我之前划分端口给服务器,结果意外停电之后无法连接了。
通过将笔记本电脑配置ip连接到核心汇聚,可以访问服务器。怀疑是vlan直接进行了隔离,请问是哪里出了问题。
(0)
最佳答案
组网,配置等信息粘出来看下吧。
(0)
大佬,我加你vx。这里没法发
# version 7.1.070, Release 7585P05 # sysname XA-FX-Core # telnet server enable # forward-path-detection enable # irf mode normal # dhcp enable dhcp server forbidden-ip 10.110.4.1 10.110.4.100 dhcp server forbidden-ip 10.110.8.1 10.110.8.100 dhcp server forbidden-ip 10.110.12.1 10.110.12.100 dhcp server forbidden-ip 10.110.16.1 10.110.16.100 dhcp server forbidden-ip 10.110.20.1 10.110.20.100 dhcp server forbidden-ip 192.168.99.1 192.168.99.100 # lldp global enable # system-working-mode standard password-recovery enable # vlan 1 # vlan 2 description CaiWu # vlan 4 description KunPeng-BanGong # vlan 8 description Foxit-BanGong # vlan 10 description FWQ # vlan 12 description Foxit-wifi # vlan 16 description KunPeng-Wifi # vlan 20 description Guest # vlan 24 description FWQ-YuLiu-Foxit # vlan 28 description FWQ-YuLiu-KunPeng # vlan 98 description TO_Router # vlan 99 description Management # traffic classifier c1 operator and if-match acl 3001 # traffic behavior b1 filter deny # qos policy p1 classifier c1 behavior b1 # stp global enable # ftth # dhcp server ip-pool vlan4 gateway-list 10.110.4.1 network 10.110.4.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan8 gateway-list 10.110.8.1 network 10.110.8.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan12 gateway-list 10.110.12.1 network 10.110.12.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan16 gateway-list 10.110.16.1 network 10.110.16.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan20 gateway-list 10.110.20.1 network 10.110.20.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan99 gateway-list 192.168.99.1 network 192.168.99.0 mask 255.255.255.0 dns-list 10.110.0.5 # interface NULL0 # interface Vlan-interface2 description CaiWu ip address 10.110.2.1 255.255.255.0 # interface Vlan-interface4 description KunPeng-BanGong ip address 10.110.4.1 255.255.252.0 packet-filter 3004 inbound # interface Vlan-interface8 description Foxit-BanGong ip address 10.110.8.1 255.255.252.0 packet-filter 3008 inbound # interface Vlan-interface10 description FWQ ip address 10.110.1.1 255.255.255.0 # interface Vlan-interface12 description Foxit-wifi ip address 10.110.12.1 255.255.252.0 packet-filter 3012 inbound # interface Vlan-interface16 description KunPeng-Wifi ip address 10.110.16.1 255.255.252.0 packet-filter 3016 inbound # interface Vlan-interface20 description Guest ip address 10.110.20.1 255.255.252.0 packet-filter 3020 inbound # interface Vlan-interface24 description FWQ-YuLiu-Foxit ip address 10.110.24.1 255.255.252.0 packet-filter 3024 inbound # interface Vlan-interface28 description FWQ-YuLiu-KunPeng ip address 10.110.28.1 255.255.252.0 packet-filter 3028 inbound # interface Vlan-interface98 ip address 10.110.0.3 255.255.255.0 # interface Vlan-interface99 description Management ip address 192.168.99.1 255.255.255.0 # interface GigabitEthernet0/0/1 port link-mode bridge # interface GigabitEthernet0/0/2 port link-mode bridge # interface GigabitEthernet0/0/3 port link-mode bridge # interface GigabitEthernet0/0/4 port link-mode bridge # interface GigabitEthernet0/0/5 port link-mode bridge # interface GigabitEthernet0/0/6 port link-mode bridge # interface GigabitEthernet0/0/7 port link-mode bridge # interface GigabitEthernet0/0/8 port link-mode bridge # interface GigabitEthernet0/0/9 port link-mode bridge # interface GigabitEthernet0/0/10 port link-mode bridge # interface GigabitEthernet0/0/11 port link-mode bridge # interface GigabitEthernet0/0/12 port link-mode bridge # interface GigabitEthernet0/0/13 port link-mode bridge port link-type hybrid port hybrid vlan 10 tagged port hybrid vlan 1 untagged # interface GigabitEthernet0/0/14 port link-mode bridge port link-type hybrid undo port hybrid vlan 1 port hybrid vlan 10 tagged port hybrid vlan 98 untagged port hybrid pvid vlan 98 # interface GigabitEthernet0/0/15 port link-mode bridge port link-type hybrid undo port hybrid vlan 1 port hybrid vlan 98 untagged port hybrid pvid vlan 98 # interface GigabitEthernet0/0/16 port link-mode bridge description TO_JieRu port link-type trunk port trunk permit vlan all # interface GigabitEthernet0/0/17 port link-mode bridge description TO_JieRu port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/18 port link-mode bridge description TO_JieRu port link-type trunk port trunk permit vlan all # interface GigabitEthernet0/0/19 port link-mode bridge description TO_JieRu port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/20 port link-mode bridge description TO_JieRu port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/21 port link-mode bridge description TO_JieRu port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/22 port link-mode bridge description TO_POE port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/23 port link-mode bridge description TO_AC port link-type trunk port trunk permit vlan all # interface GigabitEthernet0/0/24 port link-mode bridge description TO_ACG_Router port access vlan 98 # interface M-GigabitEthernet0/0/0 # interface Ten-GigabitEthernet0/0/25 port link-mode bridge # interface Ten-GigabitEthernet0/0/26 port link-mode bridge # interface Ten-GigabitEthernet0/0/27 port link-mode bridge # interface Ten-GigabitEthernet0/0/28 port link-mode bridge # scheduler logfile size 16 # line class aux user-role network-admin # line class vty user-role network-operator # line aux 0 authentication-mode scheme user-role network-admin idle-timeout 15 0 # line vty 0 4 authentication-mode scheme user-role network-operator idle-timeout 15 0 # line vty 5 63 user-role network-operator # ip route-static 0.0.0.0 0 10.110.0.1 # snmp-agent snmp-agent local-engineid 800063A2800C3AFA9A8A0100000001 snmp-agent community read foxit snmp-agent community write foxit2 snmp-agent sys-info version all # qos vlan-policy p1 vlan 4 inbound # acl advanced 3002 # acl advanced 3004 rule 10 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.8.0 0.0.3.255 rule 20 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.12.0 0.0.3.255 rule 25 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.24.0 0.0.3.255 rule 100 permit ip # acl advanced 3008 rule 10 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.4.0 0.0.3.255 rule 20 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.16.0 0.0.3.255 rule 25 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.28.0 0.0.3.255 rule 100 permit ip # acl advanced 3012 rule 10 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.4.0 0.0.3.255 rule 20 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.16.0 0.0.3.255 rule 25 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.28.0 0.0.3.255 rule 100 permit ip # acl advanced 3016 rule 10 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.8.0 0.0.3.255 rule 20 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.12.0 0.0.3.255 rule 25 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.24.0 0.0.3.255 rule 100 permit ip # acl advanced 3020 rule 10 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.8.0 0.0.3.255 rule 20 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.12.0 0.0.3.255 rule 25 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.24.0 0.0.3.255 rule 40 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.0.0 0.0.128.255 rule 45 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.4.0 0.0.3.255 rule 50 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.16.0 0.0.3.255 rule 55 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.28.0 0.0.3.255 rule 100 permit ip # acl advanced 3024 rule 10 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.4.0 0.0.3.255 rule 20 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.16.0 0.0.3.255 rule 25 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.28.0 0.0.3.255 rule 100 permit ip # acl advanced 3028 rule 10 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.8.0 0.0.3.255 rule 20 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.12.0 0.0.3.255 rule 25 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.24.0 0.0.3.255 rule 100 permit ip # acl advanced 3100 # acl advanced 3300 # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage password hash $h$6$AMI2rMlb58mXUaKQ$9AL6snry0x2eccAuMmEgpx5eFFI//gOoMVRT8N287eIbzkERjfO+XoEcEZbxRMXnZYXZJxQl8qvfUXwomyE0ag== service-type telnet http https ssh terminal authorization-attribute user-role level-15 authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user foxit class manage password hash $h$6$p2rrS/6wceTOAcdB$U8t/birgjTvvIa7AoBmD98gOPwF+9KLaPYYC/mIOYwOVzyMz/bV0uRJIySmCjdgZlxaygHH4yupO93CjoSD0/g== service-type telnet ssh terminal authorization-attribute user-role level-15 authorization-attribute user-role network-admin authorization-attribute user-role network-operator # ip http port 8080 ip http enable ip https enable # return
额。。。拓扑结构是什么样的?哪些设备,服务器接哪个口,谁访问谁不通
大佬,我加你vx。这里没法发
你之前划分之后,是不是没保存,没保存重启配置就没了
(0)
有可能是这个原因,但是我从新又设置了,还是不行。但是关键我接入到核心汇聚上的笔记本电脑可以进行访问。我怀疑是vlan之间进行隔离了。
有可能是这个原因,但是我从新又设置了,还是不行。但是关键我接入到核心汇聚上的笔记本电脑可以进行访问。我怀疑是vlan之间进行隔离了。
意外停电的话导致问题,很有可能是上一次配置后没有save,登录进交换机查看配置dis cu,看看对应的端口下是否有配置,vlan是否也都存在,不存在就需要划分端口所属vlan,最后一定要记得保存配置save
(1)
看看端口下有无acl限制
看看端口下有无acl限制
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
我只想和上次一样从新分配端口给服务器,您说的组网排查是什么意思。