02-23-2013 04:20 AM - edited 03-07-2019 11:54 AM
good day guys,
I need your hints to create a correct network topology.
what I have ? three cisco devices:
1. router 877W (with POTS internet access)
2. switch SG-500
3. Access Point Aironet 2602i
what I expect:
a) to have 4 VLANs on my switch (home, monitor, dmz, guests)
b) to have two ssids defined on my AP2602 with different ip address networks (home and guests)
the issues:
1. AP 2602i is powered from SG-500 (over PoE) so it must be connected directly to SG-500
2. SG-500 has got no DHCP server, so all DHCP servers are defined within 877W router. otherwords all devices connected to switch should ask 877W router for IP addresses
3. I am going to shut down all wireless functionality in my 877W router.
4. 4 VLANs should communicate with themselves within SG-500 switch (cause there is a 1000Mb port functionality) without router (only 100Mb port functionality)
I spent several evenings trying to find correct solution for my network, but the longer I go the worse feelings I get.
so guys, could you start with the basic stuff:
how would you create a topology ?
how many VLANS do I need ? (4 VLANS + 1 for router ?)
how to connect a router with a switch (a special dedicated VLAN ?), if so acccess/trunk ports on both ?
many thanks
Solved! Go to Solution.
02-24-2013 06:42 AM
Sample Config to assing IP address in different vlans.
Router Config
ip dhcp excluded-address 192.168.1.1 192.168.1.5
ip dhcp excluded-address 10.10.11.1 10.10.11.5
ip dhcp excluded-address 10.10.12.1 10.10.12.5
ip dhcp excluded-address 10.10.13.1 10.10.13.5
ip dhcp pool vlan1
network 192.168.1.0 255.255.255.0
dns-server 62.233.233.233 87.204.204.204
default-router 102.168.1.1
!
ip dhcp pool vlan11
network 10.10.11.0 255.255.255.0
dns-server 62.233.233.233 87.204.204.204
default-router 10.10.11.1
!
ip dhcp pool vlan12
network 10.10.12.0 255.255.255.0
dns-server 62.233.233.233 87.204.204.204
default-router 10.10.12.1
!
ip dhcp pool vlan13
network 10.10.13.0 255.255.255.0
dns-server 62.233.233.233 87.204.204.204
default-router 10.10.13.1
interface Vlan1
description LAN1$FW_INSIDE$$ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$
ip address 192.168.1.1 255.255.255.0
no shut
!
interface Vlan11
ip address 10.10.11.1 255.255.255.0
no shut
!
interface Vlan12
ip address 10.10.12.1 255.255.255.0
no shut
!
interface Vlan13
ip address 10.10.13.1 255.255.255.0
no shut
!
interface FastEthernet3
NO switchport access vlan 4
switchport mode trunk
switchport turnk encapulation dot1q
switcport trunk allowed vlan all
Switch Config
interface gigabitethernet1/47
switchport mode trunk
switchport turnk encapulation dot1q
switcport trunk allowed vlan all
interface Vlan1
ip address 192.168.1.2 255.255.255.0
ip helper-address 192.168.1.1
!
interface Vlan11
ip address 10.10.11.2 255.255.255.0
!
interface Vlan12
ip address 10.10.12.2 255.255.255.0
!
interface Vlan13
ip address 10.10.13.2 255.255.255.0
!
interface Vlan14
no ip address
!
Now This configuraiton will be enough to assing assign ip address.
Point is that the host which you will connected to any port of switch keep in mind
if u connect host to port gig 0/5
if u assign vlan 1 to gig 0/5 the host will get ip ho 192.168.1.x
if u assign vlan 11 to gig 0/5 the host will get ip ho 10.10.11.x
if u assign vlan 12 to gig 0/5 the host will get ip ho 10.10.12.x
if u assign vlan 12 to gig 0/5 the host will get ip ho 10.10.13.x
**Please Do Rate Helpful Posts**
02-24-2013 01:12 PM
Useful Configuration to configure AP with Different SSID in differnet VLANs. hope that will help you.
https://supportforums.cisco.com/docs/DOC-14496
Thanks.
