Quantcast
Channel: PowerConnect Forum - Recent Threads
Viewing all 2954 articles
Browse latest View live

Problem booting Dell Force10 MXL 10/40

$
0
0

Hi,


I have a problem with an DELL MXL 10/40 switch. Yesterday it just stopped. Today after we removed and put it back i chassis it started working.

Unfortunately is now not booting. It is showing this error below:

"Dell

Networking OS Release 9.4(0.0P1)

 NetBSD

5.1_STABLE (blade IOM) #0: Mon Apr 21 09:56:54 PDT 2014

total

memory = 2048 MB

avail

memory = 1924 MB

Detecting

hardware...panic: cache error @ EPC 0xffffffff8036568c

L1D_CACHE_ERROR_LOG

0

L1D_CACHE_INTERRUPT

0

status

0x5, cause 0x40008078

The

operating system has halted.

Please

press any key to reboot."

Does any one has any idea what to do ?

Thanks in advance.


New 3524P...Cannot get ip from SFP Port

$
0
0

I am replacing an old Dell Switch with a new 3524P.    I have configured the switch but I am unable to obtain an ip address on any device.   The new switch is tied to the core switch via fiber.  I have a compatible GBIC in switch.... I can get an address when connecting the new switch to the old switch via ethernet.....  What am I missing?

BGP default-originate issues on N3024 switch

$
0
0

Below is the configuration of the two switches.  I have BGP established and up, passing prefixes.  I want Switch 1 to send a default gateway to Switch 2 and have the default-originate command setup on the neighbor statement.  I do not see the 0.0.0.0 default route in the show ip bgp sum command, but that is detailed in the configuration guide.  However, I do not see a default 0.0.0.0 route in the route table for switch 2 at all and receive an error that there is no default route available.  What would I be missing here?

Config is below:

SWITCH 1

 

 

 

 

configure

vlan 50

exit

vlan 50

name "switchtest"

exit

hostname "Switch_1"

slot 1/0 1    ! Dell Networking N3024

stack

member 1 1    ! N3024

exit

ip routing

!

interface loopback 1

ip address 10.0.0.1 255.255.255.255

ip ospf area 0

exit

interface vlan 1

ip address dhcp   

exit

interface vlan 50

ip address 172.16.0.1 255.255.255.252

ip ospf area 0

exit

router ospf

router-id 10.0.0.1

network 10.0.0.1 255.255.255.255 area 0

network 172.16.0.0 255.255.255.252 area 0

exit

!

interface Gi1/0/1

description "Switch"

switchport access vlan 50

exit

snmp-server engineid local 800002a203f8b1566f36c4

router bgp 65001

bgp router-id 10.0.0.1

network 172.168.0.0 mask 255.255.255.252

network 10.0.0.1 mask 255.255.255.255

neighbor 172.16.0.2 remote-as 65002

neighbor 172.16.0.2 default-originate

exit              

exit

Switch_1#show ip bgp

BGP table version is 7, local router ID is 10.0.0.1

Status Codes: s suppressed, * valid, > best, i - internal

Origin Codes: i - IGP, e - EGP, ? - incomplete

    Network             Next Hop         Metric     LocPref    Path          Origin

    ------------------- ---------------- ---------- ---------- ------------- ------

*>  172.16.0.0/30       172.16.0.2       1          100        65002         i

*>  192.168.100.0/30    172.16.0.2       1          100        65002         i

*>i 10.0.0.1/32         0.0.0.0          1          100                      i

*>  10.0.0.2/32         172.16.0.2       1          100        65002         i

Switch_1#show ip bgp sum

IPv4 Routing .................................. Enable

BGP Admin Mode ................................ Enable

BGP Router ID ................................. 10.0.0.1

Local AS Number ............................... 65001

Traps ......................................... Disable

Maximum Paths ................................. 1

Maximum Paths iBGP ............................ 1

Default Keep Alive Time ....................... 30

Default Hold Time ............................. 90

Number of Network Entries ..................... 4

Number of AS Paths ............................ 1

Default Metric ................................ Not Configured

Default Route Advertise ....................... No

Redistributing:

Source    Metric     Dist List                        Route Map

--------- ---------- -------------------------------- --------------------------------

Neighbor         ASN   MsgRcvd  MsgSent  State         Up/Down Time   Pfx Rcvd

---------------- ----- -------- -------- ------------- -------------- ---------

172.16.0.2       65002 78       82       ESTABLISHED   0:00:23:24     3

Switch_1#show ip route

Route Codes: R - RIP Derived, O - OSPF Derived, C - Connected, S - Static

       B - BGP Derived, E - Externally Derived, IA - OSPF Inter Area

       E1 - OSPF External Type 1, E2 - OSPF External Type 2

       N1 - OSPF NSSA External Type 1, N2 - OSPF NSSA External Type 2

       S U - Unnumbered Peer, L - Leaked Route

 * Indicates the best (lowest metric) route for the subnet.

No default gateway is configured.

C      *10.0.0.1/32 [0/1] directly connected,   Lo1

B      *10.0.0.2/32 [20/1] via 172.16.0.2,   Vl50

O       10.0.0.2/32 [110/11] via 172.16.0.2,   Vl50

C      *172.16.0.0/30 [0/1] directly connected,   Vl50

B       172.16.0.0/30 [20/1] via 172.16.0.2,   Vl50

B      *192.168.100.0/30 [20/1] via 172.16.0.2,   Vl50

O       192.168.100.0/30 [110/20] via 172.16.0.2,   Vl50

SWITCH 2

configure

vlan 50,100

exit

vlan 50

name "SwitchTest"

exit

vlan 100

name "Switch"

exit

hostname "Switch_2"

slot 1/0 2    ! Dell Networking N3024F

stack

member 1 2    ! N3024F

exit

ip routing

!

interface loopback 0

exit

!                 

interface loopback 1

ip address 10.0.0.2 255.255.255.255

exit

interface vlan 1

ip address dhcp

exit

interface vlan 50

ip address 172.16.0.2 255.255.255.252

ip ospf area 0

exit

interface vlan 100

ip address 192.168.100.1 255.255.255.252

exit

router ospf

router-id 10.0.0.2

network 10.0.0.2 255.255.255.255 area 0

network 172.16.0.0 255.255.255.252 area 0

network 192.168.100.0 255.255.255.252 area 0

exit

!

interface Gi1/0/23

switchport access vlan 100

exit              

!

interface Gi1/0/24

description "Switch"

switchport access vlan 50

exit

snmp-server engineid local 800002a203f8b156530097

router bgp 65002

bgp router-id 10.0.0.2

network 172.16.0.0 mask 255.255.255.252

network 192.168.100.0 mask 255.255.255.252

network 10.0.0.2 mask 255.255.255.255

neighbor 172.16.0.1 remote-as 65001

exit

exit

Switch_2#show ip bgp

BGP table version is 9, local router ID is 10.0.0.2

Status Codes: s suppressed, * valid, > best, i - internal

Origin Codes: i - IGP, e - EGP, ? - incomplete

    Network             Next Hop         Metric     LocPref    Path          Origin

    ------------------- ---------------- ---------- ---------- ------------- ------

*>i 172.16.0.0/30       0.0.0.0          1          100                      i

*>i 192.168.100.0/30    0.0.0.0          1          100                      i

*>  10.0.0.1/32         172.16.0.1       1          100        65001         i

*>i 10.0.0.2/32         0.0.0.0          1          100                      i

Switch_2#show ip bgp sum

IPv4 Routing .................................. Enable

BGP Admin Mode ................................ Enable

BGP Router ID ................................. 10.0.0.2

Local AS Number ............................... 65002

Traps ......................................... Disable

Maximum Paths ................................. 1

Maximum Paths iBGP ............................ 1

Default Keep Alive Time ....................... 30

Default Hold Time ............................. 90

Number of Network Entries ..................... 4

Number of AS Paths ............................ 1

Default Metric ................................ Not Configured

Default Route Advertise ....................... No

Redistributing:

Source    Metric     Dist List                        Route Map

--------- ---------- -------------------------------- --------------------------------

Neighbor         ASN   MsgRcvd  MsgSent  State         Up/Down Time   Pfx Rcvd

---------------- ----- -------- -------- ------------- -------------- ---------

172.16.0.1       65001 83       82       ESTABLISHED   0:00:24:32     1

Switch_2#show ip route

Route Codes: R - RIP Derived, O - OSPF Derived, C - Connected, S - Static

       B - BGP Derived, E - Externally Derived, IA - OSPF Inter Area

       E1 - OSPF External Type 1, E2 - OSPF External Type 2

       N1 - OSPF NSSA External Type 1, N2 - OSPF NSSA External Type 2

       S U - Unnumbered Peer, L - Leaked Route

 * Indicates the best (lowest metric) route for the subnet.

No default gateway is configured.

B      *10.0.0.1/32 [20/1] via 172.16.0.1,   Vl50

O       10.0.0.1/32 [110/11] via 172.16.0.1,   Vl50

C      *10.0.0.2/32 [0/1] directly connected,   Lo1

C      *172.16.0.0/30 [0/1] directly connected,   Vl50

C      *192.168.100.0/30 [0/1] directly connected,   Vl100

Switch_2#show ip route 0.0.0.0

Route Codes: R - RIP Derived, O - OSPF Derived, C - Connected, S - Static

       B - BGP Derived, E - Externally Derived, IA - OSPF Inter Area

       E1 - OSPF External Type 1, E2 - OSPF External Type 2

       N1 - OSPF NSSA External Type 1, N2 - OSPF NSSA External Type 2

       S U - Unnumbered Peer, L - Leaked Route

 * Indicates the best (lowest metric) route for the subnet.

No default gateway is configured.

No routes found.

Blocking BPDUs Dell PowerConnect 3524

$
0
0

’m going through the user guide, and I see the following (image below) It says it “filters” BPDU packets if spanning tree is disabled on an interface. So, if I disable STP on a particular interface, does this mean that those packets will not be forwarded on?

I need BPDU transmission blocked on a particular port. Cisco allows you to do this by running spanning-tree #bpdufilter enable on an interface – this stops that port from receiving or sending BPDUS. I need to do that with this Dell switch.

http://downloads.dell.com/Manuals/all-products/esuprt_ser_stor_net/esuprt_powerconnect/powerconnect-3524_User%27s%20Guide_en-us.pdf

N2048 reporting jumbo packets in SNMP InErrors table

$
0
0

I have an issue with an N2048 stack reporting jumbo packets in the SNMP InErrors table:

#show statistics tengigabitethernet 1/0/1

Packets Received > 1518 Octets................. 9479

Received packets dropped > MTU: ............... 9479

$ snmpget <switch> .1.3.6.1.2.1.2.2.1.14.49
.1.3.6.1.2.1.2.2.1.14.49 = Counter32: 9479

#show system mtu

System jumbo MTU size is 9216 bytes

I'm not seeing any performance related issues and I don't think the packets are actually being dropped. I've tested with jumbo sized pings and the response comes back. The error counter is still incremented, however. On the other side of the interface is an Arista 7050S with an MTU of 9214.

Not able to set ets for Force10 S4810

$
0
0

Hi,

Below is my switch version -

==========================================================

Force10#show version
Dell Real Time Operating System Software
Dell Operating System Version: 2.0
Dell Application Software Version: 9.5(0.1)
Copyright (c) 1999-2014 by Dell Inc. All Rights Reserved.
Build Time: Thu Jul 31 21:20:08 2014
Build Path: /sites/eqx/work/swbuild01_1/build01/E9-5-0/SW/SRC
Dell Networking OS uptime is 16 hour(s), 13 minute(s)

System image file is "system://A"

System Type: S4810
Control Processor: Freescale QorIQ P2020 with 2 Gbytes (2147483648 bytes) of memory, cores(s) 1.

128M bytes of boot flash memory.

1 52-port GE/TE/FG (SE)
48 Ten GigabitEthernet/IEEE 802.3 interface(s)
4 Forty GigabitEthernet/IEEE 802.3 interface(s)

==========================================================

I have created dcb-map with below settings -

==========================================================

Force10#show running-config interface tengigabitethernet 0/22
!
interface TenGigabitEthernet 0/22
no ip address
mtu 9216
portmode hybrid
switchport
spanning-tree pvst edge-port
dot1p-priority 7
service-class dynamic dot1p
dcb-map converged
!
protocol lldp
dcbx port-role auto-downstream
dcbx version cee
no shutdown
Force10#show qos dcb-map converged
-----------------------

State :Complete
PfcMode:ON
--------------------
PG:0 TSA:ETS BW:20 PFC:OFF
Priorities:0 1 2 4 5 6 7


PG:1 TSA:ETS BW:80 PFC:ON
Priorities:3


Force10#

==========================================================

But same BW settings are not reflected in TLVs sent by switch port, what could be the issue here any idea ?. Please find below DCBX TLV wireshark screen shot -

MIBs/OIDs for Dell Powerconnect 7024/6348/5548 Switches

$
0
0

Hi All,

Any idea where i can find the above. Trying to configure custom pollers for solarwinds, to monitor CPU and Memory of the switches

Dell 6248 as default gateway - next hop router

$
0
0

Hi All,


I guess this a very basic network design question. Is it good practice/acceptable to use the Dell 6248 layer-3 switch as the gateway / next-hop router, even though the correct gateway is directly connected to the same subnet/vlan?

The issue is that we are in the process of making changes to our network, and several of the routers on the edge of our network have static routes configured so they can reach our other subnets, both local and remote. These static routes will need to be changed when we move from one circuit to another, but some of the edge routers are vendor managed, and it is inconvenient to get them reprogrammed. Also, the vendors will need to make the route changes more than once, if we want to clean up our ip addressing scheme after the move. Once the changes are made, the network topology likely will not change for a long time, so I would like to stick with static routing. Since we can enter and control the static routes in our Dell 6248, can we just tell the vendors use our Dell switch as the next-hop router when they change their static routes?

I know ip redirects might attempt to "fix" this inefficient setup, and that could cause problems, at least during the transition phase. On a smaller network with 10 servers, 100 computers and 80 phones, is this extra routing inconsequential for the Dell 6248 layer-3 switch, or is this setup something you should avoid (for other reasons)? Thanks for your insight!


change default vlan

$
0
0

on a stack of 2 x 6224 dell powerconnect's what would be the best way to change the default untagged vlan for all switchports ?

is the default setting for the switch "access mode' or "general mode"

would i do # switchport general mode pvid 10 for example ?

or switchport access vlan 10. 

Switch port to system

$
0
0

Hi,

I have rcently joined a company and we want to migrate our network to 10.0.0.0 ip address range from 192.168.0.0.

Also we want to configure few vlan's

But the major challenge I am facing is that there is no documentation available for wiring. How can i track which port of which switch is going to which system.

We are using Dell 5548 and 6248

Please help me.

Trunk n3048 to s25n

$
0
0

Hi, I'm very new to the idea of accessing different networks through a trunk line. I am in need of connecting from a few VLANs on an n3048 to a single VLAN on an s25n. I have tried a few things but none have seemed to work how I need them to.

I am not sure if I should be creating the VLAN on both switches or if I just keep it on the s25n. When I created the VLAN on both, and set both ports to be switchport trunks I was able to ping the IPs of both VLAN interfaces but not everything else on that VLAN. 

I also tried to create a port channel trunk and connect via that but I could not get through to anything with that route. 

Since I am new to this, what is the proper way to go about doing this? Port channel?trunk? Some other form of LAG? 

Any help would be very much appreciated. Thanks

Setting up a Vlan for a Power Connect 2748 - make Two Segments

$
0
0

I would like to know how to setup the switch so it would be ports 1-12 one switch area and then ports 13-48 would act seperate.

Thanks for the help.

Dell N3048P and C1765nfw Color MFD

$
0
0

Hi everyone.

I am having a rather odd issue at the moment. We have recently moved from a stack of old CISCO SG series switches to a stack of N3048P.

Everything works fine except for a C1765nfw Color MFD that refuses to print or connect to its switch once it has gone into sleep mode, works fine if I plug it back into a Cisco.

Appears to be a layer 1 issue as the port on the switch won't even light up, unless the printer is awake. the printer works fine until entering sleep mode, once this happens it can no longer be woken with a print job and has to be either power cycled or another button pressed before it will print.

Switchport is in access mode, same as the others and changing from auto negotiation to forcing 100 full duplex, doesn't seem to help either.

Has anyone else had this issue before ?

 

PowerConnect 8132/4032 - kernel:[1089639.324948] do_IRQ: 6.110 No irq handler for vector (irq -1)

$
0
0

Hi,

We're seeing these errors on the console:

Message from syslogd@node at May 14 11:22:23 ...
kernel:[1083817.043562] do_IRQ: 0.175 No irq handler for vector (irq -1)
console>
Message from syslogd@node at May 14 11:36:01 ...
kernel:[1084635.546811] do_IRQ: 6.165 No irq handler for vector (irq -1)
console>
Message from syslogd@node at May 14 12:53:40 ...
kernel:[1089298.047719] do_IRQ: 6.183 No irq handler for vector (irq -1)
console>
Message from syslogd@node at May 14 12:59:21 ...
kernel:[1089639.324948] do_IRQ: 6.110 No irq handler for vector (irq -1)

Any ideas what they are?

console>show ver

Machine Description............... Dell Networking Switch
System Model ID................... N4032
Machine Type...................... Dell Networking N4032
Serial Number..................... X
Manufacturer...................... 0xbc00
Burned In MAC Address............. XXX
System Object ID.................. X
CPU Version....................... XLP308H-B1
SOC Version....................... BCM56842_A1
HW Version........................ 3
CPLD Version...................... 17

unit active backup current-active next-active
---- ----------- ----------- -------------- --------------
1 6.2.0.5 5.1.1.7 6.2.0.5 6.2.0.5


console>

M6348 unable to connect to web GUI and unable to configure iscsi

$
0
0

Hi, Could some one help me try get the web interface to out M6348 reset or re-configured. The switch is live for production so any methods without an outage would be great.

Im ultimately looking to configure iscsi ports for our Dell Blade within the enclosure from this switch and any guides or help would be great. I do have a test blade i can configure as the network for iscci traffic has been presented to the chassis.


FN410T cold boot problems

$
0
0

Hi there,

No a question really... just a workaround for a firmware issue.

This one gave us some problems on our brand new FX2s chassis with FN410T modules: after a cold boot the server side ports (0/1 to 0/8 on each module) stay offline. Resolution is to reset those ports.

Acc. to a Dell (pre-sales) rep. this is due to a firmware isue, a patch is on the way. Lets hope there are no power faillures.

regards

Peter

applying non default route to the new vlan - powerconnect 6224p

$
0
0

Hi All,

I have a problem with applying non default route to the recently created new vlan 306

Please find configuration below:

______________________________________

console>en

console#show running-config
!Current Configuration:
!System Description "PowerConnect 6224P, 3.3.8.2, VxWorks 6.5"
!System Software Version 3.3.8.2
!Cut-through mode is configured as disabled
!
configure
vlan database
vlan 105,306,999-1000,4000-4003,4008-4010,4015,4020-4021,4030,4035
vlan routing 4001 1
vlan routing 1 2
vlan routing 4010 3
vlan routing 4020 4
vlan routing 4003 5
vlan routing 4030 6
vlan routing 4021 7
vlan routing 4035 8
vlan routing 306 9
exit
sntp unicast client enable
sntp server 192.168.64.200 priority 8
stack


member 1 4
member 2 4
exit
ip address 192.168.200.2 255.255.255.0
ip default-gateway 192.168.200.1
ip address vlan 4002
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.64.254
ip route 10.10.10.0 255.255.255.0 192.168.64.254
ip route 10.0.0.0 255.255.255.0 192.168.64.254
ip route 192.168.10.0 255.255.255.0 192.168.249.251
ip route 192.168.64.232 255.255.255.255 192.168.64.1
ip route 192.168.66.0 255.255.255.0 192.168.254.251
ip route 10.10.8.0 255.255.255.0 192.168.249.251
ip route 10.0.70.0 255.255.255.0 192.168.64.1
ip route 192.168.53.0 255.255.255.0 192.168.64.1
arp 192.168.64.189 03BF.C0A8.40BD
interface vlan 1
routing
ip address 192.168.64.250 255.255.255.0
exit


interface vlan 105
name "ISCSI-DR"
exit
interface vlan 306
name "Room 306"
routing
ip address 192.168.53.250 255.255.255.0
bandwidth 1000
ip helper-address 192.168.64.202 dhcp
ip mtu 1500
exit
interface vlan 999
name "VoIP"
exit
interface vlan 1000
name "DMZ"
exit
interface vlan 4000
name "VSA"
exit
interface vlan 4001


name "VSphere_Mgt"
routing
ip address 10.10.10.1 255.255.255.0
exit
interface vlan 4002
name "Switch_Mgt"
exit
interface vlan 4003
name "TS_NLB"
routing
ip address 10.0.1.1 255.255.255.0
bandwidth 10000
ip mtu 1500
exit
interface vlan 4008
name "External_Orig"
exit
interface vlan 4009
name "EXTERNAL"
exit
interface vlan 4010


name "BACKUP"
routing
ip address 10.0.0.1 255.255.255.0
exit
interface vlan 4015
name "VOICE_TEMP"
exit
interface vlan 4020
name "VLAN-SHDL"
routing
ip address 192.168.254.250 255.255.255.0
bandwidth 10000
ip mtu 1500
exit
interface vlan 4021
name "VLAN_IPO"
routing
ip address 192.168.63.250 255.255.255.0
bandwidth 10000
ip mtu 1500
exit


interface vlan 4030
name "TN_Connection"
routing
ip address 192.168.1.254 255.255.255.0
bandwidth 10000
ip mtu 1500
exit
interface vlan 4035
name "DR-Temp"
routing
ip address 192.168.249.250 255.255.255.0
bandwidth 10000
ip mtu 1500
exit
username "admin" password 07f86f689c0022bdbccc20f02ea5818c level 15 encrypted
no spanning-tree
ip vrrp
!
interface ethernet 1/g1
switchport voice detect auto
description "Link_to_Cordic_Switch"


switchport mode trunk
switchport trunk allowed vlan add 4000-4001
exit
!
interface ethernet 1/g2
switchport voice detect auto
switchport access vlan 4021
exit
!
interface ethernet 1/g3
switchport voice detect auto
description "ESX1_NIC1_PINK"
exit
!
interface ethernet 1/g4
switchport voice detect auto
description "ESX2_NIC1_PINK"
exit
!
interface ethernet 1/g5
switchport voice detect auto


description "ESX3_NIC1_PINK"
exit
!
interface ethernet 1/g6
switchport voice detect auto
description "Uplink to DR switch"
switchport mode general
switchport general allowed vlan add 105,4035 tagged
exit
!
interface ethernet 1/g7
switchport voice detect auto
description "ESX2_NIC3_PINK"
exit
!
interface ethernet 1/g8
switchport voice detect auto
description "ESX3_NIC3_PINK"
switchport mode trunk
switchport trunk allowed vlan add 4000-4001
exit


