• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 462
  • Last Modified:

CISCO 3560G Catalyst

I would like to Configure a CISCO 3560G Catalyst to connect to a CISCO 4506E Catalyst Switch.
I need to create one VLAN for this configuration along with the ports on teh 3560G switch.
0
pbtech
Asked:
pbtech
  • 2
1 Solution
 
AnthonyHamonCommented:
First of all, you need to use a crossover cable to connect the two switches.  Also, you may choose to have two uplinks between the switches (connecting to multiple blades on the 4506E) to improve resilience.  The following configuration includes a dummy VLAN which is a good practice to protect against various exploits.

Global configuration extract for both switches to define the VLANs
vlan <vlan number>
 name <vlan name>
vlan 900
 name NATIVE

Access port configuration on both switches:
interface <interface ID>
 switchport mode access
 switchport access vlan <vlan number>
 spanning-tree portfast
 spanning-tree bpduguard enable

Uplink port(s) of each switch
interface <interface ID>
 description ## Uplink to <switch name> switch ##
 switchport mode trunk
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan <vlan number>
 switchport trunk native vlan 900
 spanning-tree bpduguard enable
0
 
Istvan KalmarHead of IT Security Division Commented:
Hi,

On the uplink iterface not need "spanning-tree bpduguard enable" because the port will be blocked as soon het a bPDU packet!

Best regards,
Istvan
0
 
pbtechAuthor Commented:
1) The Uplinks on the Core Switch 4506E are taken.
2) We will need to run a cross-over cable from a port on the core switch (4506E) to a port on the 3560G switch.
0
 
AnthonyHamonCommented:
Yes, that is fine, the configuration I posted covers this.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

WEBINAR: 10 Easy Ways to Lose a Password

Join us on June 27th at 8 am PDT to learn about the methods that hackers use to lift real, working credentials from even the most security-savvy employees. We'll cover the importance of multi-factor authentication and how these solutions can better protect your business!

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now