SG300/SG500 remove interface vlan

Hello!

The question is the following:

I add a VLAN interface to test IP connectivity to this vlan by adding an IP address for this interface vlan and ping on a host.

for example
interface vlan 5
192.168.0.251 IP address 255.255.255.0

Then I can remove the ip address "without ip address', but I can't delete the ' interface vlan 5".»

Even when I delete the vlan itself of the database for vlan. There is no command "no interface vlan. I can only stop the interface vlan.

If anyone knows how to remove the interface vlan switches SG300/SG500 cli.

Thanks, Woeger

Hello

I tried just that with my switch from laboratory here.

I created VLAN 10 and he has given an IP address.

Then I did a no ip address on the interface VLAN and then not a vlan 10.

At this stage there is no interface THAT VLAN 10 in my config running or when I do a show ip interface.

So remove the VLAN has done actually remove the interface for me, brings me to my question.

What version of the bootcode/firmware do you currently use?  Maybe this problem has been fixed, because I am running 1.3.7.18 firmware with 1.3.7.01 code to boot.

If you are on a low moving forward and put to date, don't forget to upgrade the boot thus code, it is necessary for new versions of firmware.

Hope that help, but if not just let me know and we can take another look,

Christopher Ebert - Advanced Network Support Engineer

Cisco Small Business Support Center

* Please note the useful messages *.

Tags: Cisco Support

Similar Questions

  • Removal of VLAN Tag on SG300.

    Hi all, tried searching but I am unable to find a specific answer to my question.

    I'm testing some equipment at the present time, the basic configuration is a software tester on laptop connects via ethernet on Board of our HAD. Some data must pass through our ESE and reach a second device. Tagged data flows from the laptop to the ESA. I have two switches SG300-10 which is given to me.

    These tests require test data to be S - tag only; 802.1ad 0x88A8 Ethertype with my choice of VID (100). There is no C - Tag (0 x 8100), unusual, I know! However my second device cannot manage the VLAN, so I need to remove the label.

    Previous test required only the C - tag data, and I managed to remove the labels quite easily by connecting the DUT for the switch port 10, second device with port 10 bridge interface and tagged VLAN 100 the value member and port 9 and 10 port access VLAN 100 interface.

    I tried different combinations of setting port 10 customer/general/trunk interfaces but were unable to remove the tags out of port 9. I was able to capture the images desired on port 9 straight, but they are of course marked. I'm working on the presumption that the SG300 can remove S - Tags on output.

    The device to port 9 has need of answering queries ARP with a specific MAC address and the response on the same VLAN, which would switch to add to the ARP response. I don't know if this is possible, but perhaps I could replace this device with the second switch if it would respond to ARP on one VLAN only S-Tag.

    I would appreciate any pointers that everyone has!

    An access port on the SG300 facing the marked port of the remote site has to accomplish this. Handling tag always happens generally during penetration.

  • SG300-20 - configure DHCP on the interface VLAN

    I have read the different partners of the discussions on the SG300 and SG500 going on regarding the high setting of VLAN and DHCP on VIRTUAL networks.  For some reason, I could not get even this simple task to work.

    First thing I did was update my version firmware and boot as follows:

    SW version 1.3.7.18 (date of 12 January 2014 time 18:02:59)

    Start the 1.3.5.06 version (dated 21 July 2013 times 15:12:10)

    HW version V02

    When I rebooted the SG300 after the SW/Boot updates the boot configuration has been crushed and I had to configure my switch from scratch.  The intention is to have two VIRTUAL networks:

    VLAN 1: all the devices, servers, etc.

    VLAN 2: subnet basis which distributes DHCP addresses

    The SG300-20 is connected to a router Asus RT-AC66U on the 192.168.1.x subnet and provides access to the internal network and WiFi access (IP address of the router is 192.168.1.1 and the default gateway).  Everything works without any problem.  So my task is simply to create 2 VLANS on 192.168.2.x subnet and use DHCP to assign addresses.  I spent many hours on it and I still can't get it to work.  When I connect a laptop to the port (GI8) assigned to 2 VLANS, I end up finding a few wobbly 169.254.x.x address.  I definitely thought something would not 'easy' that hard to set up, but apparently I was wrong.

    The SG300 is running in mode L3 as shown in my running-config below.

    Someone gets to see something which could prevent my client from the laptop to receive the interface VLAN 2 DHCP IP addresses that are not on the 192.168.2.x subnet?

