Inter-Switch Link (ISL) is a Cisco proprietary trunking protocol for the encapsulation of Virtual LAN (VLAN) traffic. 802.1q is an Institute of Electrical and Electronics Engineers (IEEE) standard trunking protocol. Most Cisco LAN switches support both, but non-Cisco LAN switches that support VLAN trunking use 802.1q.
Most non-Cisco 802.1q switches maintain only a single instance of spanning tree, known as Mono Spanning Tree (MST), that defines the spanning-tree topology for all VLANs. When a Cisco switch is connected to a non-Cisco switch through an 802.1q trunk, the MST of the non-Cisco switch and the native VLAN spanning tree of the Cisco switch combine in order to form a single spanning tree topology, known as the Common Spanning Tree (CST).
Because the Cisco switches transmit Bridge Protocol Data Units (BPDUs) to the Spanning Tree Protocol (STP) multicast MAC address on VLANs other than the native VLAN of the trunk, the non-Cisco switches do not recognize these frames as BPDUs and flood them on all of the ports in the related VLAN. Other Cisco switches connected to the non-Cisco 802.1q cloud receive these flooded BPDUs. This allows the Cisco switches to maintain a spanning tree topology for each VLAN across a cloud of non-Cisco 802.1q switches. The non-Cisco 802.1q cloud that separates the Cisco switches is treated as a single broadcast segment between all of the switches that are connected to the non-Cisco 802.1q cloud through 802.1q trunks.
Verify that the trunking mode and encapsulation are configured correctly. Make certain that the native VLAN is the same on all of the 802.1q trunks that connect the Cisco switches to the non-Cisco 802.1q cloud.
If multiple Cisco switches are connected to a non-Cisco 802.1q cloud, all of the connections must be through 802.1q trunks. Do not connect Cisco switches to a non-Cisco 802.1q cloud through ISL trunks or through access ports. If this is done, it causes the switch to place the ISL trunk port or access port into the spanning tree port inconsistent state and no traffic passes through the port.
If the trunk does not pass specific VLAN traffic, the issue can potentially be that the VLAN has not been added in the database. Issue the vlan database privileged EXEC command in order to enter VLAN configuration mode. From this mode, it is possible to add, delete, and modify VLAN configurations for normal-range VLANs.
Note: The configurations of the VLAN IDs 1 to 1005 are saved in the VLAN database if the VLAN Trunking Protocol (VTP) is in the transparent or server modes. The extended-range VLAN configurations are not saved in the VLAN database.
Hi, we currently have Cisco ASA 5525 running software version 9.6(4)36 in Site A. We need to replace the existing Cisco ASA 5505 in Site B that's connected via S2S VPN. With FirePOWER 1010 NGFW, can I still connect Site A to Site B via S2...
If we have stack of 2 X 9300 switches, stack needs to be renumbered, do we need to renumber the stack members to unused number first and reboot it multiple times to take slot renumbering Eg: sw1 is member 1 and sw2 is member 2 . End state requirement...
I'm having an issue where I attempted to use Putty to SSH into the switch and it would not even attempt to connect. However, I was able to connect from Solarwinds and for a short period of time Windows CMD via SSH into the switch. Solarwinds and CMD both ...
Right now I have a RV320 in my main office, connected to 6 other offices, with RV3xx;sThey are configured with IP Only in the Local/Remote Group with WAN1 - Working I need help to have a Fail Over, for the Main office, to Failover to WAN2Do I need to...
Hey guys I have a question about TDR results on my Cisco 3650 Switch.It shows up that I have a wrong cabling connection with inverted pairs and another pair with short/crosstalk. But the phoneds and desktops connected to it works normally except the ...