07-01-2009 03:18 PM - edited 03-06-2019 06:33 AM
Hi all,
We have 3x Cisco 4500R switches with various VLANs for:
1. Cisco IP Phones (We run CallManager) (192.168.4.0/23 & 192.168.6.0/24) - VLAN 45 & VLAN 6
2. Servers (192.168.1.0/24) (VLAN 10)
3. PCs & Printers (192.168.2.0/23) (VLAN 23)
4. Network Devices (192.168.0.0/24) (VLAN 1)
5. Wireless VLAN 233/234
The SOE guys wants to create a basic test lab to recreate a AD Controller, FileServer, and a handful of PCs.
What's the best way to implement a side-by-side VLAN implementation to isloate the test lab so it doesn't interfere with the production environment but replicating the IP addressing?
We'd want to use the Wireless for the test PCs so DHCP won't be issue because of the way its been implemented.
Should I just create a single VLAN with a large subnet eg: 192.168.1.0/22 as it won't have any phones or anything else on it? The PCs will just need to see the servers but the IP addressing for hte servers and pcs need to be replicated because of login scripts etc.
I think I'd need VACLS so the new VLAN won't route? Not 100% sure.
Thanks!
Solved! Go to Solution.
07-01-2009 03:26 PM
Private VLAN Catalyst Switch Support Matrix
http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a0080094830.shtml
Securing Networks with Private VLANs and VLAN Access Control Lists
http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a008013565f.shtml
07-01-2009 03:26 PM
Private VLAN Catalyst Switch Support Matrix
http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a0080094830.shtml
Securing Networks with Private VLANs and VLAN Access Control Lists
http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a008013565f.shtml
07-01-2009 03:50 PM
Brilliant.
Thanks!
07-01-2009 03:51 PM
Please rate when helpful and/or applicable.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: