Configure VLANs and InterVLAN Routing

Publish Date: July 13, 2015

Configure VLANs and InterVLAN Routing

Configuring VLANs is pretty easy but before going into configuration, you need to plan how many VLANs you need and how to assign the users to different VLANs. Once you figure it out, you can go ahead and create the VLAN using global config vlan command.

VLAN RoutingAccording to above sample network, we need to create 3 VLANs with the names Sales, HR and Management. I will create the VLANs on Core switch and configure it as VTP server so that it can propagate these VLANs to other switches.

So, Let’s get started.

Create VLANs
Core#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Core(config)#vlan ?
  WORD        ISL VLAN IDs 1-4094
  access-map  Create vlan access-map or enter vlan access-map command mode
  dot1q       dot1q parameters
  filter      Apply a VLAN Map
  internal    internal VLAN

Core(config)#vlan 100
Core(config-vlan)#?
name  
Core(config-vlan)#name Sales
Core(config-vlan)#vlan 101
Core(config-vlan)#name HR
Core(config-vlan)#vlan 105
Core(config-vlan)#name Management
Core(config-vlan)#end
Core#

The command vlan followed by a number will create a VLAN and then name command will assign the descriptive name to VLAN, however name command is not mandatory. Now, lets take a look at VLANs on switch using show vlan command. This command will show you complete details of VLANs.

Core#show vlan 

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Fa0/3, Fa0/4, Fa0/5, Fa0/6
                                                Fa0/7, Fa0/8, Fa0/9, Fa0/10
                                                Fa0/11, Fa0/12, Fa0/13, Fa0/14
                                                Fa0/15, Fa0/16, Fa0/17, Fa0/18
                                                Fa0/19, Fa0/20, Fa0/21, Fa0/22
                                                Fa0/23, Fa0/24, Gig0/1, Gig0/2
100  Sales                            active    
101  HR                               active    
105  Management                       active    
1002 fddi-default                     act/unsup 
1003 token-ring-default               act/unsup 
1004 fddinet-default                  act/unsup 
1005 trnet-default                    act/unsup 

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1    enet  100001     1500  -      -      -        -    -        0      0
100  enet  100100     1500  -      -      -        -    -        0      0
101  enet  100101     1500  -      -      -        -    -        0      0
105  enet  100105     1500  -      -      -        -    -        0      0
1002 fddi  101002     1500  -      -      -        -    -        0      0   
1003 tr    101003     1500  -      -      -        -    -        0      0   
1004 fdnet 101004     1500  -      -      -        ieee -        0      0   
1005 trnet 101005     1500  -      -      -        ibm  -        0      0   

Remote SPAN VLANs
------------------------------------------------------------------------------


Primary Secondary Type              Ports
------- --------- ----------------- ------------------------------------------
Core#

If you want to see the brief details about VLANs, you can use show vlan brief command as shown below.

Core#show vlan brief 

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Fa0/3, Fa0/4, Fa0/5, Fa0/6
                                                Fa0/7, Fa0/8, Fa0/9, Fa0/10
                                                Fa0/11, Fa0/12, Fa0/13, Fa0/14
                                                Fa0/15, Fa0/16, Fa0/17, Fa0/18
                                                Fa0/19, Fa0/20, Fa0/21, Fa0/22
                                                Fa0/23, Fa0/24, Gig0/1, Gig0/2
100  Sales                            active    
101  HR                               active    
105  Management                       active    
1002 fddi-default                     active    
1003 token-ring-default               active    
1004 fddinet-default                  active    
1005 trnet-default                    active    
Core#

You can see the VLANs 100, 101 and 105 listed along with other VLANs that exists by default on switch and every interface is assigned to VLAN 1 by default. Remember that you cannot modify or delete default VLANs i.e. VLAN with ID 1 and 1002-1005.

VLANs are now created but each VLAN is unusable until any switchport is assigned to it. To assign an interface to VLAN, you need to go to each interface and tell it which VLAN to be a part of.

