All language subtitles for Free-CCNA-DTPVTP-Day-19-CCNA-200-301-Complete-Course_en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,859 --> 00:00:06,278 This is a free, complete course for the CCNA. 2 00:00:06,278 --> 00:00:10,609 If you like these videos, please subscribe\n 3 00:00:10,609 --> 00:00:15,539 Also, please like and leave a comment, and\n 4 00:00:18,989 --> 00:00:26,858 In this video we will cover two Cisco proprietary\n 5 00:00:26,859 --> 00:00:31,380 and VTP, VLAN trunking protocol. 6 00:00:31,379 --> 00:00:36,250 As I said, they are Cisco proprietary, meaning\n 7 00:00:37,890 --> 00:00:45,600 DTP and VTP were removed from the CCNA exam\n 8 00:00:45,600 --> 00:00:49,990 However, it’s important to know their function,\n 9 00:00:49,990 --> 00:00:53,780 on the exam even though they are not on the\ntopics list. 10 00:00:53,780 --> 00:00:56,270 So, what will we cover in this video? 11 00:00:58,899 --> 00:01:02,960 We will cover DTP, dynamic trunking protocol,\nfirst. 12 00:01:02,960 --> 00:01:08,219 DTP is a Cisco proprietary protocol that allows\n 13 00:01:08,219 --> 00:01:15,359 switchports to be either access ports or trunk\n 14 00:01:15,359 --> 00:01:19,040 Then we will cover VTP, VLAN trunking protocol. 15 00:01:19,040 --> 00:01:25,079 VTP is another Cisco proprietary protocol\n 16 00:01:25,078 --> 00:01:30,339 switch, which then acts as a server that other\n 17 00:01:30,340 --> 00:01:34,180 have to configure VLANs on every single switch\nin the network. 18 00:01:34,180 --> 00:01:39,380 Also, make sure you watch until the end of\n 19 00:01:39,379 --> 00:01:44,438 a question from ExSim for CCNA, by Boson Software. 20 00:01:44,438 --> 00:01:49,978 ExSim for CCNA is Boson’s set of practice\n 21 00:01:49,978 --> 00:01:54,069 as the best practice exams to get you ready\nfor the real thing. 22 00:01:54,069 --> 00:01:57,989 I used them myself for my CCNA and CCNP. 23 00:01:57,989 --> 00:02:02,608 If you want to get a copy of ExSim, follow\n 24 00:02:02,608 --> 00:02:06,289 Let’s go over some points about DTP. 25 00:02:06,290 --> 00:02:12,670 DTP is a Cisco proprietary protocol that allows\n 26 00:02:12,669 --> 00:02:17,339 interface status (access or trunk) without\nmanual configuration. 27 00:02:17,340 --> 00:02:23,689 Basically, two Cisco switches connected together\n 28 00:02:23,689 --> 00:02:26,240 will automatically be an access port. 29 00:02:26,240 --> 00:02:31,530 DTP is enabled by default on all Cisco switch\ninterfaces. 30 00:02:31,530 --> 00:02:37,620 Once again, because it is a proprietary protocol,\n 31 00:02:37,620 --> 00:02:43,090 So far, we have been manually configuring\n 32 00:02:45,680 --> 00:02:49,310 If we use DTP, we don’t need to enter these\ncommands. 33 00:02:49,310 --> 00:02:54,300 Now, for security purposes, manual configuration\nis recommended. 34 00:02:54,300 --> 00:02:57,730 DTP should be disabled on all switchports. 35 00:02:57,729 --> 00:03:03,310 DTP can be exploited by attackers, and I’ll\n 36 00:03:03,310 --> 00:03:08,330 this course, but for now just know that it\n 37 00:03:08,330 --> 00:03:11,050 Let’s go straight into the CLI. 38 00:03:11,050 --> 00:03:17,170 I’m in interface configuration mode here\n 39 00:03:17,169 --> 00:03:20,839 MODE, followed by the question mark. 40 00:03:20,840 --> 00:03:25,259 You can see the ACCESS and TRUNK options we\n 41 00:03:25,259 --> 00:03:28,709 look at now is this one, DYNAMIC. 42 00:03:28,709 --> 00:03:33,519 It says ‘set trunking mode to dynamically\n 43 00:03:34,919 --> 00:03:39,699 So, I entered DYNAMIC and used the question\nmark again. 44 00:03:39,699 --> 00:03:43,869 There are two options, AUTO and DESIRABLE. 45 00:03:43,870 --> 00:03:48,730 The only description given is ‘Set trunking\n 46 00:03:48,729 --> 00:03:52,090 or DESIRABLE’, which doesn’t really explain\ntheir function. 47 00:03:52,090 --> 00:03:56,049 So, let me explain each of these modes. 48 00:03:56,049 --> 00:04:01,180 A switchport in DYNAMIC DESIRABLE mode will\n 49 00:04:02,408 --> 00:04:07,209 It will form a trunk if connected to another\n 50 00:04:09,219 --> 00:04:14,550 switchport mode dynamic desirable, or switchport\n 51 00:04:17,069 --> 00:04:22,120 SW1 and SW2 are connected via their G0/0 interfaces. 52 00:04:22,120 --> 00:04:26,699 SW1’s G0/0 interface is in DYNAMIC DESIRABLE\nMODE. 53 00:04:26,699 --> 00:04:31,009 SW2’s G0/0 interface is manually configured\nas a trunk. 54 00:04:31,009 --> 00:04:35,610 So, these two switches will both agree to\noperate as trunks. 55 00:04:35,610 --> 00:04:40,840 Here is a new command, SHOW INTERFACES G0/0\nSWITCHPORT. 56 00:04:40,839 --> 00:04:45,379 These are just the first few lines of output,\n 57 00:04:45,379 --> 00:04:50,649 It says switchport: enabled, because it is\na layer 2 port. 58 00:04:50,649 --> 00:04:54,969 If we want to configure a routed port with\n 59 00:04:57,370 --> 00:05:01,439 The administrative mode is dynamic desirable. 60 00:05:01,439 --> 00:05:06,279 Administrative mode is what we actually configured\n 61 00:05:06,279 --> 00:05:10,469 mode, displays whether it is a trunk or access\nport. 62 00:05:10,470 --> 00:05:15,570 Because SW2’s interface is a trunk, SW1’s\n 63 00:05:18,220 --> 00:05:25,080 Here on SW2 you can see that both the administrative\n 64 00:05:25,079 --> 00:05:28,560 Now both interfaces are configured in dynamic\ndesirable mode. 65 00:05:28,560 --> 00:05:31,449 So, they will both form a trunk. 66 00:05:31,449 --> 00:05:37,120 The output of SHOW INTERFACES SWITCHPORT is\n 67 00:05:37,120 --> 00:05:42,889 an administrative mode of ‘dynamic desirable’,\n 68 00:05:42,889 --> 00:05:48,019 because both switches are actively using DTP\n 69 00:05:48,019 --> 00:05:53,279 Even if manually configured as a trunk, an\n 70 00:05:55,519 --> 00:05:59,509 This time SW2’s interface is configured\nin dynamic auto mode. 71 00:05:59,509 --> 00:06:03,089 A switchport in dynamic auto mode does not\n 72 00:06:04,860 --> 00:06:09,571 It will tell SW1 ‘if you want to form a\n 73 00:06:09,571 --> 00:06:12,460 going to actively try to form a trunk with\nyou.’ 74 00:06:12,459 --> 00:06:18,149 However, because SW1 is in dynamic desirable\n 75 00:06:18,149 --> 00:06:24,159 SW1’s SHOW INTERFACES SWITCHPORT output\n 76 00:06:24,160 --> 00:06:29,790 mode of dynamic auto, and again an operational\nmode of trunk. 77 00:06:29,790 --> 00:06:34,920 One more example: SW2’s interface is now\n 78 00:06:34,920 --> 00:06:37,830 the SWITCHPORT MODE ACCESS command. 79 00:06:37,829 --> 00:06:43,250 SW1 is actively trying to form a trunk, but\n 80 00:06:43,250 --> 00:06:48,680 mode, the trunk will not form, and both will\n 81 00:06:51,379 --> 00:06:57,050 The output of SHOW INTERFACES SWITCHPORT on\n 82 00:06:58,110 --> 00:07:00,360 What does ‘static access’ mean? 83 00:07:00,360 --> 00:07:05,121 ‘static access’ means an access port that\n 84 00:07:05,120 --> 00:07:08,579 (unless you configure a different VLAN). 85 00:07:08,579 --> 00:07:13,399 There are also ‘dynamic access’ ports,\n 86 00:07:13,399 --> 00:07:17,019 VLAN depending on the MAC address of the connected\ndevice. 87 00:07:17,019 --> 00:07:21,240 But this is out of the scope of the CCNA, you\n 88 00:07:21,240 --> 00:07:25,389 ports, I just wanted to clarify what ‘static\naccess’ means. 89 00:07:25,389 --> 00:07:32,659 Now, on SW2’s g0/0 interface both the administrative\n 90 00:07:32,660 --> 00:07:38,081 Okay, now you’ve learned about dynamic desirable\n 91 00:07:38,081 --> 00:07:43,500 desirable mode will use DTP negotiation to\n 92 00:07:43,500 --> 00:07:48,810 the other device is in trunk, dynamic desirable,\n 93 00:07:48,810 --> 00:07:54,079 However, if the other interface is in access\n 94 00:07:55,129 --> 00:07:59,060 Now let’s look at dynamic auto mode. 95 00:07:59,060 --> 00:08:04,160 A switchport in dynamic auto mode will NOT\n 96 00:08:04,160 --> 00:08:09,100 switches, however it will form a trunk if\n 97 00:08:11,009 --> 00:08:16,019 It will form a trunk with a switchport in\n 98 00:08:16,019 --> 00:08:19,289 or switchport mode dynamic desirable. 99 00:08:19,290 --> 00:08:26,710 So, SW1’s G0/0 interface is configured in\n 100 00:08:28,160 --> 00:08:32,690 Therefore, DTP negotiation will cause them\nto form a trunk link. 101 00:08:32,690 --> 00:08:38,180 Here you can see the administrative mode of\n 102 00:08:41,629 --> 00:08:47,649 Now, we already saw what happens when a switchport\n 103 00:08:47,649 --> 00:08:50,309 in dynamic desirable mode, they form a trunk. 104 00:08:50,309 --> 00:08:54,079 So, let’s look at two switchports in dynamic\nauto mode. 105 00:08:54,080 --> 00:08:59,190 Neither is actively trying to form a trunk,\n 106 00:09:01,059 --> 00:09:06,179 And they have the same output for the SHOW\n 107 00:09:06,191 --> 00:09:11,710 mode of dynamic auto and operational mode\nof static access. 108 00:09:11,710 --> 00:09:14,450 Next up, dynamic auto and access mode. 109 00:09:14,450 --> 00:09:21,160 As you can probably guess, this will result\n 110 00:09:21,159 --> 00:09:25,589 Here is the output of SHOW INTERFACES SWITCHPORT\non each switch. 111 00:09:25,590 --> 00:09:32,030 Now, you may wonder what happens if a manually\n 112 00:09:33,409 --> 00:09:38,919 Well, since both are manually configured,\n 113 00:09:41,139 --> 00:09:44,860 Here is the output of SHOW INTERFACES SWITCHPORT\nfor each. 114 00:09:44,860 --> 00:09:49,830 However, this configuration does not work,\n 115 00:09:49,830 --> 00:09:52,180 will not pass between these switches. 116 00:09:52,179 --> 00:09:57,299 Here’s a chart summarizing the resulting\n 117 00:09:58,710 --> 00:10:03,370 For example, a switchport in dynamic desirable\n 118 00:10:03,370 --> 00:10:06,700 any administrative mode except access. 119 00:10:06,700 --> 00:10:10,330 Pause the video here if you want to take a\nlook at this table. 120 00:10:13,440 --> 00:10:18,220 DTP will not form a trunk with a router, PC,\netc. 121 00:10:18,220 --> 00:10:19,990 The switchport will be in access mode. 122 00:10:19,990 --> 00:10:25,710 So, if you want to configure router on a stick,\n 123 00:10:25,710 --> 00:10:30,820 connected to the router as a trunk, you cannot\n 124 00:10:33,889 --> 00:10:37,189 Let me cover a few more points about DTP. 125 00:10:37,190 --> 00:10:43,510 On older switches, switchport mode dynamic\n 126 00:10:43,509 --> 00:10:46,059 They will actively try to form trunk links. 127 00:10:46,059 --> 00:10:51,750 However, on newer switchers, switchport mode\n 128 00:10:53,230 --> 00:11:00,269 You can disable DTP negotiation on an interface\n 129 00:11:00,269 --> 00:11:06,029 If you use this command, the interface will\n 130 00:11:06,029 --> 00:11:12,240 By the way, configuring an access port with\n 131 00:11:13,899 --> 00:11:17,039 It will also stop sending DTP frames. 132 00:11:17,039 --> 00:11:21,339 If you manually configure an interface in\n 133 00:11:21,340 --> 00:11:28,009 sending DTP frames, unless you also issue\n 134 00:11:28,009 --> 00:11:33,759 As I said before, it is recommended that you\n 135 00:11:33,759 --> 00:11:37,759 configure them as access or trunk ports. 136 00:11:37,820 --> 00:11:42,320 Now let me talk about trunk encapsulation negotiation. 137 00:11:42,320 --> 00:11:48,340 Switches that support both dot1q and ISL trunk\n 138 00:11:51,059 --> 00:11:56,840 This negotiation is enabled by default, as\n 139 00:11:56,841 --> 00:11:59,129 trunk encapsulation negotiate. 140 00:11:59,129 --> 00:12:03,250 I mentioned this in a previous video on VLANs. 141 00:12:03,250 --> 00:12:07,990 If you want to manually configure a trunk\n 142 00:12:07,990 --> 00:12:14,299 and ISL, you must first change the encapsulation\n 143 00:12:16,009 --> 00:12:23,549 ISL is favored over dot1q, so if both switches\n 144 00:12:23,549 --> 00:12:30,729 By the way, the DTP frames that DTP uses to\n 145 00:12:30,730 --> 00:12:34,090 or in the native VLAN when using dot1q. 146 00:12:34,090 --> 00:12:39,180 The default native VLAN is VLAN1, however,\n 147 00:12:39,179 --> 00:12:42,000 will be sent in VLAN1 for dot1q also. 148 00:12:42,000 --> 00:12:49,200 To show you this negotiation of trunking encapsulation,\n 149 00:12:51,929 --> 00:12:58,229 I set the interfaces on both switches to dynamic\n 150 00:12:58,230 --> 00:13:02,960 Notice that the default trunking encapsulation\n 151 00:13:06,269 --> 00:13:12,129 By the way, this field down here, negotiation\n 152 00:13:12,129 --> 00:13:16,269 whether the interface is sending DTP frames\nor not. 153 00:13:16,269 --> 00:13:21,949 If the interface is in dynamic desirable,\n 154 00:13:24,169 --> 00:13:28,919 If it’s in access mode, or if you use the\n 155 00:13:30,929 --> 00:13:35,359 Okay, that was a good deal of information\nabout DTP. 156 00:13:35,360 --> 00:13:39,740 I’m quite sure that you won’t need any\n 157 00:13:42,610 --> 00:13:47,539 If you need extra review, watch the section\n 158 00:13:47,539 --> 00:13:52,899 tracer yourself, and then try my packet tracer\n 159 00:13:52,899 --> 00:14:00,490 Next, let’s move on to today’s second\n 160 00:14:00,490 --> 00:14:06,759 VTP allows you to configure VLANs on a central server switch, and 161 00:14:06,759 --> 00:14:12,029 VTP clients) will synchronize their VLAN database\nto the server. 