switchport vlan mapping

Someone is using this "switchport vlan mapping" in the subway of 3750?

Can I filter the VLAN I want q-in-q tunnel?

Such as specified has never had such a need to recommend this feature for our customers.

As you wanted that a pointer is - it possible I interpreted the feature for you, and how it works.

If you encounter any problem specific to these laboratory tests are expanding so we can help you. As this feature is supposed to work.

And not the 3750 support not Double tagged traffic you want to change the client VLAN using clustering, you can only change the Vlan externally. And you must keep the Vlan internal internal internal Vlan = external.

HTH-Cheers,

Swaroop

Tags: Cisco Support

Similar Questions

  • Wireless AP-H-Reap vlan mapping changes.

    Our wireless access point is AIR-CAP3502E-C-K9 with 5500 WLC. The problem is that H-REAP mapping VLAN the VLAn ID change abruptly and if I checl newspapers, I don't see any downtime on the AP. Please note that to happen randomly and sometimes AP all AP in certain offices. Can someone help me?

    HI Eric,.

    Which version of ios, you're running on WLCs?

    Please check these:https://supportforums.cisco.com/thread/2058870

    https://supportforums.Cisco.com/thread/2164452

    Concerning

    Remember messages useful rate.

  • 5324 disable vlan 1

    Hello

    I would like to disable the vlan 1. I read in the manual of the cli on command vlan by default disable. But in my 5324 is not so option.

    I've updated to the new firmware, but still do not have this command. This device recognizes this command?

    sw3g.sh(config-VLAN) #.
    run a command EXEC-level
    Output of finish mode
    output of the current context
    map of Protocol group ID card
    No Negate command
    VLANS, create a new VLAN
    sw3g.sh(config-VLAN) # show worm
    SW version 2.0.1.4 (date 1 August 2010 17:00:12)
    Start the version 1.0.2.02 (July 23, 2006 time 16:45:47)
    HW version 00.00.02
    sw3g.sh(config-VLAN) #.

    Thanks in advance

    It is not that you are removing the trunk VLAN1, or remove, but not included in the trunk.

    If you do something similar to this.

    console switchport mode trunk #.

    Console # switchport trunk vlan native 3

    console # permit trunk switchport vlan add 2

    Then, when you do #show vlan, it should show that VLAN1 has no port in there.

  • New VLAN (wait vlan1 - vlan native) created in 1142N AP does not work

    Hello

    We have put in place which is having vlan existing (100) in local network set in place and even vlan100 is founded in 1142 N but unfortunately I am not able to connect to the existing local-configuration network

    EQ.

    New SSID: Name: wireless

    VLAN 100:

    BVI interface: 10.10.100.2

    I have everything configured correctly in PA but I am not able to reach the default gateway which is router.

    I can't configure new VLANs map with the same ssid vlan?

    only the VLANs native will work fine...

    Light on this please...

    > The default gateway configuration is present on the AP?

    > Whats the switchport configuration? What trunk?

    See the race of the AP and then the switch port configuration, then the configuration of the router interface please

    You will wait for your update...

    Concerning

    Surendra

  • Networking Concepts advanced on Switch virtual: Vlan-association

    I have a network configuration problem, and I need to implement it on my virtual switch.

    I have Vlan Setup with a primary and the association vlan. The goal of this configuration is to isolate members vlan and to prohibit any communication between members of the same Vlan.

    The configuration is the following:

    VLAN 201

    name NewHostnig

    private - vlan primary school

    private - vlan association 202

    !

    VLAN 202

    name NewHostingIsolated

    !

    interface FastEthernet2/13

    FW description

    switchport access vlan 201

    switchport private - vlan mapping 201 202

    switchport mode private - vlan promiscuity

    events-the link status logging

    interface FastEthernet2/14

    Description Client_www

    Description access vlan 201

    organizing switchport private vlan Association 201 202

    switchport private - vlan mapping 201 202

    switchport mode private - vlan host

    events-the link status logging

    Can I set this up on my virtual switch?

    Thanks for your help

    Cisco PVLANS (Private VLANS) are not supported at the moment on ESX 3.5 vswitchs. Would be a nice feature, but we will have to wait and see

  • Reference Dell 6248P - VLANS, DHCP, wireless AP

    Hello

    I'm trying to set up a VIRTUAL LAN for wireless comments traffic go through our main switches and on an ADSL router but I'm running into some difficulties.

    We have 3 points of access for model AP - AC Unifi. Each access point has a connection of physical network of 1 of 4 Dell 6248 switches which are currently in a single stack managed as follows.

    AP 1-> Port of the Switch 1 40

    AP 2-> Port of the Switch 2 36

    AP 3-> Port of the Switch 3 17

    The managed pile and AP are currently using the 192.168.1.0/24 on VLAN 1 - default and I created a VLAN 10 - guest.

    The APs have two SSID WLAN, 'corporate', which is also on the 192.168.1.0/24 range and 'guest' that is located on 192.168.99.0/24. I put the "guest" to mark its traffic with VLAN 10 and no DHCP is defined.

    I put the 3 above general Mode ports, allowing all managers and VLAN - 1 that are not marked and VLAN - 10 they are labeled.

    I also put a Zyxell router with a static address of 192.168.99.254 in Switch 4 Port 24 and set to this mode of trunk to VLAN 10.

    The router is configured to provide DHCP for the beach of 192.168.99.0/24.

    Now when I connect a laptop to our 'coporate' WLAN, everything works fine. I get a DHCP address from our server and I can reach everything as usual.

    When I connect to the "guest" WLAN, I don't get a DHCP address. If I put a static address, I can't do a ping to the router.

    Could someone tell me if my configuration is correct?

    Thanks for the additional information and the display to the top of the config.

    A couple of things I noticed the config:

    -I don't see that whatever it is set to Switch 4 Port 24, which is the case the router Zyxell is plugged. If this port is not configured properly, it may not be able to see the communication on the VIRTUAL LAN. A config like this should work on Switch 4 Port 24.

    # interface ethernet 4/g24

    switchport mode access #.

    # switchport VLAN 10 acccess

    -You may need to configure a static route to highlight traffic VLAN to the router.

    # ip route 192.168.99.0 255.255.255.0 192.168.99.254

    I would like to know if any of this helps.

  • VLAN voice and data on a single port

    Hello

    I have some 5548 P Dell switches, but I just Cisco environment.

    I find a lot of information on this but most of it relevant to the VLAN marked and unmarked on a port in general. Some articles suggest to put the port in trunk mode...

    anyway (without taking into account the QoS) how you would accomplish this example Cisco on a Dell switch:

    Switch (config) #interface g0/1

    Switch(Config-if) #switchport mode access

    Switch(Config-if) #Switchport access vlan 50

    Switch(Config-if) #voice switchport vlan 10

    Thank you!

    For general mode, commands would be present as follows.

    Console (config) # interface gigabitethernet 0/1/1

    Console # switchport mode general

    Console # switchport general allowed vlan remove 10

    Console # switchport General allowed vlan add 2,3,4,50 tag

    Activate console # vlan VoIP

    Trunk mode:

    Console (config) # interface gigabitethernet 0/1/1

    Console # switchport mode Trunk

    Console # switchport Trunk allowed to remove vlan 10

    Console # switchport Trunk allowed vlan add 2,3,4,50

    Activate console # vlan VoIP

  • Need help to configure the VLAN on a powerconnect 5448

    Hello world

    I am currently working on 2 switches PowerConnect 5448 but I'm completely lost in configuring VLAN.

    My bow:

    My needs are:

    -J' have 2 different networks that need to be isolated in different VLANS

    -I want to port 11-14 to use for network backup, all others must be used for the production network.

    -This 2 networks must pass through the port 48 (fiber)

    How can I configure this kind of network on the powerconnect interface (or via telnet)?

    My understood are the following, I have to create 2 different VLAN tag all ports, switch to safe mode all ports of the entitlement each port to the VLAN voted. Am I wrong?

    How the fiber port?

    Thanks in advance for your help on this matter.

    Since your 2 VLAN need not communicate with each other, you should be able to get this working.

    The easiest way to do this would be to have your production on VLAN 1 and VLAN 2 second network.

    Assign an IP address to the switch with the command IP #.

    Assign a default gateway with the # ip default-gateway command.

    Create a VLAN 2:

    Database console (config) # vlan

    Console (config - vlan) # vlan 2

    Set 11-14 ports to access the mode for VLAN 2

    Console # switchport mode access

    Console # switchport access vlan 2

    Set 48 on trunk or general mode ports.

    Console # switchport mode Trunk

    console # permit trunk switchport vlan add 2

    You should get pretty close to a work environment. You may encounter some problem with VLAN 2 contacting 192.168.1.0, maybe just need to put it up and test.

    Here are a few links to software packages and manuals that can help.

    Firmware.

    http://Dell.to/1tz8tW0

    Manuals.

    http://Dell.to/1yqV4DJ

    Keep us on how will your configuration.

  • VLAN routing when you use a dell computer 6224

    Hello

    I have a dell switch 6224 with 2 VLANS.

