I tested the nics in a windows box and I was able to get vlan support after updating the driver. So I need to update the driver on astaro is this possible I've never been under the hood of astaro before?
So kd did you have to load the driver yourself or did astaro autimatically give you vlan support. So basically you are saying that I need to pick items 1 and 3 on the below link
So since you are running everything through one nic have you noticed any performnace problems? I plain to put at least 3 in the box. Are you mainly running your internal lan through the layer 3 switch or do you have it segmented so that you can run your public servers from it also. I mainly want to run internal network and test network. I plan on putting public servers on a regular dumb switch.
I was able to ping the vlan interface on a nic . The problem was I had to change the switch port to tagged. When wanting to implement a full vlan cabple network do all of my devices need nics that can read vlan tags. I know I can do untagged ports but I assumed that all my boxes would need a card capable of 802.1q.
With what vlan do you make your test. If it's vlan 1 and you have a Cisco catalyst you should change the native vlan of the port (catalyst drop packed taged whit vlan 1 because untaged packed are taged with vlan 1 by default ...)
[ QUOTE ] I was able to ping the vlan interface on a nic . The problem was I had to change the switch port to tagged. When wanting to implement a full vlan cabple network do all of my devices need nics that can read vlan tags. I know I can do untagged ports but I assumed that all my boxes would need a card capable of 802.1q.
[/ QUOTE ]Only the links that need to carry 802.1q tagged VLAN traffic require devices in each end that are tagged VLAN capable. That, presumably, is just one ASL Ethernet card and one switch port in your setup. The remaining ports on your managed VLAN capable switch, would be ordinary Ethernet ports individually assigned to one out of the several VLANs programmed into the switch. Those ports are normal Ethernet ports, and the machines connected to them use a normal Ethernet confuguration.
802.1q tagged VLAN is simply a way to trunk multiple Ethernet subnets over a single cable. It is configured on individual links as required, without affecting any other switch ports.
Thanks for posting I was able to figure it out after some reading basically I created a trunk to the firewall interface. After I did that I simply started createing the virtual interfaces on astaro and applying firewall policy. I still have more testing to do though over the next few days.
Thanks for posting I was able to figure it out after some reading basically I created a trunk to the firewall interface. After I did that I simply started createing the virtual interfaces on astaro and applying firewall policy. I still have more testing to do though over the next few days.