Distinguishing Vlans without Trunking ?

Hi,
How does a switch distinguish one Vlan from another if trunking is not involved ?
For Example: Switch A is connected to Switch B via a X-over cable. I place two ports at either end of the X-over cable into VLAN 2. I place one PC on switch A in VLAN 2 and one PC in switch B in VLAN 2. The result is that they can communicate. If I place one of the PC's into VLAN 1 then they cannot communicate. Is there a tagging mechanism involved here even though trunking isn't being used ?
Has anyone got an example of the frame format for Ethernet for this scenario ?
Cheers,
Phil.

Devices connected to an access port (versus a trunk port) do not receive VLAN information.
FOr example, if you connected port 1 from switch A (which happens to be in VLAN 100) via crossover to another switch port 1 (which happens to be in VLAN 200), neither switch would know anything about the VLANs on the other switch.
Tags are added on the ingress to an access port, and stripped at the egress from an access port.
Traffic going from one port to another in the same VLAN (on the same switch) is not tagged (I believe).
If you connected an "dumb" (unmanaged) switch into a port that is associated with a VLAN on the host switch, then all of the extended ports will also appear in the VLAN of the host switch's outbound trunk.
The short version is that VLANs do not come into play for things plugged into an access port.
Good Luck
Scott

Similar Messages

  • VLANs across switches without trunking

    Assuming that you only have one VLAN, is it possible to have that single VLAN reach across multiple switches without trunk ports? I've inherited a network of a handful of Cat 6506s, and Cat4006's, which have one big flat /22 in a single VLAN. I'd like to break it up into smaller chunks and seperate VLANs, but I'm rather suprised that it appears to be working with one VLAN but without trunks.

    Actully you can run seperate access port links per vlan, chewing up a seperate physical port per vlan on each switch. There was a 2900 series switch I had a long time ago that supported vlans but not trunks.
    It had a feature called multi vlan that you could add to a port, but this was a way of letting one port talk to all vlans and was messy.
    But you could run a seperate cable for each vlan. if you have 5 vlans then 5 cables between switch A and switch B, port 1 vlan 1, port 2 vlan2, port 3 vlan3, etc...

  • Unknown vlan in trunk

    Hi all!
    We have mostly 2950 switches with standard image and 2950lre with EI. All switches in transparent modes with different domain names.
    Here is the problem
    cat1 <-trunk-> cat2 <-trunk> cat3
    On cat1 and cat3 there are ports in ,let's say ,vlan 10
    Right now I have to create vlan 10 in transit cat2. Otherwise it won't pass tagged packets recieved from cat1 to cat3.
    I was under impression that catalysts can pass all vlans in trunk by default,even if it's not known on local switch.
    I did debug on lre (debug switch vlan) and after creating vlan, it put trunk port in tagged mode for this vlan
    VLANDEBUG:STP_FORWARDING: vlan 1289 port 25
    strata_add_port_to_vlan: adding tagged port for VM_1Q_PORT
    VLANDEBUG:Set Tagged Mode For Port:25, Unit:0
    So, after creating vlan it permits this vlan on trunk port
    I wonder if it's platrofm depended, IOS image (c2950lre-i6l2q4-mz.121-22.EA1) depended or it's just the way catalysts work?

    Hi,
    You have to create Vlan 10 on your Cat2 otherwise it will not pass the traffic for the Vlan2. Think it in this way that if your switch is a VTP client and you have a VTP server, now your VLAN info will be passed to every VTP client and thus you have the same number of VLANS on the switch and hence the traffic gets pass over the trunk. If you have switches in Transparent mode than each switch has its own Vlan database and to get the traffic passed fo a particular Vlan that vlan should exist in Vlan database of each and every switch,.
    If that vlan doesnot exist then how the switch will tag the packets when it has to send the traffic to other switch. On catalyst switch the moment the tagged packet exists the trunk port it rips off the dot1q TAG and adds a Port vlan ID i.e vlan 10 on the packet and the moment it enters on the trunk port to pass it to other link, a DOT 1q tag is added on the switch. This is how the catalyst switch works. So if doesnot have any Vlan in its vlan database it will not pass the traffic for that Vlan.
    I remeber I did the same LAB when I was giving a training to some Army guys and it happend to be the same.
    regards,
    -amit singh

