Solved

VLAN between switches

Posted on 2016-07-28
4
96 Views
Last Modified: 2016-08-10
We have a VLAN 10 setup but I’m new to these and I need to get it running from another switch for some AP’s.

The AP’s work fine on the VLAN 10 when connected directly to the HP 2910al-48G-PoE Switch (J9148A) switch but the AP’s are POE and the switch cant power all 4 and the keep dropping POE on the ports.

I’ve put in an 8 port M4100-D10-POE ProSafe and tagged the ports with VLAN 10 but the VLAN stops working. I’m unsure how to configure the VLAN between the two switches.
0
Comment
Question by:Glyn Merritt
  • 2
4 Comments
 

Expert Comment

by:Chris Emmett
ID: 41732837
Hi the link between the switches needs to be set as a trunk port and not tagged as the vlan you are using
The device is on a tagged port on the vlan via trunk port to the next switch then from the trunk port of the second switch to the edge port with the vlan
0
 
LVL 1

Author Comment

by:Glyn Merritt
ID: 41732994
I see that makes sense. Do you have any experience on that configuration on either of the switches I have?
0
 
LVL 18

Accepted Solution

by:
Akinsd earned 500 total points
ID: 41733740
0
 
LVL 1

Author Closing Comment

by:Glyn Merritt
ID: 41749968
Thank you.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

27 Experts available now in Live!

Get 1:1 Help Now