SlideShare a Scribd company logo
1 of 37
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 5: Inter-VLAN
Routing
Routing & Switching
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5
5.1 Inter-VLAN Routing Configuration
5.2 Troubleshooting Inter-VLAN Routing
5.3 Layer 3 Switching
5.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Objectives
 Describe the three primary options for enabling inter-VLAN routing.
 Configure legacy inter-VLAN routing.
 Configure router-on-a-stick inter-VLAN routing.
 Troubleshoot common inter-VLAN configuration issues.
 Troubleshoot common IP addressing issues in an inter-VLAN-routed
environment.
 Configure inter-VLAN routing using Layer 3 switching.
 Troubleshoot inter-VLAN routing in a Layer 3-switched environment.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
5.1 Inter-VLAN Routing
Configuration
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Inter-VLAN Routing Operation
What is Inter-VLAN routing?
 Layer 2 switches cannot forward traffic between VLANs without the
assistance of a router.
 Inter-VLAN routing is a process for forwarding network traffic from
one VLAN to another, using a router.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Inter-VLAN Routing Operation
Legacy Inter-VLAN Routing
In the past:
 Actual routers were used to route between VLANs.
 Each VLAN was connected to a different physical router interface.
 Packets would arrive on the router through one through interface,
be routed and leave through another.
 Because the router interfaces were connected to VLANs and had
IP addresses from that specific VLAN, routing between VLANs was
achieved.
 Large networks with large number of VLANs required many router
interfaces.
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Inter-VLAN Routing Operation
Router-on-a-Stick Inter-VLAN Routing
 The router-on-a-stick approach uses a different path to route
between VLANs.
 One of the router’s physical interfaces is configured as a 802.1Q
trunk port so it can understand VLAN tags.
 Logical subinterfaces are created; one subinterface per VLAN.
 Each subinterface is configured with an IP address from the VLAN it
represents.
 VLAN members (hosts) are configured to use the subinterface
address as a default gateway.
 Only one of the router’s physical interface is used.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Inter-VLAN Routing Operation
Multilayer Switch Inter-VLAN Routing
 Multilayer switches can perform Layer 2 and Layer 3 functions,
replacing the need for dedicated routers.
 Multilayer switches support dynamic routing and inter-VLAN routing.
 The multilayer switch must have IP routing enabled.
 A switch virtual interface (SVI) exists for VLAN 1 by default. On a
multilayer switch, a logical (layer 3) interface can be configured for
any VLAN.
 The switch understands network-layer PDUs; therefore, can route
between its SVIs, just as a router routes between its interfaces.
 With a multilayer switch, traffic is routed internal to the switch device.
 This routing process is a suitable and scalable solution.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Legacy Inter-VLAN Routing
Preparation
 Legacy inter-VLAN routing requires routers to have multiple
physical interfaces.
 Each one of the router’s physical interfaces is connected to a
unique VLAN.
 Each interface is also configured with an IP address for the subnet
associated with the particular VLAN.
 Network devices use the router as a gateway to access the
devices connected to the other VLANs.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Legacy Inter-VLAN Routing
Preparation (cont.)
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Legacy Inter-VLAN Routing
Switch Configuration
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Legacy Inter-VLAN Routing
Router Interface Configuration
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Router-on-a-Stick
Preparation
 An alternative to legacy inter-VLAN routing is to use VLAN trunking
and subinterfaces.
 VLAN trunking allows a single physical router interface to route
traffic for multiple VLANs.
 The physical interface of the router must be connected to a trunk
link on the adjacent switch.
 On the router, subinterfaces are created for each unique VLAN.
 Each subinterface is assigned an IP address specific to its subnet
or VLAN and is also configured to tag frames for that VLAN.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Router-on-a-Stick
Switch Configuration
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Router-on-a-Stick
Router Subinterface Configuration
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Router-on-a-Stick
Verifying Subinterfaces
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Router-on-a-Stick
Verifying Subinterfaces (cont.)
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Access to devices on remote VLANs can be tested using
the ping command.
 The ping command sends an ICMP echo request to the
destination address.
 When a host receives an ICMP echo request, it responds with an
ICMP echo reply.
 Tracert is a useful utility for confirming the routed path taken
between two devices.
Configure Router-on-a-Stick
Verifying Routing
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19
6.2 Troubleshoot Inter-
VLAN Routing
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 When using the legacy routing model, ensure that the switch ports
connect to the router interfaces and are configured with the correct
VLANs.
 Use the switchport access vlan [appropriate vlan#]
command to correct any erroneous VLAN port assignment.
 Ensure that the router is connected to the correct switch port.
 When using router-on-a-stick, ensure that the switch port
connected to the router is configured as a trunk link.
 Use the switchport mode trunk command to make the
switch port a trunk.
Inter-VLAN Configuration Issues
Switch Port Issues
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Inter-VLAN Configuration Issues
Verify Switch Configuration
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 With router-on-a-stick configurations, a common problem is
assigning the wrong VLAN ID to the subinterface.
 The show interface command can help detect this problem.
 If this is the case, use the encapsulation dot1q <vlan_id>
interface command to fix the problem.
Inter-VLAN Configuration Issues
Verify Router Configuration
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Inter-VLAN Configuration Issues
Verify Router Configuration (cont.)
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 When using legacy inter-VLAN routing, ensure that the router has
the correct IP address and mask on the interfaces connecting to
the switch.
 Ensure that the network devices are configured with the correct IP
address and mask.
 In the router, use the ip address command to fix any erroneous
IP assignments.
 In the PCs, refer to the installed operating system documentation
to properly change IP information.
IP Addressing Issues
Errors with IP Address and Subnet Masks
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Use the show ip interface command to verify if the correct IP
address is configured in the router.
 Use the show running-config when troubleshooting router-
related problems.
 When troubleshooting addressing issues, ensure that the
subinterface is configured with the correct address for that VLAN.
 Subinterface IDs are often configured to match the VLAN number,
which makes it easier to manage inter-VLAN configuration, but this
is not a requirement.
IP Addressing Issues
Verifying IP Address and Subnet Mask
Configuration Issues
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26
5.3 Layer 3 Switching
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Layer 3 switches usually have packet-switching throughputs in the
millions of packets per second (pps).
 All Catalyst multilayer switches support the following types of Layer 3
interfaces:
• Routed port
• Switch virtual interface (SVI)
 High-performance switches, such as the Catalyst 6500 and Catalyst
4500, are able to perform most of the router’s functions.
 Several models of Catalyst switches require enhanced software for
specific routing protocol features.
Layer 3 Switching Operation and Configuration
Introduction to Layer 3 Switching
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Today’s routing has become faster and cheaper and can be
performed at hardware speed.
 Routing can be transferred to core and distribution devices with
little to no impact on network performance.
 Many users are in separate VLANs, and each VLAN is usually a
separate subnet. This implies that each distribution switch must
have IP addresses matching each access switch VLAN.
 Layer 3 (routed) ports are normally implemented between the
distribution and the core layer. This model is less dependent on
spanning tree, because there are no loops in the Layer 2 portion of
the topology.
Layer 3 Switching Operation and Configuration
Inter-VLAN Routing with Switch Virtual Interfaces
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 By default, an SVI is created for the default VLAN (VLAN 1). This
allows for remote switch administration.
 Any additional SVIs must be created by the administrator.
 SVIs are created the first time the VLAN interface configuration
mode is entered for a particular VLAN SVI.
 Enter the interface vlan 10 command to create an SVI
named VLAN 10.
 The VLAN number used corresponds to the VLAN tag associated
with data frames on an 802.1Q encapsulated trunk.
 When the SVI is created, ensure that the specific VLAN is present in
the VLAN database.
Layer 3 Switching Operation and Configuration
Inter-VLAN Routing with SVIs (Cont.)
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 SVIs advantages include:
• Much faster than router-on-a-stick, because everything is
hardware-switched and routed.
• No need for external links from the switch to the router for
routing.
• Not limited to one link. Layer 2 EtherChannels can be used
between the switches to get more bandwidth.
• Latency is much lower, because it does not need to leave the
switch.
Layer 3 Switching Operation and Configuration
Inter-VLAN Routing with SVIs (Cont.)
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 A routed port is a physical port that acts similarly to an interface on a
router.
 Routed ports are not associated with any VLANs.
 Layer 2 protocols, such as STP, do not function on a routed interface.
 Routed ports on a Cisco IOS switch do not support subinterfaces.
 To configure routed ports, use the no switchport interface
configuration mode command.
 Note: Routed ports are not supported on Catalyst 2960 Series
switches.
Layer 3 Switching Operation and Configuration
Inter-VLAN Routing with Routed Ports
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 The Cisco Switch Database Manager (SDM) provides multiple
templates for the Cisco Catalyst 2960 switch.
 The SDM lanbase-routing template can be enabled to allow the
switch to route between VLANs and to support static routing.
 Use the show sdm prefer command to verify which template is
in use.
 The SDM template can be changed in global configuration mode
with the sdm prefer command.
Layer 3 Switching Operation and Configuration
Configuring Static Routes on a Catalyst 2960
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
To troubleshoot Layer 3 switching issues, verify the following for
accuracy:
 VLANs
• VLANs must be defined across all the switches.
• VLANs must be enabled on the trunk ports.
• Ports must be in the right VLANs.
 SVIs
• SVIs must have the correct IP address or subnet mask.
• SVIs must be up.
• SVIs must match with the VLAN number.
Troubleshooting Layer 3 Switching
Layer 3 Switch Configuration Issues
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
To troubleshoot Layer 3 switching issues, verify the following for
accuracy:
 Routing
• Routing must be enabled.
• Each interface or network should be added to the routing
protocol.
 Hosts
• Hosts must have the correct IP address or subnet mask.
• Hosts must have a default gateway associated with an SVI or
routed port.
Troubleshooting Layer 3 Switching
Layer 3 Switching Configuration Issues (Cont.)
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Summary
This chapter described and explained the following concepts:
 Inter-VLAN routing, the process of routing traffic between different
VLANs, using either a dedicated router or a multilayer switch
 Legacy, router-on-a-stick, and multilayer switch inter-VLAN routing
 Layer 3 switching, SVIs, and routed ports
 Troubleshooting inter-VLAN routing with a router or a Layer 3
switch
 Common errors involving VLAN, trunk, Layer 3 interface, and IP
address configurations
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Summary
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
Switch configuration
Switch configurationSwitch configuration
Switch configurationMuuluu
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsVuz Dở Hơi
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptxKISHOYIANKISH
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet3Anetwork com
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocolMuuluu
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptxBOURY1
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLANnewbie2019
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPVuz Dở Hơi
 
CCNA - Routing & Switching Commands
CCNA - Routing & Switching CommandsCCNA - Routing & Switching Commands
CCNA - Routing & Switching CommandsEng. Emad Al-Atoum
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eadpeer
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingVuz Dở Hơi
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideIT Tech
 

What's hot (20)

CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
Switch configuration
Switch configurationSwitch configuration
Switch configuration
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control Lists
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNA - Routing & Switching Commands
CCNA - Routing & Switching CommandsCCNA - Routing & Switching Commands
CCNA - Routing & Switching Commands
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 

Viewers also liked

CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfVuz Dở Hơi
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyVuz Dở Hơi
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4Vuz Dở Hơi
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingYaser Rahmati
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPVuz Dở Hơi
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksVuz Dở Hơi
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetVuz Dở Hơi
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerVuz Dở Hơi
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemVuz Dở Hơi
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingVuz Dở Hơi
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregationJosue Wuezo
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerVuz Dở Hơi
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingVuz Dở Hơi
 

Viewers also liked (20)

CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospf
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing Dynamically
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN Routing
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
Cap6 intervlan routing
Cap6   intervlan routingCap6   intervlan routing
Cap6 intervlan routing
 
Wds
WdsWds
Wds
 
Intervlan
IntervlanIntervlan
Intervlan
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregation
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 

Similar to CCNAv5 - S2: Chapter5 Inter Vlan Routing

Chapter 14 : vlan
Chapter 14 : vlanChapter 14 : vlan
Chapter 14 : vlanteknetir
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6Waqas Ahmed Nawaz
 
KPUCC-Rs instructor ppt_chapter3_final
KPUCC-Rs instructor ppt_chapter3_finalKPUCC-Rs instructor ppt_chapter3_final
KPUCC-Rs instructor ppt_chapter3_finalFisal Anwari
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2Chaing Ravuth
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5Chaing Ravuth
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6Irsandi Hasan
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANSanilinvns
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANSanilinvns
 
CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3Irsandi Hasan
 
Week4(1)(1)
Week4(1)(1)Week4(1)(1)
Week4(1)(1)trayyoo
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationAmir Jafari
 
Inter-VLAN Routing
Inter-VLAN RoutingInter-VLAN Routing
Inter-VLAN Routingrmosate
 
IT0527 Inter-VLAN Routing
IT0527 Inter-VLAN RoutingIT0527 Inter-VLAN Routing
IT0527 Inter-VLAN Routingrmosate
 
Inter-VLAN Routing
Inter-VLAN RoutingInter-VLAN Routing
Inter-VLAN Routingrmosate
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2Waqas Ahmed Nawaz
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN RoutingNetwax Lab
 
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjfvlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjfpeterhaile1
 

Similar to CCNAv5 - S2: Chapter5 Inter Vlan Routing (20)

Chapter 14 : vlan
Chapter 14 : vlanChapter 14 : vlan
Chapter 14 : vlan
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
 
Chapter 03 - VLANs
Chapter 03 - VLANsChapter 03 - VLANs
Chapter 03 - VLANs
 
KPUCC-Rs instructor ppt_chapter3_final
KPUCC-Rs instructor ppt_chapter3_finalKPUCC-Rs instructor ppt_chapter3_final
KPUCC-Rs instructor ppt_chapter3_final
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
CCNP Switching Chapter 5
CCNP Switching Chapter 5CCNP Switching Chapter 5
CCNP Switching Chapter 5
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANS
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3
 
Day 14.1 vlan
Day 14.1 vlanDay 14.1 vlan
Day 14.1 vlan
 
Week4(1)(1)
Week4(1)(1)Week4(1)(1)
Week4(1)(1)
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
 
Inter-VLAN Routing
Inter-VLAN RoutingInter-VLAN Routing
Inter-VLAN Routing
 
IT0527 Inter-VLAN Routing
IT0527 Inter-VLAN RoutingIT0527 Inter-VLAN Routing
IT0527 Inter-VLAN Routing
 
Inter-VLAN Routing
Inter-VLAN RoutingInter-VLAN Routing
Inter-VLAN Routing
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
 
Icnd210 s02l01
Icnd210 s02l01Icnd210 s02l01
Icnd210 s02l01
 
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjfvlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
vlaN.pptgfggdfgdrgsegtrgthyrtewgsrdhftjf
 

More from Vuz Dở Hơi

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Vuz Dở Hơi
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionVuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationVuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceVuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingVuz Dở Hơi
 

More from Vuz Dở Hơi (20)

