Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:04,160 --> 00:00:07,640
This is a free, complete course for the CCNA.
2
00:00:07,639 --> 00:00:11,638
If you like these videos, please subscribe\n
3
00:00:11,638 --> 00:00:16,399
Also, please like and leave a comment, and\n
4
00:00:20,660 --> 00:00:24,189
This video will once again cover the topic\nof VLANs..
5
00:00:24,189 --> 00:00:28,410
Although we’ve already covered the most\n
6
00:00:28,410 --> 00:00:32,469
a few more things you should know about VLANs\nfor your CCNA.
7
00:00:32,469 --> 00:00:37,228
This is going to be a long video again, so\n
8
00:00:37,228 --> 00:00:40,189
First off, here are the topics that will be\n
9
00:00:40,189 --> 00:00:45,369
First off, a little addition to the previous\n
10
00:00:45,369 --> 00:00:51,409
of a native VLAN on a router when using router\n
11
00:00:51,409 --> 00:00:56,628
Next up, we will look at a few wireshark captures\n
12
00:00:56,628 --> 00:01:00,929
Wireshark is a great tool for network engineers,\n
13
00:01:00,929 --> 00:01:04,299
series to help you understand these topics.
14
00:01:04,299 --> 00:01:09,450
After that we’ll look at the final method\n
15
00:01:09,450 --> 00:01:11,480
also known as multilayer switching.
16
00:01:11,480 --> 00:01:17,960
I’ve always told you that switches are Layer\n
17
00:01:17,959 --> 00:01:22,609
many modern switches are actually Layer 3\n
18
00:01:25,510 --> 00:01:30,170
Next up are two topics which have actually\n
19
00:01:30,170 --> 00:01:36,890
DTP, the dynamic trunking protocol, and VTP,\n
20
00:01:36,890 --> 00:01:41,200
I was planning to cover these in this video,\n
21
00:01:41,200 --> 00:01:43,609
reserve a separate video for them.
22
00:01:43,609 --> 00:01:47,728
Although these have both been removed from\n
23
00:01:47,728 --> 00:01:53,000
be important for you to understand these topics\n
24
00:01:53,000 --> 00:01:56,890
you may actually see some questions about\n
25
00:01:58,840 --> 00:02:04,060
However, I will give just a basic overview\n
26
00:02:04,060 --> 00:02:08,629
Before getting started, I want to say make\n
27
00:02:08,629 --> 00:02:14,280
quiz, from now on I’ll be featuring one\n
28
00:02:14,280 --> 00:02:16,729
set of practice exams for the CCNA.
29
00:02:18,479 --> 00:02:22,899
If you want to get a copy of Boson ExSim for\n
30
00:02:24,830 --> 00:02:29,870
No other practice exams help you get ready\n
31
00:02:29,870 --> 00:02:35,920
you can I highly recommend getting and using\n
32
00:02:35,919 --> 00:02:41,469
So let’s move on to the first point, using\n
33
00:02:41,469 --> 00:02:46,209
I said in the previous lecture video that\n
34
00:02:46,209 --> 00:02:51,009
an unused VLAN, as the native VLAN feature\n
35
00:02:51,009 --> 00:02:55,209
I will talk more about network security later\n
36
00:02:55,209 --> 00:03:01,239
However, if you want to use the native VLAN\n
37
00:03:01,239 --> 00:03:04,289
The native VLAN feature does have one benefit.
38
00:03:04,289 --> 00:03:08,469
Because frames in the native VLAN aren’t\n
39
00:03:08,469 --> 00:03:14,318
is smaller so it allows the device to send\n
40
00:03:14,318 --> 00:03:21,399
In the previous video, I set the native VLAN\n
41
00:03:24,009 --> 00:03:31,979
So, just for this demonstration let’s set\n
42
00:03:31,979 --> 00:03:35,989
There are 2 methods of configuring the native\n
43
00:03:38,139 --> 00:03:44,259
First up, you can use the command ENCAPSULATION\n
44
00:03:46,150 --> 00:03:50,530
This tells the router that this subinterface\n
45
00:03:50,530 --> 00:03:53,439
just like the native VLAN on a switch.
46
00:03:53,439 --> 00:03:58,199
It will assume untagged frame belong to the\n
47
00:04:00,689 --> 00:04:05,240
The second option is to not use a subinterface at all, but just
48
00:04:05,241 --> 00:04:09,610
for the native VLAN on the physical interface of the router.
49
00:04:09,610 --> 00:04:13,510
The ENCAPSULATION DOT1Q command is not necessary in this case.
50
00:04:13,509 --> 00:04:16,608
Okay, let’s look at each option.
51
00:04:16,608 --> 00:04:19,798
First, I will configure the first option.
52
00:04:20,988 --> 00:04:28,859
On the g0/0.10 interface, I configured ENCAPSULATION\n
53
00:04:28,860 --> 00:04:33,348
Note that this is the complete topology from\n
54
00:04:35,379 --> 00:04:40,990
The only change is that I added NATIVE to\n
55
00:04:40,990 --> 00:04:45,750
Let’s take this opportunity to look at a\n
56
00:04:47,449 --> 00:04:56,189
This PC in VLAN20 has an IP address of 192.168.1.65,\n
57
00:04:59,379 --> 00:05:05,030
I will use wireshark to monitor this connection\n
58
00:05:05,029 --> 00:05:09,188
Wireshark will capture all frames on this\n
59
00:05:09,189 --> 00:05:11,639
take a look at what traffic is passing through.
60
00:05:11,639 --> 00:05:17,619
Let’s send that ping. We will first look\n
61
00:05:20,819 --> 00:05:25,960
It will be in VLAN20, and it’s being sent\n
62
00:05:25,959 --> 00:05:32,689
Here’s the wireshark capture for the ICMP\n
63
00:05:32,689 --> 00:05:36,930
First off, you can see the source and destination\n
64
00:05:36,930 --> 00:05:41,119
Now let’s look at the Ethernet header encapsulating\n
65
00:05:43,559 --> 00:05:51,520
Type: 802.1Q virtual LAN, and notice the hexadecimal\n
66
00:05:51,519 --> 00:05:57,029
I said in the previous video that dot1q is\n
67
00:05:57,029 --> 00:06:00,119
and that is where the TYPE field usually goes.
68
00:06:00,120 --> 00:06:04,728
This here is the ‘TPID’ field of the dot1q\ntag.
69
00:06:04,728 --> 00:06:09,618
Under it, these are the rest of the fields\nof the 802.1Q tag.
70
00:06:09,619 --> 00:06:13,120
First is the PCP, priority code point.
71
00:06:13,120 --> 00:06:18,340
It has a value of 0, so no special priority\n
72
00:06:18,339 --> 00:06:22,168
Under it is the DEI, drop eligible indicator.
73
00:06:22,168 --> 00:06:28,258
Again, a value of 0, so it won’t be dropped\n
74
00:06:28,259 --> 00:06:34,059
Next is the most important field, the VLAN\n
75
00:06:34,059 --> 00:06:38,990
The PC that sent the ping is in VLAN 20, and\n
76
00:06:40,990 --> 00:06:45,990
Finally, under that is the normal TYPE field\n
77
00:06:49,079 --> 00:06:56,538
It normally comes after the SOURCE MAC ADDRESS\n
78
00:06:56,538 --> 00:07:01,928
Next let’s look at the ICMP echo request\n
79
00:07:01,928 --> 00:07:06,688
It will now be in VLAN10, because the destination\nis in VLAN10.
80
00:07:06,689 --> 00:07:14,479
VLAN10 is configured as the native VLAN on\n
81
00:07:14,478 --> 00:07:20,848
Here’s the exact same ICMP echo request,\n
82
00:07:24,749 --> 00:07:29,129
It has been encapsulated with a new Ethernet\n
83
00:07:31,059 --> 00:07:33,729
This is the native VLAN function at work.
84
00:07:33,728 --> 00:07:39,800
Both R1 and SW2 understand that untagged frames\n
85
00:07:43,379 --> 00:07:47,889
That ICMP echo request will continue to the\n
86
00:07:47,889 --> 00:07:52,800
VLAN10 is configured as the native VLAN on\nall devices.
87
00:07:52,800 --> 00:07:58,309
When this PC in VLAN10 sends the ICMP echo\n
88
00:07:58,309 --> 00:08:05,490
R1, which will then tag it in VLAN20, and\n
89
00:08:05,490 --> 00:08:08,769
Now let’s take a quick look at the second\n
90
00:08:08,769 --> 00:08:14,269
router, which is simply configuring the IP\n
91
00:08:14,269 --> 00:08:19,279
no need for a subinterface or the encapsulation\ndot1q command.
92
00:08:20,740 --> 00:08:25,418
First, I used ‘NO INTERFACE G0/0.10’.
93
00:08:27,418 --> 00:08:33,728
Then, I entered interface configuration mode\n
94
00:08:37,399 --> 00:08:45,169
To help you visualize it, here is the output\n
95
00:08:45,169 --> 00:08:49,829
First off, these commands here on the physical\n
96
00:08:51,350 --> 00:08:55,470
The physical interface is configured normally\n
97
00:08:55,470 --> 00:08:59,350
This will be used for the native VLAN, VLAN10.
98
00:08:59,350 --> 00:09:04,680
The other subinterfaces are just like we configured\n
99
00:09:04,679 --> 00:09:08,409
dot1q command and their own IP address.
100
00:09:08,409 --> 00:09:11,309
This will function just like the first option\nwe saw.
101
00:09:11,309 --> 00:09:18,019
SW2 will send VLAN10 packets in untagged frames\n
102
00:09:20,740 --> 00:09:25,360
As I said before, it is recommended that you\n
103
00:09:25,360 --> 00:09:30,090
for security purposes, but if you want to\n
104
00:09:30,090 --> 00:09:34,240
how to do it on a router, so these are two methods you can use.
105
00:09:34,240 --> 00:09:37,299
You might also need to know this for your\nexam, by the way.
106
00:09:37,299 --> 00:09:40,679
Here’s the network diagram once again.
107
00:09:40,679 --> 00:09:43,679
We have one router, and two switches.
108
00:09:43,679 --> 00:09:47,699
Or I should say, two Layer 2 switches.
109
00:09:47,700 --> 00:09:51,640
This is the icon we’ve been using for regular\nLayer 2 switches.
110
00:09:51,639 --> 00:09:55,129
But let me introduce you to another type of\nswitch.
111
00:09:55,129 --> 00:10:00,210
This is the icon I will use for what is called\n
112
00:10:02,039 --> 00:10:06,629
From now on I will use either term, Layer\n
113
00:10:08,870 --> 00:10:14,360
By the way, these are the official Cisco icons\n
114
00:10:14,360 --> 00:10:20,029
but I think the ones I use in my videos look\n
115
00:10:20,029 --> 00:10:24,199
First let’s review exactly what a multilayer\nswitch does.
116
00:10:24,200 --> 00:10:28,830
A multilayer switch is capable of both switching\nAND routing.
117
00:10:31,129 --> 00:10:36,590
A regular layer 2 switch is NOT layer 3 aware,\n
118
00:10:39,120 --> 00:10:43,649
It only cares about Layer 2 information like\nMAC addresses.
119
00:10:43,649 --> 00:10:47,759
You can assign IP addresses to its interfaces\nlike a router.
120
00:10:47,759 --> 00:10:52,480
Previously we haven’t assigned any IP addresses\n
121
00:10:52,480 --> 00:10:57,450
With a Layer 3 switch, you can configure ‘routed\n
122
00:10:59,429 --> 00:11:05,299
Not just physical interfaces, but you can\n
123
00:11:05,299 --> 00:11:07,879
and assign IP addresses to those interfaces.
124
00:11:07,879 --> 00:11:12,899
These are not separate physical\n
125
00:11:12,899 --> 00:11:18,449
software of the switch that can be used to\n
126
00:11:18,450 --> 00:11:23,550
You can configure routes, like static routes,\n
127
00:11:23,549 --> 00:11:28,339
Finally, it can be used for inter-VLAN routing.
128
00:11:28,340 --> 00:11:31,850
So far, we have looked at two methods of inter-VLAN\nrouting.
129
00:11:31,850 --> 00:11:37,090
The first one, in day 16’s video, was using\n
130
00:11:38,870 --> 00:11:43,179
This works, but if you have many VLANs you\n
131
00:11:45,299 --> 00:11:50,419
The second method was router on a stick, which\n
132
00:11:50,419 --> 00:11:55,629
traffic from all VLANs between the switch\n
133
00:11:55,629 --> 00:12:00,909
This is efficient in terms of the number of\n
134
00:12:00,909 --> 00:12:05,589
all of the traffic going to the router and\n
135
00:12:05,590 --> 00:12:10,970
So, in large networks, a multilayer switch\n
136
00:12:13,529 --> 00:12:20,110
Here is the topology again, now let’s\n
137
00:12:22,210 --> 00:12:24,300
And now let’s make one more change.
