3.4.6 Lab - Configure VLANs and Trunking

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to old in this video we are going to discuss CCNA version 7 lab activity configure VLANs and trunking before coming to this activity fronts if you like to get any CCNA project support or a CCNA version 7 online classes you can contact our team using our website link you will get from the description below and also if you like to get these type of technical videos in future considered subscribing also don't forget to enable that bell icon new to the subscribe button so that you will get notification message whenever we upload a new video now back to our lab activity here we can see the topology and it's a dressing table ok we will go through the objectives built the network and configure basic device settings then create VLANs and are seen as switch ports maintain beer and pot assignments and the VLAN database also we will configure an eighth note to dot1q trunk between the switches and we will delete the VLAN database and also we will go through the scenario mode on switches use virtual local area networks that is VLANs to improve network performance by separating large layer to broadcast domains into smaller ones billions can also be used as a security measure by controlling which house communicate in general billions make it easier to design a network to support the goals of an organization villian trunks are used to span VLANs across multiple devices trunks allow the traffic from multiple VLANs to travel over a single link while keeping the VLAN identification and the segmentation intact in this lab we will create VLANs on both switches in the topology as in billions to switch access ports verify that billions are working as expected and then create a VLAN trunk between the two switches to allow house in the same VLAN to communicate through the trunk regardless of the switch the host is actually attached to they given a knot here the switches are used to be the CCNA handsewn lamps are a Cisco Catalyst tune and 6 0 s series with the Cisco IOS released 15 point to other routers switches and the Cisco IOS versions can be used depending on the model and the Cisco IOS version and the commands available and the output produced might vary from what is shown in the labs refer to the router interface summary table at the end of the lab for the collective interface identifier again a note ensured that the routers and switches have been erased and have no startup configurations if you are unsure contact your instructor anyways here we are going to use this co-packer face or so no need to worry about these tab configurations and here they mentioned at our acuity resources we require a two switches that is his core two nine six zero series then we rotate two PC's then record console cables to configure the cisco iOS devices via the console ports then we record if that cables are shown in the topology so in part one builder the network and configure basic device settings we will set up the network topology and configure basic settings on the pc host and switches that can be done cable the network as a shown in the topology attached to the devices as shown in the topology diagram and the cable as necessary coming to or a topology we will a design this topology in our packet tracer we will add at two as switches coming to network devices switches you will use it two and six zero series then we will rename these switchers as for the topology its s1 and this is s2 then we will have two PC's that is NT devices and ER this is a pc - a and here we have pc - B now we will connect these devices coming to connections so we will have copper straight through just will press control and we will select this a copper straight through so that we can connect all these devices control press control from the keyboard and we can press ok so coming to s1 here we will select the faster third 0/6 to this PC - a faster third zero then again from s1 faster third 0/1 on s2 fastethernet 0/1 then from s2 faster third 0 / 18 to this PC - be in step to configure basic settings for each switch consoling to the switch and enable privileged x ik mode then enter a configuration mode and have seen a device name to the switch sure we are not going to connect console cable because we can access each devices using its a CLA sure we can see that so here we will give enable then configure terminal or we can give the short command it's a conf space T or we can press conf tab button from the keyboard then T tab press enter so here we will set the house name press tab as yes one so here we can see the house name is changed from the default name switch to s1 now we will go to s to CLI press Enter enable configure terminal and here we can give a hostname as as - next is a disable DNS lookup to prevent the router from attempting to translate incorrectly and take commands as through there were house names ok we can do that we will go to s1 and we disable this DNS lookup the command is no IP domain