My next M1000e purchase is going to include a pair of stacked MXLs in fabric A and a pair of stacked M6348s in fabric B. I want to use stacked PowerConnect 6348s as "top rack" switches with stacked MXLs as my workhorses. Are there any known issues I need to look out for regarding bugs, or incompatibilities? I wish there was a way to connect these together using the fabric backplane, but as of now I believe using LAGs to connect them together is the best (most straghtforward) approach. STP incompatibilities come to mind when connecting different types of switches together. I appreciate any feedback on this topic.
M1000e IOMs working together: stacked MXLs and stacked PowerConnect 6348s.
6224F sfp problem
Hello, I am trying to add a 6224f to a stack that was running with 3 other switches. Switch 1 was a 6224F, Switch 2 was a 6248p, Switch 3 was a 6248. I added the new 6224f and set it up as stack member 2. All switches are running the latest firmware and boot code.
For some reason none of the SFP ports on the recently added 6224f are working properly. If I try to connect a device to the switch the port light never comes on. The SFP and the cable are good though. The 4 copper ports on the switch do not exhibit this behavior.
Strangely if I do a loopback and connect a patch cable between two ports on the switch the link light does come on.
So, the cables are good, the sfps are good and the ports are good but they only work when looping back to ports on the same switch.
Any ideas?
Thanks
Routing outside the 6248
Alright, I know this is a basic question and I've done a bunch of looking around and hours worth of trying different configurations with this 6248. Here's what I'm faced with:
- I have a flat network at this point that is 192.168.1.0 /24.
- I have a cable gateway modem at 192.168.1.1 that I use to get northbound to the Internet which is NOT capable of setting static routes.
- DNS is a VM at 192.168.1.5.
- My 6248 has several VLANs, all of which I want to route between: 1, 5, 6, etc.
- I want from every VLAN to be able to get internet access through the said cable gateway.
- VLAN 1 is 192.168.1.0 /24 network.
- Switch interface for VLAN 1 is 192.168.1.25
- Switch interface for VLANs 5 and 6 are the .1 of their respective networks, so 192.168.5.1, etc.
- Switch management interface is on VLAN 250 with IP of 192.168.250.250 /24
- All existing and future VLANs will be simple /24 networks.
- Nothing is plugged into this 6248 right now while I get the configuration right, aside from an uplink cable (access port) into the 192.168.1.0 /24 network, and a test connection to an ESXi host where I'm testing different VLAN connectivity through a VM port group.
And now, questions/problems:
- Since on this switch you cannot route between the management interface VLAN, I had to create this on VLAN 250. So right now, I can't connect to the management interface, but I can connect to the interface at 192.168.1.25. Given my network right now, how/where should I configure this switch management interface? Or is it fine like it is?
- Because my cable modem gateway is at 192.168.1.1, if I'm testing connectivity from VLANs 5 or 6, while I can reach everything on VLAN 1 (including those hosts not directly connected to the 6248), I cannot go northbound to the internet. I have also put a default route in the switch for 192.168.1.1, but that isn't working. If I am connected to the 6248, configure a port group on VLAN 1, and set the gateway on a test VM to point to 192.168.1.25, I can get out to the internet. I can also ping the router interfaces for VLANs 5 and 6.
Here is my config:
!Current Configuration:
!System Description "PowerConnect 6248, 3.3.14.2, VxWorks 6.5"
!System Software Version 3.3.14.2
!Cut-through mode is configured as disabled
!
configure
vlan database
vlan 5-6,250
vlan routing 1 1
vlan routing 5 2
vlan routing 6 3
exit
stack
member 1 2
exit
ip address 192.168.250.250 255.255.255.0
ip address vlan 250
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.1.1
interface vlan 1
routing
ip address 192.168.1.25 255.255.255.0
exit
interface vlan 5
name "test"
routing
ip address 192.168.5.1 255.255.255.0
exit
interface vlan 6
name "test"
routing
ip address 192.168.6.1 255.255.255.0
exit
username "admin" password db32549314c1390177c34647bf960343 level 15 encrypted
!
interface ethernet 1/g25
spanning-tree portfast
switchport mode trunk
switchport trunk allowed vlan add 1,5-6
exit
exit
Port Mirroring a LAG on stacked Dell PowerConnect 6248s
Hello,
Is it possible to port mirror using as a source, a LAG, consisting of 4 ports (2 in each member of a stacked set of PowerConnect 6248s). Everytime I try adding the source, using GUI, I get an error:
Error! Failed to Set 'Type' with 'Tx and Rx' error occured FILTER_MISSING
What filter is this referring to?
I cannot select as a source, the unit 1 or unit 2, members of the LAG, as the gui does not show them in the drop down list of ports.
Thank you.
How do you reset the user inactivity timeout for the GUI login on a 3524P?
Default, apparently 5 min, is too short for me. I have tried several CLI commands I found online but apparently not the right one. This in particular seems like it should work but I get an unrecognized command response.
console(config)# ip http timeout-policy 1200
Dell Diagnostics file location for S4048-ON
Hi there,
I'm running Cumulus Linux 3.0, on the S4048-ON, which kills the diagnostics partition on the filesystem.
So I'm trying to re-install the Dell Network Diagnostics but can't find it anywhere with Dell's site?
Just wondering if anybody knows the location of this file as I need it so I can boot into the diagnostics partition and upgrade the CPLD image.
The documentation here says to do this:
ONIE:/ # onie-nos-install tx.x.x.x/DND-SK-DELL-DIAG-ENTRY-UPDATER
Just I can't find that updater??
I can download the other ONIE and BIOS files from this location and when I try to install INSTALLER-DND-SK-1.0.0.8.bin I get this error message as the /dev/disk3 partition must get created during the previous step:
ONIE:/ # onie-nos-install 192.168.155.3/INSTALLER-DND-SK-1.0.0.8.bin
Stopping: discover... done.
Info: Fetching 192.168.155.3/INSTALLER-DND-SK-1.0.0.8.bin ...
Connecting to 192.168.155.3 (192.168.155.3:80)
installer 100% |*******************************| 27129k 0:00:00 ETA
ONIE: Executing installer: 192.168.155.3/INSTALLER-DND-SK-1.0.0.8.bin
Verifying image checksum ... OK.
Preparing image archive from /installer ... Done.
No Diag Partitions found.Creating Diag Partition as /dev/sda3.../tmp/tmp.oUd2mp/installer/install.sh: line 128: can't create : no
nexistent directory
/tmp/tmp.oUd2mp/installer/install.sh: line 128: can't create : nonexistent directory
3 create failed
installation /tmp/tmp.oUd2mp/installer/FTOSDIAG-SK-1.0.0.8.bin error 1
ONIE:/ #
Any information would be much appreciated.
How to enable WOL packets - 4810s
Dear all,
Appreciate if anyone could explain me how to enable Wake-up On LAN packets broadcasting among VLANs in Dell Force 10 4810s L3 Switch.
Thanks,
Nishan
Could you advise me which network diagram is efficient?
Hello all,
I have to configure Router below. (I plan to use HSRP)
I want you to advise me which diagram is efficient.
Actually, I don't know what firewall use Layer mode (L2 or L3) -> this will be confirmed tomorrow.
In this point, if you know well, please let me know yours.
Plus, basically, where is firewall located ?
Maybe should I change router and firewall's location?
Regards,
SK.
Dell N2024p stack vlan
Migrate (3x Equallogic and 5 x ESX) cluster from a Force10 S25 stack to 2 N2048 (stack/lagged config) switches W/O downtime
I was asked to post my question in this forum in stead of the storage. Here it goes :
We currently have 5 servers connected to a S25 Force10 stack with 2 PS6100 and a PS4000. We will purchase a PS6210 (prepare for future 10GB) and want to add it to the cluster (on 2 x 1GB)
Since the S25 withes are 24 ports and in a stack, we will also purchase 2 N2048 switches and put them in a lagged configuration (with the 10GB twinax on the dedicated ports).
I am wondering what the best course of action would be to migrate the 3 Equallogics and 5 servers to the new switches.
My first idea, is to connect the S25 stack and the N2048 lagged setup with 4 or more 1GB cables and put these in a lag as well. Then I can simply switch cables one by one.
Not sure if this can be easily configured on the S25 though. Anyone any ideas or tips?
