Switch proCurve 2626 (J4900B) - supported VLAN?

Hello!

I tried to Setup VLAN because I really need this feature, but I encountered a problem.

My current setup:

I had 2 switches that are connected via an optical cable.

My question is how to install ports than Let's say 10 to 15 are on the same thing but separated on the two switches network?

So that DHCP which is on 10-15 does not give the addresses to other ports?

and devices on 10-15 on one and 10 to 15 other Switch are the?

Thank you!

Hello:

I suggest that also post your question in the Forum of HP Business - section Procurve switches Support.

http://h30499.www3.HP.com/T5/ProCurve-provision-based/BD-p/switching-e-series-Forum

Tags: Notebooks

Similar Questions

  • The switch SLM224G does support VLAN per port?

    I'm looking for a simple solution create two LAN. One for my own and the other for my clients, who will be able to use the desktop computer with internet access. I only have one internet connection (ADSL over ISDN) and wil not get another just for my clients.

    My own network should not be accessible or visible to users who use the PC clients. The other way around is authorized, but not really necessary. My setup requires me to connect to the switch to the (ISP) router, and the router has a LAN port not able to do anything related to VIRTUAL networks.

    I read on the VLAN port to put here, where it is stated that creating separate LAN is just the ports in VLANS on the switch, nothing else to do... However, they used a NetGear smart switch.

    I checked SLM224G of Cisco because it is affordable, has 24 ports (instead of 8 for the NetGear) and must support of VLAN. I read a lot about VIRTUAL networks, including:

    «- Means the VLAN per port that you can reconfigure the ports to be in different VLANS.» VLAN per port does not confirm the 802. 1 q supported VLANS.

    -802. 1 q VLAN means you can mark the VLANS with 802. 1 q headers to create a trunk between two devices carrying frames for several VLAN. 802 1 q VLAN confirms that there are also supported VLAN per Port. »

    I knew by the sheets that the SLM224G supports 802. 1 q (tagged) trunking. So it should be, given the text above, also supports VLAN per port.

    My question is if it indeed will support VLAN per port?

    I am able to use it directly behind the router of my ISP and create two separate LAN?

    If so, a supplementary question: how are the PC behind the switch (inside the two VLAN) removes the ISP router IP addresses? It will serve only of the two LAN or do I have to install a DHCP server in the other LAN?

    Any information is welcome!

    Thank you.

    Mr. Bertrand,


    I read what you posted and I don't think the slm224g will do what your configuration you want to.  The reason behind all this, if you have installed 2 VLAN you will need 2 gateways for each network.  Since then just the ISP router and a network.  I'd get a router capable of VLANs and plug it into the router of the Internet service provider and then you can have up to 4 networks behind your router.  The rvs4000 is a router excellent gigabits, which supports up to 4 VLANS.  So if you need additional ports, you can get unmanaged switches and plug it into the router for added ports.

  • HELP: What router supports VLAN? -I wish both groups cannot communicate with each other.

    Hi all

    I have 5 wireless devices must connect to the router.

    I want to divide it into 2 groups:

    That is to say, 1, device A, B, C, group 2, device D, E.

    I would like two groups cannot communicate with each other.

    I've heard, it can be done by VLAN, is e2500 can adapt to what I need?

    What about EA3500 and EA4500?

    I use G wireless, is what it means that ea4500 is out of choice even if it supports VLAN?

    Thank you all!

    Evil

    Thanks for the clarification for the OP

    FWIW

    is this an alternative to routers that do not support of VLAN, to do what you want

    http://www.SmallNetBuilder.com/lanwan/lanwan-HOWTO/32486-how-to-segment-a-small-LAN-using-tagged-VLA...

  • RV Support VLAN Tagging on WAN Port?

    Hello

    I would like to know if RV Series Router can support VLAN tagging on the port WAN himself? I need this cause my ISP using these methods to connect to the router/modem to the end user.

    Thank you.

