Quantcast
Channel: PowerConnect Forum - Recent Threads
Viewing all 2954 articles
Browse latest View live

LAG/STP Configuration between two N2024 iSCSI Switches

$
0
0

Hi there,

I'm having an issue with a very simple setup between two N2024 used purely for iSCSI connectivity between a EqualLogic group members and servers.

I configured the switches as per the "Dell Networking N2000 Series Switch Configuration Guide for EqualLogic SANs" document.

The switches are configured as follows:

  • Gi1/0/1 is in vlan 10 and is used for management
  • All other ports are in the default vlan
  • Te1/0/1 and Te1/0/2 are in an LAG (Po1) and connect the two switches together
  • LAG is up at both ends

My problem is that there is no connectivity over the LAG unless I disable STP on the LAG port.  I was having problems with the EqualLogic group and narrowed it down to this issue with having STP enabled.  Port Fast is not enabled at all.

When STP was enabled, the LAG went into "discarding" state and there was no traffic between the switches.  If I disabled STP, the LAG goes into a "Manual Forwarding" state and traffic is passed between the switches.  The only links between the switches are the two 10Gb SFP cables which are in the LAG.

There's really very little configuration on the switches, I set them up exactly as described in the Dell document which sets very few options, so it seems odd that there should be an issue with this.

Does anyone have any suggestions as to what might be wrong?  I can post any config needed.

Cheers


Help, Had Switch outage Powerconnect 8024F

$
0
0

We have dual Powerconnect 8024F connected with stack 4x10G , last night we had few ports outage , that caused part of the network to be disconnected.

Looking on the switch log i have following events below , and switch version

Please advice

Thanks

15.0.1.35.1.6.35.1.1.7image1
25.1.1.75.1.1.75.1.6.3image2

AlertMAR 10 10:11:34OSAPITask-id(FIP keepalive) 1748b770 stack usage greater than 90 perc of allocated stack size
AlertMAR 10 10:06:35OSAPITask-id(FIP keepalive) 1748b770 stack usage greater than 90 perc of allocated stack size
AlertMAR 10 09:46:35OSAPITask-id(FIP keepalive) 1748b770 stack usage greater than 90 perc of allocated stack size
AlertMAR 10 09:31:35OSAPITask-id(FIP keepalive) 1748b770 stack usage greater than 90 perc of allocated stack size

NSA2600 : settings to reduce bandwidth to Youtube

$
0
0

Hello,

We use a Dell SonicWall 2600
Firmware Version: SonicOS Enhanced 6.1.2.0-11n
Safemode Version: SafeMode 6.1.0.9
ROM Version: SonicROM 5.4.0.15.

Some of our users use "a little" too much Youtube but we are not allowed to block it. So, to keep our bandwidth, we want to reduce bandwidth assigned to this website.

The question is : how to proceed ?

I've found a way but for SonicOS 5.5 and all is different with SonicOS6.1.

Do you have any idea ? Don't mind explain a lot, I'm not used with this device.

Thanks a lot

How to interpret the IfLastChange value ?

$
0
0

Hello,


I want to get the time for how long a switchport on my 5548 has been down.

However,  IfLastChange doesn't seem to display the SysUpTime value.

Initial values

SysUpTime(t): 2117493000

IfLastChange(t): 399059863

Values, after shutting down the switchport for 32 seconds

SysUpTime(t+32s): 2117496200

IfLastChange(t+32s): 399508369

And, now I have no idea how to calculate when the last switchport status change occured.

VRTX Switch R1-2401 aggregate links to Merkai MS320-48 switch

$
0
0

Hi, just installed a new vrtx server and I was trying to aggregate external ports gi0/1 - 8 to the Meraki ports 1 - 8

Initially, until I had all the cabling in, I only had ports 1 and 2 connected in LAG 5. LAG works fine, various Vlans ok and the Meraki is happy.

Added the other cables in and expanded the LAG at both ends and I get problems bringing all 8 up. It seems port 5 -8 just do not like being added. If I just concentrate on port 5 alone, that normally just does not add in. I'm down to the command line of the R1-2401 now to see what is happening now. I'm very used to configuring Cisco switches so this is comfortable for me.I have rebooted stuff too.

The switch was already running the latest firmware that I could see online. 1.0.0.62 but any suggestions welcome. Good quality cat6a cables are fitted and verfied as have the ports individually. When I was using the gui, I did see 6 of the 8 at one time come up. The first 4 are always good.

Config from switch for 1st 5 ports are:

interface gigabitethernet0/1
no eee enable
no mdix
no negotiation
channel-group 5 mode auto
switchport mode trunk
no eee lldp enable
!
interface gigabitethernet0/2
no eee enable
no mdix
no negotiation
channel-group 5 mode auto
switchport mode trunk
no eee lldp enable
!
interface gigabitethernet0/3
no eee enable
no mdix
no negotiation
channel-group 5 mode auto
switchport mode trunk
no eee lldp enable
!
interface gigabitethernet0/4
no eee enable
no mdix
no negotiation
channel-group 5 mode auto
switchport mode trunk
no eee lldp enable
!
interface gigabitethernet0/5
no eee enable
no mdix
no negotiation
channel-group 5 mode auto
switchport mode trunk
no eee lldp enable

interface Port-channel5
speed 1000
no negotiation
description "LAG to External Ports"
spanning-tree cost 20000
switchport mode trunk

BrnoDellSw1#show lacp port-channel 5
Port-Channel Po5
Port Type Gigabit Ethernet
Attached Lag id:
Actor
System Priority:1
MAC Address: f8:b1:56:65:55:f2
Admin Key: 1004
Oper Key: 1004
Partner
System Priority:32768
MAC Address: 00:18:0a:ca:83:e1
Oper Key: 768

#show int port-channel 5

Load balancing: src-dst-mac.

Gathering information...
Channel Ports
------- -----
Po5 Active: gi0/1-4 Non-candidate: gi0/5

#show lacp gi0/1
gi0/1 LACP parameters:
Actor
system priority: 1
system mac addr: f8:b1:56:65:55:f2
port Admin key: 1004
port Oper key: 1004
port Oper number: 1
port Admin priority: 1
port Oper priority: 1
port Admin timeout: LONG
port Oper timeout: LONG
LACP Activity: ACTIVE
Aggregation: AGGREGATABLE
synchronization: TRUE
collecting: TRUE
distributing: TRUE
expired: FALSE
Partner
system priority: 32768
system mac addr: 00:18:0a:ca:83:e1
port Admin key: 0
port Oper key: 768
port Oper number: 1
port Admin priority: 0
port Oper priority: 32768
port Oper timeout: LONG
LACP Activity: ACTIVE
Aggregation: AGGREGATABLE
synchronization: TRUE
collecting: TRUE
distributing: TRUE
expired: FALSE
gi0/1 LACP statistics:
LACP Pdus sent: 170
LACP Pdus received: 170
gi0/1 LACP Protocol State:
LACP State Machines:
Receive FSM: Current State
Mux FSM: Collecting Distributing State
Periodic Tx FSM: Slow Periodic State
Control Variables:
BEGIN: FALSE
LACP_Enabled: TRUE
Ready_N: FALSE
Selected: SELECTED
Port_moved: FALSE
NNT: FALSE
Port_enabled: TRUE
Timer counters:
periodic tx timer: 26
current while timer: 79
wait while timer: 0
BrnoDellSw1#

1#show lacp gi0/5
gi0/5 LACP parameters:
Actor
system priority: 1
system mac addr: f8:b1:56:65:55:f2
port Admin key: 1004
port Oper key: 1004
port Oper number: 5
port Admin priority: 1
port Oper priority: 1
port Admin timeout: LONG
port Oper timeout: LONG
LACP Activity: ACTIVE
Aggregation: AGGREGATABLE
synchronization: FALSE
collecting: FALSE
distributing: FALSE
expired: FALSE
Partner
system priority: 0
system mac addr: 00:00:00:00:00:00
port Admin key: 0
port Oper key: 0
port Oper number: 0
port Admin priority: 0
port Oper priority: 0
port Oper timeout: LONG
LACP Activity: PASSIVE
Aggregation: AGGREGATABLE
synchronization: FALSE
collecting: FALSE
distributing: FALSE
expired: FALSE
gi0/5 LACP statistics:
LACP Pdus sent: 0
LACP Pdus received: 0
gi0/5 LACP Protocol State:
LACP State Machines:
Receive FSM: Port Disabled State
Mux FSM: Detached State
Periodic Tx FSM: No Periodic State
Control Variables:
BEGIN: FALSE
LACP_Enabled: TRUE
Ready_N: FALSE
Selected: UNSELECTED
Port_moved: FALSE
NNT: FALSE
Port_enabled: FALSE
Timer counters:
periodic tx timer: 0
current while timer: 0
wait while timer: 0

Anybody any ideas or want more info? It just totally struggles after port 4 to add anything in. I haven't ruled out a hardware fault on the switch module as it is new. Don't have anything else to compare with at the moment. On the Meraki all ports are set the same to trunk etc. Port 5 just stays brown not green and when you hover over  it you get the message "Port running LACP and LACP has disabled this port"

Thanks for anything,

Dave

Dell Force10 MXL & Broadcom 57840S 10Gb Quad Port

$
0
0

Hello,

We have a M1000 Chassis  (2x  Force10 MXL 10/40 GbE DCB Switch for dual switch config + 2x Brocade M5424 FC8 Switch Redundant (FI) 12 Ports with 2x 8Gb SFPs) with 5xM620( 1x Broadcom 57840S 10Gb Quad Port and 1x Emulex LPE1205-M 8Gbps Fibre Channe) 

My Question: 

1) On the M620 Servers

1.1) Can the 4 port of the Broadcom 57840S  be actif on each M620 ?

1.2) Can this port be splitted in mutiple vNIC ? 

1.3) Can some body point on a link that explain internal port maping between the Force10 swithc and the M620 Ethernet port (in case of the pNIC and vNIC if applicable) 

2) On the Force10 MXL can we choose some internal port and instruct the switch to have the data go out from a specific External port ?  

  for the guys that are familiar with juniper the config done is that :

vnic vnicgroup 1

        vlan 10

        enable

        failover

        member INTA1.1

        member INTA2.1

        member INTA3.1

        member INTA4.1

        port EXT1

        exit

!

vnic vnicgroup 2

        vlan 11

        enable

        failover

        member INTA1.2

        member INTA2.2

        member INTA3.2

        member INTA4.2

        port EXT2

        exit

 

Thank you for your feedback,

Kamal

connectivity impact of disabling DCB on N4064f

$
0
0

Hi. We're using N4064f as ToR switches. We've connected additional EQL SANs to the network and the new EQLs are complaining about incorrect DCB configuration on the switches. We're not using DCB, so from the documentation I've read, we need to disable DCB on the switches.

I've found the commands to do so in the switch configuration guide (why can't you do it from the GUI?), my question is if this will have any impact on the connectivity.

The two N4064f switches are not stacked, but connected using the QSFP ports ISL (static LAGs). RSTP is also configured.

Our networking guy said there might be up to 2 minutes interruption, which I hope is not true.

Can someone confirm that?

If we do not disable DCB on the switches, it should have no effect on the functionality of EQLs, right? (except for the warning in group manager)

iSCSI switches and Spanning Tree configuration for management ports

$
0
0

Hi,

I have a pair of power connect N2024 switches being used for iSCSI and configured using the "Dell Switch Configuration Guide for EqualLogic SANs"

I have attached a diagram showing the configuration.

The N2000 series does not have a dedicated out of band interface so you have to configure one by using a VLAN on the switch just for this purpose. An IP interface is then configured on this VLAN for the management and it is assigned to a single physical port, in this example port 24 to be uplinked to the LAN.

The problem is the management ports (VLAN 150) are receiving STP changes from the LAN (no problem here) however the port-channel group connecting the two N2024 switches which is currently configured in Access  mode in VLAN 100, is then being shut down by spanning Tree!

My question is  why is this happening? If the Portchannel was access VLAN 150 it would make sense, but its not its VLAN 100.

Any info appreciated.

Kind regards

Dave


Dell N3024P SNMP View OID String

$
0
0

Greetings Network Gurus


I'm trying to configure SNMP on my N3024P so that I can get individual port information. So if I'm doing this correctly, I'm should create a view that includes the OID tree that references the interfaces on the switch. I'm having some difficulty understanding exactly the format of the string that should be entered in the "OID Subtree" field.

If someone could either help me out or point me in the right direction of what to do here, that would be awesome.

Thanks in advance for any help!

N3000 VLANs & ACLS

$
0
0

Hello,

Looking at the Powerconnect N3000 documentation. Am I correct that you can only have Access Control Lists applied against 24 VLANs? If that is the case anyone have a idea or strategy to work around? We have about 32 VLANS currently and have to restrict traffic from being able to communicate with the other VLANs. 

Thanks!

Connecting 3024 to 3524 with fibre

$
0
0

Hi, i have a dozen new 3024 switches and 20 new 3524 switches.

I am using Dell GBIC units to connect the switches via fibre. 

I have no problems at all connecting the 3024s together with fibre, but when i try to connect the 3024 to a 3524, i get no success.  I get an activity light on the 3524, but no lights at all on the 3024 SFP slot. 

The ports are all set up exactly the same, whether G1,G2 (SFP)  or G3,G4 (Copper) on the 3524, and connecting the two switch types together using copper works perfectly.

Any ideas what could be causing this ?

Thanks

Dan 

PowerConnect 3548p (The MAC address is not valid. You must set it now! )Error

$
0
0

Hi, i have a dell 3548p. It powers up fine but promp message asking for mac address and keep asking password which i can't figure out. Please let me know if you can help. Much appreciate.

Boot1 Checksum Test...............................PASS

Boot2 Checksum Test...............................PASS

Flash Image Validation Test.......................PASS



BOOT Software Version 1.0.0.08 Built  29-Nov-2007  16:38:01

                          ##
 ###########            #####        ######        ######
 ##############       #########      ######        ######
 ###############     #########       ######        ######
 ################  ########## ####   ######        ######
 ################ #########  ######  ######        ######
 ########################  ######### ######        ######
 ######   ##############  ########  #######        ######
 ######    ###################### #########        ######
 ######    ####################  ##########        ######
 ######    ###################  ###########        ######
 ######    ################## #############        ######
 ######   #################################        ######
 ################################################# ############
 ################  ################  ############# ############
 ################   ##############   ############# ############
 ###############      ##########     ############# ############
 ##############        ########      ############# ############
 ###########             ####        ############# ############
                          ##
 PowerConnect 3524 board based on Orion 88F5181 ARM926EJ processor
 64 MByte SDRAM. I-Cache 8 KB. D-Cache 8 KB. Cache Enabled.

Autoboot in 2 seconds - press RETURN or Esc. to abort and enter prom.

The MAC address is not valid. You must set it now!

Enter password :
invalid password !!
Enter password :
invalid password !!
Enter password :

Dell PowerConnect 3348 Setup Questions

$
0
0

Hello, I just got my PowerConnect 3348 today and I am fairly new to managed switches. I have a small home lab I'm using this switch on which includes a Dell PowerEdge R900, Dell PowerEdge 2850, and an HP Proliant DL380 G5. I'm currently using a NetGear 8-Port un-managed switch (GS108) which connects to all the servers and my ISP router (Verizon FIOS / Actiontec Router). My interfacing equipment is a simple Monitor and Keyboard configuration (no KVM). Please help me set it up properly as I am stuck with this device. Thanks!

DCB config

$
0
0

hi there,

I've setup a pair of MXLs and was hoping someone could check over the config attached. Specifically the DCB section as I've not done this before.

I've attached the config of one of the MXLs. 

  • A PS4110x is connected to Te0/41 on both MXLs and has been configured to use DCB on vlan 3000. There is no DCB error on the EQL
  • VLT is connecting the MXLs (po100, fo0/33,fo0/37)
  • A hyperV blade is setup on Te0/20 (am yet to configure other HyperV blades)

One question I had is whether vlan 3000 (the DCB/iSCSI vlan) should be applied to all ports? The document I read here suggests it should but I don't really understand why.

Thanks for any advice!

-Huw

Trunking an S4810 and an S2410 together

$
0
0

I have an S4810 (48 sfp+, 4 qsfp+) and an S2410 (24 cx4, 4 xfp).  The S2410 is an existing switch and has run out of ports.  I would like to add more equipment, and could do this by migrating all current equipment to the S4810 - but to change every server adapter from cx4 to sfp+ and purchase optics + schedule downtime for 24 servers seems unnecessary.  To that effect I got the S4810 and would like to add it to the S2410 to form a single logical switch across the two (and move some high traffic servers onto the 40G ports).

I am not doing any complicated vlan stuff between the two, both are using default vlan (1) for all ports.

I have connected a single XFP port on the S2410 to a single SFP+ port on the S4810 with SR optics, and the link is showing as active on both sides.

I cannot, however, ping between hosts on both switches.  Hosts on the same switch can ping each other without an issue, but between the switches they cannot ping.

On my gigE switches (powerconnect 2824 for example) I can simply plug a single cable between both switches and that effectively spans them.  This doesn't seem to work for the S series switches and I am not sure why.

I have seen lots of reference to LAG w/LACP and am wondering if this is required to achieve what I want to do.  I would also like to increase the bandwidth between the switches by using two 10G ports on each, so this looks to be the ideal solution, but I have never set this up on Dell/Force10 equipment.  Any instruction on how to achieve this from both switches would be very appreciated, there are subtle differences in the FTOS commands between the two switches so any advice on how it can be achieved from both ends would really be great.

Any insight into why the two switches are not forwarding to each other at present would also be good to know, just for the sake of learning.

Thanks for reading.


PVIDS and the like: Getting our PC 2824 to act like our PC6248

$
0
0

We have a remote office across the street currently being serviced by
an AirFibre microwave link.  The switches on either side of the microwave
link are Dell PC6248 (main) and Dell PC2824 (remote).

All is well under a single vlan (vlan 98).

When we try to upgrade the connection to accommodate multiple vlans we
get no connection with the 2824 in place.  But when we swap that with
another 6248 everything works OK.  I understand that to be able to
connect to the Microwave links themselves (98 addresses) we need to keep the 98 untagged.

Are we missing something on the 2824?

Here are snippets of code from the two remote switches we tried-

————————    Remote Site:   Dell 2824 running latest F/W ————————

Port : g23     <<<<< uplink to main campus
Port Mode: General
Gvrp Status: disabled
Ingress Filtering: true
Acceptable Frame Type: admitAll
Ingress UnTagged VLAN ( NATIVE ): 98
 
Port is member in:
 
Vlan               Name               Egress rule Port Membership Type
---- -------------------------------- ----------- --------------------
 30          AP Provisioning            Tagged           Static        
 87                 HR                  Tagged           Static        
 98                 98                 Untagged          Static        

 
Forbidden VLANS:
Vlan               Name               
---- --------------------------------

 
Classification rules:

———  Things work with another Dell 6248 at the remote site ———
. . . . . .
!
interface ethernet 1/g1
switchport access vlan 30  <<<< when I plug the WiFi AP here it gets provisioned from Main Campus
exit
!
interface ethernet 1/g2       
switchport access vlan 30
exit
!
interface ethernet 1/g3    <<<< when I plug in here I get my DHCP address from Main Campus
switchport access vlan 87
exit
!
interface ethernet 1/g4
switchport access vlan 87
exit
. . . . .
interface ethernet 1/g47  <<<<<<< Link to Main Campus via AirFibre
switchport mode general
switchport general pvid 98
switchport general allowed vlan add 98
switchport general allowed vlan add 30,87 tagged
exit
!
. . . . .
 ———————Main Campus Dell 6248——————————

interface ethernet 1/g4   <<<<< LINK to remote site
switchport mode general
switchport general pvid 98
switchport general allowed vlan add 98
switchport general allowed vlan add 30,87 tagged
exit
!

UPLINK TO CORE SWITCH (S4810)
interface ethernet 1/g48
switchport mode general
switchport general allowed vlan add 30,33-34,42,86-87,90-91,97-98 tagged
exit

VLANning issues on MXL blades

$
0
0

Hi,

I have a new M100e enclosure with a PS4110xs SAN, a few blade servers and two Force10 MXL switches (switches and SAN on fabric A)

I have it all set up and working fine, but using the default VLAN for everything

I want to hook the switches up to a Juniper EX3300 via SFP+ ports and route the SAN subnet out so that I can remotely connect to the management IP of the EqualLogic for VMM integration

However, whenever I try and put the SAN ports into a separate VLAN - even before I look into trunking to the Juniper - I lose all connectivity on the SAN network.

I've created a new VLAN (VLAN120) but as soon as I put ports into it they cannot ping each other.

int vlan120

tagged te0/1 (This is the SAN port)

tagged te0/12 (this is one server)

tagged te0/16 (this is the other server)

as soon as I do that I lose all connectivity to the SAN and the servers cannot ping each other over the iSCSI network.

I've tried using 'untagged' intead of 'tagged' with the same effect.

The VLAN is active (no shut)

I'm at a loss as to what the issue is.

Any help gratefully received.

Mark.

8132F LACP mode and connecting with ASA Etherchannel

$
0
0

Hello,


Could anyone can advise 8132F switch LACP mode is Layer 2 or support Layer 3?


Any example when setup with ASA Etherchannel?


Thanks!

Trunking with LAG & LACP PowerConnect r1 2401 Catalyst 3560 VLAN 1 dosen't work

$
0
0

Hallo together,


I want to build a Etherchannel between an PowerConnect r1 2401 and Catalyst 3560.The Etherchannel consists of four physical Uplinks and shoud trunk the VLANs 1 and 5. Now I have the following Configuration on my Switchs. The VLAN 5 works perfect, but VLAN 1 dosen't. Can somone give me a tip

CISCO 3560

TESTSW#show running-config
Building configuration...

Current configuration : 3967 bytes
!
! Last configuration change at 15:30:26 UTC Mon Mar 1 1993
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname TESTSW
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$Npiq$4opjllZr3FvYR0FjQbP160
enable password
!
no aaa new-model
system mtu routing 1500
!
!
!
!
!
crypto pki trustpoint TP-self-signed-1402242944
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-1402242944
 revocation-check none
 rsakeypair TP-self-signed-1402242944
!
!
crypto pki certificate chain TP-self-signed-1402242944
 certificate self-signed 01
  3082023E 308201A7 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 31343032 32343239 3434301E 170D3933 30333031 30303031
  33375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 34303232
  34323934 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  8100C3AC D03B2439 20BCCBB3 87A80270 9E8FCBE1 207F622B 417A767F 662F6018
  BA8BC937 9418EEC1 129FD734 8A319A79 B7E37718 36C34030 F3236E66 1080BD0A
  37D009D6 7B806746 BECD2502 2FC8670D FD98A85D 55FEBA13 9DA048E1 2C517C7C
  49D60EAF 91C4EEF4 0D758CF2 052D0949 5E6534CB 21FEEBD8 11F720DE 6CC571AE
  DE9F0203 010001A3 66306430 0F060355 1D130101 FF040530 030101FF 30110603
  551D1104 0A300882 06544553 54535730 1F060355 1D230418 30168014 E7E3A730
  F8F7E536 9EE0AC23 B83CB502 A82E3F89 301D0603 551D0E04 160414E7 E3A730F8
  F7E5369E E0AC23B8 3CB502A8 2E3F8930 0D06092A 864886F7 0D010104 05000381
  81007D14 070881FD 5644DF10 013E4F9C E2E36D35 678F1F2C 3317A57C 621280C6
  BD99F051 E148336B 9E7E186C 142CC5F7 449FAB69 3CC74FFD 28C2F71B 65CD15A7
  A0DA4AC0 A502A299 0F753C5D 36FAA319 16F5CF81 B326A8B0 1EFAE3FD 0257180E
  D674E8C0 3B41E9D5 BA392806 27676598 BC712B55 26D320A4 4F0FC6F7 3C1D326C EB85
        quit
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
!
!
!
!
interface Port-channel1
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
 description Vertex
 switchport trunk encapsulation dot1q
 switchport mode trunk
 channel-protocol lacp
 channel-group 1 mode active
!
interface GigabitEthernet0/3
 description Vertex
 switchport trunk encapsulation dot1q
 switchport mode trunk
 channel-protocol lacp
 channel-group 1 mode active
!
interface GigabitEthernet0/4
 description Vertex
 switchport trunk encapsulation dot1q
 switchport mode trunk
 channel-protocol lacp
 channel-group 1 mode active
!
interface GigabitEthernet0/5
 description Vertex
 switchport trunk encapsulation dot1q
 switchport mode trunk
 channel-protocol lacp
 channel-group 1 mode active
!
interface GigabitEthernet0/6
!
interface GigabitEthernet0/7
!
interface GigabitEthernet0/8
!
interface GigabitEthernet0/9
!
interface GigabitEthernet0/10
!
interface GigabitEthernet0/11
!
interface GigabitEthernet0/12
!
interface GigabitEthernet0/13
 switchport access vlan 5
 switchport mode access
!
interface GigabitEthernet0/14
!
interface GigabitEthernet0/15
!
interface GigabitEthernet0/16
!
interface GigabitEthernet0/17
!
interface GigabitEthernet0/18
!
interface GigabitEthernet0/19
!
interface GigabitEthernet0/20
!
interface GigabitEthernet0/21
!
interface GigabitEthernet0/22
!
interface GigabitEthernet0/23
!
interface GigabitEthernet0/24
!
interface GigabitEthernet0/25
!
interface GigabitEthernet0/26
!
interface GigabitEthernet0/27
!
interface GigabitEthernet0/28
!
interface Vlan1
 ip address 10.32.79.10 255.255.255.0
!
interface Vlan5
 description HFA-Server
 no ip address
!
ip http server
ip http secure-server
!
!
!
logging esm config
!
!
!
line con 0
line vty 0 4
 password
 login
line vty 5 15
 password
 login
!
end

