15-5
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Chapter 15 Configuring VTP
Understanding VTP
hexadecimal format in the running configuration. You must reenter the password if you enter a
takeover command in the domain. When you enter the secret keyword, you can directly configure
the password secret key.
Support for extended range VLAN (VLANs 1006 to 4094) database propagation. VTP versions 1
and 2 propagate only VLANs 1 to 1005. If extended VLANs a re configured, you cannot convert
from VTP version 3 to version 1 or 2.
Note VTP pruning still applies only to VLANs 1 to 1005, and VLANs 1002 to 1005 are still
reserved and cannot be modified.
Private VLAN support.
Support for any database in a domain. In addition to propagating VTP information, version 3 can
propagate Multiple Spanning Tree (MST) protocol database information. A separ ate instance of the
VTP protocol runs for each application that uses VTP.
VTP primary server and VTP secondary servers. A VTP primary server updates the database
information and sends updates that are honored by all devices in the system. A VTP secondary server
can only back up the updated VTP configurations received from th e primary server to its NVRAM.
By default, all devices come up as secondary servers. You can enter the vtp primary privileged
EXEC command to specify a primary server. Primary server status is only nee ded for database
updates when the administrator issues a t akeover message in the domain. You can have a working
VTP domain without any primary servers. Primary server status is lost if the device reloads or
domain parameters change, even when a password is configured on the switch.
The option to turn VTP on or off on a per-trunk (per-port) basis. You can enable or disable VTP per
port by entering the [no] vtp interface configuration command. When you disable VTP on trunking
ports, all VTP instances for that port are disabled. You cannot set VTP to off for the MST database
and on for the VLAN database on the same port.
When you globally set VTP mode to off, it applies to all the trunking ports in the system. However,
you can specify on or off on a per-VTP instance basis. For example, you can configure the switch
as a VTP server for the VLAN database but with VTP off for the MST database.
VTP Pruning
VTP pruning increases network available bandwidth by restricting flooded traffic to those trunk links
that the traffic must use to reach the destination devices. Without VTP pruning, a switch floods
broadcast, multicast, and unknown unicast traffic across all trunk links within a VTP domain even
though receiving switches might discard them. VTP pruning is disabled by default.
VTP pruning blocks unneeded flooded traffic to VLANs on trunk ports that are included in the
pruning-eligible list. Only VLANs included in the pruning-eligible list can be pruned. By default,
VLANs 2 through 1001 are pruning eligible switch trunk por ts. If the VLANs are configured as
pruning-ineligible, the flooding continues. VTP pruning is supported in all VTP versions.
Figure 15-1 shows a switched network without VTP pruning enabled. Port 1 on Switch A and Port 2 on
Switch D are assigned to the Red VLAN. If a broadcast is sent from the host connected to Switch A,
Switch A floods the broadcast and every switch in the network receives it, even though Switches C, E,
and F have no ports in the Red VLAN.