I am connecting a 3550 Cisco switch to an extreme layer 3 switch is a different product.
The extreme switch is the core switch running all the Vlans for this office.
I am connecting another layer 3 switch to it because I have a laser connecting to it in order to connect another building to it.
The 2 buildings are on differentr network ranges so I am going to use a routed hop to connect the 2 buildings.
My query I have is how would I setup the cisco 3550 that is connecting to this extreme layer 3 switch.
Do i just add the port into one of the Vlans on the extreme......
My objective is to get the 2 buildings connected and be able to see each other by routing even though the networks are different.
If I set the port on the cisco connecting to the extreme switch on the Vlan of the extreme switch will that do the trick or do I need to configure routes on the 3550 pointing to the differen t Vlan subnets.I should not have to because the switch will take care of that right....
If you are doing all of your Inter-VLAN routing on the Extreme switch, then all you should need is a 802.1q trunk between the 3550 and the Extreme switch assuming there will be multiple VLANs on the 3550.
If all the ports on the 3550 are on the same VLAN, then just add the ports on the 3550 and Extreme to the appropriate VLAN and you should be good to go.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...