Quantcast
Channel: PowerConnect Forum - Recent Threads
Viewing all 908 articles
Browse latest View live

Connect 2 X1026 switches together

$
0
0

Hello all,

I have 2 X1026 switches - each has 3 VLANs defined (1-3).

I am trying to connect the 2 together - preferrably just VLAN 2.

I can easily do this on Cisco equipment - but I've tried Trunk ports, General ports, Access ports - PVID of 2, allowing tagged, untagged...you name it.  I cannot get them to pass traffic.

If I connect an endpoint to the one switchport, it can talk to other VLAN2 devices without issue.  Once I connect it to the other switch, and hang the endpoint off that switch - it doesn't work.  

Can someone tell me how to configure the 2 switch ports so VLAN 2 traffic will pass between them?  

Thanks,

E


Dell Enterprise Hardware & Software Updates, January 16-20

$
0
0

Connect server to N1524 10GB port

$
0
0

Can anyone tell me if its ok to connect a server to a 10GB "uplink" port on a N1524?

Cheers,

Alg

DHCP Relay needed?

$
0
0

Hello everyone!

I am running into a issue with a DHCP request packets being dropped. Would appreciate any feedback! 

2 x Meraki MX 100 running DHCP.

4 x Dell Power Connect 6224 layer 3 stacked and routing.

3 x Dell Power Connect 5524 layer 2 stacked. (Workstation Switches)

When a client machine try's to renew the IP address it fails. Packet capture on Meraki states that source IP is 192.168.99.1. 

VLAN 105 is our workstations/clients. (192.168.105.0/24)

From what I can gather - since the request is coming from the 99.1 address, it is being dropped because it is not coming from the requesting 105.1 addresses.

Here is a rundown of the layer 3 config.

Layer 3 config-

 

!Current Configuration:

2

!System Description "PowerConnect 6224, 3.3.5.5, VxWorks 6.5"

3

!System Software Version 3.3.5.5

4

!Cut-through mode is configured as disabled

5

!

6

configure

7

vlan database

8

vlan 99-105

9

vlan routing 99 1

10

vlan routing 100 2

11

vlan routing 101 3

12

vlan routing 102 4

13

vlan routing 104 5

14

vlan routing 105 6

15

exit

16

sntp unicast client enable

17

sntp server XXXXXXXXXXX

18

clock summer-time recurring USA

19

clock timezone -5 minutes 0 zone "EST"

20

stack

21

member 1 1

22

member 2 1

23

member 3 1

24

member 4 1

25

exit

26

ip address none

27

ip name-server 192.168.100.69

28

ip routing

29

ip route 0.0.0.0 0.0.0.0 192.168.99.1

30

ip helper-address 192.168.99.1

31

interface vlan 99

32

routing

33

ip address 192.168.99.2 255.255.255.0

34

exit

35

interface vlan 100

36

routing

37

ip address 192.168.100.1 255.255.255.0

38

exit

39

interface vlan 101

40

routing

41

ip address 192.168.101.1 255.255.255.0

42

exit

43

interface vlan 102

44

routing

45

ip address 192.168.102.1 255.255.255.0

46

exit

47

interface vlan 104

48

routing

49

ip address 192.168.104.1 255.255.255.0

50

exit

51

interface vlan 105

52

routing

53

ip address 192.168.105.1 255.255.255.0

54

exit

55

username "admin" password XXXXXXXXXXXXXX level 15 encrypted

56

monitor session 1 destination interface 3/g18

57

monitor session 1 source interface 3/g24

58

monitor session 1 source interface 4/g24

59

monitor session 1 mode

60

line console

61

password XXXXXXXXXXXXXXXXXXXXXXX encrypted

62

exit

63

line telnet

64

exec-timeout 120

65

password XXXXXXXXXXXXXXXXXXXXXXX encrypted

66

exit

67

line ssh

68

password XXXXXXXXXXXXXXXXXXXXXXX encrypted

69

exit

70

ip ssh server

71

spanning-tree priority 4096

72

!

73

interface ethernet 1/g1

74

switchport mode trunk

75

switchport trunk allowed vlan add 104

76

exit

77

!

