Force10 MXL config question

My MXL blades have been set up by Dell Technology Services and work fine, but I would like to make a few changes now and not being Setup is not a network engineer, I have a problem with the docs I could find on the config of Force 10.  Specifically, I want to do 3 things:

(1) change the SSH root password

(2) remove a port to a LAG (port channel) group

(3) add a new VLAN to some ports in the switch, including the one I just removed the lag, but abandon the SHIFT since the new VLAN

Can someone point me to a doc that explains how to do this kind of things?

Also, is it possible to access the console somehow by SSH in the CMC?  I swear I've seen Dell Tech Services people who do somehow, but I don't know how they did it.  Maybe I misunderstood what they were doing.  It would be nice to not have the addresses of IP config exposed and control access through the permissions of CMC.

Thank you.

Hi amunter,

You can SSH to the CMC racadm commands and use to set it up. You just need to use PuTTY or other terminal program and go to the CMC host name or IP address.

You should be able to change the password in this way

(Force10) > activate

(Force10) #config

(Force10) (Config) #username admin passwd un_mot_de_passe

_Config_07_29_2014.PDF https://www.force10networks.com/CSPortal20/Knowledgebase/documentation/CLIConfig/FTOS/MXL_9.5 (0.1)

You can remove a port of a port channel in the channel of the port and using the command config no channel-member interface

Page 395

You can assign a VLAN to a port with the command interface vlan id - vlan

Page 910

Tags: Dell Switches

Similar Questions

  • Then a Force10 MXL blade handle no FCoE traffic?

    Hello.  I inherit a M1000e with few blades of the Force10 MXL switch installed.  The chassis has no other 10GBASE-T switches.  Since I have no plans on using FCoE, a Force10 MXL can be used for standard Ethernet (non-FCoE) traffic?  Or do I have to buy another switch?

    Thank you.

    Absolutely, to see the second page of the data sheet. It contains additional information about the available modules, how internal traffic is manipulated and external.

    http://Dell.to/1Q5fUo9

    The manuals are a great place to start. There is that a starter guide to help set up initial, and then a CLI and user guide to help configure additional features.

    http://Dell.to/1IIq8r2

    Let us know if you have any other questions.

  • Connect to Force10 MXL N4032 using cables QSFP + DA 40 G

    Hello

    I'm trying to connect a N4032 switch to a switch chassis Force10 MXL using QSFP + modules and a DA 40 G cable. Now, the problem I have is that when I plug the cable 40G QSFP DA I don't have a link, both switches show that the QSFP + optical has been inserted, and that the perspective is supported on two models of switches.

    The MXL is on the firmware 9.8.0.0 and the N4032 on 6.2.1.6.

    QSFP map show slot on the show N4032 command:

    Power admin card configured
    ID of the slot status State Pluggable model
    ----- ------ ------- ------- -------------------------------- ---------
    1/0 Enable full activate Dell N4032 number of networking
    1/1 full Activate activate card QSFP Dell Yes

    Optics QSFP + is connected to the port of1/1/1 on the N4032 and returns order status interface to see more:

    Physical admin link link LACP Flow physics
    INTF Type Mode Mode status trap Mode Mode
    --------- ------ ------- ---------- ---------- ------ ------- ------- -------
    TE1/0/1 Select Auto 10 G full turn off Active
    TE1/0/2 Select Auto 10 G full turn off Active
    TE1/0/3 select Auto 10 G full turn off Active
    TE1/0/4 turn down turn off idle
    TE1/0/5 turn down turn off idle
    TE1/0/6 turn down turn off idle
    TE1/0/7 activate Auto 10 G full activate deactivate Active
    TE1/0/8 enable Auto 10 G full activate deactivate Active
    TE1/0/9 turn down turn off idle
    TE1/0/10 turn down turn off idle
    TE1/0/11 select Auto 10 G full turn off Active
    TE1/0/12 enable Auto 10 G full activate deactivate Active
    TE1/0/13 turn down turn off idle
    TE1/0/14 turn down turn off idle
    TE1/0/15 turn on Auto 10 G full activate deactivate Active
    TE1/0/16 enable Auto 10 G full activate deactivate Active
    TE1/0/17 enable Auto 10 G full activate deactivate Active
    TE1/0/18 turn down turn off idle
    TE1/0/19 turn down turn off idle
    TE1/0/20 turn down turn off idle
    TE1/0/21 Enable Auto 1000 Full Up enable disable Active
    TE1/0/22 Enable Auto 1000 Full Up enable disable Active
    TE1/0/23 Enable Auto 1000 Full Up enable disable Active
    TE1/0/24 turn down turn off idle
    Of1/1/1 turn down turn off idle
    Of1/1/2 active 40 maximum G low turn off idle
    TE1/1/1 active 10G full detach turn off s/o
    TE1/1/2 Active 10 G full detach turn off s/o
    TE1/1/3 active 10G full detach turn off s/o

