Lab Manual
In this lab we will perform some more network tasks like.
Implementation of Intra VLAN Communication using Packet tracer
A VLAN (Virtual Local Area Network) is a network configuration technique that allows devices on
different physical LANs to be grouped into a single logical network. VLANs segment a network into
smaller, isolated broadcast domains, improving network performance, security, and manageability.
Task-:
Scenario to implement:
In this scenario we have 2 offices of an organization each office has 3 department’s Sales,
Marketing and Finance. We have same LAN so IP addresses will be of the same class. Initially all
department’s PCs can communicate with each other. We can ping from PC1- 10.0.0.1 to all other
pcs having IPs 10.0.0.2 --- 10.0.0.6 and vice versa. It shows broadcast behavior of switches within
same LAN.
Main objective of this LAB is to control/ prevent broadcast communication between these 6 PCs.
So that only relevant department PCs can communicate with each other. (i.e. Sales Department
PC-1 having IP 10.0.0.1 should only communicate with other office Sales department PC-4
having IP 10.0.0.4 in the same way Marketing department PC of Office-1 should communicate
Page 1|5
with only Marketing PC of another department and so on …...).
Pre-defined VLAN ranges:
VLAN 0, 4095: These are reserved VLAN which cannot be seen or used.
VLAN 1: It is the default VLAN of switches. By default, all switch ports are in VLAN.
This VLAN can’t be deleted or edit but can be used.
VLAN 2-1001: This is a normal VLAN range. We can create, edit and delete these
VLAN.
VLAN 1002-1005: These are CISCO defaults for fddi and token rings. These VLAN
can’t be deleted.
VLAN 1006-4094: This is the extended range of VLAN.
Purpose of VLAN IDs (100, 200, 300)
VLAN IDs are unique numbers used to identify each VLAN on a switch.
These IDs allow the switch to tag and forward packets appropriately within the VLAN.
They provide segmentation, ensuring that broadcast traffic stays within each VLAN and does not
interfere with other VLANs.
Example Use Case
VLAN 100 (sales): Connects all sales department PCs and ensures they share the same broadcast
domain.
VLAN 200 (marketing): Isolates marketing department traffic for security and better traffic
management.
VLAN 300 (finance): Keeps financial data and communication secure and separate from other
departments.
Step-01:
Assign static IPs to all PCs shown in above Topology.
Step-02: Configuration on Switch0 (Left side – Switch 0)
Click on Switch0 and goto CLI tab
Switch > enable
Switch # config terminal
Switch (config) # hostname Switch0
Switch0 (config) # vlan 100
Switch0 (config-vlan) # name sales
Switch0 (config-vlan) # exit
Switch0 (config) # vlan 200
Switch0 (config-vlan) # name marketing
Switch0 (config-vlan) # exit
Page 2|5
Switch0 (config) # vlan 300
Switch0 (config-vlan) # name finance
Switch0 (config-vlan) # exit
To check VLANs
Switch0 (config) # ctrl+ Z
Switch0# show vlan
// it will show a list of VLAN created now along with VLAN 1 (default)
Step-03: Configuration on Switch1 (Right side – Switch 1)
And then click on Switch1 and goto CLI tab
Switch > enable
Switch # config terminal
Switch (config) # hostname Switch1
Switch1 (config) # vlan 100
Switch1 (config-vlan) # name sales
Switch (config-vlan) # exit
Switch1 (config) # vlan 200
Switch1 (config-vlan) # name marketing
Switch1 (config-vlan) # exit
Switch1 (config) # vlan 300
Switch1 (config-vlan) # name finance
Switch1 (config-vlan) # exit
To check VLANs
Switch1 (config) # ctrl+ Z
Switch1# show vlan
// it will show a list of VLAN created now along with VLAN 1 (default)
Step 04: Port Membership. (Assigning interface ports to relevant VLANs)
On Switch 0:
Switch0 (config) #interface fastethernet 0/1
Page 3|5
Switch0 (config-if) #switchport mode access
Switch0 (config-if) #switchport access vlan 100
Switch0 (config-if) # exit
Switch0 (config) #interface fastethernet 0/2
Switch0 (config-if) #switchport mode access
Switch0 (config-if) #switchport access vlan 200
Switch0 (config-if) # exit
Switch0 (config) #interface fastethernet 0/3
Switch0 (config-if) #switchport mode access
Switch0 (config-if) #switchport access vlan 300
Switch0 (config-if) # exit
Switch0 (config) # ctrl+z
Switch # show vlan
Step 05: Perform the same above configurations on Switch1 (Right side)
On Switch 1:
Switch1 (config) #interface fastethernet 0/1
Switch1 (config-if) #switchport mode access
Switch1 (config-if) #switchport access vlan 100
Switch1 (config-if) # exit
Switch1 (config) #interface fastethernet 0/2
Switch1 (config-if) #switchport mode access
Switch1 (config-if) #switchport access vlan 200
Switch1 (config-if) # exit
Switch1 (config) #interface fastethernet 0/3
Switch1 (config-if) #switchport mode access
Switch1 (config-if) #switchport access vlan 300
Switch1 (config-if) # exit
Switch1 (config) # ctrl+z
Switch # show vlan
Page 4|5
Step-06: Trunk Port Assignment:
Now after this no PC will communicate with each other. To establish communication between
only relevant department PCs, need to add TRUNK PORT between 2 switches ports fastethernet
3/1. (In this scenario)
On Switch0:
Switch0(config)# interface fastethernet 0/4
Switch0(config-if)# switchport mode trunk
Switch0(config-if)# switchport trunk allowed vlan 100,200,300
Switch0(config-if)# exit
On Switch1:
Switch1 (config) # interface fastethernet 0/4
Switch1 (config-if) # switchport mode trunk
Switch1 (config-if) # switchport trunk allowe vlan 100,200,300
Switch1 (config-if) exit
To check the validity of commands on each switch:
use these three commands:
1- show vlan brief
2- show interface trunk
3- show interface status
Step-7:
Now ping 10.0.10.1 from PC1 having IP 10.0.10.2 it will be successful.
Same way
ping 10.0.20.1 from PC2 having IP 10.0.20.2 it will be successful.
ping 10.0.30.1 from PC3 having IP 10.0.30.2 it will be successful.
Mean all relevant department can only communicate with each other.
End of Lab # 07
Page 5|5