Subscribe to my RSS Feed
Join 2,575 other subscribers
My ramblings on the stuff that holds it all together
I have a new switch for my home lab as I was struggling with port count and I managed to get a good deal on eBay for a 24-port version – it’s also fan-less so totally silent which is nice as it lives in my home office.
I am re-building my home lab again (I’m not sure I ever finish a build before I find something new to try, but anyway – I digress) now I have 3 NICs in my hosts I want a dedicated iSCSI network using a VLAN on my switch.
My NAS(es) are physical devices and I want to map one NIC from each ESX host into an isolated VLAN for iSCSI/NFS traffic, this means nominating a physical switch port to just be part of a single VLAN (103) and take it out of the native VLAN (1) – Cisco call this an access port and other switches call it a Port Based VLAN (PVLAN) – this is the desired configuration
The configuration steps weren’t so intuitive on this switch so I have documented it here;
Then go to VLANs—> Participation/Tagging
Now you should have those ports connected directly to VLAN 103 and they will only be able to communicate with each-other – easiest way to test this is to ping between hosts connected on this VLAN.
You can manually check you have done this correctly by looking at VLANs—>VLAN Ports
You won’t be able to get into this VLAN from any other VLAN or the native VLAN (because we excluded VLAN 1 from these ports) if you want to be able to get into this VLAN you’ll need to dual home one of the hosts or add a layer 3 router, I unusually use a Vyatta virtual machine – post on this coming soon.
I’ll also be adding some trunk ports to carry guest network VLANS in a future post.
Pingback: Linked: How to Configure a Port Based VLAN on an HP Procurve 1810G Switch | highball.se
I am still waitin on your writeup on trunking and vyatta applicance configuration. Your setup is exactly like mine.
Hi, i have a HP Procurve just like yours and i’m trying to accomplish a home lab. Problem is i can’t figure out something. I have 3 VLANs LAN, DMZ and MANAGE. I’ve setup the switch with the 3 VLANs and all of them are untagged. All of them have an interface in a router (pfsense). I use openfiler for storage and i have 2 ESXi boxes with 4 interfaces each (LAN, DMZ, MANAGE and iSCSI). I also have a rule to allow all traffic from LAN to MANAGE. My problem is that i have a lot of packet retransmission and can’t control the ESXi from a computer in the LAN. Both of the ESXi behave the same way so it’s not an interface problem. Maybe you can give me a hint or something. I thought maybe i did not set the switch right but i don’t think that’s it. Thanks in advance.