"In inter-VLAN routing, the router interfaces are connected to switch trunk ports. The router interfaces or sub interfaces must be running a trunking protocol either ISL or 802.1Q." Is this always a must? It makes sense if we use one physical interface with many sub-interfaces on a router for each VLAN. If we use multiple dedicated physical interfaces connected to each VLAN, Do we still need to connect those ports to trunk ports on switches? In that case, will different VLAN act like different networks that are connected to a router (just like there is nothing about VLAN)? Does it work the same in both configurations: with/without trunking port protocol enabled? Is there any performance drop if VLAN trunking is used? Which way is recommended?
You have a pretty good grasp of things .You only need to trunk if you have one router port and you want multiple vlans on a attached switch and they need to talk to each other. If you have multiple ports on the router and you just want to run individual links to the switch that will also work and just look like another subnet . Of course the performance will better if you have individual links because you are not trying to shove all the trunked vlans traffic down a single link . On the same subnet it will make no difference . There is no set way depends on what you are trying to do . If you just want 2 or 3 vlans on a switch and they must talk to each other doesn't really make sense to run multiple links to a single switch .
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...