Solved

Fiber configuration for MoE on Dell PowerConnect 6224

Posted on 2008-10-09
9
911 Views
Last Modified: 2008-10-13
hello experts,

I have a QMoe (Qwest MoE) connection that has been installed this week. Basically, it gives us a 100mb piper (fiber) from our office to our colo and I have a Cisco 3750 on my end and a Dell 6224 on the colo end.

I have everything plugged in and all lights are green. the state of the interfaces is UP/Up.

I setup my laptop with an ip from the same segment that the switch on the colo side is on and try to ping the switch but i am not getting anything.

Is there something else that i missed? do i need to configure the switch to receive the traffic in a certain way? can someone help?
0
Comment
Question by:rajsidhu
  • 5
  • 4
9 Comments
 
LVL 3

Expert Comment

by:NetAdminGuy
Comment Utility
is the switched vlan'd?  the management IP may not be set or is on a seperate vlan from you.
0
 
LVL 3

Expert Comment

by:NetAdminGuy
Comment Utility
PS...
your conf file should contain these entries
ip address 172.20.1.20 255.255.255.0  <<<this is the management IP
ip default-gateway 172.20.1.1  <<<this is the management IPs gateway
ip address vlan 201  <<<this is the vlan the management IP will be on
make sure that the management IPs vlan is added to any trunks or lags
0
 

Author Comment

by:rajsidhu
Comment Utility
This is my first time Vlan 'ing. Can you hlep more?
0
 
LVL 3

Expert Comment

by:NetAdminGuy
Comment Utility
Sure.
How many VLANS have you set up?  If none, then everything is on the default vlan 1 and we dont need to go any farther...
It would help if you can post a sanitized (remove the IPs) conf file, but if you dont mind a dozen questions we can do this without...
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 

Author Comment

by:rajsidhu
Comment Utility
Looks like i have 5 VLANS setup.
1
240
241
242
300
0
 

Author Comment

by:rajsidhu
Comment Utility
I dont have a switch on this side that can handle VLANs. I also have a Firewall on the other end that I can maybe do routing with but the connection on that end is a fiber connection going into the 6224 using a GBIC.
0
 
LVL 3

Accepted Solution

by:
NetAdminGuy earned 500 total points
Comment Utility
So here are a couple assumptions on my part.  1) each vlan has a seperate IP subnet range and 2) the fiber connection you mention runs from the switch to the firewall and 3) the firewalls interface where the fiber comes in has been sub divided into sub-interfaces each with an IP thats in the range used by each subnet.
In otherwords... if vlan 240 has IP 10.0.0.0/x then the vlan 240 hosts will have IPs in the 10.0.0.0/x range and you set the switch to assgin that vlan tag to all ports these hosts connect into.  The fiber connection will be set as a trunk (tagged) port and this vlan will be added to that trunk.    This process will be repeated with each vlan.
So your interfaces will look like
interface ethernet 1/g4
switchport access vlan 201
exit
and your fiber port will look like  (I'm not using the fiber so mine still says ethernet)
interface ethernet 1/g5
switchport mode trunk
switchport trunk allowed vlan add 111,200-210,225
switchport trunk allowed vlan remove 1  <<<the switch adds this if you dont include vlan1
exit
 
Now on the firewall, your fiber will come into an interface.  This interface should be divided into sub-interfaces and each sub-interface should be assigned an IP from each of the vlans and each sub-interface should be assigned a tag.  This is the default-gateway each of the hosts on the vlans will use, so in my example above, there would be 1 sub-interface that would have an address in the 10.0.0.0/x range and it would be the same address each host listed as its default gateway.  
Now add the (at least static) routes for each of the subnets as normal.  The router does not take the vlan tags into account.  Its only intrest is IP, but it will assign the vlan tag back as the traffic leaves the sub-interface after the routing is complete so the switch knows where to switch that packet to.  
Here are some things that may help clear things up.
Only the switch cares about the vlan tags...no other device will use them.  Each switch has its own vlan database and this info is not shared.  (ok you can stack them but then they act as 1 switch so this still is true)  So each switch has to be configured with each vlan.   The vlan tag is applied as the packet comes into the switch.  The tag can now see any other ports on that vlan and can be passed up a trunk (tagged) port.  
Once the vlan tags hit the router, they are ignored for the most part.  The router looks at the IP and checks its table and routes them back  out the interface that matches that  route entry.  IF THIS INTERFACE (thats in bold not yelling) has been configured with a vlan tag, then it will be applied to the packet (such as a device on the switch from one vlan communicating with a device on the switch from a different vlan) and the switch will see this tag and switch it to the appropropriate vlan ports.  IF THIS INTERFACE (same as above) is not tagged, no vlan tag will be applied (such as a packet that does not need to go back to that switch such as traffic leaving the colo headed back to your office)  
Hope this helps...I make some assuptions and dont know what you do/dont know so please take no offense if I covered things you already know...trying to give a picture of whats happening in the infrastructure level...
0
 
LVL 3

Expert Comment

by:NetAdminGuy
Comment Utility
You still working on this?
0
 

Author Comment

by:rajsidhu
Comment Utility
Yes, I ended up creating a VLAN on the switch and then used firewalls on both ends to route the traffic. Thanks for your help;
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Find VLAN ID's 6 39
pfSense IP Helper 4 82
RIP Routing 5 45
Native Vlans, Tagged & untagged annnd Trunks 6 24
In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now