78

interface ethernet 1/g2

79

switchport mode trunk

80

switchport trunk allowed vlan add 104

81

exit

82

!

83

interface ethernet 1/g3

84

switchport mode trunk

85

switchport trunk allowed vlan add 104

86

exit

87

!

88

interface ethernet 1/g4

89

switchport mode trunk

90

switchport trunk allowed vlan add 104

91

exit

92

!

93

interface ethernet 1/g5

94

switchport mode trunk

95

switchport trunk allowed vlan add 104

96

exit

97

!

98

interface ethernet 1/g6

99

switchport access vlan 104

100

exit

101

!

102

interface ethernet 1/g7

103

switchport mode trunk

104

switchport trunk allowed vlan add 104

105

exit

106

!

107

interface ethernet 1/g8

108

switchport mode trunk

109

switchport trunk allowed vlan add 104

110

exit

111

!

112

interface ethernet 1/g9

113

switchport mode trunk

114

switchport trunk allowed vlan add 104

115

exit

116

!

117

interface ethernet 1/g10

118

switchport mode trunk

119

switchport trunk allowed vlan add 104

120

exit

121

!

122

interface ethernet 1/g11

123

switchport mode trunk

124

switchport trunk allowed vlan add 104

125

exit

126

!

127

interface ethernet 1/g12

128

switchport mode trunk

129

switchport trunk allowed vlan add 104

130

exit

131

!

132

interface ethernet 1/g13

133

switchport mode trunk

134

switchport trunk allowed vlan add 104

135

exit

136

!

137

interface ethernet 1/g14

138

switchport mode trunk

139

switchport trunk allowed vlan add 104

140

exit

141

!

142

interface ethernet 1/g15

143

switchport mode trunk

144

switchport trunk allowed vlan add 104

145

exit

146

!

147

interface ethernet 1/g16

148

switchport mode trunk

149

switchport trunk allowed vlan add 104

150

exit

151

!

152

interface ethernet 1/g17

153

switchport mode trunk

154

switchport trunk allowed vlan add 104

155

exit

156

!

157

interface ethernet 1/g18

158

switchport mode trunk

159

switchport trunk allowed vlan add 104

160

exit

161

!

162

interface ethernet 1/g19

163

switchport mode trunk

164

switchport trunk allowed vlan add 104

165

exit

166

!

167

interface ethernet 1/g20

168

switchport mode trunk

169

switchport trunk allowed vlan add 104

170

exit

171

!

172

interface ethernet 1/g21

173

switchport mode trunk

174

switchport trunk allowed vlan add 104

175

exit

176

!

177

interface ethernet 1/g22

178

switchport mode trunk

179

switchport trunk allowed vlan add 104

180

exit

181

!

182

interface ethernet 1/g23

183

switchport mode trunk

184

switchport trunk allowed vlan add 104

185

exit

186

!

187

interface ethernet 1/g24

188

switchport mode trunk

189

switchport trunk allowed vlan add 104

190

exit

191

!

192

interface ethernet 2/g1

193

switchport mode trunk

194

switchport trunk allowed vlan add 104

195

exit

196

!

197

interface ethernet 2/g2

198

switchport mode trunk

199

switchport trunk allowed vlan add 104

200

exit

201

!

202

interface ethernet 2/g3

203

switchport mode trunk

204

switchport trunk allowed vlan add 104

205

exit

206

!

207

interface ethernet 2/g4

208

switchport mode trunk

209

switchport trunk allowed vlan add 104

210

exit

211

!

212

interface ethernet 2/g5

213

switchport mode trunk

214

switchport trunk allowed vlan add 104

215

exit

216

!

217

interface ethernet 2/g6

218

switchport access vlan 104

219

exit

220

!

221

interface ethernet 2/g7

222

switchport mode trunk

223

switchport trunk allowed vlan add 104

224

exit

225

!

226

interface ethernet 2/g8

227

switchport mode trunk

228

switchport trunk allowed vlan add 104

229

exit

230

!

