Solved

vlan setup on hp procurve

Posted on 2014-09-19
3
244 Views
Last Modified: 2014-09-24
Greetings,

we currently have vlan set up on our hp using ip scheme 10.10.x.x.

we want to port a connection from another service provider thru our core to a procurve on our network.  Is this possible and how is it done with vlans?

Thank you.
0
Comment
Question by:rcdob
  • 2
3 Comments
 
LVL 40

Expert Comment

by:noci
ID: 40334251
First what procurves are you using. (Most important do they support 802.1q) as some models do and some dont.
It also needs to be a procurve that is manageable (web or ssh). f.e. 1810G ...
Non manageble switches cannot handle VLAN's.
0
 

Author Comment

by:rcdob
ID: 40334384
2910al-48g
0
 
LVL 40

Accepted Solution

by:
noci earned 500 total points
ID: 40334423
ok it can handle VLAN's.
(manual: http://h20566.www2.hp.com/portal/site/hpsc/template.BINARYPORTLET/public/kb/docDisplay/resource.process/?spf_p.tpst=kbDocDisplay_ws_BI&spf_p.rid_kbDocDisplay=docDisplayResURL&javax.portlet.begCacheTok=com.vignette.cachetoken&spf_p.rst_kbDocDisplay=wsrp-resourceState%3DdocId%253Demr_na-c03278928%257CdocLocale%253Den_US&javax.portlet.endCacheTok=com.vignette.cachetoken)


What you have to do is create a new VLAN, then assign it the the port you want to connect to the 2nd modem Untagged.
Then add the VLAN to all trunks (inter switch connections) it needs to pass on to the final switch,
al those connections you need to assign it Tagged.
the port you need it to pop on it can be tagged (if it needs to be added to link and your server knows how to handel tagged connections. (802.1q standard VLAN tagging)
or untagged if it needs to be fed to a plain interface.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Outsource Your Fax Infrastructure to the Cloud (And come out looking like an IT Hero!) Relative to the many demands on today’s IT teams, spending capital, time and resources to maintain physical fax servers and infrastructure is not a high priority.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question