Use VLAN1 or other VLAN for management purpose. The cisco switches use VLAN1 as nativ VLAN. On the switches the physical ports configure to VLAN100 or VLAN200 or any other. So you can securely separate the management VLAN (VLAN1) from other networks.
You can control the access to the management VLAN with ACL.
Thank you. The reason I was using subinterfaces was that in each vlan there are wireless bridges. The customers attach to us via their radio. Their radio is on a public subnet. But the radio is on a private network. That is what we want to be able to controll.
For example: Customer A's radio IP would be 192.168.1.40 and a gateway of 192.168.1.1. Back at the switch for VLAN100 I created a subinterface VLAN100.192 with an IP of 192.168.1.1. But their router which is attached to their radio would have an IP of 220.127.116.11 with a gateway of 18.104.22.168. Back at the switch on VLAN100 I created a subinterface with an IP of 22.214.171.124
I have tried secondary interfaces and they do work, but it just seems a bit sloppy to me. It seems as if the VLAN subinterfaces would be a bit more secure.
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...