All language subtitles for Free CCNA - VLANs (Part 3) - Day 18 - CCNA 200-301 Complete Course

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese) Download
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,829 --> 00:00:04,160 Welcome to Jeremy’s IT Lab. 2 00:00:04,160 --> 00:00:07,640 This is a free, complete course for the CCNA. 3 00:00:07,640 --> 00:00:11,639 If you like these videos, please subscribe to follow along with the series. 4 00:00:11,639 --> 00:00:16,400 Also, please like and leave a comment, and share the video to help spread this free series 5 00:00:16,400 --> 00:00:17,640 of videos. 6 00:00:17,640 --> 00:00:20,660 Thanks for your help. 7 00:00:20,660 --> 00:00:24,189 This video will once again cover the topic of VLANs.. 8 00:00:24,189 --> 00:00:28,410 Although we’ve already covered the most important basics about VLANs, there are still 9 00:00:28,410 --> 00:00:32,470 a few more things you should know about VLANs for your CCNA. 10 00:00:32,470 --> 00:00:37,229 This is going to be a long video again, so let’s get right into it. 11 00:00:37,229 --> 00:00:40,190 First off, here are the topics that will be covered in this video. 12 00:00:40,190 --> 00:00:45,370 First off, a little addition to the previous video, I will show you how to use the concept 13 00:00:45,370 --> 00:00:51,410 of a native VLAN on a router when using router on a stick for inter-VLAN routing. 14 00:00:51,410 --> 00:00:56,629 Next up, we will look at a few wireshark captures to see the dot1q tag. 15 00:00:56,629 --> 00:01:00,930 Wireshark is a great tool for network engineers, so I plan to use it at various points in this 16 00:01:00,930 --> 00:01:04,299 series to help you understand these topics. 17 00:01:04,299 --> 00:01:09,450 After that we’ll look at the final method of inter-VLAN routing, which is Layer 3 switching, 18 00:01:09,450 --> 00:01:11,480 also known as multilayer switching. 19 00:01:11,480 --> 00:01:17,960 I’ve always told you that switches are Layer 2 devices and don’t use IP addresses, however 20 00:01:17,960 --> 00:01:22,610 many modern switches are actually Layer 3 capable as well, and I’ll talk about that 21 00:01:22,610 --> 00:01:25,510 in today’s video. 22 00:01:25,510 --> 00:01:30,170 Next up are two topics which have actually been removed from the CCNA exam topics list. 23 00:01:30,170 --> 00:01:36,890 DTP, the dynamic trunking protocol, and VTP, VLAN trunking protocol. 24 00:01:36,890 --> 00:01:41,200 I was planning to cover these in this video, but due to the length of the video I’ll 25 00:01:41,200 --> 00:01:43,610 reserve a separate video for them. 26 00:01:43,610 --> 00:01:47,729 Although these have both been removed from the exam topics list, I think it will probably 27 00:01:47,729 --> 00:01:53,000 be important for you to understand these topics at least at a basic level for your CCNA, and 28 00:01:53,000 --> 00:01:56,890 you may actually see some questions about them in your exam even though they have been 29 00:01:56,890 --> 00:01:58,840 removed from the topics list. 30 00:01:58,840 --> 00:02:04,060 However, I will give just a basic overview of each, there is no need to go in depth. 31 00:02:04,060 --> 00:02:08,630 Before getting started, I want to say make sure that you stick around to the end of today’s 32 00:02:08,630 --> 00:02:14,280 quiz, from now on I’ll be featuring one BONUS question from Boson ExSim, Boson’s 33 00:02:14,280 --> 00:02:16,730 set of practice exams for the CCNA. 34 00:02:16,730 --> 00:02:18,480 Look forward to that. 35 00:02:18,480 --> 00:02:22,900 If you want to get a copy of Boson ExSim for yourself, by the way, follow the link in the 36 00:02:22,900 --> 00:02:24,830 video description. 37 00:02:24,830 --> 00:02:29,870 No other practice exams help you get ready for the real exam like Boson ExSim, so if 38 00:02:29,870 --> 00:02:35,920 you can I highly recommend getting and using it to prepare for your exam. 39 00:02:35,920 --> 00:02:41,470 So let’s move on to the first point, using the Native VLAN feature on a router. 40 00:02:41,470 --> 00:02:46,209 I said in the previous lecture video that best practice is to set the native VLAN to 41 00:02:46,209 --> 00:02:51,010 an unused VLAN, as the native VLAN feature can cause some security issues. 42 00:02:51,010 --> 00:02:55,209 I will talk more about network security later in the course, by the way. 43 00:02:55,209 --> 00:03:01,239 However, if you want to use the native VLAN feature, let’s see how to use it on a router. 44 00:03:01,239 --> 00:03:04,290 The native VLAN feature does have one benefit. 45 00:03:04,290 --> 00:03:08,470 Because frames in the native VLAN aren’t tagged, it’s more efficient, each frame 46 00:03:08,470 --> 00:03:14,319 is smaller so it allows the device to send more frames per second. 47 00:03:14,319 --> 00:03:21,400 In the previous video, I set the native VLAN to 1001 on SW1’s G0/0 interface, and SW2’s 48 00:03:21,400 --> 00:03:24,010 G0/0 and G0/1 interfaces. 49 00:03:24,010 --> 00:03:31,980 So, just for this demonstration let’s set them back to a used VLAN, VLAN10 on all trunks. 