    Management-192.168.1.111/24 Ports 1/g1-1 / g12

    Vlan150-192.168.150.111/24 Ports 1/g13-1 / g24

    I have two ports on the router with the ip address to communicate with the switch (192.168.1.2 and 192.168.150.2). Vlan1 works very well without any problems. I can ping from 192.168.150.2 to 192.168.150.111. I set up the laptop with the ip 192.168.150.113 and plugged in the Vlan150 on port 1/g19. I can not ping to 192.168.150.113 192.168.150.2. The traffic is not going through the Vlan150 in the switch.

    What Miss me? This is my first time setting up a VLAN on these switches. Help, please.

    Config

    console #show running-config

    ! Current configuration:

    ! Description of the system "PowerConnect 6224, 3.3.8.2, VxWorks 6.5.

    ! 3.3.8.2 system software version

    ! Passage mode is configured as disabled

    !

    Configure

    database of VLAN

    VLAN 150

    VLAN 150 1 routing

    subnet of VLAN association 192.168.150.0 255.255.255.0 150

    output

    battery

    1 1 member

    output

    192.168.1.111 IP address 255.255.255.0

    by default-gateway IP 192.168.1.2

    IP routing

    interface vlan 150

    name "VLAN150".

    Routing

    IP 192.168.150.111 255.255.255.0

    output

    level of 00436d6ae2ed27bbe87fa24b73b5a249 user name 'admin' password encrypted 15

    line of AAA authentication login "defaultList".

    the AAA authentication enable line 'enableList '.

    line console

    00436d6ae2ed27bbe87fa24b73b5a249 encrypted password

    output

    line telnet

    connection of authentication defaultList

    00436d6ae2ed27bbe87fa24b73b5a249 encrypted password

    output

    ssh line

    connection of authentication defaultList

    00436d6ae2ed27bbe87fa24b73b5a249 encrypted password

    output

    !

    interface ethernet 1/g1

    switchport mode general

    output

    !

    interface ethernet 1/g2

    switchport mode general

    output

    !

    interface ethernet 1/g3

    switchport mode general

    output

    !

    interface ethernet 1/g4

    switchport mode general

    output

    !

    interface ethernet 1/g5

    switchport mode general

    output

    !

    interface ethernet 1/g6

    switchport mode general

    output

    !

    interface ethernet 1/g7

    switchport mode general

    output

    !

    interface ethernet 1/g8

    switchport mode general

    output

    !

    interface ethernet 1/g9

    switchport mode general

    output

    !

    interface ethernet 1/g10

    switchport mode general

    output

    !

    interface ethernet 1/g11

    switchport mode general

    output

    !

    interface ethernet 1/g12

    switchport mode general

    output

    !

    interface ethernet 1/g13

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g14

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g15

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g16

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g17

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g18

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g19

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g20

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g21

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g22

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g23

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    !

    interface ethernet 1/g24

    switchport mode general

    VLAN allowed switchport General add 150

    switchport vlan allowed General remove 1

    output

    activate 00436d6ae2ed27bbe87fa24b73b5a249 encrypted password

    output

    Hello

    The laptop is probably sending unmarked packages and so you need to change the PVID on the interface so that the unmarked packages are assigned to 150 of VLAN.

    switchport General pvid 150

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-6248_Reference%20Guide_en-us.PDF page 600

  • Transit VLAN on the PowerConnect 6224

    I need help to sort out a problem with routing on a 6224 we have configured to act as a vlan transit for one of our branches.  The general idea is 8.143 is the vlan of transit, of 8.144 is our PC LAN 8.145 will be our VOIP lan.

    We have installed this switch with our WAN provided last week, but had to get out. Traffic seemed to happen to the WAN providers to our transit interface VLAN (172.22.143.254) wasn't going anywhere.  It's symptoms

    (1) we could ping from 172.22.144.x to 172.22.145.x and 172.22.143.x

    (2) we could ping from 172.22.145.x to 172.22.143.x and 172.22.144.x

    (3) we could ping from 172.22.143.x to 172.22.144.x and 172.22.145.x

    (4) if I was plugged into the 6224 on with an address 143.x I could ping our remote control does site at 172.22.8.x no problem but not 144.x or 145.x

    (5) 172.22.8.x, I couldn't ping 144.x or 145.x or 143.1 (I could ping 143.254 which is EXTENDED to suppliers to our switch network interface)

    Here's the running to the switch configuration.  Any suggestions would be greatly appreciated:

    Console > activate

    Console execution #show

    ! Current configuration:

    ! Description of the system "PowerConnect 6224, 3.3.6.4, VxWorks 6.5.

    ! 3.3.6.4 system software version

    ! Passage mode is configured as disabled

    !

    Configure

    database of VLAN

    VLAN 143-145

    VLAN routing 143 1

    VLAN routing 144 2

    VLAN routing 145 3

    subnet of VLAN association 172.22.143.0 255.255.255.0 143

    subnet of VLAN association 172.22.144.0 255.255.255.0 144

    subnet of VLAN association 172.22.145.0 255.255.255.0 145

    output

    battery

    1 1 member

    output

    DHCP IP address

    IP routing

    IP route 0.0.0.0 0.0.0.0 172.22.143.254

    interface vlan 143

    Name the "Transit".

    routing ip address 172.22.143.1 255.255.255.0

    output

    interface vlan 144

    name "TWLAN".

    routing ip address 172.22.144.1 255.255.255.0

    output

    interface vlan 145

    the name "VOIP" routing

    IP 172.22.145.1 255.255.255.0

    output

    level of 746f7a78621059d80fdc538acc40cbf2 user name 'admin' password encrypted 15

    !

    interface ethernet 1/g1

    switchport mode general

    VLAN allowed switchport General add 143

    output

    !

    interface ethernet 1/g2

    switchport mode general

    VLAN allowed switchport General add 143

    output

    !

    interface ethernet 1/g3

    switchport mode general

    VLAN allowed switchport General add 144

    output

    !

    interface ethernet 1/g4

    switchport mode general

    VLAN allowed switchport General add 144

    output

    !

    interface ethernet 1/g5

    switchport mode general

    VLAN allowed switchport General add 145

    output

    !

    interface ethernet 1/g6 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g7 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/8 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g9 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g10

    switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g11 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g12 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g13 switchport mode General General switchport vlan allowed output adds 145! General mode of interface ethernet 1/g14 switchport

    switchport general allowed vlan add exit 145! interface ethernet 1/g15 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g16 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g17 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g18 switchport mode General switchport General allowed vlan add 145

    output! interface ethernet 1/g19 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g20 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g21 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g22 switchport mode General switchport General allowed vlan add exit 145

    ! interface ethernet 1/g23 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g24 switchport mode General switchport General allowed vlan add to exit 145

    Console #.

    It seems that port 1 must be in the VLAN 143, not general mode access mode. You already have a static route in place on the PowerConnect switch which directs traffic to the next break in the network. But it may be necessary for a place on the Cisco that allows to direct traffic to the PowerConnect switch.

    Here is a good post to look through also.

    http://en.community.Dell.com/support-forums/network-switches/f/866/t/19506015.aspx

  • Creation of the VLAN between Powerconnect 5548 and F10 s4810...

    In the coming months we will replace our network equipment.  I was able to get their hands on the new gear at the beginning, and if I'm not traditionally a guy from the network, the project has been given to me and I started playing.  The first thing that I wanted to work on was implemented VLANs.  I have configured the switches like the picture below:

    When I have IP every PC connected to the same subnet and apply VLAN10 to their respective ports, they aren't to pings within the same stack or between cells.  My basic understanding is that they are, do they not?  Did I miss something in my understanding of VLANS or is there a problem with my configs?  I posted the configs below.

    RTTMOACCESS01 config:

    database of VLAN
    VLAN 10,20,30,40,50
    output
    Add a voice vlan Yes-table Nortel___ 000181
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table Shoretel___ 001049
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    VLAN voice Yes-table add 00907 Polycom/Veritel_phone___
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    860 port address 0.0.0.0 iSCSI target
    port 3260 address 0.0.0.0 iSCSI target
    port 9876 address 0.0.0.0 iSCSI target
    port 20002 address 0.0.0.0 iSCSI target
    20003 port address 0.0.0.0 iSCSI target
    port 25555 address 0.0.0.0 iSCSI target
    hostname rttmoaccess01
    no console logging
    privilege 15
    !
    interface vlan 10
    Name IT
    !
    interface vlan 20
    name UserPCs
    !
    interface vlan 30
    name UserTCs
    !
    interface vlan 40
    the voice name
    !
    interface vlan 50
    Name printers
    !
    gigabitethernet1/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet1/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    gigabitethernet2/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet2/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag

    !
    Default settings:
    Service etiquette: 76BYTS1
     
    SW version 4.1.0.8 (28 August 2012 time 11:17:36)
     
    Gigabit Ethernet ports
    =============================
    Speed 1000
    full duplex
    negotiation
    flow control
    Auto MDIX
    no back pressure
     
    interface vlan 1
    interface port-channel 1-32
     
    spanning tree
    spanning tree mode RSTP
     
    basis of QoS
    QoS trust cos
    Enable IAS

    RTTMOACCESS02 config:

    database of VLAN
    VLAN 10,20,30,40,50
    output
    Add a voice vlan Yes-table Nortel___ 000181
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table Shoretel___ 001049
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    VLAN voice Yes-table add 00907 Polycom/Veritel_phone___
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    860 port address 0.0.0.0 iSCSI target
    port 3260 address 0.0.0.0 iSCSI target
    port 9876 address 0.0.0.0 iSCSI target
    port 20002 address 0.0.0.0 iSCSI target
    20003 port address 0.0.0.0 iSCSI target
    port 25555 address 0.0.0.0 iSCSI target
    hostname rttmoaccess01
    no console logging
    privilege 15
    !
    interface vlan 10
    Name IT
    !
    interface vlan 20
    name UserPCs
    !
    interface vlan 30
    name UserTCs
    !
    interface vlan 40
    the voice name
    !
    interface vlan 50
    Name printers
    !
    gigabitethernet1/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet1/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    gigabitethernet2/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet2/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    Default settings:
    Service etiquette: 76BYTS1
     
    SW version 4.1.0.8 (28 August 2012 time 11:17:36)
     
    Gigabit Ethernet ports
    =============================
    Speed 1000
    full duplex
    negotiation
    flow control
    Auto MDIX
    no back pressure
     
    interface vlan 1
    interface port-channel 1-32
     
    spanning tree
    spanning tree mode RSTP
     
    basis of QoS
    QoS trust cos
    Enable IAS

    Config RTTMOCORE

    ! Version 8.3.12.0
    ! Last modification of the configuration to Fri Jun 14 13:31:58 2013 default
    ! Startup-config updated Fri Jun 14 13:32:40 2013 default
    !
    start the primary system battery-unit 0: A:
    start a system secondary battery-unit 0: B:
    start the system stack-unit 0 default: A:
    start the primary system battery-unit 1: A:
    start a system secondary battery-unit 1: B:
    start the system default stack-unit 1: A:
    !
    redundancy full automatic synchronization
    !
    Hardware watchdog
    !
    no console logging
    !
    hostname rttmocore
    !
    disposal of battery-unit 0 S4810
    !
    stack-unit 0 battery-group 14
    !
    stack-unit 0 battery-group 15
    !
    interface TenGigabitEthernet 0/46
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    interface TenGigabitEthernet 0/47
    no ip address
    switchport
    FlowControl rx tx off
    no downtime

    disposal of battery-unit 1 S4810
    !
    stack stack-unit 1-group 14
    !
    stack stack-unit 1-group 15
    !
    interface TenGigabitEthernet 1/46
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    interface TenGigabitEthernet 1/47
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    !
    interface Vlan 1
    !
    interface Vlan 10
    Description IT
    Name IT
    no ip address
    Tagged TenGigabitEthernet 0/46-47
    Tagged TenGigabitEthernet 1/46-47
    Shutdown
    !
    interface Vlan 20
    Description UserPCs
    name UserPCs
    no ip address
    Shutdown
    !
    interface Vlan 30
    Description UserTCs
    name UserTCs
    no ip address
    Shutdown
    !
    interface Vlan 40
    Speech description
    the voice name
    no ip address
    Shutdown
    !
    interface Vlan 50
    Printers description
    Name printers
    no ip address
    Shutdown
    !
    Lldp Protocol
    !
    0 line console
    line vty 0
    line vty 1
    line vty 2
    line vty 3
    line vty 4
    line vty 5
    line vty 6
    line vty 7
    line vty 8
    line vty 9
    !
    end

    I would say lets start with one side and obtain communication of work between the two computers on the same stack at RTTMOACCESS01. The port settings for the 1/01 and 2/01 look great both in access mode for VLAN 10. Which IP addresses and subnets you assign to computers?

    5548 to battery power battery connection 10 also appear to not be in a LAG, then we run two connections like that and they aren't in a SHIFT, we create a loop and a single connection will enter a blocking state.

    For the connections between the 5548 and force 10, I suggest to turn them into a GAP. The command should look like this.

    Console > activate

    Console # configure

    Console (config) # (config) # interface tengigabitethernet 1/0/1

    Console (config) # port - 1 automatic mode group

    output console #.

    Console (config) #.

    Do the same for Te2/0/1

    Then we set up this OFFSET to set it up, and I would try to use the trunk instead of general mode mode.

    Console (config) # interface port-channel 1

    console switchport mode trunk #.

    console # permit trunk switchport vlan add 10,20,30,40,50 tag

    The same should be done for the Force switch 10.

    Te0/46.1/46 in a SHIFT

    Te0/47.1/47 in another SHIFT

    Put in the trunk and let the VLANS on the trunk.

    Allows to study these settings and see if we can make any progress.

    Thank you

  • PowerConnect 5448 several VLANS between upstream and downstream server firewall

    I am struggling with what I thought, would be a simple task: route several subnets, each on one VLAN different, a firewall to a server.  In fact, I can't even pass the VLAN by default one still looking correct in the address tables and STP.

    Port 1 = firewall, VLAN 1 unidentified, 2 VLAN Tag, 1 PVID, tried the two trunk and general patterns

    17 = server NIC, VLAN 1 unidentified port, VLAN Tag, PVID 1 and 2 2, tried, tried both safe and general patterns

    VLAN 1 (firewall untagged) 10.84.195.0/24, 10.84.195.2 Interface IP and default gateway 10.84.195.1

    VLAN 2 (tag of firewall) 10.101.0.0/16, IP Interface 10.101.0.2 for 2 VLAN, firewall est.1

    The first thing I got was that something has not been properly marked by (Hyper-V, using SC VMM 2012 SP1) server or the firewall (Watchguard XTM 520).  Simple test: VPN Firewall, ping the switch to 10.101.0.2 with the tag, and works, remove the label and it doesn't.  Dynamic address table shows the two-way firewall.  Line 18 below appears right after the ping as planned on VLAN 2 with the same MAC address in VLAN 1.  In addition, I ping the switch 10.101.0.2 from the server and it works fine.  The table shows that VLAN 2 from the host (and 1 other VM), so it seems to me that everything is properly labeled.


     
    15 VLAN 1 00907f8f571b G1    
      16 VLAN 2 00155d1f1b07 G17    
      17 VLAN 2 001dd8b71c01 G17    
      18 VLAN 2 00907f8f571b G1    
     

    What I can't do, is ping through the switch to VLAN 2.  I can't ping my VPN server (10.101.20.1), and I can not ping to the gateway (10.101.0.1) from the server.  Note, it is not because of rules to firewall on each end.

    What Miss me?  I don't think I need a routing of layer 3 here, I don't have to go through VLAN, just have them several VLANS passes from one port to the other.

    Other things to note in case it is useful:

    -I have no connectivity not tag with everything else through the 10.84.195.xxx/24 switch.

    -If I delete the Tags VLAN port 2 1 trunk, I suddenly can ping the bridge VLAN 2 (10.101.0.1) from the server, although I suspect that it is because the same port is the default gateway for the switch.

    -For brevity, only 2 lines of the STP are listed below, but all ports are therefore based on the question of whether they are connected or not.

    G1 activated 128.1 Frw Desg P2P (STP) No. 4
    G2 activated 128.2 Dsbl Dsbl No. 100.

    -Latest firmware installed.

    -In addition, for people concerned about their security, I want to remove use VLAN by default in the future.

    Would it be possible for run you to stick your show output here in the forum.  In this way, we can take closer look at what you have configured.

    If you connect a desktop/laptop computer (with and intellectual property in the 10.101.0.0/16 range) in a port with the mode of access switchport VLAN 2 are you able to ping IP Interface 10.101.0.2 for 2 VLANS?  You could try to disconnect the firewall and the configurations for the port and work on getting through the switch with 2 terminals on a single VLAN.  Then, once this is confirmed as work connect the firewall back up with a trunk/general mode adding the VLAN necessary.

    You connect to the firewall on a layer 3 interface?  You need Layer 3 routing to reach the firewall correctly.

  • Assignment of VLANS by MAC address on a 6248

    Hello

    We have a mixture of 5548 and 6248 switch batteries, all updated to the latest fw, grouped on a 8024f.

    We add 560 Polycom phones to our network and want to assign phones to the voice VLAN and use the internal switch on the phone to the computer workstation.

    The 5548 have the handy table YES, the:

    VLAN voice Yes-table add 00907 Polycom/Veritel_phone___

    It works a treat and the assignment of VLANS for phone and PC works beautifully on the 5548.

    However, the 6248 legacy does not have this feature.

    Am I right assuming that we cannot assign addresses MAC Polycom-issued to one VLAN specific on switches 62XX as 55XX switches on? We are left with assigning simply labeled the voice VLAN? I'm afraid non-voix tag traffic for some applications will be treated badly as voice.

    What is the best way to do it? Here are the General config we will stop for the 6248:

    Configure
    database of VLAN
    VLAN 10 100

    interface vlan 10
    name "VoIP."
    output

    interface vlan 100
    name 'data network '.
    Routing
    IP 10.1.10.1 255.255.255.0
    output

    Example config for a switchport with Polycom and PC phone
    !
    interface ethernet 1/g1
    switchport mode general
    switchport General pvid 100
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 100
    switchport general allowed vlan add 10 tag
    switchport vlan allowed General remove 1
    output
    !

    The 6248 uses a Broadcom firmware and the 5548 uses a Marvell firmware, that's why we see the differences in the characteristics. The 6248 has no YES table as the 5548. Here is the basic configuration of VLAN voice on the 6248.

    1.

    To start creating a VLAN voice, create it first VLAN database mode for VLAN.

    Console # console (config) # vlan database console(config-vlan) # vlan 2 console (config - vlan) #exit console (config) #.

    2.

    Then, globally enable the Vlan voice.

    Console (config) # vlan VoIP

    3.

    In the configuration of interface for the desired port mode, assign it VLAN to the port using general mode. Then, assign it VLAN voice on the port with the command vlan vlan id #.

    Console (config) # interface console item in gi1/0/10 # switchport general console mode # vlan 2 voice

    There is also this white page that goes over the process.

    www.Dell.com/.../pwcnt_voice_VLAN_support.pdf

    A workstation sends no marked traffic, and will be placed on the general mode port PVID. In this case, it seems that your PVID is VLAN 100, therefore all workstation traffic will go to this VLAN. I'm not aware of a situation where the traffic of the workstation would be confused with traffic voice and placed on the VLAN incorrect, you have a specific situation / application where you think this can happen? I can do some research on this scenario to help alleviate any concerns.

    Thank you

  • Help design 6224 Vlan stack config

    Hi all

    I'm looking for help for what I feel should be a simple configuration.

    I have 2 6224 switches in what will be a stacked config.

    I need to put in place the following VLANs

    VLAN Database 5,6,7,8,9,90,100-254

    VLAN 6,7,8,9 should be isolated from each other.

    VLAN 100-254 should occupy 12 ports to resources shared between the two switches (6 per switch). 18-24 ports each switch.

    VLAN 100-254 should be able to communicate with vlan 5 via IP routing Vlan in the switch.

    Each of the VLAN 100-254 will have a 24 assigned ip subnet.

    I am new switches from Dell and I'm a little wrong with setting to the top of any help would be greatly appreciated.

    To create the VLAN on the 6224 orders will look like this.

    Console # config

    Console (config) # vlan database

    VLAN console(config-VLAN) # 2

    output console(config-VLAN) #.

    To place a port in an OFFSET, you use the channel-group command on ports you want in this SHIFT.

    The following example shows the 1/g5 port to the port-channel configuration

    Number 1 without LACP.

    Console (config) # interface ethernet 1/g5

    Console (Config-if-1/G5) # channel-group mode 1 on

    To allow multiple VLANs through a connection, you would use general/trunk switchport mode.

    Console (config) # interface ethernet 1/g5

    console switchport mode trunk #.

    console # permit trunk switchport vlan add 2,3,4 tag

    Console # end

    When you make the VLANs, they will inherently be not able to communicate with each other. So that they can communicate with each other VIRTUAL LAN routing must be enabled. Here are the basic commands needed for the VLAN routing to work.

    Console #config

    Console (config) #ip Routing

    Console (config) #interface vlan 2

    Console (config-if-vlan2) #routing

    Console (config-if-vlan2) #exit

    Console (config) #interface vlan 3

    Console (config-if-vlan3) #routing

    Console (config-if-vlan3) #exit

    Console (config) #interface vlan 4

    Console (config-if-vlan4) #routing

    Console (config-if-vlan4) #end

    If you have some VLANs, you do not want to communicate with any other VLAN, you should be able to do so by activating only not routing on VIRTUAL LAN.

    If access restrictions are to go beyond that, you may need to look at the implementation of the CAA.

    Here are a few blank pages that go on the use of ACLs and their implementation.

    www.Dell.com/.../pwcnt_IP_ACLs.pdf

    www.Dell.com/.../app_note_10.pdf

    www.Dell.com/.../app_note_3.pdf

    Hope some of this information help.

    Thank you.

  • Command switchport mode access

    Hello

    I was curious about the switchport mode access command and its interoperability with the switchport command in vlan voice.

    If I set up a switchport with the switchport mode access commmand, which will make it impossible for the switchport create a trunk special cases with the IP phone? Even if I set up switchport vlan speech?

    And if so, the port should be configured as switchport mode dynamic auto? Or desirable?

    Thank you, Pat

    Pat, you can configure a port as an access port, add the configuration of vlan voice and connect a phone and another device. The trunk will form. With the "vlan voice" Cisco obscures the fact that forms a trunk. I don't necessarily agree with this strategy, and it wasn't always in this way. I remember configuration of phones on a 3500XL and ports have been configured in trunks.

    You made me think, so I issued a few commands on a WS-C3560V2-48PS-S running IOS 12.2 (58) SE2 who has 12 phones connected on it.

    Here is the config for a port that has a connected phone:

    Switch #sho int f0/2nd round

    Building configuration...

    Current configuration: 475 bytes

    !

    interface FastEthernet0/2

    switchport access vlan 11

    switchport trunk encapsulation dot1q

    switchport trunk vlan 11 native

    switchport trunk allowed vlan 2, 10-19

    switchport mode access

    switchport nonegotiate

    switchport voice vlan 12

    SRR-queue bandwidth share 1 30 35 5

    priority queue

    MLS qos trust device cisco-phone

    MLS qos trust cos

    Auto qos voip cisco-phone

    No auto mdix

    spanning tree portfast

    service-policy input AUTOQOS-SRND4-CISCOPHONE-POLICY

    end

    If I show the status of the trunk for an individual port that IOS recognizes that the port with the attached telephone is actually a trunk:

    Switch #sho int f0/2 trunk

    VLAN Mode Encapsulation native port State

    FA0/2 off 802. 1 q non-gaine 11

    Port VLAN allowed on trunk

    FA0/2, 11-12

    Port VLAN authorized and active in the field of management

    FA0/2, 11-12

    VLAN port extending on transmission State and no tree pruned

    FA0/2, 11-12

    However if I do a "sho int trunk" to display all the ports on the switch IOS trunk does not include telephone ports in the output.

    Trunk switch #sho int

    VLAN Mode Encapsulation native port State

    FA0/45 on 802. 1 q 12 trunking

    FA0/46 / 802. 1 q 12 trunking

    Gi0/1 on 802. 1 q sheath 11

    Gi0/2 of 802. 1 q sheath 11

    Port VLAN allowed on trunk

    FA0/45 2: 10-19

    FA0/46 2: 10-19

    Gi0/1, 2, 10-19

    Gi0/2, 2, 10-19

    Port VLAN authorized and active in the field of management

    FA0/45 13, 16-2, 11-17

    FA0/46 13, 16-2, 11-17

    Gi0/1, 2, 11-13, 16-17

    Gi0/2 13, 16-2, 11-17

    VLAN port extending on transmission State and no tree pruned

    FA0/45 13, 16-2, 11-17

    FA0/46 13, 16-2, 11-17

    Gi0/1, 2, 11-13, 16-17

    Gi0/2 13, 16-2, 11-17

    So firstly IOS says "Yes, it is a trunk" and on the other hand it is said ' Nope, no trunks here! So notice that 'spanning-tree portfast' is configured on f0/2, no 'portfast spanning-tree trunk. PortFast is still active on this port.

    Switch #sho span int f0/2 selection

    VLAN0011 enabled

    VLAN0012 enabled

    Conversely on 45 port, we have a VG-224 connected and it is configured with "switchport mode trunk" and "trunk spanning-tree portfast '. If I change than just "spanning-tree portfast' we see this:

    Switch #sho span int f0/45 selection

    VLAN0002 disabled

    VLAN0011 disabled

    VLAN0012 disabled

    VLAN0013 disabled

    VLAN0016 disabled

    VLAN0017 disabled

    Cisco has confused the issue here. I would prefer if we called a trunk, a trunk, but for some reason, they do not.

    See you soon,.

    -Jeff

    ---

    Posted by Jeff Davis of the Cisco support community App WebUser

Maybe you are looking for

  • will come immediately or tun off

    I started my MacBook, and he is stuck with just the background showing the circle of rotation. It turn off not to be. Help! Thank you, Shirley

  • Some sites appear very close results, strung out bottom of the page about 4 inches wide

    On MSN Money, when I browse to various articles, they are not normally. The page I click on what is displayed on the three pages to the bottom of the screen and shown strung out on the left border about 4 inches of width, instead of display as a norm

  • Current version of the CLIQ XT software

    My cliq XT software version is 1.32.24 which is the latest version? I'm not able to download anything out of the android market. Should not be version 1.5? When I go to see if my software needs to be updated on my phone, it says that no update... don

  • Impossible to get rid of a file folder

    I tried all the stuff I could think of, including safe mode, in order to delete a folder of files from my T61p (Windows Vista Home Premium) without success. I have powers of the administrator, but they seem not to be good enough for this particular u

  • Send desktop shortcuts to the Favorites folder in vista

    original title: send to option in vista How can I send shortcuts on my desktop to Favorites folder. I could do this very easily by clicking and using XP "send to" and then office. Vista does not allow me to do. Am I missing something? Thank you