231

interface ethernet 2/g9

232

switchport mode trunk

233

switchport trunk allowed vlan add 104

234

exit

235

!

236

interface ethernet 2/g10

237

switchport mode trunk

238

switchport trunk allowed vlan add 104

239

exit

240

!

241

interface ethernet 2/g11

242

switchport mode trunk

243

switchport trunk allowed vlan add 104

244

exit

245

!

246

interface ethernet 2/g12

247

switchport mode trunk

248

switchport trunk allowed vlan add 104

249

exit

250

!

251

interface ethernet 2/g13

252

switchport mode trunk

253

switchport trunk allowed vlan add 104

254

exit

255

!

256

interface ethernet 2/g14

257

switchport mode trunk

258

switchport trunk allowed vlan add 104

259

exit

260

!

261

interface ethernet 2/g15

262

switchport mode trunk

263

switchport trunk allowed vlan add 104

264

exit

265

!

266

interface ethernet 2/g16

267

switchport mode trunk

268

switchport trunk allowed vlan add 104

269

exit

270

!

271

interface ethernet 2/g17

272

switchport mode trunk

273

switchport trunk allowed vlan add 104

274

exit

275

!

276

interface ethernet 2/g18

277

switchport mode trunk

278

switchport trunk allowed vlan add 104

279

exit

280

!

281

interface ethernet 2/g19

282

switchport mode trunk

283

switchport trunk allowed vlan add 104

284

exit

285

!

286

interface ethernet 2/g20

287

switchport mode trunk

288

switchport trunk allowed vlan add 104

289

exit

290

!

291

interface ethernet 2/g21

292

switchport mode trunk

293

switchport trunk allowed vlan add 104

294

exit

295

!

296

interface ethernet 2/g22

297

switchport mode trunk

298

switchport trunk allowed vlan add 104

299

exit

300

!

301

interface ethernet 2/g23

302

switchport mode trunk

303

switchport trunk allowed vlan add 104

304

exit

305

!

306

interface ethernet 2/g24

307

switchport mode trunk

308

switchport trunk allowed vlan add 104

309

exit

310

!

311

interface ethernet 3/g1

312

switchport mode trunk

313

switchport trunk allowed vlan add 101-102

314

exit

315

!

316

interface ethernet 3/g2

317

switchport mode trunk

318

switchport trunk allowed vlan add 100,102-103

319

exit

320

!

321

interface ethernet 3/g3

322

switchport mode trunk

323

switchport trunk allowed vlan add 100,102-103

324

exit

325

!

326

interface ethernet 3/g4

327

switchport mode trunk

328

switchport trunk allowed vlan add 101-102

329

exit

330

!

331

interface ethernet 3/g5

332

switchport mode trunk

333

switchport trunk allowed vlan add 100,102-103

334

exit

335

!

336

interface ethernet 3/g6

337

switchport mode trunk

338

switchport trunk allowed vlan add 100,102-103

339

exit

340

!

341

interface ethernet 3/g7

342

switchport mode trunk

343

switchport trunk allowed vlan add 101-102

344

exit

345

!

346

interface ethernet 3/g8

347

switchport mode trunk

348

switchport trunk allowed vlan add 100,102-103

349

exit

350

!

351

interface ethernet 3/g9

352

switchport mode trunk

353

switchport trunk allowed vlan add 100,102-103

354

exit

355

!

356

interface ethernet 3/g10

357

switchport access vlan 100

358

exit

359

!

360

interface ethernet 3/g11

361

switchport access vlan 100

362

exit

363

!

364

interface ethernet 3/g12

365

switchport access vlan 100

366

exit

367

!

368

interface ethernet 3/g13

369

switchport access vlan 100

370

exit

371

!

372

interface ethernet 3/g14

373

switchport access vlan 100

374

exit

375

!

376

interface ethernet 3/g15

377

switchport access vlan 102

378

exit

379

!

380

interface ethernet 3/g16

381

switchport access vlan 100

382

exit

383

!

384

interface ethernet 3/g17

385

switchport access vlan 100

386

exit

387

!

388

interface ethernet 3/g18

389

switchport access vlan 100

390

exit

391

!

392

interface ethernet 3/g19

393

switchport access vlan 100

394

exit

395

!

396

interface ethernet 3/g20

397

switchport access vlan 100

398

exit

399

!

400

interface ethernet 3/g21

401

switchport access vlan 100

402

exit

403

!

404

interface ethernet 3/g22

405

channel-group 1 mode auto

406

exit

407

!

408

interface ethernet 3/g23

409

channel-group 2 mode auto

410

exit

411

!

412

interface ethernet 3/g24

413

switchport mode general

414

switchport general pvid 99

415

switchport general allowed vlan add 99

416

switchport general allowed vlan add 103 tagged

417

switchport general allowed vlan remove 1

418

exit

419

!

420

interface ethernet 4/g1

421

switchport mode trunk

422

switchport trunk allowed vlan add 101-102

423

exit

424

!

425

interface ethernet 4/g2

426

switchport mode trunk

427

switchport trunk allowed vlan add 100,102-103

428

exit

429

!

430

interface ethernet 4/g3

431

switchport mode trunk

432

switchport trunk allowed vlan add 100,102-103

433

exit

434

!

435

interface ethernet 4/g4

436

switchport mode trunk

437

switchport trunk allowed vlan add 101-102

438

exit

439

!

440

interface ethernet 4/g5

441

switchport mode trunk

442

switchport trunk allowed vlan add 100,102-103

443

exit

444

!

445

interface ethernet 4/g6

446

switchport mode trunk

447

switchport trunk allowed vlan add 100,102-103

448

exit

449

!

450

interface ethernet 4/g7

451

switchport mode trunk

452

switchport trunk allowed vlan add 101-102

453

exit

454

!

455

interface ethernet 4/g8

456

switchport mode trunk

457

switchport trunk allowed vlan add 100,102-103

458

exit

459

!

460

interface ethernet 4/g9

461

switchport mode trunk

462

switchport trunk allowed vlan add 100,102-103

463

exit

464

!

465

interface ethernet 4/g10

466

switchport access vlan 100

467

exit

468

!

469

interface ethernet 4/g11

470

switchport access vlan 100

471

exit

472

!

473

interface ethernet 4/g12

474

switchport access vlan 100

475

exit

476

!

477

interface ethernet 4/g13

478

switchport access vlan 100

479

exit

480

!

481

interface ethernet 4/g14

482

switchport access vlan 100

483

exit

484

!

485

interface ethernet 4/g15

486

switchport access vlan 102

487

exit

488

!

489

interface ethernet 4/g16

490

switchport access vlan 100

491

exit

492

!

493

interface ethernet 4/g17

494

switchport access vlan 100

495

exit

496

!

497

interface ethernet 4/g18

498

switchport access vlan 100

499

exit

500

!

501

interface ethernet 4/g19

502

switchport access vlan 100

503

exit

504

!

505

interface ethernet 4/g20

506

switchport access vlan 100

507

exit

508

!

509

interface ethernet 4/g21

510

switchport access vlan 100

511

exit

512

!

513

interface ethernet 4/g22

514

channel-group 1 mode auto

515

exit

516

!

517

q

518

 

519

exit

520

!

521

interface ethernet 4/g24

522

switchport mode general

523

switchport general pvid 99

524

switchport general allowed vlan add 99

525

switchport general allowed vlan add 103 tagged

526

switchport general allowed vlan remove 1

527

exit

528

!

529

interface port-channel 1

530

switchport access vlan 105

531

exit

532

 

533

interface port-channel 2

534

switchport access vlan 105

535

exit

536

snmp-server community XXXXX

537

exit

N-Series switches: Interaction between spanning tree and routed virtual interfaces

$
0
0

I've done close reading of both the User Guide and CLI manual but I'm not clear on the interaction (i.e, "gotchas"), if any, that spanning tree (STP, RSTP, RSTP-PV, etc.) has wiith respect to virtual routed interfaces.  I know other equipment mfrs. (cough, cough ... B****ade) go to some length to describe the issue; i.e., that virtual interfaces are subject to the rules of STP if they are all in the same domain and are thus blocked for the routed protocols if not in the forwarding state.  Would this kind of operation also be true of the N-series?  What about the case of per-VLAN spanning tree?  Since it's per-VLAN would this still apply?  Wouldn't the spanning tree "terminate" at each virtual interface as opposed to grouping them all in one large domain as would be the case with (R)STP?

Virtual routed interfaces, as opposed to port-based routing, is, for me, a murky area with respect to STP and it's variations.  Any in-depth knowledge that one could share would be appreciated.

Dell PowerConnect x1052: Select LAC hashing algorithm.

$
0
0

How I can select hashing function for LAC in x1052? I need to select Layer3 or Layer4 hash.

Powerconnect 6248 cpu OID's

$
0
0

Morning, I want to monitor my dell switches cpu usage using zabbix 3.0 and grafana
since zabbix does not have a great template for powerconnect 6248 I have been making my own items to monitor.
For the CPU I have found the OID SNMPv2-SMI::enterprises.674.10895.5000.2.6132.1.1.1.1.4.4.0 which is a string value that shows the cpu usage at 5s, 1m and 5m but the problem is I can't graph it or display in any way since its a string.

I have tried searching through different OID's but adding the MIB files to a tree that I have downloaded from the dell website just gives me a lot of errors and does not display most of the MIB's

Is there an OID that I have not found that would give me the current cpu usage as an integer ? or is there some other way around this ?

Dell N4032F PortChannel, VLAN Routing Issue

$
0
0

Hello,

I am configuring my first Dell Switch Stack (having come from a Juniper background) and I seem to be having an issue with some VLAN routing on my stack.

My set up is as follows;

Four N4032F Switches in a stack.

Four FX2S Chassis with multiple blades within each with esxi installed.

8 x 10Gbps per FX2S.

2 x 10Gbps link to each switch in the stack per FX2s

8-ports per FX2S in a LACP port-group, trunk with vlan 100 allowed.

ESXi has a mgmt IP configured, on VLAN 100 (vlan specified), and the DG is configured on the stack.

Each FX2S has its own port channel/LAG group.

Chassis one contains esxi 1 & 2

esxi 1 - 192.168.1.1

esxi 2 - 192.168.1.2

chassis 2 contains esxi 3 & 4

esxi 3 - 192.168.1.3

esxi 4 - 192.168.1.4

From the switch cli, I can ping 192.168.1.1, and esxi 192.168.1.2 but no other esxi hosts.

If I change the ip on the working esxi hosts, they still ping.

The port channel, interface, esxi hosts are all configured the same (bar the vpc id etc).

No idea what is happening but it is flummoxing me!

Any ideas what could cause this?!

Many Thanks in advance.


s4810 management interface

$
0
0

Hi,

I am getting the following error when I try to configure the route to the management network.

This is what I am getting:

* configure

* interface management 0/0

* ip address 10.8.0.14 255.255.255.0

* no shutdown

* exit

* management route 0.0.0.0/0 10.8.0.5

 Address not in the same subnet as management port.

What did I miss?

Thanks

Paras

N3048P Switch Discards

$
0
0

All my new 3048P switches are showing Received and transmit Discards

Why am I getting these and how do I stop them?

thks

Configure CMC (Chassis Managemenet Controller)

$
0
0

Hello,

Now, Is the first time that I try to configure the CMC. Could you confirm me if is necessary assign IP addres through CLI or the first time is possible access CMC without IP address?

On this way, How I could access to CMC?

Thanks in advance!

Stencil FN2210S

$
0
0

Hello,

I have bought 2 new modules FN2210S and I want to create a topology. I haven't still found out the stencil in "VisioCafe" website.


Please, Wheres would be this stencil?

Also I would be need the stencil for PowerEdge FX2 chassis.

Thanks in advance,

N3048 VLAN routing and default gateway

$
0
0

Many thanks again for the previous help. However, I'm now trying to set this up in our 'live' network and I've run into a problem with (I think) the default gateway.

Our current network uses the 10.10.0.0 255.255.0.0 network and our current DG is set to our firewall and is 10.10.1.10.

