Solved

Fiber configuration for MoE on Dell PowerConnect 6224

Posted on 2008-10-09
9
922 Views
Last Modified: 2008-10-13
hello experts,

I have a QMoe (Qwest MoE) connection that has been installed this week. Basically, it gives us a 100mb piper (fiber) from our office to our colo and I have a Cisco 3750 on my end and a Dell 6224 on the colo end.

I have everything plugged in and all lights are green. the state of the interfaces is UP/Up.

I setup my laptop with an ip from the same segment that the switch on the colo side is on and try to ping the switch but i am not getting anything.

Is there something else that i missed? do i need to configure the switch to receive the traffic in a certain way? can someone help?
0
Comment
Question by:rajsidhu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
9 Comments
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22681959
is the switched vlan'd?  the management IP may not be set or is on a seperate vlan from you.
0
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22681994
PS...
your conf file should contain these entries
ip address 172.20.1.20 255.255.255.0  <<<this is the management IP
ip default-gateway 172.20.1.1  <<<this is the management IPs gateway
ip address vlan 201  <<<this is the vlan the management IP will be on
make sure that the management IPs vlan is added to any trunks or lags
0
 

Author Comment

by:rajsidhu
ID: 22682250
This is my first time Vlan 'ing. Can you hlep more?
0
Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22682478
Sure.
How many VLANS have you set up?  If none, then everything is on the default vlan 1 and we dont need to go any farther...
It would help if you can post a sanitized (remove the IPs) conf file, but if you dont mind a dozen questions we can do this without...
0
 

Author Comment

by:rajsidhu
ID: 22682528
Looks like i have 5 VLANS setup.
1
240
241
242
300
0
 

Author Comment

by:rajsidhu
ID: 22682588
I dont have a switch on this side that can handle VLANs. I also have a Firewall on the other end that I can maybe do routing with but the connection on that end is a fiber connection going into the 6224 using a GBIC.
0
 
LVL 3

Accepted Solution

by:
NetAdminGuy earned 500 total points
ID: 22687132
So here are a couple assumptions on my part.  1) each vlan has a seperate IP subnet range and 2) the fiber connection you mention runs from the switch to the firewall and 3) the firewalls interface where the fiber comes in has been sub divided into sub-interfaces each with an IP thats in the range used by each subnet.
In otherwords... if vlan 240 has IP 10.0.0.0/x then the vlan 240 hosts will have IPs in the 10.0.0.0/x range and you set the switch to assgin that vlan tag to all ports these hosts connect into.  The fiber connection will be set as a trunk (tagged) port and this vlan will be added to that trunk.    This process will be repeated with each vlan.
So your interfaces will look like
interface ethernet 1/g4
switchport access vlan 201
exit
and your fiber port will look like  (I'm not using the fiber so mine still says ethernet)
interface ethernet 1/g5
switchport mode trunk
switchport trunk allowed vlan add 111,200-210,225
switchport trunk allowed vlan remove 1  <<<the switch adds this if you dont include vlan1
exit
 
Now on the firewall, your fiber will come into an interface.  This interface should be divided into sub-interfaces and each sub-interface should be assigned an IP from each of the vlans and each sub-interface should be assigned a tag.  This is the default-gateway each of the hosts on the vlans will use, so in my example above, there would be 1 sub-interface that would have an address in the 10.0.0.0/x range and it would be the same address each host listed as its default gateway.  
Now add the (at least static) routes for each of the subnets as normal.  The router does not take the vlan tags into account.  Its only intrest is IP, but it will assign the vlan tag back as the traffic leaves the sub-interface after the routing is complete so the switch knows where to switch that packet to.  
Here are some things that may help clear things up.
Only the switch cares about the vlan tags...no other device will use them.  Each switch has its own vlan database and this info is not shared.  (ok you can stack them but then they act as 1 switch so this still is true)  So each switch has to be configured with each vlan.   The vlan tag is applied as the packet comes into the switch.  The tag can now see any other ports on that vlan and can be passed up a trunk (tagged) port.  
Once the vlan tags hit the router, they are ignored for the most part.  The router looks at the IP and checks its table and routes them back  out the interface that matches that  route entry.  IF THIS INTERFACE (thats in bold not yelling) has been configured with a vlan tag, then it will be applied to the packet (such as a device on the switch from one vlan communicating with a device on the switch from a different vlan) and the switch will see this tag and switch it to the appropropriate vlan ports.  IF THIS INTERFACE (same as above) is not tagged, no vlan tag will be applied (such as a packet that does not need to go back to that switch such as traffic leaving the colo headed back to your office)  
Hope this helps...I make some assuptions and dont know what you do/dont know so please take no offense if I covered things you already know...trying to give a picture of whats happening in the infrastructure level...
0
 
LVL 3

Expert Comment

by:NetAdminGuy
ID: 22702141
You still working on this?
0
 

Author Comment

by:rajsidhu
ID: 22703235
Yes, I ended up creating a VLAN on the switch and then used firewalls on both ends to route the traffic. Thanks for your help;
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
Arrow Electronics was searching for a KVM  (Keyboard/Video/Mouse) switch that could display on one single monitor the current status of all units being tested on the rack.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question