50 00:03:31,980 --> 00:03:35,990 There are 2 methods of configuring the native VLAN on a router, let’s take a quick look 51 00:03:35,990 --> 00:03:38,140 at both. 52 00:03:38,140 --> 00:03:44,260 First up, you can use the command ENCAPSULATION DOT1Q, followed by the vlan-id, followed by 53 00:03:44,260 --> 00:03:46,150 NATIVE. 54 00:03:46,150 --> 00:03:50,530 This tells the router that this subinterface belongs to the native VLAN, and it will function 55 00:03:50,530 --> 00:03:53,440 just like the native VLAN on a switch. 56 00:03:53,440 --> 00:03:58,200 It will assume untagged frame belong to the native VLAN, and frames sent in the native 57 00:03:58,200 --> 00:04:00,690 VLAN will not be tagged. 58 00:04:00,690 --> 00:04:05,241 The second option is to not use a subinterface at all, but just configure the IP address 59 00:04:05,241 --> 00:04:09,610 for the native VLAN on the physical interface of the router. 60 00:04:09,610 --> 00:04:13,510 The ENCAPSULATION DOT1Q command is not necessary in this case. 61 00:04:13,510 --> 00:04:16,608 Okay, let’s look at each option. 62 00:04:16,608 --> 00:04:19,798 First, I will configure the first option. 63 00:04:19,798 --> 00:04:20,988 Here it is. 64 00:04:20,988 --> 00:04:28,860 On the g0/0.10 interface, I configured ENCAPSULATION DOT1Q 10 NATIVE. 65 00:04:28,860 --> 00:04:33,349 Note that this is the complete topology from the previous lecture video, so the IP address 66 00:04:33,349 --> 00:04:35,379 is already configured. 67 00:04:35,379 --> 00:04:40,990 The only change is that I added NATIVE to the encapsulation dot1q command. 68 00:04:40,990 --> 00:04:45,750 Let’s take this opportunity to look at a wireshark capture to demonstrate the native 69 00:04:45,750 --> 00:04:47,449 VLAN. 70 00:04:47,449 --> 00:04:56,190 This PC in VLAN20 has an IP address of 192.168.1.65, and this PC in VLAN10 has an IP address of 71 00:04:56,190 --> 00:04:59,379 192.168.1.1. 72 00:04:59,379 --> 00:05:05,030 I will use wireshark to monitor this connection between R1 and SW2. 73 00:05:05,030 --> 00:05:09,189 Wireshark will capture all frames on this connection, in both directions, so we can 74 00:05:09,189 --> 00:05:11,639 take a look at what traffic is passing through. 75 00:05:11,639 --> 00:05:17,619 Let’s send that ping. We will first look at the capture of the ICMP echo request message 76 00:05:17,619 --> 00:05:20,819 as it goes from SW2 to R1. 77 00:05:20,819 --> 00:05:25,960 It will be in VLAN20, and it’s being sent to R1 for inter-VLAN routing. 78 00:05:25,960 --> 00:05:32,690 Here’s the wireshark capture for the ICMP echo request as it goes from SW2 to R1. 79 00:05:32,690 --> 00:05:36,930 First off, you can see the source and destination IP addresses here. 80 00:05:36,930 --> 00:05:41,119 Now let’s look at the Ethernet header encapsulating the IP packet. 81 00:05:41,119 --> 00:05:43,559 Specifically, look here. 82 00:05:43,559 --> 00:05:51,520 Type: 802.1Q virtual LAN, and notice the hexadecimal 8100 value here. 83 00:05:51,520 --> 00:05:57,030 I said in the previous video that dot1q is inserted after the source MAC address field, 84 00:05:57,030 --> 00:06:00,120 and that is where the TYPE field usually goes. 85 00:06:00,120 --> 00:06:04,729 This here is the ‘TPID’ field of the dot1q tag. 86 00:06:04,729 --> 00:06:09,619 Under it, these are the rest of the fields of the 802.1Q tag. 87 00:06:09,619 --> 00:06:13,120 First is the PCP, priority code point. 88 00:06:13,120 --> 00:06:18,340 It has a value of 0, so no special priority is given to this frame. 89 00:06:18,340 --> 00:06:22,169 Under it is the DEI, drop eligible indicator. 90 00:06:22,169 --> 00:06:28,259 Again, a value of 0, so it won’t be dropped during times of network congestion. 91 00:06:28,259 --> 00:06:34,059 Next is the most important field, the VLAN ID, which is 20, as you would expect. 92 00:06:34,059 --> 00:06:38,990 The PC that sent the ping is in VLAN 20, and it’s not the native VLAN so that’s why 93 00:06:38,990 --> 00:06:40,990 this frame is tagged. 94 00:06:40,990 --> 00:06:45,990 Finally, under that is the normal TYPE field of the Ethernet header, indicating that an 95 00:06:45,990 --> 00:06:49,080 IPv4 packet is encapsulated. 96 00:06:49,080 --> 00:06:56,539 It normally comes after the SOURCE MAC ADDRESS field, but now the dot1q tag is between them. 97 00:06:56,539 --> 00:07:01,929 Next let’s look at the ICMP echo request going from R1 back to SW2. 98 00:07:01,929 --> 00:07:06,689 It will now be in VLAN10, because the destination is in VLAN10. 99 00:07:06,689 --> 00:07:14,479 VLAN10 is configured as the native VLAN on both R1 and SW2, so let’s see what’s different. 100 00:07:14,479 --> 00:07:20,849 Here’s the exact same ICMP echo request, the exact same layer 3 packet, as it is sent 101 00:07:20,849 --> 00:07:22,889 from R1 to SW2. 102 00:07:22,889 --> 00:07:24,749 What’s different? 103 00:07:24,749 --> 00:07:29,129 It has been encapsulated with a new Ethernet header, but this Ethernet header doesn’t 104 00:07:29,129 --> 00:07:31,059 have a dot1q tag. 105 00:07:31,059 --> 00:07:33,729 This is the native VLAN function at work. 106 00:07:33,729 --> 00:07:39,800 Both R1 and SW2 understand that untagged frames belong to VLAN10, so there is no need to tag 107 00:07:39,800 --> 00:07:43,379 each frame with dot1q. 108 00:07:43,379 --> 00:07:47,889 That ICMP echo request will continue to the destination, untagged all the way because 109 00:07:47,889 --> 00:07:52,800 VLAN10 is configured as the native VLAN on all devices. 