Unsolved

This post is more than 5 years old

910

July 18th, 2018 08:00

VRTX R1-2401 switch question

I'm trying to securely add a port on the onboard switch to our DMZ and assign a public IP to a hyperV VM.  I'm guessing that the way to do this is to create 2 x protected ports in the same community, one physical port uplinked to our DMZ switch and one internal virtual port that is assigned to the hyperV host.

Is this the correct way to isolate and secure ports from the other hosts and switchports?  I don't run any vlans in the DMZ.

12 Elder

 • 

6.2K Posts

July 18th, 2018 11:00

Hello

If you are not using VLANs then the switch is not involved in your configuration.

I'm not sure what you are trying to accomplish, but it seems like it would be a lot easier to segment using a VLAN and use either NAT or PAT rather than trying to assign a public IP address to a virtual machine. You should be able to locate the switch manual on either the switch support page or the chassis support page.

http://www.dell.com/support/

Thanks

1 Message

July 19th, 2018 07:00

Hi Dan

Before posting, I tried various configurations with VLANs in the GUI (once I had powercycled the switch as it was unavailable through the GUI or the CLI).  I eventually reverted to the CLI and got it working within 5 mins.  Not sure what the config problem was in the GUI but it seems to overcomplicate.

I'm now having second thoughts about using the VRTX switch at all as I've found that it has become unresponsive twice more since yesterday.  It still passes packets OK, I just can't get into it via the GUI or the CLI until it's powercycled.  Does not fill me with confidence.

Thanks for the reply

Cammy

0 events found

No Events found!

Top