Time
31 hours 29 minutes
Difficulty
Beginner
CEU/CPE
30

Video Description

VLAN and VTP Configuration This lesson covers Virtual Local Area Network (VLAN) and VLAN Trunking Protocol (VTP) configurations. A VLAN allows us to take the infrastructure for one local area network and make multiple virtual local networks which helps to segment different broadcast domains. They cannot talk to each other unless it's via a router. A VTP configuration is not assigned to one particular VLAN.

Video Transcription

00:04
now, when we're setting up our different routers and switches on our network, one of the different components that we need to be aware of, one of the different concepts we need to be aware of is a vey land. Now we've talked about villains before, especially in depth, but we're gonna go over them again for this particular segment and how they deal with each other. And Gillian Stand for Virtual Local Area Network
00:23
of Alien essentially allows us to take the infrastructure for one
00:27
local area network and virtually make it like multiple virtual local area networks. So weaken segment up this one local area network into multiple virtual local area networks in order to help with segmenting up abroad are different broadcast domains,
00:45
so we may have different devices that we don't necessarily want seeing each other
00:50
but need to be on the same physical network. So we set up a virtual local area networks with our switches in order to prevent that, so our virtual local area networks are going to be have the use of multiple manage switches or single manage switch,
01:06
and our virtual local area networks cannot talk to each other unless they talked through a router
01:11
so they can on Lee talk to other devices on their same villain unless they talk through a router. And we do have switches that can perform routing functions. So we separated network into multiple smaller segments, require the use of manage switches and are different. V lands can be port based Mac address based or sub net based. Now
01:30
we talk. Now, let's take a quick look at our diagram, which we're gonna make. And with RV lands, what are villains entail
01:41
are going to be a
01:44
We're gonna put up two switches here,
01:47
and then each of these switches are gonna connect to a couple devices.
01:53
So we're gonna connect to
01:56
one
01:57
two,
02:00
three computers.
02:01
One,
02:04
two,
02:06
three computers and then
02:08
one of our switches talks out to our router
02:13
are different. The lands are going to essentially take these computers that are on the same physical network that are on the same
02:22
that are all on our same
02:24
network
02:27
i p address scheme, and it's gonna segment them out.
02:29
So all of the computers on this network are 1 92.1 68.1 got something. Computers.
02:36
So 1 92.1 68.1 dot 3192.16 th not one not 2192.1 68 that 1.4 they're all on the ST they. If we just set them up like this without setting up in evey lands, they can all talk to each other.
02:49
But let's say we have an environment where we have a training facility, and
02:54
these four computers are lab computers.
02:59
We want these lab computers to be able to talk to each other and talk out to the Internet without talking to
03:06
these two computers,
03:07
which are sales computers, which our sales staff.
03:12
So how do we make sure that these four computers that are on separate switches can talk to each other without talking to our green computers? And they can also talk out to our Internet?
03:21
Well, we'll set up a port based villain on are two different switches,
03:27
and our villain is going to segment out. That's not these networks.
03:31
So
03:32
are 1 92.1 68.1 dot two. Computer is going to be plugged into
03:39
single port. Here
03:42
we have another lab computer plug into a port here port here, port here.
03:46
Then we have our sales computer 1 92.1 68.1 dot three.
03:53
It's plugged into a port, and our other sales computers also plugged into a port. And then we have a router
03:59
as well. There are two switches air plugged in together,
04:01
each of the ports that connect to devices that are on
04:08
separate V. Lance, our access ports. So each of our ports that connect to a computer are called access ports.
04:15
These access ports, we go in and manually configure them to separate the lance we set them up is villian 0 1,000,000,001 billion to et cetera.
04:26
So we're going to say that all of our blue lab computers on villian one and our green sales computers are on the land, too.
04:35
Now,
04:36
if one of our sales computers needs to talk to our other sales computer, it simply sends out the broadcast on the land to, and it talks to the other sales computer, and it can also talk out to the Internet. But none of the traffic between these two sales computers can be intercepted by our blue computers
04:56
and our blue computers don't hear any of the broadcasts
04:59
from our green computers because they're on separate V. Lance. It's as if
05:03
in the respect for the blue computers, they can't even see these green computers on the network even though they're in the same I p address scheme are switches are managing those virtual lands.
05:15
Now, how do are two green computers talk together?
05:19
How does our rather how to our switches? No.
05:24
What villain
05:26
information gets sent over this port?
05:29
Because
05:30
we may have our blue computers that need to talk over this port as well. Between the this connection right here.
05:34
Well, this connection here
05:38
is called a trunk port.
05:40
Now, what trunk ing does is it allows us to connect switches, a connection between switches, which each host multiple V. Lance A trunk fort is different from an access port because the trunk port is not assigned to one particular V land.
05:56
We don't say Oh, well, this port is villain one. Because if we did that, then all the computers on this switch would automatically be vey laying one on Lee. The traffic that was sent
06:08
over that was sent from 1,000,000,000 won computers would go to this port.
06:13
So we want to make sure that traffic from be laying one and the land to computers can go over the sport. But when it gets to the other end, it's on Lee sent to their respective the lance.
06:23
So we set this up as a trump port.
06:27
What this trunk port will do is this trunk port will tag. All the packets that are going to that are going over it as either being on villian one or villain too.
06:42
So if our 1 92.16 th not one not three sales computer sends a packet to 1 90 to 1 68.1 dot four
06:54
when it gets goes through a router are router will say Okay, so I need to send this over my trunk port. So I'm gonna take this packet, and I'm going to say that this is on my green V land here,
07:08
and I'm gonna put all the rest of the information in it, and I'm gonna send it over.
07:12
So then that packet gets to our other switch, and our other switch says, Oh, this is only for the green v. Lance. I'm going toe on Lee send this information to other computers that are other ports that are part of the green V. Lance.
07:25
So that's the difference between our access ports, which connect our computer devices in our trunk port, which connect our switches, which hosts these multiple villains.
07:34
Now, Next up, we have a V T P configuration. Now BTP configuration stands for villian trunk ing protocol or virtual local area network trunk ing Protocol. Now, this V T P configuration is a Cisco technology, and it allows us to have
07:51
proper propagation of V lan information
07:56
across switches.
07:57
So say we set up switches. We set up our different
08:01
villian based on maybe not port based, but we based them on different, a different protocol, different sub net based
08:09
V lands or whichever method we want to use. Essentially.
08:13
And we tell this switch okay, I want you to start setting up villian protocol, and I want you to be able to, and I want you to be able to propagate that information out to other switches. So these other switches set themselves up the same way.
08:31
Well, that's what RV TP configuration does. RV tp configuration are 1,000,000,000 trumping protocol is assistant Cisco Technology, which allows switches to communicate to each other and essentially set up the lands themselves, set them up based on what configuration we want them to set up.
08:50
Now this BTP configuration needs a few, has few requirements that we need to set up the switches with. Each switch needs to be configured with the correct V T p domain V, T P protocol and BTP password information.
09:05
Now, remember again, this is only gonna be our Cisco switches that have this HVT p configuration technology and our our alternative to this would be just manually setting up each switch with each configured villains. Now, for a static environment that never changes, this may not be
09:24
a cz big of a deal,
09:26
but for an environment where we're constantly switching out switches or an extremely massive environment where we're constantly moving around, computers and things are changing very, very often than this, V T P configuration may save us a lot of management and state may save us a lot of manual entry

Up Next

CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By

Instructor Profile Image
Anthony Harris
Systems Analyst and Administrator at SAIC
Instructor