The VLAN on a Switch Standard

I am currently creating a new environment and we have a number of VLANS trunked together, I created a Standard switch for our virtual machine-to-machine network and the DMZ network, have each VLAN resources shared.

What is the best way to do it?

That I should...

Create a vss and create groups of ports of individual virtual machine for each VLAN IDS? (for example, a switch for virtual machine VLANS and a switch to DMZ with groups of individual ports?)

Or should I create just a switch for each with all 4095 active?

Hey, as previously stated, the large traps with it would be the single points of failure, but since you're ok with it, I'm going to shut up

Configuring VMware site seems ok, if you do not touch the vSwitches default security settings.

Regarding the loss of connectivity, I am looking for the reason outside of VMware (VLAN not on two physical switch ports, bad IP/gateway settings within the operating system prompted, etc..)

Tags: VMware

Similar Questions

  • Isolate the port on a vSphere standard switch traffic

    Hello

    I deploy an environment where I have a pool of 100 virtual machines that live on a switch standard vSphere isolated. The virtual machines to communicate with the rest of the world through a virtual double-NIC machine. This configuration does not work as expected, but I would go a little further and to isolate the connectivity network, such as each virtual machine can communicate with the system of double-NIC and not each other. The switch standard vSphere, the pool of 100 virtual machines are all located on the same VLAN and group ports. I spent some research time through documentation, but I did find a clean way to implement what I want. The best I can get to each of the virtual machines 100 puts their own VIRTUAL LAN, but it is ugly and will be difficult to maintain. Is there something easier that I missed?

    Thank you

    Steve

    PVLAN, but you will need the distributed virtual switch.

  • The proSafe (JGS524E + GS116E) Switches: Configuration Management Web GUI in VLAN specific

    Hello

    I use a JGS524E and a GS116E. The two are connected via a 802. 1 q uplink with all defined VLANS in him.

    A 802. 1 q other interfaces goes to a pfsense firewall, which serves as a router and dhcp server for each VLAN that I use.

    How can I configure the switches plug are in one VLAN specific and get his IP address of the dhcp server in this VLAN?

    At present, it seems to be random access: it is not predictable that range from intellectual property, it takes its IP configuration via dhcp...

    How management function works internally?

    Thank you

    Markus

    Hello

    Thank you. I tried it out, but the behavior seems to be a little different:

    I configured a static IP address for the switch (10.1.0.13 / 24). I have access to the switch web gui via the ip address of the host of a host directly connected (connected via a trunk port, where I put 1 VLAN on the trunk), but it is all the same, what VLAN that I use:

    When it is connected to the VLAN 1 I have access, but also through 10 VLANS, VLAN 20 and so forth (assumed, I configure my computer appropriate staticly in the IP network, for example 10.1.0.20 / 24). So it seems not be limited only to the VLAN 1. You have access to each vlan, only the IP configuration must be in the same network.

    I'm not sure, how it behaves when cascading the two switches, I have not tried.

    If this information can be useful for other users with the same question about this switching product line.

    For me, this behavior is not very well implemented from my point of view. For security reasons, you must limit access to the administration, for example by allowing access from a specific hardware port or a vlan. With the effective implementation, centralized management for a cascade topology is not easy to set up, perhaps because the behavior is not very clear and not documented in the manuals.

    Mentioned on the edge: there is no available TLS/SSL encryption when accessing the web gui (not https). So the password is transmitted in clear text... not a very good idea, I think.

    Thanks a lot for your help.

    Best regards

    markusd112

  • SWITCH Cisco/Linksys SLM224G: Problem with the VLAN

    Hello!

    I'm trying to set up a VLAN in my baskets. I have some knowledge about VLANs, but I still can not configure in my path.

    My situation:

    I have PC that contains two virtual machines, which works as a router between three networks: LAN, WAN, LAN2. It's a bit complicated, but I'll try to draw:

                                                     |-------------||----------------------------|                   |           e1|-to-eth1-VM2-----WAN|VirtualMachine 1        eth0|---trunk-VLAN1&2---|g1         e2|-to-eth0-VM2-----LAN2|eth0=VLAN1 eth1=VLAN2       |                   |           e3|-to-eth0-VM2-----LAN2 etc.|                         PC |                   |   SWITCH  e4||VirtualMachine 2            |                   |           e5|-to-eth1-VM1---wire-to-LAN2|eth0=VLAN3 eth1=VLAN4   eth1|---trunk-VLAN3&4---|g2         e6|-to-eth0-VM1-----LAN1|----------------------------|                   |           e7|-to-eth0-VM1-----LAN1 etc.                                                 |-------------|
    
    gX = Gigabit portseX = 100Mbit portsVMX = Virtual machine numberwire-to = patch-cord connection between ports on the switch
    
    Schema of routing and logical visibility:
    
    LAN1---VM1-----VM2---WAN              |LAN2----------|
    

    Important note is that LAN1 and LAN2 must be separated (visible only through routers). WAN must be visible through VM2 to LAN2 and through by VM1 and VM2 to LAN1. It seems easy, but VLAN that I did on this passage seems doesn't work.

    I do it like this:

    Step 1: Management of VLANS / create a VLAN...

    Creation of VLANS 1, 2, 3, 4 (numbers meters right now - I have now this number 1 is restricted to the switch).

    Step 2: Management of VLAN / Port to VLAN...

    Setting up VLAN1 with ports g1, e5 (the two labelled or not identified?-I have not seen any difference)

    Implementation VLAN2 with ports g1, e6, e7, etc...

    Implementation VLAN3 with ports g2, e2, e3, etc...

    Setting up VLAN4 with g2, e1 ports

    Step 3: Management of VLAN / Port setting...

    Implementation of ports e1 to PVID4 (chassis type = all I guess, but with "capture filter"?)

    Setting up port e2 at PVID3

    Setting up port PVID3 e3

    etc...

    Setting up port e5 for PVID1

    Setting up port e6 at PVID2

    Setting up port e7 for PVID2

    etc...

    Thus, on this configuration and that the switch it does not work for me

    I know that the switch is to see Mac since VLAN which is carried out by PC, because when I arrive in "Admin / dynamic address" I see pimps on the correct ports, with good VLAN ID. So the problem is to transmit a VLAN for their ports, then clear frames of ID and let the packets to go (and return: clear packages, add the VLAN ID and send to their Gigabit ports).

    Show the configuration is one of the many I tried :/ but I think this one is the best.

    Or maybe I don't know VLAN as I think and this scheme is impossible? Please tell me.

    Concerning

    and waiting for any suggestions,

    READ

    Hello.

    These products are processed by the Cisco Small Business Support Community.

    * If my post answered your question, please mark it as "acceptable Solution".

    * Do not forget to give a 'congratulations '. Thank you!

  • How create VLAN (12,14,15) on switch S5000 and it should communicate with all the VLANS?

    I have a server blade and s5000 620 switch (16 servers with NIC 10gig), I want to create three different VLAN's (12--> 192.168.12.1,15--> 192.168.15.1,192.168.8.1) and I want to assign VALN ip to the Server Blade, please help me on this configuration

    Here is an article that guides you through the controls to create a VLAN and assign an interface to this VLAN.

    http://Dell.to/2dlz74E

    And here's a video of assignment of an IP address on the VLANs.

    http://bit.LY/1Kgcs8e

    Hope that these will help you get the configured switch.

  • How to configure the VLAN for Cisco SG500 - switch 28

    Hello

    First of all, it's my first post here, I hope that someone can help me and please be patient because I am very little known.

    OK, so let me explain to you the scénarion I face and I hope someone can help me.

    We have a Cisco SG500 - 28 port gigabit switch in our workplace.

    Our goal is to create 3 VLANs and separate networks between the various departments.

    Vlan1 (which is the default VLAN in the switch)-will be used for the COMPUTER service and management.

    VLAN100 - will be used for business.

    VLAN200 - will be used for clients who need to connect to internet via WiFi.

    I created VLAN100 and VLAN200, and VLAN1 is there by default.

    I want to use port 13 for VLAN200 and to connect the-Wifi access point there.

    The uplink is in port 25.