    Any ideas / suggestions would be greatly appreciated!

    Here's my running-config:

    config-file-header
    MYSTICSW1
    v1.3.7.18 / R750_NIK_1_35_647_358
    CLI v1.0
    router adjustment system mode

    SSD of encrypted file indicator
    @
    SSD-control-start
    config of SSD
    control of password file unrestricted SSD
    no control of the integrity of the file ssd
    SSD-control-end cb0a3fdb1f3a1af4e4430033719968c0
    !
    database of VLAN
    VLAN 2
    output
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    Add a voice vlan Yes-table 00d01e Pingtel_phone___
    VLAN voice Yes-table add Polycom/Veritel_phone___ 00e075
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    Hello interface range vlan 1
    hostname MYSTICSW1
    host 192.168.1.15 record
    logging source hostname id
    username privilege 15 b4a0fcf20b2cd9d80a55b06ab8f83277f9733904 encrypted password cisco
    location of the SNMP-Server Office
    clock timezone ""-5
    DST Web recurring U.S. clock.
    clock source sntp
    unicast SNTP client enable
    unicast SNTP client survey
    survey of 192.168.1.10 SNTP server
    !
    interface vlan 1
    IP 192.168.1.254 255.255.255.0
    no ip address dhcp
    !
    interface vlan 2
    name MysticWAN
    192.168.2.254 IP address 255.255.255.0
    !
    interface gigabitethernet8
    switchport mode access
    switchport access vlan 2
    !
    output
    Default IP gateway 192.168.1.1

    Thanks in advance!

    Clint Lambert

    Clint, please see this post

    https://supportforums.Cisco.com/message/4178990#4178990

    -Tom
    Please mark replied messages useful
    http://blogs.Cisco.com/smallbusiness/

  • Interface VLAN SG300-28 Firmware 1.3.7.18

    Hello

    I just my SG300 to update the last firrmware 1.3.7.1.8 and I met this problem:

    -By default, the interface VLAN has been activated, but the display is always disabled

    -I can not change and I can not ping to the VLAN IP interface as well (I gave an IP 192.168.10.1)

    Is this a bug? Does anyone know how to fix this? Please help me!

    Appreciate your help

    Minh

    minh06,

    You upgrade the startup code for Sx300_FW_Boot_1.3.5.58 ?

    -Marty

  • SG300: Cant assign aw vlan 802. 1 x + freeradius

    We recently got SG300-10 and try to get the assignment of vlan dynamic works via 802.1 x and freeradius. We got it so that the client connected to the SG300 would correctly auth, IE, I see this in "see the dot1x users:

    MAC               Auth   Auth   Session        VLAN

    Port     Username         Address           Method Server Time

    -------- ---------------- ----------------- ------ ------ -------------- ----

    gi7      testuser         58:55:ca:24:19:d4 802.1X Remote 00:04:39

    However, the client does not seem to be at all on the vlan correct or any vlan. If I change the port of "dot1x - radius attributes vlan static" to "dot1x - radius attributes vlan" then the customer cant auth at all (which is expected because it cannot retrieve the information of vlan).

    The freeradius users file looks like this:

    testuser  Cleartext-Password := "testpassword"

    ##Tunnel-Tag = 0,

    Tunnel-Medium-Type = IEEE-802,

    Tunnel-Type = VLAN,

    Tunnel-Private-Group-Id = "104"

    There is this whole line in the eap.conf file:

    copy_request_to_tunnel = yes

    Running config:

    net055#show running-config

    config-file-header

    net055

    v1.3.5.58 / R750_NIK_1_35_647_358

    CLI v1.0

    set system mode switch

    file SSD indicator encrypted

    @

    ssd-control-start

    ssd config

    ssd file passphrase control unrestricted

    no ssd file integrity control

    ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0

    !

    vlan database

    default-vlan vlan 3333

    exit

    vlan database

    vlan 1,100,104,111

    exit

    voice vlan oui-table add 0001e3 Siemens_AG_phone________

    voice vlan oui-table add 00036b Cisco_phone_____________

    voice vlan oui-table add 00096e Avaya___________________

    voice vlan oui-table add 000fe2 H3C_Aolynk______________

    voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone

    voice vlan oui-table add 00d01e Pingtel_phone___________

    voice vlan oui-table add 00e075 Polycom/Veritel_phone___

    voice vlan oui-table add 00e0bb 3Com_phone______________

    dot1x system-auth-control

    hostname net055

    line console

    exec-timeout 30

    exit

    line ssh

    exec-timeout 0

    exit

    encrypted radius-server host 172.16.200.57 key #REMOVED priority 10 usage dot1.x

    radius-server host source-interface vlan 100

    management access-list mlist2

    permit ip-source 172.16.202.0 mask 255.255.255.0

    permit ip-source 172.16.200.0 mask 255.255.255.0

    exit

    management access-class mlist2

    logging buffered debugging

    aaa authentication enable default enable none

    aaa accounting dot1x start-stop group radius

    enable password level 15 encrypted #REMOVED

    no service password-recovery

    no passwords complexity enable

    passwords aging 0

    username #REMOVED password encrypted #REMOVED privilege 15

    username #REMOVED password encrypted #REMOVED privilege 15

    ip ssh server

    ip ssh password-auth

    ip http timeout-policy 1800 https-only

    no ip http server

    tacacs-server timeout 10

    clock timezone " " 0 minutes 0

    clock source sntp

    !

    interface vlan 100

    ip address 172.16.200.21 255.255.255.0

    no ip address dhcp

    !

    interface vlan 104

    name gen-0-Gnv-204.0

    !

    interface vlan 111

    name guest-0-Gnv-10-66-61.0

    dot1x guest-vlan

    !

    interface gigabitethernet1

    switchport trunk allowed vlan add 100,104,111

    !

    interface gigabitethernet7

    dot1x guest-vlan enable

    dot1x reauthentication

    dot1x radius-attributes vlan static

    dot1x port-control auto

    switchport mode general

    switchport general allowed vlan add 104 untagged

    no macro auto smartport

    !

    exit

    ip default-gateway 172.16.200.1

    Looks like there was a similar questions here, but it seems to have never been resolved:

    https://supportforums.Cisco.com/message/3336810#3336810

    Hi all

    I'm working with Colin and that ends up being a problem of RADIUS. In the file eap.conf, for peap (auth phase 1).

    We need to enable copy_request_to_tunnel AND use_tunneled_reply:

    {PEAP

    # The syringe EAP session needs a default value
    # Type of EAP that is distinct from that of
    # module EAP-tunneled.  Inside of the
    # PEAP tunnel, we recommend that you use MS-CHAPv2,
    # as the default type is supported by
    # Windows clients.
    default_eap_type = mschapv2

    # module has PEAP also of these configuration
    Articles of #, which are the same as TTLS.

    copy_request_to_tunnel = yes
    use_tunneled_reply = yes

    Subsequently, we could see the answers of the test with id user vlan posting it once by response.

    See you soon!

  • No SG300-52 routing inter - VLAN

    Hello

    I have a base on this SG300-52 configuration:

    • L3 is enabled
    • Latest Firmware is installed (1.4.0.88)
    • Vlan1 IP is 10.0.0.1/24
    • A PC is connected to port 1 (with IP 10.0.0.3)
    • VLAN99 IP is 192.168.0.2/29
    • A router is connected to the 49 port (with the 192.168.0.1 IP address and Internet access to the router is OK)
    • On SG300-52 default gateway is 192.168.0.1

    The SG-300:

    • I can ping the default gateway (192.168.0.1) and any Internet address, using 192.168.0.2 as address IP Source
    • I can't ping the default gateway (192.168.0.1) or any Internet address, using 10.0.0.1 as address IP Source
    • I can ping my PC (10.0.0.3), using 10.0.0.1 as the IP Source address
    • I can't ping my PC (10.0.0.3), using 192.168.0.2 as address IP Source

    There is no routing inter - VLAN, but I can't find how to activate...

