Solved

Tunneling vlans

Posted on 2008-10-01
2
1,531 Views
Last Modified: 2008-10-06
Howdy,
  This question is kind of off the wall but curiosity is kicking in here. Is it possible on a Cisco c3750 switch or any higher switch to create a tunnel between two vlans say vlan 20 to vlan 40? I know you can create Tunnels between routers. I was just wondering if it's possible to create that virtual connection between two vlans.

Hope this makes sense..
0
Comment
Question by:Paktusjet
2 Comments
 
LVL 13

Accepted Solution

by:
Quori earned 250 total points
ID: 22621564
I am presuming that the VLANs are on two separate locales, as tunneling between two VLANs at the one location would be mundane.

Usually you'd just create a GRE tunnel between routes and setup routing for the relevant VLANs and sites, however you are referring to a Layer2 tunnel: http://www.cisco.com/en/US/tech/tk364/technologies_configuration_example09186a00801f66fa.shtml
0
 
LVL 10

Expert Comment

by:kyleb84
ID: 22634759
Iif you just want to bridge the VLANs.. I.E. make them as one:

On one switch:

int Fa0/1
 switchport access vlan 20
 switchport trunk encapsulation dot1q
 switchport mode access

Other switch:

int Fa0/2
 switchport access vlan 40
 switchport trunk encapsulation dot1q
 switchport mode access

Plug the ports together.

Voila, kinda defies the point of having VLANs though...
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question