?
Solved

Fiber configuration for MoE on Dell PowerConnect 6224

Posted on 2008-10-09
9
Medium Priority
?
927 Views
Last Modified: 2008-10-13
hello experts,

I have a QMoe (Qwest MoE) connection that has been installed this week. Basically, it gives us a 100mb piper (fiber) from our office to our colo and I have a Cisco 3750 on my end and a Dell 6224 on the colo end.

I have everything plugged in and all lights are green. the state of the interfaces is UP/Up.

I setup my laptop with an ip from the same segment that the switch on the colo side is on and try to ping the switch but i am not getting anything.

Is there something else that i missed? do i need to configure the switch to receive the traffic in a certain way? can someone help?
0
Comment
Question by:rajsidhu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
9 Comments
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22681959
is the switched vlan'd?  the management IP may not be set or is on a seperate vlan from you.
0
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22681994
PS...
your conf file should contain these entries
ip address 172.20.1.20 255.255.255.0  <<<this is the management IP
ip default-gateway 172.20.1.1  <<<this is the management IPs gateway
ip address vlan 201  <<<this is the vlan the management IP will be on
make sure that the management IPs vlan is added to any trunks or lags
0
 

Author Comment

by:rajsidhu
ID: 22682250
This is my first time Vlan 'ing. Can you hlep more?
0
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22682478
Sure.
How many VLANS have you set up?  If none, then everything is on the default vlan 1 and we dont need to go any farther...
It would help if you can post a sanitized (remove the IPs) conf file, but if you dont mind a dozen questions we can do this without...
0
 

Author Comment

by:rajsidhu
ID: 22682528
Looks like i have 5 VLANS setup.
1
240
241
242
300
0
 

Author Comment

by:rajsidhu
ID: 22682588
I dont have a switch on this side that can handle VLANs. I also have a Firewall on the other end that I can maybe do routing with but the connection on that end is a fiber connection going into the 6224 using a GBIC.
0
 
LVL 3

Accepted Solution

by:
NetAdminGuy earned 2000 total points
ID: 22687132
So here are a couple assumptions on my part.  1) each vlan has a seperate IP subnet range and 2) the fiber connection you mention runs from the switch to the firewall and 3) the firewalls interface where the fiber comes in has been sub divided into sub-interfaces each with an IP thats in the range used by each subnet.
In otherwords... if vlan 240 has IP 10.0.0.0/x then the vlan 240 hosts will have IPs in the 10.0.0.0/x range and you set the switch to assgin that vlan tag to all ports these hosts connect into.  The fiber connection will be set as a trunk (tagged) port and this vlan will be added to that trunk.    This process will be repeated with each vlan.
So your interfaces will look like
interface ethernet 1/g4
switchport access vlan 201
exit
and your fiber port will look like  (I'm not using the fiber so mine still says ethernet)
interface ethernet 1/g5
switchport mode trunk
switchport trunk allowed vlan add 111,200-210,225
switchport trunk allowed vlan remove 1  <<<the switch adds this if you dont include vlan1
exit
 
Now on the firewall, your fiber will come into an interface.  This interface should be divided into sub-interfaces and each sub-interface should be assigned an IP from each of the vlans and each sub-interface should be assigned a tag.  This is the default-gateway each of the hosts on the vlans will use, so in my example above, there would be 1 sub-interface that would have an address in the 10.0.0.0/x range and it would be the same address each host listed as its default gateway.  
Now add the (at least static) routes for each of the subnets as normal.  The router does not take the vlan tags into account.  Its only intrest is IP, but it will assign the vlan tag back as the traffic leaves the sub-interface after the routing is complete so the switch knows where to switch that packet to.  
Here are some things that may help clear things up.
Only the switch cares about the vlan tags...no other device will use them.  Each switch has its own vlan database and this info is not shared.  (ok you can stack them but then they act as 1 switch so this still is true)  So each switch has to be configured with each vlan.   The vlan tag is applied as the packet comes into the switch.  The tag can now see any other ports on that vlan and can be passed up a trunk (tagged) port.  
Once the vlan tags hit the router, they are ignored for the most part.  The router looks at the IP and checks its table and routes them back  out the interface that matches that  route entry.  IF THIS INTERFACE (thats in bold not yelling) has been configured with a vlan tag, then it will be applied to the packet (such as a device on the switch from one vlan communicating with a device on the switch from a different vlan) and the switch will see this tag and switch it to the appropropriate vlan ports.  IF THIS INTERFACE (same as above) is not tagged, no vlan tag will be applied (such as a packet that does not need to go back to that switch such as traffic leaving the colo headed back to your office)  
Hope this helps...I make some assuptions and dont know what you do/dont know so please take no offense if I covered things you already know...trying to give a picture of whats happening in the infrastructure level...
0
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22702141
You still working on this?
0
 

Author Comment

by:rajsidhu
ID: 22703235
Yes, I ended up creating a VLAN on the switch and then used firewalls on both ends to route the traffic. Thanks for your help;
0

Featured Post

Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses
Course of the Month11 days, 18 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question