Hi all, I have had to manage another none cisco switch today, I came across an option where you have to put the port in the vlan, and then make sure its vlan id is the same, firstly what is the vlan id used for?? also there was a command saying default vlan id, what is this for? is this the same as the native vlan ?
To implement VLANs, switch vendors refer to IEEE standard 802.1q, the non-proprietary protocol.
VLAN is used to separate between different group of end-user ports at the layer 2 and reduce broadcasting domains.
To do so, 802.1q add a tag to the layer 2 frame and recalculate the CRC to indicate that it belongs to a specific VLAN when forwarding to another end-user port or through trunk links connected to other switches.
The tag is composed of several fields among them the( VLAN ID) field which will contain the VLAN number you assigned to a particular port.
So I guess independently of what switch you are using, if it supports 802.1q VLANs, you will have to map different switch ports to different VLANs (vlan ID = VLAN number) according to your planned design. Also for trunk links you have to assign a native VLAN (if it?s not done by default or you have to change it).
Maybe your switch propose to set a VLAN ID to which ports are mapped by default, this can be an additional security feature when the vlan is unused.
I recommend you to get the configuration guide for your given switch for more details about VLAN implementation.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...