• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

h3c s7003e 如何划分新的端口给其它设备

2023-04-13提问
  • 0关注
  • 0收藏,706浏览
粉丝:0人 关注:0人

问题描述:

我之前划分端口给服务器,结果意外停电之后无法连接了。

组网及组网描述:

通过将笔记本电脑配置ip连接到核心汇聚,可以访问服务器。怀疑是vlan直接进行了隔离,请问是哪里出了问题。

最佳答案

粉丝:97人 关注:1人

这个要根据组网具体排查看看了

我只想和上次一样从新分配端口给服务器,您说的组网排查是什么意思。

明天,你好 发表时间:2023-04-13 更多>>

我只想和上次一样从新分配端口给服务器,您说的组网排查是什么意思。

明天,你好 发表时间:2023-04-13
3 个回答
粉丝:0人 关注:0人

组网,配置等信息粘出来看下吧。

大佬,我加你vx。这里没法发

明天,你好 发表时间:2023-04-13 更多>>

# version 7.1.070, Release 7585P05 # sysname XA-FX-Core # telnet server enable # forward-path-detection enable # irf mode normal # dhcp enable dhcp server forbidden-ip 10.110.4.1 10.110.4.100 dhcp server forbidden-ip 10.110.8.1 10.110.8.100 dhcp server forbidden-ip 10.110.12.1 10.110.12.100 dhcp server forbidden-ip 10.110.16.1 10.110.16.100 dhcp server forbidden-ip 10.110.20.1 10.110.20.100 dhcp server forbidden-ip 192.168.99.1 192.168.99.100 # lldp global enable # system-working-mode standard password-recovery enable # vlan 1 # vlan 2 description CaiWu # vlan 4 description KunPeng-BanGong # vlan 8 description Foxit-BanGong # vlan 10 description FWQ # vlan 12 description Foxit-wifi # vlan 16 description KunPeng-Wifi # vlan 20 description Guest # vlan 24 description FWQ-YuLiu-Foxit # vlan 28 description FWQ-YuLiu-KunPeng # vlan 98 description TO_Router # vlan 99 description Management # traffic classifier c1 operator and if-match acl 3001 # traffic behavior b1 filter deny # qos policy p1 classifier c1 behavior b1 # stp global enable # ftth # dhcp server ip-pool vlan4 gateway-list 10.110.4.1 network 10.110.4.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan8 gateway-list 10.110.8.1 network 10.110.8.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan12 gateway-list 10.110.12.1 network 10.110.12.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan16 gateway-list 10.110.16.1 network 10.110.16.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan20 gateway-list 10.110.20.1 network 10.110.20.0 mask 255.255.252.0 dns-list 10.110.0.5 # dhcp server ip-pool vlan99 gateway-list 192.168.99.1 network 192.168.99.0 mask 255.255.255.0 dns-list 10.110.0.5 # interface NULL0 # interface Vlan-interface2 description CaiWu ip address 10.110.2.1 255.255.255.0 # interface Vlan-interface4 description KunPeng-BanGong ip address 10.110.4.1 255.255.252.0 packet-filter 3004 inbound # interface Vlan-interface8 description Foxit-BanGong ip address 10.110.8.1 255.255.252.0 packet-filter 3008 inbound # interface Vlan-interface10 description FWQ ip address 10.110.1.1 255.255.255.0 # interface Vlan-interface12 description Foxit-wifi ip address 10.110.12.1 255.255.252.0 packet-filter 3012 inbound # interface Vlan-interface16 description KunPeng-Wifi ip address 10.110.16.1 255.255.252.0 packet-filter 3016 inbound # interface Vlan-interface20 description Guest ip address 10.110.20.1 255.255.252.0 packet-filter 3020 inbound # interface Vlan-interface24 description FWQ-YuLiu-Foxit ip address 10.110.24.1 255.255.252.0 packet-filter 3024 inbound # interface Vlan-interface28 description FWQ-YuLiu-KunPeng ip address 10.110.28.1 255.255.252.0 packet-filter 3028 inbound # interface Vlan-interface98 ip address 10.110.0.3 255.255.255.0 # interface Vlan-interface99 description Management ip address 192.168.99.1 255.255.255.0 # interface GigabitEthernet0/0/1 port link-mode bridge # interface GigabitEthernet0/0/2 port link-mode bridge # interface GigabitEthernet0/0/3 port link-mode bridge # interface GigabitEthernet0/0/4 port link-mode bridge # interface GigabitEthernet0/0/5 port link-mode bridge # interface GigabitEthernet0/0/6 port link-mode bridge # interface GigabitEthernet0/0/7 port link-mode bridge # interface GigabitEthernet0/0/8 port link-mode bridge # interface GigabitEthernet0/0/9 port link-mode bridge # interface GigabitEthernet0/0/10 port link-mode bridge # interface GigabitEthernet0/0/11 port link-mode bridge # interface GigabitEthernet0/0/12 port link-mode bridge # interface GigabitEthernet0/0/13 port link-mode bridge port link-type hybrid port hybrid vlan 10 tagged port hybrid vlan 1 untagged # interface GigabitEthernet0/0/14 port link-mode bridge port link-type hybrid undo port hybrid vlan 1 port hybrid vlan 10 tagged port hybrid vlan 98 untagged port hybrid pvid vlan 98 # interface GigabitEthernet0/0/15 port link-mode bridge port link-type hybrid undo port hybrid vlan 1 port hybrid vlan 98 untagged port hybrid pvid vlan 98 # interface GigabitEthernet0/0/16 port link-mode bridge description TO_JieRu port link-type trunk port trunk permit vlan all # interface GigabitEthernet0/0/17 port link-mode bridge description TO_JieRu port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/18 port link-mode bridge description TO_JieRu port link-type trunk port trunk permit vlan all # interface GigabitEthernet0/0/19 port link-mode bridge description TO_JieRu port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/20 port link-mode bridge description TO_JieRu port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/21 port link-mode bridge description TO_JieRu port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/22 port link-mode bridge description TO_POE port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2 to 4094 # interface GigabitEthernet0/0/23 port link-mode bridge description TO_AC port link-type trunk port trunk permit vlan all # interface GigabitEthernet0/0/24 port link-mode bridge description TO_ACG_Router port access vlan 98 # interface M-GigabitEthernet0/0/0 # interface Ten-GigabitEthernet0/0/25 port link-mode bridge # interface Ten-GigabitEthernet0/0/26 port link-mode bridge # interface Ten-GigabitEthernet0/0/27 port link-mode bridge # interface Ten-GigabitEthernet0/0/28 port link-mode bridge # scheduler logfile size 16 # line class aux user-role network-admin # line class vty user-role network-operator # line aux 0 authentication-mode scheme user-role network-admin idle-timeout 15 0 # line vty 0 4 authentication-mode scheme user-role network-operator idle-timeout 15 0 # line vty 5 63 user-role network-operator # ip route-static 0.0.0.0 0 10.110.0.1 # snmp-agent snmp-agent local-engineid 800063A2800C3AFA9A8A0100000001 snmp-agent community read foxit snmp-agent community write foxit2 snmp-agent sys-info version all # qos vlan-policy p1 vlan 4 inbound # acl advanced 3002 # acl advanced 3004 rule 10 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.8.0 0.0.3.255 rule 20 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.12.0 0.0.3.255 rule 25 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.4.0 0.0.3.255 destination 10.110.24.0 0.0.3.255 rule 100 permit ip # acl advanced 3008 rule 10 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.4.0 0.0.3.255 rule 20 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.16.0 0.0.3.255 rule 25 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.8.0 0.0.3.255 destination 10.110.28.0 0.0.3.255 rule 100 permit ip # acl advanced 3012 rule 10 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.4.0 0.0.3.255 rule 20 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.16.0 0.0.3.255 rule 25 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.12.0 0.0.3.255 destination 10.110.28.0 0.0.3.255 rule 100 permit ip # acl advanced 3016 rule 10 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.8.0 0.0.3.255 rule 20 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.12.0 0.0.3.255 rule 25 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.16.0 0.0.3.255 destination 10.110.24.0 0.0.3.255 rule 100 permit ip # acl advanced 3020 rule 10 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.8.0 0.0.3.255 rule 20 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.12.0 0.0.3.255 rule 25 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.24.0 0.0.3.255 rule 40 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.0.0 0.0.128.255 rule 45 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.4.0 0.0.3.255 rule 50 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.16.0 0.0.3.255 rule 55 deny ip source 10.110.20.0 0.0.3.255 destination 10.110.28.0 0.0.3.255 rule 100 permit ip # acl advanced 3024 rule 10 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.4.0 0.0.3.255 rule 20 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.16.0 0.0.3.255 rule 25 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.24.0 0.0.3.255 destination 10.110.28.0 0.0.3.255 rule 100 permit ip # acl advanced 3028 rule 10 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.2.0 0.0.0.255 rule 15 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.8.0 0.0.3.255 rule 20 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.12.0 0.0.3.255 rule 25 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.20.0 0.0.3.255 rule 30 deny ip source 10.110.28.0 0.0.3.255 destination 10.110.24.0 0.0.3.255 rule 100 permit ip # acl advanced 3100 # acl advanced 3300 # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage password hash $h$6$AMI2rMlb58mXUaKQ$9AL6snry0x2eccAuMmEgpx5eFFI//gOoMVRT8N287eIbzkERjfO+XoEcEZbxRMXnZYXZJxQl8qvfUXwomyE0ag== service-type telnet http https ssh terminal authorization-attribute user-role level-15 authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user foxit class manage password hash $h$6$p2rrS/6wceTOAcdB$U8t/birgjTvvIa7AoBmD98gOPwF+9KLaPYYC/mIOYwOVzyMz/bV0uRJIySmCjdgZlxaygHH4yupO93CjoSD0/g== service-type telnet ssh terminal authorization-attribute user-role level-15 authorization-attribute user-role network-admin authorization-attribute user-role network-operator # ip http port 8080 ip http enable ip https enable # return

