All language subtitles for Free-CCNA-VLANs-Part-3-Day-18-CCNA-200-301-Complete-Course_en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:04,160 --> 00:00:07,640 This is a free, complete course for the CCNA. 2 00:00:07,639 --> 00:00:11,638 If you like these videos, please subscribe\n 3 00:00:11,638 --> 00:00:16,399 Also, please like and leave a comment, and\n 4 00:00:20,660 --> 00:00:24,189 This video will once again cover the topic\nof VLANs.. 5 00:00:24,189 --> 00:00:28,410 Although we’ve already covered the most\n 6 00:00:28,410 --> 00:00:32,469 a few more things you should know about VLANs\nfor your CCNA. 7 00:00:32,469 --> 00:00:37,228 This is going to be a long video again, so\n 8 00:00:37,228 --> 00:00:40,189 First off, here are the topics that will be\n 9 00:00:40,189 --> 00:00:45,369 First off, a little addition to the previous\n 10 00:00:45,369 --> 00:00:51,409 of a native VLAN on a router when using router\n 11 00:00:51,409 --> 00:00:56,628 Next up, we will look at a few wireshark captures\n 12 00:00:56,628 --> 00:01:00,929 Wireshark is a great tool for network engineers,\n 13 00:01:00,929 --> 00:01:04,299 series to help you understand these topics. 14 00:01:04,299 --> 00:01:09,450 After that we’ll look at the final method\n 15 00:01:09,450 --> 00:01:11,480 also known as multilayer switching. 16 00:01:11,480 --> 00:01:17,960 I’ve always told you that switches are Layer\n 17 00:01:17,959 --> 00:01:22,609 many modern switches are actually Layer 3\n 18 00:01:25,510 --> 00:01:30,170 Next up are two topics which have actually\n 19 00:01:30,170 --> 00:01:36,890 DTP, the dynamic trunking protocol, and VTP,\n 20 00:01:36,890 --> 00:01:41,200 I was planning to cover these in this video,\n 21 00:01:41,200 --> 00:01:43,609 reserve a separate video for them. 22 00:01:43,609 --> 00:01:47,728 Although these have both been removed from\n 23 00:01:47,728 --> 00:01:53,000 be important for you to understand these topics\n 24 00:01:53,000 --> 00:01:56,890 you may actually see some questions about\n 25 00:01:58,840 --> 00:02:04,060 However, I will give just a basic overview\n 26 00:02:04,060 --> 00:02:08,629 Before getting started, I want to say make\n 27 00:02:08,629 --> 00:02:14,280 quiz, from now on I’ll be featuring one\n 28 00:02:14,280 --> 00:02:16,729 set of practice exams for the CCNA. 29 00:02:18,479 --> 00:02:22,899 If you want to get a copy of Boson ExSim for\n 30 00:02:24,830 --> 00:02:29,870 No other practice exams help you get ready\n 31 00:02:29,870 --> 00:02:35,920 you can I highly recommend getting and using\n 32 00:02:35,919 --> 00:02:41,469 So let’s move on to the first point, using\n 33 00:02:41,469 --> 00:02:46,209 I said in the previous lecture video that\n 34 00:02:46,209 --> 00:02:51,009 an unused VLAN, as the native VLAN feature\n 35 00:02:51,009 --> 00:02:55,209 I will talk more about network security later\n 36 00:02:55,209 --> 00:03:01,239 However, if you want to use the native VLAN\n 37 00:03:01,239 --> 00:03:04,289 The native VLAN feature does have one benefit. 38 00:03:04,289 --> 00:03:08,469 Because frames in the native VLAN aren’t\n 39 00:03:08,469 --> 00:03:14,318 is smaller so it allows the device to send\n 40 00:03:14,318 --> 00:03:21,399 In the previous video, I set the native VLAN\n 41 00:03:24,009 --> 00:03:31,979 So, just for this demonstration let’s set\n 42 00:03:31,979 --> 00:03:35,989 There are 2 methods of configuring the native\n 43 00:03:38,139 --> 00:03:44,259 First up, you can use the command ENCAPSULATION\n 44 00:03:46,150 --> 00:03:50,530 This tells the router that this subinterface\n 45 00:03:50,530 --> 00:03:53,439 just like the native VLAN on a switch. 