VIrtual Local Area Network (VLAN)

Matt Carey
A free video tutorial from Matt Carey
Cisco CCNA Instructor - IPversity
4.3 instructor rating • 22 courses • 51,659 students

Learn more from the full course

Cisco Networking Fundamentals - CCNA Prep

Advance your Cisco networking knowledge and prepare for the CCNA exam

05:56:12 of on-demand video • Updated January 2019

  • Cisco Networking
  • Configure Cisco Routers and Switches
  • Knowledge to interview for a networking job
  • Deploy a LAN
  • Troubleshoot networking issues
  • Start a career in networking
English [Auto] In this section we're going to learn how to configure view lands on switches and the difference with support modes that will be used for the lab assignments. OK so let's start out with the basics. Let's say we wanted to assign HOST A and host be here to the and to first we'd have to go to these switch configurations and actually globally define the plan too. So the first step when configuring villans on switches is to define the villain. If the villain is not defined on the switch then the switch will not pass traffic for that Ulam once our view lands are defined. Then we have to configure our switch ports for that VLAN. So for the user a user because traffic to be assigned to be LAN to we have to tell the switch poor to do so for this type of set up since we just have an hosts that do not understand be lands and were simply just trying to put their traffic on the land too. We would use what's called the access mode port access mode ports simply just a sign and the traffic coming from the connected device to the VLAN that you define in the configuration and any traffic Eger passing a access port is considered to be untagged meaning that it does not have any of the land tag assignments because computers any type of device that you would connect to an access mode for we don't assume that it supports villans or understands beyond tags so when the traffic sent it back to the devices that are connected to access more ports it has no LAN information. So now we've configured the ports that the host are connected to. But what about between the switches for this example since we're only using one Bil'in we could actually configure the switch to switch connections the same way with access mode and two configurations. And then we would have the land to define throughout the switched path so that configuration is fine for this example. But what if we had other villans connected to these switches. If any of you 3 traffic were to be sent out of these inter switch connections the traffic would be dropped because we're only passing traffic for the land too in this access mode. Interesse switch configuration. So for this scenario since we need to pass multiple villans across these ports then we would use what's called a trunk mode port. So with a trunk mode for the switches we actually use Villon tags to assign to the traffic coming from the connected devices so that switches across the LAN would know what the plan to send the traffic out to. So let's take a look at how this configuration would flow if user a end user see or to sign Ethernet frames to switch one. So here comes a user sees frame and user A's frame. And since they both entered their access mobile and ports the switch would assign the corresponding villaine to that traffic when their frames were going to be sent out of the switch one port connected a switch to switch one would add Bil'in tags to those frames since there were violent tags assigned to these frames. Now switch to knows which villans to send the traffic to and that's how we can have multiple villains traverse a switch port. Let's look at a quick comparison of access mode and trunk mode ports access mode ports would have devices like computers printers or cameras connected to them. Trunk mode ports would have devices like switches VM hosts an autonomous or flux connect access points are connected to them. And just always remember that traffic leaving an access mode port is going to be untagged and traffic leaving a trunk mode poor is going to be tagged.