
- Cisco router on a stick configuration pdf#
- Cisco router on a stick configuration Pc#
- Cisco router on a stick configuration series#
To fix that you could configure a switch that does layer 3 routing and skip the router all together that way you would not be dependent on that one link to forward all of your traffic back and forth. So if you had a lot of traffic being forwarded between networks you could run into some bandwidth limits. If you are talking about the trunk link between the switch and the router it will pass up to the router and then be forwarded back down to the switch.
Cisco router on a stick configuration series#
How to configure a Catalyst 3750/3750-E/3750-X Series Switches Using LLDP (Link Layer Discovery Protocol) « Pete�s Packet - Mar 4, 2012 Part 2 – The Joys of Subnetttting – VLSM! | Cisco Skills - Apr 1, 2012 Part 1 – The Joys of Subnetting! | Cisco Skills - Apr 0, 2012 This post goes along with another post I did about creating VLANs on a switch: Hope that Helps, Ryan For security you should not use the native VLAN in production so this example it is not using best practices therefore I would not recommend it. For example If you wanted to see all traffic passing in and out of the physical interface using Netflow or SNMP you would not see that in this example, you would only see the native VLAN traffic. A better way to do this is use a sub-interface followed by: encapsulation dot1Q native I don't see any problems with this method besides security and monitoring. You can't set the encapsulation dot1q on a physical interface only sub-interfaces. Hey Kevin, The only reason this is set on the physical interface is because it is using un-tagged traffic also know as the native VLAN. I saw your comment on not having to use the encap command when using the actual interface (fa0/0), but I was wondering, (since you typically see books and tutorials NOT using the actual interface, but instead, typically fa0/0.1), are there any other ramifications to using one as opposed to the other? Fa0/0 as opposed to Fa0/0.1? Thanks, Kevinīesided the encapsulation command, are there any ramifications to using Fa0/0 for vlan 1 (instead of Fa0/0.1, as typically shown in ROAS configs)? Thanks, Kevin Journey to the CCIE LAB - Part 44 - BGP Link Bandwidth ().Guest VLANS + Guest Wifi - Different IP Range, Out to Filtered Internet ().What is IPv6 ? An introduction to IPV6 ().Like always if you an idea of the next topic let me hear it. ( Router-On-Stick-Example-RunConfig) If you have any questions post them below.
Cisco router on a stick configuration pdf#
I hope this information is helpful I have also attached a PDF of the running-config of both devices to give you an example of the configuration. To create a sub-interface start typing the interface that will be physically connected to the switch at the end add a period and number.ĢCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGPģ D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaĤ N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2ĥ E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPĦ i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter areaħ * - candidate default, U - per-user static route, o - ODRġ1 12C 192.168.1.0/24 is directly connected, FastEthernet0/0ġ3C 192.168.2.0/24 is directly connected, FastEthernet0/0.2ġ4C 192.168.3.0/24 is directly connected, FastEthernet0/0.3 You have to create sub-interfaces on the router to route between different VLANs these sub-interfaces do not correspond to the VLANs so you could put any number but for manageability usually people use the same sub-interface has the VLAN ID. VLAN 1 which is the native VLAN, VLAN 2 and VLAN 3 (which is called "Support").
Cisco router on a stick configuration Pc#
If you look at the network topology below you can see where Cisco came up with the name "Router on Stick" each PC is on its own network and needs the router in order for traffic to pass between the networks. If you like to understand how create VLANs on a switch follow the post above. I have already configured the Cisco switch as posted in Creating VLANs but in summary I have three VLANs total VLAN 1 which is the native VLAN, VLAN 2 and VLAN 3 (which is called support. By having VLANs you are segmenting the network and the only way to get to the other side is having a router. A while ago I talked about putting different VLANs on a switch, remember a VLAN is virtual network that although physically it may look like on the same network that does not always mean the case.
