Jump to content
Sadikhov IT Certification forums

studzer

Members
  • Content Count

    4
  • Joined

  • Last visited

Community Reputation

0 Neutral

About studzer

  • Rank
    Newbie
  1. studzer

    Guest Wireless Network

    Hi Sirkozz, Thanks for your response: At the moment I have the management and the production WLAN in the same VLAN 1 (Native VLAN). I have also created a Guest VLAN 100 on the controller and map it to the controller port 1 which also mapped to vlan 1. My question is do i need to setup VLAN 100 on the router ? For your question I will provide guest with PSK for authentication. Please advice. thanks
  2. studzer

    Guest Wireless Network

    Hi Guys I was wondering if anyone could help with the scenario below: 1. I have a wireless network with in my network environment using cisco WC4402 and cisco AP1131 2. There has been a request for Guest wireless access for internet:- For that request I have installed a broadband using cisco 877 router with 4 switchports. The following is my setup : I have a cisco 6500 switch which I have created a VLAN 100 with 3 port assigned to it. Thus port each for the controller, broadband router and laptop to test. As partly shown below interface GigabitEthernet13/23 switchport switchport access vlan 100 no ip address spanning-tree portfast ! interface GigabitEthernet13/24 switchport switchport access vlan 100 no ip address spanning-tree portfast ! interface GigabitEthernet13/25 switchport switchport access vlan 100 switchport mode trunk no ip address spanning-tree portfast On my Cisco broadband router I have created a DHCP Pool to dashout IP address for the VLAN 100 which it connects to via one of the swicthports being trunk on the router. Now this works when connects laptop to the vlan 100 on the 6500 switch as I do get a dhcp addresses from the Router. My question here is how would I be able to get the wireless controller to also talk with the VLAN 100 and be able to dashout IP address from the guest network to guest clients. At the moment both ports on the controller are connected to the 6500 switch but in the native VLAN. I understand I should create a new SSID for the guest network which I have done. Also I have created a virtual interface (called test) with IP address 192.168.1.3 in VLAN 100 as shown below. I have mapped it to the primary port 1 on the controller ? (Cisco Controller) >show interface detailed test Interface Name................................... test MAC Address...................................... 00:23:04:7d:3d:43 IP Address....................................... 192.168.1.3 IP Netmask....................................... 255.255.255.0 IP Gateway....................................... 192.168.1.1 VLAN............................................. 100 Quarantine-vlan.................................. no Active Physical Port............................. 1 Primary Physical Port............................ 1 Backup Physical Port............................. Unconfigured Primary DHCP Server.............................. 192.168.1.1 Secondary DHCP Server............................ Unconfigured DHCP Option 82................................... Disabled ACL.............................................. Unconfigured AP Manager....................................... No Guest Interface.................................. No I hope I have made myself clear, please come to my rescue as tensions are mounting. Also if you have any question I will be monitoring thed post answer your question and taking your advice.
  3. studzer

    Vlan

    hi geico thanks for your excellent response i have been playing with your response and it seem ok but I cant get pass the Catalyst 2950 to get to the router on the other side i have insert the network diagram & config to make things clear thanks again. the address are all made up and that is how they stand at the moment Config from Catalyst 3560 Layers Switch no file verify auto spanning-tree mode pvst spanning-tree extend system-id ! lan internal allocation policy ascending ! interface FastEthernet0/1 switchport access vlan 2 ! interface FastEthernet0/2 switchport access vlan 2 ! interface FastEthernet0/3 switchport access vlan 2 ! interface FastEthernet0/4 switchport access vlan 2 ! interface FastEthernet0/5 switchport access vlan 2 ! interface FastEthernet0/6 switchport access vlan 2 ! interface FastEthernet0/7 switchport access vlan 2 ! interface FastEthernet0/8 switchport access vlan 2 ! interface FastEthernet0/9 switchport access vlan 2 ! interface FastEthernet0/10 switchport access vlan 2 ! interface FastEthernet0/11 switchport access vlan 2 ! interface FastEthernet0/12 switchport access vlan 2 ! interface FastEthernet0/13 switchport access vlan 2 ! interface FastEthernet0/14 switchport access vlan 2 ! interface FastEthernet0/15 switchport access vlan 2 ! ---it here has been cut off--- interface FastEthernet0/16 switchport access vlan 2 ! interface FastEthernet0/17 switchport access vlan 2 ! interface FastEthernet0/18 switchport access vlan 2 ! interface FastEthernet0/19 switchport access vlan 2 switchport trunk encapsulation isl ! interface FastEthernet0/20 switchport access vlan 2 interface FastEthernet0/28 switchport access vlan 10 ! ! interface FastEthernet0/48 no switchport ip address 10.180.128.50 255.255.128.0 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface GigabitEthernet0/3 ! interface GigabitEthernet0/4 ! interface Vlan1 no ip address shutdown nterface Vlan2 ip address 10.180.10.3 255.255.128.0 ! ip default-gateway 10.180.50.1 ip classless ip route 0.0.0.0 0.0.0.0 10.180.50.1 ip route 0.0.0.0 0.0.0.0 10.180.128.49 ip route 155.231.48.0 255.255.255.0 10.180.128.49 ip http server ! ! control-plane ! ! line con 0 line vty 0 4 no login line vty 5 15 no login ! ! end Config for Catalyst 2950 Current configuration : 2170 bytes ! version 12.1 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname TRUSTHQ ! ! ip subnet-zero ! ! spanning-tree mode pvst no spanning-tree optimize bpdu transmission spanning-tree extend system-id ! ! ! ! interface FastEthernet0/19 switchport access vlan 10 switchport mode trunk ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! ! ! i interface FastEthernet0/46 interface FastEthernet0/47 ! interface FastEthernet0/48 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 ip address 10.180.10.2 255.255.0.0 no ip route-cache ! interface Vlan10 ip address 10.180.128.2 255.255.192.0 no ip route-cache shutdown ! ip default-gateway 10.180.50.1 ip http server snmp-server community hopefull RO snmp-server chassis-id TrustHQ Switch 2 ! line con 0 password 7 1302121D190B0179 login line vty 0 4 password 7 1302121D190B0179 login line vty 5 15 password 7 121E0018000C0957 login ! ! end I tried to insert the diagram fro this configuration but couldnt
  4. I was wondering if someone can help me here? I have a cisco layer 3 switch 3560 and would like to use its as a router. The scenario is now I am using the default vlan 1 for layer 2 switching at the moment, which is attached to a router serving as the default-gateway, but the time has come that I have to use the layer 3 functionalities by using it as router between my network and an external network. 1. My first question is. Is it possible to keep the default VLAN 1, create a routing port and sent all trafic through that port ? 2. Would I be able to trunk between this layer 3 and layer 2 (2950) switch if I was to create a VLAN? Having created a vlan I am not able to contact the layer 2 switch from the layer 3 switch even though I have activated trunking on the interfaces. 3. Also from the top I mentioned the router that has been used as my default-gateway, how would i be able to keep that as my default-gateway in the VLAN environment.
×