Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

NET201: Networking with Lab 2

Configuring Per-Interface Inter-VLAN Routing


Laboratory Exercise # 3

GRADE

Section: 2-IT4 Signature

Leader : BANTULA, Mark Steiven A. ___________________


Members :
DE VILLLA, Rhenne Angelle M. ___________________
PADILLA, Jose Rodolfo B. ___________________

Date Performed : 13 September 2019


Date Submitted : 16 September 2019

Leonardo D. Antivo
(Lab Instructor)
OBJECTIVES AND MATERIALS

Objectives:

After this laboratory, students should be able to:

1. build the network and configure basic device settings,


2. create VLANs and assign switch ports,
3. configure switches with VLANs and trunking, and
4. verify trunking, VLANs, routing, and connectivity

Materials:

QUANTITY PART DESCRIPTION


NUMBER
Working Personal Computer (PC)
1 - with Installed Cisco Packet Tracer
Software

Scenario:

Legacy inter-VLAN routing is seldom used in today’s networks; however, it


is helpful to configure and
understand this type of routing before moving on to router-on-a-stick (trunk-
based) inter-VLAN routing or
configuring Layer-3 switching. Also, you may encounter per-interface inter-
VLAN routing in organizations with
very small networks. One of the benefits of legacy inter-VLAN routing is
ease of configuration.
In this lab, you will set up one router with two switches attached via the
router Gigabit Ethernet interfaces.
Two separate VLANs will be configured on the switches, and you will set up
routing between the VLANs.

Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated
Services Routers (ISRs) with Cisco IOS, Release 15.2(4)M3(universalk9 image).
The switches used are Cisco Catalyst 2960s with Cisco IOS, Release 15.0(2)
(lanbasek9 image).
PROCEDURES

Task 1. Build the Network and Configure Basic Device Settings.


1. Cable the network topology as shown in Figure 3.1 using Packet Tracer network
simulator software.
2. Initialize and reload the router and switch. Note: If configuration files were
previously saved on the router or switch, initialize and reload these devices back
to their default configurations (Reminders: Capture all the outputs since they part
of your data results).
3. Configure basic settings for CORE_RTR.
3.1. Console into CORE_RTR and enter global configuration mode.
3.2. Execute the basic configuration of the router such as:
a. Configure the host name (“CORE_RTR”) as shown in the topology,
b. Disable IP domain lookup,
c. Enable password encryption,
d. Provide enable password (“core”)
e. Include message of the day banner (“Unauthorized access is
strictly prohibited!”)
f. Provide a password for console 0 and virtual terminal type 0 to 4 during
login (“corertr”)
3.3. Configure IP addressing on G0/0 and G0/1 and enable both interfaces (Refer
to Table 3.1)
3.4. Copy the running configuration to the startup configuration.
4. Configure PC hosts (Refer to the addressing table (Table 3.1) for PC host address
information)
5. Issue a show ip interface brief command to verify the status of router
interfaces.

Task 2. Configure Switches with VLANs and Trunking


In task 2, you will configure the switches with VLANs and trunking.
1. Configure VLANs on ACCESS_SW1.
a) Enter global configuration mode and configure the switch host name
(“ACCESS_SW1”).
b) On ACCESS_SW1, create VLAN 10. Assign STUDENTS as the VLAN name.
c) Create VLAN 20. Assign FACULTY as the VLAN name.
d) Configure F0/1 as a trunk port.
e) Assign ports F0/5 and F0/6 to VLAN 10 and configure both F0/5 and F0/6 as
access ports.
f) Assign an IP address to VLAN 10 and enable it (refer to the addressing table
in Table 3.1)
g) Configure the default gateway according to the addressing table presented in
Table 3.1.
h) Enable password encryption,
i) Provide enable password (“sw1”)
j) Include message of the day banner (“Unauthorized access is strictly
prohibited!”), and
k) Provide a password for console 0 and virtual terminal type 0 to 4 during login
(“access”)
l) Copy the running configuration to the startup configuration.

2. Issue a show ip interface brief command to verify the status of the


switch interfaces.
3. Issue a show vlan brief command to verify the status of the switch VLANs.
4. Issue a show interfaces trunk command to verify the summary of switch
trunking protocols.

5. Configure VLANs on ACCESS_SW2.


a) Enter global configuration mode and configure the switch host name
(“ACCESS_SW2”).
b) On ACCESS_SW2, create VLAN 10. Assign STUDENTS as the VLAN name.
c) Create VLAN 20. Assign FACULTY as the VLAN name.
d) Configure F0/1 as a trunk port.
e) Assign ports F0/11 and F0/18 to VLAN 20 and configure both F0/11 and F0/18
as access ports.
f) Assign an IP address to VLAN 10 and enable it (refer to the addressing table
in Table 3.1)
g) Configure the default gateway according to the addressing table presented in
Table 3.1.
h) Enable password encryption,
i) Provide enable password (“sw2”)
j) Include message of the day banner (“Unauthorized access is strictly
prohibited!”), and
k) Provide a password for console 0 and virtual terminal type 0 to 15 during login
(“access”)
l) Copy the running configuration to the startup configuration.

6. Issue a show ip interface brief command to verify the status of the


switch interfaces.
7. Issue a show vlan brief command to verify the status of the switch VLANs.
8. Issue a show interfaces trunk command to verify the summary of switch
trunking protocols.

Task 3. Verify Trunking, VLANs, Routing, and Connectivity


1. Enter the global configuration of the router to verify the routing table using show
ip route command.
What routes are listed on CORE_RTR?
________________________________________________________________
________________________________________________________________
________________________________________________________________

2. On both switches, issue the show interface trunk command. Is the F0/1 port on
both switches set to trunk (yes/no)? ______

3. Issue a show vlan brief command on both switches. Verify that VLANs 10
and 20 are active and that the proper ports on the switches are in the correct
VLANs.
Why is F0/1 not listed in any of the active VLANs?
________________________________________________________________
________________________________________________________________

4. Ping from PC-1 in VLAN 10 to PC-2 in VLAN 20. If Inter-VLAN routing is functioning
correctly, the pings between the 192.168.10.0 network and the 192.168.20.0
should be successful.
Note: It may be necessary to disable the PC firewall to ping between PCs.

5. Verify connectivity between devices. You should be able to ping between all
devices. Troubleshoot if you are not successful.

6. Save your Packet Tracer file as NET201 Lab 3 – Group#


NETWORK TOPOLOGY DIAGRAM

Figure 3.1. Per-interface Inter-VLAN environment network diagram


DATA RESULTS

Table 3.1. Summary of network device interface IP addresses


SUBNET DEFAULT
NETWORK DEVICE INTERFACE IP ADDRESS
ADDRESS GATEWAY
G0/0 192.168.20.1 255.255.255.0 NA
CORE_RTR
G0/1 192.168.10.1 255.255.255.0 NA
ACCESS_SW1 VLAN 10 192.168.10.11 255.255.255.0 192.168.10.1
ACCESS_SW2 VLAN 10 192.168.10.12 255.255.255.0 192.168.10.1
PC1 NIC 192.168.10.3 255.255.255.0 192.168.10.1
PC2 NIC 192.168.20.3 255.255.255.0 192.168.20.1

Task 1. Set Up the Topology and Initialize Devices (CLI commands, results, or
answers to some question)

Screenshot 1: Executing the basic configuration of CORE_RTR.

Screenshot 2: Configuring IP address on G0/0 and G0/1 and enabling both


interfaces.
Screenshot 3: Copying the running configuration to the startup configuration.

Screenshot 4: Issuing a show IP interface brief command to verify the status of


router interfaces.

Task 2. Configure Basic Device Settings and Verify Connectivity (CLI


commands, results, or answers to some question)

Screenshot 1: Configuring VLANs on ACCESS_SW1.


Screenshot 2: Enabling password encryption on ACCESS_SW1.

Screenshot 3: Issuing a show IP interface brief command to verify the status of


the ACCESS_SW1 interfaces.
Screenshot 4: Issuing a show vlan brief command to verify the status of the
ACCESS_SW1 VLANs.

Screenshot 5: Issuing a show interfaces trunk command to verify the


summary of ACCESS_SW1 trunking protocols.
Screenshot 6: Configuring VLANs on ACCESS_SW2.

Screenshot 7: Enabling password encryption on ACCESS_SW2.


Screenshot 8: Issuing a show IP interface brief command to verify the status of
the ACCESS_SW2 interfaces.

Screenshot 9: Issuing a show vlan brief command to verify the status of the
ACCESS_SW2 VLANs.
Screenshot 10: Issuing a show interfaces trunk command to verify the
summary of ACCESS_SW2 trunking protocols.

Task 3. Configure Basic Device Settings and Verify Connectivity (CLI


commands, results, or answers to some question)
Screenshot 1: Issuing a show IP route command.

Screenshot 2: Pinging PC_1 to PC_2

Screenshot 3: Pinging PC_2 to PC_1


Screenshot 4: Pinging PC_1 to ACCESS_SW1

Screenshot 5: Pinging PC_1 to ACCESS_SW2

Screenshot 6: Pinging PC_1 to CORE_RTR G0/1


Screenshot 7: Pinging PC_1 to CORE_RTR G0/0

Screenshot 8: Pinging PC_2 to ACCESS_SW1

Screenshot 9: Pinging PC_2 to ACCESS_SW2


Screenshot 10: Pinging PC_2 to CORE_RTR G0/1

Screenshot 11: Pinging PC_2 to CORE_RTR G0/0

Screenshot 12: PC1 IP Address


Screenshot 13: PC2 IP Address
DATA ANALYSIS / OBSERVATIONS

The Inter-VLAN routing is as a way to forward traffic between different VLAN


by implementing a router in the network. In VLANs it logically segments the switch
into different subnets, when a router is connected to the switch, an administrator
can configure the router to forward the traffic between the various VLANs
configured on the switch. The user nodes in the VLANs forwards traffic to the router
which then forwards the traffic to the destination network regardless of the VLAN
configured on the switch. Otherwise, Inter-VLAN routing using a router on a stick
utilizes an external router to pass traffic
between VLANs.

The use of VLAN means that the users would not be able to communicate
across other departments. The VLAN is a unique broadcast domain, so computers
on separate VLANs are, by default, not able to communicate. There is a way to
permit these computers to communicate; it is called inter-VLAN routing. One of the
ways to carry out inter-VLAN routing is by connecting to the switch infrastructure.
VLANs associated with unique IP subnets on the network.

In this laboratory experiment VLANs are used to segment switched networks.


Layer 2 switches, such as the 2960-24TT. Inter VLAN routing is performed by
connecting different physical router interfaces to different physical switch ports.
The switch ports connected to the router are placed in access mode and each
physical interface is assigned to a different VLAN.

Inter VLAN is a service you can’t live without in network administration. Using
VLAN has a limitation. The user nodes located on different VLANs cannot
communicate by default and it causes traffic to the network. The user nodes in the
VLANs forward the traffic to the router which then forwards the traffic to the
destination network regardless of the VLAN configured on the switch. A router is
usually connected to the switch using multiple interfaces. One for each VLAN. The
interfaces on the router are configured as the default gateway for the VLANs
configured on the switch.

In this laboratory experiment we are able to create an inter VLAN, where we


manage to reduce the flow of traffic to our network. When we met the requirements
of the following in activating the VLANs and inter VLAN. That is the time that all IP
address is activated and working. And the network is working.
QUESTIONS AND ANSWERS

Questions:

1. What is an advantage and disadvantage of using legacy per-interface


Inter-VLAN routing?
2. Describe the difference of per-interface Inter-VLAN routing over trunk-
based Inter-VLAN routing. Which is better? Support your claims by
providing comparison and explanation.
3. What are different types of switch VLANs? Describe each type and site
an example where this VLANs used in networking.
4. Identify the different switchport mode in Cisco switch and discuss each.
Also, provide a CLI command to accomplish each mode.

Answers:

1.) The advantages and disadvantages of using legacy per-interface Inter-VLAN


Routing are the following:

-It allows each router interface to accept traffic from the VLAN associated with
the connected switches interface. The traffic can then be routed to the
appropriate VLAN.

-the disadvantages of legacy Inter-VLAN routing is that it requires multiple


physical interface on both the switch and the router. This means if the network
grows, more hardware is required if you exceeded the number of physical
interfaces for switches or router.

2.) Legacy inter VLAN routing are rarely used in modern networks. It is useful to
configure and understand this sort of routing before proceeding t router-on-a-stick
inter VLAN routing or configuring the layer 3 switch. Legacy inter-VLAN routing's
advantage is simple as configuring. You may also experience per-interface Inter-
VLAN routing in associating with little networks.
Using an 802.1Q trunk between at least one switch and a single router interface
is a second way for giving routing and connection to numerous VLANs. This
method is called router-on-a-stick inter-VLAN routing where the physical router
interface gives consistent pathways is separated into different sub interfaces to all
VLANs associated.

Trunk-based inter- VLAN routing is much better than per-interface inter- VLAN
routing because it allows one interface to route several VLANs rather than per-
interface inter-VLAN which only allow one port in one VLAN.

3.) The different types of switch VLANs are the following:

a.) Default Vlan- it is the VLAN where unassigned port is located. (VLAN
1)
b.) Data Vlan- it is the vlan that segregates a pc into another. It is also the
vlan that user's using.
c.) Management Vlan. This is also called the Administrator vlan, It instruct
switch in some terms.
d.) Native Vlan- It is the part of vlan1 use to send traffic to the device that
is not registered in the switch.
e.)Voice Vlan- It is use by the VoIP users. This is for telephones or any
device that use video and audio.

4.) The different switchport mode in Ciscl switch are:

a. Switchport Mode Access - A normal way in connecting switch.

-command

switch(config)#int

switch(config-if)#switchport mode access

switch(config-if)#switchport access vlan


b. Switchport mode trunk - Use to lessen the port used in connecting switch to
another.

Static- Manually assigned VLAN.

-command

switch(config)#int

switch(config-if)#switchport mode trunk

switch(config-if)#switchport allowed vlan

c. Dynamic trunk auto- Automatically assigned VLANs.

-command

switch(config)#int

switch(config-if)#switchport mode trunk

switch(config-if)#switchport trunk dynamic auto

d. Dynamic desirable

-command

switch(config)#int

switch(config-if)#switchport mode trunk

switch(config-if)#switchport mode trunk dynamic desirable


CONCLUSION

Based on objective 1. each VLAN in its very own subnet and communicate
area, which implies that edges communicated into the system are exchanged
distinctly between the port inside the equivalent VLAN. For between VLAN
correspondences, an OSI layer 3 gadget is required. Layer 3 Gadget requires an
IP address in each VLAN and have an associated course to each of those subnets.
The hosts in each subnet would be able to be arranged to utilize the switch's IP
addresses as their default entryway.

Between VLAN routing permit, hosts and PCs in various VLAN to speak with one
another. Machines or PC in same VLAN can speak with one another however, in
the event that you need, machines from other VLAN to speak with you, for that,
you have to design inter- VLAN routing.

As stated by Oden, John, VLAN innovation is incorporated into the capabilities


of most current Ethernet switches. VLAN carries on simply like a LAN in all regards
however, with extra adaptability. By utilizing VLAN innovation, it is conceivable to
subdivide a solitary physical switch into a few coherent switches. VLANS are
actualized by utilizing the suitable switch arrangement directions to make the
VLANS and allot explicit change interfaces to the ideal VLAN. After doing this
activity, we presume that inter- VLAN directing can be performed by associating
distinctive physical switch interfaces to various physical switch interfaces.

Based on objective 2, this implies each port on a switch is to put into access
mode, and each physical interface on that switch would be relegated to an
alternate VLAN. The traffic would then be able to be steered to the suitable VLAN
and when utilizing a switch to encourage between VLAN directing, the switch
interfaces can be associated with isolated VLANs.

Based on objective 3, between VLAN routing is the way toward sending system
traffic starting with one VLAN then onto the next VLAN utilizing a switch. As we
realize that, VLAN trunk enables you to impart between at least two same VLANs
on various switches. Inter- VLAN steering enables you to convey between at least
two totally extraordinary VLAN in a similar switch or other with the assistance of
layer gadget routing.

Based on objective 4, verifying trunking, VLANs, routing, and connectivity. The


router should be located central to the switches, is that the paths are kept short
and unnecessary layer 2 hoops are avoided. Ideally, each switch is connected
directly to the router or with just one hop in between. To enable nodes from
different VLANs to communicate with each other you need an IP subnet for each
VLAN and a router. It is usually on this router that you control the inter- VLAN
traffic. The router can be a layer-3 switch or a 'real' router.
REFERENCES

Electronic Books:

Inter-VLAN Routing. Retrieved from https://www.ccnablog.com/inter-vlan-routing/

Ralcheff, N. (2014, July 31). Inter-VLAN routing. Retrieved from


https://sites.google.com/site/nikiccnawiki/switches/inter-vlanrouting

You might also like