!
interface ethernet 1/g9
switchport voice detect auto
description "GTC-VSPHERE_NIC1_PINK"
switchport access vlan 306
exit
!
interface ethernet 1/g10
switchport voice detect auto
description "ESX1_NIC0_BLACK"
switchport mode trunk
switchport trunk allowed vlan add 4000-4001
exit
!
interface ethernet 1/g11
switchport voice detect auto
description "ESX2_NIC0_BLACK"
switchport mode trunk
switchport trunk allowed vlan add 4000-4001
exit
!


interface ethernet 1/g12
switchport voice detect auto
description "ESX3_NIC0_BLACK"
exit
!
interface ethernet 1/g13
switchport voice detect auto
description "PIX_NIC3_GREEN"
switchport access vlan 1000
exit
!
interface ethernet 1/g14
switchport voice detect auto
description "ESX1_NIC4_GREEN"
switchport access vlan 1000
exit
!
interface ethernet 1/g15
switchport voice detect auto
description "ESX2_NIC4_GREEN"
switchport access vlan 1000


exit
!
interface ethernet 1/g16
switchport voice detect auto
description "ESX3_NIC4_GREEN"
switchport access vlan 1000
exit
!
interface ethernet 1/g17
switchport voice detect auto
description "Link_to_SHDL"
switchport access vlan 4020
exit
!
interface ethernet 1/g18
switchport voice detect auto
switchport mode general
switchport forbidden vlan add 999
switchport general allowed vlan add 105 tagged
exit
!


interface ethernet 1/g19
switchport voice detect auto
exit
!
interface ethernet 1/g20
switchport voice detect auto
exit
!
interface ethernet 1/g21
switchport voice detect auto
description "ESX1_NIC2_BLACK"
switchport mode trunk
switchport trunk allowed vlan add 4000-4001
exit
!
interface ethernet 1/g22
switchport voice detect auto
description "ESX2_NIC2_BLACK"
switchport mode trunk
switchport trunk allowed vlan add 4000-4001
exit


!
interface ethernet 1/g23
switchport voice detect auto
description "ESX3_NIC2_BLACK"
switchport mode trunk
switchport trunk allowed vlan add 4000-4001
exit
!
interface ethernet 1/g24
switchport voice detect auto
exit
!
interface ethernet 1/xg1
switchport voice detect auto
exit
!
interface ethernet 1/xg2
switchport voice detect auto
exit
!
interface ethernet 1/xg3


switchport voice detect auto
switchport mode general
switchport general allowed vlan add 105,306,4000-4001 tagged
exit
!
interface ethernet 1/xg4
switchport voice detect auto
exit
!
interface ethernet 2/g1
switchport voice detect auto
description "GTC-DC01_NIC1_GREY"
spanning-tree disable
switchport access vlan 4001
voice vlan 999
exit
!
interface ethernet 2/g2
switchport voice detect auto
description "GTC-SQLSRV_NIC1_GREY"
spanning-tree disable


exit
!
interface ethernet 2/g3
switchport voice detect auto
description "ESX1_NIC7_GREY"
spanning-tree disable
exit
!
interface ethernet 2/g4
switchport voice detect auto
description "ESX3_NIC7_GREY"
spanning-tree disable
exit
!
interface ethernet 2/g5
switchport voice detect auto
description "ESX2_NIC7_GREY"
spanning-tree disable
switchport access vlan 4009
exit
!


interface ethernet 2/g6
switchport voice detect auto
description "ESX1_NIC6_GREY"
spanning-tree disable
exit
!
interface ethernet 2/g7
switchport voice detect auto
description "ESX2_NIC6_GREY"
spanning-tree disable
exit
!
interface ethernet 2/g8
switchport voice detect auto
description "ESX3_NIC6_GREY"
spanning-tree disable
exit
!
interface ethernet 2/g9
switchport voice detect auto
description "PIX_NIC2_GREY"


spanning-tree disable
exit
!
interface ethernet 2/g10
channel-group 1 mode auto
switchport voice detect auto
spanning-tree disable
switchport mode trunk
switchport trunk allowed vlan add 4001
exit
!
interface ethernet 2/g11
switchport voice detect auto
spanning-tree disable
spanning-tree mst 0 external-cost 20000
switchport mode trunk
switchport trunk allowed vlan add 4001
exit
!
interface ethernet 2/g12
switchport voice detect auto


spanning-tree disable
spanning-tree mst 0 external-cost 200000
switchport mode trunk
switchport trunk allowed vlan add 4001
exit
!
interface ethernet 2/g13
switchport voice detect auto
description "TN_Connection"
spanning-tree disable
switchport access vlan 4030
exit
!
interface ethernet 2/g14
negotiation 100f
switchport voice detect auto
description "ESX1_NIC5_YELLOW"
spanning-tree disable
switchport mode general
switchport forbidden vlan add 999
exit


!
interface ethernet 2/g15
switchport voice detect auto
description "CCR_Server"
exit
!
interface ethernet 2/g16
switchport voice detect auto
description "NAS_LAN1"
spanning-tree disable
exit
!
interface ethernet 2/g17
switchport voice detect auto
description "NAS_LAN2"
spanning-tree disable
exit
!
interface ethernet 2/g18
switchport voice detect auto
description "GTC-VSPHERE_NIC2_YELLOW"


spanning-tree disable
switchport access vlan 1000
exit
!
interface ethernet 2/g19
switchport voice detect auto
switchport access vlan 4001
exit
!
interface ethernet 2/g20
switchport voice detect auto
exit
!
interface ethernet 2/g21
switchport voice detect auto
switchport access vlan 4008
exit
!
interface ethernet 2/g22
switchport voice detect auto
description "WATCHGUARD_FW"


switchport access vlan 4008
exit
!
interface ethernet 2/g23
switchport voice detect auto
description "PIX_NIC0_RED"
switchport access vlan 4009
exit
!
interface ethernet 2/g24
switchport voice detect auto
switchport access vlan 4009
exit
!
interface ethernet 2/xg1
switchport voice detect auto
exit
!
interface ethernet 2/xg2
switchport voice detect auto
exit


!
interface ethernet 2/xg3
switchport voice detect auto
exit
!
interface ethernet 2/xg4
switchport voice detect auto
exit
!
interface port-channel 1
switchport voice detect auto
spanning-tree disable
switchport mode general
exit
!
interface port-channel 2
switchport voice detect auto
switchport mode general
exit
!
interface port-channel 3


switchport voice detect auto
exit
!
interface port-channel 4
switchport voice detect auto
exit
!
interface port-channel 5
switchport voice detect auto
exit
!
interface port-channel 6
switchport voice detect auto
exit
!
interface port-channel 7
switchport voice detect auto
exit
!
interface port-channel 8
switchport voice detect auto


exit
!
interface port-channel 9
switchport voice detect auto
exit
!
interface port-channel 10
switchport voice detect auto
exit
!
interface port-channel 11
switchport voice detect auto
exit
!
interface port-channel 12
switchport voice detect auto
exit
!
interface port-channel 13
switchport voice detect auto
exit


!
interface port-channel 14
switchport voice detect auto
exit
!
interface port-channel 15
switchport voice detect auto
exit
!
interface port-channel 16
switchport voice detect auto
exit
!
interface port-channel 17
switchport voice detect auto
exit
!
interface port-channel 18
switchport voice detect auto
switchport mode general
exit


!
interface port-channel 19
switchport voice detect auto
exit
!
interface port-channel 20
switchport voice detect auto
exit
!
interface port-channel 21
switchport voice detect auto
exit
!
interface port-channel 22
switchport voice detect auto
exit
!
interface port-channel 23
switchport voice detect auto
exit
!


interface port-channel 24
switchport voice detect auto
exit
!
interface port-channel 25
switchport voice detect auto
exit
!
interface port-channel 26
switchport voice detect auto
exit
!
interface port-channel 27
switchport voice detect auto
exit
!
interface port-channel 28
switchport voice detect auto
exit
!
interface port-channel 29


switchport voice detect auto
exit
!
interface port-channel 30
switchport voice detect auto
exit
!
interface port-channel 31
switchport voice detect auto
exit
!
interface port-channel 32
switchport voice detect auto
exit
!
interface port-channel 33
switchport voice detect auto
exit
!
interface port-channel 34
switchport voice detect auto


switchport mode general
exit
!
interface port-channel 35
switchport voice detect auto
exit
!
interface port-channel 36
switchport voice detect auto
exit
!
interface port-channel 37
switchport voice detect auto
exit
!
interface port-channel 38
switchport voice detect auto
exit
!
interface port-channel 39
switchport voice detect auto


exit
!
interface port-channel 40
switchport voice detect auto
exit
!
interface port-channel 41
switchport voice detect auto
exit
!
interface port-channel 42
switchport voice detect auto
exit
!
interface port-channel 43
switchport voice detect auto
exit
!
interface port-channel 44
switchport voice detect auto
exit


!
interface port-channel 45
switchport voice detect auto
exit
!
interface port-channel 46
switchport voice detect auto
exit
!
interface port-channel 47
switchport voice detect auto
exit
!
interface port-channel 48
switchport voice detect auto
exit
snmp-server group Monitoring v1 read DefaultSuper write DefaultSuper
snmp-server user admin Monitoring auth-md5-key 97946abca325286c58bd4de1636522a9
snmp-server community-group Monitoring Monitoring
exit

console#

______________________________________________________

We have default route pointing to our cisco asa: 0.0.0.0 0.0.0.0 192.168.64.254

Also we have another route pointing to 2nd gateway cisco asa (.64.1) connected to this switch: 192.168.53.0 255.255.255.0 192.168.64.1

For some reasons for vlan 306 (192.168.53.0) only default route applies (when trying to go to the outside e.g. google) despite of having the below routes configured:

192.168.53.0 255.255.255.0 192.168.53.250 - local

192.168.53.0 255.255.255.0 192.168.64.1 - static

Basically, what I am trying to do is to tell layer 3 switch 64.250 to send all vlan 306 outbound traffic to the gateway 64.1 instead of 64.254 (default) but for some reasons even having the routes configured it is still sent to the default one

Thank you for your help

Kind Regards,

S


 

Campus over SM fiber 10g - with powerconnect 6224f ?

$
0
0

Hi there


we are trying to connect two of dell powerconnect 6224f over sm fiber.

dell-elfak(160.99.8.2) <----10g fiber------->(160.99.8.1)dell-junis(160.99.1.31)<----copper---> (160.99.1.12)gateway

(160.99.7.11)
|
|
copper
|
|
cisco-remote campus

(160.99.7.1)                   


Configurations are in attachment. for both dell switches.

The problem is that from network 160.99.1.x i can ping and trace route all the devices - all the time- but web and telnet access to 160.99.8.1 and 160.99.8.2 is not working all the time!!!



Would you be so kind to help us debug this situation?
Is it possible at all to do this with the powerconnect switches?!



Kind regards

Marko Živković
head of IT
Unviersity of Niš

10g dell_JUNIS configuration

______________________________________________________________________________


!Current Configuration:
!System Description "PowerConnect 6224F, 3.3.12.1, VxWorks 6.5"
!System Software Version 3.3.12.1
!Cut-through mode is configured as disabled
!
configure
gvrp enable
vlan database
vlan 2,36,100
vlan routing 2 1
vlan routing 100 2
vlan routing 36 3
exit
hostname "10GB_junis"
sntp unicast client enable
sntp server 147.91.8.77
clock timezone 1 minutes 0 zone "UTC"
stack
member 1 3
exit
ip address none
ip domain-name junis.ni.ac.rs
ip name-server 160.99.1.1
logging console debug
logging file debug
logging buffered warning
access-list proba deny ip any 160.99.8.2 255.255.255.252 log
ip routing
ip route 0.0.0.0 0.0.0.0 160.99.1.12
ip route 0.0.0.0 0.0.0.0 160.99.8.11
ip route 160.99.7.0 255.255.255.0 160.99.8.2
router rip
split-horizon none
no hostroutesaccept
default-metric 1
redistribute connected metric 1
redistribute static metric 1
exit
interface vlan 2
name "Veza_JUNIS"
routing
ip address 160.99.1.31 255.255.255.0
exit
interface vlan 36
name "10GB_optika"
routing
ip address 160.99.36.1 255.255.255.0
bandwidth 100000
ip mtu 1500
exit
interface vlan 100
name "10giga"
routing
ip address 160.99.8.1 255.255.255.0
ip netdirbcast
bandwidth 10000000
no ip proxy-arp
ip local-proxy-arp
ip mtu 1500
exit
username "stanko" password 771043baf218eb9499ce67933f05b111 level 15 encrypted
username "test" password eda3dcace24a59bd773d64a9b04e6427 level 15 encrypted
username "marko" password r0utir@nje level 15 encrypted
line telnet
exec-timeout 30
exit
no flowcontrol
no spanning-tree
!
interface ethernet 1/g1
shutdown
switchport mode general
switchport general pvid 100
exit
!
interface ethernet 1/g2
switchport access vlan 2
exit
!
interface ethernet 1/g21
description "abc"
switchport access vlan 2
exit
!
interface ethernet 1/g23
spanning-tree portfast
exit
!
interface ethernet 1/g24
ip arp inspection trust
description "VezaJUNIS"
gvrp enable
switchport mode general
switchport general pvid 2
switchport general ingress-filtering disable
switchport general allowed vlan add 2,100 tagged
switchport general allowed vlan remove 1
dot1x unauth-vlan 100
exit
!
interface ethernet 1/xg1
spanning-tree portfast
switchport mode general
switchport general pvid 100
switchport general allowed vlan add 100
switchport general allowed vlan remove 1
vlan priority 7
exit
exit

10GB_junis#

______________________________________________________________________________

10g dell_elfak configuration

!Current Configuration:
!System Description "PowerConnect 6224F, 3.3.12.1, VxWorks 6.5"
!System Software Version 3.3.12.1
!Cut-through mode is configured as disabled
!
configure
vlan database
vlan 8,33-34,36-38,100
vlan routing 8 1
vlan routing 100 2
vlan routing 36 3
vlan routing 37 4
vlan routing 38 5
vlan routing 34 6
vlan routing 33 7
exit
hostname "10GB_elfak"
sntp unicast client enable
sntp server 147.91.8.77
sntp server time.nist.gov
sntp server 160.99.1.12

clock timezone 2 minutes 0
stack
member 1 3
exit
ip address none
ip domain-name junis.ni.ac.rs
ip name-server 160.99.1.1
ip name-server 8.8.8.8
logging console debug
logging file debug
logging buffered debug
no diffserv
ip routing
ip route 0.0.0.0 0.0.0.0 160.99.8.1
ip route 160.99.1.0 255.255.255.0 160.99.8.1
arp dynamicrenew
no ip helper enable
router rip
no enable
split-horizon none
no hostroutesaccept
default-metric 1
redistribute connected metric 1
redistribute static metric 1
exit
interface vlan 8
routing
ip address 160.99.7.11 255.255.255.0
ip rip send version rip1
ip rip receive version both
exit
interface vlan 33
routing
ip address 160.99.33.254 255.255.255.0
exit
interface vlan 34
routing
ip address 160.99.34.101 255.255.255.0
exit
interface vlan 36
routing
ip address 160.99.36.2 255.255.255.0
ip rip send version rip1
ip rip receive version rip1
exit
interface vlan 37
routing
ip address 160.99.37.11 255.255.255.0
exit
interface vlan 38
routing
ip address 160.99.38.129 255.255.255.224
exit
interface vlan 100
routing
ip address 160.99.8.2 255.255.255.0
ip rip send version rip1
ip rip receive version both
exit
username "stanko" password 771043baf218eb9499ce67933f05b111 level 15 encrypted
username "test" password eda3dcace24a59bd773d64a9b04e6427 level 15 encrypted
username "marko" password r0utir@nje level 15 encrypted
line console
speed 115200
password c61032de58db22a4c85bb790ae11d9b7 encrypted
exit
line telnet
exec-timeout 15
exit
ip ssh server
no spanning-tree
spanning-tree mode stp
!
interface ethernet 1/g1
gvrp enable
switchport mode trunk
switchport trunk allowed vlan add 8,36
exit
!
interface ethernet 1/g5
switchport access vlan 8
exit
!
interface ethernet 1/g7
switchport access vlan 8
exit
!
interface ethernet 1/g9
switchport access vlan 33
exit
!
interface ethernet 1/g15
switchport access vlan 34
exit
!
interface ethernet 1/g21
switchport access vlan 34
exit
!
interface ethernet 1/g22
switchport access vlan 8
exit
!
interface ethernet 1/g23
switchport access vlan 37
exit
!
interface ethernet 1/g24
switchport access vlan 38
exit
!
interface ethernet 1/xg1
description "KaJUNISu"
spanning-tree portfast
switchport mode general
switchport general pvid 100
switchport general allowed vlan add 100
switchport general allowed vlan remove 1
exit
exit

10GB_elfak#

____________________________________________________________________________

Connect N3024 to Cisco router via vLan

$
0
0

Hi,

I have a Dell N3024 switch and I need it to talk to a Cisco router (provided by 3rd party to act as the gateway to a dedicated leased line) over vLan 192.

The Dell N3024 has an EQL unit attached and it needs to replicate with another site. The leased line is in place to handle this traffic and there is one of these 3rd party Cisco routers at either end. So it goes something like this:

EQL <--> N3024 <--> Cisco at Site A <--> leased line outside <--> Cisco at Site B <--> N3024 <--> EQL
(I hope that makes sense)

Trouble is, the Cisco router cannot see the EQL unit at all. I have spoken to the 3rd party and they say they cannot see anything in the ARP table for that device.


Config (all I have) from the 3rd party on the Cisco router interface in question is:

sho run int gi0/1.192
Building configuration...

Current configuration : 152 bytes
!
interface GigabitEthernet0/1.192
description ***
encapsulation dot1Q 192
ip address 192.168.2.100 255.255.255.0
end


So they have set dot1q encapsulation. I am not sure how to set this on the Dell...with Cisco it seems easy but as far as I can see I have to set the switchport mode to 'general' and then add the vLan to it:

switchport general allowed vlan add 192

..which puts it into dot1q compliance - is that right?

The config off the Dell switch is:

!Current Configuration:
!System Description "Dell Networking N3024, 6.0.1.3, Linux 3.6.5-320b2282"
!System Software Version 6.0.1.3
!
configure
vlan 2-3,5,8-15,100,192
exit
hostname "***"
slot 1/0 1 ! Dell Networking N3024
stack
member 1 1 ! N3024
exit
ip routing
ip route 10.149.2.0 255.255.255.0 10.149.2.20
ip route 10.149.3.0 255.255.255.0 10.149.3.20
ip route 10.149.12.0 255.255.255.0 10.149.12.22
ip route 10.149.13.0 255.255.255.0 10.149.13.22
ip route 10.149.14.0 255.255.255.0 10.149.14.22
ip route 10.149.15.0 255.255.255.0 10.149.15.22
ip route 10.149.0.0 255.255.255.0 10.149.0.20
ip route 0.0.0.0 0.0.0.0 10.0.0.250
interface vlan 1
ip address 10.0.0.101 255.255.255.0
exit
interface vlan 2
ip address 10.149.2.21 255.255.255.0
exit
interface vlan 3
ip address 10.149.3.21 255.255.255.0
exit
interface vlan 5
ip address 10.149.5.21 255.255.255.0
exit
interface vlan 8
ip address 10.149.8.21 255.255.255.0
exit
interface vlan 9
ip address 10.149.9.21 255.255.255.0
exit
interface vlan 10
ip address 10.149.10.21 255.255.255.0
exit
interface vlan 11
ip address 10.149.11.21 255.255.255.0
exit
interface vlan 12
ip address 10.149.12.21 255.255.255.0
exit
interface vlan 13
ip address 10.149.13.21 255.255.255.0
exit
interface vlan 14
ip address 10.149.14.21 255.255.255.0
exit
interface vlan 15
ip address 10.149.15.21 255.255.255.0
exit
interface vlan 100
ip address 10.149.0.21 255.255.255.0
exit
interface vlan 192
ip address 192.168.10.2 255.255.255.0
exit
username "***" password *** privilege 1 encrypted
username "***" password *** privilege 15 encrypted
!
interface Gi1/0/1
spanning-tree portfast
exit
!
interface Gi1/0/2
spanning-tree portfast
exit
!
interface Gi1/0/3
spanning-tree portfast
exit
!
interface Gi1/0/4
spanning-tree portfast
exit
!
interface Gi1/0/5
spanning-tree portfast
exit
!
interface Gi1/0/6
spanning-tree portfast
exit
!
interface Gi1/0/7
spanning-tree portfast
exit
!
interface Gi1/0/8
spanning-tree portfast
exit
!
interface Gi1/0/9
spanning-tree portfast
exit
!
interface Gi1/0/10
spanning-tree portfast
exit
!
interface Gi1/0/11
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/12
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/13
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/14
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/15
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/16
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/17
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/18
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/19
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/20
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/21
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/22
spanning-tree portfast
switchport access vlan 192
exit
!
interface Gi1/0/23
spanning-tree portfast
switchport mode trunk
exit
!
interface Gi1/0/24
spanning-tree portfast
switchport mode trunk
exit
snmp-server engineid local 800002a203f8b1563e0381
enable password *** encrypted
exit

The 10.149.x.x ranges and vLans are all working OK, and are not all used anyway. I have only included them for the sake of completeness.

The 'ip route' command - ip route 0.0.0.0 0.0.0.0 10.0.0.250 - would that mess up vLan 192 communications?
Should I have an IP assigned to vLan 192?
The IP of the Cisco router is 192.168.10.100 - should I set that as a gateway somewhere?

I am sure there are other things wrong with that config, but right now I just want to know and understand why it won't talk to the Cisco.

Can anyone help? Please?? This is doing my head in...

Thank you


Duncan

10 gig between two 6248

$
0
0

Hi,

I am new to dell switches, we want to move all servers to a 6248 which would be connected to another 6248 switch.

So we want to use 1000Base fibre ports on 6248 so that the link between the switches can handle the load.

Please let me know if those are SFP ports?

How can I connect two 6248on these port, I mean what cable and hardware do we need for this 10 gig connection

Viewing all 2954 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>