Quantcast
Channel: PowerConnect Forum - Recent Threads
Viewing all 2954 articles
Browse latest View live

PowerConnect 5524 and Embedded DHCP Server

$
0
0

Hello,

I would like to use the internal DHCP Server provided by PowerConnect 5524. Activation and configration of the DHCP Server is documented but there is nothing about how to make it work Sad

I have configured 2 vlan (lets call them VLAN2 : IP = 192.168.2.1 and VLAN3 = 192.168.3.1). I have configured the DHCP Server to serve IP in two pools: one on the 192.168.2.0 subnet and another on the 192.168.3.0 subnet.

The question is :

How do i affect DHCP service to each VLAN so VLAN2 is served with the pool "192.168.2" and VLAN3 is served with the pool "192.168.3"?

Thanks in advance for your precious help!

Sébastien


When to use General ports vs Trunk ports

$
0
0

Per the Dell 55xx Users Guide.pdf, both kinds can be members of multiple VLANs.  Let's say I'm hooking up WiFi APs, which will attach a VLAN tag to all traffic, based on the SSID that the client is associated with.  Do I want these AP ports to be Trunk or General ports? If either could be appropriate, what are the considerations in choosing one option vs the other?

Dell Powerconnect 5448 on Default vlan

$
0
0

Hi,

Just a question.  Will a Dell Powerconnect 5448 switch act like a home switch if its interfaces are set as default with 1 interface connecting to a primary switch who's interface is "interface mode access" with a certain vlan?  Will it work with all its switches on the uplink interface's vlan or would you need to configure the both uplink switch and this switch as trunks to let the access vlan work?

How to change DATE & Time on DELL Power connect 6224 L3 Switch

$
0
0

I Have dell power connect 6224 l3 . i need help regarding of how to change date & time on dell power connect 6224 L3 switch..

i tray the changing time through GUI & CLI but not working

so pls help.

Thanx

SIMON

DHCP problem L3 switch DELL Power Connect 6224 with vlans

$
0
0

I have Dell power connect 6224 L3 Switch.

My Vlan Detail is:-

Vlan 3 == 192.168.1.0/24

vlan 5 == 192.168.5.0/24

Dhcp Server (2008)= ip is =  = 192.168.1.9 /24

I have 2 Vlans configured on my Dell PowerConnect 6224 (L3 Switch) and a DHCP server Windows Server 2008 with 192.168.1.0/24 subnet scopes, as far as I know I need to set-up a bootdhcprelay server and enable bootdhcprelay which I have done, but when I try to get a dhcp address from my client pc dectect only 192.168.1.0/24 range but i want client dectect address only 192.168.5.0 /24 .

i allready  run:-

Config#(config-Vlan5)#

dhcp command " ip helper address " but its not working

Many dell User guide reading but nothing clarity. so pls help me.

Thnx

Powerconnect 6248-- Public and private VLAN routes... Is this the right hardware for the job?

$
0
0

I have the following configuration

Internal computers and phones on 10.99.98.0/24 and 10.11.12.0/24, 3 public CIDR/24 networks that I would like to route to vlans.. the ISP is handling "default routing" so the packets are entering my static ip already.  I can ping the gateway from the vlan . but cannot etablish a route from one vlan to another.  

A static ip address of 64.183.7.234 /30 (single static ip, gateway is set as well)

I can ping 8.8.8.8 from the switch, I can connect to the management vlan on 192.168.1.1  My initial diagram/configuration idea follows below (picture then my current config file)

I would very much like to route packets from 198.133.185.1/24 through the internet port, and back again.  Same goes for 198.147.151 and 204.128.156

When i started they used to use a PIX 515 and cisco ws3550, at an old site that had serviced multiple buildings and hundreds of users, but the firewall died, the catalyst is nearly there, and i'm servicing a great deal fewer users.  Would still like to make some use of our CIDR/24 (class  C at the time they were delegated) though!

Is this possible on this hardware? Or am I barking up the wrong tree....

