Solved

Dell Switch VLAN configuration with LAG

Posted on 2013-06-07
5
2,223 Views
Last Modified: 2016-11-23
Hello,

I have a setup with three Dell 5548 switches, two of the switches are in the comms rack and connect the the users, printers and other devces to the network, these two switches are linked using an HDMI cable and are managed using a single IP. The third switch is located in the server room at the other end of the building and is connected by two lines bonded in a LAG, this setup is all working well and as expected.

The problem I have is that I need to setup a separate network between the two point for connectivity to a particular system, I had decided to use a VLAN to acheive this and used the following setup:

On the comms room switch I removed two ports (35 & 36) from the main VLAN 1 and added them to a new VLAN 2 and did the same with port 48 on the server room switch, all VLAN 2 ports have the following confguration:

Switchport Mode: Layer2
Port VLAN Mode: General
PVID: 2
VLAN List: Added 2U
Frame Type: Admin All
Ingress Filtering: Disabled

The problem is that I cannot get any traffic to flow between the two switches on VLAN 2 the normal network comms is fine, i am wondering if i need to change the configuration of the LAG, it has the following config under the VLAN section:

LAG: 1
SwitchPort Mode: Layer2
Port VLAN Mode: Access
PVID: Greyed Out
VLAN List: 1

The other options are greyed out.

I have setup VLANS before using HP and Netgear switches and have not had any issues, the only thing that i have not had at the other sites is the LAG.

Do i need to change the configuration of the LAG to Trunk or General mode to make this work?

Thanks for Looking...
0
Comment
Question by:CSE-User
  • 3
  • 2
5 Comments
 
LVL 5

Expert Comment

by:Sebastian Talmon
Comment Utility
yes, you have to reconfigure the LAG to Trunk or General to allow VLAN 2 to be forwarded to the other switches.
0
 

Author Comment

by:CSE-User
Comment Utility
Hi Tacotec,

Thanks for the reply, when I reconfigure the LAG is it best to set to general and add VLAN1 and VLAN2 or use the TRUNK mode that seems to add all of the VLAN ID's?

Also I want the packets for the VLAN to be untagged when exiting the VLAN, from what i understand i should leave the VLAN as 2U for untagged packets at both ends, but the help section for the switch mentions that the VLAN ID if set to untagged changes the tagging over the LAG or have I read this incorreclty?
0
 
LVL 5

Accepted Solution

by:
Sebastian Talmon earned 500 total points
Comment Utility
you could set the access-ports to untagged, so that outgoing packages leaving the switch untagged, and incoming packages are tagged at port level

inside the switch all packages are tagged - untagged only means, that the device on the other end does not send a VLAN tag, so the switch should add the tag  (tagged means "expect only packages that are allready tagged with this VLAN on this port")

If the LAG Ports are uplink ports to other switches, I personally would set them as TRUNK. The native VLAN is send out untagged on trunk ports, other VLANs are send tagged over trunk-ports. (you have to set the same native VLAN ID on all trunk ports)


You'll find the current (march 2013) CLI Manual for the 5548 here:
ftp://ftp.dell.com/Manuals/Common/powerconnect-5524_Reference%20Guide_en-us.pdf
0
 

Author Comment

by:CSE-User
Comment Utility
Hi Tacotec,

Many thanks, I will go ahead and make the changes to the LAG, my only problem now is finding a time when i can make the changes, but that is my problem.
0
 
LVL 5

Expert Comment

by:Sebastian Talmon
Comment Utility
one last hint... "trunk" does not mean that all VLANs are allowed, you may have to allow VLAN2 on the trunk port depending on your config

you could find a nice overview regarding the different handling of "trunk" and "general" on different switch series on http://en.community.dell.com/support-forums/network-switches/f/866/t/19335968.aspx
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now