PowerConnect r1 2401

Powerconnect r1 2401


console#show running-config
config-file-header
v1.0.0.63 / RPLASMA_760_221_040
CLI v1.0
@
vlan database
vlan 5
exit
voice vlan oui-table add 000181 Nortel__________________
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 001049 Shoretel________________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00907a Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
!
interface vlan 1
 name HFA-Management
!
interface vlan 5
 name HFA-Server
!
interface gigabitethernet0/1
 channel-group 1 mode auto
 switchport mode trunk
!
interface gigabitethernet0/2
 channel-group 1 mode auto
 switchport mode trunk
!
interface gigabitethernet0/3
 channel-group 1 mode auto
 switchport mode trunk
!
interface gigabitethernet0/4
 channel-group 1 mode auto
 switchport mode trunk
!
interface gigabitethernet0/5
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface gigabitethernet0/6
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface gigabitethernet0/7
 channel-group 2 mode auto
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface gigabitethernet0/8
 channel-group 2 mode auto
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface gigabitethernet1/1
 switchport mode trunk
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface gigabitethernet1/2
 switchport mode trunk
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface gigabitethernet2/1
 switchport mode trunk
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface gigabitethernet2/2
 switchport mode trunk
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface Port-channel1
 switchport mode trunk
!
interface Port-channel2
 switchport mode trunk
 switchport trunk native vlan none
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface Port-channel3
 switchport trunk allowed vlan remove 2-4,6-4094
!
interface oob
 ip address 10.32.79.17 255.255.255.0
 no ip address dhcp
!
exit
ip default-gateway 10.32.79.1






Default settings:
Service tag:

SW version 1.0.0.63 (date  26-Jan-2014 time  20:18:08)

Gigabit Ethernet Ports
=============================
no shutdown
speed 1000
duplex full
negotiation
flow-control on
mdix auto
no back-pressure

interface vlan 1
interface port-channel 1 - 32

spanning-tree
spanning-tree mode RSTP

qos basic
qos trust cos
eee enable

Newbie Configuring DELL 6248 Switch

$
0
0

Hi all. I'm trying to configure a DELL 6248 switch and I have no experience doing this in the past. I have used the users guides and reference guide to get me this far, but i'm not having any luck. I can ping each IP I have assigned to each VLAN (except the management VLAN 1000). from a computer connected to VLAN 20 port 45 I can ping these IP's too but I cant reach anything else that is connected to the network on VLAN 10. What am I doing wrong here? :-/ 

