Unsolved

This post is more than 5 years old

2 Intern

 • 

160 Posts

5837

November 17th, 2004 21:00

connect CISCO DSL Router or CISCO Firewall with Switch PowerConnect 3324

hi

To connect CISCO DSL Router or CISCO Firewall with PowerConnect 3324, I use straight-through patch cable.
Could I use for this connection any ports from 1/e1-e24 or is it better to use uplink
ports 1/g1-g2 ?

and my second question is:
Is it better to disable spanning-tree on this ports from PowerConnect ?
I mean only these ports connected via patch cable to the firewall and not all ports.

kind regards
anonimous

2 Intern

 • 

812 Posts

November 18th, 2004 10:00

All ports on the switch simply forward traffic based on MAC address. The only difference between the 10/100 and 10/100/1000 ports is the speed. If the other devices are not capable of gigabit connectivity, it would be pointless to use the gigabit ports on the switch.

It is recommended to enable portfast (also referred to as fastlink or edgeport) only on ports that terminate in a node (client, server, printer, etc.). You should leave Spanning Tree enabled on ports that connect to other network devices.

2 Intern

 • 

160 Posts

November 18th, 2004 13:00

thanks for the answer.

but do I understand correctly ?

Fastlink (PowerConnect 3024) or STP (PowerConnect 3324) should be enabled in any case on this ports connected to the ADSL router ?

greetings
anonimous

2 Intern

 • 

812 Posts

November 19th, 2004 12:00

Spanning Tree (STP) is enabled by default on all of our managed switches. Enabling Fastlink basically prevents Spanning Tree from running on a particular port.
 
Best practice is to run Spanning Tree (Fastlink disabled) on all ports that connect to other network devices. It is safe to enable Fastlink on any port that terminated directly into a node (printer, client, server, etc.).

2 Intern

 • 

160 Posts

November 19th, 2004 21:00

thanks !

Message Edited by anonimous on 11-21-2004 04:51 PM

0 events found

No Events found!

Top