A Port VLAN ID (pvid) is a default VLAN ID that is assigned to an access port to designate the virtual LAN segment to which this port is connected. The pvid places the port into the set of ports that are connected under the designated VLAN ID. Also, if a trunk port has not been configured with any VLAN memberships, the virtual switch's Port VLAN ID (pvid) becomes the default VLAN ID for the ports connection.
VLAN 1 is the management VLAN. All switch ports are members of VLAN1.
The native VLAN is untagged. If the VLAN 99 traffic to the router is untagged (as it would be, because that is native on the switches), the router cannot interpret the data because there is no VLAN information in the header as expected. In turn, the router tags all VLAN 99 traffic outbound, and leaves VLAN 1 data untagged, so the switches are unable to correctly interpret either. VLAN traffic to the other VLANs should not be affected by the assignment of the native VLAN.
The IP address of each router subinterface mist be used as the default gateway for hosts on the corresponding VLAN.
STP (Spanning Tree Protocol) is typically configured on network devices such as switches to prevent loops in a network. HP servers do not typically run STP themselves, but they can be connected to switches that are running STP to ensure proper network topology and stability.
A VLAN is a virtual LAN. In technical terms, a VLAN is a broadcast domain created by switches. Normally, it is a router creating that broadcast domain. With VLANs, a switch can create the broadcast domain. This works by, you, the administrator, putting some switch ports in a VLAN other than 1, the default VLAN. All ports in a single VLAN are in a single broadcast domain. Because switches can talk to each other, some ports on switch A can be in VLAN 10 and other ports on switch B can be in VLAN 10. Broadcasts between these devices will not be seen on any other port in any other VLAN, other than 10. However, these devices can all communicate because they are on the same VLAN. Without additional configuration, they would not be able to communicate with any other devices, not in their VLAN.
There may be a more general answer to this, but by default most Cisco hardware will support up to 1,000 VLANs.
Switch(config)# ip default-gateway 192.168.1.254Switch(config)# interface vlan 1Switch(config-if)# ip address 192.168.1.1 255.255.255.0Switch(config-if)# interface fa0/1Switch(config-if)# switchport access vlan 1
Since VLAN's cannot communicate with other VLAN's directly, I believe you would have to set up a router to do that. I would check out how to set up a bridge between two VLAN's.
VLAN: How are packets distributed with respect to the different classifications?
It is the VLAN that supports untagged traffic on an 802.1Q trunk
no vlan XXX copy run star