Solved

Dot1q trunking over a wireless bridge.

Posted on 2007-11-17
6
3,485 Views
Last Modified: 2008-02-01
We are implementing a new switch architecture that adds VLAN technology. Each of our VLANs can operate seemlessly within the immediate building. We have one building (300 yds away from the main building) that can only physically connect back to the main building via wireless (buffalo air stations set to WDS bridging).

My question is, if I have a VLAN capable switch on one end behind the wireless and another on the other behind the wireless, can I send VLAN tagged frames through without it stripping the headers?

I figure that since 802.11 runs at layer two, it will do no harm to the frame headers and rebuild them properly on the other end of the connection, then whatever interface that the wireless is plugged into on the switches would be my trunk link.

Thoughts?

Thanks in advance.
0
Comment
Question by:AmericanBridge
6 Comments
 
LVL 9

Expert Comment

by:svs
ID: 20307338
Why don't you ask the manufacturer?  They will know.
0
 
LVL 50

Expert Comment

by:Don Johnston
ID: 20307454
Even though the 802.11 is layer two, so is 802.1q. So in order to trunk wirelessly, the wireless device has to support it. You'll need to check the spec's of whatever wireless device you're using to see if it supports 802.1q.
0
 
LVL 1

Author Comment

by:AmericanBridge
ID: 20324831
I am going to test a trunk over wireless tomorrow. I'll post how it goes.

AB
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 1

Author Comment

by:AmericanBridge
ID: 20339875
Well I was able to trunk a wireless connection with the two buffalos. There is alot of hype over this config so below is the configuration...

One 3524 (Cisco) with a Buffalo connected to fa0/1
: VLAN configuration

VLANs 1, 2, and 3 with data on the Cisco switch

Fa0/1: VLAN 1 Trunk mode, encapsulation dot1q, native VLAN 1
Fa0/2: VLAN 2 access mode (Printer)
Fa0/3: VLAN 3 access mode (Client)

***Other end of wireless****
Cisco 2600XL with Buffalo Airstation on port fa0/1

Fa0/1: VLAN 1: " Same as 3524"
Fa0/2: VLAN 2: " Same as 3524"
Fa0/3: VLAN 3: " Same as 3524"
Gi0/23: VLAN 1: " Trunk, encapsulation dot1q"

NOTE: A core switch in the main building is performs the routing between vlans

Over the wireless, I can ping from a client to a printer on the other end, and vice versa.
So, the wireless will trunk under WDS mode. WDS mode is the bridging mode for the wireless links.
0
 
LVL 2

Accepted Solution

by:
pulkit1982 earned 500 total points
ID: 20355982
You will have to Configure SSID in  Native VLAN for the same.
The Switch interface connecting to the AP will be configured as Trunk port-
interface GigabitEthernet0/1
 switchport trunk encapsulation dot1q
 switchport trunk native vlan 12
Switchport trunk allowed VLAN 4,12,74
 switchport mode trunk
 switchport nonegotiate
refering to the above Configuration the AP management IP will belong to VLAN 12 network and SSID will be configured for VLAN 12.

I hope this will work.
0
 
LVL 1

Author Comment

by:AmericanBridge
ID: 20383471
Yea,

I got it working ok.

The SSID didn't have to be added to the config since the two APs actaully act like a WDS bridge. They think they are connected via ethernet cable basically.

In the case of an Aironet with multiple wireless connections, your config would be mandatory.

***Message to site Admin, I am accepting a solution but please leave this question open. It is very useful info. Thanks.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

Security is one of the biggest concerns when moving and migrating your data from your on-premise location to the Public Cloud.  Where is your data? Who can access it? Will it be safe from accidental deletion?  All of these questions and more are imp…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now