How to configure trunk on Cisco Catalyst Switch

Hello Alexis

It depends on the platform you choose. If you use a 2960 for example, it doesn’t give you the choice of encapsulation. This is because in the real world, it only supports a single encapsulation type which is dot1q.

If you use a 3560 multilayer switch, you will see the choice of encapsulation is available. Indeed you will see the following:

Switch(config-if)#switchport mode trunk
Command rejected: An interface whose trunk encapsulation is "Auto" can not be configured to "trunk" mode.
Switch(config-if)#

These switches initially have an encapsulation mode of auto, which is set for access ports. This limitation is a remnant of when ISL was used in the past, but ISL is now an almost obsolete Cisco proprietary trunking protocol. In order to configure the port as a trunk, you must first choose the encapsulation mode like so:

Switch(config-if)#switchport trunk encapsulation ?
  dot1q  Interface uses only 802.1q trunking encapsulation when trunking
Switch(config-if)#switchport trunk encapsulation dot1q
Switch(config-if)#switchport mode trunk
Switch(config-if)#

So it depends on the model of the switch you are using.

I hope this has been helpful!

Laz

Thank you very much for your response! I am satisfied

Just a question. Sometimes on Packet Tracer when I say " Switchport mode trunk" on SW1 and if I say “Switchport mode dynamic desirable” on SW2, it shows me n-802.1q on sh int tr. What the hec is n-802.1q? If its negotiate does that mean trunk is already established?

Hello Satish

If you have switchport mode trunk on one end of the link, you are manually configuring that port to be in trunk mode. With switchport mode dynamic desirable on the other end of the link, you are configuring it to negotiate with the other switch.

So because one end is configured manually as a trunk, the dynamic desirable end of the link will detect that, and automatically become whatever the other side is. So it becomes a trunk.

Now because a negotiation took place in order for the switch to determine the mode of the port, this is considered a negotiated configuration. The n-802.12q indicates that this is a trunk (802.1q) that has been configured as a trunk through a negotiation process (n-).

In the lesson you will find a table that shows what mode a port will have if each end is configured with a particular mode. Here is that table showing the case in which you have trunk configured on one end and dynamic desirable on the other:
image

I hope this has been helpful!

Laz

Hi,

Can you help me to understand how work and how configure the hybrid-port on trunking protocol.

At my job (an ISP company), I see many times this type of configuration, for example when is needed a TOR switch configuration for Esxi servers., but I’m not familiar at all with it.

It is related with the native vlans but the ports are configured on a switch like hybrd-port…that make me very confused :frowning:

I saw this topic but can you explain me how it works and when I have to use it ,maybe with any example topology where this configuration is needed? Exist any lesson about that?

Thanks

Hello Giovanni

Unlike Access and Trunk ports, the Hybrid port does not have exactly the same meaning across all vendors. Each vendor will use a different terminology for various types of ports that have particular extra features beyond a simple trunk or access port.

For Cisco, the hybrid port is a feature of higher-end Cisco carrier grade switches, such as the ME1200 for example. Hybrid ports are very well described by Cisco in this documentation like so:

Hybrid ports resemble trunk ports in many ways, but adds additional port configuration
features. In addition to the characteristics described for trunk ports, hybrid ports have these abilities:

  • Can be configured to be VLAN tag unaware, C-tag aware, S-tag aware, or S-custom-tag
    aware.
  • Ingress filtering can be controlled.
  • Ingress acceptance of frames and configuration of egress tagging can be configured
    independently

Carrier networks often use QinQ with an outer and inner VLAN tag to separate customer traffic. The C-tag mentioned in the above quote is the Customer tag, or the inner tag, and the S-tag is the Service tag or the outer tag.

So a hybrid port is able to provide additional features that are useful to carriers. An example of a configuration of a hybrid port along with several of the features it delivers can be found at the following Cisco documentation:

Because this is not part of any exam content, and because for Cisco, it is a feature that is limited to a particular specialized kind of switch, there are no lessons concerning this on the site.

I hope this has been helpful!

Laz

Dear sir,

I have switch in DC IN which server (172.25.185.129/26 ) VLAN 282 and user VLAN 182 10.25.182.0/24 have configured . At level -6 i have one more switch which have user VLAN and Server vlan also. The server in the datacentre have two nic, one is connected to server network in DC and communicate to user network at level 6. And another network user vlan 10.25.182.0 /24 have configured. This user vlan cant communicate with another user vlan at Level 6. And also it cant communicate with this gateway. However the L2 switch at DC can reach gateway 10.25.181.1 .

