Multiple VLANs over 1300 series bridges

Hi
I am looking to connect a small external building to a main campus building by wireless bridge. The building i want to connect currently has two vlans, can the 1300 series bridges carry multiple vlans over the wireless bridge link? If so can anyone point me towards s document that explains it?
Many thanks
Simon

Hi Simon,
Yes they can, here is a link, i hope it helps you, look at the "Bridge configuration" title.
http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801d0815.shtml
Regards,
Milton Tizoc.

Similar Messages

  • Native VLAN over 1300 bridge

    Does the BVI interface work on the native VLAN or always on VLAN1 on a 1300 bridge? If I set a VLAN other than VLAN1 for native will that move the BVI to that VLAN?
    Also, does the native vlan have to match at both ends or does it only have local significance? If I had a point to multipoint bridge link, could one remote bridge be set for a different native vlan than another remote bridge?
    I have a bridge link that carries two data vlan's and a voice vlan. At the remote end I only have a phone connected to the bridge directly and have configured the phone to be on the correct voice vlan but I need the computer to access a vlan other than the native. I know I cannot configure the phone to have the PC use the proper vlan as it just uses what the bridge tells it is the native.
    All network equipment is managed in the vlan1, the native vlan, and user data is on another vlan.
    Seth

    You cannot configure multiple VLANs on repeater access points. Repeater access points support only the native VLAN.

  • Multiple VLAN's and -A- Bridging on AP1240AG, ver123-8.JA2

    We have a detached building to bridge to. Using the latest JA2 software, configured the A-Radio on the WLAN side as a root bridge, and in the detached building the A-Radio as a non-root bridge. A Cisco 3500 switch resides at both ends connected via BVI1. The switch ports are trunked. VLAN 64 is native. VLAN 172 is IPVoice (7920 B Radio). We only want the two VLAN's but maybe 3 SSID's (inside, bridge, phone). Want to use VLAN 64 to bridge on the A side and provide IP access on the G side. Want to use VLAN 172 for voice only on the G side. Can't get it to work properly where I can ping the switch on the non-root side without using a telnet session from the the non-root AP. Need a working config segment for Interface DotRadio1 (both ends). MAC or WEP encryption both acceptable on the bridge configuration.

    We have a detached building to bridge to. Using the latest JA2 software, configured the A-Radio on the WLAN side as a root bridge, and in the detached building the A-Radio as a non-root bridge. A Cisco 3500 switch resides at both ends connected via BVI1. The switch ports are trunked. VLAN 64 is native. VLAN 172 is IPVoice (7920 B Radio). We only want the two VLAN's but maybe 3 SSID's (inside, bridge, phone). Want to use VLAN 64 to bridge on the A side and provide IP access on the G side. Want to use VLAN 172 for voice only on the G side. Can't get it to work properly where I can ping the switch on the non-root side without using a telnet session from the the non-root AP. Need a working config segment for Interface DotRadio1 (both ends). MAC or WEP encryption both acceptable on the bridge configuration.

  • VoIP and Data over 1300 Bridge

    I have a customer who wants to link 5 out buildings back to the main network. I have proposed using the new 1300 series bridges and have already verified clear line of site from the root location to all remotes.
    The customer wants to run VoIP and data on the links. They expect about 3 phones and 3 computers at each location. Each location will have a 3500 series switch powering the 7940 phones.
    Is there a maximum number for running the VoIP of a multipoing bridge setup?
    I know I will need to setup QoS on the bridges. I just cannot find any documentation to support this setup.
    Seth

    Thsi document should help explain the Quality requirements for Wireless devices,
    http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_guide_chapter09186a00802091be.html

  • Bridging(1300 series)

    Hi I'm Serge and i configured 2 Cisco 1300 series bridges for Point 2 Point connectivity.
    The lattency on the link has an average of 3 ms.
    Signal strength of:77 dbm
    the connectivity fro both side is good as ping test.
    But when i put some data in trasnfer it take too much time.
    i trasferd a file of 16.5 MB in about 7 mn.
    pls help me find a solution about that radio link asap.
    thx!

