Force10 vlan exclusivity?
I had a whale of a Saturday in my COLO today trying (and failing) to complete what would have been a very simple task. I still don't understand why this happened, or how to solve this problem, but it's here.
Installation of the equipment:
Stacked Force10 MXL going on inside a M1000e chassis with cluster VMware ESXi 5.5 inside, supported by all storage Equallogis M4001x.
3 servers blades inside all NPAR running to copy all links are marked.
I've been running 4 VLAN for always: 1. internal networking for virtual hosts. 2 Vmotion ISCSI 3. 4. external connectivity with other hosts on outside LAN subnets. It's good and dandy. I need to set up connectivity to the Internet now and have added a 5th VLAN to my battery and label ports properly wear 'inner' connectivity to the virtual machine that needs the external connection. Simple. Now:
VLAN 10. Is Vmotion
VLAN 20 is iSCSI
VLAN 100 is my internal LAN
VLAN 200 is external LAN subnets
VLAN 300 is the Internet,
Here it comes... when I plug the cable (VLAN300) between my Internet switch MXL Internet... HOORAY!
AND... (VLAN200) is inaccessible. Now, I can SSH into my M1000e, but can't reach it from inside the organization.
Until - I unplug the cable to the VLAN200 and then plug plug back then... VLAN200 becomes available, but VLAN300 is now inaccessible.
I tested this 9 ways of Saturday night today, and this is what I learned. I can't find any logging on MXL battery that will give me a clue as to why this is happening, nor can I explain myself. I have antique HP switches that can handle this type of connectivity, but these interconnections of Force10 edge-impossible? What gives?
Is there a parameter of maxvlans on those things that just won't allow these two VLANs internal and external to exist together?
Has anyone seen something like this? I plan on calling DELL support on this first thing Monday if I can't get some help here. Thanks for your comments that you leave me.
I just sent an email, you can reply to the email with the switch configs.
Thank you
Tags: Dell Switches
Similar Questions
-
10G and switch network cards virtual configs
It will move in a new data center that has a capacity of 10G up to the switches in the baskets. In our current environment of 1 G, we have seven network cables (6 for ESX) and 1 for the remote management of the server. If we move to 10G we could cut the cables up to two for ESX and remote management.
Our current Setup uses a vSwitch for the console, another vSwitch VMotion and private traffic and a third for public traffic. Each of the three vSwitches has two network adapters physical, assigned to the redundancy.
If we go with NIC 10 G in the new data center then of course we have only a single virtual switch with two network cards in 10G for redundancy. I wouldn't have the isolation we have currently with three virtual switches, but given that we're going to use VLAN exclusively in the new data center I don't see a problem.
Any thoughts on the advantages or disadvantages? Of course, we will follow the HCL to select a network adapter. 10G compatible
I think that the reason why many customers today use more than 2 x Gigabit connections is mainly for reasons of security rather than the problems of bandwidth (FT could introduce a little challenge and you could use the same pair or a dedicated third party adapter if you are really concerned for VMotion).
I wrote about this concept a little back: http://it20.info/blogs/main/archive/2007/10/30/75.aspx
This hour IB seemed to be the best placed to do this today I think there is a consensus that it's the way things are going to be built... but using 10 Gbit (harmonised rules ethernet - which also includes storage traffic).
Back to your point I don't think that, in General, a simple increase in bandwidth will solve magically all the segmentation/security concernd that led us to dispose of separate network cards of 6-8-10-22. VLAN / exchanges have been around for a long time and their implementation (or lack of theorof) on the host ESX has been achieved through physical segmentation rather than raw bandwidth concerns. This may be different for you (good for you).
This will change with Enhanced segmentation/QoS features added to Ethernet protocol to join this converged network that talks about Cisco.
My 0.0002 cents.
Massimo.
-
Reference Dell Force10 S4810 VLAN in mirror
Ladies and gentlemen,
I was wondering if you have some experience with the mirroring of the ports on the VLT in Dell Force10 switches and if it is possible.I searched for more information last week and could not find valuable comments.I have a setup two switches to the VLT VLT.I have a couple of servers connected with port LACP channels and dozens of VLANs which they are responsible.Is it possible in the VLT to have mirrored a VLAN configuration to other VIRTUAL LAN?Best regardsKaloyan S.A full installation of VLT will require more ports that supports mirroring, and there is not a way to layer 3 mirroring.
