SlideShare a Scribd company logo
Switching
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
Ethernet is a LAN technology based on the IEEE 802.3 standard. It provides a shared medium to transfer
the data.
There are three Switching Modes
1. Cut through (Fast Forward)- When in this mode, the switch only waits for the destination
hardware address to be received before it looks up the destination address in the MAC filter
table. Cisco sometimes calls this the fast forward method.
2. Fragment Free (Modified cut through)- This is the default mode for the catalyst 1900 switch, and
it’s sometimes referred to as modified cut through. In fragment free mode, the switch checks the
first 64 bytes of a frame before forwarding it for fragmentation, thus guarding against forwarding
runts, which are caused by collisions.
3. Store and forward- In this mode the complete data frame is received on the switch’s buffer, a
CRC is run, and if the CRC passes, the switch looks up the destination address in the MAC filter
table.
We always use Store and forward switch.
Functions of a Switch
1. Address Learning- A switch learns MAC address based on Source MAC.
Figure 1 Switching Modes
Switching
2. Forward Filter Decision- A switch forwards a frame based on destination MAC.
3. Loop Avoidance- Switch use STP to prevent a network from looping.
Flooding- A process of transferring a frames copy to its all ports except that port on which it was
received.
Switch floods three types of frame
1. Broadcast (FF: FF: FF: FF: FF: FF or 255.255.255.255)
2. Multicast (start from 0100)
3. Unknown Unicast
Switches are two types
(i) Modular 2950, 3550 (Fixed)
(ii) De-Modular 4500, 6500 (We can modify)
(Note: 2960, 3560 - It supports stacking.)
Routing Rules
1. If the destination is in the same subnet or network then a device directly sends the packet to the
destination.
2. If destination is not in same subnet or network then a device directly send packet to default
gateway.
(Note: ARP Request is used to find out the Destination MAC. Cisco 6500 series switch can store 1.80 Lac
MAC Address.)
Types of Switching
1. L2 -2900 Series
2. L3
3. L4
4. MLS -3500, 3700, 4500, 6500
Layer 2 Switching-
Layer 2 switches learn MAC addresses automatically, building a table which can be used to selectively
forward packets. For example, if a switch receives packets from MAC address X on Port 1 it then knows
that packets destined for MAC address X can simply be forwarded out of that port rather than having to
try each available port in turn.
Switching
Layer 3 Switching-
1. In layer 3 switching packets are forwarded based on destination L3 information as a router does.
2. Packets are forwarded with high speed as compared to router.
3. Packets are switched using dedicated hardware.
Layer 4 Switching- In layer 4 switching TCP & UDP port numbers are checked.
MLS- In Multi-layer switching Data is forwarded based on L2, L3 & L4 information.
CAM – Content Addressable Memory
TCAM – Ternary Content Addressable Memory
FIB – Forwarding information Base
As a router maintain routing table just like this a MLS maintains FIB.
Packet Rewriter-
I. Write Source-Destination MAC
II. Decrease TTL Value
Figure 2 L2 Switch Table
Switching
TCAM Components
SDM is used for Storage
Figure 3 MLS Switches Tables
Figure 4 TCAM Components
Switching
FM – to compile ACL
I. Ingress Que – Incoming data
II. Egress Que – Outgoing data
VLAN
Before understand VLAN we have to understand LAN
LAN- A LAN consists of all devices in a single broadcast domain.
Broadcast domain: - A set of LAN connected devices in which when a device sends a broadcast then all
devices get a copy of frame so LAN & Broadcast domain are same thing.
By default a switch consider its all interface in a single broadcast domain but a switch has ability to put
some interface in one broadcast domain & some interfaces in another broadcast domain. These new
broadcast domain are called V-LAN.
Types of VLAN
1. Static Vlan- Static Vlan provides port based Vlan membership. In static Vlan we configure switch
ports in a particular Vlan.
When we manually add switch ports to specific vlans.
Switch (config) #vlan 10
Switch (config-vlan) #name Hr
Switch (config) #int fa0/1
Switch (config-if) #switchport mode access
Switch (config-if) #switchport access vlan 10
2. Dynamic Vlan- Dynamic Vlan provides Vlan membership based on MAC. When any end device is
connected with the switch, then switch learn the MAC address of end devices. After learning
MAC it sends a request to VMPS (Vlan Management Policy Server) that I have a MAC, now tell
me VLAN ID of this MAC. Now VMPS is responsible for Vlan assignment based on MAC. Now a
day we use AAA (Authentication, Authorization & accounting) for dynamic vlans. It works based
on username and password of a user.
VLAN Trunking
When a switch sends a frame to another switch then it adds an extra header with the frame which
contains VLAN ID of frame. This process is called VLAN trunking or tagging.
Types of Trunking Protocol
Switching
1. ISL (Inter Switch Link)- It is a cisco proprietary protocol. It encapsulate original Ethernet frame
with ISL header & trailer. It inserts 26 bytes header & 4 bytes trailer. This process is also called
dual tagging. It doesn’t support untagged data and native vlan.
2. 802.1Q- It is an open standard protocol. It doesn’t encapsulate original Ethernet frame with
dot1Q header & trailer but it insert 4 byte dot1Q header in original Ethernet header. It supports
untagged data and native vlans.
Figure 5 ISL Header
Figure 6 802.1q Header
Switching
Dot1q 4 bytes divided into two parts
(i) TPI – Tag Protocol Identifier
(ii) TCI – Tag Control Information
TCI – 3 bits cos – class of service
4th
bit- CFI Canonical format (for topology)
12 bit – vlan id
DTP (Dynamic Trunking Protocol)
 Cisco proprietary protocol.
DTP modes
(i) DD
(ii) DA
(iii) No Negotiate
3550 – By default mode is DD
3560 – By default mode DA
To disable DTP on cisco switches
Switch (config) #int fa0/1
Switch (config-if) #switchport nonegotiate
Before run this command we need to make this interface at least part of access list or trunk link. Only
we will be able to run this command.
By default DTP is enabled on switches
Allowed vlan via trunk 1 to 4094
Switch#sh int trunk
Switch#sh int status
Vlan range - 0 to 4095
Valid range - 1- 4094
Normal Range of Vlan
1 to 1005
Switching
Default created VLans in Normal range
1 Native vlan
1002 fddi-default
1003 token-ring-default
1004 fddinet-default
1005 trnet-default
Extended Range
1006 to 4094
Reserved
4095
(Note: Extended range vlan we can only create in Transparent mode.)
VTP Version 3 supports Extended Range.
Vlan trunk configuration
Switch (config) #int fa0/0
Switch (config-if) #switchport trunk encapsulation (ISL, dot1q, negotiate)
Switch (config-if) #switchport trunk native vlan (vlan –id)
Switch (config-if) #switchport trunk allowed vlan (vlan-list, all)
Switch (config-if) #switchport mode (trunk, dynamic, auto)
DD ----------------------------------------------------------------DD Yes
DA-----------------------------------------------------------------DA No
DA-----------------------------------------------------------------DD Yes
Static-------------------------------------------------------------DD Yes
DA----------------------------------------------------------------Static Yes
Static-------------------------------------------------------------Static Yes
Trunk
This setting place the port in permanent trunking mode. DTP is still operational so if the far-end switch
port is configured to trunk, DD, or DA, trunking will be negotiated successfully.
Switching
DD (Dynamic Desirable)
The port actively attempts to convert the link into trunking mode. In other words, it asks the far-end
switch to bring up a frame. If the far-end switch port is configured to trunk, DD or DA mode, trunking is
negotiated successfully.
DA (Dynamic Auto)
The port can be converted in to a trunk link, but only if the far-end switch actively request it. Therefore,
if the far-end switch port is configured to trunk or DD mode, trunking is negotiated. Because of passive
negotiation behavior, the link never becomes a trunk if both ends of the link are left to the Dynamic
auto.
In all these modes, DTP frames are sent out every 30 sec to keep neighboring switch ports informed of
the links mode.
Switch (config) #int gig 2/1
Switch (config-if) #switchport trunk encapsulation dot1q
Switch (config-if) #switchport trunk native vlan 100
Switch (config-if) #switchport trunk allowed vlan 100 – 105
Switch (config-if) #switchport mode DD
Switch#sh int gig 2/1 trunk
Switch#sh int status
Switch (config) #int gig 2/1
Switch (config-if) #switchport trunk allowed vlan remove 103
Switch#sh vlan id
Switch#sh int fa0/2 switchport
Switch#sh dtp (int type)
FDDI – fiber distribution data interface.
CEF – Cisco express forwarding
By default idle CAM table entries are kept for 300 seconds before they are deleted. We can change the
default setting using the following command.
Switch (config) #mac address-table aging-time (seconds)
By default, MAC addresses are learned dynamically from incoming frames. We can also configure static
CAM table entries that contain MAC addresses that might not be learned otherwise. To do this use
following commands
Switch (config) #mac-address-table static (mac-address) vlan (vlan-id) interface type (mod|num)
Switching
To view the contents of the CAM table, we can use the following form of the command
Switch #sh mac address-table dynamic
Checking the size of the CAM-Table count
Switch#sh mac address-table count
CAM table entries can be cleared manually
Switch#clear mac address-table dynamic
To select a single switch port
Switch #int fastEthernet 0/14
Select all 48 FastEthernet interfaces on Module 1
Switch (config) #int range fastEthernet 1 0/1 – 48
To set the link mode on a switch port, enter the following command
Switch (config-if) #duplex (auto|full|half)
Switch (config-if) #speed auto
Detecting Error Conditions
By default, a catalyst switch detects an error condition on every switch port for every possible cause. If
an error condition is detected the switch port is put in to the errdisable state and disabled.
Switch (config) # (no) errdisable detect cause (all|cause name)
We can repeat this command to enable or disable more than one cause.
By default ports put into the errdisable state must be re enabled manually. This is done by issuing the
shut down and then no shut.
Switch (config) # errdisable recovery cause (all |cause name)
Switch (config) #errdisable recovery interval

