Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 163
  • Last Modified:

Cisco VLAN

I have two Cisco SG200 Switch A and B.  I have two servers on Swtich A each connected via LACP LAG 2&3.  LAG 2&3 are one Vlan 1000 which is set two access mode.  Server 1&2 can ping each other.  Switch A&B are connected via 2 uplinks Which are LACP LAG 1 is on the default Vlan the second Uplink LAG is set to access on both ends in Vlan 1000.  Switch B has 1 server connected via LACP which is set to access on VLAN 1000 but server 3 can not ping 1&2.  If I set everything to trunk and the Default Vlan I can ping what am I doing wrong.  I want a backup network that is on VLAN 1000 that server 1&2 on Switch A are on and Server 3 on switch B is on .  I dont want any other traffic on 1000.  Now I have other VLAN's on each switch all ports on the VLAN's are set to access due to no cross communication the only VLAN that is on both switches is the default and VLAN 100 and the backup network VLAN 1000 but I can not get 1000 to work.  Any ideas?
0
cameljoe121
Asked:
cameljoe121
  • 5
  • 5
1 Solution
 
giltjrCommented:
I'm confused on your setup.  This does not make sense:

--> "Switch A&B are connected via 2 uplinks Which are LACP LAG 1 is on the default Vlan the second Uplink LAG is set to access on both ends in Vlan 1000.  "

It sounds like you have two uplinks in a link access group, but each link is configured differently, which will not work.  Links in a LAG, must be the same.

So How are Switch A & B connected?  If you have multiple VLAN's on A and B that need to talk to each other, then the link between those switches must be a TRUNK in order to allow multiple VLAN's.

The only traffic on VLAN 1000 will be traffic that belongs on VLAN 1000.

Can you post the configuration for the links that connect switch A&B?

A simple question, just to make sure, is server 3 on the same IP subnet as server 1&2?
0
 
cameljoe121Author Commented:
Sorry for the late replay was out yesterday and had an exchange issue today.   This I have two switches which are Cisco Sg200 series one in the front of the building on in the back on switch A there is a Hyper-V failover cluster consisting of two DL580 Nodes and a Storage server which houses all of the VHD’s the storage server is connected via Copper ISCSI.  On switch B is another DL580 which is the replica and has the autoloader connected to it.  Switch A and B have two uplinks consisting of multiple connections which have been put in a LAG via LCAP 1 and 2.  One is the production network 2 I want to use as the backup network and for replication.  On Switch A I have the following VLan’s
100–Production Network
200-Live Migration
300-Cluster Communication
400-ISCSI-1
500-ISCSI-2
600-ISCSI-3
1000-Backup Network

Switch B

100-Production Network
700-ISCSI-1
800-ISCSI-2
900-ISCSI-3
1000-Backup Network

Switch A LAGS

1-Production Uplink to Switch B
2-Backup Network Uplink to Switch B
3-Failover Cluster Node 1 LAG
4-Failover Cluster Node 2 LAG

Switch B LAGS

1-Production Uplink to Switch A
2-Backup Network Uplink to Switch A
3-DL580 Replica

All Vlan’s are set to except 100 are set to VLAN Mode Access.  100 is set to trunk.
0
 
giltjrCommented:
I think you may be confused about a few things.  VLAN's are not set to access or trunk.  

Ports/LAG groups are set to access or trunk.

If you have a port/LAG set to access, then only 1 VLAN can have traffic flow in/out of that port/LAG and the frames are untagged.

If you have a port/LAG set to trunk, then multiple VLAN's can flow over that port/LAG and all frames are tagged with the VLAN id, execpt for the native VLAN.
0
Become an Android App Developer

Ready to kick start your career in 2018? Learn how to build an Android app in January’s Course of the Month and open the door to new opportunities.

 
cameljoe121Author Commented:
Yes What I did is map the ports that the physical cables are plugged into say for Vlan 200 Cluster communication are on physical ports 2 and 20 I set them to Vlan 200 and then set the ports to Access.  Should I have not done that should I just leave everything as trunk and set the the the specific VLAN's in the setup I have there should be no need for any connections to be in more than one VLAN.
0
 
giltjrCommented:
Both switches have VLAN 100 and VLAN 1000.   Therefor the uplinks between switch A and switch B must be defined as a trunk and they must allow VLAN 100 and VLAN 1000 over the trunk.  They don't need to allow any other VLAN's

I'm confused why you have two unique LAG's connecting the two switches.  You should only need one LAG with multiple ports.  The whole idea between a LAG is you have multiple physical port that logically act like one.  There is no reason to have two unique LAG's connecting the same pair of switches.  All the ports in one LAG will sit idle waiting for all the ports in the other LAG to fail.  So you have ports sitting there doing nothing.
0
 
cameljoe121Author Commented:
There is no real reason for the the two uplink lags I just thought it may help cut the congestion to the clients some if all the backup and replication traffic was using a different link as the production network.  But since it is on the same switch and the switch is processing the traffic anyway it would not make a difference.
0
 
giltjrCommented:
How many ports are in each uplink LAG?
0
 
cameljoe121Author Commented:
LAG one has 3 copper and one fiber Lag two has 1 fiber and 1 copper
0
 
giltjrCommented:
If you really need the bandwidth I would put all 6 ports into a single LAG group.  With the way I think you have it configured LAG2 will never be used unless all 4 ports in LAG 1 go down.

You should be able to look at spanning tree and on one of the switches LAG2 and all the ports in LAG2 should show as being blocked.
0
 
cameljoe121Author Commented:
Yep You are Right Thanks for all of the help
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 5
  • 5
Tackle projects and never again get stuck behind a technical roadblock.
Join Now