138
00:12:24,299 --> 00:12:30,949
I’ve replaced the trunk link between SW2\n
139
00:12:30,950 --> 00:12:34,379
we will no longer run VLANs across this.
140
00:12:34,379 --> 00:12:40,570
I’ll talk about this link later and assign\n
141
00:12:40,570 --> 00:12:45,450
SW2’s G0/1 interface. But for now\n
142
00:12:48,000 --> 00:12:52,659
For review, when we used router on a stick\n
143
00:12:52,659 --> 00:12:58,429
between VLANs was sent to R1 first, and then\n
144
00:13:00,360 --> 00:13:06,090
For example, if this PC in VLAN20 wants to\n
145
00:13:08,460 --> 00:13:17,470
From the PC to SW2, from SW2 to R1, tagged\n
146
00:13:17,470 --> 00:13:22,110
from SW2 to SW1, tagged in VLAN10, and finally\n
147
00:13:22,110 --> 00:13:25,980
However, SW2 is a multilayer switch.
148
00:13:25,980 --> 00:13:29,930
It doesn’t have to send the traffic to R1\n
149
00:13:29,929 --> 00:13:34,029
It can do that with something called ‘Switch\n
150
00:13:34,029 --> 00:13:41,500
SVIs (or Switch Virtual Interfaces) are the virtual\n
151
00:13:44,528 --> 00:13:50,278
Configure each PC to use the SVI (NOT the\n
152
00:13:50,278 --> 00:13:54,889
When using router on a stick, the router was\n
153
00:13:54,889 --> 00:13:58,360
This time, we will use the switch’s SVIs\ninstead.
154
00:13:58,360 --> 00:14:03,580
To send traffic to different subnets/VLANs,\n
155
00:14:03,580 --> 00:14:07,870
the switch will route the traffic.
156
00:14:07,870 --> 00:14:11,490
These are the SVIs I configured on SW2.
157
00:14:11,490 --> 00:14:16,440
These are the same IP addresses I configured\n
158
00:14:16,440 --> 00:14:18,800
usable IP address in each subnet.
159
00:14:18,799 --> 00:14:23,290
So, these are already configured on each PC\n
160
00:14:23,291 --> 00:14:27,220
need to change the PC configurations.
161
00:14:27,220 --> 00:14:31,940
Now let’s take a look at the path the traffic\n
162
00:14:34,230 --> 00:14:38,779
The destination is in the 192.168.1.0/26 subnet.
163
00:14:38,779 --> 00:14:45,529
SW2 now has its own routing table, so it looks\n
164
00:14:45,529 --> 00:14:49,139
sees that the destination is connected to\nits VLAN10 SVI.
165
00:14:49,139 --> 00:14:52,279
So, the traffic is now routed to VLAN10.
166
00:14:52,279 --> 00:14:57,620
If SW2 doesn’t have the destination MAC\n
167
00:14:57,620 --> 00:15:00,500
flood the frame to all VLAN10 interfaces.
168
00:15:00,500 --> 00:15:06,190
But, let’s assume it has already learned\n
169
00:15:06,190 --> 00:15:09,070
over its trunk interface, tagged as VLAN10.
170
00:15:09,070 --> 00:15:12,629
SW1 then forwards it to the destination.
171
00:15:12,629 --> 00:15:18,350
Now, what if the hosts want to reach destinations\n
172
00:15:18,350 --> 00:15:23,759
For example, I’ve added a cloud connected\n
173
00:15:23,759 --> 00:15:28,799
Because SW2 is their default gateway, any\n
174
00:15:31,320 --> 00:15:35,860
But our previous router on a stick configurations\n
175
00:15:38,029 --> 00:15:43,709
In addition to configuring virtual interfaces,\n
176
00:15:43,710 --> 00:15:48,560
configure their physical interfaces to operate\n
177
00:15:49,590 --> 00:15:57,269
So, we can assign the subnet 192.168.1.192/30\n
178
00:15:57,269 --> 00:16:07,230
R1, with SW2’s G0/1 interface having an\n
179
00:16:07,230 --> 00:16:12,500
interface having an IP address of 192.168.1.194.
180
00:16:12,500 --> 00:16:18,720
Then, we configure a default route on SW2\n
181
00:16:18,720 --> 00:16:21,720
outside of the LAN will be sent to R1.
182
00:16:21,720 --> 00:16:27,670
I already covered static routes, including\n
183
00:16:27,669 --> 00:16:32,159
explain the concept in depth again, but I\n
184
00:16:32,159 --> 00:16:37,559
So, let’s do that, let’s get into the\n
185
00:16:37,559 --> 00:16:44,750
link between SW2 and R1, and then the SVIs\non SW2.
186
00:16:44,750 --> 00:16:50,149
First off, remove R1’s router on a stick\n
187
00:16:52,940 --> 00:17:01,290
First off, I delete each subinterface with\n
188
00:17:01,289 --> 00:17:10,109
Then, I use the command DEFAULT INTERFACE\n
189
00:17:10,109 --> 00:17:15,328
After that, I used SHOW IP INTERFACE BRIEF\n
190
00:17:15,328 --> 00:17:19,629
Notice the status of the subinterfaces, it\nsays DELETED.
191
00:17:19,630 --> 00:17:23,769
Although we have successfully deleted the\n
192
00:17:23,769 --> 00:17:26,868
a ‘deleted’ status unless we reload the\nrouter.
193
00:17:26,868 --> 00:17:31,119
That’s no problem though, so I’ll just\nleave them.
194
00:17:31,119 --> 00:17:36,599
Then I simply enter interface configuration\n
195
00:17:39,169 --> 00:17:45,220
I use SHOW IP INTERFACE BRIEF again, and you\n
196
00:17:47,880 --> 00:17:51,240
Now let’s look at the switch’s side of\n
197
00:17:51,240 --> 00:17:58,160
First, I reset the G0/1 interface to its default\n
198
00:17:58,160 --> 00:18:03,730
because it was configured as a trunk for router\n
199
00:18:03,730 --> 00:18:07,308
Next up is a very important command, one you\nmust not forget.
200
00:18:09,450 --> 00:18:14,119
This command enables Layer 3 routing on the\n
201
00:18:15,919 --> 00:18:20,799
If you forget this command, your inter-VLAN\n
202
00:18:20,798 --> 00:18:26,118
Next up is another important command, NO SWITCHPORT on the
203
00:18:26,118 --> 00:18:31,279
This is the command that changes the interface\n
204
00:18:32,788 --> 00:18:35,929
Now you will be able to assign an IP address\nto it.
205
00:18:35,929 --> 00:18:45,548
So, I assigned 192.168.1.193/30, and used\n
206
00:18:45,548 --> 00:18:49,538
the IP address is assigned to it just like\na router interface.
207
00:18:49,538 --> 00:18:54,129
Last up is the default route pointing to R1.
208
00:18:54,130 --> 00:19:02,830
As I’ve already shown you in a previous\n
209
00:19:02,829 --> 00:19:10,168
followed by the next hop, in this case 192.168.1.194,\n
210
00:19:10,169 --> 00:19:16,070
I then used SHOW IP ROUTE to confirm, and\n
211
00:19:16,069 --> 00:19:21,048
with a default route pointing to R1, and connected\n
212
00:19:22,499 --> 00:19:24,889
And one additional command you can use to
213
00:19:24,888 --> 00:19:31,798
confirm is SHOW INTERFACES STATUS, which I\n
214
00:19:31,798 --> 00:19:37,589
Notice that, in the VLAN column, instead of\n
215
00:19:37,589 --> 00:19:43,240
Okay, now let’s move on to configure those\nSVIs on SW2.
216
00:19:43,240 --> 00:19:46,788
SVI configuration is very simple.
217
00:19:46,788 --> 00:19:49,970
Here are the configurations for SW2.
218
00:19:49,970 --> 00:19:56,110
Use the command INTERFACE VLAN10, for example,\n
219
00:19:57,650 --> 00:20:01,809
Then assign an IP address, and use NO SHUTDOWN\nto enable it.
220
00:20:01,808 --> 00:20:08,118
SVIs are shutdown but default, so remember\n
221
00:20:08,118 --> 00:20:14,808
I repeated the process for VLAN20 and VLAN30,\n
222
00:20:16,880 --> 00:20:23,190
Now, just to demonstrate one problem you might\n
223
00:20:23,190 --> 00:20:31,308
that doesn’t exist on the switch, VLAN40,\n
224
00:20:31,308 --> 00:20:35,210
I also made sure to enable it with NO SHUTDOWN.
225
00:20:35,210 --> 00:20:38,690
However, look at the SVI itself.
226
00:20:41,869 --> 00:20:45,808
Well, it's because the VLAN doesn’t exist\non the switch.
227
00:20:45,808 --> 00:20:50,658
Let’s take a look at the conditions required\n
228
00:20:50,659 --> 00:20:54,360
First, the VLAN must exist on the switch.
229
00:20:54,359 --> 00:21:01,209
In this case, we haven’t created VLAN40\n
230
00:21:01,210 --> 00:21:07,590
When you assign an access port to a VLAN,\n
231
00:21:07,589 --> 00:21:09,668
will automatically create the VLAN.
232
00:21:09,669 --> 00:21:15,809
However, if you create an SVI for a VLAN that\n
233
00:21:17,929 --> 00:21:24,200
Second, the switch must have at least one\n
234
00:21:24,200 --> 00:21:30,600
and/or one trunk port that allows the VLAN\n
235
00:21:30,609 --> 00:21:36,219
For example, in the topology we’re using\n
236
00:21:36,220 --> 00:21:40,470
VLAN20, so their SVIs can go up.
237
00:21:40,470 --> 00:21:47,298
There are no connected hosts in VLAN30, however\n
238
00:21:47,298 --> 00:21:51,579
over it, so VLAN30’s SVI is up as well.
239
00:21:53,548 --> 00:21:56,589
The VLAN must not be shutdown.
240
00:21:56,589 --> 00:22:01,308
Note that this is NOT the SVI, but the VLAN\nitself.
241
00:22:01,308 --> 00:22:07,379
You can enter VLAN configuration mode, and\n
242
00:22:07,380 --> 00:22:12,549
If you do this, the SVI for that VLAN can’t\nbecome UP/UP.
243
00:22:12,548 --> 00:22:16,749
Note that, I think you can’t do this command\n
244
00:22:16,749 --> 00:22:19,868
Cisco switch if you want to try this one out.
245
00:22:19,868 --> 00:22:25,778
Finally, if the SVI itself is shutdown, it\n
246
00:22:25,778 --> 00:22:33,009
use the NO SHUTDOWN command after you create\n
247
00:22:33,009 --> 00:22:37,558
I used the SHOW IP ROUTE command again, and\n
248
00:22:37,558 --> 00:22:43,288
been added to the route table for the SVIs\n
249
00:22:46,169 --> 00:22:50,419
Okay, so our configurations are all done.
250
00:22:50,419 --> 00:22:54,679
The next video will be a practice lab, so\n
251
00:22:55,849 --> 00:23:00,619
If you have trouble remembering the commands,\n
252
00:23:00,619 --> 00:23:04,388
doing them multiple times, until you feel\nconfident.
253
00:23:04,388 --> 00:23:12,508
So, if one of our PCs wants to reach a destination\n
254
00:23:12,509 --> 00:23:16,870
which will send it to R1, which will take\ncare of it from there.
255
00:23:16,869 --> 00:23:21,319
Note that we didn’t actually configure any\n
256
00:23:21,319 --> 00:23:24,970
on inter-VLAN routing at this point.
257
00:23:24,970 --> 00:23:29,490
If one of our PCs wants to reach a destination\n
258
00:23:29,490 --> 00:23:36,298
VLAN, SW2 will do the inter-VLAN routing without\n
259
00:23:36,298 --> 00:23:42,859
Okay, before moving on to the quiz let’s\n
260
00:23:42,859 --> 00:23:45,990
I showed you two ways of configuring the native\n
261
00:23:45,990 --> 00:23:50,960
Usually, it’s best to just set the native\n
262
00:23:50,960 --> 00:23:55,739
use the native VLAN feature, you should know\n
263
00:23:55,739 --> 00:24:01,159
We looked at some wireshark captures, both\n
264
00:24:01,159 --> 00:24:03,369
because it was in the native VLAN.
265
00:24:03,368 --> 00:24:08,480
Finally, I showed you the final method of\n
266
00:24:08,480 --> 00:24:14,940
I hadn’t talked about before, a Layer 3\n
267
00:24:14,940 --> 00:24:21,350
By configuring SVIs, switch virtual interfaces,\n
268
00:24:21,349 --> 00:24:25,298
subnets and VLANs without having to send the traffic\n
269
00:24:25,298 --> 00:24:29,408
It’s like having a mini router within the\nswitch.
270
00:24:29,409 --> 00:24:35,500
These last two topics, DTP and VTP, will be\n
271
00:24:38,960 --> 00:24:43,410
As I mentioned at the beginning of the video,\n
272
00:24:43,410 --> 00:24:48,269
quiz, a few simple questions to help you review\n
273
00:24:48,269 --> 00:24:53,420
one question from Boson’s ExSim, which is\n
274
00:24:55,278 --> 00:25:00,919
I used Boson ExSim for my CCNA and CCNP, and\n
275
00:25:00,919 --> 00:25:03,840
pass all of my exams on the first try.
276
00:25:03,839 --> 00:25:07,359
If you want to pick up a copy of ExSim, check\n
277
00:25:07,359 --> 00:25:12,928
Let’s go on to question 1 of today’s quiz.
278
00:25:12,929 --> 00:25:19,730
Which TWO answers are valid options to configure\n
279
00:25:19,730 --> 00:25:24,450
(select two, each answer is a complete solution).
280
00:25:24,450 --> 00:25:30,000
Instead of reading out each answer, I’ll\n
281
00:25:30,000 --> 00:25:41,349
A, B, C, and D. Pause the video to think about\n
282
00:25:48,650 --> 00:25:56,830
The answer is B and C. B uses the ENCAPSULATION\n
283
00:25:56,829 --> 00:26:00,888
this is one option for configuring the native\nVLAN on a router.
284
00:26:00,888 --> 00:26:05,858
The other option is C, to simply configure\n
285
00:26:05,858 --> 00:26:08,368
rather than the subinterface.
286
00:26:08,368 --> 00:26:12,058
In that case, you do not need the ENCAPSULATION\nDOT1Q command.
287
00:26:12,058 --> 00:26:16,118
Okay, let’s go to question 2.
288
00:26:16,118 --> 00:26:24,128
You create an SVI for VLAN225 on SW1, assign\n
289
00:26:24,128 --> 00:26:27,168
but the interface remains down/down.
290
00:26:27,169 --> 00:26:36,210
Which TWO options might be causing this? (select\n
291
00:26:36,210 --> 00:26:43,220
B, you didn’t issue the SWITCHPORT MODE\n
292
00:26:43,220 --> 00:26:51,350
C, You didn’t issue the SWITCHPORT ACCESS\n
293
00:26:51,349 --> 00:26:56,498
Or D, No interfaces in VLAN225 are up/up.
294
00:26:56,500 --> 00:27:02,700
Pause the video to think about your answer.
295
00:27:02,700 --> 00:27:12,100
The answer is A and D. In order for an SVI to be up/up, the VLAN
296
00:27:12,108 --> 00:27:17,329
access interface in the VLAN that is up/up,\n
297
00:27:18,329 --> 00:27:24,079
You don’t need to issue the switchport mode\n
298
00:27:24,079 --> 00:27:28,829
Let’s go to question 3, which will be the\n
299
00:27:28,829 --> 00:27:34,240
a sample question from Boson ExSim for CCNA.
300
00:27:34,240 --> 00:27:38,608
Which command is used to configure a switch\n
301
00:27:41,089 --> 00:27:46,168
B, IP Address, followed by the IP address\nand Subnet mask.
302
00:27:52,538 --> 00:27:58,368
Pause the video to think about your answer.
303
00:27:58,368 --> 00:28:01,558
The answer is A, no switchport.
304
00:28:01,558 --> 00:28:06,059
This configures the interface as a routed\n
305
00:28:07,409 --> 00:28:13,929
C, ip routing, is used to enable IP routing\n
306
00:28:17,829 --> 00:28:21,658
Let's go on to today's Boson ExSim practice\nquestion.
307
00:28:21,659 --> 00:28:25,659
You issue the following commands on a Catalyst\n2950 switch.
308
00:28:30,288 --> 00:28:33,329
SWITCHPORT TRUNK ENCAPSULATION DOT1Q.
309
00:28:35,200 --> 00:28:38,288
SWITCHPORT TRUNK NATIVE VLAN 44.
310
00:28:38,288 --> 00:28:41,950
Which of the following statements is true\n
311
00:28:46,058 --> 00:28:48,019
Okay, let's check each option.
312
00:28:48,019 --> 00:28:51,058
A, VLAN 1 traffic will be untagged.
