Solved

Understanding Router ports and syntax

Posted on 2013-12-04
2
325 Views
Last Modified: 2013-12-05
I'm trying to understand the significance of the numbers before and after the slash.  (See graphic)

The three sets of numbers surrounding the router I'm trying to understand are:
0/0
0/1.100
0/2

What do these combinations of numbers mean?

router
0
Comment
Question by:brothertruffle880
2 Comments
 
LVL 35

Assisted Solution

by:Ernie Beek
Ernie Beek earned 250 total points
ID: 39695422
Let's see:

0/0 = slot/port
0/1.100 = slot/port.subinterface


Also have a look at: http://www.petri.co.il/csc_how_router_interfaces_get_their_names_on_cisco_routers.htm
0
 
LVL 18

Accepted Solution

by:
Akinsd earned 250 total points
ID: 39695701
Interface identification

My example below includes a third level (module) illustrated with Gi 0/0/0

The picture shows a router with 2 modules.
1 Module has 2 Slots, the 2nd module has 4 slots
Module 1 has a Slot with 4 Ports
1 Port can be subdivided "Virtually" in a method referred to as "Router On A Stick" into Sub-Interfaces. as described above
To create the sub-interface in your diagram. This command was issued

interface Gi 0/0.100
encapsulation dot1q 100 (The encapsulation does not have to match the subinterface but it's good practice to make it match. The encapsulation specifies which vlan that subinterface will operate on)
ip address 172.16.100.254 255.255.255.0 (I used a random IP just for illustration)

Cisco labels interfaces from right to left starting with 0 (See Picture 4 for details)

Picture1Picture2Picture3 Picture4
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ESXI home lab network setup (KISS) 12 159
forward schedule of change 1 50
Static Route 22 53
Non Distrubtive Core Switch Repacement 8 23
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now