08-17-2022 01:22 PM
Hi all
I have a particular request from a customer. Currently, there is a CISCO Switch 2960 configured with 3 vlans( 10,20,30) on the vlans 10 & 20 will be the computers, printers etc. for the users, and on vlan 30 will be the servers(DHCP, DNS,FTP etc). I need to be able to access the servers on vlan 30 from the pcs from the other vlans(10,20).
I have used for example:
interface FastEthernet0/1
switchport access vlan 10
switchport trunk allowed vlan 10,30
switchport mode access
But the pc's are unable to reach the servers. Any ideas?
08-17-2022 05:29 PM
run command
ip routing
08-17-2022 06:39 PM
08-20-2022 12:43 PM - edited 08-20-2022 12:44 PM
Hello
You need ip routing for intervlan communication then if you wish to negate access between particular vlan this can be accomplished with appending Router Access Control Lists (RACLs) on the L3 interfaces of those vlans.
08-17-2022 07:03 PM - edited 08-18-2022 06:32 AM
08-18-2022 06:36 AM
If ip routing is implemented, all pcs from the VLANs on the switch will be able to interact with each other. That way VLAN will not be necessary. The plan is to separate the pcs from departments but share the internet and server access.
Thanks for the replay
08-18-2022 06:42 AM
You need Inter-VLAN
Inter-VLAN done in this SW or in Router connect to this SW,
08-18-2022 11:59 PM
Hello,
as mentioned, you need some sort of layer 3 device (which must be there, otherwise you will not be able to access the Internet, as the 2960 by itself cannot terminate an Internet connection). What is the 2960 connected to ? Can you post the config of that device ?
08-19-2022 07:39 AM
To clarify, on a "pure" L2 switch, you cannot exchange traffic between ANY VLANs (assuming your not cross connecting them).
Some L2 switches (including 2960 models, I believe) may support a private-VLAN feature. Using just a single VLAN, most hosts cannot directly intercommunicate, except those configured to be accessed by other hosts (used for server hosts).
If your VLANs are their own individual networks, you can exchange data between them by routing. I recall (?) some models of 2960s support very basic routing features. If yours does, you would configure virtual interfaces on each VLAN, configure your hosts to use its VLAN switch interface as its gateway, and enable routing. That should allow all your VLAN to freely exchange data.
To further restrict what kind of traffic can flow where, you would add ACLs to your VLAN interfaces.
BTW, it's also possible to route between VLANs using an external L3 switch or router, which I wonder about, because, again, w/o routing, your VLANs should be unable to exchange ANY data, and also because you have a trunk configured (often used for a one armed routed connection to L3 switch or router).
08-19-2022 10:09 AM
Thanks
I will then use a 2921 router, and enable inter-Vlan to be able to intercommunicate the VLANs with the servers.
08-19-2022 12:11 PM
A 2921 should work fine for both routing between your VLANs, and controlling what traffic you permit between VLANs.
On the switch, configure one port as a trunk, allowing all VLANs. That will connect to a router port.
On the router, you'll need to define subinterfaces for each VLAN.
The only issue with a 2921, on a LAN, it can easily become a bottleneck if you connect to it with gig interfaces.
08-19-2022 08:09 AM
Hi Netsnaper,
I'm use to work on similar networks.
Vlan 10 and 20 can be called "Developpement-Stations" and "Printers" network,
and VLAN 30 as "Servers" network.
The more simple config is
- Consider VLAN 10 and VLAN 20 as "inside" interfaces
- Consider VLAN 30 as "outside" interface
- Configure NAT from both "inside" interfaces before going of the "outside"
- If the printers have to be accessible from the servers, you can configure static hosts translations (ex. 192.168.2.100 from inside interface translate to 192.168.5.100 from outside)
With this config, if you want, you will be able to use ACL to control exchanges between the 3 VLANs
Hope that will help you.
08-19-2022 10:10 AM
When you say inside and outside, do you refer to the hosts ips as inside and the VLAN interface ip as outside?
08-19-2022 09:26 AM
hi. with vlan you can separate every department and if you can communicate between vlans you should use a layer 3 device like router or layer 3 switch.after that you can use with VACL that control traffic between vlans.for instance vlan 10 can communicate with vlan 30 but vlan 10 cant communicate vlan 20.
08-19-2022 10:11 AM
Thanks
Will try using a 2921 router and enable inter-Vlan to be able to intercommunicate the hosts with the servers.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide