Quantcast
Channel: PowerConnect Forum - Recent Threads
Viewing all 2954 articles
Browse latest View live

Stacked N3024 OOB IP Conflict

$
0
0

Okay, I'm not getting this

2 x 3024 stacked, OOB IP address configured as 192.168.0.11 (MGMT LAN)

I was scanning my network to do a cleanup of ip's in dns & dhcp when I noticed a strange ip, 192.168.113.160 (Our Internal LAN).

Low and behold, I logged into to it and found out it's my N3024's. So I opened up the .11 and yup it's the same device

Then I see it's showing a conflict on the .160 address. Network scan shows nothing else active on that port.

Run the Conflict Detect and yup still there. I've made a reservation in dhcp for that mac address to see if it moves but I still don't know why it is even using that address since there is no physical connection between the 2 lans except thru my workstation.

Anyone have any ideas?


M8024-K blade switch - won't factory reset

$
0
0

I have two Dell M8024-k switches and they are driving me absolutely crazy. I recently placed them both in a stack for testing purposes (they're not in production). Now I want to just reset them to factory defaults as I've decided against using the stack. Here's what I did:

  • Reset in many different ways - delete startup-config, clear config / wr, reset to factory from GUI, etc
  • Removed stack cables
  • Tried going through the initial setup wizard but I still end up with my switches in stacks
  • Tried connecting via console to use boot options, console just doesn't work. 

Now what's happening is both switches are showing as Master, and when they boot up they go into their own individual stack, albeit in stand-alone mode. So, Switch A is Master of Stack A in stand-alone mode. Switch B is Master of Stack B in stand-alone mode.

Is this by design? Is their no way to completely remove the stack configuration from the switches and start from scratch?

Dell OS on VMWARE

$
0
0

Hello,
After created on Virtualbox the VM based on FTOS, I have tried to export to Vmware platform and doesn't works. Also I have modified the ovf file that is the description file but doesn't works.
Exists any possibility to simulate dell OS on Vmware? I need emulate on vmware because I must inspected a interoperability between Dell and Cisco.

Best regards,

InterVLan Routing

$
0
0

I currently have 7 layer 3 switches. I have 2-n4032 switches for my backbone. I have 2-Dell n3024p switches in one closet. A HP Procurve in the server room and 2-Dell n3024 switches in the server room. The HP Procurve has ip routing enabled with 5 vlans. It is the orginal switch. I have added the n4032 switches which are also tied to the iscsi. I am wondering if I should configure each switch with ip routing and a ip address for each vlan on each of the switches. Or do I let the Procurvedo all the routing and setup the other switches as layer 2.

OpenManage Switch Administrator with HTTPS SHA 256 CSR on N4032F, possible?

$
0
0

Hi,

we have a Dell Networking N4032F Switch with Dell OpenManage Switch Administrator Version  6.0.0.8.

Since SHA-1 is not supported by browsers in 2017, I would like to change the certificate to SHA-256 or higher on the switch. 

What OMSA version do I need to generate a SHA-256 CSR? Or is there another way, like uploading key+certifacte from openssl?

Tobias

[SOLVED] Power Up A Stack

$
0
0

I've just received 5 pc6248s and I want to build them into a stack.

1. The switches are all used so do I have to factory reset them before building them into a stack?

2. From what I read in the Dell Technical White Paper I have to power up the switches sequentially (the manager, the stand-by,...). Do I have always to power up the stack that way or is it just applied one time when building the stack?

Thanks all.

Preferred QoS configuration on Dell 2048P edge switches

$
0
0

Hi All,

I wanted to establish what is the preferred QoS configuration for a 2048P switch that connects to Cisco IP Phones

The Cisco phones mark their own voice signaling and voice bearer packets with DCSP values 24 and 46 respectively.

In this scenario, I would apply the configuration globally so that it applies to all interfaces and uplinks.

classofservice trust ip-dscp

classofservice ip-dscp-mapping 24 5

classofservice ip-dscp-mapping 46 5

cos-queue strict 5

or......

classofservice trust dot1p

classofservice dot1p-mapping 3 5

classofservice dot1p-mapping 5 5

cos-queue strict 5

I assume the above configurations will trust/honor the dscp value of the incoming packet and place them in a strict priority queue?

Phone interface configuration

switchport mode general

switchport general pvid 205

switchport general allowed vlan add 205

switchport general allowed vlan add 155 tagged

switchport general allowed vlan remove 1

voice vlan 155

voice vlan auth disable

Many thanks

Jamie

Dell switch N3048 ACL problem

$
0
0

Hello,
We are trying to setup two N3048 stacked switches and we have trouble with ACLs. We need to define ACLs on every VLAN and thought that rules are applied just in case that packet is leaving vlan or it is entering the vlan but we found out that if there is one pc connected to switch port in vlan and we are trying to create ACL with rule enabling ping to this PC, we also need to create second inbound rule to enable the PC to answer. It looks like switch is applying inbound ACLs also to packets going from PC to switch port. Is it normal?

In this case if I have PC with IP 10.1.180.20 in VLAN 5 and I'm trying to ping it from other vlan (there are no ACLs in other vlan), I need to create:

ACL bound to VLAN 5 as inbound

rule 1
permit ICMP packets from any to 10.1.180.20

rule 2
permit ICMP packets from 10.1.180.20 to any

Is it really like that? If I remove second rule, I'm not able to ping 10.1.180.20 from other VLAN. On router I can use instead of second rule something like permit established connections ...

That you for reaction.

Best regards, Oldrich

 


Trouble with N3024 switch and Forcepower 10 switch

$
0
0

I have a system I am trying to configure. I have a dell N3024 external switch and a Forcepower 10 switch connecting to a server. There are 2 separate systems. System 1 works just fine but the same syntax in system 2 does not. Im not even receiving connectivity lights on the N3024. Any suggestions or guidance ?

PowerConnect M8024-k switches losing clock settings upon reboot

$
0
0

I have 2 PowerConnect M8024-k blade switches in a stack configuration (although this issue was also occurring without the stack). 

I am setting the clock manually with the clock set commands, but every time I reload the switches, the clock settings are completely lost. I'm saving the config before reload of course. I'm not using any SNTP, I'm just simply setting manual local time.

Is there a solution to this?

DELL N3024F - ARP[ipMapForwarding]

$
0
0

Hi ,

I am having issues with ARP broadcast from our network devices which has Failover virtual IP configured for 2 x physical NIC connection.

Our setup is 2 x DELL N3024F switch connect to 02 x DELL 6224F switch. Default VLAN 1.

a. DELL N3024F switch is not stacked, it has VRRP configured for L3 routing

b. DELL 6224F switch is stacked with port -channel Link Aggregation 

c. Port Gi1/0/2 on DELL N3024F SW-01 connect (RJ45) to 1/g1 on DELL 6224F SW-01

d. Port Gi1/0/2 on DELL N3024F SW-02 connect (RJ45) to 2/g1 on DELL 6224F SW-02

Logging message received sample:

Nov  xx 10:20:36 172.168.XX.XX-1 ARP[ipMapForwarding]: ipmap_arp_api.c(1149) 391233 %% Received ARP Reply on interface Vl1 with bad target IP address 255.255.255.255. Sender IP is 172.168.XX.XXX, sender MAC is 00:25:97:XX:XX:XX.

These messages flooded and caused DELL N3024F switch to disconnect interface Gi1/0/2 port from DELL 6224F switch. Everytime this happens to either DELL N3024F switch, I have to power reboot the affected switche to get the connection up again.

Am i missing some configuration not properly done for DELL N3224F switch?

DELL 6224F switch is not showing any errors for the same ARP broadcast, and most of the devices is connected to through it.

Thanks for your kind advice and support.

