Home

Chapter 3: VLANs

  • 3.0 VLANs
    • 3.0.1 Introduction
      • 3.0.1.1 Introduction
      • 3.0.1.2 Vacation Station
  • 3.1 VLAN Segmentation
    • 3.1.1 Overview of VLANs
      • 3.1.1.1 VLAN Definitions
      • 3.1.1.2 Benefits of VLANs
      • 3.1.1.3 Types of VLANs
      • 3.1.1.4 Voice VLANs
      • 3.1.1.5 Packet Tracer - Who Hears the Broadcast?
    • 3.1.2 VLANs in a Multi-Switched Environment
      • 3.1.2.1 VLAN Trunks
      • 3.1.2.2 Controlling Broadcast Domains with VLANs
      • 3.1.2.3 Tagging Ethernet Frames for VLAN Identification
      • 3.1.2.4 Native VLANs and 802.1Q Tagging
      • 3.1.2.5 Voice VLAN Tagging
      • 3.1.2.6 Activity - Predict Switch Behavior
      • 3.1.2.7 Packet Tracer - Investigating a VLAN Implementation
  • 3.2 VLAN Implementations
    • 3.2.1 VLAN Assignment
      • 3.2.1.1 VLAN Ranges on Catalyst Switches
      • 3.2.1.2 Creating a VLAN
      • 3.2.1.3 Assigning Ports to VLANs
      • 3.2.1.4 Changing VLAN Port Membership
      • 3.2.1.5 Deleting VLANs
      • 3.2.1.6 Verifying VLAN Information
      • 3.2.1.7 Packet Tracer - Configuring VLANs
    • 3.2.2 VLAN Trunks
      • 3.2.2.1 Configuring IEEE 802.1Q Trunk Links
      • 3.2.2.2 Resetting the Trunk to Default State
      • 3.2.2.3 Verifying Trunk Configuration
      • 3.2.2.4 Packet Tracer - Configuring Trunks
      • 3.2.2.5 Lab - Configuring VLANs and Trunking
    • 3.2.3 Dynamic Trunking Protocol
      • 3.2.3.1 Introduction to DTP
      • 3.2.3.2 Negotiated Interface Modes
      • 3.2.3.3 Activity - Predict DTP Behavior
    • 3.2.4 Troubleshoot VLANs and Trunks
      • 3.2.4.1 IP Addressing Issues with VLAN
      • 3.2.4.2 Missing VLANs
      • 3.2.4.3 Introduction to Troubleshooting Trunks
      • 3.2.4.4 Common Problems with Trunks
      • 3.2.4.5 Trunk Mode Mismatches
      • 3.2.4.6 Incorrect VLAN List
      • 3.2.4.7 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 1
      • 3.2.4.8 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 2
      • 3.2.4.9 Lab - Troubleshooting VLAN Configurations
  • 3.3 VLAN Security and Design
    • 3.3.1 Attacks on VLANs
      • 3.3.1.1 Switch Spoofing Attack
      • 3.3.1.2 Double-Tagging Attack
      • 3.3.1.3 PVLAN Edge
      • 3.3.1.4 Activity - Identify the Type of VLAN Attacks
    • 3.3.2 Design Best Practices for VLANs
      • 3.3.2.1 VLAN Design Guidelines
      • 3.3.2.2 Lab - Implementing VLAN Security
  • 3.4 Summary
    • 3.4.1 Summary
      • 3.4.1.1 VLAN Plan
      • 3.4.1.2 Packet Tracer - Skills Integration Challenge
      • 3.4.1.3 Summary
  • Expand All
  • Collapse All