313
00:28:51,058 --> 00:28:55,388
B, VLAN 44 traffic will be untagged.
314
00:28:55,388 --> 00:28:58,558
C, all VLAN traffic will be tagged.
315
00:28:58,558 --> 00:29:02,710
Or D, all VLAN traffic will be untagged.
316
00:29:02,710 --> 00:29:09,539
Please pause the video to think about your\nanswer.
317
00:29:09,539 --> 00:29:15,638
Okay, so I think the correct answer is B,\n
318
00:29:18,058 --> 00:29:22,528
Traffic in the native VLAN will not be tagged\n
319
00:29:22,528 --> 00:29:27,700
So, I think VLAN 44 traffic will be untagged.
320
00:29:30,369 --> 00:29:34,928
And as you can see, B is in fact the correct\nanswer.
321
00:29:34,929 --> 00:29:38,538
Let's check out Boson's explanation a little\nbit.
322
00:29:38,538 --> 00:29:43,589
Traffic from VLAN 44 will be untagged when\n
323
00:29:43,589 --> 00:29:48,720
VLAN 44 traffic is untagged because it has\n
324
00:29:48,720 --> 00:29:52,360
SWITCHPORT TRUNK NATIVE VLAN 44 command.
325
00:29:52,359 --> 00:29:54,918
By default, the native VLAN is VLAN 1.
326
00:29:54,919 --> 00:30:01,288
So, by default A would be the correct answer,\n
327
00:30:01,288 --> 00:30:05,740
You can issue the SWITCHPORT TRUNK NATIVE\n
328
00:30:06,740 --> 00:30:12,409
Okay, here are explanations for why the incorrect\n
329
00:30:12,409 --> 00:30:16,440
It also says you can issue the SHOW INTERFACES\n
330
00:30:16,440 --> 00:30:21,298
that are configured for trunking, the native\n
331
00:30:21,298 --> 00:30:24,408
allowed VLANs for each trunk port.
332
00:30:24,409 --> 00:30:28,909
And here is an example, down here, after we\n
333
00:30:28,909 --> 00:30:33,720
Okay, there are also references here, to Cisco's\n
334
00:30:33,720 --> 00:30:40,519
This is volume 1, chapter 8, about Ethernet\nvirtual LANs, VLANs.
335
00:30:40,519 --> 00:30:42,429
And some Cisco documentation.
336
00:30:42,429 --> 00:30:47,038
I will leave links to these in the description\n
337
00:30:47,038 --> 00:30:53,058
reading about VLAN trunks, dot1q, please check\n
338
00:30:54,058 --> 00:30:58,138
Okay, so that's all for today's Boson ExSim\npractice question.
339
00:30:58,138 --> 00:31:02,118
If you want to get a copy of Boson ExSim,\n
340
00:31:02,118 --> 00:31:06,848
practice exams, please follow the link in\nthe video description.
341
00:31:06,848 --> 00:31:11,069
As usual, there will be supplementary materials\nfor this video.
342
00:31:11,069 --> 00:31:14,450
There will be a review flashcard deck to use\n
343
00:31:14,450 --> 00:31:18,528
Download the deck from the link in the description.
344
00:31:18,528 --> 00:31:22,798
There will also be a packet tracer practice\n
345
00:31:24,319 --> 00:31:28,168
That will be in a separate video.
346
00:31:28,169 --> 00:31:32,509
Before finishing this video, I want to give\n
347
00:31:33,999 --> 00:31:39,979
Thank you to C Mohd, Johan, And then I’m\n
348
00:31:41,409 --> 00:31:46,059
If this is you, please let me know and I will\n
349
00:31:46,058 --> 00:31:56,158
Okay, continuing on, thank you to Mark, Aleksa,\n
350
00:31:56,159 --> 00:32:03,940
Magrathea, Devin, Charlsetta, Lito, Yonatan,\n
351
00:32:03,940 --> 00:32:10,120
Sorry if I pronounced your name wrong, but\n
352
00:32:12,319 --> 00:32:16,230
Please subscribe to the channel, like the\n
353
00:32:16,230 --> 00:32:19,569
with anyone else studying for the CCNA.
354
00:32:19,569 --> 00:32:21,928
If you want to leave a tip, check the links\nin the description.
355
00:32:21,929 --> 00:32:28,889
I'm also a Brave verified publisher and accept\n
29106
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.