Comments within and below.


---- On Sat, 14 Jul 2001, Priscilla Oppenheimer 
([EMAIL PROTECTED]) wrote:

> Thanks, Paul!

You're welcome :-)
 
> OK, I don't really think VTP is evil. I can definitely 
understand the 
> problem that it solves.

It's just like any other protocol.  It can do both good and 
evil.  It will tend to do more good as you know its 
capabilities and limitations.  It does have the ability to 
scale to very large networks and greatly simplify the task of 
managing VLANs.  It can also bring your network down in an 
heartbeat.
 
> I have it working now. I have one switch set to client and 
one set to 
> server, which works fine. I didn't think I could use client 
on a Cat
> 1900 
> because the documentation says you can't configure client.
 
Unless something dramatic changed, the switch will support all 
three modes.  The first reference to it in the command line 
based version is here(watch wrap):

http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/192
8v67x/eescg67x/02vlans.htm#31633

>From the most current (9.x) version of the IOS you have:

http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/192
8v9x/cli/part2.htm#xtocid1826474

If you are referencing the ICND notes, you are correct, they 
are wrong.  They may have been fixed in a lter revision to the 
course materials.
 
http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/192
8v9x/ee_scg/1vlans.htm#xtocid288056

I believe this reference is dated.  What version of 1900 IOS 
are you using?  Go to global config mode and do a VTP ? and see 
what the choices are.  The docs don't always tell the truth, 
and sometimes the truth changes.
 

> > > vtp trunk pruning-disable 10 50
> >
> >I think the effect of this was to have only VLAN1 span both
> >switches.
> 
> The effect is that Pruning of 10 and 50 are Disabled so that 
they DO
> span 
> the trunk. They should have been spanning it anyway, though.
> 
> >  Somehow, I am still wondering if you got a trunk
> >established.
> 
> Yes I had a trunk. "Show trunk a" said it was on and using 
ISL.
> 
> Once the network was stable I was able to remove the command 
and all is 
> working, so now so I'm not sure it really was the problem. 


It's hard to say unless you did a very thorough job of 
documenting every step that you took.  It may have been some 
anomaly that cannot be reproduced.  It's happened to me before.


But, there
> was 
> something funny going on, that's for sure. I couldn't see 
multicasts
> with 
> my Sniffer on the monitor port either and now I can.
> 
> Regarding VLAN 1, I have one more question. If you give a 
switch an IP 
> address, that address is part of VLAN 1, right?

Well, generally yes.  That assumes that you did not change the 
management VLAN from VLAN 1 to something else.  The command to 
change this is:

switchA(config)#ip mgmt-vlan [vlan-number]


 The problem with that is
> 
> that you may not have any other ports that are part of VLAN 
1, since
> VLAN 1 
> is the management VLAN generally. So how do you ping or SNMP 
the switch 
> then? What is considered "best practice" for this?

Well, consider this possibility.  First, let's assume that all 
ports on a switch will be assigned to VLAN 1 unless told 
otherwise.  If you decide to change the management VLAN to VLAN 
100, then in order for SNMP, telnet, and other types of 
management traffic to work, you would only need to ensure that 
you have your switches connected with trunks.  As long as each 
trunk passes VLAN 100, you will be able to communicate to all 
managed devices (switches, managed hubs, routers, etc).  
Another benefit is that user traffic will not pass on and 
compete for bandwidth on the management VLAN 100.  The only 
traffic that should be on VLAN 100 is management traffic.  User 
traffic can flow on VLANs 10,20,30, and 40 for instance.  They 
might even correspond to the 1st floor, 2nd floor, 3rd floor, 
and 4th floor of your building.

So what about VLAN 1 and all those ports that are assigned to 
it by default?  Technically, you have no user traffic there.  
You have no management traffic there.  What kind of traffic 
could you have?  My guess would be hackers who are trying to 
access your network at layer 2.  All you need is an Ethernet 
jack to get it going.  So, what do  you do with those ports?  
My bet would be to place them in a VMPS configuration and set 
the port for ignore mode and turn the SNMP traps on.  This is 
equivalent to a silent alarm.

> 
> Thanks again. I walked into this thinking, "what could be so 
hard about 
> configuring data-link-layer devices?" Hah! 

Indeed.  The deception is that people think that LAN switches 
are just a souped of version of a hub with a few extra bennies 
thrown in.  The reality is far from that truth.  Our discussion 
of VTP only scratches the surface of the complexity of LAN 
switches 8-)


Clark and Hamilton devote 900
> 
> pages to it! ;-) 

And they both did an excellent job explaining it all.  Anybody 
who is planning on taking the CCIE lab and has not read that 
book is starting off at a major disadvantage.

It took me a whole day to get two switches, VLANs,
> DISL, 
> VTP, trunking, STP, and load sharing working correctly. Give 
me a router
> 
> any day! ;-) 

Admittedly, my penchant is for routers, but I developed a 
liking for LAN switches, particularly when I saw the power of 
multicasting.

Seriously, I think my problems all started with not using
> VTP 
> correctly from the start. Thanks for all the advice on it.

Any time.

v/r,

Paul Werner


________________________________________________
Get your own "800" number
Voicemail, fax, email, and a lot more
http://www.ureach.com/reg/tag




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=12449&t=11687
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to