110 00:07:52,800 --> 00:07:58,309 When this PC in VLAN10 sends the ICMP echo reply, it will be untagged until it reaches 111 00:07:58,309 --> 00:08:05,490 R1, which will then tag it in VLAN20, and send it back to the PC that sent the request. 112 00:08:05,490 --> 00:08:08,770 Now let’s take a quick look at the second method of configuring the native VLAN on a 113 00:08:08,770 --> 00:08:14,270 router, which is simply configuring the IP address on the router’s physical interface, 114 00:08:14,270 --> 00:08:19,280 no need for a subinterface or the encapsulation dot1q command. 115 00:08:19,280 --> 00:08:20,740 Here is how to configure it. 116 00:08:20,740 --> 00:08:25,419 First, I used ‘NO INTERFACE G0/0.10’. 117 00:08:25,419 --> 00:08:27,419 This deletes the subinterface. 118 00:08:27,419 --> 00:08:33,729 Then, I entered interface configuration mode from G0/0, and simply configured the appropriate 119 00:08:33,729 --> 00:08:37,400 IP address on the interface. 120 00:08:37,400 --> 00:08:45,170 To help you visualize it, here is the output of SHOW RUNNING-CONFIG for G0/0 and its subinterfaces. 121 00:08:45,170 --> 00:08:49,830 First off, these commands here on the physical interface are there by default, I didn’t 122 00:08:49,830 --> 00:08:51,350 configure them. 123 00:08:51,350 --> 00:08:55,470 The physical interface is configured normally with an IP address. 124 00:08:55,470 --> 00:08:59,350 This will be used for the native VLAN, VLAN10. 125 00:08:59,350 --> 00:09:04,680 The other subinterfaces are just like we configured them in the previous video, with the encapsulation 126 00:09:04,680 --> 00:09:08,410 dot1q command and their own IP address. 127 00:09:08,410 --> 00:09:11,310 This will function just like the first option we saw. 128 00:09:11,310 --> 00:09:18,020 SW2 will send VLAN10 packets in untagged frames to R1, and R1 will send them in untagged 129 00:09:18,020 --> 00:09:20,740 frames also. 130 00:09:20,740 --> 00:09:25,360 As I said before, it is recommended that you just change the native VLAN to an unused VLAN 131 00:09:25,360 --> 00:09:30,090 for security purposes, but if you want to use the native VLAN, it’s important to know 132 00:09:30,090 --> 00:09:34,240 how to do it on a router, so these are two methods you can use. 133 00:09:34,240 --> 00:09:37,300 You might also need to know this for your exam, by the way. 134 00:09:37,300 --> 00:09:40,680 Here’s the network diagram once again. 135 00:09:40,680 --> 00:09:43,680 We have one router, and two switches. 136 00:09:43,680 --> 00:09:47,700 Or I should say, two Layer 2 switches. 137 00:09:47,700 --> 00:09:51,640 This is the icon we’ve been using for regular Layer 2 switches. 138 00:09:51,640 --> 00:09:55,130 But let me introduce you to another type of switch. 139 00:09:55,130 --> 00:10:00,210 This is the icon I will use for what is called a Layer 3 switch, also known as a multilayer 140 00:10:00,210 --> 00:10:02,040 switch. 141 00:10:02,040 --> 00:10:06,630 From now on I will use either term, Layer 3 switch or multilayer switch. 142 00:10:06,630 --> 00:10:08,870 You should know both. 143 00:10:08,870 --> 00:10:14,360 By the way, these are the official Cisco icons for a layer 2 switch and a layer 3 switch, 144 00:10:14,360 --> 00:10:20,030 but I think the ones I use in my videos look cleaner and more modern. 145 00:10:20,030 --> 00:10:24,200 First let’s review exactly what a multilayer switch does. 146 00:10:24,200 --> 00:10:28,830 A multilayer switch is capable of both switching AND routing. 147 00:10:28,830 --> 00:10:31,130 It is Layer 3 aware. 148 00:10:31,130 --> 00:10:36,590 A regular layer 2 switch is NOT layer 3 aware, it doesn’t think at all about IP addresses 149 00:10:36,590 --> 00:10:39,120 or anything above Layer 2. 150 00:10:39,120 --> 00:10:43,650 It only cares about Layer 2 information like MAC addresses. 151 00:10:43,650 --> 00:10:47,760 You can assign IP addresses to its interfaces like a router. 152 00:10:47,760 --> 00:10:52,480 Previously we haven’t assigned any IP addresses to switches, only routers. 153 00:10:52,480 --> 00:10:57,450 With a Layer 3 switch, you can configure ‘routed ports’, which function like an interface 154 00:10:57,450 --> 00:10:59,430 on a router. 155 00:10:59,430 --> 00:11:05,300 Not just physical interfaces, but you can also create virtual interfaces for each VLAN, 156 00:11:05,300 --> 00:11:07,880 and assign IP addresses to those interfaces. 157 00:11:07,880 --> 00:11:12,900 These are not separate physical interfaces, but virtual interfaces in the 158 00:11:12,900 --> 00:11:18,450 software of the switch that can be used to route traffic at Layer 3. 159 00:11:18,450 --> 00:11:23,550 You can configure routes, like static routes, on a multilayer switch, just like a router. 160 00:11:23,550 --> 00:11:28,340 Finally, it can be used for inter-VLAN routing. 161 00:11:28,340 --> 00:11:31,850 So far, we have looked at two methods of inter-VLAN routing. 162 00:11:31,850 --> 00:11:37,090 The first one, in day 16’s video, was using one connection for each VLAN between the router 163 00:11:37,090 --> 00:11:38,870 and switch. 