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

CCNAv5 - S2: Chapter5 Inter Vlan Routing

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 5.1 Inter-VLAN Routing Configuration 5.2 Troubleshooting Inter-VLAN Routing 5.3 Layer 3 Switching 5.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Objectives  Describe the three primary options for enabling inter-VLAN routing.  Configure legacy inter-VLAN routing.  Configure router-on-a-stick inter-VLAN routing.  Troubleshoot common inter-VLAN configuration issues.  Troubleshoot common IP addressing issues in an inter-VLAN-routed environment.  Configure inter-VLAN routing using Layer 3 switching.  Troubleshoot inter-VLAN routing in a Layer 3-switched environment.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 5.1 Inter-VLAN Routing Configuration
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Inter-VLAN Routing Operation What is Inter-VLAN routing?  Layer 2 switches cannot forward traffic between VLANs without the assistance of a router.  Inter-VLAN routing is a process for forwarding network traffic from one VLAN to another, using a router.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Inter-VLAN Routing Operation Legacy Inter-VLAN Routing In the past:  Actual routers were used to route between VLANs.  Each VLAN was connected to a different physical router interface.  Packets would arrive on the router through one through interface, be routed and leave through another.  Because the router interfaces were connected to VLANs and had IP addresses from that specific VLAN, routing between VLANs was achieved.  Large networks with large number of VLANs required many router interfaces.
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Inter-VLAN Routing Operation Router-on-a-Stick Inter-VLAN Routing  The router-on-a-stick approach uses a different path to route between VLANs.  One of the router’s physical interfaces is configured as a 802.1Q trunk port so it can understand VLAN tags.  Logical subinterfaces are created; one subinterface per VLAN.  Each subinterface is configured with an IP address from the VLAN it represents.  VLAN members (hosts) are configured to use the subinterface address as a default gateway.  Only one of the router’s physical interface is used.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Inter-VLAN Routing Operation Multilayer Switch Inter-VLAN Routing  Multilayer switches can perform Layer 2 and Layer 3 functions, replacing the need for dedicated routers.  Multilayer switches support dynamic routing and inter-VLAN routing.  The multilayer switch must have IP routing enabled.  A switch virtual interface (SVI) exists for VLAN 1 by default. On a multilayer switch, a logical (layer 3) interface can be configured for any VLAN.  The switch understands network-layer PDUs; therefore, can route between its SVIs, just as a router routes between its interfaces.  With a multilayer switch, traffic is routed internal to the switch device.  This routing process is a suitable and scalable solution.
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Legacy Inter-VLAN Routing Preparation  Legacy inter-VLAN routing requires routers to have multiple physical interfaces.  Each one of the router’s physical interfaces is connected to a unique VLAN.  Each interface is also configured with an IP address for the subnet associated with the particular VLAN.  Network devices use the router as a gateway to access the devices connected to the other VLANs.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Legacy Inter-VLAN Routing Preparation (cont.)
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Legacy Inter-VLAN Routing Switch Configuration
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Legacy Inter-VLAN Routing Router Interface Configuration
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Router-on-a-Stick Preparation  An alternative to legacy inter-VLAN routing is to use VLAN trunking and subinterfaces.  VLAN trunking allows a single physical router interface to route traffic for multiple VLANs.  The physical interface of the router must be connected to a trunk link on the adjacent switch.  On the router, subinterfaces are created for each unique VLAN.  Each subinterface is assigned an IP address specific to its subnet or VLAN and is also configured to tag frames for that VLAN.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Router-on-a-Stick Switch Configuration
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Router-on-a-Stick Router Subinterface Configuration
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Router-on-a-Stick Verifying Subinterfaces
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Router-on-a-Stick Verifying Subinterfaces (cont.)
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Access to devices on remote VLANs can be tested using the ping command.  The ping command sends an ICMP echo request to the destination address.  When a host receives an ICMP echo request, it responds with an ICMP echo reply.  Tracert is a useful utility for confirming the routed path taken between two devices. Configure Router-on-a-Stick Verifying Routing
  • 19. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19 6.2 Troubleshoot Inter- VLAN Routing
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  When using the legacy routing model, ensure that the switch ports connect to the router interfaces and are configured with the correct VLANs.  Use the switchport access vlan [appropriate vlan#] command to correct any erroneous VLAN port assignment.  Ensure that the router is connected to the correct switch port.  When using router-on-a-stick, ensure that the switch port connected to the router is configured as a trunk link.  Use the switchport mode trunk command to make the switch port a trunk. Inter-VLAN Configuration Issues Switch Port Issues
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Inter-VLAN Configuration Issues Verify Switch Configuration
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  With router-on-a-stick configurations, a common problem is assigning the wrong VLAN ID to the subinterface.  The show interface command can help detect this problem.  If this is the case, use the encapsulation dot1q <vlan_id> interface command to fix the problem. Inter-VLAN Configuration Issues Verify Router Configuration
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Inter-VLAN Configuration Issues Verify Router Configuration (cont.)
