05-09-2024 08:10 AM - edited 05-09-2024 11:19 AM
Hello Everyone,
I have a Firewall and 2 Cisco Switches.
The current topology is as follow.
Opnsense Firewall (FW)--->Cisco CBS350-8FP-E-2G (SW1)
I would like to add the CBS250-24T-4G (SW2) behind the Cisco CBS350-8FP-E-2G (SW1) and have all 4 VLANs propagate to CBS250-24T-4G (SW2). As follow.
Opnsense Firewall (FW)--->Cisco CBS350-8FP-E-2G (SW1)--> CBS250-24T-4G (SW2)
The issue that I’m having is a computer assigned any VLAN on the CBS250-24T-4G (SW2) are not getting ip address for the DHCP. I’ve tried via SFPs and copper.
Here is the configuration from both switches.
Cisco CBS350-8FP-E-2G (SW1)
interface vlan 1
ip address 192.168.1.2 255.255.255.0
no ip address dhcp
!
interface vlan 165
name Red
!
interface vlan 110
name Blue
!
interface vlan 240
name Green
!
interface vlan 301
name Yellow
!
interface GigabitEthernet10
switchport mode trunk
switchport trunk allowed vlan 165,110,240,301
CISCO CBS250-24T-4G (SW2)
interface vlan 1
ip address 192.168.1.4 255.255.255.0
no ip address dhcp
!
interface vlan 165
name Red
!
interface vlan 110
name Blue
!
interface vlan 240
name Green
!
interface vlan 301
name Yellow
!
interface GigabitEthernet24
switchport mode trunk
switchport trunk allowed vlan 165,110,240,301
I would appreciate some help
Thank you
05-09-2024 08:50 AM
how is your configuraiton of the port connected Opensese FW - can you post that config.
if the switches actiong Layer 2 then that should work - its bizzar , by the way what is the DHCP Server or opensese Server IP ?
try adding VLAN 1 also in the allowed list - on both the side trunks.(not required for testing).
switchport trunk allowed vlan 1,165,110,240,301
05-09-2024 10:17 AM - edited 05-09-2024 10:43 AM
the ports configuration on the OPNSense FW is done via the GUI but the trunk between the firewall and the SW1 works perfectly.
and the DHCP is done by the OPNSense FW.
by adding VLAN 1 on both side trunks, I now received a ip adresse from vlan but not from any other vlans.
now i'm puzzled...
05-09-2024 11:04 PM
Glad that all working now - i was also thinking STP priorities - SW1 should be always STP root for all VLAN to work.
check some reference :
05-09-2024 09:28 AM
If the FW work as L2 FW then you need only allow traffic between to side udp 67/68
That it
MHM
05-09-2024 10:19 AM
thanks for reply
the firewall works as a L3 FW
05-09-2024 11:20 AM - edited 05-09-2024 11:24 AM
I did some more testing, I've allowed all VLAN in the trunk configurations on both sides and I was able to received IP addresse from all VLAN on SW2
I've then changed the trunk configuration on both side to only allow VLAN 165,110,240,301 and everything works now
I'm even more puzzled but It works now
thanks for all your help
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide