Configuring VTP, Vlans, Vlan Trunks, and Vmps
Configuring VTP, Vlans, Vlan Trunks, and Vmps
Configuring VTP
Before you create VLANs, you must decide whether to use VTP in your network. If you choose to
use VTP, you must decide whether the switch will be a VTP server or a VTP client. If you choose
not to use VTP, you must set the switch to transparent mode. If you use VTP, you must decide
whether to use VTP version 1 or version 2. If you are using VTP in a Token Ring environment, you
must use version 2.
After you decide which version of VTP to run, you must create a VTP domain (also called a VLAN
management domain) before you create the desired VLANs. In a VTP domain, VLANs can only be
created, changed, and deleted if the switch is in VTP server mode (the default). The VLAN
configuration cannot be changed if the switch is in VTP client mode. Both clients and servers update
their VTP and VLAN configuration based on the advertisements they receive over their trunk links.
VTP version 1 is supported in Catalyst 5000 series supervisor engine software release 2.1 or later
and ATM software release 3.1 or later. VTP version 2, an extension to VTP that supports Token Ring
LAN switching and other features, is supported in Catalyst 5000 series software release 3.1(1) and
later.
For more information on VTP, see the “Understanding VTP” section in this chapter.
Configuration Guidelines
Caution VTP version 1 and VTP version 2 are not interoperable on switches in the same VTP
domain. Every switch in the VTP domain must use the same VTP version.
Procedure
A VTP version 2-capable switch will not run version 2 unless you manually enable it on at least one
switch in the VTP domain. To enable VTP version 2, perform this task in privileged mode:
Task Command
Enable VTP version 2. set vtp v2 enable
To configure the switch as a VTP server, perform these tasks in privileged mode:
Task Command
Step 1 Define the VTP domain name. set vtp domain name
Step 2 Place the switch in VTP server set vtp mode server
mode.
Step 3 (Optional) Enable VTP pruning. set vtp pruning enable
VTP pruning is disabled by
default.
Step 4 (Optional) Set a password for the set vtp passwd passwd
VTP domain.
To configure the switch as a VTP client, perform these tasks in privileged mode:
Task Command
Step 1 Define the VTP domain name. set vtp domain name
Step 2 Place the switch in VTP client set vtp mode client
mode.
The VTP client switch receives VTP updates from VTP servers and updates its configuration
accordingly. The following example shows how to configure the switch as a VTP client:
Console> (enable) set vtp domain Lab_Network
VTP domain Lab_Network modified
Console> (enable) set vtp mode client
VTP domain Lab_Network modified
Console> (enable)
To configure the switch as VTP transparent (effectively disabling VTP on the switch), perform this
task in privileged mode:
Task Command
Place the switch in VTP transparent mode set vtp mode transparent
(disabling VTP on the switch).
A VTP transparent switch does not send VTP updates, and ignores VTP updates from VTP servers.
This example shows how to configure the switch as VTP transparent:
Console> (enable) set vtp mode transparent
VTP domain modified
Console> (enable)
Verification
To verify the VTP configuration, perform these tasks:
Task Command
Step 1 Verify the VTP domain show vtp domain
configuration.
Step 2 View the VTP statistics. show vtp statistics
This example shows the output of the show vtp domain command indicating that the switch is VTP
version 2-capable and that VTP version 2 is enabled:
Console> show vtp domain
Domain Name Domain Index VTP Version Local Mode Password
-------------------------------- ------------ ----------- ----------- ----------
Engineering 1 2 server -
This example shows the output for a switch configured as a VTP server:
Console> show vtp domain
Domain Name Domain Index VTP Version Local Mode Password
-------------------------------- ------------ ----------- ----------- ----------
Engineering 1 2 server -
This example shows the output for a switch configured as a VTP client:
Console> (enable) show vtp domain
Domain Name Domain Index VTP Version Local Mode Password
-------------------------------- ------------ ----------- ----------- ----------
Lab_Network 1 2 client -
This example shows the output for a switch configured as VTP transparent:
Console> (enable) show vtp domain
Domain Name Domain Index VTP Version Local Mode Password
-------------------------------- ------------ ----------- ----------- ----------
1 2 Transparent -
To show VTP statistics, such as VTP advertisements sent and received and VTP errors, enter the
show vtp statistics command:
Console> (enable) show vtp statistics
VTP statistics:
summary advts received 7
subset advts received 6
request advts received 0
summary advts transmitted 983
subset advts transmitted 35
request advts transmitted 21
No of config revision errors 0
No of config digest errors 0
Understanding VTP
VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency throughout
the network. VTP manages the addition, deletion, and renaming of VLANs on a network-wide basis,
and allows you to make central changes that are automatically communicated to all the other
switches in the network.
VTP minimizes possible configuration inconsistencies that arise when changes are made. These
inconsistencies can result in security violations because VLANs cross connect when duplicate
names are used and internally disconnect when VLANs are incorrectly mapped between one LAN
type and another.
Using VTP, each Catalyst 5000 series switch advertises its management domain on its trunk ports,
its configuration revision number, and its known VLANs and their specific parameters. A VTP
domain is made up of one or more interconnected devices that share the same VTP domain name. A
switch can be configured to be in one and only one VTP domain.
VTP servers and clients maintain all VLANs everywhere within the VTP domain. A VTP domain
defines the boundary of a particular VLAN. Servers and clients transmit information through trunks
to other attached switches and receive updates from those trunks.
VTP servers either maintain information in nonvolatile memory or access it using TFTP. Using VTP
servers, you can modify the global VLAN information with either the VTP MIB via the SNMP or
using the CLI. When you add or advertise VLANs, both servers and clients are notified that they
should be prepared to receive traffic on their trunk ports. A VTP server can also instruct a switch to
delete a VLAN and disable all ports assigned to it.
Advertisement frames are sent to a multicast address so that they can be received by all neighboring
devices, but they are not forwarded by normal bridging procedures. All devices in the same
management domain learn about any new VLANs configured in the transmitting device. Because of
this process, you need to configure a new VLAN only on one device in the management domain. All
other devices in the same management domain learn the configured information automatically. VTP
is transmitted on all trunk connections, including ISL, 802.1Q, 802.10, and LANE.
A new VLAN is indicated by a VTP advertisement received by a device running VTP. Devices
accept the traffic of the new VLAN and propagate it to their trunks after adding the VTP-learned
VLANs to their trunks.
Using periodic advertisements, VTP tracks configuration changes and communicates them to other
switches in the network. When a new switch is added to the network, the added devices receive
updates from VTP and automatically configure existing VLANs within the network.
VTP also maps VLANs dynamically across multiple LAN types with unique names and internal
index associations. Mapping eliminates excessive device administration required from network
administrators.
VTP establishes global configuration values and distributes the following global configuration
information:
• VLAN IDs (ISL and 802.1Q)
• Emulated LAN names (ATM LAN Emulation)
• 802.10 SAID values (FDDI)
• Maximum transmission unit (MTU) size for a VLAN
• Frame format
VTP version 2 supports Token Ring LAN switching and the following features:
• Unrecognized Type-Length-Value (TLV) Support—A VTP server or client propagates
configuration changes to its other trunks, even for TLVs it is not able to parse. The unrecognized
TLV is saved in NVRAM.
• Version-Dependent Transparent Mode—In VTP version 1, the transparent mode inspects VTP
messages for the domain name and version, and forwards a message only if the version and
domain name match. Since only one domain is supported in Catalyst 5000 series, VTP version 2
forwards VTP messages in transparent mode, without checking the version.