    The complete configuration is the following:

    #show run SG300-52
    config-file-header
    SG300-52
    v1.4.0.88 / R800_NIK_1_4_194_194
    CLI v1.0
    router adjustment system mode

    SSD of encrypted file indicator
    @
    SSD-control-start
    config of SSD
    control of password file unrestricted SSD
    no control of the integrity of the file ssd
    SSD-control-end cb0a3fdb1f3a1af4e4430033719968c0
    !
    database of VLAN
    VLAN 99
    output
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    Add a voice vlan Yes-table 00d01e Pingtel_phone___
    VLAN voice Yes-table add Polycom/Veritel_phone___ 00e075
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    Hello interface range vlan 1
    hostname SG300-52
    username privilege 15 c464af817287343305cbd6493c593885695df531 encrypted password cisco
    property intellectual ssh server
    Server SNMP Server
    The telnet server IP
    !
    interface vlan 1
    the IP 10.0.0.1 255.255.255.0
    no ip address dhcp
    !
    interface vlan 99
    name WAN
    IP 192.168.0.2 255.255.255.248
    !
    interface gigabitethernet49
    switchport mode general
    VLAN allowed switchport General add 99 unidentified
    switchport General pvid 99
    !
    output
    Default IP gateway 192.168.0.1

    You have an idea on the issue?

    Thanks in advance for your help.

    Hi Anthena1390

    My email is [email protected] / * /. When you reply to the email can let me know which devices need to communicate on VLAN 99. Is there a major reason for SG300 happen DHCP assumes that your router? Well I would like to add a few screenshots, they will show you how to properly set up a P2p link, assign DHCP pools, how to correctly add default routes. Send an email and lets get your problem is resolved.

  • SG500 layer 3 - VLAN can see each other devices Vlan9 <>- Vlan13

    Hi all!

    I guess I'm missing something simple here:

    Basic configuration: two SG500 stacked switches in layer mode 3 who should do the routing. LANCOM WLC with access Internet COOL tied up in the trunk.

    As for my understanding, I wouldn't be able to see Vlan13 of Vlan9 devices. But unfortunately, I don't have.

    Any help is appreciated. Thank you!!!

    config-file-header
    switch0908fa
    v1.3.7.18 / R750_NIK_1_35_647_358
    CLI v1.0
    define the system mode router queues-mode 4

