VMWare/Zeroshell and HP VLANs

Home Page Forums Network Management Networking VMWare/Zeroshell and HP VLANs

This topic contains 9 replies, has 0 voices, and was last updated by  newsboy9 8 years, 2 months ago.

Viewing 11 posts - 1 through 11 (of 11 total)
  • Author
    Posts
  • #42718

    newsboy9
    Member

    Ok so I have the Zeroshell configured on my VMWare box. I want it to be my VLAN router. I’ve never actually implemented VLAN’s before much less on a VMWare box. So here’s my setup.

    Zeroshell ETH00 no VLAN – IP address 172.16.0.210 (This is where I manage the box)
    Zeroshell ETH01 assigned to VLAN 2 – IP Address 172.16.12.100
    VMWare vmnic1 on vSwitch1 with VLAN2 Port Group configured. (The ZeroShell shows up in VLAN2 in the VMWare network diagram).
    On my HP Switch I have port 12 going to vmnic1 configured for tagging VLAN2.
    On that same switch I have Port 19 configured for Untagged VLAN2 and have a laptop connected to that port – IP address 172.16.12.201

    First issue. I cannot ping from or to the zeroshell and the laptop.

    Second, once I can connect via VLAN2 two I’ll configure my additional VLANs and then I’ll need help routing between them.

    Can anyone help me?

    Thanks

    #51304

    ppalias
    Member

    Is the vmnic1 aware of vlan tagging?

    #51305

    newsboy9
    Member

    It should be it’s a Broadcom NetXtreme II BCM5708 which is capable of being VLAN aware, is there somewhere I can check to see if it’s enabled in VMWare? Thanks for the reply.

    #51306

    ppalias
    Member

    Depends on the operating system of the VM server. Windows usually don’t recognize VLAN tagging by default.

    #51307

    newsboy9
    Member

    It’s ESXi 4

    #51308

    alexandrea
    Member

    Depends on the operating system of the VM server. Windows usually don’t recognize VLAN tagging by default

    #51309

    ppalias
    Member

    As far as I know this is red hat linux based, correct? Try to add the vlan on the interface with the command

    vconfig
    Usage: add [interface-name] [vlan_id]
    rem [vlan-name]
    set_flag [interface-name] [flag-num] [0 | 1]
    set_egress_map [vlan-name] [skb_priority] [vlan_qos]
    set_ingress_map [vlan-name] [skb_priority] [vlan_qos]
    set_name_type [name-type]

    * The [interface-name] is the name of the ethernet card that hosts
    the VLAN you are talking about.
    * The vlan_id is the identifier (0-4095) of the VLAN you are operating on.
    * skb_priority is the priority in the socket buffer (sk_buff).
    * vlan_qos is the 3 bit priority in the VLAN header
    * name-type: VLAN_PLUS_VID (vlan0005), VLAN_PLUS_VID_NO_PAD (vlan5),
    DEV_PLUS_VID (eth0.0005), DEV_PLUS_VID_NO_PAD (eth0.5)
    * bind-type: PER_DEVICE # Allows vlan 5 on eth0 and eth1 to be unique.
    PER_KERNEL # Forces vlan 5 to be unique across all devices.
    * FLAGS: 1 REORDER_HDR When this is set, the VLAN device will move the
    ethernet header around to make it look exactly like a real
    ethernet device. This may help programs such as DHCPd which
    read the raw ethernet packet and make assumptions about the
    location of bytes. If you don't need it, don't turn it on, because
    there will be at least a small performance degradation. Default
    is OFF.
    #51310

    newsboy9
    Member

    I haven’t used the command line yet, but I’m willing to try. What’s the command that would show me what is already configured on that interface so I can tell if any of it has been done already via the GUI.

    Thanks again for your help.

    #51311

    ppalias
    Member

    The

    ifconfig -a

    can show you the available interfaces, so if you see any of them marked like

    ethXX.YY

    it most likely is a vlan subinterface.

    #51312

    newsboy9
    Member

    Ok so it turns out that it wasn’t VMWare at all. I setup another host on my vmware box and assigned it to the VLAN 2 and I can communicate with it so my VLAN’s are working. However I still cannot ping the zeroshell on VLAN2. Sorry it took a while to respond, I got swamped with other stuff.

    #51313

    pazzer
    Member

    guys..

    I know it’s a late post but I think it’s beneficial to put this straight for anyone else reading this..

    “As far as I know this is red hat linux based, correct?”
    — No. ESX (early 2.X and 3.X versions) were somewhat based on RHEL, and used a number of RHEL components in addition to the proprietary VMware ‘vmkernel’ – but things have changed, and ESX 4 and above (especially 4.1 and above) do NOT include RHEL components. In fact, the existing ‘Service Console’ – taken from RHEL – has now been replaced with busybox in 4.1.

    With regards to dropping into the ESX shell to ‘tinker’ – be very careful. You’ll void support warranties with most companies by doing this, because ESX is an ‘appliance’ more than it is an OS. Don’t install 3rd party tools unless you’re really linux-savvy, and know how to get yourself back out. I’m not even confident that the build tools are even on the newer releases, so you’ve probably a severe lack of compilers etc..

    ESX 4 does bring many options for 3rd party plugins (Storage, Networking, Systems Mgmt etc) but these typically run in CIM memory space.

    If you are to type any CLI commands (via local terminal, remote SSH, or VMware Remote CLI) then they should be VMware commands;
    esxcfg-vswitch -l
    esxcfg-nics -l
    some other commands (tcpdump for example) are there – but aren’t always the standard binaries.

    Some notes on VLANS and ‘NICs’ – which are actually ‘uplinks’ in ESX;

    – vSwitches themselves don’t have any properties for VLANs. They carry anything.

    – VM Port Groups allow you to specify a VLAN – so any traffic from VM hosts will come into the Port Group, and will be tagged (802.1Q) as they hit the vSwitch data plane.

    – If VM hosts specify VLAN at the NIC driver stage (possible) then the tagged packets will come down through the port group and onto the vSwitch, then onto Uplink adapters to physical switch(es) – I think that the PortGroup will need VLAN 4095 specifying for this to work (4095 is catch-all, all VLANs allowed)

    – Physical switch ports should be configured as trunks, able to carry multiple VLANs. You can use an access port (eg: VLAN2) but that will tag everything coming in as VLAN2, which isn’t always what you want.

    – Physical NICs on an ESX host don’t have an IP, they are simply a copper pass-through to the physical connections outside the ESX server

    – If any changes are to be made to a NIC, it’s usually knocking off features like TSO etc, which is a CLI job. In general, no tweaking is required – you just need to design the aggregation / failover policies depending upon… well… more than I care to detail right here 😛

Viewing 11 posts - 1 through 11 (of 11 total)

You must be logged in to reply to this topic.