PowerConnect6248 and VPN Tunel
Is 6248 capable to establish site to site VPN?
Dell 6248 > Sophos XG
Hi all,
I am having trouble configuring these two coming from a cisco background.
I am used to having the no switchport command and being able to assign an IP directly to an interface, so to get around this i have created interface vlan 5 with IP 10.17.0.2/30, which is an access port connected to the sophos at 10.17.0.1, ping is working both ways.
I have devices attached to the dell, and can ping between the devices in different vlans, however i had to create a static route on the Sophos for 10.17.0.0 /16 pointing to 10.17.0.2, to get pings from internal devices on the switch to the gateway.
I am now trying to get ospf working and have the following on the switch;
routetr ospf
router-id 2.2.2.2
network 10.17.0.0 0.0.0.3 area 0.0.0.0
interface vlan 5
ip address 10.17.0.2 255.255.255.252
ip ospf area 0.0.0.0
On the Sophos, i have configured;
router ospf
router-id 1.1.1.1
network 10.17.0.0/30 area 0.0.0.0
With this configuration, they have not formed an adjacency, the dell has;
Router ID Priority IP Address Interface State Dead
Time
---------------- -------- --------------- ----------- ---------------- ------
1.1.1.1 1 10.17.0.1 vlan 5 Init/DR-OTHER 34
The sophos does not even have any information of the dell nor has it tried to form an adjacency.
Any helpful hints?
Cheers!
Dell PowerConnect n2000 Freeradius issue
Hi,
I'm a new one in PowerConnect community. I discover this environement and i'm front of an issue.
I have a FreeRadius ( base on Pfsense) and my n2048 and I try to make 802.1x authentification.
I have a Windows 7 workstation as test client.
When I try to authenticate I have this message in Switching/dot1x authentication/Monitoring mode/port access control history :
Dot1x : Radius authentication Comm Failure
And few seconds later :
Dot1x Authentication due to Guest Vlan Timer Expiry ( and the port is tagged on vlan 2 as expected in this case)
But why in first step I have a Comm Failure, is there somewhere a log file to find what's happened ?
Thank you for your help.
PowerEdge 6248 VLAN config
I am trying to reconfigure our network using VLANs and have run into a bit of a problem. I have 4 total VLANs defined but seem to be unable to route traffic between them. VLAN 43, being the main VLAN, can access the outside world and anything within it's VLAN with no problems but any other VLAN can do essentially nothing. They cannot access DHCP or DNS services located on VLAN 43 and, if I assign a device an IP address, it can ping one or two servers on VLAN 43 and thats it. I'm thinking the problem may be an issue with our firewall not being configured to pass traffic back to the VLANs as, the way it sits now, all 4 subnets that we have assigned to us are being used as one big network. Would someone please review my configuration and let me know it it is correct before I tackle the firewall issue? We do not have access to the firewall as it is controlled by our parent agency so I need to know if my config is right before I get them to start making changes.
show run
!Current Configuration:
!System Description "PowerConnect 6248, 3.3.4.1, VxWorks 6.5"
!System Software Version 3.3.4.1
!Cut-through mode is configured as disabled
!
configure
vlan database
vlan 43-46
vlan routing 43 1
vlan routing 44 2
vlan routing 45 3
vlan routing 46 4
exit
hostname "ESHCCore"
stack
member 1 2
exit
ip address 192.168.43.1 255.255.255.0
ip domain-name OAS.DHMH.Local
ip name-server 10.140.43.27
ip name-server 10.150.90.161
ip name-server 10.150.90.162
ip routing
ip route 0.0.0.0 0.0.0.0 10.140.43.1
ip helper-address 10.140.43.27 domain
ip helper-address 10.140.43.15 dhcp
interface vlan 43
name "Data Center Admin Service"
routing
ip address 10.140.43.10 255.255.255.0
exit
interface vlan 44
name " Nanticoke and Choptank Units"
routing
ip address 10.140.44.1 255.255.255.0
exit
interface vlan 45
name "Wicomico and ALP Units"
routing
ip address 10.140.45.1 255.255.255.0
exit
interface vlan 46
name "Reserved for Testing"
routing
ip address 10.140.46.1 255.255.255.0
exit
username "admin" password ########## Level 15
!
interface ethernet 1/g1
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g2
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g3
description 'ESHC-7509_PT-1_10.140.43.111'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g4
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g5
description 'ESHC-7797_10.140.43.242'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g6
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g7
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g8
description 'ESHC-7795_DHCP_VM1'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g9
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g10
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g11
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g12
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g13
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g14
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g15
description 'ESHC-7327_E-Chart_Demo_10.140.43.41'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g16
description 'ESHC-7795-OPEN_10.140.43.242'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g17
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g18
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g19
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g20
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g21
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g22
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g23
description 'ESHC-8028_Swipe_Card_Server_10.140.44.100'
spanning-tree portfast
switchport access vlan 44
exit
!
interface ethernet 1/g24
description 'ESHC-7509_DRAC'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g25
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g26
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g27
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g28
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g29
description 'ESHC-7509_PT-2_10.140.43.111'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g30
description 'ESHC_7508_DRAC'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g31
description 'ESHC-7508_Temp_DHCP_10.140.46.11'
spanning-tree portfast
switchport access vlan 46
exit
!
interface ethernet 1/g32
description 'ESHC-7508_PT-1_Teamed_10.140.43.114'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g33
description 'ESHC-7511_SAN_Port-A'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g34
description 'ESHC-7511_SAN_Port-B'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g35
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g36
description 'ESHC-RODC_10.140.43.27'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g37
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g38
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g39
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g40
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g41
description 'ESHC-7508_PT-2_Teamed_10.140.43.114'
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g42
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g43
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g44
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g45
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g46
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g47
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/g48
spanning-tree portfast
switchport access vlan 43
exit
!
interface ethernet 1/xg1
description 'Admin_Switch_VLAN_43'
switchport access vlan 43
exit
!
interface ethernet 1/xg2
description 'Service_Wing_Vlan_43'
switchport access vlan 43
exit
!
interface ethernet 1/xg3
description 'Wicomico_ALP_VLAN_45'
switchport access vlan 45
exit
!
interface ethernet 1/xg4
description 'Nanticoke_Choptank_VLAN_44'
switchport access vlan 44
exit
exit
ESHCCore#
Force10 S25 Issues, three bad ones?
I have three Force 10 S25s that we purchased from Dell. They were recertified and out of warranty (I'm don't know id they even came with a warranty)
Anyway I cannot connect with any of them via the console. Nor do they get link lights when connected to an Intel X540-T2.
I've tried different servers in case I blew the serial ports. I've made a straight through cable and connected with to an RJ45 to serial adapter (This works with a Dell PowerConnect switch)
The serial connection is 9600/8/1. I'm not sure what else to try. Three bad switches seem odd (Although we have had problems with other devices on this shipment from Dell.)
Anything I've missed?
Dell Enterprise Hardware & Software Updates for June 13 - 17, 2016
Inter-VLAN routing on Dell X4012
According to specification Dell X4012 is Layer2+ switch that supports inter-VLAN routing.
There are several references about this in original Dell documents e.g. "Dell Networking Small Business Reference Architecture 1.1"
The Small Business Reference Architecture utilizes the X4012 switch,
which defaults to Layer 2+ mode, to handle all VLAN-to-VLAN communications. Several VLANS have been configured to provide what a typical branch, remote office or SoHo might need. Figure 12 shows an example of a VLAN configuration. To see the full configuration of the Dell Networking X4012 used in this example, refer to the X4012 Distribution switch.pdf attachment.
Can anyone share this mysterious X4012 Distribution switch.pdf or point me on some information, how to configure inter-VLAN routing on X4012?
No Default gateway settings for Dell X4012
Powerconnect M8024K and M6348 Trap Code
Are there some document with snmp trap codes to PowerConnects?
Regards
speed of lacp across switches
switch is 2 N4032 with 1 40g stacking cable. jumbo frames are not yet enabled.
two dell r720s with 10g ethernet lacp across both switches. one running ubuntu 16.04, the other debian jessie with kernel 4.4.6.
iperf3 across them shows 8.9 Gbits/sec, which is what i would expect on a single port. does the lag across switches slow it down to the speed of one?