|
Table of Contents
Virtual LANsVLAN Description
Features
Components
VLAN Configuration Steps
Accessing the Virtual LAN Menu
Management Domains
Assigning a Management Domain
Verifying the Management Domain Assignment
VLAN Characteristics
Defining a VLAN
Verifying the VLAN Definition
Grouping Switch Ports to VLANs
Verifying the Grouping of Switch Ports
VLAN Trunking
VLAN Trunking With ATM
VLAN Trunking and Load Sharing
Load Sharing Using Port Priorities
Assigning STP Port Priority for Load Sharing
Verifying the STP Port Priority for Load Sharing
Load Sharing Using STP Path Costs
Configuring Load Sharing Using Path Costs
Load Sharing Example
Configuring VLAN Trunks
DISL Port States
Precautions for Trunking State
Configuring Trunks
Verifying Trunk Configuration
Adding a VLAN to an Allowed List
Verifying a VLAN Allowed List Addition
Deleting a VLAN from the Allowed List
Viewing the List of Allowed VLANs
Adding a Pruning-Eligible VLAN
Verifying Pruning-Eligible VLAN Additions
Deleting a Pruning-Eligible VLAN
Viewing a List of Pruning-Eligible VLANs
Displaying VLANs Transmitting and Receiving Flooded Traffic
VLAN Trunk Protocol
VTP Modes
Transmitting VTP Information
Configuring VTP
Verifying VTP Configuration
Configuring a VTP Password
VTP Pruning
Enabling VTP Pruning
Verifying VTP Pruning
Dynamic Port VLAN Membership
VLAN Membership Policy Server
Dynamic Ports on VMPS Clients
Configuring Dynamic Port VLAN Membership
Configuring the VMPS Addresses
Verifying VMPS Addresses
Configuring Dynamic Ports
Verifying Dynamic Port Configuration
Spanning-Tree Protocol
Configuring Spanning-Tree Protocol on Different VLANs
Accessing the STP Menu
Enabling and Disabling STP
Verifying STP Configuration
Configuring STP Options
Assigning an STP Instance
Virtual LANs
This chapter describes virtual LAN (VLAN) features and functionality, the Virtual LAN Menu of the Catalyst 2820 and Catalyst 1900 switches, and procedures for creating VLANs and assigning ports to VLANs. VLAN Description
A VLAN is a switched network that is logically segmented by functions, project teams, or applications without regard to the physical location of users. For example, several end stations might be grouped as a department, such as engineering or accounting. When the end stations are physically located close to one another, you can group them into a LAN segment. If any of the end stations are in different buildings (not the same physical LAN segment), you can then group them into a VLAN.Figure 2-1 shows an example of VLANs that span multiple switches and multiple floors or a building.
You can assign each switch port to a VLAN. Ports in a VLAN share broadcast traffic. Ports that do not belong to that VLAN do not share the broadcast traffic. Ports from multiple Catalyst 2820 and Catalyst 1900 switches can be members of the same VLAN.
Figure 2-1: VLANs Spanning Multiple Switches and Multiple FloorsBridge Groups" section in Chapter 3, "Additional Features."
Features
VLANs provide the following features:
Simplification of end-station moves, adds, and changesWhen an end station is physically moved to a new location, its attributes can be reassigned from a network management station through Simple Network Management Protocol (SNMP) or through the user interface menus. When an end station is moved within the same VLAN, it retains its previously assigned attributes in its new location. When an end station is moved to a different VLAN, the attributes of the new VLAN are applied to the end station. You can assign the Internet Protocol (IP) address of a Catalyst 2820 or Catalyst 1900 switch to any VLAN. A network management station and workstations on any Catalyst series switch VLAN then have direct access to other Catalyst 2820 and
Catalyst 1900 switches on the same VLAN, without needing a router. Only one IP address can be assigned to a Catalyst 2820 or Catalyst 1900 switch; if the IP address is reassigned to a different VLAN, the previous IP address assignment to a VLAN is invalid. VLANs allow ports on the same or different switches to be grouped so that traffic is confined to members of only that group. This feature restricts broadcast, unicast, and multicast traffic (flooding) only to ports included in a certain VLAN. The management domain is a group of VLANs that are managed by a single administrative authority. You can create VLANs for an entire management domain from a single Catalyst 2820 or
Catalyst 1900 switch. You can increase security by segmenting the network into distinct broadcast domains. To this end, VLANs can restrict the number of users in a broadcast domain. You can also control the size and composition of the broadcast domain by controlling the size and composition of a VLAN. Table 2-1 shows the capabilities and defaults for the Catalyst 2820 and Catalyst 1900 VLAN features. Controlled traffic activity
Workgroup and network security
Table 2-1: Feature Capability Default
Trunk ports
Supports a maximum of two trunks. The Catalyst 1900 switch supports a maximum of two Inter-Switch Link (ISL) trunks. The Catalyst 2820 switch supports both ISL and Asynchronous Transfer Mode (ATM) LAN emulation (LANE) trunk connections and ATM permanent virtual connections (PVCs). Fast Ethernet trunk ports can be grouped using the Fast EtherChannel feature to form a single trunk.
No trunk ports are enabled.
Supports Spanning-Tree Protocol (STP) on VLAN trunks to load share.
No load sharing is set up.
Supports server, client, and transparent modes. However, you can only configure server and transparent modes. Server and transparent modes support a maximum of 128 VLANs. From server mode, the switch automatically transitions to client mode if it learns more than 128 VLANs from advertisements. Client mode supports
1005 VLANs.
Configured to server mode. Set to no-management domain state.
Supports pruning.
Pruning is disabled.
Supports dynamic and static ports.
The default VLAN membership of all ports is static, and all ports reside in VLAN 1.
VLAN Membership Policy Server (VMPS)
Does not function as a VMPS on the network. (The Catalyst 5000 series switches support this feature.)
No default.
Runs on a maximum of 64 VLANs at one time.
VLANs 1 to 64 are enabled with STP.
Catalyst 2820 and Catalyst 1900 VLAN FeaturesComponentsNetworks that have VLANs contain one or more of the following components:
Switches that logically segment connected end stationsSwitches use frame identification, or tagging, to logically group users into administratively defined VLANs. Based on rules you define, tagging determines where the frame is to be sent by placing a unique identifier in the header of each frame before it is forwarded throughout the switch fabric. The identifier is examined and understood by each switch prior to any broadcasts or transmissions to other switches, routers, or end-station devices. When the frame exits the switch fabric, the switch removes the identifier before the frame is transmitted to the target end station. networks by mapping VLANs on the Ethernet network to emulated LANs (ELANs) on the ATM network. Fast Ethernet, FDDI, or ATM for higher throughput between switches and routers. Transport protocols that carry VLAN traffic across shared LAN and ATM backbones
VLAN Configuration Steps Switches are the entry points into the switched fabric for end-station devices and can group users, ports, or logical addresses into common communities of interest. You can use both a single switch or multiple connected switches to group ports and users into communities. By grouping ports and users together across multiple switches, VLANs can span single-building infrastructures, interconnected buildings, or campus networks. You can logically group users on Ethernet and ATM Routers that provide VLAN communications between workgroups
Routers provide policy-based control, broadcast management, and route processing and distribution. They also provide the communication between VLANs and the access to shared resources, such as servers and hosts. Routers connect to other parts of the network that are either logically segmented into subnets or that require access to remote sites across wide area links. Routers are integrated into the switching fabric by using high-speed backbone connections over The VLAN transport protocol enables information to be exchanged between interconnected switches residing on the corporate backbone. The backbone acts as the aggregation point for high-volume traffic. It also carries end-user VLAN information and identification between switches, routers, and directly attached servers. Within the backbone, high-bandwidth, high-capacity links carry the traffic throughout the enterprise. Interoperability with previously installed LAN systems
VLANs provide compatibility with previously installed systems, such as shared hubs and stackable devices. You can add shared hubs without changing existing network equipment. You also can share traffic and network resources that attach directly
to switching ports with VLAN designations.
