04-25-2019 11:24 AM
Our current Core router setting:
3750 sw -> Meraki MS450 Lan port ->Firewall (192.168.1.2)
Config:
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.1.2
no ip http server
no ip http secure-server
My question is does the core switch 3750 need to have a direct physical connection to the Firewall and not through an access switch Meraki? It looks like the only connection we have from the switch to the Firewall is from Meraki Lan port, also that port is an access port. How can the traffic route to the firewall?
Another question I have is I don't see any interface that have an ip 10.1.1.1 but I am able to ssh into the switch via 10.1.1.1. Can we ssh into switch with vlan ip address?
no ip domain-lookup
ip domain-name hydraflowusa.com
!
stack-power stack Powerstack-1
!
stack-power switch 1
stack Powerstack-1
stack-power switch 2
stack Powerstack-1
!
vtp domain hydraflow
vtp mode transparent
!
!
!
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree portfast bpduguard default
spanning-tree extend system-id
spanning-tree vlan 1-1005 priority 0
!
!
interface FastEthernet0
no ip address
no ip route-cache cef
no ip route-cache
no ip mroute-cache
shutdown
!
!
!
interface Vlan101
description MANAGEMENT
ip address 10.1.1.1 255.255.255.0
Solved! Go to Solution.
04-25-2019 11:46 AM
Hello
yes I am assuming the ms would be acting as a host switch and the Cisco would/is the stp root
The Fw wold just connect to the ms switch via an access port in a assigned vlan from the cisco
And yes you can remote access on the the Cisco switch via its SVI interface address
04-25-2019 11:46 AM
Hello
yes I am assuming the ms would be acting as a host switch and the Cisco would/is the stp root
The Fw wold just connect to the ms switch via an access port in a assigned vlan from the cisco
And yes you can remote access on the the Cisco switch via its SVI interface address
04-25-2019 12:12 PM
To clarify: The Meraki MS is acting as a bridge in between core the FW? If so, how did the core get network connection when the ISP connect straight to the firewall?
04-25-2019 11:51 AM - edited 04-25-2019 11:53 AM
3750 sw -> Meraki MS450 Lan port ->Firewall (192.168.1.2)
Config:
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.1.2
no ip http server
no ip http secure-server
My question is does the core switch 3750 need to have a direct physical connection to the Firewall and not through an access switch Meraki? It looks like the only connection we have from the switch to the Firewall is from Meraki Lan port, also that port is an access port. How can the traffic route to the firewall?
If meraki is configured as access switch, you wont have problem here. But if there other configurations, you need know if there connection between your 3750 and your firewall.
Another question I have is I don't see any interface that have an ip 10.1.1.1 but I am able to ssh into the switch via 10.1.1.1. Can we ssh into switch with vlan ip address?
you have a vlan interface configured on your device
interface Vlan101
description MANAGEMENT
ip address 10.1.1.1 255.255.255.0
>>end of the page <<
no ip domain-lookup
ip domain-name hydraflowusa.com
!
stack-power stack Powerstack-1
!
stack-power switch 1
stack Powerstack-1
stack-power switch 2
stack Powerstack-1
!
vtp domain hydraflow
vtp mode transparent
!
!
!
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree portfast bpduguard default
spanning-tree extend system-id
spanning-tree vlan 1-1005 priority 0
!
!
interface FastEthernet0
no ip address
no ip route-cache cef
no ip route-cache
no ip mroute-cache
shutdown
!
!
!
interface Vlan101
description MANAGEMENT
ip address 10.1.1.1 255.255.255.0
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide