VLan routing - Only works when switch is default gateway

I have a Dell PowerConnect 6224 routing between VLans, however the devices on the vlans can only access each other if the switch is set as the default gateway.  

How can I make it so the vlans can access anything on subnets assigned to the others?  

vlan1 = management vlan (not routable)
vlan2 = lan
vlan3 = replication

I want vlan 2 and 3 to be able to be able to communicate without having the switch as the gateway.  Thanks!
readymadeAsked:
Who is Participating?
 
netjgrnautCommented:
As for Vlan2.  If I create the static route from the firewall to the switch, will that then route all traffic to the switch, or just traffic looking for 192.168.66.x?  

Just traffic looking for 192.168.66.0/21.

The static route should look something like this:
net: 192.168.66.0  mask: 255.255.255.240  gw: 192.168.33.24  metric: 5

The rest of the traffic sent to the firewall will take the default route (to the Internet).

You'll still need the 0.0.0.0 0.0.0.0 192.168.33.1 route on the switch, so that VLAN3 traffic not bound for 192.168.32.0/21 can find a route to the Internet as well.
0
 
netjgrnautCommented:
Assuming that your VLANs are mapped to different IP subnets, they will need some gateway to communicate.  What other gateway device do you have available?

The high-level answer is that you probably need to enable some routing protocol on your network, so that your other (default) gateways are aware of this router between these two subnets.  Probably OSPF would be best for internal routing.

Some additional info on subnets and gateway IP addresses would be helpful, if you need additional guidance.
0
 
readymadeAuthor Commented:
This is a layer 3 switch, so I shouldn't need a router right?  Maybe I need to create routes on the switch?  It has this capability.  If so, what route?

Lan gateway = 192.168.33.1   255.255.248.0  (firewall)

VLan 2 subnet = 192.168.32.0  255.255.248.0
VLan 2 interface ip = 192.168.33.24  255.255.248.0

VLan 3 subnet = 192.168.66.0  255.255.255.240
VLan 3 interface ip =  192.168.66.1  255.255.255.0

Thanks!
0
Network Scalability - Handle Complex Environments

Monitor your entire network from a single platform. Free 30 Day Trial Now!

 
netjgrnautCommented:
A layer 3 switch *is* a router.

So your firewall/network border router is 192.168.33.1, which is part of the 192.168.32.0/21 subnet.  This device is plugged into a port on VLAN2 (or it isn't working).

The default gateway for hosts on VLAN3 should be 192.168.66.1 (the VLAN3 interface on the switch).

The default gateway for hosts on VLAN2 should be 192.168.33.24 (the VLAN2 interface on the switch).

Then you add a default route to the switch for 0.0.0.0 0.0.0.0 to 192.168.33.1.  NOTE: This is *not* the same thing as the default gateway for the switch.  It's part of the routing table.

In this configuration, all cross subnet traffic flows to the switch for Layer 3 routing (route once, switch thereafter - that's what makes a layer 3 switch).  All traffic bound for unknown subnets heads out to the firewall/network border router.

Make sense?
0
 
netjgrnautCommented:
...and I wonder about your VLAN1 (not routable).  What do you mean by that?  No default gateway on the VLAN1?  I'd question that design, but perhaps that's another topic...
0
 
readymadeAuthor Commented:
Great info Netjgrnaut.  Makes total sense now.  Very, very helpful.

Dell switches don't allow routing on the management vlan.  Not sure what that's all about.  So you can either create new vlans and get rid of the management vlan or just leave it with 1 port.  I decided to leave it.  Don't like deleting things.

Ok I was hoping not to have to change the default gateway of all the devices on my lan.  It's ok on the vlan3 as it won't have many devices.  Is there a way so I don't have to change all those devices?
0
 
netjgrnautCommented:
Well, VLAN3 won't be able to communicate with anything using the firewall as a default gateway - even the firewall itself - because they're on different subnets.

VLAN2 could use the firewall as a default gateway, but you would need to configure either a routing protocol (such as OSPF) between the switch and the firewall - or a static route from the firewall to 192.168.33.24  (VLAN2 switch interface) for network 192.168.66.0  255.255.255.240.

Aren't you using DHCP to hand out addresses?  That should make the change easier.

As for the management VLAN1, I suppose so long as you can connect to the switch on one of the other interfaces for management from your workstation, it's all academic.
0
 
readymadeAuthor Commented:
I don't mind making vlan3 gateway the switch.  It can then route to the edge firewall.

As for Vlan2.  If I create the static route from the firewall to the switch, will that then route all traffic to the switch, or just traffic looking for 192.168.66.x?  

We have a lot of servers, printers, etc.  DHCP will only help a little.
0
 
readymadeAuthor Commented:
Great info.  Thanks for all the help!
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.