Solved

trunking for vlans

Posted on 2006-07-01
3
423 Views
Last Modified: 2010-03-19
Quick easy question.... i have two vlans on a switch that i want to be able to talk to eachother. From what I understand, I need to make a trunk port on that switch and send it to a router in order to get the vlans to talk to each other. What I would then do is config the ip helper address to my dhcp server so it will hand out the proper ip addresses.

The question is, Does the port on the router have to be a trunk port as well??
0
Comment
Question by:khyer123
  • 2
3 Comments
 
LVL 1

Accepted Solution

by:
atifawan earned 250 total points
Comment Utility
A trunk is negotiated (or hard coded) between two devices supporting a common trunking mechanism (802.1q or ISL). Both sides need to be configured for trunking and to answer your question, yes the router port has to be configured as a trunk. For routers the method is to configure subinterfaces per VLAN. For a sample configuration please refer to the following link:

http://www.cisco.com/en/US/tech/tk389/tk390/technologies_configuration_example09186a00800949fd.shtml
0
 
LVL 4

Author Comment

by:khyer123
Comment Utility
aahh alright so that was my problem. i forgot to enable trunk port on my router! that's why my dhcp never got the ip address request broadcast. thanks for your help!!
0
 
LVL 1

Expert Comment

by:atifawan
Comment Utility
You are welcome.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now