Solved

vlan dell switch 2848

Posted on 2013-11-03
2
927 Views
Last Modified: 2016-11-23
Please need some help asap. I am not experienced in configuring switches besides enabling spanning tree and disabling ports configuring ip address for management through GUI. I am familiar with the gui for 2848 but my layout is this:
ip phones already configured from phone systems to hp switch to current cisco 8 port POE switch. then i have a cisco firewall with 8 ports filled up for wireless ap and pcs.  I need to configure my new dell 2848 to segregate 24 ports between voice and data. do i simply create the "T" for in/out data for both seperate vlans and create "U" for each port for each VLAN? sorry I sort of understand untagged and Tagged/Trunk for "T" right? :) yup I am a newbie, sort of watched youtubes, but need this configuration up this week. data needs internet and voice needs only access to phone system no firewall. please ask me if i need to provide more information.
0
Comment
Question by:grizNation
2 Comments
 
LVL 38

Accepted Solution

by:
Aaron Tomosky earned 500 total points
ID: 39620221
I'm no Cisco or dell expert, but if you want to have some ports as phone vlan and some ports as only data vlan this is a generic how to:
Set the phone ports to the phone vlan as U. Set the pvid of those ports to the phone vlan. What this does is allow phone vlan packets out untagged and anything coming in untagged gets assigned the phone vlan. Do the same for the data ports.
All desktop computers like this setup, some phones actually like to tag stuff. If your phones like tagged packets and like to tag packets going out, just use t instead of u.
For your uplink port to the other switch, it should be T for both vlans. That way packets from either vlan going to the other switch are tagged.
0
 

Author Closing Comment

by:grizNation
ID: 39648384
tagged it is. I tried and seems to be going fine. thanks, appreciate the help
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Security is one of the biggest concerns when moving and migrating your data from your on-premise location to the Public Cloud.  Where is your data? Who can access it? Will it be safe from accidental deletion?  All of these questions and more are imp…
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now