    I would be happy if you could explain things first to a more general, abstract level, and then we can look at the specific scenario that we have.

    SG500 Cisco - 28 Gets a Sophos UTM 9 router internet.

    I need to take care of the inter - VLAN routing so, subnet and DHCP

    Thanks in advance,

    Sincere greetings,

    D

    Hi Desmond, looking at this DHCP pool it looks correct.

    For the second part, you waant VLAN 200 only work on VLAN 200, that's fine. So if you have an access point, and everything on the VLAN 200 connects to the access point, you can make an access to this list. The access list is entered only, which means the inbound interface.

    So if you have a gateway connecting to #1 port. You'll need to build the access list and apply it to port number 1. That's assuming you make a list of access 'decline' subnet source IP of VLAN 200 destined for the other subnet, that you do not want access.

    The image on another post to fill out your reference numbers, then for the ACL link, it should be placed on the interface VLAN 200 first comes to the switch (IE, the port the access point connects, make sure that you choose to bind by port instead of per VLAN)

    -Tom
    Please mark replied messages useful
    http://blogs.Cisco.com/smallbusiness/

  • Help the VLANS on Cisco SG200 - 08 p switch voice and data

    Hi all

    I'm faced with a problem of configuration on the Cisco SG200 - 08 p.

    We use Cisco SG200 - 08 p on a mobile carriage which will go from classroom to classroom who will have computer and phone VoIP cisco plugged into it. The question is that each of our closets are in different VLANS (1 voice and 1 data... Let's say data vlan 20 and vlan voice 2025 for conversation) and which move towards every closet.

    It would be great if I could just create a vlan voice dynamically pick up this switch upstream has however and generic data, it seems that I was failed to do.

    So far, I can pass the data Vlan no probably. The upstream switch port is set to access port and a switch port access voice vlan (these are x 3750 switches)

    If the above is not possible, I guess I'll take what I can get. Should I create data vlan 20 and vlan2025 of the voice on the Cisco SG200 - 08 p and make a port on the Cisco SG200 - 08 p and a trunk trunk on the 3750 x? Is there an option on the Cisco SG200 - 08 p to tag voice traffic?

    I am also concerned about DRIFTING and I did not see an area in the Cisco SG200 - 08 p to set it as a customer and a transparent mode.

    Thanks for any help,

    Dan

    Playne,

    first the bad news, the switches for small businesses currently do not support VTP, they support the GVRP Protocol which is like VTP, but there is no State that the VLAN used it will not automatically learn as VTP.

    You should be able to configure the 3750 as a trunk with a vlan 1U or unmarked and vlan 2025 as the tag for the voice. configuration of the port on the switch to small businesses the same way to its home port. All ports which have only phones will be 2025U of access and all ports only PC would be access 1U. All ports of phone and computer would be trunk 1u, 2025T

    Cisco Small Business Support Center

    Randy Manthey

    CCNA, CCNA - security

  • How to set the vlan native on a virtual machine in vSphere when you use the 1000V?

    Using the General switch original vSphere, we put VLAN native by VM by setting the VLAN 0 d.

    How do we set VLAN native for a virtual machine, if the virtual computer is connected to a 1000V? I heard that is over, we can use VLAN ID 0?

    Same way as you would on any Cisco switch.

    Add this command to your profile of uplink port:

    switchport trunk vlan native X

    Keep in mind there is no VLAN 0.  VLAN '0' is just how vmware means the VLAN untagged.  There are valid in accordance with the standard 1-4095.

    Kind regards

    Robert

  • How to extract the VLAN ID of VDPortgroup on Cisco 1000v

    Hello!  I am trying to create a script that gets all the VDPortgroups and copy them to a Standard switch for migration purposes.  Our DVS is currently a Cisco 1000v.  I would like to be able to extract the VLAN ID of each VDPortgroup can I in turn put this VLAN ID on the Standard switch after its creation.  I was not able to find a VLAN ID property anywhere in the VDPortgroup object (I drilled down into ExtensionData, etc with no luck).

