34 Posts

April 9th, 2015 11:00

is it because 5548 is an unmanaged switch? and so will allow all the data regardless of vlan

34 Posts

April 9th, 2015 11:00

this is an existing scenario, I am just trying to understand how this is working

34 Posts

April 9th, 2015 13:00

this is the connectivity

6248 (g23)-----(g48)5548(g43)----(x0)sonicwall

there are few virtual machines on 6248, and all other data switches are connected to 5548

There are no vlan's configured on 5548

Intervlan routing is being done by firewall.

So my question is how the vlan data is reaching to firewall when the port connected to 5548 is access port. this is really driving me crazy

34 Posts

April 10th, 2015 12:00

This is the current situation

Now I am confused that how the traffic is going as both the ports connecting 6248 and 5448 are access ports

Vlan 60 and 90 routing is configured o firewall but how the vlan traffic is reaching there through access port.

below is config for 5448

show run
spanning-tree mode rstp
interface range ethernet g(5-48)
spanning-tree portfast
exit
interface port-channel 3
description Channel-Group-CABACK
exit
interface range ethernet g(24,38)
description CABCK106
exit
interface range ethernet all
flowcontrol on
exit
port jumbo-frame
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
interface range ethernet g(1-4)
channel-group 1 mode on
exit
interface range ethernet g(24,38)
channel-group 3 mode on
exit
interface ethernet g28
channel-group 2 mode on
exit
iscsi target port 860 address 0.0.0.0
iscsi target port 3260 address 0.0.0.0
interface vlan 1
ip address 192.168.x.x 255.255.252.0
ip address 192.168.x.x 255.255.255.0
exit
ip default-gateway 192.168.x
hostname Data6
username admin password d41d8cd98f00b204e9800998ecf8427e level 15 encrypted
snmp-server location SOTI-11FLR
snmp-server community S0t1N3tw0rk ro 192.168.1.217 view Default
snmp-server community sotinet ro 192.168.0.43 view Default
clock timezone -4
clock source sntp
sntp unicast client enable
sntp unicast client poll
sntp server 192.168.1.x
sntp server 192.168.1.x

Default settings:
Service tag: BJTBFH1

SW version 1.0.2.7 (date  17-Jun-2008 time  20:04:29)

Gigabit Ethernet Ports
=============================
no shutdown
speed 1000
duplex full
negotiation
flow-control off
mdix auto
no back-pressure

interface vlan 1
interface port-channel 1 - 8

spanning-tree
spanning-tree mode STP

qos basic
qos trust cos

34 Posts

April 10th, 2015 13:00

yes there is only one lan port on sonicwall which is conneted to 5548, is there anything else or any other way this could happen

34 Posts

April 10th, 2015 13:00

there are servers on vlan 60 and 90 and hosts are connected to access switches connected to 5548, when I try to ping a machine on vlan 60 or 90 I am able to. and how all the hosts are accessing machines on vlan 60 and 90

My confusion here is how vlan traffic is going through 5548

34 Posts

April 10th, 2015 13:00

I have just joined the company and I am also trying to understand the concept behind this type of configuration.

34 Posts

April 10th, 2015 14:00

and I did not get any email

34 Posts

April 10th, 2015 14:00

show tech does not work on 5548, is there any other output that you need

34 Posts

April 10th, 2015 14:00

I Really apologize it is a 5448, will this change anything?

34 Posts

April 13th, 2015 07:00

hi, i was wondering if this is due to the default route on 6248

ip route 0.0.0.0 0.0.0.0 192.168.1.x which is ip address of firewall lan interface, on which inter la routing for vlan 60 and 90 have been defined.

If this is so how is tis working?

No Events found!

Top