Tag Archives: SWITCH 300-115 1.4d

SWITCH 300-115 1.4 Configure and verify trunking

1.4.a VTPv1, VTPv2, VTPv3, VTP pruning

1.4.d Manual pruning

Before I get to manual pruning, VTP version 3 deserves a mention.

VTP version 3 comes with a bit of an upgrade that sets itself apart from earlier versions, to wit:

Version 3 now supports extended range vlans and private vlans.
The vtp database can support other formats, ie, MST.
Precautions against database hijacking, ie, inserting a switch with a higher revision number
   can’t whack the existing database because only the primary vtp domain server may make
   changes.
Hidden and secret passwords are available, not just plain text
Version 3 can be configured per port instead of only globally as in earlier versions.

Version 3  offers optimized resource handling and more efficient information transfer, whatever that means. (Sounds like marketing)

Let’s look at vtp version 3.

From enable mode make the vtp server the primary vtp server. See below:
vtp_ver3
Then continue as for the earlier versions, except for the password. Hidden and secret are now
   available.
SW1(config)#vtp password ccie secret
VTP secret has to be 32 characters in length
SW1(config)#vtp password ccie hidden
Setting device VTP password
As discussed earlier in the VTP section, VTP pruning in my estimation is about the only good thing to come from the whole VTP mess.
Manual pruning is what it says; manual. If you are not using VTP pruning to limit unnecessary broadcasts then you will want to prune vlans that are not in use, by hand.
VIDEO

SWITCH 300-115 1.4 Configure and verify trunking

1.4.d Manual pruning

https://www.packet6.com/ccnp-switch-manual-pruning/

https://learningnetwork.cisco.com/thread/8047

http://etutorials.org/Networking/Lan+switching+fundamentals/Chapter+4.+Layer+2+Fundamentals/VLAN+Pruning/

from switch flg pg 66

On trunk links, it is recommended to manually prune the VLANs that are not used.
You can use VTP pruning if VTP is in use, but manual pruning (using a switch-
port trunk allowed VLAN) is a secure way of allowing only those VLANs that are
expected and allowed on the link. In addition to this, it is also a good practice to
have an unused VLAN as a native VLAN on the trunk links to prevent DTP spoof-
ing.