never seen that before, looks like weird firmware. does it fully boot into the OS? if it does paste the output of "show version" then try and follow the update guide to get the latest on it
SW: Version 08.0.30dT211
[MEMBER]local-4@ICX7450-48P Switch#sh flash
Stack unit 4:
Compressed Pri Code size = 22642415, Version:08.0.40aT211 (SPS08040a.bin)
Compressed Sec Code size = 28680388, Version:08.0.30dT211 (SPS08030d.bin)
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215
Code Flash Free Space = 1777840128
Would you be willing to describe/write a guide on how you did it?I've dealt with exactly your issues a few tries now. I finally bit the bullet, set up a VM running BIND/named + ISC dhcpd and it's working so much more streamlined than pfSense - it just takes a few more keystrokes to configure - and watch out for typos.
I have never used the Unifi stuff outside of the Unifi controller software and a single WAP. I'm not sure what the L3 performance of the UDM Pro is but I suspect it is less than that of the ICX6450. I am going to blanket recommend using the ICX6450 as your L3 VLAN router and send any other traffic to the UDM Pro for internet access. You know your network needs more than me, though.
I finally am getting my network cleaned up after doing some research and trial+error. LLDP, FDP, OSPF, Loopback interfaces for management, a proper (non-pfSense) DNS+DHCP server (soon to be 2 for redundancy), a /30 trunk to my OPNSense WAN firewall for NAT duty and native IPv6 filtering with /64 subnetting, and a Lancache server running custom domains for the many installs of Void and Ubuntu Linux I have o the network - oh and Steam, XBox, and Windows updates - it's very fun downloading OS packages or games up to almost 10Gbps from a local cache.
correct, two are breakout only and cannot be connected to a 40gbE NIC at 40gbEGot my eye on a 6610-48p to replace my 6450-48p.
Just to confirm, I can use 2x 40 in the back for my server connections and the other 2 qsfp ports are just 4x 10g breakouts.? Or can I also connect those to a Mellanox X3 card on my 3rd server?
Yes, you seem to be a little confused. In your first example where you have ports 1/1/1, and 1/1/12 assigned to a untagged VLAN 10, with the switch running in layer 3, the IP assignment isn't really creating a new VLAN, but defining some of the address space being used on VLAN 10 (so that inter VLAN routing can be configured). Without defining the address space (and without definine unique address space for each VLAN) the switch will not be able to perform inter-vlan routing as it won't know that you want to talk to 192.168.1.10 on VLAN 1 or VLAN 10 if they share the same address space.I'm still somewhat confused with this. In theory I do understand how VLAN works and what are tagged and untagged ports, but the entire L3 eludes me. Can someone ELI5 those to me? For example subnet VLANs. So let's say there's vlan 10 by port, and it has 1/1/1 to 1/1/12 assigned to it untagged. There was `ip-subnet 192.168.0.0/24` added to it, and according to manual this creates another vlan inside that by-port one. Do I understand right that it has no ID? What happens to traffic that comes from 192.168.1.1? And now I cannot stick router interface into it because there's ip-subnet? ...and why does even require having a static port, since router-interface is virtual anyway?
Another example, let's say I have 3 VLANS (id 10 and 20 and 30), and tagged 1/1/1 belongs to 10 and 20. There's Access point plugged to it, and management/configuration is untagged, while traffic from the WiFi is tagged. I want to forward untagged traffic to vlan 30. Do I do just `dual mode 30` on this port and it'll work? Or do I have to put that port in vlan 30 as untagged? Or as tagged even though I don't want tagged traffic in vlan 30 from this port and don't expect any?
hostname ks-icx-01
ip dhcp-client disable
ip dns domain-list mgmt.rgn
ip dns domain-list app.rgn
ip dns domain-list iot.rgn
ip dns domain-list cli.rgn
ip dns domain-list nas.rgn
ip dns domain-list pve.rgn
ip dns domain-list voip.rgn
ip dns server-address 10.1.26.5 10.1.26.3
ip route 0.0.0.0/0 10.1.99.2
!
ipv6 dns server-address 2605:aaaa:bbbb:7a99:1c3f:83ff:feef:411d
ipv6 unicast-routing
ipv6 route ::/0 2605:aaaa:bbbb:7a99:1c3f:83ff:feef:411d
interface ve 2
port-name VLAN-VOIP
acl-logging
ip access-group VOIP in
ip address 10.1.2.1 255.255.255.0
ip helper-address 1 10.1.26.3
ip mtu 1500
ip ospf area 0
ipv6 mtu 1500
ipv6 ospf area 0
ipv6 nd router-preference high
!
interface ve 3
port-name VLAN-IOT
acl-logging
ip access-group IOT in
ip address 10.1.3.1 255.255.255.0
ip helper-address 1 10.1.26.3
ip mtu 1500
ip ospf area 0
ipv6 mtu 1500
ipv6 ospf area 0
ipv6 nd router-preference high
!
interface ve 4
port-name VLAN-SAN
ip address 10.1.4.1 255.255.255.0
ip mtu 9000
ip ospf area 0
ipv6 mtu 9000
ipv6 ospf area 0
ipv6 nd router-preference high
!
interface ve 5
port-name VLAN-MGMT
ip address 10.1.1.1 255.255.255.0
ip helper-address 1 10.1.26.3
ip mtu 1500
ip ospf area 0
ipv6 address 2605:aaaa:bbbb:7a01::1/64
ipv6 enable
ipv6 mtu 1500
ipv6 ospf area 0
ipv6 nd router-preference high
!
interface ve 10
port-name VLAN-CLI
ip address 10.1.10.1 255.255.255.0
ip helper-address 1 10.1.26.3
ip mtu 1500
ip ospf area 0
ipv6 address 2605:aaaa:bbbb:7a10::1/64
ipv6 enable
ipv6 mtu 1500
ipv6 ospf area 0
ipv6 nd router-preference high
!
interface ve 26
port-name VLAN-APP
ip address 10.1.26.1 255.255.255.0
ip helper-address 1 10.1.26.3
ip mtu 1500
ip ospf area 0
ipv6 address 2605:aaaa:bbbb:7a26::1/64
ipv6 enable
ipv6 mtu 1500
ipv6 ospf area 0
ipv6 nd router-preference high
!
interface ve 99
port-name VLAN-OPNS
ip address 10.1.99.1 255.255.255.252
ip mtu 1500
ip ospf area 0
ipv6 address 2605:aaaa:bbbb:7a99::1/64
ipv6 enable
ipv6 mtu 1500
ipv6 ospf area 0
ipv6 nd router-preference high
!
interface loopback 1
port-name Management
ip address 10.0.0.1 255.255.255.255
ip ospf area 0
ipv6 address 2605:aaaa:bbbb:7a00::1/128
ipv6 ospf area 0
!
IPv6 address 2605:aaaa:ffff:10:5047:ae63:29ef:d367 / 128
Delegated prefix 2605:a000:d401:7a00::/56
ddns-updates on;
ddns-update-style interim;
update-static-leases on;
authoritative;
key "rndc-key" {
algorithm hmac-sha256;
secret "nope";
};
allow unknown-clients;
use-host-decl-names on;
log-facility local7;
zone mgmt.rgn. {
primary localhost;
key rndc-key;
}
zone cli.rgn. {
primary localhost;
key rndc-key;
}
zone app.rgn. {
primary localhost;
key rndc-key;
}
zone voip.rgn. {
primary localhost;
key rndc-key;
}
zone iot.rgn. {
primary localhost;
key rndc-key;
}
subnet 10.1.1.0 netmask 255.255.255.0 {
range 10.1.1.150 10.1.1.250;
option domain-name-servers 10.1.26.5, 10.1.26.3;
option domain-name "mgmt.rgn";
ddns-domainname "mgmt.rgn";
option domain-search "mgmt.rgn", "app.rgn", "cli.rgn", "san.rgn", "iot.rgn", "voip.rgn", "glust
er.rgnet";
option routers 10.1.1.1;
option broadcast-address 10.1.1.255;
default-lease-time 600;
max-lease-time 7200;
}
subnet 10.1.2.0 netmask 255.255.255.0 {
range 10.1.2.150 10.1.2.250;
option domain-name-servers 10.1.26.5, 10.1.26.3;
option domain-name "voip.rgn";
ddns-domainname "voip.rgn";
option domain-search "mgmt.rgn", "app.rgn", "cli.rgn", "san.rgn", "iot.rgn", "voip.rgn", "glust
er.rgnet";
option routers 10.1.2.1;
option broadcast-address 10.1.2.255;
default-lease-time 600;
max-lease-time 7200;
}
subnet 10.1.3.0 netmask 255.255.255.0 {
range 10.1.3.150 10.1.3.250;
option domain-name-servers 10.1.26.5, 10.1.26.3;
option domain-name "iot.rgn";
ddns-domainname "iot.rgn";
option domain-search "mgmt.rgn", "app.rgn", "cli.rgn", "san.rgn", "iot.rgn", "voip.rgn", "glust
er.rgnet";
option routers 10.1.3.1;
option broadcast-address 10.1.3.255;
default-lease-time 600;
max-lease-time 7200;
}
subnet 10.1.10.0 netmask 255.255.255.0 {
range 10.1.10.150 10.1.10.250;
option domain-name-servers 10.1.26.5, 10.1.26.3;
option domain-name "cli.rgn";
ddns-domainname "cli.rgn";
option domain-search "mgmt.rgn", "app.rgn", "cli.rgn", "san.rgn", "iot.rgn", "voip.rgn", "glust
er.rgnet";
option routers 10.1.10.1;
option broadcast-address 10.1.10.255;
default-lease-time 600;
max-lease-time 7200;
}
subnet 10.1.26.0 netmask 255.255.255.0 {
range 10.1.26.150 10.1.26.250;
option domain-name-servers 10.1.26.5, 10.1.26.3;
option domain-name "app.rgn";
ddns-domainname "app.rgn";
option domain-search "mgmt.rgn", "app.rgn", "cli.rgn", "san.rgn", "iot.rgn", "voip.rgn", "glust
er.rgnet";
option routers 10.1.26.1;
option broadcast-address 10.1.26.255;
default-lease-time 600;
max-lease-time 7200;
}
##
## VLAN 2
###
host pbx01.voip.rgn {
hardware ethernet 36:22:12:27:7e:b0;
fixed-address 10.1.2.5;
ddns-hostname "pbx01";
}
##
### VLAN 3
##
host ks-prnt-01.iot.rgn {
hardware ethernet 74:40:bb:aa:6d:a5;
fixed-address 10.1.3.15;
ddns-hostname "ks-prnt-01";
}
host ks-nvr-01.iot.rgn {
hardware ethernet ec:71:db:d3:12:bf;
fixed-address 10.1.3.20;
ddns-hostname "ks-nvr-01";
}
host ks-cam-01.iot.rgn {
hardware ethernet ec:71:db:ac:87:ec;
fixed-address 10.1.3.21;
ddns-hostname "ks-cam-01";
}
host ks-cam-03.iot.rgn {
hardware ethernet b0:41:1d:25:fd:79;
fixed-address 10.1.3.23;
ddns-hostname "ks-cam-03";
}
host ecobee.iot.rgn {
hardware ethernet 44:61:32:64:f0:05;
fixed-address 10.1.3.50;
ddns-hostname "ecobee";
}
##
## VLAN 5
##
host ks-icx-01 {
hardware ethernet 74:8e:f8:e7:b4:b0;
fixed-address ks-icx-01.mgmt.rgn;
}
host ls-icx-02 {
hardware ethernet 74:8e:f8:82:e8:60;
fixed-address ks-icx-02.mgmt.rgn;
}
host arbiter {
hardware ethernet a2:7d:20:dc:94:01;
fixed-address arbiter.mgmt.rgn;
}
host neutron {
hardware ethernet 00:02:c9:3b:a0:40;
fixed-address neutron.mgmt.rgn;
}
host proton {
hardware ethernet 00:02:c9:3b:61:30;
fixed-address proton.mgmt.rgn;
}
host ks-bmc-sm1u-01 {
hardware ethernet 02:25:90:24:7e:86;
fixed-address ks-bmc-sm1u-01.mgmt.rgn;
}
host ks-bmc-sm2u-01 {
hardware ethernet 02:30:48:ca:e1:b0;
fixed-address ks-bmc-sm2u-01.mgmt.rgn;
}
host ks-bmc-sm2u-02 {
hardware ethernet 02:25:90:18:9a:c0;
fixed-address ks-bmc-sm2u-02.mgmt.rgn;
}
host ks-bmc-r710-01 {
hardware ethernet 84:2b:2b:71:7d:17;
fixed-address ks-bmc-r710-01.mgmt.rgn;
}
host ks-bmc-r710-02 {
hardware ethernet 78:2b:cb:23:85:84;
fixed-address ks-bmc-r710-02.mgmt.rgn;
}
host unifictl {
hardware ethernet 8A:CA:FD:F4:24:25;
fixed-address unifictl.mgmt.rgn;
}
host ks-uap-01 {
hardware ethernet 78:8a:20:86:5d:93;
fixed-address ks-uap-01.mgmt.rgn;
}
host ks-pve-01 {
hardware ethernet f2:6f:9b:2c:8b:73;
fixed-address ks-pve-01.mgmt.rgn;
}
host ks-pve-02 {
hardware ethernet 62:7e:20:4d:1f:82;
fixed-address ks-pve-02.mgmt.rgn;
}
host ks-pve-03 {
hardware ethernet ba:48:7e:02:81:6c;
fixed-address ks-pve-03.mgmt.rgn;
}
##
## VLAN 10
##
host area51.cli.rgn {
hardware ethernet 00:02:c9:1b:fe:10;
fixed-address 10.1.10.10;
ddns-hostname "area51";
}
host zenith.cli.rgn {
hardware ethernet fc:f8:ae:7b:c1:13;
fixed-address 10.1.10.11;
ddns-hostname "zenith";
}
host zenith-eth.cli.rgn {
hardware ethernet bc:ee:7b:17:d8:ec;
fixed-address 10.1.10.12;
ddns-hostname "zenith-eth";
}
host htpc01-eth.cli.rgn {
hardware ethernet 84:39:be:68:42:81;
fixed-address 10.1.10.13;
ddns-hostname "htpc01-eth";
}
#wifi
host htpc01.cli.rgn {
hardware ethernet 10:d0:7a:87:68:e7;
fixed-address 10.1.10.14;
ddns-hostname "htpc01";
}
host htpc02.cli.rgn {
hardware ethernet f8:b1:56:df:17:2e;
fixed-address 10.1.10.15;
ddns-hostname "htpc02";
}
host elana.cli.rgn {
hardware ethernet a8:a1:59:2e:53:a9;
fixed-address 10.1.10.16;
ddns-hostname "elana";
}
host xboxones.cli.rgn {
hardware ethernet b8:31:b5:ef:c4:48;
fixed-address 10.1.10.31;
ddns-hostname "xboxones";
}
host xboxones-wifi.cli.rgn {
hardware ethernet b8:31:b5:ef:c4:4a;
fixed-address 10.1.10.32;
ddns-hostname "xboxones-wifi";
}
host andromeda.cli.rgn {
hardware ethernet c2:fb:42:27:d8:66;
fixed-address 10.1.10.61;
ddns-hostname "andromeda";
}
host galaxys5.cli.rgn {
hardware ethernet fc:c2:de:83:9b:70;
fixed-address 10.1.10.62;
ddns-hostname "galaxys5";
}
host cassiesgalaxy.cli.rgn {
hardware ethernet 24:18:1d:60:89:41;
fixed-address 10.1.10.63;
ddns-hostname "cassiegalaxy";
}
##
## VLAN 26
##
host dhcp01 {
hardware ethernet f2:08:5d:b9:8d:a6;
fixed-address dhcp01.app.rgn;
}
host cache01 {
hardware ethernet 96:47:84:a0:2b:48;
fixed-address cache01.app.rgn;
}
host slb01 {
hardware ethernet 52:44:eb:1a:d1:73;
fixed-address slb01.app.rgn;
}
host slb02 {
hardware ethernet 4a:ff:4a:54:8a:c6;
fixed-address slb02.app.rgn;
}
host slb03 {
hardware ethernet fe:fe:2b:95:5c:27;
fixed-address slb03.app.rgn;
}
host web01 {
hardware ethernet a2:90:4f:c1:2c:e8;
fixed-address web01.app.rgn;
}
host web02 {
hardware ethernet 22:11:ad:8a:7d:73;
fixed-address web02.app.rgn;
}
host web03 {
hardware ethernet 92:01:b6:bb:8a:41;
fixed-address web03.app.rgn;
}
host redis01 {
hardware ethernet ca:80:2d:7f:c8:b4;
fixed-address redi01.app.rgn;
}
host mrdb01 {
hardware ethernet fa:18:03:ab:c2:3a;
fixed-address mrdb01.app.rgn;
}
host sync01 {
hardware ethernet 1a:3d:7c:c7:f3:56;
fixed-address sync01.app.rgn;
}
host mon01 {
hardware ethernet 62:55:04:ac:c1:93;
fixed-address mon01.app.rgn;
}
host torr01 {
hardware ethernet 82:a2:71:74:d4:bf;
fixed-address torr01.app.rgn;
}
options {
directory "/var/named";
pid-file "/var/run/named/named.pid";
auth-nxdomain yes;
datasize default;
statistics-file "/var/cache/bind/stats";
zone-statistics yes;
listen-on-v6 { any; };
allow-recursion {
10.1.0.0/16;
127.0.0.1;
};
forwarders {
1.1.1.1;
1.0.0.1;
9.9.9.9;
};
allow-query {
10.1.0.0/16;
127.0.0.1;
};
allow-query-cache {
10.1.0.0/16;
127.0.0.1;
};
allow-transfer {
10.1.0.0/16;
127.0.0.1;
};
allow-update {
10.1.0.0/16;
127.0.0.1;
};
version none;
hostname none;
server-id none;
};
key "rndc-key" {
algorithm hmac-sha256;
secret "nope";
};
zone "mgmt.rgn" {
type master;
file "mgmt.rgn.zone";
allow-update { key rndc-key; };
};
zone "iot.rgn" {
type master;
file "iot.rgn.zone";
allow-update { key rndc-key; };
};
zone "cli.rgn" {
type master;
file "cli.rgn.zone";
allow-update { key rndc-key; };
};
zone "voip.rgn" {
type master;
file "voip.rgn.zone";
allow-update { key rndc-key; };
};
zone "app.rgn" {
type master;
file "app.rgn.zone";
allow-update { key rndc-key; };
};
zone "localhost" IN {
type master;
file "localhost.zone";
allow-transfer { any; };
};
zone "0.0.127.in-addr.arpa" IN {
type master;
file "127.0.0.zone";
allow-transfer { any; };
};
zone "." IN {
type hint;
file "root.hint";
};
logging {
channel xfer-log {
file "/var/log/named.log";
print-category yes;
print-severity yes;
print-time yes;
severity info;
};
category xfer-in { xfer-log; };
category xfer-out { xfer-log; };
category notify { xfer-log; };
};
lldp run
cdp run
fdp run
show lldp neighbors
show cdp neighbors
show fdp neighbors
SSH@ks-icx-01>show lldp neighbors
Lcl Port Chassis ID Port ID Port Description System Name
1/1/23 842b.2b71.7d0f 842b.2b71.7d0f eno1 ks-pve-01.vmh~
1/1/25 842b.2b71.7d0f 842b.2b71.7d11 eno2 ks-pve-01.vmh~
1/1/35 10.1.2.155 0008.5d1b.472a port 0 Mitel IP Phon~
1/1/37 788a.2086.5d93 788a.2086.5d93 br0 ks-uap-01
1/1/45 10.1.2.156 0008.5d2a.5e60 port 0 Mitel IP Phon~
1/2/2 842b.2b71.7d0f 0002.c91a.faa1 enp6s0d1 ks-pve-01.vmh~
1/2/7 842b.2b71.7d0f 0002.c91a.faa0 enp6s0 ks-pve-01.vmh~
1/3/1 748e.f882.e860 748e.f882.e87c 10GigabitEthernet1/2/4 ks-icx-02
1/3/2 748e.f882.e860 748e.f882.e87b 10GigabitEthernet1/2/3 ks-icx-02
1/3/3 748e.f882.e860 748e.f882.e87a 10GigabitEthernet1/2/2 ks-icx-02
1/3/4 748e.f882.e860 748e.f882.e879 10GigabitEthernet1/2/1 ks-icx-02
Still a bit confused, but it's a bit better than before. Thanks! Now on to read some more...Yes, you seem to be a little confused. In your first example where you have ports 1/1/1, and 1/1/12 assigned to a untagged VLAN 10, with the switch running in layer 3, the IP assignment isn't really creating a new VLAN, but defining some of the address space being used on VLAN 10 (so that inter VLAN routing can be configured). Without defining the address space (and without definine unique address space for each VLAN) the switch will not be able to perform inter-vlan routing as it won't know that you want to talk to 192.168.1.10 on VLAN 1 or VLAN 10 if they share the same address space.
Also, in terms of tagged vs untagged, it simply means that the packet itself already contains a VLAN tag for that packet. If the switch receives a packet that is untagged, it will treat the packet as though it is from the VLAN defined for the untagged vlan for that port which the packet arrived to the switch. It may tag the packet itself at that time before sending it elsewhere).
In your later example of VLAN 30 for untagged management on certain ports, yes, you want to place the ports into dual mode if you want to treat untagged packets as a specific VLAN, but also have tagged packets from other VLANs available on those port, and you need to set the untagged VLAN to 30 in your case.
You did not mention which switch port your firewall/router is connected to nor whether that port is a member of vlan 2.Have a question and wonder if I am screwing things up. Got it all to work as a layer 2 switch but now I am trying to use the icx6450 to do intervlan routing.
vlan 1 name DEFAULT-VLAN by port
router-interface ve 1
!
vlan 2 name Transit by port
tagged ethe 1/2/1
router-interface ve 2
!
vlan 20 name Cameras by port
tagged ethe 1/2/1
untagged ethe 1/1/1
router-interface ve 20
!
vlan 30 name IoT by port
tagged ethe 1/2/1
untagged ethe 1/1/24
router-interface ve 30
!
vlan 40 name TestVlan40Network by port
tagged ethe 1/2/1
untagged ethe 1/1/25
router-interface ve 40
!
!
!
!
!
aaa authentication web-server default local
aaa authentication enable default local
aaa authentication login default local
enable aaa console
hostname honstnamehere
ip dhcp-client disable
ip route 0.0.0.0/0 192.168.1.1
!
no telnet server
username root password .....
!
!
!
!
!
interface ethernet 1/2/1
dual-mode 2
!
interface ve 1
!
interface ve 2
ip address 192.168.1.2 255.255.255.0
!
interface ve 20
ip address 10.0.20.2 255.255.255.0
ip helper-address 1 192.168.1.1
!
interface ve 30
ip address 10.0.30.2 255.255.255.0
ip helper-address 1 192.168.1.1
!
interface ve 40
ip address 10.0.40.2 255.255.255.0
ip helper-address 1 192.168.1.1
!
!
!
!
!
!
!
!
!
end
vlan 40 name TestVlan40Network by port
untagged ethe 1/1/25
router-interface ve 40
interface ve 40
ip address 10.0.40.2 255.255.255.0
ip helper-address 1 10.0.40.1