Bo friends asked, "How to configure the three-tier switch to create a VLAN" This issue, I refer to other books and the network above some information on the simple introduction.
The following descriptions are based on the Cisco Switch VLAN. Cisco's VLAN implementations are typically port-centric, and the port connected to the node determines the VLAN on which it resides. There are two ways to assign a port to a VLAN, which is static and dynamic, respectively.
The process of forming a static VLAN is the process of assigning a port to a VLAN in a mandatory manner. That is, we first set up the VLAN on the VTP (VLAN trunking Protocol) server, and then assign each port to the corresponding VLAN process. This is the most common method we use to create VLANs.
Dynamic VLAN formation is very simple, by the specific machine to decide which VLAN they belong to. That is, we first set up a vmps (VLAN membership Policy server) VLAN Management Policy Server, which contains a text file containing the MAC address table that is mapped to the VLAN. Depending on the mapping table, the switch determines which VLAN to assign the port to. This approach has great advantages, but creating a database is a very difficult and tedious task.
Here is an example of how to implement a VLAN in a typical Fast Ethernet LAN.
A typical LAN refers to a core switch with a three-layer switching function to connect several branch switches (not necessarily three-layer switching capabilities). We assume that the core switch name is: COM, and the branch switches are: PAR1, PAR2, PAR3, respectively, connected to the core switch via the Port 1 light module, and assume that the VLAN names are counter, MARKET, managing, respectively.
The work to be done:
1, set VTP DOMAIN (core, branch switches are set up)
2, Configuration relay (core, branch switches are set up)
3. Create VLAN (set on server)
4, the switch port into the VLAN
5. Configure three-layer Exchange
1, set up VTP DOMAIN. VTP domain is called an admin field.
All switches that Exchange VTP update information must be configured with the same admin domain. If all the switches are connected to a trunk, all the switches on the network are joined by a single admin domain on the core switch so that all the switches in the admin domain can understand each other's VLAN list.
Com#vlan database into VLAN configuration mode
COM (VLAN) #vtp domain COM settings vtp admin domain name com
COM (VLAN) #vtp Server Set switch to server mode
Par1#vlan database into VLAN configuration mode
PAR1 (VLAN) #vtp domain COM settings vtp admin domain name com
PAR1 (VLAN) #vtp client to set the switch to clients mode
Par2#vlan database into VLAN configuration mode
PAR2 (VLAN) #vtp domain COM settings vtp admin domain name com
PAR2 (VLAN) #vtp client to set the switch to clients mode
Par3#vlan database into VLAN configuration mode
PAR3 (VLAN) #vtp domain COM settings vtp admin domain name com
PAR3 (VLAN) #vtp client to set the switch to clients mode
Note: Setting the core switch to server mode is to allow the creation, modification, deletion of VLANs and other configuration parameters for the entire VTP domain on the switch, synchronizing the latest VLAN information passed by other switches in this VTP domain; client mode means that the switch cannot be created, deleted, Modifying VLAN configuration and not storing VLAN configuration in NVRAM can synchronize VLAN information from other switches in this VTP domain.
2. Configure relaying to ensure that admin domains can overwrite all branch switches, you must configure relaying.
The Cisco switch is capable of supporting any media as a trunk, and it can use its own ISL tags for relaying. ISL (Inter-Switch Link) is a protocol between switches, between switches and routers, and between switches and servers to transfer multiple VLAN information and VLAN data streams, configured with ISL encapsulation via ports directly connected to the switch, The VLAN allocation and configuration of the entire network can be done across the switch.
On the core switch side, configure the following:
COM (config) #interface gigabitethernet 2/1
COM (config-if) #switchport
COM (config-if) #switchport trunk Encapsulation ISL Configuration Relay protocol
COM (config-if) #switchport mode trunk
COM (config) #interface gigabitethernet 2/2
COM (config-if) #switchport
COM (config-if) #switchport trunk Encapsulation ISL Configuration Relay protocol
COM (config-if) #switchport mode trunk
COM (config) #interface gigabitethernet 2/3
COM (config-if) #switchport
COM (config-if) #switchport trunk Encapsulation ISL Configuration Relay protocol
COM (config-if) #switchport mode trunk
On the branch switch side, configure the following:
PAR1 (config) #interface gigabitethernet 0/1
PAR1 (config-if) #switchport mode trunk
PAR2 (config) #interface gigabitethernet 0/1
PAR2 (config-if) #switchport mode trunk
PAR3 (config) #interface gigabitethernet 0/1
PAR3 (config-if) #switchport mode trunk
At this point, the admin domain is set to complete.
3, create VLAN Once the admin domain is established, the VLAN can be created.
COM (VLAN) #Vlan name COUNTER created a VLAN with a number of 10 names COUNTER
COM (VLAN) #Vlan name MARKET creates a VLAN with a number of 11 names MARKET
COM (VLAN) #Vlan name managing created a VLAN with a number of 12 names managing
Note that the VLAN here is built on the core switch, and it will advertise all the switches in the entire admin domain by VTP, as long as the VLAN is created on any switch on the VTP property in the admin domain. However, if you want to include a specific switch port in a VLAN, you must set it on the switch that the port belongs to.
4, the switch port into the VLAN
This column more highlights: http://www.bianceng.cnhttp://www.bianceng.cn/Network/jhjs/
For example, to PAR1, PAR2, PAR3 ... Port 1 of the branch switch is zoned into the Counter VLAN, Port 2 is zoned market VLAN, Port 3 is zoned managing VLAN ...
PAR1 (config) #interface fastethernet 0/1 configuration Port 1
PAR1 (config-if) #switchport Access VLAN 10 attribution counter VLAN
PAR1 (config) #interface fastethernet 0/2 configuration Port 2
PAR1 (config-if) #switchport Access VLAN 11 Attribution Market VLAN
PAR1 (config) #interface fastethernet 0/3 configuration Port 3
PAR1 (config-if) #switchport Access VLAN 12 attribution managing VLAN
PAR2 (config) #interface fastethernet 0/1 configuration Port 1
PAR2 (config-if) #switchport Access VLAN 10 attribution counter VLAN
PAR2 (config) #interface fastethernet 0/2 configuration Port 2
PAR2 (config-if) #switchport Access VLAN 11 Attribution Market VLAN
PAR2 (config) #interface fastethernet 0/3 configuration Port 3
PAR2 (config-if) #switchport Access VLAN 12 attribution managing VLAN
PAR3 (config) #interface fastethernet 0/1 configuration Port 1
PAR3 (config-if) #switchport Access VLAN 10 attribution counter VLAN
PAR3 (config) #interface fastethernet 0/2 configuration Port 2
PAR3 (config-if) #switchport Access VLAN 11 Attribution Market VLAN
PAR3 (config) #interface fastethernet 0/3 configuration Port 3
PAR3 (config-if) #switchport Access VLAN 12 attribution managing VLAN
5. Configure three-layer Exchange
Here, the VLAN has been basically divided. But how do you achieve a three layer (network layer) swap between VLANs? At this point, we will assign the network (IP) address to each VLAN. Assigning IP addresses to VLANs is divided into two situations, one of which is assigning static IP addresses to all nodes of the VLAN; second, assigning dynamic IP addresses to all nodes of the VLAN. These two situations are described separately below.
Suppose the IP address of the interface assigned to the VLAN counter is 172.16.58.1/24, and the network address is: 172.16.58.0,
VLAN MARKET the assigned interface IP address is 172.16.59.1/24, the network address is: 172.16.59.0,
VLAN managing Assignment Interface IP address is 172.16.60.1/24, network address is 172.16.60.0
If the IP address is dynamically assigned, the DHCP server IP address on the network is set to 172.16.1.11.
(1) Assign a static IP address to all nodes of the VLAN.
First, the IP address of each VLAN is set on the core switch respectively. The core switch treats the VLAN as an interface, just like on the router, as follows: