Implementation of VLAN through SRW2048 & SG300-20

Hi all

I have a Linksys SRW2048 who has connected workstations. This switch is connected to a CSB SG300-20 by fiber that has connected on servers.

The problem I have is that the internet is involved in the building is nearby the Linksys SRW2048 and I need to get to the SG300-20 without allowing access to the workstation so that it can pass through the filter of our content and then access all the workstations to it.

I have 2 SRW2048 at SG300-20 fiber connection, is in use and connected servers to the rest of the network that the other is not in use.

I guess I need to put two ports on say VLAN 10, one for internet connection ADSL modem and one for the miniGBIC use spare on switch SRW2048 fiber. Then the SG300-20 again once I'll need two ports on VLAN 10 on miniGBIC inflow and the port connect with unfiltered internet content filter

The content filter will be connected then after it has been filtered to a port on the default VLAN for the rest of the workstations to access.

In theory, the above is correct? If so could someone please go through what I have to do on the two switches to allow them to speak on the same VLAN.

Thank you very much

Matt

Hi Matt,

I just did this on my SRW208MP and my SRW208P-K9-NA

Save your settings before you make these changes, so you can correct if you had problems.

If I remember I did the following., but the VLANs have been already marked on the fiber ports.

Step 1. I removed VLANs marked my fiber ports and just left ports uplink untagged VLAN by default.

Step 2. My fiber uplink ports added to the Group of LAG 1 on both switches

Step 3 now, I added selected each vlan and tag them individually on the Group 1 GAL

Step 4.  Yes, and as you say, added the hypothetical ADSL modem to a switch as VLAN10 not signposted in port

seems easy, good luck

Best regards, Dave

Tags: Cisco Support

Similar Questions

  • Implementation of VLAN / QoS for VOIP on RV180

    I posted earlier about setting up VLAN / QoS for VOIP on the SG200-18 (see: https://supportforums.cisco.com/discussion/12193666/setting-vlan-and-qos...).

    I did go ahead and buy the RV180. I connected to SG200-18.

    I wish to proceed with the implementation of VLAN / QoS on the RV180 so my phone (Grandstream VOIP wireless phone) VOIP is on its own VLAN separate from the rest of the network, so make sure that all QoS settings are optimized to give the first priority of VOIP network telephone.

    Currently I still have the VOIP phone connected to SG200-18 as stated in the previous post.

    Here are my questions:

    1 should I leave the VOIP phone connected to the SG200-18 and config all the VLANS, VLANS and VLAN Switch voice settings down to the VOIP phone, or should I plugged the phone VOIP in the RV180? Which would give me better performance and easier to do?

    2. How can I place the VOIP phone on its own VIRTUAL LAN, in addition to optimizing QoS settings so it gets a top priority for the network?

    3. I currently have set VOIP telephone in order to reserve a DHCP address in the 192.168.x range. When you move to the VLAN, should I set the DHCP reservation and/or my firewall settings (I through the firewall as well)

    4. I also get a beta-test VOIP Grandstream office phone. Time of its installation, what I have to plug directly into the RV180 or the SG200-18, and I have to put it on the same VLAN as the phone VOIP without wire Grandstream or VLAN different? It also supports PoE, but the RV180 or SG200-18 model I does not work. If I use an external power supply, connect each device will be OK or might that it became fried?

    Thank you!

    Hello

    1 should I leave the VOIP phone connected to the SG200-18 and config all the VLANS, VLANS and VLAN Switch voice settings down to the VOIP phone, or should I plugged the phone VOIP in the RV180? Which would give me better performance and easier to do?

    It will not be much difference between being on the switch or on the router, so it is for the most part to the simplicity of configuration performance.  If you plug the phone directly on the router, you will really not disturb trunking VLAN or none of this switch.

    This is really what is more convenient, but if you are able to plug into the RV directly I wouldn't worry QoS on the switch.

    So let's talk about implementation of the RV180.

    First go to network > LAN > belonging to a VLAN.  Enable VLANs, and add a new VLAN for voice (most people use 100 for voice for a reason, but it does not matter).  You will take care to set the port that the phone is plugged in not tagged to the new voice VLAN, and you can exclude the data VLAN of the port.

    Then go to several VIRTUAL local network subnets and configure the address range for it configuration DHCP / new subnet (for example 192.168.100.0) If you do not want to use it (makes things a bit easier)

    Finally, to enable QoS on the RV go to QoS > QoS WAN profiles.  Activate the WAN QoS, make sure that it is set to the priority mode and add a new entry to the table.  You can name it anything you want (I used VoiP), then set it high priority.

    Then go down on the link profile page and add a new entry here. Select the profile you just created in the drop-down menu, set the service to one, select traffic selector VLAN and make sure the drop-down menu for VLAN is the VoIP VLAN.

    At this point, we have a configuration where the voice traffic (or basically anything on the VLAN voice) will have priority when it comes out the WAN interface.

    3. I currently have set VOIP telephone in order to reserve a DHCP address in the 192.168.x range. When you move to the VLAN, should I set the DHCP reservation and/or my firewall settings (I through the firewall as well)

    The second VIRTUAL LAN should have a configuration of different subnet for him, because I spoke up.  During this process you will place the DHCP server for the new VLAN as well.  You can adjust your reservations for the phones, but it does not really matter what IP they get, since we are prioritizing voice any VLAN, so you don't have set up a reserve, unless you really want to.

    4. the Grandstream phone.

    I would put the Grandstream (and all the other VoIP phones that you could get) in the voice VLAN so that he would get the same priority treatment.  At this point with multiple devices, you can indeed install a trunk to the switch (VLAN normal unidentified and voice VLAN Tag) and configure the ports to the voice VLAN for these phones.  Who will ensure that the switch gives priority to the traffic of voice, even if it is probably not as important in their own country on the WAN.

    Regarding the PoE device connected to a non PoE switch or a router, there will be no problems.  I'm guessing that the phone also comes with an AC adapter.  It will not feed this power in the thread just because it's PoE, it's pretty much a one-way circuit.

    Hope that helps,

    Christopher Ebert - Advanced Network Support Engineer

    Cisco Small Business Support Center

    * Please note the useful messages *.

  • Problems of implementation of VLANS on Cisco SG 300-28 comments

    Hello

    I'm mainly curious if the configuration that I explained below is actually possible, and if so how do I implement. I know that this isn't the easiest configuration and I need to put in place without buying any equipment more if possible.

    I have a SG Cisco 300-28 with three Setup VLAN

    Vlan1 (company) - 192.168.10.0 - switch IP 192.168.10.254

    VLAN2 (VOIP) - 192.168.20.0 - switch IP - 192.168.20.1

    VLAN3 (guest) - 192.168.30.0 - switch IP - 192.168.30.1

    Default gateway is 192.168.10.1 (Netgear router)

    I have a wireless network setup (Netgear WMS and WAP 2) configured with TWO VIRTUAL (1 and 3) networks. They enter ports on the Cisco SG 300 - 28 which are marked on the two VIRTUAL networks. The wireless carriers has worked well, but the guest network is not reout on the Internet.

    After some troubleshooting I realized that the reason wasn't the guest was because there was no path routing of the internet to the router.

    The router I have is not really ideal, it is a Netgear DGN2200, but I managed to create a static route to 192.168.30.1 with a metric of 2, 192,168,10.254 being the jump.

    Success, the connection worked, the only problem is that now my guest network can see my business network because the corporate network uses the static route on my router to router on the guest network (due to the limitations of this device I can't do anything about it)

    So basically, what I have is

    Network Guest can connect to Business VLAN switch. I guess that's because the router is on the VLAN of Business and the default gateway is the router. As they are on the same network the Guest inevetably network can see the network and the server of the company.

    The network of the company can return to the network invited through the router using my static route, I created. The static route is really basic and I can't create a firewall on the router rule to prevent the business network addressing network comments because there is only one LAN - WAN firewall and this connection is LAN - LAN.

    What I need, is...

    somehow stop all traffic from the 192.168.30.0 network routing to what anyone on the 192.168.10.0 network, apart from the router to 192.168.10.1.

    Is this possible? I have this setup at several different site, the only difference is that I have a router from CIsco security on the latter with the VLANS configured so that I don't have this problem. Because I have a Netgear DGN2200 rather limited, I cannot configure the VLAN correctly, and as such, I need to see if I can do this on the switch somehow.

    Any help would be appreciated.

    It is my first post says in the way, so if I missed something that anyone would help then please let me know.

    Kind regards

    David

    Hi David,

    Why not apply an access list to filter incoming traffic in the SG300 switch such as, via the command line or GUI.

    Here is an example below, certainly not comprehensive, just an example

    ,

    Remember, we use the reverse masking of the ACE;

    config

    restrictGuest extended IP access list

    deny ip 192.168.30.0 0.0.0.255 192.168.20.0 0.0.0.255
    deny tcp 192.168.30.0 0.0.0.255 any 192.168.30.1 0.0.0.0 www
    deny tcp 192.168.30.0 0.0.0.255 any 192.168.30.1 0.0.0.0 telnet
    deny ip 192.168.30.0 0.0.0.255 192.168.10.0 0.0.0.255

    allow an ip

    output

    interface gigabitethernet1

    Service-acl input restrictGuest

    output

    Don't forget to save the configuration with the following command and respond to the prompt.

    To write

    or do it via the GUI method

    Step 1.  Create an ACL name

    step 2, add the ACE base port which is the list of filters.

    step 3.   Apply or binding the list to a port so that the port can watch and filter pattern matches to detect traffic in the switch.  I gave you an example of an ACE list above, you can be more creative in what you refuse.

    step 4. Now add or copy the entry in other ports on the switch.

    Be sure to save your changes to the configuration.

    I hope this helps.

    Best regards, Dave

  • Removal of VLAN Tag on SG300.

    Hi all, tried searching but I am unable to find a specific answer to my question.

    I'm testing some equipment at the present time, the basic configuration is a software tester on laptop connects via ethernet on Board of our HAD. Some data must pass through our ESE and reach a second device. Tagged data flows from the laptop to the ESA. I have two switches SG300-10 which is given to me.

    These tests require test data to be S - tag only; 802.1ad 0x88A8 Ethertype with my choice of VID (100). There is no C - Tag (0 x 8100), unusual, I know! However my second device cannot manage the VLAN, so I need to remove the label.

    Previous test required only the C - tag data, and I managed to remove the labels quite easily by connecting the DUT for the switch port 10, second device with port 10 bridge interface and tagged VLAN 100 the value member and port 9 and 10 port access VLAN 100 interface.

    I tried different combinations of setting port 10 customer/general/trunk interfaces but were unable to remove the tags out of port 9. I was able to capture the images desired on port 9 straight, but they are of course marked. I'm working on the presumption that the SG300 can remove S - Tags on output.

    The device to port 9 has need of answering queries ARP with a specific MAC address and the response on the same VLAN, which would switch to add to the ARP response. I don't know if this is possible, but perhaps I could replace this device with the second switch if it would respond to ARP on one VLAN only S-Tag.

    I would appreciate any pointers that everyone has!

    An access port on the SG300 facing the marked port of the remote site has to accomplish this. Handling tag always happens generally during penetration.

  • VLAN: ESXi <>- Cisco SG300

    Hey everybody,

    I always try to get the hang of networking with ESXi/vSphere...and I was little confused as I had a configuration problem.

    I have an Intel NUC5i5MYHE with 5.5 ESXi. As he has that one NETWORK card I am configuring a trunk so I can separate groups of ports within the host with the VLAN.

    Cisco SG300 has several VLANs (including: HAND = 10, LAB1 = 20, LAB2 = 30). * 1 is still active but VLAN native = 999 *.

    MAIN are all fair access Ports on VLAN10 (10UP).

    GE22 is a trunk with VLAN 10, 20 and 30 with label (10T, 20T, 30t, 999UP).

    A few groups of host ports ESXi has currently (simply called the VLAN I want installation and set on the VLANs)

    Also, I created the extra VMkernel port with VLAN10 just for wasting his time with (I can't access to this IP address, but after looking at VMK0, I think that I need to add static routes to the bridge?)

    V0 & VMkernel 0 = VLAN 0 (none)

    V10 & VMkernel 1 = VLAN 10

    V20 = VLAN 20

    So, with this configuration, I am unable to access the host via vSphere Client. However, if I put GE22 on SG300 to 10UP (10UP, 20T, 30t) I AM able to access... but is not what I want, right?

    To my knowledge... 0 (none) passes a VLAN while 4095 (all) does not take into account any VLAN tags completely, sending the frame as-is to the customers. (While I would let VMK0 0 (zero) as the correlates directly to my unique NIC physical, right?)

    So... my computer that connects with the vSphere Client Gets VLAN10 penetration tag (access). Switch then forwards Egress GE22 through the trunk to the ESXi host with a labeled VLAN10 framework.

    The framework should be accepted at the VMK0 whatever the tag VLAN and connect or if the frame belonged to another customer sent on the vSwitch... unless I'm confused here somewhere.

    Can someone enlighten me please?

    Thank you

    Basically, you have two options. If native/default of the physical switch port VLAN is set on the Management VLAN, then do not set a VLAN ID on the management VMkernel port group, otherwise the value the VLAN ID on the virtual side. Ultimately that a single point (the physical switch port, or the virtual port group) is responsible for the labelling/close the network frames.

    André

  • Implementation of VLAN and QoS for VOIP on SG200-18

    We recently purchased the smart switch SG200-18 to replace a Netgear switch. We are moving our phone service to VOIP through our local ISP as well.

    I currently have the VOIP phone plugged into Port 17 on SG200-18 (it is a Grandstream Cordless VOIP phone).

    I want to put the VOIP phone on one VLAN separate from the rest of the network and optimize QoS parameters so that the VOIP phone has exceptional audio quality even during network traffic.

    Here are my questions:

    1. do I need to set anything on the type of port to Port 17 (because it resembles a shape any Combo port)?

    2. How can I do to isolate VOIP telephone it's own VLAN (I see the parameters VLANS and VLAN voice, not sure that one to use;) I've tried to set a VLAN and broke the Internet connectivity on the phone until I went and removed)?

    3. do I need to adjust the QoS settings to switch to better optimize the VOIP phone?

    Some additional questions about the GS200-18 in general:

    1. do I need to adjust the parameters of the system on the switch time? I am in the Central time.

    2. do I need to adjust the Green Ethernet/Energy Saving parameters or should I stay with the default settings?

    In addition, a couple of "getting started" questions for Cisco:

    1. I registered an account My Cisco. What should I do to register my switch with Cisco and associate with my My Cisco account?

    2. What are the benefits of purchasing a contract of Cisco Small Business support, and how much would it cost the SG200-18 (I ordered it from Provantage)? I'm curious to see if it's worth the money.

    Here's my 'features ':

    Switch: SG200-18

    VOIP phone: Grandstream DP715 and 710 handsets

    Plugged in: Port 17 on SG200-18

    Services: Internet Local (Direclynx)

    Type of connection: 3 m down / 500 k up DSL move to a future wireless connection that will give us higher speeds

    Backend VOIP provider: VOIP Innovations

    Router: Apple Airport Extreme AC model (all Macs and iOS devices and the OS X Server on the network, so I use the Apple router facilitates installation, because is not QoS, trying to QoS and VLAN in the switch)

    Thank you all!

    Hello

    I'll just go to the list again:

    1. sounds good in the port from the drop-down list. So can I just connect the VOIP phone and go with it, correct?

    Yes, just plug in ethernet combo port and it will work.

    2. is not an issue, but I agree, Apple likely isn't compatible QoS or VLAN.

    3. thanks for the info on time/NTP settings. If I wanted to go there and try to configure NTP, how much is it and what I have to do? I want to I can give it a quick try.

    To Setup NTP on the switch is quite simple.  Go to Administration > Time Settings > time system and check the boxes to activate the main clock Source (SNTP)

    Then go to the settings of the SNTP page and add a new entry with the IP address of an NTP server.  There is a list of available NTP servers here:

    http://www.pool.ntp.org/en/

    You must also ensure that the switches Administrative default gateway is set correctly (it must be set the to the default gateway, probably the most convenient airport) so the switch can contact the NTP server.  That option is set under Administration > Interface Management > Interface IPv4.  Change the user-defined default gateway and enter the IP address of your airport (or whatever your default gateway for your network)

    4 sounds good on the Green Ethernet settings. I'll leave it as default value.

    Yes, better to just let those unless you have weird problems with ports disconnect, who can sometimes be caused by Green Ethernet, but if there's nothing like leave it on and save a few watts.

    5 sounds good on does not need to attach my passage to my Cisco account. Should I fill out a form any registration of the product with Cisco before calling support?

    It is not a record for support.  The only thing we need you to do is to create a Cisco account, but you have already done this, so if/when you call in support, you just need your ID for Cisco (also called a CCOID sometimes) and the serial number of your switch.

    6. thanks for the info on the Service contract. Is it something that I would need to order directly from Cisco or I who would get my Cisco partner (Provantage)? After the three years is up, treat yourself to renewal or it just falls? Is there a certain amount of time I have to buy the Service Contract forward make me ineligible?

    Support contracts are purchased through a partner Cisco, or you can get them online for the CDW or Newegg for example.  Basically, you have until the expiry of your current aid for the purchase of a new contract.  For example, right now your switch comes with 1 year of technical support.  You can only buy a contract while it is still active.  Once your three-year contract is about to run out, you're in the same situation.  You can renew it before it expires, however if you leave is up, you will not be able to put a contract on it.  Contracts are not my specialty, however, so you can check with your partner for complete details.

    7. sounds good to how data use VOIP calls. His dislikes too. :-)

    I agree, a voice call is not much traffic.  What you have described you probably don't have problems, although of course I can't guarantee that.

    8. because it is from your provider and they specifically mentioned the VOIP, I would say that you'll be fine here.

    You had also placed on your airport using access point behind a router in small businesses.  I would like to say that it is possible, a large number of wireless routers have an option to put access point only mode or something like that, but you should check with Apple on how to do it.

    Insofar as a Small Business router if you decide to upgrade for the options VLAN or QoS, I would recommend the RV180, or perhaps the RV320.  Two of these models are available with or without wire depending on what you decide to do with the airport.

    I think I got all the questions, but if not just let me know,

    Christopher Ebert - Network Support Engineer

    Cisco Small Business Support Center

    * Please note the useful messages *.

  • Several VLANS between 2 SG300-10

    Hi all

    I have 2 switches SG300-10, and I need two VLANs, one for the internal network and the other for WiFi AP.

    I need ports 1-> 4 on both switches in order to be part of VLAN 1 and 5-2 8 > VLAN. and a 10 to the 2nd switch uplink port.

    How to configure the VLAN and the interface mode VLAN?

    1-> 4 vlan 10 port, port 5-> 8 vlan 20 and vlan port 10 10, 20 and 1? (assuming I have have VLAN 10 and 20 and 1 by default)

    Ports 1-> 8 General mode and trunk of 10 port mode?

    Thank you!

    Hi Adrien, the first question is, what is your router?

    To answer your question. Single host connection ports can be configured as any mode of port, but coelio is preferential. Links of connection between switches can be trunk or general with vlan 1 UNTAG, vlan 10 tag, tag vlan 20.

    Cli command would look like this

    config t

    database of VLAN

    VLAN 10.20

    item in gi1-4 serial interface

    switchport mode access

    switchport access vlan 10

    IG5-8 serial interface

    switchport mode access

    switchport access vlan 20

    gi10 interface

    switchport mode trunk

    switchport trunk allowed vlan add all

    -Tom
    Please evaluate the useful messages

  • Convert software SRW2048 SG300

    In my view, the SRW series is the same as basic material the SG300 series.

    Is there a way to update the firmware on the series SRW using firmware SG300?

    The SG300 firmware is much more usable. Also I'd rather have consistency we have the old SRW2024/48 and new switches SG300.

    Bob

    David,

    You are on point.

    the 300 series is an Update replacement and hardware and software of the oldest product SRW.

    If you have purchased order p/n SRW2008 the updated version here in the United States that's so order p/n SRW2008-K9-NA

    We made the change in order p/n for reasons of consistency so that if you ordered SRW2008 in the past you order now SRW2008-K9-xx

    where xx is a code region for regulatory requirements and power.

    SRW2008 was a linksys product while replacing, SRW2008-K9-NA, is for example a Cisco product that now takes care of switching L3, IPv6 and a bearable CLI and a whole bunch of new features.

    SRW2008-K9-NA has a cisco SG300-10 p/n internal.

    Refer to the following table a wide for some clarity on this subject.

    This table has been copied and pasted from the public announcement of the EOL, to October 2010 referenced in the URL that follows;

    http://www.Cisco.com/en/us/prod/collateral/switches/ps5718/ps9967/end_of_life_notice_c51-632243.html

    Part number of end of sale product

    Product description

    Replacement product reference number

    Replacement product description

    More information

    SRW2008-EU

    8-port 10/100/1000 Gigabit Switch with WebView

    SRW2008-K9-G5

    Managed switch of SG 300 - 10 10 Gigabit ports

    -

    SRW2008MP-EU

    8-port 10/100/1000 Gigabit Switch WebView Maximum Power PoE

    SRW2008MP-K9-EU

    Switch managed, SG 300-10MP, 10-port Gigabit PoE Max

    -

    SRW2008P-EU

    8-port 10/100/1000 Gigabit Switch with WebView and PoE

    SRW2008P-K9-EU

    Switch managed SG 300 - 10 p 10-port Gigabit PoE

    -

    SRW2008P-UK

    8-port 10/100/1000 Gigabit Switch with WebView and PoE

    SRW2008P-K9-UK

    Switch managed SG 300 - 10 p 10-port Gigabit PoE

    -

    SRW2016-EU

    16-port 10/100/1000 Gigabit Switch with WebView

    SRW2016-K9-EU

    Managed switch of SG 300 - 20 20-port Gigabit

    -

    SRW2024-CN

    24-port 10/100/1000 Gigabit Switch with WebView

    SRW2024-K9-CN

    Managed switch of SG 300 - 28 28-port Gigabit

    -

    SRW2024P - TO THE

    24-port 10/100/1000 Gigabit Switch with WebView and PoE

    SRW2024P-K9 - TO THE

    Managed switch of SG 300 - 28 p 28-port Gigabit PoE

    -

    SRW2024P-EU

    24-port 10/100/1000 Gigabit Switch with WebView and PoE

    SRW2024P-K9-EU

    Managed switch of SG 300 - 28 p 28-port Gigabit PoE

    -

    SRW2048

    48-Port 10/100/1000 Gigabit Switch with WebView

    SRW2048-K9-NA

    Managed switch of SG 300 - 52 52-port Gigabit

    -

    SRW2048-AR

    48-Port 10/100/1000 Gigabit Switch with WebView

    SRW2048-K9-AR

    Managed switch of SG 300 - 52 52-port Gigabit

    -

    SRW2048 - TO THE

    48-Port 10/100/1000 Gigabit with 4 Combo SFP switch WebView

    SRW2048-K9 - TO THE

    Managed switch of SG 300 - 52 52-port Gigabit

    -

    SRW2048-CN

    48-Port 10/100/1000 Gigabit Switch with WebView

    SRW2048-K9-CN

    Managed switch of SG 300 - 52 52-port Gigabit

    -

    SRW2048-EU

    48-Port 10/100/1000 Gigabit Switch with WebView

    SRW2048-K9-EU

    Managed switch of SG 300 - 52 52-port Gigabit

    -

    SRW2048-UK

    48-Port 10/100/1000 Gigabit Switch with WebView

    SRW2048-K9-UK

    Managed switch of SG 300 - 52 52-port Gigabit

    -

    SRW208 - TO THE

    8-port 10/100 Ethernet Switch with WebView

    SRW208-K9 - TO THE

    SF 300 - 08 8-port 10/100 managed switch

    -

    SRW208-CN

    8-port 10/100 Ethernet Switch with WebView

    SRW208-K9-CN

    SF 300 - 08 8-port 10/100 managed switch

    -

    SRW208G-EU

    8-port 10/100 Ethernet Switch with WebView, expansion Slots

    SRW208G-K9-G5

    SF 302-08 8-port 10/100 Switch managed with Gigabit Uplinks

    -

    SRW208MP

    8-port 10/100 Ethernet Switch WebView, Maximum power PoE

    SRW208MP-K9-NA

    SF 302-08MP 8-port 10/100 PoE Managed Switch w/Gig Links Max

    -

    SRW208MP-EU

    8-port 10/100 Ethernet Switch WebView, Maximum power PoE

    SRW208MP-K9-EU

    SF 302-08MP 8-port 10/100 PoE Managed Switch w/Gig Links Max

    -

    SRW208MP-UK

    8-port 10/100 Ethernet Switch WebView, Maximum power PoE

    SRW208MP-K9-UK

    SF 302-08MP 8-port 10/100 PoE Managed Switch w/Gig Links Max

    -

    SRW208P

    8-port 10/100 with WebView and PoE

    SRW208P-K9-NA

    SF 302 - 08 p 8-port 10/100 PoE Managed Switch w/Gig rising

    SRW208P - TO THE

    8-port 10/100 Ethernet Switch with WebView and PoE

    SRW208P-K9 - TO THE

    SF 302 - 08 p 8-port 10/100 PoE Managed Switch w/Gig rising

    -

    SRW208P-EU

    8-port 10/100 Ethernet Switch with WebView and PoE

    SRW208P-K9-EU

    SF 302 - 08 p 8-port 10/100 PoE Managed Switch w/Gig rising

    -

    SRW208P-UK

    8-port 10/100 Ethernet Switch with WebView and PoE

    SRW208P-K9-UK

    SF 302 - 08 p 8-port 10/100 PoE Managed Switch w/Gig rising

    -

    SRW224G4-CN

    24-port 10/100 + 4 Gigabit ports, 2 Combo SFP switch WebView

    SRW224G4-K9-CN

    SF 300-24 24-port 10/100 Switch managed with Gigabit Uplinks

    -

    SRW248G4 - TO THE

    48-Port 10/100 + 4 switch with WebView Gigabit ports

    SRW248G4-K9 - TO THE

    SF 300-48 48-port 10/100 Switch managed with Gigabit Uplinks

    -

    SRW248G4-EU

    48-Port 10/100 + 4-port Gigabit, 2 Combo SFP switch WebView

    SRW248G4-K9-EU

    SF 300-48 48-port 10/100 Switch managed with Gigabit Uplinks

    -

    SRW248G4-UK

    48-Port 10/100 + 4-port Gigabit, 2 Combo SFP switch WebView

    SRW248G4-K9-UK

    SF 300-48 48-port 10/100 Switch managed with Gigabit Uplinks

    -

    SRW248G4P

    48-Port 10/100 + 4 switch with WebView and PoE Gigabit ports

    SRW248G4P-K9-NA

    SF 300 - 48P 48-port 10/100 PoE Managed Switch w/Gig rising

    -

    SRW248G4P - TO THE

    48-Port 10/100 + 4 switch with WebView and PoE Gigabit ports

    SRW248G4P-K9 - TO THE

    SF 300 - 48P 48-port 10/100 PoE Managed Switch w/Gig rising

    -

    SRW248G4P-UK

    48-Port 10/100 + 4 switch with WebView and PoE Gigabit ports

    SRW248G4P-K9-UK

    SF 300 - 48P 48-port 10/100 PoE Managed Switch w/Gig rising

    -

    Order details on the 300 series check the following URL;

    http://www.Cisco.com/Cisco/Web/solutions/Small_Business/products/routers_switches/300_series_switches/index.HTML-tab-models

    Bob, please do not order the older SKU, but order the replacement SKU with a K9 in the p/n. These parts new or updated numbers also come with a substantial warranty, in order to check the datasheet for this information on the warranty.

    Best regards, Dave

  • Implementation of VLAN for wireless AP with two SSID

    I am trying to install a RV180 and 3 wireless access points. I want that the AP is having 2 SSID isolated from each other. IE comments network and core network. I have setup a VLAN and my AP support 802. 1 q and ssid matching of VID. I could get this background work, but things seem to have gotten confused when I plug a POE switch instead of directly in the rv180 of the AP. At this point I don't know exactly what to ask. Perhaps start by providing information based on how I'm supposed to do. I was under the impression that since both devices are supported 802. 1 q I could configure the VLAN on the router and tell the AP to apply a VID of the SSID and thing would work. This is not the case unfortunately. Any help would be appreciated.

    Aaron Hi, depends what's this switch. If it's a unmanage switch, it cannot process tags vlan so the switch will only be a member of the vlan native who is connect from the router.

    If it is a switch to manage, you must configure the same as the router, a vlan native UNTAG, tag vlan for the connection to the AP and router port.

    -Tom
    Please mark replied messages useful

  • Question about the implementation of VLAN automatic voice with Polycom phones on a SF 300 - 24 p

    Someone at - it Setup successfully a SF 300 - 24 p to automatically assign a VLAN voice for traffic from an IP of Polycom phone? We have activated with LLDP-MED policy assigned to the port, as well as the interface configured as a trunk with the PVID defined on the VLAN data and Auto VLAN enabled.

    Hello

    Thank you for using the Cisco support community. My name is Nico Muselle and I work for Cisco Small Business Support Center.

    In response to your question, the only additional thing required on your switch is the choice of one of the below configurations:

    1. Affect the phone VLAN statically to ports connection of phones.

      or

    2. Turn them on Vlan voice (and change CoS affecting 5), and add telephony YES Polycom phones (the first 3 bytes of the MAC). You may need to add a few different Yes. This way the switch detects the phone YES and add the switchport to the Vlan voice.

    LLDP-MED network strategy as you have defined it, on the other hand, will be used to assign the VLAN on the phone automatically if you do not have to configure it manually on all phones.

    In short, you can choose one of the methods above, in combination with the LLDP-MED policy so everythings should work just fine. If it is not, please let me know.

    Kind regards

    Nico glacier
    Cisco Small Business Support Center.

  • Q on the frames jumbo and implementation of vlan separate

    Why do you recommend to set aside a VLAN for data frames between the hosts ISCSI and EQ?

    There is another reason to avoid the defaul VLAN: with switches Cisco VLAN 1 only supports the standard frames (1500 bytes).  Since this is the default VLAN, Cisco will attempt to deliver all packages, including jumbo frames.  When the switch is busy, larger packages can be filed (leading to inconsistent behavior with jumbo frames).  Will we apply the MTU set for other VLANs (correct behavior will pass every time frames, or none of the time).

    This inconsistency of chassis can be difficult to resolve - I had two W2K3 servers connected to my San.  The two servers to discover them, connect and their volumes of partition, but we'd always unplug when I am gone for formatting (the other worked).  The job server connected via standard frames so that the problematic one connected to 9000 bytes.  Solved the problem by setting the NIC in the server to standard frames immediately (additional tests with a VLAN different show that the two servers could work properly with jumbo frames).

    I've been able to reproduce these results with a PowerConnect switch and include many Cisco providers follow regarding this problem.

  • Implemented two VLANs on two 2748 switches

    I'm trying to set up two new switches 2748 to replace four older switches.  The former hardware connected two subnets with no routing between them, even if some servers are multi-homed.

    On the new 2748 s (appointed 2748A and B 2748), I would like to configure half of the ports on each button for employment on each subnet.  I created a second LAN on each switch and configured VIRTUAL port membership so that VLAN1 contains 1 to 24 ports and VLAN is comprised of ports 25-48.  All traffic is unlabeled.

    2748 switch is connected to our Cisco ASA on port 1 (subnet A) and our SonicWall on port 25 (subnet B).  24 port is then connected to the 24 2748B switch port, and everything works as expected.  However, when I connect 48 2748A switch port to the 48 2748B, all the stops communication LAN port and the switch lights will blink.

    So I guess I'm create a loop that is flooding the network, but I'm not sure of the best configuration to replace the one preceding. Should I configure a single port on the two switches in order to be a member of the VLAN1 and VLAN2 and use it to connect to 2748 A and 2748 B?  If so, who should have the traffic for one or the other tag, or the port is a trunk?

    Thank you for the pointers. I'm trying to understand it on my own, but I do not know where to start...


  • Question: can we implement 80column report through BI Publisher

    a report with 80 odd columns can be implemented by BI Publisher? We could go back the database data, but those capable by RTF model.
    is there a limitation for RTF model columns?

    If you are using another format of model, there is no limit, but if you use it, RTF, you have.

  • Routing between two VLANs on a switch in series SG300

    I've seen a lot of messages from people with problems of traffic between the two routing VLANS with some complex examples.  Can someone show a simple example for a SG300 switch (in layer 3 mode) to set up the two VLAN and send the traffic between VLANS without an external router?

    VLAN1 10.10.10.0

    VLAN2 10.10.20.0

    I tried to do through the UI and can't seem to make it work.  It seems that it must be very simple, so maybe I'm missing something in the GUI.

    Hi Chris,

    I did 5 minutes of recording that showed how I configured the two VLAN on my SG300 switch and layer 3-switched between the VLANS.

    You have no trouble getting to the GUI, so you will have no difficulty to setup in a few minutes...

    • Be sure to use the latest version of the SG300 package, with a bearable CLI.
    • to save your changes to the configuration at the end of the process.
    • the IP addresses that you create will be the address of default gateway for PC hosts on VLANs specified.
    • Recording can be interrupted at any time to perform configuration operations.

