Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Cisco Catalyst Switch Split

Posted on 2011-09-13
8
Medium Priority
?
621 Views
Last Modified: 2012-06-27
I need to take a 24-port Catalyst switch and basically carve it up into four distinct six-port switches. Each "switch" needs to be completely isolated from the other "switches". I assume VLANs would be required here, however the traffic needs to be free of any VLAN tagging, as it's connected to ISP equipment. These VLANs only need to exist on this one switch. How can this be done so there is no tagging whatsoever?

The longer story (though not completely required) is that we have three ISPs in our office and a redundant pair of Internet routers. Since the ISP equipment only has one port each, this Catalyst switch would split the ISP traffic to each router, as only one will be active at a time, using each of the first three VLANs. Then the LAN traffic from the routers would use the fourth "switch" VLAN to combine links before hitting the office LAN. Image attached.

Thanks!
VLANs.png
0
Comment
Question by:MacGyverSolutions
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
  • 2
8 Comments
 
LVL 26

Expert Comment

by:Soulja
ID: 36530724
I don't know if I completely understand your requirements, but you should just be able to create the vlans, assigned the ports with switch port access vlan x, switchport mode access. As long as you don't create any trunks there will be no tagging.
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 36531128
Soulja has explained exactly what you need...

This code will put ports 1-6 in VLAN1, 7-12 in VLAN2, 13-18 in VLAN3 and 19-24 in VLAN4...

conf t
vlan 2
exit
vlan 3
exit
vlan 4
exit
int range gi0/1 - 6
 switchport mode access
int range gi0/7-12
 switchport mode access
 switchport access vlan 2
int range gi0/13 - 18
 switchport mode access
 switchport access vlan 3
int range gi0/19 - 24
 switchport mode access
 switchport access vlan 4
end
0
 
LVL 2

Author Comment

by:MacGyverSolutions
ID: 36532373
I will try this out soon and let you know, thanks! If I don't specify a VLAN on the first range (1-6), is VLAN 1 assumed, and I will stop getting these native VLAN mismatch errors?
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 26

Expert Comment

by:Soulja
ID: 36532404
Native vlan mismatch errors? You should not be getting those unless you have trunks configured with mismatch native vlans or have mismatched access ports plugged into each other. Since you are not using trunks I assume the latter.
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 36532677
As Soulja says, you will only get native VLAN mismatch errors if trunks are configured.

If you don't set a VLAN on the first range VLAN1 is assumed by default.
0
 
LVL 2

Author Comment

by:MacGyverSolutions
ID: 36552508
There was still some weirdness after this change because I was getting "Received 802.1Q BPDU on non trunk FastEthernet0/13 VLAN4" and "Blocking FastEthernet0/13 on VLAN0004. Inconsistent port type" but apparently switching to RPVST fixed this up. Perhaps the ISP was sending their own BPDU packets?

The configuration DOES seem to be working, however the port connected to one of the WAN ports is blinking green/orange back and forth, with short spurts of what appears to be regular activity every minute or so. Anyone know what this pattern means?
0
 
LVL 2

Accepted Solution

by:
MacGyverSolutions earned 0 total points
ID: 37153965
Ended up resolving this by setting up four individual private VLANs, which do not use spanning-tree, trunks, etc. Appears to be working well.
0
 
LVL 2

Author Closing Comment

by:MacGyverSolutions
ID: 37175726
Had to use a more customized configuration than I wanted, but it works now. Whoever replaces me someday may not have a clue on how this configuration works.
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question