Start a Conversation

Solved!

Go to Solution

2853

June 7th, 2019 01:00

[7048P] Can't ping a PowerEdge R710 on Linux DEBIAN 9.8

Hello everybody,

I continue to ask questions because this case is new for me.

I have a switch PowerConnect 7048P and a server PowerEdge R710 (DEBIAN 9.8).

On one hand, intn the switch, I have done an aggregation link (number 40) with LACP between the port 13 and 14.

putty_lacp_port-channel_40.pnglacp_port_13.pnglacp_port_14.png

And the other hand, I made the server ports configuration like this :

cat_interfaces.png

When I check the bonding interface with the ifconfig command, everything looks "OK" :

ifconfig.png

But when I try to ping the server from the switch, this is failed.

Iping_172.16.220.241.png

When I try to ping the server virtual lan interface from the server, I can't but when I try to ping another virtual lan interface, I have the message "packets filtered" :

ping_172.16.100.241.pngping_172.16.220.225.png

For me, it looks like something blocked from this server but I don't know why.

I can specify another server is configured on the same VLAN and from it I can ping all of the virtual lan interfaces...

if someone have an idea, I will be interested.

 

Best regards.

 

SARL TSF

22 Posts

June 14th, 2019 07:00

Hi,

I have found the solution of my problem.

It was about the modules NetworkManager and ifenslave on Debian. Maybe they have some bugs inside them about LACP.

Finally I have used the systemd-networkd module for the network configuration. For using it you need to stop with the /etc/network/interfaces file. 

All of the new configuration files need to be inside the directory /etc/systemd/network/

I show you all of my configuration files for my cases :

eno1.pngeno2.pngeno3.pngeno4.pngbond1.netdev.pngbond1.network.png

I think this solution is available for all kind of PowerEdge Rxxx version.

I hope this will help someelse.

Best regards.

Moderator

 • 

8.7K Posts

June 7th, 2019 07:00

Hi,

If you don’t have lacp set up and just use a single port does it work?

22 Posts

June 10th, 2019 01:00

Hi @DELL-Josh Cr ,

Firstly, thank you for your answer.

I have tried your case and nothing change.

  • About the switch configuration :

new_switch_conf.png

  • About the server configuration :

new_server_conf.png

I have checked the access rules but I never create one into this switch.

For complete this reply, I give you all of the switch configuration :

