Solved

Different vlans same subnet

Posted on 2014-03-18
3
466 Views
Last Modified: 2014-03-18
Hi all,

I have two devices both in the same subnet using two different Vlans, 10 on a Cisco and 110 on a Juniper.  Both in the same subnet.

If I setup a trunk should between the two, should I tag it with Vlan 10 and 110, or should I just tag the trunk on the Cisco side with vlan 10 and tag the Juniper side of the trunk with 110 ?  

Right now would be a great time for a nice little hardware lab.

Thanks,
R
0
Comment
Question by:rotarypwr
3 Comments
 
LVL 6

Assisted Solution

by:Tim Phillips
Tim Phillips earned 250 total points
Comment Utility
I don't think you want to use VLANs if you are going to use the same subnet and want them connected.  Rather, just connect the switches together with the same VLAN for the same subnet.  

Otherwise, use two different subnets, one for each VLAN, and trunk both VLANs up to a router to route between them for connectivity.
0
 
LVL 20

Accepted Solution

by:
rauenpc earned 250 total points
Comment Utility
As you have it configured, using the same subnet with two different vlans, the only way to make them work together is to purposely "misconfigure" the link between the two. You would essentially make both links a trunk, and set the native or untagged vlan to 10 and 110 on the respective switches. This way the untagged frames will go to the same subnet, but in reality this is a misconfig situation.

The best way to handle this would be to use the same vlan numbers and subnets and avoid the mismatch, as coolrazor007 pointed out.
0
 

Author Closing Comment

by:rotarypwr
Comment Utility
Thanks.  I'm going to ask another question on this matter.   Appreciate the feedback!
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now