Solved

how can i add vlans on a cisco 2950

Posted on 2003-10-30
5
296 Views
Last Modified: 2010-04-11
how can i add vlans on a cisco 2950
0
Comment
Question by:spinoza79
5 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 25 total points
ID: 9656210
0
 
LVL 9

Assisted Solution

by:svenkarlsen
svenkarlsen earned 25 total points
ID: 9656301
Or you may have received the Cluster Management Suite (CMS) on the supporting disks with your switch, - this is a very nice tool for managing a cisco 2950 (don't mind the 'cluster', it  can also be used for a single switch).

Read about it here:
http://www.cisco.com/en/US/products/hw/switches/ps628/products_configuration_guide_chapter09186a00801cde68.html#999123
0
 
LVL 26

Expert Comment

by:jar3817
ID: 9658994
I'm pretty sure that the 2950 only support ISL and 802.1Q, they don't actually route vlans (but I might be wrong). Meaning you could have ports 1-12 on vlan1 and 13-24 on vlan2 and then your uplink port set as a vlan trunk.  Then your uplink trunk connected to some switch with layer3 switching capabilities (we use a Catalyst 4006).  In this situation all you have to do is configure what interfaces are in which vlans:

like so:
switch#config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)#interface fastEthernet 0/1
switch(config-if)#switchport access vlan 2  

and then change your uplink port to a trunking port

switch(config)#interface fastEthernet 0/25
switch(config-if)#switchport mode trunk

You have to do the same to the other end of the uplink also.

hope this helps a little

0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question