-
Force10 MXL - VLAN is not routing.
I'm trying to set up a simple installation Layer 3 on stacked MXL Force10 switches.
ManagementEthernet 0/0 90.21.0.175 YES manual upward, upward
VLAN 33 10.1.33.1 YES manual upward, upward
VLAN 101 10.1.32.1 YES manual upward, upward
VLAN 103 192.168.103.1 YES manual upward, upwardMXL-stack #sho vlan
Q: U - no identified, the T - tag
Ports Status Description Q NUM
* 1 U active Te 0/3-6, 11-14, 17-23, 25-32
U Te 1/3-6, 11-14, 16-23, 25-31EENET active 33 U Te 1/15<>
101 production Dynamics network T Te 0/1-2, 7-8, 15-16, 24, 44<==10.1.33.x>==10.1.33.x>
T Te 1/8,24,32
External network active 103 T Te 0/8,16,24<==192.168.103.x>==192.168.103.x>
T Te 1/1-2, 8, 24, 32
U Te 1/7Route ip MXL-stack #sho
Destination Gateway Dist/metric was last modified
----------- ------- ----------- -----------
C Direct 10.1.32.0/24, Vl 101 0/0 3d2h
C Direct 10.1.33.0/24, Vl 33 0/0 00:13:51
C Direct 192.168.103.0/24, Vl 103 0/0 3d1hBattery Switch MXL
Ping result message
192.168.103.13 fail
10.1.32.21 success
10.1.33.10 success192.168.103.13 - default gateway is 192.168.103.1
Ping result message
192.168.103.1 success
192.168.103.11 success
10.1.32.1 success
10.1.32.21 fail
10.1.33.1 fail - 192.168.103.1 inaccessible Destination network10.1.32.21 - default gateway is 10.1.32.1
Ping result message
192.168.103.1 success
192.168.103.13 fail
10.1.33.1 success
10.1.33.10 success10.1.33.10 - default gateway is 10.1.33.1
Ping result message
192.168.103.1 success
192.168.103.13 fail
10.1.32.1 success
10.1.32.21 successI have my hosts on my different threads pointed to the stack for their default gateways, and I want my MXL battery to switch packets at layer 3 connectivity between subnets. The part which I stem is why is my vlan 103 does not communicate? I can't even he ping of the MXL battery that has the vlan on it. This should be the easiest thing in the world, but it is a failure. Someone has an idea?
I am pleased to hear that the routing has started working. I agree, it seems strange that would not work one day and then work the next day. Were all devices removed or added to the network between the two days? Or any small changes to config?
To remove a configuration you issue clear config
http://www.force10networks.com/CSPortal20/TechTips/0080_HowDoISaveMyConfiguration.aspx
The latest firmware is 9.3.0.0. Which provides overall improvements and would be calling and updated.
iSupport portal (Web): http://www.force10networks.com/support/
E-mail: [email protected]
Phone (USA and Canada): 866-965-5800
Phone (International): + 1-408-965-5800Can monitor to see if the problem back to the top again.
-
LAG, VLANS and Trunking Force10
I'm with vSphere and I a vSwitch with several groups of ports configured, including 2 assigned to VLAN ID and a network of management with no Vlan ID. This vSwitch will use physical NIC grouped to route this traffic to a physical Dell Force10 MXL switch. My understanding of the standard networking, a trunk port must be configured and VLAN must be added to this as labeled trunk port, while the traffic that has no Vlan ID is left unidentified and by default is the vlan by default (usually Vlan 1). The attached picture is the topology I and I need to make this work, but do not have a lot of experience with Force10 switches and so far, it looks very different. In addition, if it is relevant, the external switch in the diagram is actually 2 Force10 switches separated stacked, and there are two connections to the other switch (currently a 6224 not managed) between the firewall and F10s, which is a separate issue - those must be configured as an OFFSET on the F10s and the 6224? One or the other? Or? If anyone can help with the configuration for this topology? Please help me out here. Thank you!
Currently, the best method to get assistance and recommendations with Force10 equipment, is through the Force10 support group. They will be more quickly and accurately help you with this inquiry.
www.force10networks.com/.../ContactSupportGen.aspx
Watching a white Force10 pages looks like a trunk can be configured with these commands.
Configure VLANs tagged for an Interface of Port Trunk
#configurer MXL2 MXL2 vlan (conf) #interface 11
MXL2 (conf-if-vl-11) #tagged tengigabitethernet 0/1
MXL2 (conf-if-vl-11) #no shutdown
MXL2 (conf-if-vl-11) #exit
MXL2 (conf) #interface vlan 12
MXL2 (conf-if-vl-12) #tagged tengigabitethernet 0/1
MXL2 (conf-if-vl-12) #no shutdown
MXL2 (conf-if-vl-12) #exit
MXL2 (conf) #exit MXL2 #.
en.Community.Dell.com/.../download.aspx
Thank you.
-
Force10 S2410-01-10GE - 24 p does support hybrid-mode command?
Does anyone know if the Force10 S2410-01-10GE switch - 24 p supports a command that is similar to an order for OTF to hybrid mode?
I'm in the need to have a vlan are supported interfaces also well marked and unmarked. Is there something similar to the AVSTP?
Version running on this switch of current is 2.4.1.11
John
With the AVSTP, I think you need create the VLAN and then enter in the interface VLAN, and then define this VLAN tagged, not marked or PVID. Here is an article on the creation of VLANs and affecting the tag/no identified for VLAN interface.
So, you should be able to define several as tagged VLANs. And then 1 VLAN as the PVID for all traffic not marked. Page 224 of the guide also describes some more detail.
Hope this helps
-
F10 4820 t - pulsations on the interface vlan
Hello everyone
Using Force10 S4820T on 9.6
Rate limits can be applied to the physical interfaces only? and if yes how can I do to fix a speed limit on an interface vlan? Policy-map?
Thanks in advance
Based on the information contained in the user guide, it seems that it cannot apply to the physical interface.
Page 739:
-
VLANning questions about blades MXL
Hello
I have a new M100e with a SAN PS4110xs case, a few servers blade and two switches Force10 MXL (switches and SAN on fabric)
I put it all in place and works fine, but using the default VLAN for all
I want to connect the switches to a Juniper EX3300 via SFP ports + and send the subnet SAN out so that I can connect remotely to the IP address of the EqualLogic for VMM integration management
However, every time I try to put SAN ports in a VLAN separate-, before even that I look into the chutes for the Juniper - I lose all connectivity on the San.
I created a new VLAN (VLAN120), but as soon as I set the ports inside they cannot ping each other.
int vlan120
Tagged te0/1 (this is the port of SAN)
Tagged te0/12 (it is a single server)
Tagged te0/16 (that's the other server)
as soon as I do that I lose all connectivity to the San and server cannot ping each other via the iSCSI network.
I tried to use 'no label' instead of 'tag' with the same effect.
The VLAN is active (non-stop)
I am at a loss for what is the question.
Any help gratefully received.
Select this option.
I understood the question - I got 2 trunk in the Juniper VLAN120 links - as soon as I disabled the second interface everything arises in life
Now I need to try to find a way to implement a SHIFT between the two MXL in the stack and a Juniper ex3300 - I managed to get the connectivity that I need, but with only a single link - as it is a remote site I want redundancy :-)
-
My MXL blades have been set up by Dell Technology Services and work fine, but I would like to make a few changes now and not being Setup is not a network engineer, I have a problem with the docs I could find on the config of Force 10. Specifically, I want to do 3 things:
(1) change the SSH root password
(2) remove a port to a LAG (port channel) group
(3) add a new VLAN to some ports in the switch, including the one I just removed the lag, but abandon the SHIFT since the new VLAN
Can someone point me to a doc that explains how to do this kind of things?
Also, is it possible to access the console somehow by SSH in the CMC? I swear I've seen Dell Tech Services people who do somehow, but I don't know how they did it. Maybe I misunderstood what they were doing. It would be nice to not have the addresses of IP config exposed and control access through the permissions of CMC.
