the basic what I call housekeeping configurations on a Cisco device.
This is actually nothing to do with networking per se, but it is part of C. C. A name. And we had reached a point in our lecture, our technical lecture, where we needed to learn
how to just manage or get back and forth on the operating system to do conflicts.
Now that we're done with it, we can get back to our laywer too.
we had left off layer to
before we moved to the configurations at configuring villains. We
I know what a villain is.
It is basically a virtual switch inside of a switch.
Ah, villain. If somebody asks you at an interview, however, your answer should be that the villain is a layer to broadcast domain. I will repeat.
Ah, villain is a Lear to broadcast domain. So when I said earlier
that a switch by default is one broadcast to mean the reason I use the word by default is because by default, switch really only has villain one. Yes, villain. One or 2 to 105 are present. But there are no ports assigned to that villa. Those villains, so one or 2 to 105
are used for technologies that are not used anymore. But Cisco likes being backwards compatible. Hence they still support those villains. For example, Real and 1002 is used for token Ring 200. For the most part, in First World and Second Middle Countries. It's not used anymore.
So in effect, the switch really has one operational villain, which is villain one, which means there is one broadcast remains, which means a switch by default is one broadcast domain.
However, if you have multiple villains, let's say you have three villains on a switch.
A total of four, including villain one. Then you have four broadcast remains on that switch.
So the answer to what a villain is should be
that a villain is a layer to broadcast dooming.
are two types of links
that can exist on a switch,
and the word link is synonymous with the word port,
so there are two types of ports or links that can exist on a switch. The 1st 1 is your access links
or your access ports. In the 2nd 1 is your trunk links. So first I'm going to cover what access links are. And then we're gonna cover the configuration for access links. And then we'll follow that up with the theory part of what trunk lings are. And then we're gonna configure Trunk Ling's and access link.
An access link is any link on a switch or an access port? Is any port on a switch that carries or is part off? One Dylan.
So by default, right now, let's say we saw our switches. Which ones? With juice with 364 or by default. You saw that all ports on the switch belonged to be land one.
So all those belong to only one bill, and at a time, the villain being villain won. All those are access links or access ports,
so access ports belong only to one. Be land at a time. Once again, my little box, which I call a switch. Just switch one. Let's say I have several PCs attached to this switch PC one PC to PC three and let's say
this port is port one. This is P two, and this is Port
three or P three. So let's say p one belongs to villain. One port to belongs to villain 10. Port three belongs to villain 1 50 If court one belongs to villain one,
then poured. One belongs to only one villain at a time,
which is villain one Port one
is going to be an access link.
Poor to Onley belongs to be land. 10 for two is an access link for three belongs to Bill and three I mean villain 1 50
So 43 is an access link. So when a port on a switch only belongs to one villain or is part of only one villain,
it is an access link for the most part, at your jobs. If you are network engineers or junior network engineers, all the switch ports that go connect to PCs at the other end
our access ports. If I were
to tell somebody Hey,
Put pc to on poor too,
or just put pc to in villain 10. So go to switch one
and put pc to in villain
that go to switch one look of the poor PC to is connected to which is poor, too,
and put that port on the switch in Blanton.
So when I asked somebody to go put a device in a certain villain, what I'm actually saying is look up the port that devices connected on and put that port in that specified villain.
So when you create a villain and then you put a port inside of a certain villain, the device connected at the end becomes part of that villain.
I am going to show you how to actually create access links on a switch.