Current config:
!Current Configuration:
!System Description "Powerconnect 6248, 3.2.1.3, VxWorks 6.5"
!System Software Version 3.2.1.3
!Cut-through mode is configured as disabled
!
configure
vlan database
vlan 3-4,90-92,100
vlan routing 3 1
vlan routing 4 2
vlan routing 92 3
vlan routing 90 4
vlan routing 91 5
vlan routing 100 6
exit
stack
member 1 2
exit
ip address 192.168.1.1 255.255.255.0
ip routing
ip route 0.0.0.0 0.0.0.0 64.183.7.233

interface vlan 3
name "OfficeNet"
routing
ip address 10.11.12.249 255.255.255.0
exit
interface vlan 4
name "VoIPNet"
routing
ip address 10.99.98.249 255.255.255.0
exit
interface vlan 92
name "133net"
routing
ip address 198.133.185.1 255.255.255.0
exit
interface vlan 91
name "147net"
routing
ip address 198.147.151.1 255.255.255.0
exit
interface vlan 90
name "DMZNet"
routing
ip address 204.128.156.1 255.255.255.0
exit
interface vlan 100
name "TWCBC Fiber "
routing
ip address 64.183.7.234 255.255.255.252
exit
username "admin" password<<SNIP>> level 15 encrypted
ip ssh server
!
interface ethernet 1/g1
switchport mode general
exit
!
interface ethernet 1/g2
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g3
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g4
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g5
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g6
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g7
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g8
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g9
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g10
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g11
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g12
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g13
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g14
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g15
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g16
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g17
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g18
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g19
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g20
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g21
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g22
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g23
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g24
switchport mode general
switchport general allowed vlan add 3-4
exit
!
interface ethernet 1/g29
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1
switchport general allowed vlan add 92
exit
!
interface ethernet 1/g30
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 92
exit
!
interface ethernet 1/g31
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 92
exit
!
interface ethernet 1/g32
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 92
exit
!
interface ethernet 1/g33
switchport mode general
switchport general pvid 91
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 91
exit
!
interface ethernet 1/g34
switchport mode general
switchport general pvid 91
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 91
exit
!
interface ethernet 1/g35
switchport mode general
switchport general pvid 91
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 91
exit
!
interface ethernet 1/g36
switchport mode general
switchport general pvid 91
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 91
exit
!
interface ethernet 1/g37
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 90
exit
!
interface ethernet 1/g38
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 90
exit
!
interface ethernet 1/g39
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 90
exit
!
interface ethernet 1/g40
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 90
exit
!
interface ethernet 1/g41
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 90
exit
!
interface ethernet 1/g42
switchport mode general
switchport general pvid 90
switchport forbidden vlan add 1,3-4
switchport general allowed vlan add 90
exit
!
interface ethernet 1/g48
switchport access vlan 100
switchport forbidden vlan add 1,3-4
exit
exit

How to assign a VLAN management IP address to Powerconnect 2848

$
0
0

Hello,

I tried to find the features to assign a VLAN management IP address to Powerconnect 2848.  However, it could not find this features.  Is that anyway to edit it? 

Thanks in advance. 

Not able to locate device on my network of MAC address produced by "show mac address-table" or "show bridge-address-table"

$
0
0

Hi,

I am still trying to track down some odd STP RSTP issues and came across a strange listing when I tried to list the MAC addresses seen by my switches.

There are several unique Dell Switch(?) MAC addresses that I can't find anywhere on our network.

I can view the MAC addresses on all my active switches through the GUI using "show asset" but there are about six MAC addresses in my list that aren't listed anywhere and they are definitely Dell switches (00:13:72:x:x:x, d0:67:e5:x:x:x, 00:25:64:x:x:x) 

Is there some way to list all the native MAC addresses associated with a particular switch?


Cluster nodes cant ping each other

$
0
0

Hi,

I have recently put one of our old clusters back online, its a poweredge 1855. I'm working on 5 nodes, and it has a PowerConnect 5316M on the back. The 5316M has only 1 cable connecting it to the uplink switch.

Each blade has 2 NIC's. One of them is a normal production NIC, with a normal IP on our range. All blades can ping each other on this address, and they all have internet.

The other NIC is what I'm going to use for live migration, or cluster heartbeat or something ..either way, it has a different range with no gateway (172.50.1.x)

Now, 3 of the blades can all ping eachother, but not the other 2. And the 2 that cant ping, can ping eachother. So it looks like 2 are on the same VLAN, and the other 3 are on the same VLAN.

The problem i have, is the switch shows them all on the default VLAN ..and one thing i cant work out ..is if the servers all have 2 NICs, but there are only 10 internal switch ports? ..so how can i set either NIC on a different VLAN?

The switch config is here:

console# show run
spanning-tree mode mstp
spanning-tree mst configuration
instance 1 add vlan 1,15,900
instance 2 add vlan 2-3
name PDSNetherlands1
revision 900
exit
spanning-tree mst 1 priority 57344
spanning-tree mst 2 priority 57344
interface port-channel 1
description 'LACPGROUP-M5316M-SW2'
exit
interface port-channel 1
switchport mode general
exit
vlan database
vlan 2-3,15,238,328-329,501,638,900
exit
interface port-channel 1
switchport general allowed vlan add 15
exit
interface port-channel 1
switchport general allowed vlan add 900
exit
interface vlan 2
name "PDS Internet"
exit
interface vlan 3
name "PDS Wireless"
exit
interface vlan 15
name "PDS ServerInfrastructure"
exit
interface vlan 238
name "SHELL GI-Desktops"
exit
interface vlan 328
name "SHELL Unix-Desktops"
exit
interface vlan 329
name "SHELL Windows-Servers"
exit
interface vlan 501
name "SHELL Linux-Desktops"
exit
interface vlan 638
name "SHELL IP-Telephony"
exit
interface vlan 900
name "PDS Workstations"
exit
interface range ethernet g(11-16)
channel-group 1 mode auto
exit
interface vlan 1
ip address 10.254.254.253 255.0.0.0
exit
ip default-gateway 10.0.0.1
logging 10.0.1.56 severity debugging facility local0
username admin password 5ebe2294ecd0e0f08eab7690d2a6ee69 level 15 encrypted
username admin_jon password ea4462b55746d29a4a0fc44c3db06b95 level 15 encrypt
ed
username administrator password 22d4734b069e91ceebdf297701005b28 level 15 enc
rypted
snmp-server community private rw
sntp client poll timer 60
sntp unicast client enable
sntp anycast client enable
sntp broadcast client enable
sntp server 64.90.182.55 poll
console#
Any help would be appreciated, I cannot complete the cluster validation wizard until i can crack this ..
Kind Regards,
Jon

Powerconnect 3548p unable to connect to console

$
0
0

During the day when I try to connect to the switch over the wan, I cannot connect after hours when usage is low I have no trouble connecting to the switch over the wan.

3548 CPU Utilization

$
0
0

I have a 3548p that is showing abnormally high CPU utilization:

CPU utilization
---------------
five seconds: 97%; one minute: 100%; five minutes: 88%

five seconds: 100%; one minute: 80%; five minutes: 88%

five seconds: 62%; one minute: 94%; five minutes: 82%
five seconds: 100%; one minute: 81%; five minutes: 87% 

five seconds: 100%; one minute: 100%; five minutes: 88%

five seconds: 100%; one minute: 100%; five minutes: 92%

 

This is causing latency to the switch and also delay when managing via CLI:


Packets: Sent = 55797, Received = 55776, Lost = 21 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 13ms, Maximum = 3845ms, Average = 249ms

Pinging through the switch to connected devices seems fine.  This switch has very low load:  it is powering about 7 IP phones and 3 IP cameras, and has only about half of it's ports in use.  It is not stacked and no VLANs are defined.  It does have an EPS-470 attached for redundancy.  Flow control is disabled globally, and STP is disabled selectively on some ports.  Otherwise, its conf is very nearly factory default.

