CCNA JITL MEGALAB Notes: Part 2 – VLANs, Layer-2 EtherChannel

These are notes I made while completing JITL‘s Megalab. You can follow along by watching this video and grabbing the PKA file in the description.

I certainly don’t own anything I’ve posted here, which are excerpts from JITL’s PKA file, and Wendell Odom’s books CCNA 200-301: Official Cert Guide, 1st edition vol 1 and vol 2.

Spoiler warning, these notes contain configs.


  1. In Office A, configure a Layer-2 EtherChannel named PortChannel1 between DSW-A1 and DSW-A2 using a Cisco-proprietary protocol. Both switches should actively try to form an EtherChannel.

“Cisco-proprietary” means PAgP in this case. “Both switches should actively try to form an EtherChannel” means we have to use desirable. Here’s what I mean.

DSW-A1(config-if)#channel-group 1 mode ?
  active     Enable LACP unconditionally
  auto       Enable PAgP only if a PAgP device is detected
  desirable  Enable PAgP unconditionally
  on         Enable Etherchannel only
  passive    Enable LACP only if a LACP device is detected

Using desirable on one side, and auto on the other would still result in a LAG being made, but the instructions are explicit here. I’ll set both switches to use desirable.

! DSW-A1 and DSW-A2
int range g1/0/4-5
channel-group 1 mode desirable
  1. In Office B, configure a Layer-2 EtherChannel named PortChannel1 between DSW-B1 and DSW-B2 using an open standard protocol. Both switches should actively try to form an EtherChannel.

Same as network A, just using the IEEE standard LACP instead.

! DSW-B1 and DSW-B2
int range g1/0/4-5
channel-group 1 mode active

Let’s go verify step 1 and 2.

DSW-A1#show etherchannel summary
Flags:  D - down        P - in port-channel
        I - stand-alone s - suspended
        H - Hot-standby (LACP only)
        R - Layer3      S - Layer2
        U - in use      f - failed to allocate aggregator
        u - unsuitable for bundling
        w - waiting to be aggregated
        d - default port


Number of channel-groups in use: 1
Number of aggregators:           1

Group  Port-channel  Protocol    Ports
------+-------------+-----------+----------------------------------------------

1      Po1(SU)           PAgP   Gig1/0/4(P) Gig1/0/5(P) 

Looking good! DSW-A2 should show similar results. On network B, you’ll see the same thing but using LACP as the protocol instead.

  1. Configure all links between Access and Distribution switches, including the EtherChannels, as trunk links.
    1. Explicitly disable DTP on all ports.
    2. Set each trunk’s native VLAN to VLAN 1000 (unused).
    3. In Office A, allow VLANs 10, 20, 40, and 99 on all trunks.
    4. In Office B, allow VLANs 10, 20, 30, and 99 on all trunks.

I’ll start on the dist switches. Which interfaces should I include?

DSW-A1(config-if-range)#do show cdp neighbor
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
                  S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID    Local Intrfce   Holdtme    Capability   Platform    Port ID
DSW-A2       Por 1            161                    3650        Gig 1/0/4
DSW-A2       Por 1            161                    3650        Gig 1/0/5
DSW-A2       Por 1            161                    3650        Por 1
ASW-A2       Gig 1/0/2        161            S       2960        Gig 0/1
CSW1         Gig 1/1/1        161                    3650        Gig 1/1/1
CSW2         Gig 1/1/2        161                    3650        Gig 1/1/1
ASW-A3       Gig 1/0/3        161            S       2960        Gig 0/1
ASW-A1       Gig 1/0/1        161            S       2960        Gig 0/1

Access switches are on g1/0/1-3. Checking the other dist switches shows they’re using the same ports, so I can copy and paste the following and just change the allowed vlans.

! Office A Dist
int range g1/0/1-3
switchport mode trunk
switchport nonegotiate
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,40,99

! Office B Dist
int range g1/0/1-3
switchport mode trunk
switchport nonegotiate
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,30,99

! Office A Acc
int range g0/1-2
switchport mode trunk
switchport nonegotiate
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,40,99

! Office B Acc
int range g0/1-2
switchport mode trunk
switchport nonegotiate
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,30,99
  1. Configure one of each office’s Distribution switches as a VTPv2 server. Use domain name JeremysITLab.
    1. Verify that other switches join the domain.
    2. Configure all Access switches as VTP clients.

Side note, VTP use can be dangerous in the real world so doublecheck you’ve disabled VTP before connecting a switch to your network or perish 🙂

Let’s start by setting servers and clients, then we’ll verify.

