the redundant switch configuration

We have a site with two servers of ESX4.  Both servers have networking configured like this:

vmnic0 is plugged into a switch and vmnic2 is connected to another switch.  However if the vmnic0 switch is plugged breaks down all closed virtual guest machines.  Any ideas what I am doing wrong?

However if the vmnic0 switch is plugged breaks down all closed virtual guest machines.

You have VMware HA?

Set response of isolation 'leave the virtual machine' and check how much time is needed to move to the other switch.

But tuning configuration of the switch (for example with RSTP), you can reduce this time.

Then you can put this time (better if you double it) in HA advanced settings and re-enable the response of isolation.

André

Tags: VMware

Similar Questions

  • Connect the redundant switch

    Hello

    I have several Dell 2724 switches that I would like to set up redundantly.

    I joined two 2724 s with a trunk. I would now like to connect the access switch with one connection to each of the two switches to shared resources. One cable in switch1 everything works. Put the second cable switch2 and all breaks loose.

    Option1 = Switch2 (LAG)

    \       /

    Switch3

    Can someone tell me if it works and how?

    Thank you

    This kind of configuration can operate with switches that offer spanning tree or MLAG. But the 27xx series switches do not offer these features. With this type of installation, there is a loop that will cause a continual broadcast storm that will wreak havoc on the network. Your best form of redundancy will link redundancy switch, but you will not be able to get the redundancy of switch with 27xx switches.

    Switch1 SWITCH2

    \\       //

    Switch3

    Or

    Option1 = Switch2

    //

    Switch3

    Or

    Option1 = Switch2

    \\

    Switch3

    See you soon

  • The virtual switch configuration

    Hello

    I configured Vswitch on ESX4.0 connected with a teddy bear.

    There are Cisco catalyst 4503 L3 switch configured with several VLANS at the other end. I have configured the switch port trunk with dot1q encap mode that ends on the ESX4.0 server. Service console is configured with IP default VLAN, which is accessible from the other VIRTUAL networks. One of the virtual machine with Win2k3 OS is installed, but after configuration, I am not able to ping default gateway of VLAN respective or any other property intellectual VLAN.

    Can anyone guide me where I go wrong and how to correct the problem?

    Set the Group of ports to the VLAN specific you want the virtual machine to be on.  Do not put any VLAN ID in the virtual machine, just plug it into the port group.  If you have other virtual machines, or other on this virtual machine network interface cards that need to connect to the other VLAN create other Port groups for each VIRTUAL local area network required.

  • Can WOL while the port is configured to authenticate through ISE

    Hi all

    I tried setting up WOL

    The L3 switch configuration I have no problem in it

    Configuration of the L2 switch without configuration of ISE

    interface fa0/1

    switchport access vlan 100

    switchport mode access

    spanning tree portfast

    It works well, but after that I put the ISE configuration on the port, WOL is not working.

    so please help can I use ISE + WOL or there will be problems because of that.

    I read a custom ' authentication control direction in "which should enable ISE and WOL.

    then, which will affect on something.

    Thank you.

    Yes, that's correct. If you add the command "authentication control-direction in" on a switchport then he will allow the "Magic Packet" WoL should be sent to the unit of the end and wake him up.

    By default, a switchport configured to dot1x will only allow EAP traffic initially to the switchport (thereby breaking WoL) you don't need to add the command "authentication control-direction in" to allow WoL functionality to continue working while ensuring that the endpoint can still only send EAP frames to the switchport prior authentication of 802. 1 x.

  • Aggregation of links ESXi requires the configuration of the physical switch?

    Hello

    I have two physical servers that I'll put up with ESXi. Each server has eight physical network cards. My plan is on each server to use:
    -2 management - connected to vSwitch0
    -2 for VMotion - connected to vSwitch1
    -2 for iSCSI - connected to vSwitch2 (I'll use a SAN)
    -2 to access VM network - connected to vSwitch3

    For each pair, a cable should be connected to switch1 and the second would be plugged into switch2.

    The switches are HP A5120 which are stacked into a big switch with RFID. for example I have a 'big' switch which, if one of the two physical switches dies or is turned off, would cause the 'great' switch to lose half of its ports. In this way, all four networks are expected to continue to operate even if a switch "dies."

    All the information I found online said that ESXi can have two physical cards attached to a unique vSwitch and can then do things smart for redundancy (in which case a physical NETWORK card dies) and load balanacing.

    However, while all the guides tell me how to configure it on ESXi, I'm still not sure if I should combine the two cables on the physical switches.

    So, my questions are:

    (1) in order to get the NIC or balancing working in ESXi, redundancy do I have to combine two physical ports that will connect connect two physical ports that connect to the vSwitch?

    (2) with the consolidation of NETWORK cards, I see how to have an active adapter for the management network, and an auxiliary card works fine, but for the iSCSI network, I wouldn't have only two active adapters for double the bandwidth?

    Any ideas would be much appreciated.

    Thank you.

    (1) in order to get the NIC or balancing working in ESXi, redundancy do I have to combine two physical ports that will connect connect two physical ports that connect to the vSwitch?

    No, there is no need to configure etherchannel/LACP but this will depend on the type of load balancing, you click on the ESXi host - if you use by default, you don't need to configure Etehrchannel/LACP since traffic for each virtual network interface will be only com ove a single physical port, but you will always have the reiciliency to the case where if one of the physical NIC fails traffic then released the remaining port

    If you select the hash of the IP load balancing, you must then implement Etherchannel/LACP on your physical switch since traffice can come form any physical port in the team.

    (2) with the consolidation of NETWORK cards, I see how to have an active adapter for the management network, and an auxiliary card works fine, but for the iSCSI network, I wouldn't have only two active adapters for double the bandwidth?

    Onece well once again it will depend on the Load Balancing method, you select, but you will never be able to create links physical ports to get all of the 2 GB =

    I also moved it to a more appropriate forum-

  • The correct configuration on the redundancy help

    Hello

    We have a VMware ESXi 3 hosts 4.1 with two Equallogic ps4000 infrastructuer, an AIRLOCK and one with SATA drives.

    It is connected with 2 switches, where everything is connected, so redundancy "should" work.

    On ESXi server, we have 8 network ports, in vCenter, we used 2 NICs for the management and vmotion, 2 for iScsi traffic and 2 for network access VLAN.

    Some time ago, one of our switches failed, and all the VM rebooted because they lose the connection, 2-3 minutes later they came back on the use of the other switch, but it should not happen. I did a little research and discovered that perhaps consolidation of NETWORK cards has not been configured no doubt.

    On vSwitch 2 where will my Iscsi traffic, I used a VMkernel port on both network adapters, it should work, right? What have I done wrong? Someone has an idea, what configuration should be placed on the consolidation of NETWORK cards to do this work.

    After a bit of trouble, I clicked on change properties on vSwitch 2, clicked VMkernel port ISCSi, hget to exepotions political in nic teaming configuration. Failover detection network: Link status notification only, switches: Yes, the failback: No.

    When I disconnected the cable, vmwares worked, when I unplugged the swich, RM of vm. I heard when using network cards, should I create the vmkernel ports on this vswitch using redundancy, is this true? I also thought that the ISCSI port group traffic would inherit the rights of the nicteaming, but this happens for some reason any. Someone has an idea of this network which is the best practice, when you configure the redundancy with multiple cards in vCenter?

    Thx for all the help.

    Bit of an old thread, but in the possibility it has not been resolved, here's your answer:

    With Equallogic units, you will need to configure a vmkernel by physical uplink port.

    1 vSwitch

    2 unique physical network (vmnic3, for example vmnic4) cards

    2 vmkernel ports

    -vmk1-> override set failover of vmnic3 active and vmnic4 unused

    -vmk2-> override unused vmnic4 set failover active and vmnic3

    Bind the vmkernel ports to the iscsi hba software and configure storage.  To improve the performance set up frames on all vswitches, switches and vmk.

