time 2 , forward delay 15, max age 20, txholdcount 6
Configured hello time 2 , forward delay 15, max age 20, max hops 20
----- -- - - - --
Fa0/7 Desg FWD 200000 128.7 P2p
Fa0/8 Desg FWD 200000 128.8 P2p
Fa0/9 Desg FWD 200000 128.9 P2p
Fa0/10 Desg FWD 200000 128.10 P2p
Fa0/11 Desg FWD 200000 128.11 P2p
Fa0/12 Desg FWD 200000 128.12 P2p
----- -- - - - --
Fa0/7 Desg FWD 200000 128.7 P2p
Fa0/8 Desg FWD 200000 128.8 P2p
Fa0/9 Desg FWD 200000 128.9 P2p
Fa0/10 Desg FWD 200000 128.10 P2p
Fa0/11 Desg FWD 200000 128.11 P2p
Fa0/12 Desg FWD 200000 128.12 P2p
Step 15: Modify MST Configuration
To further illustrate the convenience of MST and VTP version 3, add another instance on DLS2,
mapping VLANs 110 and 120 to it.
DLS2# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS2(config)# spanning-tree mst config
----- -
0 1-98,101-109,111-119,121-4094
1 99-100
2 110,120
----- -
DLS2(config- mst)#
DLS2(config- mst)# exit
DLS2(config)# end DLS2#
----- - -
0 1-98,101-109,111-119,121-4094
1 99-100
2 110,120
----- -
Operational hello time 2 , forward delay 15, max age 20, txholdcount 6
Configured hello time 2 , forward delay 15, max age 20, max hops 20
----- -- - - - --
----- -- - - - --
----- -- - - - --
An example of the show spanning-tree root command at DLS1 provides proof that the root bridge
is elsewhere:
DLS1# show spanning-tree root
----- -- - -- - -- - - -
Port costs, which are summed to find a path cost in the quest for a root bridge, are different in MST:
• 10 Mbps—2,000,000
• 100 Mbps—200,000
• 1 Gigabit Ethernet—20,000
• 10 Gigabit Ethernet—2,000
MST uses the same basic commands and values to manipulate the operation.
To manually configure a bridge to be the primary MST root, use the command spanning-tree
mst instance-list root {primary | secondary} global configuration command. You can also
manually set the bridge priority using the spanning-tree mst instance-list priority priority global
configuration command. In the example below, DLS1 is configured as the primary root for instance
0 and 1, and the secondary root for instance 2:
DLS1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)# spanning-tree mst 0-1 root primary
DLS1(config)# spanning-tree mst 2 root secondary
DLS1(config)# end
DLS1#
DSL2 is configured with a complementary set of instructions; root primary for instance 2 and root
secondary for instances 0 and 1:
DLS2# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS2(config)# spanning-tree mst 0-1 root secondary
DLS2(config)# spanning-tree mst 2 root primary DLS2(config)#
end
DLS2#
The results of these configuration changes are evident using the show spanning-tree root command.
From ALS1, which shows Fa0/7 (connected to DLS1) as the Root Port for instances 0 and 1 and
Fa0/9 (connected to DLS2) for instance 2:
ALS1# show spanning-tree root
Root Hello Max Fwd
MST Instance Root ID Cost Time Age Dly Root Port
----- -- - -- - -- - - -
MST0 24576 e840.406f.7280 0 2 20 15 Fa0/7
MST1 24577 e840.406f.7280 200000 2 20 15 Fa0/7
MST2 24578 e840.406f.6e00 200000 2 20 15 Fa0/9
ALS1#
As with PVST, Root Port selection is based on total path cost to the root bridge. Path cost is the sum
of Port Costs. You can configure the port costs using the spanning-tree mst instance cost value
interface configuration command, which sets the cost for that instance alone.
As an implementation example, we will shutdown interfaces Fa0/9-10 on DLS2 and then change the
port cost value of ALS2’s interface Fa0/7 to a lower number, causing the spanning tree for instance 2 to
go through ALS2.
On ALS2:
ALS2# config t
ALS2(config)# int f0/7
ALS2(config- if)# spanning-tree mst 2 cost 1000
ALS2(config- if)# exit
ALS2(config)# end
On DLS2:
DLS2# conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS2(config)# interface ran f0/9-10
----- -- - -- - -- - - -
Topology.
120
Objectives
Implement a Layer 3 EtherChannel
Implement Static Routing
Implement Inter-VLAN Routing
Background
Cisco's switching product line offers robust support for IP routing. It is common practice to use only multi-layer switching
in the distribution layer of the network, eliminating routers in all but special use cases, usually when a gateway interface
is required. Doing so provides many benefits in terms of cost and manageability. In this lab you will configure Inter-VLAN
routing on the multi-layer switches in your pod and then a Layer 3 EtherChannel link to interconnect them. You will
further configure one of your access-layer switches to support basic routing, and apply static routes so that there is
simple path control.
Note: This lab uses Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15.0(2)SE6 IP Services and LAN Base
images, respectively. The 3560 and 2960 switches are configured with the SDM templates “dual-ipv4-and-ipv6 routing”
and “lanbase-routing”, respectively. Depending on the switch model and Cisco IOS Software version, the commands
available and output produced might vary from what is shown in this lab. Catalyst 3650 switches (running any Cisco IOS
XE release) and Catalyst 2960-Plus switches (running any comparable Cisco IOS image) can be used in place of the
Catalyst 3560 switches and the Catalyst 2960 switches.
Required Resources
2 Cisco 2960 with the Cisco IOS Release 15.0(2)SE6 C2960-LANBASEK9-M or comparable
2 Cisco 3560v2 with the Cisco IOS Release 15.0(2)SE6 C3560-IPSERVICESK9-M or comparable
Computer with terminal emulation software
Ethernet and console cables
3 PCs with appropriate software
VLAN Name
99 MGMT1
100 (ALS1 only) LOCAL
110 INTERNODE
120 MGMT2
At this point, basic inter-vlan routing can be demonstrated using an attached host. Host D is attached to DLS2 via
interface Fa0/6. On DLS2, assign interface Fa0/6 to VLAN 110 and configure the host with the address 10.1.110.50/24
and default gateway of 10.1.110.1. Once you have done that, try and ping Loopback 1’s IP address (192.168.1.1). This
should work just like an external router; the switch will provide connectivity between two directly connected interfaces. In
the output below, the switchport host macro was used to quickly configure interface Fa0/6 with host-relative
commands:
DLS1(config-if-range)# no shut
DLS1(config-if-range)# exit
DLS1(config)# interface port-channel 2
DLS1(config-if)# ip address 172.16.12.1 255.255.255.252
DLS1(config-if)# no shut
DLS1(config-if)# exit
DLS1(config)#
Once you have configured both sides, verify that the EtherChannel link is up
Once done at both ends, verify connectivity by pinging from one switch to the other. In the example below, DLS2 pings
the Loopback 1 interface at DLS1.
ALS1(config-if-range)# no shut
ALS1(config-if-range)# exit
ALS1(config)# interface range f0/9-10
ALS1(config-if-range)# switchport mode trunk
ALS1(config-if-range)# switchport trunk allowed vlan 110
ALS1(config-if-range)# channel-group 4 mode desirable
Creating a port-channel interface Port-channel 4
ALS1(config-if-range)# no shut
ALS1(config-if-range)# exit
ALS1(config)#end
ALS1# show etherchannel summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - Layer3 S - Layer2
U - in use f - failed to allocate aggregator
Once that is all done, pings across the network should work, flowing across the layer 3 EtherChannel. An example from
ALS2:
ALS1(config)# ip routing
ALS1(config)# vlan 100
ALS1(config-vlan)# name LOCAL
ALS1(config-vlan)# exit
ALS1(config)# vlan 110
ALS1(config-vlan)# name INTERNODE
ALS1(config-vlan)# exit
ALS1(config)# int vlan 100
ALS1(config-if)# ip address 10.1.100.1 255.255.255.0
ALS1(config-if)# no shut
ALS1(config-if)# exit
ALS1(config)# int vlan 110
ALS1(config-if)# ip address 10.1.110.2 255.255.255.0
ALS1(config-if)# no shut
ALS1(config-if)# exit
ALS1(config)#
The output from the host shows that attempts to communicate with interface VLAN 99 at ALS1 were fulfilled locally, and
not sent to DLS1 for routing.
