It means that if you isolate your managment vlan with your user's vlan then
it will help you reaching the managment interface and it totally makes
sense.  But do you think that isolating your managment vlan will also help
you securing your network from hackers?

Regards,


Ali


-----Original Message-----
From: maverick hurley [mailto:[EMAIL PROTECTED]]
Sent: Friday, March 22, 2002 11:41 AM
To: [EMAIL PROTECTED]
Subject: RE: Catalyst 6509 [7:39192]


I have always been advised to use Vlan 1 for management only? Just dont use
vlan 1 for users and other devices. I would use vlan 1 for the managemnet
under a different subnet than your devices. Assign the subnet for vlan1 on
your router card. Use a ip under that subnet for your SC0 interface and
point your default gateway to the vlan1 interface of your router card. The
advantage for using vlan 1 only for managment is that if your management is
in the same vlan as devices and you have broadcast storms this can effect
you not being able to reach the interface for management. Also your native
vlans for ports is vlan1 incase you ever loose one end of a trunked port you
can recover easier.

thanks




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=39217&t=39192
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to