164 00:11:38,870 --> 00:11:43,180 This works, but if you have many VLANs you probably won’t have enough interfaces on 165 00:11:43,180 --> 00:11:45,300 your router. 166 00:11:45,300 --> 00:11:50,420 The second method was router on a stick, which uses a single trunk connection which carries 167 00:11:50,420 --> 00:11:55,630 traffic from all VLANs between the switch and router for inter-VLAN routing. 168 00:11:55,630 --> 00:12:00,910 This is efficient in terms of the number of interfaces, just one, but in a busy network 169 00:12:00,910 --> 00:12:05,590 all of the traffic going to the router and back to the switch can cause network congestion. 170 00:12:05,590 --> 00:12:10,970 So, in large networks, a multilayer switch is the preferred method of inter-VLAN routing. 171 00:12:10,970 --> 00:12:13,530 Let’s see how it works. 172 00:12:13,530 --> 00:12:20,110 Here is the topology again, now let’s replace SW2 with a multilayer switch. 173 00:12:20,110 --> 00:12:22,210 There we go. 174 00:12:22,210 --> 00:12:24,300 And now let’s make one more change. 175 00:12:24,300 --> 00:12:30,950 I’ve replaced the trunk link between SW2 and R1 with a point-to-point Layer 3 link, 176 00:12:30,950 --> 00:12:34,380 we will no longer run VLANs across this. 177 00:12:34,380 --> 00:12:40,570 I’ll talk about this link later and assign IP addresses to R1’s G0/0 interface and 178 00:12:40,570 --> 00:12:45,450 SW2’s G0/1 interface. But for now let’s focus on the inter-VLAN routing done 179 00:12:45,450 --> 00:12:48,000 on SW2. 180 00:12:48,000 --> 00:12:52,660 For review, when we used router on a stick for inter-VLAN routing, traffic being routed 181 00:12:52,660 --> 00:12:58,430 between VLANs was sent to R1 first, and then sent back to SW2, and then forwarded to the 182 00:12:58,430 --> 00:13:00,360 destination. 183 00:13:00,360 --> 00:13:06,090 For example, if this PC in VLAN20 wants to ping this PC in VLAN10, the traffic would 184 00:13:06,090 --> 00:13:08,460 follow a path like this. 185 00:13:08,460 --> 00:13:17,470 From the PC to SW2, from SW2 to R1, tagged in VLAN20, from R1 to SW2, tagged in VLAN10, 186 00:13:17,470 --> 00:13:22,110 from SW2 to SW1, tagged in VLAN10, and finally to the destination. 187 00:13:22,110 --> 00:13:25,980 However, SW2 is a multilayer switch. 188 00:13:25,980 --> 00:13:29,930 It doesn’t have to send the traffic to R1 for inter-VLAN routing. 189 00:13:29,930 --> 00:13:34,030 It can do that with something called ‘Switch Virtual Interfaces’. 190 00:13:34,030 --> 00:13:41,500 SVIs (or Switch Virtual Interfaces) are the virtual interfaces you can assign IP addresses to 191 00:13:41,500 --> 00:13:44,529 i n a multilayer switch. 192 00:13:44,529 --> 00:13:50,279 Configure each PC to use the SVI (NOT the router) as their gateway address. 193 00:13:50,279 --> 00:13:54,890 When using router on a stick, the router was used as the PC’s gateway. 194 00:13:54,890 --> 00:13:58,360 This time, we will use the switch’s SVIs instead. 195 00:13:58,360 --> 00:14:03,580 To send traffic to different subnets/VLANs, the PCs will send traffic to the switch, and 196 00:14:03,580 --> 00:14:07,870 the switch will route the traffic. 197 00:14:07,870 --> 00:14:11,490 These are the SVIs I configured on SW2. 198 00:14:11,490 --> 00:14:16,440 These are the same IP addresses I configured on R1 when doing router on a stick, the last 199 00:14:16,440 --> 00:14:18,800 usable IP address in each subnet. 200 00:14:18,800 --> 00:14:23,291 So, these are already configured on each PC as their gateway addresses, so there’s no 201 00:14:23,291 --> 00:14:27,220 need to change the PC configurations. 202 00:14:27,220 --> 00:14:31,940 Now let’s take a look at the path the traffic between these two PCs takes this time. 203 00:14:31,940 --> 00:14:34,230 The frame arrives at SW2. 204 00:14:34,230 --> 00:14:38,780 The destination is in the 192.168.1.0/26 subnet. 205 00:14:38,780 --> 00:14:45,530 SW2 now has its own routing table, so it looks up the destination in the routing table, and 206 00:14:45,530 --> 00:14:49,140 sees that the destination is connected to its VLAN10 SVI. 207 00:14:49,140 --> 00:14:52,280 So, the traffic is now routed to VLAN10. 208 00:14:52,280 --> 00:14:57,620 If SW2 doesn’t have the destination MAC address in its MAC address table, it will 209 00:14:57,620 --> 00:15:00,500 flood the frame to all VLAN10 interfaces. 210 00:15:00,500 --> 00:15:06,190 But, let’s assume it has already learned the MAC address, so it forwards it to SW1 211 00:15:06,190 --> 00:15:09,070 over its trunk interface, tagged as VLAN10. 212 00:15:09,070 --> 00:15:12,630 SW1 then forwards it to the destination. 213 00:15:12,630 --> 00:15:18,350 Now, what if the hosts want to reach destinations outside of the LAN? 214 00:15:18,350 --> 00:15:23,760 For example, I’ve added a cloud connected to R1 to represent the Internet. 215 00:15:23,760 --> 00:15:28,800 Because SW2 is their default gateway, any packets destined outside of their subnet will 216 00:15:28,800 --> 00:15:31,320 be sent to SW2. 217 00:15:31,320 --> 00:15:35,860 But our previous router on a stick configurations for the connection between SW2 and R1 will 218 00:15:35,860 --> 00:15:38,030 no longer work. 219 00:15:38,030 --> 00:15:43,710 In addition to configuring virtual interfaces, SVIs, on multilayer switches, we can also 220 00:15:43,710 --> 00:15:48,560 configure their physical interfaces to operate like a router interface, rather than 221 00:15:48,560 --> 00:15:49,590 a switchport. 