More Related Content

What's hot

CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
Madhan Banda
 
Exam viewer2
Exam viewer2Exam viewer2
Exam viewer2
Jorgito Leal
 
More than 200 CCNA Question Answer
More than 200 CCNA Question AnswerMore than 200 CCNA Question Answer
More than 200 CCNA Question Answer
patel_niket9
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
aghacrom
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
Kashif Latif
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)
Netwax Lab
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHING
anilinvns
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
ernestlithur
 
RIP (routing information protocol)
RIP (routing information protocol)RIP (routing information protocol)
RIP (routing information protocol)
Netwax Lab
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
Dmitry Figol
 
Ccna command
Ccna commandCcna command
Ccna command
Siddhartha Rajbhatt
 
Chapter6ccna
Chapter6ccnaChapter6ccna
Chapter6ccna
ernestlithur
 
Packet Tracer: WAN, point to point links.
Packet Tracer: WAN, point to point links.Packet Tracer: WAN, point to point links.
Packet Tracer: WAN, point to point links.
Rafat Khandaker
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2
Abdul Basit
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Rishabh Dangwal
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
Muhd Mu'izuddin
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 Stp
F.l. Yu
 
Chapter8ccna
Chapter8ccnaChapter8ccna
Chapter8ccna
ernestlithur
 
HSRP (hot standby router protocol)
HSRP (hot standby router protocol)HSRP (hot standby router protocol)
HSRP (hot standby router protocol)
Netwax Lab
 

What's hot (20)

CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
 
Exam viewer2
Exam viewer2Exam viewer2
Exam viewer2
 
More than 200 CCNA Question Answer
More than 200 CCNA Question AnswerMore than 200 CCNA Question Answer
More than 200 CCNA Question Answer
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHING
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
 
RIP (routing information protocol)
RIP (routing information protocol)RIP (routing information protocol)
RIP (routing information protocol)
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
 
Ccna command
Ccna commandCcna command
Ccna command
 
Chapter6ccna
Chapter6ccnaChapter6ccna
Chapter6ccna
 
Packet Tracer: WAN, point to point links.
Packet Tracer: WAN, point to point links.Packet Tracer: WAN, point to point links.
Packet Tracer: WAN, point to point links.
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 Stp
 
Chapter8ccna
Chapter8ccnaChapter8ccna
Chapter8ccna
 
HSRP (hot standby router protocol)
HSRP (hot standby router protocol)HSRP (hot standby router protocol)
HSRP (hot standby router protocol)
 

