cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2666
Views
0
Helpful
4
Replies

IPv6-Multiple Vlans on 6513 IOS

What is the configuration for putting

IPV4 and IPv6-Multiple Vlans on 6513 IOS

on a Switchport.  NOT the Router.

4 Replies 4

I forgot to mention that my boss does not wish to trunk the ports.

And Cisco does not use the Multi - Vlan command anymore.

We have hundreds of servers with static IP's converting to IPv6.

I had presented to my boss that the router would need to be configured

for IPv6  6 to 4 and that a DHCPv6 server would then issue out IP Address

based on the Vlan of the port and that if he wanted Multiple vlans then

we would trunk the ports and allow only the vlans we wished.

No problem putting IPv6 on router and getting a DHCPv6 server.

However, my boss does not want to put trunking on the already configured

vlan switchports and now wants to put multi-vlans on each port.

IPv4 and IPv6 vlans.....

Help.

Thanks,

Doug

Phillip Remaker
Cisco Employee
Cisco Employee

You don't need to put IP4 and IPv6 in separate VLANs - they can live on the same VLAN.

Can you elaborate about the question?

 

Hello,

 

We have 2 seperate departments.. Layer 3 (Router) side

and Layer (2) switch side - ME.

 

My boss wants to do DUAL-STACK and wants to know if

we need to do ANYTHING on OUR Layer 2 switch side ?

Or, is this IPV4/IPv6 Dual-Stack all done on the Router ?

 

Sorry, about the CAPS......

 

Thanks,

Doug

 

 

 

 

 

 

 

 

 

 

 

 

.

IPv6 is a Layer 3 protocol, which has no direct relation to IPv4 - the protocols never "see" one another on the wire.  Functionally, it is the same as running IPX, IP and Appletalk (If anybody remembers those old protocols!) on the same wire.

No direct action is needed at Layer 2 to support IPv6.  There may be some switch functions like SEcure Neighbor Discovery that you want to employ as part of your IPv6 rollout.

See: http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6553/white_paper_c11-563156.html

Also consider other first-hop security issues:

http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6553/whitepaper_c11-602135.html

Does this help?