To introduce our N3048 into our network I've setup a VLAN 10 (10.10.5.59 255.255.0.0) which I plan to set as an access port and plug existing uplinks into. I will then create additional VLANs and slowly move downlink switches across onto these other VLANs.

In preparation, I've setup VLAN 8 (192.168.8.0 255.255.248.0) for testing. I've setup a test PC with a fixed IP address (192.168.8.9/21) connected to port 8 setup as access to VLAN 8. Another PC has a fixed IP of 10.10.0.10/16) connected to port 1 setup as access to VLAN 10. Both of these PCs have the VLAN IP set as their default gateway. I can ping each PC from the other.

The N3048 uplinks to a nework switch on port 10 setup as access to VLAN 10.

My problem is that I can't ping devices on our existing network from VLAN 8, even though they are connected. However, I can ping devices on VLAN 10 if I change their default gateway to the IP address of VLAN 10. Is it possible to leave my current devices with their DG set to 10.10.1.10, but still access them from VLAN 8?

My running config is:

!Current Configuration:
!Software Capability "ACCESS ROUTER"
!Image File "N3000_N2000v6.3.1.11"
!System Description "Dell Networking N3048, 6.3.1.11, Linux 3.6.5-7dc37651"
!System Software Version 6.3.1.11
!
configure
vlan 8,10
exit
vlan 8
name "test"
exit
vlan 10
name "legacy"
exit
slot 1/0 3 ! Dell Networking N3048
stack
member 1 4 ! N3048
exit
interface out-of-band
ip address 172.16.1.1 255.255.255.0 10.10.1.10
exit
ip routing
interface vlan 1 1
exit
interface vlan 8 2
ip address 192.168.8.1 255.255.248.0
ip helper-address 10.10.1.28 dhcp
exit
interface vlan 10 3
ip address 10.10.5.59 255.255.0.0
exit
ip default-gateway 10.10.1.10
username "hivemanager" password a66badb6b8d4e17566aedc089d6d5b0e privilege 15 encrypted
username "jim" password 19fdb07ff229190ce0c088d0ab850ba2 privilege 15 encrypted
ip ssh server
application install SupportAssist auto-restart start-on-boot
application install hiveagent start-on-boot
!
interface Gi1/0/1
description "Legacy Network"
switchport access vlan 10
exit
!
interface Gi1/0/8
description "Testing"
switchport access vlan 8
exit
!
interface Gi1/0/10
description "School Network"
switchport access vlan 10
exit
snmp-server engineid local 800002a203f8b15633ec06
exit

console#show ip route

Route Codes: R - RIP Derived, O - OSPF Derived, C - Connected, K - Kernel, S - Static
B - BGP Derived, E - Externally Derived, IA - OSPF Inter Area
E1 - OSPF External Type 1, E2 - OSPF External Type 2
N1 - OSPF NSSA External Type 1, N2 - OSPF NSSA External Type 2
S U - Unnumbered Peer, L - Leaked Route

* Indicates the best (lowest metric) route for the subnet.

Default Gateway is 10.10.1.10
S *0.0.0.0/0 [253/0] via 10.10.1.10, 01h:28m:19s, Vl10
C *10.10.0.0/16 [0/0] directly connected, Vl10
C *192.168.8.0/21 [0/0] directly connected, Vl8

console#show ip vlan

MAC Address used by Routing VLANs: F8B1.5633.EC09

Logical
VLAN ID Interface IP Address Subnet Mask
------- -------------- --------------- ---------------
1 Vl1 0.0.0.0 0.0.0.0
8 Vl8 192.168.8.1 255.255.248.0
10 Vl10 10.10.5.59 255.255.0.0

console#show vlan

VLAN Name Ports Type
----- --------------- ------------- --------------
1 default Po1-128, Default
Gi1/0/2-7,
Gi1/0/9,
Gi1/0/11-48,
Te1/0/1-2
8 test Gi1/0/8 Static
10 legacy Gi1/0/1, Static
Gi1/0/10

I've attached a diagram of my setup.

Many thanks for taking the time to read and reply.

lacp enable

$
0
0

Hi

I need two ports (TenGig 0/46-47) to be a lag and enable lacp on them.  When I try to enable lacp it says  Error port not in default mode.

Steps I have performed

 

Enable port channel

*  interface port-channel 1

* no shutdown

* switchport

* channel-member Tengigabitethernet 0/46

* channel-member Tengigabitethernet 0/47

Now to enable lacp

* interface range Tengigabitethernet 0/46-47

* no shutdown

* port-channel-protocol lacp

% Error: Port is not in default mode Te 0/46

% Error: Port is not in default mode Te 0/47

What did I miss?

Thanks

Paras.

Powerconnect 2824 Mac Based Home Network - Periodically Network Locks Up

$
0
0

I have a Powerconnect 2824 home network - Frontier Cable provides source with 24 ports, including a QNAP NAS running.  Periodically, the network locks up.  Doesn't give me an error - just hangs loading pages.  Might get better on its own in about 20 minutes but often requires that I turn the entire system including the switch off and then it works when everything comes back on.  I'm pretty sure it is not the Cable Router because I can WifI into its router and get internet access.  Any ideas?  Is it time to replace my PowerConnect Switch? with what? How can I diagnose the problem?

Thanks in advance for your help.


S3100 and DHCP limits

$
0
0

hello

What is the maximum pool number on the S3100 serial switches and the maximum number of addresses that the dhcp server can provide.

regards

DHCP server and TFTP Server

$
0
0

Hello

Is it possible to send with the DHCP server using the switch S serie the address of a TFTP server using the options.

Regards

This Week's 5-Star Enterprise Support Articles

Getting Option 156 working with Dell N3048P and Shoretel Phones

$
0
0

I know this is a very specific situation, but I thought maybe someone out there has the same or similar setup.  We have Shoretel Phones, plugged into a Dell N3048P switch, which is plugged into a Sophos XG 230 rotuer.  I have worked with Shoretel to turn on Option 156 on the router, which allows the phone to be on one VLAN, while the PC that is piggy backing off the phone gets another.  I have auto VoIP turned on the port the phone is plugged in to, it is trunked, and only allows VLAN 1 and 20 and has a native VLAN of 20.  Both the PC and the phoned end up on VLAN 20.  Config is below...