46 00:03:53,439 --> 00:03:58,199 It will assume untagged frame belong to the\n 47 00:04:00,689 --> 00:04:05,240 The second option is to not use a subinterface at all, but just 48 00:04:05,241 --> 00:04:09,610 for the native VLAN on the physical interface of the router. 49 00:04:09,610 --> 00:04:13,510 The ENCAPSULATION DOT1Q command is not necessary in this case. 50 00:04:13,509 --> 00:04:16,608 Okay, let’s look at each option. 51 00:04:16,608 --> 00:04:19,798 First, I will configure the first option. 52 00:04:20,988 --> 00:04:28,859 On the g0/0.10 interface, I configured ENCAPSULATION\n 53 00:04:28,860 --> 00:04:33,348 Note that this is the complete topology from\n 54 00:04:35,379 --> 00:04:40,990 The only change is that I added NATIVE to\n 55 00:04:40,990 --> 00:04:45,750 Let’s take this opportunity to look at a\n 56 00:04:47,449 --> 00:04:56,189 This PC in VLAN20 has an IP address of 192.168.1.65,\n 57 00:04:59,379 --> 00:05:05,030 I will use wireshark to monitor this connection\n 58 00:05:05,029 --> 00:05:09,188 Wireshark will capture all frames on this\n 59 00:05:09,189 --> 00:05:11,639 take a look at what traffic is passing through. 60 00:05:11,639 --> 00:05:17,619 Let’s send that ping. We will first look\n 61 00:05:20,819 --> 00:05:25,960 It will be in VLAN20, and it’s being sent\n 62 00:05:25,959 --> 00:05:32,689 Here’s the wireshark capture for the ICMP\n 63 00:05:32,689 --> 00:05:36,930 First off, you can see the source and destination\n 64 00:05:36,930 --> 00:05:41,119 Now let’s look at the Ethernet header encapsulating\n 65 00:05:43,559 --> 00:05:51,520 Type: 802.1Q virtual LAN, and notice the hexadecimal\n 66 00:05:51,519 --> 00:05:57,029 I said in the previous video that dot1q is\n 67 00:05:57,029 --> 00:06:00,119 and that is where the TYPE field usually goes. 68 00:06:00,120 --> 00:06:04,728 This here is the ‘TPID’ field of the dot1q\ntag. 69 00:06:04,728 --> 00:06:09,618 Under it, these are the rest of the fields\nof the 802.1Q tag. 70 00:06:09,619 --> 00:06:13,120 First is the PCP, priority code point. 71 00:06:13,120 --> 00:06:18,340 It has a value of 0, so no special priority\n 72 00:06:18,339 --> 00:06:22,168 Under it is the DEI, drop eligible indicator. 73 00:06:22,168 --> 00:06:28,258 Again, a value of 0, so it won’t be dropped\n 74 00:06:28,259 --> 00:06:34,059 Next is the most important field, the VLAN\n 75 00:06:34,059 --> 00:06:38,990 The PC that sent the ping is in VLAN 20, and\n 76 00:06:40,990 --> 00:06:45,990 Finally, under that is the normal TYPE field\n 77 00:06:49,079 --> 00:06:56,538 It normally comes after the SOURCE MAC ADDRESS\n 78 00:06:56,538 --> 00:07:01,928 Next let’s look at the ICMP echo request\n 79 00:07:01,928 --> 00:07:06,688 It will now be in VLAN10, because the destination\nis in VLAN10. 80 00:07:06,689 --> 00:07:14,479 VLAN10 is configured as the native VLAN on\n 81 00:07:14,478 --> 00:07:20,848 Here’s the exact same ICMP echo request,\n 82 00:07:24,749 --> 00:07:29,129 It has been encapsulated with a new Ethernet\n 83 00:07:31,059 --> 00:07:33,729 This is the native VLAN function at work. 84 00:07:33,728 --> 00:07:39,800 Both R1 and SW2 understand that untagged frames\n 85 00:07:43,379 --> 00:07:47,889 That ICMP echo request will continue to the\n 86 00:07:47,889 --> 00:07:52,800 VLAN10 is configured as the native VLAN on\nall devices. 