 I have rebooted the switch and the issue comes back.  It is running latest code (2.0.0.51).  I noticed there is no "Show CPU Process" command in the CLI.   How can I troubleshoot to see what is causing the load?   I have enabled debug logging on the serial console and see no obvious cause, in fact no messages are being generated at all except login/logoff events.

 Conf:

 ....# show run
interface range ethernet e(34,38)
spanning-tree disable
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
interface vlan 1
ip address ....
exit
ip default-gateway ....
hostname ....
logging console debugging
username admin password ... level 15 encrypted
sntp unicast client enable
sntp unicast client poll
sntp server a.b.c.d poll
ip domain-name ....
ip name-server ....

Default settings:
Service tag: ....

SW version 2.0.0.51 (date 11-Feb-2013 time 10:45:21)

Fast Ethernet Ports
==========================
no shutdown
speed 100
duplex full
negotiation
flow-control off
mdix auto
no back-pressure

Gigabit Ethernet Ports
=============================
no shutdown
speed 1000
duplex full
negotiation
flow-control off
mdix auto
no back-pressure

interface vlan 1
interface port-channel 1 - 15

spanning-tree
spanning-tree mode STP

qos basic
qos trust cos
....#

6248P Firmware downgrade

$
0
0

I have a stack of 7 x 6248P with a firmware revision of 3.2.7.0

I want to add a new switch to the stack which wont be the master.

The firmware on the new switch is 3.3.3.3

As the new switch doesn't match the existing stack I am aware that it will start in suspended stacking mode.

Can I then 'downgrade' the firmware on the new switch from the master or do I need to upgrade the firmware on the existing 7 switches to match the new one.

Oversized packets possibly causing packet loss with Dell PC6248

$
0
0

Hello,

We are seeing packet loss on our voice network which causes the phone to sometimes ring continuously.  This could be the result of oversized packets (more details below).  Also on a separate note, if I transfer images using Windows Deployment Service multicast it floods all ports (so I don't do that anymore :-).  I had originally enabled IGMP but it previously caused the switch to crash randomly which could have been related to earlier firmware.

We have pretty simple network:

  1. 3 Dell PC6248s connected in a star topology (1 dist and 2 access switches) interconnected with LAG trunks running latest firmware.
  2. Several VLANs: voice VLAN (100) for IP phones, production data is on vlan 1, dev on vlan 5.  
  3. IP phones are mainly Aastra 9133i's with a few Polycom's.

I digged in further and we are seeing quite a few "oversized packets" on the LAG trunks.  I was wondering if this is causing the packets to drop.  If so, should I modify the MTU size to 1522 (I was reading that tagging adds 4 bytes to the default MTU of 1518) or is there a configuration error I'm overlooking somewhere?

    • show rmon statistics port-channel 1

      Port: ch1
      Dropped: 0
      Octets: 3436040607 Packets: 947867566
      Broadcast: 1158102 Multicast: 24535676
      CRC Align Errors: 0 Collisions: 0
      Undersize Pkts: 0 Oversize Pkts: 43969059
      Fragments: 0 Jabbers: 0
      64 Octets: 24107589 65 - 127 Octets: 868940536
      128 - 255 Octets: 133380606 256 - 511 Octets: 76138498
      512 - 1023 Octets: 90380909 1024 - 1518 Octets: 72636117
    • show statistics port-channel 1

      Total Packets Received (Octets)................ 175230301131
      Packets Received > 1518 Octets................. 43968808
      Packets RX and TX 64 Octets.................... 24107385
      Packets RX and TX 65-127 Octets................ 868914890
      Packets RX and TX 128-255 Octets............... 133371613
      Packets RX and TX 256-511 Octets............... 76133886
      Packets RX and TX 512-1023 Octets.............. 90379490
      Packets RX and TX 1024-1518 Octets............. 72634059
      Packets RX and TX 1519-2047 Octets............. 4344763899
      Packets RX and TX 2048-4095 Octets............. 0
      Packets RX and TX 4096-9216 Octets............. 0

      Total Packets Received Without Errors.......... 947838588
      Unicast Packets Received....................... 922145059
      Multicast Packets Received..................... 24535481
      Broadcast Packets Received..................... 1158048

      Total Packets Received with MAC Errors......... 0
      Jabbers Received............................... 0
      Fragments/Undersize Received................... 0
      Alignment Errors............................... 0
      FCS Errors..................................... 0
      Overruns....................................... 0
      802.3x Pause Frames Received................... 0
      Unacceptable Frame Type........................ 0

      Total Packets Transmitted (Octets)............. 6732668920146
      Packets Transmitted > 1518 Octets ............. 5827795
      Max Frame Size................................. 1518

      Total Packets Transmitted Successfully......... 367499338
      Unicast Packets Transmitted.................... 4651719996
      Multicast Packets Transmitted.................. 5064125
      Broadcast Packets Transmitted.................. 5682513

      Total Transmit Errors.......................... 0
      FCS Errors..................................... 0
      Underrun Errors................................ 0

      Total Transmit Packets Discarded............... 0
      Single Collision Frames........................ 0
      Multiple Collision Frames...................... 0
      Excessive Collision Frames..................... 0

      802.3x Pause Frames Transmitted................ 0
      GVRP PDUs received............................. 0
      GVRP PDUs Transmitted.......................... 0
      GVRP Failed Registrations...................... 0
      BPDU: sent 1286910, received 9

Here's the config for our dist switch:

!Current Configuration:
!System Description "PowerConnect 6248, 3.3.6.4, VxWorks 6.5"
!System Software Version 3.3.6.4
!Cut-through mode is configured as disabled
!
configure
vlan database
vlan 5,10,15,20,25,50,100,150,200
vlan routing 1 1
vlan routing 5 2
vlan routing 100 3
exit
hostname "SW1-M01"
sntp unicast client enable
sntp server 192.168.0.211
clock summer-time recurring USA zone "CDT"
clock timezone -6 minutes 0 zone "CST"
stack
member 1 2
exit
ip address 192.168.150.250 255.255.255.0
ip address vlan 150
ip domain-name ***
ip name-server 192.168.0.211
ip name-server 192.168.0.212
logging 192.168.0.128
level warning
exit
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.0.253
interface vlan 1
routing
ip address 192.168.0.254 255.255.255.0
exit
interface vlan 5
name "Dev_VLAN"
routing
ip address 192.168.10.254 255.255.255.0
exit
interface vlan 25
name "DSL_VLAN"
exit
interface vlan 100
name "Voice_VLAN"
routing
ip address 10.116.116.2 255.255.252.0
exit
interface vlan 150
name "Management_VLAN"
exit
username "admin" password ---- level 15 encrypted
voice vlan
line telnet
exec-timeout 1800
exit
ip ssh server
spanning-tree priority 4096
!
interface ethernet 1/g1
channel-group 1 mode auto
description 'SWI-M02_Uplink'
lldp transmit-tlv port-desc sys-name sys-desc sys-cap
lldp transmit-mgmt
lldp notification
lldp med confignotification
lldp med transmit-tlv location
lldp med transmit-tlv inventory
exit
!
interface ethernet 1/g2
channel-group 1 mode auto
description 'SWI-M02_Uplink'
lldp transmit-tlv port-desc sys-name sys-desc sys-cap
lldp transmit-mgmt
lldp notification
lldp med confignotification
lldp med transmit-tlv location
lldp med transmit-tlv inventory
exit
-- snipped due to length --
Thanks!

Dell Powerconnect 6224 Panic

$
0
0
I just got this router off ebay.. reset it to factory defaults and just setup up as new with new firmware now im getting this error:
anyideas?
0xca94290 (ip6MapLocalDataTask): panic: jobQueueStdPost: out of QJOBs
0x95f8330 (ipMapForwardingTask): panic: jobQueueStdPost: out of QJOBs!

0x95f8330 (ipMapForwardingTask): panic: jobQueueStdPost: out of QJOBs!

0x95f8330 (ipMapForwardingTask): panic: jobQueueStdPost: out of QJOBs!

0xca94290 (ip6MapLocalDataTask): panic: jobQueueStdPost: out of QJOBs!

