On Vlan in 6224
I have set up several VLan in powerconnect 6224 with different ip address. My problem is I can not ping each gateway using Hyperterminal or from the PC, connect to the Vlan. Another solution?
example:
Configure
database of VLAN
VLAN 100
address 192.168.1.1/24
output
interface range ethernet g1-1/6
switchport mode access
switchport access vlan 100
output
of the Terminal, trying to ping the ip of the vlan address... ureachable... and try to connect 1 pc port configure ip address and try ping the gateway (192.168.1.1) can not always ping it...
any solution that guy u can offer?
Tags: Dell Switches
Similar Questions
-
PowerConnect 6224 VLAN config / default gateway
Hello
I am new to configuring a VLAN and work with DELL going on so please forgive my ignorance.
I joined a small agency that currently has a flat structure networking including 1 6224 linked to two 5548 one is connected to three 3548 (access), and the other is connected to a server. The 6224 connects to a proxy (default gateway), and then on the Web. All devices are currently on a 192.168.78.0 24 network with ip default gateway 192.168.80.1
We want to segment the network using two VLAN initially. VLAN 1 user "80" and vlan 1 safety '70' and I want to clarify a few things before that I try:
1. can you stay the ip on the network switch for vlan user ex: 192.168.80.123 or should I create a vlan separate management?
2. I know in order for the inter - vlan, the ip of the gateway routing vlan must be on the 6224 and I then have to configure a default route to the proxy. The proxy must be on one VLAN separate or could I leave on VLAN 80 and change the ip address another que.1?
Thanks in advance.
I did it several times myself. You can do almost an infinite number of ways, but it will be better to stick to certain typical networking practices. Here is the version digest readers of what would be preferable to do so.
1 enable routing on the switch stack.
2. make a 80 VLAN for your network 24.80. Assign the IP 192.168.80.1 to this VLAN. In this way, customers will now be a ".". 1' default to the network gateway, they are on.
3 make an another VLAN 70 for your network 24.70. Assign the IP 192.168.70.1 to this VLAN. This will be the default gateway for the network. Repeat for however many VLANS / networks you want to.
4. create a separate VLAN for his own 'bubble' network between the switch and the upstream proxy server. (Lets call him a dummy VLAN 100 with an IP range x.x.100.x 29. It can be just a little/29 block or something or 24 if this is confusing. Configuring the ports a few ports 'access' for this VLAN for that no marked traffic pass over this network. Set x.x.100.1 to your Proxy Server and x.x.100.2 to your switch, then make sure you have directions on both sides about where traffic should go.
5. save your configuration so that you have to rebuild it after a reboot. :-)
It will be best to set your expecations about it. You want realistic during a weekend/maintenance window. ARP cache and other issues can make for some downtime. In addition, there are certainly other ways to do it, but that may be hurtful on the road when you need to increase or scale. Two years on the road someone wondered why a default gateway is on a few eccentric IP, or there are errors of routing intermentent, etc..
Powerconnect worldwide, just be clear what is the difference between a port of "access" to the port of 'general', and are a port 'trunk '. Conditions may be different from the Lim to make, and if one comes to tell the world of Cisco, this may be a little different.
Finally, don't forget to come up with a good procedure for this during your maintenance window. Come up with a good plan documented and so well thought out, when run you it, it will be nothing more than a task in office project.
-
Connect 6224 VLAN routing and management VLAN
Happy holidays all the world-
I read several posts here and elsewhere on the inability of the 6224 to deliver its own management interface. OK, enough, I get it. But what I don't understand is a practical solution to what seems to be a huge problem if you want to use the network to connect to the device to manage (instead of the serial console port).
Let's say I want to have three networks A, B, and C on the 6224 and configure it to route between any combination of them. Let's call them VLANS 1, 2, and 3. Three ethernet cables will connect to three ports on the 6224. for the network A, b and C. Let's just ignore shifts and redundant connections to do this.
The management VLAN can not be assigned to one of these networks, right? He said in the documentation, and it turns out if you try to do it on the configuration of the switch. It doesn't let you do.
So, how do you reach the 6224 for management? Create a fourth network, VLAN 4? This seems to be the general theme of the answers to questions like that, but how do you reach this seemingly isolated network? By definition, it cannot be routed. Any computer that you normally use on A, B or C, can not reach D.
So what then? A dedicated computer for D who cannot reach the other thing than the switch management port? What about another completely separate router (I have a Cisco ASA with some ports to spare, or a hint of irony, an another 6224!) to provide a connection between D and a networks normally used? This is crazy.
Of course, missing me something here. I can't believe that the answer is, 'If you enable routing, the management interface is essentially unusable"but that's what it looks like, from my possibly twisted point of view. I want to have my laptop computer and any other computer, sitting on a network that can be put to rout by the 6224, and for that same laptop also be able to reach this same 6224 management interface.
Someone please help me understand this?
Thank you
Chris
PS: I have an email address. It is almost unique on the entire planet. I use it to connect to this forum. But Dell, like so many others, insists on ignoring these facts and let me create an another unique identifier while playing a game of 20 questions. That's why my remarkably stupid random username.
Thanks again, and I hope that someone gets at least a good laugh over this.
Vlan management can be considered as a port OOB. If the intention is that it be separated from the rest of the traffic and on its own dedicated network. However, you are not limited to manage the switch through just the interface vlan management. Each VLAN with an IP address can be used by customers in this vlan to manage the switch.
For example, if you assign a VLAN 2 address and ip 192.168.2.1. Customers in VLAN 2 with and the 192.168.2.x subnet ip address can access 192.168.2.1 to manage the switch, while being able to communicate with clients in other VLANs.
I hope this helps some, let me know if you need help on your config, or to specify anything.
Thank you
-
Hello
I have a prolem routing dhcp requests between the vlan management where DHCP server resides and the other VLANs.
I have the scenario of base with three VLANS: vlan 10 (management vlan), 20, 30, configured on a Powerconnect 6224 switch L2 mode. This switch is connected to a pfsense router. The router is configured at the package of road between the VLANS and it does it well.
In Vlan 10, I have a configured DHCP server to use the ip addresses of all the VLANS (10, 20, 30). VLAN 10 client computers receive ip address but not others from other VLANs.
When I put the ip address in the appropriate range of VLANs manually on computers, I ping the server and I have connectivity.
This suggests that the problem is with the dhcp package.
The following is the configuration of the switch:
Configure
database of VLAN
VLAN 10,20,30
VLAN 1 1 routing
VLAN 20 2 routing
VLAN 30 3 routing
output
SNTP server time.nist.gov
clock timezone 1 minutes 0
battery
1 1 member
2 2 Member
output
DHCP IP address
IP address vlan 10
name of the IP-server 172.16.10.1bootpdhcprelay cidridoptmode
interface vlan 1
Routing
IP 172.16.1.1 255.255.255.0
output
interface vlan 20
Routing
address 172.16.20.1 IP 255.255.255.0
output
interface vlan 30
Routing
IP 172.16.30.1 255.255.255.0
output
level of 20fc49459a1898b923ed3ec7b3e81276 user name 'admin' password encrypted 15
No spanning tree
spanning tree priority 0
l2relay DHCP
DHCP l2relay VLANs 10, 20-30
DHCP l2relay circuit-id VLANs 10, 20-30
!
interface ethernet 1/g2l2relay DHCP
switchport access vlan 20
output
!
interface ethernet 1/g3
l2relay DHCP
switchport access vlan 30
output
!
interface ethernet 1/g21
switchport access vlan 10
output
!
interface ethernet 1/g22
switchport access vlan 10
output
!
interface ethernet 1/g23
switchport access vlan 10
output
!interface ethernet 1/g24
switchport mode trunk
switchport trunk allowed vlan add 10,20,30
output
Server SNMP community EyesOfNetwork ro
SNMP-server community public ro
outputI followed the instructions in the powerconnect 6224 user guide, but no progress on this issue.
Any help will be be grateful.
Thank you
Zoubeir
The DHCP server stores information that could be useful? May need to configure monitoring ports and something as wireshark to monitor DHCP packets. This would help determine where the package is stopping.
example:
Console (config) #monitor session 1 source interface 1/g8
Console (config) #monitor session 1 destination interface 1/g10
session mode 1 #monitor console (config)
right now I don't see anything in the config of the switch that stands out. If the DHCP server is configured for option 82, then you will need to include the following command on the switch.