After configuring all of the required routes, test to see that the network behaves as expected.
LAB5-2_DHCP46_STUDENT
Topology
Objectives
Background
To practice the various configuration and options associated with DHCP for IPv4 and IPv6, you will
configure a DHCP server on switch DLS1. Hosts A and B will receive IP addresses from DLS1 and validate
continued connectivity.
Note: This lab uses Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15.0(2)SE6 IP Services and
LAN Base images, respectively. The 3560 and 2960 switches are configured with the SDM templates
“dual-ipv4-and- ipv6 routing” and “lanbase-routing”, respectively.
Depending on the switch model and Cisco IOS Software version, the commands available and output
produced might vary from what is shown in this lab. Catalyst 3650 switches (running any Cisco IOS XE
release) and Catalyst 2960-Plus switches (running any comparable Cisco IOS image) can be used in
place of the Catalyst 3560 switches and the Catalyst 2960 switches.
Required Resources
2 Cisco 2960 with the Cisco IOS Release 15.0(2)SE6 C2960-LANBASEK9-M or
comparable
2 Cisco 3560v2 with the Cisco IOS Release 15.0(2)SE6 C3560-IPSERVICESK9-M or
comparable
Computer with terminal emulation software
Ethernet and console cables
3 Windows 7 PCs with appropriate software
Step 6: Configure IPv4 DHCP server on DLS1 for VLAN 99 and 120
Configure a DHCP server for IPv4 on DLS1 using the following parameters:
10.1.120.104
Configure Interface F0/6 as an access port in VLAN 99 and issue the no shut command
'
CLI Attributes
DLSl4
DLSl4
Copy Pazde
CLI Attributes
Gigabit,thernetO/1
VlanSS
Example of VLAN 99 pool configuration:
DLS1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)#ip dhcp excluded-address 10.1.99.1 10.1.99.2
DLS1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
DLS1(config)#ipv6 dhcp pool MANAGEMENT_IPV6_DHCP
DLS1(config-dhcpv6)#dns-server 2001:db8:3115:99::100
DLS1(config-dhcpv6)#exit
DLS1(config)#interface vlan 99
DLS1(config- if)#ipv6 dhcp server MANAGEMENT_IPV6_DHCP
DLS1(config- if)#ipv6 nd other-config-flag
DLS1(config- if)#exit
DLS1(config)#end
DLS1#
Step 10: Configure DHCP Relay on DLS2 for the VLAN 120 network
Redirect IPv4 and IPv6 DHCP requests to DLS1 at 10.1.99.1 and 2001:db8:3115:99::d1
respectively
DLS2(config)# int vlan 120
DLS2(config- if)# ipv6 dhcp relay destination 2001:db8:3115:99::d1 po2
DLS2(config- if)# ip helper-address 10.1.99.1
DLS2(config- if)# exit
Step 12: Configure hosts for both IPv4 and IPv6 addresses
Hosts should be attached to interface F0/6 on DLS2, ALS1 and ALS2.
On ALS1, change interface F0/6 from an access port in VLAN 100 to an access port in
VLAN 99.
On ALS2, configure interface F0/6 as an access port in VLAN 120
On DLS2, verify F0/6 is configured as an access port in VLAN 110.
First, verify that Host D (connected to DLS2 F0/6) receives an IP address from the VLAN 110 pool.
For the rest of this step, you will work with Host A connected to ALS1.
Once the interface on ALS1 is associated with proper VLAN, use the commands appropriate to the PC
operating system to obtain IPv4 and IPv6 addressing.
For a computer with Windows 7 installed (must be machine administrator) : At the command prompt, issue
the command ipconfig /renew to get an IPv4 address and ipconfig /renew6 to get an IPv6 address.
