Vlan Trunking issue

Hi,
I need some help setting up  L3 Cisco 3560 for my VM lab. I have setup a few vlans and at this point I am trying to test out routing and connectivity. I came across with two issues and I am trying to get good advise from the experst since I am not
The Cisco 3560 is directly connected to my home router gi0/4 192.168.10.0/24 which would be my internet connection. The home router default gateway is 192.168.10.1.
I created Vlan192 on the 3560 to interact with the home router and get me to the outside world from the core. Obviously I'm doing something wrong here and came across 2 issues.
1- I tried setting Fas0/2 as trunk port and using the vlan226 on my pc but it wont work when I set this to my computer. It wont route to all vlans and I am not able to ping this 10.23.226.9 address from the 3560. The only way this works for me is if I set the IP to the 192 range which is my native Vlan, but anything other from 192 wont route.
PC IP address
10.23.226.9
255.255.255.0
10.23.226.254
Fas0/2 configurartion
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 192,224-229
switchport mode trunk
Please see my entire config below and maybe you can help since I am not an expert on this.
zeus-sw1#sh run
Building configuration...
Current configuration : 5364 bytes
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname zeus-sw1
boot-start-marker
boot-end-marker
no logging console
enable secret 5 $1$E9/L$UAOdxa6S.6QT52G2Lgcll0
enable
username admin1 privilege 15 secret 5 $1$hlCW$laTgSRIXF2LnZO.wyd0k0/
aaa new-model
aaa session-id common
system mtu routing 1500
vtp mode transparent
ip routing
crypto pki trustpoint TP-self-signed-13407744
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-13407744
revocation-check none
rsakeypair TP-self-signed-13407744
crypto pki certificate chain TP-self-signed-13407744
certificate self-signed 01
  3082023D 308201A6 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
  2F312D30 2B060355 04031324 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 31333430 37373434 301E170D 39333033 30313030 31393031
  5A170D32 30303130 31303030 3030305A 302F312D 302B0603 55040313 24494F53
  2D53656C 662D5369 676E6564 2D436572 74696669 63617465 2D313334 30373734
  3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 8100BC82
  4A857145 B3984EBF ED1553C2 E23AF1CF 60B5CB00 96984A72 CEC9F4CC 09CA7B8D
  7416102A E630D17C 66716B57 DF7991AB 87DE6EBD DADE5539 F0278510 70BE7391
  F2EC292D DF0C707A 70083E80 D19F4D3D 31462E89 5EE310EE 4976F764 AB1592C1
  2A8EE610 C3B11D76 252568A7 2AE260B7 4C9141AB C8358A4A B76B94BF 6E970203
  010001A3 69306730 0F060355 1D130101 FF040530 030101FF 30140603 551D1104
  0D300B82 097A6575 732D7377 312E301F 0603551D 23041830 16801487 8F7A7E29
  112BA5CC 42E2E9E0 0A9C5ACF 6CCBD330 1D060355 1D0E0416 0414878F 7A7E2911
  2BA5CC42 E2E9E00A 9C5ACF6C CBD3300D 06092A86 4886F70D 01010405 00038181
  0059DAD2 5601B324 2B1E4143 9CE67677 45100C44 DC21364D 175CB8F2 178B0EBC
  D39D603F 8F896ADB 4CEEA493 13D8C028 F805F67B 9C7D6BA4 D195B7F3 FEED6763
  F03F4575 B768C6FB 9A783232 DCC60120 9F72B78C 9B5C1B7A FD1C78D7 A3DF7BFE
  483E46E6 7CA84A6C 95F37C63 BEA804F9 E535520E 629AE46E 0752BE69 42781471 21
  quit
spanning-tree mode pvst
spanning-tree extend system-id
vlan internal allocation policy ascending
vlan 192
name NativeVlan
vlan 224
name iSCSI
vlan 225
name ESX_MGMT
vlan 226
name VM_SERVERS
vlan 227
name VMOTION
vlan 228
name VIEWDESKTOPS
vlan 229
name VCLOUD
lldp run
interface FastEthernet0/1
interface FastEthernet0/2
switchport trunk encapsulation dot1q
switchport trunk native vlan 192
switchport trunk allowed vlan 192,224-229
switchport mode trunk
interface FastEthernet0/3
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface FastEthernet0/25
interface FastEthernet0/26
interface FastEthernet0/27
interface FastEthernet0/28
interface FastEthernet0/29
interface FastEthernet0/30
interface FastEthernet0/31
interface FastEthernet0/32
interface FastEthernet0/33
interface FastEthernet0/34
interface FastEthernet0/35
interface FastEthernet0/36
interface FastEthernet0/37
interface FastEthernet0/38
interface FastEthernet0/39
interface FastEthernet0/40
interface FastEthernet0/41
interface FastEthernet0/42
interface FastEthernet0/43
interface FastEthernet0/44
interface FastEthernet0/45
interface FastEthernet0/46
interface FastEthernet0/47
interface FastEthernet0/48
interface GigabitEthernet0/1
interface GigabitEthernet0/2
switchport trunk allowed vlan 192,224-229
interface GigabitEthernet0/3
interface GigabitEthernet0/4
description LINK SG200 UNTAGGED
switchport trunk encapsulation dot1q
switchport trunk native vlan 192
switchport trunk allowed vlan 192,224-229
switchport mode trunk
interface Vlan1
no ip address
interface Vlan192
ip address 192.168.10.254 255.255.255.0
interface Vlan224
description iSCSI
ip address 10.23.224.254 255.255.255.0
interface Vlan225
description ESX
ip address 10.23.225.254 255.255.255.0
interface Vlan226
description VM_SERVERS
ip address 10.23.226.254 255.255.255.0
ip helper-address 10.23.226.2
interface Vlan227
description VIEWDESKTOPS
ip address 10.23.227.254 255.255.255.0
interface Vlan228
description vCloudDir
ip address 10.23.228.254 255.255.255.0
interface Vlan229
description SERVERS
ip address 10.23.229.254 255.255.255.0
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.10.1
ip http server
ip http authentication local
no ip http secure-server
end

Glen,
Thanks for your advise. After changing the port as an access port I am able ping all vlans and my gateway from my home router 192.168.10.1, However a new issues came up. I am not able to get to the internet.
It seems it works from the 3560:
zeus-sw1#ping yahoo.com
Translating "yahoo.com"...domain server (255.255.255.255) [OK]
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 206.190.36.45, timeout is 2 seconds:
Success rate is 100 percent (5/5), round-trip min/avg/max = 76/94/134 ms
zeus-sw1#
It wont work from my pc:
Ethernet adapter Ethernet:
   Connection-specific DNS Suffix  . :
   Link-local IPv6 Address . . . . . : fe80::3d53:efc0:ea00:9bd2%3
   IPv4 Address. . . . . . . . . . . : 10.23.226.9
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 10.23.226.254
Tunnel adapter Teredo Tunneling Pseudo-Interface:
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
Tunnel adapter isatap.{461494F6-EA41-42CC-8B0A-B5BD2D8097DA}:
  Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
C:\Users\user1>ping google.com
Ping request could not find host google.com. Please check the name and try agai
.C:\Users\user1>ping 14.2.2.2
Pinging 14.2.2.2 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 14.2.2.2:
    Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),

Similar Messages

  • VLAN trunking from Cisco Catalyst 3750 to Cisco SF300-48P issue and related

    Hello expert,
    I'm having difficulties to configure VLAN trunking between Cisco Catalyst 3750 switch with Cisco SF300-48P switch and my workstation unable to get any DHCP IP from our DHCP server via Cisco SF300-48P switch. Below is the snippet of configuration on both switches:
    [Cisco Catalyst 3750 Switch]
    interface GigabitEthernet1/0/45
     description NCC-CC-1stFlr
     no switchport trunk encapsulation dot1q
     no switchport trunk allowed vlan 101-103
     spanning-tree portfast
    [Cisco SF300-48P Switch]
    interface fastethernet48
     spanning-tree link-type point-to-point
     switchport trunk allowed vlan add 101-103
     macro description switch
     !next command is internal.
     macro auto smartport dynamic_type switch
    interface fastethernet29
     switchport mode general
     switchport general allowed vlan add 103 tagged
     switchport general pvid 103
    Are these are correct? Kindly advice!
    Thank you very much!
    Regards,
    Alex

    Hi Alex,
    for the trunk port on Catalyst on port GE 1/0/45, we need to enable the trunk and for on encapsulation dot1q because this catalyst model is ISL capable also and the SF300 working only with Dot1q Encapsultion
    The configuration on catalyst should :
    #config terminal
    #interface Gi 1/0/45
    # switchport encapsulation 
    #switchport trunk encapsulation dot1q
    #switchport mode trunk 
    #switchport trunk allowed vlan 101-103
    #spanning-tree portfast
    For SF300 the port trunk it looks fine but for the port where the PC should receive an IP address
    #interface fastethernet29
     #switchport mode access
     #switchport ccess vlan 103
    Please let me know after this configuration
    Thanks
    Mehdi
    Please rate or mark as answered to help other Cisco Customers

  • Trunking issue with autonomous AP

    I was at a customers that wanted a new ssid configured on his 20 1252 AP's and to stand up a new one with the olds and new SSID on it. Added the vlans, trunked them down and configured the interfaces and SSID's on the existing AP's no biggie. The new AP(not really new been kicking around in a lab) is giving me some weird issues. I deleted the exisiting config from it and took one of the running configs fromm the others that are working, modified the name and ip and pasted it in. This should have worked just fine. However the trunk port on the 4507 will not come up. The radio's are up and so is the BVI, however I cannot ping to it since the trunk is down. I started looking at the config and the thing I notice is that the AP's are in vlan 2, and the native vlan is set for vlan 2 on all the working trunk ports on the switch. However the AP's do not have vlan 2 on them, and their native vlan is 1. This should not work! I always thought the native had to match on both sides?? In any case I am probably missing something stupid, I have been up since 4am it was a 4 hour drive to get here. Oh and I have to go back and make firewall changes at midnight. Here is the relavent configs please let me know if its something stupid I usually do a lot of controller based installs havnet done a autonomous one in years. Thanks!
    Here is a port on the switch
    interface GigabitEthernet3/9
    description AP 1 - SMT
    switchport access vlan 2
    switchport trunk native vlan 2
    switchport trunk allowed vlan 2,9,15
    switchport mode trunk
    end
    Here is the AP hanging off that works fine
    cstwap01#sh vlans
    Virtual LAN ID: 1 (IEEE 802.1Q Encapsulation)
    vLAN Trunk Interfaces: Dot11Radio0
    Dot11Radio1
    GigabitEthernet0
    This is configured as native Vlan for the following interface(s) :
    Dot11Radio0
    Dot11Radio1
    GigabitEthernet0
    show run on the AP
    dot11 mbssid
    dot11 vlan-name VoIPVLan vlan 9
    dot11 vlan-name Wireless-101-Legacy vlan 15
    dot11 ssid 101
    vlan 15
    authentication open
    mbssid guest-mode
    dot11 ssid VoIPVLan
    vlan 9
    authentication open
    mbssid guest-mod
    bridge irb
    interface Dot11Radio0
    no ip address
    no ip route-cache
    ssid 101
    ssid VoIPVLan
    interface Dot11Radio0.9
    encapsulation dot1Q 9
    no ip route-cache
    bridge-group 9
    bridge-group 9 subscriber-loop-control
    bridge-group 9 block-unknown-source
    no bridge-group 9 source-learning
    no bridge-group 9 unicast-flooding
    bridge-group 9 spanning-disabled
    interface Dot11Radio0.15
    encapsulation dot1Q 15
    no ip route-cache
    bridge-group 15
    bridge-group 15 subscriber-loop-control
    bridge-group 15 block-unknown-source
    no bridge-group 15 source-learning
    no bridge-group 15 unicast-flooding
    bridge-group 15 spanning-disabled
    interface GigabitEthernet0
    no ip address
    no ip route-cache
    duplex auto
    speed auto
    bridge-group 1
    no bridge-group 1 source-learning
    bridge-group 1 spanning-disabled
    interface GigabitEthernet0.9
    encapsulation dot1Q 9
    no ip route-cache
    bridge-group 9
    no bridge-group 9 source-learning
    bridge-group 9 spanning-disabled
    interface GigabitEthernet0.15
    encapsulation dot1Q 15
    no ip route-cache
    bridge-group 15
    no bridge-group 15 source-learning
    bridge-group 15 spanning-disabled
    interface BVI1
    ip address 10.190.2.51 255.255.255.0
    no ip route-cache
    ip default-gateway 10.190.2.1