    As you can see that switch captures yet the speed of the optics. Now if I take the same cable and plug it between the 2 x N4032 switches - ports immediately show a link.

    Newspapers of the MXL show optics QSFP Fo0/33, it shows the status of the admin of the ports as upward, but the State of the interface is down. Now if I take the same cable of DA and plug it between the 2 MXL in the chassis, the interface state changes until almost immediately. The two MXL is configured in a VLT, but I tried to get the link to the top with the VLT and without the VLT, does anyway.

    This shows that cables of DA are fully functional, the ports I plug are functional - even when one end of the cable plugged into the N4032 and the other end in the MXL Force10, the link is not started.

    I have the show out of all 4 switches, if necessary technical support.

    Thank you

    Dave

    This problem has been resolved with the help of Technical Support.

    It was a mismatch of negotiation between switches.

    The fix has been add to the config of the port on the Force10 MXL:

    interface fortyGigE 0/33

    INTF-type cr4 autoneg

  • Force10 MXL and blades - mapping of Interfaces

    Hello

    I know it's a recurring topic but I am facing a strange problem in the last M1000e chassis that I was sent.

    According to: mapping is very clear. For example, the first interface of the first plank must be connected via the Midplane to te0/1 (first in the IOM1 interface), but when I set up the battery of the A2 Force10 MXL (just a pile between A1 and A2) became the master so I changed the priorities to ensure that A1 is the master. Once this is done, I realized that the first interface of the first blade was linked to the Te1/1, the first IOM2 interface. Is it possible to change this? I have several chassis and I want to set all the same way...

    Thank you!

    What servers are used? Just to be clear, while MXL in A2 was the master, the LOM 1 port connected to 0/1 and the LOM 2 port connected to 1/1? Then when you changed a switch to A1, now port 1 shows that 1/1 LOM and LOM 2 port connected to 0/1?

    The ports are all physically defined by the M1000e chassis.
    Have you tried:
    -unstacking switches
    -Can ensure that ports appear correctly so that not stacked.
    -Set the priority and then put.
    -Check the enumeration.

  • Force10 MXL - VLAN is not routing.

    I'm trying to set up a simple installation Layer 3 on stacked MXL Force10 switches.

    ManagementEthernet 0/0 90.21.0.175 YES manual upward, upward
    VLAN 33 10.1.33.1 YES manual upward, upward
    VLAN 101 10.1.32.1 YES manual upward, upward
    VLAN 103 192.168.103.1 YES manual upward, upward

    MXL-stack #sho vlan

    Q: U - no identified, the T - tag

    Ports Status Description Q NUM
    * 1 U active Te 0/3-6, 11-14, 17-23, 25-32
    U Te 1/3-6, 11-14, 16-23, 25-31

    EENET active 33 U Te 1/15<>
     
    101 production Dynamics network T Te 0/1-2, 7-8, 15-16, 24, 44<==10.1.33.x>
    T Te 1/8,24,32
                                            
    External network active 103 T Te 0/8,16,24<==192.168.103.x>
    T Te 1/1-2, 8, 24, 32
    U Te 1/7

    Route ip MXL-stack #sho

    Destination Gateway Dist/metric was last modified
    -----------                          -------                                ----------- -----------
    C Direct 10.1.32.0/24, Vl 101 0/0 3d2h
    C Direct 10.1.33.0/24, Vl 33 0/0 00:13:51
    C Direct 192.168.103.0/24, Vl 103 0/0 3d1h

    Battery Switch MXL
    Ping result message
    192.168.103.13 fail
    10.1.32.21 success
    10.1.33.10 success

    192.168.103.13 - default gateway is 192.168.103.1
    Ping result message
    192.168.103.1 success
    192.168.103.11 success
    10.1.32.1 success
    10.1.32.21 fail
    10.1.33.1 fail - 192.168.103.1 inaccessible Destination network

    10.1.32.21 - default gateway is 10.1.32.1
    Ping result message
    192.168.103.1 success
    192.168.103.13 fail
    10.1.33.1 success
    10.1.33.10 success

    10.1.33.10 - default gateway is 10.1.33.1
    Ping result message
    192.168.103.1 success
    192.168.103.13 fail
    10.1.32.1 success
    10.1.32.21 success

    I have my hosts on my different threads pointed to the stack for their default gateways, and I want my MXL battery to switch packets at layer 3 connectivity between subnets.  The part which I stem is why is my vlan 103 does not communicate?  I can't even he ping of the MXL battery that has the vlan on it.  This should be the easiest thing in the world, but it is a failure.  Someone has an idea?

    I am pleased to hear that the routing has started working. I agree, it seems strange that would not work one day and then work the next day. Were all devices removed or added to the network between the two days? Or any small changes to config?

    To remove a configuration you issue clear config

    http://www.force10networks.com/CSPortal20/TechTips/0080_HowDoISaveMyConfiguration.aspx

    The latest firmware is 9.3.0.0. Which provides overall improvements and would be calling and updated.

    iSupport portal (Web): http://www.force10networks.com/support/
    E-mail: [email protected]
    Phone (USA and Canada): 866-965-5800
    Phone (International): + 1-408-965-5800

    Can monitor to see if the problem back to the top again.

  • DCB - Force10 MXL and Equallogic PS6210 - worth it or not?

    Hello all

    I have a new 3-blade M620 virtualization environment, 2 x MXL Force10 switches and 2 x Equallogic PS6210 - there is the possibility of using DCB - is it useful to configure DCB, will I get the gains and better stability, or for a small environment should I just use the configuration standard iscsi?

    Ideas or alternative options gratefully received.

    Thank you

    Hello

    If the switches are dedicated for iSCSI use, then there is no advantage to the use of DCB.  DCB in itself does not have iSCSI faster.  I just made sure non-iSCSI traffic doesn't interfere by providing iSCSI with a higher priority.  All other traffic is going in a "lossy" class of service.

    Also, you will need DCB converged network adapters to use BCD on the hosts.  Most of the iSCSI software adapters do not support DCB.

    Kind regards

  • Force10 MXL - stack or do not stack

    Hi guys,.

    If the availability is the most important thing, trunk or battery MXL rocking?

    I like simplified management, ability to balance the load on several links but I am concerned about uptime during the upgrade firmware (5-10 minutes?) and the possibility of a total interruption of the battery breaks.

    On the other hand Force10 perhaps more capable stacking that for example. 6224 switches, I had a lot of problems of overlap with.

    Forgive me if this is the wrong place to ask, but I couldn't find a Force10 forum? :-)

    Thank you

    Respect of
    Kristoffer

    The MXL switches support Virtual Link Trunking (VLT) later this year, which will solve this problem.

  • NAT for DVR Config question

    Hai all,

    New to Cisco IAM, I have a Cisco 2811 router with 2 ethernet ports:

    Here is my config:

    2-port ethernet on my router

    1 port 0/0 directly connected to the ISP link

    WAN IP is configured as 122.183.1xx.6 ip and the gateway is 122.183.1xx.5

    1 port 0/1 connected to my local network which is 192.168.1.0 network

    LAN Port 0/1 IP's 192.168.1.200

    Internet works fine

    -----------------------------------------------------------------------------------------------------------

    If I do one that is my IP address?

    I get the IP as 122.183.1xx.42

    My ISP says its a Pool of LAN IP:

    122.183.1xx.43 - 47

    ----------------------------------------------------------------------------------------------------------

    Now I just discovered my DVR outside of my internet network?

    Do I need a NAT to view my DVR?