In the ipconfig output above, notice that there are two IPv6 addresses. The first address listed,
2001:db8:3115:99:a940:91fe:38dd:da0c is a permanent address while the second address listed,
2001:db8:3115:99:75b4:31b7:6c26:50ad, is a temporary address.
Also notice that the interface portion of the permanent address is the same as the interface
portion of the link-local address.
The temporary address is generated automatically because privacy extensions are enabled.
The permanent address will be used in DNS registration and when this host is providing a service, while
the temporary address will be used when this host is serving in the client role and requesting services
from another host, with the idea that this helps provide some privacy to the host.
The temporary address is valid for one day then a new temporary address is generated and then the old
temporary address goes into a "deprecated" mode for seven days. The "active" temporary address may
also be referred to as "preferred".
The second thing to note is from the output of the route print -6 command:
The default route, expressed as ::/0, points to the link-local address of the default gateway; there is also
a route to the local IPv6 network 2001:db8:3115:99::/64 noted as "on link".
The M flag being received in the RA will cause the host to ask for a DHCP address. However, it will
also configure a SLAAC address using the prefix information in the RA. This is due to the fact that
the autoconfig flag is on by default. The “A” flag tel s the host to use the RA to build an address for
the interface. We will illustrate this with a very different DHCP prefix and a couple of packet captures
and debug outputs in a few moments.
autoconfig
We used different numbers on the DLS2 VLAN120 interface and the DHCP scope to
illustrate the impact of the autoconfig flag.
To make DLS2 remove the autoconfig flag from the RA, add the ipv6 nd prefix xx::/yy no-
autoconfig interface configuration command (xx::/yy is the prefix assigned to int VLAN 120).
Please note that as of this writing, the no-autoconfig parameter is hidden, so it will not appear in help
or tab-completion.
Note: Due to the way the values are stored, your Windows 7 host may not release the originally
configured addresses in the 2001::db8:3115:120::/64 network.
Now, reconfigure the DHCP pool at DLS1 to use the correct prefix for VLAN 120
(2001:db8:3115:120::/64), disable and re-enable the adapter on HOST B, and the host should receive a
single IPv6 address. Due to the fact that this is the same prefix, and the way Windows generates the
random interface ID, this will most likely be the same address.
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname DLS1
boot-start-marker
boot-end-marker
enable secret 5 $1$fGsq$T7aNeecM3pExyGr261H9R/
no aaa new-model
ip routing
no ip domain-lookup
ip domain-name CCNP.NET
dns-server 10.1.99.100
ip dhcp pool VLAN120_DHCP
dns-server 10.1.99.100
ipv6 unicast-routing
domain-name switch.ccnp
spanning-tree mode pvst
spanning-tree extend system-id
name MGMT1
interface Loopback1
interface Port-channel2
no switchport
interface FastEthernet0/1
shutdown
interface FastEthernet0/2
shutdown
interface FastEthernet0/3
shutdown
interface FastEthernet0/4
shutdown
interface FastEthernet0/5
shutdown
interface FastEthernet0/6
switchport access vlan 99
switchport mode access
spanning-tree portfast
interface FastEthernet0/7
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1-109,111-4094
switchport mode trunk
shutdown
interface FastEthernet0/10
shutdown
interface FastEthernet0/11
no switchport
no ip address
channel-group 2 mode desirable
interface FastEthernet0/12
no switchport
no ip address
shutdown
interface FastEthernet0/14
shutdown
interface FastEthernet0/15
shutdown
interface FastEthernet0/16
shutdown
interface FastEthernet0/17
shutdown
interface FastEthernet0/18
shutdown
interface FastEthernet0/19
shutdown
interface FastEthernet0/20
shutdown
interface FastEthernet0/21
shutdown
interface FastEthernet0/22
shutdown
interface FastEthernet0/23
shutdown
interface FastEthernet0/24
shutdown
interface GigabitEthernet0/1
shutdown
interface GigabitEthernet0/2
shutdown
interface Vlan1
no ip address
shutdown
interface Vlan99
ip address 10.1.99.1 255.255.255.0
ip http secure-server
ip route 0.0.0.0 0.0.0.0 Port-channel2 172.16.12.2
line con 0
exec-timeout 0 0
logging synchronous
line vty 0 4
password cisco
login
line vty 5 15
login
end
DLS2:
DLS2# show run | exclude !