87 00:07:52,800 --> 00:07:58,309 When this PC in VLAN10 sends the ICMP echo\n 88 00:07:58,309 --> 00:08:05,490 R1, which will then tag it in VLAN20, and\n 89 00:08:05,490 --> 00:08:08,769 Now let’s take a quick look at the second\n 90 00:08:08,769 --> 00:08:14,269 router, which is simply configuring the IP\n 91 00:08:14,269 --> 00:08:19,279 no need for a subinterface or the encapsulation\ndot1q command. 92 00:08:20,740 --> 00:08:25,418 First, I used ‘NO INTERFACE G0/0.10’. 93 00:08:27,418 --> 00:08:33,728 Then, I entered interface configuration mode\n 94 00:08:37,399 --> 00:08:45,169 To help you visualize it, here is the output\n 95 00:08:45,169 --> 00:08:49,829 First off, these commands here on the physical\n 96 00:08:51,350 --> 00:08:55,470 The physical interface is configured normally\n 97 00:08:55,470 --> 00:08:59,350 This will be used for the native VLAN, VLAN10. 98 00:08:59,350 --> 00:09:04,680 The other subinterfaces are just like we configured\n 99 00:09:04,679 --> 00:09:08,409 dot1q command and their own IP address. 100 00:09:08,409 --> 00:09:11,309 This will function just like the first option\nwe saw. 101 00:09:11,309 --> 00:09:18,019 SW2 will send VLAN10 packets in untagged frames\n 102 00:09:20,740 --> 00:09:25,360 As I said before, it is recommended that you\n 103 00:09:25,360 --> 00:09:30,090 for security purposes, but if you want to\n 104 00:09:30,090 --> 00:09:34,240 how to do it on a router, so these are two methods you can use. 105 00:09:34,240 --> 00:09:37,299 You might also need to know this for your\nexam, by the way. 106 00:09:37,299 --> 00:09:40,679 Here’s the network diagram once again. 107 00:09:40,679 --> 00:09:43,679 We have one router, and two switches. 108 00:09:43,679 --> 00:09:47,699 Or I should say, two Layer 2 switches. 109 00:09:47,700 --> 00:09:51,640 This is the icon we’ve been using for regular\nLayer 2 switches. 110 00:09:51,639 --> 00:09:55,129 But let me introduce you to another type of\nswitch. 111 00:09:55,129 --> 00:10:00,210 This is the icon I will use for what is called\n 112 00:10:02,039 --> 00:10:06,629 From now on I will use either term, Layer\n 113 00:10:08,870 --> 00:10:14,360 By the way, these are the official Cisco icons\n 114 00:10:14,360 --> 00:10:20,029 but I think the ones I use in my videos look\n 115 00:10:20,029 --> 00:10:24,199 First let’s review exactly what a multilayer\nswitch does. 116 00:10:24,200 --> 00:10:28,830 A multilayer switch is capable of both switching\nAND routing. 117 00:10:31,129 --> 00:10:36,590 A regular layer 2 switch is NOT layer 3 aware,\n 118 00:10:39,120 --> 00:10:43,649 It only cares about Layer 2 information like\nMAC addresses. 119 00:10:43,649 --> 00:10:47,759 You can assign IP addresses to its interfaces\nlike a router. 120 00:10:47,759 --> 00:10:52,480 Previously we haven’t assigned any IP addresses\n 121 00:10:52,480 --> 00:10:57,450 With a Layer 3 switch, you can configure ‘routed\n 122 00:10:59,429 --> 00:11:05,299 Not just physical interfaces, but you can\n 123 00:11:05,299 --> 00:11:07,879 and assign IP addresses to those interfaces. 124 00:11:07,879 --> 00:11:12,899 These are not separate physical\n 125 00:11:12,899 --> 00:11:18,449 software of the switch that can be used to\n 126 00:11:18,450 --> 00:11:23,550 You can configure routes, like static routes,\n 127 00:11:23,549 --> 00:11:28,339 Finally, it can be used for inter-VLAN routing. 128 00:11:28,340 --> 00:11:31,850 So far, we have looked at two methods of inter-VLAN\nrouting. 129 00:11:31,850 --> 00:11:37,090 The first one, in day 16’s video, was using\n 130 00:11:38,870 --> 00:11:43,179 This works, but if you have many VLANs you\n 131 00:11:45,299 --> 00:11:50,419 The second method was router on a stick, which\n 132 00:11:50,419 --> 00:11:55,629 traffic from all VLANs between the switch\n 133 00:11:55,629 --> 00:12:00,909 This is efficient in terms of the number of\n 134 00:12:00,909 --> 00:12:05,589 all of the traffic going to the router and\n 135 00:12:05,590 --> 00:12:10,970 So, in large networks, a multilayer switch\n 136 00:12:13,529 --> 00:12:20,110 Here is the topology again, now let’s\n 137 00:12:22,210 --> 00:12:24,300 And now let’s make one more change. 138 00:12:24,299 --> 00:12:30,949 I’ve replaced the trunk link between SW2\n 139 00:12:30,950 --> 00:12:34,379 we will no longer run VLANs across this. 140 00:12:34,379 --> 00:12:40,570 I’ll talk about this link later and assign\n 141 00:12:40,570 --> 00:12:45,450 SW2’s G0/1 interface. But for now\n 142 00:12:48,000 --> 00:12:52,659 For review, when we used router on a stick\n 143 00:12:52,659 --> 00:12:58,429 between VLANs was sent to R1 first, and then\n 144 00:13:00,360 --> 00:13:06,090 For example, if this PC in VLAN20 wants to\n 145 00:13:08,460 --> 00:13:17,470 From the PC to SW2, from SW2 to R1, tagged\n 146 00:13:17,470 --> 00:13:22,110 from SW2 to SW1, tagged in VLAN10, and finally\n 147 00:13:22,110 --> 00:13:25,980 However, SW2 is a multilayer switch. 148 00:13:25,980 --> 00:13:29,930 It doesn’t have to send the traffic to R1\n 149 00:13:29,929 --> 00:13:34,029 It can do that with something called ‘Switch\n 150 00:13:34,029 --> 00:13:41,500 SVIs (or Switch Virtual Interfaces) are the virtual\n 151 00:13:44,528 --> 00:13:50,278 Configure each PC to use the SVI (NOT the\n 152 00:13:50,278 --> 00:13:54,889 When using router on a stick, the router was\n 153 00:13:54,889 --> 00:13:58,360 This time, we will use the switch’s SVIs\ninstead. 154 00:13:58,360 --> 00:14:03,580 To send traffic to different subnets/VLANs,\n 155 00:14:03,580 --> 00:14:07,870 the switch will route the traffic. 156 00:14:07,870 --> 00:14:11,490 These are the SVIs I configured on SW2. 157 00:14:11,490 --> 00:14:16,440 These are the same IP addresses I configured\n 158 00:14:16,440 --> 00:14:18,800 usable IP address in each subnet. 159 00:14:18,799 --> 00:14:23,290 So, these are already configured on each PC\n 160 00:14:23,291 --> 00:14:27,220 need to change the PC configurations. 161 00:14:27,220 --> 00:14:31,940 Now let’s take a look at the path the traffic\n 162 00:14:34,230 --> 00:14:38,779 The destination is in the 192.168.1.0/26 subnet. 163 00:14:38,779 --> 00:14:45,529 SW2 now has its own routing table, so it looks\n 164 00:14:45,529 --> 00:14:49,139 sees that the destination is connected to\nits VLAN10 SVI. 165 00:14:49,139 --> 00:14:52,279 So, the traffic is now routed to VLAN10. 166 00:14:52,279 --> 00:14:57,620 If SW2 doesn’t have the destination MAC\n 167 00:14:57,620 --> 00:15:00,500 flood the frame to all VLAN10 interfaces. 168 00:15:00,500 --> 00:15:06,190 But, let’s assume it has already learned\n 169 00:15:06,190 --> 00:15:09,070 over its trunk interface, tagged as VLAN10. 170 00:15:09,070 --> 00:15:12,629 SW1 then forwards it to the destination. 171 00:15:12,629 --> 00:15:18,350 Now, what if the hosts want to reach destinations\n 172 00:15:18,350 --> 00:15:23,759 For example, I’ve added a cloud connected\n 173 00:15:23,759 --> 00:15:28,799 Because SW2 is their default gateway, any\n 174 00:15:31,320 --> 00:15:35,860 But our previous router on a stick configurations\n 175 00:15:38,029 --> 00:15:43,709 In addition to configuring virtual interfaces,\n 176 00:15:43,710 --> 00:15:48,560 configure their physical interfaces to operate\n 177 00:15:49,590 --> 00:15:57,269 So, we can assign the subnet 192.168.1.192/30\n 178 00:15:57,269 --> 00:16:07,230 R1, with SW2’s G0/1 interface having an\n 179 00:16:07,230 --> 00:16:12,500 interface having an IP address of 192.168.1.194. 180 00:16:12,500 --> 00:16:18,720 Then, we configure a default route on SW2\n 181 00:16:18,720 --> 00:16:21,720 outside of the LAN will be sent to R1. 182 00:16:21,720 --> 00:16:27,670 I already covered static routes, including\n 183 00:16:27,669 --> 00:16:32,159 explain the concept in depth again, but I\n 184 00:16:32,159 --> 00:16:37,559 So, let’s do that, let’s get into the\n 185 00:16:37,559 --> 00:16:44,750 link between SW2 and R1, and then the SVIs\non SW2. 186 00:16:44,750 --> 00:16:50,149 First off, remove R1’s router on a stick\n 187 00:16:52,940 --> 00:17:01,290 First off, I delete each subinterface with\n 188 00:17:01,289 --> 00:17:10,109 Then, I use the command DEFAULT INTERFACE\n 189 00:17:10,109 --> 00:17:15,328 After that, I used SHOW IP INTERFACE BRIEF\n 190 00:17:15,328 --> 00:17:19,629 Notice the status of the subinterfaces, it\nsays DELETED. 191 00:17:19,630 --> 00:17:23,769 Although we have successfully deleted the\n 192 00:17:23,769 --> 00:17:26,868 a ‘deleted’ status unless we reload the\nrouter. 193 00:17:26,868 --> 00:17:31,119 That’s no problem though, so I’ll just\nleave them. 194 00:17:31,119 --> 00:17:36,599 Then I simply enter interface configuration\n 195 00:17:39,169 --> 00:17:45,220 I use SHOW IP INTERFACE BRIEF again, and you\n 196 00:17:47,880 --> 00:17:51,240 Now let’s look at the switch’s side of\n 197 00:17:51,240 --> 00:17:58,160 First, I reset the G0/1 interface to its default\n 198 00:17:58,160 --> 00:18:03,730 because it was configured as a trunk for router\n 199 00:18:03,730 --> 00:18:07,308 Next up is a very important command, one you\nmust not forget. 200 00:18:09,450 --> 00:18:14,119 This command enables Layer 3 routing on the\n 201 00:18:15,919 --> 00:18:20,799 If you forget this command, your inter-VLAN\n 202 00:18:20,798 --> 00:18:26,118 Next up is another important command, NO SWITCHPORT on the 203 00:18:26,118 --> 00:18:31,279 This is the command that changes the interface\n 204 00:18:32,788 --> 00:18:35,929 Now you will be able to assign an IP address\nto it. 205 00:18:35,929 --> 00:18:45,548 So, I assigned 192.168.1.193/30, and used\n 206 00:18:45,548 --> 00:18:49,538 the IP address is assigned to it just like\na router interface. 207 00:18:49,538 --> 00:18:54,129 Last up is the default route pointing to R1. 208 00:18:54,130 --> 00:19:02,830 As I’ve already shown you in a previous\n 209 00:19:02,829 --> 00:19:10,168 followed by the next hop, in this case 192.168.1.194,\n 210 00:19:10,169 --> 00:19:16,070 I then used SHOW IP ROUTE to confirm, and\n 211 00:19:16,069 --> 00:19:21,048 with a default route pointing to R1, and connected\n 212 00:19:22,499 --> 00:19:24,889 And one additional command you can use to 213 00:19:24,888 --> 00:19:31,798 confirm is SHOW INTERFACES STATUS, which I\n 214 00:19:31,798 --> 00:19:37,589 Notice that, in the VLAN column, instead of\n 215 00:19:37,589 --> 00:19:43,240 Okay, now let’s move on to configure those\nSVIs on SW2. 216 00:19:43,240 --> 00:19:46,788 SVI configuration is very simple. 217 00:19:46,788 --> 00:19:49,970 Here are the configurations for SW2. 218 00:19:49,970 --> 00:19:56,110 Use the command INTERFACE VLAN10, for example,\n 219 00:19:57,650 --> 00:20:01,809 Then assign an IP address, and use NO SHUTDOWN\nto enable it. 220 00:20:01,808 --> 00:20:08,118 SVIs are shutdown but default, so remember\n 221 00:20:08,118 --> 00:20:14,808 I repeated the process for VLAN20 and VLAN30,\n 222 00:20:16,880 --> 00:20:23,190 Now, just to demonstrate one problem you might\n 223 00:20:23,190 --> 00:20:31,308 that doesn’t exist on the switch, VLAN40,\n 224 00:20:31,308 --> 00:20:35,210 I also made sure to enable it with NO SHUTDOWN. 