    As a solution, I have bet on the VLAN being on behalf of the VDPortgroup and using the regex to extract this numerical value out the name, store it in a variable and set the VLAN ID on the Group of ports in the Standard switch accordingly. However, I wish I didn't have to rely on the cosmetic name being 100% accurate and consistent with the current VLAN ID of all VDPortgroups we have there, which is a bit.

    Is there a VLAN ID hidden somewhere I'm not find in the VDPortgroup object?  Or is there a better way to do it?  Any ideas or suggestions would be very appreciated!

    Get-VDPortgroup_gm.JPG

    Best,

    Alex

    I went through a migration of last year and found that the 1000v does not advertise this information to vCenter, unfortunately. Your best bet is to analyze the name, if available.

    I know that you are not on a VMware DVS, but if set you one up, you could see the port group has a configuration VLAN (somewhere in portgroup.config.vlan.vlanid or similar). Cisco leaves it on their distributed switch, for an unknown reason.

  • Help with the VLAN and RVS4000

    I am trying to Setup VLAN on a RVS4000 to share our Internet connection with another office but do not allow access to our network of the other network. We have a BEFSX41 connected to Internet and also connected to our other site via a virtual private network to another BEFSX41. Port 1 on the BEFSX41 connects to Port 1 on an EZXS88W switch.

    The other company has provided the RVS4000 and also provides a WRT54GS router. I want to connect 2 ports on the BEFSX41 to Port 1 on the RVS4000 and 2 ports on the RVS4000 to track 1 on the WRT54GS.

    Port 1 on the RVS4000 is member of the default VLAN1 and Port 2 will be a member of VLAN2.

    Our IP network is 192.168.20.0/24

    BEFSX41 is 192.168.20.1

    The DHCP service is disabled

    The RVS4000 has a static IP address of 192.168.20.254 and is configured as a router

    DHCP is also disabled

    The wireless network is as follows:

    IP network is 192.168.21.0/24

    The address IP of WRT54GS is 192.168.21.254 and is static and also configured as a router.

    I don't know how to actually Setup the VLAN from here and the instructions are not useful. My questions are:

    1 port 1 on the RVS4000 must be safe, with label or Untagged?

    2 If the interval routing disabled?

    3. If so, how do I route between the RVS4000 and WRIGHT so the two networks have access to the Internet, but not to other networks?

    The befsx41 should be one that is connected to the internet so that your final point so that the vpn tunnel work. The wan port on the wrt54g must be connected to the lan of the befsx41 port.

    If your server is located behind the befsx41, you should be able to port forwarding. If your server is located behind the wrt54g you may experience the problem with the redirect because you need to forward ports on both routers and according to me, there are some applications that do not work on double NAT.

    If you want to have access to the internet on both VLAN of the rvs4000, it should work as a router so its internet port must be connected to the port the befsx41 lan.

  • Need help to configure the VLAN on a powerconnect 5448

    Hello world

    I am currently working on 2 switches PowerConnect 5448 but I'm completely lost in configuring VLAN.

    My bow:

    My needs are:

    -J' have 2 different networks that need to be isolated in different VLANS

    -I want to port 11-14 to use for network backup, all others must be used for the production network.

    -This 2 networks must pass through the port 48 (fiber)

    How can I configure this kind of network on the powerconnect interface (or via telnet)?

    My understood are the following, I have to create 2 different VLAN tag all ports, switch to safe mode all ports of the entitlement each port to the VLAN voted. Am I wrong?

    How the fiber port?

    Thanks in advance for your help on this matter.

    Since your 2 VLAN need not communicate with each other, you should be able to get this working.

    The easiest way to do this would be to have your production on VLAN 1 and VLAN 2 second network.

    Assign an IP address to the switch with the command IP #.

    Assign a default gateway with the # ip default-gateway command.

    Create a VLAN 2:

    Database console (config) # vlan

    Console (config - vlan) # vlan 2

    Set 11-14 ports to access the mode for VLAN 2

    Console # switchport mode access

    Console # switchport access vlan 2

    Set 48 on trunk or general mode ports.