    SSD of encrypted file indicator
    @
    SSD-control-start
    config of SSD
    control of password file unrestricted SSD
    no control of the integrity of the file ssd
    SSD-control-end cb0a3fdb1f3a1af4e4430033719968c0
    !
    database of VLAN
    VLAN 46, 91-9-99
    output
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    Add a voice vlan Yes-table 00d01e Pingtel_phone___
    VLAN voice Yes-table add Polycom/Veritel_phone___ 00e075
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    The dhcp server IP
    network IP dhcp pool P_1
    address 192.168.0.10 low high 192.168.0.254 255.255.255.0
    Infinite rental
    94.200.200.200 DNS server
    output
    network IP dhcp pool P_9
    address 192.168.9.10 low high 192.168.9.254 255.255.255.0
    Infinite rental
    94.200.200.200 DNS server
    output
    network IP dhcp pool P_13
    address 192.168.13.20 low high 192.168.13.254 255.255.255.0
    Infinite rental
    94.200.200.200 DNS server
    output
    no host start auto-config
    Hello interface range vlan 1
    hostname switch0908fa
    No complexity of passwords allow
    username privilege 15 7af78c911d5b48bea1dc2449d9d89513abeb4be5 encrypted password cisco
    name-server IP 192.168.0.5
    querying domain IP 18
    no service-CPU usage
    !
    interface vlan 1
    the IP 192.168.0.1 255.255.255.0
    no ip address dhcp
    !
    interface vlan 9
    name V_9
    IP 192.168.9.1 255.255.255.0
    !
    interface vlan 10
    name V_10
    !
    interface vlan 11
    name V_11
    !
    interface vlan 12
    name V_12
    !
    interface vlan 13
    name V_13
    192.168.13.1 IP address 255.255.255.0
    !
    interface vlan 14
    name V_14
    !
    interface vlan 15
    name V_15
    !
    interface vlan 16
    name V_16
    !
    interface vlan 17
    name V_17
    !
    interface vlan 18
    name V_18
    !
    interface vlan 19
    name V_19
    !
    interface vlan 20
    name V_20
    !
    interface vlan 21
    name V_21
    !
    interface vlan 22
    name V_22
    !
    interface vlan 23
    name V_23
    !
    interface vlan 24
    name V_24
    !
    interface vlan 25
    name V_25
    !
    interface vlan 26
    name V_26
    !
    interface vlan 27
    name V_27
    !
    interface vlan 28
    name V_28
    !
    interface vlan 29
    name V_29
    !
    interface vlan 30
    name V_30
    !
    interface vlan 31
    name V_31
    !
    interface vlan 32
    name V_32
    !
    interface vlan 33
    name V_33
    !
    interface vlan 34
    name V_34
    !
    interface vlan 35
    name V_35
    !
    interface vlan 36
    name V_36
    !
    interface vlan 37
    name V_37
    !
    interface vlan 38
    name V_38
    !
    interface vlan 39
    name V_39
    !
    interface vlan 40
    name V_40
    !
    interface vlan 41
    name V_41
    IP 192.168.41.1 255.255.255.0
    !
    interface vlan 42
    name V_42
    !
    interface vlan 43
    name V_43
    !
    interface vlan 44
    name V_44
    !
    interface vlan 45
    name V_45
    !
    interface vlan 46
    name V_46
    !
    interface vlan 91
    name V_91
    !
    interface vlan 92
    name V_92
    !
    interface vlan 93
    name V_93
    !
    interface vlan 94
    name V_94
    !
    interface vlan 95
    name V_95
    !
    interface vlan 96
    name V_96
    !
    interface vlan 97
    name V_97
    !
    interface vlan 98
    name V_98
    !
    interface vlan 99
    name V_99
    !
    interface gigabitethernet1/1/1
    switchport mode access
    !
    interface gigabitethernet1/1/2
    switchport mode access
    !
    interface gigabitethernet1/1/3
    switchport mode access
    !
    interface gigabitethernet1/1/4
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/5
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/6
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/7
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/8
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/9
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/10
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/11
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/12
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/13
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/14
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/15
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/16
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/17
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/18
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/19
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/20
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/21
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/22
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/23
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/24
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/25
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/26
    switchport mode access
    switchport access vlan 9
    !
    interface/gigabitethernet1/1/27
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/28
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/29
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/30
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/31
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/32
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/33
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/34
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/35
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/36
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/37
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/38
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/39
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/40
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/41
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/42
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/43
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/44
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/45
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/46
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/47
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/48
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/49
    switchport mode access
    !
    interface gigabitethernet1/1/50
    switchport mode access
    !
    interface gigabitethernet1/1/51
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet1/1/52
    switchport mode access
    switchport access vlan 9
    !
    interface gigabitethernet2/1/1
    switchport mode access
    !
    interface gigabitethernet2/1/2
    switchport mode access
    switchport access vlan 13
    !
    interface gigabitethernet2/1/3
    switchport mode access
    switchport access vlan 13
    !
    interface gigabitethernet2/1/4
    switchport mode access
    switchport access vlan 13
    !
    interface gigabitethernet2/1/5
    switchport mode access
    switchport access vlan 13
    !
    interface gigabitethernet2/1/6
    switchport mode access
    switchport access vlan 13
    !
    interface gigabitethernet2/1/7
    switchport mode access
    switchport access vlan 13
    !
    interface gigabitethernet2/1/8
    switchport mode access
    !
    interface gigabitethernet2/1/9
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/10
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/11
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/12
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/13
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/14
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/15
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/16
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/17
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/18
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/19
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/20
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/21
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/22
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/23
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/24
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/25
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/26
    switchport mode access
    switchport access vlan 41
    !
    interface/gigabitethernet2/1/27
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/28
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/29
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/30
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/31
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/32
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/33
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/34
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/35
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/36
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/37
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/38
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/39
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/40
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/41
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/42
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/43
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/44
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/45
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/46
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/47
    switchport mode access
    switchport access vlan 41
    !
    interface gigabitethernet2/1/48
    switchport mode access
    !
    interface gigabitethernet2/1/51
    switchport mode access
    !
    interface gigabitethernet2/1/52
    switchport mode access
    !
    output
    IP route 0.0.0.0/0 192.168.0.5 metrics 2
    encryption ip key-pair of keys rsa ssh-client
    .

    The VLAN intercommunicates is because you have an IP address on the interface VLAN that will dynamically build a route on the switch.

    As noted below, if you want to VLAN 9 to not see 13 or vice versa and ACL will be needed on the interface VLAN.

  • F10 4820 t - pulsations on the interface vlan

    Hello everyone

    Using Force10 S4820T on 9.6

    Rate limits can be applied to the physical interfaces only? and if yes how can I do to fix a speed limit on an interface vlan? Policy-map?

    Thanks in advance

    Based on the information contained in the user guide, it seems that it cannot apply to the physical interface.

    Page 739:

    http://bit.LY/1IRtdlU

  • interface vlan problems addin

    Hello

    I have a problem with my 8164F with 6.1.0.1 powerconnect version

    I create the vlan 643

    then I create an interface vlan

    interface vlan 643
    IP 172.24.64.2 255.255.240.0
    output

    When I ping the ip address of the switch

    ping 172.24.64.2
    Ping 172.24.64.2 with 0 bytes of data:

    4 packets transmitted, 0 packets received, 100% packet loss
    round-trip (MS) min/avg/max =<10><10><>

    in the journal, I have the following line

    <173>11 Jun 14:39:29 172.16.8.100 - 2 TRAPMGR [1206213340]: traputil.c (697) 1604 %% link on Vl643 is down

    show ip interface vlan 643

    State of the routing interface... Down
    Primary IP address... 172.24.64.2/255.255.240.0
    Method......................................... Manual
    Routing mode... Enable
    Administrative mode... Enable
    NET before realized emissions... Disable
    Proxy ARP...................................... Enable
    Local Proxy ARP... Disable
    Statement of assets... Inactive
    MAC address... D067. E595.0B1A
    Type of encapsulation... Ethernet
    IP MTU......................................... 1500
    Bandwidth...................................... 10000 Kbps
    Destination unreachable... Activated
    ICMP redirects... Activated

    that really interested me

    I simplified my config and merge the two portchannel.

    and it works.

    I'll come by later to STDs

  • How to view associated with an interface VLAN IP address?

    I have a 6224 with some VLANs set up. I have addresses assigned to most of VLANs (i.e. "configuration, interfaces, vlan 20, ip 192.168.20.254 address '). I can't seem to find a way to have the switch shows that vlan interfaces have this ip assigned, either the CLI or from the web interface. It does not help that I don't think that the web interface even exposes settings for this at all.

    Thank you

    Scott


  • Assign IP address to the Interface VLAN of Web Admin?

    It is a simple question, I can't find can in the web config page to assign an IP to an interface vlan.

    Example: I create a vlan 40 and assign ip 192.168.40.254/24 to it, I can accomplish this with the CLI with 'config; interface vlan 40; "192.168.40.254 IP address 255.255.255.0" but it does not seem to exist in the web interface!

    Thank you
    Scott


  • XConnect - interface vlan

    Hello

    I can create Tunnel Xconnect (OVER MPLS NETWORK) between the Vlan interface to the physical interface on the other site?

    For example:

    site 1:

    interface GigabitEthernet7/2.88
    Xconnect 1 Site Description
    encapsulation dot1Q 88
    XConnect 1.1.1.2 88 mpls encapsulation

    Site 2:

    interface Vlan 88

    Xconnect 2 Site Description
    IP 192.168.2.2 255.255.255.0

    XConnect 1.1.1.1 88 mpls encapsulation

    anyone tried this type of installation?

    Thank you

    Alon.

    Hello

    Yes. It will work.

  • X interface VLAN 4451

    I try to configure interfaces VLAN on a 4451 X and problem. I can configure subinterfaces, but I want to set up a real interface VLAN like this:

    B12_3925 (config) #int vlan 11
    * Jan 11 21:17:20: % LINEPROTO-5-UPDOWN: Line protocol on the Interface Vlan11, change of State down
    B12_3925(Config-if) #IP add 192.168.100.1 255.255.255.0

    Am I missing something? This should be very simple.

    Thank you

    Hello

    4451-X is a router, so, working with the VLAN is different to the switches. Creating a interface Vlan would make sense only if you had a switching module installed in this router and had some of its interfaces configured as switchports in the VLAN individual. Otherwise, the only way to work with the VLAN attached to interfaces routed to this router is to create some subinterfaces.

    Keep in mind: a router can have several routed interfaces and each of them can put an end to an independent set of VLANS. To a router, simply saying 'VLAN 11' doesn't mean anything, because this VLAN can be used on several routed ports and their subinterfaces. That's why the style interface Vlan is not used with routers without changing of modules installed because it is ambiguous.

    Welcome to ask for more!

    Best regards
    Peter

  • The interface VLAN ACL of inbound traffic?

    Hi, I may be over thinking this, but I have an ACL that is applied when entering an interface vlan. I have a line to allow udp any any newspaper which is temporary. I see hits, but the source ip address is outside the network to the ip address of the destination interface vlan. I expect to see ip source addresses only in the range of ip addresses of 192.168.1.128/25. What do you think? Thank you

    Interface vlan 100

    IP 192.168.1.132 255.255.255.128

    IP access-group ACL_IN in

    Hit of the ACL

    % S: SW1-6-IPACCESSLOGP: list of the allowed ACL_IN 192.168.6.100 (137) udp-> 192.168.1.132 (137), 1 packet

    Hello

    That looks like to me WINS navigation, a response packet.

    And as MS navigation works at level 2, it sends a response to the IP of the router where he sees demand for travel coming - maybe your customers have a configured WINS server address?

    Do not forget
    allow udp any any newspaper

    will match ANY ip src, not only your local subnet and is why your journal entries show the traffic in both directions.

    Rgds

    Ian

  • Interface VLAN traffic information

    Hi all

    Could someone please advice what traffic demonstrated Interface VLAN?

    For example, I have two interfaces, VLAN 10, and I created the layer 3 Interface VLAN 10.

    If I monitor the traffic of 10 to VLAN, the two interfaces combined traffic statistics?

    Thank you

    Prasanna Kumar deully

    Oh sorry I thought you meant span monitor where you register the interface traffic combined with the terms of a vlan

    To answer your question, it will display the number of ip layer 3 traffic in packets to all interfaces grouped under the vlan, then Yes, the two interfaces will show the interface of layer 3 vlan, some platforms will also show some L2 information like below and its shows 30 sec count on VLAN interfaces, but number five on the physical interface FA0/1

    Vlan149 is up, line protocol is up
    Material is EtherSVI, the address is 0008.e3ff.fd90 (bia 0008.e3ff.fd90)
    The Internet address is x.x.x.x/24
    MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
    reliability 255/255, txload 1/255, rxload 1/255
    Encapsulation ARPA, loopback not set
    KeepAlive not supported
    Type of the ARP: ARPA, ARP Timeout 04:00
    Last entry of 00:00:14, exit ever, blocking of output never
    Last clearing of "show interface" counters 24w4d
    Input queue: 0/75/0/0 (size/max/drops/dumps); Total output drops: 0
    Strategy of queues: fifo
    Output queue: 0/40 (size/max)
      30 second entry rate 2134000 bps, 381 packets/s
    exit rate of 30 seconds 2019000 bps, 460 packets/s
      L2 switching: ucast: 30595061 pkt, 2268569227 bytes - mcast: 0 pkt, 0 bytes
    L3 in Switched: ucast: 5882988002 pkt, 1908218042989 bytes - mcast: 1623 pkt, 775020 bytes
    L3 on Switched: ucast: 5579358870 pkt, 1872959920772 bytes - mcast: 322 pkt, 138259 bytes
    5886751734 packets input, 1885010127367 bytes, 0 no buffer
    Received 0 emissions (28 of IP multicasts)
    0 Runts, 0 giants, 0 shifters
    entry 0, 0 CRC errors, frame 0, saturation 0, 0 ignored
         5618600472 packets output, 1854023804196 bytes, 0 underruns
    0 output errors, 0 interface resets
    output buffer, the output buffers 0 permuted 0 failures

Maybe you are looking for

  • Problem screen on Satellite P500

    When I start my laptop I can´t nothing appears on my screen... I have to tilt the screen on 30 degrees.After a few minutes, I can open the full screen.

  • Problem DaqMx LabVIEW

    Hello: Installed Labview 2012 yesterday, daqmx was already installed (9,6) since I used it with Measurement Studio 2012. LabVIEW does not recognize DAQmx. I'm using Labview examples and get daq mx errors. Thank you.

  • Anti virus blackBerry smartphones

    Is there a good anti virus, I can download 4 my bb 8320?

  • Creative cloud downloaded the wrong version of Lightroom: How can I downgrade this version?

    Hello! I use an old MacBook Pro (mid 2010) with Mac OSX 10.8.5 and I found an update to Lightroom in the creative application of cloud. Then I started the installation. Unfortunately, LR won't start because it only works under OSX 10.9 and superior.

  • WebLogic server 12.11 is stuck in boot mode

    When I start the server Weblogic 12.11 stuck in START mode. I was working fine until I tried to deploy a WAR file. It never completed the deployment even after several minutes. Since then, whenever I type "startWebLogic.cmd' to cmd prompt, I get the