lookup presenter and coming to s2 here also we have to give a no IP domain and look up next is a sane class asleep related x''k encrypted password then assign as his course the console password and enable logon then assign Cisco as the vty password and enable login ok we will do that coming to s1 first of all we will enable secret and they mentioned the password as class enable a secret password is class now we will go to line console 0 and we will enable the password as Cisco then we will give you the command log in now we will exit then we will go to the line vty for all the lines from 0 to 15 we will let set the password as cisco then login now we will do it on s2 will enable a secret as class then we will go to line console 0 and we will have set the password as cisco he will give you the login command exit and then go through a line vty for all the lines from 0 to 15 that means the 16 lines set the password as cisco then a login next is encrypt the plaintext transmits also we can create a banner that once anyone accessing the device that unauthorized access is prohibited ok these two can be done we will go to s1 and here we can set the first we encrypt all the plaintext passwords we have the command service password encryption now we will the set banner motd banner message of the day he will start with the delimiter he will give a warning will give a message okay now we will go - yes - he will give a service password encryption then press enter so we can see that command okay then now we have to set the banner motd and we will set the message any message any running message we can give and otherwise the access is strictly prohibited nephew's configure the IEP a trusted listed in the addressing table for VLAN 1 on the switch ok then now we have to go to a dressing table and here we can see VLAN 1 IP address for the device s1 and s2 1.11 and 1.12 with a certain to mask we will set this address in over as switches so coming to s1 here we can see just I will copy this a Patras ok now we will go to interface vlan1 and we will let the IP address here is that address then it's certain to mask then we have to even though she'd command no shutdown no we will go to s to interface vlan1 and here is the IP address it's a 1.12 then it's something to mask then not shutdown command you will see what is next now shut on all interfaces that will not be used okay that can be done it's for the security purpose coming to our topology here we can see in this switch s1 we used at two ports that is FA 0 / 6 and the FS 0 / 1 so except these two ports we will shut down all other thoughts ok we can do that we will accept and here we will go to the interface as a range faster thir net 0 / 2 till 5 because one be already used and the six also used then coma again a fashio third net 0 / 7 onwards Tilted 24 sorry also we have a two gigabit ethernet interfaces we will give G 0 / 1 - 2 you will shut down all these interfaces now we will disable all the ports I mean all the unused ports in this switch S 2 so coming to the topology here we can see we used faster third 0 / 1 + 0 / 18 in this switch so we will disable all ports except these two ports you will go to s 2 and the hero will give a configure terminal then we will go to the interfaces arranged faster turret 0/2 till 17 because one we used and 18 also used then faster third at 0 / 19 till 24 also we have a two gigabit ethernet interfaces G 0 / 1 - 2 then presenter he will give Shahram next ISA set the clock on the switch okay that can be done we will now set that we will go to s1 password is cisco enable password is class here we can verify the clock so here we can see it's incorrect we will set the clock clock we will set that time we will give a 1000 minutes so then seconds then we have to set the date it's a 3 then the month it's a May then that your it's 2020 the same way we can do it in s2 coming - yes - we will exit from this we can press control is it then press enter we will let's check the clock show clock and here we can see it's incorrect so we will set the clock clock set then maybe let's at that time it's hour then minute then seconds then we have to give the date it's a 3 then the month then the year 2020 now we can verify the show clock and here we can see the time date and the Europe next is say figuration to the startup configuration file okay we can do that we will save from a ramp to NB ROM we have the command copy running-config this + R then tab button then startup config then press Enter destination file name default ok then press Enter now we will do it on s to copy running-config space static - config ok static - config the file name yes in step 3 configure the PC host refer to the dressing-table for pc host address information ok we will configure these pcs as per our addressing table coming to PC - a here we can see the IP address or 192.168.1.3 so just to be copy this address and here we can see it's something to mask you will give it here then also they given the default gateway - 10.1 next is PC - be it's one ninety two dot one six eight dot a 10.4 coming to PC - B we will go to desktop IP configuration and here is its address then it's a default gateway it's 10.1 correct we will see what is next okay now step four test connectivity verify that the PC host can't pink one another it may be necessary to disable the PCs firewall to ping between pcs anyways we are doing in packet race or so no need to worry about the firewall so can PC - a ping PC - B can t see - a ping s1 ok we will test that first of all we will ping from PC - a - PC - B you will go to PC - a and here we will give the command ping and PC - B IEP address it's here and here we can see we get the replies now we will ping to our a switch yes one sure is that a trust just will copy that and we will thing to it and we can see request timed out we can see it's failed so here why it's failed the ping from PC - a - this s1 here we can see this s1 and s2 they are in one subnet and the PC - a and PC - B they are in another subnet so the ping failed so here we will get the reply only from PC - B if you ping - if you think from PC - a to s1 or s2 it will fail next is scan PC - B ping is - it won't work we can try that it's from PC - B we will go to PC - B and command prompt here we will give the ping command it's a 1.12 so we can see get the request timed out we can see it's failed next is can s1 ping s2 yes it will work because they are in the same subnet we can try we will a ping from s1 and here we can give that command a ping to s2 it's 12 ok here we have to give only one ping so success rate is 60% ok once more we will try so that we will get 100 percentage sure we can see success all right is a hundred percent if you answered no to any of the above questions why were the pings and successful yes all D we discussed that sure from PC - a we cannot ping - yes one also from PC - B it's failed - yes - because they are in a different subnet no coming to party to create VLANs and the same as switch ports in party - we will create a management operations parking lot and an ATV lands on both switches you will then assign the VLANs to the appropriate interface then the chauvelin command is used to verify your configuration settings create a valence on the switches so we are going to create these VLANs so with names we learnt in operations VLAN 20 it's a packing and a score lot and we learn 99 management then we learnt thousand as a native here they given the command how we have to create the VLANs so we will do that on s1 you will go to s1 will give a configure terminal we'll keep it here yeah we go terminal then we will create a VLAN 10 and we will give the name as operations then we will create a VLAN 20 name us a parking underscore a lot then you create a VLAN 99 name as a management then we lend thousand name is a native tenant next create the same VLANs on s2 also ok we can do that we will close this s1 then we will go to s2 password is cisco enable password is class configure terminal here we will create the VLAN VLAN 10 name operations VLAN 20 name parking underscore a lot then VLAN 99 we can give the shortcut VL is enough VLAN 99 then a name management then we have a VLAN 1000 name us a net to the end issue the show VLAN brief command to view the list of violence on s1 so we are going to give this a show command to show wheel and brief and we can see the VLANs we created 10 20 99 and to 1000 with its a name ok what is the default VLAN in this output itself we can see it so VLAN 1 is the default and what for are saying to the default Avilan yeah by default the old the poor so that is from faceted on Co slash one till 24 also to Gigabit Ethernet interfaces are assigned to VLAN 1 we will verify in or a switch s1 you will go to s1 and here we will do the show command show VLAN brief and here we can see the details here we have the VLANs created 10 20 99 and 1000 with it's a named VLAN name and we can see they are active and here we can see the default to VLAN that is VLAN 1 its name is default and we can see all the interfaces are assigned to this default to VLAN 1 in step to assign VLANs to the character switch interfaces a symbol ends to the interfaces on s1 ok I see in PC - a - the operation VLAN 1 we can see now this PC - a is connected to the port faster third zeroes are six in this switch s1 so we will go to that interface and then we will give the modest switch Oporto modest access then we will assign VLAN 10 to this port FA 0 / 6 we will do that configuration we will go to s1 then here we will go to that interface you will go to global configuration mode configure a terminal then the interface it's faster third at to 0 / 4 6 then we will have seen a switch report Ahmad us access now we will give us a chip or to access VLAN it's a no 10 now move the switch IP address VLAN 99 yes previously we said IP address for this a VLAN one for the management purpose now we have to change we have to move this IP address to the interface VLAN 99 because we created