• Consistency Checks—In VTP version 2, VLAN consistency checks (such as VLAN names and
values) are done only when new information is entered through SNMP or the CLI. Consistency
checks are not done when new information is obtained from a VTP message, or when information
is read from NVRAM. If the digest on a received VTP message is correct, its information is
accepted without consistency checks.
When enabled, VTP pruning does not prune traffic from VLANs that are not pruning-eligible. By
default, VLANs 2 through 1000 are pruning-eligible. VLAN 1 is always pruning-ineligible; traffic
from VLAN 1 cannot be pruned.
To make a VLAN pruning ineligible, enter the clear vtp pruneeligible command. To make a VLAN
pruning eligible again, enter the set vtp pruneeligible command. You can issue these commands
regardless of whether VTP pruning is enabled or disabled. Pruning eligibility resides on the local
device only.
Configuration Guidelines
These guidelines apply to switches within the same VTP domain:
• Enabling or disabling VTP pruning on a VTP server enables or disables VTP pruning for the
entire management domain.
• Making VLANs pruning-eligible or pruning-ineligible on a switch affects pruning-eligibility for
those VLANs on that device only (not for the entire management domain).
Procedures
To configure VTP pruning, perform these tasks in privileged mode:
Task Command
Step 1 Enable VTP pruning in the management set vtp pruning enable
domain.
Step 2 (Optional) Make specific VLANs clear vtp pruneeligible vlan_range
pruning-ineligible on the device. (By
default, VLANs 2–1000 are
pruning-eligible.)
Step 3 (Optional) If necessary, make specific set vtp pruneeligible vlan_range
VLANs pruning-eligible on the device.
This example shows how to enable VTP pruning in the management domain and how to make
VLANs 2–99, 250–255, and 501–1000 pruning-eligible on the particular device:
Console> (enable) set vtp pruning enable
This command will enable the pruning function in the entire management domain.
All devices in the management domain should be pruning-capable before enabling.
Do you want to continue (y/n) [n]? y
VTP domain Lab_Network modified
Console> (enable) clear vtp pruneeligible 100-500
Vlans 1,100-500,1001-1005 will not be pruned on this device.
VTP domain Lab_Network modified.
Console> (enable) set vtp pruneeligible 250-255
Vlans 2-99,250-255,501-1000 eligible for pruning on this device.
VTP domain Lab_Network modified.
Console> (enable)
Task Command
Disable VTP pruning in the management domain. set vtp pruning disable
This example shows how to disable VTP pruning in the management domain:
Console> (enable) set vtp pruning disable
This command will disable the pruning function in the entire management domain.
Do you want to continue (y/n) [n]? y
VTP domain Lab_Network modified
Console> (enable)
Verification
To verify the VTP pruning configuration, perform these tasks:
Task Command
Step 1 Verify the VTP pruning show vtp domain
configuration.
Step 2 Check whether VLANs are being show trunk
pruned on trunk ports.
This example shows how to verify the VTP pruning configuration using the show vtp domain
command. The arrow shows that VTP pruning is enabled, and that VLANs 2–99, 250–255, and
501–1000 are pruning-eligible:
Console> (enable) show vtp domain
Domain Name Domain Index VTP Version Local Mode Password
-------------------------------- ------------ ----------- ----------- ----------
Lab_Network 1 2 server -
This example shows how to verify the VTP pruning configuration using the show trunk command.
The arrow shows that VLANs 1 and 522–524 are in spanning-tree forwarding state and are not
pruned on the trunk:
Console> (enable) show trunk
Port Mode Encapsulation Status Native vlan
-------- ----------- ------------- ------------ -----------
1/1 auto isl trunking 523
3/1 on lane trunking 1
4/1-2 on lane trunking 1
-------- ---------------------------------------------------------------------
1/1 1,522-524
3/1
4/1-2
Console> (enable)
Switch 4
Port 2
Switch 5 Switch 2
Red
VLAN
Port 1
S5812
Figure 9-2 shows the same switched network with VTP pruning enabled. The broadcast traffic from
Switch 1 is not forwarded to Switches 3, 5, and 6 because traffic from the Red VLAN has been
pruned on the links indicated (port 5 on Switch 2 and port 4 on Switch 4).
Switch 4
Port 2
Flooded traffic
is pruned Port
4 Switch 2
Red
VLAN
Switch 5
Port
5
Port 1
S5813
Switch 6 Switch 3 Switch 1
Configuring VLANs
Two main tasks are involved with configuring VLANs:
• Creating the VLAN and setting its parameters
• Assigning one or more Catalyst 5000 series switch ports to the VLAN
If you are configuring Token Ring VLANs, see the section “Creating Token Ring VLANs (TrBRFs)”
later in this chapter.
Creating a VLAN
Enter the set vlan command to create a VLAN and enter the clear vlan command to delete a VLAN.
If the switch is a VTP server, changes to the VLAN configuration are propagated to other switches
in the VTP domain. If the switch is a VTP client, you cannot create or delete VLANs; you must
change the VTP mode of the switch or perform the VLAN configuration on a VTP server. If the
switch is in VTP transparent mode, the VLAN configuration affects the particular switch only and
is not propagated to other switches in the network.
VLANs support a number of parameters, only a few of which are discussed in this section. For
complete information on the set vlan command and its parameters, refer to the Catalyst 5000 Series
Command Reference publication.
Configuration Guidelines
Before you can create a VLAN on the switch, you must do one of the following:
• Define a VTP domain and place the switch in VTP server mode
• Place the switch in VTP transparent mode (effectively disabling VTP on the switch)
For information on configuring VTP, see the section “Configuring VTP” earlier in this chapter.
Procedures
To create a VLAN on the switch, perform this task in privileged mode:
Task Command
Create a VLAN. If desired, assign it a set vlan vlan_num [name name]
name (the VLAN number is used as the
name if no name is specified).
Task Command
Delete a VLAN. clear vlan vlan_num
This example shows how to delete a VLAN (in this case, the switch is a VTP server):
Console> (enable) clear vlan 100
This command will deactivate all ports on vlan 100
in the entire management domain
Do you want to continue(y/n) [n]?y
Vlan 100 deleted
Console> (enable)
Verification
To verify the VLAN configuration, perform this task:
Task Command
Verify the VLAN configuration. show vlan
VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
Procedure
To assign one or more switch ports to a VLAN, perform this task in privileged mode:
Task Command
Assign one or more switch ports set vlan vlan_num mod_num/port_num
to a VLAN.
Note If you specify a VLAN that does not exist, the VLAN is created and the specified ports are
assigned to it.
Figure 9-3 shows a switch that has ports 1 through 4 assigned to VLAN 10 (Engineering) and ports
5 through 12 assigned to VLAN 20 (Accounting).
1 2 3 4 5 6 7 8 9 10 11 12
Host A
H3065
VLAN 10 VLAN 20
Engineering Accounting
Verification
To verify the port VLAN assignments, perform either of these tasks:
Task Command
• Verify the port VLAN assignments. show vlan
• Verify the port VLAN assignments. show port
This example shows how to verify the port VLAN assignments using the show vlan command:
Console> (enable) show vlan
VLAN Name Status Mod/Ports, Vlans
---- -------------------------------- --------- ----------------------------
1 default active 1/2
2/1-12
5/1-2
522 VLAN0522 active
523 VLAN0523 active
524 VLAN0524 active
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
522 enet 100522 1500 - - - - - 0 0
523 enet 100523 1500 - - - - - 0 0
524 enet 100524 1500 - - - - - 0 0
1002 fddi 101002 1500 - 0x0 - - - 0 0
1003 trcrf 101003 1500 0 0x0 - - - 0 0
1004 fdnet 101004 1500 - - 0x0 ieee - 0 0
1005 trbrf 101005 1500 - - 0x0 ibm - 0 0
This example shows how to verify the port VLAN assignments using the show port command:
Console> (enable) show port
Port Name Status Vlan Level Duplex Speed Type
----- ------------------ ---------- ---------- ------ ------ ----- ------------
1/1 connected trunk normal half 100 100BaseTX
1/2 notconnect 1 normal half 100 100BaseTX
2/1 connected 1 normal half 100 100BaseTX
2/2 notconnect 1 normal half 100 100BaseTX
2/3 notconnect 1 normal half 100 100BaseTX
2/4 notconnect 1 normal half 100 100BaseTX
2/5 notconnect 1 normal half 100 100BaseTX
2/6 notconnect 1 normal half 100 100BaseTX
2/7 notconnect 1 normal half 100 100BaseTX
2/8 notconnect 1 normal half 100 100BaseTX
2/9 notconnect 1 normal half 100 100BaseTX
2/10 notconnect 1 normal half 100 100BaseTX
2/11 notconnect 1 normal half 100 100BaseTX
2/12 notconnect 1 normal half 100 100BaseTX
3/1 notconnect trunk normal full 155 OC3 MMF ATM
4/1 notconnect trunk normal full 45 DS3 ATM
4/2 notconnect trunk normal full 45 DS3 ATM
5/1 notconnect 1 normal half 100 FDDI
5/2 notconnect 1 normal half 100 FDDI
<... output truncated ...>
Console> (enable)
Configuration Guidelines
When configuring a TrBRF, note these guidelines:
• The VLAN number for the default TrBRF is 1005. Possible bridge number values, in
hexadecimal format, are 00 through 0F. The bridge number for the default bridge is 0F.
• If you set the TrBRF state to suspend, all logical ports associated with the TrBRF are disabled
and shown as inactive.
• You cannot assign a TrCRF to the default TrBRF (1005). The default TrBRF can only be the
parent of the default TrCRF (1003).
• Two TrBRF Spanning-Tree Protocol and TrCRF bridge mode configurations will result in the
logical ports (the connection between the TrBRF and the TrCRF) of the TrBRF being put in a
blocked state:
— The TrBRF is running the IBM Spanning-Tree Protocol and the TrCRF is in SRT mode.
— The TrBRF is running the IEEE Spanning-Tree Protocol and the TrCRF is in SRB mode.
• The default Spanning-Tree Protocol for a TrBRF is IBM.
Procedures
To configure a new TrBRF, enter this version of the set vlan command in privileged mode:
Task Command
Configure a new TrBRF. set vlan vlan_num [name name] type trbrf [state
{active | suspend}] [mtu mtu]
bridge bridge_number [stp {ieee | ibm}]
After entering the set vlan command, you see this display:
Console> (enable) set vlan 999 name brf-999 type trbrf
Vlan 999 configuration successful
Console> (enable)
To change an existing TrBRF, enter this command in privileged mode, changing the appropriate
parameters as necessary:
Task Command
Change an existing TrBRF. set vlan vlan_num [name name] [state {active |
suspend}] [mtu mtu] [bridge bridge_number]
[stp {ieee | ibm}]
Verification
To verify the configuration of Token Ring VLANs, enter this command:
Task Command
Verify the configuration. show vlan [vlan_num]
After entering the show vlan command and specifying a TrBRF, you see this display:
Console> show vlan 1005
VLAN Name Status Mod/Ports, Vlans
---- -------------------------------- --------- ----------------------------
1005 trbrf-default active 1003
VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
1005 trbrf 101005 4472 - - 0xf ibm - 0 0
TrBRF 3
TrCRF TrCRF TrCRF
400 350 200
S6813
You cannot distribute TrCRFs across switches as illustrated in Figure 9-5. Ports associated with a
TrCRF must be located within the same Catalyst 5000 series switch. However, one exception to this
rule is the default Token Ring VLAN configuration of the Token Ring module. By default, the Token
Ring VLAN configuration of the Token Ring module has all ports assigned to the default TrCRF
(1003). The default TrCRF is associated with the default TrBRF (1005). If you have not configured
the ports of a Token Ring module to associate with a new TrCRF, traffic is passed between the default
TrCRFs located on separate switches that are connected via ISL.
Note To pass data between rings located on separate switches, you can associate the rings to the
same TrBRF and configure the TrBRF for SRB.
Switch A Switch B
ISL
TrBRF 2
TrCRF TrCRF TrCRF
300 300 300
S6812
The backup TrCRF enables you to configure an alternate route for traffic between undistributed
TrCRFs located on separate switches that are connected by a TrBRF, should the ISL connection
between the switches become inactive. You can configure only one port per switch as part of a
backup TrCRF and only one backup TrCRF for a TrBRF.
To create a backup TrCRF, assign one port on each switch that the TrBRF traverses to the backup
TrCRF. Under normal circumstances, only one port in the backup TrCRF is active. If the ISL
connection between the switches becomes inactive, the port that is a part of the backup TrCRF on
each affected switch automatically becomes active, rerouting traffic between the undistributed
TrCRFs through the backup TrCRF. When the ISL connection is reestablished, all but one port in the
backup TrCRF is disabled. Figure 9-6 illustrates the backup TrCRF.
Switch A Switch B
ISL
TrBRF 1
TrCRF TrCRF
600 601
Backup
TrCRF 612
S6811
Configuration Guidelines
When configuring a TrCRF, note these guidelines:
• The VLAN number for the default TrCRF is 1003. Possible ring_number values, in hexadecimal
format, are 01 through FFF.
• You must configure the TrBRF to which you plan to associate the TrCRF before you configure
the TrCRF.
• If you set the TrCRF state to suspend, all ports associated with the TrCRF are disabled and
shown as inactive.
• The default bridge mode of a TrCRF is SRB.
• These two TrBRF Spanning-Tree Protocol and TrCRF bridge mode configurations place the
logical ports (the connection between the TrBRF and the TrCRF) of the TrBRF in a blocked state:
— The TrBRF is running the IBM Spanning-Tree Protocol and the TrCRF is in SRT mode.
— The TrBRF is running the IEEE Spanning-Tree Protocol and the TrCRF is in SRB mode.
• You cannot assign a TrCRF to the default TrBRF (1005). The default TrBRF can only be the
parent of the default TrCRF (1003).
Procedures
To configure a new TrCRF, perform this task in privileged mode, ensuring that you specify each
parameter that applies to the TrCRF type you are configuring:
Task Command
Configure a new TrCRF. set vlan vlan_num [name name] type trcrf [state
{active | suspend}] [mtu mtu]
ring ring_number parent vlan_num [mode {srt |
srb}] [backupcrf {off | on}]
[aremaxhop hopcount] [stemaxhop hopcount]
After entering the set vlan command, you see this display:
Console> (enable) set vlan 1000 name crf-1000 type trcrf ring 001 parent 999
Vlan 1000 configuration successful
Console> (enable)
To change an existing TrCRF, perform this task in privileged mode, changing the appropriate
parameters as desired:
Task Command
Change an existing TrCRF. set vlan vlan_num [name name] [state {active |
suspend}] [mtu mtu] [ring ring_number]
[parent vlan_num] [mode {srt | srb}] [backupcrf
{off | on}] [aremaxhop hopcount]
[stemaxhop hopcount]
To specify that a TrCRF is a backup TrCRF, perform this task in privileged mode:
Task Command
Specify that a TrCRF is a backup TrCRF. set vlan vlan_num backupcrf on
After entering the set vlan command and specifying on for the backupcrf parameter, you see this
display:
Console> (enable) set vlan 1000 backupcrf on
Vlan 1000 configuration successful.