    Console # switchport mode Trunk

    console # permit trunk switchport vlan add 2

    You should get pretty close to a work environment. You may encounter some problem with VLAN 2 contacting 192.168.1.0, maybe just need to put it up and test.

    Here are a few links to software packages and manuals that can help.

    Firmware.

    http://Dell.to/1tz8tW0

    Manuals.

    http://Dell.to/1yqV4DJ

    Keep us on how will your configuration.

  • Configuration of VLAN 6248 - link IP subnet to the VLAN

    We have 200 node network with no VLAN (small private company that developed quickly)

    All nodes / devices / etc. of PCs spread evenly over 6 Dell 5448 switches with no regard for the Department, location or usage.

    (1) L3 is 6248 - we've added 6248 route VLANs (everything is on VLAN 1 still - i.e. without marking)

    (2) L2 several VLANS by switch - the best of cases, 2 VLANS by 5448

    (3) trunk / general uplink L2 s 5448 using LAG (44, 45 ports) - should be labelled all traffic, but since it will be a conversion / migration on an e-commerce network 24 x 7, we thought that we would have to do uplink between 5548 s and 6248 General and changes to the trunk later

    (4) for the conversion, all uplinks of trunk/general will have several VLANs marked as vlan1 untagged traffic

    (5) we know fixed us every VLAN gateway IP to the IP address of 6248 maintenance the VLAN, but can't decide how to proceed with no one-to-one correspondence of VLAN LAG uplink

    Questions on 6248

    Q1: we would use "bind the IP subnet to the VLAN ' the 6248 to configure routing between VLANS or do we define the belonging to a VLAN by LAG?

    Q2: would we be able to ping the IP of the bridge VLAN configured in the 6248 a down host link / node / PC marked for the same VLAN?

    Any suggestions would be most appreciated.

    On the 6248 allowing to the VLAN routing you must just ensure each VLAN has an IP address assigned to it:

    Console (config) #interface vlan 5

    Console (config - vlan) #ip address 192.105.1.1 255.255.255.0

    Then enable routing on the switch:

    Console (config) #ip Routing

    That's all that needs to be configured on the 6248 for VLAN routing to work. One thing to take steps, is that on the 6248 the management VLAN is not routable. By default, the management VLAN is VLAN 1. Two options are to move the management VLAN a VLAN different:

    Console # configure

    Console (config) #ip address vlan 99

    Or not use VLAN 1 at all. Place traffic on other VLANs.

    The answer to your second question is Yes. With the VLAN routing enabled a customer to any what VLAN should be able to ping the gateway of the 6248.

    When it comes to generals and trunk mode. General mode is like a combination of access and trunk, you can send several VLANS not identified. General mode is most commonly used on the 6200 switches when connecting with the new switches, trunk sometimes doesn't connect when it is connected to a most recent switch. I suggest using the general mode on the 6248 and if it works, leave it in general mode.

    Here is a list of various white papers which all have some good info to have.

    http://en.community.Dell.com/TechCenter/networking/w/wiki/2580.networking-whitepapers.aspx

    6248 user's Guide

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-6248_User%27s%20Guide2_en-us.PDF

    6248 cli guide

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-6248_Reference%20Guide_en-us.PDF

    5548 user's Guide

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-5524p_User%27s%20Guide_en-us.PDF

    5548 cli guide

    FTP://FTP.Dell.com/manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/PowerConnect-5524_Reference%20Guide_en-us.PDF

    Having to update firmware of the switch can help with interoperability.

    6248

    http://www.Dell.com/support/home/us/en/04/product-support/product/PowerConnect-6248/drivers

    5548

    http://www.Dell.com/support/home/us/en/04/product-support/product/PowerConnect-5548/drivers

    See you soon

  • Can not do anything on the VLAN ping on 6248

    Hello

    I've spent a day and a half trying to solve this problem, but I'm not getting anywhere. Here is a breakdown of the test configuration database.

    Port 1: Connected to the existing network (if I can get to the host ESXi from my PC)
    : 3 my ESXi host is connected to this
    Virtual machines are tag VLAN through port ESXi group properties.
    All VLANS have 1 VM except VLAN 10, which has 2.
    All the VLANS are IP address ending with 24 par.1 the subnet mask.
    All virtual machines have the corresponding default gateway pointing to the IP of the VLAN (XXX1)
    I am able to get the IP address of the DHCP server to different VLANS.