Use the Virtual LAN Menu to perform the following tasks, which are described in this chapter:Accessing the Virtual LAN Menu
Access the Virtual LAN MenuAssign a management domain
Define a VLAN
Group switch ports to VLANs
Configure trunks
Configure VTP
Configure VTP pruning
Configure dynamic port membership
To access the Virtual LAN Menu, enter V at the selection prompt on the Main Menu. The following display appears:
Catalyst 1900 - Virtual LAN Configuration --------------------Information---------------- VTP version: 1 Configuration revision: 1 Maximum VLANs supported locally: 1005 Number of existing VLANs: 6 Configuration last modified by: 0.0.0.0 at 01-03-2000 18:35:56 --------------------Settings------------------ [N] Domain name [V] VTP mode control Server [F] VTP pruning mode Disabled [O] VTP traps Enabled --------------------Actions------------------- [L] List VLANs [A] Add VLAN [M] Modify VLAN [D] Delete VLAN [E] VLAN Membership [S] VLAN Membership Servers [T] Trunk Configuration [W] VTP password [P] VTP Statistics [X] Exit to Main Menu Enter Selection:
When configuring the functions displayed on the menu, you might not use the options in the order in which they appear in the menu. Many of the menu entries prompt you for an additional selection and then return you to the Virtual LAN Menu for the next step.
Management Domains
When creating a VLAN, you must first determine and configure the management domain on the switch. Management domains group VLANs into zones of different administrative responsibilities. Catalyst 2820 and Catalyst 1900 switches support only one management domain for each switch.
Catalyst 2820 and Catalyst 1900 switches operate in one of three modes: server, client, or transparent mode. By default, a Catalyst 2820 or Catalyst 1900 switch in the no-management domain state is a VTP server; that is, it learns from received advertisements on a configured trunk port. If trunks are configured on the switch, VTP receives and transmits VLAN advertisements. In server mode, you can add or delete VLANs by using the VTP Management Information Base (MIB) SNMP management station, the command-line interface (CLI), or the console menus.The Catalyst 2820 and Catalyst 1900 switches automatically change from VTP server mode to VTP client mode when they receive an advertisement with more than 128 VLANs. You cannot configure a Catalyst 2820 or Catalyst 1900 switch for VTP client mode. As in VTP server mode, a switch in VTP client mode also transmits advertisements and learns new information from advertisements. However, you cannot add, delete, or modify a VLAN through the MIB or the console. The VTP client does not maintain VLAN information in nonvolatile storage; when it starts, it learns the configuration by receiving advertisements from the trunk ports. Assigning a Management Domain
A switch configured in VTP server mode advertises VLAN configuration to neighboring switches through its trunks and learns new VLAN configurations from those neighbors. Use the server mode to add or delete VLANs and to modify VLAN information by using the VTP MIB, the CLI, or the console menus. For example, when you add a VLAN, VTP advertises the new VLAN to other switches, and both servers and clients prepare to receive traffic on their trunk ports.
In VTP transparent mode, the switch does not advertise or learn VLAN configurations from the network. When a switch is in VTP transparent mode, you can modify, add, or delete VLANs through the console menus, the CLI, or the MIB.
When a switch is in the no-management domain state and running in either server or client mode, it inherits a management domain name and configuration revision number upon receiving an advertisement from a configured trunk port. The configuration revision number reflects the latest revision of the VTP configuration. If a management domain for the switch is defined, the switch ignores advertisements with a different management domain or a lower configuration revision number and checks all received advertisements with the same management domain for consistency. If the information contained in the received advertisement is consistent, the switch propagates the advertisements to other trunk ports and adds the newly learned information locally. Because all devices in the same management domain learn about any new VLANs configured in the transmitting device, you need to configure a new VLAN on only one device in the management domain.
A management domain is a group of VLANs that is under the same administrative responsibility. You need to assign a management domain to the switch before you create a VLAN.Verifying the Management Domain Assignment
By default, a Catalyst 2820 or Catalyst 1900 switch resides in the no-management domain state until it is configured with a management domain or receives an advertisement for a management domain. To assign a management domain, do the following:
Step Action1. Access the VLAN Configuration Menu.
Select [V] Virtual LAN Menu from the Main Menu.
2. Define the VLAN management domain of the switch.
a. Select [N] Domain Name Menu from the Virtual LAN Menu.
b. Enter the management domain name at the selection prompt.
c. Press Return. The Virtual LAN Menu reappears.
To verify that you have assigned the management domain, view the domain name on the Virtual LAN Configuration Menu.
VLAN Characteristics
To create a new VLAN, you need to define the VLAN characteristics. The Enterprise Edition software prompts you to define these characteristics:
Maximum transmission unit (MTU)—the maximum packet size, in bytes, that the VLAN can use.802.10 SAID—the IEEE 802.10 security association identifier (SAID) of a VLAN.
Translational bridge—The VLAN identifier of the translationally bridged VLAN. The VLANs that are translationally bridged must be of different types.
Ring number—the ring number of an FDDI or Token-Ring VLAN. The ring number is used for source routing in a Token-Ring architecture.
Parent VLAN—the parent VLAN of an FDDI or Token-Ring VLAN. The parent VLAN must be an FDDI-Net or Token-Ring-Net VLAN. The parent VLAN specifies the VLAN ID to which an FDDI or Token-Ring VLAN is attached for bridging functions.
STP type—IBM or IEEE (for FDDI-Net or Token-Ring-Net VLANs).
Bridge number—the bridge number of an FDDI-Net or Token-Ring-Net VLAN.
Defining a VLAN
VLAN number—the VLAN identifier.
Note When configuring an ATM VLAN name—the VLAN name. The VLAN name must be a unique name in the management domain.
VLAN type—Ethernet, FDDI, Token-Ring, FDDI-Net, or Token-Ring-Net.
VLAN state—enabled or suspended. When a VLAN is suspended, all traffic on the switch for that VLAN is blocked.
To define a VLAN, you need to specify its attributes. Complete the following steps to set the VLAN number, name, IEEE 802.10 SAID value, and MTU size.
Step Action1. Access the VLAN Configuration Menu.
Select [V] Virtual LAN Menu from the
Main Menu.
2. Add the specified VLAN to the VLAN list.
Select [A] Add VLAN from the
Virtual LAN Menu.
3. Define the type of VLAN to be added.
Enter the type of VLAN at the selection prompt. For Ethernet, enter [1]. Press Return.
4. Define the VLAN number.
At the next menu, select [N] VLAN Number, and enter the number of the VLAN to be added. Press Return.
