1.4.a VTPv1, VTPv2, VTPv3, VTP pruning
1.4.d Manual pruning
Before I get to manual pruning, VTP version 3 deserves a mention.
VTP version 3 comes with a bit of an upgrade that sets itself apart from earlier versions, to wit:
Version 3 now supports extended range vlans and private vlans.
The vtp database can support other formats, ie, MST.
Precautions against database hijacking, ie, inserting a switch with a higher revision number
can’t whack the existing database because only the primary vtp domain server may make
Hidden and secret passwords are available, not just plain text
Version 3 can be configured per port instead of only globally as in earlier versions.
Version 3 offers optimized resource handling and more efficient information transfer, whatever that means. (Sounds like marketing)
So this is the time when we should look towards the Best portable PCs for video altering laptops for video editing In any case, before we start it will be not out of the question to take a gander at the particulars which you ought to look before purchasing your Best portable PCs for video altering
Let’s look at vtp version 3.
From enable mode make the vtp server the primary vtp server. See below:
Then continue as for the earlier versions, except for the password. Hidden and secret are now
SW1(config)#vtp password ccie secret
VTP secret has to be 32 characters in length
SW1(config)#vtp password ccie hidden
Setting device VTP password
As discussed earlier in the VTP section, VTP pruning in my estimation is about the only good thing to come from the whole VTP mess.
Manual pruning is what it says; manual. If you are not using VTP pruning to limit unnecessary broadcasts then you will want to prune vlans that are not in use, by hand.
1.4.d Manual pruning
from switch flg pg 66
On trunk links, it is recommended to manually prune the VLANs that are not used.
You can use VTP pruning if VTP is in use, but manual pruning (using a switch-
port trunk allowed VLAN) is a secure way of allowing only those VLANs that are
expected and allowed on the link. In addition to this, it is also a good practice to
have an unused VLAN as a native VLAN on the trunk links to prevent DTP spoof-