PowerConnect 2716 default VLAN1 trunkable switch?

Compared to my other question (http://en.community.dell.com/support-forums/network-switches/f/866/t/19537080.aspx), I wanted to know if I put 1 LAG VLAN 1 I will be able to manage the switches through the trunk because it is not marked? I'm assuming that only tagged packets would cross the switches as I had set on the frame Type LAG1: admit Tag only, default 1 VLAN is untagged, and when I tried to change my PVID for port one at the time to use a new VLAN (I created 11 hoped trunk web management) I altogether lost access to web management.

I think I remember reading somewhere before that 1 Port must always be in the VLAN 1 / 1 PVID in order to access the web administration gui, I'd rather be able to manage the two switches to a single cable to my management station and keep them off the network. (I am unable to test the trunk at the moment that I can't change the live environment until a maintenance window 25)

Management accessible only VLAN 1. If you only allow packets marked and then unmarked VLAN 1 pass, if you let packets not marked, you can be able to make it work, but only if you have other devices on the VLAN 1 on the other end of the trunk, and all not marked traffic communicated. Unfortunately this switch has the capacity as our most end switches run management on any VLAN or have a dedicated management port.

Tags: Dell Switches

Similar Questions

  • Has anyone set up a trunk between switches PowerConnect 2716 and Intellinet 523554?

    I have a client who has three switches Intellinet 523554 in the core switches and various on the edge, including a PowerConnect 2716 switch. The firewall is a Sonicwall, which is plugged into one of the Intellinet switches, and there are three new SonicPoints that plug in the PowerConnect switch. To the best of my knowledge, even if X 0 (LAN) and X 2 (WLAN) are related to the SonicWall, I need to keep these separate networks. If I plug them both in the VLAN 1, network crashes (I presume due to a storm of broadcasting). On all switches, I created 2 VLANS, left 1 VLAN not identified and configured the appropriate access and if necessary junction ports. Two types of switches use the web-based configuration and it is just not a lot of parameters to be set. VLAN 1 traffic goes OK on the trunk, but VLAN 2 does not work. I'm not familiar with the configuration of the Intellinet switches, so I sent an email into their support. Unfortunately, for the chutes, that's what the rest of the world calls aggregation of links, so I have no help from them yet. I am quite confident that the configuration is as good as it can get.

    Has anyone else tried this and been successful? Any thoughts? The PowerConnect switch runs 1.0.1.07 firmware. Thank you

    The marking of VLAN is the feature you're looking for, 802. q. 1, Page 10 of the user guide describes in detail the configuration of VLANS on switches Intellinet.

    Assets.mhint.S3.amazonaws.com/.../523554_manual.pdf

    Page 50 of guide the user to the 2716

    FTP.Dell.com/.../PowerConnect-2716_User%27s%20Guide_en-US.pdf

    Hope this helps

  • PowerConnect 5324 default factory reset

    Hello

    I have a Dell PowerConnect 5324 and I need to reset it to factory settings.

    I am facing difficulties to connect the switch cable to the Console, the following has been done

    1. I tried 2 difrent console cables

    2 - I tried 2 difrent computers

    3 - I tried Hyperterminal & PuTTY

    4 tried default 9600, N, 8, 1 and many more combinations

    5 - made sure SCROLL LOCK is OFF

    The spectacle of hyperterminal connected but I can't figure anything...

    Double entry not funcion and I am not able to access the switch.

    How can I resolve this more? What should I do in this case?

    THX

    Hello

    Can you telnet to it? You can access the web GUI? If you can access the switch in a different way, you can reset to the factory settings by deleting the configuration of start and reloading. For the console, you need a null modem or crossover RS-232 cable.

  • Cannot access the IP by default with the switch Cisco SF200 - 24 p

    Hello, I just bought Cisco switch SF200-24, but I can't access to switch with default address IP 192.168.1.254.

    I set up my laptop 192.168.1.4 and connect to the Port No. 1 but I can't ping too.

    anything you can help me please.