02-23-2013 05:50 AM
If your Router IOS version 12.4 that will only allow you to make TWO VLANs with VLAN 1 one of them. In total you can have three.
If your are running IOS greater then 12.4 u can have two more vlan.
Run DHCP on your Router
U can make Vlans on your router
Uplink between your switch and router will be trunk
Same vlan will be on your switch.
WIFI Access Point with Differnet SSID in different VLANs
02-23-2013 07:02 AM
1. my IOS on my router supports up to 4 VLANs.
2. do I understand correctly my switch can have no more than 4 VLANs (it is limited by router 4 VLAN capabilities) ?
3. do I need to have 4 uplinks between router and switch (each one for 1 VLAN) ?
4. my switch is 3 layer capable - does point 3 somehow limit the VLANs throughput ? I mean inter VLAN traffic will go through router (100mb port) instead of being served within switch itself ?
5. I just do not get the idea how to connect my WiFi AP to the switch. I have got only one gigaport in AP, but I need at least two VLANs. how to define a port in AP and how to define a port in switch to communicate in the right way
6. how to pass DHCP server information from router to AP via switch ?
02-23-2013 09:21 AM
2. do I understand correctly my switch can have no more than 4 VLANs (it is limited by router 4 VLAN capabilities) ?
You can have more vlan on switch but intervlan routing will be done in that case. In simple words routing between different subnet. L3 device can do that thing.
3. do I need to have 4 uplinks between router and switch (each one for 1 VLAN) ?
Single Uplink will be enough and u will make that uplink trunk. Trunk meaning it will allow all vlan.
4. my switch is 3 layer capable - does point 3 somehow limit the VLANs throughput ? I mean inter VLAN traffic will go through router (100mb port) instead of being served within switch itself ?
If can make your switch l3 capable that will allow to make u more vlans and in that case intervlan routing will be done by your switch and Internet traffic will be routed towards your Router Interface by using default route.
5. I just do not get the idea how to connect my WiFi AP to the switch. I have got only one gigaport in AP, but I need at least two VLANs. how to define a port in AP and how to define a port in switch to communicate in the right way
You just need to insert single cable from your ap to your switch and make it a access port. SSID that u will make on AP u will assing them different vlans.
6. how to pass DHCP server information from router to AP via switch ?
In l3 Switch under vlan
u can enable ip-helper address
*** Do Rate Helpful Posts ***
02-23-2013 02:55 PM
Jawad, first of all, many thanks for your interest so far.
I followed your instructions, but obviously I did something wrong - cannot get it working...
I have got a trunk port on my router, but my switch cannot get any ip address.
this is my router' config:
---------------------------------------------
Current configuration : 15027 bytes
!
! Last configuration change at 23:17:38 CET Sat Feb 23 2013 by admin
! NVRAM config last updated at 22:57:06 CET Sat Feb 23 2013 by admin
!
version 12.4
no service pad
service timestamps debug datetime msec localtime
service timestamps log datetime msec localtime
service password-encryption
service sequence-numbers
!
hostname C877W
!
boot-start-marker
boot system flash:/c870-advipservicesk9-mz.124-24.T7.bin
boot-end-marker
!
security authentication failure rate 3 log
logging message-counter syslog
logging buffered 151200
!
no aaa new-model
clock timezone CET 1
clock summer-time CET recurring last Sun Mar 3:00 last Sun Oct 4:00
!
!
crypto pki certificate chain tti
certificate self-signed 01
384 9999 9999 9999 9999
quit
dot11 mbssid
dot11 syslog
dot11 vlan-name GLAN4 vlan 4
dot11 vlan-name LOCAL vlan 1
dot11 vlan-name WLAN3 vlan 3
!
dot11 ssid abc
vlan 1
authentication open eap eap_methods2
authentication network-eap eap_methods2
authentication key-management wpa
!
dot11 ssid def
vlan 4
authentication open
authentication key-management wpa
wpa-psk ascii 7 def
!
no ip source-route
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 10.10.12.4 10.10.12.254
ip dhcp excluded-address 192.168.1.31 192.168.1.254
!
ip dhcp pool LAN1
network 10.10.10.0 255.255.255.0
dns-server 10.10.10.1 62.233.233.233 87.204.204.204
default-router 10.10.10.1
netbios-name-server 10.10.10.2
lease infinite
!
ip dhcp pool WLAN4
import all
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
dns-server 62.233.233.233 87.204.204.204
netbios-name-server 10.10.10.2
lease infinite
!
ip dhcp pool DLAN3
import all
network 10.10.12.0 255.255.255.0
default-router 10.10.12.1
dns-server 62.233.233.233 87.204.204.204
netbios-name-server 10.10.10.2
lease infinite
!
ip dhcp pool HOME
network 10.10.11.0 255.255.255.0
default-router 10.10.11.1
dns-server 62.233.233.233
lease infinite
!
ip dhcp pool 10
network 10.0.0.0 255.255.255.0
default-router 10.0.0.2
!
!
ip cef
no ip bootp server
ip name-server 62.233.233.233
ip name-server 87.204.204.204
no ip port-map x11 port tcp from 6000 to 6606 description X Window System
ip ips config location flash:/ips5/ retries 5 timeout 10
ip ips notify SDEE
no ip ips notify log
!
ip ips signature-category
category all
retired true
category ios_ips basic
retired false
!
ip inspect audit-trail
no ipv6 cef
!
multilink bundle-name authenticated
!
parameter-map type regex sdm-regex-nonascii
pattern [^\x00-\x80]
!
!
crypto key pubkey-chain rsa
named-key realm-cisco.pub
key-string
F3020301 0001
quit
!
!
!
archive
log config
hidekeys
!
!
no ip ftp passive
ip ssh time-out 60
ip ssh authentication-retries 2
!
class-map type inspect match-any SDM_AH
match access-group name SDM_AH
class-map type inspect match-any sdm-cls-insp-traffic
match protocol cuseeme
match protocol dns
match protocol ftp
match protocol h323
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp extended
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-all sdm-insp-traffic
match class-map sdm-cls-insp-traffic
class-map type inspect match-any SDM_IP
match access-group name SDM_IP
class-map type inspect imap match-any imap-mail
match login clear-text
class-map type inspect match-any printer-9100
class-map type inspect match-any SDM_ESP
match access-group name SDM_ESP
class-map type inspect match-any SDM_HTTPS
match access-group name SDM_HTTPS
class-map type inspect match-any SDM_EASY_VPN_SERVER_TRAFFIC
match protocol isakmp
match protocol ipsec-msft
match class-map SDM_AH
match class-map SDM_ESP
class-map type inspect match-any print-9100
class-map type inspect match-any SDM_SHELL
match access-group name SDM_SHELL
class-map type inspect match-all sdm-invalid-src
match access-group 100
class-map type inspect match-all sdm-protocol-http
match protocol http
!
!
policy-map type inspect sdm-permit-icmpreply
class class-default
pass
policy-map type inspect sdm-pol-NATOutsideToInside-1
class class-default
drop
policy-map type inspect sdm-inspect
class type inspect sdm-invalid-src
inspect
class type inspect sdm-insp-traffic
inspect
class type inspect sdm-protocol-http
inspect
class class-default
pass
!
zone security out-zone
zone security in-zone
zone security dmz-zone
zone security guest-zone
zone-pair security sdm-zp-self-out source self destination out-zone
service-policy type inspect sdm-permit-icmpreply
zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone
service-policy type inspect sdm-pol-NATOutsideToInside-1
zone-pair security sdm-zp-in-out source in-zone destination out-zone
service-policy type inspect sdm-inspect
!
bridge irb
!
!
interface ATM0
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
no atm ilmi-keepalive
!
interface ATM0.2 point-to-point
description $FW_OUTSIDE$$ES_WAN$
ip flow ingress
zone-member security out-zone
pvc 0/35
encapsulation aal5mux ppp dialer
dialer pool-member 2
!
!
interface FastEthernet0
description LAN1
switchport mode trunk
!
interface FastEthernet1
description WLAN2
switchport access vlan 4
switchport mode trunk
!
interface FastEthernet2
switchport access vlan 4
switchport trunk native vlan 4
switchport mode trunk
!
interface FastEthernet3
description GLAN4
switchport access vlan 4
switchport mode trunk
!
interface Virtual-Template2
ip unnumbered BVI1
!
interface Virtual-Template3
ip unnumbered BVI1
!
interface Virtual-Template4
ip unnumbered BVI1
!
interface Dot11Radio0
no ip address
ip nbar protocol-discovery
ip flow ingress
ip flow egress
!
encryption mode ciphers tkip
!
encryption vlan 1 mode ciphers aes-ccm
!
encryption vlan 4 mode ciphers tkip
!
ssid abc
!
ssid def
!
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
station-role root
l2-filter bridge-group-acl
!
interface Dot11Radio0.1
encapsulation dot1Q 1 native
no cdp enable
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 input-address-list 700
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio0.4
encapsulation dot1Q 4
no cdp enable
bridge-group 4
bridge-group 4 subscriber-loop-control
bridge-group 4 spanning-disabled
bridge-group 4 block-unknown-source
no bridge-group 4 source-learning
no bridge-group 4 unicast-flooding
!
interface Vlan1
description LAN1$FW_INSIDE$$ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$
ip address 10.10.11.1 255.255.255.0
ip flow ingress
ip tcp adjust-mss 1452
!
interface Vlan3
no ip address
bridge-group 3
!
interface Vlan4
description GLAN4
no ip address
traffic-shape rate 64000 8000 8000 1000
bridge-group 4
!
interface Dialer1
description $FW_OUTSIDE$
ip address negotiated
no ip redirects
no ip unreachables
no ip proxy-arp
ip nbar protocol-discovery
ip flow ingress
ip flow egress
ip nat outside
ip virtual-reassembly
zone-member security out-zone
encapsulation ppp
dialer pool 2
dialer-group 2
no cdp enable
ppp authentication chap callin
ppp chap hostname ssss
ppp chap password 7 ssss
!
interface BVI1
description LAN1$ES_LAN$$FW_INSIDE$
ip address 10.10.15.1 255.255.255.0
ip helper-address 10.10.11.1
ip helper-address 192.168.1.1
ip nbar protocol-discovery
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly
zone-member security in-zone
ip tcp adjust-mss 1452
!
interface BVI3
description WLAN3$FW_DMZ$
ip address 10.10.12.1 255.255.255.0
ip nat inside
ip virtual-reassembly
zone-member security dmz-zone
!
interface BVI4
description GLAN4$FW_INSIDE$
ip address 192.168.1.1 255.255.255.0
ip helper-address 10.10.11.1
ip helper-address 192.168.1.1
ip nat inside
ip virtual-reassembly
zone-member security in-zone
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer1
ip http server
ip http access-class 10
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip flow-cache timeout active 1
ip flow-export source Dot11Radio0
ip flow-export version 5
ip flow-export destination 10.10.10.114 9996
ip flow-export destination 10.10.1.4 9996
!
ip dns server
ip nat inside source list 1 interface Dialer1 overload
ip nat inside source list 2 interface Dialer1 overload
ip nat inside source list 3 interface Dialer1 overload
ip nat inside source list 4 interface Dialer1 overload
!