    -----

    Kind regards

    Danny

    Please visit RV315W.

  • RV082 SB + switches with functionality of tag vlan

    Hi guys,.

    I have a small laboratory data center at home, with 1 Server iSCSI and VMware ESXi 5.1 3 guests. I run a few linux servers and windows servers.

    And a couple of years ago I bought a Cisco SB double RV082 VPN router and a Netgear smart switch in order to have more segmentantion and management on my network and the virtual machines. I was really happy with the Cisco router, because of stability and functionality.

    But after a while, I wanted to learn VLANS and vlan tagging and discovered that I wanted to create interfaces for the different VLANs. I installed the firewall open source pfSense, in order to create these VLANS with tagging of the firewall and on switches/esxi hosts. The pfSense has been installed in a virtual machine on one of the hosts vSphere, and which has become a headache if something happened to the host. So I decided to go back to the Cisco SB RV082.

    So here's my question:

    Is it possible to still have all these VLANS that I created on the switches and ESXi hosts when I swap to the Cisco router? Even if the Cisco support only port service VLAN, this shouldn't be a problem? Because of the Multiple subnet feature? These VLANs will have access to the Internet and does not have access to another. Only the primary network management network should have access to the VLAN.

    Let's say my primary network is 192.168.1.X and I have 5 VLAN with IP 192.168.2.X,... 3.X... 4.X etc. To be able to use these VLANs on all devices, do I need to assign each VLAN on the Cisco to a specific port? Which means I'll have 5 Cisco cables to the switch?

    I'll probably have a DC with DHCP and DNS on a few of VLANS I create. If DHCP for the different VLANs will be created like that and won't have the firewall (which RV082 can't stand?)

    In my head, this logical text/topic. But I'm not quite sure if you guys understand what I'm saying or want to accomplish here. So please don't not to ask :-)

    Thanks in advance.

    Hi Ruben, this router supports the only port VLAN basis. It does not support any tag VLAN (802. 1 (q). This is reflected by in, VLAN does not matter them, only the subnets.

    If you need the subnets to communicate through the router, you can activate the functionality of multiple subnet.

    If you want to limit disclosure of the host, you can try to establish access rules to limit communication subnet.

    -Tom
    Please mark replied messages useful

  • Connect 2 switches SG200-26 with two VLANS separated

    B "H".

    Well, I'm going to cry uncle and ask the community of cisco to help here... Here's what I'm trying to accomplish.  I have two cabinets in a data center with four available cross connect cables.  I want to put in place two discrepancies between the two switches which will each be a vlan through to the other.   My vlan by default contains all my servers on it (10.0.0.0/8) and my backup vlan (192.168.200.0/24) will only be used for data backups and iscsi traffic.  For the moment, I have a cable connecting the two switches and it works very well for the vlan by default.  When I add a second cable and set it on vlan 200, no matter what I try settings it just does not pass traffic.  I'm sure I'm doing something wrong, stupidly, but well, I never claimed to be a networking expert, that's why I'm here asking for help!

    I have made several attempts to get the second connection works, marked, unmarked, trunk, access, etc.  Can someone be tell me is this the real solution, or point me to the documentation, so I can solve this problem?

    Thanks in advance!

    Hello Yitz'har,

    SG 200 switch does not support EMU, PVST and PVST +. None of the products of small businesses currently support any proprietary protocol which is not IEEE or equivalent. The exception to this idea is COP which was added about 18 months in the LWA 1.1 releases to better integrate voice, onplus solutions and interact with business networks.

    Work that we discussed yetserday in your case is to disable the covering tree generally define the bpdu filtering.

  • If cisco switch WS-C2950G-12 supports the configuration of MAb

    Hi all

    My switch is c2950 and I've been trying for a MAb authentication using ACS. Please let me know will this switch supports and if not is there any way how to use this switch for the authentication of MAb.

    System image file is flash:/c2950-i6q4l2-mz.121-22.EA1b.bin «»

    Cisco WS-C2950G-12-EI (RC32300) Prozesseur (revision L0) 2.

    Please tell em orders that must be configured for the authentication of the MAB.

    Hello

    WS-C2950G-12 switch is not supported MAB.

    Below is a generic deployment guide fo MAB:

    http://preview.cisco.com/en/US/docs/solutions/Enterprise/Campus/IBD/MACAuthB.html.

    The basic MAB commands are:

    interface FastEthernet0/1
     switchport access vlan 2
     switchport mode access
     dot1x mac-auth-bypass
     dot1x pae authenticator
     dot1x port-control auto
     spanning-tree portfast
     spanning-tree bpduguard enable

    HTH,
    Tiago

    --

    If this helps you or answers to your question if it you please mark it as 'responded' or write it down, if other users can easily find it.

  • Supported VLAN ID-4250 or IDS-4250XL?

    Hello

    I was reviewing for the purchase of an IDS solution. One of the major concerns I have is the ability to monitor several local networks VIRTUAL (Interfaces) and flow.

    I was looking through the IDS-4250 and IDS-4250XL specifications. the XL version has an output more than 4250. What got me confused, is that the XL version takes only an additional interface (1000Base-SX) while the standard version gives you the ability to both 1000Base-SX and 4port FE.

    Now, my question is, is it possible on the 2 special devices to configure the interface of surveillance to monitor multiple VIRTUAL local networks (with the help of a trunk), if all them VLANS are connected on a Switch? Unfortunately buying an IDS module for 6500 is out of the question since no available 6500 switch is currently available.

    The IDS-4250-TX-K9 (aka IDS-4250) is the basic frame which can be added a single PCI card (IDS-XL-INT =, IDS-4250-SX-INT =, IDS-4FE-INT =).

    If the IDS-XL-INT = (aka card XL) is added to the IDS 4250 sensor would then become an IDS-4250-XL-K9 (aka IDS-4250-XL).

    NOTE: The ID-4250-XL is not a chassis separated from the base, it is the same ID-4250-TX-K9 with the IDS-XL-INT = already installed by manufacturing.

    The XL card has 2 interfaces Gig of fiber with MTRJ fiber optic in SX type connectors.

    Map XL adds hardware acceleration to 2 interfaces Gig fiber (increases performance of 1 GB of capacity of monitoring).

    However, there is a limitation which, with interfaces to fiber XL only 2 XL adapter card can be used for monitoring.

    If the ID-4250-SX-INT = (aka card SX) is added to the IDS 4250 sensor would then become an IDS-4250-SX-K9 (aka IDS-4250-SX).

    The SX card has a single fiber interface Gig with SC connector for the SX interface.

    With the IDS 4250 SX users can sniff both interface SX of the card as well as the interface of TX Gig sniff on Board standard, which gives a total of 2 interfaces to sniff.

    If the ID-4FE-INT = (aka 4FE card) is added to the IDS 4250 then it was not a name of created specific sensor (although I usually call a 4FE-4250-IDS)

    The 4FE card has a 10/100 4 TX interfaces

    With the IDS-4250 so that a map 4FE, that user can sniff the two interfaces TX 4 10/100 card as well as the interface of TX Gig sniff standard onboard which gives a total of 5 sniffing interfaces.

    NOTE: ONE of the 3 PCI cards can be placed in the ID-4250. The IDS 4250 has 2 PCI slots, BUT Cisco CAN'T stand that place a card in ONE of the 2 slots. If users cannot set 2 cards XL or 2 cards SX, or 2 cards 4FE, a mixture of 2 different types of cards. (This may change in a future release).

