If this the device only doing L2, theris L3 routing required in the Swithch
below command only rquired to reach managment. (rather we use to use ip route command)
ip default-gateway 192.168.210.1
This switch can be a host switch - no up routing so basically it’s just like a pc
The D/G is required for remote access to the switch otherwise without it you would not be able reach it off it own subnet
Well sorry but these is just like I am keeping my point of View As u said that Nexus all ports are SFP so you have given one Cisco switch with it and then on that switch you have connected server and on that server you have created various DHCP Pool.
But what mine thinking say is Its good what you have did atleast I got to know such scenerio also but what if
1->You have Created a DHCP IP Pool on your Nexus device only
2-> and after that you would have created multiple VLANs as you have already Created and also VLAN SVI on Nexus Only.
3-> what these could have done is your Nexus would have worked as an DHCP Server as it has the capacity to do that I believe that so because I have personally not worked on Nexus
4-> The setup would have been much easier sorry but I just felt that from my end to explain things according to my scenerio
I hope with Server you have not only created DHCP server pool but also AD & Other Domain settings.
on a side note, and I don't know if this has already been mentioned, your access port needs the 'spanning-tree portfast' command, try and add that:
switchport access vlan 402
switchport mode access
firstname.lastname@example.org Hello, guys!
one more question about DHCP Option 82. Do I need to configure it on nexus?
In general for what we use this option?
And what about the trusted interface? Should I configure a trusted interface? (Ensure that the DHCP server is connected to the device using a trusted interface. https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/security/configuration/guide/b_Cisco_Nexus_9000_Series_NX-OS_Security_Configuration_Guide/b_Cisco_Nexus_9000_Series_NX-OS_Security_Configuration_Guide_chapter_01101.html)