Thank you.
Hi amunter,
You can SSH to the CMC racadm commands and use to set it up. You just need to use PuTTY or other terminal program and go to the CMC host name or IP address.
You should be able to change the password in this way
(Force10) > activate
(Force10) #config
(Force10) (Config) #username admin passwd un_mot_de_passe
You can remove a port of a port channel in the channel of the port and using the command config no channel-member interface
Page 395
You can assign a VLAN to a port with the command interface vlan id - vlan
Page 910
-
Force10 problem and Dell Openmanage Network Manager snmp
Hello
I have install snmp on Force10: traps, string community, I have also setup set up on omnm, but for some reason, I could not authenticate with F10, please find config below as well as key details:
Dell10G-1 #show running-config
Current configuration...
! Version 9.0 (1.3)
! Last modification of the configuration to Fri Feb 21 14:07:21 2014 by default
! Startup-config updated Fri Feb 21 12:50:21 2014 by default
!
start the primary system battery-unit 1: A:
start a system secondary battery-unit 1: B:
start the system default stack-unit 1: A:
start the primary system battery-unit 2: A:
start a system secondary battery-unit 2: B:
start the system default stack-unit 2: A:
!
redundancy full automatic synchronization
!
hostname Dell10G-1
!
enable password 7 b125455cf679b208d3169fc631698be5722a1b01b7edad00
!
username admin password 7 269672acad1160b3ff0b65cde5149f32
!
no activation of dcb
!
disposal of battery-unit 1 S5000
!
stack stack-unit 1-group 14
!
stack stack-unit 1-group 15
!
TenGigabitEthernet-1/0 interface
no ip address
hybrid portmode
switchport
TrustDSCP of service-policy input
no downtime
!
interface TenGigabitEthernet 1/1
no ip address
hybrid portmode
switchport
TrustDSCP of service-policy input
no downtime
!
interface TenGigabitEthernet 1/2
no ip address
hybrid portmode
switchport
TrustDSCP of service-policy input
no downtime
!
interface TenGigabitEthernet 1/3
no ip address
hybrid portmode
switchport
TrustDSCP of service-policy input
no downtime
!
interface TenGigabitEthernet 1/4
no ip address
hybrid portmode
switchport
TrustDSCP of service-policy input
no downtime
!
interface TenGigabitEthernet 1/5
no ip address
hybrid portmode
switchport
TrustDSCP of service-policy input
no downtime
!
interface TenGigabitEthernet 1/6
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/7
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/8
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 9/1
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/10
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/11
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/12
no ip address
hybrid portmode
switchport
TrustDSCP of service-policy input
no downtime
!
interface TenGigabitEthernet 1/13
no ip address
hybrid portmode
switchport
no downtime
!
interface TenGigabitEthernet 1/14
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/15
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/16
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/17
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 1/18
no ip address
Shutdown
!
interface TenGigabitEthernet 1/19
no ip address
Shutdown
!
interface TenGigabitEthernet 1/20
no ip address
Shutdown
!
interface TenGigabitEthernet 1/21
no ip address
Shutdown
!
interface TenGigabitEthernet 1/22
no ip address
Shutdown
!
interface TenGigabitEthernet 1/23
no ip address
Shutdown
!
interface TenGigabitEthernet 1/24
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 1/25
EQL-con2 description
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 1/26
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 1/27
no ip address
hybrid portmode
switchport
no downtime
!
interface TenGigabitEthernet 1/28
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 1/29
no ip address
hybrid portmode
switchport
no downtime
!
interface TenGigabitEthernet 1/30
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 1/31
no ip address
hybrid portmode
switchport
no downtime
!
interface TenGigabitEthernet 1/32
no ip address
no downtime
!
interface TenGigabitEthernet 1/33
no ip address
Shutdown
!
TenGigabitEthernet 1/34 interface
no ip address
Shutdown
!
interface TenGigabitEthernet 1/35
no ip address
Shutdown
!
interface 1/48 fortyGigE
no ip address
Shutdown
!
interface fortyGigE 1/52
no ip address
Shutdown
!
disposal of battery-unit 2 S5000
!
stack stack-unit 2-group 14
!
stack stack-unit 2-group 15
!
