there are servers on vlan 60 and 90 and hosts are connected to access switches connected to 5548, when I try to ping a machine on vlan 60 or 90 I am able to. and how all the hosts are accessing machines on vlan 60 and 90
My confusion here is how vlan traffic is going through 5548
mahimakundu
34 Posts
0
April 9th, 2015 11:00
is it because 5548 is an unmanaged switch? and so will allow all the data regardless of vlan
mahimakundu
34 Posts
0
April 9th, 2015 11:00
this is an existing scenario, I am just trying to understand how this is working
mahimakundu
34 Posts
0
April 9th, 2015 13:00
this is the connectivity
6248 (g23)-----(g48)5548(g43)----(x0)sonicwall
there are few virtual machines on 6248, and all other data switches are connected to 5548
There are no vlan's configured on 5548
Intervlan routing is being done by firewall.
So my question is how the vlan data is reaching to firewall when the port connected to 5548 is access port. this is really driving me crazy
mahimakundu
34 Posts
0
April 10th, 2015 12:00
This is the current situation
Now I am confused that how the traffic is going as both the ports connecting 6248 and 5448 are access ports
Vlan 60 and 90 routing is configured o firewall but how the vlan traffic is reaching there through access port.
below is config for 5448
show run
spanning-tree mode rstp
interface range ethernet g(5-48)
spanning-tree portfast
exit
interface port-channel 3
description Channel-Group-CABACK
exit
interface range ethernet g(24,38)
description CABCK106
exit
interface range ethernet all
flowcontrol on
exit
port jumbo-frame
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
interface range ethernet g(1-4)
channel-group 1 mode on
exit
interface range ethernet g(24,38)
channel-group 3 mode on
exit
interface ethernet g28
channel-group 2 mode on
exit
iscsi target port 860 address 0.0.0.0
iscsi target port 3260 address 0.0.0.0
interface vlan 1
ip address 192.168.x.x 255.255.252.0
ip address 192.168.x.x 255.255.255.0
exit
ip default-gateway 192.168.x
hostname Data6
username admin password d41d8cd98f00b204e9800998ecf8427e level 15 encrypted
snmp-server location SOTI-11FLR
snmp-server community S0t1N3tw0rk ro 192.168.1.217 view Default
snmp-server community sotinet ro 192.168.0.43 view Default
clock timezone -4
clock source sntp
sntp unicast client enable
sntp unicast client poll
sntp server 192.168.1.x
sntp server 192.168.1.x
Default settings:
Service tag: BJTBFH1
SW version 1.0.2.7 (date 17-Jun-2008 time 20:04:29)
Gigabit Ethernet Ports
=============================
no shutdown
speed 1000
duplex full
negotiation
flow-control off
mdix auto
no back-pressure
interface vlan 1
interface port-channel 1 - 8
spanning-tree
spanning-tree mode STP
qos basic
qos trust cos
mahimakundu
34 Posts
0
April 10th, 2015 13:00
yes there is only one lan port on sonicwall which is conneted to 5548, is there anything else or any other way this could happen
mahimakundu
34 Posts
0
April 10th, 2015 13:00
there are servers on vlan 60 and 90 and hosts are connected to access switches connected to 5548, when I try to ping a machine on vlan 60 or 90 I am able to. and how all the hosts are accessing machines on vlan 60 and 90
My confusion here is how vlan traffic is going through 5548
mahimakundu
34 Posts
0
April 10th, 2015 13:00
I have just joined the company and I am also trying to understand the concept behind this type of configuration.
mahimakundu
34 Posts
0
April 10th, 2015 14:00
and I did not get any email
mahimakundu
34 Posts
0
April 10th, 2015 14:00
show tech does not work on 5548, is there any other output that you need
mahimakundu
34 Posts
0
April 10th, 2015 14:00
I Really apologize it is a 5448, will this change anything?
mahimakundu
34 Posts
1
April 13th, 2015 07:00
hi, i was wondering if this is due to the default route on 6248
ip route 0.0.0.0 0.0.0.0 192.168.1.x which is ip address of firewall lan interface, on which inter la routing for vlan 60 and 90 have been defined.
If this is so how is tis working?