PowerConnect 7048P#show running-config

!Current Configuration:
!System Description "PowerConnect 7048P, 5.1.14.1, VxWorks 6.6"
!System Software Version 5.1.14.1
!System Operational Mode "Normal"
!
configure
no boot host dhcp
no boot host auto-reboot
vlan 10,20,30,40,50,60,70
exit
vlan 10
name "Firewall"
vlan association subnet 172.16.250.252 255.255.255.252
vlan association mac C0EA.E4B1.D520
exit
vlan 20
name "Power Distribution Units"
vlan association subnet 172.16.240.248 255.255.255.248
vlan association mac 0023.AEE2.A46C
vlan association mac 0023.AEE2.A471
exit
vlan 30
name "Printers"
vlan association subnet 172.16.210.240 255.255.255.240
vlan association mac 84A9.3E52.31CD
exit
vlan 40
name "Servers"
vlan association subnet 172.16.220.224 255.255.255.224
vlan association mac 0011.325A.64CD
vlan association mac 0011.325A.64CE
vlan association mac 0024.E832.B2AC
vlan association mac 0024.E832.B2AE
vlan association mac 0024.E832.B2B0
vlan association mac 0026.B979.24DE
vlan association mac 0026.B979.24E0
exit
vlan 50
name "Workstations"
vlan association subnet 172.16.0.240 255.255.255.240
vlan association mac 1C75.0841.5566
vlan association mac C81F.66AA.D9D1
vlan association mac C81F.66AB.0B45
exit
vlan 60
name "Phones"
vlan association subnet 172.16.100.240 255.255.255.240
exit
vlan 70
name "Administration"
vlan association subnet 172.16.230.248 255.255.255.248
vlan association mac C0EA.E4B1.D534
exit
ip telnet server disable
snmp-server location "13, Rue Jean Bourgey, 69100 VILLEURBANNE"
snmp-server contact "Romain VERICEL"
hostname "PowerConnect 7048P"
slot 1/0 6    ! PowerConnect 7048P
slot 1/2 11   ! SFP+ Card
stack
member 1 6    ! PCT7048P
exit
interface out-of-band
ip address 172.16.235.202 255.255.255.252 172.16.235.201
exit
no ip domain-lookup
no logging on
logging console errors
logging web-session
logging file debugging
logging buffered errors
no boot auto-copy-sw allow-downgrade
ip routing
router rip
no enable
redistribute connected
exit
interface vlan 1 8
exit
interface vlan 10 2
ip address 172.16.250.253 255.255.255.252
bandwidth 10000
ip mtu 9000
exit
interface vlan 20 3
ip address 172.16.240.249 255.255.255.248
bandwidth 10000
ip mtu 9000
exit
interface vlan 30 4
ip address 172.16.210.241 255.255.255.240
bandwidth 10000
ip mtu 9000
exit
interface vlan 40 5
ip address 172.16.220.225 255.255.255.224
bandwidth 10000
ip mtu 9000
exit
interface vlan 50 6
ip address 172.16.0.241 255.255.255.240
bandwidth 10000
ip mtu 9000
exit
interface vlan 60 7
ip address 172.16.100.241 255.255.255.240
bandwidth 10000
ip mtu 9000
exit
interface vlan 70 1
ip address 172.16.230.249 255.255.255.248
bandwidth 10000
exit
username "admin" password 2f158c7505d83299779230e9e4ff568a privilege 15 encrypted
line console
exec-timeout 2
exit
line telnet
exec-timeout 2
exit
line ssh
enable authentication enableList
password 2f158c7505d83299779230e9e4ff568a encrypted
exit
ip ssh server
ip ssh protocol 2
no spanning-tree
mac address-table static 0023.AEE2.A46C vlan 20 interface Gi1/0/5
mac address-table static 0023.AEE2.A471 vlan 20 interface Gi1/0/6
mac address-table static 84A9.3E52.31CD vlan 30 interface Gi1/0/7
mac address-table static 0011.325A.64CD vlan 40 interface Po45
mac address-table static 0011.325A.64CE vlan 40 interface Po45
mac address-table static 0024.E832.B2AC vlan 40 interface Po40
mac address-table static 0024.E832.B2AE vlan 40 interface Po40
mac address-table static 0026.B979.24DE vlan 40 interface Po41
mac address-table static 0026.B979.24E0 vlan 40 interface Po41
mac address-table static 1C75.0841.5566 vlan 50 interface Gi1/0/27
mac address-table static 307C.B2FF.4489 vlan 50 interface Gi1/0/36
mac address-table static C81F.66AA.D9D1 vlan 50 interface Gi1/0/25
mac address-table static C81F.66AB.0B45 vlan 50 interface Gi1/0/26
ip vrrp
ip verify binding C0:EA:E4:B1:D5:34 vlan 70 172.16.230.254 interface Gi1/0/3
ip verify binding 00:23:AE:E2:A4:6C vlan 20 172.16.240.253 interface Gi1/0/5
ip verify binding 00:23:AE:E2:A4:71 vlan 20 172.16.240.254 interface Gi1/0/6
ip verify binding 84:A9:3E:52:31:CD vlan 20 172.16.210.249 interface Gi1/0/7
ip verify binding C8:1F:66:AA:D9:D1 vlan 50 172.16.0.243 interface Gi1/0/25
ip verify binding C8:1F:66:AB:0B:45 vlan 50 172.16.0.244 interface Gi1/0/26
ip verify binding C0:EA:E4:B1:D5:20 vlan 10 172.16.250.254 interface Po10
ip verify binding 00:24:E8:32:B2:AC vlan 40 172.16.220.241 interface Po40
ip verify binding 00:26:B9:79:24:DE vlan 40 172.16.220.242 interface Po41
ip verify binding 00:11:32:5A:64:CD vlan 40 172.16.220.254 interface Po45
!
interface Gi1/0/13
channel-group 40 mode active
lacp timeout short
description "PowerEdge R710"
mtu 9000
switchport general allowed vlan remove 1
power inline high-power
power inline priority critical
green-mode energy-detect
green-mode eee
exit
!
interface Gi1/0/14
--More-- or (q)uit
channel-group 40 mode active
lacp timeout short
description "PowerEdge R710"
mtu 9000
switchport general allowed vlan remove 1
power inline high-power
power inline priority critical
green-mode energy-detect
green-mode eee
exit
!
interface Gi1/0/23
channel-group 45 mode active
lacp timeout short
description "DS215+"
mtu 9000
switchport general allowed vlan remove 1
power inline high-power
power inline priority critical
green-mode energy-detect
green-mode eee
exit
!
interface Gi1/0/24
--More-- or (q)uit
channel-group 45 mode active
lacp timeout short
description "DS215+"
mtu 9000
switchport general allowed vlan remove 1
power inline high-power
power inline priority critical
green-mode energy-detect
green-mode eee
exit
!
interface port-channel 10
ip verify source port-security
description "Firewall"
hashing-mode 6
switchport access vlan 10
exit
!
interface port-channel 40
ip verify source port-security
description "Domain Name Server"
hashing-mode 6
switchport access vlan 40
mtu 9000
exit
!
interface port-channel 45
ip verify source port-security
description "Network Attached Storage"
switchport general pvid 40
switchport access vlan 40
exit
snmp-server engineid local 800002a203d067e5e0f472
line console
no exec-banner
no login-banner
no motd-banner
exit
line telnet
no exec-banner
no login-banner
no motd-banner
exit
exit

Just one more thing. I have detected the message "packet filtered" is arrived because when I ping, the server try to use the eno3 interface with the bad network. 

When I try after disable the eno3 interface, everytime I have the message "Destination Host Unreachable".

 

Best regards

 

Moderator

 • 

8.7K Posts

June 10th, 2019 09:00

Do you have another device you can try to see if it is the R710 that is the problem?

22 Posts

June 13th, 2019 03:00

Hi @DELL-Josh Cr ,

I have tried 2 differents cases :

  • Connect a laptop (in the port 13) of the switch. It has been reconnized by the switch and I was able to ping the others servers in same VLAN and all of the others VLAN.
  • Connect a laptop (in the port 1) of the server. I was able to ping the server.

Really, I don't understand the missunderstanding between the switch and the server.

PS : Moreover, I checked all iDRAC on LAN configuration was disabled.

 

Best regards

Moderator

 • 

8.7K Posts

June 13th, 2019 08:00

What OS is the server running?

22 Posts

June 13th, 2019 10:00

The Operating System is DEBIAN 9.8 x64 without graphic interface.

 

Best regard.

Moderator

 • 

8.7K Posts

June 13th, 2019 13:00

Does ifconfig -a show any data being sent and received?

22 Posts

June 13th, 2019 14:00

Yes, the ifconfig -a showed me some datas sent and received across the bond.

ifconfig_-a.png

Best regards

No Events found!

Top