04-30-2012 07:12 AM - edited 03-07-2019 06:25 AM
Hi,
I have Cisco 3560X L3 switch and i need to configure DHCP on this switch. I have already configured below mentioned VLANs
VLAN 10 - 192.168.8.254 (USER VLAN)
VLAN 20 - 192.168.152.254 (REMOTE & VPN USERS VLAN)
VLAN 30 - 192.168.0.254 (SERVER VLAN)
After configuring DHCP, all the users needs to get IP from USER VLAN and all the servers should get IP from SERVER VLAN.
Can you please let me know if its possible? If yes, request you to please let me know the steps as I am very newbie in this kind of configuration
Also, please let me know what all will be causes/problems if all the load comes on the L3 switch.
Thanks in advance.
Regards,
Sagar
04-30-2012 10:24 AM
Here is a sample config
ip dhcp excluded-address 192.168.2.1
ip dhcp excluded-address 192.168.2.1 192.168.2.20
ip dhcp pool D_MKT
network 192.168.2.0 255.255.255.0
default-router 192.168.2.1
dns-server 192.168.1.17
domain-name mydomain.com
lease 8
04-30-2012 02:57 PM
You can have multiple dhcp scopes on your device too.
ip dhcp excluded-address 192.168.8.254
ip dhcp excluded-address 192.168.8.1 192.168.8.99
ip dhcp excluded-address 192.168.0.254
ip dhcp excluded-address 192.168.0.1 192.168.0.99
ip dhcp pool User
network 192.168.8.0
default-router 192.168.8.254
dns-server x.x.x.x
ip dhcp pool Servers
network 192.168.0.0
default-router 192.168.0.254
dns-server x.x.x.x
The PCs will get the address from their respective dhcp scope without any additional configurations on SVIs.
HTH,
John
04-30-2012 10:32 PM
Hi John,
Thanks for your reply !!
I have configured the DHCP as suggested by you and laptop gets the DHCP address too but unable to get through the internet. I have configured Gi0/1 port as Trunk port and connected the cable coming from Sonicwall Firewall.
I have done the routing from Firewall to all the above mentioned VLANs.
L3 Switch IP - 10.10.10.1 and Firewall Gateway set as 10.10.10.2
Can you please suggest where i am wrong !!
Thanks for your patience !!
Regards,
Sagar
04-30-2012 10:39 PM
Please come up with any ACL applied. or any rules on the firewall.
--
Parvesh
05-01-2012 03:36 AM
Sagar,
Which device is doing natting? If you're hosts have addresses and dns servers, see if they can ping the switch, your firewall, and past the firewall. If they can't get past the firewall and the firewall is natting, make sure that it can nat for the other subnets. I'm not sure about sonicwalls, but some of those devices won't allow you to nat for more subnets than what it has assigned to its internal interface even though you can route to the other subnets internally.
HTH,
John
Please rate all useful posts...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide