Solved

Cisco switch trunking commands

Posted on 2010-09-08
4
483 Views
Last Modified: 2012-05-10
If I set the "switchport mode trunk" command on an interface, but don't specify the "switchport trunk allowed vlan X,X" command as well, what vlans are allowed through?  Also, if this same interface has the command set on it "switchport access vlan 2", does that do anything or is it a non factor since the interface is set to trunk mode?
0
Comment
Question by:jpletcher1
4 Comments
 
LVL 24

Accepted Solution

by:
rfc1180 earned 42 total points
Comment Utility
>but don't specify the "switchport trunk allowed vlan X,X" command as well, what vlans are allowed through?

all of them are allowed

> Also, if this same interface has the command set on it "switchport access vlan 2", does that do anything or is it a non factor since the interface is set to trunk mode?

non-factor
0
 
LVL 6

Assisted Solution

by:Gunter17
Gunter17 earned 42 total points
Comment Utility
By default a trunk link carries all VLANs that exist on the switch. This is because all VLANs are active on a trunk link; and as long as the VLAN is in the switch's local database, traffic for that VLAN is carried across the trunks.

On a Cisco switch, ports are assigned to a single VLAN. These ports are referred to as access ports and provide a connection for end users or node devices, such as a router or server.
...
For the IOS device, you must first select the port (or port range for integrated IOS) and then use the switchport access vlan command followed by the VLAN number.

This is all from ciscopress.com.

To answer your question outright:
1. If a switchport trunk allowed vlan is not specified and the port is in trunk mode, the port belongs to all VLANs.
2. If the switchport access vlan 2 command is given, but the port is in trunk mode the command will be ignored.

0
 
LVL 17

Assisted Solution

by:Kvistofta
Kvistofta earned 41 total points
Comment Utility
0
 

Author Closing Comment

by:jpletcher1
Comment Utility
Thanks guys, this was the info I was looking for.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
SSL RA VPN 7 70
Windows 7 Share with XP 22 57
Connecting LAN to a new leased line 2 15
RDP Sonicwall 8 19
Article by: IanTh
Hi Guys After a whole weekend getting wake on lan over the internet working, I thought I would share the experience. Your firewall has to have a port forward for port 9 udp to your local broadcast x.x.x.255 but if that doesnt work, do it to a …
Let’s list some of the technologies that enable smooth teleworking. 
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now