the VLAN ID Sun subnet

Hi all

Once a company has started the configuration on the san and vpshere.  I have a question what they were doing to my id of vlan vmkernel san, they chose ALL (4095).  Is this fair?  My subnet on the san is 20.10.70.x, I also put it on the same subnet or leave it like that?  I know that my settings are complicated since I'm on cisco switch advance 3750 I can do for any connection junction subnet on two switches and other switches are used to connect san.

Thanks for any comments, you can add...

This is not a common configuration - marking is usually in the Group of ports or virtual switch. The only reason why you would do this is if the labelling was performed at the level of the physical switch - personally I would configure the VLAN evenly everywhere, for all networks - management, production, iSCSI and vmotion etc. marking at the level of the virtual switch

Tags: VMware

Similar Questions

  • Configuration of VLAN 6248 - link IP subnet to the VLAN

    We have 200 node network with no VLAN (small private company that developed quickly)

    All nodes / devices / etc. of PCs spread evenly over 6 Dell 5448 switches with no regard for the Department, location or usage.

    (1) L3 is 6248 - we've added 6248 route VLANs (everything is on VLAN 1 still - i.e. without marking)

    (2) L2 several VLANS by switch - the best of cases, 2 VLANS by 5448

    (3) trunk / general uplink L2 s 5448 using LAG (44, 45 ports) - should be labelled all traffic, but since it will be a conversion / migration on an e-commerce network 24 x 7, we thought that we would have to do uplink between 5548 s and 6248 General and changes to the trunk later

    (4) for the conversion, all uplinks of trunk/general will have several VLANs marked as vlan1 untagged traffic

    (5) we know fixed us every VLAN gateway IP to the IP address of 6248 maintenance the VLAN, but can't decide how to proceed with no one-to-one correspondence of VLAN LAG uplink

    Questions on 6248

    Q1: we would use "bind the IP subnet to the VLAN ' the 6248 to configure routing between VLANS or do we define the belonging to a VLAN by LAG?

    Q2: would we be able to ping the IP of the bridge VLAN configured in the 6248 a down host link / node / PC marked for the same VLAN?

    Any suggestions would be most appreciated.

    On the 6248 allowing to the VLAN routing you must just ensure each VLAN has an IP address assigned to it:

    Console (config) #interface vlan 5

    Console (config - vlan) #ip address 192.105.1.1 255.255.255.0

    Then enable routing on the switch:

    Console (config) #ip Routing

    That's all that needs to be configured on the 6248 for VLAN routing to work. One thing to take steps, is that on the 6248 the management VLAN is not routable. By default, the management VLAN is VLAN 1. Two options are to move the management VLAN a VLAN different:

    Console # configure

    Console (config) #ip address vlan 99

    Or not use VLAN 1 at all. Place traffic on other VLANs.

    The answer to your second question is Yes. With the VLAN routing enabled a customer to any what VLAN should be able to ping the gateway of the 6248.

    When it comes to generals and trunk mode. General mode is like a combination of access and trunk, you can send several VLANS not identified. General mode is most commonly used on the 6200 switches when connecting with the new switches, trunk sometimes doesn't connect when it is connected to a most recent switch. I suggest using the general mode on the 6248 and if it works, leave it in general mode.

    Here is a list of various white papers which all have some good info to have.

    http://en.community.Dell.com/TechCenter/networking/w/wiki/2580.networking-whitepapers.aspx

    6248 user's Guide

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-6248_User%27s%20Guide2_en-us.PDF

    6248 cli guide

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-6248_Reference%20Guide_en-us.PDF

    5548 user's Guide

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-5524p_User%27s%20Guide_en-us.PDF

    5548 cli guide

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-5524_Reference%20Guide_en-us.PDF

    Having to update firmware of the switch can help with interoperability.

    6248

    http://www.Dell.com/support/home/us/en/04/product-support/product/PowerConnect-6248/drivers

    5548

    http://www.Dell.com/support/home/us/en/04/product-support/product/PowerConnect-5548/drivers

    See you soon

  • Can not do anything on the VLAN ping on 6248

    Hello

    I've spent a day and a half trying to solve this problem, but I'm not getting anywhere. Here is a breakdown of the test configuration database.

    Port 1: Connected to the existing network (if I can get to the host ESXi from my PC)
    : 3 my ESXi host is connected to this
    Virtual machines are tag VLAN through port ESXi group properties.
    All VLANS have 1 VM except VLAN 10, which has 2.
    All the VLANS are IP address ending with 24 par.1 the subnet mask.
    All virtual machines have the corresponding default gateway pointing to the IP of the VLAN (XXX1)
    I am able to get the IP address of the DHCP server to different VLANS.

    Things that work:
    From a virtual machine, I can ping to IP of any VLAN (so MV in VLAN 10 can ping IP of the VLAN 20)
    The console, I can ping IP of any VLAN

    Things that DON'T work:
    The console, I cannot ping any computer virtual IP.
    From a virtual machine, I can not ping any address (including the virtual machines in the same VLAN)

    Here is my config running:

    ! Current configuration:
    ! Description of the system "PowerConnect 6248, 3.3.7.3, VxWorks 6.5.
    ! 3.3.7.3 system software version
    ! Passage mode is configured as disabled
    !
    Configure
    database of VLAN
    VLAN 10,20,30,40,50,300
    VLAN 10 1 routing
    VLAN 20 2 routing
    VLAN 30 3 routing
    VLAN routing 40 4
    VLAN 50 5 routing
    VLAN routing 300 6
    output
    unicast SNTP client enable
    customer survey SNTP 1024 timer
    SNTP server 0.north - america.pool.ntp.org
    clock timezone-7 minutes 0
    battery
    1 2 Member

    output
    IP 192.168.8.250 255.255.255.0
    default IP gateway - 192.168.8.230
    IP routing
    IP helper-address 10.80.10.10 dhcp
    interface vlan 10
    name 'server '.
    Routing
    IP 10.80.10.1 255.255.255.0
    output
    interface vlan 20
    name "printer - Switch."
    Routing
    IP 10.80.20.1 255.255.255.0
    IP helper 10.80.10.10
    output
    interface vlan 30
    name "Workstation".
    Routing
    IP 10.80.30.1 255.255.255.0
    IP helper 10.80.10.10
    output
    interface vlan 40
    name "phones".
    Routing
    IP 10.80.40.1 255.255.255.0
    IP helper 10.80.10.10
    output
    interface vlan 50
    name of the 'Camera '.
    Routing
    IP 10.80.50.1 255.255.255.0
    IP helper 10.80.10.10
    output
    interface vlan 300
    name "router".
    Routing
    IP address 192.168.1.250 255.255.255.0
    output
    user name 'root' password XXXXXXX level encrypted 15
    l2relay DHCP
    DHCP l2relay vlan 10,20,30,40,50
    !
    interface ethernet 1/g1
    switchport mode general
    output
    !
    interface ethernet 1/g2
    switchport mode general
    output
    !
    interface ethernet 1/g3
    spanning tree portfast
    switchport mode general
    switchport general allowed vlan add 10,20,30,40 tag
    output
    output

    Looking at the config on the switch, I can't predict whether the switch. The config is pretty basic, and the only way I guess whether the switch is if there were problems with the overall performance of the network. Love packages ignored, times of high ping, etc. Doing some research I found a few posts of blogs, KB and forum various with some things to look at what can help.

    http://msmvps.com/blogs/netman66/archive/2010/03/25/VMware-vSphere-4-client-slow-to-load-fixed.aspx

    http://KB.VMware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalID=1027836

    http://www.v-front.de/2011/07/improve-your-vSphere-clients.html

    http://KB.VMware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalID=1029665

    http://hardforum.com/showthread.php?t=1698368

    http://d1it.WordPress.com/2010/12/23/slow-vSphere-client/

    See you soon

  • Creation of the VLAN between Powerconnect 5548 and F10 s4810...

    In the coming months we will replace our network equipment.  I was able to get their hands on the new gear at the beginning, and if I'm not traditionally a guy from the network, the project has been given to me and I started playing.  The first thing that I wanted to work on was implemented VLANs.  I have configured the switches like the picture below:

    When I have IP every PC connected to the same subnet and apply VLAN10 to their respective ports, they aren't to pings within the same stack or between cells.  My basic understanding is that they are, do they not?  Did I miss something in my understanding of VLANS or is there a problem with my configs?  I posted the configs below.

    RTTMOACCESS01 config:

    database of VLAN
    VLAN 10,20,30,40,50
    output
    Add a voice vlan Yes-table Nortel___ 000181
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table Shoretel___ 001049
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    VLAN voice Yes-table add 00907 Polycom/Veritel_phone___
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    860 port address 0.0.0.0 iSCSI target
    port 3260 address 0.0.0.0 iSCSI target
    port 9876 address 0.0.0.0 iSCSI target
    port 20002 address 0.0.0.0 iSCSI target
    20003 port address 0.0.0.0 iSCSI target
    port 25555 address 0.0.0.0 iSCSI target
    hostname rttmoaccess01
    no console logging
    privilege 15
    !
    interface vlan 10
    Name IT
    !
    interface vlan 20
    name UserPCs
    !
    interface vlan 30
    name UserTCs
    !
    interface vlan 40
    the voice name
    !
    interface vlan 50
    Name printers
    !
    gigabitethernet1/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet1/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    gigabitethernet2/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet2/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag

    !
    Default settings:
    Service etiquette: 76BYTS1
     
    SW version 4.1.0.8 (28 August 2012 time 11:17:36)
     
    Gigabit Ethernet ports
    =============================
    Speed 1000
    full duplex
    negotiation
    flow control
    Auto MDIX
    no back pressure
     
    interface vlan 1
    interface port-channel 1-32
     
    spanning tree
    spanning tree mode RSTP
     
    basis of QoS
    QoS trust cos
    Enable IAS

    RTTMOACCESS02 config:

    database of VLAN
    VLAN 10,20,30,40,50
    output
    Add a voice vlan Yes-table Nortel___ 000181
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table Shoretel___ 001049
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    VLAN voice Yes-table add 00907 Polycom/Veritel_phone___
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    860 port address 0.0.0.0 iSCSI target
    port 3260 address 0.0.0.0 iSCSI target
    port 9876 address 0.0.0.0 iSCSI target
    port 20002 address 0.0.0.0 iSCSI target
    20003 port address 0.0.0.0 iSCSI target
    port 25555 address 0.0.0.0 iSCSI target
    hostname rttmoaccess01
    no console logging
    privilege 15
    !
    interface vlan 10
    Name IT
    !
    interface vlan 20
    name UserPCs
    !
    interface vlan 30
    name UserTCs
    !
    interface vlan 40
    the voice name
    !
    interface vlan 50
    Name printers
    !
    gigabitethernet1/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet1/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    gigabitethernet2/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet2/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    Default settings:
    Service etiquette: 76BYTS1
     
    SW version 4.1.0.8 (28 August 2012 time 11:17:36)
     
    Gigabit Ethernet ports
    =============================
    Speed 1000
    full duplex
    negotiation
    flow control
    Auto MDIX
    no back pressure
     
    interface vlan 1
    interface port-channel 1-32
     
    spanning tree
    spanning tree mode RSTP
     
    basis of QoS
    QoS trust cos
    Enable IAS

    Config RTTMOCORE

    ! Version 8.3.12.0
    ! Last modification of the configuration to Fri Jun 14 13:31:58 2013 default
    ! Startup-config updated Fri Jun 14 13:32:40 2013 default
    !
    start the primary system battery-unit 0: A:
    start a system secondary battery-unit 0: B:
    start the system stack-unit 0 default: A:
    start the primary system battery-unit 1: A:
    start a system secondary battery-unit 1: B:
    start the system default stack-unit 1: A:
    !
    redundancy full automatic synchronization
    !
    Hardware watchdog
    !
    no console logging
    !
    hostname rttmocore
    !
    disposal of battery-unit 0 S4810
    !
    stack-unit 0 battery-group 14
    !
    stack-unit 0 battery-group 15
    !
    interface TenGigabitEthernet 0/46
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    interface TenGigabitEthernet 0/47
    no ip address
    switchport
    FlowControl rx tx off
    no downtime

    disposal of battery-unit 1 S4810
    !
    stack stack-unit 1-group 14
    !
    stack stack-unit 1-group 15
    !
    interface TenGigabitEthernet 1/46
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    interface TenGigabitEthernet 1/47
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    !
    interface Vlan 1
    !
    interface Vlan 10
    Description IT
    Name IT
    no ip address
    Tagged TenGigabitEthernet 0/46-47
    Tagged TenGigabitEthernet 1/46-47
    Shutdown
    !
    interface Vlan 20
    Description UserPCs
    name UserPCs
    no ip address
    Shutdown
    !
    interface Vlan 30
    Description UserTCs
    name UserTCs
    no ip address
    Shutdown
    !
    interface Vlan 40
    Speech description
    the voice name
    no ip address
    Shutdown
    !
    interface Vlan 50
    Printers description
    Name printers
    no ip address
    Shutdown
    !
    Lldp Protocol
    !
    0 line console
    line vty 0
    line vty 1
    line vty 2
    line vty 3
    line vty 4
    line vty 5
    line vty 6
    line vty 7
    line vty 8
    line vty 9
    !
    end

    I would say lets start with one side and obtain communication of work between the two computers on the same stack at RTTMOACCESS01. The port settings for the 1/01 and 2/01 look great both in access mode for VLAN 10. Which IP addresses and subnets you assign to computers?

    5548 to battery power battery connection 10 also appear to not be in a LAG, then we run two connections like that and they aren't in a SHIFT, we create a loop and a single connection will enter a blocking state.

    For the connections between the 5548 and force 10, I suggest to turn them into a GAP. The command should look like this.

    Console > activate

    Console # configure

    Console (config) # (config) # interface tengigabitethernet 1/0/1

    Console (config) # port - 1 automatic mode group

    output console #.

    Console (config) #.

    Do the same for Te2/0/1

    Then we set up this OFFSET to set it up, and I would try to use the trunk instead of general mode mode.

    Console (config) # interface port-channel 1

    console switchport mode trunk #.

    console # permit trunk switchport vlan add 10,20,30,40,50 tag

    The same should be done for the Force switch 10.

    Te0/46.1/46 in a SHIFT

    Te0/47.1/47 in another SHIFT

    Put in the trunk and let the VLANS on the trunk.

    Allows to study these settings and see if we can make any progress.

    Thank you

  • Help with the VLAN routing

    I'm pretty green when I just went and routing configurations please bear with me.  I'm available what I want to achieve and what I could do until now (although it may be completely wrong).

    I have an office where we run low on IP addresses for our local network, the obvious answer is to get VOIP phones on their own subnet.  So, I have a switch PC6224 I want to use to create the second subnet.

    Existing Workstation LAN = 172.22.144.0 (255.255.255.0)

    Default GW for the LAN = 172.22.144.1 for all devices on that subnet

    I would like to create an IPPhone = 172.22.145.0 (255.255.255.0) subnet

    Here's what I have "Achieved" so far:

    Currently, I can ping from a client on 172.22.145.x to the 172.22.144.12 (VLAN 3 ip interface) but cannot ping any other 172.22.144.x that is not directly connected to the 6224 switch device.  Trying to ping the network 172.22.145.x device leave a device plugged into the 172.22.144.x VLAN on the switch of packets results was sent to the default gateway for the network (172.22.144.1) who does not know what to do with them.

    Here is my config of 6224 switch operation:

    Console execution #show
    ! Current configuration:
    ! Description of the system "PowerConnect 6224, 3.3.6.4, VxWorks 6.5.
    ! 3.3.6.4 system software version
    ! Passage mode is configured as disabled
    !
    Configure
    database of VLAN
    VLAN 2-3
    VLAN 2 1 routing
    VLAN 3 2 routing
    subnet of VLAN association 172.22.144.0 255.255.255.0 3
    subnet of VLAN association 172.22.145.0 255.255.255.0 2
    output
    battery
    1 1 member
    output
    IP address no
    IP routing
    IP route 0.0.0.0 0.0.0.0 172.22.144.1
    interface vlan 2
    name "IPPhone.
    Routing
    IP 172.22.145.1 255.255.255.0
    output
    interface vlan 3
    name "TWLAN".
    Routing
    IP 172.22.144.12 255.255.255.0
    output
    level of 746f7a78621059d80fdc538acc40cbf2 user name 'admin' password encrypted 15
    !
    interface ethernet 1/g3
    switchport access vlan 3
    output
    !
    interface ethernet 1/g4
    switchport access vlan 3
    output
    !
    interface ethernet 1/g5
    switchport access vlan 2
    output

