Book now with code EOY2025
boostinbadger wrote: » I am trying to configure subinterfaces on a 2620XM but when I try to assign an IP address to each subint I get the message: % Configuring IP routing on a LAN subinterface is only allowed if that subinterface is already configured as part of an IEEE 802.10, IEEE 802.1Q, or ISL vLAN. I have dot1q configured on the trunk coming from the switch the router is connected to: interface FastEthernet0/4 switchport trunk encapsulation dot1q switchport mode trunk I am using CBT Nugs and Jeremy did not run into this or go over it. Any ideas?
boostinbadger wrote: » Thanks Allen2308. Thats it! Instead of assigning the IP address of 192.168.1.2 for vlan 1 to fa 0/0 and be the native, I had to set it to fa 0/0.1 (which is weird bc 0.1 and 0.10 are the same unless you are in Ciscoland). Here is what it needed to look like: interface FastEthernet0/0 no ip address duplex auto speed auto ! interface FastEthernet0/0.1 encapsulation dot1Q 1 native ip address 192.168.1.2 255.255.255.0 ! interface FastEthernet0/0.10 encapsulation dot1Q 10 ip address 192.168.10.1 255.255.255.0 ! interface FastEthernet0/0.20 encapsulation dot1Q 20 ip address 192.168.20.1 255.255.255.0
chmorin wrote: » It actually does not have to be fa0/0.1 you just need to have a subinterface for your native vlan, and one for all other vlans for inter-vlan routing to work properly.
boostinbadger wrote: » I am using CBT Nugs and Jeremy did not run into this or go over it.
ZZOmega wrote: » In the topology shown above, by assuming/implementing any of the correct configurations posted here, wouldn't communication between S1 and R1 be limited to only outside traffic coming from R1 and stopping at S1? In other words, F0/1 of S1 is not a trunking port(as shown in boostinbadger's diagram), therefore it cannot communicate VLAN information. Finally, wouldn't configuring R2 instead of R1 as the "stick" router increase traffic, creating bandwidth issues on the links between S1 and R2? Any interVLAN communication has to travel those segments, and configuring it on the side rather than having it centralized seems pretty inefficient to me.
Would there be no communication at all, or just native VLAN members who are able to access the cloud?
Use code EOY2025 to receive $250 off your 2025 certification boot camp!