I have setup a port on a 2960 switch that is attaced to my firewall. Everything works fine. My desktop can still see the firewall and get to the internet until I change the mode and vlan of the switch port my desktop is connected to. Then I cannot see the firewall or get to the internet. The client and the firewall are on the same subnet.
My understanding was that trunked ports allowed vlan traffic from any vlan.
Sorry for not being clearer. I have the port to the firewall configured as a trunk (I am going to pass multiple vlans to it) not the port to the desktop. I thought that even thought I changed the desktop to access vlan 34 that it could still access the firewall since the firewall was on a trunk port even thought the native vlan for the trunk was vlan 1
You need to verify the trunking configuration between the switch and the firewall. I haven't played much with firewall these days but if you can post the config, I can (or someone else on this board) figure out what's wrong with it.
The switchport is rather easy
switchport trunk encapsulation do1tq
switchport mode trunk
That's what you entered at the switch, right?
Also, can the workstation ping other devices on Vlan34?
Are you planning to route between Vlans?
What device are you planning to use for routing between Vlans? Remember, the Firewall can't route between Vlans, it forwards traffic from one interface to another after inspection.
What type/make of firewall is this? Is it aware of dot1q/ISL trunk protocol.
I think you should have a Layer 3 device to allow inter vlan routing and to reach firewall from multiple vlan PCs.
In the first instance it worked becoz the firewall port and desktop port all are in default access vlan 1. When u changed the desktop vlan from default to vlan34 it wont work, even though u kept the desktop n firewall IP in same subnet.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...