- Community Home
- >
- Servers and Operating Systems
- >
- HPE BladeSystem
- >
- BladeSystem - General
- >
- Re: Configuring a server on a DMZ with Cisco 3020 ...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-29-2009 11:12 AM
тАО04-29-2009 11:12 AM
We are needing to migrate our BusinessObjects server and Web server, which our in the DMZ on the public side, over to our c7000 enclosure. We currently have 10 blades in the system with 2 Cisco 3020 switches in IC Bay 1 and IC Bay 2. 6 of the switch ports (Gi0/17-22) on each 3020 are EC Trunked to our backbone HP 2824 switches. I'm thinking I'm needing a way for Internal switch ports Gi0/6 & Gi0/14 (representing the bays the new servers are going to be put into) to connect/pass-thru to the external Gi0/23 or Gi0/24 ports directly. This is so I can connect that physical port to our already configured DMZ ports on the HP 2824s. This is the most simplistic way I can think of to use our DMZ servers in our Blade enclosure. If I'm completely going in the wrong direction I apologize in advance. Thanks in advance for any assistance you can provide!
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-29-2009 12:03 PM
тАО04-29-2009 12:03 PM
Solutionwhat you are describing above is completely possible by creating a separate VLAN on your 3020s for the DMZ traffic.
For a simple config just add the "switchport access vlan x" command to each interface you want in the DMZ (where x is a unique VLAN id).
example:
interface GigabitEthernet0/6
switchport access vlan 99
interface GigabitEthernet0/14
switchport access vlan 99
interface GigabitEthernet0/23
switchport access vlan 99
interface GigabitEthernet0/24
switchport access vlan 99
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-29-2009 12:05 PM
тАО04-29-2009 12:05 PM
Re: Configuring a server on a DMZ with Cisco 3020 Switches
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-29-2009 01:42 PM
тАО04-29-2009 01:42 PM
Re: Configuring a server on a DMZ with Cisco 3020 Switches
The sample config I showed above would send untagged frames to the 2824 on gi0/23 or 24.
For ease of administration I would recommend using the same VLAN ID. That way if you migrate to VLAN tagging later, it is easier.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-10-2009 01:12 PM
тАО06-10-2009 01:12 PM
Re: Configuring a server on a DMZ with Cisco 3020 Switches
Current configuration : 2722 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname al-blsw1
!
boot-start-marker
boot-end-marker
!
enable password **********
!
no aaa new-model
system mtu routing 1500
ip subnet-zero
!
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
interface Port-channel5
switchport mode trunk
!
interface FastEthernet0
ip address dhcp
no ip route-cache
no ip mroute-cache
!
interface GigabitEthernet0/1
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/2
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/3
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/4
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/5
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/6
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/7
switchport access vlan 4
switchport mode access
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/8
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/9
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/10
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/11
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/12
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/13
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/14
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/15
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/16
speed 1000
spanning-tree portfast
!
interface GigabitEthernet0/17
description 2428-1(port 17)
switchport mode trunk
channel-group 5 mode on
!
interface GigabitEthernet0/18
description 2428-1(port 18)
switchport mode trunk
channel-group 5 mode on
!
interface GigabitEthernet0/19
description 2428-1(port 15)
switchport mode trunk
channel-group 5 mode on
!
interface GigabitEthernet0/20
description 2428-1(port 16)
switchport mode trunk
channel-group 5 mode on
!
interface GigabitEthernet0/21
description 2428-1(port 1)
switchport mode trunk
channel-group 5 mode on
!
interface GigabitEthernet0/22
description 2428-1(port 6)
switchport mode trunk
channel-group 5 mode on
!
interface GigabitEthernet0/23
!
interface GigabitEthernet0/24
switchport access vlan 4
switchport mode access
!
interface Vlan1
no ip address
no ip route-cache
no ip mroute-cache
shutdown
!
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.1.96 254
ip route 0.0.0.0 0.0.0.0 192.168.1.96 254
ip http server
!
!
control-plane
!
!
line con 0
line vty 0 4
exec-timeout 90 0
password **********
login
line vty 5 15
login
!
end
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-10-2009 01:46 PM
тАО06-10-2009 01:46 PM
Re: Configuring a server on a DMZ with Cisco 3020 Switches
Normally this would still work but I would recommend doing a "show spanning-tree" on the 3020 to see whether port g0/24 is blocking or forwarding.
I would add the command "switchport trunk allowed vlan 1" (and any other vlans you want on the trunk EXCEPT for VLAN 4) on the port channel interface.