A switch is a device used in networks to connect multiple devices (e.g., computers, printers) and manage data flow between them.
00-14-22-01-23-45.Here’s how you configure VLANs on a Cisco switch:
Create a VLAN:
Example command to create VLAN 10 for the Sales department:
vlan 10
name Sales
Assign a VLAN to a Port:
Assign a specific port (e.g., GigabitEthernet0/1) to VLAN 10:
interface GigabitEthernet0/1
switchport mode access
switchport access vlan 10
Verify Configuration:
Use the following command to check the VLAN configuration:
show vlan brief
What is it?
A method where a single physical router interface is used to route traffic between multiple VLANs.
Configuration Example:
Create subinterfaces for VLANs:
interface GigabitEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.1.1 255.255.255.0
interface GigabitEthernet0/0.20
encapsulation dot1Q 20
ip address 192.168.2.1 255.255.255.0
Enable routing between the VLANs.
Benefit: Cost-effective solution for small networks.
Wireless networking allows devices to communicate without physical cables by using radio waves. It is commonly implemented in Wi-Fi networks, enabling mobility and ease of access.
Wireless networks are susceptible to attacks, so security protocols are used to protect them:
WEP (Wired Equivalent Privacy):
WPA (Wi-Fi Protected Access):
Frequency Bands: Wi-Fi operates on two main frequency bands:
Channels:
Here’s an example of setting up a secure wireless network:
Set the SSID:
ssid HomeWiFi
Configure WPA2 Security:
encryption mode ciphers aes
authentication open
wpa pre-shared-key MySecurePassword
Assign a channel and frequency:
frequency 2.4GHz
channel 6
In Layer 2 networks, redundant paths are often created to ensure reliability. However, this redundancy can lead to loops, where data circulates endlessly, consuming bandwidth and causing network instability.
Solution: Spanning Tree Protocol (STP) prevents loops by selectively blocking redundant paths.
STP ensures a loop-free topology by performing the following steps:
Ports transition through the following states:
Enable STP:
By default, STP is enabled on most Cisco switches.
To check its status:
show spanning-tree
Change the Priority:
Lower the priority to make a switch the root bridge:
spanning-tree vlan 1 priority 4096
Verify Root Bridge:
Use the following command:
show spanning-tree vlan 1
The output will show the root bridge and port roles.
RSTP (Rapid Spanning Tree Protocol):
MSTP (Multiple Spanning Tree Protocol):
Here’s a quick recap of the key concepts covered in Network Access:
| Concept | Purpose/Description |
|---|---|
| Ethernet Standards | Defines wired networking speeds and media (e.g., 10Base-T, 100Base-T, 1000Base-T). |
| Switching Concepts | Switches manage traffic using MAC address tables and reduce collisions. |
| VLANs | Segments networks logically to isolate traffic and improve performance. |
| Inter-VLAN Routing | Enables communication between VLANs using routers or Layer 3 switches. |
| Wireless Concepts | Covers Wi-Fi configurations, security protocols, channels, and frequencies. |
| Spanning Tree Protocol | Prevents Layer 2 loops by managing redundant paths. |
In modern enterprise networks, Layer 3 switches are commonly used to route traffic between VLANs without requiring a separate router.
A Layer 3 switch combines the functionality of a switch (Layer 2) and a router (Layer 3). It can perform routing between VLANs internally using SVIs (Switched Virtual Interfaces).
Instead of using subinterfaces on a router (router-on-a-stick), a Layer 3 switch creates a virtual interface per VLAN, allowing routing between them.
Example Configuration:
interface vlan 10
ip address 192.168.10.1 255.255.255.0
no shutdown
interface vlan 20
ip address 192.168.20.1 255.255.255.0
no shutdown
ip routing ! Enables routing on the Layer 3 switch
Advantages of Layer 3 Switching:
No need for external routers
Faster internal routing with hardware-based processing
Cleaner and scalable design
Wireless security is critical in preventing unauthorized access and protecting data in transit.
Encryption: AES (Advanced Encryption Standard)
Authentication: Pre-shared key (WPA2-PSK) or enterprise authentication
Vulnerability: Susceptible to dictionary attacks if weak passwords are used
WPA3 addresses WPA2’s weaknesses and introduces several enhancements:
SAE (Simultaneous Authentication of Equals): Replaces the pre-shared key exchange, making it resistant to offline dictionary attacks.
Forward Secrecy: Even if a session key is compromised, previous data cannot be decrypted.
Improved Encryption: WPA3 uses 192-bit encryption in WPA3-Enterprise mode for stronger protection.
Individualized Data Encryption: Even on open networks (e.g., coffee shops), WPA3 can encrypt traffic per user.
Conclusion: WPA3 enhances wireless security in both personal and enterprise environments by strengthening authentication and encryption.
Understanding potential Spanning Tree Protocol (STP) problems is key for troubleshooting:
Root Bridge Misplacement: If the wrong switch becomes the root bridge (e.g., due to default priorities), traffic may flow inefficiently.
Solution: Manually set bridge priority on the desired root switch:
spanning-tree vlan 1 priority 4096
Blocked Ports Not Converging: A port may remain in a blocked state due to misconfiguration or topology changes.
Solution: Use show spanning-tree to analyze port roles and STP state transitions.
BPDUs are critical messages exchanged by switches to maintain the STP topology.
BPDU Uses:
Elect root bridge
Determine port roles (root port, designated port, blocked)
Detect loops and topology changes
BPDU Command Example:
show spanning-tree detail
This command shows BPDU-related metrics, root bridge ID, and port costs.
PortFast: Bypasses STP states on edge ports (not for trunk or uplinks)
BPDU Guard: Disables a port if unexpected BPDUs are received — protects against rogue switch connections
You already discussed Router-on-a-Stick — where a router uses subinterfaces to handle VLANs. Let’s contrast it with the more modern approach:
Uses one physical interface on the router with multiple subinterfaces (e.g., Gi0/0.10 for VLAN 10)
Requires trunking configuration on the connected switch port
Layer 3 switches eliminate the need for external routers:
Benefits:
No single point of failure on a trunk
Hardware switching enables faster routing
More scalable in enterprise settings
Configuration Tip: Ensure ip routing is enabled on the switch to allow Layer 3 processing between VLANs.
| Method | Device Used | Performance | Complexity | Common Use |
|---|---|---|---|---|
| Router-on-a-Stick | Layer 2 Switch + Router | Lower | Moderate | Small networks |
| SVI on Layer 3 Switch | Layer 3 Switch | Higher | Lower | Enterprise environments |
To strengthen Network Access knowledge for CCNA and real-world application:
Understand Layer 3 switch routing via SVIs as the scalable modern standard
Dive deeper into WPA3 and its protections vs WPA2
Learn to troubleshoot STP with tools like show spanning-tree and by analyzing BPDU behavior
Know the difference between Router-on-a-Stick and SVI routing, with configurations for both
Two switches are connected by a trunk link but hosts in different VLANs cannot communicate across the switches. What configuration issue is the most likely cause?
The VLAN is not allowed on the trunk.
Trunk links carry traffic from multiple VLANs between switches. If a VLAN is not included in the trunk’s allowed VLAN list, frames tagged with that VLAN ID will not pass across the trunk. This prevents hosts in that VLAN on different switches from communicating. Engineers should verify the trunk configuration using commands such as show interfaces trunk. If the VLAN is missing, it must be added to the allowed list so that the trunk can transport frames belonging to that VLAN across the switching infrastructure.
Demand Score: 83
Exam Relevance Score: 90
Which protocol automatically negotiates EtherChannel formation between switches using active and passive modes?
LACP.
Link Aggregation Control Protocol (LACP) is an IEEE standard used to dynamically form EtherChannel bundles. It allows multiple physical interfaces to combine into a single logical interface to increase bandwidth and provide redundancy. LACP supports active and passive negotiation modes. Active mode actively sends negotiation frames, while passive mode waits to respond. At least one side must be configured as active to form the channel. If both sides are passive, the EtherChannel will not establish because neither initiates negotiation.
Demand Score: 72
Exam Relevance Score: 87
Which Spanning Tree feature ensures a loop-free topology by selecting a single root bridge?
Root bridge election.
Spanning Tree Protocol prevents Layer 2 loops by creating a tree-like topology. During initialization, switches exchange Bridge Protocol Data Units (BPDUs) to elect a root bridge. The switch with the lowest bridge ID becomes the root bridge. All other switches calculate the shortest path to this root and block redundant links to avoid loops. Rapid PVST+ enhances this process by allowing faster convergence and maintaining separate spanning trees per VLAN. Understanding root bridge election and port roles is critical for troubleshooting switching loops and unexpected blocking ports.
Demand Score: 69
Exam Relevance Score: 88
Which discovery protocol works on multi-vendor networks to share device information such as hostname and port ID?
LLDP.
Link Layer Discovery Protocol (LLDP) is an open IEEE standard that allows network devices to advertise information about themselves to directly connected neighbors. Devices periodically send LLDP frames containing details such as system name, management address, port ID, and capabilities. Because LLDP is vendor-neutral, it operates across equipment from different manufacturers. Cisco Discovery Protocol (CDP) provides similar functionality but is proprietary to Cisco devices. Engineers commonly use LLDP during troubleshooting to identify neighboring devices and verify physical connectivity between network components.
Demand Score: 65
Exam Relevance Score: 84