Table of Contents

Configuring VLANs

Configuring VLANs

This chapter describes how to create a virtual local-area network (VLAN) and how the VLANs work.

A VLAN is a group of end stations, independent of physical location, with a common set of requirements. For example, several end stations might be grouped as a department, such as engineering or accounting. If the end stations are located close to one another, they can be grouped into a LAN segment. If any of the end stations are on a different LAN segment, such as different buildings or locations, they can be grouped into a VLAN that has all the same attributes as a LAN even though the end stations are not all on the same LAN segment. The information identifying a packet as part of a specific VLAN is preserved across a Catalyst 5000 series switch connection to a router or other switch.

Creating a VLAN Across a Domain

To define the VLAN, indicate the VLAN number, name, type, maximum transmission unit, security association identifier (SAID), state, ring number, bridge identification number, and number to indicate whether source routing should be set to transparent or bridging. For more information on the commands for creating VLANs, refer to the Catalyst 5000 Series Command Reference publication.

Procedure

To create a VLAN across a networking domain, perform these steps in privileged mode:

Task Command
Step 1 Define the VLAN management domain. set vtp [domain name] [mode mode] [interval interval]
[passwd passwd]
Step 2 Define the VLAN. set vlan vlan_num [name name] [type type] [mtu mtu] [said said] [state state] [ring ring_number] [bridge bridge_number] [parent vlan_num] [stp stp_type] [translation vlan_num]

Verification

Grouping Switch Ports to VLANs

A VLAN created in a management domain remains unused until it is mapped to Catalyst 5000 series switch ports. The set vlan command maps VLANs to ports. The default configuration has all switched Ethernet ports on VLAN 1. However, you can enter groups of ports as individual entries, for example, 2/1, 3/3, 3/4, 3/5. You can also use a hyphenated format, for example, 2/1, 3/3-5. Figure 9-1 shows a local VLAN configuration that groups switch ports into VLAN 10 and VLAN 20.


Figure 9-1: Local VLAN Configuration



Procedure

To create a VLAN, perform the following task in privileged mode:

Task Command
Define the VLAN and indicate the included ports. set vlan vlan_num mod_num/port_num

Note When assigning a VLAN for Fiber Distributed Data Interface (FDDI) ports, you can designate port 1 or port 2 of the FDDI port; both are automatically assigned the same VLAN. However, if you view the VLAN configuration, by entering the show port command, only port 1 is displayed. Recall that port 2 belongs to the same VLAN.

After entering the set vlan command, you see this display:

system1> (enable) set vlan 10 2/1-4
VLAN 10 modified.
VLAN 1 modified.
VLAN    Mod/Ports
10      2/1-4
system1> (enable) set vlan 20 2/5-24
VLAN 20 modified.
VLAN 1 modified.
VLAN    Mod/Ports
20      2/5-24

Verification

To verify that the VLAN configuration is correct, enter the show vlan command. After entering the show vlan command, you see this display:

system1> (enable) show vlan
VLAN    Mod/Ports
----    ---------------------------------------------------------------------
1       1/1-2
10      2/1-4
20      2/5-24
system1> (enable) 

Note To set up a FDDI 802.10 VLAN configuration, refer to "Setting Up an FDDI 802.10 Configuration" in "Configuring the CDDI/FDDI Module."

Configuring VLAN Trunks

A trunk physically links two Catalyst 5000 series switches or Catalyst 5000 series switches and routers. Trunks carry the traffic of multiple VLANs and allow you to extend VLANs from one Catalyst 5000 switch to another.

Enter the set trunk command to configure trunks on ports or to configure the mode for the trunk: on, off, desirable, or auto. Set the trunk to on to make the port a trunk port and off to make the port a nontrunk port. Set the trunk to desirable to make the port a trunk port if the port it is connecting to allows trunking. Set the trunk to auto to make the port a trunk port if the port it is connected to becomes set for trunking. Port 1 on module 1 is configured as a trunk.

To establish a trunk, you must configure the port on each Catalyst 5000 series switch as a trunk port. For more information, refer to the Catalyst 5000 Series Command Reference publication.

Procedure

To establish trunks, perform these steps in privileged mode:

Task Command
Step 1 Establish trunks on specific ports. set trunk mod_num/port_num {on | off | desirable | auto} [vlans]
Step 2 Verify that the trunk configuration is correct. show trunk

After entering the set trunk command, you see this display:

Console> (enable) set trunk 1/2 5
Port 1/2 allowed vlans modified to 1-5.
Console> (enable) set trunk 1/1 desirable
Port 1/1 mode set to desirable.
Port 1/1 has become a trunk.

Verification

To verify the VLAN trunk configuration, enter the show trunk command. After entering the show trunk command, you see this display:

Console> (enable) show trunk
Port     Mode       Status        
-------  ---------  ------------  
1/1      desirable  trunking      
1/2      auto       not-trunking  
3/1      auto       not-trunking  
3/2      auto       not-trunking  
3/3      auto       not-trunking  
Port     Vlans allowed
-------  ---------------------------------------------------------------
1/1      1-1000
1/2      1-5
3/1      1-1000
3/2      1-1000
3/3      1-1000
Port     Vlans active
-------  ---------------------------------------------------------------
1/1      1,55
1/2      1
3/1      1
3/2      1
3/3      1
Console> (enable)

How VLAN Trunks Work

With VLAN trunks, you can connect switches to each other and to routers using high-speed interfaces. The Catalyst 5000 series switch can multiplex up to 1000 VLANs between switches and routers by using Inter-Switch Link (ISL) on Fast Ethernet, LAN emulation on Asynchronous Transfer Mode (ATM), or 802.10 on FDDI. You can use any combination of these trunk technologies to form enterprise-wide VLANs and choose between low-cost copper and long-distance fiber connections for your trunks.

Load sharing allows VLAN traffic on parallel Fast Ethernet ISL trunks to be split between multiple trunks. By setting Spanning-Tree Protocol parameters on a VLAN basis, you can define which VLANs have priority access to a trunk and which use the trunk as a backup when another trunk fails.

In Spanning-Tree Protocol (STP), low integer values have the highest priority. Therefore, when you assign spanning-tree port priorities lower than the default value of 32 to VLANs, the traffic of those VLANs travels on the trunk with the lowest integer value. You must set the spanning-tree port priority to the same value at both ends of each trunk on each Catalyst 5000 series switch.

Figure 9-2 illustrates two trunks that are connected to the ports of supervisor engine modules on two Catalyst 5000 series switches. The port cost of carrying VLAN traffic across these trunks is equal.

This splits VLAN traffic between the two trunks and increases the throughput capacity and fault tolerance between Catalyst 5000 series switches; trunk 1 carries traffic for VLANs 8 through 10, and trunk 2 carries traffic for VLANs 3 through 6. If either trunk fails, the remaining trunk carries the traffic for all of the VLANs.

Caution  The port cost of a VLAN must be equal on all parallel trunks when setting port priority for load sharing.

Figure 9-2: Spanning-Tree Load Sharing Using VLAN Trunks



Configuring VLAN Trunk Protocol

VLAN Trunk Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN configuration consistency throughout the network. VTP manages the addition, deletion, and renaming of VLANs at the system level. This protocol allows you to manage VLANs on a network-wide basis and make central changes that are automatically communicated to all the other switches in the network without requiring manual intervention at each switch. In addition, VTP minimizes possible configuration inconsistencies that arise when inappropriate changes are made. These inconsistencies can result in security violations because VLANs become cross-connected when duplicate names are used and internally disconnected when VLANs are incorrectly mapped between one LAN type and the other.

VTP is disabled by default on the Catalyst 5000 series ATM switch and must be explicitly enabled. VTP works only with the Network Management Processor (NMP) software release 2.1 or later and ATM software release 3.1 or later. For more information, refer to the Catalyst 5000 Series Command Reference publication.

Prerequisites

The following prerequisites apply when configuring VTP:

Procedure

To configure VTP, perform this task:

Task Command
Define a VLAN management domain. set vtp [domain domain_name] [mode mode] [interval interval] passwd passwd]

After entering the set vtp command, you see this example display:

Console (enable) set vtp
Usage:
set vtp [domain <name>] [mode <mode> [interval <interval>] [passwd <passwd>]
(name: 120-160 characters, mode = (client, server, transparent), interval = 1-300 sec, passwd : 0-64 characters)
Console> (enable) set vtp domain catbox mode client interval 160
VTP: domain catbox modified
Console> (enable)

To disable VTP, use the set vtp domain domain_name mode transparent command. Setting the mode to transparent does not remove the domain name from the switch, but it disables VTP for that domain. To remove the domain name, use the clear config all command.

Verification

Enter these commands to verify your VTP configuration:

After entering the command, you see this display:
console> show vtp domain
Domain Name	Domain Index	VTP Version	Local Mode
-----------------	-	----------------	--------------	-------------
Engineering	1	1	client	
Advt Interval	Vlan-count	Max-vlan-storage	Config Revision	Notifications
---------------	-------------	----------------	---	--------------------		---------------
300	5	1023	0	disabled
Last Updater	Pruning	PruneEligible on Vlans
---------------	---------	----------------------------------------
172.20.26.151	disabled	2-1000
After entering the command, you see this display:
Console> (enable) show vlan
VLAN Name                       Type  Status    Mod/Ports
---- -------------------------- ----- --------- ----------------
1    default                    enet  active    2/1-24
                                                3/1-12
                                                4/13-48
3    vlan3                      enet  active    
55   vlan55                     enet  active    
66   vlan66                     fddi  active    
88   vlan88                     tring active    
99   vlan99                     fddi  active    
1002 fddi-default               fddi  active    
1003 token-ring-default         tring active    
1004 fddinet-default            fdnet active    
1005 trnet-default              trnet active    
VLAN SAID       MTU   RingNo BridgeNo StpNo Parent Trans1 Trans2
---- ---------- ----- ------ -------- ----- ------ ------ ------
1    100001     1500  0      0        0     0      0      0
3    100003     1500  0      0        0     0      0      0
55   100055     1500  0      0        0     0      0      0
66   100066     4500  500    0        0     500    0      0
88   100088     1500  0      0        0     0      0      0
99   100099     1500  0      0        0     0      0      0
1002 101002     4500  0      0        0     0      1      1003
1003 101003     4500  0      0        0     0      1      1002
1004 101004     4500  0      1004     0     0      0      0
1005 101005     4500  0      1005     0     0      0      0
Console>

For more information, refer to the Catalyst 5000 Series Command Reference publication.

How VTP Works

Using VTP, each Catalyst 5000 series switch advertises its management domain on its trunk ports, its configuration revision number, and its known VLANs and their specific parameters. A VTP domain is made up of one or more interconnected devices that share the same VTP domain name. A switch can be configured to be in one and only one VTP domain.

VTP servers and clients maintain all VLANs everywhere within the VTP domain. A VTP domain defines the boundary of the specified VLAN. Servers and clients also transmit information through trunks to other attached switches and receive updates from those trunks.

VTP servers either maintain information in nonvolatile memory or access it using Trivial File Transfer Protocol (TFTP). Using VTP servers, you can modify the global VLAN information using either the VTP Management Information Base (MIB) or the command-line interface (CLI). When VLANs are added and advertised, both servers and clients are notified that they should be prepared to receive traffic on their trunk ports. A VTP server can also instruct a switch to delete a VLAN and disable all ports assigned to it.

The advertisement frames are sent to a multicast address so that they can be received by all neighboring devices, but they are not forwarded by normal bridging procedures. All devices in the same management domain learn about any new VLANs configured in the transmitting device. Because of this process, you need to configure a new VLAN only on one device in the management domain. All other devices in the same management domain automatically learn the configured information. VTP is transmitted on all trunk connections, including ISL, 802.10, and LAN Emulation (LANE).