    I had a lot of Interferance @ the site and pls make sure the transfer rate is on default for better throughput if u have some kinda interferance. Thx
    Sergent_02

  • 1300 Series at 100 mW

    Kindly advise what part number of 1300 Series bridge should I order to have maximum 100 mW power output in .11b mode. I intend to use external antennas.

    Hi Alexei,
    All power levels are subject to country standards. The "E" model access points are set to European standards, which I believe restrict 802.11b to 17dB (50mW).
    I apologize for assuming you were in the Americas. Assuming now that you're in Europe, you won't be able to order an "A" access point. Or at least, you can order it, but you can't legally use it at full power :)

  • 1300 Series Access Point/Bridge Power Injector - Using power over ethernet

    Can I use power over ethernet to supply the Injector with power?

    Hi Mikael,
    Sorry, this will not work. Have a look at these specs;
    1300 Series Power
    Power
    The access point/bridge receives inline power from the Cisco Aironet Power Injector (hereafter called the power injector). Dual-coax cables are used to provide Ethernet data and power from the power injector to the access point/bridge. The power injector is an external unit designed for operation in a sheltered environment, such as inside a building or vehicle. The power injector also functions as an Ethernet repeater by connecting to a Category 5 LAN backbone and using the dual-coax cable interface to the access point/bridge.
    The power injector is available in two models:
    Cisco Aironet Power Injector LR2 standard version (included with the access point/bridge)
    48-VDC input power
    Uses the 48-VDC power module (included with the access point/bridge)
    Cisco Aironet Power Injector LR2T optional transportation version
    12- to 40-VDC input power
    Note The power injector and the power module must not be placed in an outdoor unprotected environment. The power module must not be placed in a building's environmental air space, such as above a suspended ceiling.
    http://www.cisco.com/en/US/products/ps5861/products_installation_guide_chapter09186a008079b93b.html#wp1051840
    Dual coaxial cable to run from the power injector to the 1300. See attached notes:
    Cisco Aironet 1300 Series
    Cisco Aironet 1300 Series Access Point/Bridge Power Injector
    The Cisco Aironet 1300 Series Outdoor Access Point/Bridge Power Injector,converts the standard 10/100 BaseT Ethernet interface that is suitable for weather protected areas to a dual F-Type connector interface for coax cables that are more suitable for harsh outdoor environments. The Power Injector also provides power to the outdoor unit over the same cables with a power discover feature and surge protection. To support longer cable runs from your wireless network switch or router, the Power Injector LR is designed to accommodate up to a 100 meter coaxial cable run plus 100 meters of indoor cat5 cable?enabling total cable runs up to 200 meters. The Cisco Aironet 1300 Series Outdoor Access Point/Bridge ships with the Power Injector LR2 and an AC power supply.
    From this link:
    http://www.cisco.com/en/US/products/ps5861/products_data_sheet09186a008022551d.html
    Cisco Aironet 1300 Series Outdoor Access Point/Bridge Hardware Installation Guide
    Ethernet Ports
    The access point/bridge dual-coax Ethernet ports consists of a pair of 75-ohm F-type connectors, linking the unit to your 100BASE-T Ethernet LAN through the power injector. The dual-coax cables are used to send and receive Ethernet data and to supply inline 48-VDC power from the power injector to the access point/bridge.
    From this link:
    http://www.cisco.com/en/US/products/ps5861/products_installation_guide_book09186a00804d3095.html
    AIR-PWRINJ-BLR2
    F-Type Connectors
    Dual coaxial cable carries full-duplex Ethernet, DC power, and full-duplex console port (RS-232 connection)
    From this link:
    http://www.cisco.com/en/US/products/ps5861/products_data_sheet09186a00802252e1.html
    Hope this helps!
    Rob