0xca94290 (ip6MapLocalDataTask): panic: jobQueueStdPost: out of QJOBs!

0xca94290 (ip6MapLocalDataTask): panic: jobQueueStdPost: out of QJOBs!

0xca94290 (ip6MapLocalDataTask): panic: jobQueueStdPost: out of QJOBs!

0xca94290 (ip6MapLocalDataTask): panic: jobQueueStdPost: out of QJOBs!

0xca94290 (ip6MapLocalDataTask): panic: jobQueueStdPost: out of QJOBs!

0xca94290 (ip6MapLocalDataTask): panic: jobQueueStdPost: out of QJOBs!

Dell PowerConnect 5448 Multiple Hosts Mode

$
0
0

In the Web interface of this switch, there is a "Multiple Hosts" mode...  Is this some sort of "port security" wherein if another switch is placed here (naturally with multiple servers connected) will get dropped?

I have an secondary switch connected to a primary switch in "access mode".  Both primary and secondary switch interface connected to each other 

is in mode "access vlan xx" (not in trunk).  It seems that when the secondary switch is connected.  Everything disconnects.


Int Vlan 1 state down

$
0
0

Hi Im new to Dell switches but so far Ive been going good as the syntax is very familiar to one that I am used to. I have an issue where I have multiple vlans and i try to create an Ip address for interface VLAN 1 but it does not want to come up. My other vlan interfaces come up but for some odd reason vlan 1 interface stays down. can someone please  help me?

Dell Powerconnect 7048 VLAN routing no internet

$
0
0

here is my setup

5548 ---> 7048 ---> Cisco ASA 5505

I have vlan routing currently at my Cisco ASA 5505

I am trying to move routing to the 7048.

I can route between all vlan when use the 7048's VLAN ip's as default gateways.  The problem is anything that is no in the default VLAN 4 I can get to the internet even after add a ip route 192.168.102.0 255.255.255.0 192.168.102.1 to the config.  Bellow is the config of my 7048.  Also below is a picture of my IP addres on my server that can hit the internet.  If I set the default gateway to 192.168.102.1 the internet works fine.  Any help would be greatly appreciated!

!Current Configuration:
!System Description "PowerConnect 7048, 4.2.2.3, VxWorks 6.6"
!System Software Version 4.2.2.3
!System Operational Mode "Normal"
!
configure
vlan database
vlan 2,4-5,40,100
vlan routing 1 1
vlan routing 4 2
vlan routing 40 3
vlan routing 2 4
vlan routing 100 5
vlan routing 5 6
exit
vlan 2
name "DMZ"
exit
vlan 4
name "Desktops"
exit



vlan 5
name "Phone"
exit
vlan 40
name "Management"
exit
vlan 100
name "iSCSI-01"
exit
snmp-server location "OHPC01"
hostname "CORE-01"
slot 1/0 5 ! PowerConnect 7048
sntp unicast client enable
sntp server 192.168.8.11
clock summer-time recurring USA
clock timezone -5 minutes 0
stack
member 1 5 ! PCT7048
exit
interface out-of-band
ip address 10.1.40.10 255.255.255.0 0.0.0.0



exit
ip domain-name ""
ip name-server "192.168.8.11"
ip name-server "192.168.8.12"
ip routing
ip default-gateway 192.168.103.1
ip route 0.0.0.0 0.0.0.0 192.168.103.1 253
interface vlan 1
exit
interface vlan 2
ip address 192.168.102.120 255.255.255.0
exit
interface vlan 4
exit
interface vlan 5
exit
interface vlan 40
ip address 192.168.103.40 255.255.255.0
exit
interface vlan 100
exit



line telnet
exec-timeout 30
enable authentication enableList
exit
no flowcontrol
!
interface Gi1/0/1
switchport general pvid 2
switchport access vlan 2
exit
!
interface Gi1/0/2
switchport access vlan 40
exit
!
interface Gi1/0/3
description 'WiFi_Access_Point'
switchport access vlan 4
exit



