Solved

connecting 2 VLAN's on 2 Switches

Posted on 2010-09-08
4
1,122 Views
Last Modified: 2012-05-10
Dear All,


I have a 3COM 4200G-48pt and a 3COM 4210G-48pt switch.

The 4200G has two VLANs :

* LAN (32 ports)
* SAN (16 ports)

both with untagged member ports. I assume that basically this is a "port VLAN" where I simply split up the switch. For the computers connected to the switch, it is as if I had 2 seperate switches.

There's no need for any traffic going between the two VLAN's.


Now I want to add the new 4210G to get redundancy.

I made the same configuration on the 4210G, with 2 VLAN's with untagged ports.

There are 2 links between each lan on each switch, so :

- Switch 1 - pt 48 --> Switch 2 - pt 48
- Switch 1 - pt 47 --> Switch 2 - pt 47
- Switch 1 - pt 1 --> Switch 2 - pt 1
- Switch 1 - pt 2 --> Switch 2 - pt 2


for some reason, the system works fine for the "SAN - VLAN" but not for the "LAN - VLAN"...



SO:

1° is this configuration OK?
2° any clues why it doesn't work with LAN-VLAN ?

3° we have 5 desks with 4 workstations each. Currently, each desk has a small 8 pt switch. Is it a good idea to connect those switches to each 3COM switch?


thanks in advance!

Nicolas

0
Comment
Question by:nd2u
  • 2
4 Comments
 
LVL 21

Accepted Solution

by:
from_exp earned 250 total points
ID: 33625680
thing you are going to will never work.

there are "redundant paths" definitions. To deal with redundant ports switches use spanning tree, because redundant paths should be working only when primary are down.
If you have 8port switches at every desk, then most likely they don't support spanning tree, so when you connect it to two switches (which are interconnected) you'll get a loop and your network will stop working.

If you want to interconnect two switches, then you shouldn't do it in way you do, but you have to take single port (or several ports joined in a link aggregation group) in every switch and configure it as tagged for both vlans.
0
 

Author Comment

by:nd2u
ID: 33625715
maybe it's best we forget about the desktop switches for the moment.


As for the inter switch connection... I don't see what's the problem actually...

So your solution is to interconnect via eg 4 ports of each switch and configure those ports as TAGGED members for each VLAN ?
0
 
LVL 21

Expert Comment

by:from_exp
ID: 33625753
and to configure not only tagged for each vlan, but also as a member or link aggregation group, otherwise only one of them will work, but 3 other will be disabled by spanning tree.
0
 
LVL 5

Assisted Solution

by:BooSTid
BooSTid earned 250 total points
ID: 33632322
You do not need to use multiple ports to connect them; although you can if you want to set up an etherchannel.

Ports that are going to pass traffic of multiple VLANS need to be tagged with that VLAN number. This is equivalent to trunking in the Cisco world.

If the port only has one vlan, or an endpoint, it is untagged for that vlan.

If the port is part of an etherchannel, it needs to be part of a trunk group.

If you have ports 5 ports, 1-4 with vlans 1-4, and then a fifth port to carry them all to another switch, you would essentially do this:

Port 1 untagged vlan 1
Port 2 untagged vlan 2
Port 3 untagged vlan 3
Port 4 untagged vlan 4
port 5 tagged vlan 1-4

This is simplified of course.

If you had 6 ports with the same setup, but with ports 5 and 6 carrying all the traffic as a group (etherchannel for cisco guys), you would assign 5 and 6 to trunk group 1, and then tag trunk group 1 with vlans 1-4.

Now that the basics are out of the way, to answer your questions:

1. You need to explain why adding a second switch is bringing you redundancy. For clusters and NIC teams, this is perfectly acceptable. For backbone layers, this is also acceptable. But if this is for endpoint devices with single NICs, what's the point? Are you giving redundancy to the desktop switches? If this is the case, it probably won't work.

2. Need the above info. It will probably be helpful to post configs, as it may not be a topological issue, but one of configuration.

3. Desktop switches to individual ports should be fine, just be careful not to introduce any kind of loop. Spanning tree may or may not take down your whole network heh.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Certain printers randomly go offline 15 74
Shoretel Voice Networks. 6 47
VLAN and IP Addressing Schema 35 47
Lost hyper V virtual network 1 38
This article is focussed on erradicating the confusion with slash notations. This article will help you identify and understand the purpose and use of slash notations. A deep understanding of this will help you identify networks quicker especially w…
There are times where you would like to have access to information that is only available from a different network. This network could be down the hall, or across country. If each of the network sites have access to the internet, you can create a ne…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now