All language subtitles for Free-CCNA-VLANs-Part-2-Day-17-CCNA-200-301-Complete-Course_en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:04,589 --> 00:00:08,000 This is a free, complete course for the CCNA. 2 00:00:08,000 --> 00:00:12,250 If you like these videos, please subscribe\n 3 00:00:12,250 --> 00:00:17,089 Also, please like and leave a comment, and\n 4 00:00:20,399 --> 00:00:26,839 In this video we will continue with the topic\n 5 00:00:26,839 --> 00:00:32,939 In the last video, Day 16, we covered the\n 6 00:00:32,939 --> 00:00:37,079 what their purpose is, and the most basic\nVLAN configurations. 7 00:00:37,079 --> 00:00:42,859 However, that’s not really enough information,\n 8 00:00:42,859 --> 00:00:44,840 to be able to understand and use VLANs. 9 00:00:44,840 --> 00:00:49,089 That’s what we’ll cover in today’s video. 10 00:00:49,088 --> 00:00:52,109 So let’s take a look at what we’ll cover, exactly. 11 00:00:52,109 --> 00:00:56,850 This will be a fairly long video I think,\n 12 00:00:56,850 --> 00:00:59,390 First of all, what is a trunk port? 13 00:00:59,390 --> 00:01:02,378 I mentioned trunk ports briefly in the last\nvideo. 14 00:01:02,378 --> 00:01:08,189 Whereas an access port belongs to a single\n 15 00:01:10,540 --> 00:01:13,900 Next, what is the purpose of trunk ports? 16 00:01:16,680 --> 00:01:20,840 Next I will talk about 802.1Q encapsulation. 17 00:01:20,840 --> 00:01:26,390 This is an additonal tag added to an Ethernet\n 18 00:01:28,319 --> 00:01:34,519 Next, we’ll go into trunk port configuration,\n 19 00:01:36,599 --> 00:01:40,079 Finally, we’ll cover ‘router on a stick’. 20 00:01:40,079 --> 00:01:44,700 It’s a bit of an odd name, but this is something\n 21 00:01:44,700 --> 00:01:49,890 It’s a more efficient way of performing\n 22 00:01:49,890 --> 00:01:52,820 a separate router interface for every VLAN. 23 00:01:56,219 --> 00:02:01,230 For a quick review, here is the network topology\n 24 00:02:01,230 --> 00:02:03,939 There is a single switch, and three VLANs. 25 00:02:03,939 --> 00:02:10,679 All of the switch interfaces are access ports\n 26 00:02:13,699 --> 00:02:18,500 Three interfaces are used to connect to the\n 27 00:02:18,500 --> 00:02:22,169 For this video, let’s use a different network\ntopology. 28 00:02:22,169 --> 00:02:27,169 Here’s the network topology we’ll start\nwith for this lesson. 29 00:02:27,169 --> 00:02:29,939 This time, there are two switches used. 30 00:02:29,939 --> 00:02:36,250 Note that VLAN10, the VLAN for the engineering\n 31 00:02:36,250 --> 00:02:42,030 This is very common, as departments in a company\n 32 00:02:42,030 --> 00:02:45,930 You might have some engineers on one\n 33 00:02:47,199 --> 00:02:50,819 We are still using only access ports. 34 00:02:50,819 --> 00:02:57,599 There are two links between SW1 and SW2, one\n 35 00:02:57,599 --> 00:03:02,629 There must be a link in VLAN10 between the\n 36 00:03:02,629 --> 00:03:09,299 to both SW1 and SW2, and also because the\n 37 00:03:12,449 --> 00:03:17,869 As for the link in VLAN30, it is necessary\n 38 00:03:21,539 --> 00:03:25,479 There is no link in VLAN20 between SW1 and\nSW2. 39 00:03:25,479 --> 00:03:30,489 This is because there are no PCs in VLAN20\nconnected to SW1. 40 00:03:30,490 --> 00:03:38,730 PCs in VLAN20 can still reach PCs connected\n 41 00:03:38,729 --> 00:03:41,049 Let me demonstrate that inter-VLAN routing. 42 00:03:41,050 --> 00:03:47,430 Let’s say this PC in VLAN20 wants to send\n 43 00:03:49,460 --> 00:03:54,400 It will send the frame with a destination\n 44 00:03:54,400 --> 00:03:58,260 R1 then forwards it back to SW2. 45 00:03:58,259 --> 00:04:04,500 Note that this traffic arrived at SW2 on the\n 46 00:04:04,500 --> 00:04:10,479 so it forwards it to SW1 on the VLAN10 connection\n 47 00:04:12,370 --> 00:04:19,189 So, you can see that, even though there isn’t\n 48 00:04:19,189 --> 00:04:24,449 PC in VLAN20 can still send traffic to the\n 49 00:04:27,478 --> 00:04:33,379 In a small network with few VLANs, it is possible\n 50 00:04:33,379 --> 00:04:37,399 when connecting switches to switches, and\nswitches to routers. 51 00:04:37,399 --> 00:04:42,128 However, when the number of VLANs increases,\nthis is not viable. 52 00:04:42,129 --> 00:04:47,009 It will result in wasted interfaces, and often\n 53 00:04:48,990 --> 00:04:55,418 You can use 'trunk ports' to carry traffic from\n 54 00:04:55,418 --> 00:05:00,459 Once again, these are different than access ports, which belong to 55 00:05:00,459 --> 00:05:04,998 Let’s take a quick look at how trunk ports\nwork. 56 00:05:04,999 --> 00:05:10,820 So, now I’ve replaced those separate connections\n 57 00:05:10,819 --> 00:05:14,810 between SW1 and SW2, and SW2 and R1. 58 00:05:14,810 --> 00:05:19,360 However, to make it more clear, let’s add\nthose colors back. 59 00:05:19,360 --> 00:05:24,028 Okay, so now you can see which VLANs are allowed\non each trunk. 60 00:05:24,028 --> 00:05:29,569 Remember, these are single physical connections,\n 61 00:05:30,918 --> 00:05:38,778 Let’s say this PC in VLAN10 wants to send\n 62 00:05:38,778 --> 00:05:42,819 It sends the traffic to SW2, which then sends\nit to SW1. 63 00:05:45,589 --> 00:05:49,938 How does SW1 know which VLAN the traffic belongs\nto? 64 00:05:49,939 --> 00:05:55,689 Both VLANs 10 and 30 are allowed on the interface\n 65 00:05:55,689 --> 00:05:59,139 SW1 know which VLAN it belongs to? 66 00:06:02,199 --> 00:06:05,889 Switches will ‘tag’ all frames that they\nsend over a trunk link. 67 00:06:05,889 --> 00:06:09,560 This allows the receiving switch to know which\n 68 00:06:09,560 --> 00:06:14,800 In fact, another name for a trunk port is\n 69 00:06:14,800 --> 00:06:18,559 an access port is an ‘untagged’ port. 70 00:06:18,559 --> 00:06:22,680 Frames sent over access ports aren’t tagged,\n 71 00:06:22,680 --> 00:06:25,778 interface belongs to a single VLAN. 72 00:06:25,778 --> 00:06:31,308 If a frame arrives on a switchport in VLAN10,\n 73 00:06:31,309 --> 00:06:35,699 Let’s talk about those VLAN tags. 74 00:06:35,699 --> 00:06:44,788 There are two main trunking protocols: ISL\n 75 00:06:49,050 --> 00:06:55,389 ISL is an old Cisco proprietary protocol,\n 76 00:06:55,389 --> 00:07:02,809 802.1Q. Dot1q is an industry standard\n 77 00:07:02,809 --> 00:07:06,379 Electrical and Electronics Engineers). 78 00:07:10,980 --> 00:07:15,020 That’s Ethernet, another industry standard\nprotocol. 79 00:07:15,019 --> 00:07:17,978 You will probably NEVER use ISL in the real\nworld. 80 00:07:17,978 --> 00:07:21,968 Even modern Cisco equipment doesn’t support\nit. 81 00:07:21,968 --> 00:07:25,279 For the CCNA, you only need to learn dot1q. 82 00:07:25,279 --> 00:07:31,259 You should know what ISL is, but you don’t\n 83 00:07:31,259 --> 00:07:36,449 Okay here’s an old slide, back from Day\n5 on Ethernet switching. 84 00:07:36,449 --> 00:07:40,288 Do you remember the fields of the Ethernet\nheader and trailer? 85 00:07:40,288 --> 00:07:44,649 If you don’t, I recommend going back to\n 86 00:07:44,649 --> 00:07:46,939 time explaining it all again here. 87 00:07:46,939 --> 00:07:52,620 However, the reason I am showing this is because\n 88 00:07:52,620 --> 00:07:54,649 two fields of the Ethernet header. 89 00:07:54,649 --> 00:07:58,050 So, here’s just the Ethernet header. 90 00:07:58,050 --> 00:08:04,408 Dot1q inserts a 4-byte, or 32-bit field between\n 91 00:08:07,199 --> 00:08:12,588 As you can see here, the dot1q tag is inserted\n 92 00:08:12,588 --> 00:08:15,478 or length fields of the Ethernet header. 93 00:08:18,800 --> 00:08:25,300 As I just said, the 802.1Q tag is inserted\n 94 00:08:27,829 --> 00:08:31,658 The tag is 4 bytes, or 32 bits, in length. 95 00:08:31,658 --> 00:08:34,740 The tag consists of two main fields. 96 00:08:34,740 --> 00:08:43,349 Those are the Tag Protocol Identifier, TPID,\n 97 00:08:43,349 --> 00:08:46,280 The TCI itself consists of three sub-fields. 98 00:08:46,279 --> 00:08:51,240 Let’s quickly take a look at each field\nof the dot1q tag. 99 00:08:51,240 --> 00:08:57,399 Here’s a diagram of the dot1q tag format,\nthanks to wikipedia. 100 00:08:57,399 --> 00:09:03,539 Notice that it can be divided into two halves,\n 101 00:09:03,539 --> 00:09:12,429 Also, the TCI can be divided into three sub\n 102 00:09:12,429 --> 00:09:17,159 Okay first up lets look at the TPID field. 103 00:09:17,159 --> 00:09:25,579 The field is 16 bits, or 2 bytes, in length,\n 104 00:09:25,580 --> 00:09:31,400 The TPID is ALWAYS set to a value of 0x8100. 105 00:09:31,399 --> 00:09:39,519 Remember, 0x just means hexadecimal, so the actual\n 106 00:09:41,328 --> 00:09:48,799 Each hexadecimal digit is 4 bits, so 4 x 4\n 107 00:09:48,799 --> 00:09:54,818 This value of 8 1 0 0 indicates that the frame\nis dot1q-tagged. 108 00:09:54,818 --> 00:09:59,028 As I just showed you, the dot1q tag comes\n 109 00:10:00,659 --> 00:10:04,159 This is where the TYPE field is usually located. 110 00:10:04,159 --> 00:10:09,769 When the switch sees this value of 8 1 0 0\n 111 00:10:09,769 --> 00:10:14,929 Okay, that’s all for the TPID field. 112 00:10:14,929 --> 00:10:20,489 Next up let’s look at the first field of\n 113 00:10:24,669 --> 00:10:30,929 It is used for Class of Service, CoS, which\n 114 00:10:31,929 --> 00:10:39,309 Don’t worry about this field too much, just\n 115 00:10:39,309 --> 00:10:43,778 Next up is the DEI, Drop Eligible Indicator. 116 00:10:43,778 --> 00:10:47,039 This field is just a single bit in length. 117 00:10:47,039 --> 00:10:51,410 It is used to indicate frames that can be\n 118 00:10:51,410 --> 00:10:55,349 makes sure more important network traffic\ngets through. 119 00:10:55,350 --> 00:10:59,500 Once again, you don’t really need to worry\n 120 00:10:59,500 --> 00:11:01,919 know the name and it’s basic purpose. 121 00:11:01,919 --> 00:11:08,969 Okay, finally is a very important field, the\n 122 00:11:11,328 --> 00:11:15,919 It is the field that actually identifies the\n 123 00:11:15,919 --> 00:11:20,479 this is the most important field of the dot1q\ntag. 124 00:11:20,480 --> 00:11:26,460 Because this field is 12 bits in length, that\n 125 00:11:26,460 --> 00:11:30,379 2 to the power of 12 equals 4096. 126 00:11:30,379 --> 00:11:37,889 However, the first and last VLANs, 0 and 4095,\n 127 00:11:37,889 --> 00:11:44,509 Therefore, the actual range of VLANs that\n 128 00:11:44,509 --> 00:11:49,470 By the way, Cisco’s proprietary ISL, which\n 129 00:11:49,470 --> 00:11:55,889 over trunk connections, also uses a VLAN range\nof 1 to 4094. 130 00:11:55,889 --> 00:12:00,360 As I mentioned before, however, you don’t\n 131 00:12:00,360 --> 00:12:04,399 completely replaced by the industry standard\ndot1q. 132 00:12:04,399 --> 00:12:09,000 So, those are the fields of the dot1q tag. 133 00:12:09,000 --> 00:12:13,399 Take a look at this diagram, do you remember\n 134 00:12:15,089 --> 00:12:19,449 If you want to read a little bit about dot1q,\n 135 00:12:21,970 --> 00:12:26,899 Okay let me talk about the VLAN ranges a little\nbit more. 136 00:12:26,899 --> 00:12:33,860 The range of VLANs, which as I mentioned is\n 137 00:12:33,860 --> 00:12:41,050 'normal VLANs', which are numbered from 1 to\n 138 00:12:44,970 --> 00:12:49,920 Some older devices cannot use the extended\n 139 00:12:49,919 --> 00:12:53,519 that modern switches will support the extended\nVLAN range. 140 00:12:53,519 --> 00:12:58,269 I work with Cisco switches a lot in my job,\n 141 00:12:58,269 --> 00:13:03,110 doesn’t support the entire range, from 1\nto 4094. 142 00:13:03,110 --> 00:13:07,759 Just be aware that some older switches might\n 143 00:13:07,759 --> 00:13:12,439 Okay, so let’s look at this diagram once again. 144 00:13:12,440 --> 00:13:18,820 So, this PC in VLAN10 wants to send\n 145 00:13:18,828 --> 00:13:24,219 The traffic goes to SW2, which then forwards\n 146 00:13:26,519 --> 00:13:32,940 SW1 receives the frame, and because the destination\n 147 00:13:34,309 --> 00:13:40,250 Remember, a standard layer 2 switch like this\n 148 00:13:40,250 --> 00:13:45,970 it will not forward traffic between VLANs. 149 00:13:45,970 --> 00:13:48,870 Let me introduce another concept of dot1q. 150 00:13:48,870 --> 00:13:52,438 Dot1q has a feature called the NATIVE VLAN. 151 00:13:52,438 --> 00:13:56,938 Cisco’s ISL does not have this feature,\nby the way. 152 00:13:56,938 --> 00:14:02,559 The native VLAN is VLAN 1 by default on all\n 153 00:14:04,049 --> 00:14:08,948 It’s important to remember that this has\n 154 00:14:08,948 --> 00:14:11,588 a global configuration on the switch. 155 00:14:11,589 --> 00:14:15,660 Now, what exactly does the native VLAN do? 156 00:14:15,659 --> 00:14:20,860 The switch does not add an 802.1Q tag to frames\n 157 00:14:20,860 --> 00:14:25,068 It will forward the frame normally, without\n 158 00:14:25,068 --> 00:14:29,620 So, what does the receiving switch do when\n 159 00:14:31,250 --> 00:14:35,448 When a switch receives an untagged frame on\n 160 00:14:36,730 --> 00:14:41,680 So, it’s very important that the native\n 161 00:14:41,679 --> 00:14:47,208 Switches will still forward traffic if there\n 162 00:14:51,429 --> 00:14:55,539 This time, let’s say I’ve configured the\n 163 00:14:57,929 --> 00:15:01,509 Let’s follow some traffic on the same path\nas usual. 164 00:15:01,509 --> 00:15:05,999 This PC sends the traffic to SW2. 165 00:15:05,999 --> 00:15:11,490 It will send the traffic to SW1, but because\n 166 00:15:14,539 --> 00:15:20,250 The untagged frame arrives at SW1, which assumes\n 167 00:15:20,250 --> 00:15:23,839 forwards it to the destination. 168 00:15:23,839 --> 00:15:28,580 This time, let’s look at if there is a native\n 169 00:15:28,580 --> 00:15:33,339 On SW2’s interface I’ve configured VLAN10\nas the native VLAN. 170 00:15:33,339 --> 00:15:39,259 However, on SW1’s interface I’ve configured\n 171 00:15:41,990 --> 00:15:45,500 Up to the point the traffic reaches SW1, it’s\nthe same. 172 00:15:45,500 --> 00:15:50,220 However, when SW1 receives the frame this\nis what it will think. 173 00:15:51,919 --> 00:15:54,469 Therefore, it must belong to VLAN30. 174 00:15:54,470 --> 00:15:57,899 But, the destination is in VLAN10, not VLAN30. 175 00:15:57,899 --> 00:16:00,068 So, I won’t forward the frame. 176 00:16:00,068 --> 00:16:04,549 So, I think you can see why it is important\n 177 00:16:06,289 --> 00:16:11,719 Let’s look at another reason why it’s\n 178 00:16:11,720 --> 00:16:18,028 This time, this PC in VLAN10 wants to reach\nthis PC in VLAN30. 179 00:16:18,028 --> 00:16:24,308 The PC sends the frame to SW2, which forwards\n 180 00:16:27,230 --> 00:16:31,649 However, VLAN30 is the native VLAN of SW1. 181 00:16:31,649 --> 00:16:36,679 When this frame tagged with VLAN30 arrives,\n 182 00:16:36,679 --> 00:16:39,620 not forward it to the destination. 183 00:16:39,620 --> 00:16:44,580 Because it expects all traffic in VLAN 30\n 184 00:16:44,580 --> 00:16:48,690 will consider the frame to be an error, and\nnot forward it. 185 00:16:48,690 --> 00:16:52,860 So once again, make sure the native VLAN matches\non each switch! 186 00:16:52,860 --> 00:16:57,480 Okay, let’s finally get into the configuration\nof trunk ports. 187 00:16:57,480 --> 00:17:01,938 I’ve added the interface numbers to the\n 188 00:17:01,938 --> 00:17:11,139 So, we will be configuring G0/0 on SW1,\n 189 00:17:15,910 --> 00:17:20,450 First let’s look at the most basic trunk\n 190 00:17:22,950 --> 00:17:28,809 After entering interface configuration mode,\n 191 00:17:28,809 --> 00:17:31,899 manually configure the interface as a trunk. 192 00:17:31,900 --> 00:17:35,990 However, in this case we got an error message. 193 00:17:35,990 --> 00:17:40,970 Command rejected, an interface whose trunk\n 194 00:17:44,650 --> 00:17:48,220 Many modern switches do not support Cisco’s\nISL at all. 195 00:17:51,130 --> 00:17:56,660 Even though ISL is a proprietary Cisco protocol,\n 196 00:17:58,849 --> 00:18:04,829 However, switches that do support both dot1q\n 197 00:18:04,829 --> 00:18:09,619 example) have a trunk encapsulation of ‘Auto’\nby default. 198 00:18:09,619 --> 00:18:15,399 To manually configure the interface as a trunk\n 199 00:18:18,900 --> 00:18:24,540 On switches that only support dot1q, this\nis not necessary. 200 00:18:24,539 --> 00:18:28,759 After you set the encapsulation type, you\n 201 00:18:28,759 --> 00:18:32,549 So, let’s see how to set the encapsulation\ntype. 202 00:18:32,549 --> 00:18:37,279 You use the SWITCHPORT TRUNK ENCAPSULATION\ncommand. 203 00:18:37,279 --> 00:18:40,309 I used the question mark to see the options. 204 00:18:40,309 --> 00:18:44,200 There are dot1q, isl, and negotiate. 205 00:18:44,200 --> 00:18:47,650 Negotiate sets it to AUTO mode, so we cant\nchoose that. 206 00:18:47,650 --> 00:18:52,500 I will talk more about AUTO mode in the next\n 207 00:18:52,500 --> 00:18:54,779 questions I will answer them there. 208 00:18:54,779 --> 00:19:00,369 I set the encapsulation to dot1q, and then\n 209 00:19:02,410 --> 00:19:08,050 On switches that only support dot1q, you will\n 210 00:19:08,049 --> 00:19:13,659 but on some switches you will need to set\n 211 00:19:13,660 --> 00:19:18,190 I used the SHOW INTERFACES TRUNK command to\nconfirm. 212 00:19:18,190 --> 00:19:21,519 First up, the trunk interfaces are listed\nhere. 213 00:19:21,519 --> 00:19:26,200 'Mode on' means that the interface was manually\n 214 00:19:26,200 --> 00:19:30,950 In the next lecture we will look at how a\n 215 00:19:30,950 --> 00:19:34,390 configuration, but we’ll forget about that\nfor the moment. 216 00:19:34,390 --> 00:19:40,710 Encapsulation is dot1q as we configured, status\n 217 00:19:40,710 --> 00:19:44,620 mentioned before, is the default of 1. 218 00:19:44,619 --> 00:19:48,299 Under that, the VLANs allowed on the trunk\nare displayed. 219 00:19:48,299 --> 00:19:53,769 By the default, ALL VLANs, 1 to 4094, are\nallowed on the trunk. 