-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathmod2-03.html
543 lines (494 loc) · 25.9 KB
/
mod2-03.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>Advanced Networking - Module 2 Chapter 3 - VLANs</title>
<meta name="description" content="Abilitante alle certificazioni Cisco CCENT e CCNA">
<meta name="author" content="Hacklab Cosenza">
<meta name="apple-mobile-web-app-capable" content="yes">
<meta name="apple-mobile-web-app-status-bar-style" content="black-translucent">
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no">
<link rel="stylesheet" href="css/reveal.css">
<link rel="stylesheet" href="css/theme/black.css" id="theme">
<!-- Code syntax highlighting -->
<link rel="stylesheet" href="lib/css/zenburn.css">
<!-- Printing and PDF exports -->
<script>
var link = document.createElement( 'link' );
var link = document.createElement( 'link' );
link.rel = 'stylesheet';
link.type = 'text/css';
link.href = window.location.search.match( /print-pdf/gi ) ? 'css/print/pdf.css' : 'css/print/paper.css';
document.getElementsByTagName( 'head' )[0].appendChild( link );
</script>
<!--[if lt IE 9]>
<script src="lib/js/html5shiv.js"></script>
<![endif]-->
</head>
<body>
<div class="reveal">
<!-- Any section element inside of this container is displayed as a slide -->
<div class="slides">
<section>
<h1>Advanced Networking</h1>
<h2>Routing & Switching:<h2>
<h2>Routing & Switching Essentials</h2>
<h3>Chapter 3: VLANs</h3>
<p>
<small><a href="http://hlcs.it">Hacklab Cosenza</a> / Centro di Ricerca su Tecnologia e Innovazione</small>
</p>
</section>
<section>
<section>
<h2>What We Know So Far</h2>
<ul>
<li>A switch connects every device attached to it in a <strong>single LAN</strong>.</li>
<li>It operates at Layer 1 and <strong>Layer 2</strong> of the ISO/OSI stack.</li>
<li>Switches propagates Ethernet <strong>broadcast frames to all ports</strong>.</li>
<li>A LAN therefore represents a <strong>single broadcast domain</strong>.</li>
<li>Multiple <strong>interconnected switches extend broadcast</strong> domains.</li>
</ul>
</section>
<section>
<h2>What We Know So Far</h2>
<ul>
<li>There is a <strong>1:1 relationship</strong> between interconnected switches, a LAN, and its broadcast domain.</li>
<li>Broadcast domains can be <strong>segmented by phisically separating</strong> switches and/or connecting switches/LANs to a router.</li>
<li>Broadcast is necessary (many broadcast-based protocols) but <strong>large broadcast domains reduce network efficiency</strong>.</li>
<li>VLANs are "<em>groups of ports on a switch</em>".</li>
</ul>
</section>
</section>
<section>
<section>
<h2>Definition of VLAN</h2>
<p><strong>VLANs (<em>Virtual LANs</em>)</strong> are subsets of devices within a single physical LAN that behave <em><u>just like they are on their own, separate LAN</u></em>. What are the implications, exactly?</p>
<ul>
<li>The <strong>VLAN has its own, separate, <u>reduced</u> broadcast domain</strong>: broadcast frames will reach all other hosts in the VLAN...</li>
<li>... and none of those that are not in the VLAN.</li>
<li>Broadcast sent by hosts that are not part of the VLAN won't reach those that are part of the VLAN.</li>
</ul>
</section>
<section>
<h2>Definition of VLAN</h2>
<ul>
<li><strong>L2-based protocols (including broadcast-</strong>based ones) will work inside the VLAN.</li>
<li>No need of routing through a gateway to communicate between hosts in the same VLAN.</li>
<li>Their own, separate ARP/MAC tables.</li>
</ul>
</section>
</section>
<section>
<section>
<h2>Why VLAN(s)?</h2>
<p>VLANs are <strong>best-defined by the problems they solve</strong>:</p>
<ul>
<li>They allow the creation of <strong>multiple, independent logical networks</strong> based on (and regardless of) the same, <strong>shared infrustrucure</strong> of physical devices and connections.</li>
<li>They segment and reduce <strong>single large broadcast domains into multiple</strong> smaller ones.</li>
</ul>
</section>
<section>
<h2>Why VLAN(s)?</h2>
<p>Other advantages of using VLANs:</p>
<ul>
<li><strong>Performances</strong> - Reduced broadcast domains increases network efficiency. </li>
<li><strong>Costs</strong> - Creating more networks without requiring additional/separate infrastructure.</li>
<li><strong>Flexibility</strong> - Networks can be (re)configured more easily, and on criterias other than physical locations and wirings (function, project, security level).</li>
<li><strong>Security</strong> - Traffic is completely segregated based on the agreed policies, that can be more easily implemented at L3.</li>
</ul>
</section>
</section>
<section>
<section>
<h2>Creating (Port-Based) VLANs</h2>
<p>A VLAN is <strong>created by defining a logical group of switch ports</strong> and making each one a <em>member</em> of that group.</p>
<p><strong>That group is the VLAN</strong>, and it is identified by a number (0-4095) called <strong>VLAN ID</strong>. All hosts connected to a given port <strong>become members of the VLAN(s)</strong> that port is a member of.</p>
<p>Switches <strong>must support</strong> the creation of VLANs (<em>VLAN-aware</em>) and the <strong>VLAN standard 802.1Q</strong>.</p>
<p>Creating VLANs is the equivalent of <strong>dividing a switch into multiple sub-switches, independent</strong> from one another.</p>
<p>When every port is a member of <u>exactly one</u> VLAN, we are creating <em>port-based VLANs</em> using <strong><em>access ports</em></strong>.</p>
</section>
<section>
<h2>Creating (Port-Based) VLANs</h2>
<div><img src="http://i.imgur.com/qovQm1S.png"></div>
<small>A single switch, without any VLAN.</small>
<div><img src="http://i.imgur.com/WB5WZLF.png"></div>
<small>A single switch segmented into 2 port-based VLANs. The behaviour is the same of 2 independent switches.</small>
</section>
<section>
<h2>Creating (Port-Based) VLANs</h2>
<p>VLANs can <strong>span multiple interconnected switches</strong> and still maintain isolation. Setup VLANs on every switch and connect them with one cable for each VLAN to extend.</p>
<img src="http://i.imgur.com/IMZURZP.png">
<small>Without VLANs, this would require 2+2=4 switches.</small>
<p>These setups quickly become troubling, <strong>wasting lots of ports when you have many VLANs and switches</strong>.</p>
</section>
</section>
<section>
<section>
<h2>VLAN Trunking</h2>
<p>Ideally, we would like to use a <strong>single connection to distribute all the VLANs</strong> from switch to switch, like this:</p>
<img src="http://i.imgur.com/vzfojVR.png">
<p>A <em><strong>trunk</strong></em> is a point-to-point connection between VLAN-aware devices that's <strong>capable of transporting more than one VLAN</strong>.</p>
<p>A <em>trunk port</em> is a switch port participating in a trunk.</p>
</section>
<section>
<h2>VLAN Trunking</h2>
<img src="http://i.imgur.com/vzfojVR.png">
<p>There's <u>one problem</u>: when it receives frames from a trunk, <strong>how can a switch know to which VLAN a frame belongs</strong>?</p>
</section>
</section>
<section>
<h2>VLAN Tagging</h2>
<p>The solution if <strong>VLAN tagging</strong>. The frames travelling in the trunk are <em>tagged</em>: the <em>VLAN ID</em> of the VLAN the frame belongs to is added to the Ethernet frame.</p>
<p>Only frames in a trunk <em>needs</em> to be tagged. "Normal" Ethernet frames in the context of VLANs are called <strong><em>untagged</em></strong> frames.</p>
<p>Of course, adding VLAN tags required a modification to the Ethernet frames, that is standardised in <strong>IEEE 802.1Q</strong>.</p>
</section>
<section>
<h2>802.1q</h2>
<img src="http://i.imgur.com/fpJ9xUH.gif">
<ul>
<li><strong>Type/TPID</strong> (2 bytes) - 0x8100, indicating a 802.1Q frame.</li>
<li><strong>Priority</strong> (3 bits) - It supports 7-priorities QoS (802.1p).</li>
<li><strong>CFI</strong> (1 bit) - Enables Token Ring encapsulation.</li>
<li><strong>VID</strong> (12 bit) - The actual "tag", indentifies up to 4096 VLANs.</li>
</ul>
<p><strong>Maximum length</strong> for a 802.1Q frame is <strong>increased to 1522 bytes</strong> (4 bytes more than standard 802.3 Ethernet).</p>
</section>
<section>
<section>
<h2>Special-Function VLANs</h2>
<ul>
<li><strong>Data VLAN</strong> - The typical VLAN: manually configured by admins to divide one physical LAN into multiple ones, and transport traffic generated by final users.</li>
<li><strong>Default VLAN</strong> - The VLAN that every port belongs in a switch default configuration. On a Cisco Switch, the default VLAN has VID 1, it's called <em>default</em> and it's just like every other VLAN except it cannot be deleted or renamed.</li>
</section>
<section>
<h2>Special-Function VLANs</h2>
<ul>
<li><strong>Management VLAN</strong> - The VLAN(s) that is/are used to access a switch remotely for administration. A Management VLAN must have an address configuration provided to its associated SVI. It is strongly adviced to move the Management VLAN away from the default VLAN 1 on a Cisco Switch.</li>
<li><strong>Voice VLAN</strong> - One or more VLAN(s) reserved to IP telephony and VoIP.</li>
</ul>
</section>
</section>
<section>
<section>
<h2>Native VLAN</h2>
<p>Every VLAN on a trunk link has its frames <em>tagged</em>. There's one possible exception, a single VLAN allowed to have its frames <em>untagged</em>.</p>
<p>This VLAN is called the <strong><em>Native VLAN</em></strong> of that <u>trunk</u> port.</p>
<p>There can be <u>only one</u> Native VLAN on a trunk port: if 2 VLANs were allowed to have untagged frames, how could the trunk distinguish the two?</p>
<p>Every trunk port has a parameter called <strong><em>Default Port VLAN ID (PVID)</em></strong>, which has the value of the Native VLAN ID assigned to it.</p>
</section>
<section>
<h2>Native VLAN</h2>
<p><em>Tagged</em> frames with the Native VLAN ID are <u>rejected</u> on Cisco switches. All untagged traffic is forwarded to the Native VLAN.</p>
<p>It is mostly used for <strong>backward compatibility</strong> with non-VLAN compatible devices, but using them it's not recommended.</p>
<p><u>Best Practice</u>: configure an unused VLAN as Native VLAN for all trunk ports.</p>
</section>
</section>
<section>
<h2>Voice VLAN</h2>
<p>It's best practice to <strong>reserve VLAN(s) for voice services</strong> with transmission priority over other VLAN(s).</p>
<p>It's very important to have <strong>< 100ms</strong> end-to-end delay.</p>
<p><strong>Cisco IP Phones have integrated switches</strong> that are configured to send <em>tagged</em> Voice and Data VLAN traffic.</p>
<img src="http://i.imgur.com/1SKSmBG.jpg">
<small>The host is connected to the phone and send normal <em>untagged</em> frame. It's up to the phone to tag Data and Voice appropriately. The switch <em>access</em> port has to be configured with a Voice VLAN.</small>
</section>
<section>
<h2>VLANs on Cisco Switches</h2>
<ul>
<li><strong>Normal Range</strong> (VID 1-1005)</li>
<ul>
<li>VID 1, 1002-1005 cannot be removed.</li>
<li>VID 1002-1005 reserved for Token Ring and FDDI.</li>
<li>Configuration stored on flash memory root, in a file called <strong>vlan.dat</strong>.</li>
<li>Can be automatically learned and configured through the <em>VLAN Trunking Protocol</em>.</li>
</ul>
<li><strong>Extended Range</strong> (VID 1006-4094)</li>
<ul>
<li>Configuration doesn't use vlan.dat file, stores by default in the running configuration file.</li>
