The mission of the Cisco Community is to provide a peer-to-peer support channel Cisco customers, partners and potential customers.
You are welcome to participate and collaborate in the Cisco Community by asking questions, replying to other member's questions, posting documents, videos and blogs related to Cisco Products, technologies and solutions as well as hosting or attending our events.
We welcome everyone with an interest in the Cisco Community, as long as you observe these community rules:
1. Be respectful. Respect people's time and attention by asking well-thought-out questions and sharing what you've learned so far in your experimentation or prior research. Respect people as individuals by keeping your tone positive and your comments constructive.
2. Be relevant. Make sure your contributions are relevant to the mission of the community, to the specific discussion style and topic where you post. Please do not post duplicate messages in different areas of the community to avoid fragmenting discussion. If you have a new question, start a new thread rather than interrupting a conversation. Solicitations are rarely relevant. If you have something you want members to join, participate in, or buy, ask us first.
3. Keep your word. Don't post anything that would violate any contractual agreements (copyright, trade secret or otherwise) or nondisclosure agreements to which you are a party.
4. Protect privacy - yours and others'. Don't share anything about yourself or your organization that you would not want to see on a road-side billboard. Share your business email address if you wish, but don't post personal information-your own or anyone else's-including contact information or any content that you receive in one-to-one communications without the author's consent. Also, be very careful of not posting information from your devices on the network or content such as other users' personally identifiable information, installed applications, log in credentials and/or passwords, network inventory, network diagram from networks in production environments, configuration dump, virtual images of network, network reports, and field notices and/or security vulnerabilities which may impact a customer. For more information read the Cisco Community Acceptable User Agreement (a.k.a Terms of Service).
5. Remember, this is user-generated content. You'll find plenty of good advice here, but remember that your situation, configuration, or implementation may vary from that of the individual sharing a solution. Some advice you find here may even be wrong. Apply the same good judgment here that you would apply to information anywhere on the Internet.
By using these forums you agree to follow these rules as well as the fullTerms of Service for the Cisco Community. We thank you, and your fellow community members thank you.
The Cisco Logo and Cisco Employees
You will notice that some community members have a Cisco logo next to their names - this means they are Cisco employees.
Like you, they are members of the community around Cisco products, technologies, and solutions, and we encourage them to share their knowledge and opinions here when appropriate.
We want this to be the best community it can possibly be - so let us know what you think, or how we can help improve your experience on the Cisco Community by providing your feedback. To do so, simply click on the Feedback link located in the footer.
We will be happy to help!
Flag inappropriate content for review
If you recognize any violation of these guidelines, please notify us within the community by choosing "Report Inappropriate Content" from the message's Options menu and let us know why you feel the content is inappropriate.
If you have any questions about our guidelines, terms, or policies,let us know.
Share Your Success
We always include an interactive Q&A session at the end of each briefing so be prepared to interact. Come prepared to interact!
Miss a briefing? Miss a ...
I have a router-on-a-stick that is connected to a switch to 3 workstations that are one connected to VLAN 2 & VLAN 3. 2 workstations are connected to VLAN2 while the other one is connected to VLAN3. Now the problem is that i need to deny network traff...