HPE GreenLake Administration
- Community Home
- >
- Networking
- >
- Legacy
- >
- Switches, Hubs, Modems
- >
- Setting up Layer 3 VLAN routing
Switches, Hubs, and Modems
1826471
Members
3155
Online
109692
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-02-2008 07:42 PM
07-02-2008 07:42 PM
Setting up Layer 3 VLAN routing
We have three physically separated locations. We just connected them via an AT&T CSME or Opt-E-Man. It’s fiber, but what AT&T provides is a port on an AT&T owned HP Switch in the MPOE. We then plug our switches into the AT&T switch.
We have several VLANS on each switch: Default, 100, 103, 108, 111, 120
We’ve made the connection between sites by connecting ports tagged for all VLANS on our switches to the AT&T switches. The issue is AT&T. They limit the number of MAC addresses on each of the Opt-E-Man ports.
To prevent AT&T from seeing all the MACs on each side of the Opt-E-Man we need to set the switches to route all the VLANS on layer 3. Then all AT&T sees are the MACs of the three connected switch ports.
This is new territory for us, but probably very simple to others. Can anyone provide an example of how this is set up? We have HP Procurve 2650’s at the two remote sites and an HP Procurve 5304xl at the main location. The default gateway for all the VLANS is on a SonicWall NSA E-6500 at the main site. Each VLAN has a physical port on the SonicWall. VLAN 108 is passing VOIP traffic.
It’s working, however we have too many MAC addresses for AT&T – they can solve the issue, it just cost 5 bucks a month for each additional MAC.
Thanks,
K Conde
Sutter County Schools
We have several VLANS on each switch: Default, 100, 103, 108, 111, 120
We’ve made the connection between sites by connecting ports tagged for all VLANS on our switches to the AT&T switches. The issue is AT&T. They limit the number of MAC addresses on each of the Opt-E-Man ports.
To prevent AT&T from seeing all the MACs on each side of the Opt-E-Man we need to set the switches to route all the VLANS on layer 3. Then all AT&T sees are the MACs of the three connected switch ports.
This is new territory for us, but probably very simple to others. Can anyone provide an example of how this is set up? We have HP Procurve 2650’s at the two remote sites and an HP Procurve 5304xl at the main location. The default gateway for all the VLANS is on a SonicWall NSA E-6500 at the main site. Each VLAN has a physical port on the SonicWall. VLAN 108 is passing VOIP traffic.
It’s working, however we have too many MAC addresses for AT&T – they can solve the issue, it just cost 5 bucks a month for each additional MAC.
Thanks,
K Conde
Sutter County Schools
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-04-2008 01:37 AM
07-04-2008 01:37 AM
Re: Setting up Layer 3 VLAN routing
Hi, Kevin !
First you should choose a device to be a router.
To allow ip routing at the chosen device you need to enable it :
#config
#no default-gateway
#ip routing
Then to enable static ip routing between VLANs you need to set up ip interfaces for those VLANs :
#vlan 777
#ip address 1.2.3.4/24
#vlan 999
#ip address 5.6.7.8/24
...
You may need to add a default route:
#ip routing 0.0.0.0 .....
Do not forget to add a default gateway on devices connected to your network pointing to ip address of the appropriate vlan.
Good luck,
Dmitry
First you should choose a device to be a router.
To allow ip routing at the chosen device you need to enable it :
#config
#no default-gateway
#ip routing
Then to enable static ip routing between VLANs you need to set up ip interfaces for those VLANs :
#vlan 777
#ip address 1.2.3.4/24
#vlan 999
#ip address 5.6.7.8/24
...
You may need to add a default route:
#ip routing 0.0.0.0 .....
Do not forget to add a default gateway on devices connected to your network pointing to ip address of the appropriate vlan.
Good luck,
Dmitry
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-09-2008 10:23 AM
07-09-2008 10:23 AM
Re: Setting up Layer 3 VLAN routing
It's a bit complicated but I give it a try.
I assume the sonicwall to be at the main location as the 5304xl is.
Configure the 5304xl to use 'ip routing' and configure the default gw IP's (which currently are configured on the sonicwall) on each vlan on this core switch. You will lose connection to the sonicwall but I will get back to that later.
Then, you will have to define for both remote sites (not being the main site) new IP-block's for EACH vlan including of course new default gw's for these vlan's. Configure these default gw addresses on the vlan's on the 2650's (after also configuring 'ip routing' on them).
Then, define a new vlan and call it 'routing vlan'. Configure this vlan on all switches on the port connected to AT&T and to the sonicwall. Give the switches and the sonicwall new IP-addresses all in the same IP-block.
At last, configure static routes on all swithces and the sonicwall to each other using the 'routing vlan ip address' as destination. Or use RIP if all systems support it.
On both remote sites you will have to renumber all hosts,.. but if you use DHCP just configure 'ip helper-address' on each vlan towards your DHCP server and allow the DHCP server to serve the IP-addresses.
As I already noticed,.. not an easy task but it could be done.
Hint: when you use link-keepalive on each AT&T port, the port will shut down when AT&T mis configures their network. This is very useful if you can afford another E-MAN from another company as backup.
I assume the sonicwall to be at the main location as the 5304xl is.
Configure the 5304xl to use 'ip routing' and configure the default gw IP's (which currently are configured on the sonicwall) on each vlan on this core switch. You will lose connection to the sonicwall but I will get back to that later.
Then, you will have to define for both remote sites (not being the main site) new IP-block's for EACH vlan including of course new default gw's for these vlan's. Configure these default gw addresses on the vlan's on the 2650's (after also configuring 'ip routing' on them).
Then, define a new vlan and call it 'routing vlan'. Configure this vlan on all switches on the port connected to AT&T and to the sonicwall. Give the switches and the sonicwall new IP-addresses all in the same IP-block.
At last, configure static routes on all swithces and the sonicwall to each other using the 'routing vlan ip address' as destination. Or use RIP if all systems support it.
On both remote sites you will have to renumber all hosts,.. but if you use DHCP just configure 'ip helper-address' on each vlan towards your DHCP server and allow the DHCP server to serve the IP-addresses.
As I already noticed,.. not an easy task but it could be done.
Hint: when you use link-keepalive on each AT&T port, the port will shut down when AT&T mis configures their network. This is very useful if you can afford another E-MAN from another company as backup.
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Support
Events and news
Customer resources
© Copyright 2025 Hewlett Packard Enterprise Development LP