    If a breakdown quick of what I said:

    ID-4250-TX-K9:

    1 gig TX interface

    500 Mbps performance

    IDS-4250-TX-K9 + ID - 4FE - INT =:

    1 TX interface + 4 gig interfaces FE TX

    500 Mbps performance

    IDS-4250-TX-K9 ID - 4250 - SX - INT PLUS:

    (ID-4250-SX-K9)

    1 gig TX + 1 Gig SX interface (SC connector) interface

    500 Mbps performance

    IDS-4250-TX-K9 + IDS-XL-INT: =

    (ID-4250-XL-K9)

    2 interfaces gig SX with hardware acceleration (MTRJ connectors)

    1 Gbps performance

    NOTE: Performance is not a port, but it is rather total performance of the chassis when the combination to pronounce on all ports to sniff.

    As for the question on the circuits.

    ID software supports 802. 1 q trunk monitoring on ALL interfaces. You don't have to worry about buying a particular sensor for links model.

    You must determine your model of sensor (and additional PCI card) performance-based physical connection and sensor required:

    How to:

    On the switch itself hard code the port as a 802. 1 q trunk port and force the sheath to be turned on. (This must be hardcoded on the switch because there is no trading e-mail with the sensor).

    In the BONE of CAT on the 6500 switch, an example would be:

    define trunk 6/1 on dot1q

    Now set up the trunk single trunk port them VLAN you are interested the surveillance.

    In the BONE of CAT on the 6500 switch, an example would be:

    set of 6/1 master 1-100

    Disable the trunk 6/1 101-1005, 1025-4094

    Now, you need to use SPAN or capture VACL to send packets on the trunk port.

    In the BONE of CAT on the 6500 switch, an example would be:

    set of spans 1-100 6/1

    NOTE: Configure the port as a trunk port is not enough to get the packets sent to the sensor. You must always use SPAN or capture VACL on top of the trunk port to get the packages at the monitoring sensor.

    If you do not the 6500 then, of course, the controls on your switch may be different. And in some cases the above commands can be gathered in a single command on your switch so see your switch documentation' are.

  • iSCSI selection Switch - Procurve 1400?

    http://www.ProCurve.com/products/switches/HP_ProCurve_Switch_1400_Series/overview.htm

    I'm looking for something beyond the frames of an isolated iSCSI network?

    You searched for Jumbo and Flowcontrol

    Historically, HP ProCurve had both Jumbo and Flow Control features, but he was not supported to have BOTH running at the same time due to lack of resources.

    I'd be really careful and do not forget to check with HP before making the purchase indeed have two functions AND can have both active.

    ##If you found my post answered your question or helpful please mark it as such.

  • Support vlan missing R6250

    Hi guys,.

    Are there any chance to get r6250 to support the vlan in update close?

    The specifications of this router is excellent, good speed - memory support for usb 3.0 everything is cool. But I miss a lot of support of vlan.

    My fiber optics connection request 10 for ppoe and vlan VLAN 20 for iptv.

    Already tried fw custom (like dd - wrt and tomato that adds vlan) but the performance is not good as the original (usb share and other things) and wifi speed is far away...

    BTW, the source code for the firmware is offline or not available.

    Please add support for vlan ASAP (r6250, v6300 v1 and v2) are missing.

    To date, group VLAN / bridge is now supported on the latest firmware of the R6250.

    Here is the link to the release notes.

  • HP Procurve configuration 2928 and VLAN

    Hi all

    We configure two VLANS on the switch, but we do not have any router to connect these two networks.

    The network address range VLAN (id 972) first is 192.168.1.0 (computer admin)

    And the second (id 100) VIRTUAL LAN 192.168.2.0 (VmWare management network)

    Using a mask of 255.255.252.0 these two networks can communicate if they are on the same local network.

    So we can use a cable between a port of each VIRTUAL LAN to connect VLAN 100 id with the id of the VLAN 972 on the same switch?

    And how to configure these ports?

    Thanks for your help

    Nicolas

    Hello

    Thks for this response.
    I found a solution by using switches VLAN Interfaces as a router.

    Nicolas

  • activate the command on router

    Hi all

    I can not create interface Vlan on my new Cisco1941 router if I understand well for switching this feature should help, but I don't really know how

    my router has built in ipbasek9 and with securityk9 license key and I think now not allowed need extra required for the functionality of switch please help me this

    As already mentioned by Gpauwen, unless there is a switching module installed in the router, the router is not by default supports "switching."

    However, perhaps it will support (L2) connection between its routed ports.

    In addition, if you have a switch to connect to the router, a routed port can be configured with subinterfaces that work with trunk of a switch port (i.e. supporting VLAN multiple interfaces).

  • Cisco asa active multiple interfaces on a single switch without configuration of vlan switch.

    I was wondering if there is a work around on cisco asa to have 2 interfaces vlan on a switch. The reason I ask I have a cisco asa 5505 and a dell switch that does not support the configuration of VLANs. I set up 2 interface vlan on a cisco asa and when two interfaces are active my internet drops frequently. I was wondering if there is nothing to configure the asa cisco to make this thing work. Thanks in advance...

    Assuming that Dell switch at least linking several interfaces of the ASA to the Dell should translate all media spanning tree protocols, but a bet covering the tree blocking State to avoid a tree covering loop.

    If the Dell does not support tree covering weight then you would be in very bad shape each broadcast packet would be will loop indefinitely and cause what we call a 'broadcast storm. "

    One way is not good and the other real harm.

  • Several VLANS and DHCP relay on two stacked switch SGE2000-G5

    We were put to the task of securing a small desktop system managed that is currently set up with a standard switch for each of the offices (with different companies) to see each other and in some cases, access to each of the other documents on the network.

    Obviously, this is far from adequate set up and our goal is to isolate each office using VIRTUAL networks, but share a common internet connection provided by managed offices.  We have two switches for layer 3 Cisco SGE2000-G5, but we are new on Cisco equipment and VLAN, so we are not quite sure on how to implement this.  DHCP must be provided by a router, there is no server.  We are open to suggestions on the router as we still buy a.

    I hope that someone may be useful.

    Thank you very much

    Jim

    Hi Jim,.

    SGE2000 switches you are using must be able to handle this without issue. What type of router you are using? As long as you have a router that will take in charge VLAN / several subnets, it should be a simple configuration.

    Here's a quick run down of the measures to be implemented. (using vlan1 and vlan2)

    On the router, create a vlan / subnet 2 and set the port to connect to your shared resources with the two VLAN 1 and 2 switch. (it will be untagged, two will be marked)

    On the switch, create vlan2 and do the same for the port connected to the router. (vlan1 marked and tagged vlan2)

    Now for each switch port that you want to assign the port access and vlan1 and vlan2. (this vlan will be without a label)

    If your router allows, disable routing inter - vlan. If this isn't the case, you must create rules to block traffic from one network to the other.

    All this happens under the assumption that your router can support VLAN and can also make DHCP for this VLAN.

    Hope this information helps

  • Networking Concepts advanced on Switch virtual: Vlan-association

    I have a network configuration problem, and I need to implement it on my virtual switch.

    I have Vlan Setup with a primary and the association vlan. The goal of this configuration is to isolate members vlan and to prohibit any communication between members of the same Vlan.

    The configuration is the following:

    VLAN 201

    name NewHostnig

    private - vlan primary school

    private - vlan association 202

    !

    VLAN 202

    name NewHostingIsolated

    !

    interface FastEthernet2/13

    FW description

    switchport access vlan 201

    switchport private - vlan mapping 201 202

    switchport mode private - vlan promiscuity

    events-the link status logging

    interface FastEthernet2/14

    Description Client_www

    Description access vlan 201

    organizing switchport private vlan Association 201 202

    switchport private - vlan mapping 201 202

    switchport mode private - vlan host

    events-the link status logging

    Can I set this up on my virtual switch?

    Thanks for your help

    Cisco PVLANS (Private VLANS) are not supported at the moment on ESX 3.5 vswitchs. Would be a nice feature, but we will have to wait and see

Maybe you are looking for