09-21-2020 01:21 PM
I have two stackable switches, arranging the network in a star topology. I am creating 5 distinct VLANs (one for each different department).
if I use the IP addresses
Interface VLAN 192.168.1.10.255.255.255.0
VLAN2: 192.168.2.10.255.255.255.0
VLAN3: 192.168.3.10.255.255.255.0
VLAN4: 192.168.4.10.255.255.255.0
VLAN5: 192.168.5.10.255.255.255.0
VLAN6: 192.168.6.10.255.255.255.0
Would each VLAN need a separate default gateway? What else do I need to do to properly configure the network?
09-21-2020 01:59 PM - edited 09-21-2020 02:09 PM
Yes, each VLAN need a separate default gateway. you can use switched virtual interface (SVI) on main switch, Core sw. Switches use SVI with IP to communicate and route traffic. SVI, which behaves like routed interface, it is virtual software-based interface that will be use for all end devices in that particular vlan. SVI x will route traffic belonging to vlan x
192.168.1.0/24 can be use to route traffic between Core and router as SVI vlan 1 (interface vlan 1). And other SVIs (from 2-6) will be default gateways for other vlans. Technically, for security reason you should not use vlan 1 for data traffic.
SVI interface vlan 2 with 192.168.2.10 /24 can be default gateway for vlan 2.
SVI interface vlan 3 with 192.168.3.10./24 for vlan 3 and so forth.
you can use Packet tracer , a free simulator from Cisco Net Academy
Regards, ML
**Please Rate All Helpful Responses **
09-22-2020 04:16 PM - edited 09-22-2020 04:17 PM
Example:
ip routing
interface Vlan2
ip address 192.168.2.10 255.255.255.0
!
interface Vlan3
ip address 192.168.3.10 255.255.255.0
etc
Example of L2 switch
interface Vlan2
ip address 192.168.2.1 255.255.255.0
Also, you do not need to use SVI on those edge L2 switches with IP 192.168.2.1.1 and 192.168.3.1, etc. You could move those IPs to Core switch instead of 192.168.2.10 use 192.168.2.1.
L2 switches do not need SVI with IP for vlan x data traffic. But they do need SVI IP Only to be able to connect to that switch for management purpose. That is usually done using special management vlan x reserved for that purpose. in your case, iy could be vlan 1 with interface Vlan2 and ip address 192.168.1.0/24
Do you have Packet Tracer ?
09-21-2020 05:18 PM
trying to add example but for some reason my reply is not possing due to some html error
09-22-2020 05:21 AM
You have 2 options :
Layers 2 :
1.all the Switches connect to Core switch as Layer Trunk allowed respected vlan in Trunk
2. Configure on core all the SVI point Default route towards Router going to Internet.
3. On same Router point back static route for that IP ranges towards your Core switch IP address.
4. Make sure NAT is covered on router all the IP pool can get internet.
Layers 3 :
1.all the Switches connect to Core switch configured point to point interface (no switch port option connected interface between switch )
2. Configure SVI on the Local switch - Default route towards Core Switch Point to Point IP
3. On same Router point back static route for that IP ranges towards your Core switch IP address.
4. Make sure NAT is covered on router all the IP pool can get internet.
I prefer Layer 2 Options, and you can create DHCP pools, ACL on core switch, One administraiton task on 1 device. (Hope you have take care License).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide