Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Objectives
Upon completing this lesson, you will be able to produce a design plan and implementation
plan for a layer 2 network based on given business and technical requirements. You will then
implement the plan and perform verifications while identifying checkpoints along the way. This
ability includes being able to meet these objectives:
Review and verify your solution, as well as your findings and action log against a set of
checkpoints provided by the instructor.
Consolidate the lessons learned during the review discussions into a set of best practice
methods and commands to aid you in future deployment procedures
SWITCH v1.08-2
This lab consists of six switches to be configured in a coordinated manner to offer layer 2
connectivity throughout your pod. Several devices are to be connected at a later time to your
different switches, which makes that your solution must be effective without the possibility to
fully test all devices communications. Some devices are present in the topology to help you
verify their connectivity. Your configuration tasks were centered on port configuration, that
would have to be set to specific VLANs or trunk. The difficulty of the exercise was to
determine which ports would have to be trunk, which VLANs would have to be allowed, and
which ports would have to be set as access ports.
8-4
Task 3 - Implementation
Configure switches based on implementation plan
Verify configuration during/after implementation
ROUTE v1.02-3
Lab 8-1 consists of three tasks which need to be completed in order to fulfill the lab
requirements.
In Task 1, you need to finish the initial design based on given information and requirements.
In Task 2, you need to create a full implementation plan based on the design, including
verification steps before and after the implementation.
In Task 3, you actually configure your pod switches based on your implementation plan.
In Task 4, you verify the ports correct configuration.
Work with your instructor to decide which VLANs need to be configured on which switches
and determine the traffic flow. Then verify which port needs to be in access mode, in which
VLAN, and which port needs to be in trunk mode. On each trunk, list which VLANs should be
allowed.
8-5
Implementation Plan
Which items should be configured, and in which order?
VLAN assignment to ports?
Trunk configuration?
Layer 2 verification?
VLAN pruning on trunks?
VLANs creation?
Layer 3 (ping) verification?
SWITCH v1.08-4
A successful implementation plan allows configuring the devices with the minimum about of
duplication. In other words, an implementation plan is efficient when you do not need to alter
your previous configuration to implement new items. You should proceed in a logical order.
The above list represents all the configuration tasks. List them in the most efficient order.
8-6
SWITCH v1.08-5
8-7
Sample Solution
This topic describes a sample solution for the lab.
SWITCH v1.08-6
Configuration Checkpoints
ASW1:
Autonomous AP on port f0/4:
Port in trunk mode
Allowed VLANs 14 and 63
ASW2:
Lightweight AP on port f0/12
Port in access mode, in VLAN 11
H-REAP AP on port f0/11:
Port in trunk mode
Allowed VLANs 14 and 63
8-8
SWITCH v1.08-7
SWITCH v1.08-8
The above lists of tasks are example of configuration that can be conducted on the various
switches in your lab topology to implement the solution. Other solutions may be possible. One
possible variation lies in the trunk configuration to the 4404 controller. The solution described
here relies on link aggregation, as stated by the lab exercise. In a real network, you may also be
requested to configure the links to the controllers as trunks, without link aggregation. The
correct solution depends on the controller configuration.
8-9
Verification
Verification commands
show vlan
show interface
show interface trunk
show interface switchport
show interface etherchannel
show vtp status
show running-config interface
SWITCH v1.02-11
After each configuration task takes place, you may use verification commands to ensure
successful implementation. Several show commands can be used and the most relevant are
listed here:
8-10
show vlan: Display the VLAN database to verify VLANs have been created.
show interface trunk: Display information about the trunk status of an interface.
Verification Points
Correct VLANs assigned to ports
Port mode verified, access or trunk
VLAN allowed on trunk ports
Etherchannel ports are active
SWITCH v1.08-10
During the configuration and verification phase, an implementer can verify success using
several checkpoints. After completing all configuration tasks, the implementation may be
successful or may require additional configuration and verification. These checkpoints can help
speed a successful installation.
Checkpoints during a layer 2 network installation can include:
Switchports are active and client devices can ping the network.
Trunks are active and network traffic flows from switch to switch.
8-11
Summary
This topic summarizes the key points that were discussed in this lesson.
Summary
Creation of an implementation plan depends on business and
technical requirements
Configuration of a network is based on the implementation plan
Verification of the implementation is critical
8-12
SWITCH v1.02-13
8-13