Hi Kerry;
Jose,
I am assuming that you created the sub interfaces on your PF interface so
that it is working like a trunk interface.
I created sub interfaces eth0.2 and eth0.3 in my centos host for the vlans.
Inside the vmware image the pf interfaces are eth0 eth1 eth2.
I configured the switch on port 24 to be on trunk. Is there anything else to
do? I really dont know not quite linux expert.
Looking at your switch config, I am assuming that your PF server interface
is connected to FastEthernet 0/24
Yes thats right. My eth0 physical is directly on the switch port 24.
It looks like port 0/24 is missing these two commands
switchport trunk encapsulation dot1q
switchport trunk native vlan ? (which sub interface on your PF server is
not being tagged?)
In cisco 2950 it is for default that if a port is in trunk mode it is
already dot1q encapsulation. Thats why it doesnt appear in the config,
others cisco switches may appear but this model I am sure of that.
The switchport trunk native vlan I put like this but also doesnt appear in
config file. I think thats because trunk port for default it is already
present in all vlans:
switchport trunk native vlan all
I didnt understand the tagged sub interface on PF server...
I am attaching all files.
Thanks for your help.
Jose
----- Original Message -----
From: "Melcher, Kerry" <[email protected]>
To: <[email protected]>
Sent: Tuesday, January 18, 2011 9:08 PM
Subject: Re: [Packetfence-users] Vlan administrative down
problemciscoswitch2950
Jose,
I am assuming that you created the sub interfaces on your PF interface so
that it is working like a trunk interface.
Looking at your switch config, I am assuming that your PF server interface
is connected to FastEthernet 0/24
It looks like port 0/24 is missing these two commands
switchport trunk encapsulation dot1q
switchport trunk native vlan ? (which sub interface on your PF server is
not being tagged?)
Thank You,
Kerry Melcher
-----Original Message-----
From: José Carlos França Jr [mailto:[email protected]]
Sent: Tuesday, January 18, 2011 11:00 AM
To: [email protected]
Subject: Re: [Packetfence-users] Vlan administrative down problemciscoswitch
2950
You said that several people told me to look ate my trunk ports but I didnt
see anyone answering my question. Only you did. You are right...I never
provided my configuration and I am attaching now in a text file.
I am still having problems to the vlans to communicate. I put one port in
every vlan just to do the test that the zen pdf file is telling to do but I
was unable to have them communicating and I dont know why.
Thanks for your assistance and time.
Jose.
----- Original Message -----
From: "Olivier Bilodeau" <[email protected]>
To: <[email protected]>
Sent: Tuesday, January 18, 2011 3:31 PM
Subject: Re: [Packetfence-users] Vlan administrative down problem cisco
switch 2950
Hi José,
On 17/01/11 2:39 PM, José Carlos França Jr wrote:
But I still cant get my vlans to work...I cant communicate with them.
Several people tried to tell you to look at your trunk ports and you never
provided the config.
Since your problem is not closely related to PacketFence I would suggest
that you seek assistance in a Cisco or network support forum. You have more
chances of people willing to help you out on a network setup problem there
rather than here.
Try to get two devices on two different switches to communicate on the same
VLAN. Once you get there come back here with your PacketFence questions and
we will be more than happy to help you out from there.
Have a nice day!
--
Olivier Bilodeau
[email protected] :: +1.514.447.4918 *115 :: www.inverse.ca Inverse
inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
------------------------------------------------------------------------------
Protect Your Site and Customers from Malware Attacks Learn about various
malware tactics and how to avoid them. Understand malware threats, the
impact they can have on your business, and how you can protect your company
and customers by using code signing.
http://p.sf.net/sfu/oracle-sfdevnl
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
Protect Your Site and Customers from Malware Attacks
Learn about various malware tactics and how to avoid them. Understand
malware threats, the impact they can have on your business, and how you
can protect your company and customers by using code signing.
http://p.sf.net/sfu/oracle-sfdevnl
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
[root@localhost ~]# cat /proc/net/vlan/eth0.2
eth0.2 VID: 2 REORDER_HDR: 1 dev->priv_flags: 81
total frames received 0
total bytes received 0
Broadcast/Multicast Rcvd 0
total frames transmitted 50
total bytes transmitted 7518
total headroom inc 0
total encap on xmit 50
Device: eth0
INGRESS priority mappings: 0:0 1:0 2:0 3:0 4:0 5:0 6:0 7:0
EGRESSS priority Mappings:
[root@localhost ~]#
[root@localhost ~]# cat /proc/net/vlan/eth0.3
eth0.3 VID: 3 REORDER_HDR: 1 dev->priv_flags: 81
total frames received 0
total bytes received 0
Broadcast/Multicast Rcvd 0
total frames transmitted 305
total bytes transmitted 19033
total headroom inc 0
total encap on xmit 305
Device: eth0
INGRESS priority mappings: 0:0 1:0 2:0 3:0 4:0 5:0 6:0 7:0
EGRESSS priority Mappings:
[root@localhost ~]#
Sw1Labredes#sh run
Building configuration...
Current configuration : 6702 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Sw1Labredes
!
enable secret 5 $1$GHrD$NJMttwX3V8gT/PO8IQyHy1
enable password labredestest
!
ip subnet-zero
!
vtp mode transparent
!
spanning-tree mode pvst
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
!
!
!
vlan 2
name Normal
!
vlan 3
name Registration
!
vlan 4
name Isolation
!
vlan 5
name MAC_Detection
!
interface FastEthernet0/1
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0001
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/2
switchport access vlan 2
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0002
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/3
switchport access vlan 3
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0003
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/4
switchport access vlan 4
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0004
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/5
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0005
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/6
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0006
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/7
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0007
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/8
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0008
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/9
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0009
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/10
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0010
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/11
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0011
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/12
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0012
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/13
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0013
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/14
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0014
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/15
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0015
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/16
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0016
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/17
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0017
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/18
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0018
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/19
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0019
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/20
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0020
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/21
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0021
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/22
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0022
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/23
switchport access vlan 5
switchport mode access
switchport port-security
switchport port-security violation restrict
switchport port-security mac-address 0200.0000.0023
no cdp enable
spanning-tree portfast
!
interface FastEthernet0/24
switchport mode trunk
no cdp enable
ip dhcp snooping trust
!
interface Vlan1
ip address 192.168.67.6 255.255.255.0
no ip route-cache
!
ip http server
no cdp run
snmp-server community public RO
snmp-server community private RW
snmp-server enable traps port-security
snmp-server enable traps port-security trap-rate 1
snmp-server host 192.168.67.10 version 2c public port-security
!
line con 0
exec-timeout 0 0
line vty 0 4
password labredes
login
line vty 5 15
password labredes
login
!
mac-address-table notification interval 0
mac-address-table notification
mac-address-table aging-time 3600
!
end
# nVidia Corporation MCP67 Ethernet
DEVICE=eth0.2
BOOTPROTO=static
ONBOOT=yes
IPADDR=192.168.2.2
NETMASK=255.255.255.0
VLAN=yes
TYPE=Ethernet
PEERDNS=yes
GATEWAY=192.168.2.10
NETWORK=192.168.2.0
# nVidia Corporation MCP67 Ethernet
DEVICE=eth0.3
BOOTPROTO=static
ONBOOT=yes
IPADDR=192.168.3.2
NETMASK=255.255.255.0
VLAN=yes
TYPE=Ethernet
PEERDNS=yes
GATEWAY=192.168.3.10
NETWORK=192.168.3.0
# nVidia Corporation MCP67 Ethernet
DEVICE=eth0
BOOTPROTO=none
HWADDR=00:1B:24:98:02:29
ONBOOT=yes
TYPE=Ethernet
NETMASK=255.255.255.0
IPADDR=192.168.67.2
GATEWAY=192.168.67.1
USERCTL=no
IPV6INIT=no
PEERDNS=yes
search Runio
search localdomain
nameserver 192.168.67.1
nameserver 200.175.182.139
nameserver 200.175.5.139
Sw1Labredes#show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/24
2 Normal active Fa0/2
3 Registration active Fa0/3
4 Isolation active Fa0/4
5 MAC_Detection active Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
2 enet 100002 1500 - - - - - 0 0
3 enet 100003 1500 - - - - - 0 0
4 enet 100004 1500 - - - - - 0 0
5 enet 100005 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
Remote SPAN VLANs
------------------------------------------------------------------------------
Primary Secondary Type Ports
------- --------- ----------------- ------------------------------------------
DEVICE=eth0
BOOTPROTO=static
BROADCAST=192.168.67.255
IPADDR=192.168.67.10
NETMASK=255.255.255.0
NETWORK=192.168.67.0
ONBOOT=yes
TYPE=Ethernet
GATEWAY=192.168.67.1
DEVICE=eth1
ONBOOT=yes
BOOTPROTO=static
IPADDR=192.168.2.10
NETMASK=255.255.255.0
GATEWAY=192.168.2.10
NETWORK=192.168.2.0
DEVICE=eth2
ONBOOT=yes
BOOTPROTO=static
IPADDR=192.168.3.10
NETMASK=255.255.255.0
GATEWAY=192.168.3.10
NETWORK=192.168.3.0
------------------------------------------------------------------------------
Protect Your Site and Customers from Malware Attacks
Learn about various malware tactics and how to avoid them. Understand
malware threats, the impact they can have on your business, and how you
can protect your company and customers by using code signing.
http://p.sf.net/sfu/oracle-sfdevnl
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users