Cisco Switches :: Unable To Get SG200-26 VLAN Configuration
Feb 20, 2013
Below is my configuration so far.
GE1 General 1UP, 100T, 101T
GE26 General 1UP, 100U, 101U
But I could not get port GE1 on vlan 100 to ping to anything on GE26.It only works when i change it to 100UP... BUT the rest of the vlan ID (101) will still unable to work.
Yes. i need multiple vlan on a single port as I am running Virtual machines on the GE1 and GE26 is an uplink I need all vlan to communicate from GE1 to GE26. Is this possible?
We recently purchsed a SG200-26 and have several SPA303 with the 2 ports. The other component is a Sonicwall NSA3500.The SG200-26 is on an interface of the Sonicwall that interface has a primary of 172.20.3.x and the sub interface is 172.20.5.x. I labed the VLAN as 5?I went to the "Create VLAN" in the SG200-26 and also created VLAN 5 and under Voice VLAN the ID is 5.Then I went to the SmartPort and assigned GE24 as IP Phone + Desktop. That was OK. But when I go to the SPA303 and Enable VLAN and VLAN ID 5 I get Initializing Network. I am able to ping the 172.20.5.1 which is the gateway for the VLAN but still pull no IP. I also have an DHCP range assinged the subinterface.I also am using Cisco Configuration Assistant. I can see the switch SG200-26 and my IP set but it shows no IP. So I know that the CDP from the phone to the switch is working.
i have a question about the proper method to setup up vlan(s) on a sg200 switch with a sv220w router. Should i setup the vlan on the router or the switch? I have small office setup, i need atleast 2 vlans to separate the networks. i want both to have internet access but be completely isolated from each other.
I start writing this post telling you that I'm not a qualified network admin, so I beg your pardon if I do not use appropriate terms in my question. Also my english in not so good since I'm Italian and my english in almost scholastic.
This is the "story" :
I bought two switches as described above and actually I have to create 2 VLANS as described below :
VLAN id 2 name "Service_A" ports 1-4 VLAN id 3 name "Service_B" ports 7-9
all other ports can stay in default VLAN1.
my network infrastructure have some other very simple swtiches connected and 1 soho router (static ip 192.168.1.1) with dhcp active and ip pool address released from 192.168.1.100 to 200.
the SG200-26 have static ip 192.168.1.254 and 192.168.1.253
MY NEEDS:
I need VLAN for privacy matter so all computer connected to ports in VLAN2 cannot see nor enumerate PCs and resources on other VLANs, but I also absolutely NEED that all computer in every ports (and every VLAN even default VLAN1) can access the internet.
My organization wishes to host a LAN gaming event. The setup I have in mind involves a 24-port switch for connecting all the player computers and having that switch connected to a smaller "core" switch which has the the game server and router connected to it. I'd like to know if I can set things up as follows...
SG200-26 with ports 1-24 on seperate VLANs so they cannot talk to eachother. I'd then like ports 25 and 26 to be an aggregated (for bandwidth and redundancy) trunk port to carry all 24 VLANs plus an additional management VLAN (ex. VLAN 100) that will be used for accessing the switch. I'd like those aggregated trunk ports to connect to an SG300-10 "core" switch which will be connected to the game server and to a router for internet access.
I'd like the ability to have two network connections from the game server to the switch, one on the management VLAN and one on a different VLAN (ex. VLAN 50) that will be accessed by the players (ports 1-24 on the SG200-26). The core switch needs the ability to perform restricted inter-VLAN routing, in that it doesn't allow VLANs 1-24 to talk to eachother but they can talk to the server's VLAN but only through specific service ports (ex. port 12345, 12346). Is this possible?
Furthermore how would I configure the SG300-10 to allow VLANs 1-24 to talk to VLAN 50, but not themselves or VLAN 100. As well, I'll probably have the router on it's own VLAN (ex. VLAN 60) and allow VLANs 1-24 to access it but only through HTTP port 80 for web access.
I have the SG200-08 switch that I am using for Link Aggregation between a Synology DS713+ NAS and my HP Z820 workstation.I have ports 1 and 2 set up as LAG CH1 connecting to the HP and ports 7 and 8 as LAG CH2 connecting to the NAS. I have AT&T Uverse as my Internet provider so I have one cable coming from my Uverse router to the Cisco switch to provide Internet access. I also am coming out of my Cisco switch to my Apple Airport Extreme providing Wi-Fi to my house in addition to wireless access to the NAS. I have no problem seeing and connecting to my NAS drive but my issues comes with regular internet access to my computer.I have created a Team with two of my Intel NIC's and connect just fine to the NAS. My Internet on the other hand is completely hit or miss.Some times it shows Internet access and will connect to web pages just fine and other times it will say no Internet. I have tried shuffling around ports, enabling/disabling certain settings that I have either read about online thinking that it might be one of my problems but at this point all of this IT lingo is making my brain bleed. I don't know if my basic settings are correct or if I need to change one simple thing to get this whole thing working.
I am new to VLANs although I generally understand the concept. I have a small office with 25 desktop/laptops and 15 VoIP phones connected with a SG200-50 switch and on Port 1 I have the Cisco SRP541W router for DHCP and Internet access. My goal is simple: 1) Segregate the VoIP phones (voice) from the computers (data) and 2) Prioritize the VoIP phones traffic.
I believe this can be accomplished by setting up a second VLAN and maybe a third (if the default should not be used) and then identifying those ports as Voice VLAN ports. I guess I just need to know how to flag each interface and each port so that they all can talk to the router on Port 1 yet the voice and data will be in different broadcast domains. Also, do I need a management VLAN??
Is this setup correct? VLAN 1 - default (data) Port 1 (Trunk) (Tagged)Port 2 - 30 (Access) (Untagged)VLAN 2 - voice Port 1 (Trunk) (Tagged)Port 31 - 48 (Access) (Untagged) What should the interface settings be on each port (General, Access or Trunk)? What should the port VLAN membership be on each port (Tagged or Untagged)??
I got a new switch and am trying to connect a UCS server to it. I can ping the switch just fine but when I try to use IE8 or firefox, I can't get to the web interface to configure it.
Here's my setup:
Cisco UCS C210 M2 IP = 192.168.1.100 Subnet = 255.555.255.0
Cisco SG200-26 (not PoE model). After a power failure, at restart the switch seems unable to reboot. The power led starts blinking in green, after some seconds the connected ports start blinking as well, but the the switch reboots automatically after few more seconds.I tried to disconnect lan cables, power cord, and reset to factory by pressing and holding down the proper button for 30s and more, but no success.In the small amount of time the switch's ports seem to be powered up, clients don't receive packets, don't ping each other or the switch manage address.
SG200-08 and SG200-08P fail to hold or update Date/Time.(New installation for a UC320 setup.)I've got both an SG200-08 and SG200-08P that are failing to maintain date/time when set with "Use Local Settings". Every restart/powercycle causes them to reset to Dec 31 1969. Other settings save fine.I first tried to set time via SNTP Unicast using a variety of public time server addresses including the 3 hard coded to the SG200-08 firmware:
Sadly though it always just shows "Active Server Server Host Address: 0.0.0.0" and continues having 12/31/1969 as the date. Both after a config save and a reboot.I can ping the NTP servers just fine from the switches either by IP or by hostname.At this point I've decided that I must be missing something simple. At least I hope so... otherwise it's a firmware bug which means waiting for a fix.Other devices behind the same firewall/gateway (RVS4000) are updating NTP
On the SG200-side I've set the IP-address and default-gateway accordingly, however:From the SG200 I can't ping any other host on the same IP-subnet as the switchFrom the SG200 can't ping the default-gatewaycan't ping from any other host or the default-gateway *to* the switch But:On the SG200 I've got plenty of MAC-addresses under "Dynamic Address Table" - however only MAC-addresses that belong to the management-VLAN of the SG200 (i.e. VLAN9 in my case)The MAC-address table on the SG200 even includes the MAC-addresses of hosts on the same VLAN I tried to ping without success. For example: I tried a PING from a host having a MAC-address of 00:19:bb:31:91:30. This MAC shows up in the arp table of the SG200. To cross check I connected a dedicated PC to the SG200 and assign it an IP-address out of the management-LAN-range of the SG200 - in this case I can access the switch (i.e. PING, WEB etc.)So to summarize: Connectivity is OK when going from directly connected devices to the SG200. No connectivity from devices that are behind the C2960S towards the SG200 and vice versa. (The problem is definitely not with the C2960S-side since we've got plenty of them hooked together without problems.) I'm enclosing the screenshots of the corresponding definitions on the SG200.
I'm baffled by the poor performance that I'm seeing when passing traffic between my two Cisco SG switches.
The configuration is as basic as I can make it, no VLANs, QoS or bonding. Both have been updated to current firmware as part of the troubleshooting process.
When I transfer data within one of my switches I see 50/60Mb/s. When I pass the same traffic between both switches I see 0.6 Mbs/ or less.
I have tried to eliminate every possible factor including switching out the cables. No success.
I'm adding it to an existing infastructure, with multiple VLANs. I believe I have it set up correctly, however whenever I daisy-chain the switch in with the trunk ports, it's not passing the VLAN info correctly. There's not a lot of configuguration involved, so I'm not quite sure where I might be going wrong. I've attached a couple screenshots that show my trunk port configuration.
I have been trying to setup vlans on a SG300-28p but they are not working. This is my setup: I want Switch1 to have ports 1-10 to access the DMZ, and 11-24 the LAN. Then i wan to add switch2-4 to extend the access to LAN.
i tested with cisco 2960 switches by just telling what ports whould have access to DMZ and LAN but the small business switches are different..
Before I launch into this can I say that I am very much a novice with regards to Managed Switches and their configuration. I have the following equipment which I have connected to the switch: [code] All of the above are on subnet 255.255.255.0.All of the above communicate with each other during normal operation.Our client is connecting to the switch but his requirement is for his system to "see" the PLC Comms Card as follows:IP: 10.0.3.61 on Subnet 255.255.252.0 .
Using the Internet Explorer interface connection I have created an additional VLAN (ID 2) on Port 10 with the intention of using this as the connection to the client ( I assume there will be further settings required to route the PLC connection to this port) but every time I try to assign the IP and Subnet values and click "APPLY" the changes are not made and the connection appears to hang leading me to reboot the switch.I have connected to the switch via console and changed the mode to Layer 3. I also assume that it is OK for the three pieces of equipment to remain on the default VLAN. How I should setup this VLAN and ultimately achieve my goal.
I'm new to managed networking. So I'm having trouble understanding how to set up my switches properly. I have a closed network with about 20 switches and 2 IDF's. No router, and no internet. I have a SLM 2024 in want to have 4 ports set up with a VLAN.
I have another SLM2024 I want to be on the same VLAN some where else. Switch 1 uses port 24 GBIC as and uplink port to one of the IDF's. Switch 2 uses ports 12 and 24 copper(LACP) to make a hop from another switch(ports 1 and 13 LACP)which inturn is connected to thesame IDF on port 24 GBIC. How do I set up switch 1 ports 7,8,19,20? Also, how do I set up switch 2 ports 7,8,19,20?
I am in the process of preping our network for the installation of an IP Camera based security system on it will be running within VLAN 600 in our network, and management would prefer that general users are not even aware it is there.
16 Cameras will all be running off two SF302-8P Switches that will be uplinked to our Cisco 2960 Access Switches. Due to port limitations I need to daisy chain the two SF302 Switches.
ACCESS-302-CA-01 - Ge1 uplinked to Port on ACCESS-03 (Cisco 2960) On this switch Fe1-8 Need to be in VLAN 600 to communicated with the camera server which will be plugged directly into Ge2 on Access 302-02.
ACCESS-302-CA-02 - Ge1 Uplinked to Ge2 on ACCESS-302-01
Ge2 - connected to the Network Video Recorder.
I've defined the VLAN's in the switch and have VLAN 600 as Untagged for FE1-8.
how do I configure Ge1 and Ge2 on each switch to pass the appropriate VLAN conntent to the devices connected?
I'm new to managed networking. So I'm having trouble understanding how to set up my switches properly. I have a closed network with about 20 switches and 2 IDF's. No router, and no internet. I have a SLM 2024 in want to have 4 ports set up with a VLAN. I have another SLM2024 I want to be on the same VLAN some where else. Switch 1 uses port 24 GBIC as and up link port to one of the IDF's. Switch 2 uses ports 12 and 24 copper(LACP) to make a hop from another switch(ports 1 and 13 LACP)which inturn is connected to the same IDF on port 24 GBIC. How do I set up switch 1 ports 7,8,19,20? Also, how do I set up switch 2 ports 7,8,19,20? VLAN 11
We have a project in which we are using 34 Cisco SG200-18's each with a MGBLX1 (LC Single Mode Fiber) SFP mini-GBIC.All the fiber's come back to one building where we must "bridge" all 34 fiber connections. What hardware should be used to accomplish this? A L2 switch? For example, a 12 port SFP Switch with Fiber SFP's accepting the first 12 fiber connections, then other switch with SFP for the next 12 and so on, until there is a overall capacity of 36 and having patch cables between the 3 switches?
what cisco or non cisco hardware would work with these SF200-18's to accomplish this?
We are replacing some netgear switches with the Cisco SG200. The situation is relatively straightforward. We have a series of VLAN's coming in on a trunk from a service provider for our Metro Ethernet locations. These trunks then get cross-connect to various location for connectivity. The problem we have is there are two VLAN's that need to go to the same switch which provides access to our public IP block.
I set up the two VLAN's on the SG200 with the trunk port VLAN tagging on the service provider port. Then I set up a separate port for untagging the traffic with the PVID of the respective VLANS's as follows: [code] The public switch has no VLAN's configured (it is an SG200 too). If I connect GE2 to the public switch everything works fine. When I connect GE3 to the public switch, things die. I thought this might be caused by STP although STP should not be detecting issues like this across separate VLAN's. Disabled STP, no change.The same configuration with the Netgear worked without an issue. FYI, the VLAN's cannot be changed...they are defined by the service provider in this particular case. otherwise we'd just make them the same..
I need to purchase a few Gigabit PoE switches for a small business and I am thinking that SG200 or SG300 switches are perfect for this purpose.
Layer 3 functionality in SG300 switches is not great - HSRP or any other next-hop redundancy protocol is not supported, dynamic routing protocols are not supported, policy-based routing is not supported, etc. I may get one SG300 switch for inter-VLAN routing so that I do not have to send traffic to a Layer 3 device for this purpose, especially because my Layer 3 device (ASA5505) has only 10/100 Mbps interfaces. All other switches in the network don't have to be Layer 3 switches, and I am thinking of perhaps getting SG200 instead of SG300 swithces. However, because I am a long-time Cisco engineer, and know ins and outs of the IOS CLI, I would much rather administer the switches with CLI rather than GUI. So, do SG200 switches provide CLI (even if it is not officially supported) or is the only Small Business switch platform that supports CLI SG300? I do realize that the OS running on these switches is not IOS, but after having reviewed the CLI manual for SG300, I would say that 90+% of commands are identical to IOS CLI commands.
I just picked up a pair of 18-port SG200s, and I'm trying to figure out of there's some secret trick to getting CLI access to them? I've upgraded to the latest version of firmware (1.2.7.76) hoping that may work, but no luck.I can tell the guts to support a CLI are there, because writing the config out to a TFTP server shows identical an identical config style to the SG500 I have here.Is there some way to enable it?
I am trying to set up three vlans across two switches. The switches are Cisco SG200 and SG 300 series. There are 20 devices connected to the two switches including a router for Internet. Among these devices are five wireless access points all hardwired to the LAN. If I understand correctly the first thing I have to do is aggregate the two switches. I ran two cat5 cables to ports 1 and 2 of each switch. As I understand it all I need to do is to create SAG with the two ports on each switch. I think I need to use tagging but I don't really understand how to do this. Once I get the trunking set up correctly I want to create one vlan to which all devices will belong for Internet access. The other two would be for data and VoIP. Do I create vlans with the same name on both switches? When I assign the devices (by port) do I need to enable tagging? Which type of port setting should I use? I am assuming that by including the acess points in the vlans will mean that any wireless device connected to them will have acess to the Internet and the devices in the same vlan.
As per the title, I just require 3 to 4 VLANS with inter-VLAN communication enabled.
In the past I have used this router with each port of the internal switch set to a different VLAN, with each in turn hooked up to an unmanaged switch. This has work fine for me but I want to dip my toe in the world of .1q VLANS and gain some added flexibility and neatness.
I currently work in the IT field part-time as a end-user support technician while I am finishing my Bachelor's Degree in Network Administration. I'm not completely new to networking at this point, but I am by no means a master of it either. The basics of small networks (less than 10 PCs) and the lower-end of small business grade Cisco equipment are not unfamiliar to me. Up until this point however, I have had very little experience with any higher-end Cisco networking equipment.
Now on to the questions, which may seem like the answers should be obvious, but let's face it, I do not have the resources to own much equipment myself at this time for experimentation purposes, nor does the school I am attending have a lot of financial resources to provide us with recent hardware to learn on. What I want to know are a few things about PoE as implemented on Cisco devices, specifically the SG200-50P small business series switch. According to the technical documentation, the switch supports PoE on 24 of its 48 ports, specifically 1 - 12 and 24 - 36; simple enough. The switch is currently installed in an office that has less than 24 connected devices, but that is currently expanding. None of the PoE ports are utilized as of yet, but going forward, there will be more than 24 connected devices. Will another switch need to be installed if the additional connected devices (PCs and printers) are not using PoE, or is the PoE an auto-sensing feature that will simply remain disabled if a device that does not require power over the network cable is connected? Is there some setting that needs to be changed through the management interface to keep devices that should not be drawing power from doing so?
There will likely be some additional questions generated by my inquiry, and I fully understand if these are completely novice questions, but I admittedly do not know the answer. When I Googled it, I was greeted by a few hundred thousand results, the first dozen or so pages of results all being for places to purchase this particular type of switch, so I thought I would try my luck on the forums of the place that made it.
I was given a task of creating a vlan and isolating one pc to access an internal website (192.168.90.15) on a specific port (port 8080)The pc is connected in the following manner:
PC--> HP Switch --> Cisco Small Business SG200 switch --> 3550 Catalyst 1, 3550 Catalyst 2 and 3550 Catalyst 3.
I have created a vlan 110 on the Main 3550 Catalyst switch and successfully added the pc to that vlan.However, that PC must be able to access the internet and an internal website on port 8080.I have placed an access-list on the main 3550 catalyst switch which is connected to our router as below:
Client ip address: 192.168.100.2 VLAN 110: 192.168.100.3
access-list 110 permit tcp host 192.168.100.2 host 192.168.90.15 eq 8080access-list 110 permit icmp host 192.168.100.2 anyaccess-list 110 deny ip 192.168.100.0 0.0.0.255 ? I was unable to access the webserver even after many attempts.
I have a Cisco SG200 26 Port Switch, 2 Cisco WAP4410N Access points, and a VLAN aware Router. I have created 4 VLAN's. For the sake of this conversation lets call them.
The Access points are capable of doing V LAN tagging so I plan on having them tag a guest network as V LAN 101. That can get sent to the V LAN aware router and out. No problem. I have some devices, or management pages that I don't want accessible from the general network. (Intel V pro KVM, Remote Management Cards, AP Config Menus, Switch config menu...) . I need to be able to take a V LAN unaware device, plug it into port 1, and have it communicate with V LAN 98, 99 and 100.
I am trying to connect an SG200 to a customer's existing network. The customer does not want to receive any bpdu frames from the SG200. The customer's port has bpdu guard configured to err-disable their port upon receipt of a bpdu.
How do I completely disable spanning tree on the SG200 so that it does not send any bpdus?
My SG20-50P Switch Log appears as follows with Random ports going up and down. I am trying to find out if this links to another problem I'm having with a Client Server software locking up on the client end. The hardware, thin clients and desktops, are working and have checked all sleep and power settings. All items in working order, now I'm wondering about the switch
I saw the announcement stating that "200 and 300 Switches now supports Cisco Pre-standard POE" available here:[URL]However, I cannot find the 1.1.1.8 firmware for the SG200-08P in the download center (latest is 1.0.1.0).Does this mean this doesn't apply to the SG200-08P?If it doesn't apply, any other switches with 16 or less all gigabit ports which support legacy PoE?