    Things that work:
    From a virtual machine, I can ping to IP of any VLAN (so MV in VLAN 10 can ping IP of the VLAN 20)
    The console, I can ping IP of any VLAN

    Things that DON'T work:
    The console, I cannot ping any computer virtual IP.
    From a virtual machine, I can not ping any address (including the virtual machines in the same VLAN)

    Here is my config running:

    ! Current configuration:
    ! Description of the system "PowerConnect 6248, 3.3.7.3, VxWorks 6.5.
    ! 3.3.7.3 system software version
    ! Passage mode is configured as disabled
    !
    Configure
    database of VLAN
    VLAN 10,20,30,40,50,300
    VLAN 10 1 routing
    VLAN 20 2 routing
    VLAN 30 3 routing
    VLAN routing 40 4
    VLAN 50 5 routing
    VLAN routing 300 6
    output
    unicast SNTP client enable
    customer survey SNTP 1024 timer
    SNTP server 0.north - america.pool.ntp.org
    clock timezone-7 minutes 0
    battery
    1 2 Member

    output
    IP 192.168.8.250 255.255.255.0
    default IP gateway - 192.168.8.230
    IP routing
    IP helper-address 10.80.10.10 dhcp
    interface vlan 10
    name 'server '.
    Routing
    IP 10.80.10.1 255.255.255.0
    output
    interface vlan 20
    name "printer - Switch."
    Routing
    IP 10.80.20.1 255.255.255.0
    IP helper 10.80.10.10
    output
    interface vlan 30
    name "Workstation".
    Routing
    IP 10.80.30.1 255.255.255.0
    IP helper 10.80.10.10
    output
    interface vlan 40
    name "phones".
    Routing
    IP 10.80.40.1 255.255.255.0
    IP helper 10.80.10.10
    output
    interface vlan 50
    name of the 'Camera '.
    Routing
    IP 10.80.50.1 255.255.255.0
    IP helper 10.80.10.10
    output
    interface vlan 300
    name "router".
    Routing
    IP address 192.168.1.250 255.255.255.0
    output
    user name 'root' password XXXXXXX level encrypted 15
    l2relay DHCP
    DHCP l2relay vlan 10,20,30,40,50
    !
    interface ethernet 1/g1
    switchport mode general
    output
    !
    interface ethernet 1/g2
    switchport mode general
    output
    !
    interface ethernet 1/g3
    spanning tree portfast
    switchport mode general
    switchport general allowed vlan add 10,20,30,40 tag
    output
    output

    Looking at the config on the switch, I can't predict whether the switch. The config is pretty basic, and the only way I guess whether the switch is if there were problems with the overall performance of the network. Love packages ignored, times of high ping, etc. Doing some research I found a few posts of blogs, KB and forum various with some things to look at what can help.

    http://msmvps.com/blogs/netman66/archive/2010/03/25/VMware-vSphere-4-client-slow-to-load-fixed.aspx

    http://KB.VMware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalID=1027836

    http://www.v-front.de/2011/07/improve-your-vSphere-clients.html

    http://KB.VMware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalID=1029665

    http://hardforum.com/showthread.php?t=1698368

    http://d1it.WordPress.com/2010/12/23/slow-vSphere-client/

    See you soon

  • Creation of the VLAN between Powerconnect 5548 and F10 s4810...

    In the coming months we will replace our network equipment.  I was able to get their hands on the new gear at the beginning, and if I'm not traditionally a guy from the network, the project has been given to me and I started playing.  The first thing that I wanted to work on was implemented VLANs.  I have configured the switches like the picture below:

    When I have IP every PC connected to the same subnet and apply VLAN10 to their respective ports, they aren't to pings within the same stack or between cells.  My basic understanding is that they are, do they not?  Did I miss something in my understanding of VLANS or is there a problem with my configs?  I posted the configs below.