  • The proSafe (JGS524E + GS116E) Switches: Configuration Management Web GUI in VLAN specific

    Hello

    I use a JGS524E and a GS116E. The two are connected via a 802. 1 q uplink with all defined VLANS in him.

    A 802. 1 q other interfaces goes to a pfsense firewall, which serves as a router and dhcp server for each VLAN that I use.

    How can I configure the switches plug are in one VLAN specific and get his IP address of the dhcp server in this VLAN?

    At present, it seems to be random access: it is not predictable that range from intellectual property, it takes its IP configuration via dhcp...

    How management function works internally?

    Thank you

    Markus

    Hello

    Thank you. I tried it out, but the behavior seems to be a little different:

    I configured a static IP address for the switch (10.1.0.13 / 24). I have access to the switch web gui via the ip address of the host of a host directly connected (connected via a trunk port, where I put 1 VLAN on the trunk), but it is all the same, what VLAN that I use:

    When it is connected to the VLAN 1 I have access, but also through 10 VLANS, VLAN 20 and so forth (assumed, I configure my computer appropriate staticly in the IP network, for example 10.1.0.20 / 24). So it seems not be limited only to the VLAN 1. You have access to each vlan, only the IP configuration must be in the same network.

    I'm not sure, how it behaves when cascading the two switches, I have not tried.

    If this information can be useful for other users with the same question about this switching product line.

    For me, this behavior is not very well implemented from my point of view. For security reasons, you must limit access to the administration, for example by allowing access from a specific hardware port or a vlan. With the effective implementation, centralized management for a cascade topology is not easy to set up, perhaps because the behavior is not very clear and not documented in the manuals.

    Mentioned on the edge: there is no available TLS/SSL encryption when accessing the web gui (not https). So the password is transmitted in clear text... not a very good idea, I think.

    Thanks a lot for your help.

    Best regards

    markusd112

  • IviSwitch loses value when sending, "configure the switch" configuration = TRUE

    Hi all

    We are currently assessing Teststand 4.1 with a multimeter keithley 3706 switch system.

    After a first enthusiasm, thinking this tool with the meter switch fits perfectly our needs, real life seems difficult.

    Between several other problems, we must say to the device, the channel "s1com1" and "s1com2" are strings of configuration.

    Configure the teststand step: change the switch step IVI-> IVI, switching, configuration switch: channels "s1com1" Configuration = True

    led to observable in both actions in Ni Spy:

    GetAttributeViBoolean (..., "s1com1", _IS_CONFIGURATION_CHANNEL, VI_FALSE)

    SetAttributeViBoolean (..., "s1com1", _IS_CONFIGURATION_CHANNEL, VI_FALSE)

    manually call to this function of the interactive a CVI fp class works as expected (the VI_TRUE updated)

    Is there any hint that we could do wrong? Currently, we are just before writing wrappers in cvi and jump all the wonderful Types of IVIStep in teststand.

    Looking forward to any comments

    David Clus

    David-

    This would have the same problem we discovered recently in our internal tests. For the problem that we found, we will probably include our fix in a next corrective patch. You can check if the problem persists if you change your locale in English in the control panel? If the problem no longer occurs, can you use this as a workaround for now?

  • As redundant N3024 switch configuration

    Dear all,

    Hi, I just get N3024 Dell as a main switch and X 1026 access.

    I try to create the topology like this:

    VLAN 10: 10.10.10.xxx/24

    VLAN 20: 20.20.20.xxx/24

    VLAN 30: 30.30.30.xxx/24

    VLAN 40: 40.40.40.xxx/24

    Just try using the interface vlan each switch.