162 00:14:12,029 --> 00:14:16,689 It is designed for large networks with many\n 163 00:14:16,690 --> 00:14:19,440 each VLAN on every single switch. 164 00:14:19,440 --> 00:14:26,200 However, like DTP it is rarely used, and it\n 165 00:14:26,200 --> 00:14:30,910 I will show you one reason why it is recommended\n 166 00:14:30,909 --> 00:14:35,528 There are three versions of VTP, 1, 2 and\n3. 167 00:14:35,528 --> 00:14:40,689 Most modern Cisco switches support all three,\n 168 00:14:42,100 --> 00:14:46,159 I will talk about some differences in each\nversion as we go. 169 00:14:46,159 --> 00:14:54,029 There are three VTP modes that a switch can\n 170 00:14:54,029 --> 00:14:57,980 Cisco switches operate in VTP server mode\nby default. 171 00:14:57,980 --> 00:15:02,350 Let’s talk about the different VTP modes. 172 00:15:02,350 --> 00:15:09,040 First up, VTP servers. They can add, modify, and\ndelete VLANs. 173 00:15:09,039 --> 00:15:14,599 As I said, Cisco switches operate in VTP server\n 174 00:15:14,600 --> 00:15:18,050 database on Cisco switches by default. 175 00:15:18,049 --> 00:15:24,250 They store the VLAN database in non-volatile\n 176 00:15:24,250 --> 00:15:29,580 This means the VLAN database is saved even\n 177 00:15:29,580 --> 00:15:37,790 VTP servers will increase the REVISION NUMBER\n 178 00:15:37,789 --> 00:15:40,819 This revision number is a very important part\nof VTP. 179 00:15:40,820 --> 00:15:46,680 It’s what VTP uses to determine the newest\n 180 00:15:46,679 --> 00:15:49,250 that the switches will synchronize to. 181 00:15:49,250 --> 00:15:55,710 VTP servers will advertise the latest version\n 182 00:15:55,710 --> 00:15:59,860 the VTP clients will synchronize their VLAN\ndatabase to it. 183 00:15:59,860 --> 00:16:05,919 So, VTP advertisements aren’t sent on access\n 184 00:16:05,919 --> 00:16:13,069 Here’s another important point: VTP servers\n 185 00:16:14,539 --> 00:16:19,629 It means that a VTP server will synchronize\n 186 00:16:19,629 --> 00:16:24,669 number, because the highest revision number\n 187 00:16:27,379 --> 00:16:30,120 Now let’s talk about VTP clients a little. 188 00:16:30,120 --> 00:16:35,389 VTP clients cannot add, modify, or delete\nVLANs. 189 00:16:35,389 --> 00:16:41,319 If you try to add, modify, or delete a VLAN\n 190 00:16:41,320 --> 00:16:48,430 VTP clients do not store the VLAN database\n 191 00:16:50,970 --> 00:16:56,028 VTP clients will synchronize their VLAN database\n 192 00:16:58,080 --> 00:17:01,470 I will talk about VTP domains soon. 193 00:17:01,470 --> 00:17:07,279 Finally, VTP clients will advertise their\n 194 00:17:07,279 --> 00:17:09,759 to other clients over their trunk ports. 195 00:17:09,759 --> 00:17:12,789 Okay, that’s enough information for now. 196 00:17:12,789 --> 00:17:19,159 I will talk about the third VTP mode, VTP\ntransparent, later. 197 00:17:19,160 --> 00:17:21,670 So let’s look at how VTP works. 198 00:17:21,670 --> 00:17:26,370 These are four switches, and I’ve configured\n 199 00:17:26,369 --> 00:17:31,159 will send and receive VTP advertisements between\neach other. 200 00:17:31,160 --> 00:17:37,509 Here is the output of a very useful command,\n 201 00:17:37,509 --> 00:17:42,690 All of these switches have the default configuration,\n 202 00:17:42,690 --> 00:17:46,400 Let’s look at some of these fields. 203 00:17:46,400 --> 00:17:52,100 These fields here shows that the switch is\n 204 00:17:52,099 --> 00:17:55,449 but it is running version 1 at the moment,\nthe default. 205 00:17:55,450 --> 00:17:59,130 Notice that there is no domain name. 206 00:17:59,130 --> 00:18:03,470 By default the domain name is NULL, there\nis no domain name. 207 00:18:03,470 --> 00:18:07,680 If we want VTP to synchronize among these\n 208 00:18:07,680 --> 00:18:10,960 with the same VTP domain name. 209 00:18:12,329 --> 00:18:16,889 You can see the default VTP operating mode\nof server. 210 00:18:16,890 --> 00:18:21,810 Notice the maximum number of VLANs supported\nlocally is 1005. 211 00:18:21,809 --> 00:18:27,399 This is because VTP version 1 and version\n 212 00:18:30,329 --> 00:18:35,308 Only version 3 supports them, so if you want\n 213 00:18:38,420 --> 00:18:44,190 The number of existing VLANs is 5, those are\n 214 00:18:48,000 --> 00:18:51,910 Finally, look at the configuration reivision\nnumber. 