New VLAN is indicated by a VTP advertisement received by a device running VTP. Devices then accept the traffic of the new VLAN and propagate it to their trunks after adding the VTP-learned VLANs to their trunks. The VTP pruning protocol (see "Configuring VTP Pruning" in this chapter) limits the extent of this forwarding to areas of the network where the VLAN extends, based on VLAN membership resident within the switch.

Using periodic advertisements, VTP tracks configuration changes and communicates them to other switches in the network. When a new switch is added to the network, the added devices receive updates from VTP and automatically configures existing VLANs within the network. VTP also dynamically maps VLANs across multiple LAN types with unique names and internal index associations. Mapping eliminates excessive device administration required from network administrators.

VTP establishes global configuration values and distributes the following global configuration information:

The VTP MIB provides the Simple Network Management Protocol (SNMP) instrumentation for the VTP, allowing the reading and setting of specific VTP parameters.

Configuring VTP Pruning

VTP pruning enhances network bandwidth use by reducing unnecessary flooded traffic, which includes broadcast, multicast, unknown, and flooded unicast packets. This feature restricts flooded traffic to only those trunk links that the traffic must use to access the appropriate network devices, increasing available bandwidth.

By default, VTP pruning is disabled in a management domain. Make sure that all devices in the management domain support VTP pruning before enabling it. VTP pruning is supported in software release 2.3 or later.

VTP pruning, even if enabled, does not take effect on a VLAN that is not pruning-eligible. By default, VLAN 1 is not pruning-eligible, while VLANs 2 through 1000 are pruning-eligible. To enable pruning eligibility, enter the set vtp pruneeligible command. To disable pruning eligibility, enter the clear vtp pruneeligible command. You can invoke these commands independently of the pruning mode. Pruning eligibility resides on the local device only.

You can set the pruning enable or pruning disable option at any VTP server, and propagation takes effect on all devices in the same management domain.

After enabling pruning, you must assign a domain name for VTP pruning to take effect. For information on assigning a domain name, refer to the "Configuring VLAN Trunk Protocol" section in this chapter.

VTP pruning takes effect several seconds after configuration. To configure VTP pruning, you must enter the pruning enable option of the set vtp command.

Procedure

To configure VTP pruning, perform the following steps:

Task Command
Step 1 Enable the VTP pruning option. set vtp [domain_name [domain_name]] [mode mode_type] [password <password_string>] pruning enable
Step 2 Disable the VLAN pruning eligibility. clear vtp pruneeligible vlan_range
Step 3 Enable VTP pruning eligibility. set vtp pruneeligible vlan_range>
Step 4 Disable the VTP pruning option. set vtp [domain_name [domain_name]] [mode mode_type] [password <password_string>] pruning disable
console> clear vtp pruneeligible 2,3,6-8,100-200
Vlans 1-3,6-8,100-200 will not be pruned on this device.
console> set vtp pruneeligible 120,150
Vlans 4-5,9-99,120,150,201-1000 eligible for pruning on this device.
This command specifies VLANs 120 and 150 as eligible for pruning. It also displays all pruning-eligible VLANs.

Verification

console> show vtp domain
Domain Name	Domain Index		VTP Version					Local Mode
-----------	------------		-----------		-----------
WBU	1		1		client
Vlan-count	Max-vlan-storage		Config Revision		Notifications
----------	--------------		---------------	-	---------------		
6	1023		23		disabled
Last Updated	Pruning		PruneEligible on Vlans
--------------	-------		------------------------
172.20.26.151	enabled		4-5,9-99,120,150,201-1000
Console> (enable) show trunk 2/2
Port      Mode       Status
--------  ---------  ------------
 2/2      on         trunking
 
Port      Vlans allowed on trunk
--------  -----------------------------------------------
 2/2      1-1000
 
Port      Vlans allowed and active in management domain
--------  -----------------------------------------------
 2/2      1,10,20,30,40,50,100
 
Port      Vlans supported on trunk after pruning
--------  --------------------------------------------------
 2/2      1,40,50
The last row in the show trunk display shows the VLANs that are not pruned on the trunk port 2/2. In this example, VLANs 1, 40, and 50 are not pruned, and VLANs 10, 20, 30, and 100 are pruned.
console> show vtp statistics
VTP statistics:
summary advts received	17
subset advts received	20
request advts received	0
summary advts transmitted	5
subset advts transmitted	14
request advts transmitted	4
No of config revision errors	0
No of config digest errors	0
VTP pruning statistics:
				Summary advts received from
Trunk	Join transmitted	Join received	non-pruning-capable device
1/1	303	312	0
1/2	353	0	8			

How VTP Pruning Works

VTP pruning allows you to forward traffic only on those trunks necessary for access to the appropriate network devices. Refer to Figure 9-3 and Figure 9-4. The Catalyst 5000 series switches are connected by trunks that also are spanning-tree forwarding paths.


Figure 9-3:

Nonoptimal Flooding Traffic without VTP Pruning

In Figure 9-3, VTP pruning is not configured. The switch fabric consists of six Catalyst 5000 series switches, shown as Switches 1 through 6. Port 1 on Switch 1 and port 2 on Switch 4 are associated with the Red VLAN. The flooded traffic from port 1 on Switch 1 to port 2 on Switch 4 is forwarded to all switches, even though Switches 3, 5, and 6 have no ports on the Red VLAN.

Refer to Figure 9-4, in which VTP pruning is enabled.


Figure 9-4:

Optimized Flooding Traffic with VTP Pruning

In Figure 9-4, the broadcast traffic from port 1 on Switch 1 to port 2 on Switch 4 is not forwarded to Switches 3, 5, and 6, because the traffic is pruned on the specified ports. Switches 3, 5, and 6 have no ports on the Red VLAN, and VTP pruning has reduced the unnecessary flooding storm to switches not associated with the Red VLAN.

Configuring Dynamic Port VLAN Membership

You can assign dynamic ports to a VLAN based on the source Media Access Control (MAC) address of the hosts connected to that port. On dynamic ports, you can move a connection from a port on one switch to a port on another switch in the network. This section describes how to set up dynamic ports, including the configuration of the VLAN Membership Policy Server (VMPS), which has a database of MAC address-to-VLAN mappings necessary for setting up dynamic ports.

To configure dynamic port VLAN membership, complete the following tasks in this section:

Configuring the VLAN Membership Policy Server

The database of MAC address-to-VLAN mappings enables your workstation to be placed into the correct VLAN. You must configure the VMPS before configuring a port as dynamic.

Prerequisites

Before configuring the VMPS, you must perform the following tasks:

Procedure

When you enable the VMPS, it begins to download the configuration information from the TFTP server. After a successful download, the VMPS task is started, and it accepts the VMPS requests. To enable the VMPS, use the following procedure:

Task Command
Step 1 Configure the IP address of the TFTP server on which the ASCII file resides. set vmps tftpserver ip_addr [filename]
Step 2 Enable VMPS. set vmps state {enable | disable}
Console(enable)> set vmps state enable
Vlan Membership Policy Server enable is in progress.

The set vmps state enable command sets the VMPS state in nonvolatile RAM to enable. If it is previously disabled, this command initiates a background task to begin the database download. After a successful database download, this command sets the operational status to active.

Console(enable)> set vmps state disable
All the VMPS configuration information will be lost and the resources released on disable.
Do you want to continue (y/n[n]): yes
Vlan Membership Policy Server disabled.

For more information, refer to the Catalyst 5000 Series Command Reference publication.

Verification

Enter the following commands to verify the status of port VLAN membership.

For more information, refer to the Catalyst 5000 Series Command Reference publication.

Error Messages

Table 9-1 shows sample error messages and actions you need to take after entering the set vmps state {enable | disable} command.


Table  9-1: Error Messages for set vmps state {enable | disable} Command
Error Message Recommended Action
Console(enable)> set vmps state enable

TFTP server IP address is not configured.

Enter the set vmps tftpserver ip_addr [filename] command and configure the TFTP server address.
Console(enable)> set vmps state enable

Unable to contact the TFTP server 198.4.254.222.

Enter the set route command to reach the TFTP server.
Console(enable)> set vmps state enable

File "vmps_configuration.db" not found on the TFTP server 198.4.254.222.

Create a configuration file in the file server.
Console(enable)> set vmps state enable

Enable failed due to insufficient resources.

The Catalyst 5000 series switch does not have sufficient resources to run the database. You can fix this problem by increasing the dynamic random-access memory (DRAM).

Table 9-2 shows sample error messages and actions you need to take after entering the download vmps command.


Table  9-2: Error Messages for download vmps Command
Error Message Recommended Action
Console(enable)> download vmps

TFTP server IP address is not configured.

Enter the set vmps tftpserver ip_addr [filename] command and configure the TFTP server address.
Console(enable)> download vmps

Unable to contact the TFTP server 198.4.254.222.

Enter the set route command to reach the TFTP server. This message is printed to the syslog server.
Console(enable)> download vmps

File "vmps_configuration.db" not found on the TFTP server 198.4.254.222.

Create a configuration file in the file server. This message is printed to the syslog server.

VMPS File

The following describes the parameters in the configuration file. A sample VMPS configuration file is shown in the next section, "Example VMPS Configuration File."

Example VMPS Configuration File
!vmps domain <domain-name>
! The VMPS domain must be defined.
!vmps mode { open | secure }
! The default mode is open.
!vmps fallback <vlan-name>
!vmps no-domain-req { allow | deny }
!
! The default value is allow.
vmps domain WBU
vmps mode open
vmps fallback default
vmps no-domain-req deny
!
!
!MAC Addresses
!
vmps-mac-addrs
!
! address <addr> vlan-name <vlan_name>
!
address 0012.2233.4455 vlan-name hardware
address 0000.6509.a080 vlan-name hardware
address aabb.ccdd.eeff vlan-name Green
address 1223.5678.9abc vlan-name ExecStaff
address fedc.ba98.7654 vlan-name --NONE--
address fedc.ba23.1245 vlan-name Purple
!
!
!Port Groups
!
!vmps-port-group <group-name>
! device <device-id> { port <port-name> | all-ports }
!
vmps-port-group WiringCloset1
 device 198.92.30.32 port 3/2
 device 172.20.26.141 port 2/8
vmps-port-group "Executive Row"
 device 198.4.254.222 port 1/2
 device 198.4.254.222 port 1/3
 device 198.4.254.223 all-ports
!
!
!VLAN groups
!
!vmps-vlan-group <group-name>
! vlan-name <vlan-name>
!
vmps-vlan-group Engineering
vlan-name hardware
vlan-name software
!
!
!VLAN port Policies
!
!vmps-port-policies {vlan-name <vlan_name> | vlan-group <group-name> }
! { port-group <group-name> | device <device-id> port <port-name> }
!
vmps-port-policies vlan-group Engineering
 port-group WiringCloset1
vmps-port-policies vlan-name Green
 device 198.92.30.32 port 4/8
vmps-port-policies vlan-name Purple
 device 198.4.254.22 port 1/2
 port-group "Executive Row"

How the VMPS Works

After you enable VMPS by entering the set vmps state {enable | disable} command, the configuration information is downloaded from a TFTP server, and the VMPS begins to accept requests from clients. Upon subsequent resets of the Catalyst 5000 series switches, the configuration information is downloaded automatically from a TFTP server, and the VMPS is enabled.

The VMPS opens a User Datagram Protocol (UDP) socket to communicate with clients and listen to client requests. Upon receiving a valid request from a client, the VMPS searches its database for a MAC address-to-VLAN mapping. If the assigned VLAN is restricted to a group of ports, the VMPS verifies the requesting port against this group. If the VLAN is legal on this port, the VLAN name is passed in the response. If the VLAN is illegal on that port and the VMPS is not in secure mode, it sends an access denied response. If the VMPS is in secure mode, it sends a port shutdown response.

