6248 FI connectivity

I am configuring the FI 6248. After that I configured the IP FI and virtual IP address.

I am able to access the UCS Manager. But when I do 'Show Cluster State' she said HA isn't ready and any device attached to this FI.

I have checked and ensured that L1 L1 is connected L2 to L2 is connected and chnaged but still face the cables you same question.

UCS01 - A # show the State of the cluster

The ID of the cluster: 0xd425c77a752f11e1-0x9eda547fee7429e4

A: UPWARD ELEMENTARY SCHOOL

B: UP, SUBORDINATE

HA IS NOT READY

Any device attached to this fabric of interconnection

UCS01-A #.

Can someone help me with this please.

Thank you

Sri

If you do not have any connected HA chassis won't be ready. Configure interfaces going your chassis as a server to find out the chassis.

Tags: Cisco DataCenter

Similar Questions

  • Newbie connection DELL 6248 pile to pile of CISCO 3750

    Hi all

    I need to extend the desktop LAN by connecting a battery of CISCO 3750 existing a new pile of DELL 6248.

    I intend to use the fiber/combo harbour in DELL 6248 to connect to the CISCO uplink port.

    I want to use DELL port 48 but I saw there was 1/g48 and 1/xg48.  From memory, they are mutually exclusive.

    Q1.  That means I'll just set up 1/g48 and do not enter the config of 1/xg48 of the sentence?

    Q2.  To connect together the 2 batteries, devrais I defined just two ports to connect as a trunk port?  I have no experience in doing so.  FOR INFO.  We already use VLAN in piles CISCO and so the new DELL batteries must know about it.

    Any help will be very appreciated!

    Combo ports have a combined input and output of the PHY chip. Only the optical port or RJ-45 port can be used individually, but not at the same time. Any cable is connected will first use the port PHY. If the Ethernet port is used, you will configure with 1/g48, if fiber port is used then set up uses 1 / x 48.

    Yes, you are right, a network connection is what you want between the two battery. Commands on the switch PowerConnect looks like this.

    Console > activate

    Console # config

    Console (config) # interface ethernet 1/g48

    console switchport mode trunk #.

    console # permit trunk switchport vlan add 2,3,4,5

    On the PowerConnect 62xx switches, you must use general mode if you want to allow traffic from management on the switch on the PVID.  If you use the Trunk mode, you will not have the default VLAN on these ports.  The ports will only allow labeled traffic. So if the Trunk mode does not you, then switch to general mode.

    As the pile of Cisco has already VLAN on it, we must ensure to the PowerConnect switch has those same VLAN. Here is an example of creating a VLAN on the PowerConnect switch.

    Console > activate

    Console # config

    Console (config) # vlan database

    VLAN console(config-VLAN) # 2

    output console(config-VLAN) #.

    Console (config) # interface vlan 2

    Console # name Marketing

    Console # end

    Another thing you may perform is place a static route to help the traffic at the back of the battery.

    IP route {network} {mask with joker} {Next Hop-IP}

    Console # config

    Console (config) # ip route 172.16.0.0 255.255.0.0 10.0.0.2

    Console (config) # end

    I hope this info helps,

    Thank you.

  • VLAN Trunking between 6248 and 2848

    Hello

    I have a Powerconnect 6248 switch connected to a 2848 and I try to get a VLAN on the 2848.

    VLAN working and properly receive DHCP addresses, traffic lanes and DNS runs on the 6248.

    The Protocol DHCP, DNS server is connected to port 1 on the 6248.

    When I create a Trunk port on 3 the 6248 Port, allow all VLANS through it, creating a trunk on port 1 of the 2848 on VLAN10 and try to plug in devices inside, they can see all other devices connected to the L3 switch.

    The two switches are running the latest firmware and the L3 on his own works as expected. I can't get any kind of circuits working at L2, tried with normal cable and crossover switch.

    Here is the config of the L3 6248. Switch 2848 L2 has a blank canvas with 10 VLANS created on ports 1,2,3,4 with port 1 as the trunk port installation.

    Any ideas pleeease? Anyone? It drives me crazy.