<li>VTP can't be enabled to learn VLAN in this range.</li>
</ul>
</ul>
</section>
<section>
<section>
<h2>VLAN Configuration</h2>
<ul><li>VLAN creation</li></ul>
<pre><code class="no-highlight">Switch(config)# vlan [vlan_id | vlan_id,vlan_id,... | vlan_id - vlan_id]
Switch(config-vlan)# name [vlan_name]</code></pre>
<ul><li>Assigning ports</li></ul>
<pre><code class="no-highlight">Switch(config)# interface [interface_id]
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan [vlan_id]</code></pre>
<p>If the VLAN wasn't previously created, it will be now.</p>
<ul><li>Return to Default VLAN Membership</li></ul>
<pre><code class="no-highlight">Switch(config-if)# no switchport access vlan</code></pre>
<p>To change the membership of access ports, simply re-assign them, <strong>it's not necessary to delete current membership first</strong>.</p>
</section>
<section>
<h2>VLAN Configuration</h2>
<h3>VLAN Deletion</h3>
<pre><code class="no-highlight">Switch(config)# no vlan [vlan_id]</code></pre>
<p>After deleting a VLAN, <strong>ports won't be able to communicate until they are reassigned</strong> to an active VLAN, so it may be better to do it before beleting.</p>
<p>All the configured VLANs can be <strong>deleted at once</strong> by deleting the vlan.dat file:</p>
<pre><code class="no-highlight">Switch# delete flash:vlan.dat</code></pre>
</section>
<section>
<h2>VLAN Configuration</h2>
<h3>Veryfing: show vlan</h3>
<pre><code class="no-highlight">S2>enable
S2#show vlan brief
VLAN Name Status Ports
---- --------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/19
Fa0/20, Fa0/21, Fa0/22, Fa0/23
Fa0/24, Gig0/1, Gig0/2
10 Faculty/Staff active
20 Students active Fa0/18
30 Guest active Fa0/6, Fa0/11
99 Management+Native active
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
S2#show vlan id 20
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
20 Students active Fa0/18
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
20 enet 100020 1500 - - - - - 0 0
S2#show vlan name Guest
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
30 Guest(Default) active Fa0/6, Fa0/11
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
30 enet 100030 1500 - - - - - 0 0
S2#show vlan summary
Number of existing VLANs : 9
Number of existing VTP VLANs : 9
Number of existing extended VLANs : 0
</code></pre>
</section>
<section>
<h2>VLAN Configuration</h2>
<h3>Veryfing: show interfaces</h3>
<pre><code class="no-highlight">S2>show interfaces Fa0/5 switchport
Name: Fa0/5
Switchport: Enabled
Administrative Mode: static access
Operational Mode: down
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 56 (Management&Native)
Trunking Native Mode VLAN: 56 (Management&Native)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none</code></pre>
</section>
</section>
<section>
<h2>VLAN Trunking Configuration</h2>
<h3>Trunk Creation</h3>
<p>Execute these commands on <strong>both ends</strong> of the trunk link.</p>
<pre><code class="no-highlight">S1(config)# interface [interface_id]
S1(config-if)# switchport mode trunk
S1(config-if)# switchport trunk native vlan [vlan_id]
S1(config-if)# switchport trunk allowed vlan [vlan_list]</code></pre>
<p>There are other ways to configure trunk links, but we will only cover <code>switchport mode trunk</code> configurations.</p>
<h3>Reset to Default State</h3>
<pre><code class="no-highlight">S1(config)# interface [interface_id]
S1(config-if)# no switchport trunk native vlan
S1(config-if)# no switchport trunk allowed vlan
# Back to Native VLAN = 1 and All VLANs allowed on the trunk
S1(config-if)# switcport mode access</code></pre>
</section>
<section>
<section>
<h2>Dynamic Trunking Protocol</h2>
<p>DTP is a <strong>Cisco proprietary protocol</strong> that is able to automatically manage point-to-point trunk links.</p>
