Reader small image

You're reading from  Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

Product typeBook
Published inNov 2020
PublisherPackt
ISBN-139781800208094
Edition1st Edition
Right arrow
Author (1)
Glen D. Singh
Glen D. Singh
author image
Glen D. Singh

Glen D. Singh is a cybersecurity author, educator and SecOps professional. His areas of expertise are cybersecurity operations, offensive security tactics and techniques, and enterprise networking. He holds a Master of Science (MSc) in cybersecurity and many industry certifications from top awarding bodies such as EC-Council, Cisco, and Check Point. Glen loves teaching and mentoring others while sharing his wealth of knowledge and experience as an author. He has written many books, which focus on vulnerability discovery and exploitation, threat detection, intrusion analysis, incident response, network security, and enterprise networking. As an aspiring game changer, Glen is passionate about increasing cybersecurity awareness in his homeland, Trinidad and Tobago.
Read more about Glen D. Singh

Right arrow

Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels

As you're building your network, you will be learning a lot about configurations and techniques to ensure you have an optimally performing network. However, let's not forget about the actual engineering aspect of computer networking. There are many technologies at all layers of the OSI reference model, and a TCP/IP protocol suite that helps us to create an efficient network.

Throughout this chapter, you will learn about the importance of segmenting a flat physical network into smaller broadcast domains to improve both network security and the efficiency of network performance, using a layer 2 technology known as Virtual Local Area Network (VLAN). You will also learn about the various types of VLANs and useable ranges within an organization, and how to implement and establish end-to-end connectivity between devices and different VLANs on a network.

Additionally, you'll discover how to...

Technical requirements

To follow along with the exercises in this chapter, please ensure that you have met the following hardware and software requirement:

The code files for this chapter are available at https://github.com/PacktPublishing/Implementing-and-Administering-Cisco-Solutions/tree/master/Chapter%2005.

Check out the following video to see the Code in Action:https://bit.ly/33WlzIG

Understanding VLANs

In a small LAN operating at optimal performance, there are typically a few devices exchanging messages simultaneously. As an organization grows to support more business services, so does a network to support more connected users and network applications. Physically, expanding a network seems simple, but we also need to consider the logical traffic flow and its capacity between devices. For us humans, we don't see the actual traffic flowing across a network without using tools such as Wireshark.

Important note

Wireshark is a network protocol analyzer that has the ability to display the raw details within a packet.

Let's imagine that within an organization, there are hundreds of devices all connected to the same physical network. If one device sends a broadcast (shouts on the network), all other connected devices will receive and process each broadcast message. What if a lot more devices are generating broadcast messages simultaneously? The high...

Layer 2 Discovery Protocols

In this section, we will discuss two popular layer 2 protocols that help us as networking professionals to map a network topology without seeing a network diagram. At the end of this topic, you'll be able to determine the roles, local interfaces, model numbers, and even IP addresses of directly connected neighbor devices while having a clear idea of the actual network topology.

The following exercises are executed in our existing VLAN topology lab.

Cisco Discovery Protocol (CDP)

CDP is a Cisco proprietary protocol that operates at layer 2, the data link layer. CDP is used to assist Cisco devices to learn about their directly connected neighbors, such as other switches and routers. CDP is enabled by default on Cisco switches and routers.

Important note

Devices exchange advertisements (messages) using a multicast address, 01:00:0C:CC:CC:CC.

A CDP message contains the following:

  • The IOS version
  • The device model and type
  • ...

Understanding and configuring EtherChannels

Let's imagine you are connecting two switches using their GigabitEthernet interfaces; your objective is to combine the bandwidth of the two physical interfaces to get a total of 2 GB/s between the switches. Making the physical connections between both switches does not simply combine the bandwidth automatically. The following diagram shows a visual representation of the connection:

Figure 5.28 – Two switches connected together

Why is one link blocked between the switches? By default, Cisco switches have a layer 2 loop prevention protocol known as Spanning-Tree Protocol (STP). Therefore, physically interconnecting switches, as shown in the previous diagram, will cause STP to automatically block one of the interfaces.

This is where EtherChannels come in to save us once more. An EtherChannel allows us to combine multiple physical ports on a switch to create a single logical interface. Therefore, the...

Summary

In this chapter, you have learned the importance of segmenting a network using VLANs to improve both network performance and security. You also now have the hands-on experience to create and assign VLANs, configure both access and trunk ports, and perform inter-VLAN routing on a Cisco network. You have gained the skills needed to implement and perform network discovery using the LLDP layer 2 protocol. Lastly, you have gained the knowledge and hands-on experience of merging physical interfaces into a single logical interface known as an EtherChannel.

I hope this chapter has been informative and helps you in your journey toward implementing and administrating Cisco solutions and preparing for the CCNA 200-301 certification. In the next chapter, Chapter 6, Understanding and Configuring Spanning-Tree, you will learn how to segment your network to improve performance and security and implement link aggregation technologies and discovery protocols.

Questions

The following is a short list of review questions to reinforce your learning and help you identify the areas you need to revisit:

  1. Which VLANs are not usable on a Cisco IOS switch?

    A. 945

    B. 1002

    C. 1001

    D. 1

  2. When creating VLANs, where does the switch store the VLANs?

    A. running-config

    B. startup-config

    C. vlan.bin

    D. vlan.dat

  3. Which mode allows a switch interface to carry multiple VLANs?

    A. Access

    B. Up

    C. Trunk

    D. Administratively up

  4. Which standard defines tagged traffic?

    A. IEEE 802.1Q

    B. IEEE 802.3ab

    C. IEEE 802.1X

    D. IEEE 802.11

  5. Which command disables DTP on an interface?

    A. switchport trunk encapulation dot1q

    B. switchport nonegotiate

    C. switchport access no vlan

    D. switchport no dtp

  6. Which port states will create a trunk?

    A. Switch A – Dynamic Auto and Switch B – Dynamic Auto

    B. Switch A – Dynamic Auto and Switch B – Dynamic Desirable

    C. Switch A – Dynamic Auto and Switch B – Access

    D. Switch A – Access and Switch...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
Published in: Nov 2020Publisher: PacktISBN-13: 9781800208094
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Glen D. Singh

Glen D. Singh is a cybersecurity author, educator and SecOps professional. His areas of expertise are cybersecurity operations, offensive security tactics and techniques, and enterprise networking. He holds a Master of Science (MSc) in cybersecurity and many industry certifications from top awarding bodies such as EC-Council, Cisco, and Check Point. Glen loves teaching and mentoring others while sharing his wealth of knowledge and experience as an author. He has written many books, which focus on vulnerability discovery and exploitation, threat detection, intrusion analysis, incident response, network security, and enterprise networking. As an aspiring game changer, Glen is passionate about increasing cybersecurity awareness in his homeland, Trinidad and Tobago.
Read more about Glen D. Singh