It means that if you isolate your managment vlan with your user's vlan then it will help you reaching the managment interface and it totally makes sense. But do you think that isolating your managment vlan will also help you securing your network from hackers?
Regards, Ali -----Original Message----- From: maverick hurley [mailto:[EMAIL PROTECTED]] Sent: Friday, March 22, 2002 11:41 AM To: [EMAIL PROTECTED] Subject: RE: Catalyst 6509 [7:39192] I have always been advised to use Vlan 1 for management only? Just dont use vlan 1 for users and other devices. I would use vlan 1 for the managemnet under a different subnet than your devices. Assign the subnet for vlan1 on your router card. Use a ip under that subnet for your SC0 interface and point your default gateway to the vlan1 interface of your router card. The advantage for using vlan 1 only for managment is that if your management is in the same vlan as devices and you have broadcast storms this can effect you not being able to reach the interface for management. Also your native vlans for ports is vlan1 incase you ever loose one end of a trunked port you can recover easier. thanks Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=39217&t=39192 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]