<p>A port can be put into different <strong>trunk and non-trunk modes</strong>. Some of these modes supports <strong>DTP autonegotiation</strong> of trunk status, by <strong></strong>sending and receiving DTP frames <strong>with the neighbour</strong>.</p>
<p>Non-Cisco devices don't support DTP, or even forward it correctly. In these cases it is recommended to disable DTP.</p>
<p>To enable trunking with a device that doesn't support DTP:</p>
<pre><code class="no-highlight">S1(config-if)# switchport mode trunk
S1(config-if)# switchport nonegotiate</code></pre>
</section>
<section>
<h2>Interface Modes and DTP</h2>
<ul>
<li><strong>switchport mode access</strong> - Turn a port into an access port and permanent nontrunking mode.</li>
<li><strong>switchport mode dynamic auto</strong> (default) - Turn the interface into a trunk if needed (neighbour set to trunk or desirable).</li>
<li><strong>switchport mode dynamic desirable</strong> (default on older switches) - The interface sets itself as a trunk if the neighbour is set to trunk, desirable or auto mode.</li>
<li><strong>switchport mode trunk</strong> - Permanent trunking mode, only negotiates a trunk link.</li>
<li><strong>switchport nonegotiate</strong> - The interface won't send DTP frames, so no autonegotiation will happen. Only available in access or trunk mode.</li>
</ul>
</section>
<section>
<h2>Interface Modes and DTP</h2>
<img src="http://i.imgur.com/3Xl9zAm.png">
<p>The best practice is:</p>
<ul>
<li>for links intended to be trunk links, to <strong>configure statically, disable trunk autonegotiation</strong> whenever possible.</li>
<li>for links not intended to be trunk, <strong>disable DTP</strong> altogether.</li>
</ul>
</section>
<section>
<h2>Verifying DTP</h2>
<pre><code class="no-highlight">SW1#show dtp interface f0/24
DTP information for FastEthernet0/24:
TOS/TAS/TNS: TRUNK/NONEGOTIATE/TRUNK
TOT/TAT/TNT: 802.1Q/802.1Q/802.1Q
Neighbor address 1: 000AB7055158
Neighbor address 2: 000000000000
Hello timer expiration (sec/state): never/STOPPED
Access timer expiration (sec/state): never/STOPPED
Negotiation timer expiration (sec/state): never/STOPPED
Multidrop timer expiration (sec/state): never/STOPPED
FSM state: S6:TRUNK
# times multi & trunk 0
Enabled: yes
In STP: no
Statistics
----------
246 packets received (238 good)
8 packets dropped
8 nonegotiate, 0 bad version, 0 domain mismatches,
0 bad TLVs, 0 bad TAS, 0 bad TAT, 0 bad TOT, 0 other
243 packets output (243 good)
240 native, 3 software encap isl, 0 isl hardware native
0 output errors
0 trunk timeouts
1 link ups, last link up on Mon Mar 01 1993, 00:01:01
0 link downs</code></pre>
<small>TOS/TAS/TNS = Trunk Operational/Administrative/Negotiation Status.</small>
<small>TOT/TAT/TNT = Trunk Operational/Administrative/Negotiation Encapsulation.</small>
<small>
<ul>
<li>Operational = The current, actual status of the trunk</li>
<li>Administrative = How we configured it</li>
<li>Negotiated = What the switch asked during negotiation</li>
</ul>
</small>
</section>
</section>
<section>
<section>
<h2>Troubleshooting VLANs</h2>
<ul>
<li>An <strong>unique subnet</strong> must be assigned to each VLAN.</li>
<li>The most common mistake is to <strong>assign the wrong VLAN</strong> to ports.</li>
<li>Ports become inactive if their VLAN is deleted, so always remember to <strong>reassign the port to another VLAN</strong> or recreate the VLAN.</li>
</ul>
</section>
<section>
<h2>Troubleshooting VLANs</h2>
<ul>
<li><strong><em>VLAN Leaking</em></strong> - When ports accept traffic from VLAN they are not intended to be a part of.</li>
<li>VLAN Leaking occurs when a trunk link has a <strong>native VLAN mismatch</strong> and <em>untagged</em> traffic is directed to the wrong VLAN. CDP generates debug messages in such a case.</li>