215 00:18:53,710 --> 00:18:59,700 If I add, modify, or delete a VLAN this will\n 216 00:18:59,700 --> 00:19:02,799 to VTP clients in the same domain. 217 00:19:02,799 --> 00:19:07,480 It will also update its own VLAN database\n 218 00:19:07,480 --> 00:19:12,529 revision number, because VTP servers function\n 219 00:19:12,529 --> 00:19:20,720 So, I used the command VTP DOMAIN CISCO to\n 220 00:19:20,720 --> 00:19:26,009 I then made a vlan, VLAN10, and named it engineering. 221 00:19:26,009 --> 00:19:32,770 So, because I added a VLAN, if I do SHOW VTP\n 222 00:19:35,420 --> 00:19:40,769 You can now see that the VTP domain name has\n 223 00:19:40,769 --> 00:19:44,349 is 6, and the revision number has increased\nto 1. 224 00:19:44,349 --> 00:19:47,539 Now let’s go check on the other switches. 225 00:19:47,539 --> 00:19:51,259 Okay, so something interesting has occurred. 226 00:19:51,259 --> 00:19:57,029 Without any configuration, SW2 has changed\n 227 00:19:57,029 --> 00:20:02,240 database to match SW1’s, with a revision\nnumber of 1. 228 00:20:02,240 --> 00:20:08,820 If a switch with no VTP domain (or domain NULL)\n 229 00:20:08,820 --> 00:20:12,829 name, it will automatically join that VTP\ndomain. 230 00:20:12,829 --> 00:20:17,730 So, SW2 automatically joined the domain cisco. 231 00:20:17,730 --> 00:20:23,250 As I said before, If a switch receives a VTP\n 232 00:20:23,250 --> 00:20:28,650 a higher revision number, it will update its\n 233 00:20:28,650 --> 00:20:35,790 If I do SHOW VLAN BRIEF on SW2 now, you can\n 234 00:20:37,539 --> 00:20:43,790 Here you can see that the advertisements were\n 235 00:20:43,790 --> 00:20:47,220 joined the domain and updated their VLAN database\nas well. 236 00:20:47,220 --> 00:20:54,670 Since you’ve seen how VTP sync works, let\n 237 00:20:54,670 --> 00:21:00,789 an old switch with a higher revision number\n 238 00:21:00,789 --> 00:21:05,789 all switches in the domain will sync their\n 239 00:21:05,789 --> 00:21:10,010 This could cause all of the hosts on your\n 240 00:21:10,010 --> 00:21:14,619 the switches could sync to a totally different\n 241 00:21:16,480 --> 00:21:22,299 This is one reason why VTP is usually not\n 242 00:21:22,299 --> 00:21:27,419 Just to demonstrate that, let’s say this\n 243 00:21:27,420 --> 00:21:32,830 5, and VLANs 1, 10, 20, 30, and 40. 244 00:21:32,829 --> 00:21:37,279 Then you take an old switch your company used\n 245 00:21:37,279 --> 00:21:42,660 has a revision number of 50, and VLANS1, 99,\nand 220. 246 00:21:42,660 --> 00:21:47,110 It will send VTP advertisements with this\n 247 00:21:48,890 --> 00:21:53,840 All of these switches will update their VLAN\n 248 00:21:53,839 --> 00:21:59,599 10,20,30, and 40 will suddenly lose connectivity. 249 00:21:59,599 --> 00:22:03,449 Next let me talk about VTP transparent mode. 250 00:22:03,450 --> 00:22:09,370 Switches in VTP transparent mode do not participate\n 251 00:22:09,369 --> 00:22:13,309 VLAN database to the VTP server. 252 00:22:13,309 --> 00:22:18,369 VTP transparent mode maintains its own independent\n 253 00:22:18,369 --> 00:22:25,619 It can add, modify, or delete VLANs, but they won’t\n 254 00:22:25,619 --> 00:22:30,389 Although it doesn’t sync its VLAN database,\n 255 00:22:30,390 --> 00:22:36,041 trunk ports, if the VTP advertisement is in\n 256 00:22:39,369 --> 00:22:44,798 So let’s compare the functionality of server,\n 257 00:22:44,798 --> 00:22:49,369 I set SW2 to client mode with the command\nVTP MODE CLIENT. 258 00:22:49,369 --> 00:22:56,049 Afterward, I tried to create VLAN20 on the\n 259 00:22:56,049 --> 00:22:59,548 because SW2 is now in client mode. 260 00:22:59,548 --> 00:23:04,349 Then I set SW3 to transparent mode with VTP\nMODE TRANSPARENT. 261 00:23:04,349 --> 00:23:09,230 Also, to show you that a transparent mode\n 262 00:23:09,230 --> 00:23:13,539 in a different domain, I changed the domain\nname to juniper. 263 00:23:13,539 --> 00:23:21,079 So, I created VLAN 20, named sales, on SW1\n 264 00:23:23,250 --> 00:23:28,200 Then I did show vtp status, and you can see\n 265 00:23:29,509 --> 00:23:33,539 It should be 2 I think, but I made a few other\n 266 00:23:34,859 --> 00:23:39,579 Anyway, let’s see check out SW2. 267 00:23:39,579 --> 00:23:46,710 As you can see, the VTP client SW2 has indeed\n 268 00:23:46,710 --> 00:23:49,950 now has the same revision number, 4. 269 00:23:49,950 --> 00:23:54,480 How about the transparent switch, SW3? 270 00:23:54,480 --> 00:24:01,079 As expected, on the transparent switch SW3,\n 271 00:24:03,660 --> 00:24:09,850 Changing the VTP domain to an unused domain\n 272 00:24:09,849 --> 00:24:14,730 Changing the VTP mode to transparent will\n 273 00:24:14,730 --> 00:24:19,610 So, if you’re going to plug an old switch\n 274 00:24:19,609 --> 00:24:25,579 that uses VTP, make sure to reset the revision\n 275 00:24:25,579 --> 00:24:29,730 it doesn’t overwrite your network’s VLAN\nconfigurations. 276 00:24:29,730 --> 00:24:36,269 Now, the question is whether SW4 will have\n 277 00:24:36,269 --> 00:24:42,529 Remember, SW3 is in transparent mode in a\n 278 00:24:42,529 --> 00:24:45,079 the VTP advertisements to SW4. 279 00:24:45,079 --> 00:24:51,869 Indeed, SW4 does not have VLAN20, and it is\n 280 00:24:51,869 --> 00:24:58,739 So, what can we do to make SW3 start forwarding\n 281 00:24:58,740 --> 00:25:04,190 If we change the VTP domain on SW3 back to\n 282 00:25:04,190 --> 00:25:11,610 to SW4, even though SW3 itself won’t sync\n 283 00:25:11,609 --> 00:25:16,469 So, I changed the VTP domain on SW3 back to\ncisco. 284 00:25:16,470 --> 00:25:22,308 I also created some new VLANs on SW1 to increase\n 285 00:25:22,308 --> 00:25:28,480 by the way, and now you can see that SW3 did\n 286 00:25:28,480 --> 00:25:33,509 and SW4 synced its VLAN database to SW1 and\nSW2. 287 00:25:33,509 --> 00:25:38,670 Finally, I’ll just talk about VTP version\na little bit. 288 00:25:38,670 --> 00:25:44,029 To change the VTP version, use the VTP VERSION\ncommand. 289 00:25:44,029 --> 00:25:48,680 Changing the VTP version increases the revision\n 290 00:25:48,680 --> 00:25:52,090 this new revision number will be sent. 291 00:25:52,089 --> 00:25:57,490 Other servers and clients will then sync and\n 292 00:25:57,490 --> 00:26:03,740 For example here is SW4, it is now running\n 293 00:26:06,140 --> 00:26:11,290 As for the difference between VTP version\n 294 00:26:11,289 --> 00:26:17,220 from Cisco: VTP V2 is not much different than\nVTP V1. 295 00:26:17,220 --> 00:26:24,190 The major difference is that VTP V2 introduces\n 296 00:26:24,190 --> 00:26:28,660 If you use Token Ring VLANs, you must enable\nVTP V2. 297 00:26:28,660 --> 00:26:32,990 Otherwise, there is no reason to use VTP V2. 298 00:26:32,990 --> 00:26:38,480 Token ring is an old technology, so really\n 299 00:26:38,480 --> 00:26:43,990 As for version 3, it has quite a few differences\n 300 00:26:43,990 --> 00:26:47,349 the scope of the CCNA, so we’ll leave it\nhere. 301 00:26:47,349 --> 00:26:51,719 Okay here’s the first slide on VTP again. 302 00:26:51,720 --> 00:26:56,669 To be honest, there is still lots more I can\n 303 00:26:58,549 --> 00:27:03,629 Again, it isn’t on the exam topics list,\n 304 00:27:03,630 --> 00:27:08,850 VTP and its purpose, so I wanted to tell you\n 305 00:27:08,849 --> 00:27:13,029 If you learn and remember the information\n 306 00:27:13,029 --> 00:27:17,029 that should be more than enough for the CCNA\nexam. 307 00:27:17,029 --> 00:27:23,049 Basically, just know the purpose of VTP, the\n 308 00:27:23,049 --> 00:27:28,210 mode, know that switches operate in server\n 309 00:27:28,210 --> 00:27:32,299 clients too, and know about revision numbers. 310 00:27:32,299 --> 00:27:37,009 If you know all of that, you should be fine. 311 00:27:37,009 --> 00:27:41,538 So before moving on to today’s quiz let’s\n 312 00:27:41,538 --> 00:27:46,750 We looked at DTP first, which is a protocol\n 313 00:27:46,750 --> 00:27:50,210 with other Cisco switches, without manual\nconfiguration. 314 00:27:50,210 --> 00:27:56,500 However, it’s recommended that you disable\n 315 00:27:56,500 --> 00:28:01,849 Then we looked at VTP, another Cisco proprietary\n 316 00:28:01,849 --> 00:28:07,668 on switches that operate as central VTP servers,\n 317 00:28:07,669 --> 00:28:12,759 and VTP client switches sync their database\nto it. 318 00:28:12,759 --> 00:28:17,700 Note that VTP only syncs the VLAN database,\n 319 00:28:17,700 --> 00:28:24,230 on each switch separately, for example SWITCHPORT\n 320 00:28:24,230 --> 00:28:29,170 VTP does not automatically assign interfaces\nto VLANs. 