222 00:15:49,590 --> 00:15:57,270 So, we can assign the subnet 192.168.1.192/30 for this point-to-point link between SW2 and 223 00:15:57,270 --> 00:16:07,230 R1, with SW2’s G0/1 interface having an IP address of 192.168.1.193, and R1’s G0/0 224 00:16:07,230 --> 00:16:12,500 interface having an IP address of 192.168.1.194. 225 00:16:12,500 --> 00:16:18,720 Then, we configure a default route on SW2 pointing toward R1, so all traffic destined 226 00:16:18,720 --> 00:16:21,720 outside of the LAN will be sent to R1. 227 00:16:21,720 --> 00:16:27,670 I already covered static routes, including default routes, in previous videos, so I won’t 228 00:16:27,670 --> 00:16:32,160 explain the concept in depth again, but I will show you the configurations once more. 229 00:16:32,160 --> 00:16:37,560 So, let’s do that, let’s get into the configurations, starting first with the point-to-point 230 00:16:37,560 --> 00:16:44,750 link between SW2 and R1, and then the SVIs on SW2. 231 00:16:44,750 --> 00:16:50,150 First off, remove R1’s router on a stick configurations and configure that new IP address 232 00:16:50,150 --> 00:16:52,940 on G0/0. 233 00:16:52,940 --> 00:17:01,290 First off, I delete each subinterface with this command, NO INTERFACE G0/0.10, .20, and .30. 234 00:17:01,290 --> 00:17:10,109 Then, I use the command DEFAULT INTERFACE G0/0, to reset G0/0 to it’s default settings. 235 00:17:10,109 --> 00:17:15,328 After that, I used SHOW IP INTERFACE BRIEF to check the interfaces. 236 00:17:15,329 --> 00:17:19,630 Notice the status of the subinterfaces, it says DELETED. 237 00:17:19,630 --> 00:17:23,769 Although we have successfully deleted the subinterfaces, they will remain here with 238 00:17:23,769 --> 00:17:26,868 a ‘deleted’ status unless we reload the router. 239 00:17:26,868 --> 00:17:31,120 That’s no problem though, so I’ll just leave them. 240 00:17:31,120 --> 00:17:36,600 Then I simply enter interface configuration mode for G0/0 and configure the new IP address, 241 00:17:36,600 --> 00:17:39,169 with a /30 subnet mask. 242 00:17:39,169 --> 00:17:45,220 I use SHOW IP INTERFACE BRIEF again, and you can see that the new IP address has been successfully 243 00:17:45,220 --> 00:17:47,880 configured. 244 00:17:47,880 --> 00:17:51,240 Now let’s look at the switch’s side of the point-to-point connection. 245 00:17:51,240 --> 00:17:58,160 First, I reset the G0/1 interface to its default setting with the DEFAULT INTERFACE command, 246 00:17:58,160 --> 00:18:03,730 because it was configured as a trunk for router on a stick because of the previous lab. 247 00:18:03,730 --> 00:18:07,309 Next up is a very important command, one you must not forget. 248 00:18:07,309 --> 00:18:09,450 IP ROUTING. 249 00:18:09,450 --> 00:18:14,119 This command enables Layer 3 routing on the switch, it lets it build its own routing table 250 00:18:14,119 --> 00:18:15,919 like a router. 251 00:18:15,919 --> 00:18:20,799 If you forget this command, your inter-VLAN routing will not work. 252 00:18:20,799 --> 00:18:26,119 Next up is another important command, NO SWITCHPORT on the interface. 253 00:18:26,119 --> 00:18:31,280 This is the command that changes the interface from a Layer 2 switchport to a Layer 3 routed 254 00:18:31,280 --> 00:18:32,789 port. 255 00:18:32,789 --> 00:18:35,929 Now you will be able to assign an IP address to it. 256 00:18:35,929 --> 00:18:45,549 So, I assigned 192.168.1.193/30, and used show IP interface brief, and as you can see 257 00:18:45,549 --> 00:18:49,539 the IP address is assigned to it just like a router interface. 258 00:18:49,539 --> 00:18:54,130 Last up is the default route pointing to R1. 259 00:18:54,130 --> 00:19:02,830 As I’ve already shown you in a previous video, the command is IP ROUTE 0.0.0.0 0.0.0.0, 260 00:19:02,830 --> 00:19:10,169 followed by the next hop, in this case 192.168.1.194, which is R1. 261 00:19:10,169 --> 00:19:16,070 I then used SHOW IP ROUTE to confirm, and you can see that SW2 now has a routing table, 262 00:19:16,070 --> 00:19:21,049 with a default route pointing to R1, and connected and local routes for the routed interface 263 00:19:21,049 --> 00:19:22,499 we configured. 264 00:19:22,499 --> 00:19:24,889 And one additional command you can use to 265 00:19:24,889 --> 00:19:31,799 confirm is SHOW INTERFACES STATUS, which I showed in a previous video on Ethernet switching. 266 00:19:31,799 --> 00:19:37,590 Notice that, in the VLAN column, instead of a VLAN number G0/1 displays ‘ROUTED’. 267 00:19:37,590 --> 00:19:43,240 Okay, now let’s move on to configure those SVIs on SW2. 268 00:19:43,240 --> 00:19:46,789 SVI configuration is very simple. 269 00:19:46,789 --> 00:19:49,970 Here are the configurations for SW2. 270 00:19:49,970 --> 00:19:56,110 Use the command INTERFACE VLAN10, for example, to create an SVI for VLAN10 and configure 271 00:19:56,110 --> 00:19:57,650 it. 272 00:19:57,650 --> 00:20:01,809 Then assign an IP address, and use NO SHUTDOWN to enable it. 273 00:20:01,809 --> 00:20:08,119 SVIs are shutdown but default, so remember to use the NO SHUTDOWN command to enable them. 274 00:20:08,119 --> 00:20:14,809 I repeated the process for VLAN20 and VLAN30, and that’s all there is to configuring SVIs, 275 00:20:14,809 --> 00:20:16,880 very simple. 