ip access-list extended SDM_HTTPS
remark SDM_ACL Category=1
permit tcp any any eq 443
ip access-list extended SDM_IP
remark SDM_ACL Category=1
permit ip any any
ip access-list extended SDM_SHELL
remark SDM_ACL Category=1
permit tcp any any eq cmd
ip access-list extended any
remark SDM_ACL Category=128
permit ip any any
ip access-list extended printer
remark SDM_ACL Category=128
permit ip any any
!
logging trap debugging
logging 10.10.11.1
access-list 1 remark inside to Internet
access-list 1 remark SDM_ACL Category=2
access-list 1 remark LAN1
access-list 1 permit 10.10.10.0 0.0.0.255
access-list 2 remark WLAN2
access-list 2 remark SDM_ACL Category=2
access-list 2 permit 10.10.11.0 0.0.0.255
access-list 3 remark DLAN3
access-list 3 remark SDM_ACL Category=2
access-list 3 permit 10.10.12.0 0.0.0.255
access-list 4 remark WLAN4
access-list 4 remark SDM_ACL Category=2
access-list 4 permit 192.168.1.0 0.0.0.255
access-list 10 remark CCP_ACL Category=1
access-list 10 permit 192.168.1.0 0.0.0.255
access-list 10 permit 10.10.11.0 0.0.0.255
access-list 100 remark CCP_ACL Category=128
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip 10.10.10.0 0.0.0.255 any
access-list 100 permit ip 10.10.12.0 0.0.0.255 any
access-list 101 remark SDM_ACL Category=128
access-list 101 permit ip any any
access-list 105 remark Auto generated by SDM Management Access feature
access-list 105 remark CCP_ACL Category=1
access-list 105 permit ip 192.168.1.0 0.0.0.255 any
access-list 105 permit ip 10.10.11.0 0.0.0.255 any
access-list 109 remark Auto generated by SDM Management Access feature
access-list 109 remark CCP_ACL Category=1
access-list 109 permit tcp 10.10.11.0 0.0.0.255 host 10.10.11.1 eq telnet
access-list 109 permit tcp 10.10.11.0 0.0.0.255 host 10.10.11.1 eq 22
access-list 109 permit tcp 10.10.11.0 0.0.0.255 host 10.10.11.1 eq www
access-list 109 permit tcp 10.10.11.0 0.0.0.255 host 10.10.11.1 eq 443
access-list 109 permit tcp 10.10.11.0 0.0.0.255 host 10.10.11.1 eq cmd
access-list 109 deny tcp any host 10.10.11.1 eq telnet
access-list 109 deny tcp any host 10.10.11.1 eq 22
access-list 109 deny tcp any host 10.10.11.1 eq www
access-list 109 deny tcp any host 10.10.11.1 eq 443
access-list 109 deny tcp any host 10.10.11.1 eq cmd
access-list 109 deny udp any host 10.10.11.1 eq snmp
access-list 109 permit ip any any
no cdp run
!
!
!
!
!
control-plane
!
bridge 1 protocol ieee
bridge 1 route ip
bridge 3 protocol ieee
bridge 3 route ip
bridge 4 protocol ieee
bridge 4 route ip
banner exec ^CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
% Password expiration warning.
-----------------------------------------------------------------------
nice, huh ?
-----------------------------------------------------------------------
^C
banner login ^CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
no modem enable
transport output telnet
speed 115200
line aux 0
transport output telnet
line vty 0 4
access-class 105 in
exec-timeout 0 0
privilege level 15
login local
transport input telnet ssh
!
scheduler max-task-time 5000
ntp server 150.254.183.15 prefer source Dialer1
ntp server 193.110.137.171 source Dialer1
ntp server 212.244.36.227 source Dialer1
!