    !
    interface ethernet 1/g6
    switchport access vlan 2
    output
    !
    interface ethernet 1/g7
    switchport access vlan 2
    output
    !
    interface ethernet 1/g8
    switchport access vlan 2
    output
    !
    interface ethernet 1/g9
    switchport access vlan 2
    output
    !
    interface ethernet 1/g10
    switchport access vlan 2
    output
    !

    interface ethernet 1/g11
    switchport access vlan 2
    output
    !
    interface ethernet 1/g12
    switchport access vlan 2
    output
    !
    interface ethernet 1/g13
    switchport access vlan 2
    output
    !
    interface ethernet 1/g14
    switchport access vlan 2
    output
    !
    interface ethernet 1/g15
    switchport access vlan 2
    output
    !
    interface ethernet 1/g16

    switchport access vlan 2
    output
    !
    interface ethernet 1/g17
    switchport access vlan 2
    output
    !
    interface ethernet 1/g18
    switchport access vlan 2
    output
    !
    interface ethernet 1/g19
    switchport access vlan 2
    output
    !
    interface ethernet 1/g20
    switchport access vlan 2
    output
    !
    interface ethernet 1/g21
    switchport access vlan 2

    output
    !
    interface ethernet 1/g22
    switchport access vlan 2
    output
    !
    interface ethernet 1/g23
    switchport access vlan 2
    output
    !
    interface ethernet 1/g24
    switchport access vlan 2
    output
    output

    Console #.

    Any help would be greatly appreciated.

    Thanks, Grant

    What port connects to 172.22.144.1 the jump according to the internet?

    What should happen is we need a VLAN 'remote' separate just for the connection between the 6224 and your 172.22.144.1 jump following the internet device.

    If 172.22.144.1 remains the same, then you must create another local network VIRTUAL to "TWLAN".  Eventually, VLAN 4 with a range of ip addresses of 172.22.146.1 - 254 255.255.255.0.  Where the VLAN 4 interface has an IP address defined as 172.22.146.1.  Once that all connected devices again VLAN 4 that were in the VLAN 3 need to change there IPs and gateway 172.22.146.1

    So the only port that has configuration of VLAN 3 is the connection to 172.22.144.1 port next to the internet break.  The IP address defined on the interface VLAN 3 should be in the same subnet as 172.22.144.1 range.

    Here is a diagram that can help you to see the whole upward.  VLAN 100 in the diagram represent VLAN 3 in your case.  Switch 2 would represent your device from the internet of next hop.

  • How to configure the VLAN for Cisco SG500 - switch 28

    Hello

    First of all, it's my first post here, I hope that someone can help me and please be patient because I am very little known.

    OK, so let me explain to you the scénarion I face and I hope someone can help me.

    We have a Cisco SG500 - 28 port gigabit switch in our workplace.

    Our goal is to create 3 VLANs and separate networks between the various departments.

    Vlan1 (which is the default VLAN in the switch)-will be used for the COMPUTER service and management.

    VLAN100 - will be used for business.

    VLAN200 - will be used for clients who need to connect to internet via WiFi.

    I created VLAN100 and VLAN200, and VLAN1 is there by default.

    I want to use port 13 for VLAN200 and to connect the-Wifi access point there.

    The uplink is in port 25.

    I would be happy if you could explain things first to a more general, abstract level, and then we can look at the specific scenario that we have.

    SG500 Cisco - 28 Gets a Sophos UTM 9 router internet.

    I need to take care of the inter - VLAN routing so, subnet and DHCP

    Thanks in advance,

    Sincere greetings,

    D

    Hi Desmond, looking at this DHCP pool it looks correct.

    For the second part, you waant VLAN 200 only work on VLAN 200, that's fine. So if you have an access point, and everything on the VLAN 200 connects to the access point, you can make an access to this list. The access list is entered only, which means the inbound interface.

    So if you have a gateway connecting to #1 port. You'll need to build the access list and apply it to port number 1. That's assuming you make a list of access 'decline' subnet source IP of VLAN 200 destined for the other subnet, that you do not want access.

    The image on another post to fill out your reference numbers, then for the ACL link, it should be placed on the interface VLAN 200 first comes to the switch (IE, the port the access point connects, make sure that you choose to bind by port instead of per VLAN)

    -Tom
    Please mark replied messages useful
    http://blogs.Cisco.com/smallbusiness/

  • SF300 Questions of the of the VLAN IP address

    I bought 3 SF300-48 switches to work AP1131AG Aironet wireless with my APs. I have now spent 1 VLAN for all to have a Guest_Wireless VLAN 200 as well as the default VLAN 1 for my Corporate_Network. The question that I have is that any client on my default VLAN receives an IP address from the DHCP Windows Server without problems, but when you connect to the guest VLAN you can't obtain an IP address.

    So, I also have a Cisco 3560 G Router (default gateway) which has the same Aironet AP1131AG AP connected to it with the same config as additional points of access files and it works perfectly. I can connect to each SSID wireless (Corp. Vlan1 or comments Vlan 200) and get the IP address of the DHCP server.

    I also have the network below plan and was seeking help in the SF300 configuration to allow the IP to get on the subnet, Vlan 200. I also tried to connect my laptop directly in the SF300 and configure the port to access the Vlan 200 and I still can't an IP address.

    Any help would be appreciated...

    Aaron

    Hi aaron, on the 3560, the port mode is defined as the encapsulation dot1q and one vlan specified native? Also, for the SF300 vlan natif native is 1, you tag vlan 200 to the trunk?

    The Catalyst switch works differently than the SX300 switch in this sense.

    Note also, will not attend the VTP SX300 or PAO.

    -Tom
    Please evaluate the useful messages

  • Problem with the VLAN routing

    I try to put in place several VLAN on a Cisco 3560 switch. These new segments must be able to communicate with the VLAN 1 and even Internet access. I managed to add the VLAN and have network connectivity between the new VLAN.  However, these VIRTUAL to VLAN1 networks routing was not working properly.  Certainly something is missing or correct in this configuration. It would be much appreciated if someone can shed some light. Thanks in advance.

    Basic IP information:

    • Gateway 10.1.1.2
    • VLAN1: 10.1.1.1/24
    • VLAN2: 10.1.2.1/24
    • VLAN3: 10.1.3.1/24

    What works:

    • Hosts in VLAN 1 can ping the DG and access the internet
    • LAN 2 and 3 communicate with each other.  Hosts in VLAN2 (e.g. 10.1.2.2) can ping hosts in VLAN3 (e.g. 10.1.3.2) on the same switch
    • Hosts in VLAN 2 and 3 can ping to the IP of VLAN1 (10.1.1.1) interface

    What does not work:

    • Hosts in VLAN 2 and 3 cannot ping hosts in VLAN 1 on the same switch, or vice versa.
    • Hosts in VLAN 2 and 3 cannot even ping the DG.

    Yched blocks my post if I understand the config.  I'm sorry that I have to include it as an attachment.

    We have no information on the DG - what it is, how it is configured.  It is likely:

    1. unknown subnet vlan2 and vlan3 ranges.  Therefore can not to return packages for them.

    2. the default gateway for vlan1 customers is 10.1.1.2, so when customers vlan1 are trying to answer to vlan 2, 3, packets is directed to a DG, which probably ONLY has a default route to the Internet.

    3. once it is somehow solved (extra static on DG), Internet for vlan 2.3 will require same NAT rules with respect to the vlan 1.

  • Client access in the VLAN with Any Connect

    I configured a router 1841 for SSL VPN and it works very well, the client connects and downloads all connect and then I create a VPN.  The question I have is that I have two VLAN on the router, the default VLAN 1 and 4 of VLANS on a void interface.

    The customer I can ping the IP sup and I can ping all IP addresses on a client in the vlan defautl, ping ends by request timed out so this suggests that the packet to the destination and fell on the way.  What I'm working on, it's how to connect any customer notice VLAN so it can connect to the computer in VLAN 4?

    I have not yet posted config in case it's a simple question that I need to do!

    Thank you

    Kyle

    Yes, if the Anyconnect pool is in the same subnet that vlan 4, then he would try to run the resolution arp instead of send traffic to the default gateway. I suggest that you change the pool of a single subnet, and you would need to modify the exemption ZBFW and NAT ACL accordingly.

  • VPN clients cannot access to the vlan

    Hello

    I just changed my flat lan to a virtual LAN environment multi, but now I need help to get to my VPN back working again as the VPN user can access servers that are not on the vlan 'door '.  I've read enough to know that it is probably associated with NAT, but I'm not sure where to put this information.

    Does go in the NAT, associated with the E0 interface (outgoing internet gateway), to the vlan10 (vlan router is actually on) or can I create a new one and apply it to the crypto ipsec and isakmp side of things that use VPN users?

    My network is configured as such...

    VPN client - Router1811 - split trunk - C3550 - 12G - shared - resources multiple C3550s - servers/Wstns

    The router subnet 192.168.10.0 as all switches, VLAN is set up through the 12 G and all other switches as vtp "vtp clients", including the router.  The user can get to the 10 subnet and any server on it, but not to the"farm" on the subnet 192.168.11.0.

    I noticed Federico has been working on something very similar to this... but any help would be appreciated.

    Thank you, Don

    Hi Don,

    Please mark this discussion as resolved if there is no other problem with this VPN.

    See you soon,.

    Nash.

  • The vlan vmotion should join him vlan management for vmotion work?

    Host 1

    Management network is a vswitch. IP VLAN 350 172.31.250.201

    vMotion network is on an another vswitch. VLAN 500 IP 192.168.1.1

    Host 2

    Management network is a vswitch. IP VLAN 350 172.31.250.202

    vMotion network is on an another vswitch. VLAN 500 IP 192.168.1.2

    Running Cisco UCS, the vNIC for vmotion are the vlan 500 but vmotion works only when they have access to the vlan 350 the management vlan.

    Sorry for the question noob but not vmotion need access to the vlan management in order to work?

    Thank you

    No, what you're doing - vMotion running in a dedicated subnet - is actually recommended to do this. Ensure that the UCS switch ports are configured correctly, allowing the VLANS required.

    André

  • Change the VLAN ID on a group of ports on a vSS

    We are changing the subnet that our vCenter VM resides on that will translate into change us vCenters IP address, subnet mask and gateway.

    He also goes to say that we must change the VLAN ID on the port group.

    My question is, can we change the Port Group VLAN ID first or first change vCenters details?. (So it is in VST Mode physical ports on the switch are trunk ports with say VLAN 100 and 200 with the new 300 of VLAN to add)

    Very welcome any suggetions. :-)

    Use the vSphere client to connect to the host that is running the VM vCenter.

    In this session of vSphere client, you can

    (a) change the VLAN switch vSS

    (b) open a console for the VM vCenter and change the IP settings it

    The vCenter VM will lose its network connection, but your session will continue to run, because you are connectly directly to a host (and no to vCenter).

    If the vCenter server is connected to an Active Directory server, then make sure to use a local administrative account or a domain administrator with cached credentials to connect.

    Furthermore, after you change the IP address of vCenter you will probably run the issue described here: http://kb.vmware.com/kb/1001493, but the article contains a resolution for this.

  • What is the form of Sun Circle in the upper left corner of the image my friend just send to me?

    What is the form of Sun Circle in the upper left corner of the image my friend just send to me?

    It can refer to live photos. Can you post a screenshot? -AJ

  • SWITCH Cisco/Linksys SLM224G: Problem with the VLAN

    Hello!

    I'm trying to set up a VLAN in my baskets. I have some knowledge about VLANs, but I still can not configure in my path.

    My situation:

    I have PC that contains two virtual machines, which works as a router between three networks: LAN, WAN, LAN2. It's a bit complicated, but I'll try to draw:

                                                     |-------------||----------------------------|                   |           e1|-to-eth1-VM2-----WAN|VirtualMachine 1        eth0|---trunk-VLAN1&2---|g1         e2|-to-eth0-VM2-----LAN2|eth0=VLAN1 eth1=VLAN2       |                   |           e3|-to-eth0-VM2-----LAN2 etc.|                         PC |                   |   SWITCH  e4||VirtualMachine 2            |                   |           e5|-to-eth1-VM1---wire-to-LAN2|eth0=VLAN3 eth1=VLAN4   eth1|---trunk-VLAN3&4---|g2         e6|-to-eth0-VM1-----LAN1|----------------------------|                   |           e7|-to-eth0-VM1-----LAN1 etc.                                                 |-------------|
    
    gX = Gigabit portseX = 100Mbit portsVMX = Virtual machine numberwire-to = patch-cord connection between ports on the switch
    
    Schema of routing and logical visibility:
    
    LAN1---VM1-----VM2---WAN              |LAN2----------|
    

    Important note is that LAN1 and LAN2 must be separated (visible only through routers). WAN must be visible through VM2 to LAN2 and through by VM1 and VM2 to LAN1. It seems easy, but VLAN that I did on this passage seems doesn't work.

    I do it like this:

    Step 1: Management of VLANS / create a VLAN...

    Creation of VLANS 1, 2, 3, 4 (numbers meters right now - I have now this number 1 is restricted to the switch).

    Step 2: Management of VLAN / Port to VLAN...

    Setting up VLAN1 with ports g1, e5 (the two labelled or not identified?-I have not seen any difference)

    Implementation VLAN2 with ports g1, e6, e7, etc...

    Implementation VLAN3 with ports g2, e2, e3, etc...

    Setting up VLAN4 with g2, e1 ports

    Step 3: Management of VLAN / Port setting...

    Implementation of ports e1 to PVID4 (chassis type = all I guess, but with "capture filter"?)

    Setting up port e2 at PVID3

    Setting up port PVID3 e3

    etc...

    Setting up port e5 for PVID1

    Setting up port e6 at PVID2

    Setting up port e7 for PVID2

    etc...

    Thus, on this configuration and that the switch it does not work for me

    I know that the switch is to see Mac since VLAN which is carried out by PC, because when I arrive in "Admin / dynamic address" I see pimps on the correct ports, with good VLAN ID. So the problem is to transmit a VLAN for their ports, then clear frames of ID and let the packets to go (and return: clear packages, add the VLAN ID and send to their Gigabit ports).

    Show the configuration is one of the many I tried :/ but I think this one is the best.

    Or maybe I don't know VLAN as I think and this scheme is impossible? Please tell me.

    Concerning

    and waiting for any suggestions,

    READ

    Hello.

    These products are processed by the Cisco Small Business Support Community.

    * If my post answered your question, please mark it as "acceptable Solution".

    * Do not forget to give a 'congratulations '. Thank you!

  • Help with the VLAN and RVS4000

    I am trying to Setup VLAN on a RVS4000 to share our Internet connection with another office but do not allow access to our network of the other network. We have a BEFSX41 connected to Internet and also connected to our other site via a virtual private network to another BEFSX41. Port 1 on the BEFSX41 connects to Port 1 on an EZXS88W switch.

    The other company has provided the RVS4000 and also provides a WRT54GS router. I want to connect 2 ports on the BEFSX41 to Port 1 on the RVS4000 and 2 ports on the RVS4000 to track 1 on the WRT54GS.

    Port 1 on the RVS4000 is member of the default VLAN1 and Port 2 will be a member of VLAN2.

    Our IP network is 192.168.20.0/24

    BEFSX41 is 192.168.20.1

    The DHCP service is disabled

    The RVS4000 has a static IP address of 192.168.20.254 and is configured as a router

    DHCP is also disabled

    The wireless network is as follows:

    IP network is 192.168.21.0/24

    The address IP of WRT54GS is 192.168.21.254 and is static and also configured as a router.

    I don't know how to actually Setup the VLAN from here and the instructions are not useful. My questions are:

    1 port 1 on the RVS4000 must be safe, with label or Untagged?

    2 If the interval routing disabled?

    3. If so, how do I route between the RVS4000 and WRIGHT so the two networks have access to the Internet, but not to other networks?

    The befsx41 should be one that is connected to the internet so that your final point so that the vpn tunnel work. The wan port on the wrt54g must be connected to the lan of the befsx41 port.

    If your server is located behind the befsx41, you should be able to port forwarding. If your server is located behind the wrt54g you may experience the problem with the redirect because you need to forward ports on both routers and according to me, there are some applications that do not work on double NAT.

    If you want to have access to the internet on both VLAN of the rvs4000, it should work as a router so its internet port must be connected to the port the befsx41 lan.

Maybe you are looking for