    ************************

    ! Current configuration:
    ! Description of the system "Powerconnect 6248, 3.2.0.7, VxWorks 6.5.
    ! Version of the software system 3.2.0.7
    ! Passage mode is configured as disabled
    !
    Configure
    database of VLAN
    VLAN 10,20,30
    VLAN 10 1 routing
    VLAN 20 2 routing
    VLAN 30 3 routing

    output
    battery
    1 2 Member
    output
    the IP 192.168.0.1 255.255.255.0
    field of IP domain name
    name-server IP 192.168.1.10
    IP routing
    interface vlan 10
    Routing
    IP 192.168.1.1 255.255.255.0
    output
    interface vlan 20
    Routing
    address 192.168.20.1 255.255.255.0
    IP helper-address is 192.168.1.10
    output
    interface vlan 30
    Routing
    192.168.30.1 IP address 255.255.255.0
    IP helper-address is 192.168.1.10
    output
    level password user name 'administrator' encrypted 15 5f4dcc3b5aa765d61d8327deb882cf99
    l2relay DHCP
    DHCP l2relay vlan 10-90
    !
    interface ethernet 1/g1
    switchport mode general
    pvid switchport General 10
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 10,20,30
    output
    !
    interface ethernet 1/g2
    switchport mode general
    pvid switchport General 10
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 10
    output
    !
    interface ethernet 1/g3
    switchport mode trunk
    switchport trunk allowed vlan add 10.20
    output
    !
    interface ethernet 1/g4
    switchport mode general
    pvid switchport General 10
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 10
    output
    !
    interface ethernet 1/g5
    switchport mode general
    pvid switchport General 10
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 10
    output
    !
    interface ethernet 1/g6
    switchport mode general
    switchport General pvid 20
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 20
    output
    !
    interface ethernet 1/g7
    switchport mode general
    switchport General pvid 20
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 20
    output
    !
    interface ethernet 1/g8
    switchport mode general
    switchport General pvid 20
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 20
    output
    !
    interface ethernet 1/g9
    switchport mode general
    switchport General pvid 30
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 30
    output
    !
    interface ethernet 1/g10
    switchport mode general
    switchport General pvid 30
    No switchport acceptable-framework-type general tag only
    VLAN allowed switchport General add 30
    output

    After turning off spanning tree on the 2848, all works now.

    VLAN, trunking everything.

    Thanks for the help! :)

    I hope that if someone else can use what it took me ages to develop. I plugged on Netgear switches etc and they seem to work.

    The issue was going on between the dell 6248 and 2848, Spanning tree is enabled on the default 2848. If I was going to the Netgear via the 6248, then at the 2848 switches worked.

    My config on the l3 also works very well if someone would use :)

  • Connection SAN Dell PowerConnect 6248

    Our switch in our network is the Dell PowerConnect 6248. This switch has a SFP module.

    I was wondering if I could use this module to connect my SAN [activeRAID 32 TB of storage active destocking] and have access to the storage as a network or NAS drive Bay.

    To be more precise I'll be plugging the controller [HBA] San to the SFP module on the 624 of Dell PC via a cable Fibre Channel LC.

    I'm new to SAN configuration and look for the best solution to access the storage on my network.

    Everyone has implemented a San with the SFP Module before; If that set up your look like?

    Fibre channel and ethernet/IP are not compatible protocols without another device that can translate. The 6248 has no support for FCoE. There are switches that support both they are called network switches convergent or unified, although generally the traffic is still separated.

  • Connection of several 6248

    Hello all!

    I have currently 2 x PC6248 which are stacked with stacking YY741 module and 2 x cables Dell F4XF - F4XF 1 m between them and that's all working well.  # See the battery port shows that xg1 and xg2 are used on both switches xg3 xg4 is both down.  It's what I expected.

    I need to add more than two switches, but they will be at a distance.  The first would be about 15 meters and the second would be between 75 and 100 meters.  Can I use cables of F4XF-F4XF that eager to 'stack' switches and if so, where can I find this length cables?  If I can do that, can I go out with just 1 cable to the remote switches?  (Yes, I know that it would be only a 12 GB of interconnection).

    If the answer above is no, then I can put 2 x gbic ports xg3/xg4 on both the existing switches and and 4 x gbic in xg1 - xg4 on new switches and connect interconnect two new switches on optical fiber LC - LC, going to this length?  (Yes, I know/xg1 xg2 are not usable in the existing stack).  If I can do it this way, what gbic would I get?  Can I use any LC - LC gbic or are there specific gbic, should I use?  And how to configure all switches?  I have several VLANs in the existing stack.  My config is attached below (if you see errors, feel free to say yes lol), it's pretty basic.  All chassis #1 ports are in use with some on chassis #2.  Currently, with only 2 switches in the battery, everything works perfectly.

    console #show run
    ! Current configuration:
    ! Description of the system "PowerConnect 6248, 3.3.13.1, VxWorks 6.5.
    ! 3.3.13.1 system software version
    ! Passage mode is configured as disabled
    !
    Configure
    database of VLAN
    VLAN 2-3, 252, 254
    VLAN 1 1 routing
    VLAN routing 2 254
    VLAN 3 3 routing
    VLAN routing 252 4
    VLAN routing 2 5
    subnet of VLAN association 192.168.0.0 255.255.255.0 1
    subnet of VLAN association 192.168.1.0 255.255.255.0 2
    subnet of VLAN association 192.168.2.0 255.255.255.0 3
    subnet of VLAN association 192.168.252.0 255.255.255.0 252
    subnet of VLAN association 192.168.254.0 255.255.255.252 254
    output
    unicast SNTP client enable
    192.168.0.2 SNTP server

    clock timezone-7 minutes 0 area "MST".
    battery
    1 2 Member
    2 2 Member
    output
    IP 192.168.254.1 255.255.255.252
    IP - lhcfun.local domain name
    8.8.8.8 IP name-server
    IP-server names 8.8.4.4
    name of the IP-server 198.105.254.17
    name-server IP 192.168.0.2
    IP routing
    IP route 0.0.0.0 0.0.0.0 192.168.1.2
    IP helper-address 192.168.0.2 dhcp
    IP helper-address 192.168.0.2 ntp
    interface vlan 1
    Routing
    the IP 192.168.0.1 255.255.255.0
    output
    interface vlan 2
    the name "Firewall."

    Routing
    IP 192.168.1.1 255.255.255.0
    output
    interface vlan 3
    name "iSCSI".
    Routing
    IP 192.168.2.1 255.255.255.0
    output
    interface vlan 252
    name of the "Ports Console"
    Routing
    IP 192.168.252.1 255.255.255.0
    IP helper-address 192.168.0.2 dhcp
    output
    interface vlan 254
    name of "management".
    Routing
    output
    level of 20b269eca6cf2aa9fb7ff4f4d0460dad user name 'admin' password encrypted 15
    spanning tree priority 0
    l2relay DHCP

    !
    interface ethernet 1/g1
    switchport access vlan 252
    output
    !
    interface ethernet 1/g2
    Auto mode channel-group 2
    output
    !
    interface ethernet 1/g3
    Auto mode channel-group 2
    output
    !
    interface ethernet 1/g4
    Auto mode channel-group 1
    output
    !
    interface ethernet 1/g5
    Auto mode channel-group 1
    output
    !

    interface ethernet 1/g6
    Auto mode channel-group 1
    output
    !
    interface ethernet 1/g7
    Auto mode channel-group 1
    output
    !
    interface ethernet 1/g8
    switchport access vlan 252
    output
    !
    interface ethernet 1/g11
    Auto mode channel-group 3
    output
    !
    interface ethernet 1/g12
    Auto mode channel-group 3
    output
    !
    interface ethernet 1/g13

    Auto mode channel-group 3
    output
    !
    interface ethernet 1/g14
    Auto mode channel-group 3
    output
    !
    interface ethernet 1/g15
    switchport access vlan 252
    output
    !
    interface ethernet 1/g18
    Auto mode channel-group 4
    output
    !
    interface ethernet 1/g19
    Auto mode channel-group 4
    output
    !
    interface ethernet 1/g20
    Auto mode channel-group 4

    output
    !
    interface ethernet 1/g21
    Auto mode channel-group 4
    output
    !
    interface ethernet 1/g22
    switchport access vlan 252
    output
    !
    interface ethernet 1/g23
    Auto mode channel-group 5
    output
    !
    interface ethernet 1/g24
    Auto mode channel-group 5
    output
    !
    interface ethernet 1/g25
    Auto mode channel-group 6
    switchport access vlan 3

    output
    !
    interface ethernet 1/g26
    Auto mode channel-group 6
    switchport access vlan 3
    output
    !
    interface ethernet 1/g27
    Auto mode channel-group 6
    switchport access vlan 3
    output
    !
    interface ethernet 1/g28
    Auto mode channel-group 6
    switchport access vlan 3
    output
    !
    interface ethernet 1/g29
    switchport access vlan 252
    output
    !

    interface ethernet 1/g32
    Auto mode channel-group 7
    output
    !
    interface ethernet 1/g33
    Auto mode channel-group 7
    output
    !
    interface ethernet 1/g34
    Auto mode channel-group 7
    output
    !
    interface ethernet 1/g35
    Auto mode channel-group 7
    output
    !
    interface ethernet 1/g36
    switchport access vlan 252
    output
    !
    interface ethernet 1/g39

    Auto mode channel-group 8
    output
    !
    interface ethernet 1/g40
    Auto mode channel-group 8
    output
    !
    interface ethernet 1/g41
    Auto mode channel-group 8
    output
    !
    interface ethernet 1/g42
    Auto mode channel-group 8
    output
    !
    interface ethernet 1/g43
    switchport access vlan 252
    output
    !
    interface ethernet 1/g44
    Auto mode channel-group 9

    output
    !
    interface ethernet 1/g45
    Auto mode channel-group 9
    output
    !
    interface ethernet 1/g46
    switchport access vlan 252
    output
    !
    interface ethernet 2/g47
    switchport access vlan 252
    output
    !
    interface ethernet 2/g48
    switchport access vlan 2
    output
    !
    interface port-channel 1
    Description "nas20".
    spanning tree portfast

    output
    !
    interface port-channel 2
    Description "nas20port22".
    spanning tree portfast
    output
    !
    interface port-channel 3
    Description "vmw16".
    spanning tree portfast
    output
    !
    interface port-channel 4
    Description "vmw18".
    spanning tree portfast
    output
    !
    interface port-channel 5
    Description "nas24".
    spanning tree portfast
    output

    !
    interface port-channel 6
    Description "nas24iscsi vlan 3.
    spanning tree portfast
    switchport access vlan 3
    output
    !
    interface port-channel 7
    Description "vmw28".
    spanning tree portfast
    output
    !
    interface port-channel 8
    Description "vmw30".
    spanning tree portfast
    output
    !
    interface port-channel 9
    Description "tsm32".
    spanning tree portfast
    output

    output

    This distance is too far for stacking. Module stacking both 10GE CX4 module can be configured for each role (Ethernet or stacking). By default, each module works according to its module ID. Change the role of a module, a reboot is necessary for the change to take effect. However, I believe that the distance for stacking cables max is about 3 meters. And the limit of CX4 cable is 15 meters.

    Other modules for the back of the switch are a 10GBase-T, part # X901C. The 10GBase-T module settle only in 2 Bay (right when viewing the back Bay). And a module SFP + 10GE, part # U691D.

    Combo on the front of the switch ports ports SFP 1 GB. Combo ports have a combined input and output of the PHY chip. Only the optical port or RJ-45 port ACR be used individually, but not at the same time. Any cable is connected will first use the port PHY.

    The fiber option that should meet your needs is a SFP - 1 G - SX transceiver. This transceiver uses the LC multimode fiber and it is good to 550 m. part # 407 - BOU

    http://Dell.to/1Rok1wO

    Here is a document that passes on the available module options.

    http://Dell.to/1OtQmfD

    With switch connections involving several VLANs, you will want to use connections in Trunk mode. For the switch connections you do not use portfast.

    # interface port-channel 1

    # switchport mode Trunk

    # switchport Trunk letter vlan add 2,3,4,5,6

    I hope this helps answer some of your questions.

  • How to connect 6248 PC to PC 6024 via LAG?

    Hi all

    I have the following problem: I want to connect a new PowerConnect 6248 switch to your existing PowerConnect 6024 that acts as your central router.

    Everything works fine so far. I connected the two switches via ports, created a GAP them configured as trunk and set all the VLAN which should pass these trunk. The only problem I have is that I can't ping or access the 6248 PC via the network that has an IP to VLAN 1.

    Here's the important part of the PC 6024 config:

    database of VLAN
    VLAN 10-11, 20-21
    output

    interface vlan 1
    IP 192.168.224.129 255.255.255.128
    output
    interface vlan 10
    IP 192.168.224.1 255.255.255.128
    output

    interface vlan 11

    IP 192.168.225.1 255.255.255.128
    output
    interface vlan 20
    IP 192.168.225.129 255.255.255.128
    output
    interface vlan 21
    IP 192.168.226.1 255.255.254.0
    output

    interface port-channel 3
    switchport mode trunk
    output

    serial port-channel interface 3
    switchport trunk allowed vlan add 10-11, 20-21
    output

    serial interface ethernet g(5-6)
    Auto mode channel-group 3
    output

    And now the PC 6248 config:

    database of VLAN
    VLAN 10-11, 20-21
    output

    IP 192.168.224.143 255.255.255.128
    default IP gateway - 172.31.224.129
    interface ethernet 1/g47
    Auto mode channel-group 1
    output
    interface ethernet 1/g48
    Auto mode channel-group 1
    output
    interface port-channel 1
    switchport mode trunk
    switchport trunk allowed vlan add 1: 20-21
    output

    Port 1/g47 and 1/g48 6248 PC are connected to the g5 and g6 6024 PC port. However, I cannot ping the 192.168.224.143 (IP of the PC 6248).

    When I do a "show interfaces switchport port-channel 3" on the PC 6024, it says:

    Port: ch3
    Port mode: trunk
    GVRP Status: disabled
    Filtering of penetration: true
    Acceptable frame type: admitAll
    Penetration UnTagged VLAN (NATIVE): 1
    Protected: disabled
     
    Port is a member of:

    Rule of VLAN name output Port membership Type
    ---- -------------------------------- ----------- --------------------
    1 1 no marked system

    10 10 the static tag

    11 11 the static tag
    20 20 static tag
    21 21 static tag

    Prohibition of VLAN:

    Name of VLAN
    ---- --------------------------------

    Any ideas? I missed the point?

    BTW, the firmware 6024 tracks 2.0.0.01 and firmware 6248 2.0.0.12.

    Thank you in advance for your help!


  • 6248 FI Cisco's UCS with Cisco catalyst 2960 connectivity

    In our environment, UCS, connects the two fabric as a Cisco Nexus 9 k switch upstream with vPC and it works well. But we need to isolate some virtual servers on the blades of the UCS on an entirely separate DMZ switch which is Cisco catalyst 2960.

    (1) so can we connect cables separate physical twinax of FI uplink ports to catalyst 2960 and connectivity to the servers in the DMZ keeping YEW to nexus connectivity as it is?

    (2) in this case, as there are 2 switches to nexus core 1 and 2 so we will require 2 cisco catalyst 2960 for disjoint such a network? or otherwise we can connect A FI and FI B to one on his 2 numbers 2960 switch. Gig SFP ports + 10?

    (3) also suggest things must be taken in charge, the best guides practice or an illustration in this context.

    The assignment is static and cannot be changed.

    location 1 - uplink 1

    slot 2 - uplink 2...

    If a property has no blade, the corresponding uplink is not used and that can not be changed!

    This dedication of uplinks of IOM is of course a lot of resources: cables, ports on FI, allowed port,...

  • Connection no UCS server to the fabric of interconnection 6248

    We are migrating our VMS of Dell PowerEdge servers to Cisco UCS environment 620\710. The question has been ask if we can connect our Dell servers directly to the IF SFP ports + and/or the connection of TP will 10 GB. Is this possible? How does the FIs treat non - UCS servers?

    This is not supported! I guess you want to do vmotion and transfer your Dell to UCS Server VM. Just configure the appropriate network connectivity (vlan UCS to Northbound Dell server) and it should work.

  • Guest WLAN with VLAN (Dell PC 6248)

    Hello community,

    I want to set up a WLAN of comments using 2 VLANS.
    Setup: IPFire, Dell Power Connect 6248, Netgear WNAP 320 Access Point

    The blue Interface on the firewall tag all executives with ID 15.

    The switch nearly all Ports are unlabeled and the native VLAN 1.
    The "Guest-VLAN" is the VLAN ID 15.

    The port settings

    G36: trunk

    G22:

    All unmarked frames in the VLAN 1 native get the ID1 when they reached Port 22.

    Belonging to a VLAN

    In VLAN 1 native

    In "Guest VLAN" 15:

    Yes, on the 22 of Port that is connected to the AP, executives with the ID15 (guest) and executives who get ID 1 should forwarded to the AP.

    AP, I've implemented 2 SSID.

    The staff-WLAN has ID VLAN 1 and comments-WLAN the VLAN ID 15

    But only the WLAN staff works. I do not get an IP address when I connected with the WLAN Guest.
    Another program installation on the access point:

    I am a beginner in this topic and English is not my language preferred, so please excuse the mistakes :)
    You have any ideas?

    Thank you. :)

    One thing I did not to until that earlier. You said when you plugged your workstation directly on the blue link, he got an IP address and has worked well? By default, that a workstation will send unmarked frames, then maybe the firewall is set to be without a label on this interface. In this case, we can try the following config on the 36 port.

    switchport mode access #.
    # switchport access vlan 15

    The VLAN native will send and receive packets not marked. You said that everything in the VLAN 1 works, right?

  • Help! 6248 PC crash 'voipTask '.

    As of this morning, our 6248 will throw an exception and restart.  It is not very coherent, but it is causing major headaches because of the loss of connectivity within the company.  I haven't found a good conduit yet, but that's what I come up with.

    It is urgent for our company, so any help would be great!

    Exception: taskID = cbbc770, vectNum = e00, FAEF = 0xcbbd948
    record savings of crash in crashdump.1

    ERRNO SP NAME TID PRI STATUS PC INPUT TIMEOUT
    ----------  ------------ -------- --- ---------- -------- -------- ------- -----
    voipTask voipTask cbbc770 LOAN 0x1d9dd00 cbbb2b0 255 0 0

    battery: base 0xcbbc770 end 0xcbb4770 margin size 32768 9376 high 23392
    Options: 0 x 1009001

    vector: 0xe00

    Stack trace:
    0x1d9dd00: ipcom_inet_pton (0x1d9dc78) + 0 x 88
    0x1def690: (0x1def644) inet_pton(3) + 0x4c
    0 x 1272300: osapiInetPton (0 x 1272294) + 0x6c
    0x133a9c4: voipSetupSipSession (0 x 1339814) + 0x11b0
    0x133af60: voipSetupSipSession (0 x 1339814) + 0x174c
    0x133b6f8: voipSipMessageParse (0x133b108) + 0x5f0
    0x1335a2c: voipPduReceiveProcess (0 x 1335974) + 0xb8
    0x132d52c: voipTask (0x132d468) + 0xc4
    0x1dbc8e0: (0x1dbc884) vxTaskEntry + 0x5c
    R0 = 0 MS = cbbb2b0 r02 = r03 0 = 2
    R04 = r05 40400101 = 6bba508 r06 = 64 r07 = 6bba8cc
    R08 = 0 = 40400101 r10 r09 = 2fc r11 0000 = 0
    R12 = 0 r14 r13 = 0 = 0 = 0 r15
    R16 = r17 r18 = r19 0 = 0 0 = 0
    R20 = r21 r22 = r23 0 = 0 0 = 0
    R24 = 0 = 0 = 0 0 = r27 r26 r25
    R28 = 0 0 = 132d 468 r31 r29 = r30 = cbbb2b0
    MSR = 2029200 lr = 1def690 ctr = 0 pc = 1d9dd00
    CR = x 24000488 = 20000000

    Thanks for the link!  I'll probably level firmware anyway, but this issue is directly related to our phone server.

    We run/digium switchvox and we went to 6.3 over the weekend.  I continued leaning toward that by yesterday and my diagnosis finally admitted to him after several calls digium support and 8 hours later.  We have lowered the server and everything is happy again!

  • L3 PC 6248 ISP routing switch

    And I was wondering if someone could help me please?
    We have recently sign up for FPL FiberNet Direct Internet Access (DIA), and they give us a point to point IP 30 for connection between our fiber-copper Transceiver and the NOC and also gave us a block of 28 public IPs we road to the 30 default of IPs to our local network gateway and servers.
    We have a few 6248 PC laying around and were told to use one of them to get the job of the internet!
    I did research on how to make this work between manual the device reference guide and other threads on the support forum, I came up with the following configuration and I was wondering anyone could look at it and let me know if it wise and might work or if I'm missing something, or maybe do it in a completely different way :

    Create a VLAN 100 to 28 address block

    Console #configurer
    console (config) #vlan database
    Console (config - vlan) #vlan 100
    Console (config - vlan) #exit

    Configure the VLAN routing for the VLAN and assign an IP address

    Console #configurer
    Console (config) #interface vlan 100
    Console (config-if-vlan100) #routing

    Console (config-if-vlan100) #ip address 68.168.25.33 255.255.255.240

    Console (config-if-vlan100) #exit

    Console (config) #ip Routing

    Associate a subnet IP with a VLAN

    It shows how to configure the switch so that all hosts with IP addresses in the network of 68.168.25.32/28 are members of the VLAN 100.

    Console #configurer
    console (config) #vlan database

    subnet of console (config - vlan) #vlan association 68.168.25.32 255.255.255.240 100

    Create VLAN 200 out of the 30 internet

    Console #configurer
    console (config) #vlan database
    Console (config - vlan) #vlan 200
    Console (config - vlan) #exit

    Configure the VLAN routing for the VLAN and assign an IP address

    Console #configurer
    Console (config) #interface vlan 200

    Console (config-if-vlan200) #ip address 198.150.3.110 255.255.255.252

    Console (Config-if-vlan200) # name internet vlan
    Console (config-if-vlan200) #routing

    Console (config-if-vlan200) #exit

    Assign a Port to VLAN200

    Console (config) #interface ethernet 1/g1

    access mode console (config-if-1/g1) #switchport

    Console (config-if-1/g1) #switchport access vlan 200

    Console (config-if-1/g1) #exit

    road to console (config) #ip 0.0.0.0 0.0.0.0 198.150.3.109

    OK, we finally got I work, my mistake was that I had together 1/g1 port for access mode and it was supposed to be in general Mode so I issued the following command so my VLAN would receive traffic labeled the ISP VLAN 200 they gave me with:

    interface ethernet 1/g1

    switchport mode general

    switchport General pvid 200

    switchport general allowed vlan add 200 tag

    I also was on the phone with them to make sure that I got everything we need on the VIRTUAL LAN, they gave me and to make sure we could ping back, they end up doing some changes at their end for all operate as it should, it's the running configuration see the final :

    ! Current configuration:

    ! Description of the system "PowerConnect 6248, 3.3.7.2, VxWorks 6.5.

    ! 3.3.7.2 system software version

    ! Passage mode is configured as disabled

    !

    Configure

    database of VLAN

    VLAN 100 200

    VLAN 100 1 routing

    VLAN 200 2 routing

    output

    battery

    1 2 Member

    output

    IP 192.168.1.1 255.255.255.0

    by default-gateway IP 192.168.1.254

    no console logging

    IP routing

    IP route 0.0.0.0 0.0.0.0 198.150.3.109

    interface vlan 100

    Routing

    IP 68.168.25.33 255.255.255.240

    output

    interface vlan 200

    name ' internet - vlan ".

    Routing

    IP 198.150.3.110 255.255.255.252

    output

    user name 'admin' password password

    !

    interface ethernet 1/g1

    switchport mode general

    switchport General pvid 200

    switchport general allowed vlan add 200 tag

    output

    !

    interface ethernet 1/g2

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g3

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g4

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g5

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g6

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g7

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g8

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g9

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g10

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g11

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g12

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g13

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g14

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g15

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g16

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g17

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g18

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g19

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g20

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g21

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g22

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g23

    GVRP enable

    switchport access vlan 100

    output

    !

    interface ethernet 1/g24

    GVRP enable

    switchport access vlan 100

  • Connect sonicwall tz215 with dell 6248P

    I'm currently setting up the 6248P powerconnect switch switch with sonicwall router tz215. I'm doing the transition as simple as possible. The router will make the WAN and DHCP and the switch will route traffic between subnet PCs and WAN of sonicwall for internet access.

    I have the selector on default and vlan1 as management vlan. should I start to create the vlan 10 for IP subnet, which is the same as sonicwall LAN subnet?

    SonicWALL x 0: WAN (fibre); x 1: WAN (ADSL2 +); x 2 LAN (10.0.0.x)

    Dell 6248P 44 port: connection with sonicwall x 2

    Please recommend any config step by step, thank you very much.

    6200 switches are not able to deliver their own management of VLANS. When you configure routing VLAN you will need to follow this article.

    http://Dell.to/1FiQhu7

    It is common to see only one VLAN dedicated to the connection between the switch and the firewall. So in this example VLAN 10 would give an IP address in the same subnet as the firewall. Then place the port access mode for VLAN 10 44.

    The 6248 you'll also want to place a static route that directs traffic on the firewall. Looks something like this:

    # ip route 0.0.0.0 0.0.0.0 192.168.10.1

    Address of the firewall. The SonicWall also have some static routes in routing traffic to the internal network.

    http://Dell.to/1SdpdUh

    The getting started guide is a good starting point for the configuration at the start of the switch. Then use the user's guide for instructions on configuring additional features.

    http://Dell.to/1EJ4qlK

    If you are in need of more support deepened with the SonicWall, it may be best to contact SonicWall support group.

    http://Dell.to/1VZtZ70

    Let us know if run into snags or have any questions.

  • VLAN function 6248 switch IP address

    We have a nice and simple class C private address space private on 4 x Dell 6248 switches. We are running out of IP addresses. We could change the netmask (add more bits), but who is to reach each node and potentially finding devices that do not work with anything other than 24. We have a lot of old material that we must keep functioning. In addition, we want to limit emissions, since here we have projects that do a lot of UDP broadcasts. If each project in one VLAN, the load on the switches would be less. Hosts on VLANS must get to the common servers well.

    So I did some reading and thought we would use of VLANS, routing and others to have several C class spaces. We turn the material around the office at an alarming rate so I thought that an IP based VLAN would be an excellent solution. I have problems with the documentation and configuration to make it work.

    We have 2 x 2716 Dell and 2 x Dell 2724 switches in the mix as well. They are connected to the 6248 s switches dumb and all seems to work now.

    I created 2 VLAN and reports the following:

    Curetes #show ip interface vlan 2

    State of the Routing Interface... Down
    Primary IP address... 192.168.3.1/255.255.255.0
    Routing mode... Enable
    Administrative mode... Enable
    NET before realized emissions... Disable
    Proxy ARP...................................... Enable
    Local Proxy ARP... Disable
    Statement of assets... Inactive
    MAC address... 0019.B998. E71E
    Type of encapsulation... Ethernet
    IP MTU......................................... 1500
    Bandwidth...................................... 10000 Kbps
    Destination unreachable... Activated
    ICMP redirects... Activated

    I am running firmware V3.3.3.3. I have improved the switches on the weekend of 2.2.0.3 I read that VLAN does work well with this version.

    I can't find in the documentation "Setup Guide" or "CLI_EN.pdf" how to get the "Routing Interface status" that up to.

    My config running is pretty simple:

    ! Current configuration:
    ! Description of the system "PowerConnect 6248, 3.3.3.3, VxWorks 6.5.
    ! 3.3.3.3 system software version
    ! Passage mode is configured as disabled
    !
    Configure
    database of VLAN
    VLAN 2-3, 10-11
    VLAN 2 1 routing
    VLAN 3 2 routing
    subnet of VLAN association 192.168.3.0 255.255.255.0 2
    output
    hostname "curetes.
    Select the SNTP client distribution
    192.139.238.68 SNTP server
    battery
    1 2 Member
    2 2 Member
    3 2 Member
    4 2 Member
    output

    IP 192.139.238.79 255.255.255.0
    default IP gateway - 192.139.238.27
    IP routing
    interface vlan 2
    name '192-168-3-x-address. "
    Routing
    address 192.168.3.1 IP 255.255.255.0
    output
    interface vlan 3
    Routing
    output
    level XXXXXXXXXXXXXXXXXXX username 'admin' password encrypted 15
    output

    Question (in order of importance):

    What is the best way to go to solve my problem (limit/exhaustion of Ip address space broadcast domain)?

    How to make "Routing Interface Status" on VLAN 2 upward? Do I need it upward?

    How to configure a VLAN to do what I want?

    Thanks in advance.

    Don

    Yes, that's my suggestion.

  • M8024-k and 6248

    Hi all

    I have a Dell M8024-K pass with a dual port DELL 10GBaseT expansion card in the connector 1. It is possible to connect one of its 10 GB ports with a 1 GB on a Dell 6248 switch port or availabe ports on DELL 10GBaseT expansion card y t uplink provided just M8024-k switches?

    I tried to connect a port on DELL 10GBaseT expansion card to a port on a Dell 6248 switch, but the link is down.

    Thank you

    A.

    The M8024-K can be connected to the 6248, but must be made using the same interfaces to speed. 1 GB to 1 GB or 10 GB to 10 GB. 10GBaseT expansion card does not support 1 GB connections. The 6248 has provisions for a plug-in SFP +.

    http://Dell.to/1XP25ve

  • Reference Dell 6248: hot swapping and upgrade battery links

    I have a set of switches Dell 6248.  I have a few questions to explore:

    (1) can I add/remove the CX4 cables while the switch is working?  (I guess it's the same rules as a cable normal Ethernet...)

    (2) can I add/remove modules while the switch is working?

    First scenario I'm looking at: extend the stack on a stacked rack.

    I think the process here is, install a switch of spare with stacking module, run off battery cables to the battery, breaking and re-Assembly of the ring, then turn on the switch, confirm the ID stack and connectivity and migrate customers to it.  I can totally hot cables plug the CS4, right?

    Next scenario I'm curious: upgrade of 12G to 48G stack.

    Can I exchange the accumulated 12 GB card and swap the 48G card in when the switch is on, or do I have to turn it off?  Connectors on the 48G card the same?  (CX4..)  Can I / layout 48G and 12G cards in a pile during my upgrade?  Is the maximum length of cable the same (3 m) on a stack of 48G?

    Thank you!

    -danny

    Hey Danny,

    The stackable modules are not hot-swappable. The cables are, but for the modules to detect that it must present when the switch is started. A reboot is also required for stacking on these ports using Ethernet. Yes 48 GB stackable modules also have a 3 meter cable.

Maybe you are looking for

  • A single / Multi channel divergence in VI for unit piloted by GPIB

    Hi all I'm hoping to get help with a VI that I edit. VI control an Agilent 34970 A via a NI GPIB-ENET 100/1000. I have downloaded the driver for this instrument and had it works such that I can select a channel (or more channels) and monitor the volt

  • DST short hard drive failed, code 64XTPH - 00078 M-X87SXG-60RW03

    I experienced detention and the system freezes on my Compaq CQ2909EO desktop. Guarantee was completed two weeks ago, and unsurprisingly the problems started almost immediately after that. He went so far, that I was forced to do a check disk onto anot

  • My Movie Maker freezes when I try to change titles-XP

    Originally, I had 2 sets of titles at the end of my film, after I had finished, I realized that one set had not entered, I come back in to edit, but found I couldn't create a newarea to rewrite the missing titles, then I thought that I could change t

  • HP Pavilion 23: Desktop Windows 10 flashing after long installation

    I have a computer all-in-one HP Pavilion 23, SKU B5A53AV #ABA. I was using Windows 7. I downloaded the upgrade of Windows 10. The problem seems to be similar to the following question: http://h30434.www3.HP.com/T5/desktop-operating-systems-software-r

  • If the Environment Variable in Vista

    How to change the Environment Variable in Vista? ... I could do with XP using Control Panel > performance and Maintenance, but could not find the area revealing in Vista.