5. Define the VLAN name.
At the next menu, select
[V] VLAN Name, and enter the name of the VLAN to be added. Press Return.
6. Set the IEEE 802.10 SAID value.
At the next menu, select [I] 802.10 SAID, and enter the appropriate value. The value must be within the range shown on the screen, and the value cannot be the same as the value of another IEEE 802.10 value. After you enter the value, press Return.
7. Set the MTU size.
At the next menu, select [M] MTU Size, and enter the appropriate value. Press Return.
8. Enable the VLAN.
At the next menu, select
[T] VLAN State, and select Enabled. Press Return.
9. Save the configuration.
Select [S] Save.
Verifying the VLAN DefinitionTo verify that you have configured the VLAN, view the VLAN settings on the Virtual LAN Configuration Menu. To do this, select [L] from the Virtual LAN Menu to access the list of defined VLANs. Verify that the defined VLAN was added to the list. To get a complete list of parameters for a particular VLAN, select [M] Modify VLANs.
Grouping Switch Ports to VLANs
Before configuring a VLAN, you need to determine its structure and consider how to group users into VLANs. Based on access, security, and bandwidth requirements, decide which users need to be part of the same VLAN according to these considerations:Figure 2-2 shows a local VLAN configuration that groups switch ports into VLAN 10 and VLAN 20.
Media type—All ports in the VLAN must support the same media type as defined in the VLAN.Access—As an example, consider assigning VLAN membership based on product-team membership or department groupings.
Traffic—If a particular server interface is a bottleneck because of heavy traffic, you might want to add a second interface to the server and divide the users into two VLANs.
Number of VLANs—You can configure from 1 to 1005 VLANs.
Figure 2-2: Local VLAN Configurationhas all switched Ethernet ports statically assigned to VLAN 1. If a port is assigned to a VLAN that is not created or to a VLAN in a suspended state, that port acquires the disabled-no-VLAN status. The port cannot forward or receive traffic until the VLAN assigned to that port is enabled. group the switch ports to VLANs, do the following: Step Action
1. Access the Virtual LAN Menu.
Select [V] Virtual LAN from the Main Menu.
2. Access the VLAN Membership screen.
Select [E] VLAN Membership.
3. Access the VLAN Assignment screen.
Select [V] VLAN Assignment.
4. Select the appropriate VLAN for each port.
Enter the appropriate port numbers at the selection prompt, and select the VLAN to group the ports at the next selection prompt. Press Return.
Fast Ethernet port can function as an ISL trunk, a static VLAN member port, or a dynamic VLAN member port. An ATM module can function as a LANE trunk or a static VLAN member port. You can configure a Fast Ethernet port as a static VLAN member port by following the steps listed. To configure an ATM port as a static VLAN member port, you must also configure a LANE client. For more information on configuring LANE clients, refer to the Catalyst 2820 ATM Modules Installation and Configuration Guide.Verifying the Grouping of Switch PortsA VLAN created in a management domain remains unused until it is mapped to switch ports. The VLAN Membership menu maps the VLANs to ports. The default configuration
To
Note When selecting VLANs, you can only assign VLAN 0 to dynamic ports. You cannot assign VLAN 0 to static ports. Dynamic ports are listed as VLAN 0 on the VLAN Assignment screen if no VLAN has been obtained. If a VLAN has been obtained, the VLAN number is shown on the screen. You can assign VLAN 1 to VLAN 1005 to static ports.A
To verify that you have grouped switch ports to VLANs, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] Virtual LAN from the Main Menu.
2. Access the VLAN Membership screen.
Select [E] VLAN Membership.
VLAN Trunking
A VLAN trunk can connect two Catalyst 2820 or Catalyst 1900 switches; it can also connect a Catalyst 2820 or Catalyst 1900 switch to a Catalyst 5000 series switch or to a router. For concepts about VLAN with load sharing, refer to "VLAN Trunking and Load Sharing" later in this section.
The Catalyst 1900 and Catalyst 2820 switches support two Fast Ethernet ISL trunks. A trunk can be a one-port Fast Ethernet TX, a one-port Fast Ethernet FX, or an ATM module. Refer to the Catalyst 2820 ATM Modules Installation and Configuration Guide to determine the firmware version that supports trunking.VLAN Trunking With ATM
For each enabled VLAN that is known to the VTP and included in the allowed list for the trunk port, a Fast Ethernet ISL trunk automatically carries traffic for the VLAN and extends VLANs from one Catalyst switch to another.
For an ATM trunk to carry traffic for a VLAN, all of the following conditions must be met:Figure 2-3 shows the Catalyst 2820 using ATM trunking.
The VLAN must be enabled.The VLAN must be known to the VTP.
The VLAN must be included in the allowed list.
A corresponding ELAN name mapped to the specified VLAN ID must be defined on the ATM module, and the VLAN ID must match the VLAN used on the switch. For a PVC, the VLAN ID must be bound to a PVC.
The ATM trunk module does not forward frames from the switch for a VLAN until you define a LANE client. Each VLAN must be associated with either a LANE client or a PVC before the ATM trunk module forwards traffic to and from a VLAN. When creating a LANE client or PVC on the module, a VLAN number is needed to map the ATM connection to a VLAN. For more information on configuring LANE clients, refer to the Catalyst 2820 ATM Modules Installation and Configuration Guide.
To configure support for RFC 1483, you must bind PVCs to the VLAN, and the VLAN ID must match the VLAN ID used on the switch. Each ATM trunk module supports a maximum of 64 active VLANs at one time.
Figure 2-3: Catalyst 2820 ATM ELAN Configuration with a RouterVLAN Trunking and Load Sharing
There are three ways to configure load sharing using trunk ports. One way uses STP port priorities; the second way uses STP path costs. (For a third method, refer to the "Fast EtherChannel" section in Chapter 3, "Additional Features.") If you configure load sharing using STP port priorities, both load-sharing links must be connected to the same switch. If you configure load sharing using STP path costs, each load-sharing link can be connected to the same switch or to two different switches.
Load Sharing Using Port Priorities
To use load sharing with port priorities, you must use STP parameters on a VLAN basis. These parameters define which VLANs have priority access to a trunk and which VLANs use the trunk as a backup.Each trunk port supports two STP port priorities. You can assign one of the two priorities to each VLAN. As a result, the trunk port with the higher priority (lower integer values) for a VLAN remains in the forwarding state. The trunk port with the lower priority (higher integer values) for the same VLAN remains in the blocking state. One trunk port transmits or receives all traffic for the VLAN.Figure 2-4 shows two trunks that are connected to the switched 100BaseTX ports on two Catalyst 1900 switches. The port cost of carrying VLAN traffic across these trunks is equal.
VLANs 8 through 10 are assigned a port priority of 10 on Trunk 1.
VLANs 3 through 6 retain the default port priority of 128 on Trunk 1.
VLANs 3 through 6 are assigned a port priority of 10 on Trunk 2.
VLANs 8 through 10 retain the default port priority of 128 on Trunk 2.
Trunk 1 carries traffic for VLANs 8 through 10, and Trunk 2 carries traffic for VLANs 3 through 6. If the active trunk fails, the trunk with lower priority takes over and carries the traffic for all of the VLANs.