Caution If the backup TrCRF port is attached to a Token Ring MAU, it does not provide a backup path
unless the ring speed and port mode are set by another device. Therefore, we recommend that you configure
the ring speed and port mode for the backup TrCRF.
You can specify the maximum hop count for All-Routes and Spanning-Tree Explorer frames for
each TrCRF. This limits the maximum number of hops an explorer is allowed to traverse. If a port
determines that the explorer frame it is receiving has traversed more than the number of hops
specified, it does not forward the frame. The TrCRF determines the number of hops an explorer has
traversed based on the number of bridge hops in the route information field.
If you are configuring maximum hop counts for a TrCRF, ensure that you specify values for the
aremaxhop and stemaxhop parameters when entering the set vlan command. Valid values are 1 to
14. The default is 7.
To specify the maximum number of bridge hops to be allowed in explorer packets for a TrCRF,
perform this task in privileged mode:
Task Command
Specify the maximum number of bridge hops to be set vlan vlan_num aremaxhop hopcount
allowed in explorer packets for a TrCRF. stemaxhop hopcount
After entering the set vlan command and specifying hopcount values, you see this display:
Console> (enable) set vlan 1000 aremaxhop 10 stemaxhop 10
Vlan 1000 configuration successful
Verification
To verify the configuration of Token Ring VLANs, perform this task:
Task Command
Verify the configuration. show vlan [vlan_num]
After entering the show vlan command and specifying a TrCRF, you see this display:
Console> (enable) show vlan 1003
VLAN Name Status Mod/Ports, Vlans
---- -------------------------------- --------- ----------------------------
1003 trcrf-default active 3/1-16
VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
1003 trcrf 101003 4472 1005 0xccc - - srb 0 0
Procedure
To group Token Ring module ports to a TrCRF, perform this task:
Task Command
Group Token Ring module ports into a TrCRF. set vlan vlan_num mod/ports...
After entering the set vlan command to group ports to a TrCRF, you see this display:
Console> (enable) set vlan 1000 3/1-3
VLAN 1000 modified.
Console> (enable)
Verification
To verify the configuration of Token Ring VLANs, enter this command:
Task Command
Verify the configuration. show vlan [vlan_num]
After entering the show vlan command and specifying a TrCRF, you see this display:
Console> (enable) show vlan 1003
VLAN Name Status Mod/Ports, Vlans
---- -------------------------------- --------- ----------------------------
1003 trcrf-default active 3/1-16
VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
1003 trcrf 101003 4472 1005 0xccc - - srb 0 0
Task Command
Delete the VLAN. clear vlan vlan_num
This example shows how to delete a TrCRF from the management domain:
Console> (enable) clear vlan 1000
This command will deactivate all ports on vlan 1000
in the entire management domain
Do you want to continue(y/n) [n]?y
Vlan 1000 deleted.
Console> (enable)
Caution When clearing a TrCRF, all the ports grouped to the TrCRF become inactive and remain inactive
and associated with the TrCRF number until you assign them to a new TrCRF.
This example shows how to delete a TrBRF from the management domain:
Console> (enable) clear vlan 999
Vlan 999 deleted
Console> (enable)
Note You cannot delete a TrBRF without first reassigning or clearing the TrCRFs to which it is a
parent.
Understanding VLANs
When an end station is physically moved to a new location, its attributes can be reassigned from a
network management station via SNMP or the CLI. When an end station moves within the same
VLAN, it retains its previously assigned attributes in its new location. When an end station moves
to a different VLAN, the attributes of the new VLAN are applied to the end station, according to the
security levels in place.
You can assign the IP address of a Catalyst 5000 series switch supervisor engine module to any
VLAN. This mobility allows a network management station and workstations on any Catalyst 5000
VLAN to access directly another Catalyst 5000 series switch on the same VLAN without a router.
Only one IP address can be assigned to a Catalyst 5000 series switch; if you reassign the IP address
to a different VLAN, the previous IP address assignment to a VLAN is invalid.
VLANs allow ports on the same or different switches to be grouped so that traffic is confined to
members of that group only. This feature restricts broadcast, unicast, and multicast traffic (flooding)
to ports only included in a certain VLAN. Traffic between VLANs must be routed. You can set up
VLANs for an entire management domain from a single Catalyst 5000 series switch. A maximum
of 250 VLANs can be active at any time.
Figure 9-7 shows an example of VLANs segmented into logically defined networks.
Floor 3
Catalyst 5000
Fast
Ethernet
Floor 2
Catalyst 5000
Floor 1
S5071
Multiple TrCRFs can be interconnected using a single TrBRF. The connection between the TrCRF
and the TrBRF is referred to as a logical port. For source routing, the switch appears as a single
bridge between the logical rings. The TrBRF can function as an SRB or SRT bridge running either
the IBM or IEEE Spanning-Tree Protocol. If SRB is used, you can define duplicate MAC addresses
on different logical rings.
Traditionally, one instance of Spanning-Tree Protocol is run for each VLAN to prevent loops in the
bridge topology. However, Token Ring runs an instance of Spanning-Tree Protocol both at the
TrCRF level and the TrBRF level. The Spanning-Tree Protocol at the TrCRF level removes loops in
the logical ring. The TrBRF Spanning-Tree Protocol is similar to the Ethernet Spanning-Tree
Protocol; it interacts with external bridges to remove loops from the bridge topology.
Caution Certain parent TrBRF Spanning-Tree Protocol and TrCRF bridge mode configurations can place
the logical ports (the connection between the TrBRF and the TrCRF) of the TrBRF in a blocked state.
Within a Token Ring VLAN, logical rings can define port groups that have the same ring number.
The IEEE calls this port group a TrCRF. A TrCRF is limited to the ports in a single Token Ring
module on the Catalyst 5000 series switch. However, one exception to this rule that is discussed in
the “Adding or Changing TrCRF Parameters” section.
Within the TrCRF, source-route switching is used for forwarding based on either MAC addresses or
route descriptors. If desired, the entire VLAN can operate as a single ring. Frames can be switched
between ports within a single TrCRF.
As shown in Figure 9-8, multiple TrCRFs can be interconnected using a single TrBRF.
SRB or SRT
BRF
CRF
SRS SRS SRS
For source routing, the switch appears as a single bridge between the logical rings. The TrBRF can
function as an SRB or SRT bridge running either the IBM or IEEE Spanning-Tree Protocol. If SRB
is used, duplicate MAC addresses can be defined on different logical rings.
To accommodate SNA traffic, you can use a combination of SRT and SRB modes. In a mixed mode,
the TrBRF considers some ports (logical ports connected to TrCRFs) to be operating in SRB mode
while others are operating in SRT mode.
The TrBRF can be extended across a network of switches via high-speed uplinks between the
switches. These links must be able to multiplex multiple VLANs and provide the necessary
information to support logical rings.
Caution A management domain does not function properly if you do not assign a management domain
password to each Catalyst 5000 series switch in the domain.
The set vlan command uses the following parameters to create a VLAN in the management domain:
• VLAN number
• VLAN name
• VLAN type (Ethernet, FDDI, FDDI network entity title [NET], or TR NET)
• Maximum transmission unit (packet size, in bytes) that the VLAN can use
• Security association identifier (SAID)
• VLAN state (active or suspended)
• Ring number for FDDI and Token Ring VLANs
• Bridge identification number
• Parent VLAN number
• Spanning-Tree Protocol type
• VLAN number to use when translating from one VLAN type to another
The Catalyst 5000 series switch uses the SAID parameter of the set vlan command to identify each
VLAN on an 802.10 trunk. The default SAID for VLAN 1 is 100001, for VLAN 2 is 100002, for
VLAN 3 is 100003, and so on. The default MTU is 1500 bytes. The default state is active on an
802.10 trunk.
When translating from one VLAN type (Ethernet, FDDI, FDDI NET, or TR NET) to another, the
Catalyst 5000 series switch requires a different VLAN number for each media type.
VLAN Components
VLANs consist of the following components:
• Switches that logically segment connected end stations
Switches are the entry point for end-station devices into the switched fabric and provide the
intelligence to group users, ports, or logical addresses into common communities of interest.
LAN switches increase performance and dedicated bandwidth across the network.
You can group ports and users into communities using a single switch or connected switches. By
grouping ports and users across multiple switches, VLANs can span single-building
infrastructures, interconnected buildings, or campus networks. Each switch can make filtering
and forwarding decisions by packet and communicate this information to other switches and
routers within the network.
Frame identification or tagging logically groups users into administratively defined VLANs.
Tagging places a unique identifier in the header of each frame as it is forwarded throughout the
switch fabric. Each switch understands and examines the identifier prior to any broadcasts or
transmissions to other switches, routers, or end-station devices. When the frame exits the switch
fabric, the switch removes the identifier before the frame is transmitted to the target end station.
Based on rules defined by the administrator, tagging determines where the frame is to be sent or
broadcast.
• Routers that extend VLAN communications between workgroups
Routers provide policy-based control, broadcast management, and route processing and
distribution. They also provide the communication between VLANs and VLAN access to shared
resources such as servers and hosts. Routers connect to other parts of the network that are either
logically segmented into subnets or require access to remote sites across wide area links. Routers
use high-speed backbone connections over Fast Ethernet, FDDI, or ATM for higher throughput
between switches and routers.
• Interoperability with previously installed LAN systems
VLANs provide system compatibility with previously installed systems, such as shared hubs and
stackable devices. With VLANs, you can configure devices such as shared hubs as a part of the
VLAN architecture and can share traffic and network resources that directly attach to switching
ports with VLAN designations.
• Transport protocols that carry VLAN traffic across shared LAN and ATM backbones
The VLAN transport enables information exchange between interconnected switches and routers
on the corporate backbone. The backbone acts as the aggregation point for large volumes of
traffic. It also carries end-user VLAN information and identification between switches, routers,
and directly attached servers. Within the backbone, high-bandwidth, high-capacity links carry the
traffic throughout the enterprise. Three high-bandwidth options include Fast Ethernet,
FDDI/CDDI, and ATM.
• VLAN management
Network management solutions offer centralized control, configuration, and traffic management
functions.
Note Only the nonegotiate and off modes function with IEEE 802.1Q trunks.
Mode Function
on Puts the port into permanent trunking mode and negotiates to convert the link into a trunk port.
The port becomes a trunk port even if the other end of the link does not agree to the change.
This mode is not allowed on IEEE 802.1Q ports.
off Negotiates to convert the link into a nontrunk port. The port converts to a nontrunk port even if
the other end of the link does not agree to the change. This is the default mode for FDDI trunks.
This option is not allowed for ATM ports.
desirable Makes the port actively attempt to become a trunk port. The port becomes a trunk if the port it
is connected to allows trunking and is set to on, desirable, or auto mode. This mode is not
allowed on IEEE 802.1Q, FDDI, and ATM ports.
auto Makes the port willing to become a trunk port. The port becomes a trunk if the port it is
connected to is set to on or desirable mode. This mode is not allowed on IEEE 802.1Q, FDDI,
and ATM ports. This is the default mode for Fast Ethernet ports.
nonegotiate Makes the port a trunk port but prevents the port from generating DISL frames used with ISL
and IEEE 802.1Q Fast Ethernet trunks.
Note DISL is a point-to-point protocol. However, some internetworking devices may forward
DISL frames improperly. To avoid this problem, ensure that trunking is turned off on ports connected
to non-Catalyst 5000 series devices if you do not intend to trunk across those links. When manually
enabling trunking on a link to a Cisco router, use the nonegotiate keyword to cause the port to
become a trunk but not generate DISL frames. The nonegotiate keyword is available in
Catalyst 5000 series software release 2.4(3) and later.
For more information about the set trunk command, refer to the Catalyst 5000 Series Command
Reference publication.
Procedures
To configure a port as an ISL trunk (the default for Fast Ethernet ports), perform this task in
privileged mode:
Task Command
Configure a port as an ISL trunk. set trunk mod_num/port_num [on | desirable | auto | nonegotiate]
[vlans]
After entering the set trunk command, you see this display:
Console> (enable) set trunk 1/1 on
Port(s) 1/1 trunk mode set to on.
Console> (enable) 2/20/1998,23:38:35:DISL-5:Port 1/1 has become trunk
To configure a port as an IEEE 802.1Q trunk, perform this task in privileged mode (requires
Catalyst 5000 series software release 4.1(1) or later and 802.1Q-capable hardware):
Task Command
Configure a port as an 802.1Q trunk. set trunk mod_num/port_num nonegotiate [vlans] dot1q
Caution DISL negotiation does not occur on IEEE 802.1Q trunks. You must configure the ports on both
ends of the trunk link as 802.1Q trunks using the set trunk command with the nonegotiate and dot1q
keywords. Expect spanning tree to block the port on the other end of the trunk link until you configure that
end of the link as an 802.1Q trunk as well. Do not configure one end of a trunk as an 802.1Q trunk and the
other end as an ISL trunk or a nontrunk port. Errors will occur and no traffic can pass over the link.
After entering the set trunk nonegotiate dot1q command, you see this display:
Console> (enable) set trunk 4/5 nonegotiate dot1q
Port(s) 4/5 trunk mode set to nonegotiate.
Port(s) 4/5 trunk type set to dot1q.
Console> (enable) 2/20/1998,23:38:35:DISL-5:Port 1/1 has become dot1q trunk
Note For an example on how to configure an 802.1Q trunk, see the section “IEEE 802.1Q Trunks
on Fast Ethernet Ports.”
By default, all VLANs are added to the allowed VLANs list for the trunk. If you want to remove
VLANs from the allowed list, enter the clear trunk command. This prevents traffic for those
VLANs from passing over the trunk. You cannot remove VLAN 1, the default VLAN, from the
allowed list. Entering the clear trunk command without specifying VLANs returns the port to the
default trunk type and mode for that port type.
Task Command
Remove specific VLANs from the allowed clear trunk mod_num/port_num vlans
VLANs list for a trunk.
After entering the clear trunk command, you see this display:
Console> (enable) clear trunk 1/1 2-250
Removing Vlan(s) 2-250 from allowed list.
Port 1/1 allowed vlans modified to 1,251-1005.
Console> (enable)
If you want to add VLANs to the allowed list for a trunk after you removed them using clear trunk,
enter the set trunk command to add the specific VLANs:
Task Command
Add specific VLANs to the allowed VLANs set trunk mod_num/port_num vlans
list for a trunk.
To return a port to the default trunk type and mode for that port type, enter the clear trunk command.
To explicitly turn off trunking on a port, enter the set trunk off command:
Task Command
Return the port to the default trunking type clear trunk mod_num/port_num
and mode for that port type.
Turn off trunking on a port. set trunk mod_num/port_num off
Verification
To verify the trunking configuration, perform this task:
Task Command
Verify the trunking configuration. show trunk [mod/port]
If you configure an IEEE 802.1Q trunk on a port, you will see output similar to the following when
you enter the show trunk command:
Console> (enable) show trunk 4/5
Port Mode Encapsulation Status Native vlan
-------- ----------- ------------- ------------ -----------
4/5 nonegotiate dot1q trunking 1
Catalyst 5000
switch
70
IEEE 802.1Q Trunks on Fast Ethernet Ports
IEEE 802.1Q trunks are supported in Catalyst 5000 series software release 4.1 and later. 802.1Q
trunks can only be configured on 802.1Q-capable hardware. Check the documentation for your
hardware to see if your hardware is 802.1Q-capable. In software release 4.1, you must manually
configure IEEE 802.1Q trunk ports on both ends of the link. DISL, the protocol used to negotiate
ISL trunks (the default trunk type for Fast Ethernet), does not yet support 802.1Q. To properly
configure an IEEE 802.1Q trunk, the trunk type (encapsulation), trunk mode, and native VLAN must
be the same on both ends of the link.
In this example, an 802.1Q trunk is configured between port 1/1 on Switch 1 and port 4/1 on
Switch 2. The initial network configuration is shown in Figure 9-10. Assume that the native VLAN
is VLAN 1 on both ends of the link.
5000 5000
Switch 1 Switch 2
To configure a port as an 802.1Q trunk, enter the set trunk command. You must use the nonegotiate
keyword when configuring a port as an 802.1Q trunk.
Switch 1> (enable) set trunk 1/1 nonegotiate dot1q
Port(s) 1/1 trunk mode set to nonegotiate.
Port(s) 1/1 trunk type set to dot1q.
Switch 1> (enable) 04/15/1998,22:02:17:DISL-5:Port 1/1 has become dot1q trunk
Notice that after the port on Switch 1 is configured as an 802.1Q trunk, syslog messages (indicated
by the arrows) are displayed on the Switch 2 console, and port 4/1 on Switch 2 is blocked. The
Spanning-Tree Protocol blocks the port because there is a port-type inconsistency on the trunk link:
port 1/1 on Switch 1 is configured as an 802.1Q trunk while port 4/1 on Switch 2 is configured as an
ISL trunk (see Figure 9-11). Port 4/1 would also be blocked if it were configured as a nontrunk port.
10641
5000 X 5000
Output from the show spantree and show spantree statistics commands on Switch 2 displays the
problem (indicated by the arrows). The configuration mismatch exists until the port on Switch 2 is
properly configured.
Switch 2> (enable) show spantree 1
VLAN 1
Spanning tree enabled
Spanning tree type ieee
<...output truncated...>
BPDU-related parameters
port spanning tree enabled
state broken
port_id 0x8142
port number 0x142
path cost 100
message age (port/VLAN) 1(20)
designated_root 00-60-09-79-c3-00
designated_cost 0
designated_bridge 00-60-09-79-c3-00
designated_port 0x8142
top_change_ack FALSE
config_pending FALSE
port_inconsistency port_type & port_vlan
<...output truncated...>
Port 4/1 on Switch 2 changes from blocking mode to forwarding mode once the port-type
inconsistency is resolved (see Figure 9-12). (This assumes that there is no wiring loop present that
would cause the port to be blocked normally by spanning tree. In either case, the port state would
change from “type-pvid-inconsistent” to “blocking” in the show spantree output.)
5000 5000
Verify the 802.1Q configuration on Switch 1 by entering the show trunk and show spantree
commands:
Switch 1> (enable) show trunk 1/1
Port Mode Encapsulation Status Native vlan
-------- ----------- ------------- ------------ -----------
1/1 nonegotiate dot1q trunking 1
<...output truncated...>
The output shows that the port 1/1 is an IEEE 802.1Q trunk port, that its status is “trunking,” and that
the port-state is “forwarding” (indicated by the arrows).
Verify the configuration on Switch 2 by entering the show trunk and show spantree commands:
Switch 2> (enable) show trunk 4/1
Port Mode Encapsulation Status Native vlan
-------- ----------- ------------- ------------ -----------
4/1 nonegotiate dot1q trunking 1
<...output truncated...>
The output shows that port 4/1 is an IEEE 802.1Q trunk port, that its status is “trunking,” and that
the port-state is “forwarding” (indicated by the arrows).
Verify connectivity across the trunk using the ping command:
Switch 1> (enable) ping switch_2
switch_2 is alive
Switch 1> (enable)
Figure 9-13 Parallel Trunk Configuration Before Configuring VLAN-Traffic Load Sharing
Trunk 2
VLANs 10, 20, 30, 40, 50, and 60: port-VLAN priority 32 (blocking)
1/1 1/1
1/2 1/2
Trunk 1
11743
VLANs 10, 20, 30, 40, 50, and 60: port-VLAN priority 32 (forwarding)
By default, the port-VLAN priority for both trunks is equal (a value of 32). Therefore, the
Spanning-Tree Protocol blocks port 1/2 (Trunk 2) for each VLAN on Switch 1 to prevent forwarding
loops. Trunk 2 is not used to forward traffic unless Trunk 1 fails.
This example shows how to configure the Catalyst 5000 series switches so that traffic from multiple
VLANs is load-balanced over the parallel trunks.
Step 1 Configure a VTP domain on both Switch 1 and Switch 2 (by entering the set vtp
command) so that the VLAN information configured on Switch 1 is learned by Switch 2.
Make sure Switch 1 is a VTP server. You can configure Switch 2 as a VTP client or as a
VTP server:
Switch_1> (enable) set vtp domain BigCorp mode server
VTP domain BigCorp modified
Switch_1> (enable)
Step 3 Verify the VTP and VLAN configuration on Switch 1 by entering the show vtp domain
and show vlan commands as follows:
Switch_1> (enable) show vtp domain
Domain Name Domain Index VTP Version Local Mode Password
-------------------------------- ------------ ----------- ----------- ----------
BigCorp 1 2 server -
Step 4 Configure the supervisor engine uplinks on Switch 1 as ISL trunk ports by entering the
set trunk command. Specifying the desirable mode on the Switch 1 ports causes the ports
on Switch 2 to negotiate to become trunk links (assuming that the Switch 2 uplinks are in
the default auto mode).
Switch_1> (enable) set trunk 1/1 desirable
Port(s) 1/1 trunk mode set to desirable.
Switch_1> (enable) 04/21/1998,03:05:05:DISL-5:Port 1/1 has become isl trunk
Step 5 Verify that the trunk links are up by entering the show trunk command as follows:
Switch_1> (enable) show trunk 1
Port Mode Encapsulation Status Native vlan
-------- ----------- ------------- ------------ -----------
1/1 desirable isl trunking 1
1/2 desirable isl trunking 1
Step 6 When the trunk links come up, VTP passes the VTP and VLAN configuration to
Switch 2. Verify that Switch 2 has learned the VLAN configuration by entering the show
vlan command on Switch 2:
Switch_2> (enable) show vlan
VLAN Name Status Mod/Ports, Vlans
---- -------------------------------- --------- ----------------------------
1 default active
10 VLAN0010 active
20 VLAN0020 active
30 VLAN0030 active
40 VLAN0040 active
50 VLAN0050 active
60 VLAN0060 active
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
<...output truncated...>
Switch_2> (enable)
Step 7 It will take one or two minutes for spanning tree to converge. Once the network stabilizes,
check the spanning-tree state of each trunk port on Switch 1 by entering the show
spantree command.
Trunk 1 is forwarding for all VLANs. Trunk 2 is blocking for all VLANs. On Switch 2,
both trunks are forwarding for all VLANs, but no traffic passes over Trunk 2 because port
1/2 on Switch 1 is blocking.