TenGigabitEthernet-2/0 interface
no ip address
Shutdown
!
interface TenGigabitEthernet 2/1
no ip address
Shutdown
!
interface TenGigabitEthernet 2/2
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 2/3
no ip address
Shutdown
!
interface TenGigabitEthernet 2/4
no ip address
Shutdown
!
interface TenGigabitEthernet 2/5
no ip address
switchport
no downtime
!
interface TenGigabitEthernet 2/6
no ip address
Shutdown
!
interface TenGigabitEthernet 2/7
no ip address
Shutdown
!
interface TenGigabitEthernet 2/8
no ip address
Shutdown
!
interface TenGigabitEthernet 9/2
no ip address
Shutdown
!
interface TenGigabitEthernet 2/10
no ip address
Shutdown
!
interface TenGigabitEthernet 2/11
no ip address
Shutdown
!
interface TenGigabitEthernet 2/12
no ip address
Shutdown
!
interface TenGigabitEthernet 2/13
no ip address
Shutdown
!
interface TenGigabitEthernet 2/14
no ip address
Shutdown
!
interface TenGigabitEthernet 2/15
no ip address
Shutdown
!
interface TenGigabitEthernet 2/16
no ip address
Shutdown
!
interface TenGigabitEthernet 2/17
no ip address
Shutdown
!
interface TenGigabitEthernet 2/18
no ip address
Shutdown
!
interface TenGigabitEthernet 2/19
no ip address
Shutdown
!
interface TenGigabitEthernet 2/20
no ip address
Shutdown
!
interface TenGigabitEthernet 2/21
no ip address
Shutdown
!
interface TenGigabitEthernet 2/22
no ip address
Shutdown
!
interface TenGigabitEthernet 2/23
no ip address
no downtime
!
interface TenGigabitEthernet 2/24
EQL-con1 description
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 2/25
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 2/26
no ip address
hybrid portmode
switchport
no downtime
!
interface TenGigabitEthernet 2/27
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 2/28
no ip address
hybrid portmode
switchport
no downtime
!
interface TenGigabitEthernet 2/29
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 2/30
no ip address
hybrid portmode
switchport
no downtime
!
interface TenGigabitEthernet 2/31
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 2/32
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 2/33
no ip address
MTU 12000
switchport
no downtime
!
TenGigabitEthernet 2/34 interface
no ip address
MTU 12000
switchport
no downtime
!
interface TenGigabitEthernet 2/35
no ip address
Shutdown
!
interface fortyGigE 2/48
no ip address
Shutdown
!
interface fortyGigE 2/52
no ip address
Shutdown
!
interface ManagementEthernet 0/0
no downtime
!
ManagementEthernet 1/0 interface
IP address 10.0.0.30/24
no downtime
!
ManagementEthernet 2/0 interface
IP address 10.0.0.25/24
no downtime
!
ManagementEthernet 3/0 interface
no downtime
!
ManagementEthernet 4/0 interface
no downtime
!
ManagementEthernet-5/0 interface
no downtime
!
ManagementEthernet 6/0 interface
no downtime
!
ManagementEthernet 7/0 interface
no downtime
!
ManagementEthernet-8/0 interface
no downtime
!
interface ManagementEthernet 9/0
no downtime
!
ManagementEthernet-10/0 interface
no downtime
!
ManagementEthernet-11/0 interface
no downtime
!
interface Vlan 1
! unidentified TenGigabitEthernet-1/0-17, 27, 29, 31
! unidentified TenGigabitEthernet 2/2,5,26,28,30
!
Vlan 100 interface
ISCSI description
iSCSI name
no ip address
tagless TenGigabitEthernet 1/24-26, 28, 30
tagless TenGigabitEthernet 2/24-25, 27, 29, 31-34
no downtime
!
interface Vlan 150
VMotion description
no ip address
Tagged TenGigabitEthernet 1/27,29,31
Tagged TenGigabitEthernet 2/26,28,30
Shutdown
!
interface Vlan 999
Speech description
the voice name
no ip address
Tagged TenGigabitEthernet 1/0-3, 5, 12-13
no downtime
!
interface Vlan 4000
no ip address
Shutdown
!
interface Vlan 4001
no ip address
Shutdown
!
interface Vlan 4003
no ip address
Shutdown
!
interface Vlan 4010
no ip address
Shutdown
!
interface Vlan 4020
no ip address
Shutdown
!
interface Vlan 4030
no ip address
Shutdown
!
management route 0.0.0.0/0 10.0.0.1
!
class service dynamics dot1p
!
SNMP-server community Monitoring ro
Server enable SNMP traps bgp
SNMP-Server enable traps snmp authentication linkdown, linkup cold start
Server enable SNMP traps vrrp
Server enable SNMP traps lacp
entity of traps activate SNMP Server
Enable SNMP-Server intercepts stp
Server enable SNMP traps ecfm
Server enable SNMP traps vlt
Enable SNMP-Server intercepts fips
Server enable SNMP traps xstp
Enable SNMP-Server intercepts ets
Server enable SNMP traps envmon cam-use temperature power fan
Server enable SNMP traps eoam
Enable SNMP-Server intercepts pfc
Host Server SNMP 10.0.0.238 traps version 1 monitoring - port udp 162
!
class-map correspondence-everything ClassMap1
match ip dscp 46
!
Policy-map-input TrustDSCP
Class-card service-queue ClassMap1 2
Trust diffserv
!
Lldp Protocol
to advertise dot1-tlv, port port-protocole-vlan-id-vlan-id
advertise dot1-tlv-name of vlan id the vlan-999
advertise med
advertise med 999 6 46 voices
!
0 line console
line vty 0
line vty 1
line vty 2
line vty 3
line vty 4
line vty 5
line vty 6
line vty 7
line vty 8
line vty 9
!
end
______________________________
Dell10G-1 #show snmp group
GroupName: v1v2creadg security model: v1
readview: v1v2cdefault writeview: no give view entry
notifyview: v1v2cdefault context: no context specified
status: Active
GroupName: v1v2creadg security model: v2c
readview: v1v2cdefault writeview: no give view entry
notifyview: v1v2cdefault context: no context specified
status: Active
GroupName: v1v2cwriteg security model: v1
readview: v1v2cdefault writeview: v1v2cdefault
notifyview: v1v2cdefault context: no context specified
status: Active
GroupName: v1v2cwriteg security model: v2c
readview: v1v2cdefault writeview: v1v2cdefault
notifyview: v1v2cdefault context: no context specified
status: Active
__________________________________
Dell10G-1 #show snmp community
Community: monitoring
Background: no
Security-name: v1v2creadu
Community: public
Background: no
Security-name: v1v2creadu
Don't know if there are other settings of snmp that must be put in place or I missed something
Thank you for your help
Hello
Can you try to set up OMNM like this http://en.community.dell.com/support-forums/network-switches/f/866/t/19535001.aspx
Set up two profiles of authentication in OMNM. ((1) SNMP v1/v2c and used the SNMP community string, I put on the Force 10 switch 2) Telnet/SSH using the switches telnet user ID, password and the password 'Enable' leaving him activate ID empty.
-
See the bandwidth for the Port-Channel on Powerconnect &; Force10
Reference Dell dear community,
Y at - it a command CLI or GUI to see how much bandwidth result after having done a port channel in some port Powerconnect and Force10? Suppose we have 4 port 1 Gb and do 4 ports with 1 port-channel. So actually in this channel port have a bandwidth of 4 GB.
In Cisco, with the command show interface port-channel 1, we get the result
switch #sh po int 1
Port-channel 1 is up, line protocol is up (connected)
Material is EtherChannel, address is 0064.4026.739a (bia 0064.4026.739a)
MTU 1500 bytes, BW 4000000 Kbit, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
KeepAlive set (10 sec)
Full duplex, 1000 Mbps, link type is auto, media type is unknown
input stream control is turned off, output flow control is not supported
Members in this channel: Gi0/1 Gi0/2
Type of the ARP: ARPA, ARP Timeout 04:00
Last entry of 00:00:00, 00:04:48 output, output hang never
Final cleaning of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/dumps); Total output drops: 0
Strategy of queues: fifo
Output queue: 0/40 (size/max)
5 minute input rate 2000 bps, 3 packets/s
5 minute output rate 2000 bps, 3 packets/sBut if we do this command on Powerconnect, the just result inform port that starts from the port-channel.
