Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Fiber configuration for MoE on Dell PowerConnect 6224

Posted on 2008-10-09
9
Medium Priority
?
934 Views
Last Modified: 2008-10-13
hello experts,

I have a QMoe (Qwest MoE) connection that has been installed this week. Basically, it gives us a 100mb piper (fiber) from our office to our colo and I have a Cisco 3750 on my end and a Dell 6224 on the colo end.

I have everything plugged in and all lights are green. the state of the interfaces is UP/Up.

I setup my laptop with an ip from the same segment that the switch on the colo side is on and try to ping the switch but i am not getting anything.

Is there something else that i missed? do i need to configure the switch to receive the traffic in a certain way? can someone help?
0
Comment
Question by:rajsidhu
  • 5
  • 4
9 Comments
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22681959
is the switched vlan'd?  the management IP may not be set or is on a seperate vlan from you.
0
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22681994
PS...
your conf file should contain these entries
ip address 172.20.1.20 255.255.255.0  <<<this is the management IP
ip default-gateway 172.20.1.1  <<<this is the management IPs gateway
ip address vlan 201  <<<this is the vlan the management IP will be on
make sure that the management IPs vlan is added to any trunks or lags
0
 

Author Comment

by:rajsidhu
ID: 22682250
This is my first time Vlan 'ing. Can you hlep more?
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22682478
Sure.
How many VLANS have you set up?  If none, then everything is on the default vlan 1 and we dont need to go any farther...
It would help if you can post a sanitized (remove the IPs) conf file, but if you dont mind a dozen questions we can do this without...
0
 

Author Comment

by:rajsidhu
ID: 22682528
Looks like i have 5 VLANS setup.
1
240
241
242
300
0
 

Author Comment

by:rajsidhu
ID: 22682588
I dont have a switch on this side that can handle VLANs. I also have a Firewall on the other end that I can maybe do routing with but the connection on that end is a fiber connection going into the 6224 using a GBIC.
0
 
LVL 3

Accepted Solution

by:
NetAdminGuy earned 2000 total points
ID: 22687132
So here are a couple assumptions on my part.  1) each vlan has a seperate IP subnet range and 2) the fiber connection you mention runs from the switch to the firewall and 3) the firewalls interface where the fiber comes in has been sub divided into sub-interfaces each with an IP thats in the range used by each subnet.
In otherwords... if vlan 240 has IP 10.0.0.0/x then the vlan 240 hosts will have IPs in the 10.0.0.0/x range and you set the switch to assgin that vlan tag to all ports these hosts connect into.  The fiber connection will be set as a trunk (tagged) port and this vlan will be added to that trunk.    This process will be repeated with each vlan.
So your interfaces will look like
interface ethernet 1/g4
switchport access vlan 201
exit
and your fiber port will look like  (I'm not using the fiber so mine still says ethernet)
interface ethernet 1/g5
switchport mode trunk
switchport trunk allowed vlan add 111,200-210,225
switchport trunk allowed vlan remove 1  <<<the switch adds this if you dont include vlan1
exit
 
Now on the firewall, your fiber will come into an interface.  This interface should be divided into sub-interfaces and each sub-interface should be assigned an IP from each of the vlans and each sub-interface should be assigned a tag.  This is the default-gateway each of the hosts on the vlans will use, so in my example above, there would be 1 sub-interface that would have an address in the 10.0.0.0/x range and it would be the same address each host listed as its default gateway.  
Now add the (at least static) routes for each of the subnets as normal.  The router does not take the vlan tags into account.  Its only intrest is IP, but it will assign the vlan tag back as the traffic leaves the sub-interface after the routing is complete so the switch knows where to switch that packet to.  
Here are some things that may help clear things up.
Only the switch cares about the vlan tags...no other device will use them.  Each switch has its own vlan database and this info is not shared.  (ok you can stack them but then they act as 1 switch so this still is true)  So each switch has to be configured with each vlan.   The vlan tag is applied as the packet comes into the switch.  The tag can now see any other ports on that vlan and can be passed up a trunk (tagged) port.  
Once the vlan tags hit the router, they are ignored for the most part.  The router looks at the IP and checks its table and routes them back  out the interface that matches that  route entry.  IF THIS INTERFACE (thats in bold not yelling) has been configured with a vlan tag, then it will be applied to the packet (such as a device on the switch from one vlan communicating with a device on the switch from a different vlan) and the switch will see this tag and switch it to the appropropriate vlan ports.  IF THIS INTERFACE (same as above) is not tagged, no vlan tag will be applied (such as a packet that does not need to go back to that switch such as traffic leaving the colo headed back to your office)  
Hope this helps...I make some assuptions and dont know what you do/dont know so please take no offense if I covered things you already know...trying to give a picture of whats happening in the infrastructure level...
0
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22702141
You still working on this?
0
 

Author Comment

by:rajsidhu
ID: 22703235
Yes, I ended up creating a VLAN on the switch and then used firewalls on both ends to route the traffic. Thanks for your help;
0

Featured Post

Big Data Means Big Business

In data-dependent industries like IT, finance, and healthcare, there’s a growing demand for qualified analysts to fill leadership roles. WGU’s MS in Data Analytics has IT certifications from Oracle and SAS built into its curriculum at a flat fee that could save you money.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question