SonicWall Switch Getting Started Guide
Configuring Basic Topologies
57
About Uplink Interfaces
Uplink interfaces can be viewed as “trunk” ports set up to carry tagged/untagged traffic. When a Switch is added
with firewall Uplink and Switch options, the port on the firewall configured as the firewall uplink and the port on
the Switch configured as the Switch uplink are set up automatically to receive/send tagged traffic for all IDV
VLANs. The IDV VLAN of the tagged traffic allows the firmware to derive the PortShield host interface for the
traffic.
Criteria for Configuring an Uplink Interface
•
The interface must be a physical interface; virtual interfaces are not allowed.
•
The interface must connect a firewall and a Switch.
•
The interface cannot be a PortShield host (some other firewall interface cannot be portshielded to it) or a
PortShield group member (cannot be portshielded to another firewall interface).
•
The interface cannot be a bridge primary or bridge secondary interface.
•
The Switch side of the uplink interface cannot have any children (it cannot be a parent interface for
children interfaces). The Firewall uplink interface can have child/ sub interfaces.
Connecting the Switch Management Port to
a Firewall
The interface connected to the management port of the Switch must have an IP address from the same subnet
as the Switch. For example, if the management connection between the Switch and the firewall is through X2,
then X2 must have an IP address from the same subnet, such as
192.168.168.10.
The default Switch IP
address is
192.168.168.169.
All port-based configuration operations are disabled on the Switch port designated as the Switch management
and Switch uplink ports. This action ensures that configuration operations on these critical ports do not lead to
Switch-reachability issues jeopardizing the integration solution.
NOTE:
IDV
— Interface Disambiguation via VLAN – The reconfiguring of ports, portshielded to firewall
interfaces, on the Switch as access ports of the VLAN corresponding to the PortShield VLAN.