!Current Configuration:
!Software Capability "ACCESS ROUTER"
!Image File "N3000_N2000v6.3.1.8"
!System Description "Dell Networking N3048P, 6.3.1.8, Linux 3.6.5-7dc37651"
!System Software Version 6.3.1.8
!
configure
vlan 10,20,30
exit
slot 1/0 7 ! Dell Networking N3048P
stack
member 1 5 ! N3048P
exit
ip access-list salad
1000 permit every
exit
ip routing
ip helper-address 192.168.1.1
interface vlan 1 1
ip address 192.168.1.2 255.255.255.0
ip access-group salad in 1
exit
interface vlan 10 2
ip address 192.168.10.1 255.255.255.0
ip rip
ip access-group salad in 1
exit
interface vlan 20 3
ip address 192.168.20.1 255.255.255.0
ip rip
ip access-group salad in 1
exit
interface vlan 30 4
ip address 192.168.30.1 255.255.255.0
ip access-group salad in 1
exit
ip route 0.0.0.0 0.0.0.0 192.168.1.1
no passwords min-length
username "hivemanager" password a66badb6b8d4e17566aedc089d6d5b0e privilege 15 encrypted
username "root" password a6f5beb4643beb69bf29bac56a33d5c3 privilege 15 encrypted
ip ssh server
application install SupportAssist auto-restart start-on-boot
application install hiveagent start-on-boot
!
interface Gi1/0/1
switchport access vlan 10
ip access-group salad in 1
exit
!
interface Gi1/0/2
switchport voice detect auto
switchport mode trunk
switchport trunk native vlan 20
switchport trunk allowed vlan 1,20
ip access-group salad in 1
exit
!
interface Gi1/0/3
switchport access vlan 30
ip access-group salad in 1
exit
!
interface Gi1/0/4
ip access-group salad in 1
exit
!
interface Gi1/0/5
ip access-group salad in 1
exit
!
interface Gi1/0/6
ip access-group salad in 1
exit
!
interface Gi1/0/7
ip access-group salad in 1
exit
!
interface Gi1/0/8
ip access-group salad in 1
exit
!
interface Gi1/0/9
ip access-group salad in 1
exit
!
interface Gi1/0/10
ip access-group salad in 1
exit
!
interface Gi1/0/11
ip access-group salad in 1
exit
!
interface Gi1/0/12
ip access-group salad in 1
exit
!
interface Gi1/0/13
ip access-group salad in 1
exit
!
interface Gi1/0/14
ip access-group salad in 1
exit
!
interface Gi1/0/15
ip access-group salad in 1
exit
!
interface Gi1/0/16
ip access-group salad in 1
exit
!
interface Gi1/0/17
ip access-group salad in 1
exit
!
interface Gi1/0/18
ip access-group salad in 1
exit
!
interface Gi1/0/19
ip access-group salad in 1
exit
!
interface Gi1/0/20
ip access-group salad in 1
exit
!
interface Gi1/0/21
ip access-group salad in 1
exit
!
interface Gi1/0/22
ip access-group salad in 1
exit
!
interface Gi1/0/23
ip access-group salad in 1
exit
!
interface Gi1/0/24
ip access-group salad in 1
exit
!
interface Gi1/0/25
ip access-group salad in 1
exit
!
interface Gi1/0/26
ip access-group salad in 1
exit
!
interface Gi1/0/27
ip access-group salad in 1
exit
!
interface Gi1/0/28
ip access-group salad in 1
exit
!
interface Gi1/0/29
ip access-group salad in 1
exit
!
interface Gi1/0/30
ip access-group salad in 1
exit
!
interface Gi1/0/31
ip access-group salad in 1
exit
!
interface Gi1/0/32
ip access-group salad in 1
exit
!
interface Gi1/0/33
ip access-group salad in 1
exit
!
interface Gi1/0/34
ip access-group salad in 1
exit
!
interface Gi1/0/35
ip access-group salad in 1
exit
!
interface Gi1/0/36
ip access-group salad in 1
exit
!
interface Gi1/0/37
ip access-group salad in 1
exit
!
interface Gi1/0/38
ip access-group salad in 1
exit
!
interface Gi1/0/39
ip access-group salad in 1
exit
!
interface Gi1/0/40
ip access-group salad in 1
exit
!
interface Gi1/0/41
ip access-group salad in 1
exit
!
interface Gi1/0/42
ip access-group salad in 1
exit
!
interface Gi1/0/43
ip access-group salad in 1
exit
!
interface Gi1/0/44
ip access-group salad in 1
exit
!
interface Gi1/0/45
ip access-group salad in 1
exit
!
interface Gi1/0/46
ip access-group salad in 1
exit
!
interface Gi1/0/47
ip access-group salad in 1
exit
!
interface Gi1/0/48
ip access-group salad in 1
exit
!
interface Te1/0/1
ip access-group salad in 1
exit
!
interface Te1/0/2
ip access-group salad in 1
exit
!
snmp-server engineid local 800002a203f48e383b9a8d
exit

Intervlan routing between two N4064 switches

$
0
0

A question for routing between two switches.  We have two IDFs, with a 4064 in each, these two switches are connected via trunk.  Each switch has it's own firewall and ISP provider, and the default gateway for each is it's own respective firewall.  

Switch A and Switch B both have vlan 12, 14 and 20 named and IP'ed.  Switch A has VLAN 30, which is the one going out to the internet, Switch B has VLAN 33, which is it's internet gateway, but also a DMZ.  

We need traffic from Switch A to be able to get to VLAN 33 on Switch B.  As that VLAN 33 doesn't exist on Switch A, what is the best way to route the traffic to Switch B?  Currently, I have a next-hop routing policy, but was wondering if there isn't some other way, maybe a static route table entry?

Thank you in advance

Viewing all 908 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>