Simplified Networking
  • Home
  • Technology VoD!
    • Cisco >
      • Route & Switch / Enterprise Infrastructure
  • Technology Breakdowns!
    • Route&Switch/Ent. Infra. >
      • L2 Technologies
      • L3 Technologies
      • VPN Technologies
      • Services >
        • IOS - Dynamic NAT
        • HSRP - IPv4 Setup
        • HSRP - Priority and Preemption
    • Service Provider >
      • IGPs (Interior Gateway Protocols)
      • First Hop Redundancy >
        • HSRP (Hot Standby Router Protocol) >
          • HSRP - IOS/IOS XE Setup
          • HSRP - IOS XR Setup
      • BGP (Border Gateway Protocol)
      • Inter AS Multicast (MSDP)
      • Intra-AS MPLS
      • Inter-AS MPLS
    • Security >
      • IOS Firewall
      • ASA Firewall
      • FirePOWER Threat Defense >
        • FTD - FTD NGFW Device Setup and FMC Integration
      • VPNs >
        • PKI
        • Site to Site VPNs
        • Remote Access VPNs >
          • IOS Remote Access
          • ASA Remote Access
    • Data Center >
      • Nexus 9000v >
        • Nexus 9000v - Enabling Features
        • Nexus 9000v - VLANs and Trunks
        • Nexus 9000v - LACP Port Channels
        • Nexus 9000v - vPC (Virtual Port Channel)
        • Nexus 9000v - OSPFv2
        • Nexus 9000v - VXLAN - Ingress Replication Flood and Learn
        • Nexus 9000v - IP Multicast
        • Nexus 9000v - VxLAN - Multicast Flood and Learn
        • Nexus 9000v - VxLAN - BGP EVPN with Multicast
        • Nexus 9000v - VxLAN - BGP EVPN w/Ingress Replication
        • Nexus 9000v - VxLAN - Inter-VxLAN Routing with BGP EVPN
        • Nexus 9000v - VXLAN - External Routing
      • Nexus 7000v
    • Palo Alto

VTP

Picture
VTP or VLAN Trunking Protocol allows for a switch that needs to propagate VLANs to other switches. SW3 and SW4 are going to be VTP servers and SW will be configured as a VTP client, which won't be allowed to do any editing of VLANs.

SW3(config)#vtp domain TEST
Changing VTP domain name from NULL to TEST
SW3(config)#
*Sep 13 05:25:42.128: %SW_VLAN-6-VTP_DOMAIN_NAME_CHG: VTP domain name changed to TEST.

SW4(config)#vtp domain TEST
Domain name already set to TEST.

SW(config)#vtp mode client

The reason why SW4 through an error is because SW3 had already defined the VTP domain and SW4 learned it.

SW#show vtp status
VTP Version capable             : 1 to 3
VTP version running             : 1
VTP Domain Name                 : TEST
VTP Pruning Mode                : Disabled
VTP Traps Generation            : Disabled
Device ID                       : 5000.0005.0000
Configuration last modified by 0.0.0.0 at 9-13-19 04:53:28

Feature VLAN:
--------------
VTP Operating Mode                : Client
Maximum VLANs supported locally   : 1005
Number of existing VLANs          : 13
Configuration Revision            : 1
MD5 digest                        : 0xA9 0x18 0x13 0x3F 0x4E 0x44 0xAE 0x03
                                    0x2B 0xED 0xB4 0x1C 0xC6 0x53 0xA9 0xF7

We see that SW has learned several VLANs but the number seems a bit low. 

SW#show vlan brief

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Gi0/2, Gi0/3, Gi1/0, Gi1/1
                                                Gi1/2, Gi1/3
31   VLAN0031                         active
32   VLAN0032                         active
36   VLAN0036                         active
39   VLAN0039                         active
313  VLAN0313                         active
314  VLAN0314                         active
322  VLAN0322                         active
323  VLAN0323                         active

We see that only the VLANs from SW3 are showing up. We need to configure SW3 or SW4 with the VLANs that SW4 had previously created.

SW4#show vlan brief

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Gi2/3
31   VLAN0031                         active
32   VLAN0032                         active
36   VLAN0036                         active
39   VLAN0039                         active
313  VLAN0313                         active
314  VLAN0314                         active
322  VLAN0322                         active
323  VLAN0323                         active

You'll notice that all the ports are missing. We have an orphaned port situation, the ports were placed into the VLANs in the VLANs lab but were deleted when SW3 propagated it's VLAN database.

SW3(config)#vlan 41,42,46,49,413,414,422,423

SW4#show vlan brief

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Gi2/3
31   VLAN0031                         active
32   VLAN0032                         active
36   VLAN0036                         active
39   VLAN0039                         active
41   VLAN0041                         active    Gi0/3
42   VLAN0042                         active    Gi0/2
46   VLAN0046                         active    Gi0/1
49   VLAN0049                         active    Gi0/0
313  VLAN0313                         active
314  VLAN0314                         active
322  VLAN0322                         active
323  VLAN0323                         active
413  VLAN0413                         active    Gi1/1
414  VLAN0414                         active    Gi1/0
422  VLAN0422                         active    Gi1/3
423  VLAN0423                         active    Gi1/2

SW#show vtp status
VTP Version capable             : 1 to 3
VTP version running             : 1
VTP Domain Name                 : TEST
VTP Pruning Mode                : Disabled
VTP Traps Generation            : Disabled
Device ID                       : 5000.0005.0000
Configuration last modified by 0.0.0.0 at 9-13-19 05:32:03

Feature VLAN:
--------------
VTP Operating Mode                : Client
Maximum VLANs supported locally   : 1005
Number of existing VLANs          : 21
Configuration Revision            : 2
MD5 digest                        : 0x40 0xC7 0xDD 0x7C 0x55 0x40 0xD0 0xA9
                                    0xD6 0xE6 0x19 0x44 0x34 0xF9 0xB0 0x7C

SW#show vlan brief

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Gi0/2, Gi0/3, Gi1/0, Gi1/1
                                                Gi1/2, Gi1/3
31   VLAN0031                         active
32   VLAN0032                         active
36   VLAN0036                         active
39   VLAN0039                         active
41   VLAN0041                         active
42   VLAN0042                         active
46   VLAN0046                         active
49   VLAN0049                         active
313  VLAN0313                         active
314  VLAN0314                         active
322  VLAN0322                         active
323  VLAN0323                         active
413  VLAN0413                         active
414  VLAN0414                         active
422  VLAN0422                         active
423  VLAN0423                         active

Now that all the VLANs have been delivered via VTP. This is the outcome we were looking for. 
Powered by Create your own unique website with customizable templates.
  • Home
  • Technology VoD!
    • Cisco >
      • Route & Switch / Enterprise Infrastructure
  • Technology Breakdowns!
    • Route&Switch/Ent. Infra. >
      • L2 Technologies
      • L3 Technologies
      • VPN Technologies
      • Services >
        • IOS - Dynamic NAT
        • HSRP - IPv4 Setup
        • HSRP - Priority and Preemption
    • Service Provider >
      • IGPs (Interior Gateway Protocols)
      • First Hop Redundancy >
        • HSRP (Hot Standby Router Protocol) >
          • HSRP - IOS/IOS XE Setup
          • HSRP - IOS XR Setup
      • BGP (Border Gateway Protocol)
      • Inter AS Multicast (MSDP)
      • Intra-AS MPLS
      • Inter-AS MPLS
    • Security >
      • IOS Firewall
      • ASA Firewall
      • FirePOWER Threat Defense >
        • FTD - FTD NGFW Device Setup and FMC Integration
      • VPNs >
        • PKI
        • Site to Site VPNs
        • Remote Access VPNs >
          • IOS Remote Access
          • ASA Remote Access
    • Data Center >
      • Nexus 9000v >
        • Nexus 9000v - Enabling Features
        • Nexus 9000v - VLANs and Trunks
        • Nexus 9000v - LACP Port Channels
        • Nexus 9000v - vPC (Virtual Port Channel)
        • Nexus 9000v - OSPFv2
        • Nexus 9000v - VXLAN - Ingress Replication Flood and Learn
        • Nexus 9000v - IP Multicast
        • Nexus 9000v - VxLAN - Multicast Flood and Learn
        • Nexus 9000v - VxLAN - BGP EVPN with Multicast
        • Nexus 9000v - VxLAN - BGP EVPN w/Ingress Replication
        • Nexus 9000v - VxLAN - Inter-VxLAN Routing with BGP EVPN
        • Nexus 9000v - VXLAN - External Routing
      • Nexus 7000v
    • Palo Alto