6.4.2 Lab – Implement Etherchannel Answers Full 100% 2023 2024
This is Cisco 6.4.2 Lab – Implement Etherchannel Answers Full 100% 2023 2024 for Cisco CCNA 2 v7 SRWE v7.02.
Lab – Implement EtherChannel (Answers Version)
Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only.
Topology
Addressing Table
Device |
Interface |
IP Address |
Subnet Mask |
S1 |
VLAN 10 |
192.168.10.11 |
255.255.255.0 |
S2 |
VLAN 10 |
192.168.10.12 |
255.255.255.0 |
PC-A |
NIC |
192.168.20.3 |
255.255.255.0 |
PC-B |
NIC |
192.168.20.4 |
255.255.255.0 |
VLAN Table
VLAN |
Name |
Interface Assigned |
10 |
Management |
VLAN 10 |
20 |
Clients |
S1: F0/6 S2: F0/18 |
999 |
Parking_Lot |
S1: F0/3-5, F0/7-24, G0/1-2 S2: F0/3-17, F0/19-24, G0/1-2 |
1000 |
Native |
N/A |
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Create VLANs and Assign Switch Ports
Part 3: Configure 802.1Q Trunks between the Switches
Part 4: Implement and Verify an EtherChannel between the switches
Background / Scenario
Link aggregation allows the creation of logical links that are comprised of two or more physical links. This provides increased throughput beyond using only one physical link. Link aggregation also provides redundancy if one of the links fails.
In this lab, you will configure EtherChannel, a form of link aggregation used in switched networks. You will configure EtherChannel using Link Aggregation Control Protocol (LACP).
Note: LACP is a link aggregation protocol that is defined by IEEE 802.3ad, and it is not associated with any specific vendor.
LACP allows Cisco switches to manage Ethernet channels between switches that conform to the 802.3ad protocol. You can configure up to 16 ports to form a channel. Eight of the ports are in active mode and the other eight are in standby mode. When any of the active ports fail, a standby port becomes active. Standby mode works only for LACP, not for PAgP.
Note: The switches used with CCNA hands-on labs are Cisco Catalyst 2960s with Cisco IOS Release 15.2(2) (lanbasek9 image). Other switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs.
Note: Make sure that the switches have been erased and have no startup configurations. If you are unsure, contact your Answers.
Answers Note: Refer to the Answers Lab Manual for the procedures to initialize and reload devices.
Required Resources
- 2 Switches (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
- 2 PCs (Windows with a terminal emulation program, such as Tera Term)
- Console cables to configure the Cisco IOS devices via the console ports
- Ethernet cables as shown in the topology
Instructions
Part 1:Build the Network and Configure Basic Device Settings
In Part 1, you will set up the network topology and configure basic settings on the PC hosts and switches.
Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.
Step 2:Configure basic settings for each switch.
- Assign a device name to the switch.
Open configuration window
switch(config)# hostname S1
- Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as though they were host names.
S1(config)# no ip domain-lookup
- Assign class as the privileged EXEC encrypted password.
S1(config)# enable secret class
- Assign cisco as the console password and enable login.
S1(config)# line console 0
S1(config-line)# password cisco
S1(config-line)# login
- Assign cisco as the VTY password and enable login.
S1(config)# line vty 0 15
S1(config-line)# password cisco
S1(config-line)# login
- Encrypt the plaintext passwords.
S1(config)# service password-encryption
- Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
S1(config)# banner motd $ Authorized Users Only! $
- Save the running configuration to the startup configuration file.
S1# copy running-config startup-config
- Set the clock on the switch to today’s time and date.
S1# clock set 15:30:00 27 Aug 2019
Note: Use the question mark (?) to help with the correct sequence of parameters needed to execute this command.
- Copy the running configuration to the startup configuration.
Close configuration window
Step 3:Configure PC hosts.
Refer to the Addressing Table for PC host address information.
Part 2:Create VLANs and Assign Switch Ports
In Part 2, you will create VLANs as specified in the table above on both switches. You will then assign the VLANs to the appropriate interface and verify your configuration settings. Complete the following tasks on each switch.
Step 1:Create VLANs on the switches.
- On both switches create and name the required VLANs from the VLAN Table above.
Open configuration window
S1(config)# vlan 10
S1(config-vlan)# name Management
S1(config-vlan)# vlan 20
S1(config-vlan)# name Clients
S1(config-vlan)# vlan 999
S1(config-vlan)# name Parking_Lot
S1(config-vlan)# vlan 1000
S1(config-vlan)# name Native
S1(config-vlan)# exit
S2(config)# vlan 10
S2(config-vlan)# name Management
S2(config-vlan)# vlan 20
S2(config-vlan)# name Clients
S2(config-vlan)# vlan 999
S2(config-vlan)# name Parking_Lot
S2(config-vlan)# vlan 1000
S2(config-vlan)# name Native
S2(config-vlan)# exit
- Configure and activate the management interface on each switch using the IP address information in the Addressing Table.
S1(config)# interface vlan 10
S1(config-if)# ip address 192.168.10.11 255.255.255.0
S1(config-if)# no shutdown
S1(config-if)# exit
S2(config)# interface vlan 10
S2(config-if)# ip address 192.168.10.12 255.255.255.0
S2(config-if)# no shutdown
S2(config-if)# exit
- Assign all unused ports on the switch to the Parking_Lot VLAN, configure them for static access mode, and administratively deactivate them.
S1(config)# interface range f0/3 – 4, f0/7 – 24, g0/1 – 2
S1(config-if-range)# switchport mode access
S1(config-if-range)# switchport access vlan 999
S1(config-if-range)# shutdown
S2(config)# interface range f0/3 – 17, f0/19 – 24, g0/1 – 2
S2(config-if-range)# switchport mode access
S2(config-if-range)# switchport access vlan 999
S2(config-if-range)# shutdown
Step 2:Assign VLANs to the correct switch interfaces.
- Assign used ports to the appropriate VLAN (specified in the VLAN table above) and configure them for static access mode.
S1(config)# interface f0/6
S1(config-if)# switchport mode access
S1(config-if)# switchport access vlan 20
S2(config)# interface f0/18
S2(config-if)# switchport mode access
S2(config-if)# switchport access vlan 20
- Issue the show vlan brief command and verify that the VLANs are assigned to the correct ports.
S1# show vlan brief
VLAN NameStatusPorts
—- ——————————– ——— ——————————-
1defaultactiveFa0/1, Fa0/2
10Managementactive
20SalesactiveFa0/6
999Parking_LotactiveFa0/3, Fa0/4, Fa0/5, Fa0/7
Fa0/8, Fa0/9, Fa0/10, Fa0/11
Fa0/12, Fa0/13, Fa0/14, Fa0/15
Fa0/16, Fa0/17, Fa0/18, Fa0/19
Fa0/20, Fa0/21, Fa0/22, Fa0/23
Fa0/24, Gi0/1, Gi0/2
1000 Nativeactive
1002 fddi-defaultact/unsup
1003 token-ring-defaultact/unsup
1004 fddinet-defaultact/unsup
1005 trnet-defaultact/unsup
S2# show vlan brief
VLAN NameStatusPorts
—- ——————————– ——— ——————————-
1defaultactiveFa0/1, Fa0/2
10Managementactive
20ClientsactiveFa0/18
999Parking_LotactiveFa0/3, Fa0/4, Fa0/5, Fa0/6
Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/19
Fa0/20, Fa0/21, Fa0/22, Fa0/23
Fa0/24, Gi0/1, Gi0/2
1000 Nativeactive
1002 fddi-defaultact/unsup
1003 token-ring-defaultact/unsup
1004 fddinet-defaultact/unsup
1005 trnet-defaultact/unsup
Close configuration window
Part 3:Configure 802.1Q trunks between the switches.
In Part 3, you will manually configure interfaces F0/1 and F0/2 as 802.1Q trunks.
- Change the switchport mode on the interfaces to force trunking. Use the interface range command to reduce the number of commands required. Make sure to do this on both switches.
Open configuration window
S1(config)# interface range f0/1-2
S1(config-if-range)# switchport mode trunk
S2(config)# interface range f0/1-2
S2(config-if-range)# switchport mode trunk
- As a part of the trunk configuration, set the native VLAN to 1000 on both switches. You may see error messages temporarily while the two interfaces are configured for different native VLANs.
S1(config-if-range)# switchport trunk native vlan 1000
S2(config-if-range)# switchport trunk native vlan 1000
- As another part of trunk configuration, specify that VLANs 10, 20, and 1000 are allowed to cross the trunk.
S1(config-if-range)# switchport trunk allowed vlan 10,20,1000
S2(config-if-range)# switchport trunk allowed vlan 10,20,1000
- Issue the show interfaces trunk command to verify the trunking ports, Native VLAN and allowed VLANs across the trunk.
S1# show interfaces trunk
PortModeEncapsulationStatusNative vlan
Fa0/1on802.1qtrunking1000
Fa0/2on802.1qtrunking1000
PortVlans allowed on trunk
Fa0/110,20,1000
Fa0/210,20,1000
PortVlans allowed and active in management domain
Fa0/110,20,1000
Fa0/210,20,1000
PortVlans in spanning tree forwarding state and not pruned
Fa0/110,20,1000
Fa0/2none
S2# show interfaces trunk
PortModeEncapsulationStatusNative vlan
Fa0/1on802.1qtrunking1000
Fa0/2on802.1qtrunking1000
PortVlans allowed on trunk
Fa0/110,20,1000
Fa0/210,20,1000
PortVlans allowed and active in management domain
Fa0/110,20,1000
Fa0/210,20,1000
PortVlans in spanning tree forwarding state and not pruned
Fa0/110,20,1000
Fa0/210,20,1000
Question:
Why is the “Vlans in spanning tree forwarding state and not pruned” entry different for F0/1 and F0/2?
In the example above spanning tree has placed F0/2 in the blocking state.
Close configuration window
Part 4:Implement and Verify an EtherChannel between the switches.
- Create a LACP-based EtherChannel using F0/1 and F0/2 using group number 1, with both switches actively negotiating the EtherChannel protocol. Use the interface range command to reduce the number of commands required.
Open configuration window
S1(config)# interface range f0/1-2
S1(config-if-range)# channel-group 1 mode active
S1(config-if-range)# exit
S2(config)# interface range f0/1-2
S2(config-if-range)# channel-group 1 mode active
S2(config-if-range)# exit
- After the EtherChannel is configured, a virtual Port-Channel interface is automatically created. Now interface Port-Channel 1 represents the logical interface of the bundled physical ports F0/1 and F0/2. Additionally, the Port-Channel will inherit the configuration of the first physical port added to the EtherChannel.
- Issue the show interfaces trunk command to verify trunking is still in place
S1# show interfaces trunk
PortModeEncapsulationStatusNative vlan
Po1on802.1qtrunking1000
PortVlans allowed on trunk
Po110,20,1000
PortVlans allowed and active in management domain
Po110,20,1000
PortVlans in spanning tree forwarding state and not pruned
Po110,20,1000
S2# show interfaces trunk
PortModeEncapsulationStatusNative vlan
Po1on802.1qtrunking1000
PortVlans allowed on trunk
Po110,20,1000
PortVlans allowed and active in management domain
Po110,20,1000
PortVlans in spanning tree forwarding state and not pruned
Po110,20,1000
Question:
What does the port ‘Po1’ represent?
The logical grouping of physical interfaces F0/1 and F0/2 is now seen as Port-channel 1 or Po1.
- Use the show etherchannel summary command to verify the EtherChannel configuration.
S1# show etherchannel summary
Flags:D – downP – bundled in port-channel
I – stand-alone s – suspended
H – Hot-standby (LACP only)
R – Layer3S – Layer2
U – in usef – failed to allocate aggregator
M – not in use, minimum links not met
u – unsuitable for bundling
w – waiting to be aggregated
d – default port
Number of channel-groups in use: 1
Number of aggregators:1
GroupPort-channelProtocolPorts
——+————-+———–+———————————————–
1Po1(SU)LACPFa0/1(P)Fa0/2(P)
S2# show etherchannel summary
Flags:D – downP – bundled in port-channel
I – stand-alone s – suspended
H – Hot-standby (LACP only)
R – Layer3S – Layer2
U – in usef – failed to allocate aggregator
M – not in use, minimum links not met
u – unsuitable for bundling
w – waiting to be aggregated
d – default port
Number of channel-groups in use: 1
Number of aggregators:1
GroupPort-channelProtocolPorts
——+————-+———–+———————————————–
1Po1(SU)LACPFa0/1(P)Fa0/2(P)
Close configuration window
End of document
Device Configs – Final
Switch S1
S1# show run
Building configuration…
Current configuration : 3276 bytes
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname S1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
system mtu routing 1500
!
!
no ip domain-lookup
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
interface Port-channel1
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,1000
switchport mode trunk
!
interface FastEthernet0/1
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,1000
switchport mode trunk
channel-group 1 mode active
!
interface FastEthernet0/2
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,1000
switchport mode trunk
channel-group 1 mode active
!
interface FastEthernet0/3
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/4
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/5
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/6
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/7
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/8
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/9
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/10
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/11
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/12
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/13
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/14
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/15
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/16
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/17
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/18
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/19
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/20
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/21
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/22
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/23
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/24
switchport access vlan 999
switchport mode access
shutdown
!
interface GigabitEthernet0/1
switchport access vlan 999
switchport mode access
shutdown
!
interface GigabitEthernet0/2
switchport access vlan 999
switchport mode access
shutdown
!
interface Vlan1
no ip address
!
interface Vlan10
ip address 192.168.10.11 255.255.255.0
!
ip http server
ip http secure-server
!
banner motd ^C Authorized Users Only! ^C
!
line con 0
password 7 14141B180F0B
login
line vty 0 4
password 7 14141B180F0B
login
line vty 5 15
login
vlan 10
name Management
vlan 20
name Clients
vlan 999
name Parking_Lot
vlan 1000
name Native
exit
end
Switch S2
S2# show run
Building configuration…
Current configuration : 3276 bytes
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname S2
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
system mtu routing 1500
!
!
no ip domain-lookup
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
interface Port-channel1
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,1000
switchport mode trunk
!
interface FastEthernet0/1
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,1000
switchport mode trunk
channel-group 1 mode active
!
interface FastEthernet0/2
switchport trunk native vlan 1000
switchport trunk allowed vlan 10,20,1000
switchport mode trunk
channel-group 1 mode active
!
interface FastEthernet0/3
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/4
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/5
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/6
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/7
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/8
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/9
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/10
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/11
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/12
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/13
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/14
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/15
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/16
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/17
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/18
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/19
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/20
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/21
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/22
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/23
switchport access vlan 999
switchport mode access
shutdown
!
interface FastEthernet0/24
switchport access vlan 999
switchport mode access
shutdown
!
interface GigabitEthernet0/1
switchport access vlan 999
switchport mode access
shutdown
!
interface GigabitEthernet0/2
switchport access vlan 999
switchport mode access
shutdown
!
interface Vlan1
no ip address
!
interface Vlan10
ip address 192.168.10.12 255.255.255.0
!
ip http server
ip http secure-server
!
banner motd ^C Authorized Users Only! ^C
!
line con 0
password 7 14141B180F0B
login
line vty 0 4
password 7 14141B180F0B
login
line vty 5 15
login
vlan 10
name Management
vlan 20
name Clients
vlan 999
name Parking_Lot
vlan 1000
name Native
exit
end