Building configuration...
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname DLS2
boot-start-marker
boot-end-marker
no ip domain-lookup
ip domain-name CCNP.NET
ipv6 unicast-routing
spanning-tree mode pvst
name INTERNODE
vlan 120
name MGMT2
interface Loopback1
interface Port-channel3
switchport trunk encapsulation dot1q
switchport mode trunk
interface Port-channel4
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 110
switchport mode trunk
interface FastEthernet0/1
shutdown
interface FastEthernet0/2
shutdown
interface FastEthernet0/3
shutdown
interface FastEthernet0/4
shutdown
interface FastEthernet0/5
shutdown
interface FastEthernet0/6
switchport access vlan 110
switchport mode access
spanning-tree portfast
interface FastEthernet0/7
switchport trunk encapsulation dot1q
switchport mode trunk
no switchport
no ip address
no switchport
no ip address
shutdown
interface FastEthernet0/14
shutdown
interface FastEthernet0/15
shutdown
interface FastEthernet0/16
shutdown
interface FastEthernet0/17
shutdown
interface FastEthernet0/18
shutdown
interface FastEthernet0/19
shutdown
interface FastEthernet0/20
shutdown
interface FastEthernet0/21
shutdown
interface FastEthernet0/22
shutdown
interface FastEthernet0/23
shutdown
interface FastEthernet0/24
shutdown
interface GigabitEthernet0/1
shutdown
interface GigabitEthernet0/2
shutdown
interface Vlan1
no ip address
shutdown
interface Vlan110
ip address 10.1.110.1 255.255.255.0
interface Vlan120
ip address 10.1.120.1 255.255.255.0
ip helper-address 10.1.99.1
ip http secure-server
ip route 0.0.0.0 0.0.0.0 Port-channel2 172.16.12.1
line con 0
exec-timeout 0 0
logging synchronous
line vty 0 4
password cisco
login
line vty 5 15
login
end
ALS1:
ALS1# show run | exclude !
Building configuration...
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname ALS1
boot-start-marker
boot-end-marker
enable secret 5 $1$YDUK$0/lhaW7VU52.3OatxOK3J0
no aaa new-model
no ip domain-lookup
ip domain-name CCNP.NET
ipv6 unicast-routing
spanning-tree mode pvst
name MGMT1
vlan 100
name LOCAL
vlan 110
name INTERNODE
interface Port-channel1
interface Port-channel4
switchport trunk allowed vlan 110
switchport mode trunk
interface FastEthernet0/1
shutdown
interface FastEthernet0/2
shutdown
interface FastEthernet0/3
shutdown
interface FastEthernet0/4
shutdown
interface FastEthernet0/5
shutdown
interface FastEthernet0/6
switchport access vlan 99
switchport mode access
spanning-tree portfast
interface FastEthernet0/7
switchport trunk allowed vlan 1-109,111-4094
switchport mode trunk
shutdown
interface FastEthernet0/12
shutdown
interface FastEthernet0/13
shutdown
interface FastEthernet0/14
shutdown
interface FastEthernet0/15
shutdown
interface FastEthernet0/16
shutdown
interface FastEthernet0/17
shutdown
interface FastEthernet0/18
shutdown
interface FastEthernet0/19
shutdown
interface FastEthernet0/20
shutdown
interface FastEthernet0/21
shutdown
interface FastEthernet0/22
shutdown
interface FastEthernet0/23
shutdown
interface FastEthernet0/24
shutdown
interface GigabitEthernet0/1
shutdown
interface GigabitEthernet0/2
shutdown
interface Vlan1
no ip address
shutdown
interface Vlan99
ip address 10.1.99.2 255.255.255.0
interface Vlan100
ip address 10.1.100.1 255.255.255.0
interface Vlan110
ip default-gateway 10.1.99.1
ip http server
ip http secure-server
ip route 0.0.0.0 0.0.0.0 10.1.99.1
line con 0
exec-timeout 0 0
logging synchronous
line vty 0 4
password cisco
login
line vty 5 15
login
end
ALS2:
ALS2# show run | exclude !
Building configuration...
Current configuration : 2093 bytes
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname ALS2
boot-start-marker
boot-end-marker
no aaa new-model
ip domain-name CCNP.NET
ipv6 unicast-routing
spanning-tree mode pvst
spanning-tree extend system-id
name MGMT2
interface Port-channel3
switchport mode trunk
interface FastEthernet0/1
shutdown
interface FastEthernet0/2
shutdown
interface FastEthernet0/3
shutdown
interface FastEthernet0/4
shutdown
interface FastEthernet0/5
shutdown
interface FastEthernet0/6
switchport access vlan 120
switchport mode access
spanning-tree portfast
interface FastEthernet0/7
switchport mode trunk
shutdown
interface FastEthernet0/10
shutdown
interface FastEthernet0/11
shutdown
interface FastEthernet0/12
shutdown
interface FastEthernet0/13
shutdown
interface FastEthernet0/14
shutdown
interface FastEthernet0/15
shutdown
interface FastEthernet0/16
shutdown
interface FastEthernet0/17
shutdown
interface FastEthernet0/18
shutdown
interface FastEthernet0/19
shutdown
interface FastEthernet0/20
shutdown
interface FastEthernet0/21
shutdown
interface FastEthernet0/22
shutdown
interface FastEthernet0/23
shutdown
interface FastEthernet0/24
shutdown
interface GigabitEthernet0/1
shutdown
interface GigabitEthernet0/2
shutdown
interface Vlan1
no ip address
shutdown
interface Vlan120
ip address 10.1.120.2 255.255.255.0
ip default-gateway 10.1.120.1
ip http server
ip http secure-server
line con 0
exec-timeout 0 0
logging synchronous
line vty 0 4
login
line vty 5 15
login
end
rntexfaoe FasrBtherneto/EO
rntexfaoe FasrBtherneto/E3
intexfaoe FasrBtherneto/D4
intexfaoe WiqaAirBthernet0/3
me-aaams s o o o<.
@ DLS1
Copy Paste
9. CONCLUSIONES
Goyzueta, C. A. (21 de 01 de 2019). CCNPv7 SWITCH - Chapter 1 Lab Preparing the Switch.
Obtenido de youtube: https://www.youtube.com/watch?v=WBXjsXx4mVc
Learning, W. (29 de 07 de 2016). CCNPv7 Switch Lab 1 - Preparing the Switch. Obtenido de google:
https://www.youtube.com/watch?v=usgICse2vyo
Froom, R., Frahim, E. (2015). CISCO Press (Ed). Switch Fundamentals Review.
Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide CCNP
SWITCH 300-115. Recuperado de https://1drv.ms/b/s!AmIJYei-
NT1IlnWR0hoMxgBNv1CJ
Froom, R., Frahim, E. (2015). CISCO Press (Ed). Network Design Fundamentals.
Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide CCNP
SWITCH 300-115. Recuperado de https://1drv.ms/b/s!AmIJYei-
NT1IlnWR0hoMxgBNv1CJ
Froom, R., Frahim, E. (2015). CISCO Press (Ed). Campus Network Architecture.
Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide CCNP
SWITCH 300-115. Recuperado de https://1drv.ms/b/s!AmIJYei-
NT1IlnWR0hoMxgBNv1CJ
Froom, R., Frahim, E. (2015). CISCO Press (Ed). Spanning Tree Implementation.
Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide CCNP
SWITCH 300-115. Recuperado de https://1drv.ms/b/s!AmIJYei-
NT1IlnWR0hoMxgBNv1CJ
Froom, R., Frahim, E. (2015). CISCO Press (Ed). InterVLAN Routing. Implementing
Cisco IP Switched Networks (SWITCH) Foundation Learning Guide CCNP SWITCH 300-
115. Recuperado de https://1drv.ms/b/s!AmIJYei-NT1IlnWR0hoMxgBNv1CJ