I had it all configured the way I thought it had to be and it was
still not working. 

I was configuring my new Cisco switch with the web
management interface. When I finally connected on the serial port, I
realized I hadn't allowed the VLANs across the trunk ports. It was a
stupid oversight on my part, but as soon as I did that, everything
started working. 

I ultimately decided to leave my Cisco switch running
in L2 mode. Someday, I may decide to configure it to run in L3. 

In the
mean time, I was able to rip out several unnecessary switches and patch
cables now that everything in on a managed switch and using VLANs.


Thanks for the input. 

Tom 

On 04/21/2013 5:17 am, Paul Gear wrote:


> On 04/21/2013 11:26 AM, Tom Jensen wrote:
> 
>> ... I realize this
really isn't Shorewall specific since each VLAN interface would be
entered as a zone and rules configured appropriately. But I would
appreciate some validation with my planned approach. Has anyone done
something similar? Is my thinking with VLANs correct? I don't have much
experience with VLANs yet. Is there documentation using Shorewall in a
similar setup?
> 
> Hi Tom,
> 
> I do something very similar with my
main client at present. In fact, 
> we're working on putting everything
in VLANs (not just internal stuff) 
> and running the server with bonded
interfaces, so that the staff at our 
> remote offices don't have to
care which server NIC is which. They can 
> just plug into any (or all)
of the interfaces and it will work.
> 
> I typically set up something
like this:
> 
> - VLAN 1: management - contains switch, wifi AP, and
sometimes ESXi 
> server management IPs
> 
> - VLAN 10: staff - PCs,
printers, staff laptops via wifi, sometimes file 
> servers
> 
> - VLAN
20: public - PCs, sometimes printers, guest wifi devices
> 
> - VLAN 30:
ADSL modem - PPPoE runs on this interface.
> 
> In the bonded scenario i
described, we would put all of the ethX 
> interfaces into bond0 (in ALB
or TLB mode, so that there's no need for 
> LACP on the switch), then
use the bond0.VLAN interfaces as the shorewall 
> zones (except the
management VLAN, which is just bond0, and ppp0, which 
> will be your
DSL interface for the net zone).
> 
> To do this, you need to make sure
the server NICs are plugged into trunk 
> ports on the Cisco switch.
Switch setup for the above would be 
> something like this:
> 
> vlan
1
> name mgt
> vlan 10
> name staff
> vlan 20
> name public
> vlan 30
>
name adsl
> interface GigabitEthernet1/0/1
> switchport mode trunk
>
switchport trunk native vlan 1
> switchport trunk encapsulation dot1q
>
switchport trunk allowed vlan 10,20,30
> interface
GigabitEthernet1/0/2
> switchport mode trunk
> switchport trunk native
vlan 1
> switchport trunk encapsulation dot1q
> switchport trunk allowed
vlan 10,20,30
> ... (repeat for as many server NICs as you want)
> 
>
Regards,
> Paul
> 
>
------------------------------------------------------------------------------
>
Precog is a next-generation analytics platform capable of advanced
>
analytics on semi-structured data. The platform includes APIs for
building
> apps and a phenomenal toolset for data science. Developers
can use
> our toolset for easy data analysis & visualization. Get a free
account!
> http://www2.precog.com/precogplatform/slashdotnewsletter
[1]
> _______________________________________________
> Shorewall-users
mailing list
> [email protected]
>
https://lists.sourceforge.net/lists/listinfo/shorewall-users [2]

--


Tom Jensen | President
Digital Toolbox
Phone | Direct
651-503-3559
Email | [email protected]



Links:
------
[1]
http://www2.precog.com/precogplatform/slashdotnewsletter
[2]
https://lists.sourceforge.net/lists/listinfo/shorewall-users
------------------------------------------------------------------------------
Get 100% visibility into Java/.NET code with AppDynamics Lite
It's a free troubleshooting tool designed for production
Get down to code-level detail for bottlenecks, with <2% overhead.
Download for free and get started troubleshooting in minutes.
http://p.sf.net/sfu/appdyn_d2d_ap2
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to