Accessing boot menu on a M8024 from the CMC cli

$
0
0

Is there a way to access the boot menu on a M8024 though the CMC console redirect? Bought a used switch and I am unable to log in and need to reset the password and all the settings. If not will any usb serial cable work or is there a specific one I need to use?

Thanks!

Need help with commands to clear a switch port config N2024 Stacked

$
0
0

The existing config is:

interface Gi1/0/20

speed 1000

description "WifiLocation2"

switchport general allowed vlan add 154

switchport general allowed vlan add 153 tagged

switchport general allowed vlan remove 1

switchport access vlan 15

lldp transmit-tlv sys-desc sys-cap

lldp transmit-mgmt

lldp notification

lldp med confignotification

voice vlan auth disable

I need it to look like:

interface Gi1/0/20

description "WifiLocation2"

switchport access vlan 15

I have tried quite a few things but cannot get rid of the switchport lines

any help would be appreciated

Clayton

802.1X with MAB on Phone+PC port

$
0
0

Hi,

I am considering enabling 802.1X on N2000 switch on a port with Phone & PC connected and need some clarification on the subject of behavior of this setup.


I want to treat the Phone as 802.1X unaware client. So according to N-series User Guide, I should choose 802.1X MAC-based authentication with MAC-bypass (MAB). It is stated that when port is configured with MAB it will check first if connected client responds to EAP Request. If no EAP Response, then it goes with MAC address.

Now, let's assume the Phone has booted and is up and running. Now we plug in PC behind the Phone.

1. Will that PC be able to do 802.1X with Active Domain credentials username & password (EAP Request/Reply) or once the port on a switch is set to MAC-based auth it will always need to authenticate with MAC address only?

2. Will Dynamic VLAN Assignment with attributes returned by RADIUS work assuming port in General mode?

Thanks,

Dell N4000 decrease convergence time MLAG/VRRP

$
0
0

I am having issues with the time convergence in this solution. Basically, I have two N4064F in MLAG and running VRRP. Everything works fine, but the time is killing me.

Sometimes it takes 5-12 seconds establish the communication and we have voice in this site. So, we lose the voice while the protocols do their recalculation. It works like this: if we disconnect one of the switches simulating a failure, sometimes it doesn't lose packets, but when reconnect the second switch they do the calculation for both protocols, and we lose connection for 5-12 seconds. Sometimes, We lose packets when we disconnect the switch, but after the re-connection, it will lose one packet, and that's fine.

S,o I need a quick recovery after failure, and after second switch recovery. I have tested all the parameters in VRRP and MLAG: decrease timers, change priorities, disable preempt, and decreasing STP timer, but the result is the same. I not sure what else to do. When I call Dell, they send their guides for MLAG and VRRP. I already followed all those procedures, but the result is the same.

Here are my configuriations:

configure
vlan 2,300,310,330,335,510,555,610-612,1000,3000
exit
vlan 2
name "Red actual"
exit
vlan 310
name "Tel.-Centro"
exit
vlan 510
name "PCs-Centro"
exit
vlan 555
name "administracion"
exit
vlan 610
name "nav-guest"
exit
vlan 611
name "V611"
exit
vlan 612
name "V612"
exit
vlan 1000
name "v1000-HMC"
exit
hostname "CentroSW1"
slot 1/0 5    ! Dell Networking N4064F
slot 1/1 6    ! Dell QSFP Card
stack
member 1 4    ! N4064F
exit
ip http timeout-policy idle 3600 life 86400
ip access-list admin
exit
ip routing
interface vlan 1
ip address dhcp
exit
interface vlan 2
ip address 172.16.4.109 255.255.0.0
exit
interface vlan 300
ip address 172.26.95.2 255.255.255.0
exit
interface vlan 310
ip address 172.26.80.2 255.255.255.0
ip helper-address 172.16.7.14 domain
ip helper-address 172.16.7.21 domain
ip helper-address 172.16.7.14 dhcp
ip helper-address 172.16.7.21 dhcp
exit
interface vlan 330
ip address 192.168.230.2 255.255.255.0
ip helper-address 172.16.7.14 domain
ip helper-address 172.16.7.21 domain
ip helper-address 172.16.7.14 dhcp
ip helper-address 172.16.7.21 dhcp
exit
interface vlan 510
ip address 172.26.144.2 255.255.240.0
ip helper-address 172.16.7.14 domain
ip helper-address 172.16.7.21 domain
ip helper-address 172.16.7.14 dhcp
ip helper-address 172.16.7.21 dhcp
exit
interface vlan 555
ip address 172.26.194.92 255.255.252.0
exit
interface vlan 3000
ip address 192.168.71.17 255.255.255.252
exit
ip route 0.0.0.0 0.0.0.0 172.16.4.1
ip route 172.26.10.0 255.255.255.0 172.16.4.22 5
ip route 172.26.64.0 255.255.252.0 172.16.4.90
ip route 172.26.79.0 255.255.255.0 172.16.4.90
ip route 172.26.128.0 255.255.240.0 172.16.4.90
username "incristian" password c3670758e087fc72a9ffb44f66c1e3e4 privilege 15 encrypted
spanning-tree mode mst
spanning-tree priority 4096
ip vrrp
dhcp l2relay
!
interface Te1/0/1
channel-group 10 mode on
description " MLAG partner link 10"
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/2
channel-group 11 mode on
description "mlag partner link"
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/3
channel-group 13 mode on
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/4
channel-group 14 mode on
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/5
channel-group 15 mode on
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/6
channel-group 16 mode on
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/7
channel-group 17 mode on
switchport mode trunk
switchport trunk native vlan 330
switchport trunk allowed vlan 330,335
exit
!
interface Te1/0/11
channel-group 18 mode on
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,300,310,510,555,610-612
exit
!
interface Te1/0/12
channel-group 19 mode on
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,300,310,510,555,610-612
exit
!
interface Te1/0/44
channel-group 20 mode on
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,610,612,1000
exit
!
interface Te1/0/46
channel-group 21 mode on
switchport mode trunk
switchport trunk allowed vlan 2,300,310,335,510,555,610-612,1000
exit
!
interface Te1/0/47
channel-group 1 mode active
description "EnlACEs-entre-switches-MLAG"
spanning-tree disable
switchport mode trunk
udld enable
udld port aggressive
exit
!
interface Te1/0/48
channel-group 1 mode active
description "EnlACEs-entre-switches-MLAG"
spanning-tree disable
switchport mode trunk
udld enable
udld port aggressive
exit
!
interface Fo1/0/1
speed 40000
exit
!
interface Fo1/0/2
speed 40000
exit
!
interface Fo1/1/1
speed 40000
exit
!
interface Fo1/1/2
speed 40000
exit
!
interface port-channel 1
description "Enlace-entre-Switches-MLAG"
spanning-tree disable
vpc peer-link
exit
!
interface port-channel 10
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 10
exit
!
interface port-channel 11
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 11
exit
!
interface port-channel 13
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 13
exit
!
interface port-channel 14
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 14
exit
!
interface port-channel 15
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 15
exit
!
interface port-channel 16
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 16
exit
!
interface port-channel 17
switchport mode trunk
switchport trunk native vlan 330
switchport trunk allowed vlan 330,335
vpc 17
exit
!
interface port-channel 18
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,300,310,510,555,610-612
vpc 18
exit
!
interface port-channel 19
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,300,310,510,555,610-612
vpc 19
exit
!
interface port-channel 20
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,610,612,1000
vpc 20
exit
!
interface port-channel 21
switchport mode trunk
switchport trunk allowed vlan 2,300,310,335,510,555,610-612,1000
vpc 21
exit
interface vlan 2 2
vrrp 20
vrrp 20 mode
vrrp 20 ip 172.16.4.91
vrrp 20 priority 200
vrrp 20 accept-mode
exit
interface vlan 300 3
vrrp 251
vrrp 251 mode
vrrp 251 ip 172.26.95.1
vrrp 251 priority 200
vrrp 251 accept-mode
exit
interface vlan 310 4
vrrp 252
vrrp 252 mode
vrrp 252 ip 172.26.80.1
vrrp 252 priority 200
vrrp 252 accept-mode
exit
interface vlan 330 5
vrrp 250
vrrp 250 mode
vrrp 250 ip 192.168.230.1
vrrp 250 priority 200
vrrp 250 accept-mode
exit
interface vlan 510 6
vrrp 253
vrrp 253 mode
vrrp 253 ip 172.26.144.1
vrrp 253 priority 200
vrrp 253 accept-mode
exit
interface vlan 555 7
vrrp 254
vrrp 254 mode
vrrp 254 ip 172.26.194.91
vrrp 254 priority 200
vrrp 254 accept-mode
exit
snmp-server engineid local 800002a203f8b15662a650
feature vpc
vpc domain 2
role priority 10
peer-keepalive enable
peer-keepalive destination 192.168.71.18 source 192.168.71.17
peer detection enable
exit
exit