Similar to Switching

VLAN
VLANVLAN
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Mike McLain
 
Dc fabric path
Dc fabric pathDc fabric path
Dc fabric path
ASHISH SEHGAL
 
Switching
SwitchingSwitching
Switching
SwitchingSwitching
CCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg
CCNA Routing and Switching Lesson 13 - Switching - Eric VanderburgCCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg
CCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg
Eric Vanderburg
 
Ccna 9
Ccna  9Ccna  9
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_enCcnp3 lab 3_4_en
Ccnp3 lab 3_4_en
Omar Herrera
 
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_enCcnp3 lab 3_4_en
Ccnp3 lab 3_4_en
Omar Herrera
 
Vlan
Vlan Vlan
Vlan
sanss40
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
BIRLA VISHVAKARMA MAHAVIDYALAY
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
BIRLA VISHVAKARMA MAHAVIDYALAY
 
VLAN on packet Tracer
VLAN on packet TracerVLAN on packet Tracer
VLAN on packet Tracer
BIRLA VISHVAKARMA MAHAVIDYALAY
 
3 2
3 23 2
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
Atakan ATAK
 
ENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptxENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptx
ManuelRojas960410
 
Vlan
VlanVlan
Vlan
PAF-KIET
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Abdelkhalik Mosa
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
Netwax Lab
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
darulquthni
 

Similar to Switching (20)

VLAN
VLANVLAN
VLAN
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
 
Dc fabric path
Dc fabric pathDc fabric path
Dc fabric path
 
Switching
SwitchingSwitching
Switching
 
Switching
SwitchingSwitching
Switching
 
CCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg
CCNA Routing and Switching Lesson 13 - Switching - Eric VanderburgCCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg
CCNA Routing and Switching Lesson 13 - Switching - Eric Vanderburg
 
Ccna 9
Ccna  9Ccna  9
Ccna 9
 
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_enCcnp3 lab 3_4_en
Ccnp3 lab 3_4_en
 
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_enCcnp3 lab 3_4_en
Ccnp3 lab 3_4_en
 
Vlan
Vlan Vlan
Vlan
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
 
VLAN on packet Tracer
VLAN on packet TracerVLAN on packet Tracer
VLAN on packet Tracer
 
3 2
3 23 2
3 2
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
ENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptxENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptx
 
Vlan
VlanVlan
Vlan
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 

More from Netwax Lab

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
Netwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Netwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
Netwax Lab
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
Netwax Lab
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
Netwax Lab
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
Netwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
Netwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
Netwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
Netwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
Netwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
Netwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
Netwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
Netwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
Netwax Lab
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
Netwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
Netwax Lab
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
Netwax Lab
 

More from Netwax Lab (20)

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Switching

  • 1. Switching Switching – A Process of using the MAC address on LAN is called Layer 2 Switching. Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network. Switching breaks up large collision domains into smaller ones and that a collision domain is a network segment with two or more devices sharing the same bandwidth. Ethernet is a LAN technology based on the IEEE 802.3 standard. It provides a shared medium to transfer the data. There are three Switching Modes 1. Cut through (Fast Forward)- When in this mode, the switch only waits for the destination hardware address to be received before it looks up the destination address in the MAC filter table. Cisco sometimes calls this the fast forward method. 2. Fragment Free (Modified cut through)- This is the default mode for the catalyst 1900 switch, and it’s sometimes referred to as modified cut through. In fragment free mode, the switch checks the first 64 bytes of a frame before forwarding it for fragmentation, thus guarding against forwarding runts, which are caused by collisions. 3. Store and forward- In this mode the complete data frame is received on the switch’s buffer, a CRC is run, and if the CRC passes, the switch looks up the destination address in the MAC filter table. We always use Store and forward switch. Functions of a Switch 1. Address Learning- A switch learns MAC address based on Source MAC. Figure 1 Switching Modes
  • 2. Switching 2. Forward Filter Decision- A switch forwards a frame based on destination MAC. 3. Loop Avoidance- Switch use STP to prevent a network from looping. Flooding- A process of transferring a frames copy to its all ports except that port on which it was received. Switch floods three types of frame 1. Broadcast (FF: FF: FF: FF: FF: FF or 255.255.255.255) 2. Multicast (start from 0100) 3. Unknown Unicast Switches are two types (i) Modular 2950, 3550 (Fixed) (ii) De-Modular 4500, 6500 (We can modify) (Note: 2960, 3560 - It supports stacking.) Routing Rules 1. If the destination is in the same subnet or network then a device directly sends the packet to the destination. 2. If destination is not in same subnet or network then a device directly send packet to default gateway. (Note: ARP Request is used to find out the Destination MAC. Cisco 6500 series switch can store 1.80 Lac MAC Address.) Types of Switching 1. L2 -2900 Series 2. L3 3. L4 4. MLS -3500, 3700, 4500, 6500 Layer 2 Switching- Layer 2 switches learn MAC addresses automatically, building a table which can be used to selectively forward packets. For example, if a switch receives packets from MAC address X on Port 1 it then knows that packets destined for MAC address X can simply be forwarded out of that port rather than having to try each available port in turn.
  • 3. Switching Layer 3 Switching- 1. In layer 3 switching packets are forwarded based on destination L3 information as a router does. 2. Packets are forwarded with high speed as compared to router. 3. Packets are switched using dedicated hardware. Layer 4 Switching- In layer 4 switching TCP & UDP port numbers are checked. MLS- In Multi-layer switching Data is forwarded based on L2, L3 & L4 information. CAM – Content Addressable Memory TCAM – Ternary Content Addressable Memory FIB – Forwarding information Base As a router maintain routing table just like this a MLS maintains FIB. Packet Rewriter- I. Write Source-Destination MAC II. Decrease TTL Value Figure 2 L2 Switch Table
  • 4. Switching TCAM Components SDM is used for Storage Figure 3 MLS Switches Tables Figure 4 TCAM Components
  • 5. Switching FM – to compile ACL I. Ingress Que – Incoming data II. Egress Que – Outgoing data VLAN Before understand VLAN we have to understand LAN LAN- A LAN consists of all devices in a single broadcast domain. Broadcast domain: - A set of LAN connected devices in which when a device sends a broadcast then all devices get a copy of frame so LAN & Broadcast domain are same thing. By default a switch consider its all interface in a single broadcast domain but a switch has ability to put some interface in one broadcast domain & some interfaces in another broadcast domain. These new broadcast domain are called V-LAN. Types of VLAN 1. Static Vlan- Static Vlan provides port based Vlan membership. In static Vlan we configure switch ports in a particular Vlan. When we manually add switch ports to specific vlans. Switch (config) #vlan 10 Switch (config-vlan) #name Hr Switch (config) #int fa0/1 Switch (config-if) #switchport mode access Switch (config-if) #switchport access vlan 10 2. Dynamic Vlan- Dynamic Vlan provides Vlan membership based on MAC. When any end device is connected with the switch, then switch learn the MAC address of end devices. After learning MAC it sends a request to VMPS (Vlan Management Policy Server) that I have a MAC, now tell me VLAN ID of this MAC. Now VMPS is responsible for Vlan assignment based on MAC. Now a day we use AAA (Authentication, Authorization & accounting) for dynamic vlans. It works based on username and password of a user. VLAN Trunking When a switch sends a frame to another switch then it adds an extra header with the frame which contains VLAN ID of frame. This process is called VLAN trunking or tagging. Types of Trunking Protocol
  • 6. Switching 1. ISL (Inter Switch Link)- It is a cisco proprietary protocol. It encapsulate original Ethernet frame with ISL header & trailer. It inserts 26 bytes header & 4 bytes trailer. This process is also called dual tagging. It doesn’t support untagged data and native vlan. 2. 802.1Q- It is an open standard protocol. It doesn’t encapsulate original Ethernet frame with dot1Q header & trailer but it insert 4 byte dot1Q header in original Ethernet header. It supports untagged data and native vlans. Figure 5 ISL Header Figure 6 802.1q Header
  • 7. Switching Dot1q 4 bytes divided into two parts (i) TPI – Tag Protocol Identifier (ii) TCI – Tag Control Information TCI – 3 bits cos – class of service 4th bit- CFI Canonical format (for topology) 12 bit – vlan id DTP (Dynamic Trunking Protocol)  Cisco proprietary protocol. DTP modes (i) DD (ii) DA (iii) No Negotiate 3550 – By default mode is DD 3560 – By default mode DA To disable DTP on cisco switches Switch (config) #int fa0/1 Switch (config-if) #switchport nonegotiate Before run this command we need to make this interface at least part of access list or trunk link. Only we will be able to run this command. By default DTP is enabled on switches Allowed vlan via trunk 1 to 4094 Switch#sh int trunk Switch#sh int status Vlan range - 0 to 4095 Valid range - 1- 4094 Normal Range of Vlan 1 to 1005
  • 8. Switching Default created VLans in Normal range 1 Native vlan 1002 fddi-default 1003 token-ring-default 1004 fddinet-default 1005 trnet-default Extended Range 1006 to 4094 Reserved 4095 (Note: Extended range vlan we can only create in Transparent mode.) VTP Version 3 supports Extended Range. Vlan trunk configuration Switch (config) #int fa0/0 Switch (config-if) #switchport trunk encapsulation (ISL, dot1q, negotiate) Switch (config-if) #switchport trunk native vlan (vlan –id) Switch (config-if) #switchport trunk allowed vlan (vlan-list, all) Switch (config-if) #switchport mode (trunk, dynamic, auto) DD ----------------------------------------------------------------DD Yes DA-----------------------------------------------------------------DA No DA-----------------------------------------------------------------DD Yes Static-------------------------------------------------------------DD Yes DA----------------------------------------------------------------Static Yes Static-------------------------------------------------------------Static Yes Trunk This setting place the port in permanent trunking mode. DTP is still operational so if the far-end switch port is configured to trunk, DD, or DA, trunking will be negotiated successfully.
  • 9. Switching DD (Dynamic Desirable) The port actively attempts to convert the link into trunking mode. In other words, it asks the far-end switch to bring up a frame. If the far-end switch port is configured to trunk, DD or DA mode, trunking is negotiated successfully. DA (Dynamic Auto) The port can be converted in to a trunk link, but only if the far-end switch actively request it. Therefore, if the far-end switch port is configured to trunk or DD mode, trunking is negotiated. Because of passive negotiation behavior, the link never becomes a trunk if both ends of the link are left to the Dynamic auto. In all these modes, DTP frames are sent out every 30 sec to keep neighboring switch ports informed of the links mode. Switch (config) #int gig 2/1 Switch (config-if) #switchport trunk encapsulation dot1q Switch (config-if) #switchport trunk native vlan 100 Switch (config-if) #switchport trunk allowed vlan 100 – 105 Switch (config-if) #switchport mode DD Switch#sh int gig 2/1 trunk Switch#sh int status Switch (config) #int gig 2/1 Switch (config-if) #switchport trunk allowed vlan remove 103 Switch#sh vlan id Switch#sh int fa0/2 switchport Switch#sh dtp (int type) FDDI – fiber distribution data interface. CEF – Cisco express forwarding By default idle CAM table entries are kept for 300 seconds before they are deleted. We can change the default setting using the following command. Switch (config) #mac address-table aging-time (seconds) By default, MAC addresses are learned dynamically from incoming frames. We can also configure static CAM table entries that contain MAC addresses that might not be learned otherwise. To do this use following commands Switch (config) #mac-address-table static (mac-address) vlan (vlan-id) interface type (mod|num)
  • 10. Switching To view the contents of the CAM table, we can use the following form of the command Switch #sh mac address-table dynamic Checking the size of the CAM-Table count Switch#sh mac address-table count CAM table entries can be cleared manually Switch#clear mac address-table dynamic To select a single switch port Switch #int fastEthernet 0/14 Select all 48 FastEthernet interfaces on Module 1 Switch (config) #int range fastEthernet 1 0/1 – 48 To set the link mode on a switch port, enter the following command Switch (config-if) #duplex (auto|full|half) Switch (config-if) #speed auto Detecting Error Conditions By default, a catalyst switch detects an error condition on every switch port for every possible cause. If an error condition is detected the switch port is put in to the errdisable state and disabled. Switch (config) # (no) errdisable detect cause (all|cause name) We can repeat this command to enable or disable more than one cause. By default ports put into the errdisable state must be re enabled manually. This is done by issuing the shut down and then no shut. Switch (config) # errdisable recovery cause (all |cause name) Switch (config) #errdisable recovery interval