A VTP version 2-capable network device can operate in the same VTP domain as a network
device running VTP version 1 provided VTP version 2 is disabled on the VTP version
2-capable network device (VTP version 2 is disabled by default).
1) Do not enable VTP version 2 on a network device unless all of the network devices in the same VTP domain are version 2-capable. When you enable VTP version 2 on a network device, all of the version 2-capable network devices in the domain enable VTP version 2.
2) In a Token Ring environment, you must enable VTP version 2 for Token Ring VLAN switching
VTP version 2 is disabled by default on VTP version 2-capable switches. When you enable VTP version 2 on a switch, every VTP version 2-capable switch in the VTP domain enables version 2 and same happens when you disable vtp version 2 it will be disabled on all v2 capable switch.
You can only configure the version on switches in VTP server or transparent mode.
So you can disable v2 mode on your server and it will be done on all your clients and access switches which are in same vtp domain.
NOW because VTP is just to have vlan database synching across your network chnaging the version will not have any affect or downtime on your data network.
VTP version 1 and VTP version 2 are not interoperable on switches in the same VTP domain so till the time all switches have same VTP version the database synching will not happen for any new vlans or change or modification of exisitng vlans will not have affect on all switches.
So you can go ahead and change your switch back to version 1 and things will be ok.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...