configure
vlan 2,300,310,330,335,510,555,610-612,1000,3000
exit
vlan 2
name "Red actual"
exit
vlan 310
name "Tel.-Centro"
exit
vlan 510
name "PCs-Centro"
exit
vlan 555
name "administracion"
exit
vlan 610
name "nav-guest"
exit
vlan 611
name "V611"
exit
vlan 612
name "V612"
exit
vlan 1000
name "v1000-HMC"
exit
hostname "CentroSW2"
slot 1/0 5    ! Dell Networking N4064F
slot 1/1 6    ! Dell QSFP Card
stack
member 1 4    ! N4064F
exit
ip http timeout-policy idle 3600 life 86400
ip access-list admin
exit
ip routing
interface vlan 1
ip address dhcp
exit
interface vlan 2
ip address 172.16.4.110 255.255.0.0
exit
interface vlan 300
ip address 172.26.95.3 255.255.255.0
exit
interface vlan 310
ip address 172.26.80.3 255.255.255.0
ip helper-address 172.16.7.14 domain
ip helper-address 172.16.7.21 domain
ip helper-address 172.16.7.14 dhcp
ip helper-address 172.16.7.21 dhcp
exit
interface vlan 330
ip address 192.168.230.3 255.255.255.0
ip helper-address 172.16.7.14 domain
ip helper-address 172.16.7.21 domain
ip helper-address 172.16.7.14 dhcp
ip helper-address 172.16.7.21 dhcp
exit
interface vlan 510
ip address 172.26.144.3 255.255.240.0
ip helper-address 172.16.7.14 domain
ip helper-address 172.16.7.21 domain
ip helper-address 172.16.7.14 dhcp
ip helper-address 172.16.7.21 dhcp
exit
interface vlan 555
ip address 172.26.194.93 255.255.252.0
exit
interface vlan 3000
ip address 192.168.71.18 255.255.255.252
exit
ip route 0.0.0.0 0.0.0.0 172.16.4.1
ip route 172.26.10.0 255.255.255.0 172.16.4.22 5
ip route 172.26.64.0 255.255.252.0 172.16.4.90
ip route 172.26.79.0 255.255.255.0 172.16.4.90
ip route 172.26.128.0 255.255.240.0 172.16.4.90
username "incristian" password c3670758e087fc72a9ffb44f66c1e3e4 privilege 15 encrypted
spanning-tree mode mst
spanning-tree priority 28672
ip vrrp
dhcp l2relay
!
interface Te1/0/1
channel-group 10 mode on
description " MLAG partner link 10"
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/2
channel-group 11 mode on
description "mlag partner link"
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/3
channel-group 13 mode on
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/4
channel-group 14 mode on
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/5
channel-group 15 mode on
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/6
channel-group 16 mode on
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,310,510,555,610,612
exit
!
interface Te1/0/7
channel-group 17 mode on
switchport mode trunk
switchport trunk native vlan 330
switchport trunk allowed vlan 330,335
exit
!
interface Te1/0/11
channel-group 18 mode on
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,300,310,510,555,610-612
exit
!
interface Te1/0/12
channel-group 19 mode on
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,300,310,510,555,610-612
exit
!
interface Te1/0/44
channel-group 20 mode on
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,610,612,1000
