<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring a server on a DMZ with Cisco 3020 Switches in BladeSystem - General</title>
    <link>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410575#M5850</link>
    <description>So if the DMZ VLAN on the HP 2824 switch is 4 then I should make the switchports on the 3020s all part of VLAN 4 and then they should be able to work just fine?  Or does the VLAN chosen on the Cisco side of things not matter?  Thanks again so much!</description>
    <pubDate>Wed, 29 Apr 2009 19:05:10 GMT</pubDate>
    <dc:creator>Brett Sadler</dc:creator>
    <dc:date>2009-04-29T19:05:10Z</dc:date>
    <item>
      <title>Configuring a server on a DMZ with Cisco 3020 Switches</title>
      <link>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410573#M5848</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;We are needing to migrate our BusinessObjects server and Web server, which our in the DMZ on the public side, over to our c7000 enclosure.  We currently have 10 blades in the system with 2 Cisco 3020 switches in IC Bay 1 and IC Bay 2.  6 of the switch ports (Gi0/17-22) on each 3020 are EC Trunked to our backbone HP 2824 switches.  I'm thinking I'm needing a way for Internal switch ports Gi0/6 &amp;amp; Gi0/14 (representing the bays the new servers are going to be put into) to connect/pass-thru to the external Gi0/23 or Gi0/24 ports directly.  This is so I can connect that physical port to our already configured DMZ ports on the HP 2824s.  This is the most simplistic way I can think of to use our DMZ servers in our Blade enclosure.  If I'm completely going in the wrong direction I apologize in advance.  Thanks in advance for any assistance you can provide!&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Apr 2009 18:12:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410573#M5848</guid>
      <dc:creator>Brett Sadler</dc:creator>
      <dc:date>2009-04-29T18:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring a server on a DMZ with Cisco 3020 Switches</title>
      <link>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410574#M5849</link>
      <description>Brett:&lt;BR /&gt;&lt;BR /&gt;what you are describing above is completely possible by creating a separate VLAN on your 3020s for the DMZ traffic.&lt;BR /&gt;&lt;BR /&gt;For a simple config just add the "switchport access vlan x" command to each interface you want in the DMZ (where x is a unique VLAN id).&lt;BR /&gt;&lt;BR /&gt;example:&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt; switchport access vlan 99&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/14&lt;BR /&gt; switchport access vlan 99&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/23&lt;BR /&gt; switchport access vlan 99&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/24&lt;BR /&gt; switchport access vlan 99&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Apr 2009 19:03:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410574#M5849</guid>
      <dc:creator>HEM_2</dc:creator>
      <dc:date>2009-04-29T19:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring a server on a DMZ with Cisco 3020 Switches</title>
      <link>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410575#M5850</link>
      <description>So if the DMZ VLAN on the HP 2824 switch is 4 then I should make the switchports on the 3020s all part of VLAN 4 and then they should be able to work just fine?  Or does the VLAN chosen on the Cisco side of things not matter?  Thanks again so much!</description>
      <pubDate>Wed, 29 Apr 2009 19:05:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410575#M5850</guid>
      <dc:creator>Brett Sadler</dc:creator>
      <dc:date>2009-04-29T19:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring a server on a DMZ with Cisco 3020 Switches</title>
      <link>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410576#M5851</link>
      <description>if the traffic between the 3020 and the 2824 is untagged then the VLAN ID doesn't have to match (because the tag is not carried in the ethernet frames) but if you are tagging the frames then the VLAN ID would need to match.&lt;BR /&gt;&lt;BR /&gt;The sample config I showed above would send untagged frames to the 2824 on gi0/23 or 24.&lt;BR /&gt;&lt;BR /&gt;For ease of administration I would recommend using the same VLAN ID. That way if you migrate to VLAN tagging later, it is easier.</description>
      <pubDate>Wed, 29 Apr 2009 20:42:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410576#M5851</guid>
      <dc:creator>HEM_2</dc:creator>
      <dc:date>2009-04-29T20:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring a server on a DMZ with Cisco 3020 Switches</title>
      <link>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410577#M5852</link>
      <description>So I've configured as you suggested for the below ports.  g0/7 is the Blade I want in our DMZ and g0/24 is the physical port that is connected to our untagged DMZ port on our HP 2824 switch.  VLAN 4 is the VLAN on both sides incase we ever turn on tagging.  I can't get ANY type of access out from the blade.  It seems that the HP is showing the connection from the Cisco, but i'm stumped...&lt;BR /&gt;&lt;BR /&gt;Current configuration : 2722 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug uptime&lt;BR /&gt;service timestamps log uptime&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname al-blsw1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;enable password **********&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;ip subnet-zero&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel5&lt;BR /&gt; switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt; ip address dhcp&lt;BR /&gt; no ip route-cache&lt;BR /&gt; no ip mroute-cache&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt; switchport mode access&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/8&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/9&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/10&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/11&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/12&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/13&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/14&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/15&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/16&lt;BR /&gt; speed 1000&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/17&lt;BR /&gt; description 2428-1(port 17)&lt;BR /&gt; switchport mode trunk&lt;BR /&gt; channel-group 5 mode on&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/18&lt;BR /&gt; description 2428-1(port 18)&lt;BR /&gt; switchport mode trunk&lt;BR /&gt; channel-group 5 mode on&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/19&lt;BR /&gt; description 2428-1(port 15)&lt;BR /&gt; switchport mode trunk&lt;BR /&gt; channel-group 5 mode on&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/20&lt;BR /&gt; description 2428-1(port 16)&lt;BR /&gt; switchport mode trunk&lt;BR /&gt; channel-group 5 mode on&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/21&lt;BR /&gt; description 2428-1(port 1)&lt;BR /&gt; switchport mode trunk&lt;BR /&gt; channel-group 5 mode on&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/22&lt;BR /&gt; description 2428-1(port 6)&lt;BR /&gt; switchport mode trunk&lt;BR /&gt; channel-group 5 mode on&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/23&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/24&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt; switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no ip address&lt;BR /&gt; no ip route-cache&lt;BR /&gt; no ip mroute-cache&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;ip classless&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.96 254&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.96 254&lt;BR /&gt;ip http server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt; exec-timeout 90 0&lt;BR /&gt; password **********&lt;BR /&gt; login&lt;BR /&gt;line vty 5 15&lt;BR /&gt; login&lt;BR /&gt;!&lt;BR /&gt;end</description>
      <pubDate>Wed, 10 Jun 2009 20:12:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410577#M5852</guid>
      <dc:creator>Brett Sadler</dc:creator>
      <dc:date>2009-06-10T20:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring a server on a DMZ with Cisco 3020 Switches</title>
      <link>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410578#M5853</link>
      <description>you have swithport trunk configured on your port channel.  By default Cisco sends all vlans on a trunk.  Therefore it is sending vlan 4 on the port channel as well.&lt;BR /&gt;&lt;BR /&gt;Normally this would still work but I would recommend doing a "show spanning-tree" on the 3020 to see whether port g0/24 is blocking or forwarding.&lt;BR /&gt;&lt;BR /&gt;I would add the command "switchport trunk allowed vlan 1"  (and any other vlans you want on the trunk EXCEPT for VLAN 4) on the port channel interface.</description>
      <pubDate>Wed, 10 Jun 2009 20:46:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/bladesystem-general/configuring-a-server-on-a-dmz-with-cisco-3020-switches/m-p/4410578#M5853</guid>
      <dc:creator>HEM_2</dc:creator>
      <dc:date>2009-06-10T20:46:41Z</dc:date>
    </item>
  </channel>
</rss>