Configure Trunk Ports

You know that the trunk links are used to carry the traffic belonging to multiple VLANs. Switches SW1 and SW2 are connected to Core switch using 2 links. Now, we will configure links between these switches as Trunk.

SW1 configuration:

SW1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#interface range fastEthernet 0/1-2
SW1(config-if-range)#switchport mode trunk
SW1(config-if-range)#switchport trunk native vlan 105
SW1(config-if-range)#switchport trunk allowed vlan 100-105

In above configuration commands, I have selected both fastEthernet0/1 and fastEthernet0/2 interfaces using interface range command and then the command switchport mode trunk will set these interfaces in trunk mode. The switchport trunk native vlan command sets the native vlan to 105. Remember that by-default native VLAN is 1 but we have changed native VLAN to be 105 as a security measure. By default all the VLANs are allowed through trunk ports but we can use the switchport trunk allowed vlan command to specify the vlans that are allowed through trunk ports.

SW2 configuration:

SW2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW2(config)#int range fa0/3-4
SW2(config-if-range)#switchport mode trunk
SW2(config-if-range)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/3, changed state to down

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/3, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/4, changed state to down

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/4, changed state to up

SW2(config-if-range)#switchport trunk native vlan 105
SW2(config-if-range)#switchport trunk allowed vlan 100-105
SW2(config-if-range)#end
SW2#

Core configuration:

Core#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Core(config-if-range)#int range fa0/3-4
Core(config-if-range)#switchport mode trunk 
Command rejected: An interface whose trunk encapsulation is "Auto" can not be configured to "trunk" mode.
Command rejected: An interface whose trunk encapsulation is "Auto" can not be configured to "trunk" mode.
Core(config-if-range)#switchport trunk encapsulation dot1q 
Core(config-if-range)#switchport mode trunk 
Core(config-if-range)#switchport trunk native vlan 105
Core(config-if-range)#switchport trunk allowed vlan 100-105
Core(config-if-range)#int range fa0/1-2
Core(config-if-range)#switchport mode trunk 
Core(config-if-range)#switchport trunk native vlan 105
Core(config-if-range)#switchport trunk allowed vlan 100-105
Core(config-if-range)#switchport trunk encapsulation dot1q 
Core(config-if-range)#end
Core#

The configuration of Core switch is same as SW1 and SW2. You will notice that only switchport trunk encapsulation command is new in Core switch. This is because Core switch is Cisco 3560 which is a layer-3 switch and it supports multiple trunking methods such as ISL and dot1q as we have discussed above in VLAN Tagging Protocols section. Switches SW1 and SW2 are 2960 series switches which does not support multiple tagging methods. So, it does not give you the option to specify encapsulation type.

Now that the Trunk Links are configured. We will configure VTP on Core switch which will use trunk links to propagate VLANs to SW1 and SW2.

Configure VTP

We will configure Core switch to be VTP Server and others as client.

Core#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Core(config)#vtp ?
  domain    Set the name of the VTP administrative domain.
  mode      Configure VTP device mode
  password  Set the password for the VTP administrative domain
  version   Set the adminstrative domain to VTP version
Core(config)#vtp mode server 
Device mode already VTP SERVER.
Core(config)#vtp domain techtutsonline
Changing VTP domain name from NULL to techtutsonline
Core(config)#vtp password Abc@123
Setting device VLAN database password to Abc@123
Core(config)#end
Core#

The vtp mode server command sets the switch mode as VTP server. Notice that the switch says device mode already SERVER. This is because, by default every Cisco switch is VTP server. The vtp domain command sets VTP domain name and vtp password sets the password. This is pretty straightforward.

Now, the SW1 and SW2 need to be configured as VTP client and domain name and password must be same.

Before configuring VTP on SW1, I will use show vlan brief command to make sure no other VLANs exist on this switch (except default VLANs).

