The native vlan in Dot1Q trunking is very important.The native VLAN is the only VLAN that is not tagged in a Dot1Q trunk (802.1q). In most cases the native VLAN on a trunk is VLAN 1. If you do not have the same native VLANs on both ends of your trunk then you will receive native VLAN mismatch errors on your switches. This does not mean that the trunk does not work. It does if you have the VLANs defined on your switches that are propagating through your trunk. It is good practice to not use your native VLAN for any concernable traffic. Make it a junk VLAN and have no data on it. It is not tagged in this type of trunk thus if you are connecting to a third party vendor with your trunk then you are at risk of exposing your native VLAN to them and if it has traffic on it , that too... Hope this helps..Good Luck...
Being able to send untagged frames on a link allows you to connect devices that don't understand the 802.1Q tag. That's something that was never important for Cisco trunks (supposed to be point to point between bridges), but 802.1Q is an IEEE standard and is not a "trunking" mechanism in the way Cisco defines it.
While ISL was designed exclusively to connect switching devices, DOT1Q is a generic form. I guess, originally, Native VLAN was introduced to carry management traffic between switches. Not tagging these management messages reduces burden on the switches as they do not have to untag every packet to identify the management traffic.
Native Vlan do have connection with the trunking...let me take a simple scenario..
You have two switches connected together and you have vlans on both of them .but in one of the switch one the port has not been assigned to any Vlan .then that ports data will be sent to native vlan without any configuration on tht particular port.
This native vlan is best used for administarive purpose and also in VOIP configuration..
trunking is there but done only for unassigned vlan ports
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...