I need to change remote subnets from 25 to 25 in a remote site. Right now the site has a 2800 router connected to a 3560 switch, both running IOS. I'd like to split the 24 bit subnet connecting the switch to the router into 2 25 bit subnets - one the upper half of the existing 24 bit subnet, and the other the lower half, each on a different vlan. I only have a modem connected into the router, and I'd like to do make the change without losing connectivity to the switch. The router and switch are not set up for dot1q trunking. So what I'm doing is creating an additional vlan on the switch and spliting the existing 24 bit subnet accross the new vlan and existing vlan. Without a modem in both the router and switch, I'd like to do this without losing connectivity, so I don't end up with the interface on the swith having no IP address.
so in the above diagram, the switch's interface to the router would become 172.16.10.254/25 (ni a vlan with that IP address) and the router's interface to the switch would become 172.16.10.253/25. Then a new vlan with the IP address 172.16.10.126/25 would be created, and a static route to that vlan put into the router. BGP would take care of rest. I'd consider also trunking between then two, but again I'm not sure what state the switch's configuration will be left in if connectivity is lost.
Save the configs and copy them to your PC using the "copy flash:startup-config tftp:" commands. Use Wordpad (do NOT use Notepad) and make the necessary changes to the config and push the configs back up (copy tftp: flash:running-config). If you don't like the result, you can invoke the copy start runn.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...