276 00:20:16,880 --> 00:20:23,190 Now, just to demonstrate one problem you might encounter, I created another SVI for a VLAN 277 00:20:23,190 --> 00:20:31,309 that doesn’t exist on the switch, VLAN40, and assigned an IP address, 40.40.40.40/24. 278 00:20:31,309 --> 00:20:35,210 I also made sure to enable it with NO SHUTDOWN. 279 00:20:35,210 --> 00:20:38,690 However, look at the SVI itself. 280 00:20:38,690 --> 00:20:40,799 It is DOWN/DOWN. 281 00:20:40,799 --> 00:20:41,870 Why is that? 282 00:20:41,870 --> 00:20:45,809 Well, it's because the VLAN doesn’t exist on the switch. 283 00:20:45,809 --> 00:20:50,659 Let’s take a look at the conditions required for an SVI to be UP/UP. 284 00:20:50,659 --> 00:20:54,360 First, the VLAN must exist on the switch. 285 00:20:54,360 --> 00:21:01,210 In this case, we haven’t created VLAN40 on the switch, so the SVI won’t become UP/UP. 286 00:21:01,210 --> 00:21:07,590 When you assign an access port to a VLAN, if the VLAN doesn’t yet exist the switch 287 00:21:07,590 --> 00:21:09,669 will automatically create the VLAN. 288 00:21:09,669 --> 00:21:15,809 However, if you create an SVI for a VLAN that doesn’t exist yet, the switch WILL NOT automatically 289 00:21:15,809 --> 00:21:17,929 create the VLAN. 290 00:21:17,929 --> 00:21:24,200 Second, the switch must have at least one access port in the VLAN in an up/up state, 291 00:21:24,200 --> 00:21:30,600 and/or one trunk port that allows the VLAN that is in an up/up state. 292 00:21:30,610 --> 00:21:36,220 For example, in the topology we’re using here, SW2 has hosts connected in VLAN10 and 293 00:21:36,220 --> 00:21:40,470 VLAN20, so their SVIs can go up. 294 00:21:40,470 --> 00:21:47,299 There are no connected hosts in VLAN30, however it has a trunk port, G0/0, which allows VLAN30 295 00:21:47,299 --> 00:21:51,580 over it, so VLAN30’s SVI is up as well. 296 00:21:51,580 --> 00:21:53,549 Okay, next rule. 297 00:21:53,549 --> 00:21:56,590 The VLAN must not be shutdown. 298 00:21:56,590 --> 00:22:01,309 Note that this is NOT the SVI, but the VLAN itself. 299 00:22:01,309 --> 00:22:07,380 You can enter VLAN configuration mode, and disable the VLAN with the SHUTDOWN command. 300 00:22:07,380 --> 00:22:12,549 If you do this, the SVI for that VLAN can’t become UP/UP. 301 00:22:12,549 --> 00:22:16,749 Note that, I think you can’t do this command in packet tracer, so you’ll need a real 302 00:22:16,749 --> 00:22:19,869 Cisco switch if you want to try this one out. 303 00:22:19,869 --> 00:22:25,779 Finally, if the SVI itself is shutdown, it obviously won’t be up/up, so make sure to 304 00:22:25,779 --> 00:22:33,009 use the NO SHUTDOWN command after you create an SVI, because they are shutdown by default. 305 00:22:33,009 --> 00:22:37,559 I used the SHOW IP ROUTE command again, and you can see connected and local routes have 306 00:22:37,559 --> 00:22:43,289 been added to the route table for the SVIs we created, all shown as directly connected 307 00:22:43,289 --> 00:22:46,169 to the SVI for each VLAN. 308 00:22:46,169 --> 00:22:50,419 Okay, so our configurations are all done. 309 00:22:50,419 --> 00:22:54,679 The next video will be a practice lab, so you can get some hands-on practice doing these 310 00:22:54,679 --> 00:22:55,850 configurations. 311 00:22:55,850 --> 00:23:00,620 If you have trouble remembering the commands, I highly recommend doing practice labs, and 312 00:23:00,620 --> 00:23:04,389 doing them multiple times, until you feel confident. 313 00:23:04,389 --> 00:23:12,509 So, if one of our PCs wants to reach a destination outside of the LAN, it will be sent to SW2, 314 00:23:12,509 --> 00:23:16,870 which will send it to R1, which will take care of it from there. 315 00:23:16,870 --> 00:23:21,320 Note that we didn’t actually configure any routes on R1 in this lab, I’m just focusing 316 00:23:21,320 --> 00:23:24,970 on inter-VLAN routing at this point. 317 00:23:24,970 --> 00:23:29,490 If one of our PCs wants to reach a destination in the LAN, but in a different subnet and 318 00:23:29,490 --> 00:23:36,299 VLAN, SW2 will do the inter-VLAN routing without having to send the traffic to R1. 319 00:23:36,299 --> 00:23:42,860 Okay, before moving on to the quiz let’s review what we covered in today’s video. 320 00:23:42,860 --> 00:23:45,990 I showed you two ways of configuring the native VLAN on a router. 321 00:23:45,990 --> 00:23:50,960 Usually, it’s best to just set the native VLAN to an unused VLAN, but if you want to 322 00:23:50,960 --> 00:23:55,739 use the native VLAN feature, you should know how to configure it on a router. 323 00:23:55,739 --> 00:24:01,159 We looked at some wireshark captures, both a dot1q-tagged frame, and one that was untagged 324 00:24:01,159 --> 00:24:03,369 because it was in the native VLAN. 325 00:24:03,369 --> 00:24:08,480 Finally, I showed you the final method of inter-VLAN routing, using a type of switch 326 00:24:08,480 --> 00:24:14,940 I hadn’t talked about before, a Layer 3 switch, also known as a multilayer switch. 