    Hello Mike,
    actually, native VLAN doesn't have to match on two sides of a trunk, in fact it's quite common with autonomous APs. Your BVI1 is usually tied to a native VLAN 1, but switch port native VLAN is usually configured for whatever VLAN you want AP's management IP to belong to, in your case VLAN 2.
    When you connect two catalyst switches together with a trunk that has different native VLAN configured on two sides, you will keep getting logging messages warning you about it. It's not recommended, but some scenarios require such setup.
    Something else is wrong, maybe a physical issue. When you say the trunk is down, do you mean the interface is down ? Can you paste config of bad switch port and bad AP?
    Regards,
    Roman

  • Vlan trunk problem

    Hi,
    Im configuring a vlan trunk between 2 switches but I'm having a problem somehow.
    Switch 1 a Cisco 3750G n
    name: alrswcc00
    interface GigabitEthernet1/0/28
     description Uplink Alrswcc20
     switchport trunk encapsulation dot1q
     switchport trunk allowed vlan 1-30
     switchport mode trunk
    end
    Name: Gi1/0/28
    Switchport: Enabled
    Administrative Mode: trunk
    Operational Mode: trunk
    Administrative Trunking Encapsulation: dot1q
    Operational Trunking Encapsulation: dot1q
    Negotiation of Trunking: On
    Access Mode VLAN: 1 (default)
    Trunking Native Mode VLAN: 1 (default)
    Administrative Native VLAN tagging: enabled
    Voice VLAN: none
    Administrative private-vlan host-association: none
    Administrative private-vlan mapping: none
    Administrative private-vlan trunk native VLAN: none
    Administrative private-vlan trunk Native VLAN tagging: enabled
    Administrative private-vlan trunk encapsulation: dot1q
    Administrative private-vlan trunk normal VLANs: none
    Administrative private-vlan trunk private VLANs: none
    Operational private-vlan: none
    Trunking VLANs Enabled: 1-30
    Pruning VLANs Enabled: 2-1001
    Capture Mode Disabled
    Capture VLANs Allowed: ALL
    Switch 2 a Cisco 2960S
    name: alrswcc20
    interface GigabitEthernet1/0/25
     description Uplink Alrswcc00
     switchport trunk allowed vlan 1-30
     switchport mode trunk
    end
    Name: Gi1/0/24
    Switchport: Enabled
    Administrative Mode: trunk
    Operational Mode: trunk
    Administrative Trunking Encapsulation: dot1q
    Operational Trunking Encapsulation: dot1q
    Negotiation of Trunking: On
    Access Mode VLAN: 1 (default)
    Trunking Native Mode VLAN: 10 (Inactive)
    Administrative Native VLAN tagging: enabled
    Voice VLAN: none
    Administrative private-vlan host-association: none
    Administrative private-vlan mapping: none
    Administrative private-vlan trunk native VLAN: none
    Administrative private-vlan trunk Native VLAN tagging: enabled
    Administrative private-vlan trunk encapsulation: dot1q
    Administrative private-vlan trunk normal VLANs: none
    Administrative private-vlan trunk associations: none
    Administrative private-vlan trunk mappings: none
    Operational private-vlan: none
    Trunking VLANs Enabled: 10,20,30,40
    Pruning VLANs Enabled: 2-1001
    Capture Mode Disabled
    Then lastly on switch 2 I created a port for an Ubiquiti access point with following settings.
    interface GigabitEthernet1/0/24
     switchport trunk native vlan 10
     switchport trunk allowed vlan 10,20,30,40
     switchport mode trunk
    end
    But my AP doesn't seem the get an IP. Where as if I plug it in on Switch 1 it does with the same settings.
    So I am assuming there is something wrong with my trunk. What am I doing wrong?
    Thank you,
    Michael