    Switch:

    IP routing

    interface VLAN 10

    10.10.10.1/24 IP address

    The interface VLAN 20

    20.20.20.1/24 IP address

    The interface VLAN 30

    30.30.30.1/24 IP address

    Interface port 2

    switchport mode trunk

    B switch:

    IP routing

    interface VLAN 10

    10.10.10.2/24 IP address

    The interface VLAN 20

    20.20.20.2/24 IP address

    The interface VLAN 30

    30.30.30.2/24 IP address

    I think that my config is far from complete and not best practices...

    My question is, what should I configure on each N3024 Dell, so all them VLAN can connected to the Internet? (can create the support for the ip address of the Sonic Wall port)

    Please please need your help.

    Thanks before.

    -The VRRP VLAN must be the same on both switches.

    -That the master switch must have control of the track in place.

    -The connection between the switch and the firewall must be that it is own VLAN and does not part of VLAN VRRP.

    Here is a diagram that I put in place, it could help clear up some confusion.

  • LAG does not not after more Guide of switch Configuration for EqualLogic San steps in the document.

    We use the information provided in the following document: i.dell.com/.../dell-networking-n4000-series-switch-configuration-guide-for-equallogic-sans.pdf

    We have two switches of N4032F which are stacked and followed almost word for Word from this document.  We do not use DCB.  We are trying to set up a SHIFT and follow-up step 2.11 in the document, but it seems that the SHIFT does not work.

    Switch 1:

    serial interface fortygigabitethernet 1/1/1-2

    No spanning tree portfast

    active in mode channel-group 1

    Switch 2:

    interface series fortygigabitethernet 2/1/1-2

    No spanning tree portfast

    active in mode channel-group 2

    However, when it was discovered after changing these settings it shows them as being inactive.

    Can someone please help?

    Thank you

    Jeff

    Thanks for the additional information. When the switches are stacked, they act as a logical switch. Then when you plug with an OFFSET you are basically creating a loop and hook up a switch on himself. Desempilement switches and just use the OFFSET for the interconnection of the switch and you should see the GAL go active.

  • Configuration of the L3 Switch to send the traffic to Palo Alto

    Please forgive my ignorance when it comes to Palo Alto. This is the first time that I do business with them. We need to ensure one VLAN located behind the Palo Alto. I am including a diagram to show a simulation of what we seek to do. We have by default VLAN1 which is our default data VLAN. We have 19 VLAN is VLAN we want it secure. The VLAN1 SVI IP is 10.1.1.1 and VLAN19 SVI IP is 10.1.2.1. On the Palo Alto, we have an IP interface was like 10.1.1.2 for default data VLAN and 10.1.2.2 for the VLAN secure. There are also a pair of HA with IPS 10.1.1.3 and 10.1.2.3 respectively. We have EIGRP that announces the network default VLAN1. Here's what we want to do. Anything from the 10.1.1.x network, go to the 10.1.2.x network, must pass through the Palo Alto. Whatever either from the 10.1.2.x network, must go through the Palo Alto as well. Nothing to any other network 10.1.1.x, takes the route by default (and), and anything from 10.1.2.x to anything else on 10.1.2.x should stay local to the LAN (not pass through Palo Alto. Need just for the MAC address arp). My question is, how do I tell my L3 switch to send all traffic created in the 10.1.2.x, through the Palestinian Authority? I can't do an IP route because from the local network VIRTUAL lives on these L3 switches and is a directly connected route. Really, I can't do the ACB on the switch, because that is really meant to routers. I can put a long match, for everything on the 10.1.2.x network (i.e. the route ip 10.1.2.7 255.255.255.255 10.1.1.2), but for some reason when do whatsoever of 10.1.2.x another thing goes on 10.1.2.x through the palo alto so. Anyone have any suggestions on what would be the best practice, from a network perspective, on how to do this? Thanks for any help!

    Looks like you want all traffic to and from the secure virtual local network to pass through the firewall of your description?

    I'm not familiar with Palo Alto firewall is so I don't know how they work in HA, IE. with other devices do you want to simply talk to a VIP which is responsible for two firewalls?

