I'm just a little confused and would like some clairification about a couple of things.
1) The 2950 switch does NOT support ISL, right? I was sure this was the case, but saw something on the tech. support pages that led me to believe otherwise. I'm not talking about and XL switch, just the straight 2950.
2) With 802.1q Inter-VLAN Routing, is it necessary to have an IP on the main interface on the router, or just a good idea? I plan on doing the routing between VLAN 1 and VLAN 2 on one switch and VLAN 2 and VLAN 3 on another.
when ever u want to make communication between two differnet VLAN then there is a need for the layer-3 device...right...here your switch is not layer-3 switch...thats why u need to create the multiple sub interfaces on the router interface so u can have communication between differnet VLAN...and one more thing will u clear your connectivity...
1) Yes that is correct. The 2950/2955 series of switches do not support ISL.
2) Usually you do not configure IP Address on the physical interface when doing inter-VLAN routing. The only situation I can think of when you will do it is when using IOS versions earlier than 12.3(T) that did not allow you to use the dot1q native command on a sub-interface. In this case the IP Address on the physical interface will be handling untagged packets from the native VLAN. For all other VLANs you would configure sub-interfaces and configure ip addresses there. The following link might help:
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...