本帖最后由 liang0375 于 2017-12-18 22:17 编辑 华为由器的配置文件在6楼三层交换机配置在10楼 搞定了,就是建VLAN100,静态路由再指定VLAN100的线路. 就是有点不明天为什么要建这个虚拟口 |
从上面的描述来看交换机是使用的路由功能,华为路由使用子接口是为了封装dot1q协议, 爱快上面直接可以接收三层交换机发来的数据,只需要设置lan口地址为192.168.100.252即可,不需要添加扩展IP。 |
18979379502 发表于 2017-12-18 21:19 华为很多设备都是把接口划分到vlan,然后配置IP,作为路由口的。 所以楼主应该直接把爱快的lan地址设置为192.168.100.252就可以了。爱快创建vlan多此一举了。 |
18979379502 发表于 2017-12-18 20:35 搞定了,谢谢。就是建了VLAN后还有在静态路由那把LAN1线路都改成VLAN100 |
liang0375 发表于 2017-12-18 20:37 我不知道为什么华为的路由器要启子接口,其实直接在三层交换机VLAN100的接口出来接路由器LAN的IP地址设个同网段就能通,把静态路由留着直接把LAN的地址改成192.168.100.252,试一下 |
!Software Version V200R007C00SPC500 # sysname AP_SW_CORE # FTP server enable # vlan batch 100 200 to 202 # igmp-snooping enable # telnet server enable # lldp enable # http server load s7700-v200r007c00spc500.005.web.7z # clock timezone BJ add 08:00:00 # dhcp enable # diffserv domain default # drop-profile default # vlan 202 description office # ip pool AP_YW gateway-list 172.16.7.254 network 172.16.0.0 mask 255.255.248.0 lease day 0 hour 6 minute 0 dns-list 202.103.224.68 202.103.225.68 119.29.29.29 182.254.116.116 # aaa authentication-scheme default authorization-scheme default accounting-scheme default local-user huawei privilege level 3 local-user huawei service-type telnet ftp http # interface Vlanif100 ip address 192.168.100.254 255.255.255.0 # interface Vlanif200 description To-AP ip address 192.168.200.254 255.255.255.0 dhcp select interface # interface Vlanif201 description To-AC-YW ip address 172.16.7.254 255.255.248.0 dhcp select global # interface Vlanif202 ip address 192.168.202.254 255.255.255.0 # interface Vlanif300 # interface Ethernet0/0/0 ip address 192.168.1.1 255.255.255.0 # interface GigabitEthernet2/0/0 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/1 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/2 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/3 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/4 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/5 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/6 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/7 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/8 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/9 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/10 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/11 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/12 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/13 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/14 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/15 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/16 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/17 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/18 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/19 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/20 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/21 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/22 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet2/0/23 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet3/0/0 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet3/0/1 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet3/0/2 # interface GigabitEthernet3/0/3 # interface GigabitEthernet3/0/4 # interface GigabitEthernet3/0/5 # interface GigabitEthernet3/0/6 # interface GigabitEthernet3/0/7 # interface GigabitEthernet3/0/8 # interface GigabitEthernet3/0/9 # interface GigabitEthernet3/0/10 # interface GigabitEthernet3/0/11 # interface GigabitEthernet3/0/12 port link-type access port default vlan 202 # interface GigabitEthernet3/0/13 port link-type access port default vlan 202 # interface GigabitEthernet3/0/14 port link-type access port default vlan 202 # interface GigabitEthernet3/0/15 port link-type access port default vlan 202 # interface GigabitEthernet3/0/16 port link-type access port default vlan 202 # interface GigabitEthernet3/0/17 port link-type access port default vlan 202 # interface GigabitEthernet3/0/18 port link-type access port default vlan 202 # interface GigabitEthernet3/0/19 port link-type access port default vlan 202 # interface GigabitEthernet3/0/20 port link-type access port default vlan 202 # interface GigabitEthernet3/0/21 port link-type access port default vlan 202 # interface GigabitEthernet3/0/22 port link-type access port default vlan 202 # interface GigabitEthernet3/0/23 port link-type access port default vlan 202 # interface NULL0 # ip route-static 0.0.0.0 0.0.0.0 192.168.100.252 # authentication-mode aaa user privilege level 15 protocol inbound all user-interface vty 16 20 # wlan wlan work-group default # return |
18979379502 发表于 2017-12-18 20:35 怎么搞,就是这个子接口不懂怎么搞呀? 我建了 100VLAN 192.168.100.252 也不行呢 |
楼主应该在爱快端口启子接口,建个100的VLAN和192.168.100.252,你建扩展IP没有用 |
本帖最后由 liang0375 于 2017-12-18 20:08 编辑 [V200R007C00SPCc00] # sysname YSXL_Router # drop illegal-mac alarm # ipv6 # dns resolve dns proxy enable # vlan batch 100 # lldp enable # dhcp enable # pki realm default enrollment self-signed # ssl policy default_policy type server pki-realm default # acl name GigabitEthernet0/0/2 2997 rule 5 permit acl name GigabitEthernet0/0/1 2999 rule 5 permit # traffic classifier g_c_ef_GigabitEthernet0/0/1 operator or if-match dscp ef traffic classifier g_c_cs6_GigabitEthernet0/0/1 operator or if-match dscp cs6 traffic classifier g_c_af1_GigabitEthernet0/0/1 operator or if-match dscp af11 af12 af13 traffic classifier g_c_cs7_GigabitEthernet0/0/1 operator or if-match dscp cs7 traffic classifier g_c_af2_GigabitEthernet0/0/1 operator or if-match dscp af21 af22 af23 traffic classifier g_c_af3_GigabitEthernet0/0/1 operator or if-match dscp af31 af32 af33 traffic classifier g_c_af4_GigabitEthernet0/0/1 operator or if-match dscp af41 af42 af43 traffic classifier g_c_be_GigabitEthernet0/0/1 operator or if-match dscp default # traffic behavior g_c_ef_GigabitEthernet0/0/1 queue ef bandwidth pct 15 traffic behavior g_c_cs6_GigabitEthernet0/0/1 queue ef bandwidth pct 5 traffic behavior g_c_af1_GigabitEthernet0/0/1 queue af bandwidth pct 5 traffic behavior g_c_cs7_GigabitEthernet0/0/1 queue ef bandwidth pct 5 traffic behavior g_c_af2_GigabitEthernet0/0/1 queue af bandwidth pct 25 traffic behavior g_c_af3_GigabitEthernet0/0/1 queue af bandwidth pct 5 traffic behavior g_c_af4_GigabitEthernet0/0/1 queue af bandwidth pct 15 traffic behavior g_c_be_GigabitEthernet0/0/1 queue af bandwidth pct 24 # traffic policy qos_g_GigabitEthernet0/0/1 classifier g_c_be_GigabitEthernet0/0/1 behavior g_c_be_GigabitEthernet0/0/1 classifier g_c_af1_GigabitEthernet0/0/1 behavior g_c_af1_GigabitEthernet0/0/1 classifier g_c_af2_GigabitEthernet0/0/1 behavior g_c_af2_GigabitEthernet0/0/1 classifier g_c_af3_GigabitEthernet0/0/1 behavior g_c_af3_GigabitEthernet0/0/1 classifier g_c_af4_GigabitEthernet0/0/1 behavior g_c_af4_GigabitEthernet0/0/1 classifier g_c_ef_GigabitEthernet0/0/1 behavior g_c_ef_GigabitEthernet0/0/1 classifier g_c_cs6_GigabitEthernet0/0/1 behavior g_c_cs6_GigabitEthernet0/0/1 classifier g_c_cs7_GigabitEthernet0/0/1 behavior g_c_cs7_GigabitEthernet0/0/1 traffic policy SAC_manager # aaa authentication-scheme default authorization-scheme default accounting-scheme default # firewall zone Local priority 64 # interface Dialer1 link-protocol ppp ppp ipcp dns admit-any ppp ipcp dns request tcp adjust-mss 1200 ip address ppp-negotiate dialer user arweb dialer bundle 1 dialer-group 2 nat outbound 2999 # interface Vlanif1 ip address 192.168.230.254 255.255.255.0 # interface Vlanif100 # interface GigabitEthernet0/0/0 tcp adjust-mss 1200 ip address 192.168.188.1 255.255.255.0 # interface GigabitEthernet0/0/0.1 dot1q termination vid 100 tcp adjust-mss 1200 ip address 192.168.100.252 255.255.255.0 qos car inbound source-ip-address range 172.16.0.1 to 172.16.7.254 per-address cir 500 cbs 37600 pbs 62600 green pass yellow pass red discard qos car outbound destination-ip-address range 172.16.0.1 to 172.16.7.254 per-address cir 1440 cbs 192512 pbs 320512 green pass yellow pass red discard # interface GigabitEthernet0/0/1 pppoe-client dial-bundle-number 1 tcp adjust-mss 1460 qos gts cir 100000 cbs 2500000 traffic-policy qos_g_GigabitEthernet0/0/1 outbound # interface GigabitEthernet0/0/2 tcp adjust-mss 1200 ip address 192.168.220.1 255.255.255.0 # interface GigabitEthernet0/0/3 description VirtualPort shutdown # interface Cellular0/0/0 # interface Cellular0/0/1 # interface NULL0 # dialer-rule dialer-rule 1 ip permit dialer-rule 2 ip permit # info-center timestamp log format-date # snmp-agent local-engineid 800007DB039CE37479C668 # telnet ipv6 server enable # http secure-server ssl-policy default_policy http server enable http secure-server enable # ip route-static 0.0.0.0 0.0.0.0 Dialer1 ip route-static 172.16.0.0 255.255.248.0 192.168.100.254 ip route-static 192.168.200.0 255.255.255.0 192.168.100.254 ip route-static 192.168.202.0 255.255.255.0 192.168.100.254 # fib regularly-refresh disable # user-interface con 0 authentication-mode password set authentication password cipher %^%#e996T-q&I+|U$*~3~,:~MjB]H4JvA9E[m_!g7X*2c$EmR%|Qk$3L*|N=V5N:%^%# user-interface vty 0 4 authentication-mode aaa user privilege level 15 # wlan ac ap-profile name ap-profile-0 id 0 telnet enable # voice # diagnose # ops # autostart # return |
|小黑屋|手机版|Archiver|论坛规章制度|iKuai Inc. ( 京ICP备13042604号 )
GMT+8, 2024-5-9 08:21
Powered by Discuz! X3.3
© 2001-2024 Comsenz Inc.