220 00:19:53,769 --> 00:19:58,549 However, for security purposes, we might want\n 221 00:19:58,549 --> 00:20:03,329 trunk, so we’ll look at that configuration next. 222 00:20:03,329 --> 00:20:07,929 Next up is VLANs allowed and active in management\ndomain. 223 00:20:07,930 --> 00:20:13,539 This includes the default VLAN of 1, as well\n 224 00:20:15,299 --> 00:20:22,589 Note that, although VLAN1, which exists by\n 225 00:20:22,589 --> 00:20:26,220 which I showed you in the previous lecture\nvideo, do not. 226 00:20:26,220 --> 00:20:29,960 As I mentioned before, don’t worry about\n 227 00:20:31,930 --> 00:20:37,039 The last field of the SHOW INTERFACES TRUNK\n 228 00:20:39,170 --> 00:20:44,039 I’ll talk about this in a future lecture,\n 229 00:20:46,950 --> 00:20:51,059 Here is the command to configure the VLANs\nallowed on a trunk. 230 00:20:51,059 --> 00:20:55,639 SWITCHPORT TRUNK ALLOWED VLAN, and then there\nare some options. 231 00:20:55,640 --> 00:20:59,250 WORD allows you to simply configure the list\nof VLANs allowed. 232 00:21:01,579 --> 00:21:08,519 So, I used the command SWITCHPORT TRUNK ALLOWED\n 233 00:21:08,519 --> 00:21:13,960 Notice that the SHOW INTERFACES TRUNK command\n 234 00:21:16,720 --> 00:21:19,610 Now let’s take a look at the ADD option. 235 00:21:19,609 --> 00:21:23,549 This allows you to add allowed VLANs to the\n 236 00:21:23,549 --> 00:21:29,859 Currently VLANs 10 and 30 are allowed, let’s\n 237 00:21:29,859 --> 00:21:33,990 hosts in VLAN20 are connected to SW1. 238 00:21:33,990 --> 00:21:39,690 This time I used the command SWITCHPORT TRUNK\n 239 00:21:39,690 --> 00:21:45,590 The SHOW INTERFACES TRUNK command now shows\n 240 00:21:48,200 --> 00:21:53,490 Note that, because I haven’t actually created\n 241 00:21:53,490 --> 00:21:59,250 displayed in the VLANs allowed and active\n 242 00:21:59,250 --> 00:22:02,200 Next up I’ll show you the ‘remove’ option. 243 00:22:02,200 --> 00:22:06,539 VLAN20 isn’t necessary on this trunk, so\nlet’s remove it. 244 00:22:06,549 --> 00:22:11,289 I used the command SWITCHPORT TRUNK ALLOWED\nVLAN REMOVE 20. 245 00:22:11,289 --> 00:22:17,000 Now, as you can see, VLAN20 has been removed\n 246 00:22:21,150 --> 00:22:23,170 Next up lets look at the ALL option. 247 00:22:23,170 --> 00:22:28,210 I think this one is fairly obvious, but lets\ntake a look anyway. 248 00:22:28,210 --> 00:22:32,840 This time I used the command SWITCHPORT TRUNK\nALLOWED VLAN ALL. 249 00:22:32,839 --> 00:22:35,589 Now all VLANs are allowed on the trunk. 250 00:22:35,589 --> 00:22:41,859 This is the same as the default state, as\n 251 00:22:41,859 --> 00:22:44,719 Next up lets look at the EXCEPT option. 252 00:22:44,720 --> 00:22:47,789 It allows all VLANS except the ones you specify. 253 00:22:51,339 --> 00:22:58,730 I used the command SWITCHPORT TRUNK ALLOWED\n 254 00:22:58,730 --> 00:23:08,420 As you can see it allows all VLANs except\n 255 00:23:08,420 --> 00:23:15,460 Okay, finally let’s look at the NONE option,\n 256 00:23:15,519 --> 00:23:21,839 This time I used the command SWITCHPORT TRUNK\n 257 00:23:23,779 --> 00:23:28,190 This effectively allows no traffic to pass\n 258 00:23:28,190 --> 00:23:31,000 settings we want for this network. 259 00:23:33,420 --> 00:23:37,940 SW1 has hosts in VLAN 10 and VLAN 30 connected\nto it. 260 00:23:37,950 --> 00:23:42,580 No hosts in VLAN20 are connected, so there’s\n 261 00:23:44,009 --> 00:23:49,359 So, let’s set the allowed VLANs to 10 and\n30 like we did before. 262 00:23:52,490 --> 00:23:56,640 Now the only VLANs allowed on the trunk are\nVLANs 10 and 30. 263 00:23:56,640 --> 00:24:01,500 The reason to do this is for security purposes,\n 264 00:24:03,839 --> 00:24:09,949 Also, for network performance purposes, this\n 265 00:24:09,950 --> 00:24:13,549 and such in other VLANs won’t be sent over\nthe trunk. 266 00:24:13,549 --> 00:24:17,919 Now, I said I’d show you how to change the\nnative VLAN. 267 00:24:17,920 --> 00:24:23,960 For security purposes, it is best to change\n 268 00:24:23,960 --> 00:24:28,029 Network security will be explained more in-depth\n 269 00:24:28,029 --> 00:24:32,599 This video is already getting long so I won’t\n 270 00:24:32,599 --> 00:24:38,019 about limiting unnecessary traffic in the\n 271 00:24:38,019 --> 00:24:42,990 Also, remember to make the native VLAN match\nbetween switches. 272 00:24:42,990 --> 00:24:46,650 Now let’s look at how to change the native\nVLAN. 