321 00:28:29,170 --> 00:28:33,679 Both of these protocols are no longer on the\n 322 00:28:33,679 --> 00:28:37,780 them and their basic functions, you may get\n 323 00:28:37,779 --> 00:28:42,029 Okay let’s move on to today’s quiz. 324 00:28:42,029 --> 00:28:47,720 As a bonus, I will also feature one practice\n 325 00:28:47,720 --> 00:28:52,240 set of practice exams I highly recommend you\n 326 00:28:52,240 --> 00:28:55,849 Check out ExSim via the link in the video\ndescription. 327 00:28:55,849 --> 00:29:00,009 Okay, let’s go to question 1 of today’s\nquiz. 328 00:29:00,009 --> 00:29:07,160 SW1 and SW2 are connected, are both new switches,\n 329 00:29:08,599 --> 00:29:15,399 However, SW2’s power supply fails so you\n 330 00:29:16,869 --> 00:29:21,949 You reset the configuration before connecting\n 331 00:29:21,950 --> 00:29:25,170 that a trunk is formed between the two switches. 332 00:29:27,160 --> 00:29:32,670 A, interfaces on old switches default to switchport\nmode trunk. 333 00:29:32,670 --> 00:29:38,900 B, interfaces on old switches default to switchport\n 334 00:29:38,900 --> 00:29:43,570 Or C, access ports are a feature of newer\nswitches. 335 00:29:43,569 --> 00:29:50,470 Pause the video to think about your answer. 336 00:29:50,470 --> 00:29:57,329 The answer is B, interfaces on old switches\n 337 00:29:57,329 --> 00:29:59,819 Newer switches default to dynamic auto. 338 00:29:59,819 --> 00:30:06,399 So, in this case SW1’s interface is probably\n 339 00:30:06,400 --> 00:30:10,910 switch’s interface is probably in dynamic\n 340 00:30:13,859 --> 00:30:20,459 SW1 is connected to SW2, and SW2 is connected\nto SW3. 341 00:30:20,460 --> 00:30:26,860 You want SW2 to forward SW1’s VLAN database\n 342 00:30:26,859 --> 00:30:30,379 to synchronize its VLAN database to SW1. 343 00:30:30,380 --> 00:30:32,930 Which command should you use on SW2? 344 00:30:47,990 --> 00:30:54,240 Pause the video to think about your answer. 345 00:30:54,240 --> 00:30:58,630 The answer is a, vtp mode transparent. 346 00:30:58,630 --> 00:31:04,590 A switch in VTP transparent mode will forward\n 347 00:31:04,589 --> 00:31:07,269 VLAN database to the VTP server. 348 00:31:07,269 --> 00:31:14,319 It also won’t advertise its own VLAN database. Let's go to 349 00:31:14,319 --> 00:31:18,408 What are two methods to reset a switch’s\n 350 00:31:19,829 --> 00:31:22,329 Each answer is a complete solution). 351 00:31:22,329 --> 00:31:27,279 A, change the VTP domain to an unused domain\nname. 352 00:31:27,279 --> 00:31:31,160 B, change the switch to VTP server mode. 353 00:31:31,160 --> 00:31:35,410 C, change the switch to VTP transparent mode. 354 00:31:35,410 --> 00:31:39,250 Or D, use the VTP RESET command. 355 00:31:39,250 --> 00:31:46,000 Pause the video to think about your answer. 356 00:31:46,000 --> 00:31:52,660 The answers are A, change the vtp domain to\n 357 00:31:55,529 --> 00:31:59,149 Either of these methods will reset the revision\nnumber to 0. 358 00:31:59,150 --> 00:32:03,410 This is useful if adding a switch with a higher\n 359 00:32:03,410 --> 00:32:09,279 Okay, now let’s go to today’s Boson ExSim\nquestion. 360 00:32:09,279 --> 00:32:14,500 For today's Boson ExSim practice question,\n 361 00:32:16,819 --> 00:32:21,240 So this is about DTP, Dynamic Trunking Protocol. 362 00:32:21,240 --> 00:32:28,579 Select the VLAN trunking operational modes\n 363 00:32:28,579 --> 00:32:32,099 and drag them to the resulting trunking configuration. 364 00:32:32,099 --> 00:32:36,879 So here we have one end of the connection,\none switch interface. 365 00:32:36,880 --> 00:32:39,100 And then the other switch, the other end. 366 00:32:39,099 --> 00:32:43,399 Access, dynamic auto, dynamic desirable, or\ntrunk. 367 00:32:43,400 --> 00:32:47,050 Okay, so see if you can complete this chart\non your own. 368 00:32:47,049 --> 00:32:51,619 Pause the video if you want to try it. 369 00:32:51,619 --> 00:32:54,229 Okay, so let's walk through the answers. 370 00:32:54,230 --> 00:32:59,130 So, here on one end of the connection, access\nmode. 371 00:32:59,130 --> 00:33:04,650 Manually configuring a switch port in access\n 372 00:33:04,650 --> 00:33:06,720 It won't form a trunk port, no matter what. 373 00:33:06,720 --> 00:33:13,548 So, two access ports will result in an operational\n 374 00:33:13,548 --> 00:33:17,299 Access and dynamic auto, same thing. 375 00:33:17,299 --> 00:33:22,819 So, dynamic auto can form a trunk but it won't\n 376 00:33:22,819 --> 00:33:24,329 end is trying to form a trunk. 377 00:33:29,089 --> 00:33:35,079 Although this end is trying to form a trunk,\n 378 00:33:35,079 --> 00:33:39,168 Now, access and trunk that is a misconfig. 