  • Private VLAN Promiscuous Trunk Port - Switches which support this function

    Can anyone confirm if the "Private VLAN Promiscuous Trunk Port" feature is supported in any lower end switches such as Nexus 5548/5672 or 4500X? According to the feature navigator support seems to be restricted to the Catalyst 4500 range (excluding the 4500X) as shown below. If the feature is going to be supported in the Cat 3850 this would be good to know, thanks

    4500x Yes
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_26674-01.html
    Nexus 5k Yes
    http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/layer2/521_n1_3/b_5k_Layer2_Config_521N13/b_5k_Layer2_Config_521N13_chapter_0100.html
    3850s
    They dont support pvs at all yet
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/vlan/configuration_guide/b_vlan_3se_3850_cg/b_vlan_3se_3850_cg_chapter_0100.html
    Restrictions for VLANs
    The following are restrictions for VLANs:
    The switch supports per-VLAN spanning-tree plus (PVST+) or rapid PVST+ with a maximum of 128 spanning-tree instances. One spanning-tree instance is allowed per VLAN.
    The switch supports IEEE 802.1Q trunking methods for sending VLAN traffic over Ethernet ports.
    Configuring an interface VLAN router's MAC address is not supported. The interface VLAN already has an MAC address assigned by default.
    Private VLANs are not supported on the switch.
    You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.

  • Catalyst series - Private VLAN over trunk

    Hey every body
    I was planning to implement a Cisco Nexus 5596 in a data center as it supports private VLAN over trunk.
    But now, I av been forced to use a Cisco Catalyst series instead of the Nexus one.
    Based on the feature that is very important for my manager (private VLAN over trunk), which Catalyst switch can be replaced with the Nexus 5596? In other words, what Catalyst series switch works at the same scale and efficiency of Nexus 5596 and supports private VLAN over trunk feature?
    Cheers

    4500x Yes
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_26674-01.html
    Nexus 5k Yes
    http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/layer2/521_n1_3/b_5k_Layer2_Config_521N13/b_5k_Layer2_Config_521N13_chapter_0100.html
    3850s
    They dont support pvs at all yet
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/vlan/configuration_guide/b_vlan_3se_3850_cg/b_vlan_3se_3850_cg_chapter_0100.html
    Restrictions for VLANs
    The following are restrictions for VLANs:
    The switch supports per-VLAN spanning-tree plus (PVST+) or rapid PVST+ with a maximum of 128 spanning-tree instances. One spanning-tree instance is allowed per VLAN.
    The switch supports IEEE 802.1Q trunking methods for sending VLAN traffic over Ethernet ports.
    Configuring an interface VLAN router's MAC address is not supported. The interface VLAN already has an MAC address assigned by default.
    Private VLANs are not supported on the switch.
    You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.

  • Native Vlan and Trunking

    Hi Folks,
    I am having a doubt with native Vlan in trunk ports.
    In a topology of 3 switches. Switch A is connected with switchB and SwitchC on uplinks. Can I configure the different native vlans for 2 different trunk for switch A.
    Like I am having 3 vlan,s configured in switch A with VTP domain transparent(1,500,900-Vlans configured). Same configuration is there in B & C too.
    So can we use 999 as a native vlan for trunk between A&B and native vlan 1 for trunk configured between A&C.

    yes possible, if specific reasons. Already discussed several times on this forum. Pls refer this link:
    http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&forum=Network%20Infrastructure&topic=LAN%2C%20Switching%20and%20Routing&CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cbe4e88

  • NAtive VLAN?what is the use of vlan?VLAN in trunk link?

    what is the use of native VLAN in trunk links? where should i change native vlan from vlan1 to another?
    what is the use of untagged native VLAN frame?