! set server on DSW-A1 and DSW-B1
vtp version 2
vtp domain JeremysITLab
vtp mode server

! set client on all access switches
vtp mode client

! verify on ASW-A3
ASW-A3#show vtp status
VTP Version capable             : 1 to 2
VTP version running             : 2
VTP Domain Name                 : JeremysITLab
VTP Pruning Mode                : Disabled
VTP Traps Generation            : Disabled
Device ID                       : 0001.C7C3.9E00
Configuration last modified by 0.0.0.0 at 2-28-93 07:08:55

Feature VLAN : 
--------------
VTP Operating Mode                : Client
Maximum VLANs supported locally   : 255
Number of existing VLANs          : 9
Configuration Revision            : 8
MD5 digest                        : 0xCC 0xE4 0x7E 0x95 0x53 0xF6 0xE0 0xA3 
                                    0x8E 0xBB 0x86 0xB0 0xE9 0x1C 0xA2 0xF7 

We can see the domain has been set and the VTP operating mode is Client. Perfect! Let’s add some vlans to propagate.

  1. In Office A, create and name the following VLANs on one of the Distribution switches. Ensure that VTP propagates the changes.
    1. VLAN 10: PCs
    2. VLAN 20: Phones
    3. VLAN 40: Wi-Fi
    4. VLAN 99: Management

We’ll setup vlans on our VTP server DSW-A1.

! set vlans
vlan 10
name PCs
vlan 20
name Phones
vlan 40
name Wi-Fi
vlan 99
name Management

Checking on a client switch should now show those vlans.

! verify on ASW-A3
ASW-A3#show vlan 

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24
10   PCs                              active    
20   Phones                           active    
40   Wi-Fi                            active    
99   Management                       active    
1002 fddi-default                     active    
1003 token-ring-default               active    
1004 fddinet-default                  active    
1005 trnet-default                    active 
...
  1. In Office B, create and name the following VLANs on one of the Distribution switches. Ensure that VTP propagates the changes.
    1. VLAN 10: PCs
    2. VLAN 20: Phones
    3. VLAN 30: Servers
    4. VLAN 99: Management

Pretty similar to step 5. I’ll create and name the vlans on our VTP server DSW-B1, then check to see if they’ve been created on a VTP client.

! set vlans
vlan 10
name PCs
vlan 20
name Phones
vlan 30
name Servers
vlan 99
name Management

Okay, now verifying…

! verify on ASW-B3
ASW-B3#show vlan

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24
10   PCs                              active    
20   Phones                           active    
30   Servers                          active    
99   Management                       active    
1002 fddi-default                     active    
1003 token-ring-default               active    
1004 fddinet-default                  active    
1005 trnet-default                    active
...
  1. Configure each Access switch’s access port. 
    1. LWAPs will not use FlexConnect
    2. PCs in VLAN 10, Phones in VLAN 20
    3. SRV1 in VLAN 30
    4. Manually configure access mode and explicitly disable DTP

What the heck is FlexConnect? I’ve never heard of that.

FlexConnect: An AP at a remote site can locally switch traffic between an SSID and a
VLAN if its CAPWAP tunnel to the WLC is down and if it is configured to do so.1

Oh, this just means that the AP must connect to the WLC. We should account for that when we’re setting up switchports. Links to LWAPs should be access ports on vlan 99. LWAP is on int f0/1.

! ASW-A1 and ASW-B1
int f0/1
switchport mode access
switchport nonegotiate
switchport access vlan 99

ASW-A2, A3, and B2 all connect to an IP phone. These will need an access and voice vlan configured.

! ASW-A2, ASW-A3, ASW-B2
int f0/1
switchport mode access
switchport nonegotiate
switchport access vlan 10
switchport voice vlan 20

Last, ASW-B3 connects to a server. We’ll configure the switchport in access mode on vlan 30.

! ASW-B3
int f0/1
switchport mode access
switchport nonegotiate
switchport access vlan 30
  1. Configure ASW-A1’s connection to WLC1.
    1. It must support the Wi-Fi and Management VLANs.
    2. The Management VLAN should be untagged.
    3. Disable DTP.

A good hint here is that the link needs multiple vlans. That means this is a trunk.
Second, the management vlan should be untagged, which means we need to set native vlan to 99.

! ASW-A1
int f0/2
switchport mode trunk
switchport nonegotiate
switchport trunk native vlan 99
switchport trunk allowed vlan 40,99
  1. Administratively disable all unused ports on Access and Distribution switches.

This is just good practice. Let’s go find all the ports we want to target. We can pipe the output of show ip int brief and choose to exclude the word “up” to only select down ports.

ASW-A1#show ip int brief | exc up
Interface              IP-Address      OK? Method Status                Protocol 
FastEthernet0/3        unassigned      YES manual down                  down 
FastEthernet0/4        unassigned      YES manual down                  down 
FastEthernet0/5        unassigned      YES manual down                  down 
FastEthernet0/6        unassigned      YES manual down                  down 
...

Nice. Here’s all the shut commands.

! ASW-A1
int range f0/3-24
shut
do write

! All other access switches
int range f0/2-24
shut
do write

! Dist switches
int range g1/0/6-24,g1/1/3-4
shut
do write

That’s all for Part 2!


  1. Odom, Wendell. “Chapter 27: Analyzing Cisco Wireless Architectures” in CCNA 200-301: Official Cert Guide: Vol 1, 647 ↩︎