NET201: Networking with Lab 2
Configuring Per-Interface Inter-VLAN Routing
                         Laboratory Exercise # 3
                                  GRADE
Section: 2-IT4                                     Signature
Leader      : BANTULA, Mark Steiven A.             ___________________
Members     :
              DE VILLLA, Rhenne Angelle M.         ___________________
              PADILLA, Jose Rodolfo B.             ___________________
                 Date Performed     : 13 September 2019
                 Date Submitted     : 16 September 2019
                          Leonardo D. Antivo
                            (Lab Instructor)
OBJECTIVES AND MATERIALS
Objectives:
   After this laboratory, students should be able to:
   1. build the network and configure basic device settings,
   2. create VLANs and assign switch ports,
   3. configure switches with VLANs and trunking, and
   4. verify trunking, VLANs, routing, and connectivity
Materials:
         QUANTITY          PART                  DESCRIPTION
                          NUMBER
                                       Working Personal Computer (PC)
              1                -       with Installed Cisco Packet Tracer
                                       Software
Scenario:
       Legacy inter-VLAN routing is seldom used in today’s networks; however, it
is helpful to configure and
       understand this type of routing before moving on to router-on-a-stick (trunk-
based) inter-VLAN routing or
       configuring Layer-3 switching. Also, you may encounter per-interface inter-
VLAN routing in organizations with
       very small networks. One of the benefits of legacy inter-VLAN routing is
ease of configuration.
       In this lab, you will set up one router with two switches attached via the
router Gigabit Ethernet interfaces.
      Two separate VLANs will be configured on the switches, and you will set up
routing between the VLANs.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated
Services Routers (ISRs) with Cisco IOS, Release 15.2(4)M3(universalk9 image).
The switches used are Cisco Catalyst 2960s with Cisco IOS, Release 15.0(2)
(lanbasek9 image).
PROCEDURES
Task 1. Build the Network and Configure Basic Device Settings.
   1. Cable the network topology as shown in Figure 3.1 using Packet Tracer network
      simulator software.
   2. Initialize and reload the router and switch. Note: If configuration files were
      previously saved on the router or switch, initialize and reload these devices back
      to their default configurations (Reminders: Capture all the outputs since they part
      of your data results).
   3. Configure basic settings for CORE_RTR.
      3.1. Console into CORE_RTR and enter global configuration mode.
      3.2. Execute the basic configuration of the router such as:
          a. Configure the host name (“CORE_RTR”) as shown in the topology,
          b. Disable IP domain lookup,
          c. Enable password encryption,
          d. Provide enable password (“core”)
          e. Include message of the day banner (“Unauthorized              access     is
               strictly prohibited!”)
          f.   Provide a password for console 0 and virtual terminal type 0 to 4 during
               login (“corertr”)
      3.3. Configure IP addressing on G0/0 and G0/1 and enable both interfaces (Refer
           to Table 3.1)
      3.4. Copy the running configuration to the startup configuration.
   4. Configure PC hosts (Refer to the addressing table (Table 3.1) for PC host address
      information)
   5. Issue a show ip interface brief command to verify the status of router
      interfaces.
Task 2. Configure Switches with VLANs and Trunking
   In task 2, you will configure the switches with VLANs and trunking.
   1. Configure VLANs on ACCESS_SW1.
      a) Enter global configuration mode and configure the switch host name
          (“ACCESS_SW1”).
   b) On ACCESS_SW1, create VLAN 10. Assign STUDENTS as the VLAN name.
   c) Create VLAN 20. Assign FACULTY as the VLAN name.
   d) Configure F0/1 as a trunk port.
   e) Assign ports F0/5 and F0/6 to VLAN 10 and configure both F0/5 and F0/6 as
        access ports.
   f)   Assign an IP address to VLAN 10 and enable it (refer to the addressing table
        in Table 3.1)
   g) Configure the default gateway according to the addressing table presented in
        Table 3.1.
   h) Enable password encryption,
   i)   Provide enable password (“sw1”)
   j)   Include message of the day banner (“Unauthorized access is strictly
        prohibited!”), and
   k) Provide a password for console 0 and virtual terminal type 0 to 4 during login
        (“access”)
   l)   Copy the running configuration to the startup configuration.
2. Issue a show ip interface brief command to verify the status of the
   switch interfaces.
3. Issue a show vlan brief command to verify the status of the switch VLANs.
4. Issue a show interfaces trunk command to verify the summary of switch
   trunking protocols.
5. Configure VLANs on ACCESS_SW2.
   a) Enter global configuration mode and configure the switch host name
        (“ACCESS_SW2”).
   b) On ACCESS_SW2, create VLAN 10. Assign STUDENTS as the VLAN name.
   c) Create VLAN 20. Assign FACULTY as the VLAN name.
   d) Configure F0/1 as a trunk port.
   e) Assign ports F0/11 and F0/18 to VLAN 20 and configure both F0/11 and F0/18
        as access ports.
   f)   Assign an IP address to VLAN 10 and enable it (refer to the addressing table
        in Table 3.1)
   g) Configure the default gateway according to the addressing table presented in
        Table 3.1.
   h) Enable password encryption,
      i)   Provide enable password (“sw2”)
      j)   Include message of the day banner (“Unauthorized access is strictly
           prohibited!”), and
      k) Provide a password for console 0 and virtual terminal type 0 to 15 during login
           (“access”)
      l)   Copy the running configuration to the startup configuration.
   6. Issue a show ip interface brief command to verify the status of the
      switch interfaces.
   7. Issue a show vlan brief command to verify the status of the switch VLANs.
   8. Issue a show interfaces trunk command to verify the summary of switch
      trunking protocols.
Task 3. Verify Trunking, VLANs, Routing, and Connectivity
   1. Enter the global configuration of the router to verify the routing table using show
      ip route command.
      What routes are listed on CORE_RTR?
      ________________________________________________________________
      ________________________________________________________________
      ________________________________________________________________
   2. On both switches, issue the show interface trunk command. Is the F0/1 port on
      both switches set to trunk (yes/no)? ______
   3. Issue a show vlan brief command on both switches. Verify that VLANs 10
      and 20 are active and that the proper ports on the switches are in the correct
      VLANs.
      Why is F0/1 not listed in any of the active VLANs?
      ________________________________________________________________
      ________________________________________________________________
   4. Ping from PC-1 in VLAN 10 to PC-2 in VLAN 20. If Inter-VLAN routing is functioning
      correctly, the pings between the 192.168.10.0 network and the 192.168.20.0
      should be successful.
   Note: It may be necessary to disable the PC firewall to ping between PCs.
5. Verify connectivity between devices. You should be able to ping between all
   devices. Troubleshoot if you are not successful.
6. Save your Packet Tracer file as NET201 Lab 3 – Group#
NETWORK TOPOLOGY DIAGRAM
  Figure 3.1. Per-interface Inter-VLAN environment network diagram
DATA RESULTS
Table 3.1. Summary of network device interface IP addresses
                                                    SUBNET         DEFAULT
 NETWORK DEVICE     INTERFACE     IP ADDRESS
                                                   ADDRESS         GATEWAY
                       G0/0        192.168.20.1   255.255.255.0        NA
    CORE_RTR
                       G0/1        192.168.10.1   255.255.255.0        NA
   ACCESS_SW1         VLAN 10     192.168.10.11   255.255.255.0   192.168.10.1
   ACCESS_SW2         VLAN 10     192.168.10.12   255.255.255.0   192.168.10.1
       PC1              NIC        192.168.10.3   255.255.255.0   192.168.10.1
       PC2              NIC        192.168.20.3   255.255.255.0   192.168.20.1
Task 1. Set Up the Topology and Initialize Devices (CLI commands, results, or
        answers to some question)
Screenshot 1: Executing the basic configuration of CORE_RTR.
Screenshot 2: Configuring IP address on G0/0 and G0/1 and enabling both
               interfaces.
Screenshot 3: Copying the running configuration to the startup configuration.
Screenshot 4: Issuing a show IP interface brief command to verify the status of
               router interfaces.
Task 2. Configure Basic Device Settings and Verify Connectivity (CLI
        commands, results, or answers to some question)
Screenshot 1: Configuring VLANs on ACCESS_SW1.
Screenshot 2: Enabling password encryption on ACCESS_SW1.
Screenshot 3: Issuing a show IP interface brief command to verify the status of
               the ACCESS_SW1 interfaces.
Screenshot 4: Issuing a show vlan brief command to verify the status of the
              ACCESS_SW1 VLANs.
Screenshot 5: Issuing a show interfaces trunk command to verify the
               summary of ACCESS_SW1 trunking protocols.
Screenshot 6: Configuring VLANs on ACCESS_SW2.
Screenshot 7: Enabling password encryption on ACCESS_SW2.
Screenshot 8: Issuing a show IP interface brief command to verify the status of
               the ACCESS_SW2 interfaces.
Screenshot 9: Issuing a show vlan brief command to verify the status of the
              ACCESS_SW2 VLANs.
Screenshot 10: Issuing a show interfaces trunk command to verify the
                summary of ACCESS_SW2 trunking protocols.
Task 3. Configure Basic Device Settings and Verify Connectivity (CLI
        commands, results, or answers to some question)
Screenshot 1: Issuing a show IP route command.
Screenshot 2: Pinging PC_1 to PC_2
Screenshot 3: Pinging PC_2 to PC_1
Screenshot 4: Pinging PC_1 to ACCESS_SW1
Screenshot 5: Pinging PC_1 to ACCESS_SW2
Screenshot 6: Pinging PC_1 to CORE_RTR G0/1
Screenshot 7: Pinging PC_1 to CORE_RTR G0/0
Screenshot 8: Pinging PC_2 to ACCESS_SW1
Screenshot 9: Pinging PC_2 to ACCESS_SW2
Screenshot 10: Pinging PC_2 to CORE_RTR G0/1
Screenshot 11: Pinging PC_2 to CORE_RTR G0/0
Screenshot 12: PC1 IP Address
Screenshot 13: PC2 IP Address
DATA ANALYSIS / OBSERVATIONS
    The Inter-VLAN routing is as a way to forward traffic between different VLAN
by implementing a router in the network. In VLANs it logically segments the switch
into different subnets, when a router is connected to the switch, an administrator
can configure the router to forward the traffic between the various VLANs
configured on the switch. The user nodes in the VLANs forwards traffic to the router
which then forwards the traffic to the destination network regardless of the VLAN
configured on the switch. Otherwise, Inter-VLAN routing using a router on a stick
utilizes an external router to pass traffic
between VLANs.
    The use of VLAN means that the users would not be able to communicate
across other departments. The VLAN is a unique broadcast domain, so computers
on separate VLANs are, by default, not able to communicate. There is a way to
permit these computers to communicate; it is called inter-VLAN routing. One of the
ways to carry out inter-VLAN routing is by connecting to the switch infrastructure.
VLANs associated with unique IP subnets on the network.
    In this laboratory experiment VLANs are used to segment switched networks.
Layer 2 switches, such as the 2960-24TT. Inter VLAN routing is performed by
connecting different physical router interfaces to different physical switch ports.
The switch ports connected to the router are placed in access mode and each
physical interface is assigned to a different VLAN.
    Inter VLAN is a service you can’t live without in network administration. Using
VLAN has a limitation. The user nodes located on different VLANs cannot
communicate by default and it causes traffic to the network. The user nodes in the
VLANs forward the traffic to the router which then forwards the traffic to the
destination network regardless of the VLAN configured on the switch. A router is
usually connected to the switch using multiple interfaces. One for each VLAN. The
interfaces on the router are configured as the default gateway for the VLANs
configured on the switch.
    In this laboratory experiment we are able to create an inter VLAN, where we
manage to reduce the flow of traffic to our network. When we met the requirements
of the following in activating the VLANs and inter VLAN. That is the time that all IP
address is activated and working. And the network is working.
QUESTIONS AND ANSWERS
   Questions:
       1. What is an advantage and disadvantage of using legacy per-interface
          Inter-VLAN routing?
       2. Describe the difference of per-interface Inter-VLAN routing over trunk-
          based Inter-VLAN routing. Which is better? Support your claims by
          providing comparison and explanation.
       3. What are different types of switch VLANs? Describe each type and site
          an example where this VLANs used in networking.
       4. Identify the different switchport mode in Cisco switch and discuss each.
          Also, provide a CLI command to accomplish each mode.
   Answers:
1.) The advantages and disadvantages of using legacy per-interface Inter-VLAN
Routing are the following:
-It allows each router interface to accept traffic from the VLAN associated with
the connected switches interface. The traffic can then be routed to the
appropriate VLAN.
-the disadvantages of legacy Inter-VLAN routing is that it requires multiple
physical interface on both the switch and the router. This means if the network
grows, more hardware is required if you exceeded the number of physical
interfaces for switches or router.
2.) Legacy inter VLAN routing are rarely used in modern networks. It is useful to
configure and understand this sort of routing before proceeding t router-on-a-stick
inter VLAN routing or configuring the layer 3 switch. Legacy inter-VLAN routing's
advantage is simple as configuring. You may also experience per-interface Inter-
VLAN routing in associating with little networks.