327 00:24:14,940 --> 00:24:21,350 By configuring SVIs, switch virtual interfaces, on a multilayer switch, you can route between 328 00:24:21,350 --> 00:24:25,299 subnets and VLANs without having to send the traffic to a router. 329 00:24:25,299 --> 00:24:29,409 It’s like having a mini router within the switch. 330 00:24:29,409 --> 00:24:35,500 These last two topics, DTP and VTP, will be left for the next lecture video. 331 00:24:35,500 --> 00:24:38,960 Let’s move on to today’s quiz. 332 00:24:38,960 --> 00:24:43,410 As I mentioned at the beginning of the video, I’m happy to announce that, after my usual 333 00:24:43,410 --> 00:24:48,269 quiz, a few simple questions to help you review what we’ve learned, I will be featuring 334 00:24:48,269 --> 00:24:53,420 one question from Boson’s ExSim, which is a fantastic set of practice exams for the 335 00:24:53,420 --> 00:24:55,279 CCNA. 336 00:24:55,279 --> 00:25:00,919 I used Boson ExSim for my CCNA and CCNP, and I really think they were what allowed me to 337 00:25:00,919 --> 00:25:03,840 pass all of my exams on the first try. 338 00:25:03,840 --> 00:25:07,360 If you want to pick up a copy of ExSim, check the link in the description. 339 00:25:07,360 --> 00:25:12,929 Let’s go on to question 1 of today’s quiz. 340 00:25:12,929 --> 00:25:19,730 Which TWO answers are valid options to configure the native VLAN on a router in a ROAS configuration? 341 00:25:19,730 --> 00:25:24,450 (select two, each answer is a complete solution). 342 00:25:24,450 --> 00:25:30,000 Instead of reading out each answer, I’ll just let you take a look at each set of commands. Here we go. 343 00:25:30,000 --> 00:25:41,350 A, B, C, and D. Pause the video to think about your answer, remember there are two valid 344 00:25:41,350 --> 00:25:48,650 options., so select two. 345 00:25:48,650 --> 00:25:56,830 The answer is B and C. B uses the ENCAPSULATION DOT1Q NATIVE command on the subinterface, 346 00:25:56,830 --> 00:26:00,889 this is one option for configuring the native VLAN on a router. 347 00:26:00,889 --> 00:26:05,859 The other option is C, to simply configure the IP address on the physical interface, 348 00:26:05,859 --> 00:26:08,369 rather than the subinterface. 349 00:26:08,369 --> 00:26:12,059 In that case, you do not need the ENCAPSULATION DOT1Q command. 350 00:26:12,059 --> 00:26:16,119 Okay, let’s go to question 2. 351 00:26:16,119 --> 00:26:24,129 You create an SVI for VLAN225 on SW1, assign an IP address, and enable it with no shutdown, 352 00:26:24,129 --> 00:26:27,169 but the interface remains down/down. 353 00:26:27,169 --> 00:26:36,210 Which TWO options might be causing this? (select two) A, VLAN225 doesn’t exist on the switch. 354 00:26:36,210 --> 00:26:43,220 B, you didn’t issue the SWITCHPORT MODE TRUNK command on VLAN225’s SVI. 355 00:26:43,220 --> 00:26:51,350 C, You didn’t issue the SWITCHPORT ACCESS VLAN 225 command on VLAN225’s SVI. 356 00:26:51,350 --> 00:26:56,499 Or D, No interfaces in VLAN225 are up/up. 357 00:26:56,500 --> 00:27:02,700 Pause the video to think about your answer. 358 00:27:02,700 --> 00:27:12,100 The answer is A and D. In order for an SVI to be up/up, the VLAN must exist on the switch, and it must have either an 359 00:27:12,109 --> 00:27:17,330 access interface in the VLAN that is up/up, or a trunk interface that allows the VLAN 360 00:27:17,330 --> 00:27:18,330 that is up/up. 361 00:27:18,330 --> 00:27:24,080 You don’t need to issue the switchport mode trunk or switchport access vlan commands. 362 00:27:24,080 --> 00:27:28,830 Let’s go to question 3, which will be the last quiz question before we take a look at 363 00:27:28,830 --> 00:27:34,240 a sample question from Boson ExSim for CCNA. 364 00:27:34,240 --> 00:27:38,609 Which command is used to configure a switch interface as a routed port? 365 00:27:38,609 --> 00:27:41,090 A, no switchport. 366 00:27:41,090 --> 00:27:46,169 B, IP Address, followed by the IP address and Subnet mask. 367 00:27:46,169 --> 00:27:48,989 C, ip routing. 368 00:27:48,989 --> 00:27:52,539 Or D, switchport mode route. 369 00:27:52,539 --> 00:27:58,369 Pause the video to think about your answer. 370 00:27:58,369 --> 00:28:01,559 The answer is A, no switchport. 371 00:28:01,559 --> 00:28:06,060 This configures the interface as a routed port, and allows you to configure an IP address 372 00:28:06,060 --> 00:28:07,409 on the interface. 373 00:28:07,409 --> 00:28:13,929 C, ip routing, is used to enable IP routing on the switch, but it doesn’t set an individual 374 00:28:13,929 --> 00:28:17,830 interface as a routed port. 375 00:28:17,830 --> 00:28:21,659 Let's go on to today's Boson ExSim practice question. 376 00:28:21,659 --> 00:28:25,659 You issue the following commands on a Catalyst 2950 switch. 377 00:28:25,659 --> 00:28:27,590 CONFIGURE TERMINAL. 378 00:28:27,590 --> 00:28:30,289 INTERFACE FASTETHERNET 0/7. 379 00:28:30,289 --> 00:28:33,330 SWITCHPORT TRUNK ENCAPSULATION DOT1Q. 380 00:28:33,330 --> 00:28:35,200 SWITCHPORT MODE TRUNK. 381 00:28:35,200 --> 00:28:38,289 SWITCHPORT TRUNK NATIVE VLAN 44. 382 00:28:38,289 --> 00:28:41,950 Which of the following statements is true regarding VLAN traffic when it is sent over 383 00:28:41,950 --> 00:28:44,419 port FastEthernet0/7? 384 00:28:44,419 --> 00:28:46,059 Select the best answer. 385 00:28:46,059 --> 00:28:48,019 Okay, let's check each option. 386 00:28:48,019 --> 00:28:51,059 A, VLAN 1 traffic will be untagged. 387 00:28:51,059 --> 00:28:55,389 B, VLAN 44 traffic will be untagged. 388 00:28:55,389 --> 00:28:58,559 C, all VLAN traffic will be tagged. 389 00:28:58,559 --> 00:29:02,710 Or D, all VLAN traffic will be untagged. 390 00:29:02,710 --> 00:29:09,540 Please pause the video to think about your answer. 391 00:29:09,540 --> 00:29:15,639 Okay, so I think the correct answer is B, because you issued the SWITCHPORT TRUNK NATIVE 392 00:29:15,639 --> 00:29:18,059 VLAN 44 command. 393 00:29:18,059 --> 00:29:22,529 Traffic in the native VLAN will not be tagged when it is sent over a trunk interface. 394 00:29:22,529 --> 00:29:27,700 So, I think VLAN 44 traffic will be untagged. 395 00:29:27,700 --> 00:29:28,700 Let's check. 396 00:29:28,700 --> 00:29:30,370 Click 'show answer' down here. 397 00:29:30,370 --> 00:29:34,929 And as you can see, B is in fact the correct answer. 398 00:29:34,929 --> 00:29:38,539 Let's check out Boson's explanation a little bit. 399 00:29:38,539 --> 00:29:43,590 Traffic from VLAN 44 will be untagged when it is sent over port FastEthernet0/7. 400 00:29:43,590 --> 00:29:48,720 VLAN 44 traffic is untagged because it has been configured as the native VLAN by the 401 00:29:48,720 --> 00:29:52,360 SWITCHPORT TRUNK NATIVE VLAN 44 command. 402 00:29:52,360 --> 00:29:54,919 By default, the native VLAN is VLAN 1. 403 00:29:54,919 --> 00:30:01,289 So, by default A would be the correct answer, but we changed it to 44. 404 00:30:01,289 --> 00:30:05,740 You can issue the SWITCHPORT TRUNK NATIVE VLAN (vlan-id) command to change the native 405 00:30:05,740 --> 00:30:06,740 VLAN. 406 00:30:06,740 --> 00:30:12,409 Okay, here are explanations for why the incorrect options are incorrect. 407 00:30:12,409 --> 00:30:16,440 It also says you can issue the SHOW INTERFACES TRUNK command to display the list of ports 408 00:30:16,440 --> 00:30:21,299 that are configured for trunking, the native VLAN for each port, and list of currently 409 00:30:21,299 --> 00:30:24,409 allowed VLANs for each trunk port. 410 00:30:24,409 --> 00:30:28,909 And here is an example, down here, after we have changed the native VLAN to 44. 411 00:30:28,909 --> 00:30:33,720 Okay, there are also references here, to Cisco's official cert guide. 412 00:30:33,720 --> 00:30:40,519 This is volume 1, chapter 8, about Ethernet virtual LANs, VLANs. 413 00:30:40,519 --> 00:30:42,429 And some Cisco documentation. 414 00:30:42,429 --> 00:30:47,039 I will leave links to these in the description of the video, so if you want some further 415 00:30:47,039 --> 00:30:53,059 reading about VLAN trunks, dot1q, please check those links in the description for further 416 00:30:53,059 --> 00:30:54,059 reading. 417 00:30:54,059 --> 00:30:58,139 Okay, so that's all for today's Boson ExSim practice question. 418 00:30:58,139 --> 00:31:02,119 If you want to get a copy of Boson ExSim, and I highly recommend you do, they are fantastic 419 00:31:02,119 --> 00:31:06,849 practice exams, please follow the link in the video description. 420 00:31:06,849 --> 00:31:11,070 As usual, there will be supplementary materials for this video. 421 00:31:11,070 --> 00:31:14,450 There will be a review flashcard deck to use with the software ‘Anki’. 422 00:31:14,450 --> 00:31:18,529 Download the deck from the link in the description. 423 00:31:18,529 --> 00:31:22,799 There will also be a packet tracer practice lab to help you practice the configurations 424 00:31:22,799 --> 00:31:24,320 from this video. 425 00:31:24,320 --> 00:31:28,169 That will be in a separate video. 426 00:31:28,169 --> 00:31:32,509 Before finishing this video, I want to give a shoutout to all of my JCNP-level channel 427 00:31:32,509 --> 00:31:33,999 members. 428 00:31:33,999 --> 00:31:39,979 Thank you to C Mohd, Johan, And then I’m sorry, but the next person displays only as 429 00:31:39,979 --> 00:31:41,409 Channel failed to load. 430 00:31:41,409 --> 00:31:46,059 If this is you, please let me know and I will try to ask YouTube to fix it. 431 00:31:46,059 --> 00:31:56,159 Okay, continuing on, thank you to Mark, Aleksa, Miguel, Yousif, Samil, Boson Software (the creators of ExSim), Sidi, 432 00:31:56,159 --> 00:32:03,940 Magrathea, Devin, Charlsetta, Lito, Yonatan, Mike, Aleksander, and Vance. 433 00:32:03,940 --> 00:32:10,120 Sorry if I pronounced your name wrong, but thank you so much for your support. 434 00:32:10,120 --> 00:32:12,320 Thank you for watching. 435 00:32:12,320 --> 00:32:16,230 Please subscribe to the channel, like the video, leave a comment, and share the video 436 00:32:16,230 --> 00:32:19,570 with anyone else studying for the CCNA. 437 00:32:19,570 --> 00:32:21,929 If you want to leave a tip, check the links in the description. 438 00:32:21,929 --> 00:32:28,889 I'm also a Brave verified publisher and accept BAT, or Basic Attention Token, tips via the 439 00:32:28,889 --> 00:32:29,889 Brave browser. 440 00:32:29,889 --> 00:32:31,040 That's all for now. 42393

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.