# Check the baud rate of the switch
# It is usually 9600 or 115200
sudo screen /dev/ttyS0 115200
# Later to connect to previous screen session
sudo screen -x
enable
copy running-config startup-config
enable
configure
interface managementethernet 1/1
ip address <ip address>/<cidr>
no shutdown
enable
configure
hostname <host_name>
enable
configure
ip ssh server enable
enable
configure
username <username> password 0 <password>
enable
configure
enable password 0 <password>
enable
configure
interface gigabitethernet 1/<port number>
switchport
no shutdown
interface range gigabitethernet 1/<start-port>-1/<end-port>
# Example:
interface range tengigabitethernet 1/3/1-1/3/4
There are a few rules:
PLAN (Private VLAN) VLANs are used to isolate users in different subnets usually. However, PVLAN is used to isolate users in the same subnet. ISPs uses PVLAN to prevent their users reach to each other.
# ---- [Listing VLANs]
enable
show vlan
# ---- [Creating VLANs]
enable
configure
interface vlan <new VLAN ID>
# ---- [Adding ports to VLAN]
enable
configure
interface vlan <VLAN ID>
untagged gigabitethernet 1/<port number>
untagged gigabitethernet 1/45-1/48
no untagged gigabitethernet 1/<port number>
# Then add to a vlan either tagged ot untagged
I was at the data center recently, trying to establish a connection to the
network A.B.C.D/X
through Switch A
. This network is accessible only through tagged VLAN 2500
.
The Setup:
Port 1
on Switch A needs to be a trunk port, allowing it to carry multiple tagged VLANs: 2100
and 2500
.
This trunk port can send and receive traffic from both VLANs while maintaining their tags.Port 2
is an access port that should be untagged for VLAN 2500
. This means it will handle traffic without tags, adding the VLAN 2500
tag to outgoing traffic and removing it from incoming traffic.Port 3
is an access port that belongs to VLAN 2100
. Traffic from devices connected to this port is untagged when it enters Switch A
.Traffic Flow:
Port 3
(VLAN 2100
): Traffic from a device connected to port 3
enters Switch A
as untagged.
Since port 3
is associated with VLAN 2100
. When this traffic needs to access network A.B.C.D/X
,
Switch A
sends it out through port 1
as both are member of same VLAN 2500
.
Port 1
re-tags the traffic with VLAN 2500
before sending it to the network A.B.C.D/X
.
Port 2 is set as an untagged member of VLAN 2500
, Switch A processes this traffic as part of VLAN 2500
.
When it exits through port 1
, it is tagged with VLAN 2500
and sent to Switch B
, destined for the network A.B.C.D/X
.
# port 1
enable
configure
interface TenGigabitEthernet 1/1
switchport
switchport mode private-vlan trunk
# port 2, 3
enable
configure
switchport
# vlan 2100
enable
conf
interface vlan 2100
untagged TenGigabitEthernet 1/3
tagged TenGigabitEthernet 1/1
# vlan 2500
enable
conf
interface vlan 2500
tagged TenGigabitEthernet 1/1
untagged TenGigabitEthernet 1/2
show mac-address-table
show interfaces status
show interfaces configured
show interfaces switchport
show running-config
# For an Interface:
interface twentyFiveGigE 1/3/1
show config
show system stack-unit 1 fanout configured
stack-unit <stack number> port <port number> portmode <mode> speed <speed>
# Example with no:
no stack-unit 1 port 3 portmode quad
#<stack number>: 1-6
#<port number>: 1/2
#<mode>: {dual, quad, single}
#<speed>: {100G, 40G, 10G}
# Example:
stack-unit 1 port 1/2 portmode single speed 40G
Example:
Set an interface to default settings:
default interface twentyFiveGigE 1/3/3
Dell(conf)#openflow of-instance 1
Dell(conf-of-instance-1)#controller 1 10.11.54.60 tcp sndbuf 32000
Dell#show openflow of-instance 1
Instance : 1
<snipped>
Controller 1 : TCP, 10.11.54.60/6633, rcv/sndbuf 2000/32000, not-connected
Controller 2 : -
openflow of-instance 1
controller 1 192.168.10.10 tcp
of-version 1.0
dpid-mac-addr 00:00:00:01:00:52
no shutdown
cam-acl default
cam-acl-vlan default
That’s it!