<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: XCC VE6120 ports: admin, data, vswitch promiscious mode in ExtremeWireless (General)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31358#M706</link>
    <description>Hi Bill,&lt;BR /&gt;&lt;BR /&gt;Thank you for explaining.&lt;BR /&gt;&lt;BR /&gt;If traffic is bridged at the AP it can be mapped to different VLANs depending the radius attribute returned from the NAC.&lt;BR /&gt;What would be reasons to tunnel all traffic back to the controller other than having a more centralized configuration?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Klaus</description>
    <pubDate>Mon, 08 Nov 2021 08:30:00 GMT</pubDate>
    <dc:creator>tfsnetman</dc:creator>
    <dc:date>2021-11-08T08:30:00Z</dc:date>
    <item>
      <title>XCC VE6120 ports: admin, data, vswitch promiscious mode</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31356#M704</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I am installing a VE6120 and ended up with 3 interfaces (admin, data 1, data 2).&lt;BR /&gt;Admin is out of band - VLAN 10&lt;BR /&gt;Data 1, data 2 - VLAN 16.&lt;BR /&gt;&lt;BR /&gt;While the documentation is stating that the vswitch should accept promiscious connections, this doesn't seem to make sense.&lt;BR /&gt;&lt;BR /&gt;Please correct me if I am wrong:&lt;BR /&gt;- data interfaces are used by APs and controller to talk to each other&lt;BR /&gt;- user traffic is locally switched&lt;BR /&gt;- no ther VLANs required on data ports&lt;BR /&gt;- global default gateway applies to Admin topology, static routes might be required for subnets that should be reachable via data ports / topology.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;&lt;BR /&gt;Klaus</description>
      <pubDate>Thu, 28 Oct 2021 03:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31356#M704</guid>
      <dc:creator>tfsnetman</dc:creator>
      <dc:date>2021-10-28T03:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: XCC VE6120 ports: admin, data, vswitch promiscious mode</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31357#M705</link>
      <description>Klaus,&lt;BR /&gt;&lt;BR /&gt;Depending on your situation/design the configuration of the ports changes.&amp;nbsp; If, in your deployment, you are bridging all wireless client traffic at the AP you may not need to enable the 2nd data port.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;In most of our deployments, we do not use the Admin port for Out of Band management, and use the first data port for management, AP registration, etc.&amp;nbsp; We usually only use the 2nd data port if we have a need to bridge the traffic at the controller onto a separate VLAN; sometimes used for Guest traffic that is tunneled back to be put on a separate VLAN.&lt;BR /&gt;&lt;BR /&gt;In the legacy Extreme/Enterasys-based controllers (V2110, C4110, C5210, etc.), we oftentimes did not use the Global Default Gateway, we bypassed that setting and just set a default route.&amp;nbsp; For the newer controllers (XCA/XCC) we use the Global Default Gateway - usually the Gateway for the subnet we will be managing the controller from - Data Port 1 in our case.&amp;nbsp; In the XCA/XCC this creates a default static route using the same gateway.&lt;BR /&gt;&lt;BR /&gt;For nearly all of our deployments, routing between the different subnets/VLANs is done from a different location, so we do not need to add that information at the Controller level.&amp;nbsp; Again, depending on your network's configuration, you may or may not need to add those routes.&amp;nbsp; You could use the 'Diagnostics' feature under the 'Tools' menu.&amp;nbsp; From there you can ping and traceroute from your controller's specific interfaces.&amp;nbsp; If you're able to reach the different subnets from your data port(s) you shouldn't need to add the static routes.&lt;BR /&gt;&lt;BR /&gt;I believe that the reason for the documentation stating the vSwitch needs to be in promiscuous mode is specifically for allowing tagged VLANs.&amp;nbsp; If your VMware host is on the same subnet, and no tagged VLANs are needed for any VM on that host, you should be able to leave promiscuous mode off. &lt;BR /&gt;&lt;BR /&gt;I hope this helps, but if you have any additional questions, please feel free to ask.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Bill</description>
      <pubDate>Thu, 28 Oct 2021 14:33:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31357#M705</guid>
      <dc:creator>Bill_Handler</dc:creator>
      <dc:date>2021-10-28T14:33:00Z</dc:date>
    </item>
    <item>
      <title>RE: XCC VE6120 ports: admin, data, vswitch promiscious mode</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31358#M706</link>
      <description>Hi Bill,&lt;BR /&gt;&lt;BR /&gt;Thank you for explaining.&lt;BR /&gt;&lt;BR /&gt;If traffic is bridged at the AP it can be mapped to different VLANs depending the radius attribute returned from the NAC.&lt;BR /&gt;What would be reasons to tunnel all traffic back to the controller other than having a more centralized configuration?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Klaus</description>
      <pubDate>Mon, 08 Nov 2021 08:30:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31358#M706</guid>
      <dc:creator>tfsnetman</dc:creator>
      <dc:date>2021-11-08T08:30:00Z</dc:date>
    </item>
    <item>
      <title>RE: XCC VE6120 ports: admin, data, vswitch promiscious mode</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31359#M707</link>
      <description>Klaus,&lt;BR /&gt;&lt;BR /&gt;Sorry about the delay, I've been out of pocket...&lt;BR /&gt;&lt;BR /&gt;For some deployments bridging at the controller may be necessary for traffic/content filtering or shaping - there are other reasons, but those are what are the most prevalent in our experience with our customer base.&amp;nbsp; We've had some customers whose environments necessitated this.&amp;nbsp; We do try to shy away from it due to the potential load it can put on a Virtual Controller.&lt;BR /&gt;&lt;BR /&gt;It all depends on the deployment and the needs/wants of the customer.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Bill</description>
      <pubDate>Thu, 11 Nov 2021 15:30:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/xcc-ve6120-ports-admin-data-vswitch-promiscious-mode/m-p/31359#M707</guid>
      <dc:creator>Bill_Handler</dc:creator>
      <dc:date>2021-11-11T15:30:00Z</dc:date>
    </item>
  </channel>
</rss>

