Monday 14 October 2019

How to Configure Vlan On Cisco Router | VLAN trunks Troubleshooting

How to Configure Vlan On Cisco Router

This section describes How to Configure Vlan On Cisco Router and VLAN trunks. In post is specifically related to configuration of VLAN, if you want to learn about what is the VLAN you can visit the previous post. 
Table of Contents
  1. VLAN ranges on Catalyst switches
  2. Creation of a VLAN
  3. Assignment of ports to VLAN networks
  4. How to Delete a VLan
  5. Verification of VLAN information
  6. VLAN Trunks Configuration
  7. VLAN Troubleshooting
  8. Troubleshooting trunks configurations


How many VLANs you can configure on Cisco Switch


Different Cisco Catalyst switches support various amounts of VLAN. The amount of VLANs they support is sufficient to meet the needs of most organizations. For example, the Catalyst 2960 and 3560 series switches support more than 4000 VLANs. The normal range VLANs on these switches are numbered from 1 to 1005, and the extended range VLANs are numbered from 1006 to 4094. The following illustration shows the available VLANs on a Catalyst 2960 switch running Cisco IOS, version 15.x.


Normal Range VLAN

·         It is used in networks of small and medium businesses and companies.
·         It is identified by a VLAN ID between 1 and 1005.
·         IDs from 1002 to 1005 are reserved for Token Ring VLANs and fiber optic distributed data interface (FDDI).
·         IDs 1 and 1002 to 1005 are created automatically and cannot be deleted.
·         The settings are stored in a VLAN database file, called vlan.dat. The vlan.dat file is located in the flash memory of the switch.
·         The VLAN trunk link protocol (VTP), which allows you to manage VLAN settings between switches, can only discover and store VLAN networks of normal range.

Extended VLAN Range

·         It enables service providers to expand their infrastructure to a larger number of customers. Some global companies may be large enough to need the IDs of extended range VLANs.
·         They are identified by a VLAN ID between 1006 and 4094.
·         The settings are not written to the vlan.dat file.
·         They support fewer VLAN features than normal range VLANs.
·         They are saved, by default, in the running configuration file.
·         VTP does not learn extended range VLANs.

How to create VLAN on Cisco Switch

When configuring VLAN networks of normal range, the configuration details are stored in the flash memory of the switch in a file called vlan.dat. The flash memory is persistent and does not require the copy running-config startup-config command. However, because other details are usually configured on Cisco switches at the same time that VLANs are created, it is advisable to save the changes to the running configuration in the startup configuration. The following table shows the syntax of the Cisco IOS command that is used to add a VLAN to a switch and assign it a name. It is recommended to name each VLAN in the configuration of a switch.
Description
Command
Enter global configuration mode.
S1 # configure terminal
Create a VLAN with a valid ID number.
S1 (config) #vlan id-vlan
Specify a unique name to identify the VLAN.
S1 (config-vlan) #name vlan-name
Return to privileged EXEC mode.
S1 (config-vlan) # end
Table of Commands for Creating a VLAN.

VLAN Configuration Example

In following figure, it is shown how VLAN is configured for students (VLAN 20) on switch S1. In the topology example, the student's computer (PC2) has not yet been associated with any VLAN, but has the IP address 172.17.20.22.
S1# configure terminal
S1(config)# vlan 20
S1(config-vlan)# name student
S1(config-vlan)# end
The switchport access vlan command   forces the creation of a VLAN if it does not already exist on the switch. For example, VLAN 30 is not present in the result of the show vlan brief command   of the switch. If the switchport access vlan 30 command is entered   on any interface without prior configuration, the switch displays the following:
% Access VLAN does not exist. Creating vlan 30
How change the membership of Port of VLAN
There are several ways to change the membership of ports in a VLAN. The following table shows the syntax for changing the membership of a switch port of VLAN 1 with the  no switchport access vlan command of the interface configuration mode.
Description
Command
Enter global configuration mode.
S1 # configure terminal
Remove the VLAN assignment from the port.
S1 (config-if) # no switchport access vlan
Return to privileged EXEC mode.
S1 (config-if) # end
VLAN Assignment Elimination Table.

CONFIGURATION EXAMPLE

The F0 / 18 interface was previously assigned to VLAN 20. The no switchport access vlan command for the F0 / 18 interface is entered. Examine the result of the show vlan brief command   that follows immediately, as shown in the previous result. The show vlan brief command   shows the type of VLAN assignment and membership for all switch ports. The show vlan brief command   shows a line for each VLAN. The result for each VLAN includes the name, status and switch ports of the VLAN.

VERIFICATION EXAMPLE

VLAN 20 is still active, even if it has no ports assigned. The following scheme shows that the result of the show interfaces f0 / 18 switchport command   verifies that the access VLAN for interface F0 / 18 has been reset to VLAN 1.

ASSIGNING A PORT TO A VLAN

The VLAN membership of a port can be easily changed. It is not necessary to first remove a port from a VLAN to change its VLAN membership. When the VLAN membership of an access port is reassigned to another existing VLAN, the new VLAN membership simply replaces the previous VLAN membership. Next, port F0 / 11 was assigned to VLAN 20.

S1 # config t
S1 (config) # interface F0 / 11
S1 (config-if) # switchport mode access
S1 (config-if) # switchport access vlan 20
S1 (config-if) # end

How to delete a VLAN

In the illustration, the global configuration mode command no vlan  id-vlan  is used to remove VLAN 20 from the switch. Switch S1 had a minimal configuration with all ports in VLAN 1 and an unused VLAN 20 in the VLAN database. The show vlan brief command   verifies that VLAN 20 is no longer present in the vlan.dat file after using the no vlan 20 command.
S1 # conf t
S1 (config) # no vlan 20
S1 (config) # end
Caution: Before deleting a VLAN, reassign all member ports to a different VLAN. Ports that do not transfer to an active VLAN cannot communicate with other hosts once the VLAN is removed and until they are assigned to an active VLAN.
Alternatively, the entire vlan.dat file can be deleted with the delete flash command: vlan.dat in the privileged EXEC mode. The abbreviated version of the command (delete vlan.dat) can be used if the vlan.dat file was not moved from its default location. After issuing this command and reloading the switch, the previously configured VLANs are no longer present. This returns the switch to the factory default condition with respect to the VLAN configuration.

VERIFICATION OF VLAN INFORMATION

Once a VLAN is configured, the configuration can be validated with the Cisco IOS show commands.
show vlan [ brief | id  id-vlan | name  vlan-name | summary ]
The following table shows the options for the show vlan  and  show interfaces commands  .



Description
Command
Show a line for each VLAN with its name, status and ports.
brief
Show information about a single VLAN identified by its ID number.
For the vlan-id, the range is 1 to 4094.
id id-vlan
Show information about a single VLAN identified by name. The name of the VLAN is an ASCII string of 1 to 32 characters.
name vlan-name
Show the summary of VLAN information.
summary
Show vlan command table

USE THE SHOW VLAN COMMAND

In the following example, the show vlan name student command   produces a result that is not easily interpreted. The show vlan summary command   shows the count of all configured VLANs. The result shows seven VLANs.

USE THE SHOW INTERFACES VLAN COMMAND

The show interfaces vlan  id-vlan  command  shows details that exceed the scope of this course. The important information appears on the second line of the following scheme, which indicates that VLAN 20 is active.

VLAN TRUNKS CONFIGURATION

A VLAN trunk link is a layer 2 link of the OSI model between two switches that carries traffic for all VLANs (unless the list of allowed VLANs is restricted manually or dynamically). To enable trunk links, configure the ports at either end of the physical link with parallel command sets. To configure a switch port at one end of a trunk link, use the switchport mode trunk command. With this command, the interface switches to permanent trunk mode. The port establishes a dynamic trunk link protocol (DTP) negotiation to convert the link into a trunk link, even if the interface connected to it does not accept the change. In this course, the switchport mode trunk command   is the only method that is implemented for trunking configuration.
The following table shows the syntax of the Cisco IOS command to specify a native VLAN (other than VLAN 1). In the example, VLAN 99 is configured as a native VLAN with the switchport trunk native vlan 99 command.
Description
Command
Enter global configuration mode.
S1 # configure terminal
Enter the interface configuration mode.
S1 (config) # interface interface_id
Make the link a trunk link.
S1 (config-if) # switchport mode trunk
Specify a native VLAN for frames without labels.
S1 (config-if) # switchport trunk native vlan id_vlan
Specify the list of VLANs that will be allowed on the trunk link.
S1 (config-if) # switchport trunk allowed vlan vlan-list
Return to privileged EXEC mode.
S1 (config-if) # end
Trunk Link Configuration Table
Use the switchport trunk allowed vlan   Cisco IOS list-vlan command  to specify the list of VLANs that will be allowed on the trunk link.
VLAN TOPOLOGY EXAMPLE

In following image, VLANs 10, 20 and 30 support the Teaching, Student and Guest computers (PC1, PC2 and PC3). Port F0 / 1 of switch S1 was configured as a trunk link port and forwards traffic for VLANs 10, 20 and 30. VLAN 99 was configured as a native VLAN.

VLAN 10 - Faculty / Staff - 172.17.10.0/24
VLAN 20 - Students - 172.17.20.0/24
VLAN 30 - Guest - 172.17.30.0/24
VLAN 99 - Native - 172.17.99.0/24
The following shows the configuration of port F0 / 1 of switch S1 as a trunk link port. The native VLAN is changed to VLAN 99 and the list of allowed VLANs is restricted to 10, 20, 30 and 99.
S1 (config) # interface FastEthernet0 / 1
S1 (config-if) # switchport mode trunk
S1 (config-if) # switchport trunk native vlan 99
S1 (config-if) # switchport trunk allowed vlan 10,20,30,99
S1 (config-if) # end

RESET THE TRUNK LINK TO THE DEFAULT STATE

The following table shows the commands to remove the allowed VLANs and restore the native VLAN from the trunk. When it is restored to the default state, the trunk link allows all VLANs and uses VLAN 1 as a native VLAN.
Description
Command
Enter global configuration mode.
S1 # configure terminal
Enter the interface configuration mode.
S1 (config) # interface interface_id
Establish the trunk link to allow all VLANs.
S1 (config-if) # no switchport trunk allowed vlan
Reset the native VLAN to the default value.
S1 (config-if) # no switchport trunk native vlan
Return to privileged EXEC mode.
S1 (config-if) # end
Reset table of values ​​configured in trunks
The commands used to reset all trunk link features of a trunk interface to the default settings are now displayed. The show interfaces f0 / 1 switchport command reveals that the trunk link was reconfigured in a default state.
Finally, the example result shows the commands used to remove the trunk link feature of port F0 / 1 of switch S1. The show interfaces f0 / 1 switchport command reveals that the F0 / 1 interface is now in static access mode.

TRUNK LINK CONFIGURATION VERIFICATION


The following result shows the configuration of port F0 / 1 of switch S1. The configuration is verified with the command show interfaces id-switchport interface.
In the highlighted upper area, it is shown that the administrative mode of port F0 / 1 was set to trunk. The port is in trunk mode. In the next highlighted area, it is verified that the native VLAN is VLAN 99. Further down in the result, in the highlighted lower area, it is shown that all VLANs are enabled on the trunk link.

VLAN TROUBLESHOOTING

Each VLAN must correspond to a single IP subnet . If two devices on the same VLAN have different subnet addresses, they cannot communicate. This is a frequent problem and is easily solved by identifying the incorrect configuration and changing the subnet address to a correct address.
In above image, PC1 cannot connect to the Web / TFTP server shown.
The verification of the IPv4 configuration options of PC1, which is shown in the following result, reveals the most frequent error in the configuration of VLAN networks: a badly configured IPv4 address. PC1 was configured with IPv4 address 172.172.10.21, but should have been configured with address 172.17.10.21.

PC1> ipconfig

IP Address ...................: 172.172.10.21
Subnet Mask ..................: 255.255.0.0
Default Gateway ..............: 0.0.0.0

The PC1 Fast Ethernet configuration dialog box shows the updated IPv4 address, 172.17.10.21. The result shown at the bottom indicates that PC1 regained connectivity to the Web / TFTP server located at IPv4 address 172.17.10.30.

PC1> ping 172.17.10.30
Pinging 172.17.10.30 with 32 bytes of data:
Reply from 172.17.10.30: Bytes = 32 Time = 147ms TTL = 128

How to Troubleshoot MISSING VLANS

If there is still no connection between the devices in a VLAN but the IP addressing problems have been ruled out.

Step 1 : Use the show vlan command   to verify if the port belongs to the expected VLAN. If the port was assigned to an incorrect VLAN, use the switchport access vlan command   to correct VLAN membership. Use the show mac address-table command   to review which addresses were obtained on a particular port on the switch and to which VLAN that port was assigned, as shown below:
Step 2 : If the VLAN to which the port was assigned is removed, the port becomes inactive. The ports of a deleted VLAN will not be indicated in the result of the show vlan command  . Use the show interfaces switchport command   to verify that the inactive VLAN is assigned to the port, as shown:
In the previous result, the MAC addresses that were obtained in the F0 / 1 interface are shown. It can be seen that the MAC address 000c.296a.a21c was obtained at interface F0 / 1 of VLAN 10. If this is not the expected VLAN number, change the VLAN port membership with the switchport access vlan command. Each port of a switch belongs to a VLAN. If the VLAN to which the port belongs is deleted, it becomes inactive. None of the ports belonging to the VLAN that was deleted can communicate with the rest of the network. Use the show interface f0 / 1 switchport command   to verify if the port is inactive. If the port is inactive, it does not work until the VLAN is created with the global configuration command vlan  id-vlan  or the VLAN is removed from the port with the no switchport access vlan  id-vlan command  .

TROUBLESHOOTING TRUNKS

One of the common tasks of network administrators is to solve problems of trunk or port link formation that behaves incorrectly as trunk ports. Occasionally, a switch port may behave as a trunk link port, even if it was not configured as such. For example, an access port can accept frames from VLAN networks other than the VLAN to which it was assigned. This is known as "VLAN filtration."
TROUBLESHOOTING COMMANDS
To solve problems of trunk links that are not formed or VLAN filtering, proceed as follows:
·         Step 1 : Use the show interfaces trunk command   to verify if there is a match between the local native VLAN and the peers. If the native VLAN does not match at both ends, there is a VLAN leak.
·         Step 2 : Use the show interfaces trunk command   to verify if a trunk link was established between the switches. Staticly configure trunks whenever possible. Cisco Catalyst switch ports use DTP by default and attempt to negotiate a trunk.
To show the status of the trunk link and the native VLAN used in it, and verify the establishment of that link, use the show interfaces trunk command  . Next, it is shown that the native VLAN at one end of the trunk link was changed to VLAN 2. If one end of the trunk link is configured as native VLAN 99 and the other end as native VLAN 2, the frames that are sent from the trunk VLAN 99 on one end are received on VLAN 2 on the other end. VLAN 99 is filtered in segment VLAN 2.
SW1 # show interfaces f0 / 1 trunk

Port Mode Encapsulation Status Native vlan
Fa0 / 1 car 802.1q         trunking 2
CDP displays a native VLAN incompatibility warning on a trunk link with this message:
* Mar 1 06: 45: 26.232:% CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on FastEthernet0 / 1 (2), with S2 FastEthernet0 / 1 (99).
If there is a native VLAN incompatibility, connectivity problems occur on the network. Data traffic for VLANs other than the two native VLANs configured is correctly propagated through the trunk link, but data related to any of the native VLANs is not propagated correctly through the trunk link.

As shown above, the incompatibility problems of the native VLAN do not prevent the trunk link from forming. To resolve a native VLAN incompatibility, configure the native VLAN to be the same VLAN on both sides of the link.

COMMON ISSUES WITH TRUNKS

In general, trunk link problems are due to incorrect configuration. When configuring VLANs and trunks in a switched infrastructure, the most frequent configuration errors are as follows:
·         Incompatibility of native VLAN:  Trunk link ports were configured with different native VLANs. This configuration error generates console notifications and can cause routing problems between VLANs, among other inconveniences. This represents a security risk.
For example, one port is defined as VLAN 99 and the other as VLAN 100.
·         Incompatibilities of trunk mode:  A trunk port is configured in a mode that is not compatible for trunk links on the corresponding peer port. These configuration errors cause the trunk link to stop working. Ensure that both sides of the trunk link are configured with the switchport mode trunk command  . The other trunk link configuration commands exceed the scope of this course.
For example, one side of the trunk link is configured as an access port.

VLANs allowed on trunk links:  The list of VLANs allowed on a trunk link with the current VLAN trunk requirements was not updated. In this case, unexpected traffic or no traffic is sent to the trunk link.
The list of allowed VLANs does not support the current VLAN trunk requirements.
If a problem with a trunk link is detected and the cause is unknown, start troubleshooting with a review of the trunk links to determine if there is a native VLAN incompatibility. If that is not the cause, check if there is a trunk link mode incompatibility and, finally, check the list of VLANs allowed on the trunk link. On the next two pages, we discuss how to troubleshoot frequent trunk links.

WRONG PORT MODE

Typically, trunk links are statically configured with the switchport mode trunk command  . The trunk link ports of Cisco Catalyst switches use DTP to negotiate link status. When a port on a trunk link is configured with a trunk link mode that is not compatible with the neighboring trunk link port, a trunk link cannot be formed between the two switches.

INCORRECT VLAN LIST

For a VLAN traffic to be transmitted through a trunk link, it must be allowed on that link. To do this, use the switchport trunk allowed vlan  command id-vlan  .


No comments:

Post a Comment