379 00:33:39,169 --> 00:33:41,080 Do not do this in a real network. 380 00:33:41,079 --> 00:33:45,269 You can try it out in a lab to see what happens,\n 381 00:33:48,380 --> 00:33:50,850 Dynamic auto and access, well we just saw\nthat here. 382 00:33:53,690 --> 00:33:55,549 Dynamic auto and dynamic auto. 383 00:33:55,549 --> 00:34:01,490 Neither is actively trying to form a trunk,\n 384 00:34:01,490 --> 00:34:03,500 Dynamic auto and dynamic desirable. 385 00:34:03,500 --> 00:34:08,108 This end is actively trying to form a trunk,\n 386 00:34:08,108 --> 00:34:14,068 Same thing, dynamic auto and trunk will form\na trunk. 387 00:34:14,068 --> 00:34:19,878 Even if you manually configure 'switchport\n 388 00:34:19,878 --> 00:34:22,549 end will actively try to form a trunk with\nthe other end. 389 00:34:22,550 --> 00:34:25,909 And since it is dynamic auto, they will form\na trunk. 390 00:34:25,909 --> 00:34:30,829 Okay, dynamic desirable and access, that will\nresult in access. 391 00:34:30,829 --> 00:34:34,740 This end will refuse to become a trunk. 392 00:34:34,739 --> 00:34:39,098 Dynamic desirable and dynamic auto, that will\nform a trunk. 393 00:34:39,099 --> 00:34:42,099 Two dynamic desirables definitely form a trunk. 394 00:34:43,909 --> 00:34:47,349 Okay, next, moving on to trunk on this end. 395 00:34:47,349 --> 00:34:50,259 Trunk and access, again that is a misconfig. 396 00:34:50,259 --> 00:34:53,528 Don't do this in a real network. 397 00:34:53,528 --> 00:34:57,789 Trunk and dynamic auto will form a trunk. 398 00:34:57,789 --> 00:35:00,460 Trunk and dynamic desirable, of course. 399 00:35:00,460 --> 00:35:04,588 And, of course, trunk and trunk also will\nform a trunk. 400 00:35:04,588 --> 00:35:08,808 So once you've finished, click on 'done'. 401 00:35:08,809 --> 00:35:10,778 And then click on 'show answer'. 402 00:35:10,778 --> 00:35:14,829 Now, if you don't want to check the answer\n 403 00:35:14,829 --> 00:35:17,210 question in the practice exam. 404 00:35:17,210 --> 00:35:19,400 But let's see if I got the correct answer. 405 00:35:21,829 --> 00:35:26,150 Okay, here is Boson's explanation, you can\nread it if you want. 406 00:35:26,150 --> 00:35:28,119 And there are also references here. 407 00:35:28,119 --> 00:35:34,490 The official cert guide by Wendell Odom, volume\n 408 00:35:34,489 --> 00:35:36,539 And some additional reading from Cisco. 409 00:35:36,539 --> 00:35:40,639 I will link some reading from Cisco in the\n 410 00:35:40,639 --> 00:35:45,278 And this category shows which category of\n 411 00:35:45,278 --> 00:35:48,099 This is from the 'network access' category. 412 00:35:48,099 --> 00:35:52,009 Okay, so that's today's ExSim practice question. 413 00:35:52,009 --> 00:35:56,568 If you want to get a copy of ExSim for yourself,\n 414 00:35:56,568 --> 00:36:01,358 practice exams, please follow the link in\nthe video description. 415 00:36:01,358 --> 00:36:06,639 There will be supplementary materials for\nthis video. 416 00:36:06,639 --> 00:36:10,538 There will be a review flashcard deck to use\n 417 00:36:10,539 --> 00:36:13,200 Download the deck from the link in the description. 418 00:36:13,199 --> 00:36:17,818 There will also be a packet tracer practice\n 419 00:36:19,519 --> 00:36:23,210 That will be in a separate video. 420 00:36:23,210 --> 00:36:29,048 Before finishing today’s video I want to\n 421 00:36:29,048 --> 00:36:38,538 Thank you to Samil, velvijaykum, C Mohd, Johan,\n 422 00:36:38,539 --> 00:36:45,630 the creators of ExSim, by the way, Sidi, Magrathea,\n 423 00:36:47,170 --> 00:36:53,269 Sorry if I pronounced your name incorrectly,\n 424 00:36:53,268 --> 00:36:57,968 One of you is displaying at Channel failed\n 425 00:36:57,969 --> 00:37:00,960 and I’ll see if YouTube can fix it. 426 00:37:00,960 --> 00:37:05,730 This is the list of JCNP-level members at\n 427 00:37:05,730 --> 00:37:09,539 up recently and your name isn’t on here\n 428 00:37:14,159 --> 00:37:18,129 Please subscribe to the channel, like the\n 429 00:37:18,130 --> 00:37:21,400 with anyone else studying for the CCNA. 430 00:37:21,400 --> 00:37:24,079 If you want to leave a tip, check the links\nin the description. 431 00:37:24,079 --> 00:37:30,089 I'm also a Brave verified publisher and accept\n 35607

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.