    Here are a couple of observations:
    1.  The switchport trunk encap dot1q command was not applied on the 2960 because 802.1q trunking is the default.  The 2960 series switches do not support ISL encapsulation, as the OP observed.  There is, therefore, no need to manually specify the trunking protocol.  The show int g1/0/24 switchport command confirmed that trunking is working.  I find the show int g1/0/24 trunk command to be more informative in this context.  It tells you what VLANs are active and trunking between the connection.
    2.  You do need to define VLANS 2-30 on your second switch. You can do so manually or you can configure VLAN Trunking Protocol (VTP).  VTP is your easiest bet.  Example config:
    Switch 1
    sw1(config)# vtp mode server
    sw1(config)# vtp version 2
    sw1(config)# vtp domain MY_DOMAIN
    sw1(config)# vtp password MySecret
    Issue a show vtp status  in priv exce mode to very your settings.
    Switch 2
    sw2# show vtp status
    Do this command FIRST and make sure that the configuration revision number is smaller than the revision number of SW1.
    VTP Operating Mode                : Client
    Maximum VLANs supported locally   : 255
    Number of existing VLANs          : 25
    Configuration Revision            : 174
    If config revision on SW2 is greater than config revision of SW1, then issue following command:
    SW2(config)# vtp domain bogus
    SW2(config)# vtp domain MY_Domain
    SW2(config)# do show vtp status
    Your config revision should go back to zero.
    Now issue the same commands on SW2. 
    SW2(config)# vtp version 2  (pretty sure that is default, but I issue it anyway)
    SW2(config)# vtp mode client (means you cannot define VLANs on this switch.  Most admins prefer that only one switch be capable of creating VLANs).
    SW2(config)# do sh vtp status
    The config revision was important because injecting a switch into your network that has a higher VTP revision can overwrite your existing VLAN database.  If that happens, chances are that most of your network traffic will cease to function as all of your access ports will be in a VLAN mismatch mode.

  • Does the 8540 support VLAN Trunking

    I would like to VLAN trunk four VLANs(8540 bridge-groups) from an 8540 switch router to a Cat 5000. I have not seen in Cisco's documentation anything that indicates that the 8540 supports VLAN trunking.

    8540 supports both ISL and 802.1q VLAN trunking
    http://www.cisco.com/univercd/cc/td/doc/product/atm/c8540/12_1/pereg_1/quick_cg/layer3.htm#39775

  • Encrypting vlan-trunk traffic between switches

    Hi,
    Can anyone guide me to some papers or other resources on how to encrypt traffic between 2 switches. The switchces will be connected with fiber and use dot-1q tagging. And I wan't to encrypt all of the trunked traffic.
    I was thinking of L2TP, but I haven't found any good description on how to implement this. I have two 3750 switches I thought I might use.
    Thanks for any input,
    Regards,
    Oyvind Mathiesen
    mnemonic
    Norway

    Hi,
    Thanks for the response. I had a look at MACsec and it looks good. I would have liked to employ something P2P though, to also limit the ammount of MAC addresses broadcasted on the "wire". But let me first give you an understanding of the task:
    We have two sites, connected via fibre and we want to create a VLAN trunk across and order to expand the broadcast domains to te other site.
    The IDIOT carrier, has a limitation on the number of MAC addresses they allow on the fibre service, 100.
    We also need to encrypt the datatraversing this connectivity.
    MACsec wuold work 100% exept the source and dstination MAC addresses are still sent (at least according to https://docs.google.com/viewer?a=v&q=cache:LEf2qOmYZyYJ:www.ieee802.org/1/files/public/docs2011/bn-hutchison-macsec-sample-packets-0511.pdf+&hl=en&gl=za&pid=bl&srcid=ADGEESgmAHXpDOY0RBAE-Rv1HDpu_C_gkeSPN4cv6NGgyP0M1aXVu0UqzCfxo8t_P41ep6J37k4OLKnjfp1M9hoTDHxY22WGz2h7yB7YRLyPvRUbGS8TICzvEMlG92xqbhy6RWFugmnj&sig=AHIEtbTfu0LQIJejdYidE6yzq4lpPifxjQ
    And that would cause me to eat into the 100 MAC limit.
    Ridiculous I know, but we are looking for an out-of-the-norm plan...
    Thanks

  • Cisco VLAN Trunking Protocol Vulnerability

    I have got a cisco 2821 model router with a c2800nm-advipservicesk9-mz.151-2.T4 IOS, and was reported with 'Cisco VLAN Trunking Protocol Vulnerability'.
    Though the device is in server mode, I do not have any domain name or trunk port configured.
    Is my device really vulnerable? If yes, whats next?

    Hi Alex,
    for the trunk port on Catalyst on port GE 1/0/45, we need to enable the trunk and for on encapsulation dot1q because this catalyst model is ISL capable also and the SF300 working only with Dot1q Encapsultion
    The configuration on catalyst should :
    #config terminal
    #interface Gi 1/0/45
    # switchport encapsulation 
    #switchport trunk encapsulation dot1q
    #switchport mode trunk 
    #switchport trunk allowed vlan 101-103
    #spanning-tree portfast
    For SF300 the port trunk it looks fine but for the port where the PC should receive an IP address
    #interface fastethernet29
     #switchport mode access
     #switchport ccess vlan 103
    Please let me know after this configuration
    Thanks
    Mehdi
    Please rate or mark as answered to help other Cisco Customers

  • VLAN Trunking and GVRP

    Decided we'd give the Cisco 300 series switches a try and see
    what we think about them compared to our Cisco Catalyst 2960 switches.
    I'm already stumped on setting up VLAN trunking between 4 switches. Do I have to manually setup all the VLAN's on each switch? I set them up on the first switch and was expecting GVRP would propagate them to the others like VTP.
    Denny

    Decided we'd give the Cisco 300 series switches a try and see
    what we think about them compared to our Cisco Catalyst 2960 switches.
    I'm already stumped on setting up VLAN trunking between 4 switches. Do I have to manually setup all the VLAN's on each switch? I set them up on the first switch and was expecting GVRP would propagate them to the others like VTP.
    Denny

  • How many VLANs supported via MACsec VLAN-trunk link?

    Hi,
    Any one know how many VLANs maximum allowed across a MACsec link between two C6500 with Sup2Ts or between two N7K respectively?
    As far as I know, C3750X has limitation of 8 VLANs, according to
    •Cisco TrustSec enforcement is supported only on up to eight VLANs on a VLAN-trunk link. If there are more than eight VLANs configured on a VLAN-trunk link and Cisco TrustSec enforcement is enabled on those VLANs, the switch ports on those VLAN-trunk links will be error-disabled.
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/15-0_2_se/configuration/guide/3750x_cg/trustsec.html
    Thanks,
    Cedar

    Hi,
    Any one know how many VLANs maximum allowed across a MACsec link between two C6500 with Sup2Ts or between two N7K respectively?
    As far as I know, C3750X has limitation of 8 VLANs, according to
    •Cisco TrustSec enforcement is supported only on up to eight VLANs on a VLAN-trunk link. If there are more than eight VLANs configured on a VLAN-trunk link and Cisco TrustSec enforcement is enabled on those VLANs, the switch ports on those VLAN-trunk links will be error-disabled.
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/15-0_2_se/configuration/guide/3750x_cg/trustsec.html
    Thanks,
    Cedar

  • VLAN trunk via MPLS

    Is it possible to run a VLAN trunk (DOT1Q) from a Central site to a remote over a MPLS connection?

    You can do that either by using dot1q tunnelling or port based EoMPLS. For a description of these two features, please refer to the following document:
    http://www.cisco.com/en/US/products/sw/iosswrel/ps5013/products_feature_guide09186a0080088187.html
    Hope this helps,

  • WRVS4400N VLAN trunking question

    Hi all,
    I just got a SRW224G4 today my main objective is to trunk 30 VLAN(s) to my WRVS4400N for interVLAN communication. So far I set G1 on my SRW as a trunk port and linked it to port 2 on my WRVS4400N (which is also set as a trunk).
    So far no good when I go into LAN settings I do not see an option wheree I can set DHCP addresses or gateways for these VLAN(s). Is this even possible with the WRVS4400N I meen if Linksys is going to provide a small business solution atleast their equipment should support VLAN trunking with each other.
    If anybody knows the solution to this please let me know.
    Cheers

    From what I know, although the WRVS4400N has support for port based VLAN setup, it does not give you the option to set different DHCP addresses for each of the 4 VLANS.

