Link to home
Start Free TrialLog in
Avatar of neothink
neothink

asked on

Configuring SonicPoints on SonicWall NSA with Netgear switches

My goal is to plug multiple SonicPoints into my network of Netgear ProSafe switches and allow access to the LAN for employees and then access to the Internet for guests. I believe I am close to getting this working since when I plug a SonicPoint directly into X2 of the SonicWall, the SonicPoint comes up, offers the two SSIDs, and allows me to connect and surf.

My issue is placing the Netgear switches into the equation. It seems that I lose DHCP on one of the networks when I try different VLAN options. The SonicWall is configured with X0 and X2 bridged together. X0 is the LAN, X2 WLAN, and I have a VLAN 10 on X2:V10.  Right now I have DHCP coming from the SonicWall for both virtual access points.

Can somebody tell me the correct way to set the VLAN settings to make this work? Do I need to have X0 plugged into the switch since the SonicPoint seems to work fine plugged directly into X2? If I plug X0 and X2 into the switch, won't it create a loop?

Thanks for any assistance.
Avatar of Aaron Tomosky
Aaron Tomosky
Flag of United States of America image

Are these smart switches you can log into?
Avatar of neothink
neothink

ASKER

Yes, FSM726. I currently have a console cable on them but they have a web gui as well.
Good, so you need to add vlan10 to the switch, and allow it "tagged" out the sonicwall port and whatever ports the sonicpoint are plugged into.
I did that but I couldn't get everything to work correctly. What PVID do I use for each port?
Pvid is what vlan gets assigned to untagged packets, so the default vlan. You normally want this vlan to leave the switch untagged as well.
I have removed the bridge and have configured a Cisco Catalyst 3500 and everything works as it should. The problem is I need to use the Netgear switches.  The Cisco config is pretty basic I think.

Current configuration:
!
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
aaa new-model
aaa authentication login default local
enable secret 5 $1$zekz$B5Y2vR/bfrsHV8KIR6dC/.
!
!
!
!
!
!
no spanning-tree vlan 1
ip subnet-zero
no ip domain-lookup
!
!
!
interface FastEthernet0/1
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/2
 switchport access vlan 10
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
.
.
.
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface VLAN1
 ip address 192.168.2.11 255.255.255.0
 no ip directed-broadcast
 no ip route-cache
!
ip default-gateway 192.168.2.1
!
line con 0
 transport input none
 stopbits 1
line vty 5 15
!
end
SOLUTION
Avatar of Aaron Tomosky
Aaron Tomosky
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
It turns out the SonicWall & SonicPoints don't play nice out of the box. You would think you could plug each of them into your LAN switches and have it supply wireless to your LAN but you would be mistaken. Here is the article I found that pointed me in the correct direction.

http://briandagan.com/fix-configuring-sonicpoint-aps-on-a-sonicwall