273 00:24:46,650 --> 00:24:53,470 The command to change the native VLAN is SWITCHPORT\n 274 00:24:56,950 --> 00:25:04,200 As you can see, the native VLAN has now been\nchanged to 1001. 275 00:25:04,200 --> 00:25:08,819 After configuring this trunk port, I did the SHOW VLAN BRIEF 276 00:25:08,819 --> 00:25:14,679 Notice that G0/0 is not listed anywhere. Not in VLAN10 or 277 00:25:14,680 --> 00:25:18,420 even though those are the VLANs allowed on the trunk. 278 00:25:18,420 --> 00:25:24,300 This is because the SHOW VLAN BRIEF command shows the access ports 279 00:25:24,299 --> 00:25:26,819 not the trunk ports that allow each VLAN. 280 00:25:26,920 --> 00:25:32,360 Use the SHOW INTERFACES TRUNK command instead to confirm trunk 281 00:25:32,359 --> 00:25:36,799 Now that we’ve seen the configurations\n 282 00:25:39,450 --> 00:25:45,140 On SW2’s G0/0 interface, we must allow VLANs\n10 and 30. 283 00:25:45,140 --> 00:25:51,500 On SW2’s G0/1 interface, however, we must\nallow VLAN 20 as well. 284 00:25:51,500 --> 00:25:58,200 Here are the configurations for SW2’s G0/0\n 285 00:25:58,200 --> 00:26:02,019 These are the same as before, so I won’t go\nthrough each one. 286 00:26:02,019 --> 00:26:06,500 You can pause the video if you want to take a look\n 287 00:26:06,500 --> 00:26:10,440 Now let’s move on to G0/1, which is connected\nto R1. 288 00:26:10,440 --> 00:26:13,720 Okay, here are the configurations. 289 00:26:13,720 --> 00:26:20,539 Almost identical to G0/0, except I allowed\n 290 00:26:20,549 --> 00:26:27,259 Now, both G0/0 and G0/1 are displayed in the\n 291 00:26:27,259 --> 00:26:32,379 So, that’s all for the switch configurations\nfor this lesson. 292 00:26:32,380 --> 00:26:35,660 However, you may be wondering about the router. 293 00:26:35,660 --> 00:26:40,100 In the previous lecture, we used three separate\n 294 00:26:40,099 --> 00:26:45,789 R1, and assigned a separate IP address to\neach one on R1. 295 00:26:45,789 --> 00:26:50,319 Each one served as the default gateway address\n 296 00:26:50,319 --> 00:26:55,019 However, now we are using only one physical\n 297 00:26:55,019 --> 00:26:58,789 So, we must use ‘subinterfaces’ on\nR1. 298 00:27:01,960 --> 00:27:05,250 First of all, look at the title of the slide. 299 00:27:05,250 --> 00:27:08,569 ROUTER ON A STICK, also written as ROAS. 300 00:27:08,569 --> 00:27:13,500 It’s a bit of a strange name, but it’s\n 301 00:27:13,500 --> 00:27:18,460 routing, as there is only a single physical\n 302 00:27:18,460 --> 00:27:22,190 and it looks like a ‘stick’ on the network\ntopology diagram. 303 00:27:22,190 --> 00:27:29,519 So, in this case that one physical interface\n 304 00:27:29,519 --> 00:27:33,079 It’s connected to G0/1 on SW2. 305 00:27:33,079 --> 00:27:39,539 But, we can actually divide this one physical\n 306 00:27:39,539 --> 00:27:44,500 which will allow us to perform inter-VLAN\n 307 00:27:47,680 --> 00:27:58,500 G0/0.10 for VLAN10, G0/0.20 for VLAN20, and\nG0/0.30 for VLAN30. 308 00:27:58,500 --> 00:28:04,509 These three logical subinterfaces are really\n 309 00:28:04,509 --> 00:28:11,859 to SW2’s G0/1 interface, but they can operate\n 310 00:28:11,859 --> 00:28:15,990 Before we look at the router configurations,\n 311 00:28:18,809 --> 00:28:25,190 We already configured G0/1 as a trunk, and\n 312 00:28:25,190 --> 00:28:31,230 That’s all you need to do on the switch, configure\n 313 00:28:31,230 --> 00:28:35,710 Now let’s look at the router configurations. 314 00:28:37,329 --> 00:28:43,079 First, make sure the interface is enabled\n 315 00:28:46,059 --> 00:28:48,700 Next up is the first subinterface. 316 00:28:48,700 --> 00:28:52,789 Notice how to enter subinterface configuration\nmode. 317 00:28:56,410 --> 00:29:00,860 This subinterface number does not have to\nmatch the VLAN number. 318 00:29:00,859 --> 00:29:06,229 However it is highly recommended that they\n 319 00:29:06,230 --> 00:29:11,400 If each subinterface’s number matches the\n 320 00:29:14,690 --> 00:29:20,269 The next command after that is ENCAPSULATION\n 321 00:29:22,539 --> 00:29:27,759 This tells the router to treat any arriving\n 322 00:29:27,759 --> 00:29:31,390 as if they arrived on this sub interface. 323 00:29:31,390 --> 00:29:36,820 If a frame arrives tagged with VLAN10, R1\n 324 00:29:39,619 --> 00:29:45,509 It will also tag all frames leaving this subinterface\n 325 00:29:45,509 --> 00:29:53,640 Finally, after the encapsulation dot1q command,\n 326 00:29:53,640 --> 00:29:56,870 Once again, I have assigned the last usable\n 327 00:29:56,869 --> 00:30:00,529 And that’s all for this subinterface. 328 00:30:00,529 --> 00:30:03,789 Then I did the same thing with the other two\nsubinterfaces. 329 00:30:03,789 --> 00:30:09,960 Again, I made the subinterface and VLAN numbers\n 330 00:30:09,960 --> 00:30:15,370 of each subnet as the IP address of the subinterface. 331 00:30:15,369 --> 00:30:20,009 If you confirm with the SHOW IP INTERFACE\n 332 00:30:20,009 --> 00:30:25,220 subinterfaces appears, as well as the physical\n 333 00:30:25,220 --> 00:30:29,559 itself has no IP address assigned to it. 334 00:30:29,559 --> 00:30:31,919 And here is the routing table. 335 00:30:31,920 --> 00:30:36,019 Notice the connected and local routes are\n 336 00:30:36,019 --> 00:30:39,150 to regular physical interfaces. 337 00:30:39,150 --> 00:30:46,600 When R1 sends frames out of these subinterfaces,\n 338 00:30:46,599 --> 00:30:54,219 For example, if a packet arrives destined\n 339 00:30:54,220 --> 00:30:58,600 the packet out of it’s G0/0 interface tagged\nwith VLAN20. 340 00:30:58,599 --> 00:31:04,819 Okay, let’s review the important points\nabout router on a stick. 341 00:31:04,819 --> 00:31:10,559 ROAS is used to route between multiple VLANs\n 342 00:31:12,180 --> 00:31:16,130 The switch interface is configured as a regular\ntrunk. 343 00:31:16,130 --> 00:31:19,830 The router interface is configured using subinterfaces. 344 00:31:19,829 --> 00:31:25,069 You configure the VLAN tag and IP address\non each subinterface. 345 00:31:25,069 --> 00:31:29,769 The router will behave as if frames arriving\n 346 00:31:29,769 --> 00:31:32,990 subinterface configured with that VLAN tag. 347 00:31:32,990 --> 00:31:38,680 Finally, the router will tag frames sent out\n 348 00:31:42,250 --> 00:31:46,319 Now that we have configured the router, let’s\n 349 00:31:46,319 --> 00:31:50,059 routing works with these subinterfaces. 350 00:31:50,059 --> 00:31:55,769 This PC in VLAN10 is trying to reach this\nPC in VLAN30. 351 00:31:58,059 --> 00:32:04,809 SW2 sends the frame on its G0/1 interface\n 352 00:32:04,809 --> 00:32:12,879 R1 receives it on its G0/0 interface, identifying\n 353 00:32:15,910 --> 00:32:27,120 The destination is in the subnet 192.168.1.128/26,\n 354 00:32:27,119 --> 00:32:31,069 so it sends the frame out of its G0/0 interface. 355 00:32:31,069 --> 00:32:37,119 It tags it as VLAN30 because that is what\n 356 00:32:37,119 --> 00:32:42,489 SW2 then forwards it to SW1, tagging it as\n 357 00:32:42,490 --> 00:32:45,529 SW1 then forwards the frame to the destination. 358 00:32:45,529 --> 00:32:50,450 Okay, let’s quickly review before moving\non to today’s quiz. 359 00:32:50,450 --> 00:32:55,340 I think I say this after every video these\n 360 00:32:56,339 --> 00:33:01,089 Please rewatch certain parts of the video\n 361 00:33:01,089 --> 00:33:05,250 materials to help you practice and review\nas well. 362 00:33:05,250 --> 00:33:09,029 First off, we answered the question WHAT IS\nA TRUNK PORT? 363 00:33:09,029 --> 00:33:14,599 It’s a switch interface that carries traffic\n 364 00:33:14,599 --> 00:33:17,809 We also answered what the purpose of a trunk\nport is. 365 00:33:17,809 --> 00:33:23,109 It allows switches to forward traffic from\n 366 00:33:23,109 --> 00:33:27,609 instead of having to use a separate physical\n 367 00:33:27,609 --> 00:33:34,049 I also introduced 802.1Q encapsulation, which\n 368 00:33:34,049 --> 00:33:39,329 and is used to identify which VLAN the frame\n 369 00:33:39,329 --> 00:33:44,629 I showed how to configure trunk ports on a\n 370 00:33:44,630 --> 00:33:47,700 type, allowed VLANs, and native VLAN. 371 00:33:47,700 --> 00:33:53,210 Finally, I showed you how to configure ROUTER\n 372 00:33:53,210 --> 00:33:58,900 subinterfaces on a single physical interface,\n 373 00:33:58,900 --> 00:34:03,830 VLANs and subnets to be routed without having\n 374 00:34:04,829 --> 00:34:07,319 It’s like a trunk port on a router. 375 00:34:07,319 --> 00:34:12,210 Finally, let’s move on to today’s quiz. 376 00:34:14,878 --> 00:34:21,269 You want to configure SW1 to send VLAN10 frames\n 377 00:34:29,378 --> 00:34:33,860 B, switchport trunk allowed vlan 10. 378 00:34:33,860 --> 00:34:37,909 C, switchport trunk allowed vlan add 10. 379 00:34:37,909 --> 00:34:42,500 D, switchport trunk native vlan 10. 380 00:34:42,500 --> 00:34:49,380 Pause the video to think about your answer. 