Figure 2-4: Load Sharing Using Port Priorities
Assigning STP Port Priority for Load Sharing
Catalyst 2820 and Catalyst 1900 switches use load sharing on parallel trunks. By setting STP parameters on a VLAN basis, you can define which VLANs have priority access to a trunk and which VLANs use the trunk as a backup when another trunk fails.When two ports on the same bridge form a loop, port priority determines which port is enabled and which port is in standby mode. A trunk port supports two port priorities. These priorities are assigned from the Trunk Port STP Configuration Menu. You can enter a port priority value from 0 to 255, with the lowest value having the highest priority. To assign a priority to a port, do the following:
Step Action1. Access the Port Configuration Menu.
Enter [P] Port Configuration at the selection prompt in the Main Menu.
2. Specify the port (or trunk port) to be prioritized.
Enter the port number at the selection prompt, and press Return.
3. Access the Trunk STP Configuration Menu.
Enter [T] Trunk STP Configuration at the selection prompt.
4. Select the port priority value for option 1 and option 2.
a. Select [I] Port Priority (spanning tree) - option 1.
b. Enter the port priority at the selection prompt. Press Return.
c. Select [J] Port Priority (spanning tree) - option 2.
d. Enter the port priority at the selection prompt. Press Return.
5. Assign the VLANs to port priority option 1 or port priority option 2.
a. Select [M] Assign VLANs to option 1 port priority.
b. Enter the VLAN numbers that are to use port priority option 1 at the selection prompt. Press Return.
c. Select [O] Assign VLANs to option 2 port priority.
d. Enter the VLAN numbers that are to use port priority option 2 at the selection prompt. Press Return.
Verifying the STP Port Priority for Load Sharing Note This feature cannot be used with Fast EtherChannel.
To verify the port priority option values and the assignment of VLANs to port priority options 1 and 2, access the Trunk Port STP Configuration Menu, and select [E] to show the assignment of VLANs to port priority options.
Load Sharing Using STP Path Costs
You can configure load sharing between trunk ports by assigning two STP path costs (path-cost option 1 and path-cost option 2) to each trunk and then assigning different VLANs to the different path costs. path costs for option 1 and option 2. Consequently, STP selects the path for VLAN traffic by using the Bridge ID. All VLANs then use the same path to forward traffic, as shown in Figure 2-5.
Note This feature cannot be used with Fast EtherChannel.By default, trunk ports are assigned the same STP
Figure 2-5: Traffic Path Without Load Sharing
Figure 2-6.
You can configure VLAN 1 to use a different path than VLAN 2 by assigning two path costs per trunk and assigning each VLAN to use a different path cost on each trunk, as shown in
Figure 2-6: Traffic Path With Load Sharing
Figure 2-5 and Figure 2-6, path costs are applied to the bottom switch.
Configuring Load Sharing Using Path Costs
To configure load sharing using path costs, do the following:
Set the trunk state for trunk A and trunk B to one of these options:On
Desirable
Auto
No-negotiate
The trunk state on the remote end of the trunk connection (that is, on the other switch) must be in a state that allows trunking. Refer to the "DISL Port States" section for more information on this subject.
Note Load sharing cannot be configured on a trunk that is in the off state. Set the two path-cost options on trunk A to different values.Assign one VLAN to use the higher path cost for trunk A, and assign another VLAN to use the lower path cost for trunk A.
Set the two path-cost options on trunk B to the same values as those you assigned to trunk A.
Assign the VLAN that used the higher trunk A path cost to use the lower trunk B path cost.
Assign the VLAN that used the lower trunk A path cost to use the higher trunk B path cost.
Load Sharing Example
The following example configures load sharing by configuring the following parameters:
Trunk A path-cost option 1 is 10 (default).Trunk A path-cost option 2 is a value less than or equal to 10.
Note The value of path cost option 2 on any trunk must be less than or equal to the value for path cost option 1 on the same trunk. Trunk B path-cost option 1 is 10 (default).
Trunk B path-cost option 2 is a value less than or equal to 10.
VLAN 1 is assigned to use trunk A path-cost option 1 and trunk B path-cost option 2.
VLAN 2 is assigned to use trunk A path-cost option 2 and trunk B path-cost option 1.
Step Action
1. Access the Virtual LAN Menu.
Select [V] Virtual LAN from the Main Menu.
2. Access the Trunk Configuration Menu.
Enter [T] Trunk Configuration.
3. Select trunk A.
At the next menu, enter [A], and press Return.
4. Access the trunking setting.
Enter [T] Trunking.
5. Configure the trunking state for the selected port.
At the next menu, select a state:
[1] On[3] Desirable
[4] Auto
[5] Nonegotiate
Press Return.
6. Select trunk B.
At the next menu, enter [N] Next Trunk.
7. Access the trunking setting.
Enter [T] Trunking.
8. Configure the trunking state for the selected port.
At the next menu, select a state:
[1] On[3] Desirable
[4] Auto
[5] Nonegotiate
Press Return.
9. Return to the Main Menu.
Enter [X] Exit, twice.
10. Access the Port Configuration Menu.
Enter [P] Port Configuration.
11. Select trunk A.
At the next menu, enter [A], and press Return.
12. Access the trunk port A STP Configuration Menu.
Enter [T] Trunk STP configuration.
13. Select the path-cost for option 2.
At the next menu, select [B] Path cost (spanning tree) - option 2.
14. Enter the new path-cost for option 2.
At the prompt, enter 100, and press Return.
15. Assign VLAN1 to path-cost option 1.
a. Select [T] Assign VLANs to option 1 Path cost.
b. Enter 1 and press Return.
16. Assign VLAN2 to path-cost option 2.
a. Select [Y] Assign VLANs to option 2 Path cost.
b. Enter 2 and press Return.
17. Access the trunk port B STP configuration menu.
a. Enter [N] Next Trunk.
18. Select the path-cost for option 2.
At the next menu, select [B] Path cost (spanning tree) - option 2.
19. Enter the new path-cost for option 2.
At the prompt, enter 100, and press Return.
20. Assign VLAN1 to path-cost option 2.
a. Select [Y] Assign VLANs to option 2 Path cost.
b. Enter 1, and press Return.
21. Assign VLAN2 to path-cost option 1.
a. Select [T] Assign VLANs to option 1 Path cost.
b. Enter 2, and press Return.
Table 2-2 summarizes the VLAN and path-costs assigned in this example.
Table 2-2: Path Cost = 10 Path Cost = 100 Trunk A
VLAN 1
VLAN 2
Trunk BVLAN 2
VLAN 1
VLAN Path-Cost AssignmentsConfiguring VLAN TrunksLoad sharing is achieved as follows:
For VLAN 1, STP puts trunk A in forwarding state and trunk B in blocking state.For VLAN 2, STP puts trunk B in forwarding state and trunk A in blocking state.
A VLAN trunk physically links two VLAN-capable switches or a VLAN-capable switch and a VLAN-capable router. VLAN trunks carry the traffic of multiple VLANs so you can extend VLANs from one Catalyst series switch to another. 100BaseTX or 100BaseFX and ATM modules as trunks. On the Catalyst 1900, you can configure the 100BaseTX or 100Base FX ports as trunks. (Refer to the Catalyst 2820 ATM Modules Installation and Configuration Guide to determine the firmware version that supports trunking.)DISL) protocol synchronizes the configuration of two interconnected Fast Ethernet interfaces into an ISL trunk. The DISL protocol ensures that both of the Fast Ethernet interfaces are either in trunking or nontrunking mode. cannot be used if you have configured bridge groups on the switch. For more information on bridge groups, see the "Bridge Groups" section in Chapter 3, "Additional Features."