    In your example the two firewalls have an IP address per vlan, but always just use you one IP addresses for the end-end connectivity. I'll assume that you do, you may need to change, but when I say that I mean the one that reminds you of the devices for routing etc..

    So for all the traffic to and from the network 10.1.2.0/24 to go through the firewall, you must-

    (1) remove the battery switch the IVR for vlan 19. You need the firewall to be routing vlan not secure the 3750 s. You leave vlan 19 in the database for vlan.

    (2) point them vlan 19 customers as default gateway

    (3) addition of a route on the stack of 3750 for the network 10.1.2.0/24-

    IP route 10.1.2.0 255.255.255.0

    (4) if the 10.1.2.0/24 network needs to talk to other that 10.1.1.0/24 remote subnets, then for each of these networks the firewall should be a route. The syntax will not be IOS, but this should give you an idea-

    IP 10.1.1.1 road

    etc... for each remote network

    That means foregoing is all the traffic going and coming from 10.1.2.x customers to other subnets must go through the firewall. The customer traffic in the vlan secured to other clients in the vlan safe doesn't have to go the firewalls.

    Jon

  • issue of redundant switches ESX

    Hi guys,.

    Please help me to clarify this point.

    I enclose a simple diagram showing the configuration.

    Question: Do I need to connect the two switches in order to get the VM1 VM2 talk and vice versa and offer redundancy switch?

    Thank you!

    Hello

    Yes, I think that for your diagram and design, there is no redundancy.

    Imagine host2 loses the connection to switch1.

    If host1 sends all traffic through switch1, never land on two host. You bought two switches for redundancy haven't you?

    A server can detect when a directly connected path failed. For example, in the above situation, host2 will send everything to the switch2 he knows is online. But a server cannot fail 'upstream '.

  • Best practices for the redundancy of the network in vSphere 4

    I'm running a cluster of production with 3 3850 m2 running at this time around 70 machines virtual, with more to come in the future.

    I have 6 CARDS each to use for networking.

    I'm not sure which is the best award of the NICs process.

    The redundancy for the VMKernel can I?

    Team for the Service Console NIC?

    I currently have the following:

    vswif0 Console of Service vmnic0

    vswif1 network of the VM vmnic3, 4, 5

    vswif2 VMotion vmnic1, 2 (different subnet)

    I have need of 3 NICs for the virtual machine or should I team the Service Console?

    It would be better to put a second Service Console on the Virtual Network machine's power switch, or do I have to put it on the switch of VMotion?

    My prefereence is for VMotion switch, but I'm ready to hear the recommendations of those wiser than me!

    I have 8 currently

    2 > SC (1 active, 1 standby on separate physical switches)

    3 > VMotion, FT, customer iSCSI PG (Etherchannel) MTU = 9000

    3 > VM PG VLAN (Etherchannel)

    previous to this, I had 4 I did:

    2 > SC, (2 active) VMotion, VST (vSwitch VLan Tagging)

    2 > VM (2 active) VLAN, VST (vSwitch VLan Tagging)

    Saw some problems with STP so separated back SC.

    6 as you do it sounds like a very good Setup.

    (2) SC, VMotion (active on each, Eve for each)

    (4) networking VM

    Don't forget that just them having active only effects not inbound traffic coming out unless you have all these ports in an Etherchannel configuration.  There is an example in the kB for this.  But depends on the amount of traffic all VM networks have if they network traffic a lot you could get by with less ports there.

    The SC definatally you want some kind of uplink port intelligence network as with ESX SC with HA ports check insulation network through these ports, so if this one is down which could lead to problems of isolation.  It's not like you'll do any FT? so it's something else to think about with the installation program.

  • 7000 R as point of access one using the integrated switch

    I use the first 7000 R as a router and the second 7000 R as an Access Point. I can even if need the integrated switch of one Access Point is this switch automatically connect with the same netzwork?

    Marcel

    You can use all of the ports on the R7000 in AP mode. They are in the same network. If your access point is configured properly on the ports of the AP devices, should receive a valid IP address / gateway to the Base R7000 (DHCP server). You could even hang it cut one of thos ports, if you wanted to... Make sure that you are running at least cable CAT5e Ethernet between the R7000 AP and the Station of Base R7000 to connect the two devices.

  • Network with Airport Extreme problems connected to the Linksys switch

    I have a wired network in my house.  It has the following configuration: Modem base station Airport Extreme for Linksys switch and then all wired connections.  It is in a wiring closet in a room upstairs.  I have 2 other extremes from the airport, to spread out of the range, but they are currently disabled and disconnected from the network until I have found why I get auto ip address on several of my wired connections.  I have reset the modem, EI and switch.  More wired connections seem to be working very well, but there are 4 or 5 who say that the ethernet cable is connected, but it can not connect to the internet because of a self assigned ip address.  I thought maybe it was a problem with the port of the switch, but when I plugged a cable work in, everything worked again.  Thus, for example, on my iMac, in a study downstairs, I had plugged on the ethernet port in the wall.  He let me only to connect to wireless internet.  He says the ethernet connection had a self assigned ip.  I went upstairs and took the cable from the switch and directly connected to the Airport Extreme, and then connect to this iMac worked fine via ethernet.  So I'm really confused as to why it does not work when it is connected to the switch.  Why are only a few connections ethernet works and others not?

    Any help would be greatly appreciated.

    Why are only a few connections ethernet works and others not?

    Because either you have a bad port on the switch (unlikely, but possible) or a wired Ethernet connection bad, or maybe both ends of several of the Ethernet cables (99% of the time, the problem is in the wiring or connectors Ethernet... not the switch).

    But, we must test the switch first and then work from there.  It might be much easier to call a guy from wire or the custom installation specialist to do all this for you, but if you want to give it a try... Here's how.  It is not difficult at this stage, just take some time.

    Unplug the switch except the Ethernet cable that connects the AirPort Extreme to each cable Ethernet switch.  Label each Ethernet cable with a number or a letter you can install the wires in their original position on the switch.

    Use of a laptop computer with an Ethernet port and a short, spare Ethernet cable... virtually no matter what length will make... and turn off the WiFi on the laptop so it should use Ethernet to connect to Internet.

    Test an Ethernet port on the switch with the laptop and the Ethernet cable to make sure that you have get a good Internet connection. If you do so, test the next port of the switch. Continue until all ports of the switch has been tested.  With luck, they will all work.

    If this is the case... which is likely... then you know that the Ethernet switch is working properly.

    Now things get a little more complicated. Ideally, you have documentation that tells you what Ethernet cable goes to what area of the House. If you don't, just connect the Ethernet cable to the switch... then go to the other end of the Ethernet cable to the wall outlet and connect the computer laptop and short Ethernet cable to the wall socket.

    If you have no documentation to indicate where each cable goes, so go ahead and connect all the Ethernet cables to the switch.

    Still, make sure that the wireless is disabled on the laptop so that it can only connect to the Internet via an Ethernet connection. Check if you can get a good connection Internet in this way. If you can, then you know that the individual Ethernet cable and the Ethernet port on the wall are working properly...

    Test other areas one at a time the same way.  You are very likely going to find Ethernet cables or a wall of ports that do not work properly. The hardest part here is that you... or a wire guy... will have to check the Ethernet cable at both ends to ensure that the Ethernet Sockets have been installed correctly.  It is not easy. The wires are tiny and its easy to get involved.  Installation of new Ethernet cards, it's really a job for an experienced guy who will provide hopefully a cable Tester well when it comes.

    Some Ethernet will certainly be replaced.  In rare cases, the cable itself has a break somewhere... and it's not easy to fix something like this, without pulling new cable... that would not be possible according to the House provision.

    When you know that all ports on the switch are working and all ports Ethernet wall around the House work... so... we can get the network set in place and working properly.

Maybe you are looking for