  • SG200 vlan trunking?

    Hello,
    does SG200 supoort VLAN Trunking?

    Hello, I think there is support:
    I found this site too which shows how to configure it: http://lachlanmiskin.com/blog/2012/08/01/cisco-sg-200-08-trunking/
    Cisco's datasheet says it supports tagging 802.1q.
    http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps11229/data_sheet_c78-667827.html
    Hope this helps.
    Please rate useful posts and remember to mark any solved questions as answered. Thank you.

  • VLAN trunking newbie SRW208MP to SRW2008MP

    Hello All,
    Just need a simple setup - 2 VLANs, a few ports each, on each unit, trunked together (ultimately on SFP module). Tried what seems to be right but (natch) not working. Just need simple guidelines to see where am going wrong. Thanks!

    OK, well, using that example, as well as another thread here (Cisco SLM224P
    VLAN TRUNKING), I reset and redid all the VLAN related settings.
    There are 2 subnets in play here -
    10.51.0.0/255.255.252.0 - VLAN 1 - Used as the Management VLAN.
    10.51.4.0/255.255.255.0 - VLAN 5 - A subnet for Wireless LAN POE connection and management.
    And 2 switches -
    198 is a SRW208MP, remote unit. will have single WAP and various devices.
    199 is a SRW2008MP, at head end near subnet(s) source. Will have up to 4 WAPs and the
    connections required to provide for both subnets.
    For purposes of discussion, the planned fiber SFP interconnect is being played by a copper trunk.
    Setups follow:
    198 VLANs-
    198 Port Setting-
    198 Ports to VLAN 1-
    198 Ports to VLAN 5-
    198 VLAN to Ports-
    Unit 2 - 199
    199 VLANs-
    199 Port Settings-
    199 Ports to VLAN 1-
    199 Ports to VLAN 5-
    199 VLAN to Ports-
    The configuration as posted does not provide the expected results.
    I am convinced I am overlooking something simple. Usually is!
    The net results are that the Management VLAN (1) is present and accounted for on both switches, but that could even be because they are acting as switches do.
    The VLAN 5, however, does not function at either end. The 'Local' switch, 199, shows traffic on the WAP ports but no traffic of any consequence is traversing and the WAPs are nonresponsive.
    Ditto Remote switch. Management VLAN yes, 5 VLAN no.
    Any suggestions greatly appreciated.

  • SRV3000 Trunking Issues

    Issue:
    Need some assistance configuring 3 aditional lines on my SRV3000, There are two lines that are working fine but when trying to add 3 new ones, It was unable for them to work.  Provider explained that this is a Trunking issue,  The three aditional lines  state they belong to  Trunk 9-DID Any suggestions?
    Thanks in advance.

    Hi Juan,
    Do you mean a Linksys One SVR3000?
    If so, this is a specialized services router that was designed to only work in the Linksys One environment registered to a Service Node.
    I can't offer any help with this device.
    Regards,
    Patrick

  • CE-500 VLAN trunks

    I have not been able to configure a VLAN trunk at a CE-500. I configure the port using CNA as router and specify the native VLAN, but I do not know where to specify the allowed VLANs. The port is connected to a Cisco Router with sub-interfaced configured. When I click on "modify" the smartport, an small windows quicky opens and closes, only leaving an option for the native VLAN. What am I doing wrong? How do I specify a port as a trunk port?
    Thanks a lot for the help.
    Juan S

    I believe you are aware of creating the standard Cisco IOS procedure for creating VLAN trunks.
    under the interface configuration mode, in which you need to create a trunk,
    switchport mode trunk
    switchport mode trunk encapsulation isl/dot1q
    switchport mode trunk native vlan
    switchport mode trunk allowed vlans
    But if you are already using these commands correctly, still you have the problem, I want you to let me know the following informations.
    1. What error message you receive at the console while implementing trunking?
    2. What is the other end device with which you are trying to establish trunk?.

Maybe you are looking for