Solved

Understanding Router ports and syntax

Posted on 2013-12-04
2
330 Views
Last Modified: 2013-12-05
I'm trying to understand the significance of the numbers before and after the slash.  (See graphic)

The three sets of numbers surrounding the router I'm trying to understand are:
0/0
0/1.100
0/2

What do these combinations of numbers mean?

router
0
Comment
Question by:brothertruffle880
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 35

Assisted Solution

by:Ernie Beek
Ernie Beek earned 250 total points
ID: 39695422
Let's see:

0/0 = slot/port
0/1.100 = slot/port.subinterface


Also have a look at: http://www.petri.co.il/csc_how_router_interfaces_get_their_names_on_cisco_routers.htm
0
 
LVL 18

Accepted Solution

by:
Akinsd earned 250 total points
ID: 39695701
Interface identification

My example below includes a third level (module) illustrated with Gi 0/0/0

The picture shows a router with 2 modules.
1 Module has 2 Slots, the 2nd module has 4 slots
Module 1 has a Slot with 4 Ports
1 Port can be subdivided "Virtually" in a method referred to as "Router On A Stick" into Sub-Interfaces. as described above
To create the sub-interface in your diagram. This command was issued

interface Gi 0/0.100
encapsulation dot1q 100 (The encapsulation does not have to match the subinterface but it's good practice to make it match. The encapsulation specifies which vlan that subinterface will operate on)
ip address 172.16.100.254 255.255.255.0 (I used a random IP just for illustration)

Cisco labels interfaces from right to left starting with 0 (See Picture 4 for details)

Picture1Picture2Picture3 Picture4
0

Featured Post

Upcoming Webinar: Securing your MySQL/MariaDB data

Join Percona’s Chief Evangelist, Colin Charles as he presents Securing your MySQL®/MariaDB® data on Tuesday, July 11, 2017 at 7:00 am PDT / 10:00 am EDT (UTC-7).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question