neothink
asked on
Configuring SonicPoints on SonicWall NSA with Netgear switches
My goal is to plug multiple SonicPoints into my network of Netgear ProSafe switches and allow access to the LAN for employees and then access to the Internet for guests. I believe I am close to getting this working since when I plug a SonicPoint directly into X2 of the SonicWall, the SonicPoint comes up, offers the two SSIDs, and allows me to connect and surf.
My issue is placing the Netgear switches into the equation. It seems that I lose DHCP on one of the networks when I try different VLAN options. The SonicWall is configured with X0 and X2 bridged together. X0 is the LAN, X2 WLAN, and I have a VLAN 10 on X2:V10. Right now I have DHCP coming from the SonicWall for both virtual access points.
Can somebody tell me the correct way to set the VLAN settings to make this work? Do I need to have X0 plugged into the switch since the SonicPoint seems to work fine plugged directly into X2? If I plug X0 and X2 into the switch, won't it create a loop?
Thanks for any assistance.
My issue is placing the Netgear switches into the equation. It seems that I lose DHCP on one of the networks when I try different VLAN options. The SonicWall is configured with X0 and X2 bridged together. X0 is the LAN, X2 WLAN, and I have a VLAN 10 on X2:V10. Right now I have DHCP coming from the SonicWall for both virtual access points.
Can somebody tell me the correct way to set the VLAN settings to make this work? Do I need to have X0 plugged into the switch since the SonicPoint seems to work fine plugged directly into X2? If I plug X0 and X2 into the switch, won't it create a loop?
Thanks for any assistance.
Are these smart switches you can log into?
ASKER
Yes, FSM726. I currently have a console cable on them but they have a web gui as well.
Good, so you need to add vlan10 to the switch, and allow it "tagged" out the sonicwall port and whatever ports the sonicpoint are plugged into.
ASKER
I did that but I couldn't get everything to work correctly. What PVID do I use for each port?
Pvid is what vlan gets assigned to untagged packets, so the default vlan. You normally want this vlan to leave the switch untagged as well.
ASKER
I have removed the bridge and have configured a Cisco Catalyst 3500 and everything works as it should. The problem is I need to use the Netgear switches. The Cisco config is pretty basic I think.
Current configuration:
!
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
aaa new-model
aaa authentication login default local
enable secret 5 $1$zekz$B5Y2vR/bfrsHV8KIR6 dC/.
!
!
!
!
!
!
no spanning-tree vlan 1
ip subnet-zero
no ip domain-lookup
!
!
!
interface FastEthernet0/1
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface FastEthernet0/2
switchport access vlan 10
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
.
.
.
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface VLAN1
ip address 192.168.2.11 255.255.255.0
no ip directed-broadcast
no ip route-cache
!
ip default-gateway 192.168.2.1
!
line con 0
transport input none
stopbits 1
line vty 5 15
!
end
Current configuration:
!
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
aaa new-model
aaa authentication login default local
enable secret 5 $1$zekz$B5Y2vR/bfrsHV8KIR6
!
!
!
!
!
!
no spanning-tree vlan 1
ip subnet-zero
no ip domain-lookup
!
!
!
interface FastEthernet0/1
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface FastEthernet0/2
switchport access vlan 10
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
.
.
.
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface VLAN1
ip address 192.168.2.11 255.255.255.0
no ip directed-broadcast
no ip route-cache
!
ip default-gateway 192.168.2.1
!
line con 0
transport input none
stopbits 1
line vty 5 15
!
end
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
It turns out the SonicWall & SonicPoints don't play nice out of the box. You would think you could plug each of them into your LAN switches and have it supply wireless to your LAN but you would be mistaken. Here is the article I found that pointed me in the correct direction.
http://briandagan.com/fix-configuring-sonicpoint-aps-on-a-sonicwall
http://briandagan.com/fix-configuring-sonicpoint-aps-on-a-sonicwall