Ihave a cisco 2950 catalyst switch with 24 ports. 10 of these ports belong to vlan 2 ( / 255.255.255.0) 10 of these ports belong to vlan 3 (10.0.1.0 / 255.255.255.0) the cat switch is connected to a 1721 router through a fastethernet interface. the router has two subinterfaces. 10.0.0.1 / 24 and 10.0.1.1 / 24 what else do I need to do so that all clients can reach each other and the
Since you have not included the router model, I will assume it is a Cisco router, something like an ISR with a built-in switch module. Some Cisco routers can have a built-in or optional, add-on switch modules. The interfaces for this module are switch interfaces, not router interfaces. You need to create VLAN interfaces to link the layer-2 switch to the layer-3 router. You configure the switch interfaces the same way that you do for a layer-2 switch. They are switch interfaces, not router interfaces, so you cannot configure layer-3 on those interfaces. That is where the SVIs come in. You assign a VLAN to each switch interface, and create an SVI for each VLAN. The SVIs get configured with the layer-3 information for the VLAN. The layer-3 addresses configured on the SVIs will be the gateways for the VLANs. The router will also have some router interfaces that get configured for layer-3. Routers will, by default, route everything between its layer-3 interfaces, including SVIs configured for layer-3. Let's assume you have eight switch interfaces GigabitEthernet0 - 7, and two router interfaces GigabitEthernet8 - 9, like a Cisco 892 router. There are two connections to other routers, and there are four VLANs two switch interfaces on each VLAN. The first eight interfaces are switch interfaces, and they are configured like a layer-2 switch. The last two interfaces are router interfaces, and they are configured with layer-3. The four VLAN interfaces are configured as layer-3 interfaces. Routing between the VLANs and the router interfaces will happen, as long as they are configured for layer-3, and there are no other configurations to block, ACLs. The gateways for the VLANs will be the addresses configured on the VLAN interfaces. You could have something like this interface GigbitEthernet0 description VLAN 1 switchport access vlan 1 switchport mode access no shutdown ! interface GigbitEthernet1 description VLAN 1 switchport access vlan 1 switchport mode access no shutdown ! interface GigbitEthernet2 description VLAN 2 switchport access vlan 2 switchport mode access no shutdown ! interface GigbitEthernet3 description VLAN 2 switchport access vlan 2 switchport mode access no shutdown ! interface GigbitEthernet4 description VLAN 3 switchport access vlan 3 switchport mode access no shutdown ! interface GigbitEthernet5 description VLAN 3 switchport access vlan 3 switchport mode access no shutdown ! interface GigbitEthernet6 description VLAN 4 switchport access vlan 4 switchport mode access no shutdown ! interface GigbitEthernet7 description VLAN 4 switchport access vlan 4 switchport mode access no shutdown ! interface GigbitEthernet8 description Link to Router 2 ip address no ip redirects no ip unreachables no ip proxy-arp no shutdown ! interface GigbitEthernet9 description Link to Router 3 ip address no ip redirects no ip unreachables no ip proxy-arp no shutdown ! interface Vlan1 description VLAN1 ip address no ip redirects no ip unreachables no ip proxy-arp no shutdown ! interface Vlan2 description VLAN2 ip address no ip redirects no ip unreachables no ip proxy-arp no shutdown ! interface Vlan3 description VLAN3 ip address no ip redirects no ip unreachables no ip proxy-arp no shutdown ! interface Vlan4 description VLAN4 ip address no ip redirects no ip unreachables no ip proxy-arp no shutdown !Aftermaking sure that the trunk port is configured on the switch, Vlan with the corresponding numbers (2,3 and 4) are created, the switch is connected to the Gi 0/1 interface of the router, you can start checking the reachability of hosts belonging to different vlans. Conditions for hosts in different Vlans in order to reach each other
I want to connect two routers to a switch which will then be connected to a modem. Now as far as I know a switch does not do network translation and this won't work with one IP address. So I bought two addresses at my ISP. Attached is a simple schematic that explains what I want to do. Is there any additional configuration needed on either of the routers Linksys WRT54GL to make this work or will it "Just Work"? slhck222k70 gold badges603 silver badges590 bronze badges asked May 29, 2012 at 958 5 This should just work. But i would make sure router 1 and router 2 client sides are on different subnets. answered May 29, 2012 at 1005 SibsterSibster8144 silver badges8 bronze badges 1 EDIT Apparently I was wrong, you can get two different IP addresses while using one Modem to connect. When I tried doing it, it didn't work, so maybe it depends on the ISP or the modem, or maybe I didn't configure it properly... You can use the Routers to manage the clients in two subnets and configure the routers separately. For example, you can use one router to configure a Wireless network and the other to configure a LAN network. answered May 29, 2012 at 1104 ShaharShahar3461 gold badge4 silver badges14 bronze badges 3 it's just work... because switch is device to share connection. You must setting routing table and NAT for routers. in the computer client, you must fill gateway with IP address of router... answered May 31, 2012 at 946 This question is really an old question, Hope you have already solved it, but I have some ideas to share with you. You are talking about 2 physically separate routers connecting to PoE switch. Yes, that is possible. You create 2 vlans on the switch. Lets say you create vlan 100 and 200, then add port,lets say 10 to vlan 100 and port 20 to vlan 200. Now you have one PC connected to port 10 and one PC connected to port 20. And don't forget to assign the IP address. answered Jul 11, 2016 at 235 Mark TwainMark Twain2541 silver badge5 bronze badges
Because port 2 belongs to the first VLAN and other ports that belong to the first VLAN are 1, 3, and 4. Since ports 5, 6, 7, and 8 don't belong to the first VLAN, the switch will not forward the incoming broadcast message from these ports.
While echoing Ron and John's comments that there is no universal "best practice" here and there's only what's best for you, I'd like to propose an alternative solution that you haven't mentioned yet. EdgeRouter does support bonding/link aggregation using Link Aggregation Control Protocol LACP. However, in older EdgeRouters, this traffic was not eligible for offloading, which meant bonding for example 4 gigabit ports wouldn't result in 4Gbps of bandwidth. It would produce redundancy, but some bandwidth less than 4Gbps, possibly simply 1Gbps. However, according to this page, newer ER-X, ER-X-SFP, and EP-R6 EdgeRouters support offloading, so aggregating 4 gigabit ports should result in 4Gbps or very near it, allowing for some losses. So, in theory, if you had one of the newer EdgeRouters, and you didn't need certain mutually-exclusive protocols, and your network topology supported it, you could do the following Bond X ports on the router to support XGbps of bandwidth and also redundancy Bond X ports on the switch in the same way Connect X ethernet cables between the bonded router ports and the bonded switch ports Configure your VLANs on the single bonded interface on the router and switch I say this in a rather nebulous way; there are a lot of steps to this, clearly Through this configuration, all the VLANs would be able to take advantage of up to XGbps of bandwidth between the VLANs for allowed traffic, so that you wouldn't have saturated links using all 1Gbps and bottlenecked while other links used only a few Mbps and remained essentially unitized.
Step2: Configure router-on-a-stick inter-VLAN routing on a router. a. Configure inter-VLAN routing on R-1 for all the VLANs that are configured on the S-3 switch. Use the information in the Addressing Table b. Be sure to configure descriptions of all interfaces. Step 3: Configure default gateways on hosts.
Step2. Assign switch ports to the VLANS. Ports fa0/1 and fa0/2 acting as access ports for VLAN10, while ports fa0/3 andfa0/4 for VLAN20.. We shall use fa0/5 port for the trunk port for carrying the traffic between the two VLANS via the router.. NOTE: fa refers to fast ethernet ports used for connecting the network hosts to the switch or router. Configurations for access ports fa0/1 and fa0/2
Ihave a Cisco SG300 managed switch I am attempting to configure to handle two VLANs one for data (VLAN1) and another for voice (VLAN20). Ports 1 and 52 are configured to trunk to the router/firewall, and to a second SG300 switch , respectively.The remaining ports 2-48 on both switches are set to.gnd1. 30219030045119125034830596