exit
!
interface Te1/0/46
channel-group 21 mode on
switchport mode trunk
switchport trunk allowed vlan 2,300,310,335,510,555,610-612,1000
exit
!
interface Te1/0/47
channel-group 1 mode active
description "EnlACEs-entre-switches-MLAG"
spanning-tree disable
switchport mode trunk
udld enable
udld port aggressive
exit
!
interface Te1/0/48
channel-group 1 mode active
description "EnlACEs-entre-switches-MLAG"
spanning-tree disable
switchport mode trunk
udld enable
udld port aggressive
exit
!
interface Fo1/0/1
speed 40000
exit
!
interface Fo1/0/2
speed 40000
exit
!
interface Fo1/1/1
speed 40000
exit
!
interface Fo1/1/2
speed 40000
exit
!
interface port-channel 1
description "Enlace-entre-Switches-MLAG"
switchport mode trunk
vpc peer-link
exit
!
interface port-channel 10
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 10
exit
!
interface port-channel 11
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 11
exit
!
interface port-channel 13
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 13
exit
!
interface port-channel 14
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 14
exit
!
interface port-channel 15
switchport mode trunk
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 15
exit
!
interface port-channel 16
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,310,510,555,610,612
vpc 16
exit
!
interface port-channel 17
switchport mode trunk
switchport trunk native vlan 330
switchport trunk allowed vlan 330,335
vpc 17
exit
!
interface port-channel 18
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,300,310,510,555,610-612
vpc 18
exit
!
interface port-channel 19
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,300,310,510,555,610-612
vpc 19
exit
!
interface port-channel 20
switchport mode trunk
switchport trunk native vlan 2
switchport trunk allowed vlan 2,610,612,1000
vpc 20
exit
!
interface port-channel 21
switchport mode trunk
switchport trunk allowed vlan 2,300,310,335,510,555,610-612,1000
vpc 21
exit
interface vlan 2 2
vrrp 20
vrrp 20 mode
vrrp 20 ip 172.16.4.91
vrrp 20 priority 200
vrrp 20 accept-mode
exit
interface vlan 300 3
vrrp 251
vrrp 251 mode
vrrp 251 ip 172.26.95.1
vrrp 251 priority 195
vrrp 251 accept-mode
exit
interface vlan 310 4
vrrp 252
vrrp 252 mode
vrrp 252 ip 172.26.80.1
vrrp 252 priority 195
vrrp 252 accept-mode
exit
interface vlan 330 5
vrrp 250
vrrp 250 mode
vrrp 250 ip 192.168.230.1
vrrp 250 priority 195
vrrp 250 accept-mode
exit
interface vlan 510 6
vrrp 253
vrrp 253 mode
vrrp 253 ip 172.26.144.1
vrrp 253 priority 195
vrrp 253 accept-mode
exit
interface vlan 555 7
vrrp 254
vrrp 254 mode
vrrp 254 ip 172.26.194.91
vrrp 254 priority 195
vrrp 254 accept-mode
exit
snmp-server engineid local 800002a203f8b15662a650
feature vpc
vpc domain 2
role priority 20
peer-keepalive enable
peer-keepalive destination 192.168.71.17 source 192.168.71.18
peer detection enable
exit
exit


