Start a Conversation

Unsolved

This post is more than 5 years old

J

25181

July 25th, 2009 01:00

configure DELL 6248 vlans to participate in vlans on SonicWall NSA 240

i have 2 Dell 6248 switches. I trunk them and they pass vlan information with no problems. I uplink one Dell to a SonicWall NSA 240 and it will not talk. I have created 6 vlan interfaces on the NSA 240 and assigned them the apropriate vlan ID's to match the dell. I cannot pass traffic thru the dell switch to the internet and I also cannot obtain an IP from the dhcp server assigned to the subnet for the vlan.

Here is the switch that is connected to the NSA 240:

6248PoE_Switch#show run
!Current Configuration:
!System Description "PowerConnect 6248P, 2.2.0.3, VxWorks5.5.1"
!System Software Version 2.2.0.3
!
configure
vlan database
vlan  50-55

interface ethernet 1/g47
description Uplink_to_NSA_240
switchport mode general
switchport general acceptable-frame-type tagged-only
switchport general allowed vlan add 50-55
exit
!

interface ethernet 1/g48
description Uplink_to_2nd_6248
no negotiation
switchport mode trunk
switchport trunk allowed vlan add 50-55
switchport trunk allowed vlan remove 1

==================================================

2nd Switch:

configure
vlan database
vlan  50,55
exit
hostname "6248_Switch"

interface ethernet 1/g47
switchport mode trunk
switchport trunk allowed vlan add 50,55
switchport trunk allowed vlan remove 1
exit

Switch 2 only has Interfaces with vlan 50 and 55 assigned. Do I still define all Vlans on this switch or does one switch pass vlan traffic it knows about to the other even if it has no interfaces configured in any of these vlans?

 

909 Posts

July 27th, 2009 10:00

on NSA 240 switch:

- port 1/g47 is set to egress untagged packets in vlans 50-55.  I assume you wanted tagged packets so change this:

switchport general allowed vlan add 50-55

to this:

switchport general allowed vlan add 50-55 tagged

on 2nd switch:

If the switch receives tagged packets on a port that is not a member of that vlan, then the packets will be dropped, whether or not the vlans are defined on the switch.

25 Posts

July 28th, 2009 01:00

One more question:

I want both switches to be in Vlan 50 and have a mangement IP address from the vlan 50 subnet.

How do I configure? I will post configs shortly

 

 

25 Posts

July 28th, 2009 01:00

Excellent - Worked.

Thanks!

25 Posts

July 28th, 2009 02:00

VLAN 50 SUBNET HAS A GATEWAY IP OF 192.168.50.254 WHICH IS THE SONICWALL 240

1ST SWITCH

configure
vlan database
vlan  50-55
exit
hostname "6248PoE_Switch"
stack
member 1 5
exit
ip address 192.168.50.253 255.255.255.0
ip default-gateway 192.168.50.254

"UPLINK port TO SONICWALL 240 @ IP 192.168.50.254"

interface ethernet 1/g47
description 'Uplink_to_NSA_240'
switchport mode general
no switchport general acceptable-frame-type tagged-only
switchport general allowed vlan add 50-55 tagged
switchport general allowed vlan remove 1
exit
!

interface ethernet 1/g48
description 'Link_to_non PoE 6248
switchport trunk allowed vlan add 50-55
switchport trunk allowed vlan remove 1
exit

2ND SWITCH: (non PoE 6248)

configure
vlan database
vlan  50,55
exit
hostname "6248_Switch"
stack
member 1 2
exit
ip address 192.168.50.252 255.255.255.0
ip default-gateway 192.168.50.254

interface ethernet 1/g47
switchport mode trunk
switchport trunk allowed vlan add 50,55
switchport trunk allowed vlan remove 1
exit

 

909 Posts

July 28th, 2009 13:00

To set the management vlan to 50:

onsole>en

console#configure

console(config)#ip address vlan 50

No Events found!

Top