Last Updated on April 9, 2018 by Admin
2.1.4.4 Packet Tracer – Configure VLANs, VTP, and DTP
Packet Tracer – Configure VLANs, VTP and DTP (Answer Version)
Answer Note: Red font color or gray highlights indicate text that appears in the Answer copy only.
Topology

2.1.4.4 Packet Tracer – Configure VLANs, VTP, and DTP
Addressing Table
Device | Interface | IP Address | Subnet Mask |
PC0 | NIC | 192.168.10.1 | 255.255.255.0 |
PC1 | NIC | 192.168.20.1 | 255.255.255.0 |
PC2 | NIC | 192.168.30.1 | 255.255.255.0 |
PC3 | NIC | 192.168.30.2 | 255.255.255.0 |
PC4 | NIC | 192.168.20.2 | 255.255.255.0 |
PC5 | NIC | 192.168.10.2 | 255.255.255.0 |
S1 | VLAN 99 | 192.168.99.1 | 255.255.255.0 |
S2 | VLAN 99 | 192.168.99.2 | 255.255.255.0 |
S3 | VLAN 99 | 192.168.99.3 | 255.255.255.0 |
Objectives
Part 1: Configure and Verify DTP
Part 2: Configure and Verify VTP
Background / Scenario
As the number of switches in a network increases, the administration necessary to manage the VLANs and trunks can be challenging. To ease some of the VLAN and trunking configurations, VLAN trunking protocol (VTP) allows a network administration to automate the management of VLANs. Trunk negotiation between network devices is managed by the Dynamic Trunking Protocol (DTP), and is automatically enabled on Catalyst 2960 and Catalyst 3560 switches.
In this activity, you will configure trunk links between the switches. You will configure a VTP server and VTP clients in the same VTP domain. You will also observe the VTP behavior when a switch is in VTP transparent mode. You will assign ports to VLANs and verify end-to-end connectivity with the same VLAN.
Part 1: Configure and Verify DTP
In Part 1, you will configure trunk links among the switches, and you will configure VLAN 999 as the native VLAN.
Step 1: Verify VLAN configuration.
Verify the configured VLANs on the switches.
a. On S1, click the CLI tab. At the prompt, enter enable and enter the show vlan brief command to verify the configured VLANs on S1.
S1# show vlan brief
VLAN Name Status Ports
—- ——————————– ——— ——————————-
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Gig0/1, Gig0/2
99 Management active
999 VLAN0999 active
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
b. Repeat step a. on S2 and S3. What VLANs are configured on the switches?
____________________________________________________________________________________
VLANs 99 and 999 are configured on all the switches.
Step 2: Configure Trunks on S1, S2, and S3.
Dynamic trunking protocol (DTP) manages the trunk links between Cisco switches. Currently all the switchports are in the default trunking mode, which is dynamic auto. In this step, you will change the trunking mode to dynamic desirable for the link between switches S1 and S2. For the link between switches S1 and S3, the link will be set as a static trunk. Use VLAN 999 as the native VLAN in this topology.
a. On switch S1 and switch S2, configure the trunk link to dynamic desirable on the GigabitEthernet 0/1 interface. The configuration of S1 is shown below.
S1(config)# interface g0/1
S1(config-if)# switchport mode dynamic desirable
b. For the trunk link between S1 and S3, configure a static trunk link on the GigabitEthernet 0/2 interface.
S1(config)# interface g0/2
S1(config-if)# switchport mode trunk
S3(config)# interface g0/2
S3(config-if)# switchport mode trunk
c. Verify trunking is enabled on all the switches using the show interfaces trunk command.
S1# show interfaces trunk
Port Mode Encapsulation Status Native vlan
Gig0/1 desirable n-802.1q trunking 1
Gig0/2 on 802.1q trunking 1
Port Vlans allowed on trunk
Gig0/1 1-1005
Gig0/2 1-1005
Port Vlans allowed and active in management domain
Gig0/1 1,99,999
Gig0/2 1,99,999
Port Vlans in spanning tree forwarding state and not pruned
Gig0/1 none
Gig0/2 none
What is the native VLAN for these trunks currently? VLAN 1
d. Configure VLAN 999 as the native VLAN for the trunk links on S1.
