Skip to main content

Should we use ISL or 802.1 Q for Trunking - Cisco Devices

Trunking is a way to carry traffic from several VLANs over a point-to-point link between the two devices.

Two ways in which Ethernet trunking can be implemented are:

1) ISL - InterSwitch Link

(Cisco proprietary protocol, and not supported by the 2940 or 2950 series switches)

2) 802.1Q (Institute of Electrical and Electronics Engineers (IEEE) standard)


For Catalyst 2900XL/3500XL/2940/2950/2970 Switches:


Catalyst 2940 and 2950 series switches only support 802.1q trunking, and do not support ISL trunking.

On a 4 MB DRAM Catalyst 2900XL switch, trunking is only supported with the following trunking-capable modules:

WS-X2914-XL-V: 4-port 10/100 ISL/802.1Q switch module
WS-X2922-XL-V: 2-port 100BaseFX ISL/802.1Q switch module
WS-X2924-XL-V: 4-port 100BaseFX ISL/802.1Q switch module
WS-X2931-XL: 1000BaseX uplink for Catalyst 2900 XL
WS-X2932-XL: 1000BaseT uplink for Catalyst 2900 XL

To get the compactability chart please refer;

http://www.cisco.com/en/US/tech/tk389/tk815/technologies_configuration_example09186a00800949fd.shtml

Note:

The benefits of using dot1q is that you can connect non-cisco devices with a cisco device, ISL is CISCO proprietary so you're not able to connect other switches that are non-cisco. You can use the one you like as long as you're consistent and use the same on the link.

Regards

Avinash Pillai

URL : http://avinashpillai.blogspot.com
Email: avinashp[AT]aztecsoft[DOT]com, avinashp25[AT]gmail[DOT]com

Comments

Popular posts from this blog

What is Cybersecurity Risk? Definition & Factors to Consider

  Cybersecurity risk has become a leading priority for organizations as they embrace digital transformation and leverage advanced technology solutions to drive business growth and optimize efficiencies. Additionally, many organizations are increasingly reliant on third-party and   fourth-party vendors   or programs.  In this post, we’ll explore what cybersecurity risk is and take a look at some key cybersecurity risk factors that organizations across all industries should keep in mind as they build and refine their   cybersecurity risk management strategy .   What is cybersecurity risk? Cybersecurity risk refers to   potential threats and vulnerabilities   in digital systems. It encompasses the likelihood of a cyberattack compromising data or systems, leading to financial,   reputational , or operational damage. A few examples of cybersecurity risks include   ransomware ,   malware ,   insider threats ,   phishing attacks ...

How To Manage Dell Servers using OMSA – OpenManage Server Administrator On Linux

OMSA is a web based application to manage DELL PowerEdge Servers. Using OMSA you can perform proactive system monitoring, system diagnosis, troubleshoot hardware issues and configure RAID etc., You can also view and manage hardware’s embedded system management (ESM) log using OMSA. This is an jumpstart guide that explains how to install Dell OMSA on Linux. I have also provided few screenshots of DELL OMSA web application. 1. Download DELL OMSA Go to DELL support website -> click on “Drivers & Downloads” -> choose your server model (in my case, I selected PowerEdge 2850) -> choose the operating system -> scroll-down and expand ‘Systems Management’ -> Click on ‘OpenManage Server Administrator Managed Node’ -> Click on OM_5.5.0_ManNode_A00.tar.gz to download it. You can directly download it to your Linux server as shown below. # mkdir -p /usr/local/omsa # cd /usr/local/omsa # wget http://ftp.us.dell.com/sysman/OM_5.5.0_ManNode_A00.tar.gz 2....

Various Types of Hunt Groups

                                                         Various Types of Hunt Groups         * Sequential Hunt Groups    * Peer Hunt Groups   * Longest-Idle Hunt Groups   * Parallel Hunt Groups (Call Blast) Sequential Hunt Groups In a sequential hunt group, extensions always ring in the order in which they are listed, left to right, when the hunt group is defined. The first number in the list is always the first number to be tried when the pilot number is called. Maximum number of hops is not a configurable parameter for sequential hunt groups. Peer Hunt Groups In a peer hunt group, extensions ring in a round-robin order. The first extension to ring is the number in the list to the right of the last extension to ring when the pilot number was last called. Ringing pro...