Switch_1> (enable) show spantree 1/1
Port Vlan Port-State Cost Priority Fast-Start Group-method
--------- ---- ------------- ----- -------- ---------- ------------
1/1 1 forwarding 19 32 disabled
1/1 10 forwarding 19 32 disabled
1/1 20 forwarding 19 32 disabled
1/1 30 forwarding 19 32 disabled
1/1 40 forwarding 19 32 disabled
1/1 50 forwarding 19 32 disabled
1/1 60 forwarding 19 32 disabled
1/1 1003 not-connected 19 32 disabled
1/1 1005 not-connected 19 4 disabled
Switch_1> (enable) show spantree 1/2
Port Vlan Port-State Cost Priority Fast-Start Group-method
--------- ---- ------------- ----- -------- ---------- ------------
1/2 1 blocking 19 32 disabled
1/2 10 blocking 19 32 disabled
1/2 20 blocking 19 32 disabled
1/2 30 blocking 19 32 disabled
1/2 40 blocking 19 32 disabled
1/2 50 blocking 19 32 disabled
1/2 60 blocking 19 32 disabled
1/2 1003 not-connected 19 32 disabled
1/2 1005 not-connected 19 4 disabled
Switch_1> (enable)
Step 8 Divide the configured VLANs into two groups. You might want traffic from half of the
VLANs to go over one trunk link and half over the other, or if one VLAN has heavier
traffic than the others, you can have traffic from that VLAN go over one trunk and traffic
from the other VLANs go over the other trunk link.
In this example, VLANs 10, 20, and 30 (Group 1) are forwarded over Trunk 1, and
VLANs 40, 50, and 60 (Group 2) are forwarded over Trunk 2.
Step 9 On Switch 1, enter the set spantree portvlanpri command to change the port-VLAN
priority for the Group 1 VLANs on Trunk 1 (port 1/1) to an integer value lower than the
default of 32.
Switch_1> (enable) set spantree portvlanpri 1/1 1 10
Port 1/1 vlans 1-9,11-1004 using portpri 32.
Port 1/1 vlans 10 using portpri 1.
Port 1/1 vlans 1005 using portpri 4.
Switch_1> (enable) set spantree portvlanpri 1/1 1 20
Port 1/1 vlans 1-9,11-19,21-1004 using portpri 32.
Port 1/1 vlans 10,20 using portpri 1.
Port 1/1 vlans 1005 using portpri 4.
Switch_1> (enable) set spantree portvlanpri 1/1 1 30
Port 1/1 vlans 1-9,11-19,21-29,31-1004 using portpri 32.
Port 1/1 vlans 10,20,30 using portpri 1.
Port 1/1 vlans 1005 using portpri 4.
Switch_1> (enable)
Step 10 On Switch 1, change the port-VLAN priority for the Group 2 VLANs on Trunk 2
(port 1/2) to an integer value lower than the default of 32.
Switch_1> (enable) set spantree portvlanpri 1/2 1 40
Port 1/2 vlans 1-39,41-1004 using portpri 32.
Port 1/2 vlans 40 using portpri 1.
Port 1/2 vlans 1005 using portpri 4.
Switch_1> (enable) set spantree portvlanpri 1/2 1 50
Port 1/2 vlans 1-39,41-49,51-1004 using portpri 32.
Port 1/2 vlans 40,50 using portpri 1.
Port 1/2 vlans 1005 using portpri 4.
Switch_1> (enable) set spantree portvlanpri 1/2 1 60
Port 1/2 vlans 1-39,41-49,51-59,61-1004 using portpri 32.
Port 1/2 vlans 40,50,60 using portpri 1.
Port 1/2 vlans 1005 using portpri 4.
Switch_1> (enable)
Step 11 On Switch 2, change the port-VLAN priority for the Group 1 VLANs on Trunk 1
(port 1/1) to the same value you configured for those VLANs on Switch 1.
Caution The port-VLAN priority for each VLAN must be equal on both ends of the link.
Step 12 On Switch 2, change the port-VLAN priority for the Group 2 VLANs on Trunk 2
(port 1/2) to the same value you configured for those VLANs on Switch 1.
Switch_2> (enable) set spantree portvlanpri 1/2 1 40
Port 1/2 vlans 1-39,41-1004 using portpri 32.
Port 1/2 vlans 40 using portpri 1.
Port 1/2 vlans 1005 using portpri 4.
Switch_2> (enable) set spantree portvlanpri 1/2 1 50
Port 1/2 vlans 1-39,41-49,51-1004 using portpri 32.
Port 1/2 vlans 40,50 using portpri 1.
Port 1/2 vlans 1005 using portpri 4.
Switch_2> (enable) set spantree portvlanpri 1/2 1 60
Port 1/2 vlans 1-39,41-49,51-59,61-1004 using portpri 32.
Port 1/2 vlans 40,50,60 using portpri 1.
Port 1/2 vlans 1005 using portpri 4.
Switch_2> (enable)
Step 13 When you have configured the port-VLAN priorities on both ends of the link, the
spanning tree converges to use the new configuration.
Check the spanning-tree port states on Switch 1 by entering the show spantree
command. The Group 1 VLANs should be forwarding on Trunk 1 and blocking on
Trunk 2. The Group 2 VLANs should be blocking on Trunk 1 and forwarding on Trunk 2.
Switch_1> (enable) show spantree 1/1
Port Vlan Port-State Cost Priority Fast-Start Group-method
--------- ---- ------------- ----- -------- ---------- ------------
1/1 1 forwarding 19 32 disabled
1/1 10 forwarding 19 1 disabled
1/1 20 forwarding 19 1 disabled
1/1 30 forwarding 19 1 disabled
1/1 40 blocking 19 32 disabled
1/1 50 blocking 19 32 disabled
1/1 60 blocking 19 32 disabled
1/1 1003 not-connected 19 32 disabled
1/1 1005 not-connected 19 4 disabled
Switch_1> (enable) show spantree 1/2
Port Vlan Port-State Cost Priority Fast-Start Group-method
--------- ---- ------------- ----- -------- ---------- ------------
1/2 1 blocking 19 32 disabled
1/2 10 blocking 19 32 disabled
1/2 20 blocking 19 32 disabled
1/2 30 blocking 19 32 disabled
1/2 40 forwarding 19 1 disabled
1/2 50 forwarding 19 1 disabled
1/2 60 forwarding 19 1 disabled
1/2 1003 not-connected 19 32 disabled
1/2 1005 not-connected 19 4 disabled
Switch_1> (enable)
Figure 9-14 shows the network after you configure VLAN traffic load-sharing.
Figure 9-14 Parallel Trunk Configuration After Configuring VLAN Traffic Load Sharing
Trunk 2
VLANs 10, 20, and 30: port-VLAN priority 32 (blocking)
VLANs 40, 50, and 60: port-VLAN priority 1 (forwarding)
1/1 1/1
1/2 1/2
Trunk 1
VLANs 10, 20, and 30: port-VLAN priority 1 (forwarding)
11742
The advantage of the configuration shown in Figure 9-14 is that both trunks are utilized when the
network is operating normally and, if one trunk link fails, the other trunk link acts as an alternate
forwarding path for the traffic previously traveling over the failed link.
Suppose that Trunk 1 fails in the network shown in Figure 9-14. The Spanning-Tree Protocol
reconverges to use Trunk 2 to forward traffic from all the VLANs, as shown in the following
example:
Switch_1> (enable) 04/21/1998,03:15:40:DISL-5:Port 1/1 has become non-trunk
Prerequisites
Before configuring the VMPS, you must perform these tasks:
• Determine the MAC address-to-VLAN mapping by entering the show cam command.
• Use the information obtained by displaying the dynamic content-addressable memory (CAM)
entries to build an ASCII file on your workstation or PC.
• Move the ASCII file to the TFTP server so it can be downloaded to the Catalyst 5000 series
switch.
Procedure
When you enable the VMPS, it begins to download the configuration information from the TFTP
server. After a successful download, the VMPS task is started, and it accepts the VMPS requests.
