0% found this document useful (0 votes)
40 views

Networking Technology NET 272 - Lab Exercise Advanced STP - PVST+, RSTP, MST Conducted On 9/16 By: Chris Ortiz

The document summarizes the steps taken in a lab to configure STP, VLANs, trunking, routing, and monitoring in a Cisco switched network. Key steps included: 1) Cabling switches and configuring VLANs, trunking, and VTP to enable VLAN switching; 2) Configuring routing with EIGRP on distribution switches to enable inter-VLAN communication; 3) Verifying connectivity within and between VLANs and monitoring the spanning tree.

Uploaded by

chrisnciss
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Networking Technology NET 272 - Lab Exercise Advanced STP - PVST+, RSTP, MST Conducted On 9/16 By: Chris Ortiz

The document summarizes the steps taken in a lab to configure STP, VLANs, trunking, routing, and monitoring in a Cisco switched network. Key steps included: 1) Cabling switches and configuring VLANs, trunking, and VTP to enable VLAN switching; 2) Configuring routing with EIGRP on distribution switches to enable inter-VLAN communication; 3) Verifying connectivity within and between VLANs and monitoring the spanning tree.

Uploaded by

chrisnciss
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Networking Technology

NET 272 – Lab Exercise


Advanced STP – PVST+, RSTP, MST
Conducted on 9/16
By: Chris Ortiz
Objective
The purpose of this lab is to configure and monitor STP features within a Cisco IOS environment
of switches.

Part 1: Connect Switched Network and Configure VLAN Operation


The network is configured as show below with associated port assignments (all at 100Mbps
ports connections):

As can be seen from the diagram above, there are three customer VLANs (Engineering-100,
Marketing-200 and Finance-100) and the management VLAN-1. After cabling the above configuration,
the next step, since working with VLANS, was to ensure that the VLAN configuration (database) was
clean.

Part 2: Configure Basic VLAN Switching and Inter-VLAN Communications


IP addressing was completed on physical, logical and loopback interfaces as shown in the earlier
network diagram. Additionally, we configured each access switch with a default gateway which
pointed to the SVI on the distribution switch. All access switches were also configured as VTP clients,
allowing the distribution switches serving as VTP clients.

Acc3(config)#vtp mode client Sets VTP to client mode

Acc3(config)#vtp domain team1


Changing VTP domain name from cisco to team1 Sets the VTP domain name (must match)

Acc3(config)#vtp password cisco Sets the VTP domain password (must match)

Acc3(config-if)#spanning-tree portfast Forces an access port to immediately


transition to forwarding state
Access Switch ports were “hard-coded” to become access ports and put in the VLAN respective
to its connected host.

The distribution switches in the network were also configured with default gateways and
configured as VTP servers. We manually configure our trunking ports to trunk mode:
Acc3(config-if)#switchport trunk encapsulation dot1q
Acc3(config-if)#switchport mode trunk

VLAN access could further be configured to restrict specific VLAN traffic:


Acc3(config-if)#switchport trunk allowed vlan 1,100,200,300

We verify trunking between access and distribution switches by executing the following command:
DS2#show int trunk

Port Mode Encapsulation Status Native vlan


Fa0/3 on 802.1q trunking 1
Fa0/4 on 802.1q trunking 1
Fa0/5 on 802.1q trunking 1

Port Vlans allowed on trunk


Fa0/3 1,100,200,300
Fa0/4 1,100,200,300
Fa0/5 1,100,200,300

Port Vlans allowed and active in management domain


Fa0/3 1,100,200,300
Fa0/4 1,100,200,300
Fa0/5 1,100,200,300

Port Vlans in spanning tree forwarding state and not pruned


Fa0/3 1,200,300
Fa0/4 1,100,200,300
Fa0/5 1,200,300

Once these switches are configured as VTP servers with the matching domain name and
password, they begin to send VLAN information.
Acc3(config)#vtp mode server Sets VTP to server mode

Acc3(config)#vtp domain team1


Changing VTP domain name from cisco to team1 Sets the VTP domain name (must match)

Acc3(config)#vtp password cisco Sets the VTP domain password (must match)

Finally, the VLANs are created on the distribution switches (VTP servers) and the VLAN
information is then propagated to the client (and server or transparent) switches participating in this
VTP instance.

We know that the only way for a host in one VLAN to pass traffic to a host in a different VLAN is
to introduce routing either statically or dynamically. In order to first “tell” a multi-layer switch that it
will perform as a layer 3 device, the following command must be issued:
DS2(config)#ip routing

At this point, devices within the same VLAN are able to communication with each other. We
verify this with ping commands.

Part 3 – Configuring Routed Interfaces


Our next step to configure inter-VLAN traffic is to determine the means by which to route, in our
case by using EIGRP, a dynamic routing protocol. This is performed on all distribution switches:

DS1_3560_5(config)#router eigrp 1 Creates EIGRP routing instance

DS1_3560_5(config-router)#network 176.1.0.0 0.0.0.63


DS1_3560_5(config-router)#network 176.1.0.64 0.0.0.63 Identifies networks (interfaces) that
DS1_3560_5(config-router)#network 176.1.0.128 0.0.0.63
DS1_3560_5(config-router)#network 176.1.0.192 0.0.0.15 will participate in the EIGRP routing
DS1_3560_5(config-router)#network 176.1.0.216 0.0.0.3 instance
DS1_3560_5(config-router)#network 176.1.0.220 0.0.0.3

Our next steps were to configure links between core and distribution as routed ports, configure
an ether-channel between the core switches, and verify operation of EIGRP:

DS1_3560_5(config-if)#no switchport Makes a switch port a routed port

NOTE: During this portion of the lab exercise, we identified a problem with a single workstation
communicating. What we saw from a Wireshark capture was that one PC was rejecting ARP
requests. We finally rebooted the machine to resolve the issue, which led us to believe that the
workstation was possibly “latched” onto a previously configured IP address and network.

Our next step was to verify routing. Routing table from DS1 perspective looks like this:
DS1_3560_5#sho ip route

Gateway of last resort is not set

176.1.0.0/16 is variably subnetted, 11 subnets, 4 masks


C 176.1.0.128/26 is directly connected, Vlan300
D 176.1.0.254/32 [90/158720] via 176.1.0.213, 00:58:19, FastEthernet0/2
D 176.1.0.224/30 [90/30720] via 176.1.0.213, 01:02:40, FastEthernet0/2
[90/30720] via 176.1.0.209, 01:02:40, FastEthernet0/1
D 176.1.0.228/30 [90/30720] via 176.1.0.213, 01:02:40, FastEthernet0/2
C 176.1.0.208/30 is directly connected, FastEthernet0/1
C 176.1.0.212/30 is directly connected, FastEthernet0/2
D 176.1.0.216/30 [90/28416] via 176.1.0.194, 01:02:41, Vlan1
[90/28416] via 176.1.0.130, 01:02:41, Vlan300
[90/28416] via 176.1.0.66, 01:02:41, Vlan200
[90/28416] via 176.1.0.2, 01:02:41, Vlan100
D 176.1.0.220/30 [90/28416] via 176.1.0.194, 01:02:41, Vlan1
[90/28416] via 176.1.0.130, 01:02:41, Vlan300
[90/28416] via 176.1.0.66, 01:02:42, Vlan200
[90/28416] via 176.1.0.2, 01:02:42, Vlan100
C 176.1.0.192/28 is directly connected, Vlan1
C 176.1.0.0/26 is directly connected, Vlan100
C 176.1.0.64/26 is directly connected, Vlan200

We also confirm successful operation of the ether-channel:


6500_1_exit#sh etherchannel
Channel-group listing:
-----------------------

Group: 1
----------
Group state = L3
Ports: 2 Maxports = 16
Port-channels: 1 Max Port-channels = 16
Protocol: LACP

At this point, we are able to successfully ping “around” the network and between VLANs.

Part 4 – Monitoring the Network


In monitoring the network, we’ll first observer spanning tree in operation between the access
and distribution switches, since these are connected with redundant links and susceptible to a loop
without STP running. The following page is a breakout of the results from a converged spanning tree
operation between these 5 switches. From the output of DS1, we can see that it is functioning as the
root for VLAN100

Based on the topology, spanning tree ensures redundancy without loops between the access
and distribution layers. However, there is a single connection at the core layer to the internet router. If
Core2 were to fail, access to the internet from this network would be unavailable, as well as access from
the internet to this network.

You might also like