11-25-2015 04:11 AM - edited 03-08-2019 02:50 AM
Hi team
Iam new one in this side. I have 3750G series 24-ports cisco switch, microsoft 2008 server. i need to know about how to configure on cisco switch with multiple vlans. DHCp are comming from Microsoft server with multiple DHCP scope for each vlan. So how i configure multiple vlans on specified switch here.
iam giving vlans
vlan 10 management
vlan 20 voip
vlan 30 users
ipaddress range 192.168.10.0/24 for vlan 10
ipaddress range 192.168.20.0/24 for vlan 20
ipaddress range 192.168.30.0/24 for vlan 30
i also needto know about how communication possible from switch to Microsoft Server 2008 and its switch configuration.Rough figure of my pan are given here.please go through on it.
Please help me.
Solved! Go to Solution.
12-10-2015 06:26 AM
DHCP server must have default gateway. Switch uses the IP address of interface VLAN which client come as the source IP, so DHCP server needs to have default gateway to be able to reply back.
Masoud
12-10-2015 06:43 AM
Thanks for kind and quick replay.
Actually I didn't get you. Kindly please explain more. I am stuck with that one.
12-12-2015 02:15 AM
Default Gateway for DHCP is Switch Port IP address which we connected DHCP server IP range?
Kindly Help me Please.
12-12-2015 05:28 AM
Yes, you are correct. The gateway must be in the same range. After you set gateway on dhcp server, you should be able to ping it from switch with any source. Please check this command on switch as an example.
ping 10.20.30.9 source 10.27.130.1
12-15-2015 05:23 AM
Thanks for you help.
Above are ok.
That 3750G has some issue. I got to change the firmware. I copied that firmware from switch. but when I tried to upload from tftp server it shows "error opening tftp".
I can download any file from switch to tftp server.
when put show flash on that switch this show
drw c3750-ipbasek9-mz.122-58.SE1
in directory mode. ican't see c3750-ipbasek9-mz.122-58.SE1.bin this file.
But backup to tftp server. Directory has any issue for uploading.
Please provide steps for uploading new firmware.
Thanks for advance.
Kindly help me please
12-15-2015 05:44 AM
Hello,
It is very simple.
Check the the link below for that
https://www.youtube.com/watch?v=HFKHb4hy56U.
Copy TFTP Flash
make sure here you put the complete name of IOS plus .bin
Also check the configuration of your TFTP server. You need to put the IOS in the default directory of TFTP server. When you upload your IOS into TFTP server, search that IOS in your computer. Put the new IOS next tothe IOS you find after search.
Masoud
11-25-2015 07:43 AM
By default, there is no restriction for communication, so VLAN managment can access to other VLAN. You need to put restriction on other VLAN to access VLAN 10.
ip access-list extended managmet
permit tcp 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255 established
permit tcp 192.168.30.0 0.0.0.255 192.168.10.0 0.0.0.255 established
permit icmp 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255 echo-reply
permit icmp 192.168.30.0 0.0.0.255 192.168.10.0 0.0.0.255 echo-reply
deny ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255
deny ip 192.168.30.0 0.0.0.255 192.168.10.0 0.0.0.255
permit ip any any
Int vlan 10
ip access-group managmet OUT (edited) ( Changing IN to OUT suggested by Paul)
Please try it and give feedback.
Hope it helps,
Masoud
Masoud
11-25-2015 07:43 AM
Hello Masoud
Remember your query on a prvious post regards svi racl logic
Take a look at this picture example from Peter to clarify https://supportforums.cisco.com/discussion/12043016/pls-explain-svi-acl-source-and-destination-direction
Res
Paul
11-25-2015 07:53 AM
Hello,
oops. My mistake. You are right. I need to put on out interface.
Thanks for mentioning.
Best,
Masoud
11-25-2015 07:56 AM
Summary. The rule of thumb for the direction of the ACL on SVI above are:
ACL always have the form of , while the direction of the ACL int SVI works as below:
If it’s INBOUND (“ip access-group ACL out”), then it means “It’s going OUT TO the VLAN100 access ports.”
If it’s OUTBOUND (“ip access-group ACL in”), then it means “It’s going AWAY from the VLAN100”
11-25-2015 06:13 AM
Adding to my previous comment
For SSH connectivity.
*****************************
IP domain-name Cisco.com
IP ssh version 2
username cisco passwork cisco
Crypto key generaye RSA [ press enter for questions]
line VTY 0 4
login local
transport input SSH [telnet if needed]
Masoud
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide