<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: A-Series Switch VLAN Configuration in Network Architecture &amp; Design</title>
    <link>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13312#M716</link>
    <description>First&lt;BR /&gt;
Create your vlans on the C series.  Assign the IP addresses and subnet masks to the L3 interface&lt;BR /&gt;
&lt;BR /&gt;
Next, the uplink port to the A4 from the C5&lt;BR /&gt;
set vlan egress 2,3,4 ge.1.1 tagged&lt;BR /&gt;
From the A4 to the C5&lt;BR /&gt;
(first run (set vlan create 2,3,4))&lt;BR /&gt;
set vlan egress 2,3,4 fe.1.1 tagged&lt;BR /&gt;
&lt;BR /&gt;
Do the same for other uplink port to the other A4 and so on.  You are tagging the port all the way through.  Cisco would call this a trunk.&lt;BR /&gt;
&lt;BR /&gt;
I am assuming you are doing passtrough firewalling on the ASA.  So the uplink port to the ASA from the C5&lt;BR /&gt;
set vlan egress 2,3,4 ge.1.2 tagged&lt;BR /&gt;
&lt;BR /&gt;
On the cisco firewall you might need to create subinterfaces for each of the VLANS and turn on intra-interface and inter-interface routing:&lt;BR /&gt;
&lt;BR /&gt;
same-security-traffic permit inter-interface&lt;BR /&gt;
same-security-traffic permit intra-interface&lt;BR /&gt;
&lt;BR /&gt;
Then tag each of the subinterfaces and put them in the same sercuity group.&lt;BR /&gt;
&lt;BR /&gt;
Then on the other side (Cisco) &lt;BR /&gt;
int gig 0/1&lt;BR /&gt;
switchport mode trunk&lt;BR /&gt;
&lt;BR /&gt;
For the access ports&lt;BR /&gt;
&lt;BR /&gt;
int gig 0/4&lt;BR /&gt;
switchport access vlan 4&lt;BR /&gt;
&lt;BR /&gt;
etc...&lt;BR /&gt;</description>
    <pubDate>Tue, 20 Oct 2015 08:52:00 GMT</pubDate>
    <dc:creator>Jeremy_Gibbs</dc:creator>
    <dc:date>2015-10-20T08:52:00Z</dc:date>
    <item>
      <title>A-Series Switch VLAN Configuration</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13311#M715</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
I have some queries on configuring VLAN on our network having the combination of Enterasys A series &amp;amp; C5 series switches which is connected to CISCO 3650 via CISCO ASA Firewall&lt;BR /&gt;
(Refer the below schematic network diagram)&lt;BR /&gt;
&lt;BR /&gt;
We need to create VLAN2,3,4 for  Enterasys A- Series Switch which connects the computer FAS1,FAS2 &amp;amp; FAS3 with IP range 192.168.2.11/24,192.168.3.11/24&amp;amp;192.168.4.11/24 respectively.&lt;BR /&gt;
&lt;BR /&gt;
VLAN2 connected computers on A- Series switch need to connect the servers on VLAN2 of CISCO 3650 switch .&lt;BR /&gt;
Similarly VLAN3 on A - Series switch will able to connect servers on VLAN3 of CISCO 3650&lt;BR /&gt;
VLAN4 on A - Series switch will able to connect servers on VLAN4 of CISCO 3650&lt;BR /&gt;
&lt;BR /&gt;
What are all the configuration need to be done on A, C5 series switches &amp;amp; CISCO 3650 , firewalls to meet the requirements.&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="aeac4a1f77004ed0bb884a239bd5e3f7_RackMultipart20151020-12022-tmxwl0-VLAN_Config_Query_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5687i41C8F3E5FB6891CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="aeac4a1f77004ed0bb884a239bd5e3f7_RackMultipart20151020-12022-tmxwl0-VLAN_Config_Query_inline.jpg" alt="aeac4a1f77004ed0bb884a239bd5e3f7_RackMultipart20151020-12022-tmxwl0-VLAN_Config_Query_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Oct 2015 07:53:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13311#M715</guid>
      <dc:creator>Jeyaprakash_V</dc:creator>
      <dc:date>2015-10-20T07:53:00Z</dc:date>
    </item>
    <item>
      <title>RE: A-Series Switch VLAN Configuration</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13312#M716</link>
      <description>First&lt;BR /&gt;
Create your vlans on the C series.  Assign the IP addresses and subnet masks to the L3 interface&lt;BR /&gt;
&lt;BR /&gt;
Next, the uplink port to the A4 from the C5&lt;BR /&gt;
set vlan egress 2,3,4 ge.1.1 tagged&lt;BR /&gt;
From the A4 to the C5&lt;BR /&gt;
(first run (set vlan create 2,3,4))&lt;BR /&gt;
set vlan egress 2,3,4 fe.1.1 tagged&lt;BR /&gt;
&lt;BR /&gt;
Do the same for other uplink port to the other A4 and so on.  You are tagging the port all the way through.  Cisco would call this a trunk.&lt;BR /&gt;
&lt;BR /&gt;
I am assuming you are doing passtrough firewalling on the ASA.  So the uplink port to the ASA from the C5&lt;BR /&gt;
set vlan egress 2,3,4 ge.1.2 tagged&lt;BR /&gt;
&lt;BR /&gt;
On the cisco firewall you might need to create subinterfaces for each of the VLANS and turn on intra-interface and inter-interface routing:&lt;BR /&gt;
&lt;BR /&gt;
same-security-traffic permit inter-interface&lt;BR /&gt;
same-security-traffic permit intra-interface&lt;BR /&gt;
&lt;BR /&gt;
Then tag each of the subinterfaces and put them in the same sercuity group.&lt;BR /&gt;
&lt;BR /&gt;
Then on the other side (Cisco) &lt;BR /&gt;
int gig 0/1&lt;BR /&gt;
switchport mode trunk&lt;BR /&gt;
&lt;BR /&gt;
For the access ports&lt;BR /&gt;
&lt;BR /&gt;
int gig 0/4&lt;BR /&gt;
switchport access vlan 4&lt;BR /&gt;
&lt;BR /&gt;
etc...&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Oct 2015 08:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13312#M716</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2015-10-20T08:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: A-Series Switch VLAN Configuration</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13313#M717</link>
      <description>Hi Jeremy Gibbs,&lt;BR /&gt;
&lt;BR /&gt;
Thanks for you quick reply.. Now we got idea how to proceed with VLAN configuration to meet the requirements.&lt;BR /&gt;
&lt;BR /&gt;
I have one more question on connecting C5 series switch to CISCO ASA 5515-X Firewall.&lt;BR /&gt;
&lt;BR /&gt;
We bought ASA 5515-X Firewall (6GE - Data + 1GE - Mgmt configuration).&lt;BR /&gt;
&lt;BR /&gt;
How we can connect C5 series to Firewall ? &lt;BR /&gt;
Can we use copper SFP transceivers on C5 switch and then connect to firewall?&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Oct 2015 10:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13313#M717</guid>
      <dc:creator>Jeyaprakash_V</dc:creator>
      <dc:date>2015-10-20T10:50:00Z</dc:date>
    </item>
    <item>
      <title>RE: A-Series Switch VLAN Configuration</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13314#M718</link>
      <description>Per the &lt;A href="http://enterasys.wpengine.com/wp-content/uploads/2013/09/transceivers-datasheet.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;Pluggable Transceivers datasheet&lt;/A&gt;, the C5-Series is compatible with the MGBIC-02, which is a 1-gigabit-only RJ45 SFP transceiver with a reach of 100 meters. &lt;BR /&gt;
So yes, in theory one could use a copper SFP transceiver on a C5 switch to connect to one of the ASA 5515-X's gigabit ethernet ports. &lt;BR /&gt;
&lt;BR /&gt;
On the other hand, on the C5G124-24/48(P2) and C5K125-24/48(P2) it would be simpler and more economical to use one of its native front-panel 10/100/1000 RJ45 ports instead of installing a MGBIC-02. In considering this I haven't yet hit upon a scenario in which it would make good sense to use other than a native port for a copper connection.</description>
      <pubDate>Tue, 20 Oct 2015 22:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/a-series-switch-vlan-configuration/m-p/13314#M718</guid>
      <dc:creator>Paul_Poyant</dc:creator>
      <dc:date>2015-10-20T22:22:00Z</dc:date>
    </item>
  </channel>
</rss>