    RTTMOACCESS01 config:

    database of VLAN
    VLAN 10,20,30,40,50
    output
    Add a voice vlan Yes-table Nortel___ 000181
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table Shoretel___ 001049
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    VLAN voice Yes-table add 00907 Polycom/Veritel_phone___
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    860 port address 0.0.0.0 iSCSI target
    port 3260 address 0.0.0.0 iSCSI target
    port 9876 address 0.0.0.0 iSCSI target
    port 20002 address 0.0.0.0 iSCSI target
    20003 port address 0.0.0.0 iSCSI target
    port 25555 address 0.0.0.0 iSCSI target
    hostname rttmoaccess01
    no console logging
    privilege 15
    !
    interface vlan 10
    Name IT
    !
    interface vlan 20
    name UserPCs
    !
    interface vlan 30
    name UserTCs
    !
    interface vlan 40
    the voice name
    !
    interface vlan 50
    Name printers
    !
    gigabitethernet1/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet1/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    gigabitethernet2/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet2/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag

    !
    Default settings:
    Service etiquette: 76BYTS1
     
    SW version 4.1.0.8 (28 August 2012 time 11:17:36)
     
    Gigabit Ethernet ports
    =============================
    Speed 1000
    full duplex
    negotiation
    flow control
    Auto MDIX
    no back pressure
     
    interface vlan 1
    interface port-channel 1-32
     
    spanning tree
    spanning tree mode RSTP
     
    basis of QoS
    QoS trust cos
    Enable IAS

    RTTMOACCESS02 config:

    database of VLAN
    VLAN 10,20,30,40,50
    output
    Add a voice vlan Yes-table Nortel___ 000181
    Add a voice vlan Yes-table 0001e3 Siemens_AG_phone___
    Add a voice vlan Yes-table 00036 b Cisco_phone___
    Add a voice vlan Yes-table 00096e Avaya___
    Add a voice vlan Yes-table 000fe2 H3C_Aolynk___
    Add a voice vlan Yes-table Shoretel___ 001049
    Add a voice vlan Yes-table 0060 b 9 Philips_and_NEC_AG_phone
    VLAN voice Yes-table add 00907 Polycom/Veritel_phone___
    Add a voice vlan Yes-table 00e0bb 3Com_phone___
    860 port address 0.0.0.0 iSCSI target
    port 3260 address 0.0.0.0 iSCSI target
    port 9876 address 0.0.0.0 iSCSI target
    port 20002 address 0.0.0.0 iSCSI target
    20003 port address 0.0.0.0 iSCSI target
    port 25555 address 0.0.0.0 iSCSI target
    hostname rttmoaccess01
    no console logging
    privilege 15
    !
    interface vlan 10
    Name IT
    !
    interface vlan 20
    name UserPCs
    !
    interface vlan 30
    name UserTCs
    !
    interface vlan 40
    the voice name
    !
    interface vlan 50
    Name printers
    !
    gigabitethernet1/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet1/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    gigabitethernet2/0/1 interface
    switchport access vlan 10
    !
    tengigabitethernet2/0/1 interface
    switchport mode general
    switchport general allowed vlan add 10 tag
    switchport general allowed vlan add 20 tag
    switchport general allowed vlan add 30 tag
    switchport general allowed vlan add 40 tag
    switchport general allowed vlan add 50 tag
    !
    Default settings:
    Service etiquette: 76BYTS1
     
    SW version 4.1.0.8 (28 August 2012 time 11:17:36)
     
    Gigabit Ethernet ports
    =============================
    Speed 1000
    full duplex
    negotiation
    flow control
    Auto MDIX
    no back pressure
     