  • AP1300 Bridging Multiple Vlans with Dot1q

    I have a pair of AIR-BR1310G-E-K9 to do ptp bridging. Topology is like this:
    host-switch-rootAP---nonRootAP-switch-host
    We have multiple vlans and have followed this doco:
    <http://www.cisco.com/en/US/docs/wireless/access_point/1300/12.3_7_JA/configuration/guide/b37vlan.html>
    The native vlan is all good and can ping across end-to-end. However, the when I attach a host to the switch in another vlan i.e. user vlan - there is no connectivity. Essentially, we want to dot1q over the ptp bridge setup.
    running version:
    c1310-k9w7-mx.124-10b.JA1
    appreciate any input.
    Ajaz

    yes. standard trunk config on both switches:
    5SL_SWITCH#srif 0/24
    Building configuration...
    Current configuration : 186 bytes
    interface FastEthernet0/24
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 1,100
    switchport mode trunk
    switchport nonegotiate
    spanning-tree portfast trunk
    end
    5SL_SWITCH#show interfaces trunk
    Port Mode Encapsulation Status Native vlan
    Fa0/24 on 802.1q trunking 1
    Port Vlans allowed on trunk
    Fa0/24 1,100
    Port Vlans allowed and active in management domain
    Fa0/24 1,100
    Port Vlans in spanning tree forwarding state and not pruned
    Fa0/24 1,100
    5SL_SWITCH#
    11SL_SWITCH#srif 0/24
    Building configuration...
    Current configuration : 186 bytes
    interface FastEthernet0/24
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 1,100
    switchport mode trunk
    switchport nonegotiate
    spanning-tree portfast trunk
    end
    11SL_SWITCH#show interfaces trunk
    Port Mode Encapsulation Status Native vlan
    Fa0/24 on 802.1q trunking 1
    Port Vlans allowed on trunk
    Fa0/24 1,100
    Port Vlans allowed and active in management domain
    Fa0/24 1,100
    Port Vlans in spanning tree forwarding state and not pruned
    Fa0/24 1,100
    11SL_SWITCH#
    furthermore the vlans exist in the db and when i trunk between the switches - I can ping the SVI's.
    Do you want me to post the AP config?

  • Encrypting Aironet 1410 bridge link using multiple VLANs

    I've looked at the documentation available for Aironet 1400 series, and still would like to see a single document showing an example of
    the best encryption/authentication available for bridge links using multiple VLANs.
    As I understand it, 1400 series can support WPA-PSK using AES, which would work for me.  I just can't picture how to integrate chapters 9 and 10 for the 'WEP and WEP Features' + 'Configuring Authentication Types' instructions.
    I'm looking either for an example config, or a step-by-step that did all steps consecutively.
    Thanks

    What doc are you refering to?  If you want to encrypt the link from root bridge to non-root bridge, then WPA/TKIP-PSK is what you should use.  Here is a link to how to setup your link ssid to WPA: http://www.cisco.com/en/US/docs/wireless/bridge/1400/12.2_15_JA/configuration/guide/p15auth.html#wp1044935
    Don't worry about the example they show on the WEP, just use the configuration from the above link for your encryption.
    Configuring a VLAN
    Configuring your bridge to support VLANs is a five-step process:
    1. Create subinterfaces on the radio and Ethernet interfaces.
    2. Enable 802.1q encapsulation on the subinterfaces and assign one subinterface as the native VLAN.
    3. Assign a bridge group to each VLAN.
    4. (Optional) Enable WEP on the native VLAN. <-- Use WPA-PSK
    5. Assign the bridge's SSID to the native VLAN.
    http://www.cisco.com/en/US/docs/wireless/bridge/1400/12.2_15_JA/configuration/guide/p15vlan.html
    Here is an example of vlan 1 (native) will be your management and your wireless link.  vlan 10 & 20 will pass through the link.
    BR# configure terminal
    BR(config)# interface dot11radio0.1
    BR(config-subif)# encapsulation dot1q 1 native
    BR(config-subif)# bridge group 1
    BR(config-subif)# exit
    BR(config)# interface fastEthernet0.1
    BR(config-subif)# encapsulation dot1q 1 native
    BR(config-subif)# bridge group 1
    BR(config)# interface fastEthernet0.10
    BR(config-subif)# encapsulation dot1q 10
    BR(config-subif)# bridge group 10
    BR(config)# interface fastEthernet0.20
    BR(config-subif)# encapsulation dot1q 20
    BR(config-subif)# bridge group 20
    BR(config-subif)# exit
    BR(config)# interface dot11radio0
    BR(config-if)# ssid batman
    BR(config-ssid)# vlan 1
    BR(config-ssid)# infrastructure-ssid
    BR(config-ssid)# end

