When using the CLI of cisco devices, there is the "logging syncronous" command that keeps the log messages from interrupting the command prompt. Do Dell PowerConnect switches have a similar command somewhere?
Here is how our network is setup: We have one Sonicwall NSA 3500 that feeds internet to the entire campus. Connected to the Sonicwall is a Dell PowerConnect 5548. Connected to that are the 4 main UAP's (Ubiquiti UniFi access points) for the main building. The controller (software) is connected to the Dell through several unmanaged switches. Other buildings are connected directly to the Sonicwall through 2 Rocket M5's and a NanoBridge.
DHCP is handled by the Sonicwall. There are 2 SSID's Staff and Public
Public is by itself on vlan 205 with 192.168.205.0/24 and a 60 min lease. Staff is not on a vlan and that interface on Sonicwall is shared with computers. The network is 192.168.12.0/24 with a 1440 min lease.
Sonicwall handles all routing with the default settings Also Sonicwall only allows traffic from 205 to go to the WAN, everything else is blocked.
We have had this setup for a couple weeks now, and we have had the Sonicwall and the UAP's for several months without issue. For whatever reason, starting the day before yesterday, certain devices refuse to get an ip address when they connect to either of the wireless networks on any of the UAP's. They instead get a link local address (Which is reported on the controller as their address.)
Each device seems to act consistently, and does not seem tied to brand (Some iPhones have difficulty, some don't etc.): Some won't get on at all. Some will get on if you switch networks several times. Some will get on but occasionally get kicked off then get right back on. Some don't appear to have any issues. (That I have heard about anyway. It is possible all devices are having some kind of issues that just aren't getting noticed/reported.)
We have tried rebooting all equipment, and unplugging everything on the Dell switch except one of the UAP's and the issues continued. Any thoughts?
I have a Dell PowerConnect 5324 (SW version: 2.0.1.3) which I hardly ever use. I need to list out the mac-addresses it sees on certain ports, such as g23. I have fooled around with the cli and done a few google searches, but have not run across the exact command to do this. The switch is only accessible via the serial port & cli.
How can I do this?
We have several Dell 6248 swtich stacks (of 3 each) that form the backbone of our iSCSI Storage network. We need to perform firmware updates on the switch stacks, but are concerned about the downtime required.
By way of information our storage is exclusively Dell/Equallogic PS6000 series enclosures with 3 or 4 GigE uplinks per enclosure.
As you might already know, these switches can't be upgraded a member at a time, and the reboot required to upgrade the switches is on the order of two minutes (i.e. longer than the iSCSI initiator timeout for a volume).
Does anyone have any suggestions for how we might be able to accomplish a iSCSI SAN switch stack upgrade while minimizing downtime?
Thanks for any help or suggestions.
Joe
With a setup of two NICs on a server into two different switches where each NIC has a different IP (But both on the same network), and then the switches to the router. How would I configure the two ports on the router to be redundant so that one port goes to one switch and the other port to the other switch. The router is a Cisco 3825, switches are Dell Power connect 5324s.
The idea being that as long as applications on the server are configured to work with both IPs, any 1 NIC or 1 switch could fail and the service would still be up. I understand the router would still be a single point of failure.
Update:
Little background, I moving my whole datacenter and don't have that much time to plan, so this sort of redundancy might be out of the scope of what I can learn and do with the time I have.
However, I am going to be rewiring everything and maybe purchasing stuff. I almost have enough switches to connect all servers to two different switches, and have a 3800 and a spare 2800 router. If I keep configurations as they are now, but put the second NIC into a redundant switch for each server, and then those second switches into the second router, will I be ready to set up this sort of redundancy as far as physical configuration is concerned? Might this configuration be limiting in my redundancy options, or which route I go will this basically be the physical layout?