[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

cisco switch trunking

Posted on 2013-12-09
2
Medium Priority
?
564 Views
Last Modified: 2013-12-10
on the show interfaces switchport command for a trunking port

what is the meaning of:

Access Mode VLAN: 1 (default)
Trunking native mode vlan: 10

most all ports (computers) are assigned to vlan 10. The trunking native mode can also be part of the same vlan as the client computers and why is the native vlan 1 there?
Thanks.
0
Comment
Question by:tolinrome
2 Comments
 
LVL 17

Accepted Solution

by:
TimotiSt earned 1000 total points
ID: 39706862
The untagged vlan will depend on the mode of the port.
If the port is 'access', the untagged (native) vlan will be vlan 1, and no other tagged vlans will be allowed.
If the port is 'trunk', the untagged (native) vlan will be vlan10, and other tagged vlans might be permitted too (based on the 'switchport trunk vlan allow ...' statement).
0
 
LVL 20

Assisted Solution

by:rauenpc
rauenpc earned 1000 total points
ID: 39708660
TomotiSt is correct. The important line to look for is the "operational mode". I'll admit it can be confusing that Cisco allows the configuration of both access and trunk mode commands, but it all comes down to DTP - dynamic trunking protocol. If the operational mode is access, only the access commands have any bearing on switchport behavior. Likewise, if the operational mode is trunk then only the trunk commands have any bearing on the switchport behavior.
0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question