Delete post

load balance Radius Authentication

$
0
0

HI Guys,

we have a bunch of N1548p in our office and our new project is to set RAdius authentication in those switch, my question is how can i configure the switch in case my frist radius server fail it try to authenticate in my radius server backup ?

best regards,

Help setting up Voice VLAN on PowerConnect 3548p

$
0
0

Hi,

I currently have four 3548p switches and a Mitel 3300 telephone system. At present we have a simple flat network but as things are expanding I would like to separate the telephone traffic using a Voice VLAN. Our computers are connected via the data port on the desk phones so are not using separate switch ports, i.e. the computer and phone on each desk shares the same switch port.

I've never done this before so wondered if anyone would be able to help with basic, step-by-step instructions on setting this up, preferably using the GUI.

As I said, I am very new to this so am feeling my way through this. I can see the Voice VLAN section in the GUI but a lot of the options are greyed out. Dies that mean I need to set up a VLAN first before making it the voice VLAN?

Any help would be most appreciated.

Mark

Jumbo Packet error on N3048P Switch Stack

$
0
0

I do not have Jumbo Frames enabled on any device on my network but I am continuously getting Jumbo Frames (which show up as errors on one of my switch stacks) and I have no idea where they are coming from.

I have connected the PC that I have Wire Shark on to the receiving switch stack but the switch is dropping the jumbo packets as errors so I do not see them. I have connected the PC to the switch stack that the packets would be the sending switch stack and I still have no idea where these packets are coming from.

Any advice? 

VOIP phones unable to obtain IP. N4032F core with 3 x stacked N2048P edge switches

$
0
0

My DHCP server is configured with all the scopes and option 156 (configServers=1.1.100.10, ftpservers=1.1.100.10, country=7, language=4, layer2tagging=1, vlanid=100) which is required for our Shoretel VOIP phone system.

When I plug a PC into any port I receive a VLAN3 IP as expected, if I change the PVID to 100 I receive a VLAN100 IP as expected, however when I plug a VOIP phone in I get a DHCP server Timeout message, I am really stuck on this issue now , any help would be greatly appreciated.

See the switch configs below:

My current Core Switch config:

!Current Configuration:
!System Description "Dell Networking N4032F, 6.3.1.8, Linux 3.7.10-d53e7a63"
!System Software Version 6.3.1.8
!Cut-through mode is configured as disabled
!
configure
vlan 2-4,100,110
exit
vlan 1
vlan association subnet 1.1.1.0 255.255.255.0
exit
vlan 2
name "Servers"
vlan association subnet 1.1.2.0 255.255.255.0
exit
vlan 3
name "Users"
vlan association subnet 1.1.3.0 255.255.255.0
exit
vlan 4
name "PCI-Users"
vlan association subnet 1.1.4.0 255.255.255.0
exit
vlan 100
name "VOIP"
vlan association subnet 1.1.100.0 255.255.255.0
exit
vlan 110
name "DMZ"
vlan association subnet 1.1.110.0 255.255.255.0
exit
slot 1/0 3 ! Dell Networking N4032F
stack
member 1 2 ! N4032F
exit
ip http secure-server
ip routing
ip helper-address 1.1.2.1 dhcp
ip helper-address 1.1.2.7 dhcp
interface vlan 1 1
ip address 1.1.1.200 255.255.255.0
exit
interface vlan 2 2
ip address 1.1.2.254 255.255.255.0
exit
interface vlan 3 3
ip address 1.1.3.254 255.255.255.0
ip helper-address 1.1.2.1
exit
interface vlan 4 4
ip address 1.1.4.254 255.255.255.0
ip helper-address 1.1.2.1
exit
interface vlan 100 5
ip address 1.1.100.254 255.255.255.0
ip helper-address 1.1.2.1 dhcp
exit
username "xxxx" password xxxx privilege 15 encrypted
voice vlan
radius-server host auth 1.1.2.16
name "Default-RADIUS-Server"
exit
ip ssh server
spanning-tree priority 4096
!
interface Te1/0/1
switchport mode trunk
exit
!
interface Te1/0/2
switchport mode trunk
exit
!
interface Te1/0/3
switchport mode trunk
exit
!
interface Te1/0/4
switchport mode trunk
exit
!
interface Te1/0/5
switchport mode trunk
exit
!
interface Te1/0/6
switchport mode trunk
exit
!
interface Te1/0/7
switchport mode trunk
exit
!
interface Te1/0/8
switchport mode trunk
exit
!
interface Te1/0/9
switchport mode trunk
exit
!
interface Te1/0/10
switchport mode trunk
exit
!
interface Te1/0/11
switchport mode trunk
exit
!
interface Te1/0/12
switchport mode trunk
exit
!
interface Te1/0/13
switchport mode trunk
exit
!
interface Te1/0/14
switchport mode trunk
exit
!
interface Te1/0/15
switchport mode trunk
exit
!
interface Te1/0/16
switchport mode trunk
exit
!
interface Te1/0/17
switchport mode trunk
exit
!
interface Te1/0/18
switchport mode trunk
exit
!
interface Te1/0/19
switchport mode trunk
exit
!
interface Te1/0/20
switchport mode trunk
exit
!
interface Te1/0/21
switchport mode trunk
exit
!
interface Te1/0/22
switchport mode trunk
exit
!
interface Te1/0/23
switchport mode trunk
exit
!
interface Te1/0/24
switchport mode trunk
exit
snmp-server engineid local 800002a203f48e384225fa
eula-consent support-assist reject
exit

My Edge Switch Stack Config (I am only posting the config from Stack member 1 as all ports are configured identically:

!Current Configuration:
!System Description "Dell Networking N2048P, 6.3.1.8, Linux 3.6.5-7dc37651"
!System Software Version 6.3.1.8
!
configure
vlan 2-4,20,100,110
exit
vlan 2
name "Servers"
exit
vlan 3
name "Users"
exit
vlan 4
name "PCI-Users"
exit
vlan 100
name "VOIP"
exit
vlan 110
name "DMZ"
exit
slot 1/0 9 ! Dell Networking N2048P
slot 2/0 9 ! Dell Networking N2048P
slot 3/0 9 ! Dell Networking N2048P
stack
member 1 9 ! N2048P
member 2 9 ! N2048P
member 3 9 ! N2048P
exit
logging monitor debugging
logging 1.1.1.100
description "Asus Laptop"
level debugging
exit
boot auto-copy-sw
interface vlan 1 1
ip address 1.1.1.201 255.255.255.0
exit
username "xxx" password 7xx privilege 15 encrypted
voice vlan
ip ssh server
power inline management static
!
interface Gi1/0/1
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 2
switchport general allowed vlan add 2-3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/2
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/3
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/4
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan none
voice vlan auth disable
exit
!
interface Gi1/0/5
switchport mode general
switchport general pvid 2
switchport general allowed vlan add 2-3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/6
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/7
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/8
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
power inline limit user-defined 32000
power inline powered-device MR18-7-Marketing
power inline priority critical
exit
!
interface Gi1/0/9
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/10
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/11
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/12
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/13
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/14
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/15
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/16
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/17
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/18
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/19
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/20
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/21
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/22
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 2
switchport general allowed vlan add 2-3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/23
switchport voice detect auto
spanning-tree portfast
switchport general allowed vlan remove 1
switchport access vlan 2
voice vlan 100
exit
!
interface Gi1/0/24
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/25
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/26
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/27
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/28
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/29
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/30
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/31
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/32
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/33
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/34
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/35
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/36
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/37
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/38
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/39
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/40
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/41
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/42
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/43
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/44
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/45
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/46
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/47
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Gi1/0/48
switchport voice detect auto
spanning-tree portfast
switchport mode general
switchport general pvid 3
switchport general allowed vlan add 3
switchport general allowed vlan add 100 tagged
voice vlan 100
exit
!
interface Te1/0/1
spanning-tree guard loop
switchport mode trunk
exit
!
interface Te1/0/2
spanning-tree guard loop
switchport mode trunk
exit
!

Thanks for your help

Viewing all 2954 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>