VLAN Tag vlan vs unidentified

I am running Dell Power Connect 5548 and 5524 in an arrangement of battery on 3 floors.

I have a question on the Middle floor by which DHCP addresses are not to be issued to clients in vlan 90

See below

GFLOOR

interface gigabitethernet1/0/48
channel-group mode 1 on
switchport mode general
switchport general allowed vlan add 40,50,70,80,90 tag
VLAN allowed switchport General add 1 unidentified

interface gigabitethernet2/0/48
channel-group mode 1 on
switchport mode general
switchport general allowed vlan add 40,50,70,80,90 tag
VLAN allowed switchport General add 1 unidentified
!
Interface Port - Channel 1
Description LAG_TO_TOP_FLOOR
switchport mode general
switchport general allowed vlan add 40,50,70,80,90 tag
VLAN allowed switchport General add 1 unidentified

1FLOOR

interface gigabitethernet1/0/48
channel-group mode 1 on
switchport mode general
switchport general allowed vlan add 40,50,70,80 tag
VLAN allowed switchport General add 1.90 untagged

interface gigabitethernet2/0/48
channel-group mode 1 on
switchport mode general
switchport general allowed vlan add 40,50,70,80 tag
VLAN allowed switchport General add 1.90 untagged

interface gigabitethernet3/0/24
switchport access vlan 50
Interface Port - Channel 1
Description LAG_TO_TOP_FLOOR
switchport mode general
switchport general allowed vlan add 40,50,70,80 tag
VLAN allowed switchport General add 1.90 untagged

I just need to tap 1Floor interfaces or should I take 90 off unmarked first, then add to marked subsequently

switchport mode general
switchport general allowed vlan add 40,50,70,80,90 tag
VLAN allowed switchport General add 1 unidentified

Thank you

ANDY

If that's the difference and the other works and the other is not then I suggest matching the configs on the floors.

Is there a reason why, the floors are set up differently?

Tags: Dell Switches

Similar Questions

  • Having trouble getting the voice VLAN on the switch X1052P to work at all

    Can someone help me understand how to set up the voice VLAN X1052P? I spent several hours trying to get this working and it does not work. I spent about 4 hours on the phone with a Dell technician that night and he couldn't get it to work and finally gave up. He told me that I had to spend my warranty to ProSupport because he did not know how to solve the problem. What group of *. It's a simple configuration of VLAN. What must be so picky about? In any case...

    Setting up the VIRTUAL LAN must be fairly simple, but apparently on this switch is not. The user guide page 406 is not very useful except explaining what the different options. I must admit I am not an expert VLAN so I dunno I've misconfigured something. But remember, Dell technology could not operate either.

    Here's my situation... I have VoIP phones on my network connected to a network wall jack. Connected to phones are my computers of users. The computer of the user and its respective VoIP phone, both share the same data cable. Before replacing Cisco managed Internet service provider spend all it worked well. The problem is that they had direct access to our network so I removed the switch and installed the X1052P in its place. I talked to the ISP to let them know what I'm doing and they said everything I had to do was setup VLAN ID: 15 for the voice VLAN because this is the VLAN ID that the router uses to route telephone traffic. Router PSI is also the server DHCP VLAN 15 and issues IP for phones using 172.27.0.0/24 with a DHCP 172.27.0.50 range - 150.

    I tried to configure the switch using parameters of VLAN static and settings VLAN voice and neither one also seems to do what I want it to do.

    Network administration > VLAN > VLAN static

    Network administration > VLAN > Voice VLAN

    I activated the profile 'phone' on ports I want to added to the voice VLAN and it does not work. Moreover, 47 the switch port is connected directly to the ISP router and is configured as a trunk with the default port VLAN 1 unidentified and tag VLAN 15. For other ports I tried the general implementation, access and trunk of the parameters on each port to see if I could get something going and still nothing happens. When I set up the ports as General ports VLAN, I made adding VLAN VLAN 1 and VLAN 15 as a VLAN tagged not marked. It still does not.

    This is the short story from where I am now. Any help is greatly appreciated.

    FYI, as a follow up I finally solved the problem. I hope this information helps someone else that can encounter the same problem.

    After buying the ProSupport warranty upgrade ($121 out-of-Pocket mind you) and addressing a total of 4 technicians ProSupport expert technician a 3rd another level (only available via chat message between one of the ProSupport phone technicians and the 3rd Tier expert tech - i.e. I couldn't talk or chat with this person me) the consensus was that the material must be bad. When I bought the X1052P I bought two of them, so the best way to know if it was a bad switch was simply configure the other switch and see if the behavior occurs on this one, too. Well, this switch also restarted each time I assigned the profile 'phone' to more than 13 or 14 ports in the switch. It seems that it was not a hardware problem after all.

    I went back to the switch original and tried new things hoping that I could fall on a solution and it turns out that the solution was NOT to use the voice VLAN on the switch. It does not work!

    SOLUTION: I set the VLAN ID: 15 manually and no has not assigned any phone profiles to one of the ports. This is how I solved the problem.

    So he has bad software on the switch. I tried to see if there are updates of the firmware on the Dell support site, but there is none. Configure manually the phone VLAN was the solution. What a freaking nightmare which turned out to be. Maybe someone in Dell could note this problem and test in-house. And, if you want to compensate me for the 20 + hours I spent working on this problem, which has be great, too.

  • PowerConnect 5448 several VLANS between upstream and downstream server firewall

    I am struggling with what I thought, would be a simple task: route several subnets, each on one VLAN different, a firewall to a server.  In fact, I can't even pass the VLAN by default one still looking correct in the address tables and STP.

    Port 1 = firewall, VLAN 1 unidentified, 2 VLAN Tag, 1 PVID, tried the two trunk and general patterns

    17 = server NIC, VLAN 1 unidentified port, VLAN Tag, PVID 1 and 2 2, tried, tried both safe and general patterns

    VLAN 1 (firewall untagged) 10.84.195.0/24, 10.84.195.2 Interface IP and default gateway 10.84.195.1

    VLAN 2 (tag of firewall) 10.101.0.0/16, IP Interface 10.101.0.2 for 2 VLAN, firewall est.1

    The first thing I got was that something has not been properly marked by (Hyper-V, using SC VMM 2012 SP1) server or the firewall (Watchguard XTM 520).  Simple test: VPN Firewall, ping the switch to 10.101.0.2 with the tag, and works, remove the label and it doesn't.  Dynamic address table shows the two-way firewall.  Line 18 below appears right after the ping as planned on VLAN 2 with the same MAC address in VLAN 1.  In addition, I ping the switch 10.101.0.2 from the server and it works fine.  The table shows that VLAN 2 from the host (and 1 other VM), so it seems to me that everything is properly labeled.


     
    15 VLAN 1 00907f8f571b G1    
      16 VLAN 2 00155d1f1b07 G17    
      17 VLAN 2 001dd8b71c01 G17    
      18 VLAN 2 00907f8f571b G1    
     

    What I can't do, is ping through the switch to VLAN 2.  I can't ping my VPN server (10.101.20.1), and I can not ping to the gateway (10.101.0.1) from the server.  Note, it is not because of rules to firewall on each end.

    What Miss me?  I don't think I need a routing of layer 3 here, I don't have to go through VLAN, just have them several VLANS passes from one port to the other.

    Other things to note in case it is useful:

    -I have no connectivity not tag with everything else through the 10.84.195.xxx/24 switch.

    -If I delete the Tags VLAN port 2 1 trunk, I suddenly can ping the bridge VLAN 2 (10.101.0.1) from the server, although I suspect that it is because the same port is the default gateway for the switch.

    -For brevity, only 2 lines of the STP are listed below, but all ports are therefore based on the question of whether they are connected or not.

    G1 activated 128.1 Frw Desg P2P (STP) No. 4
    G2 activated 128.2 Dsbl Dsbl No. 100.

    -Latest firmware installed.

    -In addition, for people concerned about their security, I want to remove use VLAN by default in the future.

    Would it be possible for run you to stick your show output here in the forum.  In this way, we can take closer look at what you have configured.

    If you connect a desktop/laptop computer (with and intellectual property in the 10.101.0.0/16 range) in a port with the mode of access switchport VLAN 2 are you able to ping IP Interface 10.101.0.2 for 2 VLANS?  You could try to disconnect the firewall and the configurations for the port and work on getting through the switch with 2 terminals on a single VLAN.  Then, once this is confirmed as work connect the firewall back up with a trunk/general mode adding the VLAN necessary.

    You connect to the firewall on a layer 3 interface?  You need Layer 3 routing to reach the firewall correctly.