    Hi,
    On ethernet, you can connect more than one device to a port. So when you configure a port as trunk, it expects a vlan tag to arrive. But some times there are devices which dont have the capability to tag the packet and still they need to connect to network. So they can use native vlan to have connectivity. It is not a usual situation, but it helps on some situation where multiple devices connected on a trunk and not all have ability to send tagged frames. Hope this helps.
    Please do remember to rate all useful posts.
    Thanks,
    Madhu

  • Sniffing vlan without using monitor session

    Hello,
    I am trying to configure sniffing on vlan without using monitor session on 3550 - 122-25.SEB. My idea was to put static mac mapping for all the mac addresses in the vlan to one port where to put IDS sniffing interface. Unfortunately the switch doesn't accept static mapping for mac address that he already knows via dynamic mapping on one and the same vlan. If I first shut down the port where the source device is located then I can put static mapping but after enabeling the port again the switch doesn't lear the dynamic mac. Is there any other way to redirect traffic ? I am thinking also if I can disable mac address learning on this vlan ->turning the switch in to hub for this vlan ?

    Your vlan also needs to be configured for remote-span:
    vlan 35
      remote-span
    I would keep the filter attached, if the frame is not "good" it can't do any harm on the destination-system. It typically won't even get there.
    And make sure that you don't have too much span-traffic on the interswitch-links and the destination-link.

  • Various questions on uplink profiles, CoS, native VLAN, downlink trunking

    I will be using vPC End Host Mode with MAC-pinning. I see I can further configure MAC-Pinning. Is this required or will it automatically forward packets by just turning it on? Is it also best not to enable failover for the vnics in this configuration? See this text from the Cisco 1000V deployment Guide:
    Fabric Fail-Over Mode
    Within the Cisco UCS M71KR-E, M71KR-Q and M81KR adapter types, the Cisco Unified Computing System can
    enable a fabric failover capability in which loss of connectivity on a path in use will cause remapping of traffic
    through a redundant path within the Cisco Unified Computing System. It is recommended to allow the Cisco Nexus
    1000V redundancy mechanism to provide the redundancy and not to enable fabric fail-over when creating the
    network interfaces within the UCS Service Profiles. Figure 3 shows the dialog box. Make sure the Enable Failover
    checkbox is not checked."
    What is the 1000V redundancy?? I didn't know it has redundancy. Is it the MAC-Pinning set up in the 1000V? Is it Network State Tracking?
    The 1000V has redundancy and we can even pin VLANs to whatever vNIC we want. See Cisco's Best Practices for Nexus 1000V and UCS.
    Nexus1000V management VLAN. Can I use the same VLAN for this and for ESX-management and for Switch management? E.g VLan 3 for everything.
    According to the below text (1000V Deployment Guide), I can have them all in the same vlan:
    There are no best practices that specify whether the VSM
    and the VMware ESX management interface should be on the same VLAN. If the management VLAN for
    network devices is a different VLAN than that used for server management, the VSM management
    interface should be on the management VLAN used for the network devices. Otherwise, the VSM and the
    VMware ESX management interfaces should share the same VLAN.
    I will also be using CoS and Qos to prioritize the traffic. The CoS can either be set in the 1000V (Host control Full) or per virtual adapter (Host control none) in UCS. Since I don't know how to configure CoS on the 1000V, I wonder if I can just set it in UCS (per adapter) as before when using the 1000V, ie. we have 2 choices.
    Yes, you can still manage CoS using QoS on the vnics when using 1000V:
    The recommended action in the Cisco Nexus 1000V Series is to assign a class of service (CoS) of 6 to the VMware service console and VMkernel flows and to honor these QoS markings on the data center switch to which the Cisco UCS 6100 Series Fabric Interconnect connects. Marking of QoS values can be performed on the Cisco Nexus 1000V Series Switch in all cases, or it can be performed on a per-VIF basis on the Cisco UCS M81KR or P81E within the Cisco Unified Computing System with or without the Cisco Nexus 1000V Series Switch.
    Something else: Native VLANs
    Is it important to have the same native VLAN on the UCS and the Cisco switch? And not to use the default native VLAN 1?   I read somewhere that the native VLAN is used for communication between the switches and CDP amongst others. I know the native VLAN is for all untagged traffic. I see many people set the ESXi management VLAN as native also, and in the above article the native VLAN (default 1) is setup. Why? I have been advised to leave out the native VLAN.
    Example:Will I be able to access a VM set with VLAN 0 (native) if the native VLAN is the same in UCS and the Cisco switch (Eg. VLAN 2)? Can I just configure a access port with the same VLAN ID as the native VLAN, i.e 2 and connect to it with a PC using the same IP network address?
    And is it important to trunk this native VLAN? I see in a Netapp Flexpod config they state this: "This configuration also leverages the native VLAN on the trunk ports to discard untagged packets, by setting the native VLAN on the port channel, but not including this VLAN in the allowed VLANs on the port channel". But I don't understand it...
    What about the downlinks from the FI to the chassis. Do you configure this as a port channel also in UCS? Or is this not possible with the setup described here with 1000V and MAC-pinning.
    No, port channel should not be configured when MAC-pinning is configured.
    [Robert] The VSM doesn't participate in STP so it will never send BPDU's.  However, since VMs can act like bridges & routers these days, we advise to add two commands to your upstream VEM uplinks - PortFast and BPDUFilter.  PortFast so the interface is FWD faster (since there's no STP on the VSM anyway) and BPDUFilter to ignore any received BPDU's from VMs.  I prefer to ignore them then using BPDU Gaurd - which will shutdown the interface if BPDU's are received.
    -Are you thinking of the upstream switch here (Nexus, Catalyst) or the N1kV uplink profile config?
    Edit: 26 July 14:23. Found answers to many of my many questions...

    Answers inline.
    Atle Dale wrote:
    Something else: Native VLANsIs it important to have the same native VLAN on the UCS and the Cisco switch? And not to use the default native VLAN 1?   I read somewhere that the native VLAN is used for communication between the switches and CDP amongst others. I know the native VLAN is for all untagged traffic. I see many people set the ESXi management VLAN as native also, and in the above article the native VLAN (default 1) is setup. Why? I have been advised to leave out the native VLAN.[Robert] The native VLAN is assigned per hop.  This means between the 1000v Uplinks port profile and your UCS vNIC definition, the native VLAN should be the same.  If you're not using a native VLAN, the "default" VLAN will be used for control traffic communication.  The native VLAN and default VLAN are not necessarily the same.  Native refers to VLAN traffic without an 802.1q header and can be assigned or not.  A default VLAN is mandatory.  This happens to start as VLAN 1 in UCS but can be changed. The default VLAN will be used for control traffic communication.  If you look at any switch (including the 1000v or Fabric Interconnects) and do a "show int trunk" from the NXOS CLI, you'll see there's always one VLAN allowed on every interface (by default VLAN 1) - This is your default VLAN.Example:Will I be able to access a VM set with VLAN 0 (native) if the native VLAN is the same in UCS and the Cisco switch (Eg. VLAN 2)? Can I just configure a access port with the same VLAN ID as the native VLAN, i.e 2 and connect to it with a PC using the same IP network address?[Robert] There's no VLAN 0.  An access port doesn't use a native VLAN - as its assigned to only to a single VLAN.  A trunk on the other hand carries multiple VLANs and can have a native vlan assigned.  Remember your native vlan usage must be matched between each hop.  Most network admins setup the native vlan to be the same throughout their network for simplicity.  In your example, you wouldn't set your VM's port profile to be in VLAN 0 (doens't exist), but rather VLAN 2 as an access port.  If VLAN 2 also happens to be your Native VLAN northbound of UCS, then you would configured VLAN 2 as the Native VLAN on your UCS ethernet uplinks.  On switch northbound of the UCS Interconnects you'll want to ensure on the receiving trunk interface VLAN 2 is set as the native vlan also.  Summary:1000v - VM vEthernet port profile set as access port VLAN 21000v - Ethernet Uplink Port profile set as trunk with Native VLAN 2UCS - vNIC in Service Profile allowing all required VLANs, and VLAN 2 set as NativeUCS - Uplink Interface(s) or Port Channel set as trunk with VLAN 2 as Native VLANUpstream Switch from UCS - Set as trunk interface with Native VLAN 2From this example, your VM will be reachable on VLAN 2 from any device - assuming you have L3/routing configured correctly also.And is it important to trunk this native VLAN? I see in a Netapp Flexpod config they state this: "This configuration also leverages the native VLAN on the trunk ports to discard untagged packets, by setting the native VLAN on the port channel, but not including this VLAN in the allowed VLANs on the port channel". But I don't understand it...[Robert] This statement recommends "not" to use a native VLAN.  This is a practice by some people.  Rather than using a native VLAN throughout their network, they tag everything.  This doesn't change the operation or reachability of any VLAN or device - it's simply a design descision.  The reason some people opt not to use a native VLAN is that almost all switches use VLAN 1 as the native by default.  So if you're using the native VLAN 1 for management access to all your devices, and someone connects in (without your knowing) another switch and simply plug into it - they'd land on the same VLAN as your management devices and potentially do harm.What about the downlinks from the FI to the chassis. Do you configure this as a port channel also in UCS? Or is this not possible with the setup descrived here with 1000V and MAC-pinning.[Robert] On the first generation hardware (6100 FI and 2104 IOM) port channeling is not possible.  With the latest HW (6200 and 2200) you can create port channels with all the IOM - FI server links.  This is not configurable.  You either tell the system to use Port Channel or Individual Links.  The major bonus of using a Port Channel is losing a link doesn't impact any pinned interfaces - as it would with individual server interfaces.  To fix a failed link when configured as "Individual" you must re-ack the Chassis to re-pinn the virtual interfaces to the remaining server uplinks.  In regards to 1000v uplinks - the only supported port channeling method is "Mac Pinning".  This is because you can't port channel physical interfaces going to separate Fabrics (one to A and one to B).  Mac Pinning gets around this by using pinning so all uplinks can be utilized at the same time.--[Robert] The VSM doesn't participate in STP so it will never send BPDU's.  However, since VMs can act like bridges & routers these days, we advise to add two commands to your upstream VEM uplinks - PortFast and BPDUFilter.  PortFast so the interface is FWD faster (since there's no STP on the VSM anyway) and BPDUFilter to ignore any received BPDU's from VMs.  I prefer to ignore them then using BPDU Gaurd - which will shutdown the interface if BPDU's are received.-Are you thinking of the upstream switch here (Nexus, Catalyst) or the N1kV uplink profile config?[Robert] The two STP commands would be used only when the VEM (ESX host) is directly connected to an upstream switch.  For UCS these two commands to NOT apply.

  • VTP Pruning vs Allowing VLANs on Trunk ports

    We would like to know best approach to reduce VLAN traffic on our network. We are currently trunking all fiber ports 802.1q.
    We have about 73 VLANs across the network. We have done a lot of research and there seem to be a lot of theoretical answers but no one who uses it in practice.
    Here is our current configs for fiber ports between closets:
    Cisco WMH6509
    interface GigabitEthernet2/8
     description Fiber To STB Lab 3850
     switchport
     switchport trunk encapsulation dot1q
     switchport mode trunk
     no ip address
     no snmp trap link-status
    end
    Cisco STB Lab 3850
    interface GigabitEthernet1/1/1
     description Fiber To WMH6509
     switchport mode trunk
    end
    We are considering:
    VTP Pruning Enable
               or
     switchport
     switchport trunk encapsulation dot1q
     switchport trunk allowed vlan 26,99,109,188
     switchport mode trunk
    Thanks,
    Tom

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of   the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    As I have some years (cough - decades) software development experience, I lean toward automation solutions, so, for example, I often prefer dynamic routing over static routing, and so likewise, I prefer VTP over manual configuration on multiple devices.
    However, VTP does have some "quirks".  For example, this year I ran into an issue where an edge switch had a new VLAN defined to a port which wasn't in use on a transit switch, so VTP auto pruning, pruned it off the transit's uplink trunk.  (I was a bit of a pain to find the cause as VTP doesn't prune right away - edge worked for a bit and then it stopped working.  One fix would have been to stop using VTP auto-pruning, across the whole VTP domain, but instead, configured VTP to not auto-prune the needed VLAN across the needed trunk.)
    So, as Paul notes, VTP auto pruning might be easier to get going, but be prepared for unexpected incidents (again, not saying you'll have any, just be prepared).  So, if you're prepared, I would go with VTP auto pruning, but if you want to "play safe", go with Paul's recommendation.

  • 897VAW: Cannot add Allowed vlans to Trunk on WLAN-GigabitEthernet interface

    Hi,
    I am trying to configure the Access Point module on my Cisco Router (897AVW), however I am unable to route / ping between the router and the AP.
    In a few examples I've seen, the wlan-GigabitEthernet interface has the command:
    switchport trunk allowed vlan 1-3,1002-1005
    or
    switchport trunk native vlan 2
    I have tried both and although the router doesn't error, show-ing the config, neither commands have taken.
    Is there something I am doing wrong or is this a bug in the IOS?
    To save making this post long, my latest running configs are on my blog:
    Router: http://www.thingsgeeky.walker.uk.com/?p=3781
    AP: http://www.thingsgeeky.walker.uk.com/?p=3781
    Many Thanks
    W.

    Hi,
    I am trying to configure the Access Point module on my Cisco Router (897AVW), however I am unable to route / ping between the router and the AP.
    In a few examples I've seen, the wlan-GigabitEthernet interface has the command:
    switchport trunk allowed vlan 1-3,1002-1005
    or
    switchport trunk native vlan 2
    I have tried both and although the router doesn't error, show-ing the config, neither commands have taken.
    Is there something I am doing wrong or is this a bug in the IOS?
    To save making this post long, my latest running configs are on my blog:
    Router: http://www.thingsgeeky.walker.uk.com/?p=3781
    AP: http://www.thingsgeeky.walker.uk.com/?p=3781
    Many Thanks
    W.

  • VLANs and Trunking

    Okay, I know this is not strictly a Cisco question as the switches in question are HP ProCurve 2524's, but hopefully I'll be granted a pardon for that. I'm trying to create a network with two VLANs who don't speak to each other but can each access the internet on their own through a Cisco 1721 router. I know I need to set up two different VLANs on the network and that I'll set up access-lists and subinterfaces on the one fast ethernert interface on the router. But here's the real question: the network I need to keep separate is all on switch 3. So obviously, I put every port on that switch on VLAN 2. Now, switch 3 goes to port 0/24 on switch 2. So I put interface 0/24 on switch 2 into VLAN 2 as well, and make switch 2's uplink, port 0/25 a trunking port. Here's the problem though: switch 2 is connected to switch 1, which is connected to the router. Obviously I can't make that incoming port on switch 1 part of VLAN 2, since some traffic from VLAN 1 will be coming through it! Do I simply set up switch 1's uplink port to do trunking and leave it at that, or is there some sort of strangeness I need to do in order to get switch 1 to pass along traffic from both VLAN 1 and VLAN 2 to the router?

    I think you've got the right idea there. Configure the interface between the router and switch1 as a trunk interface. Then, create ethernet sub-interfaces on the 1721 for both of the VLANs. If you don't want inter-vlan traffic between the VLANs, create appropriate ACLs on these two sub-interfaces.
    That should do it.
    Hope that helps - pls rate the post if it does.
    Paresh

  • How to add VLAN to trunk port on Cisco SF200-24

    Hello All,
    I have question want to ask: 
    I have Cisco switch SF200-24 I want to configuration VLAN as below:
    Port 1 to 10 = Vlan 100
    Port 11 to 21 = Vlan 200
    Port 22 to 24 = Vlan 300
    Port GE1 = Trunking (Primary)
    Port GE2 = Trunking (Secondary)
    How to add all VLAN 100, 200, 300 go through Trunking Primary and Secondary?
    Which port can I connect for management switch?
    Thanks 

    > How to add all VLAN 100, 200, 300 go through Trunking Primary and Secondary?
    firstly set those ports as trunks via "VLAN Management" -> "Interface settings" - click on corresponding port, click on "edit.." button and select "Trunk" from list.
    Once those ports (GE1 and GE2) are as trunks, you can now assign them all desired VLANs via "VLAN Management" -> "Port VLAN Membership". Select first port (GE1), click "join VLAN" and select all desired VLANs from left list and put them to right list.
    and you are done.
    > Which port can I connect for management switch?
    by default, switch management IP is a part of default VLAN1. If you wanted to keep access to your switch, assign "VLAN1" to one of access ports, or change management VLAN to different number than 1 - but in this case dont forget to apply correct IP settings in order to meet subnet assigned in new VLAN.

  • Missing Allowed vlans on trunk on Standby ACE.

    Guys,
    I would like to know if allowing vlans under portchannel will replicate on standby unit.Somehow I see all configuration is sync except  switchport trunk allowed vlan under Portchannel.             
    Thanks
    Ajay

    Hi Siva,
    I remove 3rd port from port channel but still vlans are not getting sync.
    ACE1/Admin# sh vlan
    Vlans configured on physical port(s)
    vlan3001  vlan3060  vlan3200-3201  vlan3208  vlan3260-3262  vlan3264-3265  vlan3270-3272  vlan3274-3275  vlan3280  vlan3300-3302  vlan3650-3652  vlan3661-3663  vlan3668-3669  vlan4090
    ACE1/Admin#
    ACE2/Admin# sh vlan
    Vlans configured on physical port(s)
    vlan3001  vlan3200-3201  vlan3208  vlan3260-3262  vlan3264-3265  vlan3270-3272  vlan3274-3275  vlan3300-3302  vlan3650-3652  vlan3661  vlan3668-3669  vlan4090
    ACE2/Admin#
    ACE1/Admin# sh ft group status
    FT Group                     : 1
    Configured Status            : in-service
    Maintenance mode             : MAINT_MODE_OFF
    My State                     : FSM_FT_STATE_ACTIVE
    Peer State                   : FSM_FT_STATE_STANDBY_HOT
    Peer Id                      : 1
    No. of Contexts              : 1
    Running cfg sync status      : Running configuration sync has completed
    Startup cfg sync status      : Startup configuration sync has completed
    ft peer 1
      heartbeat interval 300
      heartbeat count 10
      ft-interface vlan 4090
      query-interface vlan 3001
    ft group 1
      peer 1
      no preempt
      priority 150
      associate-context Admin
      inservice
    any suggestion/ next steps to troubleshoot ?
    Thanks
    Ajay

  • Private Vlans and trunk mode

    if we have a primary vlan 100 associate with it
    vlan 11 over {fa0/2 work as host mode} , vlan 12 over {fa0/3 work as host mode} they work as secondry community vlan
    and vlan 13 as isolated secondry vlan over {fa0/4 host mode}
    How we can route between private vlans 11,12,13 and {vlan 50 fa0/5 access mode}
    cloud we use the fa 0/1 which connected to L3 device as promiscouous mode and trunk mode at the same time or what ... ??
    and

    Private vlan's are all on the same subnet, so from what you are writing I see:
    100-------------------------------
    | | |
    | | |
    11 12 13
    Fa0/2 fa/03 fa0/4
    and you want to route to Vlan 50, correct?
    In that case you need to trunk vlan 100 to a vlan interface and make sure that vlan 50 also has a routed interface on the same device.

Maybe you are looking for

  • Variable filename and folder in receiver cc

    Dear experts, On PI, I need to create a (text-) file with a variable name and folder. The scenario is as follows: idoc-> PI -> txt file In my incoming Idoc I get the following data: - directory where the txt file should be saved; - name that the txt

  • My iPhone 4 stops after playing one song on any playlist after updating to IOS 5

    Hi all. I just upated my iphone to IOS 5 and my music playlists will only play one song, or a few songs and stop even when hundreds of songs are listed on that playlists. The top arrows allowing to enable "repeat playlist" or "repeat one song" work b

  • I Often get  Deployment Errors is it necessary to reinstall every time JSC2

    Hi i am using JSC2 update 1, but i am not satisfied with this IDE, Because it often shows deployment error when i run my application and really it irritates me. Till Now i have downloaded and reinstalled it for Five times but it still showing errors.

  • Vectors in Illustrator, versus CAD and GIS programs

    I like that Illustrator can handle .dwg files, so I don't have to restart to windows as often. However, I've found that Illustrator's ability to handle large files, especially imported .dwg files is really, really, ridiculously slow. Compared to Auto

  • Routine  rule type in transformations

    Hello Experts, Can some one throw light on <b>Routine</b> as a rule type in transformations featured in BI 7.0. All mention some scenarios. Thanks in advance. Regards, KS