381 00:34:49,380 --> 00:34:53,659 The answer is D, switchport trunk native VLAN10. 382 00:34:53,659 --> 00:35:00,119 A, encapsulation dot1q 10 is used on a router\n 383 00:35:01,639 --> 00:35:06,069 B and C are used to modify the VLANs allowed\non the trunk. 384 00:35:06,070 --> 00:35:11,210 D is used to specify the native VLAN, and\n 385 00:35:17,320 --> 00:35:22,070 After modifying the VLANs allowed on a trunk\n 386 00:35:25,130 --> 00:35:29,260 A, switchport trunk allowed vlan default. 387 00:35:29,260 --> 00:35:33,870 B, switchport trunk allowed vlan all. 388 00:35:33,869 --> 00:35:38,469 C, switchport trunk allowed vlan none. 389 00:35:38,469 --> 00:35:45,869 Or D, switchport trunk allowed vlan 1 and\n1001 to 1005. 390 00:35:45,869 --> 00:35:52,500 Pause the video to think about your answer. 391 00:35:52,500 --> 00:35:57,070 The answer is B, switchport trunk allowed\nVLAN all. 392 00:35:57,070 --> 00:36:02,850 By default all VLANs are allowed on a trunk\n 393 00:36:02,849 --> 00:36:05,110 will return it to the default state. 394 00:36:05,110 --> 00:36:11,490 Answer D, by the way, lists the VLANs that\n 395 00:36:11,489 --> 00:36:14,429 different than the VLANs allowed on a trunk\nby default. 396 00:36:18,599 --> 00:36:23,299 You try to configure an interface on a Cisco\n 397 00:36:23,300 --> 00:36:27,019 mode trunk, but the command is rejected. 398 00:36:27,019 --> 00:36:29,650 Which command might fix this issue? 399 00:36:33,360 --> 00:36:39,140 B, switchport trunk encapsulation 802.1q. 400 00:36:39,139 --> 00:36:44,809 C, switchport trunk encapsulation dot1q. 401 00:36:44,809 --> 00:36:49,150 Or D, switchport trunk encapsulation auto. 402 00:36:49,150 --> 00:36:55,119 Pause the video to think about your answer. 403 00:36:55,119 --> 00:37:00,019 The answer is C, switchport trunk encapsulation\ndot1q. 404 00:37:00,019 --> 00:37:06,480 On Cisco switches that support both 802.1Q\n 405 00:37:06,481 --> 00:37:10,830 you want to manually configure the interface\n 406 00:37:10,829 --> 00:37:16,569 encapsulation type with SWITCHPORT TRUNK\nENCAPSULATION DOT1Q. 407 00:37:16,570 --> 00:37:20,740 You could use ISL instead, but ISL is almost\nnever used. 408 00:37:24,889 --> 00:37:30,569 Which field of the 802.1Q tag identifies the\n 409 00:37:40,980 --> 00:37:46,820 Pause the video to think about your answer. 410 00:37:49,460 --> 00:37:57,460 VID stands for VLAN ID, it is 12 bits long\n 411 00:37:57,460 --> 00:38:05,329 TPID stands for tag protocol identifier, and\n 412 00:38:09,269 --> 00:38:15,139 PCP stands for priority code point and is\n 413 00:38:16,809 --> 00:38:21,719 D, VLN, is not a real field of the 802.1Q\ntag. 414 00:38:21,719 --> 00:38:27,619 Let’s go to the last question, question\n5. 415 00:38:27,619 --> 00:38:34,019 You configured switchport trunk allowed vlan\n 416 00:38:34,019 --> 00:38:39,639 appear in the Vlans allowed and active in\n 417 00:38:43,530 --> 00:38:48,120 A, VLAN10 doesn’t exist on the switch. 418 00:38:51,079 --> 00:38:59,619 C, the command should be switchport trunk\n 419 00:39:01,900 --> 00:39:07,760 Pause the video to think about your answer. 420 00:39:07,760 --> 00:39:12,490 The answer is A, VLAN10 doesn’t exist on\nthe switch. 421 00:39:12,489 --> 00:39:17,459 If a VLAN doesn’t exist on the switch, even\n 422 00:39:17,460 --> 00:39:22,780 appear in the 'Vlans allowed and active in\n 423 00:39:27,130 --> 00:39:32,590 Okay, so as always there will be supplementary\n 424 00:39:32,590 --> 00:39:36,620 There will be flash cards to use with the\n 425 00:39:39,199 --> 00:39:43,500 There will also be a packet tracer practice\n 426 00:39:45,610 --> 00:39:49,240 That will be in a separate video. 427 00:39:49,239 --> 00:39:55,789 Before finishing this video, I want to think\n 428 00:39:55,789 --> 00:40:05,500 Thank you to Charlsetta, Lito, Yonatan, Mike,\n 429 00:40:07,949 --> 00:40:14,379 Sorry if I pronounced your names incorrectly,\n 430 00:40:14,380 --> 00:40:20,750 Extra shoutout to Boson software, I absolutely\n 431 00:40:20,750 --> 00:40:27,269 network simulator, check out the links in\n 432 00:40:28,849 --> 00:40:32,750 Please subscribe to the channel, like the\n 433 00:40:32,750 --> 00:40:36,099 with anyone else studying for the CCNA. 434 00:40:36,099 --> 00:40:38,699 If you want to leave a tip, check the links\nin the description. 435 00:40:38,699 --> 00:40:44,849 I'm also a Brave verified publisher and accept\n 36279

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.