    Hello

    Quick Start Guide:

    To access the switch using the web interface, you must know the IP address of the switch uses. The switch uses the default IP of default 192.168.1.254.
    When the switch is using the default IP address, the system LED flashes continuously. When the switch uses an address IP assigned server DHCP or an administrator has configured a static IP address, the system LED is lit (DHCP is enabled by default).

    You see the system LED flashes constantly?

  • How to remove the default setting to switch the field in Word format codes

    Maybe I changed the settings for the field codes and all my links now appear as full description i.e. {HYPERLINK http://www.microsoft.com} instead of www.microsoft . com

    Well, if I just select and press SHIFT + F9, I can switch, but I don't want to appear in the first place.

    Please suggest!

    Open Word, click on the "round", select "Word Options", go to "Advanced", scroll down to the section "Display the content Document" and uncheck "Show codes field instead of their values".

    HAL
    --
    HAL Hostetler, TCE
    Engineer senior/UPDATED--MS MVP-Print/Imaging - WA7BGX
    www.kvoa.com - KVOA television, Tucson, AZ.
    Live Hot Licks - www.badnewsbluesband.com

  • PowerConnect M6220 problem without tag switch of VLAN

    Good afternoon.
    I do not have much knowledge of networks and need help.
    M6220 have this connected to a HP ProCurve switch switch connected by a trunk.
    My problem is that I can not pass the 10 untagged procurve VLAN to the M6220 switch, can you help me?
    M6220 has firmware version 1.
    Thank you

    On a network connection VLAN native is the VLAN used to send and receive packets not marked. Here is an example of the configuration.

    Console (config-if-article gi1/0/1) #interface item in gi1/0/24
    trunk mode console (config-if-article gi1/0/24) #switchport
    Console (config-if-article gi1/0/24) #switchport trunk vlan 10 native
    trunk allowed vlan #switchport console (config-if-article gi1/0/24) add 10,11,12,13

    If trunk mode does not work, you can also try to use the general mode.

    Console (config-if-article gi1/0/1) #interface item in gi1/0/24
    mode console (config-if-article gi1/0/24) general #switchport
    Console (config-if-article gi1/0/24) #switchport general pvid 10
    Console (config-if-article gi1/0/24) #switchport general allowed vlan add 10 untagged
    Console (config-if-article gi1/0/24) #switchport general allowed vlan add 11,12,13 tag

    Hope this helps

  • Dell Powerconnect 6224 Default VLAN VLAN reference and management

    Hello

    two questions-

    1. what exactly he wants to tell the VLAN by default is not routable or VLAN 1 is not routable? I can connect to my 6224 a different subnet and its got nothing configured except default values and an IP address to this VLAN

    2. I have a stack of 2 x 6224 s, 95% completed and all on the default VLAN 1. I won't use VLAN 1. So I create a VLAN 10 and "range Ethernet all interface ' followed ' switchport access vlan 10"»

    Now I can not connect on the network. That's happened? How can I move everything cleanly on VLAN 10 and it is possible via the network or must it be done with a cable from the console?

    Thank you

    Hello, by default, the management interface is in VLAN 1, if you want to she be changed to VLAN 10 please use the command 'ip address vlan 10' in the Setup mode and check the status of management interface using the command 'show ip interface '.

  • Questions about N3024 switch by default - originate BGP

    Here is the configuration of the two switches.  I set up and rising BGP, passing of prefixes.  I want 1 switch to send a default gateway to switch 2 and have the default installation of command on the next statement are created.  I don't see the 0.0.0.0 route by default in the show ip bgp sum command, but which is detailed in the configuration guide.  However, I don't see a default route 0.0.0.0 in the routing table for switch 2 at all and an error message that there is no default route available.  Would I be missing here?