  • problem with dhcp Cisco sg200 voice vlan

    I have cisco sg200 50 p connected to the switch cisco 3750. I just wanted to separate voice (vlan2) and data (vlan1) VLAN. I created vlan 2 as my voice VLAN and separate dhcp server for vlan 2 to give IPS for phones. However the phone ip connected to my voice vlan (vlan 2) does not receive the ip address of my dhcp server vlan 2.

    the dhcp server is connected to a switch with an access port (vlan2-voice) 3750

    two switches are connected through the trunk ports and allowed vlan 1 & 2

    IP phone is connected to sg200 via the access port (vlan 2).

    Note: there is a pc connected to the ip phone

    I'm really grateful if someone can help me with this problem

    Hi Ruchiran,

    To cover the base, ensure that VLAN 2 is added to the database VLAN on the 3750. Simple by using the command "show vlan id 2", if it is not found, you must first create the VLAN 2 on the 3750.

    Second, if you connect the same IP phone directly to the 3750 on an access port, vlan 2 unidentified, is the phone receives IP address as you hope?

    Then, on the trunk of 3750 connection to the SX200. Building the trunk when using a command like "switchport trunk allowed vlan remove 1-4094," then build the trunk more precisely with the VLAN ' trunk switchport allowed vlan add 2 "who will score 2 VLAN port." "

    On the SG200 switch, must be defined the trunk and VLAN Tag 2 on the port to connect to 3750 then the connection to the phone port should be 2 VLANS not identified as access port.

  • Problems with VLAN...

    Hello

    I try to get a controller 2106 (latest firmware) and 3 1252 to our network access points. We have 3560 switches to base with a few VIRTUAL networks. I can put it all fine on its own with my laptop on the WAC himself, but connect it to a switch port in our server VLAN does work at all. Its not accessible via ping, telnet, HTTP.

    I have for this kind of work. I created a switchport mode trunk and I ALSO HAD to TAG management/access point interfaces. It's the only way I can telnet/HTTP in to the WAC. BUT I can't do now within this server VLAN. I can't reach our client device, VLAN, or I can reach the WAC to our client VLAN. Even with the trunkport game, if I put the interfaces on the WAC to unlabeled, I can't do anything on the WAC at all! Any ideas what I'm missing?

    Thank you

    Make sure you have all the VLAN defined on the switch. Make sure all connections to the switch are attached to the trunk. Each vlan must also a layer 3 interface. management and the ap-Manager should be on the same vlan and the dot1q trunk port must be defined on vlan native x where X is the vlan, management and ap-Manager ip is on. On the WLC, you must set the tag of vlan '0' unidentified. Who should you get.

    Place the access point on the same subnet as the management and the ap Manager and make sure that there is a for this subnet dhcp scope to the ap can obtain an ip address and be able to join the WLC. Then, you can move the access point to a different subnet if you wish.

  • Implementation of VLAN / QoS for VOIP on RV180

    I posted earlier about setting up VLAN / QoS for VOIP on the SG200-18 (see: https://supportforums.cisco.com/discussion/12193666/setting-vlan-and-qos...).

    I did go ahead and buy the RV180. I connected to SG200-18.

    I wish to proceed with the implementation of VLAN / QoS on the RV180 so my phone (Grandstream VOIP wireless phone) VOIP is on its own VLAN separate from the rest of the network, so make sure that all QoS settings are optimized to give the first priority of VOIP network telephone.

    Currently I still have the VOIP phone connected to SG200-18 as stated in the previous post.

    Here are my questions:

    1 should I leave the VOIP phone connected to the SG200-18 and config all the VLANS, VLANS and VLAN Switch voice settings down to the VOIP phone, or should I plugged the phone VOIP in the RV180? Which would give me better performance and easier to do?

    2. How can I place the VOIP phone on its own VIRTUAL LAN, in addition to optimizing QoS settings so it gets a top priority for the network?

    3. I currently have set VOIP telephone in order to reserve a DHCP address in the 192.168.x range. When you move to the VLAN, should I set the DHCP reservation and/or my firewall settings (I through the firewall as well)

    4. I also get a beta-test VOIP Grandstream office phone. Time of its installation, what I have to plug directly into the RV180 or the SG200-18, and I have to put it on the same VLAN as the phone VOIP without wire Grandstream or VLAN different? It also supports PoE, but the RV180 or SG200-18 model I does not work. If I use an external power supply, connect each device will be OK or might that it became fried?

    Thank you!

    Hello

    1 should I leave the VOIP phone connected to the SG200-18 and config all the VLANS, VLANS and VLAN Switch voice settings down to the VOIP phone, or should I plugged the phone VOIP in the RV180? Which would give me better performance and easier to do?

    It will not be much difference between being on the switch or on the router, so it is for the most part to the simplicity of configuration performance.  If you plug the phone directly on the router, you will really not disturb trunking VLAN or none of this switch.

    This is really what is more convenient, but if you are able to plug into the RV directly I wouldn't worry QoS on the switch.

    So let's talk about implementation of the RV180.

    First go to network > LAN > belonging to a VLAN.  Enable VLANs, and add a new VLAN for voice (most people use 100 for voice for a reason, but it does not matter).  You will take care to set the port that the phone is plugged in not tagged to the new voice VLAN, and you can exclude the data VLAN of the port.

    Then go to several VIRTUAL local network subnets and configure the address range for it configuration DHCP / new subnet (for example 192.168.100.0) If you do not want to use it (makes things a bit easier)

    Finally, to enable QoS on the RV go to QoS > QoS WAN profiles.  Activate the WAN QoS, make sure that it is set to the priority mode and add a new entry to the table.  You can name it anything you want (I used VoiP), then set it high priority.

    Then go down on the link profile page and add a new entry here. Select the profile you just created in the drop-down menu, set the service to one, select traffic selector VLAN and make sure the drop-down menu for VLAN is the VoIP VLAN.

    At this point, we have a configuration where the voice traffic (or basically anything on the VLAN voice) will have priority when it comes out the WAN interface.

    3. I currently have set VOIP telephone in order to reserve a DHCP address in the 192.168.x range. When you move to the VLAN, should I set the DHCP reservation and/or my firewall settings (I through the firewall as well)

    The second VIRTUAL LAN should have a configuration of different subnet for him, because I spoke up.  During this process you will place the DHCP server for the new VLAN as well.  You can adjust your reservations for the phones, but it does not really matter what IP they get, since we are prioritizing voice any VLAN, so you don't have set up a reserve, unless you really want to.

    4. the Grandstream phone.

    I would put the Grandstream (and all the other VoIP phones that you could get) in the voice VLAN so that he would get the same priority treatment.  At this point with multiple devices, you can indeed install a trunk to the switch (VLAN normal unidentified and voice VLAN Tag) and configure the ports to the voice VLAN for these phones.  Who will ensure that the switch gives priority to the traffic of voice, even if it is probably not as important in their own country on the WAN.

    Regarding the PoE device connected to a non PoE switch or a router, there will be no problems.  I'm guessing that the phone also comes with an AC adapter.  It will not feed this power in the thread just because it's PoE, it's pretty much a one-way circuit.

    Hope that helps,

    Christopher Ebert - Advanced Network Support Engineer

    Cisco Small Business Support Center

    * Please note the useful messages *.

  • Cisco Small Business Equipment VLAN security issue

    Hi, I have a RV220W router and a switch SG200-18. I'm trying to set up my network to be as secure as possible...

    The RV220W has the configuration of VLAN next:

    Port 1: Manage, DMZ, Business, Test, Diag, home and anywhere (not identified)

    Port 2-4: not used (unidentified) and people with DISABILITIES

    All ports were excluded from the default VLAN

    SG200-18 has the configuration of VLAN next:

    Port 1 (trunk): manage, DMZ, Business, Test, Diag, home and anywhere (not identified)

    Port 2-17 (access): not used (unidentified) and people with DISABILITIES

    Port 18 (access): manage (unlabeled) * used to configure and manage the switching and routing of a pc

    All ports were excluded from the default VLAN

    I installed this according to the instructions in the Cisco security best practices: http://www.cisco.com/warp/public/cc/pd/si/casi/ca6000/prodlit/vlnwp_wp.pdf

    My questions regarding my network of quenching of Double-Encapsulated 802. 1 q / attack of VLAN nested. The white paper suggests to disable the VLAN native/unidentified all trunk ports... Unfortunately the RV220W seems to require a VLAN without label on each port (won't allow me to only have the tag VLAN)... Can someone suggest a more secure configuration given that I work with?

    Thank you!

    P.S. the switch allows me to configure a port mode 'General' where I can configure the frame Type to "Admit tag only" to allow only traffic labeled... I don't know if this would increase security?