Why the same vlan cant reach ? However different VLAN (282 AND 182 ) can reachable.
Please advice . Will appreciate your help.SECL6SWITCH.txt (61.3 KB) DCR4R11-SW01-DC-SEC.txt (18.8 KB)

Thanks

Regards,
Mani

Hello Mani

After a brief look at your configuration files, I see that the two switches are connected using a port channel which is configured as a trunk that passes all VLANs between the two switches. This means that if the VLANs are configured correctly on the access ports with the correct VLAN numbers, users should be able to communicate with each other between switches.

However, looking again at your configurations, I see that there is no VLAN 182 on the DC switch, so there is something that’s not right with the VLANs.

Take a look at your VLAN configurations across the two switches again to ensure that the configuration is correct.

I hope this has been helpful!

Laz

Dear Sir,

The first 8 ports are in VLAN 182 on the DC switch. From the switch i can reach gw 10.25.182.1 . However the I connect VLAN 182 to my laptop , unable to connect gateway.
Kindly let me know if u need any other information then i will send .

Thank you

Regards,
Mani

Hello Mani

Unfortunately I don’t see VLAN 182 on the DC switch. I see VLAN 282 on ports Ge0/1 to Ge0/23. Here is an excerpt from your DCR4R11-SW01-DC-SEC.txt file:

interface Port-channel1
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0
 no ip address
 shutdown
!
interface GigabitEthernet0/1
 switchport access vlan 282
 switchport mode access
 no cdp enable
 spanning-tree portfast
!
interface GigabitEthernet0/2
 switchport access vlan 282
 switchport mode access
 no cdp enable
 spanning-tree portfast
!
interface GigabitEthernet0/3
 switchport access vlan 282
 switchport mode access
 no cdp enable
 spanning-tree portfast
!
interface GigabitEthernet0/4
 switchport access vlan 282
 switchport mode access
 no cdp enable
 spanning-tree portfast

If this is the case, then VLAN 182 is simply not included within the DC switch, which would account for the difficulty in communication.

I hope this has been helpful!

Laz

DCR4R9-SW02#.txt (8.0 KB)

Dear Sir,

I have attached the correct switch which is datacentre switch for your kind reference.
Kindly check and update please.

Thank you

Regards,
Mani

Hello Mani

When troubleshooting such issues, it’s not always enough to simply share a configuration file to find a fault. You need all troubleshooting tools at your disposal, namely CLI commands and active testing.

Even so, looking at the configuration files, I see that there is a port channel created on both devices, and this port channel is configured as a trunk which passes all VLANs. However, on the DC switch, I notice that there is no channel-group command on the TE interfaces resulting in an incomplete etherchannel configuration. Without CLI access to confirm this, I can only assume that this is the source of the problem you’re dealing with.

I hope this has been helpful!

Laz

Hi Rene,

I noticed this lesson is not visible in the drop down for ENCOR > Switching. I found it via the DTP lesson link. Thanks

Bhav

1 Like

Hello Bhav

Thanks for pointing that out, I’ll let @ReneMolenaar know.

Laz

Thanks Bhav, just added it.

Rene

Thanks Rene. It was a good lesson, although I noticed on IOL L2 images, dynamic auto and desirable modes appear to be disabled. I have VIRL though so managed to lab it with one of the L2 IOS images from there.

Dynamic is dangerous ? If some malicious switch comes with dynamic mode then it will automatically sync with it ?

This what I listen from YouTube lesson .

Hello Abdul

DTP is a protocol that is used for convenience. When you use it ports can negotiate to function as either access or trunks based on what they perceive at the other end of the link. The danger here occurs when a malicious user is connected to an access port of a switch that is configured to operate with DTP. The user can “trick” the switch into thinking the computer is a switch, and it can create a trunk between the switch and the computer. This will give the computer access to other VLANs that it is not allowed to have.

For this reason, it is always a good idea to disable DTP on the ports of switches. DTP should not be confused with VTP which is a different protocol.

I hope this has been helpful!

Laz

So Administrative Mode Should only be set as 802.1q for switches and operational mode should be set as manually : switchport mode trunk ? & Switchport no negotiate ?

and access ports should manually configured

with this threats can be minimized in the network ?

do we really need dynamic desirable or dynamic auto in real life networks ? or it’s just in lab environment ? if yes where its used ?

Hello Abdul

It is considered best practice to disable DTP on a trunk using the switchport nonegotiate command. This will ensure that the interface will only enter the mode that you manually configure, either trunk or access. This way, you can avoid any security issues.

The only situation in which DTP would be useful is if you constantly rearrange your network topology, connecting and disconnected switches and hosts. If this is the case, you would connect a PC to a port on the switch, and it will automatically become an access port, or if you connect one switch to another, it will automatically become a trunk. This way you can avoid the need to constantly manually configure ports.

But it is rare to have a production network where this is the case, so outside of a lab environment, DTP in the vast majority of cases can be more harmful than good.

I hope this has been helpful!

Laz