If the VLAN from the table does not match the current VLAN on the port and there are active hosts on the port, the VMPS sends an access denied or a port shutdown response based on the secure mode of the VMPS.

You can configure a fallback VLAN name into the VMPS. If the requested MAC address is not in the table, the VMPS sends the fallback VLAN name in response. If you do not configure a fallback VLAN and the MAC address does not exist in the table, the VMPS sends an access denied response. If the VMPS is in secure mode, it sends a port shutdown response.

You can also make an explicit entry in the configuration table to deny access to specific MAC addresses for security reasons by specifying a --NONE-- keyword for the VLAN name. In this case, the VMPS sends an access denied or port shutdown response.

Troubleshooting

After the VMPS successfully downloads the ASCII configuration file, it parses the file and builds a database. The VMPS outputs the statistics about the total number of lines parsed and the number of parsing errors. Set the syslog level for VMPS to 3 to obtain more information on the errors.

Configuring Dynamic Ports on Clients

To configure dynamic port VLAN membership on a client, use the following procedure:

Prerequisites

The following prerequisites apply to configuring dynamic ports:

Procedure

To configure dynamic ports on clients, perform the following steps.

Task Command
Step 1 Configure the VMPS IP address to be queried on the client. set vmps server ip_addr [primary]
Step 2 Configure the VLAN membership assignment to a port. set port membership mod_num / port_num.. {dynamic | static}

Verification

console (enable)> show vmps server
VMPS domain server		 VMPS Status
---------------------------------------
192.0.0.6
192.0.0.1	primary
192.0.0.9
Suppose you enter the following commands:
console (enable) > set port membership help
Usage: set port membership < mod_num / port_num..> < dynamic | static >
console (enable) > set port membership 3/1-3 dynamic
Ports 3/1-3 vlan assignment set to dynamic.
Spantree port fast start option enabled for ports 3/1-3.
console (enable) > set port membership 1/2 dynamic
Trunking port 1/2 vlan assignment cannot be set to dynamic.
console (enable) > set port membership 2/1 dynamic
ATM LANE port 2/1 vlan assignment can not be set to dynamic.
After entering the set port membership command followed by the show port command, you see the following display:
console> show port
Port 	Name	Status	Vlan	Level	Duplex	Speed	Type
1/1		connect	dyn-3	normal	full	100	100 BASE-TX
1/2		connect	trunk	normal	half	100	100 BASE-TX
2/1		connect	trunk	normal	full	155	OC3 MMF ATM
3/1		connect	dyn-5	normal	half	10	10 BASE-T
3/2		connect	dyn-5	normal	half	10	10 BASE-T
3/3		connect	dyn-5	normal	half	10	10 BASE-T

Note The show port command displays dyn- under the Vlan column of the display when it has not yet been assigned a VLAN for a port.

Troubleshooting

A port may shut down under the following circumstances:

If a dynamic port shuts down, enter the set port enable mod_num/port_num to reenable the port.

Example Configuration Assumptions

Refer to Figure 9-5. For this example, the following assumptions apply:

Example


Figure 9-5: Dynamic Port VLAN Membership Configuration

Example Configuration Procedure

Use the following procedure to configure the VMPS and dynamic ports:

Step 1 Configure Switch 1 as the primary VMPS, by performing the following tasks on Switch 1:

After entering these commands, the file Bldg-G.db is downloaded to Switch 1. Switch 1 becomes the VMPS server.


Step 2 Configure dynamic ports on the clients, Switch 2, and Switch 9, by performing the following tasks:

Entering this command on Switch 2 designates the VMPS switch to be queried. The primary switch option configures Switch 1 as the primary VMPS.


Switch 1, Switch 3, and Switch 10 are configured as VMPSs. Switch 1 is the primary VMPS. Switch 3 and Switch 10 are secondary servers. All the switches are clients.


Suppose you connect End Station 2 on port 3/1. When End Station 2 sends a packet, Switch 2 sends a query to the primary VMPS, Switch 1. Switch 1 responds with a VLAN that is assigned to port 3/1. Because Spanning-Tree Protocol (Portfast mode) is enabled by default for dynamic ports, port 3/1 is immediately connected and enters forwarding mode.


Step 3 Configure dynamic ports on Switch 9 by repeating Step 2 for Switch 9.

How Dynamic Port VLAN Membership Works

Dynamic ports work in conjunction with the VMPS, which holds a database of MAC address-to-VLAN mappings. This section describes dynamic port behavior and the interaction of dynamic port VLAN membership with other features.

On the current Catalyst 5000 series switch hardware platform, a dynamic (nontrunking) port can belong to only one VLAN at a time. Upon link-up, a dynamic port is isolated from its static VLAN. The source MAC address from the first packet of a new host on the dynamic port is sent to the VMPS, which provides the VLAN number to which this port must be assigned. When a new host sends a packet on a dynamic port, the packet is detected by the Network Management Processor (NMP). The NMP, using status information from the host packet, sends a query to the VMPS and then the VMPS responds with options. For example, suppose the NMP sends a query to the VMPS, and the VMPS response is "Place port in VLAN X." The port is then placed in VLAN X if the response is valid. At this point, the host is connected to VLAN X through the switch fabric.

Multiple hosts (MAC addresses) can be active on a dynamic port, provided they are all in the same VLAN. Upon link-down, a dynamic port is moved back to a state in which it is isolated from other VLANs, and the port ends in its initial state. Any hosts that come online through this port are detected by the NMP and then checked with the VMPS before these hosts are allowed network VLAN connectivity.

Dynamic port VLAN membership interacts with the following features:

When a port becomes dynamic, spanning-tree portfast is automatically enabled for that port. Portfast-enabled dynamic ports that are moved to a new VLAN are placed in forwarding mode and participate in spanning tree. Automatic enabling of spanning tree allows you to connect to the network quickly. In addition, spanning tree prevents applications on the host from timing out and entering loops caused by incorrect configurations. If desired, you can disable spanning-tree portfast mode on a dynamic port.
A host can move from a dynamic port to a static port on the same VLAN. When a host moves from a static port to an operational dynamic port on the same VLAN in less than five minutes, it immediately connects to that VLAN. When the NMP detects this event at a later time, it checks with the VMPS about the legality of the specific host on the dynamic port.
Static secure ports cannot become dynamic ports. You must turn off security on the static secure port before it can become dynamic.
Static ports that are trunking cannot become dynamic ports. You must first turn off trunking on the trunk port before changing it from static to dynamic.

Note The management domain and the management VLAN of the client and the server must be the same.

How VLANs Work

The VLANs on a Catalyst 5000 series switch simplify adding and moving end stations on a network. For example, when an end station is physically moved to a new location, its attributes can be reassigned from a network management station via SNMP or the CLI. When an end station is moved within the same VLAN, it retains its previously assigned attributes in its new location. When an end station is moved to a different VLAN, the attributes of the new VLAN are applied to the end station, according to the security levels in place.

The IP address of a Catalyst 5000 series switch supervisor engine module can be assigned to any VLAN. This mobility allows a network management station and workstations on any Catalyst 5000 VLAN to access directly another Catalyst 5000 series switch on the same VLAN without a router. Only one IP address can be assigned to a Catalyst 5000 series switch; if the IP address is reassigned to a different VLAN, the previous IP address assignment to a VLAN is invalid.

VLANs allow ports on the same or different switches to be grouped so that traffic is confined to members of that group only. This feature restricts broadcast, unicast, and multicast traffic (flooding) to ports only included in a certain VLAN. You can set up VLANs for an entire management domain from a single Catalyst 5000 series switch. A maximum of 250 VLANs can be active at any time.

Figure 9-6 shows an example of VLANs segmented into logically defined networks.


Figure 9-6: VLANs as Logically Defined Networks



VLANs in a Management Domain

The set vtp and set vlan commands use VTP to set up VLANs across an entire management domain. The default configuration group, defined as VLAN 1, is all switched Ethernet ports and Ethernet repeater ports.

By default, the Catalyst 5000 series switch is in the no-management domain state until it is configured with a management domain or receives an advertisement for a domain. If a switch receives an advertisement, it inherits the management domain name and configuration revision number. The switch ignores advertisements with a different management domain or an earlier configuration revision number and checks all received advertisements with the same domain for consistency. While a Catalyst 5000 series switch is in the no-management domain state, it is a VTP server; that is, it learns from received advertisements.

The set vtp command sets up the management domain, including establishing the management domain name, the VTP mode of operation (server, client, or transparent), the interval between VLAN advertisements, and the password value. There is no default domain name (the value is set to null). The default advertisement interval is five minutes. The default VTP mode of operation is set to server.

By default, the management domain is set to nonsecure mode without a password. A password sets the management domain to secure mode. You must configure a password on each Catalyst 5000 series switch in the management domain when in secure mode.

Caution  A management domain does not function properly if the management domain password is not assigned to each Catalyst 5000 series switch in the domain.

The set vlan command uses the following parameters to create a VLAN in the management domain:

The Catalyst 5000 series switch uses the SAID parameter of the set vlan command to identify each VLAN on an 802.10 trunk. The default SAID for VLAN 1 is 100001, for VLAN 2 is 100002, for VLAN 3 is 100003, and so on. The default MTU is 1500 bytes. The default state is active on an 802.10 trunk.

When translating from one VLAN type (Ethernet, FDDI, Token Ring, FDDI NET, or TR NET) to another, the Catalyst 5000 series switch requires a different VLAN number for each media type.

VLAN Components

VLANs consist of the following components:

Switches are the entry point for end-station devices into the switched fabric and provide the intelligence to group users, ports, or logical addresses into common communities of interest. LAN switches also increase performance and dedicated bandwidth across the network.
You can group ports and users into communities using a single switch or connected switches. By grouping ports and users together across multiple switches, VLANs can span single-building infrastructures, interconnected buildings, or campus networks. Each switch has the intelligence to make filtering and forwarding decisions by packet and to communicate this information to other switches and routers within the network.
Frame identification or tagging is one approach for logically grouping users into administratively defined VLANs. Tagging places a unique identifier in the header of each frame as it is forwarded throughout the switch fabric. The identifier is understood and examined by each switch prior to any broadcasts or transmissions to other switches, routers, or end-station devices. When the frame exits the switch fabric, the switch removes the identifier before the frame is transmitted to the target end station. Based on rules defined by the administrator, tagging determines where the frame is to be sent or broadcast.
Routers provide policy-based control, broadcast management, and route processing and distribution. They also provide the communication between VLANs and VLAN access to shared resources such as servers and hosts. Routers connect to other parts of the network that are either logically segmented into subnets or require access to remote sites across wide area links. Consolidating the overall number of physical router ports required for communication between VLANs, routers use high-speed backbone connections over Fast Ethernet, FDDI, or ATM for higher throughput between switches and routers.
VLANs provide system compatibility with previously installed systems, such as shared hubs and stackable devices. While many of these devices are being replaced with newer switching technologies, previously installed concentrators still perform useful functions. With VLANs, you can configure devices such as shared hubs as a part of the VLAN architecture and can share traffic and network resources that directly attach to switching ports with VLAN designations.
The VLAN transport enables information to be exchanged between interconnected switches and routers residing on the corporate backbone. Transport capabilities remove physical boundaries, increase flexibility of a VLAN solution, and provide mechanisms for interoperability between backbone system components.
The backbone acts as the aggregation point for large volumes of traffic. It also carries end-user VLAN information and identification between switches, routers, and directly attached servers. Within the backbone, high-bandwidth, high-capacity links carry the traffic throughout the enterprise. Three high-bandwidth options include Fast Ethernet, FDDI/CDDI, and ATM.
Network management solutions offer centralized control, configuration, and traffic management functions.

VLAN Technologies

Because switches and routers directly attach to the backbone, they must be able to transport VLAN information and interoperate with other network components. In response to these requirements, several different transport mechanisms are used for communicating VLAN information across high-performance backbones. Among them are the LANE standard that has been approved by the ATM Forum, Inter-Switch Link (ISL) for Fast Ethernet, and the IEEE 802.10 protocol, which provides VLAN communication across shared FDDI backbones. These different, yet interoperable, VLAN technologies are supported on the Catalyst 5000 series switch. Each allows a single link to carry information from multiple VLANs.

VLAN Examples

This section contains examples of VLAN configurations for ISLs on Fast Ethernet ports, multiple Catalyst 5000 series switches using Spanning-Tree Protocol, and 802.10 protocol on FDDI ports.

Inter-Switch Links on Fast Ethernet Ports

Any Fast Ethernet port can be configured as a trunk. Trunks use ISL to support multiple VLANs. An ISL trunk is like a continuation of the switching backplane. It allows for the Catalyst 5000 series switch to multiplex up to 1000 VLANs between switches and routers.

The Dynamic ISL (DISL) protocol dynamically configures trunk ports between Catalyst 5000 series switches; it synchronizes two interconnected Fast Ethernet interfaces into becoming ISL trunks and minimizes VLAN trunk configuration procedures because only one end of a link must be configured as a trunk or nontrunk.

Figure 9-7 shows an example of a Fast Ethernet ISL configuration.


Figure 9-7: Fast Ethernet ISL Configuration



Multiple Switch Spanning-Tree Protocol and VLAN Configuration

VLAN groups can be set up across multiple Catalyst 5000 series switches if the switches have any two ports of the same VLAN connected, as shown in Figure 9-8.


Figure 9-8: Multiple Switch Spanning-Tree Protocol and VLAN Configuration



The trunks and VLANs for the Catalyst 5000 series Switch 1 on the first floor were configured as follows:

System1> (enable) set vtp domain abc
VTP: domain abc modified
System1> (enable) set vlan 10
VTP: vlan addition successful
System1> (enable) set vlan 10 1/1-4
VLAN 10 modified.
VLAN 1 modified.
VLAN  Mod/Ports
---- -----------------------
10    1/1-4
System1> (enable) set vlan 20
VTP: vlan addition successful
System1> (enable) set vlan 20 2/5-24
VLAN 20 modified.
VLAN 1 modified.
VLAN  Mod/Ports
---- -----------------------
20    2/5-24
System1> (enable) set trunk 1/1-2 on
Port 1/1 mode set to on.
Port 1/2 mode set to on.
System1> (enable) 
Mon May 6 1996, 18:22:07  Port 1/1 and 1/2 has become trunk.
System1> (enable) show trunk
Port     Mode       Status        
-------  ---------  ------------  
1/1 	 on         trunking      
1/2      on         trunking      
Port     Vlans allowed
-------  --------------------------------------------------------------
1/1      1-1000
1/2      1-1000
4/1-2    1-1000
Port     Vlans active
-------  --------------------------------------------------------------
1/1      1
1/2      1,10,20
4/1-2    1
System1> (enable) show port
Port Name	       Status        Vlan       Level  Duplex Speed Type
---- --------------	---------- ---------- ------ ------ ----- -----------
1/1	connected	trunk	normal	full	100	100BaseTX
1/2	notconnect	trunk	normal	full	100	100BaseTX
2/1	notconnect	10	normal	half	10	10BaseT
2/2	notconnect	10	normal	half	10	10BaseT
2/3	notconnect	10	normal	half	10	10BaseT
2/4	connected	10	normal	half	10	10BaseT
2/5	notconnect	20	normal	half	10	10BaseT
2/6	notconnect	20	normal	half	10	10BaseT
.
.
.
2/23	notconnect 20         normal   half    10 10BaseT
2/24	notconnect 20         normal   half    10 10BaseT
Port Align-Err  FCS-Err    Xmit-Err   Rcv-Err
---- ---------- ---------- ---------- ----------
1/1           0          0          0          0
1/2           0          0          0          0
2/1           0          0          0          0
2/2           0          0          0          0
2/3           0          0          0          0
2/4           0          0          0          0
.
.
.
2/22          0          0          0          0
2/23          0          0          0          0
2/24          0          0          0          0
Port Single-Col Multi-Coll Late-Coll Excess-Col Carri-Sens Runts Giants
---- ---------- ---------- --------- ---------- ---------- ----- -------
1/1           0          0          0          0          0         0         -
1/2           0          0          0          0          0         0         -
2/1           0          0          0          0          0         0         0
2/2           0          0          0          0          0         0         0
2/3           0          0          0          0          0         0         0
2/4           0          0          0          0          0         0         0
.
.
.
2/22          0          0          0          0          0         0         0
2/23          0          0          0          0          0         0         0
2/24          0          0          0          0          0         0         0
                                   Ler
Port CE-State ConnState Type Neig Con Est Alm Cut Lem-Ct Lem-Rej-Ct Tl-Min
---- -------- --------- ---- ---- --------------- ------- --------- ------
Last-Time-Cleared
--------------------------
Mon May 6 1996, 17:59:45

The trunks and VLANs for the Catalyst 5000 series Switch 2 on the second floor were configured as follows:


Note Switch 2 is automatically configured with a trunk when the trunk is set on Switch 1.
Switch 2 learns about the VLANs set on Switch 1 through VTP.
System2> (enable) 
Mon May 6 1996, 16:35:47  Port 1/2 has become trunk.
System2> (enable) show trunk 
Port     Mode       Status        
-------  ---------  ------------  
1/1      auto trunking  
1/2      auto       trunking      
Port     Vlans allowed
-------  --------------------------------------------------------------
1/1      1-1000
1/2      1-1000
Port     Vlans active
-------  --------------------------------------------------------------
1/1      1,10,20,30
1/2      1,10,20,30
System2> (enable) show port
Port Name	       Status        Vlan       Level  Duplex Speed Type
---- --------------	---------- ---------- ------ ------ ----- -----------
1/1	connected	trunk	normal	half	100	100BaseTX
1/2	connected	trunk	normal	half	100	100BaseTX
2/1	notconnect	10	normal	half	10	10BaseT
2/2	notconnect	10	normal	half	10	10BaseT
2/3	notconnect	10	normal	half	10	10BaseT
2/4	connected	10	normal	half	10	10BaseT
.
.
.
2/21 	notconnect 	20         normal   half 10 10BaseT
2/22 	notconnect 	20         normal   half 10 10BaseT
2/23 	notconnect 	20         normal   half 10 10BaseT
2/24 	notconnect 	20         normal   half 10 10BaseT
Port Align-Err  FCS-Err   Xmit-Err   Rcv-Err
---- ---------- --------- ---------- ----------
1/1          0          0          0          0
1/2          0          0          0          0
2/1          0          0          0          0
2/2          0          0          0          0
2/3          0          0          0          0
2/4          0          0          0          0
.
.
.
2/19          0           0          0          0          0         0         0
2/20          0           0          0          0          0         0         0
2/21          0           0          0          0          0         0         0
2/22          0           0          0          0          0         0         0
2/23          0           0          0          0          0         0         0
2/24          0           0          0          0          0         0         0
Last-Time-Cleared
--------------------------
Mon May 6 1996, 16:04:07
System2> (enable) show port
Port Name         Status     Vlan       Level  Duplex Speed Type
---- ------------ ---------- ---------- ------ ------ ----- -----------
1/1	connected	trunk	normal	full	100	100BaseTX
1/2	connected	trunk	normal	full	100	100BaseTX
2/1	notconnect	10	normal	half	10	10BaseT
2/2	notconnect	10	normal	half	10	10BaseT
2/3	notconnect	10	normal	half	10	10BaseT
2/4	connected	10	normal	half	10	10BaseT
.
.
.
2/21              notconnect 20         normal   half    10 10BaseT
2/22              notconnect 20         normal   half    10 10BaseT
2/23              notconnect 20         normal   half    10 10BaseT
2/24              notconnect 20         normal   half    10 10BaseT
Port Align-Err  FCS-Err   Xmit-Err   Rcv-Err
---- ---------- --------- ---------- ----------
1/1          0          0          0          0
1/2          0          0          0          0
2/1          0          0          0          0
2/2          0          0          0          0
2/3          0          0          0          0
2/4          0          0          0          0
.
.
.
2/19          0           0          0          0          0         0         0
2/20          0           0          0          0          0         0         0
2/21          0           0          0          0          0         0         0
2/22          0           0          0          0          0         0         0
2/23          0           0          0          0          0         0         0
2/24          0           0          0          0          0         0         0
Last-Time-Cleared
--------------------------
Mon May 6 1996, 16:04:07

802.10 Protocol on FDDI Ports

VLANs can be extended across an FDDI network by multiplexing switched packets over a Copper Distributed Data Interface (CDDI)/FDDI interface using the 802.10 protocol. Using 802.10, Catalyst 5000 CDDI/FDDI interface links can operate as interswitch trunks that provide broadcast control between configured VLANs. The 802.10 protocol encapsulates a VLAN identifier and packet data according to the IEEE 802.10 specification. CDDI/FDDI interfaces that support 802.10 make selective forwarding decisions within a network domain based upon the VLAN identifier.

The VLAN identifier is a user-configurable four-byte SAID. The SAID identifies traffic as belonging to a particular VLAN. It also determines which VLAN each packet is switched to the bus.

Refer to Figure 9-9 for an example of configuring FDDI trunks. In this example, the SAID ensures that packets destined for VLAN 1 only reach VLAN 1 after they are transmitted across the FDDI trunks. Refer to Figure 9-10 for an example of an FDDI 802.10 VLAN network configuration.


Figure 9-9: FDDI Trunks Configuration




Figure 9-10:
FDDI 802.10 VLAN Network Configuration



VTP provides CDDI/FDDI module configuration for 802.10-based VLANs. VTP requires a protocol type (Ethernet, FDDI, or Token Ring) to be configured for each VLAN. A VLAN can only have one type associated with it. Each VLAN type must have its own unique identifier, and translations between different identifiers must be mapped. VTP advertises VLAN translation mappings to all Catalyst 5000 series switches in a management domain.

FDDI/CDDI modules integrate switched Ethernet and Fast Ethernet LANs into the FDDI network. To map an 802.10 FDDI VLAN to an Ethernet VLAN, you must map the 802.10 VLAN SAID to an Ethernet VLAN by mapping an Ethernet VLAN to an FDDI VLAN and assigning a SAID value to the FDDI VLAN.

If a CDDI/FDDI module receives a packet containing a VLAN SAID that maps to a locally supported Ethernet VLAN on the Catalyst 5000 series switch, the CDDI/FDDI module translates the packet into Ethernet format and forwards it across the switch backplane to the Ethernet module. CDDI/FDDI modules filter the packets they receive from reaching the backplane if the VLAN SAIDs in the packets do not map to a locally supported VLAN.

Figure 9-11 illustrates the configuration for forwarding a packet from the Ethernet module port 1 in slot 2 to the FDDI module port 1 in slot 5. For this example, you would specify the translation of Ethernet VLAN 2 to FDDI VLAN 22. FDDI VLAN 22 is then automatically translated to Ethernet VLAN 2. The VLAN SAID must be identical on both FDDI modules. Since 802.10 CDDI/FDDI interface links can operate as interswitch trunks, you can configure multiple VLAN translations over a link.


Figure 9-11: VLAN Identifiers for an FDDI 802.10 Configuration



CDDI/FDDI modules also support one native (nontrunk) VLAN, which handles all non-802.10 encapsulated FDDI traffic. A translation number does not need to be configured for the native VLAN since packets that are forwarded to the native VLAN do not contain VLAN identifiers. To map an Ethernet VLAN to an FDDI native VLAN, you must configure the FDDI port to be on the Ethernet VLAN. To do this, configure the Ethernet VLAN with the module number and port number of the FDDI-native VLAN.


Copyright 1989-1997 © Cisco Systems Inc.