    In what concerns the vlan tag/UNTAG Yes. You must take into account the limitation of the router.

    -Tom
    Please mark replied messages useful

  • Problem with SG-200 and access point on VLAN

    I'm having some problems with the configuration of VLANS on the SG-200 and the WiFi access point. The access point (a TP-Link WA801N) is able to access the internet when it is plugged into a port that is on the default VLAN (1 PVID). If I plug it into one of the other VLAN then all clients connected to WiFi to lose access to the internet and can not access on the local VIRTUAL network devices. I've used this configuration with a Cisco WAP4410N of first generation.

    I'm not sure if it's something wrong with the way I configured the switch or a problem with the access point.

    The setup I have is:

    Modem/router ADSL (7800N billion)

    |

    -------------------Port 1--------------------

    |                                               |

    |               SG-200 08 |

    |                                               |

    ---3---port 8 - port

    |                    |

    Access point |

    (TP-Link WA801N).

    |

    SF - 100 D

    The port configurations are

    Port Mode PVID membership

    1 general 1 1U, 7U, 666U

    2 general 1 1U, 7U, 666U

    3 general 7 1U, 7U

    4 General 7 1U, 7U

    5 General 7 1U, 7U

    6 General 7 1U, 7U

    7 general 1U 666, 666U

    8 General 1U 666, 666U

    Iain,

    You have virtual local networks put in place on your router? The subnets that you use on each vlan? The router will give DHCP for each vlan?

    The SG200 isn't a fully managed layer 3 switch, it's just a "smart switch" so you can not actually be able to do simply only switch. A sg300 mode layer 3 would be able to do this because it is a fully managed switch.

    If the router is configured with the VLAN, vlan 1 unidentified, the rest the tag, the router-> SG200 port is trunking and the others as access ports on their vlan respective. Once the router is configured, this video contributor forum albums and Cisco employee David Hornstein is very useful to correctly configure the switch.

    Best,

    David

    Please evaluate the useful messages.

  • SG 300 - Inter VLAN

    Salvation of the forumers

    My problem statement

    a. how to let a single switchport to transport the vlan voice and data of vlan?

    say I had create and configure the vlan (20) voice and data of vlan (10)

    first of all, I do like this (join the voice vlan.png)

    What should I do

    A1. Management port for VLAN, VLAN

    (define the interface as General, but then should I check PVID, tag or remove the brand?)

    A2. Management VLAN-VLAN to the Port

    (is it leaves vlan 10 and vlan 20 to join the switchport?)  (Attach it VLAN to Port.png)

    b. is this done switch "ip Routing" for inter routing VLAN?

    say I create him VLAN, assign the IP address of the virtual interface for it. Have to do to activate routing inter - VLAN?

    I have check the static route only switch IPv4, is that it need a manual to create the static route to reach subnet each VLAN?

    can c. that be NTP server?

    Thank you

    Noel

    Hello!

    a. create a vlan 10 (data) and vlan 20 (voice). Set the switchport where you have an IP phone that is attached to the Trunk mode (management of Vlan-> settings of the Interface). Administrative PVID of the port should be 10. Go to the management of VLAN-> a Port VLAN membership, select the switchport and click Join VLANS. In the right column, you should have '10UP' (VLAN 10 Untagged, PVID: 10). In the left column select 20, labelling must be tagged, click the right arrow button to add 20 VLAN Tag to the port and click on apply.

    These settings will make switchport transfer VLAN10 traffic (data) as non-identified and VLAN20 traffic as added to the phone the voice. In each case, your phone, if it has a PC in the Appendix must be configured for voice traffic with the tag VLAN20 tag and move unidentified to the PC data traffic. Voice of preserve settings VLAN as shown on the screenshot - he let the switch to assign the optimal settings of QoS for traffic vlan voice.

    b. If you have the latest firmware installed routing Inter VLAN is enabled by default. Simply create interfaces SVI (assign an IP address to the VIRTUAL local area network interface) and if you have at least a host connected to the switchport member of the VLAN, the road to this subnet will automatically appear in the switch routing table. If you have multiple VLANs with the affected IP addresses and hosts active on these VLAN - all these networks appears in the table of routing as being directly connected and hosts all the VLANS will be able to communicate with each other. You must restrict the Inter-VLAN communication - use IP ACL.

    c. No, the switch can be SNTP client only.

  • RV042G and SG200-18 have no work

    (1) SG200-18 configuration

    -VLAN 10 and 20

    -VLAN 10: Port 1 with label, Port 14 untagged

    -VLAN 20: Port 1 tagged, 13 Port unidentified

    -Port 1: 1UP, 10T, 20T admit tagged PVID 1

    -Port 14: 10UP admit tagless PVID 10

    -Port 13: 20UP admit tagless PVID 20

    Port 1 connected to fiber Ontario (VLAN 10), 14 Port connected to WAN RV042G.

    Once LAN RV042G connects to the port of SG200-18 (vlan1), WAN RV042G cannot get an internet connection and 14 missing public IP, port, showing the 'Elements' under "Spanning Tree"

    Can anyone help?

    Hi Lian, as I indicated in my first post and preceding positions, 802. 1 q allows only one instance of spanning tree. That's why disabling spanning tree works.

    Yes, the binding protocol works for all models of RV0XX.

    -Tom
    Please evaluate the useful messages

  • Problem with routing/circuits between SG300-10 and Dell Powerconnect 5224

    Hello

    I just bought a SG300-10 switch and loaded new firmware 1.27 on it.  Configure my VLAN and trunks, but I have a weird problem that I can't seem to understand.  It may be something small, I'm missing, but no matter, I have been scratching at it all day and I kicked in the butt.  If anyone can point me in the right direction or maybe something that someone see in my config which is wrong, I can get the terminology/theory wrong, after all, I just spent my CCNA :)

    My configuration:

    I have the SG300-10 as my switch and changed over to L3, so it may be my core of my small network.  On port 1, vlan 200 is configured as my unidentified native PVID and I put it to 210(LAN network) to trunk VLANs, 220 (management vlan) on the tag to the Dell powerconnect 5224 24port switch.  On port 1 of the Dell switch, I install as a trunk it as well with the same configuration (vlan native of PVID unidentified 200, 210 and 220 tag trunking).

    I have installed virtual interfaces on the SG300 for each VLAN (vlan 210 = 192.168.210.1/24, vlan 220 = 192.168.220.1/24) and on the Dell, since this is a feature of L2, I changed the vlan 1 to 220 management and assign the IP 192.168.220.2/24.

    Now, since the SG300 web interface, I ping IP management Dell (192.168.220.2/24)successfully and vice versa, can ping from Dell web interface to one of the IP of the bridge VLAN (210.1 & 220.1) successfully so that test, to me, looks like the Dell communicates with the SG300.)  I also have the default gateway of the Dell 192.168.220.1 printer value.

    Server IP: 192.168.220.10/24

    Workstation IP: 192.168.210.80/24

    Now the dilemma:

    I have a server plugged into switch port Dell 2 (configured as 'hybrid' because there is no option to access, value 220 PVID, vlan, worth 220 Untagged) and from the server, I can ping IP management dell very well switch and can ping the IP of the gateway of great SG300 so.  On the SG300 switch, on port 2, I plugged in a workstation (configuration is in access mode, vlan 210 unidentified) who can not ping the server plugged into the dell switch.  The workstation, I can ping all the SG300 interfaces and also the IP management dell but I can't ping the server.

    Any ideas anyone can provide is much appreciated!

    Edition of VLAN.

    Lenell, thank you for the call tonight. It seems that we have found the problem. The SIN, although it is configured with a default gateway, the gateway that brings 0.0.0.0. We also checked the NAS works from the same subnet to connect but fails outside of the subnet. Conversely, we checked 2 computers have no problem to connect through the VLAN level 3.

    I hope we got the right direction.

    -Tom
    Please evaluate the useful messages

  • SGE2010 will be marking?

    Hi all

    I'm trying to find out if the SGE2010 will make the following feaute:

    Port 1: Vlan X unidentified

    2 port: Vlan Y Unttaged

    Port 3: X Vlan tag, tag Vlan Y.

    3 port would be an ASA device with two virtual interfaces on this VLAN. Swich will add tags when the unmarked frames comes from port 1 or 2 and send it to the port 3 tag.

    Switch will remove tags of port 3 and return to the Port 1 or Port 2.

    I realized this behavior with a netgear switch.

    Thank you

    Jose,


    The switch will do that for you, it will remove the tag once it turns on the trunk port.


    However, this switch not allow you tag vlan 1 so you need to use 2 VLAN different other than 1 and mark them on the trunk port.

  • SG500-52-K9-NA voice and data? s

    Just took a SG500-52 for the new addition of office and we just bought IP phones. I configured 1 port with vlan 41 voice given 100 shared resources and computer and telephone that work together. Even when I plug the computer directly into the switch, it still works even if the port is configured as a trunk and VLAN tagged 2? This work what's - what a smartport thing?

    Hi jbpollard,

    If you use a phone and a PC to a port, you must configure:
    -vlan 41 tagged
    -vlan 100 unidentified

    PC / laptop can mark normally not packages. This is why virtual LAN PC must not be tagged.
    The IP phone can mark packets.

    On the other Cisco switches, you can also set the client port as trunk. But then the vlan on the trunk native must be the vlan where the PC without going into.

  • Using UC320W with SLM2008, SRW2024 WRVS4400N

    This question has a little broad, but I'm a total newbie to the VLAN in spite of being a consultant FOR 28 years now... The network has never been my goal so far.

    1. Using the material in the subject line, peux I spread the voice and data VLAN everywhere in the network successfully?
    2. How the hell can I configure the VLANS on these 3 devices? Regular installation manuals leave me a lost.
    3. The WRVS4400N is old hardware (v1) and cannot be put in place with 2 or more WiFi SSID. I could scrap my network of demonstration/Office in view of its low cost (it has been fine for years my main router is now just a switch and the AP). What AP would you propose to expand the network of the UC320W wireless (VLAN voice and data) in signal-challenged parts of a building? A Wi - Fi connection can even be tagged with the VLAN ID?
    4. The old SRW2024 looks a lot like one of the new SG300s. can it be firmware upgraded to the same level? He will then this magic trick of the CDP and establish its own VLAN?
    5. I need to have something that works well at the end of the day, because it will be my own production system (torture tested by my family of 7) and a demonstration site for my clients to come 'play' before they buy. I'm looking to add telephony to my long practice of COMPUTING.

    So I need help and opinions. Should I keep or delete all or part of this type of gear? How to configure the VLANS on older devices?

    Any help appreciated.

    Thank you people.

    Hi Chris,

    I think you should be able to use your switches in your network.  New generations contain some features vocal auto that make installation easier while being more green in consumption and the heat of electricity.  Essentially, you create a VLAN 100 (call it voice) on each switch.  Next, you need to make each port a port trunk 'tag' (VLAN 100) and unidentified on the VLAN 1 (shouldn't need to do something to the VLAN 1).  Usually, this is done on a page call Port to the VLAN.  We are in the process of updating the intelligent design document for cheating for the solution of UC320W add more coverage for manual settings.

    Regarding the WRVS4400N, you can put that aside for now.  To extend the coverage of your WiFi, you will need to use a gateway such as Cisco AP 541N.  When the bypass between WiFi and Ethernet you map essentially one VLAN to a SSID.  In the UC320W and when configuring the access point, you associate VLAN 1 (unidentified) with your SSID data and associate the voice VLAN 100 SSID (voice).    In this version, you will want to use the same settings and passwords in configuring WiFi for Access Points and the UC320W.

    I hope this helps.

    Chris

  • RV180 restrict access to the Site to Site VPN

    Hello

    I'm trying to set up my network so that VPN traffic is routed only to a physical single on the RV180 port or to a certain subset of devices on a network.

    I have a site to site vpn configuration in a Home Office and connect to the corporate network.  The user has a couple of devices on the home network who need to access the corporate network.

    We hope to leave his PC accessible to its home network and the corporate network, but limit other devices to access the vpn.

    I think that I could do playing with the subnet, but I just can't get my head around it.

    It must be something simpleish to do this, isn't there?

    I'd appreciate any help you have.

    Thank you

    Gary

    Hi boys, here's a hypothetical situation.

    VLAN 1 is port 1

    VLAN 2 is port 2

    VLAN 1 has a switch connected to your local network of services

    VLAN 2 has a switch to maintain your VPN.

    The configuration of the port for each port would be the vlan respective unidentified.

    You can disable the router in order to prohibit intervlan communication. But also, and especially, the vpn is a specific meaning, subnet, you specify the specific ip subnet on the config of the tunnel because the config include not a second subnet will not work it's traffic in the tunnel.

    -Tom
    Please mark replied messages useful

Maybe you are looking for