<li>Trunk links also must have <strong>compatible trunk modes and identical sets of allowed VLANs</strong>, otherwise no traffic or unexpected traffic issues could arise.</li>
</ul>
</section>
<section>
<h2>Troubleshooting VLAN Trunks</h2>
<pre><code class="no-highlight">Cat3550#show interfaces trunk
Port Mode Encapsulation Status Native vlan
Fa0/17 auto 802.1q trunking 1
Fa0/18 trunk 802.1q other 1
Fa0/19 trunk 802.1q other 1
Port Vlans allowed on trunk
Fa0/17 1-4094
Fa0/18 1-4094
Fa0/19 1-4094
Port Vlans allowed and active in management domain
Fa0/17 1-3,10
Fa0/18 1-3,10
Fa0/19 None
Port Vlans in spanning tree forwarding state and not pruned
Fa0/17 1-3,10
Fa0/18 1-3,10
Fa0/19 None
Cat3550#show interface Fa0/17 switchport
Name: Fa0/17
Switchport: Enabled
Administrative Mode: dynamic auto
[output omitted]
</code></pre>
<p>Use these verification commands on both ends to...</p>
<ul>
<li>first, check for VLAN mismatches over the trunk link.</li>
<li>then, check for trunk modes mismatches.</li>
<li>lastly, check the VLAN allowed on the trunk.</li>
</ul>
</section>
</section>
<section>
<section>
<h2>VLAN Security: Switch Spoofing</h2>
<p>The attacker that is able to physically access a switch can <strong>take advantage of the switchport default mode</strong>: dynamic auto.</p>
<p>After connecting to a dynamic auto port, the attacker emulates 802.1Q and DTP frames, <strong>forcing the link into a trunk link</strong>.</p>
<p>If the attacker succeeds, it can then <strong>access all the allowed VLANs</strong> on that port.</p>
<p>To avoid Switch Spoofing, you must <strong>disable trunking</strong> on all ports and then statically <strong>configure trunks only where required with DTP disabled</strong>.</p>
</section>
<section>
<h2>VLAN Security: Double Tagging</h2>
<img src="http://i.imgur.com/WS7F7v8.png">
<img src="http://i.imgur.com/SrQGaDI.gif">
</section>
<section>
<h2>VLAN Security: Double Tagging</h2>
<img src="http://i.imgur.com/WS7F7v8.png">
<img src="http://i.imgur.com/PswYzx3.gif">
</section>
<section>
<h2>VLAN Security: PVLAN Edge</h2>
<p>By electing specific ports as <strong><em>protected</em></strong> we can <strong>forbid any L2 traffic</strong> (unicast, broadcast, multicast) between them.</p>
<p>This feature is called <em>Private VLAN Edge</em> and <u>only has local switch significance</u>.</p>
<p>Traffic <strong>between unprotected and protected</strong> ports on the same switch or <strong>protected ports belonging to different switches</strong> is treated in the usual way.</p>
<p>To configure a port as protected:</p>
<pre><code class="no-highlight">Switch(config-if)# switchport protected</code></pre>
<p>To restore a port as unprotected:</p>
<pre><code class="no-highlight">Switch(config-if)# no switchport protected</code></pre>
</section>
</section>
<section>
<h1>End of Lesson</h1>
</section>
</div>
</div>
<script src="lib/js/head.min.js"></script>
<script src="js/reveal.js"></script>
<script>
// More info https://github.com/hakimel/reveal.js#configuration
Reveal.initialize({
controls: true,
progress: true,
history: true,
center: true,
transition: 'slide', // none/fade/slide/convex/concave/zoom
// More info https://github.com/hakimel/reveal.js#dependencies
dependencies: [
{ src: 'lib/js/classList.js', condition: function() { return !document.body.classList; } },
{ src: 'plugin/markdown/marked.js', condition: function() { return !!document.querySelector( '[data-markdown]' ); } },
{ src: 'plugin/markdown/markdown.js', condition: function() { return !!document.querySelector( '[data-markdown]' ); } },
{ src: 'plugin/highlight/highlight.js', async: true, callback: function() { hljs.initHighlightingOnLoad(); } },
{ src: 'plugin/zoom-js/zoom.js', async: true },
{ src: 'plugin/notes/notes.js', async: true }
]
});
</script>
</body>
</html>