If you are using VTP to propagate VLAN information, you must enable a trunk to receive and propagate VLAN information through network advertisements. The switch then learns the management domain and the VLANs within it that are defined on all other switches. Refer to the section titled "Configuring VTP" for instruction for setting this option. ISL-capable switch ports process DISL packets from switches that have the same VTP domain name or a null domain name. If a switch port receives a DISL packet with a different VTP domain name than the domain name configured on the switch, the packet is discarded.
Figure 2-7 shows an example of a Fast Ethernet ISL configuration.
Figure 2-7: Catalyst 2820 Switches and Catalyst 1900 Switches in a Fast Ethernet ISL Configuration
DISL Port States
The DISL protocol requires that there is a point-to-point ISL connection between two devices. DISL-capable ports can be configured to be in any of the states described in
Table 2-3.
Table 2-3: Port State Description
On
Configures the port in permanent ISL trunk mode and negotiates with the connected device to convert the link to trunk mode. The port converts to a trunk, even if the other end of the link does not. This state is used when an ISL port is connected to another ISL port that does not support the DISL protocol.
Off
Disables port trunking and negotiates with the connected device to convert the link to nontrunk. The port converts to a nontrunk mode, even if the other end of the link does not. This state is used when an ISL port is connected to another ISL port that does not support the DISL protocol. (Default)
Desirable
Triggers the port to negotiate the link from nontrunking to trunking mode. The port negotiates to a trunk port if the connected device is either in the On, Desirable, or Auto state. Otherwise, the port becomes a nontrunk port.
Auto
Enables a port to become a trunk only if the connected device has the state set to On or Desirable.
No-negotiate
Configures the port in permanent ISL trunk mode, but the port does not generate or process DISL frames. Use this state when an ISL port is connected to another ISL port (such as a router ISL port) that does not support the DISL protocol.
DISL Port StatesstatusTable 2-4.)The of a VLAN port is shown in the grayed out field in the Status column of the web console Port Management Page. These non-configurable VLAN states indicate the DISL status of a port and whether or not the port has been disabled or suspended because no VLAN has been configured for the port. (See
Table 2-4: VLAN Port Status VLAN Port Status Description
Suspended-DISL
The port is suspended due to DISL negotiation.
Suspended No-VLAN
The port is suspended because there is no VLAN assigned to the port.
Disabled No-VLAN
The port is disabled because the VLAN assigned to the port does not exist.
Precautions for Trunking StateThe on (or off) trunking state might cause configuration problems. Use the on or off state when an ISL port is connected to a device that you know does not support the DISL protocol. Because configurations can change, we advise you to set the trunking state to auto or desirable. If the other port does not support DISL, the port then functions as normal in static mode.
Using the on trunking state when the DISL protocol is in use might lead to ISL-mode mismatches where one end of the link is trunking while the other end is not. The situation can arise if the switch on the other end of the trunk is in no-negotiate state. Therefore, if a trunk is desired, use the desirable trunking state.
Using the off trunking state is not recommended when using DISL protocol. The risk of creating an ISL-mode mismatch is lower with the off mode, but if a trunk is not desired, use auto mode.
Table 2-5 shows the possible combinations of DISL port states for two switches, Switch 1 and Switch 2. For each port state combination, it also lists the trunking mode of the switch. An asterisk (*) indicates a misconfigured state that, if configured, results in a loss of connectivity.
Switch 1 Port State Switch 2 Port State Switch 1 Mode Switch 2 ModeOff
Off
Nontrunking
Nontrunking
Off
On
Nontrunking
Trunking*
Off
Desirable
Nontrunking
Nontrunking
Off
Auto
Nontrunking
Nontrunking
Off
No-negotiate
Nontrunking
Trunking*
On
Off
Trunking
Nontrunking*
On
On
Trunking
Trunking
On
Desirable
Trunking
Trunking
On
Auto
Trunking
Trunking
On
No-negotiate
Trunking
Trunking
Desirable
Off
Nontrunking
Nontrunking
Desirable
On
Trunking
Trunking
Desirable
Desirable
Trunking
Trunking
Desirable
Auto
Trunking
Trunking
Desirable
No-negotiate
Nontrunking
Trunking*
Auto
Off
Nontrunking
Nontrunking
Auto
On
Trunking
Trunking
Auto
Desirable
Trunking
Trunking
Auto
Auto
Nontrunking
Nontrunking
Auto
No-negotiate
Nontrunking
Trunking*
No-negotiate
Off
Trunking*
Nontrunking*
No-negotiate
On
Trunking
Trunking
No-negotiate
Desirable
Trunking*
Nontrunking*
No-negotiate
Auto
Trunking
Nontrunking*
No-negotiate
No-negotiate
Trunking
Trunking
DISL Port State CombinationsConfiguring TrunksYou cannot change the trunking state of an ATM module. The trunking state of trunk-capable ATM modules defaults to on. The trunking state of ATM modules not capable of trunking defaults to off.
To configure a trunk, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] from the Main Menu.
2. Access the Trunk Configuration Menu.
Enter [T] Trunk Configuration.
3. Select the appropriate trunk port.
At the next menu, enter [A] or [B] at the selection prompt, and press Return.
4. Access the trunking setting.
Enter [T] Trunking.
5. Configure the trunking state for the selected port.
At the next menu, select a setting:
[1] On[2] Off
[3] Desirable
[4] Auto
[5] Nonegotiate
Press Return.
Verifying Trunk ConfigurationTo verify that you have configured the selected port as a trunk port, check the trunking status and encapsulation type at the top of the Trunk Configuration screen. (When a link is present, a Fast Ethernet trunk shows ISL encapsulation. An ATM module shows LANE encapsulation.) From the Main Menu, access the Port Configuration Menu to see the status of each active VLAN.
Adding a VLAN to an Allowed List
Each trunk has a list of VLANs called allowed VLANs that are enabled to receive and transmit all types of traffic on that trunk. You must configure the VLAN and add it to the allowed list for the trunk so that it can receive trunk traffic. By default, all configured VLANs are allowed on a trunk. To add a VLAN to the allowed list, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] from the Main Menu.
2. Access the Trunk Configuration Menu.
Enter [T] Trunk Configuration.
3. Select the appropriate trunk port.
At the next menu, enter [A] or [B] at the selection prompt, and press Return.
4. Add the VLAN to the allowed list for the trunk.
a. Enter [A] Add Allowed VLANs at the selection prompt.
b. Enter the appropriate VLAN number at the selection prompt in the next menu. The Trunk Configuration Menu reappears.
Verifying a VLAN Allowed List AdditionTraffic will not be forwarded to or from a VLAN that is not included in the VLAN allowed list.
To verify that you have added a VLAN to the allowed list, select [V] List Allowed VLANs from the Trunk Configuration Menu, and examine the contents of the display.
Deleting a VLAN from the Allowed List
To delete a VLAN from the allowed list, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] Virtual LAN from the Main Menu.
2. Access the Trunk Configuration Menu.
Enter [T] Trunk Configuration.
3. Delete the VLAN number.
a. Select [D] Delete Allowed VLAN(s).
b. Enter the appropriate VLAN number at the selection prompt in the next menu, and press Return.
Viewing the List of Allowed VLANsTo view the list of allowed VLANs, select [V] List Allowed VLANs from the Trunk Configuration Menu.
Adding a Pruning-Eligible VLAN
The flood traffic of a VLAN is typically sent to all switches in the same management domain that are connected by trunks. Pruning VLANs restricts the flood traffic of a VLAN to just those switches that have member ports. When you prune eligible VLANs, you restrict the flood traffic of those VLANs. VTP pruning does not affect the flow of nonflooded traffic, such as known unicast and multicast traffic. Each trunk is configured with its own pruning-eligible list of VLANs. This list is only relevant if VTP pruning is enabled. Verifying Pruning-Eligible VLAN Additions
To add a pruning-eligible VLAN, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] from the Main Menu.
2. Access the Trunk Configuration Menu.
Enter [T] Trunk Configuration.
3. Select the appropriate trunk port.
At the next menu, enter [A] or [B] at the selection prompt, and press Return.
4. Add the pruning eligible VLAN.
a. Enter [E] Add Pruning Eligible VLAN(s) at the selection prompt.
b. Enter the appropriate VLAN number at the selection prompt in the next menu. The Trunk Configuration Menu reappears.
To verify that you have added a pruning-eligible VLAN, select [T] Trunk Configuration, and view the contents of the display. To view additional VLAN information, select [F] List Pruning Eligible VLANs.
Deleting a Pruning-Eligible VLAN
To delete a pruning -eligible VLAN, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] from the Main Menu.
2. Access the Trunk Configuration Menu.
Enter [T] Trunk Configuration.
3. Delete the VLAN number.
a. Select [C] Delete Pruning Eligible VLAN(s).
b. Enter the appropriate VLAN number at the selection prompt in the next menu, and press Return.
Viewing a List of Pruning-Eligible VLANsTo view the list of pruning-eligible VLANs, select [F] List Pruning Eligible VLANs from the Trunk Configuration Menu.Displaying VLANs Transmitting and Receiving Flooded Traffic
For more information about pruning, refer to the "Configuring VTP Pruning" section in this chapter.
You can use the Trunk Configuration Menu to display the following lists:
A list of VLANs on which flooded traffic is transmitted over a specified trunkIf a remote switch on a specified trunk requests the local switch to transmit flooded traffic on a specific list of VLANs, you can display that VLAN list on the local switch. At the selection prompt of the Trunk Configuration Menu, select [S] List VLANs that Transmit Flooded Traffic. A list of VLANs on which flooded traffic is received over a specified trunk
VLAN Trunk Protocol If a local switch on a specified trunk requests the remote switch to transmit flooded traffic on a specific list of VLANs, you can display that VLAN list on the local switch. At the selection prompt of the Trunk Configuration Menu, select [R] List VLANs that Receive Flooded Traffic.
The VTP maintains VLAN configuration consistency throughout the network. VTP manages the addition, deletion, and modification of VLANs at the system level, automatically communicating this information to all the other switches in the network. In addition, VTP minimizes these possible configuration inconsistencies that can result in security violations: VTP Modes
VLANs can become cross-connected when duplicate names are used.VLANs can become internally disconnected when they are incorrectly mapped between one LAN type and the other.
You can configure VLANs on Catalyst 2820 and Catalyst 1900 switches when the switch is in VTP server or transparent mode. You can use the CLI, console menus, or the MIB (when using a SNMP management station) to modify a VLAN configuration when the switch is in either server or transparent modes.Table 2-6 shows the maximum number of VLANs stored in nonvolatile RAM (NVRAM), the console or MIB configuration options, the advertisement options, and the maximum number of active VLANs for Catalyst 2820 and Catalyst 1900 switches.
A switch configured in VTP server mode advertises VLAN configuration to neighboring switches through its trunks and learns new VLAN configurations from those neighbors. Use the server mode to add or delete VLANs and to modify VLAN information by using either the VTP MIB, the CLI, or the console. For example, when you add a VLAN, VTP advertises the new VLAN, and both servers and clients prepare to receive traffic on their trunk ports.
After the switch automatically transitions to VTP client mode, it transmits advertisements and learns new information from advertisements. However, you cannot add, delete, or modify a VLAN through the MIB, the CLI, or the console. The VTP client does not maintain VLAN information in nonvolatile storage; when it starts, it learns the configuration by receiving advertisements from the trunk ports.
In VTP transparent mode, the switch does not advertise or learn VLAN configurations from the network. When a switch is in VTP transparent mode, you can modify, add, or delete VLANs through the console, the CLI, or the MIB.
Table 2-6: Catalyst 2820 and Catalyst 1900 VTP Modes Mode Maximum Number of VLANs in NVRAM MIB, CLI, or Console Configuration Switch Receives Advertisements Maximum Number of VLANs
VTP server
128
MIB, CLI, or console configuration for up to 128 VLANs
Yes
128
VTP transparent
128
MIB, CLI, or console configuration for up to 128 VLANs
No
128
VTP client
0
Not configurable
Yes
1005
VTP client mode to VTP transparent mode, the switch retains only the first 128 VLANs and deletes the remaining VLANs.connections, including ISL, IEEE 802.10, and LANE. The VTP MIB provides the SNMP instrumentation for the VTP, allowing the reading and setting of specific VTP parameters.VTP establishes global configuration values and distributes the following global configuration information:Configuring VTP
VLAN IDs (ISL)
Emulated LAN names (ATM LANE)
IEEE 802.10 SAID values (FDDI)
Maximum transmission unit (MTU) size for a VLAN
VTP maintains VLAN consistency throughout the network and manages VLAN modifications at the system level. With VTP, VLAN changes are automatically communicated to all other switches in the network.Verifying VTP Configuration
To configure VTP, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] from the Main Menu.
2. Verify the setting of a management domain name.
Access [N] Domain Name on the Virtual LAN Menu. Verify that the server has a VTP management domain so that VTP information can be sent to other VTP switches in the management domain.
Press Return to view the Virtual Lan Menu.
3. Access the VTP Mode Control Menu.
Select [V] VTP Mode Control from the VLAN Configuration Menu.
4. Select the server mode.
Enter [S] Server at the selection prompt. The VLAN Configuration Menu reappears.
Note The switch learns advertisements only if other VTP devices reside on the network, and at least one trunk port must be configured on the switch. VTP learns from advertisements within 5 minutes.To verify that VTP is enabled and the switch is transmitting and receiving advertisements, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] from the Main Menu.
2. Access the list of defined VLANs.
Select [L] from the Virtual LAN Menu.
3. View the VTP statistics.
Select [P] VTP Statistics at the selection prompt of the Virtual LAN Menu, and view the contents on the display.
Configuring a VTP Password
Step Action1. Access the Virtual LAN Menu.
Select [V] from the Main Menu.
2. Enter a password.
a. Select [W] VTP Password from the Virtual LAN Menu.
b. Enter a password at the selection prompt.
VTP PruningVTP pruning is a method of traffic control that reduces unnecessary broadcast, multicast, and flooded unicast packets. This feature restricts flood traffic to only those trunk links that access the appropriate network devices. By default, VLANs 2 through 1001 are pruning-eligible. You cannot prune default VLANs (VLANs 1, 1002, 1003, 1004, or 1005). In a switching fabric, if certain parts of the network do not require the forwarding of flooded traffic on specific VLANs and VTP pruning is enabled, the switch prevents the forwarding of flooded traffic to pruning-eligible VLANs. VTP pruning blocks flood traffic to VLANs on trunk ports that are included in the pruning-eligible list. If the VLANs are configured as pruning-ineligible, the flooding continues. Figure 2-8 and Figure 2-9. The Catalyst 2820 and Catalyst 1900 switches are connected by trunks that also are spanning-tree forwarding paths.
Refer to
Figure 2-8: Nonoptimal Flood
ed Traffic without VTP PruningIn Figure 2-8, VTP pruning is not configured. The switch fabric consists of six
Catalyst 2820 and Catalyst 1900 switches, shown as switches 1 through 6. Port 1 on
switch 1 and port 2 on switch 4 are associated with the Red VLAN. The broadcast traffic from port 1 on switch 1 to port 2 on switch 4 is forwarded to all switches, even though switches 3, 5, and 6 have no ports on the Red VLAN.
Refer to Figure 2-9, in which VTP pruning is enabled.
Figure 2-9: Optimal Flood
ing Traffic with VTP PruningFigure 2-9, the broadcast traffic from port 1 on switch 1 to port 2 on switch 4 is not forwarded to switches 3, 5, and 6 because the traffic is pruned on the specified ports. Switches 3, 5, and 6 have no ports on the Red VLAN, and VTP pruning has reduced the flooding storm to switches not associated with the Red VLAN.
In
Enabling VTP Pruning
To enable VTP pruning, do the following:
Step Action1. Access the Virtual LAN Menu.
Select [V] from the Main Menu.
2. Access the VTP Pruning Mode screen.
Select [F] VTP Pruning Mode.
3. Enable VTP pruning.
Enter Enable at the selection prompt. The VLAN Configuration Menu reappears.
Verifying VTP PruningTo verify that you have enabled VTP pruning, select [F] VTP Pruning Mode, and view the VTP pruning state.
Dynamic Port VLAN Membership
You can move a connection from a port on one switch to a port on another switch in the network (without reconfiguring the port) by assigning dynamic ports to a VLAN. VLAN Membership Policy Server
To configure dynamic port VLAN membership, you must configure the Virtual LAN Membership Policy Server (VMPS) and assign ports on each switch with dynamic VLAN membership. Dynamic ports work in conjunction with the VMPS, which holds a database of MAC addresses-to-VLAN mappings. Catalyst 2820 and Catalyst 1900 switches do not function as VMPSs. The VMPS must be running on another device in the network, such as a Catalyst 5000 series switch.
The VMPS has a database of MAC-address-to-VLAN mappings that places the end station into the correct VLAN. You must configure the VMPS before configuring a port as dynamic. After you configure the VMPS, the configuration information is downloaded from a TFTP server, and the VMPS begins to accept requests from clients.Dynamic Ports on VMPS Clients
The Catalyst 2820 or Catalyst 1900 switch queries the VMPS for the appropriate VLAN assignment by sending the VMPS the source MAC address of the incoming packet.
Upon receiving a valid request from a Catalyst 2820 or Catalyst 1900 switch, the VMPS searches its database for a MAC address-to-VLAN mapping. Based on the request and the VMPS mode, the VMPS takes one of the following actions:
If the assigned VLAN is restricted to a group of ports, the VMPS verifies the requesting port against this group.If the VLAN is legal on this port, the VLAN name is passed in the response.
If the VLAN is illegal on this port, and the VMPS is not in secure mode, the VMPS sends an access-denied response.
If the VLAN is illegal on this port, and the VMPS is in secure mode, the VMPS sends a port-shutdown response.
If the VLAN from the table does not match the current VLAN on the port, there are active hosts on the port, and the VMPS is not in secure mode, the VMPS sends an access-denied response.
If the VLAN from the table does not match the current VLAN on the port, there are active hosts on the port, and the VMPS is in secure mode, the VMPS sends a port-shutdown response.
You can configure a fallback VLAN name on the VMPS. If the requested MAC address is not in the table, the VMPS sends the fallback VLAN name in response. If you do not configure a fallback VLAN and the MAC address is not in the table, the VMPS sends an access-denied response. If the VMPS is in secure mode, it sends a port-shutdown response.
You can also make an explicit entry in the configuration table to deny access to specific MAC addresses for security reasons by specifying a none keyword for the VLAN name. Again, the VMPS sends either an access-denied or port-shutdown response.
If the Catalyst 2820 or the Catalyst 1900 switch receives an access-denied response from the VMPS, it continues to block traffic to or from the port. The switch continues to monitor the packets directed to the port and sends a query to the VMPS when it identifies a new address. If the Catalyst 2820 or the Catalyst 1900 switch receives a port-shutdown response from the VMPS, it changes the port status to disabled-management. You must use SNMP or the console to enable the port.
Before configuring dynamic ports, you must configure the VMPS so that it is active and accessible by the Catalyst 2820 and Catalyst 1900 switches.
A dynamic port can belong to only one VLAN at a time. Upon link-up, a dynamic port is isolated from its static VLAN. The switch does not forward traffic to or from this port until a VLAN is identified for the port. Until a valid VLAN is assigned to a dynamic port, no connectivity is allowed. The source MAC address from the first packet of a new host on the dynamic port is sent to the VMPS. The VMPS provides the VLAN number to which this port must be assigned. For example, suppose the switch sends a valid query to the VMPS, and the VMPS response is "Place port in VLAN X." At this point, the host is connected to VLAN X through the switch fabric.
Multiple hosts (MAC addresses) can be active on a dynamic port if they are all in the same VLAN. Upon link-down, a dynamic port is returned to its initial state and is isolated from other VLANs. The switch detects only the first host that comes online through this port.
Note Subsequent host-to-VLAN associations are assumed to be the same as the first host, and no query is sent to the VMPS for subsequent hosts.Dynamic port VLAN membership interacts with the following features:
Spanning treeConfiguring Dynamic Port VLAN Membership When a port becomes dynamic, spanning-tree Port Fast is automatically enabled for that port. These ports that are moved to a new VLAN are placed in forwarding mode and participate in spanning tree, providing fast network connectivity. Secure ports
Secure ports cannot become dynamic ports. You must turn off security on a port before it can become dynamic. Trunk ports
Static ports that are trunking cannot become dynamic ports. You must first turn off trunking on a port before the dynamic port feature is operational. Note Use dynamic ports only to connect end stations. If dynamic ports are connected to switches or routers, you could lose connectivity. Note The ATM modules do not support dynamic port VLAN membership.
You can move a connection from a dynamic port on one switch to a dynamic port on another switch in the network without reconfiguring either port. When you configure dynamic ports, the switch automatically assigns VLAN membership to a dynamic VLAN port based on the source MAC address of the received packets.Configuring the VMPS Addresses
Note Before configuring dynamic ports, verify that you have configured the VMPS on a device in the network. Because the Catalyst 2820 and Catalyst 1900 switches do not function as VMPSs, you must make sure that a VMPS is active on the network for the switches to support dynamic port VLAN membership.Step Action
1. Access the Virtual LAN Menu.
Select [V] Virtual LAN from the Main Menu.
2. Configure the primary VMPS IP address to be queried.
a. Select [S] VLAN Membership Servers.
b. Select [1] 1st VMPS IP Address.
c. Enter the IP address of the server, and press Return.
3. Configure the secondary VMPS IP addresses that the switch queries if no responses are received from the primary VMPS.
a. Select [S] VLAN Membership Servers.
b. Select [2], [3], or [4], enter the appropriate IP addresses, and press Return.
4. Select the primary VMPS.
a. Select [S] VLAN Membership Servers.
b. Select [P] Primary Server.
c. Select the number of the server to be used as the primary VMPS.
5. Set the number of attempts to contact a VMPS before the switch queries the next VMPS in the list.
Select [R] Number of retries before changing server, enter the appropriate number, and press Return.
Verifying VMPS AddressesTo verify that you have configured the VMPS addresses, access the VLAN Membership Servers Menu, and view the contents of this display.
Configuring Dynamic Ports
After configuring the addresses of the VMPS, configure the ports as dynamic.
Step Action1. Access the Virtual LAN Menu.
Select [V] Virtual LAN from the Main Menu.
2. Access the VLAN Membership Menu.
Select [E] VLAN Membership from the VLAN Configuration Menu.
3. Access the Membership Type Menu.
Select [M] Membership Type from the VLAN Membership Menu.
4. Specify the port on which you want to configure dynamic VLAN membership.
Enter the port number at the selection prompt.
5. Change the specified port from static to dynamic.
Select [D] ynamic at the selection prompt.
Verifying Dynamic Port ConfigurationTo verify that you have configured the port as a dynamic port, select [E] VLAN Membership to see the VLAN membership configuration display for all ports. The display shows a port status change from static to dynamic.
Spanning-Tree Protocol
STP provides path redundancy while preventing undesirable loops that are caused by multiple active paths. For an Ethernet network to function properly, only one active path must exist between two stations.
Loops result in some switches seeing stations appear on both sides of the switch. This condition voids the forwarding algorithm and allows forwarding of duplicate frames.
STP defines a tree that spans all switches in an extended network and forces certain redundant data paths into a standby (blocked) state. If one of the network segments in the spanning tree becomes unreachable, or if STP costs change, the spanning-tree algorithm reconfigures the spanning-tree topology and reestablishes the link by activating the standby path. The STP operation is transparent to end stations, which do not recognize whether they are connected to a single LAN segment or to a switched LAN of multiple segments.
Configuring Spanning-Tree Protocol on Different VLANs
When creating fault-tolerant internetworks, a loop-free path must exist between all nodes in a network. The spanning-tree algorithm calculates the best loop-free path throughout the switched network.Because each VLAN is a logical LAN segment, one instance of STP maintains a loop-free topology in each VLAN. Although the Catalyst 2820 and Catalyst 1900 switches support a maximum of 1005 VLANs, you can enable STP on a maximum of 64 VLANs at one time. If you configure more than 64 VLANs, you can still operate the other VLANs with STP disabled. By default, STP is enabled on VLANs 1 through 64.Accessing the STP Menu
Note If VLANs or bridge groups are configured on the switch, the web interface displays the spanning-tree values for VLAN 1 or bridge group 1, respectively.
To access the Spanning Tree Configuration Menu, do the following:
Step Action1. Access the Network Management Menu.
Select [N] Network Management from the Main Menu.
2. Access the Bridge - Spanning Tree Menu.
Enter [B] Bridge Configuration from the Network Management Menu.
Enabling and Disabling STP
To enable or disable STP, do the following:
Step Action1. Access the Network Management Configuration Menu.
Enter [N] Network Management at the selection prompt in the Main Menu.
2. Access the Bridge Configuration menu.
Select [B] Bridge Configuration.
3. Enable STP on a specified VLAN, if desired.
Enter [E] at the selection prompt, and press Return.
4. Disable STP on a specified VLAN, if desired.
Enter [D] at the selection prompt, and press Return.
Verifying STP ConfigurationTo check the STP status of a VLAN, do the following:
Step Action1. Access the Network Management Configuration Menu.
Enter [N] Network Management at the selection prompt in the Main Menu
2. Access the Bridge Configuration menu.
Select [B] Bridge Configuration.
3. Check the STP status of a VLAN.
Select [O] VLAN Bridge Operating Parameters.
4. Specify the VLAN.
Enter the VLAN number at the selection prompt. Press Return.
Configuring STP OptionsThe following VLAN STP operating parameters are displayed:
Designated rootNumber of member ports
Max age
Forward delay
Number and time of topology changes that have occurred
Root port
Root path-cost
Hello time
The Enterprise Edition software contains four configuration options for VLANs enabled with STP. For each option, you can configure a unique bridge priority, max age, hello time, and forward delay. After configuring an option, you can assign it to one STP instance or to several STP instances. By default, option 1 is assigned to all STP instances.Assigning an STP Instance
For more information about the bridge priority, max age, hello time, and forward delay options, refer to the Catalyst 1900 Series Installation and Configuration Guide or the Catalyst 2820 Series Installation and Configuration Guide.
To configure bridge priority, max age, hello time, and forward delay, do the following:
Step Action1. Access the Network Management Configuration Menu.
Enter [N] Network Management at the selection prompt in the Main Menu.
2. Access the Bridge Configuration Menu.
Select [B] Bridge Configuration.
3. Specify an option to be configured.
At the selection prompt, enter [1], [2], [3], or [4] to access the option screen.
4. Modify the Bridge Priority parameter.
Enter [B] at the selection prompt, and enter the Bridge Priority value.
5. Modify the Max Age parameter.
Enter [M] at the selection prompt, and enter the Max Age value.
6. Modify the Hello Time parameter.
Enter [H] at the selection prompt, and enter the Hello Time value.
7. Modify the Forward Delay parameter.
Enter [F] at the selection prompt, and enter the Forward Delay value.
8. Select the next option to be configured, if desired.
Enter [N] Next Option at the selection prompt to access another option.
To assign an STP instance to a specific option, do the following:
Step Action1. Access the Network Management Configuration Menu.
Enter [N] Network Management at the selection prompt in the Main Menu.
2. Access the Bridge Configuration screen.
Select [B] Bridge Configuration.
3. Assign an STP instance operating on a VLAN to use a specified option.
a. Enter option 1, 2, 3, or 4 at the selection prompt.
b. Select [A] Assign VLANs to option.
c. Enter the VLAN number at the selection prompt, and press Return. You see the spanning-tree option menu.
d. Select [X] Exit to the Bridge STP Configuration Menu.
Posted: Sun Sep 29 11:23:31 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.
Transmitting VTP InformationNote If a switch in VTP server mode receives advertisements containing more than
128 VLANs, the switch automatically transitions to VTP client mode. Note If you change the switch from
Note VLANs cannot be connected by bridge groups.
The Enterprise Edition software for Catalyst 2820 or Catalyst 1900 switches supports a maximum of 27 switched ports. On the Catalyst 2820 switch, you can configure only the single-port
The Dynamic Inter-Switch Link Protocol (
Note DISL Note InNote All VLAN features are disabled if you have configured bridge groups on the switch. For more information on bridge groups, see the"