I came across this config on a switch recently and was confused:
description Local Clients
switchport access vlan 15
switchport trunk native vlan 326
What will happen when a client is plugged in? By default a switch port is in access mode, and I would think trunk commands are ignored if not in trunk mode. So is this just sloppy config work or is this an intended configuration? If it's valid, what happens and why?
The switchport is configured for access only. The switchport trunk native vlan 326 is used when the port is configured for trunking. It takes untagged packets and puts them in VLAN 326. This will not turn on trunking. It looks like leftover configuration or it can be in there for security purposes. If it's for security, typically the VLAN (326 in your case) would be a null VLAN. Is that valid VLAN in your environment?
Right - so that's where I'm confused. Without a mode command to define whether it's a trunk or access, what will happen? It has supporting commands for the access mode (defining the access VLAN) and the trunk mode (defining the native VLAN), but without specifying 'switchport mode access' or 'switchport mode trunk' I'm not sure what will happen. I'm going to try it on one of my switches.
It depends on the connected device and what model of switch you have. If the other end wants to trunk, some switches will trunk out of the box. Most of the newer switches require trunking to be configured however.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...