    Config is below:

    SWITCH 1

     

     

     

     

    Configure

    VLAN 50

    output

    VLAN 50

    name "switchtest".

    output

    hostname "Switch_1.

    location 1/0 1! Dell network N3024

    battery

    1 1 member! N3024

    output

    IP routing

    !

    loopback interface 1

    IP 10.0.0.1 address 255.255.255.255

    IP ospf area 0

    output

    interface vlan 1

    DHCP IP address

    output

    interface vlan 50

    172.16.0.1 IP address 255.255.255.252

    IP ospf area 0

    output

    router ospf

    router ID 10.0.0.1

    10.0.0.1 network 255.255.255.255 area 0

    network 172.16.0.0 255.255.255.252 area 0

    output

    !

    item in gi1/0/1 interface

    Description 'Switch '.

    switchport access vlan 50

    output

    Server SNMP engineid local 800002a203f8b1566f36c4

    router bgp 65001

    router BGP 10.0.0.1 ID

    172.168.0.0 netmask 255.255.255.252

    10.0.0.1 netmask 255.255.255.255

    172.16.0.2 neighbor remote - as 65002

    neighbor 172.16.0.2 are created by default

    output

    output

    Switch_1 #show ip bgp

    BGP table version is 7, local router ID is 10.0.0.1

    Status codes: s removed, * valid, > best, i - internal

    Source codes: i - IGP, e - EGP? -incomplete

    Network Next Hop metric LocPref path origin

    ------------------- ---------------- ---------- ---------- ------------- ------

    * > 172.16.0.0/30 172.16.0.2 1 100 65002 I

    * > 192.168.100.0/30 172.16.0.2 1 100 65002 I

    * > I have 10.0.0.1/32 0.0.0.0 1 100 I

    * > 10.0.0.2/32 172.16.0.2 1 100 65002 I

    Switch_1 #show ip bgp sum

    IPv4 routing... Enable

    BGP Admin Mode... Enable

    BGP router ID... 10.0.0.1

    Local AS number... 65001

    Traps ......................................... Disable

    Maximum paths... 1

    Maximum paths IBGP... 1

    Default Keep Alive Time... 30

    Default hold time... 90

    Number of entries of network... 4

    Number of PATHS... 1

    Default metric... Not configured

    Advertise default route... NO.

    Redistribution:

    Dist metric list of source route map

    --------- ---------- -------------------------------- --------------------------------

    Neighbor ASN MsgRcvd MsgSent State down time Pfx Rcvd

    ---------------- ----- -------- -------- ------------- -------------- ---------

    172.16.0.2 65002 78 82 ESTABLISHED 0:00:23:24 3

    Switch_1 #show ip route

    The traffic code: R - RIP derived, O - OSPF derived, C - connected, S - static

    B - Derived E - from outside, AI - BGP OSPF Inter zone

    E1 - OSPF external Type 1, E2 - OSPF external Type 2

    N1 - OSPF NSSA external Type 1, N2 - OSPF NSSA external Type 2

    S U - unnumbered Peer, L - flight road

    * Indicates the best route (the lowest metric) for the subnet.

    No default gateway is configured.

    *10.0.0.1/32 C [0/1] directly connected, Lo1

    B *10.0.0.2/32 [20/1] via 172.16.0.2, Vl50

    10.0.0.2/32 [110/11] via 172.16.0.2, Vl50

    *172.16.0.0/30 C [0/1] directly connected, Vl50

    B 172.16.0.0/30 [20/1] via 172.16.0.2, Vl50

    B *192.168.100.0/30 [20/1] via 172.16.0.2, Vl50

    192.168.100.0/30 [110/20] through 172.16.0.2, Vl50

    SWITCH 2

    Configure

    VLAN 50 100

    output

    VLAN 50

    name "SwitchTest".

    output

    VLAN 100

    name of the 'Switch '.

    output

    hostname "Switch_2".

    location 1/0 2. Dell network N3024F

    battery

    1 2 Member! N3024F

    output

    IP routing

    !

    loopback interface 0

    output

    !

    loopback interface 1

    10.0.0.2 IP address 255.255.255.255

    output

    interface vlan 1

    DHCP IP address

    output

    interface vlan 50

    IP 172.16.0.2 255.255.255.252

    IP ospf area 0

    output

    interface vlan 100

    IP 192.168.100.1 255.255.255.252

    output

    router ospf

    router ID 10.0.0.2

    10.0.0.2 network 255.255.255.255 area 0

    network 172.16.0.0 255.255.255.252 area 0

    network 192.168.100.0 255.255.255.252 area 0

    output

    !

    interface item in gi1/0/23

    switchport access vlan 100

    output

    !

    interface item in gi1/0/24

    Description 'Switch '.

    switchport access vlan 50

    output

    Server SNMP engineid local 800002a203f8b156530097

    router bgp 65002

    router BGP 10.0.0.2 ID

    172.16.0.0 netmask 255.255.255.252

    192.168.100.0 netmask 255.255.255.252

    10.0.0.2 netmask 255.255.255.255

    neighbor remote - as 65001 172.16.0.1

    output

    output

    Switch_2 #show ip bgp

    Version of BGP table is 9, local router ID is 10.0.0.2

    Status codes: s removed, * valid, > best, i - internal

    Source codes: i - IGP, e - EGP? -incomplete

    Network Next Hop metric LocPref path origin

    ------------------- ---------------- ---------- ---------- ------------- ------

    * > I have 172.16.0.0/30 0.0.0.0 1 100 I

    * > I have 192.168.100.0/30 0.0.0.0 1 100 I

    * > 10.0.0.1/32 172.16.0.1 1 100 65001 I

    * > I have 10.0.0.2/32 0.0.0.0 1 100 I

    Switch_2 #show ip bgp sum

    IPv4 routing... Enable

    BGP Admin Mode... Enable

    BGP router ID... 10.0.0.2

    Local AS number... 65002

    Traps ......................................... Disable

    Maximum paths... 1

    Maximum paths IBGP... 1

    Default Keep Alive Time... 30

    Default hold time... 90

    Number of entries of network... 4

    Number of PATHS... 1

    Default metric... Not configured

    Advertise default route... NO.

    Redistribution:

    Dist metric list of source route map

    --------- ---------- -------------------------------- --------------------------------

    Neighbor ASN MsgRcvd MsgSent State down time Pfx Rcvd

    ---------------- ----- -------- -------- ------------- -------------- ---------

    172.16.0.1 65001 83 82 ESTABLISHED 0:00:24:32 1

    Switch_2 #show ip route

    The traffic code: R - RIP derived, O - OSPF derived, C - connected, S - static

    B - Derived E - from outside, AI - BGP OSPF Inter zone

    E1 - OSPF external Type 1, E2 - OSPF external Type 2

    N1 - OSPF NSSA external Type 1, N2 - OSPF NSSA external Type 2

    S U - unnumbered Peer, L - flight road

    * Indicates the best route (the lowest metric) for the subnet.

    No default gateway is configured.

    B *10.0.0.1/32 [20/1] via 172.16.0.1, Vl50

    10.0.0.1/32 [110/11] via 172.16.0.1, Vl50

    *10.0.0.2/32 C [0/1] directly connected, Lo1

    *172.16.0.0/30 C [0/1] directly connected, Vl50

    *192.168.100.0/30 C [0/1] directly connected, Vl100

    Switch_2 #show ip route 0.0.0.0

    The traffic code: R - RIP derived, O - OSPF derived, C - connected, S - static

    B - Derived E - from outside, AI - BGP OSPF Inter zone

    E1 - OSPF external Type 1, E2 - OSPF external Type 2

    N1 - OSPF NSSA external Type 1, N2 - OSPF NSSA external Type 2

    S U - unnumbered Peer, L - flight road

     * Indicates the best route (the lowest metric) for the subnet.

    No default gateway is configured.

    No route found.

    Solution:

    Dell switches need to be turned on in the config.

    router bgp * AS number *.

    default-information originate always

  • Ill at 5.5 VLAN switch distributed

    Begging for a little help. It's my first knife to set up a VLAN on an ESXi 5.5 Distributed Switch. I'm used to the physical switches... Dell & Cisco...

    Installation program:

    Firewall

    > > WAN1 [5 x static IP] > > WAN to the firewall

    > > WAN2 [1 x, DHCP] > > WAN to the firewall

    > > LAN1 "VMnet" 10.x.1.x/24 > > Firewall > Port1 on Dell PowerConnect 2748 (switch is not compatible trunking)

    > > LAN2 "WiFi" 10.x.2.x/24 [adapter Wireless Firewall]

    > > VLAN1 Switch1 Port1 'tag 'ESXiNet' [VMkernel + vMotion] 10.x.3.x/24' > > Switch1, Port 14 "Untagged."

    > > Port 14 on Switch1 attends Port2 on Switch3 [Dell PowerConnect 2716]

    > > Port 2 on Switch3 is 'tag', 3-16 Ports are not all "marked" and all go direct to VMkernel NIC card pairs for redundancy.

    > > VLAN2 "OfficeNET' 10.x.4.x/24 Switch1 Port1 to Switch1 LAG1 [Ports Switch1 15 & 16] > > Switch2 Ports 1 and 2 as"Gal1"[Dell PowerConnect 2724]

    > > VLAN3 'AdminNet' 10.x.5.x/24 Switch1 Port1 to Switch1 Ports 40-48

    Problem is that I have a VLAN that comes out of my Dell PowerConnect 2748 switch and enter an ESXi host. VLAN is #99. If I connect a laptop directly into the switch I get an IP DHCP correctly of the switch address on this VLAN. If I plug this LAG (or individual port if I break upwards the LAG) in my ESXi hosts can't pass the VIRTUAL local area network via the distributed switch.

    You are looking for assistance. Hope that the above explanation makes sense. Just trying to get one VLAN through a switch distributed to a virtual machine.

    Sorry for the bug to the community with this configuration. It seems that it was my fault... or my mistake. I got it setup properly from the start... For all those who in the future that concludes this thread...

    Firewall VLAN # 100 > Switch Port 01 (tag) > Group GAL 1 [15 & 16 switch ports] (unidentified) > ESXi host LAG (default configuration for VLAN Trunking 0 - 4094) > Distributed port group nec VLAN #100.

    The problem is that I have restart the physical switch and Firewall [Physics] but not the host ESXi, DS or virtual machines. Because the VMs system had been on before configuration changes their network cards were shooting a null IP and without release and renew their, they have been stuck without the IP DHCP VLAN address. I didn't enter the VMs (2012r2 server operating system) system and disable the network adapters and then enable them. They then shot the IP address of the subnet assigned to the VLAN.

    Stupid mistake but at least it is resolved.

  • Try to access 3 switches Dell - 5212 1 & 2 5324

    I have 1 PowerConnect 5212, & 5324 2 switches that the previous admin left no configuration information for (at least they were labeled before the INVESTIGATION period). Tried to reach out to the previous admin, no luck for now. Having said that, without doing a full reset to factory default (thus annihilate all the default configurations that are possible on these switches) can I do with them? I'm sure they have a configuration of vlan / etc otherwise I would just wipe them off. What are the default for these switches identification & information anyway that I can maybe get even the username in use on these if I can try wildly random passwords?

    Thank you!

    On some switches, the start menu will have a password recovery procedure. This should be a time to access the switch, you can then copy the configs and edit the user credentials.

    worth looking in, hope it helps.

  • Configuration of the L3 Switch to send the traffic to Palo Alto

    Please forgive my ignorance when it comes to Palo Alto. This is the first time that I do business with them. We need to ensure one VLAN located behind the Palo Alto. I am including a diagram to show a simulation of what we seek to do. We have by default VLAN1 which is our default data VLAN. We have 19 VLAN is VLAN we want it secure. The VLAN1 SVI IP is 10.1.1.1 and VLAN19 SVI IP is 10.1.2.1. On the Palo Alto, we have an IP interface was like 10.1.1.2 for default data VLAN and 10.1.2.2 for the VLAN secure. There are also a pair of HA with IPS 10.1.1.3 and 10.1.2.3 respectively. We have EIGRP that announces the network default VLAN1. Here's what we want to do. Anything from the 10.1.1.x network, go to the 10.1.2.x network, must pass through the Palo Alto. Whatever either from the 10.1.2.x network, must go through the Palo Alto as well. Nothing to any other network 10.1.1.x, takes the route by default (and), and anything from 10.1.2.x to anything else on 10.1.2.x should stay local to the LAN (not pass through Palo Alto. Need just for the MAC address arp). My question is, how do I tell my L3 switch to send all traffic created in the 10.1.2.x, through the Palestinian Authority? I can't do an IP route because from the local network VIRTUAL lives on these L3 switches and is a directly connected route. Really, I can't do the ACB on the switch, because that is really meant to routers. I can put a long match, for everything on the 10.1.2.x network (i.e. the route ip 10.1.2.7 255.255.255.255 10.1.1.2), but for some reason when do whatsoever of 10.1.2.x another thing goes on 10.1.2.x through the palo alto so. Anyone have any suggestions on what would be the best practice, from a network perspective, on how to do this? Thanks for any help!

    Looks like you want all traffic to and from the secure virtual local network to pass through the firewall of your description?

    I'm not familiar with Palo Alto firewall is so I don't know how they work in HA, IE. with other devices do you want to simply talk to a VIP which is responsible for two firewalls?

    In your example the two firewalls have an IP address per vlan, but always just use you one IP addresses for the end-end connectivity. I'll assume that you do, you may need to change, but when I say that I mean the one that reminds you of the devices for routing etc..

    So for all the traffic to and from the network 10.1.2.0/24 to go through the firewall, you must-

    (1) remove the battery switch the IVR for vlan 19. You need the firewall to be routing vlan not secure the 3750 s. You leave vlan 19 in the database for vlan.

    (2) point them vlan 19 customers as default gateway

    (3) addition of a route on the stack of 3750 for the network 10.1.2.0/24-

    IP route 10.1.2.0 255.255.255.0

    (4) if the 10.1.2.0/24 network needs to talk to other that 10.1.1.0/24 remote subnets, then for each of these networks the firewall should be a route. The syntax will not be IOS, but this should give you an idea-

    IP 10.1.1.1 road

    etc... for each remote network

    That means foregoing is all the traffic going and coming from 10.1.2.x customers to other subnets must go through the firewall. The customer traffic in the vlan secured to other clients in the vlan safe doesn't have to go the firewalls.

    Jon

  • What switch do you recommend

    Hello

    Brief description of our environment...

    x 1 poweredge R720 with x 4 network ports for iSCSI
    x 2 poweregde R710 with x 4 network ports for iSCSI
    x 1 poweregde R610 with x 2 network ports for iSCSI

    x 2 PS6100E EQL
    x 2 PS4100E EQL
    x 2 PS6000 EQL
    X 4 PS5000 EQL

    Everything is distributed evenly between two floors of the building by using SyncRep and regular replication on the EQL boxes and using a VMware HA and DRS cluster on hosts.
    Physically separate networks for iSCSI network and production.

    We use 5448 powerconnect on the iSCSI network switches. One PC5448 for each floor and they are connected with x 4 fiber LACP trunk link.

    I know that these switches have to be replaced, but what? PC6248, PC7048 or Force10? Perhaps even another manufacturer? If so which model? The price IS a decisive factor, I don't have the budget for expensive stuff

    Check the support matrix Equallogic to get an idea of what switches are validated and supported / recommended. It is not limited only the Dell switches (Cisco, Juniper and Brocade options listed there).

    First, you'll want to upgrade to double switches on each floor and LACP together. You can stack them, but this has the drawback that if ever you want to / need to upgrade the firmware of the switch in one or both of the rooms, you'll need 100% service interruptions in this room.

    In my next part I'll stick to switches Dell since it is a Dell message board.

    I would skip the PC6200 series unless your budget can not install a switch better. The 6200 is a decent switch, but it's on its way out (this can be seen by the fact that Dell has not updated the firmware on the switch since the 3.3 series (all 7 k and higher switches are now on a firmware 5.x).) The Force10 S25 series is better than this PC7024 a switch, but if you plan to switch to 10 GB at some point, you may consider a pair of 8132 s PowerConnect in each room. The non - F version uses RJ45 ports that can make 1Gbit and 10 GB, then you can use to start just the current units of EQL, but new units could be 10Gbit units. You want to get the QSFP + optional modules for each switch and 2 wires for each pair, so you can use these 2 40Gbit LACP ports switches set in each room.

    If you want to use a LACP between the 2 rooms consisting of two switches, you have a more difficult choice to make; stack the switches (with the disadvantage that I mentioned above), or upgrade to Force10 S4820s that these offer the possibility to make a channel of port on 2 non-Stack switches (PowerConnect firmware does not offer this).

    Cisco and Brocade offer similar characteristics (to execute a LACP on 2 switches non-Stack), but I do not know what exact firmware and/or switches that would offer.

  • Default gateway question

    Our topology is quite simple. We have a set of 7048 switches connected to a Watchguard firewall. The switches have a couple VLAN routed together via the L3 switch stack. Currently, telephones and workstations all use their ip address vlan respective as default gateway (perfect) but the internal firewall (confidence) IP address is in the same subnet as the vlan primary and this ip address is the default gateway of switches (this cannot be good...).

    I don't want my firewall to do so I guess I need to create a 30 routing inter - vlan subnet as an uplink to the firewall. Everyone did this with a similar L3 switch and a firewall Watchguard XTM?

    I'm not familiar with one of these devices. It seems that you can't even create a routed on the L3 switch interface...

    You have the right idea, create a common VIRTUAL local network between the stack and the firewall that is on a different subnet than the rest of the traffic.

    On 7048 stack, you create a VLAN for this connection. Name it and IP address assignment.

    Console (config) # vlan database

    VLAN console(config-VLAN) # 2

    output console(config-VLAN) #.

    Console (config) # interface vlan 2

    Console # name FirewallConnection

    Console (config - vlan) #ip address 10.10.10.1 255.255.255.252

    Then the port that connects to the firewall should be included in the access mode for the VLAN.

    Console (config) # interface ethernet 1/g1

    Console # switchport mode access

    Console # switchport access vlan 2

    Then the same thing on the firewall. Creat VLAN, assign IP address, assign to connecting port.

    Keep us updated

    Thank you

  • VLAN with Switch L3 (SG-500)

    Hello

    I would like to know how to configure the VLAN in SG - 500 with its feature of L3 (switch, router).

    The switch is running in L2 mode and has a few hosts connected to him.

    Some questions I have:

    1. If I turn it on to L3 ( set system mode router ) what will happen to him? It will still work as a normal L2 switch as it is now, or I have to change some other configuration? Will be the current hosts?
    2. The switch must L3 run VTP for VLAN?
    3. What happens if the router is not a Cisco router (it's a SonicWALL)?

    Thank you in advance!

    Hi Vlad

    1. If you put the switch on set system router mode, it will default to the switch. Some features of strict l2 will disappear while some features of l3 will appear.

    2. the switch does not support construction

    3. the router isn't little matter, layer 3 is 3. Subnets, IP addresses and routes. Somethings are easier, but nothing is basically capable of doing.

    -Tom
    Please mark replied messages useful

  • How not to lose by default menu items?

    I have a screen that extends from screen and have created my own menu items. Now that the menu items I created appear in the menu. I would also like some of the default items, especially "switching applications", appears in the menu.

    How to include these default menu items?

    Thank you

    call super.makeMenu)

Maybe you are looking for