end
------------------------------
and this is my switch config:
-------------------------------
vlan database
vlan 11-14
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp snooping
ip dhcp snooping database
ip dhcp snooping information option allowed-untrusted
ip dhcp relay address 10.10.11.1
ip dhcp relay address 192.168.1.1
ip dhcp relay enable
ip dhcp information option
no boot host auto-config
bonjour interface range gi1/3
bonjour interface range vlan 1
hostname SG500
line console
exec-timeout 0
exit
line telnet
exec-timeout 0
exit
no passwords complexity enable
passwords aging 0
username cisco password encrypted 7af78c911d5b48bea1dc2449d9d89513abeb4be5 privilege 15
no snmp-server server
ip http timeout-policy 0 http-only
ip http secure-server
clock timezone " " 1
clock summer-time web recurring eu
clock source sntp
clock dhcp timezone
ip name-server 10.10.10.1 10.10.11.1
ip telnet server
!
interface vlan 1
ip address 10.10.10.2 255.255.255.0
no ip address dhcp
!
interface vlan 11
name HOME
ip address 10.10.11.2 255.255.255.0
!
interface vlan 12
name MONITORING
ip address 10.10.12.2 255.255.255.0
!
interface vlan 13
name DMZ
ip address 10.10.13.1 255.255.255.0
!
interface vlan 14
name GUESTS
ip address 192.168.1.2 255.255.255.0
!
interface gigabitethernet1/46
switchport trunk allowed vlan add 11,14
!
interface gigabitethernet1/47
switchport trunk allowed vlan add 11,14
!
ip helper-address 10.10.11.2 10.10.11.1 37 42 49 53 137 138
ip helper-address 10.10.12.2 10.10.12.1 37 42 49 53 137 138
ip helper-address 10.10.13.2 10.10.13.1 37 42 49 53 137 138
ip helper-address 192.168.1.2 192.168.1.1 37 42 49 53 137 138
ip helper-address all 10.10.11.1 37 42 49 53 137 138
snmp-server set rlAutomaticClockSetFromPCEnabled rlAutomaticClockSetFromPCEnabled true
-------------------------
1. any idea where is a bug ? router does not assign any IP address to my switch
2. I connect the switch (port 47) with the router (port FA3), and if I later connect any host to the switch, the host is given ip address from 10.10.11.0 pool. shouldn't it be a 192.168.1.0 pool ?
02-23-2013 03:28 PM
I am not able to understand you. What you want to to do and you are working on new config or changing old one.
Please elaborate what u want to do. Then i will be able to guide u in best way possible.
Thanks...
02-24-2013 03:01 AM
these are my current configs.
my questions:
1. why do my hosts connected to switch get ip addresses from 10.10.11.0 pool instead 192.168.1.0 pool ? switch (port GigaEth47) is connected to router (FastEth3). FastEth3 on router belongs to VLAN4 which is within 192.168.1.0 pool.
2. I connect my Access Point to any of switch poet, but nothing happens ...
02-24-2013 06:42 AM
Sample Config to assing IP address in different vlans.
Router Config
ip dhcp excluded-address 192.168.1.1 192.168.1.5
ip dhcp excluded-address 10.10.11.1 10.10.11.5
ip dhcp excluded-address 10.10.12.1 10.10.12.5
ip dhcp excluded-address 10.10.13.1 10.10.13.5
ip dhcp pool vlan1
network 192.168.1.0 255.255.255.0
dns-server 62.233.233.233 87.204.204.204
default-router 102.168.1.1
!
ip dhcp pool vlan11
network 10.10.11.0 255.255.255.0
dns-server 62.233.233.233 87.204.204.204
default-router 10.10.11.1
!
ip dhcp pool vlan12
network 10.10.12.0 255.255.255.0
dns-server 62.233.233.233 87.204.204.204
default-router 10.10.12.1
!
ip dhcp pool vlan13
network 10.10.13.0 255.255.255.0
dns-server 62.233.233.233 87.204.204.204
default-router 10.10.13.1
interface Vlan1
description LAN1$FW_INSIDE$$ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$
ip address 192.168.1.1 255.255.255.0
no shut
!
interface Vlan11
ip address 10.10.11.1 255.255.255.0
no shut
!
interface Vlan12
ip address 10.10.12.1 255.255.255.0
no shut
!
interface Vlan13
ip address 10.10.13.1 255.255.255.0
no shut
!
interface FastEthernet3
NO switchport access vlan 4
switchport mode trunk
switchport turnk encapulation dot1q
switcport trunk allowed vlan all
Switch Config
interface gigabitethernet1/47
switchport mode trunk
switchport turnk encapulation dot1q
switcport trunk allowed vlan all
interface Vlan1
ip address 192.168.1.2 255.255.255.0
ip helper-address 192.168.1.1
!
interface Vlan11
ip address 10.10.11.2 255.255.255.0
!
interface Vlan12
ip address 10.10.12.2 255.255.255.0
!
interface Vlan13
ip address 10.10.13.2 255.255.255.0
!
interface Vlan14
no ip address
!
Now This configuraiton will be enough to assing assign ip address.
Point is that the host which you will connected to any port of switch keep in mind
if u connect host to port gig 0/5
if u assign vlan 1 to gig 0/5 the host will get ip ho 192.168.1.x
if u assign vlan 11 to gig 0/5 the host will get ip ho 10.10.11.x
if u assign vlan 12 to gig 0/5 the host will get ip ho 10.10.12.x
if u assign vlan 12 to gig 0/5 the host will get ip ho 10.10.13.x
**Please Do Rate Helpful Posts**
02-24-2013 09:18 AM
Jawad, many thanks for your config,
I managed to have it working, unfortunately only partially ...
I configured my router according to your instructions. everything went well.
unfortunatelly I cannot configure my switch the way you showed me.
I mean exactly the following line (int GE1/47 part):
"switchport trunk encapsulation dot1q"
my switch does not accept this command in "interface GE" mode
this is not the end of my observations:
I managed to assign exclusively vlan14 to some of the ports. now , if I connect any host, correcct IP address is assigned (192.168.1.0 pool)
the problem is that I wanted to do it with vlan11. in that case no host gets the IP address. they get 169.254.135.44 addresses - instead of 10.10.11.0 address pool
02-24-2013 10:28 AM
I did some more testing
I assigned VLAN 12 to some ports. switch works like a charm. hosts are given CORRECT addreses (10.10.12.0 pool)
looks like VLAN 11 is the only issue.
any ideas ?
02-24-2013 12:50 PM
Kinldy Check Vlan 11 exist in Switch and Router. Also Vlan 11 pool also exist in router.
Check VLan11 status is up in router and switch.
Assing some interface Vlan11 and connect host to that interface.
**Do Rate Helpful Posts**
02-24-2013 01:03 PM
Jawad,
just found the issue. I configured too many VLANs on my router, as a result only some of them were working.
many, many help for your hints.
one thing more if you can still have got some tolerance for me
do you know how to configure an access point with two different SSIDs and connect it to my switch ? I assume my switch port must be exaclty the same as GE47 in previous example..
but I have no clue how to do it on access point side ...
02-24-2013 01:12 PM
Useful Configuration to configure AP with Different SSID in differnet VLANs. hope that will help you.
https://supportforums.cisco.com/docs/DOC-14496
Thanks.
02-27-2013 12:13 PM
good day Jawad,
could you please give me a hand one more time ?
I got everything working till yesterday (I mean AP, switch and router),
now, for some reasons my AP does not assign correct ip addresses to my wireless hosts. it gives addreses like this: 169.254.104.137, and I cannot do anything about it. do you have a clue what my be wrong, or better, do you need a config ?
02-27-2013 02:37 PM
Have you check ap is correct vlan and you configured ap correctly.
Also you can assing static ip to your laptop trying conneting to that ap and check network connectivity is ok through ping. That will confirm you.
Post AP Config
and also post show run of switch port connected to AP.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide