Why use encapsulation dot1q




















As you can see we have computers on both sides and they are in different VLANs, by using trunks we can make sure all VLAN traffic can be sent between the switches. This is how switches know to which VLAN our traffic belongs. If you want to know how to configure trunks…take a look at this lesson that I wrote earlier. It explains how to configure trunks on Cisco Catalyst switches. Tags: The switch will tag the frame when it leaves the trunk.

Ask a question or join the discussion by visiting our Community Forum. Native ports accept traffic from a single VLAN and are used to link end devices like routers, servers, terminals etc. They do not need to accommodate an additional identification tag as they are involved in exchanging traffic with a single end device. Hence the name, untagged ports. They are also referred to as access ports. Trunk ports are used to pass traffic from multiple VLANs and are used to link switches.

In order to distinguish between frames from different VLANs, trunk ports add identification tags to the frames. Hence the name, tagged ports. A trunk is a point-to-point link between two network devices that carry more than one VLAN. Note that native VLANs transport untagged frames. However, when these untagged frames reach a trunk end, they need to be tagged to make sure the switch on the other side of the trunk can forward the frames to the right destinations.

As a result, the switches with trunk ports add tags to the frames for identification - a process typically known as VLAN Encapsulation. Switch 2, on receiving the tagged frames, decapsulates them to check which VLAN they are destined for and forwards them accordingly. When a switch port is configured to function as a trunk port, it adds unique identification tags — either IEEE It is the most widely used encapsulation method for VLAN tagging.

Note: IEEE Do you mean add the encapsulation to the main interface on the router? If so you don't need to do that for it work. Yep I did.

The reason I ask is because on another router see below the command was in place. Thanks : silly me. Post Reply. Latest Contents. The IT Blog Awards is now accepting submissions! Created by caiharve on PM. Submit your blog, vlog or podcast today. They make geeky cool. They are both educator As an industry and m Networking and Cloud Announcements Fall Created by Kelli Glass on PM. Created by Mohamed Alhenawy on AM.

Ask a Question. Find more resources. Blogs Networking Blogs Networking News. Project Gallery.



0コメント

  • 1000 / 1000