cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2828
Views
55
Helpful
25
Replies

Network Configuration Problem

krishna das
Level 1
Level 1

Hi team

Iam new one in this side. I have 3750G series 24-ports cisco switch, microsoft 2008 server. i need to know about how to configure on cisco switch with multiple vlans. DHCp are comming from Microsoft server with multiple DHCP scope for each vlan. So how i configure multiple vlans on specified switch here.

iam giving vlans

vlan 10 management

vlan 20 voip

vlan 30 users

ipaddress range 192.168.10.0/24 for vlan 10

ipaddress range 192.168.20.0/24 for vlan 20

ipaddress range 192.168.30.0/24 for vlan 30

i also needto know about how communication possible from switch to Microsoft Server 2008 and its switch configuration.Rough figure of my pan are given here.please go through on it.

Please help me.

25 Replies 25

DHCP server must have default gateway. Switch uses the IP address of interface VLAN which client come as the source IP, so DHCP server needs to have default gateway to be able to reply back.

Masoud

Thanks for kind and quick replay.

Actually I didn't get you. Kindly please explain more. I am stuck with that one.

Default Gateway for DHCP is Switch Port IP address which we connected DHCP server IP range?

Kindly Help me Please.

Yes, you are correct. The gateway must be in the same range. After you set gateway on dhcp server, you should be able to ping it from switch with any source. Please check this command on switch as an example.

ping 10.20.30.9 source 10.27.130.1

Thanks for you help.

Above are ok.

That 3750G has some issue. I got to change the firmware. I copied that firmware from switch. but when I tried to upload from tftp server it shows "error opening tftp".

I can download any file from switch to tftp server.

when put show flash on that switch this show

drw   c3750-ipbasek9-mz.122-58.SE1

in directory mode. ican't see c3750-ipbasek9-mz.122-58.SE1.bin this file.

But backup to tftp server. Directory has any issue for uploading.

Please provide steps for uploading new firmware.

Thanks for advance.

Kindly help me please

Hello,

It is very simple.

Check the the link below for that

https://www.youtube.com/watch?v=HFKHb4hy56U.

Copy TFTP Flash

make sure here you put the complete name of IOS plus .bin

Also check the configuration of your TFTP server. You need to put the IOS in the default directory of TFTP server. When you upload your IOS into TFTP server, search that IOS in your computer. Put the new IOS next tothe IOS you find after search.

Masoud

By default, there is no restriction for communication, so VLAN managment can access to other VLAN. You need to put restriction on other VLAN to access VLAN 10.

ip access-list extended managmet
permit tcp 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255 established
permit tcp 192.168.30.0 0.0.0.255 192.168.10.0 0.0.0.255 established
permit icmp 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255 echo-reply
permit icmp 192.168.30.0 0.0.0.255 192.168.10.0 0.0.0.255 echo-reply
deny ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255
deny ip 192.168.30.0 0.0.0.255 192.168.10.0 0.0.0.255
permit ip any any

Int vlan 10
ip access-group managmet OUT (edited)  ( Changing IN to OUT suggested by Paul)

Please try it and give feedback.

Hope it helps,

Masoud

Masoud

Hello Masoud

Remember your query on a prvious post regards svi racl logic

Take a look at this picture example from Peter to clarify https://supportforums.cisco.com/discussion/12043016/pls-explain-svi-acl-source-and-destination-direction

Res

Paul


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

Hello,

oops. My mistake. You are right. I need to put on out interface.

Thanks for mentioning.

Best,

Masoud

Summary. The rule of thumb for the direction of the ACL on SVI above are:

ACL always have the form of , while the direction of the ACL int SVI works as below:

If it’s INBOUND (“ip access-group ACL out”), then it means “It’s going OUT TO the VLAN100 access ports.”
If it’s OUTBOUND (“ip access-group ACL in”), then it means “It’s going AWAY from the VLAN100”


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

Adding  to my previous comment

For SSH connectivity.

*****************************

IP domain-name Cisco.com

IP ssh version 2

username cisco passwork cisco

Crypto key generaye RSA  [ press enter for questions]

line VTY 0 4

login local

transport input SSH [telnet if needed]

Masoud