!
interface Gi1/0/4
description 'Avaya_Phone_System'
switchport access vlan 5
exit
!
interface Gi1/0/5
description 'iDRAC'
switchport access vlan 40
exit
!
interface Gi1/0/6
description 'iDRAC'
switchport access vlan 40
exit
!
interface Gi1/0/7
description 'iDRAC'
switchport access vlan 40
exit
!



interface Gi1/0/8
description 'iDRAC'
switchport access vlan 40
exit
!
interface Gi1/0/9
description 'VMware_Management'
switchport access vlan 40
exit
!
interface Gi1/0/10
description 'VMware_Management'
switchport access vlan 40
exit
!
interface Gi1/0/11
description 'VMware_Management'
switchport access vlan 40
exit
!
interface Gi1/0/12



description 'VMware_Management'
switchport access vlan 40
exit
!
interface Gi1/0/13
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/14
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/15



switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/16
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/17
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1



exit
!
interface Gi1/0/18
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/19
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/20
switchport mode general
switchport general pvid 4



switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/21
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/22
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!



interface Gi1/0/23
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/24
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/25
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged



switchport general allowed vlan remove 1
exit
!
interface Gi1/0/26
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/27
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/28
switchport mode general



switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/29
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/30
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit



!
interface Gi1/0/31
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/32
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/33
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4



switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/34
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/35
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/36



switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/37
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/38
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 5,40 tagged
switchport general allowed vlan remove 1



exit
!
interface Gi1/0/39
switchport mode general
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 5,40 tagged
switchport general allowed vlan remove 1
exit
!
interface Gi1/0/40
description 'Cisco_ASA_VLAN2'
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
switchport access vlan 2
exit
!
interface Gi1/0/41
description 'Cisco_ASA_VLAN4'



switchport general pvid 2
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
switchport access vlan 4
exit
!
interface Gi1/0/42
description 'Cisco_ASA_VLAN5'
switchport general pvid 4
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
switchport access vlan 5
exit
!
interface Gi1/0/43
description 'Cisco_ASA_VLAN40'
switchport general pvid 40
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged



switchport general allowed vlan remove 1
switchport access vlan 40
exit
!
interface Gi1/0/44
description 'Cisco_ASA_VLAN100'
switchport general pvid 100
switchport general allowed vlan add 4
switchport general allowed vlan add 2,5,40 tagged
switchport general allowed vlan remove 1
switchport access vlan 100
exit
!
interface Gi1/0/45
switchport access vlan 40
exit
!
interface Gi1/0/46
switchport access vlan 4
exit
!



interface Gi1/0/47
switchport mode trunk
switchport access vlan 4
exit
!
interface Gi1/0/48
switchport mode trunk
switchport access vlan 4
 

PowerConnect 2324 - will not connect to ASA

$
0
0

Hello,

I have a PowerConnect 2324 that I would like to use to uplink wireless APs to a Cisco ASA. But when I connect the 2324 the link to the ASA is just a slow steady green blink and there is now communication through the interface.

I currently have the ASA and AP connected through a SoHo 5 port device and that works fine , I am just trying to remove all SoHo type devices.

I had the 2324 connected to a 3548P for expansion and it was working for that.

The Cisco ASA has the wlan interface set to auto negotiate. The connection to the AP seems to work OK.

I have tried moving the cable around to try other ports but that makes no difference.

 Thanks for helpful suggestions.

DHCPCLIEN Failed to acquire an IP address on intIfNum - 274; DHCP Server did not respond.

$
0
0

I have Dell Powerconnect 8024F 10gig switche. One of them is having NOTICE event in logs : "

DHCPCLIENFailed to acquire an IP address on intIfNum - 274; DHCP Server did not respond.

"

It's looping infinitely on all of them.

Maximum frame size support for LInk aggregation Dell Power connect 6224

$
0
0

does anyone know where i can find the info for my Dell PowerConnect 6224 and if it supports jumbo frames.

I am trying to get the most out of my switch and it seems when I set my device to jumbo frames MTU 9000 it doesnt work right.

Viewing all 2954 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>