S1(config)# interface range g0/1 – 2
S1(config-if-range)# switchport trunk native vlan 999
What messages did you receive on S1? How would you correct it?
____________________________________________________________________________________
____________________________________________________________________________________
%CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on GigabitEthernet0/2 (999), with S3 GigabitEthernet0/2 (1).
%CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on GigabitEthernet0/1 (999), with S2 GigabitEthernet0/1 (1).
To correct native VLAN mismatch, configure VLAN 999 as the native VLAN on S2 and S3.
e. On S2 and S3, configure VLAN 999 as the native VLAN.
f. Verify trunking is successfully configured on all the switches. You should be able ping one switch from another switch in the topology using the IP addresses configured on the SVI.
Part 2: Configure and Verify VTP
S1 will be configured as the VTP server and S2 will be configured as a VTP client. All the switches will be configured to be in the VTP domain CCNA and use the VTP password cisco.
VLANs can be created on the VTP server and distributed to other switches in the VTP domain. In this part, you will create 3 new VLANs on the VTP server, S1. These VLANs will be distributed to S2 using VTP. Observe how the transparent VTP mode behaves.
Step 1: Configure S1 as VTP server.
Configure S1 as the VTP server in the CCNA domain with the password cisco.
a. Configure S1 as a VTP server.
S1(config)# vtp mode server
Setting device to VTP SERVER mode.
b. Configure CCNA as the VTP domain name.
S1(config)# vtp domain CCNA
Changing VTP domain name from NULL to CCNA
c. Configure cisco as the VTP password.
S1(config)# vtp password cisco
Setting device VLAN database password to cisco
Step 2: Verify VTP on S1.
a. Use the show vtp status command on the switches to confirm that the VTP mode and domain are configured correctly.
S1# show vtp status
VTP Version : 2
Configuration Revision : 0
Maximum VLANs supported locally : 255
Number of existing VLANs : 7
VTP Operating Mode : Server
VTP Domain Name : CCNA
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x8C 0x29 0x40 0xDD 0x7F 0x7A 0x63 0x17
Configuration last modified by 0.0.0.0 at 0-0-00 00:00:00
Local updater ID is 192.168.99.1 on interface Vl99 (lowest numbered VLAN interface found)
b. To verify the VTP password, use the show vtp password command.
S1# show vtp password
VTP Password: cisco
Step 3: Add S2 and S3 to the VTP domain.
Before S2 and S3 will accept VTP advertisements from S1, they must belong to the same VTP domain. Configure S2 as a VTP client with CCNA as the VTP domain name and cisco as the VTP password. Remember that VTP domain names are case sensitive.
a. Configure S2 as a VTP client in the CCNA VTP domain with the VTP password cisco.
S2(config)# vtp mode client
Setting device to VTP CLIENT mode.
S2(config)# vtp domain CCNA
Changing VTP domain name from NULL to CCNA
S2(config)# vtp password cisco
Setting device VLAN database password to cisco
b. To verify the VTP password, use the show vtp password command.
S2# show vtp password
VTP Password: cisco
c. Configure S3 to be in the CCNA VTP domain with the VTP password cisco. Switch S3 will be set in VTP transparent mode.
S3(config)# vtp mode Transparent
S3(config)# vtp domain CCNA
Changing VTP domain name from NULL to CCNA
S3(config)# vtp password cisco
Setting device VLAN database password to cisco
d. Enter show vtp status command on all the switches to answer the following question.
Notice that the configuration revision number is 0 on all three switches. Explain.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The configuration revision number increments by one every time a VLAN is added, deleted, or modified. No additional configurations have been made to VLANs on any of the switches.
Step 4: Create more VLANs on S1.
a. On S1, create VLAN 10 and name it Red.
S1(config)# vlan 10
S1(config-vlan)# name Red
b. Create VLANs 20 and 30 according to the table below.
VLAN Number | VLAN Name |
10 | Red |
20 | Blue |
30 | Yellow |
c. Verify the addition of the new VLANs. Enter show vlan brief at the privileged EXEC mode.
Which VLANs are configured on S1?
