010 Static Trunking Study Notes
010 Static Trunking Study Notes
010 Static Trunking Study Notes
com
Static vs Dynamic
There is a choice to configure either static trunking or dynamic trunking.
When static trunking is configured, you are telling the switch to explicitly
turn up a trunk. There is no negotiation, however the same static trunk
configuration must be enabled on the neighbor switch port. The other
option is a dynamic (negotiated) trunk that is conditional based on how
connected switches are configured.
802.1q Encapsulation
The purpose of 802.1q is to enable forwarding of multiple VLANs to a
neighbor switch. That is accomplished by tagging each frame with 4-byte
tag for VLAN membership. The tagging and forwarding of Ethernet
frames starts after Layer 2 convergence has occurred with STP. The
Ethernet frame header is modified as a result of adding the VLAN tag.
That requires recalculation of the FCS value used for CRC. Access ports
will drop any frame that has an 802.1q tag. The open standard for multi-
vendor switch connectivity is 802.1q encapsulation. It is the current Cisco
default setting as well for a trunk mode interface.
www.cisconetsolutions.com
Native VLAN
The switch management VLAN 1 forwards management frames between
switches and cannot be deleted. The default configuration is to assign all
switch ports to VLAN 1. As a result, all management and user traffic use
VLAN 1. Some examples of management frames include CDP, LACP,
VTP, STP and DTP. The purpose of management frames are to provide
control plane communication between switches. Cisco recommends you
separate management and user traffic for security purposes.
The following statements describes proper operation for the native VLAN.
The following IOS interface command configure the default native VLAN
setting for a trunk interface.
switch(config-if)# switchport trunk native vlan 1
Add/Remove VLANs
Cisco default configuration is to allow all VLANs from 1 - 4094 across the
trunk. The purpose of VLAN pruning is to permit or deny VLANs across a
trunk interface. That will permit or deny all traffic originating from specific
VLAN/s. It is a recommended security practice to only permit traffic from
VLANs that must traverse a trunk and remove everything else.
Each switch alerts neighbor switch of all VLANs that are not active. Any
VLANs not configured are automatically removed from the trunk by the
neighbor switch. That is done to minimize all unicast, broadcast and
multicast traffic across the trunk. The administrator can also add or
remove VLANs manually after trunk mode is enabled. The following
command displays default trunking operation. It displays operational
status of all trunk interfaces on a switch.
www.cisconetsolutions.com
Example 1
The network administrator has configured a trunk between two switches.
The configuration must allow only VLAN 10, 11 and 12 across the trunk.
What is the correct IOS command to accomplish that?
The default trunk configuration allows all VLAN traffic from range 1-4094
across the trunk. The following IOS interface command will only allow
VLAN 10, VLAN 11 and VLAN 12 across the trunk.
Example 2
The following IOS interface command will add VLAN 9 and VLAN range
100-200 to the trunk interface. The add | remove keyword only applies
after the default VLAN range has been initially modified.
Example 3
The following command will remove VLAN 10 from a trunk interface.
Name: Gig1/2
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: Off
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Trunking VLANs Enabled: 11-12
Pruning VLANs Enabled: 2-1001
The administrative mode (trunk) is how the switch port is configured and
operational mode (trunk) is the switch interface status. The trunk is not
formed unless administrative and operational mode is trunk. Cisco switch
ports support access mode or trunk mode. The network administrator
would configure a port mode when enabling an interface.
Change the native VLAN from default VLAN 1 for security purposes.
Layer 2 loops are minimized as well when STP control frames are sent
across the native VLAN.
www.cisconetsolutions.com