NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
ghost974
Aug 16, 2017Aspirant
Static route on S3300
I have a 2 datacenters composed of a Load balancer and a switch. Each location has it own internet connection/ gateway. I have a LANX connection between both location to stack my S3300. Servers on ...
ghost974
Aug 16, 2017Aspirant
Hi Hopchen, thx for the reply. I do understand the solution where my server will have the switch are their gateway for internal routing.
The switch-stack is seen as only 1 equipement, so just 1 default gateway. Do I configure gateway in Route > Routing Table > Configure Route > DefaultRoute ?
How would the switch know that traffic from servers 3.10 will go to 3.1, or 3.20 will go to 3.2 ?
Hopchen
Aug 16, 2017Prodigy
Hi,
I assume you are referring to my suggestion number 2? In that case, I have answered your questions below.
"Do I configure gateway in Route > Routing Table > Configure Route > DefaultRoute"
No need to do any additional routes on the switch-stack essentially. The switch-stack will have two routing duties. Route traffic from the 192.168.3.x network to the 192.168.6.x network and vice versa. You will create VLAN interfaces in each VLAN (3 and 6) to accomplish this. You don't need to make routes to tell the switch-stack where networks 192.168.3.x and 192.168.6.x are. The switch-stack knows already. It has interfaces in those networks :)
"How would the switch-stack know that traffic from servers 3.10 will go to 3.1, or 3.20 will go to 3.2?"
That is not how it would work :). The end solution would work like this:
- If server in VLAN/network 3 or 6 wants to communicate with a server in the other network, then the request is sent to the switch-stack (defined by the static routes you created on those servers). The packet is routed to the other VLAN/network solely by the switch-stack. Your LBs will never see that traffic.
- If a server in VLAN/network 3 or 6 wants to communicate with anything else (Internet, etc.) the request is sent to the server's default gateway, which will be the LBs. The switch-stack is not involved here at all, from a routing point of view.
Let me know if anything is unclear.
Cheers
- ghost974Aug 17, 2017Aspirant
Ok I understand. I have configured VLANs, and an IP in each VLAN. I have no tag configured on my load balancer so I untagged all port.
Only 1 VLAN seems to works, I can't reach it with the other IP.
I'd like to not use the VLAN tagging as it requires changes on the load balancer too.
(vlan6 is now vlan4)
- ghost974Aug 17, 2017Aspirant
I have untaggged all ports for all VLAN, for some reason I lost total connectivity, I cannot ping any switch's IP any more, i'm locked out...
Please advise :(
- HopchenAug 17, 2017Prodigy
Hi,
Note: I can't see your pictures/screenshots yet, so I reply based on your written text.
As you had two subsets, I (as I wrote) assumed that you used VLANs already. It seems you weren't? In that case, what was your setup? I guess you used just default VLAN 1 and had 2 IP networks?
In any case, I wish you had asked before messing with the VLANs as we could have advise you better. The config you describe shows that you aren't used to VLANs and that is fine, but please ask first then. You are running on smart switches so there is no console ports here. If you locked yourself out, there is nothing you can do but reset the stack!
Now, that being said - you won't loose access to a switch just because you untag multiple VLANs on a port. Did you ever change the PVIDs? Did you remove the VLAN 1 association on the ports? If no, then you can access the switch-stack through the VLAN 1 interface (the original IP the switch-stack had), by simply plugging a PC into any port. Ensure your PC has an IP address in the same range as the switch-stack.
As a side note. I understand why you don't want to mess with the LBs so you aren't a fan of the VLANs. However, I don't see a way to do this without the VLANs though - if you want the switch to do some internal routing. But, if you weren't using VLANs in the first place then why have two IP networks? Those networks are on the same layer 2 so there is no effective separation anyway. Why not just run one IP network then and be done with it?
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!