  Using an 802.1Q trunk between at least one switch and a single router interface
is a second way for giving routing and connection to numerous VLANs. This
method is called router-on-a-stick inter-VLAN routing where the physical router
interface gives consistent pathways is separated into different sub interfaces to all
VLANs associated.
  Trunk-based inter- VLAN routing is much better than per-interface inter- VLAN
routing because it allows one interface to route several VLANs rather than per-
interface inter-VLAN which only allow one port in one VLAN.
    3.) The different types of switch VLANs are the following:
       a.) Default Vlan- it is the VLAN where unassigned port is located. (VLAN
       1)
       b.) Data Vlan- it is the vlan that segregates a pc into another. It is also the
       vlan that user's using.
       c.) Management Vlan. This is also called the Administrator vlan, It instruct
       switch in some terms.
       d.) Native Vlan- It is the part of vlan1 use to send traffic to the device that
       is not registered in the switch.
      e.)Voice Vlan- It is use by the VoIP users. This is for telephones or any
device that use video and audio.
4.) The different switchport mode in Ciscl switch are:
a. Switchport Mode Access - A normal way in connecting switch.
 -command
            switch(config)#int
            switch(config-if)#switchport mode access
            switch(config-if)#switchport access vlan
b. Switchport mode trunk - Use to lessen the port used in connecting switch to
another.
Static- Manually assigned VLAN.
 -command
           switch(config)#int
           switch(config-if)#switchport mode trunk
           switch(config-if)#switchport allowed vlan
c. Dynamic trunk auto- Automatically assigned VLANs.
  -command
           switch(config)#int
           switch(config-if)#switchport mode trunk
           switch(config-if)#switchport trunk dynamic auto
d. Dynamic desirable
  -command
           switch(config)#int
           switch(config-if)#switchport mode trunk
           switch(config-if)#switchport mode trunk dynamic desirable
CONCLUSION
      Based on objective 1. each VLAN in its very own subnet and communicate
area, which implies that edges communicated into the system are exchanged
distinctly between the port inside the equivalent VLAN. For between VLAN
correspondences, an OSI layer 3 gadget is required. Layer 3 Gadget requires an
IP address in each VLAN and have an associated course to each of those subnets.
The hosts in each subnet would be able to be arranged to utilize the switch's IP
addresses as their default entryway.
 Between VLAN routing permit, hosts and PCs in various VLAN to speak with one
another. Machines or PC in same VLAN can speak with one another however, in
the event that you need, machines from other VLAN to speak with you, for that,
you have to design inter- VLAN routing.
  As stated by Oden, John, VLAN innovation is incorporated into the capabilities
of most current Ethernet switches. VLAN carries on simply like a LAN in all regards
however, with extra adaptability. By utilizing VLAN innovation, it is conceivable to
subdivide a solitary physical switch into a few coherent switches. VLANS are
actualized by utilizing the suitable switch arrangement directions to make the
VLANS and allot explicit change interfaces to the ideal VLAN. After doing this
activity, we presume that inter- VLAN directing can be performed by associating
distinctive physical switch interfaces to various physical switch interfaces.
  Based on objective 2, this implies each port on a switch is to put into access
mode, and each physical interface on that switch would be relegated to an
alternate VLAN. The traffic would then be able to be steered to the suitable VLAN
and when utilizing a switch to encourage between VLAN directing, the switch
interfaces can be associated with isolated VLANs.
  Based on objective 3, between VLAN routing is the way toward sending system
traffic starting with one VLAN then onto the next VLAN utilizing a switch. As we
realize that, VLAN trunk enables you to impart between at least two same VLANs
on various switches. Inter- VLAN steering enables you to convey between at least
two totally extraordinary VLAN in a similar switch or other with the assistance of
layer gadget routing.
  Based on objective 4, verifying trunking, VLANs, routing, and connectivity. The
router should be located central to the switches, is that the paths are kept short
and unnecessary layer 2 hoops are avoided. Ideally, each switch is connected
directly to the router or with just one hop in between. To enable nodes from
different VLANs to communicate with each other you need an IP subnet for each
VLAN and a router. It is usually on this router that you control the inter- VLAN
traffic. The router can be a layer-3 switch or a 'real' router.
REFERENCES
Electronic Books:
Inter-VLAN Routing. Retrieved from https://www.ccnablog.com/inter-vlan-routing/
Ralcheff, N. (2014, July 31). Inter-VLAN routing. Retrieved from
https://sites.google.com/site/nikiccnawiki/switches/inter-vlanrouting