×
INTELLIGENT WORK FORUMS
FOR COMPUTER PROFESSIONALS

Contact US

Log In

Come Join Us!

Are you a
Computer / IT professional?
Join Tek-Tips Forums!
  • Talk With Other Members
  • Be Notified Of Responses
    To Your Posts
  • Keyword Search
  • One-Click Access To Your
    Favorite Forums
  • Automated Signatures
    On Your Posts
  • Best Of All, It's Free!

*Tek-Tips's functionality depends on members receiving e-mail. By joining you are opting in to receive e-mail.

Posting Guidelines

Promoting, selling, recruiting, coursework and thesis posting is forbidden.

Students Click Here

Cisco Blade Switch and HP Blade server

Cisco Blade Switch and HP Blade server

Cisco Blade Switch and HP Blade server

(OP)
Dear All,
We have ESXi 4.0 an HP c3000 blade chassis with 4 half height blades installed in slot 1, 2, 5 and 6.

The blade chassis has a Cisco 3120 Blade switch with 4 10GB connection to a Cisco 4506E core switch and we would like to use the 4 copper ports on the Cisco 3120 blade switch to connect the VMs on the ESX to a Catalyst 3750 into a DMZ network.

My question is how do we make the copper ports on the Cisco Blade switch to be visible to the ESX blade servers (HP 460s)

In the ESX hosts only 4 ports are visible to each ESX servers.


I have searched the Cisco blade switch in the Blade chassis Onboard admin but nothing to map these ports.

Any links or how to will be very much appreciated.

Thanks you

RE: Cisco Blade Switch and HP Blade server

The switch module on the back of the c3000 is just like a switch in the rack.  You connect the server port to a switch and it doesn't care about the other ports on the switch.  In the c3000, the link between the 460 and the switch is hard wired and established when you insert the blade into the enclosure.  ESX is probably only seeing the ports on the 4 blades connecting to the blade module.

You need to access the switch directly for specific configuration items (ie, vlans, trunking, UFD, port grouping).  I have a c7000 with 16 blades and here is how i have mine setup.

The internal ports (1-16) are individually tagged with vlans.
Tagging on the external ports is enabled (ports on the back of the bladecenter switch)
The vlans are defined on the switch and for each vlan and include the internal ports and external ports if traffic from the inside passes to the rest of the network
Two of the external ports are used as uplinks to the network and configured as trunks on the network switch side
Since I have redundant switches and uplinks I also have enabled uplink failure detection (UFD) configured to disable the inside switch ports if the uplinks go down so the servers don't continue to try and pass traffic to a switch that has no communication to the network.
 

Red Flag This Post

Please let us know here why this post is inappropriate. Reasons such as off-topic, duplicates, flames, illegal, vulgar, or students posting their homework.

Red Flag Submitted

Thank you for helping keep Tek-Tips Forums free from inappropriate posts.
The Tek-Tips staff will check this out and take appropriate action.

Reply To This Thread

Posting in the Tek-Tips forums is a member-only feature.

Click Here to join Tek-Tips and talk with other members! Already a Member? Login

Close Box

Join Tek-Tips® Today!

Join your peers on the Internet's largest technical computer professional community.
It's easy to join and it's free.

Here's Why Members Love Tek-Tips Forums:

Register now while it's still free!

Already a member? Close this window and log in.

Join Us             Close