Sei sulla pagina 1di 59

Wolkite University

Department of Information Systems

Systems and Network


Administration

Lesson II: Switching


1
Switched Network Hierarchy

 The switched network must deliver on current requirements and future required
services and technologies. some design guidelines for switched network are built
upon the following principles:
1. Hierarchical
2. Modularity
3. Resiliency
4. Flexibility
Core, Distribution, Access
Role of Switched Networks

 It allows more flexibility, traffic management, and additional


features, such as:
1. Quality of service
2. Additional security
3. Support for wireless networking and connectivity
4. Support for new technologies, such as IP telephony and mobility
services
Switched Networks: Form Factor

 There are various types of switches used in business networks.


 It is important to deploy the appropriate types of switches based
on network requirements.
 some common business considerations when selecting switch
equipment.
 Cost
 Port Density
 Power(POA)
 Reliability
 Port Speed
 Frame Buffers
 Scalability
Switched Networks: Form Factor

Fixed
Switched Networks : Form Factor

Modular
Switched Networks: Form Factor

Stackable
 Cisco StackWise technology allows the
interconnection of up to nine switches.

Stackable switches use a special port for


interconnections.

Many Cisco stackable switches also support


StackPower technology, which enables power sharing
among stack members.
Switching as a General Concept

A Switch makes a decision based on ingress and destination port


 A LAN switch keeps a table that it uses to determine how to forward
traffic through the switch
 switches forward Ethernet frames based on the destination MAC
address of the frames.
Dynamically Populating a Switch MAC Address Table
 A switch must first learn which devices exist on each port before it
can transmit a frame
 It builds a table called a MAC address, or content addressable
memory (CAM) table
 The mapping device <-> port is stored in the CAM table
 CAM is a special type of memory used in high-speed searching
applications.
 The information in the MAC address table is used to send frames
 When a switch receives an incoming frame with a MAC address
that is not found in the CAM table, it floods it to all ports but the
one that received the frame.
Switch Forwarding Methods
Store-and-Forward Switching
 Store-and-Forwarding allows the switch to:
– Check for errors (via FCS check)
– Perform Automatic Buffering
 Slower forwarding
Cut-Through Switching
 Cut-Through allows the switch to start forwarding in about 10 microseconds
 No FCS check
 No Automatic Buffering
Switching Domains: Collision Domains
Collision domain is the segment where devices must
compete to communicate
All ports of a hub belong to the same collision domain
Every port of a switch is a collision domain on its own
A switch break the segment into smaller collision domains,
easing device competition.
Switching Domains: Broadcast Domains
Broadcast domain is the extend of the network
where a broadcast frame can be heard.
Switches forward broadcast frames to all ports.
Therefore switches don’t break broadcast domains.
All ports of a switch (with its default configuration)
belong to the same broadcast domain
If two or more switches are connected, broadcasts
will be forward to all ports of all switches (except
for the port that originally received the broadcast)
Alleviating Network Congestion

Switches help alleviating network congestion by:


• facilitating the segmentation of a LAN into separate
collision domains
• providing full-duplex communication between devices
• taking advantage of their high port density
• buffering large frames
• employing high speed ports
• taking advantage of their fast internal switching
process
• having a low per-port cost
Preparing for Basic Switch Management
• In order to remotely manage a Cisco switch, it needs
to be configured to access the network
• An IP address and a subnet mask must be configured
• If managing the switch from a remote network, a
default gateway must also be configured
• The IP information (address, subnet mask, gateway)
is to be assigned to a switch SVI (switch virtual
interface)
• Although these IP settings allow remote
management and remote access to the switch, they
do not allow the switch to route Layer 3 packets.
Preparing for Basic Switch Management
Duplex Communication
Configure Switch Ports at the Physical Layer
Verifying Switch Port Configuration
Port Security: Operation

 Port security limits the number of valid MAC addresses allowed on a


port
 The MAC addresses of legitimate devices are allowed access, while
other MAC addresses are denied
 Any additional attempts to connect by unknown MAC addresses will
generate a security violation
 Secure MAC addresses can be configured in a number of ways:
• Static secure MAC addresses
• Dynamic secure MAC addresses
• Sticky secure MAC addresses
Port Security: Violation Modes

 IOS considers a security violation when either of these situations


occurs:
• The maximum number of secure MAC addresses for that interface have
been added to the CAM, and a station whose MAC address is not in the
address table attempts to access the interface.
• An address learned or configured on one secure interface is seen on
another secure interface in the same VLAN.

 There are three possible action to be taken when a violation is


detected:
• Protect
• Restrict
• Shutdown
Port Security: Configuring

 Configuring Dynamic Port Security


Port Security: Configuring

 Configuring Port Security Sticky


Port Security: Verifying

 Verifying Port Security Sticky


Port Security: Verifying

 Verifying Port Security Sticky – Running Config


Port Security: Verifying

 Verifying Port Security Secure MAC Addresses


Ports In Error Disabled State

 A port security violation can put a switch in error disabled


state
 A port in error disabled is effectively shut down
 The switch will communicate these events through console
messages
Ports In Error Disabled State

 The show interface command also reveals a switch port on


error disabled state
Ports In Error Disabled State

 A shutdown/no shutdown interface command must be


issued to re-enable the port
VLAN Definitions
• VLAN (virtual LAN) is a logical partition of a layer 2 network
• Multiple partition can be created, allowing for multiple
VLANs to co-exist
• Each VLAN is a broadcast domain, usually with its own IP
network
• VLANS are mutually isolated and packets can only pass
between them through a router
• The partitioning of the layer 2 network takes inside a layer 2
device, usually a switch.
• The hosts grouped within a VLAN are unaware of the VLAN’s
existence
VLAN Definitions
Benefits of VLANs
• Security
• Cost reduction
• Better performance
• Shrink broadcast domains
• Improved IT staff efficiency
• Simpler project and application management
Types of VLANs
• Data VLAN
• Default VLAN
• Native VLAN
• Management VLAN
Types of VLANs
VLAN Trunks
• A VLAN trunk carries more than one VLAN
• Usually established between switches so same-
VLAN devices can communicate even if physically
connected to different switches
• A VLAN trunk is not associated to any VLANs.
Neither is the trunk ports used to establish the
trunk link
• Cisco IOS supports IEEE802.1q, a popular VLAN
trunk protocol
VLAN Trunks
Controlling Broadcast Domains with VLANs

• VLANs can be used to limit the reach of broadcast


frames
• A VLAN is a broadcast domain of its own
• Therefore, a broadcast frame sent by a device in a
specific VLAN is forwarded within that VLAN only.
• This help controlling the reach of broadcast frames
and their impact in the network
• Unicast and multicast frames are forwarded within
the originating VLAN as well
Tagging Ethernet Frames for VLAN Identification

• Frame tagging is used to properly transmit multiple VLAN


frames through a trunk link
• Switches will tag frames to identify the VLAN they belong.
Different tagging protocols exist, with IEEE 802.1q being a
very popular one
• The protocol defines the structure of the tagging header
added to the frame
• Switches will add VLAN tags to the frames before placing
them into trunk links and remove the tags before
forwarding frames through non-trunk ports
• Once properly tagged, the frames can transverse any
number of switches via trunk links and still be forward
within the correct VLAN at the destination
Tagging Ethernet Frames for VLAN Identification
Native VLANs and 802.1q Tagging
• A frame that belongs to the native VLAN will not
be tagged
• A frame that is received untagged will remain
untagged and placed in the native VLAN when
forwarded
• If there are not ports associated to the native
VLAN and no other trunk links, an untagged frame
will be dropped
• In Cisco switches, the native VLAN is VLAN 1 by
default
Creating a VLAN
Assigning Ports To VLANs
Changing VLAN Port Membership
Changing VLAN Port Membership
Deleting VLANs
Verifying VLAN Information
Verifying VLAN Information
Configuring IEEE 802.1q Trunk Links
Resetting the Trunk To Default State
Resetting the Trunk To Default State
Verifying Trunk Configuration
Addressing Issues with VLAN
• It is very common practice to associate a VLAN with a IP network
• Since different IP networks only communicate through a router,
all devices within a VLAN must be part of the same IP network in
order to communicate
• In the picture below, PC1 can’t communicate to the server
because it has a wrong IP address configured
Missing VLANs
• If all IP addresses mismatch have been solved but
device still can’t connect, check if the VLAN exists in
the switch.
Introduction to Troubleshooting Trunks
Common Problems With Trunks
• Trunking issues are usually associated with incorrect configurations.
• The most common type of trunk configuration errors are:
1. Native VLAN mismatches
2. Trunk mode mismatches
3. Allowed VLANs on trunks
• If a trunk problem is detected, the best practice guidelines recommend
to troubleshoot in the order shown above.
Trunk Mode Mismatches
• If a port on a trunk link is configured with a trunk mode that
is incompatible with the neighboring trunk port, a trunk link
fails to form between the two switches
• Check the status of the trunk ports on the switches using
the show interfaces trunk command
• To fix the problem, configure the interfaces with proper
trunk modes.
Incorrect VLAN List
• VLANs must be allowed in the trunk before their
frames can be transmitted across the link
• Use the switchport trunk allowed vlan command to
specifuy which VLANs are allowed in a trunk link
• To ensure the correct VLANs are permitted in a trunk,
used the show interfaces trunk command

Potrebbero piacerti anche