I want to install a SonicPoint on an existing SRW224G4P switch. Sonicwall architecture uses VLAN to support multiple SSID on SonicPoint. Sonicwall interface X0 attached to port e12 on the switch, and the Soncipotn on e24, which is PoE enabled. In this configuration I can see the Sonicpoint is OPERATIONAL as seen on the sonicwall, so there is some communication between the two. Additionally, a laptop can see the SSID broadcast, and attach in a “limited” manner, but IPCONFIG shows no IP addresses being set. Oddly, it Windows Update may have worked overnight in this configuration. However, I cannot access the LAN or WAN from the laptop.
Where am I going wrong in the switch VLAN configuration?
I had the same issue with the VAPs and SP vlans not working together. I suggest create separate vlan for SPs, then change the SP switchports to trunk and untag the vlan for SP, tag the vlans for guest & corp.
Mr. Weiss, thank you so much for your input. I must admit, though, I am confued by your nomenclature, and a bit by strategy.
First, for the "UP" links, does this mean trunking. On the SRW series, the switchport options are access|trunk|general and the membership is excluded|Tagged|Untagged. I presume the T above is Tagged, U is Untagged, but am confused with UP.
Second, it is intersting that the Sonicpoints (management) is on one VLAN and the traffic (corporate, guest) on another. I will have to look into that setup on the UTM. Why did you do this? The examples I have seen (Sonicpoint KB 5798, 5801) show one vlan for botht hte traffic and management. These don't show both Corporate and Guest traffic on the same SP, though...
Finally, do you have examples of how you set up the UTM firewall for cross VLAN traffic?
Sorry, I didn't meantion I am using Cisco SG200 series switches. It's just a GUI for setup and management.
All ports are set as Trunk. I had the SP ports as Access, but that didn't work on the VAP setup. The UP stands for untagged and PVID.
I setup the 3 vlans just for troubleshooting ease. I know I have one vlan for Sonicpoint communication, and the other two wireless for clients.
On Sonicwall I have Firewall Access rule WLAN (Corp) > LAN - Source=WLAN (Corp) Destination=LAN Subnets Service=Any. That allows wireless clients on corp SSID to access LAN hosts without using VPN, which I guess is what Sonicwall wants you to do.
Article ID:4006 Configure Secure Shell (SSH) Server Authentication
Settings on a Switch Objective Secure Shell (SSH) is a protocol that
provides a secure remote connection to specific network devices. This
connection provides functionality that is similar...
Article ID:4982 Access an SMB Switch CLI using SSH or Telnet Objective
The Cisco Small Business Managed Switches can be remotely accessed and
configured through the Command Line Interface (CLI). Accessing the CLI
allows commands to be entered in a termina...
Article ID:5735 Convert Configuration Files using the Configuration
Migration Tool on Cisco Small Business Switches Introduction The Cisco
Configuration Migration Tool allows you to convert configuration files
from previous generation of Cisco Small Busin...