A Port VLAN ID (pvid) is a default VLAN ID that is assigned to an access port to designate the virtual LAN segment to which this port is connected. The pvid places the port into the set of ports that are connected under the designated VLAN ID. Also, if a trunk port has not been configured with any VLAN memberships, the virtual switch's Port VLAN ID (pvid) becomes the default VLAN ID for the ports connection.
VLAN 1 is the management VLAN. All switch ports are members of VLAN1.
The name given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged is the "native VLAN." The native VLAN is used for untagged traffic on a trunk link, allowing devices that do not support VLAN tagging to communicate over the trunk. By default, VLAN 1 is designated as the native VLAN, but this can be changed to another VLAN as needed.
The native VLAN is untagged. If the VLAN 99 traffic to the router is untagged (as it would be, because that is native on the switches), the router cannot interpret the data because there is no VLAN information in the header as expected. In turn, the router tags all VLAN 99 traffic outbound, and leaves VLAN 1 data untagged, so the switches are unable to correctly interpret either. VLAN traffic to the other VLANs should not be affected by the assignment of the native VLAN.
In the default configuration of a new switch, the switch operates in "out-of-the-box" mode, meaning all ports are set to access mode and belong to the default VLAN (VLAN 1). Spanning Tree Protocol (STP) is enabled by default to prevent loops in the network. Additionally, there is no password set for console, VTY, or enable access, and no IP address is assigned to the switch interfaces until configured by the user.
The IP address of each router subinterface mist be used as the default gateway for hosts on the corresponding VLAN.
Configuring Standard STP Parameters STP is disabled by default on Routing Switches. By default, each port-based VLAN on an HP device runs a separate spanning tree (a separate instance of STP). An HP device has one port-based VLAN (VLAN 1) by default that contains all the device's ports.
A VLAN is a virtual LAN. In technical terms, a VLAN is a broadcast domain created by switches. Normally, it is a router creating that broadcast domain. With VLANs, a switch can create the broadcast domain. This works by, you, the administrator, putting some switch ports in a VLAN other than 1, the default VLAN. All ports in a single VLAN are in a single broadcast domain. Because switches can talk to each other, some ports on switch A can be in VLAN 10 and other ports on switch B can be in VLAN 10. Broadcasts between these devices will not be seen on any other port in any other VLAN, other than 10. However, these devices can all communicate because they are on the same VLAN. Without additional configuration, they would not be able to communicate with any other devices, not in their VLAN.
There may be a more general answer to this, but by default most Cisco hardware will support up to 1,000 VLANs.
Switch(config)# ip default-gateway 192.168.1.254Switch(config)# interface vlan 1Switch(config-if)# ip address 192.168.1.1 255.255.255.0Switch(config-if)# interface fa0/1Switch(config-if)# switchport access vlan 1
The command "shutdown vlan 17" is used in network configuration to disable VLAN 17 on a network switch. When executed, it effectively prevents any traffic from being forwarded through this VLAN, rendering it inactive. This can be useful for network management purposes, such as troubleshooting or reconfiguring the VLAN. To reactivate the VLAN, the command "no shutdown vlan 17" would be used.
Since VLAN's cannot communicate with other VLAN's directly, I believe you would have to set up a router to do that. I would check out how to set up a bridge between two VLAN's.