Chapter 4: Introduction to VLANs
Media:
4.1.1
Describe a VLAN
4.1.2
Why are VLANs Necessary?
4.1.3
Security Problems in a Legacy Network
A Known Unicast Frame in a Switched Network
4.1.4
VLANs and Broadcast Distribution
4.1.5
Concurrent Transmissions in a Catalyst
4.1.6
Network Latency from Routers vs. VLANs
4.1.7
VLANs vs. Complex Access Lists
4.1.8
Wrong Motives for Implementing VLANs
4.2.1
VLAN Boundaries
4.2.2
End-to-End VLANs
4.2.3
Local VLANs
4.2.4
Establishing VLAN Memberships
Dynamic VLANs
4.2.5
Port-Based VLAN Membership
4.2.6
Dynamic VLANs
4.3.1
Cisco IOS Software Based Switch (1-3)
4.3.2
Verify VLAN Configuration (1-2)
4.3.3
Set Command-Based Switch
Cisco IOS Software Based Switch
4.3.4
Configure the VMPS Server
Disable VMPS
4.3.5
Configuring Dynamic Ports on a VMPS Client
Verifying VMPS Configuration
Configuring a Software-Based Switch as a VMPS Client
Verifying Configuration on a Software-Based Switchs
4.3.6
Access Links and Trunk Links
4.4.1
Frame Tagging and Encapsulation Methods
4.4.2
ISL Frame Format
ISL Encapsulation Description
4.4.3
Frame Identification with 802.1Q
4.4.4
Lane
4.4.5
No Graphic
4.5.1
Trunking
4.5.2
Cisco IOS Software Based Switch
Set Command-Based Switch
4.5.3
Cisco IOS Software Based Switch
Set Based Switch (2-3)
4.6.1
VTP Benefits
4.6.2
VTP Operation (1-2)
4.6.3
VTP Mode Comparisons
4.6.4
Adding a Switch to a VTP Domain
4.6.5
Three Types of VTP Messages
VTP Summary Advertisement
VTP Subnet Advertisement Format
4.7.1
Basic Configuration Steps
4.7.2
Configure the VTP Version (1-2)
4.7.3
Cisco IOS Software Based Switch
Set-Based Switch
4.7.4
Cisco IOS Software Based Switch
Set-Based Switch
4.7.5
Cisco IOS Software Based Switch
Set Based Switch (2-3)
4.8.1
Flooded Traffic with VTP Pruning Disabled
Flooded Traffic with VTP Pruning Enabled
4.8.2
Cisco IOS Software Based Switch
Set-Based Switch
4.8.3
Verify VTP Pruning (1-2)