To enable the VMPS, use this procedure:
Task Command
Step 1 Configure the IP address of the TFTP set vmps tftpserver ip_addr [filename]
server on which the ASCII file resides.
Step 2 Enable VMPS. set vmps state {enable | disable}
The set vmps tftpserver ip_addr [filename] command specifies the VMPS database location. The
filename is the name of the ASCII VMPS file.
After entering the set vmps state enable command, you see this display:
Console> (enable) set vmps state enable
Vlan Membership Policy Server enable is in progress.
The set vmps state enable command sets the VMPS state in NVRAM to enable. If it is previously
disabled, this command initiates a background task to begin the database download. After a
successful database download, this command sets the operational status to active.
You can also enter the following VMPS-related commands:
• To download VMPS database information or change the VMPS database, enter the download
vmps command.
Enter this command if you want to change the VMPS database or if a previous download failed.
• To disable VMPS, enter the set vmps state disable command.
When you disable the VMPS, tasks are removed and all configuration information is flushed.
You see this display:
Console> (enable) set vmps state disable
All the VMPS configuration information will be lost and the resources released on
disable.
Do you want to continue (y/n[n]): yes
Vlan Membership Policy Server disabled.
For more information, refer to the Catalyst 5000 Series Command Reference publication.
Verification
Enter these commands to verify the status of port VLAN membership:
• To show current VMPS configuration information, enter the show vmps command. You also can
enter this command to verify the operational status.
• To display MAC-address-to-VLAN mapping, enter the show vmps mac [mac_address]
command. You can also enter the show vmps vlan vlan_name command.
• To display ports belonging to a restricted VLAN, enter the show vmps vlanports vlan_name
command.
• To display VMPS statistics, enter the show vmps statistics command.
• To clear VMPS statistics, enter the clear vmps statistics command.
For more information, refer to the Catalyst 5000 Series Command Reference publication.
Error Messages
Table 9-2 shows sample error messages and actions you need to take after entering the set vmps
state {enable | disable} command.
Table 9-2 Error Messages for set vmps state enable Command
Table 9-3 shows sample error messages and actions you need to take after entering the download
vmps command.
Troubleshooting
After the VMPS successfully downloads the ASCII configuration file, it parses the file and builds a
database. The VMPS outputs the statistics about the total number of lines parsed and the number of
parsing errors. Set the syslog level for VMPS to 3 to obtain more information on the errors.
Example
A sample VMPS configuration file is shown below.
!vmps domain <domain-name>
! The VMPS domain must be defined.
!vmps mode { open | secure }
! The default mode is open.
!vmps fallback <vlan-name>
!vmps no-domain-req { allow | deny }
!
! The default value is allow.
vmps domain WBU
vmps mode open
vmps fallback default
vmps no-domain-req deny
!
!
!MAC Addresses
!
vmps-mac-addrs
!
! address <addr> vlan-name <vlan_name>
!
address 0012.2233.4455 vlan-name hardware
address 0000.6509.a080 vlan-name hardware
address aabb.ccdd.eeff vlan-name Green
address 1223.5678.9abc vlan-name ExecStaff
address fedc.ba98.7654 vlan-name --NONE--
address fedc.ba23.1245 vlan-name Purple
!
!Port Groups
!
!vmps-port-group <group-name>
! device <device-id> { port <port-name> | all-ports }
!
vmps-port-group WiringCloset1
device 198.92.30.32 port 3/2
device 172.20.26.141 port 2/8
Prerequisites
These prerequisites apply to configuring dynamic ports:
• You must configure the VMPS before configuring dynamic ports.
• The VMPS must be active and accessible to the Catalyst 5000 series switch.
Procedure
To configure dynamic ports on clients, perform these steps:
Task Command
Step 1 Configure the VMPS IP address to be set vmps server ip_addr [primary]
queried on the client.
Step 2 Configure the VLAN membership set port membership mod_num /port_num
assignment to a port. {dynamic | static}
Verification
To verify the status of the VMPS IP address, enter these commands:
• Enter the show vmps server command to display the VMPS addresses after clearing a VMPS.
After entering the show vmps server command, you see this display:
Console> (enable) show vmps server
VMPS domain server VMPS Status
---------------------------------------
192.0.0.6
192.0.0.1 primary
192.0.0.9
• Enter the clear vmps server ip_addr command to clear the VMPS IP address.
To verify the status of port VLAN membership, enter these commands:
• To display the port status, enter the show port command. If a dynamic port is shut down, its status
on the display is shown as shutdown. The default port membership setting is static.
Console> (enable) set port membership help
Usage: set port membership < mod_num / port_num..> < dynamic | static >
After entering the set port membership and the show port commands, you see this display:
Console> show port
Port Name Status Vlan Level Duplex Speed Type
1/1 connect dyn-3 normal full 100 100 BASE-TX
1/2 connect trunk normal half 100 100 BASE-TX
2/1 connect trunk normal full 155 OC3 MMF ATM
3/1 connect dyn-5 normal half 10 10 BASE-T
3/2 connect dyn-5 normal half 10 10 BASE-T
3/3 connect dyn-5 normal half 10 10 BASE-T
Note The show port command displays dyn- under the Vlan column of the display when it has
not yet been assigned a VLAN for a port.
• To reconfirm the current dynamic port VLAN membership with VMPS, enter the reconfirm
vmps command. The VMPS database changes are not automatically conveyed to dynamic port
entities. After making a VMPS database change, you can apply the change to the dynamic port
entity on a device. After entering the command, you see this display:
Console> (enable) reconfirm vmps
reconfirm process started
Use 'show dvlan statistics' to see reconfirm status
Console> (enable)
Troubleshooting
A port might shut down under the following circumstances:
• The VMPS is in secure mode and it is illegal for the host to be on the port. The port shuts down
to remove the host.
• More than 50 active hosts reside on a dynamic port.
If a dynamic port shuts down, enter the set port enable mod_num/port_num to reenable the port.
Example
Figure 9-15 shows an example of a dynamic port configuration.
TFTP server
Catalyst 5000
Primary VMPS Router
Server 1 Switch 1
172.20.22.7
172.20.26.150
3/1 Client
Switch 2
End station 1 172.20.26.151
Secondary VMPS
Server 2 Switch 3
172.20.26.152
Switch 4
172.20.26.153 Ethernet segment
Switch 5
172.20.26.154
Switch 6
172.20.26.155
Switch 7
172.20.26.156
Switch 8
172.20.26.157
Client
Switch 9
End station 2 172.20.26.158
S5697
Secondary VMPS
Server 3 Switch 10
172.20.26.159
After entering these commands, the file Bldg-G.db is downloaded to Switch 1. Switch 1
becomes the VMPS server.
Step 2 Configure dynamic ports on the clients, Switch 2, and Switch 9, by performing these
tasks:
(a) Configure the primary VMPS IP address on Switch 2 as follows:
Console> (enable) set vmps server 172.20.26.150 primary
Entering this command on Switch 2 designates the VMPS switch to be queried. The
primary switch option configures Switch 1 as the primary VMPS.
Note If you use the local switch as the VMPS server, you should configure the IP
address of the local switch as the VMPS server.
Suppose you connect End Station 2 on port 3/1. When End Station 2 sends a packet,
Switch 2 sends a query to the primary VMPS, Switch 1. Switch 1 responds with a VLAN
that is assigned to port 3/1. Because Spanning-Tree Protocol (Portfast mode) is enabled
by default for dynamic ports, port 3/1 is immediately connected and enters forwarding
mode.
Step 3 Configure dynamic ports on Switch 9 by repeating Step 2 for Switch 9.
Note The management domain and the management VLAN of the client and the server must be the
same.