VLAN 99 for the management purpose okay so first of all we are to go to VLAN 1 then we have to remove the IP address and we have to assign that IP address to VLAN 99 ok we will do that coming to our switch s1 we will exit from this then we will go to interface VLAN 1 right here we will give you no IP address so that they are saying the IP address will be removed now we will go to for that adjust we will exit and then we will go to the interface VLAN 99 and here we will assign the IP address as per our dressing table this is the IP address for this s which s one issue the show we learn brief command and verify that the villains are assigned to the correct interfaces also we can issue the show IP interface brief command and what is the status of VLAN 99 and explain okay first of all we will give before that just will press control is that so that we can go to privileged exec mode here we will give a show a VLAN brief then press enter here we can see the details we can see this port first pair of 0/6 now assigned to VLAN 10 now we will give the commander show IP interface brief show IP interface brief and here we can see the status of VLAN 99 correct you can see VLAN 99 so we can see it status up but we can see this protocol is down sure we can see status up and the protocol down because actually this V and all D created it is in the database so that's why it's up but we can see this VLAN is known as into any port that's why it is protocol or shows it down ok right next is a same PC - B - the operations VLAN on s2 you will go to is - then here enter password is cisco enable password is class ok now we will give a configure terminal we will go to that interface fastethernet 0/1 which is connected to a PC - B here we can see that this a PC - B is connected to the interface a fast return 0 / 18 in this switch is - ok so here we will give the support mode as access then we will give us a chip access to VLAN 10 remove the IP address for VLAN 1 on s2 ok we will do that then we have to configure an IP address for VLAN 99 or as 2 according to the addressing table okay first of all we will remove the IP address for the interface vlan1 no IP address you will exit and then we will go to the interface it's a VLAN 99 and here we will assign the IP address as per our addressing table it's one turtle ok then press Enter use the show VLAN brief command to verify that the villains are assigned to the correct interfaces okay so is s1 able to ping s to explain anyways before that we will I play this show command just will press control is at hand we will go to privilege exit mode here we will give a show VLAN brief command and we can see the details here we can see this port fast 2/3 of 0 / 18 is assigned to VLAN 10 next is is s1 able to ping is to explain I don't think so it will work anyways we will try it just I will copy this IP address we will go to yes 1 and here we will give ping - yes - it's a IP address is 1.12 correct and press ENTER and we will check it I think it's not working it won't work not out so we can see success rate is 0% why it's not working actually we assign the DS IP address for the VLAN 99 and here by default these supports allows only VLAN 1 the default VLAN next DC's PC - a able to ping PC - be explained it won't work already be told the link between s1 and s2 will allow only the frame which is tagged with the VLAN 1 but a now our PC - a and the PC - B they are in VLAN 10 and this VLAN 10 won't be allowed through this link anyways we will test it will go to PC - a command prompt and here we can use the up arrow so that we will get the command or we can view that ping and here is PC - B IP address and we are waiting for the replies we will get a request timed out we can see it's failed packets sent e4 but received a zero loss - for 100% loss now in part 3 maintain be LAN port assignments and the VLAN database in part 3 we will change Evelyn assignments to ports and removal answer from the VLAN database so in step 1 are saying a VLAN to multiple interfaces on s1 assign interfaces from foster of 0 / 11 till 24 - VLAN 99 and here we can see that command we have to go to at those interfaces or cell range from FA 0 / 11 till 24 then we have to give us which reporter modest access then we have to give us a report access VLAN 99 we will do the configuration coming to s1 okay here we will give a configure terminal now we will go to the interface a cell range faster third at the 0 / 11 till 24 ok then press enter now we can give such reporter mode as access then we have to give you support access VLAN hi its civilian 99 now we will end it now issue the show.we and brief command to verify VLAN assignments okay here we will give a show VLAN brief and here we can see the details all those interfaces will be insane to VLAN 99 here we can see from FA 0 / 1 till 24 it's a st. - VLAN 99 that is management again reassign FA 0 / 11 and FA 0 / 21 - wheel and 10 then verify that Avedon assignments are correct ok we will do that if we have to go to these two interfaces that is FA 0 / 11 and FA 0 / 21 so here we will give a configure terminal then we will give an interface a cell range faster third 0 / it's 11 and faster third 0 / 21 okay here we will have seen these ports - VLAN 10 ok here we can give us a cheap port its access VLAN 10 and we can verify it will give the command end again enter on the show VLAN brief and here we'll verify see if a zero slash toe okay it's in not in this 19 n also 21 here we can see that interface by mean those ports FS callosum are 6 0 / 11 and they FA 0 / 21 just now we added these two ports to this VLAN 10 next is step 2 or remove a VLAN assignment from my interface use the switch port access VLAN command to remove the VLAN 99 assignment to FA 0 / 24 and here we can see the command we have to go to that interface and we have to give a no switch port access VLAN we will do that we will go to s1 and here we will go to that interface that is before that will you have to go to global configuration mode configure a terminal then interface it's not gigabit at third and sorry it's faster termit 0/24 and here we have to give you the command that no support access VLAN then we have to press enter now we will verify that the VLAN change was made which VLAN is FA 0 / 24 and now associated with we will verify that we will end here then we will give the commander show VLAN brief then press enter and here we will see this FA 0 / 24 here we cannot see that interface FA 0 / 24 and now here we can see FA 0 / 24 now it's associated with VLAN 1 the default VLAN in step 3 remove a VLAN ID from the VLAN database I had a VLAN 32 interface FS 0/24 without issuing the global VLAN command we have to give like this interface over here to go to the interface FA 0 / 24 then we have to give a switch port access of VLAN 30 here we can see we get a message access villain does not exist creating VLAN 30 okay we will do that just before that they're given and not here currently switched technology no long hall request that the VLAN command be issued to add a VLAN to the database by assigning and unknown wheel and to a port the villain will be created and added to the VLAN database that's why we get this message access villain does not exist that means this VLAN 30 so they will create it automatically we will do this configuration coming to yes one you will go to configure terminal and then we will go to that interface faster third and 0/24 and here we are going to give a support its access or VLAN 30 and we will see what happens here we can see access VLAN does not exist creating VLAN 30 that's where this VLAN 30 is created automatically okay verify that the new villain is a displayed in the VLAN table and what is the default name of VLAN 30 we can verify that we will end here chauvelin brief and we can see the details very Sweden 30 here we can see we land 30 and we are saying this support a fast affair of 0/24 and here we can see it's a name by default it gives a VLAN 0 0 3 0 that means of this name is created with it's a VLAN ID next is use the know VLAN 30 command to remove VLAN 30 from the VLAN database we have to give this command no we land 30 then end yes these two points are very important we will do that you will go to global configuration mode configure terminal then we will give no VLAN 30 so VN brief command then FAC was last 24 ghosts are saying to VLAN 30 so after deleting VLAN 30 from the villian database what VLAN is port FS 0/24 are saying to what happens to the traffic get disdained to the host attach the two FA 0/24 we will give this a show command end chauvelin brief and we will check that interface FAS 0/24 no here we cannot see that VLAN 30 it's a removed and - where is FAS 0/24 we cannot see anywhere actually we assigned an interface that is FS 0/24 to the VLAN 30 then after we deleted that VLAN 30 then we can see that FA 0 / 24 is not as into any villain that's we that interface that is FA 0 / 24 is not listed in these supports now you should the know as which port access Avilan command on interface FA 0 / 24 then issue the show with an brief command to determine the villain assignment for this interface that is FA 0 / 24 - vici villain is FA 0 / 24 assigned we will check that configure terminal we will go to that interface faster third 0/24 and here we will give know a support access VLAN no we will end and here we will give a show VLAN brief now we can see this interface I'm in this port FAS a rose last 24 is assigned to the default to VLAN that is VLAN 1 they given a note here before removing a villain from the database it is recommended that you reassign all the ports are saying to that wheel and yes we have to do that why should you reassign a poor to another wheel and before removing the villain from the villain database yes we have seen if you are not removing that port won't be listed here in this VLAN list now we will go to platform configure and it not to dot1q trunk between the switches that is s1 and s2 in part 4 we will configure interface