Before down-voting, jab-commenting, or telling someone they are doing something wrong (instead of giving them some type of solution) is not productive at all. Something very important to remember about switches is that "not all switches are created equal".
In my case there is NO way (that I could find) to manage the switch on any VLAN other than VLAN1. This would be fine but then you run into an issue with VLAN1 in that you can NOT alter the VLAN in any way. In Dell's mind VLAN1 is sacred and not to be touched. You can not rename the VLAN, tag or untag packets, etc. My only option was to use other VLANs created by me. The issue you run into is that if your not on VLAN1 you can NOT manage the switch! Well seeing as how I need to manage the switch I decided that the only way to make this happen was to keep the 1st port dedicated to management and keep it on VLAN1. Then I thought by connecting to virtual VLANs together with a physical cat5 cable I would be able to hop from one VLAN to another on the Dell switch. Well this was a shot in the dark (even though I hated the idea of hooking that cat5 from one port to another on the same switch I gave it a try). This resulted in a no go situation. I could not get the two VLANs to talk to each other. So I came at it from another angle. My work around involved my ASA5505 that I use for small routing jobs (such as managing a switch that is a horrible design like the dell powerconnects).
I simply isolated the switches on there own subnet 10.71.3.48/29 and hooked port 1 right into my ASA5505 then gave the ASA5505 an IP of 10.71.3.49 for that INT used and the switch an IP of 10.71.3.50 (mask: 255.255.255.248).
I know this is not a solution for the issue at hand, but I simply could not find a way to get around making it work. So instead I came up with a work around.