Solved

2950 Setup

Posted on 2004-10-05
2
265 Views
Last Modified: 2010-04-10
Im in the process of setting up a 2950 switch for the first time.  I went in and set the IP address for the VLAN1 w/ the subnet now I am confused as to what I have to do next.  I would like to use port 1 as the uplink port.
0
Comment
Question by:jamesPeck
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 43

Expert Comment

by:JFrederick29
ID: 12229082
The switch will work out of the box.  No configuration is necessary to operate the switch.  If you want to uplink the switch, simply use a cross over cable between switches.  Basic configuration should be applied to the switch for security purposes, i.e. set the enable secret password and setup the VTY lines for telnet access if desired:

switch>en
switch#conf term
switch(config)#enable secret <password>
switch(config)#line vty 0 15
switch(config-line)#password <password>
switch(config-line)#login
0
 
LVL 11

Accepted Solution

by:
PennGwyn earned 50 total points
ID: 12231946
By default all of the ports will be on VLAN 1; if you're not using multple VLANs, you don't need to change this.  If your network does use multiple VLANs, you'll want to configure the uplink as a trunk port, and likewise the port that it connects to on another switch.

Use a crossover; on (non-Cisco) switches that have a dedicated uplink port, it's wired as a crossover so that a straight cable can be used.

0

Featured Post

Report: Liquid Web beats Amazon, Rackspace & More

A study by performance analyst firm Cloud Spectator finds that Liquid Web beats rivals Amazon, Rackspace and DigitalOcean when it comes to website and cloud application performance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Comware OS Simulator and GNS3 5 219
How to map a network share in Windows Recovery Environment? 2 48
Add HP 8210 Printer to Airport Extreme with USB 5 59
CISCO WIFI 6 64
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question