225 00:20:35,210 --> 00:20:38,690 However, look at the SVI itself. 226 00:20:41,869 --> 00:20:45,808 Well, it's because the VLAN doesn’t exist\non the switch. 227 00:20:45,808 --> 00:20:50,658 Let’s take a look at the conditions required\n 228 00:20:50,659 --> 00:20:54,360 First, the VLAN must exist on the switch. 229 00:20:54,359 --> 00:21:01,209 In this case, we haven’t created VLAN40\n 230 00:21:01,210 --> 00:21:07,590 When you assign an access port to a VLAN,\n 231 00:21:07,589 --> 00:21:09,668 will automatically create the VLAN. 232 00:21:09,669 --> 00:21:15,809 However, if you create an SVI for a VLAN that\n 233 00:21:17,929 --> 00:21:24,200 Second, the switch must have at least one\n 234 00:21:24,200 --> 00:21:30,600 and/or one trunk port that allows the VLAN\n 235 00:21:30,609 --> 00:21:36,219 For example, in the topology we’re using\n 236 00:21:36,220 --> 00:21:40,470 VLAN20, so their SVIs can go up. 237 00:21:40,470 --> 00:21:47,298 There are no connected hosts in VLAN30, however\n 238 00:21:47,298 --> 00:21:51,579 over it, so VLAN30’s SVI is up as well. 239 00:21:53,548 --> 00:21:56,589 The VLAN must not be shutdown. 240 00:21:56,589 --> 00:22:01,308 Note that this is NOT the SVI, but the VLAN\nitself. 241 00:22:01,308 --> 00:22:07,379 You can enter VLAN configuration mode, and\n 242 00:22:07,380 --> 00:22:12,549 If you do this, the SVI for that VLAN can’t\nbecome UP/UP. 243 00:22:12,548 --> 00:22:16,749 Note that, I think you can’t do this command\n 244 00:22:16,749 --> 00:22:19,868 Cisco switch if you want to try this one out. 245 00:22:19,868 --> 00:22:25,778 Finally, if the SVI itself is shutdown, it\n 246 00:22:25,778 --> 00:22:33,009 use the NO SHUTDOWN command after you create\n 247 00:22:33,009 --> 00:22:37,558 I used the SHOW IP ROUTE command again, and\n 248 00:22:37,558 --> 00:22:43,288 been added to the route table for the SVIs\n 249 00:22:46,169 --> 00:22:50,419 Okay, so our configurations are all done. 250 00:22:50,419 --> 00:22:54,679 The next video will be a practice lab, so\n 251 00:22:55,849 --> 00:23:00,619 If you have trouble remembering the commands,\n 252 00:23:00,619 --> 00:23:04,388 doing them multiple times, until you feel\nconfident. 253 00:23:04,388 --> 00:23:12,508 So, if one of our PCs wants to reach a destination\n 254 00:23:12,509 --> 00:23:16,870 which will send it to R1, which will take\ncare of it from there. 255 00:23:16,869 --> 00:23:21,319 Note that we didn’t actually configure any\n 256 00:23:21,319 --> 00:23:24,970 on inter-VLAN routing at this point. 257 00:23:24,970 --> 00:23:29,490 If one of our PCs wants to reach a destination\n 258 00:23:29,490 --> 00:23:36,298 VLAN, SW2 will do the inter-VLAN routing without\n 259 00:23:36,298 --> 00:23:42,859 Okay, before moving on to the quiz let’s\n 260 00:23:42,859 --> 00:23:45,990 I showed you two ways of configuring the native\n 261 00:23:45,990 --> 00:23:50,960 Usually, it’s best to just set the native\n 262 00:23:50,960 --> 00:23:55,739 use the native VLAN feature, you should know\n 263 00:23:55,739 --> 00:24:01,159 We looked at some wireshark captures, both\n 264 00:24:01,159 --> 00:24:03,369 because it was in the native VLAN. 265 00:24:03,368 --> 00:24:08,480 Finally, I showed you the final method of\n 266 00:24:08,480 --> 00:24:14,940 I hadn’t talked about before, a Layer 3\n 267 00:24:14,940 --> 00:24:21,350 By configuring SVIs, switch virtual interfaces,\n 268 00:24:21,349 --> 00:24:25,298 subnets and VLANs without having to send the traffic\n 269 00:24:25,298 --> 00:24:29,408 It’s like having a mini router within the\nswitch. 