This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

VLANs and Interfaces

Hey all, right now we have about a dozen VLANs spread around all seven of the ASG220 ports. I'd like to consolidate or simplify this if possible. Is there a best practice? There doesn't appear to be any rhyme or reason how the person who was here before me allocated\defined VLANs to the ASG interfaces. What''s strange is the trunk ports on the switch that connect to ASG interfaces allow all VLANs. In that case.. why not just allow all VLANs on one ASG port and be done?


This thread was automatically locked due to age.
Parents
  • On the UTM, you can define multiple VLANs on a LAG, but you can't create a LAG with an interface that already has a VLAN defined on it.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Reply
  • On the UTM, you can define multiple VLANs on a LAG, but you can't create a LAG with an interface that already has a VLAN defined on it.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children
No Data