SW1#show vlan brief 

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Fa0/3, Fa0/4, Fa0/5, Fa0/6
                                                Fa0/7, Fa0/8, Fa0/9, Fa0/10
                                                Fa0/11, Fa0/12, Fa0/13, Fa0/14
                                                Fa0/15, Fa0/16, Fa0/17, Fa0/18
                                                Fa0/19, Fa0/20, Fa0/21, Fa0/22
                                                Fa0/23, Fa0/24, Gig0/1, Gig0/2
1002 fddi-default                     active    
1003 token-ring-default               active    
1004 fddinet-default                  active    
1005 trnet-default                    active    
SW1#

You can see there is no VLAN create yet. Now let’s go ahead and configure VTP.

SW1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#vtp mode client 
Setting device to VTP CLIENT mode.
SW1(config)#vtp domain techtutsonline
Changing VTP domain name from NULL to techtutsonline
SW1(config)#vtp password Abc@123
Setting device VLAN database password to Abc@123
SW1(config)#end
SW1#

Similarly on SW2

SW2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW2(config)#vtp mode client
Setting device to VTP CLIENT mode.
SW2(config)#vtp domain techtutsonline
Changing VTP domain name from NULL to techtutsonline
SW2(config)#vtp password Abc@123
Setting device VLAN database password to Abc@123
SW2(config)#end
SW2#

Now let’s check VLAN details once again.

SW2#show vlan brief 

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Fa0/1, Fa0/2, Fa0/5, Fa0/6
                                                Fa0/7, Fa0/8, Fa0/9, Fa0/10
                                                Fa0/11, Fa0/12, Fa0/13, Fa0/14
                                                Fa0/15, Fa0/16, Fa0/17, Fa0/18
                                                Fa0/19, Fa0/20, Fa0/21, Fa0/22
                                                Fa0/23, Fa0/24, Gig0/1, Gig0/2
100  Sales                            active    
101  HR                               active    
105  Management                       active    
1002 fddi-default                     active    
1003 token-ring-default               active    
1004 fddinet-default                  active    
1005 trnet-default                    active    
SW2#

Here we go. Did you see VLANs 100, 101 and 105 automatically created on SW2? This means VTP server has successfully propagated VLANs to SW2 and SW1.

Enable VTP Pruning
Core# configure terminal
Core(config)#vtp pruning
Pruning switched on
Core(config)#int range fa0/1-2
Core(config-if-range)#switchport trunk pruning vlan 100-105
Core(config-if-range)#end

The vtp pruning global config command is used to enable VTP pruning on switch and switchport trunk pruning vlan command is used to specify the VLANs to be pruned.

You can use show vtp status command to verify the status of VTP on switch as shown below.

SW2#show vtp status 
VTP Version                     : 2
Configuration Revision          : 0
Maximum VLANs supported locally : 255
Number of existing VLANs        : 8
VTP Operating Mode              : Client
VTP Domain Name                 : techtutsonline
VTP Pruning Mode                : Enabled
VTP V2 Mode                     : Disabled
VTP Traps Generation            : Disabled
MD5 digest                      : 0x5E 0x11 0x45 0x7E 0x5A 0x73 0x55 0x3E 
Configuration last modified by 192.168.1.12 at 3-1-93 00:29:40
SW2#

Now, it is time to assign switchports to specific VLANs.

Assigning Switch Ports to VLANs

You can configure each port on a switch to be in a specific VLAN by using the interface config mode switchport access vlan command. You can also configure multiple ports at the same time with the interface range command. In our sample network, PC1 and PC2 belong to VLAN 100 and VLAN 101 respectively. So, let’s assign the switchports accordingly.

SW1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#interface fastEthernet 0/3
SW1(config-if)#switchport mode ?
access Set trunking mode to ACCESS unconditionally
dynamic Set trunking mode to dynamically negotiate access or trunk mode
trunk Set trunking mode to TRUNK unconditionally
SW1(config-if)#switchport mode access 
SW1(config-if)#switchport access vlan 100
SW1(config-if)#
SW2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW2(config)#int fa0/1
SW2(config-if)#switchport mode access
SW2(config-if)#switchport access vlan 101
SW2(config-if)#

The switchport mode access command will set switchport to be access port and switchport access vlan command will set the port to be the member of respective vlan.

The options for switchport mode can be access, dynamic or trunk.

switchport mode access: This puts the interface into permanent non-trunking mode. The interface becomes a non-trunk interface regardless of whether the neighbor
interface is a trunk interface. The port would be a dedicated layer 2 port.

switchport mode dynamic auto: This mode makes the interface able to convert the link to a trunk link. The interface becomes a trunk interface if the neighbor interface is set to trunk or desirable mode. This is default mode in Cisco catalyst switches.

switchport mode dynamic desirable: This one makes the interface actively attempt to
convert the link to a trunk link. The interface becomes a trunk interface if the neighbor
interface is set to trunk, desirable, or auto mode.

switchport mode trunk: This puts the interface into permanent trunking mode and negotiates to convert the neighbor link into a trunk link. The interface becomes a trunk interface even if the neighbor interface isn’t a trunk interface.

switchport nonegotiate: This prevents the interface from generating Dynamic Trunking Protocol (DTP) frames. You can use this command only when the interface switchport mode is access or trunk. You must manually configure the neighboring interface as a trunk interface to establish a trunk link.

Configuring Inter-VLAN Routing using Router on a Stick

You have now configured VLANs, VTP and Trunk Links on all the switches in our sample network. By default, the hosts which are members of the same VLAN can communicate. To allow hosts on different VLANs to communicate, you need a layer 3 device (either a router or a layer 3 switch).

The inter-VLAN routing configuration steps are different on Router and Layer-3 switch. So, I will configure using both Router as well as Layer-3 switch.

I am going to start with the router approach first. Consider the following addressing scheme and network diagram.

PC1: 192.168.0.10, 255.255.255.0, default gateway 192.168.0.1
PC2: 192.168.2.10, 255.255.255.0, default gateway 192.168.2.1
SW1: 192.168.5.10, 255.255.255.0, default gateway 192.168.5.1
SW2: 192.168.5.11, 255.255.255.0, default gateway 192.168.5.1
Core: 192.168.5.12, 255.255.255.0, default gateway 192.168.5.1

Configure the IP address, subnet mask and default-gateway in PC1, PC2 and all the switches as shown above.

SW1(config)#int vlan 1
SW1(config-if)#no ip address
SW1(config-if)#shutdown
SW1(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to administratively down
SW1(config-if)#int vlan 105
%LINK-5-CHANGED: Interface Vlan105, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan105, changed state to up
SW1(config-if)#ip address 192.168.5.10 255.255.255.0
SW1(config-if)#exit
SW1(config)#ip default-gateway 192.168.5.1

Remember that we are using VLAN 105 as management VLAN instead of default VLAN 1. So, we have issued shutdown command under vlan 1.

SW2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW2(config)#int vlan 1
SW2(config-if)#no ip address
SW2(config-if)#shut
%LINK-5-CHANGED: Interface Vlan1, changed state to administratively down
SW2(config-if)#int vlan 105
%LINK-5-CHANGED: Interface Vlan105, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan105, changed state to up

SW2(config-if)#ip address 192.168.5.11 255.255.255.0
SW2(config-if)#exit 
SW2(config)#ip default-gateway 192.168.5.1
Core#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Core(config)#int vlan 1
Core(config-if)#no ip add
Core(config-if)#shut
%LINK-5-CHANGED: Interface Vlan1, changed state to administratively down

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down

Core(config-if)#int vlan 105
Core(config-if)#
%LINK-5-CHANGED: Interface Vlan105, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan105, changed state to up

Core(config-if)#ip add 192.168.5.12 255.255.255.0
Core(config-if)#exit
Core(config)#ip default-gateway 192.168.5.1

Because all switches are in same IP subnet, you can now verify if switches can reach each other by running ping.

PC1 and PC2 belong to different VLANs and all the switches are in separate VLAN (105)

VLAN Routing RouterYou know that Router generally has very limited number of interfaces as compared to layer-3 switch. So, we cant configure each router interface for different VLAN. Instead, we will divide the router’s one interface into logical sub-interfaces—one for each VLAN.

First, we need to configure the link between Core switch and R1 as Trunk and set the encapsulation to dot1q.

Core#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Core(config)#int gigabitEthernet 0/1
Core(config-if)#switchport trunk encapsulation dot1q 
Core(config-if)#switchport mode trunk 
Core(config-if)#switchport trunk native vlan 105
Core(config-if)#end
Core#

Now let’s go ahead and configure interVLAN routing on R1

R1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#interface gigabitEthernet 0/1.1
R1(config-subif)#encapsulation dot1Q ?
  <1-1005>  IEEE 802.1Q VLAN ID
R1(config-subif)#encapsulation dot1Q 100
R1(config-subif)#ip address 192.168.0.1 255.255.255.0
R1(config-subif)#no shutdown 
R1(config-subif)#interface gigabitEthernet 0/1.2
R1(config-subif)#encapsulation dot1Q 101
R1(config-subif)#ip address 192.168.2.1 255.255.255.0
R1(config-subif)#no shutdown 
R1(config-subif)#interface gigabitEthernet 0/1.5
R1(config-subif)#encapsulation dot1Q 105
R1(config-subif)#ip address 192.168.5.1 255.255.255.0
R1(config-subif)#no shutdown 
R1(config-subif)#int gig0/1
R1(config-if)#no ip address
R1(config-if)#no shut
R1(config-if)#end

In above configuration commands on R1, I have create 3 logical sub-interfaces under main physical interface gigabitEthernet0/1 with the name gigabitEthernet0/1.1, gigabitEthernet0/1.2 and gigabitEthernet0/1.5 for VLAN 100, 101 and 105 respectively. The number after interface name gigabitEthernet0/1 (1, 2, 5) is arbitrary and has nothing to do with VLAN ID. The command encapsulation dot1Q followed by VLAN ID is doing the actual magic of mapping the VLAN ID with router’s sub-interface and ip address command is used to assign the IP address to sub-interface (or VLAN interface). And at the end, you have to go into main interface configuration mode (gigabitEthernet0/1) and do a no shutdown command to bring the interface up. Remember, Router’s interfaces are shutdown by default.

After above configuration, PC1 and PC2 can now communicate with each other.

PC1>ipconfig

FastEthernet0 Connection:(default port)

   Link-local IPv6 Address.........: FE80::20A:F3FF:FEC5:2282
   IP Address......................: 192.168.0.10
   Subnet Mask.....................: 255.255.255.0
   Default Gateway.................: 192.168.0.1

PC1>ping 192.168.0.1

Pinging 192.168.0.1 with 32 bytes of data:

Reply from 192.168.0.1: bytes=32 time=1ms TTL=255
Reply from 192.168.0.1: bytes=32 time=1ms TTL=255
Reply from 192.168.0.1: bytes=32 time=0ms TTL=255
Reply from 192.168.0.1: bytes=32 time=0ms TTL=255

Ping statistics for 192.168.0.1:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 1ms, Average = 0ms

PC1>ping 192.168.2.10

Pinging 192.168.2.10 with 32 bytes of data:

Reply from 192.168.2.10: bytes=32 time=0ms TTL=127
Reply from 192.168.2.10: bytes=32 time=0ms TTL=127
Reply from 192.168.2.10: bytes=32 time=0ms TTL=127
Reply from 192.168.2.10: bytes=32 time=0ms TTL=127

Ping statistics for 192.168.2.10:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms

PC1>

In above configuration, we used a single interface of router to configure interVLAN routing. This method is also known as “router on a stick”. I also want to point out that this creates a bottleneck, as well as a single point of failure in your network. If R1 becomes unreachable due to any reason, none of your hosts will be able to communicate with hosts in different VLAN.

To mitigate this risk, you can you a layer-3 capable switch to perform inter VLAN communication.

Configuring Inter-VLAN Routing using Layer-3 Switch

Cisco catalyst switches accomplish inter-vlan routing by creating Layer 3 interfaces known as Switch Virtual Interfaces (SVI). This procedure requires layer 3 switch like Catalyst 3560, 3750, 4500 4000 Series running Enhanced Multilayer Image (EMI) or Standard Multilayer Image (SMI) with IOS 12.1(11) EA1 and later.

Consider the following sample network.

InterVLAN using L3SW1 Switch Configuration
SW1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#vtp mode client
Setting device to VTP CLIENT mode.
SW1(config)#vtp domain techtutsonline
Changing VTP domain name from NULL to techtutsonline
SW1(config)#vtp password Abc@123
Setting device VLAN database password to Abc@123
SW1(config)#int giga0/1
SW1(config-if)#switchport mode trunk
SW1(config-if)#end
SW1#
%SYS-5-CONFIG_I: Configured from console by console

SW1#show vlan brief 

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24
                                                Gig0/2
10   VLAN0010                         active    
20   VLAN0020                         active    
30   VLAN0030                         active    
1002 fddi-default                     active    
1003 token-ring-default               active    
1004 fddinet-default                  active    
1005 trnet-default                    active    
SW1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#interface fastEthernet 0/1
SW1(config-if)#switchport access vlan 10
SW1(config-if)#interface fastEthernet 0/2
SW1(config-if)#switchport access vlan 20
SW1(config-if)#interface fastEthernet 0/3
SW1(config-if)#switchport access vlan 30
SW1(config-if)#end
SW1#
L3 Switch Configuration
L3#config term
L3(config)#vtp mode server
Device mode already VTP SERVER.
L3(config)#vtp domain techtutsonline
Changing VTP domain name from NULL to techtutsonline
L3(config)#vtp password Abc@123
Setting device VLAN database password to Abc@123
L3(config)#vtp pruning
L3(config)#
L3(config)#int gig0/1
L3(config-if)#switchport trunk encapsulation dot1q 
L3(config-if)#switchport mode trunk 
L3(config-if)#exit
L3(config)#interface vlan 10
L3(config-if)#
%LINK-5-CHANGED: Interface Vlan10, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan10, changed state to up

L3(config-if)#ip address 192.168.10.1 255.255.255.0
L3(config-if)#no shutdown 
L3(config-if)#interface vlan 20
L3(config-if)#ip address 192.168.20.1 255.255.255.0
%LINK-5-CHANGED: Interface Vlan20, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan20, changed state to up

L3(config-if)#interface vlan 30
L3(config-if)#ip address 192.168.30.1 255.255.255.0
%LINK-5-CHANGED: Interface Vlan30, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan30, changed state to up

L3(config-if)#exit
L3(config)#ip routing
L3(config)#end
L3#

In L3 configuration, I have assigned IP address to each switched virtual interface (SVI). and then enabled IP routing using ip routing global mode command.

After completing above step, all the hosts PC1, PC2 and PC3 should be able to communicate among each other. Verify using ping command from PC1.

PC1>ipconfig

FastEthernet0 Connection:(default port)

   Link-local IPv6 Address.........: FE80::20D:BDFF:FE82:2509
   IP Address......................: 192.168.10.10
   Subnet Mask.....................: 255.255.255.0
   Default Gateway.................: 192.168.10.1

PC1>ping 192.168.10.1

Pinging 192.168.10.1 with 32 bytes of data:

Reply from 192.168.10.1: bytes=32 time=0ms TTL=255
Reply from 192.168.10.1: bytes=32 time=0ms TTL=255

Ping statistics for 192.168.10.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms

Control-C
^C
PC1>ping 192.168.30.30

Pinging 192.168.30.30 with 32 bytes of data:

Request timed out.
Reply from 192.168.30.30: bytes=32 time=0ms TTL=127
Reply from 192.168.30.30: bytes=32 time=1ms TTL=127
Reply from 192.168.30.30: bytes=32 time=0ms TTL=127

Ping statistics for 192.168.30.30:
    Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 1ms, Average = 0ms

PC1>

You can see that interVLAN routing is pretty easy to accomplish using Layer-3 switch as compared to that of Router. There is no need of creating sub-interfaces as we did in case of Router. Using layer-3 switch, SVI and ip routing process can do the magic of inter-VLAN communication.

This concludes the VLAN and inter-VLAN routing section.

Back



Microsoft Certified | Cisco Certified