nerdexam
CiscoCisco

200-301 · Question #688

200-301 Question #688: Real Exam Question with Answer & Explanation

Lab Simulation 6: VLAN & Trunk Configuration Explained --- Overall Goal The lab builds Layer 2 network segmentation across three switches. Two VLANs isolate traffic by department (MARKETING=202, FINANCE=303). Only the VLANs that actually need to pass between switches are permitte

Submitted by diego_uy· Mar 5, 2026Network Access

Question

Lab Simulation 6 Guidelines This is a lab item in which tasks will be performed on virtual devices. - Refer to the Tasks tab to view the tasks for this lab item. - Refer to the Topology tab to access the device console(s) and perform the tasks. - Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window. - All necessary preconfigurations have been applied. - Do not change the enable password or hostname for any device. - Save your configurations to NVRAM before moving to the next item. - Click Next at the bottom of the screen to submit this lab and move to the next question. - When Next is clicked, the lab closes and cannot be reopened. Topology Tasks Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted across any links between switches for security purposes. Do not modify or delete VTP configurations. The network needs two user-defined VLANs configured: VLAN 202: MARKETING VLAN 303: FINANCE 1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs. 2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted. 3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted. Answer: SW1 enable configure terminal vlan 303 name FINANCE interface e0/1 switchport mode access switchport access vlan 303 interface e0/2 switchport mode trunk switchport trunk allowed vlan 303 end copy running-config startup-config SW2 enable configure terminal vlan 202 name MARKETING vlan 303 name FINANCE interface e0/1 switchport mode access switchport access vlan 202 interface e0/2 switchport mode trunk switchport trunk allowed vlan 303 interface e0/3 switchport mode trunk switchport trunk allowed vlan 202,303 end copy running-config startup-config SW3 enable configure terminal vlan 202 name MARKETING vlan 303 name FINANCE interface e0/0 switchport mode access switchport access vlan 202 interface e0/1 switchport mode access switchport access vlan 303 interface e0/3 switchport mode trunk switchport trunk allowed vlan 202,203 end copy running-config startup-config

Options

  • taskConfigure Layer 2 connectivity on Sw1, Sw2, and Sw3 by defining VLANs 202 (MARKETING) and 303 (FINANCE), assigning them to PC-connected interfaces as access ports, and configuring inter-switch links (e0/2 on Sw1/Sw2, e0/3 on Sw2/Sw3) as 802.1q trunks, permitting only the required VLANs for security. Do not modify or delete VTP configurations.
  • prerequisitesConsole access to virtual devices (Sw1, Sw2, Sw3). All necessary preconfigurations have been applied. Do not change enable password or hostname for any device.

Explanation

Lab Simulation 6: VLAN & Trunk Configuration Explained


Overall Goal

The lab builds Layer 2 network segmentation across three switches. Two VLANs isolate traffic by department (MARKETING=202, FINANCE=303). Only the VLANs that actually need to pass between switches are permitted on trunk links — this is the security requirement: no unnecessary VLAN traffic leaks across inter-switch links.

Traffic flow after configuration:

[FINANCE PC] --access e0/1--> SW1 --trunk e0/2--> SW2 --trunk e0/3--> SW3 --access e0/1--> [FINANCE PC]
[MARKETING PC] --access e0/1--> SW2 --trunk e0/3--> SW3 --access e0/0--> [MARKETING PC]

Switch-by-Switch Breakdown

SW1

SW1 only hosts a FINANCE PC. It connects upstream to SW2 via e0/2.

StepCommandWhy
enableEnter privileged EXECRequired before any config commands
configure terminalEnter global config modeAll VLAN/interface configs happen here
vlan 303 / name FINANCECreate VLAN 303 locallyVLANs must exist in the local VLAN database before you assign ports to them
interface e0/1 → switchport mode accessSet PC-facing port to access modeAccess ports carry exactly one VLAN untagged — correct for end devices
switchport access vlan 303Assign the port to VLAN 303Associates this PC's traffic with FINANCE
interface e0/2 → switchport mode trunkSet inter-switch link to trunkTrunk ports carry tagged traffic for multiple VLANs
switchport trunk allowed vlan 303Restrict trunk to VLAN 303 onlySecurity requirement — MARKETING traffic has no business on this link since SW1 has no MARKETING devices
copy running-config startup-configSave to NVRAMWithout this, a reload wipes all your work

Note: The procedure also shows vlan 202 / name MARKETING on SW1. This is technically not required since SW1 has no MARKETING devices or links, but it's harmless and some graders may expect consistent VLAN databases. The critical part is that trunk allowed vlan 303 keeps MARKETING traffic off this link.

What breaks if skipped:

  • Skip vlan 303: The access port assignment fails silently or traffic is dropped — the VLAN doesn't exist to forward frames.
  • Skip switchport trunk allowed vlan 303: The trunk defaults to allowing all VLANs, violating the security requirement.
  • Skip copy run start: Reboot = full reconfiguration.

SW2

SW2 is the hub switch — it connects to both SW1 (e0/2) and SW3 (e0/3), and hosts a MARKETING PC on e0/1. It must carry both VLANs on its link to SW3.

StepCommandWhy
vlan 202 / name MARKETINGCreate VLAN 202SW2 hosts a MARKETING PC and must forward that VLAN
vlan 303 / name FINANCECreate VLAN 303FINANCE traffic transits SW2 between SW1 and SW3
interface e0/1 → access → vlan 202MARKETING PC access portSame logic as SW1 — end device gets untagged single-VLAN port
interface e0/2 → trunk → allowed vlan 303Link to SW1SW1 only has FINANCE; no reason to send MARKETING frames toward SW1
interface e0/3 → trunk → allowed vlan 202,303Link to SW3SW3 has both MARKETING and FINANCE PCs, so both VLANs must traverse this link

What breaks if skipped:

  • allowed vlan 303 on e0/2 (instead of both): FINANCE traffic between SW1 and SW3 can't cross SW2 — hosts can't communicate.
  • allowed vlan 202,303 on e0/3 (if you only allowed one): The VLAN you excluded becomes unreachable on SW3.

SW3

SW3 hosts both a MARKETING PC (e0/0) and a FINANCE PC (e0/1), connecting upstream to SW2 via e0/3.

StepCommandWhy
vlan 202 / vlan 303Create both VLANsBoth are needed locally for the two PCs
interface e0/0 → access → vlan 202MARKETING PCUntagged access for end device
interface e0/1 → access → vlan 303FINANCE PCUntagged access for end device
interface e0/3 → trunk → allowed vlan 202,303Link to SW2Both VLANs need to pass upstream to reach the rest of the network

Typo alert in the provided answer: SW3's trunk command reads allowed vlan 202,203 — that should be 202,303. VLAN 203 doesn't exist. Always double-check VLAN numbers; a single digit error means traffic is silently dropped.


Key Concepts to Remember

Access vs. Trunk:

  • Access port = one VLAN, untagged. Use for PCs, printers, phones.
  • Trunk port = multiple VLANs, 802.1Q tagged. Use for switch-to-switch links.

Trunk allowed VLAN logic — ask yourself:

"Which VLANs have devices on both sides of this link (directly or transitively)?"

  • SW1↔SW2: Only FINANCE devices exist on/behind SW1 → allow 303 only
  • SW2↔SW3: Both MARKETING and FINANCE exist on SW3 → allow 202,303

Memory tip — "Follow the traffic": Trace each PC's path to another PC of the same VLAN. Every trunk link that path crosses must have that VLAN permitted. If a VLAN doesn't need to cross a link, don't allow it — that's the security principle.

VTP note: The instruction says "do not modify VTP configurations." VTP can auto-propagate VLANs across switches, but the lab requires you to define them explicitly per switch. Don't touch vtp mode, vtp domain, or vtp password.


Quick Checklist Before Saving

  1. VLANs created with correct names on each switch?
  2. PC-facing ports set to access and assigned correct VLAN?
  3. Inter-switch ports set to trunk with only the required VLANs in the allowed list?
  4. copy running-config startup-config run on every switch?

Topics

#VLANs#Trunking#Layer 2 Switching#Access Ports

Community Discussion

No community discussion yet for this question.

Full 200-301 PracticeBrowse All 200-301 Questions