FA 0/1 to use the dynamic trunking protocol that is called the DTP to allow it to negotiate the trunk mode after this has been accomplished and verified we will disable DTP on interface fa 0 / 1 and manually configure it as a trunk yes now we are going to allow all the VLANs to pass through this interface or through this link step 1 I use a DTP to initiate tracking on FS row / 1 the default DTP mode of 8 to 9 6 0s which produce dynamic auto this allows the interface to convert the link to a trunk if then a neighboring interface is set to tranq or dynamic desirable mode sit fa 0 / 1 on s1 to negotiate triangle mode we have to give this command we have to go to that interface then support the more dynamic desirable ok we will give that configure terminal we will go to the interface fastethernet 0/1 yes/no we will give this command support mode it's a dynamic desirable then press Enter so you should also receive a link status messages on s2 okay we will verify that we will go to s 2 and here we can see those messages issue the show with an brief command on s1 and s2 interface FS 0 / 1 is no longer as saying - VLAN 1 tranqed interfaces are not listed in the VLAN table ok we will verify that you will end here and here we will give a show VLAN brief and we cannot see our port FS 0 / 1 here because now it's trunk here also we'll verify it password is cisco enable password is class chauvelin brief and here also we cannot see that interface FS 0 / 1 how we will verify this a trunk issue the show interface trunk command to view triangle interfaces notice that the modern s1 is the city - desirable and the mode on s2 is set to auto so we will give his commander show interfaces trunk on s1 as well as s2 sure interfaces trunk and here we can see 40 surface 0 / 1 and here we can see the more it's a desirable then status trunking and we can see native VLAN 1 and we can see now variants allowed and active in management domain it's a 110 20 99 and 1000 also we will verify in s2 we will give a show interfaces trunk and here we can see the details port is FA 0 / 1 teres trunking native VLAN 1 and here we can see a load of islands they given a note here by default all villains are allowed on a trunk the switchport a trunk command allows you to control what we lens have access to the trunk for this lab keep the default settings which allows all villains to traverse FS 0/1 okay so verify that villain traffic is a traveling over trunk interface FS 0/1 now can s1 ping s2 then can pc - a ping PC - B we will check that first of all we will ping from s1 to s2 we will get the IP address of s2 show IP interface brief and we will get its IP address we will copy it then coming to s1 CLI here we will leap into that switch and we are waiting for the replies here success alrighty 60% - once more we will try so that we get hundred percentage yes it's working now can PC - a ping PC - B he will get a PC - B IP address then we will go to PC - a command prompt we will link to that PC and we get the replies it's working now next is a can PC - a ping s1 we have to verify that people get its IP address yes one IP address show IP interface brief and we will copy this address then coming to PC - a command prompt we will the ping - yes one request timed out it may work oh it won't work because they are in different subnets correct exactly it won't work no doubt request timed out no it's not working now can PC - be ping yes - it won't work because they are in different subnet and in different of VLANs okay we will go to PC - B we will ping - yes - sure is the command request timed out no it's not working if you answered no to any of the above questions explained below you are already told because this s1 and s2 they are in VLAN 99 and they have different subnet address PC - a and PC - B they are in VLAN 10 and they are in different subnet coming to step to manually configure trunk interface FA 0 / 1 the switch port mode of trunk command is used to manually configure a port as a trunk this command should be issued on both ends of the link ok change the switch port to modern interface FS 0 / 1 - force tracking make sure to do this on both switches we have to give this a command we have to go to the interface FS 0 / 1 then we have to give us a porter mode a trunk on both switches s 1 and s 2 this is how we configure this a trunk manually we will do it on s1 first configure terminal we will go to that interface fastethernet 0/1 0 okay then he will give us a cheap port mod as a trunk then we will go to s2 girl saw reads configure terminal interface fastethernet 0/1 support the mod as a trunk modified the trunk configuration on both switches by changing the native VLAN from VLAN 1 to VLAN 1,000 okay by default that is natively then in we then 1 now we are going to change it and here we can see the command switch port a trunk in a TV Land 1000 so here he'll do genus one support chunk native VLAN it's one thousand now issue the show interfaces Trung command to view the trunk notice the native VLAN information is updated okay we will let check that show interface trunk coming to yes one and here we can see we are getting a message native VLAN mismatch yes because we configure native VLAN here in the switch s1 as one thousand and partly we have to configure on this switch s2 also that's why we get this message okay so just we will end here and we will give a show reel and brief I know this we will give a show interface as a trunk and here we can see details now we can see mode is not desirable it shows on so mainly we can figure that trunk and we can see native VLAN is one thousand coming to us to here also we can see that mismatch and it show interfaces trunk and here we can see native VLAN is in one so we have to assign to one thousand and here we can see mod is change ly to on from auto so here we will give a configure terminal we will go to the interface fastethernet 0/1 then we will give a super Chang native VLAN 1000 and here we can see it says this pot consistency or restored because here we can figure this native VLAN to a 1000 as we can figure in this sgs1 here why might you want to manually configure an interface to Chango mode instead of using DTP sure this DTB that is a dynamic trunking protocol is a cisco proprietary protocol it will work only on a Cisco switches suppose if you want to use some other vendor switches then we must configure manually again one more question why might you want to change the native VLAN on a trunk yeah obviously all of them know by default and native VLAN is in VLAN 1 so obviously it's a security risk so a better to change this native VLAN to some other villian number coming to Pat 5 delete the VLAN database in part 5 we will delete the VLAN database from the switch it is necessary to do this when initializing is switched back to its default settings in step 1 determine if the VLAN database exists so we have to give this command issue the show flush command to determine if a villain dot that file exists in flash here we can see the command I mean the show command what we have to give in s1 it's show flash they give an EndNote if there is a villain dot that file located in flash then the villain database does not contain it's a default settings okay so we will go to s1 and CLI password password is class chauvelin it's not show flash ok and - here we can see the file it's a villain dot that coming to step to delete the VLAN database issue the delete we landed that command to delete the VLAN that file from flash and reset the VLAN database back to its default settings you will be prompted twice to confirm that you want to delete the VLAN that file then press enter both times we have to give it delete space than that file name that is Bill and or that so it will confirm twice we can see that so both time we have to press Enter now we will delete the civilian database delete file name is a VLAN dot dat so here we can see the confirmation delete a file name with the villain dot that so this presenter so again re confirming that delete flash that will entered that file from this a flash yes so this presenter ok issue the show flash command to verify that the VLAN note that file has been deleted again we will give this a show flash command and we will verify that that file is deleted to initialize I switch back to its default settings what other commands are unneeded ok obviously we can't erase the startup config so that we can bring it so default settings ok now we will apply with is a show flash command show flash and here we cannot see that file VLAN dot patch now coming to the reflection questions what is needed to allow host Ron Wieland tend to communicate to house on real and 99 so here if you want to communicate from one villain to another we have to enable inter VLAN routing so for inter VLAN routing we must use either a router or a layer 3 switch commonly we can say a layer 3 device and we will see this inter VLAN routing configuration in the forthcoming video next teaser what are some primary benefits that an organization can receive through effective use of VLANs obviously there are some benefits of using VLANs like better security then cost savings also we have efficient use of bandwidth in up links then we have higher performance because it reduces the broadcast domain then we have a broadcast strong mitigation etc ok so friends in this video we discuss to the lab activity configure VLANs and trunking now dear friends if you have any doubt any suggestions please comment below also if you liked your video give a thumb and share with all your friends and if you like to contact us for any support you can visit our website stay tuned and we will meet again with a next video thank you
Info
Channel: Tech Acad
Views: 20,124
Rating: undefined out of 5
Keywords: CISCO Certification, CISCO, CCNA, Routing and Switching, VLAN, Packet Tracer
Id: SW-b8LfP0kk
Channel Id: undefined
Length: 57min 19sec (3439 seconds)
Published: Mon May 04 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.