Cisco Small Business Switch VLAN Configuration

This tutorial will show you how to configure VLANs on a Cisco Small Business series switch. In my example I’m using a SG 300-10MP switch but it will be similar to other SMB switches. In the example below we have a single switch connected to 4 devices, each device is in a different VLAN. To accomplish this we need to create those VLANs and assign the interfaces to the correct VLAN.

Cisco SMB Vlans

First we need to login to the switch, the default IP address is 192.168.1.1. Default username is ‘cisco’ and password is also ‘cisco’.

Cisco SMB Switch Login Screen

Once you are logged in you need to select VLAN Management from the menu and then choose Create VLAN:

Cisco SMB Switch VLAN Management

In this overview you will see all VLANs that this switch has at the moment. So far there is only VLAN 1 (management VLAN). Hit the Create VLAN button:

Cisco SMB Switch Create VLAN

Add VLAN 2,3 and 4 and give it a descriptive name. Your overview will look like this:

Cisco SMB Switch VLAN Overview

The VLANs are now configured but we still have to assign our interfaces to the correct VLAN. Select VLAN Management and then Interface Settings:

Cisco SMB Interface Settings

You will see the following overview with all interfaces on the switch. As you can see by default all interfaces are trunks. We want to make sure that the interfaces connected to the different devices are access ports and that they can only access their own VLAN. Select an interface, and click on Edit:

Cisco SMB Interface Overview

Here’s an example for the GE1 interface. For the interface VLAN Mode select Access and click on Apply:

Cisco SMB Edit Interface Setting

Do the same for interface GE2, GE3 and GE4 so your overview looks like this:

Cisco SMB Interface Access Ports

Interface GE1, GE2, GE3 and GE4 are now in access mode but we still need to select the VLAN that they belong to. Do this by selecting VLAN Management from the menu and then choose Port VLAN Membership:

Cisco SMB Port VLAN Membership

You will see the following overview with the Port VLAN Membership overview:

Cisco SMB Port VLAN Membership Interfaces

Select one of the interfaces and hit the Join VLAN button:

Cisco SMB Join VLAN

Make sure you select the correct VLAN for the interface and ensure that Tagging is set to Untagged. Configure GE2 for VLAN 2, GE3 for VLAN 3 and GE4 for VLAN 4. Once you are done your overview will look like this:

We're Sorry, Full Content Access is for Members Only...

If you like to keep on reading, Become a Member Now! Here is why:

  • Learn any CCNA, CCNP and CCIE R&S Topic. Explained As Simple As Possible.
  • Try for Just $1. The Best Dollar You've Ever Spent on Your Cisco Career!
  • Full Access to our 654 Lessons. More Lessons Added Every Week!
  • Content created by Rene Molenaar (CCIE #41726)

540 Sign Ups in the last 30 days

satisfaction-guaranteed
100% Satisfaction Guaranteed!
You may cancel your monthly membership at any time.
No Questions Asked!

Tags: ,


Forum Replies

  1. Rene
    I need a help on something… if in one port i want to connect 2 host. An Avaya Phone and a Computer, this is bc the avaya phones have an additional port to the desktop so the port will receive 2 mac addresses that will require 2 different vlans… do i need to configure trunk? Can you explain that as well?

  2. 'Hi René, big thank you for this tutorial.
    It helped me started with the process which is great, but even though i followed it step by step, i got stuck at the ‘Port Vlan membership setting’.Actually, when i try to join my created vlan, there is only a blank window under the ‘select vlan’ part i cant see any of the vlan i created earlier in the process.
    After redoing each step again, I thought that i missed something aside of your explanations, and wondered if maybe i shouldnt swith the system Mode to L3 and get further options activated first, like an IPV4 int

    ... Continue reading in our forum

  3. Hi Rene

    After another day of banging my keyboard I learned a few things.

    1 - my Barracuda DCHP sever needs to be rebooted on changes - many times it was not giving DCHP (which led me to think VLANS were broken) but on static assignments of IP the VLAN could ping the Firewall. This took 2 days to figure out.

    1. I finally think I got the TRUNKING correct. I did it this way

    Port 1 - TRUNK - 10UP, 100T, 200T
    Port 2 - 49 - ACCESS in 3 groups of ports for 10, 100 200

    IPV4 routing enabled on Cisco
    Subnets and DCHP all defined on Firewall

    VLAN routing first set as DCH

    ... Continue reading in our forum

  4. Hi Rene,

    I hope I’m in the right place here…

    I have been following through your example here and I think is the closest example I’ve found to what I’m trying to do, but I think I’m missing a few things

    …like where do the different IP’s & ranges get set for each VLAN, and can those separate VLAN’s be setup to do the DCHP assignments for the devices in each VLAN?

    Here’s briefly what I’m trying to accomplish…

    I have a network on a Comcast fiber with public static IP’s I have a cisco router 1941 up front, then a cisco SG300 switch to handle traffic connections betw

    ... Continue reading in our forum

  5. Hi Rene, thanks for your reply, but I think I definitely need a bit more…

    First I’ve been thinking about this a bunch and wondering if I’m over complicating this…
    So yes I have 1941 SG300#1 (to fw, phone & data app using 3 ports w/public ip’s) …and add, SG300#2 to my WAP’s

    I can use another public IP for SG300#2 (but not enough for WAPs), so SG300#2 can be like xx.yyy.76.30 and can point it to my GW xx.yyy.76.1 and I have that working but when I plug my laptop into SG#2 I get a DCHP IP but in my xx.yyy.76.range…my thought was to have a DHCP to assign IPs in

    ... Continue reading in our forum

67 more replies! Ask a question or join the discussion by visiting our Community Forum