    If I use an ID DYDNS my 2811 router filters the 37777.how port of release

    DVR IP is 192.168.1.242 port is no 37777

    What is the procedure for nat to a static pool of ip from my ISP? How to unblock port 37777?

    Help to sort it out...

    Thank you...

    have you tried the previous suggestion? I asked for but I don't see everything.

    To check if your ISP blocks or do not do the following:

    1. create an ACL as follows

    access-list 199 permit tcp any newspaper EQ 37777 122.183.1xx.43 host

    access ip-list 199 permit a whole

    2. apply to the external interface

    Router (config) # int fa0/1

    (config-if) #ip group-access 199 in

    3. now Telnet 37777 outdoor port 122.183.1xx.43

    4. check if the th packages hit you box by running the following command:

    See the list of 199 ip access

    If you see numbers of access increases on the front-line ACL meanas your ISP does not block the traffic.

    After doing this. Please send the latest config.

  • ASA5520 failover Config Question

    Can I use the same interface for failover lan cable and the sync'ing of the State?

    I currenlty have the following ocnfig, but I really need another interface for a demilitarized zone, so I would like to consolidate the lan interface and connect the interface if possible. They would use the same IP addresses if this scenario is a valid option?

    -----

    primary failover lan unit

    failover failover lan interface GigabitEthernet0/3

    link failover FWstate GigabitEthernet0/2

    failover interface ip failover 10.2.0.1 255.255.255.0 ensures 10.2.0.2

    failover UI FWstate 10.2.1.1 ip 255.255.255.0 ensures 10.2.1.2

    Basically, I'm asking the following will work:

    primary failover lan unit

    failover failover lan interface GigabitEthernet0/3

    link failover FWstate GigabitEthernet0/3

    failover interface ip failover 10.2.0.1 255.255.255.0 ensures 10.2.0.2

    failover UI FWstate 10.2.0.1 ip 255.255.255.0 ensures 10.2.0.2

    It is possible, but do not duplicate failover interface address. Use after config:

    primary failover lan unit

    local failover FAIL GigabitEthernet0/3 network interface

    failover link FAIL GigabitEthernet0/3

    failover interface ip FAIL 10.2.0.1 255.255.255.0 ensures 10.2.0.2

    mikrobi,

  • Need Extra pair of eyes to look over the VPN config question...

    I have a 515 and 3 501. I have currently 2 VPN works well. I'm having a bit of time lift the 3rd VPN. I check that the same key is used for both configs. I know I'm missing something simple here, but I can't see it...

    515:

    6.2 (2) version PIX

    ethernet0 nameif outside security0

    nameif ethernet1 inside the security100

    nameif ethernet2 security10 intf2

    ...

    hostname YRPCI

    domain xxxx.com

    fixup protocol ftp 21

    fixup protocol http 80

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol they 389

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol sip 5060

    fixup protocol 2000 skinny

    fixup protocol http-8080

    fixup protocol ftp 22

    names of

    name x.x.71.8 ConstOffice

    name x.x.81.11 BftOffice

    MainOffice x.x.71.7 name (this is the local device)

    name x.x.152.238 Savannah

    allow the ip host 192.168.50.10 access list acl_outbound a

    allow the ip host 192.168.50.75 access list acl_outbound a

    allow the ip host 192.168.50.201 access list acl_outbound a

    acl_outbound list of access allowed tcp 192.168.50.0 255.255.255.0 any eq smtp

    acl_outbound list of access allowed tcp 192.168.50.0 255.255.255.0 any eq pop3

    acl_outbound 192.168.50.0 ip access list allow 255.255.255.0 host 192.168.51.0

    acl_outbound 192.168.50.0 ip access list allow 255.255.255.0 host 192.168.52.0

    acl_outbound 192.168.50.0 ip access list allow 255.255.255.0 host 192.168.53.0

    access-list acl_outbound allow the host tcp 192.168.50.11 a

    acl_inbound list access permit tcp any host MainOffice eq 3389

    acl_inbound list access permit icmp any any echo response

    access-list acl_inbound allow icmp all once exceed

    acl_inbound list all permitted access all unreachable icmp

    allow the ip host MainOffice one access list acl_inbound

    acl_inbound list access permit tcp any any eq ssh

    acl_inbound list access permit tcp any host pop3 eq MainOffice

    acl_inbound list access permit tcp any host MainOffice eq smtp

    access-list 100 permit ip 192.168.50.0 255.255.255.0 192.168.51.0 255.255.255.0

    access-list 100 permit ip 192.168.50.0 255.255.255.0 192.168.52.0 255.255.255.0

    access-list 100 permit ip 192.168.50.0 255.255.255.0 192.168.53.0 255.255.255.0

    access-list 101 permit ip 192.168.50.0 255.255.255.0 192.168.52.0 255.255.255.0

    access-list 102 permit ip 192.168.50.0 255.255.255.0 192.168.51.0 255.255.255.0

    access-list 103 allow ip 192.168.50.0 255.255.255.0 192.168.53.0 255.255.255.0

    pager lines 24

    interface ethernet0 car

    Auto interface ethernet1

    Automatic stop of interface ethernet2

    ICMP allow any echo outdoors

    ICMP allow any inaccessible outside

    Outside 1500 MTU

    Within 1500 MTU

    intf2 MTU 1500

    IP address outside pppoe setroute

    IP address inside 192.168.50.1 255.255.255.0

    intf2 IP address 127.0.0.1 255.255.255.255

    alarm action IP verification of information

    alarm action attack IP audit

    don't allow no history of pdm

    ARP timeout 14400

    Global interface 2 (external)

    NAT (inside) - 0 100 access list

    NAT (inside) 2 192.168.50.0 255.255.255.0 0 0

    static (inside, outside) MainOffice 3389 192.168.50.75 tcp 3389 netmask 255.255.255.255 0 0

    static (inside, outside) tcp MainOffice 192.168.50.11 pop3 pop3 netmask 255.255.255.255 0 0

    static (inside, outside) tcp smtp MainOffice 192.168.50.11 smtp netmask 255.255.255.255 0 0

    Access-group acl_inbound in interface outside

    acl_outbound access to the interface inside group

    ...

    Permitted connection ipsec sysopt

    No sysopt route dnat

    Crypto ipsec transform-set esp - esp-sha-hmac RIGHT

    VPN1 card crypto ipsec-isakmp 10

    correspondence address 10 card crypto vpn1 102

    card crypto vpn1 pfs set 10 group2

    card crypto vpn1 together 10 peer ConstOffice

    card crypto vpn1 10 set transform-set RIGHT

    vpn1 20 ipsec-isakmp crypto map

    correspondence address 20 card crypto vpn1 101

    card crypto vpn1 pfs set 20 group2

    20 card crypto vpn1 peer BftOffice game

    card crypto vpn1 20 set transform-set RIGHT

    vpn1 30 ipsec-isakmp crypto map

    correspondence address 30 card crypto vpn1 103

    card crypto vpn1 pfs set 30 group2

    30 card crypto vpn1 peer Savannah game

    card crypto vpn1 30 set transform-set RIGHT

    vpn1 outside crypto map interface

    ISAKMP allows outside

    ISAKMP key * address ConstOffice netmask 255.255.255.255

    ISAKMP key * address BftOffice netmask 255.255.255.255

    ISAKMP key * address netmask 255.255.255.255 Savannah

    ISAKMP identity address

    part of pre authentication ISAKMP policy 10

    encryption of ISAKMP policy 10

    ISAKMP policy 10 sha hash

    10 1 ISAKMP policy group

    ISAKMP life duration strategy 10 86400

    SSH 0.0.0.0 0.0.0.0 outdoors

    SSH 192.168.50.0 255.255.255.0 inside

    SSH timeout 20

    VPDN group pppoex request dialout pppoe

    VPDN group localname yearround1 pppoex

    VPDN group ppp authentication pap pppoex

    VPDN username yearround1 password *.

