</p> Review Questions 43 q- Y. q- k6 {6 D1 Z1 o; o9 o9 ]
Chapter 2 Implementing VLANs in Campus Networks 51
) S; f; B+ Z4 V Implementing VLAN Technologies in a Campus Network 52; M5 q$ |1 j) c5 M) ~. z" | W
VLAN Segmentation Model 53: Y' U8 M3 `# W+ U0 y& \
End-to-End VLAN 54$ [4 ~ c% b W" @
Local VLAN 55
- q3 ]! i2 J- D Comparison of End-to-End VLANs and Local VLANs 565 [8 p# H: p8 c$ b: r( f* G1 M5 j7 Q) i
Mapping VLANs to a Hierarchical Network 57
8 k5 Y8 ~1 J4 l0 y Planning VLAN Implementation 58
9 ?& U7 q {8 u3 U W2 X Best Practices for VLAN Design 59
* B' \' Z' J9 I2 P Configuring VLANs 60
2 O/ H. r; ~+ F7 b/ `& j5 I VLAN Ranges 600 l$ f; B- z. m+ w1 a
Verifying the VLAN Configuration 63
4 S9 v0 O7 z% q$ b, V/ ? Troubleshooting VLANs 67
X$ p9 w# W$ ^! k3 a0 q Troubleshooting Slow Throughput 67( D* X7 |/ P, v' U: P
Troubleshooting Communication Issues 68
5 l% S/ `: V3 g. t6 P Implementing Trunking in Cisco Campus Network 681 Q, c+ h% @7 q. X
Trunking Protocols 69
1 R" T/ W) S$ w- G# k2 ~) f# Z y, V Understanding Native VLAN in 802.1Q Trunking 712 |$ m- ]% S, H
Understanding DTP 72
, \1 O4 i/ W( L: N# y9 V Cisco Trunking Modes and Methods 72' u! P) \5 d7 t& B8 O# d
VLAN Ranges and Mappings 73* N( i2 m2 ?$ S6 N( l$ O$ F* _% `
Best Practices for Trunking 734 U, r- D" S9 S: b) P
Configuring 802.1Q Trunking 74
& d; l* ]- {- F) \0 v6 e Verifying Trunking Configurations 76
Y, ^: ]! [$ F8 N* l7 I Troubleshooting Trunking 77# {. o) j2 j) E+ [4 r
VLAN Trunking Protocol 78
( F* t0 x9 v% f9 }& y: c+ X8 z! C1 X: { VTP Pruning 818 `' ?. m" K: u% h0 D- f
VTP Versions 82
I# y7 d# g! ? VTP Versions 1 and 2 82, M7 v) u5 I8 n" H# B, I! E
VTP Version 3 83
' k9 z4 c5 |$ O( P7 e# ^% q0 u VTP Messages Types 83' U; d9 |1 a2 u) k
Summary Advertisements 83
8 I& R0 f; w' w! P- }; h9 M2 _0 j8 A Subset Advertisements 845 \+ G4 [$ P& D
Advertisement Requests 84
+ }( w* R9 S) F! t/ G7 Y VTP Authentication 84& Q( k( n+ J/ x& i3 |2 [6 G8 \: }
Best Practices for VTP Implementation 84$ `2 @7 u9 S, P
Configuring VTP 85) V0 U1 \0 j7 a( e8 G! J+ N+ d
Verifying the VTP Configuration 85
3 z( ]: X! R9 s6 @% S# B* v' o. ~; P Troubleshooting VTP 87' x" a& i3 j: D+ Y9 Z( }
Private VLANs 87
! q- \+ c- i0 F8 Y Private VLANs Overview 881 ]/ Z/ ^+ o1 h+ R' a
Private VLANs and Port Types 88
4 `) ~$ ]3 [4 u! }! X. G Private VLAN Configuration 908 v, Y* }/ m, w( J! V ~/ e
Configuring Private VLANs in Cisco IOS 91+ w; }5 ?8 \8 ^" q1 R3 o
Verifying Private VLAN 92
X- [8 k; s$ |4 D* M" D; z Private VLAN Configuration Example 937 X# q6 F* C' D
Single Switch Private Configuration 93; P2 B- c* a- s8 Q0 l. b' ?
Private VLAN Configuration Across Switches 94
0 P) L; p, N5 f- ?) o Port Protected Feature 97
. }: ?/ z, q4 U! m& s: c$ y) u, ` Configuring Link Aggregation with EtherChannel 97
) h# [$ t2 }: b6 C- I Describe EtherChannel 98
# J9 T) R2 a& e PAgP and LACP Protocols 101
( b9 }6 `$ g/ v; Q) E. W PAgP Modes 101
8 @5 A4 _/ [5 z; Z LACP Modes 103
; `% X4 Y# n6 ~. V4 @* S Configure Port Channels Using EtherChannel 105/ F7 O2 m* h3 J1 x
Guidelines for Configuring EtherChannel 105
( S9 E: V% D* U; E3 u Layer 2 EtherChannel Configuration Steps 106
. S; p% v$ c7 H: `2 A# b" T7 L- p Verifying EtherChannel 108
% T1 p7 q/ C' E EtherChannel Load Balancing Options 1100 B( t/ q) s# A9 R+ S) \' T
Summary 112- T# e) Y: }) w5 c6 h, T+ _
! l$ i! M% N6 S: m$ v0 J
Review Questions 113 |