270 00:24:29,409 --> 00:24:35,500 These last two topics, DTP and VTP, will be\n 271 00:24:38,960 --> 00:24:43,410 As I mentioned at the beginning of the video,\n 272 00:24:43,410 --> 00:24:48,269 quiz, a few simple questions to help you review\n 273 00:24:48,269 --> 00:24:53,420 one question from Boson’s ExSim, which is\n 274 00:24:55,278 --> 00:25:00,919 I used Boson ExSim for my CCNA and CCNP, and\n 275 00:25:00,919 --> 00:25:03,840 pass all of my exams on the first try. 276 00:25:03,839 --> 00:25:07,359 If you want to pick up a copy of ExSim, check\n 277 00:25:07,359 --> 00:25:12,928 Let’s go on to question 1 of today’s quiz. 278 00:25:12,929 --> 00:25:19,730 Which TWO answers are valid options to configure\n 279 00:25:19,730 --> 00:25:24,450 (select two, each answer is a complete solution). 280 00:25:24,450 --> 00:25:30,000 Instead of reading out each answer, I’ll\n 281 00:25:30,000 --> 00:25:41,349 A, B, C, and D. Pause the video to think about\n 282 00:25:48,650 --> 00:25:56,830 The answer is B and C. B uses the ENCAPSULATION\n 283 00:25:56,829 --> 00:26:00,888 this is one option for configuring the native\nVLAN on a router. 284 00:26:00,888 --> 00:26:05,858 The other option is C, to simply configure\n 285 00:26:05,858 --> 00:26:08,368 rather than the subinterface. 286 00:26:08,368 --> 00:26:12,058 In that case, you do not need the ENCAPSULATION\nDOT1Q command. 287 00:26:12,058 --> 00:26:16,118 Okay, let’s go to question 2. 288 00:26:16,118 --> 00:26:24,128 You create an SVI for VLAN225 on SW1, assign\n 289 00:26:24,128 --> 00:26:27,168 but the interface remains down/down. 290 00:26:27,169 --> 00:26:36,210 Which TWO options might be causing this? (select\n 291 00:26:36,210 --> 00:26:43,220 B, you didn’t issue the SWITCHPORT MODE\n 292 00:26:43,220 --> 00:26:51,350 C, You didn’t issue the SWITCHPORT ACCESS\n 293 00:26:51,349 --> 00:26:56,498 Or D, No interfaces in VLAN225 are up/up. 294 00:26:56,500 --> 00:27:02,700 Pause the video to think about your answer. 295 00:27:02,700 --> 00:27:12,100 The answer is A and D. In order for an SVI to be up/up, the VLAN 296 00:27:12,108 --> 00:27:17,329 access interface in the VLAN that is up/up,\n 297 00:27:18,329 --> 00:27:24,079 You don’t need to issue the switchport mode\n 298 00:27:24,079 --> 00:27:28,829 Let’s go to question 3, which will be the\n 299 00:27:28,829 --> 00:27:34,240 a sample question from Boson ExSim for CCNA. 300 00:27:34,240 --> 00:27:38,608 Which command is used to configure a switch\n 301 00:27:41,089 --> 00:27:46,168 B, IP Address, followed by the IP address\nand Subnet mask. 302 00:27:52,538 --> 00:27:58,368 Pause the video to think about your answer. 303 00:27:58,368 --> 00:28:01,558 The answer is A, no switchport. 304 00:28:01,558 --> 00:28:06,059 This configures the interface as a routed\n 305 00:28:07,409 --> 00:28:13,929 C, ip routing, is used to enable IP routing\n 306 00:28:17,829 --> 00:28:21,658 Let's go on to today's Boson ExSim practice\nquestion. 307 00:28:21,659 --> 00:28:25,659 You issue the following commands on a Catalyst\n2950 switch. 308 00:28:30,288 --> 00:28:33,329 SWITCHPORT TRUNK ENCAPSULATION DOT1Q. 309 00:28:35,200 --> 00:28:38,288 SWITCHPORT TRUNK NATIVE VLAN 44. 310 00:28:38,288 --> 00:28:41,950 Which of the following statements is true\n 311 00:28:46,058 --> 00:28:48,019 Okay, let's check each option. 312 00:28:48,019 --> 00:28:51,058 A, VLAN 1 traffic will be untagged. 313 00:28:51,058 --> 00:28:55,388 B, VLAN 44 traffic will be untagged. 314 00:28:55,388 --> 00:28:58,558 C, all VLAN traffic will be tagged. 315 00:28:58,558 --> 00:29:02,710 Or D, all VLAN traffic will be untagged. 316 00:29:02,710 --> 00:29:09,539 Please pause the video to think about your\nanswer. 317 00:29:09,539 --> 00:29:15,638 Okay, so I think the correct answer is B,\n 318 00:29:18,058 --> 00:29:22,528 Traffic in the native VLAN will not be tagged\n 319 00:29:22,528 --> 00:29:27,700 So, I think VLAN 44 traffic will be untagged. 320 00:29:30,369 --> 00:29:34,928 And as you can see, B is in fact the correct\nanswer. 321 00:29:34,929 --> 00:29:38,538 Let's check out Boson's explanation a little\nbit. 322 00:29:38,538 --> 00:29:43,589 Traffic from VLAN 44 will be untagged when\n 323 00:29:43,589 --> 00:29:48,720 VLAN 44 traffic is untagged because it has\n 324 00:29:48,720 --> 00:29:52,360 SWITCHPORT TRUNK NATIVE VLAN 44 command. 325 00:29:52,359 --> 00:29:54,918 By default, the native VLAN is VLAN 1. 326 00:29:54,919 --> 00:30:01,288 So, by default A would be the correct answer,\n 327 00:30:01,288 --> 00:30:05,740 You can issue the SWITCHPORT TRUNK NATIVE\n 328 00:30:06,740 --> 00:30:12,409 Okay, here are explanations for why the incorrect\n 329 00:30:12,409 --> 00:30:16,440 It also says you can issue the SHOW INTERFACES\n 330 00:30:16,440 --> 00:30:21,298 that are configured for trunking, the native\n 331 00:30:21,298 --> 00:30:24,408 allowed VLANs for each trunk port. 332 00:30:24,409 --> 00:30:28,909 And here is an example, down here, after we\n 333 00:30:28,909 --> 00:30:33,720 Okay, there are also references here, to Cisco's\n 334 00:30:33,720 --> 00:30:40,519 This is volume 1, chapter 8, about Ethernet\nvirtual LANs, VLANs. 335 00:30:40,519 --> 00:30:42,429 And some Cisco documentation. 336 00:30:42,429 --> 00:30:47,038 I will leave links to these in the description\n 337 00:30:47,038 --> 00:30:53,058 reading about VLAN trunks, dot1q, please check\n 338 00:30:54,058 --> 00:30:58,138 Okay, so that's all for today's Boson ExSim\npractice question. 339 00:30:58,138 --> 00:31:02,118 If you want to get a copy of Boson ExSim,\n 340 00:31:02,118 --> 00:31:06,848 practice exams, please follow the link in\nthe video description. 341 00:31:06,848 --> 00:31:11,069 As usual, there will be supplementary materials\nfor this video. 342 00:31:11,069 --> 00:31:14,450 There will be a review flashcard deck to use\n 343 00:31:14,450 --> 00:31:18,528 Download the deck from the link in the description. 344 00:31:18,528 --> 00:31:22,798 There will also be a packet tracer practice\n 345 00:31:24,319 --> 00:31:28,168 That will be in a separate video. 346 00:31:28,169 --> 00:31:32,509 Before finishing this video, I want to give\n 347 00:31:33,999 --> 00:31:39,979 Thank you to C Mohd, Johan, And then I’m\n 348 00:31:41,409 --> 00:31:46,059 If this is you, please let me know and I will\n 349 00:31:46,058 --> 00:31:56,158 Okay, continuing on, thank you to Mark, Aleksa,\n 350 00:31:56,159 --> 00:32:03,940 Magrathea, Devin, Charlsetta, Lito, Yonatan,\n 351 00:32:03,940 --> 00:32:10,120 Sorry if I pronounced your name wrong, but\n 352 00:32:12,319 --> 00:32:16,230 Please subscribe to the channel, like the\n 353 00:32:16,230 --> 00:32:19,569 with anyone else studying for the CCNA. 354 00:32:19,569 --> 00:32:21,928 If you want to leave a tip, check the links\nin the description. 355 00:32:21,929 --> 00:32:28,889 I'm also a Brave verified publisher and accept\n 29106

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.