Solved

Process to create a VLAN for HP Procurve switches

Posted on 2006-11-14
10
591 Views
Last Modified: 2012-05-05
Hello,

I understand what a VLAN is.  I understand basically how they work and what their function is.  And I have a general idea of what VLAN I would create for my LAN based on the types of traffic, applications, etc.  I just don't know how to go about setting one up......  I have HP Procurve switches.

Are VLAN ID's similar to SSID's in wireless networking?  For example lets say I wanted to create a VLAN from a specific port on switch1, that goes to switch2, and then to server1...  How would I do that?  
0
Comment
Question by:philmaceri
  • 6
  • 4
10 Comments
 
LVL 17

Expert Comment

by:jburgaard
Comment Utility
What are you going to use the VLANS for?
Is the purpose only to keep broadcast down?
Are the VLANS going to be isolated from each other, or do you plan to route between them?
How do you pref. to config sw.'  web/menu/cli ?

lets say I wanted to create a VLAN 7 from port 3 on switch1 out on port 25 connected to switch2 port 26 and from sw2 port 4 to server1:

sw1:
config
vlan 7
name VL-7
untagged 3
tagged 25
exit

sw2:
config
vlan 7
name VL-7
untagged 4
tagged 26
exit
0
 

Author Comment

by:philmaceri
Comment Utility
Thanks jburgaard!

I work in a manufacturing environment.  We have torque guns and plcs that our systems are constantly polling and checking for changes in bits.  In addition to that we have line stations (desktp pcs) that are acting as terminals guiding the operators through the build process.  The line stations use IE to serve up ASP pages pulled from a sql server.  
0
 
LVL 17

Expert Comment

by:jburgaard
Comment Utility
In ex. above tagging (short for IEEE 802.1Q tagging ) means : the packets carry a tag telling the sw. to what vlan the packet belongs.
So many vlans could be carried this way on the link betw. sw1 and sw2 . So perhaps you could say there is some sort of analog. to SSID's in wireless networking.
In contrast only one untagged vlan pr. port to a PC.
0
 

Author Comment

by:philmaceri
Comment Utility
If I setup a vlan...for example lets say a vlan that goes from a tcp/ip torque tool to a server...  will that torque tool be able to talk to other devices or just use the route on the vlan?  Does traffic on the vlan take priority or does it actually limit those devices from talking to other things?
0
 
LVL 17

Expert Comment

by:jburgaard
Comment Utility
As long as the vlan does not have an IP, the trafic is isolated within this vlan.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Comment

by:philmaceri
Comment Utility
Can I have multiple nodes or clients on a single vlan?  by assigning their untagged port on the switch the same vlan name?
0
 
LVL 17

Expert Comment

by:jburgaard
Comment Utility
yes
like in

sw1:
config
vlan 7
name VL-7
untagged 3,8,14,16-18
tagged 25
exit

then also ports
8,14,16,17 and 18
could be connected to same server on sw2 port 4

0
 

Author Comment

by:philmaceri
Comment Utility
Okay.  Great!

The last question is...  if and when I setup a vlan on any given switch...  the port I specify as tagged (which will be the uplink)...  will that uplink port be able to be used outside the vlan?
0
 
LVL 17

Accepted Solution

by:
jburgaard earned 500 total points
Comment Utility
' the port I specify as tagged (which will be the uplink)...  will that uplink port be able to be used outside the vlan?'
That is exactly the idea:

like in

sw1:
config
vlan 7
name VL-7
untagged 3
tagged 25
exit
vlan 8
name VL-8
untagged 2
tagged 25
exit


sw2:
config
vlan 7
name VL-7
untagged 4
tagged 26
exit
vlan 8
name VL-8
untagged 24
tagged 26
exit

here VL-8 caries (untagged)packets from sw1/port2
via the link to sw2 (tagged with VLAN ID 8)
and the packets can be seen [by a server] (Vlan-info stripped of) on sw2/port24

hope this help
0
 
LVL 17

Expert Comment

by:jburgaard
Comment Utility
glad to help
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now