    interface vlan 1
    interface port-channel 1-32
     
    spanning tree
    spanning tree mode RSTP
     
    basis of QoS
    QoS trust cos
    Enable IAS

    Config RTTMOCORE

    ! Version 8.3.12.0
    ! Last modification of the configuration to Fri Jun 14 13:31:58 2013 default
    ! Startup-config updated Fri Jun 14 13:32:40 2013 default
    !
    start the primary system battery-unit 0: A:
    start a system secondary battery-unit 0: B:
    start the system stack-unit 0 default: A:
    start the primary system battery-unit 1: A:
    start a system secondary battery-unit 1: B:
    start the system default stack-unit 1: A:
    !
    redundancy full automatic synchronization
    !
    Hardware watchdog
    !
    no console logging
    !
    hostname rttmocore
    !
    disposal of battery-unit 0 S4810
    !
    stack-unit 0 battery-group 14
    !
    stack-unit 0 battery-group 15
    !
    interface TenGigabitEthernet 0/46
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    interface TenGigabitEthernet 0/47
    no ip address
    switchport
    FlowControl rx tx off
    no downtime

    disposal of battery-unit 1 S4810
    !
    stack stack-unit 1-group 14
    !
    stack stack-unit 1-group 15
    !
    interface TenGigabitEthernet 1/46
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    interface TenGigabitEthernet 1/47
    no ip address
    switchport
    FlowControl rx tx off
    no downtime
    !
    !
    interface Vlan 1
    !
    interface Vlan 10
    Description IT
    Name IT
    no ip address
    Tagged TenGigabitEthernet 0/46-47
    Tagged TenGigabitEthernet 1/46-47
    Shutdown
    !
    interface Vlan 20
    Description UserPCs
    name UserPCs
    no ip address
    Shutdown
    !
    interface Vlan 30
    Description UserTCs
    name UserTCs
    no ip address
    Shutdown
    !
    interface Vlan 40
    Speech description
    the voice name
    no ip address
    Shutdown
    !
    interface Vlan 50
    Printers description
    Name printers
    no ip address
    Shutdown
    !
    Lldp Protocol
    !
    0 line console
    line vty 0
    line vty 1
    line vty 2
    line vty 3
    line vty 4
    line vty 5
    line vty 6
    line vty 7
    line vty 8
    line vty 9
    !
    end

    I would say lets start with one side and obtain communication of work between the two computers on the same stack at RTTMOACCESS01. The port settings for the 1/01 and 2/01 look great both in access mode for VLAN 10. Which IP addresses and subnets you assign to computers?

    5548 to battery power battery connection 10 also appear to not be in a LAG, then we run two connections like that and they aren't in a SHIFT, we create a loop and a single connection will enter a blocking state.

    For the connections between the 5548 and force 10, I suggest to turn them into a GAP. The command should look like this.

    Console > activate

    Console # configure

    Console (config) # (config) # interface tengigabitethernet 1/0/1

    Console (config) # port - 1 automatic mode group

    output console #.

    Console (config) #.

    Do the same for Te2/0/1

    Then we set up this OFFSET to set it up, and I would try to use the trunk instead of general mode mode.

    Console (config) # interface port-channel 1

    console switchport mode trunk #.

    console # permit trunk switchport vlan add 10,20,30,40,50 tag

    The same should be done for the Force switch 10.

    Te0/46.1/46 in a SHIFT

    Te0/47.1/47 in another SHIFT

    Put in the trunk and let the VLANS on the trunk.

    Allows to study these settings and see if we can make any progress.

    Thank you

  • Dell Powerconnect 5448 a reference on the vlan by default

    Hello

    Just a question.  A Dell Powerconnect 5448 switch will act as a home if its interfaces are configured with 1 interface connection to a primary switch that has the interface is 'access to the interface mode' by default with a vlan?  It will work with all its switches on vlan interface of uplink or would you need to configure both as the trunks to allow access vlan to work and this switch uplink?

    The 5448 is a layer 2 switch, which by default has a VLAN native of 1 with all interfaces in access mode for the native VLAN 1. On the VLAN native all frames are frames unmarked. So now that your uplink to the other switch port, all the info will be sent without label, which means the other switch will receive the unmarked data and then place it in the VLAN that is in access mode. Communication should work this way.

    However, I think using a network connection between the switches. The trunk port is used to connect the devices up-to-date with the switches / VLAN together and allow several VLAN tagged fell on it. Looks like you already have several VLANs on the network, and having a network connection will allow you to expand on it. At the same time everything that is on the VLAN native is always through the trunk to the other switch and will stay on the VLAN native.

Maybe you are looking for