I need a basic L3 switch for maybe 25 mbps that will do hopefully up to 50 VLANs and which will not require me to hire someone to configure it.
As much as I like Cisco, that rules them out.
The reason I'd like a Layer 3 switch is so that I can run my backups and inter-server transfers without adding to my bandwidth bill. Also, VLANS are a critical requirement as i have a lot of customers with root on their managed servers.
So i am looking at HP [gasp] switches. How "easy" is the web-based configuration widget? [I'm an advanced unix admin but networking is a mystery to me.]
This is a starter switch and once i have a full cab of servers I'll be able to spend $7K on a pair of 3560s and hire someone to configure them for me ... but until then what can i get to meet my requirements?
I'm not sure exactly how to phrase the question. But, I'm researching how to PXE boot a server without having a DHCP/PXE server in each vlan.
Scenario: Datacenter with dozens of servers. 1 VLAN per server. Cisco switches and routers. Each server has a serial console available for remote management (OS and BIOS are configured for serial console). If an admin wants to re-install OS, they should be able to reboot the server and tell the BIOS to initiate a PXE boot request. A central install server is available to provide the DHCP and PXE boot images.
Has anyone tried this? I have been reading about the 'ip helper-address' for Cisco to relay DHCP requests. Interested in hearing about real-world setups. Or is there a better way to accomplish remote OS installs?
I'm looking for a solution that I can place a firewall between 2 vlans on a BigIron router with L3 enabled.
For this moment there is one big vlan2 with a ip-route 0.0.0.0 0.0.0.0 18.104.22.168 and a router-interface ve2 with the IP of the router, the address I use as gateway on the machines behind it.
The WAN port has the IP address to communicate with to the GW of the carrier-router (22.214.171.124)
Because I want to let the BigIron the routing I was thinking of 2 vlans, one for the lan-vlan and one for the wan-vlan, but this will be a problem because I only have one IP-block what I can use.
So the sitiuation must be as follow on the BigIron:
WAN => vlan2 => firewall => vlan3(lan)
Because of the fact that the firewall will be transparent, this should be no problem to place it between the vlans. The actual problem is how to manage this. In simple words, I should be able to replace the firewall with a cross-cable and it should still work.
Cisco for an example has a SVI solution for this, but I can't find such thing for a Foundry router.
Having a slight problem working with one of our Extreme Summit 48 (ugh) switches - I've figured out most of the basics, but I can't seem to find any way to add a secondary IP address to a VLAN! This, I would have thought, would be a pretty basic feature to have. Typing "config vlan [vlanname] ipaddress 126.96.36.199/24" works for setting the primary IP, but I can't figure out how to add any more - and doing the command again just overwrites the first one.
So... does anyone have any tricks up their sleeve, or is this something that Extreme neglected to add to this model switch?
I've read that all ethernet switches in a MST Region need the same Name, Revision number, and list of member vlans for each Instance. So what happens when you need to change the range of VLANs in a MSTI ? Let's say that you need to add a range of vlans to an instance that spans 20 switches? How would you do that?
Can you make a recommendation for a switch-based L3 router which can
- hold a moderate number of routes (interface routes, a few hundred statics + default) - OSPF and BGP - MST - 1024 layer-3 dot1q subinterfaces (or maybe VLAN interfaces) with + traffic policing in and out per subinterface/vlan + VRRP/HSRP/NSRP - IPv4 & IPv6 native - 2x GigE ports - Not tip-over under 1gbps DDoS towards a VLAN interface.
I've been using 3560Gs, but they seem to lack the output traffic policing. I'd prefer to have subinterfaces which don't run spanning-tree, versus Vlan Interfaces to a trunk interface which runs spanning-tree. These switches sit at the L3 boundary between two L2 networks.
Cost is a big factor; but I also must carry vendor licenses & support contract, if the vendor asserts that not doing so is illegal in US.
We are co-located at a datacenter and host web sites, and corporate email systems, as well as host dedicated servers for customers.
We currently have two /25 internet facing subnets from our provider. We have a Watchguard X5500e 8 port gigabit firewall that supports routing as well as VLANs. We also currently own QTY4 2848 HP Gigabit switches.
We currently have each switch connected in a loop with 2 gigabit ports trunked using static LCAP. The switches are connected as follows: A > B B > C C > D D > A
Rapid STP is turned on. One thing is - is this the ideal trunking scheme?
The more important question is this. We would like to separate ips from each other using VLANing.
IE: we might have a client with 5 different IPs in one or more subnets and we would like to group them together.
We ideally do not want to break up the subnets into smaller ones as it makes it hard to reconfigure and it wastes ip addresses, as we do not have that many.
I currently have a dedicated server, which is hosting several websites. I'm happy with the service I'm getting, but I'm trying to save money. I'm paying $120/month for the dedicated server. Spending half of that each month would be great.
Right now, the websites are either static websites, or are simple database driven websites with not much traffic. My server load averages are pretty close to 0.01 I would think a VPS would be fine for my needs. However, I may have a site I will host in the future that is database driven and uses Ruby on Rails. It would probably have 10-20 users online at any given time, and maybe several hundred subscribers total.
Would a VPS still work in this instance, or should I stick with a dedicated machine?
This week connectswitch's service has not been that good. Basically first they restart the node without prior notice and our vps was down for 7 hours. and now we buy our cPanel license via them and they havent paid it so the license is now expired although we have paid them for it.
I am looking at picking up a switch to mess around with at home. I found the following within driving distance but have no idea of which one will give me more up to date, hands on experience. Any feedback is greatly appreciated.
Used Cisco WS-C5509 Chassis with power supply ( POWER SUPPLY 34-0870-01), and fan (WSC5509FAN) Cisco WS-X5530-E2 Supervisor Engine III Modules Cisco Systems WS-U5537-FETX CISCO 4 PORT 100BASETX UPLINK MODULE Cisco WS-X5234-RJ45 Switch Modules X 8
Cisco WS-C5500 Chassis POWER SUPPLY 34-0773-03 Cisco Ws-x5550 Supervisor Engine Iii G-series WS-X5234-RJ45 X 11
Cisco WS-C5505 Chassis Cisco WS-X5530-E2 Supervisor Engine III Modules Cisco WS-U5533-FEFX-MMF Supervisor Engine III Uplink Modules Cisco WS-X5225R Switch Modules X 2
We have a small hosting company (currently 24 racks) that we are expanding to hold 100 racks. We have several 3640 series routers behind a 7200 series router (our edge router) that feed into numerous 2950 switches and 515 & 525 pix firewalls then into the racks with customer supplied switches within the rack. I want to replace all the 3640 and 2950 switches with a 6500 series switch. The only routing we do within the 3640's is subnet routing to the switches which make up individual networks for each customer. My goal is to use the 6500 switch to limit bandwidth for each port feeding a customer and to eliminate all but the 7200 router and the 2950 switches. Does anyone know of a reason or reasons this would not work or if it's just a bad idea. Looking for pro's and con's,
I just bought 2 Gbit dedicated bandwidth for me, and my customers. This is the switch the DC gave me. I know it is a 24 port switch, that can handle up to 4 Gbit of bandwidth. And that you can give each port its own dedicated bandwidth.
But this is my question. Off this switch can I give metered bandwidth? Like 2000 GB Bandwidth?
Also how would I offer unmeterd bandwidth? Like hook up a cheap Linksys up to it and limit the bandwidth to the port that the Linksys is in?