明天,你好 发表时间:2023-04-13

额。。。拓扑结构是什么样的?哪些设备,服务器接哪个口,谁访问谁不通

物质空间位置转移 发表时间:2023-04-13

大佬,我加你vx。这里没法发

明天,你好 发表时间:2023-04-13
粉丝:146人 关注:1人

你之前划分之后,是不是没保存,没保存重启配置就没了

有可能是这个原因,但是我从新又设置了,还是不行。但是关键我接入到核心汇聚上的笔记本电脑可以进行访问。我怀疑是vlan之间进行隔离了。

明天,你好 发表时间:2023-04-13 更多>>

有可能是这个原因,但是我从新又设置了,还是不行。但是关键我接入到核心汇聚上的笔记本电脑可以进行访问。我怀疑是vlan之间进行隔离了。

明天,你好 发表时间:2023-04-13
粉丝:0人 关注:0人

意外停电的话导致问题,很有可能是上一次配置后没有save,登录进交换机查看配置dis cu,看看对应的端口下是否有配置,vlan是否也都存在,不存在就需要划分端口所属vlan,最后一定要记得保存配置save

看看端口下有无acl限制

一只小浪浪 发表时间:2023-04-14 更多>>

看看端口下有无acl限制

一只小浪浪 发表时间:2023-04-14

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明