    Terminal width 80

    Cryptochecksum:849d6fdb066c58cf7cfe868b6109145c

    : end

    501: (VPN is not working)

    6.2 (2) version PIX

    ethernet0 nameif outside security0

    nameif ethernet1 inside the security100

    Select 7RD3DIuHCed/Bft9 of encrypted password

    7RD3DIuHCed/Bft9 of encrypted passwd

    Savannah hostname

    domain yrpci.com

    fixup protocol ftp 21

    fixup protocol http 80

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol they 389

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol sip 5060

    fixup protocol 2000 skinny

    names of

    name x.x.152.238 Savannah

    name x.x.71.7 MainOffice

    acl_outbound ip 192.168.53.0 access list allow 255.255.255.0 any

    acl_outbound list of allowed access host ip MainOffice 192.168.53.0 255.255.255.0

    acl_inbound list access permit icmp any any echo response

    access-list acl_inbound allow icmp all once exceed

    acl_inbound list all permitted access all unreachable icmp

    acl_inbound of the x.x.152.0 255.255.252.0 ip access list permit 192.168.50.0 255.255.255.0

    access-list 101 permit ip 192.168.53.0 255.255.255.0 192.168.50.0 255.255.255.0

    access-list 101 permit ip host Savannah 192.168.50.0 255.255.255.0

    pager lines 24

    interface ethernet0 10baset

    interface ethernet1 10full

    Outside 1500 MTU

    Within 1500 MTU

    IP address outside dhcp setroute

    IP address inside 192.168.53.1 255.255.255.0

    alarm action IP verification of information

    alarm action attack IP audit

    PDM logging 100 information

    don't allow no history of pdm

    ARP timeout 14400

    Global 1 interface (outside)

    (Inside) NAT 0-list of access 101

    NAT (inside) 1 192.168.53.0 255.255.255.0 0 0

    Access-group acl_inbound in interface outside

    acl_outbound access to the interface inside group

    allow icmp a conduit

    Route outside 0.0.0.0 0.0.0.0 x.x.152.1 1

    ...

    Permitted connection ipsec sysopt

    No sysopt route dnat

    Crypto ipsec transform-set esp - esp-sha-hmac RIGHT

    vpn1 30 ipsec-isakmp crypto map

    correspondence address 30 card crypto vpn1 101

    card crypto vpn1 pfs set 30 group2

    30 card crypto peer MainOffice vpn1 game

    card crypto vpn1 30 set transform-set RIGHT

    ISAKMP allows outside

    ISAKMP key * address MainOffice netmask 255.255.255.255

    ISAKMP identity address

    part of pre authentication ISAKMP policy 10

    encryption of ISAKMP policy 10

    ISAKMP policy 10 sha hash

    10 1 ISAKMP policy group

    ISAKMP life duration strategy 10 86400

    Telnet 192.168.53.0 255.255.255.0 inside

    Telnet timeout 5

    SSH 0.0.0.0 0.0.0.0 outdoors

    SSH timeout 20

    dhcpd address 192.168.53.55 - 192.168.53.60 inside

    dhcpd lease 3600

    dhcpd ping_timeout 750

    dhcpd outside auto_config

    dhcpd allow inside

    Terminal width 80

    Cryptochecksum:57589b8bf8636b0a7f8a2d5a5e582649

    : end

    Thanks for your help in advance guys.

    Dave

    I think the following should be added to the config of the 501

    vpn1 outside crypto map interface

  • IPSec site to site config question

    Hi all

    I want to config vpn site to site between cisco 871w and openswan on CentOS way.

    I found that it can direct press 'Enter' after command:

    "crypto ipsec transform-set esp - aes 256 test"

    In my mind, I know that ipsec can be configured not encryption in the esp Protocol. So, what happens if there is no MCHA for auth in this scenario?

    Default hash method will MCHA took or something else?

    Thank you

    Drank Breya

    If you do not configure a HMAC for your IPSec security associations, and then no HMAC is used. That should NEVER be done! There are examples on ORC showing encryption without authentication, and also older versions of the official courses Cisco Firewall did that. But it is a non-secure config because he knows attacks against IPSec if you are not using authentication. Use always the ESP with a HMAC!

    --
    Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
    http://www.Kiva.org/invitedBy/karsteni

  • New to VM, network config question

    I have a question with networking on a virtual machine host. IM pretty new MV so forgive me if this is a stupid question or if its in the wrong forum.

    I have a single host VM with ESXi 5 turn several Win2008 server. The physical network switch is a 48-Port 10/100 but a 2 gigabit ports. The physical host has 4 gigabit NIC. Is it better to launch 4 NICs to 100 MB/s or two Gigabit? What happened to run 2 network cards in each (2 gigabytes) and 2 in 100? How do I configure?

    Im just trying to see what options are avilable for me with this and what is the preferred configuration.

    Thank you!

    So you can plug them into the ports of 1 GB as if you don't need all the traffic flowing on routes rising 1 GB and host to the same new host which will be at least 1 GB speed.

    Your army to the workstation traffic will flow to 100 MB max.

    Personally, I would look to pick up a new switch if budgets permit.  You can get a switch 48-Port gigabit for £180 all about, or if you do not use the 48-port you can get a smaller much cheaper.

    Kind regards

    Simon Greaves

    www.simongreaves.co.UK

  • config question

    What does this line in the config? GSM. MaterialSpec.AnalyticalProperty.CofA.Enabled = False

    We do not see more of country of origin on the failure column. Here's what we currently have in the config.

    GSM. MaterialAttribute.CountryOfOrigin.Enabled = True

    GSM. MaterialSpec.AnalyticalProperty.CofA.Enabled = False

    Please define GSM. MaterialSpec.MaterialBreakdowns.MaterialBreakdown.COO.Enabled to true, then reset IIS for the re - test.

  • watching storage NFS since FC storage, have network config question

    I have a lot of hosts running ESX3.5 U3. 4 network cards each have... 1 SC, 2 for VM, 1 for SC2 and VMotion. My question is when I go to use storage NFS I should use the vswitch which has the port of VKernel configured on it, correct? and I can only have a VKernel port on a host, correct? If those who are both good while I have my storage VMotion traffic and NFS on the same vswitch (NIC), correct? for my tests, I added a quad-port nic to a couple of hosts and predicted the addition of these NICs to the existing vswitch SC2/VMotion.

    current:

    vmnic0 = SC (vswitch0)

    vmnic1 = VM (vswitch1)

    vmnic2 = VM (vswitch1)

    No nic (vswitch2) network

    vmnic3 = VMotion/SC2/NFS (vswitch3)

    Futures:

    vmnic0 = SC (vswitch0)

    vmnic1 = VM (vswitch1)

    vmnic2 = VM (vswitch1)

    No nic (vswitch2) network

    vmnic3 = unassigned or add to VM vswitch network

    vmnic4 = VMotion/SC2/NFS (vswitch3)

    vmnic5 = VMotion/SC2/NFS (vswitch3)

    vmnic6 = unassigned or add to vswitch3

    vmnic7 = unassigned or add to vswitch3

    control at will!

    You can have multiple vmkernel ports, but not on the same subnet.  If you segment your NFS traffic in a separate network, you can create another vmkernel port to take advantage of this way.

    In addition, the only reason to have multiple sc ports is if you didn't trust your configuration VLAN switch.  To provide redundancy, I pair a 2nd NETWORK card with the first port of sc and get the hardware redundancy rather than adding complexity with a 2nd service console IP.  Then use a 2nd pair for vmotion, a 3rd pair for the vm traffic and a 4th pair for NFS.  That would give you redundancy at each layer, and if you use separate network segments with each type of data, provide you a better level of security as well.

    -KjB

  • Where are stored the DNS? HA config question

    I have 6 hosts ESX 3.5 on a private network. Don't not using DNS.

    I added the IP addresses and host names to all guests, including VC and confirmed that they can mutually ping by host name.

    Always make a config HA if error. When I go into the properties of the Vmotion on the VC switch and look at the DNS configuration tab, there:

    Name: mktgvmw20 (correct)

    Domain: empty nothing (correct)

    Preferred DNS: 192.168.10.1 (not good)

    I want my DNS preferred to say nothing. I have 3 other hosts configured in this way and they are working with the HA, but I can't figure out how to remove this DNS entry. When I try using the VC in this window, it is said, "the domain name is not in the correct format" and not save any changes I make to this DNS Configuration tab. I don't want a domain in there name.

    Where in ESX can I manually remove the preferred DNS entry? Thank you.

    Check /etc/resolv.conf

Maybe you are looking for