(currently I have a cable from port 33 connected to another switch on the network for testing)

heres my running config

!Current Configuration:
!System Description "PowerConnect 6248, 3.3.12.1, VxWorks 6.5"
!System Software Version 3.3.12.1
!Cut-through mode is configured as disabled
!
configure
vlan database
vlan 10,20,30,40,1000
vlan routing 10 1
vlan routing 20 2
vlan routing 30 3
vlan routing 40 4
exit
hostname "Logic-Stack"
stack
member 1 2
exit
ip address 192.168.100.250 255.255.255.0
ip default-gateway 192.168.100.248
ip address vlan 1000
ip routing


interface vlan 10
name "main"
routing
ip address 192.168.0.254 255.255.255.0
exit
interface vlan 20
name "floor"
routing
ip address 192.168.1.254 255.255.255.0
exit
interface vlan 30
name "prodtrack"
routing
ip address 10.0.1.254 255.255.0.0
exit
interface vlan 40
name "external"
routing
ip address 192.168.10.254 255.255.255.0
exit
interface vlan 1000


name "manage"
exit
username "Admin" password ad66bfa8d82d1692619fe77f98127fbd level 15 encrypted
!
interface ethernet 1/g1
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g2
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g3


description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g4
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g5
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000


exit
!
interface ethernet 1/g6
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g7
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g8
description "Main Network VLAN"
spanning-tree portfast


switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g9
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g10
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!


interface ethernet 1/g11
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g12
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g13
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10


switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g14
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g15
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g16
description "Main Network VLAN"


spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g17
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g18
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit


!
interface ethernet 1/g19
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g20
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g21
description "Main Network VLAN"
spanning-tree portfast
switchport mode general


switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g22
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g23
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g24


description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g25
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g26
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000


exit
!
interface ethernet 1/g27
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g28
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g29
description "Main Network VLAN"
spanning-tree portfast


switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g30
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g31
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!


interface ethernet 1/g32
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g33
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g34
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10


switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g35
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g36
description "Main Network VLAN"
spanning-tree portfast
switchport mode general
switchport general pvid 10
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g37
channel-group 1 mode auto


description "Link Aggregation Group connecting floor switch"
switchport mode trunk
switchport trunk allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g38
channel-group 2 mode auto
description "Link Aggregation Group connecting DataCollection switch"
switchport mode trunk
switchport trunk allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g39
channel-group 1 mode auto
description "Link Aggregation Group connecting floor switch"
switchport mode trunk
switchport trunk allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g40
channel-group 2 mode auto


description "Link Aggregation Group connecting DataCollection switch"
switchport mode trunk
switchport trunk allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g41
channel-group 1 mode auto
description "Link Aggregation Group connecting floor switch"
switchport mode trunk
switchport trunk allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g42
channel-group 2 mode auto
description "Link Aggregation Group connecting DataCollection switch"
switchport mode trunk
switchport trunk allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g43
channel-group 1 mode auto


description "Link Aggregation Group connecting floor switch"
switchport mode trunk
switchport trunk allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g44
channel-group 2 mode auto
description "Link Aggregation Group connecting DataCollection switch"
switchport mode trunk
switchport trunk allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g45
description "Main Network on Floor"
spanning-tree portfast
switchport mode general
switchport general pvid 20
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g46


description "ProdTrack - DataCollection"
spanning-tree portfast
switchport mode general
switchport general pvid 30
switchport general allowed vlan add 10,20,30,40,1000
exit
!
interface ethernet 1/g47
description "Connection to Firewall/Internet"
switchport mode general
switchport general pvid 40
switchport general allowed vlan add 10,20,30,40,1000 tagged
exit
!
interface ethernet 1/g48
description "Switch Management"
switchport mode general
switchport general pvid 1000
switchport general allowed vlan add 10,20,30,40,1000 tagged
exit
enable password ad66bfa8d82d1692619fe77f98127fbd encrypted

Viewing all 2954 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>