____________________________________________________________________________________
VLANs 1, 10, 20, 30, 99, and 999.
d. Confirm configuration changes using the show vtp status command on S1 and S2 to confirm that the VTP mode and domain are configured correctly. Output for S2 is shown here:
S2# show vtp status
VTP Version : 2
Configuration Revision : 6
Maximum VLANs supported locally : 255
Number of existing VLANs : 10
VTP Operating Mode : Client
VTP Domain Name : CCNA
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0xE6 0x56 0x05 0xE0 0x7A 0x63 0xFB 0x33
Configuration last modified by 192.168.99.1 at 3-1-93 00:21:07
How many VLANs are configured on S2? Does S2 have the same VLANs as S1? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
S2 has 10 VLANs, the same number as S1. Because S1 is the VTP server and S2 is a VTP client in the CCNA domain, S2 has received the VLAN information from S1.
Step 5: Observe VTP transparent mode.
S3 is currently configured as VTP transparent mode.
a. Use show vtp status command to answer the following question.
How many VLANs are configured on S3 currently? What is the configuration revision number? Explain your answer.
____________________________________________________________________________________
____________________________________________________________________________________
Currently there are 7 VLANs on S3. The configuration revision number is 0 because S3 is in transparent mode and VLAN configurations have not been changed since switch startup.
How would you change the number of VLANs on S3?
____________________________________________________________________________________
____________________________________________________________________________________
While S3 is in transparent mode, it will not implement the VLAN information from the VTP server, so all of the VLANs changes either need to be configured manually, or S3 can be changed to a VTP client to implement the VLAN information from VTP server.
b. Change VTP mode to client on S3.
Use show commands to verify the changes on VTP mode. How many VLANs exists on S3 now?
____________________________________________________________________________________
10
Note: VTP advertisements are flooded throughout the management domain every five minutes, or whenever a change occurs in VLAN configurations. To accelerate this process, you can switch between Realtime mode and Simulation mode until the next round of updates. However, you may have to do this multiple times because this will only forward Packet Tracer’s clock by 10 seconds each time. Alternatively, you can change one of the client switches to transparent mode and then back to client mode.
Step 6: Assign VLANs to Ports
Use the switchport mode access command to set access mode for the access links. Use the switchport access vlan vlan-id command to assign a VLAN to an access port.
Ports | Assignments | Network |
S2 F0/1 – 8
S3 F0/1 – 8 |
VLAN 10 (Red) | 192.168.10.0 /24 |
S2 F0/9 – 16
S3 F0/9 – 16 |
VLAN 20 (Blue) | 192.168.20.0 /24 |
S2 F0/17 – 24
S3 F0/17 – 24 |
VLAN 30 (Yellow) | 192.168.30.0 /24 |
a.Assign VLANs to ports on S2 using assignments from the table above.
S2(config-if)# interface range f0/1 – 8
S2(config-if-range)# switchport mode access
S2(config-if-range)# switchport access vlan 10
S2(config-if-range)# interface range f0/9 -16
S2(config-if-range)# switchport mode access
S2(config-if-range)# switchport access vlan 20
S2(config-if-range)# interface range f0/17 – 24
S2(config-if-range)# switchport mode access
S2(config-if-range)# switchport access vlan 30
b. Assign VLANs to ports on S3 using assignment from the table above.
Step 7: Verify end to end connectivity.
- From PC0 ping PC5.
- From PC1 ping PC4.
- From PC2 ping PC3.
Script
Switch S1
enable config t vtp mode server vtp domain CCNA vtp password cisco vlan 10 name Red vlan 20 name Blue vlan 30 name Yellow interface g0/1 switchport mode dynamic desirable switchport trunk native vlan 999 interface g0/2 switchport mode trunk switchport trunk native vlan 999 end
Switches S2 and S3
enable config t vtp mode client vtp domain CCNA vtp password cisco interface g0/1 switchport mode dynamic desirable switchport trunk native vlan 999 interface g0/2 switchport mode trunk switchport trunk native vlan 999 interface range f0/1 - 8 switchport mode access switchport access vlan 10 interface range f0/9 - 16 switchport mode access switchport access vlan 20 interface range f0/17 - 24 switchport mode access switchport access vlan 30 end