Currently Empty: 0.00 €
Module 3 – LAB 4 - VLAN Configuration
You are a network engineer tasked with configuring VLANs. You have two departments: HR and Sales. Each department is on two floors. You need to separate the two departments from each other so that only your department can communicate with each other – HR can’t communicate with Sales, and Sales can’t communicate with HR. The PCs are already configured, so all you need to do is configure the switches. HR should be in VLAN 10, and SALES should be in VLAN 20.Â
Step 1: Check VLANs and create a new VLANs – 10 and 20.Â
- Log in to the switches (SW1, SW2) using the default credentials, use the Klish CLI. Create a new VLANs – 10 for HR, and 20 for Sales departments, after that view the current VLANs that exists on this switch.Â
- Step 2: Configure the access ports on both switches.Â
Configure Ethernet1 and Ethernet2 of both switches (SW1, SW2) to access ports. Ethernet1 ports should be in VLAN 10, and Ethernet2 ports should be in VLAN 20. After that, check again current VLANs.Â
- Step 3: Configure the trunk port on both switches.Â
Configure the Ethernet8 port, which should be the trunk port. Allow all VLANs on that port.Â
- Step 4: Check that everything is working using the PING command.Â
Use the ping command to mutually ping the devices from HR1 to HR2, and from SALES1 to SALES2
- Default credentials: admin / YourPaSsWoRdÂ
- Remember to allow all VLANs to be sent through trunk portÂ
- PCs should’ve been connected to access ports, not the trunk one.Â
- In SONiC, the subnet mask 255.255.255.0 is represented in the format of x.x.x.x/24. This is because the number 24 represents the number of bits set to 1 in the subnet mask, which is equivalent to 255.255.255.0 in dotted decimal notation.
- The names of the virtual computers are different in remote access to those shown on the topology. Virtual computers and their counterparts in remote access are motioned below:
- HR1 – mod3lab4-vpc1
- HR2 – mod3lab4-vpc3
- SALES1 – mod3lab4-vpc2
- SALES2 – mod3lab4-vpc4
- Credentials for Virtual computers are login: root password: route2openÂ
The purpose of the laboratory is to practice creating VLANs and how to use them in real environment.Â
Step 1: Check VLANs and create a new VLANs – 10 and 20.Â
SW1 & SW2Â
 1. sonic# configure terminalÂ
 2. sonic(config)# interface Vlan 10Â
 3. sonic(config–if–Vlan10)# exitÂ
 4. sonic(config)# interface Vlan 20Â
 5. sonic(config–if–Vlan20)# exitÂ
 6. sonic(config)# exitÂ
 7. sonic# show VlanÂ
 8. Q: A – Access (Untagged), T – TaggedÂ
 9. NUM       Status     Q Ports           Autostate  DynamicÂ
10. 10        Inactive                       EnableÂ
11. 20        Inactive                       Enable      Â
Step 2: Configure the access ports on both switchesÂ
SW1 & SW2Â
 1. sonic# configure terminalÂ
 2. sonic(config)# interface Ethernet1Â
 3. sonic(config–if–Ethernet1)# switchport access Vlan 10Â
 4. sonic(config–if–Ethernet1)# no shutdownÂ
 5. sonic(config–if–Ethernet1)# exitÂ
 6. sonic(config)# interface Ethernet2Â
 7. sonic(config–if–Ethernet2)# switchport access Vlan 20Â
 8. sonic(config–if–Ethernet2)# no shutdownÂ
 9. sonic(config–if–Ethernet2)# exitÂ
10. sonic# show VlanÂ
11. Q: A – Access (Untagged), T – TaggedÂ
12. NUM       Status     Q Ports         Autostate  DynamicÂ
13. 10        Active                       EnableÂ
14. 20        Active                       Enable      Â
Â
Step 3: Configure the trunk port on both switches.Â
SW1 & SW2:Â
1. sonic# configure terminalÂ
1. sonic(config)# interface Ethernet8Â
2. sonic(config–if–Ethernet8)# switchport trunk allowed vlan allÂ
3. sonic(config–if–Ethernet8)# no shutdownÂ
4. sonic(config–if–Ethernet8)# exitÂ
Â
Step 4: Check that everything is working using the PING command.Â
Â
HR1 to HR2:Â
 1. HR1> ping 192.168.1.1 <- That’s IP for HR1Â
 2.  Â
 3. 192.168.1.1 icmp_seq=1 ttl=64 time=0.001 msÂ
 4. 192.168.1.1 icmp_seq=2 ttl=64 time=0.001 msÂ
 5. 192.168.1.1 icmp_seq=3 ttl=64 time=0.001 msÂ
 6. 192.168.1.1 icmp_seq=4 ttl=64 time=0.001 msÂ
 7. 192.168.1.1 icmp_seq=5 ttl=64 time=0.001 msÂ
 9. HR1> ping 192.168.1.3 <- That’s IP for SALES1Â
11. host (192.168.1.3) not reachableÂ
13. HR1> ping 192.168.1.2 <- That’s IP for HR2Â
15. 84 bytes from 192.168.1.2 icmp_seq=1 ttl=64 time=8.142 msÂ
16. 84 bytes from 192.168.1.2 icmp_seq=2 ttl=64 time=9.225 msÂ
17. 84 bytes from 192.168.1.2 icmp_seq=3 ttl=64 time=7.310 msÂ
18. 84 bytes from 192.168.1.2 icmp_seq=4 ttl=64 time=6.748 msÂ
19. 84 bytes from 192.168.1.2 icmp_seq=5 ttl=64 time=7.339 msÂ
21. HR1> ping 192.168.1.4 <- That’s IP for SALES2Â
23. host (192.168.1.4) not reachableÂ
SALES1 to SALES2:Â
 1. SALES1> ping 192.168.1.3 <- That’s IP for SALES1Â
 3. 192.168.1.3 icmp_seq=1 ttl=64 time=0.001 msÂ
 4. 192.168.1.3 icmp_seq=2 ttl=64 time=0.001 msÂ
 5. 192.168.1.3 icmp_seq=3 ttl=64 time=0.001 msÂ
 6. 192.168.1.3 icmp_seq=4 ttl=64 time=0.001 msÂ
 7. 192.168.1.3 icmp_seq=5 ttl=64 time=0.001 msÂ
 9. SALES1> ping 192.168.1.4 <- That’s IP for SALES2Â
11. 84 bytes from 192.168.1.4 icmp_seq=1 ttl=64 time=8.816 msÂ
12. 84 bytes from 192.168.1.4 icmp_seq=2 ttl=64 time=10.120 msÂ
13. 84 bytes from 192.168.1.4 icmp_seq=3 ttl=64 time=11.251 msÂ
14. 84 bytes from 192.168.1.4 icmp_seq=4 ttl=64 time=9.931 msÂ
16. SALES1> ping 192.168.1.1 <- That’s IP for HR1Â
18. host (192.168.1.1) not reachableÂ
20. SALES1> ping 192.168.1.2 <- That’s IP for HR2Â
22. host (192.168.1.2) not reachableÂ