Solved

CCNA Switch Subintf question

Posted on 2004-09-16
3
312 Views
Last Modified: 2010-04-10
Hey, i got the test tommorow and a quick question:

On a switch (1900 or 2950), when you want to configure Inter-VLAN Routing, what are the proper configuration steps?

Is is
switch#config t
switch(config)#int f0/0.1
switch(config-subif)#encapsulation isl (or dot1q for 2950) "vlan#"

or did i miss something?  Thanks!
0
Comment
Question by:smashmouthftball
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 300 total points
ID: 12083861
You cannot configure inter-vlan routing on either a 1900 or a 2950. You need a layer 3 switch to do that.
However, you can use a "router-on-a-stick".
Switchport setup for trunking
ROUTER interface:

ROUTER#config t
ROUTER(config)#int f0/0.1
ROUTER(config-subif)#encapsulation isl (or dot1q for 2950) "vlan#"
0
 

Author Comment

by:smashmouthftball
ID: 12084922
Ahh now that makes sense...telling the router to move packets from switch to switch...do you have to put in the encapsulation isl (or dot1q for 2950) "vlan#" command for each vlan you want to route through the router, or will just one do?
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 12084993
You have to have a separate router sub-interface for each VLAN, so yes, you need to specify the encap and the vlan#
i.e.

interface fa0/0
  ip address x.x.x.1 255.255.255.0

interface f0/0.2
  ip address x.x.y.1 255.255.255.0
 encap dot1q 2

interface f0/0.3
 ip address x.x.z.1 255.255.255.0
 encap dot1q 3

<etc>
Notice that VLAN 1 does not require a sub-if. The major interface F0/0 in this case, will automatically recognize VLAN1 traffic without specifying encapsulation or vlan#

0

Featured Post

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question