F5F Stay Refreshed Power Users Networks A new managed switch is ready. What should we do next?

A new managed switch is ready. What should we do next?

A new managed switch is ready. What should we do next?

J
jxzuzuzo
Posting Freak
750
02-25-2020, 06:35 AM
#1
[removed]
J
jxzuzuzo
02-25-2020, 06:35 AM #1

[removed]

T
TyphoonFz
Junior Member
5
02-26-2020, 03:25 AM
#2
Begin with the fundamentals of VLANs, native VLANs, and SVI (VLAN interface). These concepts will help you become comfortable with the switch and allow you to isolate your test equipment from the firewall. For security-focused work, progress to L2 security measures such as MACSEC, 802.1x, STP, BDPU guard, root guard, and stormcontrol. These are the standard L2 protocols used in production environments.
T
TyphoonFz
02-26-2020, 03:25 AM #2

Begin with the fundamentals of VLANs, native VLANs, and SVI (VLAN interface). These concepts will help you become comfortable with the switch and allow you to isolate your test equipment from the firewall. For security-focused work, progress to L2 security measures such as MACSEC, 802.1x, STP, BDPU guard, root guard, and stormcontrol. These are the standard L2 protocols used in production environments.

O
Oscar_skilzz
Junior Member
21
02-26-2020, 09:08 AM
#3
[removed]
O
Oscar_skilzz
02-26-2020, 09:08 AM #3

[removed]

F
Fake_Blood123
Member
66
03-02-2020, 12:40 AM
#4
It's confirmed. When setting up your own VLAN for a specific purpose and not routing it back to the firewall, all devices will lose external connectivity. This is where SVIs or VLAN interfaces come into play. You can set up DHCP on the switch, and the SVI will handle DHCP requests. VLANs operate at layer 2, functioning as virtual LANs. Devices within the same subnet and VLAN communicate directly through the switch, without needing routing. Routing is only necessary when you need to reach devices in different subnets. If routing is required, SVIs are useful again, but trunking the VLAN back to the firewall is generally not recommended.
F
Fake_Blood123
03-02-2020, 12:40 AM #4

It's confirmed. When setting up your own VLAN for a specific purpose and not routing it back to the firewall, all devices will lose external connectivity. This is where SVIs or VLAN interfaces come into play. You can set up DHCP on the switch, and the SVI will handle DHCP requests. VLANs operate at layer 2, functioning as virtual LANs. Devices within the same subnet and VLAN communicate directly through the switch, without needing routing. Routing is only necessary when you need to reach devices in different subnets. If routing is required, SVIs are useful again, but trunking the VLAN back to the firewall is generally not recommended.

1
1234qaz12qaz
Posting Freak
773
03-02-2020, 01:28 AM
#5
[removed]
1
1234qaz12qaz
03-02-2020, 01:28 AM #5

[removed]

B
BookMix
Member
207
03-02-2020, 09:50 PM
#6
Subnets are groups of IP addresses within the same network, allowing devices to communicate directly. Using 192.168.1.0/24 as an example, the range spans from 192.168.1.0 to 192.168.1.255. All devices in that area share the same subnet and can interact without issues, provided VLANs are confined to the switch and not merged into the broader network.
B
BookMix
03-02-2020, 09:50 PM #6

Subnets are groups of IP addresses within the same network, allowing devices to communicate directly. Using 192.168.1.0/24 as an example, the range spans from 192.168.1.0 to 192.168.1.255. All devices in that area share the same subnet and can interact without issues, provided VLANs are confined to the switch and not merged into the broader network.