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  When using legacy inter-VLAN routing, ensure that the router has the correct IP address and mask on the interfaces connecting to the switch.  Ensure that the network devices are configured with the correct IP address and mask.  In the router, use the ip address command to fix any erroneous IP assignments.  In the PCs, refer to the installed operating system documentation to properly change IP information. IP Addressing Issues Errors with IP Address and Subnet Masks
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Use the show ip interface command to verify if the correct IP address is configured in the router.  Use the show running-config when troubleshooting router- related problems.  When troubleshooting addressing issues, ensure that the subinterface is configured with the correct address for that VLAN.  Subinterface IDs are often configured to match the VLAN number, which makes it easier to manage inter-VLAN configuration, but this is not a requirement. IP Addressing Issues Verifying IP Address and Subnet Mask Configuration Issues
  • 26. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26 5.3 Layer 3 Switching
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Layer 3 switches usually have packet-switching throughputs in the millions of packets per second (pps).  All Catalyst multilayer switches support the following types of Layer 3 interfaces: • Routed port • Switch virtual interface (SVI)  High-performance switches, such as the Catalyst 6500 and Catalyst 4500, are able to perform most of the router’s functions.  Several models of Catalyst switches require enhanced software for specific routing protocol features. Layer 3 Switching Operation and Configuration Introduction to Layer 3 Switching
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Today’s routing has become faster and cheaper and can be performed at hardware speed.  Routing can be transferred to core and distribution devices with little to no impact on network performance.  Many users are in separate VLANs, and each VLAN is usually a separate subnet. This implies that each distribution switch must have IP addresses matching each access switch VLAN.  Layer 3 (routed) ports are normally implemented between the distribution and the core layer. This model is less dependent on spanning tree, because there are no loops in the Layer 2 portion of the topology. Layer 3 Switching Operation and Configuration Inter-VLAN Routing with Switch Virtual Interfaces
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  By default, an SVI is created for the default VLAN (VLAN 1). This allows for remote switch administration.  Any additional SVIs must be created by the administrator.  SVIs are created the first time the VLAN interface configuration mode is entered for a particular VLAN SVI.  Enter the interface vlan 10 command to create an SVI named VLAN 10.  The VLAN number used corresponds to the VLAN tag associated with data frames on an 802.1Q encapsulated trunk.  When the SVI is created, ensure that the specific VLAN is present in the VLAN database. Layer 3 Switching Operation and Configuration Inter-VLAN Routing with SVIs (Cont.)
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  SVIs advantages include: • Much faster than router-on-a-stick, because everything is hardware-switched and routed. • No need for external links from the switch to the router for routing. • Not limited to one link. Layer 2 EtherChannels can be used between the switches to get more bandwidth. • Latency is much lower, because it does not need to leave the switch. Layer 3 Switching Operation and Configuration Inter-VLAN Routing with SVIs (Cont.)
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  A routed port is a physical port that acts similarly to an interface on a router.  Routed ports are not associated with any VLANs.  Layer 2 protocols, such as STP, do not function on a routed interface.  Routed ports on a Cisco IOS switch do not support subinterfaces.  To configure routed ports, use the no switchport interface configuration mode command.  Note: Routed ports are not supported on Catalyst 2960 Series switches. Layer 3 Switching Operation and Configuration Inter-VLAN Routing with Routed Ports
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  The Cisco Switch Database Manager (SDM) provides multiple templates for the Cisco Catalyst 2960 switch.  The SDM lanbase-routing template can be enabled to allow the switch to route between VLANs and to support static routing.  Use the show sdm prefer command to verify which template is in use.  The SDM template can be changed in global configuration mode with the sdm prefer command. Layer 3 Switching Operation and Configuration Configuring Static Routes on a Catalyst 2960
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential To troubleshoot Layer 3 switching issues, verify the following for accuracy:  VLANs • VLANs must be defined across all the switches. • VLANs must be enabled on the trunk ports. • Ports must be in the right VLANs.  SVIs • SVIs must have the correct IP address or subnet mask. • SVIs must be up. • SVIs must match with the VLAN number. Troubleshooting Layer 3 Switching Layer 3 Switch Configuration Issues
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential To troubleshoot Layer 3 switching issues, verify the following for accuracy:  Routing • Routing must be enabled. • Each interface or network should be added to the routing protocol.  Hosts • Hosts must have the correct IP address or subnet mask. • Hosts must have a default gateway associated with an SVI or routed port. Troubleshooting Layer 3 Switching Layer 3 Switching Configuration Issues (Cont.)
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Summary This chapter described and explained the following concepts:  Inter-VLAN routing, the process of routing traffic between different VLANs, using either a dedicated router or a multilayer switch  Legacy, router-on-a-stick, and multilayer switch inter-VLAN routing  Layer 3 switching, SVIs, and routed ports  Troubleshooting inter-VLAN routing with a router or a Layer 3 switch  Common errors involving VLAN, trunk, Layer 3 interface, and IP address configurations
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Summary
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential