Solved

trunking for vlans

Posted on 2006-07-01
3
429 Views
Last Modified: 2010-03-19
Quick easy question.... i have two vlans on a switch that i want to be able to talk to eachother. From what I understand, I need to make a trunk port on that switch and send it to a router in order to get the vlans to talk to each other. What I would then do is config the ip helper address to my dhcp server so it will hand out the proper ip addresses.

The question is, Does the port on the router have to be a trunk port as well??
0
Comment
Question by:khyer123
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 1

Accepted Solution

by:
atifawan earned 250 total points
ID: 17024187
A trunk is negotiated (or hard coded) between two devices supporting a common trunking mechanism (802.1q or ISL). Both sides need to be configured for trunking and to answer your question, yes the router port has to be configured as a trunk. For routers the method is to configure subinterfaces per VLAN. For a sample configuration please refer to the following link:

http://www.cisco.com/en/US/tech/tk389/tk390/technologies_configuration_example09186a00800949fd.shtml
0
 
LVL 4

Author Comment

by:khyer123
ID: 17024246
aahh alright so that was my problem. i forgot to enable trunk port on my router! that's why my dhcp never got the ip address request broadcast. thanks for your help!!
0
 
LVL 1

Expert Comment

by:atifawan
ID: 17024302
You are welcome.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses
Course of the Month5 days, 20 hours left to enroll

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question