Example:
Trust l2relay console #dhcp (config-if-1/g1)
But I don't think that's our scenario here.
-
Dell Powerconnect 6224 Default VLAN VLAN reference and management
Hello
two questions-
1. what exactly he wants to tell the VLAN by default is not routable or VLAN 1 is not routable? I can connect to my 6224 a different subnet and its got nothing configured except default values and an IP address to this VLAN
2. I have a stack of 2 x 6224 s, 95% completed and all on the default VLAN 1. I won't use VLAN 1. So I create a VLAN 10 and "range Ethernet all interface ' followed ' switchport access vlan 10"»
Now I can not connect on the network. That's happened? How can I move everything cleanly on VLAN 10 and it is possible via the network or must it be done with a cable from the console?
Thank you
Hello, by default, the management interface is in VLAN 1, if you want to she be changed to VLAN 10 please use the command 'ip address vlan 10' in the Setup mode and check the status of management interface using the command 'show ip interface '.
-
configuration of VLAN 6224/5448
Hello
I intend to get ISP co-location services and I need some tips for simple diagram below that I'm not really good in network.
L3 = 6224 switch
Switch L2 = 5448
VLAN blue = management
VLAN = green KVM host. VM it will use to connect to the internet
I created all three VLANs, but I have a few questions
1. should I have 3 cables of L3 to L2? One for the connection of two switches, two others for vlan10 & 20?
' 2. If I set port 2 and port 1 to vlan10 vlan20, to the title of the page "belonging to a vlan" GUI set for each VLAN?
3. How can I assign IPs 24 in vlan Green?
Appreciate for any help I can get :)
Thank you
ETH.
No need for 3 cables except if you create a GAP. To carry several VLANS through a connection, you use general parameters of the trunk.
Example:
Console (config) # interface ethernet 1/e7
mode console # switchport general
Console # switchport General allowed vlan add 2,3,4,5 tag
Console # pvid General switchport 99
It depends on what plug ports 1 and 2. If they connect to a server and that the server is not aware of VLAN, you would set it to not signposted. You can also accomplish this by setting the port to access the mode for the VLAN.
Example:
Console (config) # interface ethernet 1/e1
Console # switchport mode access
Console # switchport access vlan 2
But if it connects to another network device VLAN aware, you might consider with label especially if there are several VLANs on the connection.
On the 6224 assign you an address up to the VLAN with these commands.
Example:
Console (config) #interface vlan 5
Console (config - vlan) #ip address 192.168.1.1 255.255.255.0
-
Management VLan in Dell Powerconnect 6224
Hello
I have power supply dell switch connect 6224. I created 3 vlan, Vlan 10,20 and 30. different ip network given to all the vlan...
The problem, he can access via telnet or Http from the IP two vlan 3... I want that she needs to access from only a single IP address not all the...
should what additional configuration I do on switch?
I will seek to implement the ACL to deny access to the address IP of the VLAN.
This is a good, white page that covers the ACLs on the 6224.
http://www.Dell.com/downloads/global/products/PWCNT/en/pwcnt_ip_acls.PDF
To help control access to the switch, one of the first things I suggest you do allows SSH and HTTPS, then disable Telnet and HTTP.
-
PowerConnect 6224 VLAN created, but impossible to do a ping between customers
1 created vlan 2 with two ports 17.19 with ip 10.0.1.2/24
2 created vlan 3 with two ports 13.15 with ip 10.0.2.2/24
attempt to create inter routing vlan
1 pc windows connected with ip 10.0.1.3/24 and a gateway to port 17 10.0.1.2
2 connected windows pc with ip 10.0.2.3/24 and a gateway 10.0.2.2 to port 15
Unable to get the Ping between two clients any help would be much appreciated, thank you in advance and running config pasted below
coresw1 #show running-config
! Current configuration:
! Description of the system "PowerConnect 6224, 3.3.7.3, VxWorks 6.5.
! 3.3.7.3 system software version
! Passage mode is configured as disabled
!
Configure
database of VLAN
VLAN 2-3, 5
VLAN 2 1 routing
VLAN 3 2 routing
output
location of SNMP Server "Data Center"
contact SNMP Server «»
hostname "coresw1".
unicast SNTP client enable
10.0.0.1 SNTP server
clock timezone 5 minutes 30 zone 'IST '.
battery
1 1 member
output
IP 10.0.0.193 255.255.255.0by default-gateway IP 10.0.0.1
IP - peekaygroup.com domain name
name-server IP 10.0.0.1
without enabling ipv6
IP routing
interface vlan 2
name "LAN1.
Routing
10.0.1.2 IP address 255.255.255.0
bandwidth 10000
IP mtu 1500
output
interface vlan 3
name "LAN2.
Routing
IP 10.0.2.2 255.255.255.0
bandwidth 10000
IP mtu 1500
output
interface vlan 5
name "RIL Internet"output
level of 8a9f2a72d65baf40b48108874cd50592 user name 'admin' password encrypted 15
!
interface ethernet 1/g13
switchport access vlan 3
output
!
interface ethernet 1/g15
switchport access vlan 3
output
!
interface ethernet 1/g17
switchport access vlan 2
output
!
interface ethernet 1/g19
switchport access vlan 2
output
!
interface ethernet 1/g20
switchport access vlan 5output
!
interface ethernet 1/g22
switchport access vlan 5
output
SNMP-server community public rw
outputThis blog does a good job of showing the different firewall rules to add. You said that you have already tweaked the firewall some, I would just check the measures taken.
http://www.sysprobs.com/enable-ping-reply-Windows-7
If there is no antivirus software installed, try a break/disabling it to test and see if it makes a difference.
I don't see anything on the config which would prevent pings happen.
-
VLAN routing when you use a dell computer 6224
Hello
I have a dell switch 6224 with 2 VLANS.
Management-192.168.1.111/24 Ports 1/g1-1 / g12
Vlan150-192.168.150.111/24 Ports 1/g13-1 / g24
I have two ports on the router with the ip address to communicate with the switch (192.168.1.2 and 192.168.150.2). Vlan1 works very well without any problems. I can ping from 192.168.150.2 to 192.168.150.111. I set up the laptop with the ip 192.168.150.113 and plugged in the Vlan150 on port 1/g19. I can not ping to 192.168.150.113 192.168.150.2. The traffic is not going through the Vlan150 in the switch.
What Miss me? This is my first time setting up a VLAN on these switches. Help, please.
Config
console #show running-config
! Current configuration:
! Description of the system "PowerConnect 6224, 3.3.8.2, VxWorks 6.5.
! 3.3.8.2 system software version
! Passage mode is configured as disabled
!
Configure
database of VLAN
VLAN 150
VLAN 150 1 routing
subnet of VLAN association 192.168.150.0 255.255.255.0 150
output
battery
1 1 member
output
192.168.1.111 IP address 255.255.255.0
by default-gateway IP 192.168.1.2
IP routing
interface vlan 150
name "VLAN150".
Routing
IP 192.168.150.111 255.255.255.0
output
level of 00436d6ae2ed27bbe87fa24b73b5a249 user name 'admin' password encrypted 15
line of AAA authentication login "defaultList".
the AAA authentication enable line 'enableList '.
line console
00436d6ae2ed27bbe87fa24b73b5a249 encrypted password
output
line telnet
connection of authentication defaultList
00436d6ae2ed27bbe87fa24b73b5a249 encrypted password
output
ssh line
connection of authentication defaultList
00436d6ae2ed27bbe87fa24b73b5a249 encrypted password
output
!
interface ethernet 1/g1
switchport mode general
output
!
interface ethernet 1/g2
switchport mode general
output
!
interface ethernet 1/g3
switchport mode general
output
!
interface ethernet 1/g4
switchport mode general
output
!
interface ethernet 1/g5
switchport mode general
output
!
interface ethernet 1/g6
switchport mode general
output
!
interface ethernet 1/g7
switchport mode general
output
!
interface ethernet 1/g8
switchport mode general
output
!
interface ethernet 1/g9
switchport mode general
output
!
interface ethernet 1/g10
switchport mode general
output
!
interface ethernet 1/g11
switchport mode general
output
!
interface ethernet 1/g12
switchport mode general
output
!
interface ethernet 1/g13
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g14
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g15
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g16
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g17
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g18
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g19
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g20
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g21
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g22
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g23
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
!
interface ethernet 1/g24
switchport mode general
VLAN allowed switchport General add 150
switchport vlan allowed General remove 1
output
activate 00436d6ae2ed27bbe87fa24b73b5a249 encrypted password
output
Hello
The laptop is probably sending unmarked packages and so you need to change the PVID on the interface so that the unmarked packages are assigned to 150 of VLAN.
switchport General pvid 150
-
Hello
DELL powerconnect 6224 reference.
I want to access the management of a different VIRTUAL LAN VLAN.
The management of VLANS is 100 of VLAN. not the routing
My computer is vlan 60 (192.168.60.10) and I want to connect via ssh or http (192.168.100.1) to manage my switch.
Thank you for your help on the command line
The management of VLANS on the 6224 is not routable. So, you will not be able to access VLAN 100 from any other VLAN. However, you can manage the switch from other VLAN IP addresses. So if VLAN 60 has an IP of 192.168.60.1 you can http and ssh to it. And if the VLAN routing is enabled you have access to 192.168.60.1 on the other VLAN.
See you soon
-
PowerConnect 6224 VLAN down?
I just created a new 51 VLAN on my core 6224 switch.
I have assigned an IP address, configured routing, he attributed to multiple trunks, and I attributed to a port of access to him as well. VLAN 8, I'll set up, have had no problems with others.
Here's what I see when I show ip interface vlan 51
PHX_Core_Switch #show ip interface vlan 51
State of the Routing Interface... Down
Primary IP address... 10.200.51.1/255.255.255.0
Routing mode... Enable
Administrative mode... Enable
NET before realized emissions... Disable
Proxy ARP...................................... Enable
Local Proxy ARP... Disable
Statement of assets... Inactive
MAC address... 5C26.0AF9.9E8C
Type of encapsulation... Ethernet
IP MTU......................................... 1500
Bandwidth...................................... 10000 Kbps
Destination unreachable... Activated
ICMP redirects... ActivatedWhy the interface is down? Help? I'm going nuts here!
Just got off the phone with Dell technical support. They could not understand either, we have created a new 60 VLANS and it came fine and worked exactly as planned.
Maybe it's a bug in the Firmware 3.3.3.3.
-
Transit VLAN on the PowerConnect 6224
I need help to sort out a problem with routing on a 6224 we have configured to act as a vlan transit for one of our branches. The general idea is 8.143 is the vlan of transit, of 8.144 is our PC LAN 8.145 will be our VOIP lan.
We have installed this switch with our WAN provided last week, but had to get out. Traffic seemed to happen to the WAN providers to our transit interface VLAN (172.22.143.254) wasn't going anywhere. It's symptoms
(1) we could ping from 172.22.144.x to 172.22.145.x and 172.22.143.x
(2) we could ping from 172.22.145.x to 172.22.143.x and 172.22.144.x
(3) we could ping from 172.22.143.x to 172.22.144.x and 172.22.145.x
(4) if I was plugged into the 6224 on with an address 143.x I could ping our remote control does site at 172.22.8.x no problem but not 144.x or 145.x
(5) 172.22.8.x, I couldn't ping 144.x or 145.x or 143.1 (I could ping 143.254 which is EXTENDED to suppliers to our switch network interface)
Here's the running to the switch configuration. Any suggestions would be greatly appreciated:
Console > activate
Console execution #show
! Current configuration:
! Description of the system "PowerConnect 6224, 3.3.6.4, VxWorks 6.5.
! 3.3.6.4 system software version
! Passage mode is configured as disabled
!
Configure
database of VLAN
VLAN 143-145
VLAN routing 143 1
VLAN routing 144 2
VLAN routing 145 3
subnet of VLAN association 172.22.143.0 255.255.255.0 143
subnet of VLAN association 172.22.144.0 255.255.255.0 144
subnet of VLAN association 172.22.145.0 255.255.255.0 145
output
battery
1 1 member
output
DHCP IP address
IP routing
IP route 0.0.0.0 0.0.0.0 172.22.143.254
interface vlan 143
Name the "Transit".
routing ip address 172.22.143.1 255.255.255.0
output
interface vlan 144
name "TWLAN".
routing ip address 172.22.144.1 255.255.255.0
output
interface vlan 145
the name "VOIP" routing
IP 172.22.145.1 255.255.255.0
output
level of 746f7a78621059d80fdc538acc40cbf2 user name 'admin' password encrypted 15
!
interface ethernet 1/g1
switchport mode general
VLAN allowed switchport General add 143
output
!
interface ethernet 1/g2
switchport mode general
VLAN allowed switchport General add 143
output
!
interface ethernet 1/g3
switchport mode general
VLAN allowed switchport General add 144
output
!
interface ethernet 1/g4
switchport mode general
VLAN allowed switchport General add 144
output
!
interface ethernet 1/g5
switchport mode general
VLAN allowed switchport General add 145
output
!
interface ethernet 1/g6 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g7 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/8 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g9 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g10
switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g11 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g12 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g13 switchport mode General General switchport vlan allowed output adds 145! General mode of interface ethernet 1/g14 switchport
switchport general allowed vlan add exit 145! interface ethernet 1/g15 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g16 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g17 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g18 switchport mode General switchport General allowed vlan add 145
output! interface ethernet 1/g19 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g20 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g21 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g22 switchport mode General switchport General allowed vlan add exit 145
! interface ethernet 1/g23 switchport mode General General switchport vlan allowed output adds 145! interface ethernet 1/g24 switchport mode General switchport General allowed vlan add to exit 145
Console #.
It seems that port 1 must be in the VLAN 143, not general mode access mode. You already have a static route in place on the PowerConnect switch which directs traffic to the next break in the network. But it may be necessary for a place on the Cisco that allows to direct traffic to the PowerConnect switch.
Here is a good post to look through also.
http://en.community.Dell.com/support-forums/network-switches/f/866/t/19506015.aspx
-
VLAN between 2 powerconnect 6224 using XFP modules
Dear friends,
I have 2 switches powerconnect 6224 interconnected using optical fiber and XFP ports on the rear panel of the switch.
There is no configuration of the battery between them.
The distance between the two switches is 500 metres and they both work correctly when you use the vlan by default (use of the LAN)
I created a virtual LAN using 2 ports on a firewall and I created the same vlan on the second firewall, but I can't see a VLAN traffic goes to the other.
Also, I tried to configure the port as trunk but same result.
The vlan works very well in a single switch, but traffic is not able to flow to the second switch.
You have an idea why does not?
Maybe is not posible to have VLANs using xfp connections...
Any idea would be greatly popular.
Thanks in advance!
Rear ports are labeled xg1, 2, 3, 4. So, if the connection is made using the xg1 on a single switch for xg1 on the other switch. Then you enter interface 1/xg1 and make configuration changes.
-
To set up a new VIRTUAL local network to separate the common workstation network and obtain new DHCP scope, I had a few questions and found advice in the post of http://en.community.dell.com/support-forums/network-switches/f/866/t/19370806.aspx?PageIndex=3 but now I find that my traffic is not going through properly so I'm starting a new thread to get help shows all of working.
Current primary network 192.168.1.0/24 (192.168.1.200 DHCP server). Adding new perspectives to the server for 192.168.3.0/24 active.
Gateway default 192.168.1.0/24 is 192.168.1.254 (Cisco ASA, it was set up like that when I arrived and no room to insert the dedicated router). Adding route to 192.168.3.0/24 > 192.168.1.253 (PC6224 and VLAN 1 management interface). I also added exceptions NAT asa for the 192.168.3.0 network.
I was still having some problems of scathing to the 192.168.3.0 network from the DHCP server and I added a static route on the server for this network, bypassing the ASA for routing to the switch.
From the DHCP server, I am able to ping 192.168.1.253, 192.168.3.254 but not a laptop that runs Windows XP configured with 192.168.3.1 address connected to port 22 of the 6224.
The XP laptop, I am able to ping 192.168.3.254 but not 192.168.1.253 or any other address in the 192.168.1.0 network.
The switch CLI, I am able to ping on both networks destinations.
Here is my config of switch. I have it set to scrape factory reset so there is no buried old ACL inside.
console #show run
! Current configuration:
! Description of the system «PowerConnect 6224P, 3.3.5.5, VxWorks 6.5»
! 3.3.5.5 system software version
! Passage mode is configured as disabled
!
Configure
database of VLAN
VLAN 2
VLAN 2 1 routing
outputIP 192.168.1.253 255.255.255.0
by default-gateway IP 192.168.1.254
IP - domain.local domain name
name-server IP 192.168.1.11
name-server IP 192.168.1.200
IP routing
IP helper-address 192.168.1.200 dhcpinterface vlan 2
name 'common '.
Routing
192.168.3.254 IP address 255.255.255.0
IP netdirbcast
bandwidth 10000
business assistance-address IP 192.168.1.11
field of IP helper-address 192.168.1.200
IP helper-address 192.168.1.200 dhcp
IP mtu 1500
outputl2relay DHCP
DHCP l2relay vlan 2
!
interface ethernet 1/g21
switchport access vlan 2
output
!
interface ethernet 1/g22
switchport access vlan 2
output
!
interface ethernet 1/g23
switchport access vlan 2
output
!
interface ethernet 1/g24
switchport access vlan 2
output
-
6224 does not get to the internet on vlan-111
Unable to get to the internet, ran tracert, and when it does respond it shows 192.168.98.254 as next hop. not good.
On switch port 8 is vlan-1 management port 192.168.2.0/24
on switch port 5 is vlan-111 end-users 192.168.111.0/24
on switch port 21 is vlan-98 Mitel voip phones (not active yet) 192.168.98.0/24
Unable to get to the internet when on a Win2k8R2 server on switch port 5 vlan-111
running-config !Current Configuration:!System Description "PowerConnect 6224, 3.3.1.10, VxWorks 6.5"!System Software Version 3.3.1.10!Cut-through mode is configured as disabled!configurevlan databasevlan 98,111vlan routing 98 1vlan routing 111 2exitsnmp-server location ""snmp-server contact ""hostname "TS-1"stackmember 1 1exitip address 192.168.2.1 255.255.255.0ip default-gateway 192.168.2.254ip domain-name xxxxxx.netip name-server 192.168.111.2ip name-server 216.136.95.2ip host fs-bafb01 192.168.111.2ip host ln-bafb 192.168.111.3ip host tl-bafb 192.168.111.4ip routingip route 0.0.0.0 0.0.0.0 192.168.111.1interface vlan 98name "MITEL"routingip address 192.168.98.254 255.255.255.0exitinterface vlan 111name "111-END-USERS"routingip address 192.168.111.254 255.255.255.0exitusername "admin" password fd358f7bed5ecdd318abe6b925e513cc level 15 encryptedvoice vlandhcp l2relay!interface ethernet 1/g1switchport voice detect autodescription 'To_SRX220'switchport access vlan 111exit!interface ethernet 1/g2switchport voice detect autodescription 'To_TS3_Port26'switchport mode generalswitchport general allowed vlan add 98,111 taggedexit!interface ethernet 1/g3switchport voice detect autodescription 'To_MITEL_SYSTEM'switchport access vlan 98switchport forbidden vlan add 111voice vlan 98exit!interface ethernet 1/g4switchport voice detect autodescription 'To_TS2_Port26'switchport mode generalswitchport general allowed vlan add 98,111 taggedexit!interface ethernet 1/g5switchport voice detect autoswitchport access vlan 111exit!interface ethernet 1/g6switchport voice detect autodescription 'To_LN_BAFB_ETH0'switchport access vlan 111exit!interface ethernet 1/g7switchport voice detect autodescription 'To_TL__PortETH0'switchport access vlan 111switchport forbidden vlan add 98exit!interface ethernet 1/g8switchport voice detect autoexit!interface ethernet 1/g9switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g10switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g11switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g12switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g13switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g14switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g15switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g16switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g17switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g18switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 111switchport general allowed vlan add 98 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g19switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 98,111 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g20switchport voice detect autoswitchport mode generalswitchport general pvid 111switchport general allowed vlan add 98,111 taggedswitchport general allowed vlan remove 1exit!interface ethernet 1/g21switchport voice detect autodescription 'To_FS__Port_ETH01_VLAN98'switchport access vlan 98exit!interface ethernet 1/g22no negotiationspeed 10switchport voice detect autodescription 'To_T4_Port10'switchport mode generalswitchport general allowed vlan add 98,111 taggedexit!interface ethernet 1/g23no negotiationspeed 10switchport voice detect autodescription 'To_W7_Port10'switchport mode generalswitchport general allowed vlan add 98,111 taggedexit!interface ethernet 1/g24no negotiationspeed 10switchport voice detect autodescription 'To_W6_Port10'switchport mode generalswitchport general allowed vlan add 98,111 taggedexit!interface ethernet 1/xg1switchport voice detect autoexit!interface ethernet 1/xg2switchport voice detect autoexit!interface ethernet 1/xg3switchport voice detect autoexit!interface ethernet 1/xg4switchport voice detect autoexit!interface port-channel 1switchport voice detect autoexit!interface port-channel 2switchport voice detect autoexit!interface port-channel 3switchport voice detect autoexit!interface port-channel 4switchport voice detect autoexit!interface port-channel 5switchport voice detect autoexit!interface port-channel 6switchport voice detect autoexit!interface port-channel 7switchport voice detect autoexit!interface port-channel 8switchport voice detect autoexit!interface port-channel 9switchport voice detect autoexit!interface port-channel 10switchport voice detect autoexit!interface port-channel 11switchport voice detect autoexit!interface port-channel 12switchport voice detect autoexit!interface port-channel 13switchport voice detect autoexit!interface port-channel 14switchport voice detect autoexit!interface port-channel 15switchport voice detect autoexit!interface port-channel 16switchport voice detect autoexit!interface port-channel 17switchport voice detect autoexit!interface port-channel 18switchport voice detect autoexit!interface port-channel 19switchport voice detect autoexit!interface port-channel 20switchport voice detect autoexit!interface port-channel 21switchport voice detect autoexit!interface port-channel 22switchport voice detect autoexit!interface port-channel 23switchport voice detect autoexit!interface port-channel 24switchport voice detect autoexit!interface port-channel 25switchport voice detect autoexit!interface port-channel 26switchport voice detect autoexit!interface port-channel 27switchport voice detect autoexit!interface port-channel 28switchport voice detect autoexit!interface port-channel 29switchport voice detect autoexit!interface port-channel 30switchport voice detect autoexit!interface port-channel 31switchport voice detect autoexit!interface port-channel 32switchport voice detect autoexit!interface port-channel 33switchport voice detect autoexit!interface port-channel 34switchport voice detect autoexit!interface port-channel 35switchport voice detect autoexit!interface port-channel 36switchport voice detect autoexit!interface port-channel 37switchport voice detect autoexit!interface port-channel 38switchport voice detect autoexit!interface port-channel 39switchport voice detect autoexit!interface port-channel 40switchport voice detect autoexit!interface port-channel 41switchport voice detect autoexit!interface port-channel 42switchport voice detect autoexit!interface port-channel 43switchport voice detect autoexit!interface port-channel 44switchport voice detect autoexit!interface port-channel 45switchport voice detect autoexit!interface port-channel 46switchport voice detect autoexit!interface port-channel 47switchport voice detect autoexit!interface port-channel 48switchport voice detect autoexitsnmp-server community public ro ipaddress 192.168.111.9exit
I didn't imply that you need another switch. In my example of switch 2 is your firewall.
Maybe you are looking for
-
Hello Could someone give me some information about whether it is possible to use the NEITHER USB-6501 As a generator PWM to control the dimming of 18 power LED function? calendar is not so relevant and if the pulse width can be controlled in the PC i
-
Why used my montior come in clear?
now the image on the monitor will not come in anr clear I have not now what to try his similar ive got high contrast... ??
-
ppg7wm - 82589 m-mfpwlk-60sl03 appears during the test drive. Help, please!
ppg7wm - 82589 m-mfpwlk-60sl03 appears when the hard drive test. Help, please!
-
Envy 17-j130ea (F7T68EA?): fingerprint reader
I've already owned a desire to 15 (etc.), which had a fingerprint reader work (perfectly). I gave my son and bought the 17-j130ea for me. The new machine has the upper housing to the fingerprint reader, but it became obvious from the BIOS, and materi
-
Phone of blackBerry Smartphones does not recognize contacts
I downloaded my sim contacts on my pearl 9105, but if I get a text from one of them the phone does not recognize the number. Their name does not come to the top, only his number and it is difficult / impossible to remember dozens of phone numbers lea