    Recording is now available on the website of the WebEx service. Click on the link below to read:

    https://Cisco.WebEx.com/ciscosales/LSR.php?at=PB&SP=MC&rID=55688352&RKEY=05e1fc5fff0d05da

    Configuration of VLAN

    Monday, October 24, 2011 11:02 New York time

    5 minutes

    Have fun

    Best regards, Dave

  • Need help to set up voice VLAN in SG300

    Hello

    I spent too much time on it now and need help. I'm trying to set up a voice switch VLAN on a SG300 - 28 p. I need to charge a phone Cisco 7965 connected to a port on SG300 - 28 p to use VLAN 100, and a workstation connected to the phone to use Cisco 7965 on VLAN 101 by SG300 - 28 p. In the common Cisco IOS switches, this task is configured as follows:

    interface gi25

    switchport mode access

    switchport access vlan 101

    switchport voice vlan 100

    Trying to achieve this scenario with a Cisco SG300 switch turns into a nightmare. You will have to deal with a Dynamic of VLAN voice Auto Voice VLAN mode. Then, you must have a configured trigger and activated Automatic Smartport . I tried to do this in CLI nothing helps. Cisco 7965 receives an IP address of the access VLAN on Gi15 interface, which is 101 VLAN. I need to receive an address IP of the VLAN 100.

    The current configuration under Gi15 interface is as follows:

    interface gigabitethernet15

    activate the storm control

    broadcast storm control level kbit/s 10

    Storm-control include multicast

    port security throw trap 60

    maximum port security by 10 points

    port security mode max-addresses

    spanning tree portfast

    LLDP-med disable

    switchport mode access

    switchport access vlan 101

    ! next order is internal

    macro auto smartport dynamic_type unknown $native_vlan 101 $voice_vlan 100

    Now, I don't know how the macro auto smartport dynamic_type unknown $native_vlan 101 $voice_vlan 100 command in the config, and I do not know how to remove it.

    When I try to enter the command macro auto smartport type ip_phone_desktop under Gi15 interface, I get the following error message:

    The $voice_vlan macro setting is not configurable by the user

    It seems that the auto attendant smartport macro ip_phone_desktop can not apply the setting $voice_vlan with a value of 100. In fact, I explicitly does not use this parameter to everything in the order of macro auto smartport type ip_phone_desktop ; However, the SG300 switch knows that the voice VLAN VLAN 100, and he's trying to use this VLAN ID as the value of the $voice_vlan parameter, the macro fails.

    I tried statically configure the voice VLAN on the switch SG300 using the command id of the vlan 100 voice , but I couldn't get the ip_phone_desktop macro to configure interface Gi15 correctly. Then, I removed the command id of the vlan 100 voice and obtained SG300 to learn his voice VLAN ID of UC560 connected to the SG300 through a trunk port based on the port configuration (connected to SG300) for the trunk of the next UC560:

    switchport trunk vlan 101 native

    switchport mode trunk

    switchport voice vlan 100

    Cisco-switch macro description

    This is the command switchport voice vlan 100 who announces to SG300 via CDP VLAN 100 is a voice VLAN. When I run the command show vlan local VoIP on the SG300, I get the following result:

    VLAN ID - VPT DSCP Source MAC address Interface

    1                    5          46       default           ----                    ---

    * 100 CDP e0:5f:b9:xx:yy:zz gi28

    Thus, it is clear that the SG300 receives information from UC560 via CDP in port Gi28 VLAN 100 is the voice VLAN. However, I can not always apply the ip_phone_desktop macro to SG300 Gi15 interface.

    Also, I tried to set up vState ofoithis vlan auto-déclenché as well as the commands in global configuration State vlan automatic voice activated mode. Or setting changes anything view voice VLAN announced at Cisco 7965 where Cisco 7965 continues to use VLAN101 (access the VLAN assigned to the interface Gi15).

    Hello telecastle,

    The Macro just get in the way most of the time. A default state on the switch a user will set the id of the vlan voice with orders

    (config) #voice vlan id 100

    * This will create the vlan 100

    VLAN, VoIP? * You can use to change your defaults for dscp and cos a long with all the other settings.

    State of vlan (config) enabled automatic #voice

    (config) #interface rank fa1-24

    (config-if-range) #switchport trunk vlan 101 native

    trunk (config-if-range) #switchport allowed vlan add 100

    * This function will define the vlan native on the trunk to 101 for the data port and vlan tagged will be 101 for the voice.

    CDP is enabled automatically and should learn the features of the phone and get on the phone to the vlan 101 on this port.

    CDP of the UC should automatically fill in the switch of the SG. You may need to upgrade the switch to the latest firmware however. Also make sure that the DHCP server for the voice if the CPU must be configured accordingly.

    Let me know if this helps.

    Cisco Small Business Support Center

    Randy Manthey

    CCNA, CCNA - security

Maybe you are looking for