  • Bridge with clients & multiple VLANs on 1242 AP

    Hi,
    I am trying to set up a test as per the attached diagram. I am looking to use 2x 1242 access points to bridge to a remote part of the network.
    I currently have 2 VLANs on the network, all network devices are on VLAN 1 for management and client access is on VLAN 2.
    What I am trying to achieve is to bridge between the two access points and also have clients connect to VLAN 2 on each access point.
    Firstly, are the 1242's capable of this or would I need to look at a 1300 Bridge?
    I have attached a copy of the base config I have on both AP's, the only difference between them is the root or non-root role.
    My bridge link currently works and I can ping across it on VLAN 1 but I cannot get a client to connect to the SSID on VLAN2. Although the SSID is set to guest mode I cannot see it being broadcast and if I manually try and connect nothing happens.
    Is there anything basic I am missing here or can anyone offer advice on bridging multiple VLANs with 1242 AP's?
    Thanks,
    Paul

    Ooops....forgot to add the attachments first time.
    Thanks,
    Paul.

  • Bridging multiple VLAN with sg 200-08 and wap321

    Hi all
    Equipment:
    ASA 5505
    2x gs 200-08
    2x wap321
    Is there a possibility, to bridge 2 VLAN between one and another side with two WAP 321 and use the AP's also as WDS Bridge to extend the Wireless Network?
    I need to extend the Range of the WLAN but also want to use 2 different VLAN on both sides of the network. There is no Possibility to establish a wired Connection, so i try to use the AP's in "workgroup bridge" mode, but i always can use only one VLAN on the other side.
    Thanks for any help

    Hi Luis
    The Problem is, there is no wired connection between the WAP321.
    The topology is like this:
    VLAN1------ASA5505--  --SG200-08---------WAP321             WAP321--------SG200-8-------VLAN1
                                                 I                                                                                                 I
    VLAN2---------------------------                                                                                               -----------VLAN2
    VLAN1 and VLAN2 are also available in the WLAN on 2 Different SSID's:
    SSID: inside -> VLAN1
    SSID: outside -> VLAN2
    If i understand the Cluster mode right,there is a wired connection required between the WAP321 .
    In meantime i tried to connect the WAP321 over WDS, but always only VLAN1 is available on the "right" side of the Network.
    Is there a Possibility, to Bridge multiple VLAN's over a WDS connection?
    Best Regards
    Dominique

  • 1300 series as Bridge and AP both

    Any idea if 1300 series is bridging with another 1300 with integrated antennas on both the end, how would be the performance of it if used for AP mode as well as it works both ways.

    Configuring access points and bridges to treat a workgroup bridge as a client device allows more workgroup bridges to associate to the same access point, or to associate using an SSID that is not an infrastructure SSID. The performance cost of reliable multicast deliveryduplication of each multicast packet sent to each workgroup bridge limits the number of infrastructure devices, including workgroup bridges, that can associate to an access point or bridge. To increase beyond 20 the number of workgroup bridges that can associate to the access point, the access point must reduce the delivery reliability of multicast packets to workgroup bridges. With reduced reliability, the access point cannot confirm whether multicast packets reach the intended workgroup bridge, so workgroup bridges at the edge of the access point's coverage area might lose IP connectivity.
    When you treat workgroup bridges as client devices, you increase performance but reduce reliability. You use the no infrastructure client configuration interface command to configure access points and bridges to treat workgroup bridges as simple client devices. This is the default setting.

  • Create VLAN over 1310 Bridges

    How can i create Differents VLANs on 1310 Root bridge and pass the VLAN info to the non root bridge wirelessly.
    Currently my switch ports are configured as access port for the bridges and if i make the port a trunk port; siwtch connected to the non root bridge stops communicating. Any help will be appreciated.
    Thanks,
    Osman

    Check out this link:
    http://www.cisco.com/en/US/docs/wireless/access_point/1300/12.3_7_JA/configuration/guide/b37vlan.html

  • Catalyst series - Private VLAN over trunk

    Hey every body
    I was planning to implement a Cisco Nexus 5596 in a data center as it supports private VLAN over trunk.
    But now, I av been forced to use a Cisco Catalyst series instead of the Nexus one.
    Based on the feature that is very important for my manager (private VLAN over trunk), which Catalyst switch can be replaced with the Nexus 5596? In other words, what Catalyst series switch works at the same scale and efficiency of Nexus 5596 and supports private VLAN over trunk feature?
    Cheers

    4500x Yes
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_26674-01.html
    Nexus 5k Yes
    http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/layer2/521_n1_3/b_5k_Layer2_Config_521N13/b_5k_Layer2_Config_521N13_chapter_0100.html
    3850s
    They dont support pvs at all yet
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/vlan/configuration_guide/b_vlan_3se_3850_cg/b_vlan_3se_3850_cg_chapter_0100.html
    Restrictions for VLANs
    The following are restrictions for VLANs:
    The switch supports per-VLAN spanning-tree plus (PVST+) or rapid PVST+ with a maximum of 128 spanning-tree instances. One spanning-tree instance is allowed per VLAN.
    The switch supports IEEE 802.1Q trunking methods for sending VLAN traffic over Ethernet ports.
    Configuring an interface VLAN router's MAC address is not supported. The interface VLAN already has an MAC address assigned by default.
    Private VLANs are not supported on the switch.
    You cannot have a switch stack containing a mix of Catalyst 3850 and Catalyst 3650 switches.

  • Vlan over wireless bridge with internet sharing?

    Hi Community, my first post here, hoping somebody may be able to advise...
    I live on a farm which is too far for broadband but fortunately I also have an office in a nearby town and because I have line of sight I have setup a wireless bridge, this gives me 8 MBits which is wonderful. Some of my equipment, for example a NAS is on the farm, and I need to access them from the office via the wireless link and I occasinally use vnc to access my office desktop from the farm. This all works beautifully.
    Ok. now I want to share my internet with my neighbor on the farm, who, in a strange twist also rents an office next to mine downtown, so I would like to give him access to the internet and to his equipment he has there too.. but I don't want him to be able to access my equipment and visa versa I don't want to see his stuff...
    This sounds like a job for port based VLAN.. and so what I bought is two Linksys/Cisco SLM2005 layer2 switches in the hope that this would allow me to do what I want... but I'm not so sure now. In the office I use a draytek v2910 which has a vlan feature that allows me to separate the ports from each other, only giving them internet access.
    So... if I connect these two switches to each other, and I create a VLAN with the same id on each of the switches, will the corresponding vlans be shared, so, if you assume the following hardware setup:
    farm: slm2005 switch
    port 1 -> wireless bridge to office: member of vlan "2", "3"
    port 2 -> access point A for neighbor: member of vlan "2"
    port 3 -> my own access point B: member of vlan "3"
    office: slm2005 switch
    port 1 -> wireless bridge to farm: member of vlan "2", "3"
    port 2  -> access point C for neighbor: member of vlan "2"
    port 3 -> my access point for office D: member of vlan "3"
    port 4 -> router port 1: member of vlan "2"
    port 5 -> router port 2: member of vlan "3"
    the router (draytek v2910) is configured in such a way to separate port 1 and port 2 (otherwise there would be a loop...)
    The idea here is to create a vlan "2" for my neighbor and "3" for myself. but what's the correct way to consider the wireless bridge inbeetween (in fact, I think the same problem would occur if I just connected the two switches with a cable (if i had a 2 mile long one..)...)
    Will my neighbor be able to see both access points "A" and "C" and the internet, but not be my access points "B" and "D"? Or does this whole concept of VLAN over bridge not work like this, or not at all?
    Thanks in advance for any advice,
    Andres

    Hi Andreas,
    you're not far from it.
    Your whole concept is ok. What you just need is on the gateway of each subnet (I would presume it's the router in the office) to create an access list preventing to route between vlan 2 and 3.
    On all other devices,  traffic can't jump between vlans. But on a routing device that has the Vlan layer3 interfaces, traffic is routed between vlans so that's where you need to prevent it.
    With regards to vlans over wireless, you're also having the good concept. The point is to have only 1 ssid, that will be in a certain vlan, but also bridging the other vlans onto that ssid.
    This doc should help you out :
    http://www.cisco.com/en/US/partner/products/hw/wireless/ps4570/products_configuration_example09186a00801d0815.shtml#vlanbr
    HTH,
    Nicolas
    Thanks to rank the answer if you see it as useful !

Maybe you are looking for