Reference Dell #show interfaces port-channel 1 short
Ch-Type Hash Type Min-links Channel ports local FRP
------- ----------------------------- -------- --------- --------- ---------
PO1 Active: Static disabled people article gi1/0/1, gi1/0/2 7 1 article
Item in gi1/0/3, item in gi1/0/4Type of hashing algorithm
1 - the source MAC, VLAN, EtherType, source module and port Id
2 - destination MAC, VLAN, EtherType, module source and port Id
3 - source IP and TCP/UDP source port
4 - destination IP and destination TCP/UDP port
5 source/Destination MAC, VLAN, EtherType, MODID/source port
6 source/Destination IP and port TCP/UDP source / destination
7 - improved hash modeCan you help us find the answer?
Thank you
Kind regards
Aziz
The PowerConnect switches do not have the ability to show as much detail as the Force10 can. The RMON tables have an interface use %, what may be the closest we can do on the PowerConnect switch.
#show rmon statistics
I've seen some monitoring software which was able to question the switch via SNMP and get some information of bandwidth. However, this can be a bit inconsistent, according to which switch and what software is used.
The MIBs/OID can be downloaded with the software switch.
http://www.Dell.com/support/home/us/en/rc959303/products/ser_stor_net/networking/net_fxd_prt_swtchs
-
Cisco 1921 &; SG500 VLAN and DHCP problem
Dear all,
Thank you in advance for taking the time to read this.
A little history:
I want to install a project for an athlete, which is unfortunately on a budget pretty tight with a potentially large quantity of network users (~ 200 without public WIFI). I need to separate the 5 groups of users and to give them all access to internet without see each other. 5 user groups also share the same bandwidth to the internet and VLANs must be controlled bandwidth.
To do this, I had planned to use Cisco devices built-in functions and buy a 1921 Cisco router as a switch of SG500.
I have configured the router for 8 subinterfaces is internal NIC with 8 VLAN. I also configured DHCP Pools 8 on the 1921 and set up NAT and firewall.
What I want to do now is have the SG500 to recognize the VLAN ID, I configured on the router (as well as on the switch using the same VLAN ID numbers), and then assign ports to the VLAN on the switch, and depending on where I plug into the switch, the device receives different IP addresses from DHCP.
However, I can't get this to work. The router works fine, the 'intact' if left switch gives me an IP address from the DHCP server on the IP address of higher network VLAN (I.e. 168.8.0). but I can not configure the switch ports correctly so that it works. I was also confused, is that dhcp pools that I have configured on the command-line command on the router do not appear in professional CP in the mask of the pool.
Can someone kindly check the configuration of the router and throw some guidance on how I need to configure the Ports on the SG500? I must say that I have had too many nights and I seem to confuse tagging, untagging, to exclusion and prohibiting the ;.)
I have the router for you here:
Thanks again and good night!
W.
Hi Wolfgang, for the sx500 configuration can be something like this
config t
database of VLAN
VLAN 2-8
int item in gi1/1/1
switchport mode general
switchport trunk allowed vlan add 2-8 tag
switchport General disable filtering of capture
For any client that connects must be no tagged coelio
So if you want a client access port then you should do something like 5 unidentified to this port
config t
int item in gi1/1/2
switchport mode access
switchport access vlan 5
-Tom
Please mark replied messages useful -
WAP321 VLAN and SG300 routing problem
Hello
I have a SG300 - 28 p as a main switch. Three WAP321 APs are connected with two SSID. A primary SSID is served on VLAN 1 and a guest THAT SSID is on VLAN 2.
The SG300, I have three ports of junction for the WAP321s because they carry VLAN 1 and VLAN 2. 25 on the switch port is a port of access for VLAN 2 since the guest network is served by its own router and WAN access. The main LAN and Wireless is on the 192.168.101.x network and the network of comments (including cable) is on 192.168.24.x.
Wireless connection to the WAP321, obtain the appropriate IP addresses (DHCP is served by routers - both are RV042s). On the main network (101), I am able to ping, access to the network. On the network of comments, I'm not able to ping to the router (192.168.24.222) or the 192.168.24.254 switch. However, it is not a problem if I'm on a wired connection to the router reviews.
This makes me suspect that I missed certain routing or configuration on the SG300 for this configuration. Any advice? See the attached diagram below:
Eugene
Eugene, I think the problem is with the AP. This is a clear indication of the fact you are wired in and have no problems.
One thing that may be a scenario is external causes. Your computer is exclusively wireless or you have tested while wired + wireless? Have you tried with a second computer is wireless only?
If you use a computer (s) strictly wireless, the problem is with the AP and can be somehow "mask" the network devices either.
I know things like characteristic of guest network and captive portal has some mechanisms of protection because it is not about the guest to access the network devices. How is the configured access point? Everything just with 2 SSID and a username/password?
I think that it is perhaps a good idea to look at how this Approach is implemented if there is any interference from external factors.
-Tom
Please mark replied messages useful -
Exclusive network for VM adapters
Hi people,
I have ESXi installation on a Server 3 network cards.
I want to create a Virtual Machine and to allocate 2 cards exclusive for this virtual machine. The virtual machine will be a firewall.
Is this possible?
Thank you
Douglas
Hello, welcome to the forum
As far as I KNOW, Yes, you can
You will use a vmnic (physical NIC) for your management and... and will place it in a vSwitch (for example on the default, vswitch0)
Then you will create a second vSwitch with two remaining vmnic. (i.e. vSwitch1)
Create 2 port group and assign them to separate NIC and config their VLAN if use you it. (penetration = group1, evacuation = portgroup2 port)
So you will have 2 vNIC on your VM, connect each on each port group. (vNIC1--> penetration vNIC2--> evacuation).
-= If you have found this note/response useful, please consider awarding points to 'Correct' or 'useful ' = -.
-= If there is a mistake in my notes, please correct me! =-
-= Thank you =-
! http://www.kasraeian.com/wp-content/uploads/2010/02/VCP4-logo-small.jpg!
! http://www.kasraeian.com/wp-content/uploads/2010/02/MCTS-logo-small.jpg!
-
App 5.1 server does not not on different VLANS
Helloooo
I just installed a new server and I use the server application. Everything seemed to work fine until I moved my iMac to a VLAN different. Profiles and update settings do not push to the iMac and sit at a stadium in waiting. Also to register the new iMacs on the server I get to the login server window and it crashes it and does not authenticate. Screen opens by saying that I can open a second window and registration. When I try to register, I get an unknown error and that it fails. It seems timeless. I tried to change a lot of settings prescribed by other users, but nothing helped. Someone at - it advice on what could be the problem.
See you soon
Sean
Hello
I took the easy on this way and bring a USB ethernet to my mac so that I have two physical interfaces. An in each VLAN.
There are other ways to do this, and this is a good article:
https://blog.Pivotal.IO/Labs/Labs/using-deploystudio-across-Subnets-a-Path-Not-t Aken
Kind regards
Erik
Maybe you are looking for
-
Seek to increase the effectiveness of the user's browser.
-
My name is Hamidar Chanzi of Tanzania. I bought my new iPhone more than 5 s about two weeks ago and it was good work. But now the problem to communicate with others (always indicate ' search'). Also required to update. I was downloading the iOS 9.1
-
Installation of Service Pack 1 for Vista
I received the error message during the installation of SP1. Error code 0 x 80073712
-
I think that this should be easy, but I must be stupid. I have a laptop with Windows Vista Home Basic, I would erase the operating system and install XP Professional, how to clear the OP system? I tried to boot from the cd with the new XP, after load
-
Importing large .wmv in Windows Movie Maker
Hello It doesn't seem to be any major problem with the Windows Movie Maker program, because it is play other videos that I'm importing. It can't import video that I converted from .mov to .wmv using Winff to 1 h. Last night he just repeated does not