
295
Cisco Systems, Inc.
www.cisco.com
Configuring VTP
Prerequisites for Configuring
VTP
When you configure VTP, you must configure a trunk port so that the switch can send and receive VTP
advertisements to and from other switches in the domain.
Before adding a VTP client switch to a VTP domain, always verify that its VTP configuration revision number is
lower
than the configuration revision number of the other switches in the VTP domain. Switches in a VTP domain always
use the VLAN configuration of the switch with the highest VTP configuration revision number. If you add a switch that
has a revision number higher than the revision number in the VTP domain, it can erase all VLAN information from the
VTP server and VTP domain. See
Adding a VTP Client Switch to a VTP Domain, page 305
for the procedure for
verifying and resetting the VTP configuration revision number.
Restrictions for Configuring
VTP
VTP version 1 and VTP version 2 are not interoperable on switches in the same VTP domain. Do not enable VTP
version 2 unless every switch in the VTP domain supports version 2.
In VTP versions 1 and 2, when you configure extended-range VLANs on the switch, the switch must be in VTP
transparent mode. VTP version 3 also supports creating extended-range VLANs in client or server mode.
Information About Configuring
VTP
VTP
A VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN configuration consistency by
managing the addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations and
configuration inconsistencies that can cause several problems, such as duplicate VLAN names, incorrect VLAN-type
specifications, and security violations.
Before you create VLANs, you must decide whether to use VTP in your network. Using VTP, you can make configuration
changes centrally on one or more switches and have those changes automatically communicated to all the other switches
in the network. Without VTP, you cannot send information about VLANs to other switches.
VTP is designed to work in an environment where updates are made on a single switch and are sent through VTP to other
switches in the domain. It does not work well in a situation where multiple updates to the VLAN database occur
simultaneously on switches in the same domain, which would result in an inconsistency in the VLAN database.
The switch supports 1005 VLANs, but the number of configured features affects the usage of the switch hardware. If the
switch is notified by VTP of a new VLAN and the switch is already using the maximum available hardware resources, it
sends a message that there are not enough hardware resources available and shuts down the VLAN. The output of the
show vlan
user EXEC command shows the VLAN in a suspended state.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...