Solved

HP Trunking to ESXi 5.1 - IP disconnect

Posted on 2013-01-29
1
914 Views
Last Modified: 2016-11-23
Hi,

I have a weird anomaly with a brand new fresh install of ESXi 5.1 on two new Dell PowerEdge 1950s.

I setup the HP switch and ESXi networking just like the below link:
http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=1004048&sliceId=1&docTypeID=DT_KB_1_1&dialogID=206986211&stateId=0%200%20202116152

The vsphere management IP is 192.168.5.16 on vlan 115 (this is a brand new subnet with no other conflicting IPs).

HP switch commands:
trunk 15-16 trk21 trunk
vlan 115 tagged trk21

I can't access 192.168.5.16, no ping, nothing.

I then change the IP address to 192.168.5.17 and whola, I'm able to ping and access it? Very weird.

On an identical server with identical HP switch trunking using trk20 I can ping it 192.168.5.15 and access vsphere via that IP address. I leave it overnight and come back in the morning and its no longer accessible with IP address 192.168.5.15, just for kicks I change it to 192.168.5.16 and its accessible for a while and then is inaccessible again?

In vsphere both hosts have the vswitch0 configured with the two NICs to be active and I only changed the load balancing to IP Hash. That's it.

Anybody have any clue?

- Jonathan

PS: Similar in a way to this issue in this thread that never got answered:
http://communities.vmware.com/thread/409288
0
Comment
Question by:RFVDB
1 Comment
 

Accepted Solution

by:
RFVDB earned 0 total points
ID: 38832994
Think I might have just found the problem. I've applied this link:
http://kb.vmware.com/selfservice/documentLinkInt.do?micrositeID=&popup=true&languageId=&externalID=1022751

So far so good. I'll let you know.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Last article we focus in how to VMware: How to create and use VMs TAGs – Part 1 so before follow this article and perform the next tasks, you should read the first article how to create the TAG before using them in Veeam Backup Jobs.
Teach the user how to install log collectors and how to configure ESXi 5.5 for remote logging Open console session and mount vCenter Server installer: Install vSphere Core Dump Collector: Install vSphere Syslog Collector: Open vSphere Client: Config…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now