Solved

VLAN setup on Power Connect 3348

Posted on 2008-10-10
3
689 Views
Last Modified: 2012-03-15
I have two Dell switches (PowerConnect 3348 and PowerConnect 3424) in two buildings that are connected via fiber-optic on the fiber ports. I am trying to setup a wireless system on a different VLAN for security reasons. On the 3348 I have ports 33-36 setup as VLAN2 and port 24 on the 3424 on VLAN2. However, I cannot get them to communicate between the two switches. I have an access point on port 33 on the 3348 and another one on port 24 on the 3424. I also have a router setup on port 34 on the 3348 that goes to a DSL line that allows Internet access for our customers that they access via the access points. How do I setup the switches so that those ports can connect to each other and not bleed into our internal subnet that is setup as VLAN1 on all the other ports?
0
Comment
Question by:henryt32
3 Comments
 
LVL 4

Assisted Solution

by:damalano
damalano earned 100 total points
ID: 22694407
Don't know dell that much but found this on creating vlan routing.

http://www.dell.com/downloads/global/products/pwcnt/en/app_note_38.pdf

Good luck
0
 

Author Comment

by:henryt32
ID: 22780536
Anybody else have any ideas?
0
 
LVL 1

Accepted Solution

by:
rupspan earned 150 total points
ID: 22817700
You need to turn on VLAN Trunking and allow all you VLANs to traverse this link.  When you have 2 switches you have to create a Trunk line between them.

Trunking is a special function that can be assigned to a port, making that port capable of carrying traffic for any or all of the VLANs accessible by a particular switch. Such a port is called a trunk port, in contrast to an access port, which carries traffic only to and from the specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL tags or 802.1Q tags) as they pass between switches, so each frame can be routed to its intended VLAN. An access port does not provide such tags, because the VLAN for it is pre-assigned, and identifying markers are therefore unnecessary.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

When posting a question about a Cisco ASA, Cisco Router or Cisco Switch, it can aid diagnosis if a suitably sanitised copy of the config is provided. It is much better to leave as much of the configuration as original as possible, as it could be tha…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now