I have 3 4510 Switches on my network. I have a dedicated T1 from an outside Customer that has will have a about 10 users that need to be on this separate network. On each switch, there i 3 ports i need dedicated to this separate network. I assume the best way to handle this is to setup a VLAN....
The T1 is connected into our 3600 router
Which is managed by our WAN group offsite. To utilize this VLAN, Is there a way to avoid having to do any configuring on the router?, or can i do all the configuring on my Switches?...
Istvan,. the ten users are in my network. they each have 2 nics one for our network, and the second nic for the other network...
The way it is setup now, there is a separte switch with one connection coming from the router, and a few users plugged into this separate switch, and fiber from this separate switch connecting to another office to accomodate the users who need the connection there. I to get rid of the separate switch, and setup a vlan so i can plug it directly into the 4510R switch, using a vlan... My question to you, will i have to do anything on the Router to make this happen?
If I understand what you want to accomplish, it might be as simple as defining 3 access client ports on each 4510 then spanning that vlan across the three 4510s. (The latter could be done either across a trunk, or via a port dedicated to this vlan.) Lastly, connect the router to another port on any of the three 4510 that's also in the same vlan.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...