cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1123
Views
0
Helpful
2
Replies

Span VLAN across multiple switches

l.broer
Level 1
Level 1

Hello all.
I have a problem configuring my SG350 switches reasonably.

 

The requirement is that both switches run two VLANs. VLAN1 of one switch should then together with the VLAN1 of the second switch make one unit.
All information about the VLANs should be exchanged between the VLANs via a trunk port.

 

Zeichnung1.png

 

Unfortunately, this does not yet work with my previous configurations.

I am not sure what membership mode the individual ports must have and what other configurations I need to make so that the system behaves correctly.

 

I would be happy if someone could help me.
Thanks a lot and best regards

SG350-10p:

config-file-header
v2.5.7.85 / RCBS3.1_930_871_059
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink none
unit-type-control-end
!
spanning-tree loopback-guard
vlan database
vlan 10,20
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone
voice vlan oui-table add 00036b Cisco_phone
voice vlan oui-table add 00096e Avaya
voice vlan oui-table add 000fe2 H3C_Aolynk
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone
voice vlan oui-table add 00e075 Polycom/Veritel_phone
voice vlan oui-table add 00e0bb 3Com_phone
errdisable recovery interval 90
errdisable recovery cause loopback-detection
errdisable recovery cause port-security
errdisable recovery cause dot1x-src-address
errdisable recovery cause acl-deny
errdisable recovery cause stp-bpdu-guard
errdisable recovery cause stp-loopback-guard
errdisable recovery cause udld
errdisable recovery cause storm-control
no eee enable
bonjour interface range vlan 1
qos advanced ports-trusted
qos advanced-mode trust dscp
qos map dscp-queue 0 to 1
qos map dscp-queue 8 to 2
qos map dscp-queue 9 to 1
qos map dscp-queue 10 to 1
qos map dscp-queue 11 to 1
qos map dscp-queue 12 to 1
qos map dscp-queue 13 to 1
qos map dscp-queue 14 to 1
qos map dscp-queue 15 to 1
qos map dscp-queue 16 to 1
qos map dscp-queue 17 to 1
qos map dscp-queue 18 to 1
qos map dscp-queue 19 to 1
qos map dscp-queue 20 to 1
qos map dscp-queue 21 to 1
qos map dscp-queue 22 to 1
qos map dscp-queue 23 to 1
qos map dscp-queue 24 to 1
qos map dscp-queue 25 to 1
qos map dscp-queue 26 to 1
qos map dscp-queue 27 to 1
qos map dscp-queue 28 to 1
qos map dscp-queue 29 to 1
qos map dscp-queue 30 to 1
qos map dscp-queue 31 to 1
qos map dscp-queue 32 to 1
qos map dscp-queue 33 to 1
qos map dscp-queue 34 to 1
qos map dscp-queue 35 to 1
qos map dscp-queue 36 to 1
qos map dscp-queue 37 to 1
qos map dscp-queue 38 to 1
qos map dscp-queue 39 to 1
qos map dscp-queue 40 to 1
qos map dscp-queue 41 to 1
qos map dscp-queue 42 to 1
qos map dscp-queue 43 to 1
qos map dscp-queue 44 to 1
qos map dscp-queue 45 to 1
qos map dscp-queue 46 to 3
qos map dscp-queue 47 to 1
qos map dscp-queue 48 to 1
qos map dscp-queue 49 to 1
qos map dscp-queue 50 to 1
qos map dscp-queue 51 to 1
qos map dscp-queue 52 to 1
qos map dscp-queue 53 to 1
qos map dscp-queue 54 to 1
qos map dscp-queue 55 to 1
qos map dscp-queue 56 to 4
qos map dscp-queue 57 to 1
qos map dscp-queue 58 to 1
qos map dscp-queue 59 to 1
qos map dscp-queue 60 to 1
qos map dscp-queue 61 to 1
qos map dscp-queue 62 to 1
qos map dscp-queue 63 to 1
ip ssh server
ip telnet server
!
interface vlan 10
ip address 192.168.10.53 255.255.255.0

!
interface GigabitEthernet1
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet2
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet3
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet4
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet5
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet6
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet7
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet8
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet9
switchport mode trunk
switchport trunk allowed vlan 10
!
interface GigabitEthernet10
switchport mode trunk
switchport trunk allowed vlan 20
!
exit
macro auto disabled
macro auto built-in parameters switch $native_vlan 1
ip igmp snooping
ip igmp snooping vlan 10
ip igmp snooping vlan 20
ip igmp snooping vlan 10 querier
ip igmp snooping vlan 20 querier

Sg350-20p:

config-file-header
switch280596
v2.4.0.94 / RTESLA2.4_930_181_045
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink none
unit-type-control-end
!
spanning-tree loopback-guard
vlan database
vlan 10,20
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone
voice vlan oui-table add 00036b Cisco_phone
voice vlan oui-table add 00096e Avaya
voice vlan oui-table add 000fe2 H3C_Aolynk
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone
voice vlan oui-table add 00e075 Polycom/Veritel_phone
voice vlan oui-table add 00e0bb 3Com_phone
errdisable recovery interval 90
errdisable recovery cause loopback-detection
errdisable recovery cause port-security
errdisable recovery cause dot1x-src-address
errdisable recovery cause acl-deny
errdisable recovery cause stp-bpdu-guard
errdisable recovery cause stp-loopback-guard
errdisable recovery cause udld
errdisable recovery cause storm-control
no eee enable
bonjour interface range vlan 1
qos advanced ports-trusted
qos advanced-mode trust dscp
qos map dscp-queue 0 to 1
qos map dscp-queue 8 to 2
qos map dscp-queue 9 to 1
qos map dscp-queue 10 to 1
qos map dscp-queue 11 to 1
qos map dscp-queue 12 to 1
qos map dscp-queue 13 to 1
qos map dscp-queue 14 to 1
qos map dscp-queue 15 to 1
qos map dscp-queue 16 to 1
qos map dscp-queue 17 to 1
qos map dscp-queue 18 to 1
qos map dscp-queue 19 to 1
qos map dscp-queue 20 to 1
qos map dscp-queue 21 to 1
qos map dscp-queue 22 to 1
qos map dscp-queue 23 to 1
qos map dscp-queue 24 to 1
qos map dscp-queue 25 to 1
qos map dscp-queue 26 to 1
qos map dscp-queue 27 to 1
qos map dscp-queue 28 to 1
qos map dscp-queue 29 to 1
qos map dscp-queue 30 to 1
qos map dscp-queue 31 to 1
qos map dscp-queue 32 to 1
qos map dscp-queue 33 to 1
qos map dscp-queue 34 to 1
qos map dscp-queue 35 to 1
qos map dscp-queue 36 to 1
qos map dscp-queue 37 to 1
qos map dscp-queue 38 to 1
qos map dscp-queue 39 to 1
qos map dscp-queue 40 to 1
qos map dscp-queue 41 to 1
qos map dscp-queue 42 to 1
qos map dscp-queue 43 to 1
qos map dscp-queue 44 to 1
qos map dscp-queue 45 to 1
qos map dscp-queue 46 to 3
qos map dscp-queue 47 to 1
qos map dscp-queue 48 to 1
qos map dscp-queue 49 to 1
qos map dscp-queue 50 to 1
qos map dscp-queue 51 to 1
qos map dscp-queue 52 to 1
qos map dscp-queue 53 to 1
qos map dscp-queue 54 to 1
qos map dscp-queue 55 to 1
qos map dscp-queue 56 to 4
qos map dscp-queue 57 to 1
qos map dscp-queue 58 to 1
qos map dscp-queue 59 to 1
qos map dscp-queue 60 to 1
qos map dscp-queue 61 to 1
qos map dscp-queue 62 to 1
qos map dscp-queue 63 to 1
ip ssh server
ip telnet server
!
interface vlan 10
ip address 192.168.10.20 255.255.255.0

!
interface GigabitEthernet1
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet2
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet3
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet4
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet5
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet6
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet7
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet8
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 10
!
interface GigabitEthernet9
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet10
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet11
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet12
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet13
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet14
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet15
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!
interface GigabitEthernet16
spanning-tree portfast
spanning-tree bpduguard enable
switchport access vlan 20
!

interface GigabitEthernet17
switchport mode trunk
switchport trunk native vlan 10
!
interface GigabitEthernet18
switchport mode trunk
switchport trunk native vlan 20
!
interface GigabitEthernet19
switchport mode trunk
switchport trunk native vlan 10
!
interface GigabitEthernet20
switchport mode trunk
switchport trunk native vlan 20
!
exit
macro auto disabled
macro auto built-in parameters switch $native_vlan 1
ip igmp snooping
ip igmp snooping vlan 10
ip igmp snooping vlan 20
ip igmp snooping vlan 10 querier
ip igmp snooping vlan 20 querier

 

2 Replies 2

balaji.bandi
Hall of Fame
Hall of Fame

not sure what port you used to connect each other just try port trunk instead of native vlan in it and let us know if that works ?

 

example - for testing both the side as below : thinking this is the port you used to connect  both the switches ? hope you connecting 1 link or 2 links ?

 

interface GigabitEthernet19
switchport mode trunk
no switchport trunk native vlan 10

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Hello


@l.broer wrote:

Hello all.

The requirement is that both switches run two VLANs. VLAN1 of one switch should then together with the VLAN1 of the second switch make one unit.


You need to use stack cabling to make these two switch's one logical unit, Suggest you wipe the configuration ot both switch's and then reconnect via stack cables 

 

Then follow this guide 


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul
Review Cisco Networking for a $25 gift card