Time
30 hours 46 minutes
Difficulty
Intermediate
CEU/CPE
31

Video Description

Virtual Local Area Connections In this lesson, we use a series of examples to define and demonstrate the concept of what a virtual local area connection (VLAN) is and how it differs from other local area network infrastructures. You'll learn the strategic and network administration benefits of switch+port assignments for network resources and why it's an important broad function to correctly segment nodes to specific LAN on the network. You'll also learn how to logically separate and create two or more virtual LANS inside the same (single) physical device.

Video Transcription

00:04
now moving on. Let's expand this concept of broadcast domains to something we call virtual local area networks or
00:16
villains, too.
00:19
Hits home the concept off what a villain is. I'm gonna go through a little
00:26
a little example
00:27
to hit home. Why we need villains,
00:32
lessons you
00:33
or pretend we're going to do a lot of pretending in this class.
00:37
We have a switch switch one, and we have four peces attached to it. And let's say these PCs PC one
00:46
you see too
00:47
PC three and P C. Four.
00:51
Let's say this switch one belongs to the accounting department for some company. So now this switch belongs to some accounting department for some company. And I knew I haven't covered I p address ing right now, but
01:06
you don't need to know. I p address ing to understand this concept. So just go along with me.
01:11
Let's say this accounting department has an I p. Address our network address of 10 10 10 0
01:19
and then PC wanted to sign the address. 10 10 10.1
01:23
pc to is $10.10 dollars $10 to PC three years turned out $10.10 dollars, three and PC forced and not turned up to in that four.
01:34
Now suppose the same company also as a management department. So this is switch to
01:42
and there are two people in management and we'll call them
01:47
PC
01:49
five and PC six. Now the management department would have a different I p address ING scheme
01:56
not $10.10 dollars, $10 0 It would be,
01:59
let's say,
02:00
$20.20 dollars, $20 0 This is just, for example,
02:08
why can't we put
02:10
P C five and PC six
02:14
on switch one? What we can't because the management department has a different i p address ing scheme.
02:20
And
02:22
if PC one sends out a broadcast at some point,
02:24
everybody would receive it
02:28
if they were all attached to switch one.
02:30
So if I put PC five NPC six on switch, one
02:36
P C five and PC six would receive that broadcast,
02:38
however, they're supposed to be separate a separate department from the accounting department.
02:46
So what do you do?
02:49
Not to mention the fact switches don't have just four ports.
02:53
You can buy switches with 24 ports. I think the least amount of force you can buy our 12 but most places most places have switches that are 48 boards and above.
03:04
So we're here. Let's say I had 24 ports. I'm wasting 20 points and I pay money purport when I purchased this equipment.
03:12
So not only is it
03:14
insecure.
03:15
Report P C five NPC six on the same switch.
03:19
It is also a waste of money. I'm wasting
03:22
22 ports on sweets, too,
03:24
because nobody else can be on the same switch where the management department is located. There is no separation,
03:30
so the separation comes by having a physical separation, just buying different devices. But then you run into the problem where you're wasting ports.
03:38
What if I do? Put PC five, which is 2020 20.5, and PC six, which is $2020.20.6
03:50
on the same switch, unless for 10 p. C. One is connected to Port one. PC three is connected. Report. Three pc to is connected to port to P. C. Four to port
04:01
45 to port five and 6 to 46
04:08
whips
04:13
Port six.
04:15
Now let's say inside of the switch, I log into the switch and I do some configurations where I tell the switch
04:23
that
04:24
P one port, one
04:27
port to
04:28
port three and Port four belong to land
04:34
number 10
04:38
and Port five and Port six belong to Land
04:47
Twin.
04:48
Now would have done
04:50
is I have actually created true switches to virtual switches inside of the same physical device.
04:59
So instead of there being a physical separation, off accounting
05:04
and the management department, there is a logical separation inside of the switch. So I have created to virtual switches inside
05:16
off one switch, and the switch is basically a land. It's a local area network, so I have created to virtual lands inside of the same physical device. So instead of calling this land 10 I can call it
05:30
Villain
05:32
10 or virtual and 10 and I can call the management department villain
05:40
20.
05:42
Sure
05:43
coming back to the lab.
05:45
Villains are nothing more than virtual switches inside of the main switch,
05:54
so villains are nothing more than different virtual switches that you create inside the main physical device.
06:00
Now the benefits of the lambs.
06:03
One.
06:04
You're saving yourself money
06:06
by using up all the ports on the switch.
06:10
Two billion skin trance verse,
06:14
different switches so
06:15
Now the distance constraints have been taken away.
06:19
Ah, villain can extend from the floor. I'm on to the basement of this building. And as long as the users or the PC is connected to those switches belong to the same villain.
06:31
They will talk to each other like they're sitting next to each other. So the distance constraint is gone. So remember, villains can transfers multiple physical switches
06:43
beyond one on a switch and Dylan 1002 through 1005 That's 100210031004 and 1005
06:56
And Dylan won our default villains. Which means they already exist on the switch
07:02
and they cannot be deleted.
07:04
Okay, so villain one and one or 2 to 105 r default villains, and they cannot be deleted.
07:12
Now, by default.
07:14
All ports on a switch belong to Villain one
07:19
once again
07:20
by default, and I'll be showing you that in a in a few minutes. By default, all ports on a switch belong to Dylan. One villain Rangers Total villain Rangers, depending on the platform, depending on the switch and the operating system that you're using
07:38
the total number off
07:40
pour the total number of villains you can have on a switch
07:43
very between one and 40 94.
07:47
So
07:48
villain one through 40 94 are the total amount of the lands that you can possibly create on the switch, depending on the platform. Now, just because you can choose to create villain
08:01
3000 doesn't mean you need 3000 villains on that one device. You could Onley Havilland 3000 and real and 50 and you would be fine.
08:11
Now, this little bit of information is not exactly see CNN specific. It is a little bit beyond, but take note that villain one through 1005
08:22
are called normal range villains
08:26
re lands 1006 through 40 94 are considered extended range of the lands.
08:35
Now extended range villains will come into play a little bit later. I'll mention it when I'm covering another topic Call villain Trucking protocol. So we will put that little tidbit on the back burner till then. So now we go to the next stage villain configuration.
08:52
So the next topic we're gonna cover is villain configuration.
08:56
For your benefit, I'm gonna write the commands on the board,
09:01
and then I will show you
09:03
on Package Racer.
09:05
So there are two ways to create
09:09
villains
09:11
the old way, and the new way
09:15
the old way is actually not part of C. C in it.
09:18
I'll go ahead and cover it in my classes anyways, because most of people listening to this lecture or most of the people that are in my classes are in production. And not everybody has the most upgraded IOS at work, and not everybody can afford to buy new switches all the time, so you might run into a switch at some point. That just doesn't do it the new way.
09:37
So you need to know the old way just for work purposes, and it is not hard. It is very simple.
09:43
So on a switch
09:46
in the old way, you simply say Villain space data base and
09:52
the Sisko command line is not cap sensitive. So it could be capital cannot cannot be capital. It can be lower case, and it'll work just fine.
10:03
Except for passwords,
10:05
passwords, I can accept it.
10:07
So when you hit the return key or when you hit, enter
10:11
the sweet changes moods to switch.
10:15
It will say
10:16
Villain, which is your villain. Database mood
10:20
over here. Villain. Let's say 50
10:24
and hit. Enter.
10:26
And
10:28
if you wanna give it a name, you can say name.
10:33
Let's say test,
10:37
and when you hit enter it will create real and 50.
10:41
At that point, you can say exit
10:52
and you will return back out of the database mood.
11:00
And then
11:01
you can check your configurations by doing the command show villain or show V land brief, which is the preferred command. Or at least I think it's the preferred command. And in about five minutes, when I do these commands, I'll point out the difference between the command show villain and show the land brief.
11:20
Now, this is the old way of doing it.
11:22
Okay, this is the old way method of doing the lance.
11:28
Now the new way for the new way. You need to be
11:33
what is called
11:35
the configuration mode for the switch.
11:37
And once again
11:39
we're nearing the point where I will have to stop Terry
11:43
after villains are done and then move over to show you how to operate or how to navigate the Cisco operating system. But we'll get to that. I hold it.
11:54
So for the new method, you need to be in conflict
11:58
and you will understand what config mode is by the end of the day. Today,
12:05
from config mode, you would say Villain,
12:09
let's create villain 100
12:13
And when you hit the return key, you will see that the mode for the switch
12:18
changes over to
12:22
config villain.
12:24
And now you're configuring the villain database on a switch over here. I can give it a name, Name
12:33
C, C and A. And that
12:37
should create
12:39
my villain 100.
12:41
Sometimes you can run into an issue.
12:45
Sometimes people do a show command from this mode and try to see if the villain has been created
12:50
and there is a way to do a show command from this mode,
12:54
you can simply, instead of saying show villain, brief, say do show villain brief. However, the caveat here is, and I've noticed this personally and I have a home lab. I've notices on my home lab. Some of my switches will show me villain 100 at this point,
13:13
fine and dandy.
13:13
Sometimes the switch does not digest this command to you actually exit out of this mood. So if at this point you check to see if you have the land 100 sometimes it leaves people confused because they don't see the land 100 in the dead of it. They are thinking that Hey, I just did the command.
13:33
Where's my veal? And 100?
13:35
What they need to do is exit out of this mood, go back to your config mood
13:41
and check again. Or you could go back a lower mode and check again. But now, if you check with the command do show
13:48
villain brief,
13:54
you will see that villain 100 is there and it's present.
13:58
Okay, now, at this point, I'm gonna pull a packet tracer and show you how this works.

Up Next

Cisco Certified Network Associate (CCNA) Certification

Our online, self-paced Cisco Certified Network Associate CCNA training teaches students to install, configure, troubleshoot and operate LAN, WAN and dial access services for medium-sized networks. You'll also learn how to describe the operation of data networks.

Instructed By

Instructor Profile Image
Junaid Memon
Instructor