4.5.2 Lab Implement Inter VLAN Routing
4.5.2 Lab Implement Inter VLAN Routing
Topology
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
R1
G0/0/1.20 192.168.20.1 255.255.255.0 N/A
R1
G0/0/1.30 192.168.30.1 255.255.255.0 N/A
R1
G0/0/1.1000 N/A N/A N/A
VLAN Table
VLAN Name Interface Assigned
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Create VLANs and Assign Switch Ports
Part 3: Configure an 802.1Q Trunk between the Switches
Part 4: Configure Inter-VLAN Routing on the Router
Part 5: Verify Inter-VLAN Routing is working
Background / Scenario
Modern switches use virtual local-area networks (VLANs) to improve network performance by
separating large Layer 2 broadcast domains into smaller ones. VLANs can also be used as a
security measure by separating sensitive data traffic from the rest of the network. In general,
VLANs make it easier to design a network to support the goals of an organization.
Communication between VLANs requires a device operating at Layer 3 of the OSI model. Adding
an inter-VLAN router allows the organization to segregate and separate broadcast domains while
simultaneously allowing them to communicate with each other.
VLAN trunks are used to span VLANs across multiple devices. Trunks allow the traffic from
multiple VLANs to travel over a single link, while keeping the VLAN identification and
segmentation intact. A particular kind of inter-VLAN routing, called “Router-on-a-Stick”, uses a
trunk from the router to the switch to enable all VLANs to pass to the router.
In this lab, you will create VLANs on both switches in the topology, assign VLANs to switch
access ports, verify that VLANs are working as expected, create VLAN trunks between the two
switches and between S1 and R1, and configure Inter-VLAN routing on R1 to allow hosts in
different VLANs to communicate, regardless of which subnet the host resides.
Note: The routers used with CCNA hands-on labs are Cisco 4221 with Cisco IOS XE Release
16.9.4 (universalk9 image). The switches used in the labs are Cisco Catalyst 2960s with Cisco
IOS Release 15.2(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be
used. Depending on the model and Cisco IOS version, the commands available and the output
produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table
at the end of the lab for the correct interface identifiers.
Note: Ensure that the routers and switches have been erased and have no startup configurations.
If you are unsure contact your instructor.
Required Resources
● 1 Router (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or comparable)
● 2 Switches (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
● Console cables to configure the Cisco IOS devices via the console ports
Instructions
Part 1: Build the Network and Configure Basic Device Settings
In Part 1, you will set up the network topology and configure basic settings on the PC hosts and
switches.
configure terminal
hostname R1
d. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered
commands as though they were host names.
////////////////////////////////////////////////////
e. Assign class as the privileged EXEC encrypted password.
line console 0
password cisco
login
R1(config)# exit
R1# copy running-config startup-config
/////////////////////////////////////////
k. Set the clock on the router.
hostname S1
hostname S2
b. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered
commands as though they were host names.
c. Assign class as the privileged EXEC encrypted password.
d. Assign cisco as the console password and enable login.
e. Assign cisco as the vty password and enable login.
f. Encrypt the plaintext passwords.
g. Create a banner that warns anyone accessing the device that unauthorized access is
prohibited.
h. Set the clock on the switch.
i. Save the running configuration to the startup configuration.
Se ejecutan los mismos comandos que para el router.
2) S2
S2(config)# vlan 10
S2(config-vlan)# name Management
S2(config-vlan)# vlan 20
S2(config-vlan)# name Sales
S2(config-vlan)# vlan 30
S2 (config-vlan) # name Operations
S2(config-vlan)# vlan 999
S2(config-vlan)# name Parking_Lot
S2 (config-vlan) # vlan 1000
S2(config-vlan)# name Native
S2(config-vlan)# exit
b. Configure the management interface and default gateway on each switch using the IP
address information in the Addressing Table.
c. Assign all unused ports on the switch to the Parking_Lot VLAN, configure them for static
access mode, and administratively deactivate them.
Nota: El comando interface range es útil para llevar a cabo esta tarea con los pocos
comandos que sea necesario.
S1(config)# interface range f0/2 - 4 , f0/7 - 24 , g0/1 - 2
S1(config-if-range)# switchport mode access
S1(config-if-range)# switchport access vlan 999
S1(config-if-range)# shutdown
notes: switchport mode access forces the port to be an access port while and any device
plugged into this port will only be able to communicate with other devices that are in the same VLAN.
Using the “Switchport mode trunk” command forces the port to be trunk port.
S1(config-if-range)#shutdown
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/3, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/4, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/7, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/8, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/9, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/10, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/11, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/12, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/13, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/14, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/15, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/16, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/17, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/18, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/19, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/20, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/21, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/22, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/23, changed state to administratively
down
%LINK-5-CHANGED: Interface FastEthernet0/24, changed state to administratively
down
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to administratively
down
%LINK-5-CHANGED: Interface GigabitEthernet0/2, changed state to administratively
down
S1(config-if-range)#
Note: The interface range command is helpful to accomplish this task with as few commands as
necessary.
c. Specify that VLANs 10, 20, 30, and 1000 are allowed to cross the trunk.
d. Verify trunking ports, the Native VLAN and allowed VLANs across the trunk.
2) Specify that VLANs 10, 20, 30, and 1000 are allowed to cross the trunk.
c. Verify trunking.
Question:
Step 2: Complete the following tests from PC-A. All should be successful.
Note: You may have to disable the PC firewall for pings to work
a. Ping from PC-A to its default gateway.
b. Ping from PC-A to PC-B
c. Ping from PC-A to S2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
4221 Gigabit Ethernet 0/0/0 Gigabit Ethernet 0/0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(G0/0/0) (G0/0/1)
4300 Gigabit Ethernet 0/0/0 Gigabit Ethernet 0/0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(G0/0/0) (G0/0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and
how many interfaces the router has. There is no way to effectively list all the combinations of
configurations for each router class. This table includes identifiers for the possible combinations of
Ethernet and Serial interfaces in the device. The table does not include any other type of interface,
even though a specific router may contain one. An example of this might be an ISDN BRI interface.
The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to
represent the interface.
End of document