• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

S5500V2-EI内的VLAN之间ping不通

  • 0关注
  • 1收藏,999浏览
粉丝:0人 关注:0人

问题描述:

我这边有个三层交换机,创建好各VLAN之后,可以连接上联的防火墙上网。但是交换机之间的VLAN不能互通,配置如下,还想需要添加什么吗?


  1. #
  2. version 7.1.070, Release 1119P11
  3. #
  4. sysname H3C
  5. #
  6. telnet server enable
  7. #
  8. irf mac-address persistent timer
  9. irf auto-update enable
  10. undo irf link-delay
  11. irf member 1 priority 1
  12. #
  13. dhcp enable
  14. dhcp server forbidden-ip 192.168.6.240 192.168.6.250
  15. dhcp server forbidden-ip 192.168.99.240 192.168.99.250
  16. #
  17. lldp global enable
  18. #
  19. password-recovery enable
  20. #
  21. vlan 1
  22. #
  23. vlan 10
  24. #
  25. vlan 20
  26. #
  27. vlan 100
  28. #
  29. stp global enable
  30. #
  31. dhcp server ip-pool vlan10
  32. gateway-list 192.168.99.1
  33. network 192.168.98.0 mask 255.255.254.0
  34. dns-list 114.114.114.114 8.8.8.8
  35. static-bind ip-address 192.168.98.2 mask 255.255.254.0 hardware-address 309c-237d-e37c
  36. static-bind ip-address 192.168.98.59 mask 255.255.254.0 hardware-address 309c-23b8-8244
  37. static-bind ip-address 192.168.98.95 mask 255.255.254.0 hardware-address 8ca6-dfcc-7e87
  38. static-bind ip-address 192.168.98.155 mask 255.255.254.0 hardware-address 8825-939d-3f68
  39. static-bind ip-address 192.168.99.33 mask 255.255.254.0 hardware-address 00d8-6154-b61a
  40. static-bind ip-address 192.168.99.58 mask 255.255.254.0 hardware-address d094-662a-3a3e
  41. static-bind ip-address 192.168.99.111 mask 255.255.254.0 hardware-address 309c-23b0-fd65
  42. static-bind ip-address 192.168.99.141 mask 255.255.254.0 hardware-address f439-09f3-1efa
  43. static-bind ip-address 192.168.99.188 mask 255.255.254.0 hardware-address b4b6-8633-57f9
  44. static-bind ip-address 192.168.99.198 mask 255.255.254.0 hardware-address 1062-e55c-c521
  45. static-bind ip-address 192.168.99.199 mask 255.255.254.0 hardware-address b4a3-82b1-cc27
  46. static-bind ip-address 192.168.99.224 mask 255.255.254.0 hardware-address 040e-3ce9-df6f
  47. #
  48. dhcp server ip-pool vlan20
  49. gateway-list 192.168.6.1
  50. network 192.168.6.0 mask 255.255.254.0
  51. dns-list 114.114.114.114 8.8.8.8
  52. #
  53. interface NULL0
  54. #
  55. interface Vlan-interface1
  56. #
  57. interface Vlan-interface10
  58. ip address 192.168.99.1 255.255.254.0
  59. #
  60. interface Vlan-interface20
  61. ip address 192.168.6.1 255.255.254.0
  62. #
  63. interface Vlan-interface100
  64. ip address 192.168.2.2 255.255.255.0
  65. #
  66. interface FortyGigE1/0/33
  67. port link-mode bridge
  68. #
  69. interface FortyGigE1/0/34
  70. port link-mode bridge
  71. #
  72. interface GigabitEthernet1/0/1
  73. port link-mode bridge
  74. port access vlan 10
  75. #
  76. interface GigabitEthernet1/0/2
  77. port link-mode bridge
  78. port access vlan 10
  79. #
  80. interface GigabitEthernet1/0/3
  81. port link-mode bridge
  82. port access vlan 10
  83. #
  84. interface GigabitEthernet1/0/4
  85. port link-mode bridge
  86. port access vlan 10
  87. #
  88. interface GigabitEthernet1/0/5
  89. port link-mode bridge
  90. port access vlan 10
  91. #
  92. interface GigabitEthernet1/0/6
  93. port link-mode bridge
  94. port access vlan 10
  95. #
  96. interface GigabitEthernet1/0/7
  97. port link-mode bridge
  98. port access vlan 10
  99. #
  100. interface GigabitEthernet1/0/8
  101. port link-mode bridge
  102. port access vlan 10
  103. #
  104. interface GigabitEthernet1/0/9
  105. port link-mode bridge
  106. port access vlan 10
  107. #
  108. interface GigabitEthernet1/0/10
  109. port link-mode bridge
  110. port access vlan 10
  111. #
  112. interface GigabitEthernet1/0/11
  113. port link-mode bridge
  114. port access vlan 10
  115. #
  116. interface GigabitEthernet1/0/12
  117. port link-mode bridge
  118. port access vlan 10
  119. #
  120. interface GigabitEthernet1/0/13
  121. port link-mode bridge
  122. port access vlan 10
  123. #
  124. interface GigabitEthernet1/0/14
  125. port link-mode bridge
  126. port access vlan 10
  127. #
  128. interface GigabitEthernet1/0/15
  129. port link-mode bridge
  130. port access vlan 10
  131. #
  132. interface GigabitEthernet1/0/16
  133. port link-mode bridge
  134. port access vlan 10
  135. #
  136. interface GigabitEthernet1/0/17
  137. port link-mode bridge
  138. port access vlan 10
  139. #
  140. interface GigabitEthernet1/0/18
  141. port link-mode bridge
  142. port access vlan 10
  143. #
  144. interface GigabitEthernet1/0/19
  145. port link-mode bridge
  146. port access vlan 10
  147. #
  148. interface GigabitEthernet1/0/20
  149. port link-mode bridge
  150. port access vlan 10
  151. #
  152. interface GigabitEthernet1/0/21
  153. port link-mode bridge
  154. port access vlan 20
  155. #
  156. interface GigabitEthernet1/0/22
  157. port link-mode bridge
  158. port access vlan 20
  159. #
  160. interface GigabitEthernet1/0/23
  161. port link-mode bridge
  162. port access vlan 20
  163. #
  164. interface GigabitEthernet1/0/24
  165. port link-mode bridge
  166. port access vlan 20
  167. #
  168. interface GigabitEthernet1/0/25
  169. port link-mode bridge
  170. combo enable copper
  171. #
  172. interface GigabitEthernet1/0/26
  173. port link-mode bridge
  174. combo enable copper
  175. #
  176. interface GigabitEthernet1/0/27
  177. port link-mode bridge
  178. combo enable copper
  179. #
  180. interface GigabitEthernet1/0/28
  181. port link-mode bridge
  182. port access vlan 100
  183. combo enable copper
  184. #
  185. interface GigabitEthernet1/0/29
  186. port link-mode bridge
  187. #
  188. interface GigabitEthernet1/0/30
  189. port link-mode bridge
  190. #
  191. interface M-GigabitEthernet0/0/0
  192. #
  193. interface Ten-GigabitEthernet1/0/31
  194. port link-mode bridge
  195. #
  196. interface Ten-GigabitEthernet1/0/32
  197. port link-mode bridge
  198. #
  199. scheduler logfile size 16
  200. #
  201. line class aux
  202. user-role network-admin
  203. #
  204. line class usb
  205. user-role network-admin
  206. #
  207. line class vty
  208. user-role network-operator
  209. #
  210. line aux 0
  211. user-role network-admin
  212. #
  213. line vty 0 4
  214. user-role level-15
  215. user-role levle-15
  216. user-role network-operator
  217. #
  218. line vty 5 63
  219. user-role network-operator
  220. #
  221. ip route-static 0.0.0.0 0 192.168.2.1
  222. #
  223. radius scheme system
  224. user-name-format without-domain
  225. #
  226. domain system
  227. #
  228. domain default enable system
  229. #
  230. role name level-0
  231. description Predefined level-0 role
  232. #
  233. role name level-1
  234. description Predefined level-1 role
  235. #
  236. role name level-2
  237. description Predefined level-2 role
  238. #
  239. role name level-3
  240. description Predefined level-3 role
  241. #
  242. role name level-4
  243. description Predefined level-4 role
  244. #
  245. role name level-5
  246. description Predefined level-5 role
  247. #
  248. role name level-6
  249. description Predefined level-6 role
  250. #
  251. role name level-7
  252. description Predefined level-7 role
  253. #
  254. role name level-8
  255. description Predefined level-8 role
  256. #
  257. role name level-9
  258. description Predefined level-9 role
  259. #
  260. role name level-10
  261. description Predefined level-10 role
  262. #
  263. role name level-11
  264. description Predefined level-11 role
  265. #
  266. role name level-12
  267. description Predefined level-12 role
  268. #
  269. role name level-13
  270. description Predefined level-13 role
  271. #
  272. role name level-14
  273. description Predefined level-14 role
  274. #
  275. user-group system
  276. #
  277. local-user admin class manage
  278. password hash $h$6$PgCFWtk13BdvH2LM$iMAIONu1TLZXZxVxrNn6hJCphChJMInFp5QmDoTibBCK7LNyUdknp4AmzoSIcsu/1Q7xbrf+IJiK9K4+ShiFmw==
  279. service-type telnet http
  280. authorization-attribute user-role level-15
  281. authorization-attribute user-role network-operator
  282. #
  283. ip http enable
  284. #
  285. return



最佳答案

佚名 九段
粉丝:23人 关注:0人

应该没问题呀,vlan 20 10 100应该可以互通的,终端网关设置了吗

回复zhiliao_OK3fv:

流统配置: acl number 3010 rule 1 permit icmp source 10.0.254.26 0 destination 10.0.254.17 0    //10.0.254.26为PING发起源地址,10.0.254.17为PING的目的地址 rule 2 permit icmp source 10.0.254.17 0 destination 10.0.254.26 0  // 源目的调换,用于匹配ICMP回程流量   traffic classifier MQC operator and if-match acl 3010       If-match destination-mac 88df-9e65-67b3 同时匹配mac和vlan       If-match service-vlan-id 1876   traffic behavior MQC accounting packet   qos policy MQC classifier MQC behavior MQC   interface Ten-GigabitEthernet1/0/5    //对应流途径接口 qos apply policy MQC inbound qos apply policy MQC outbound   interface Ten-GigabitEthernet1/0/6     //对应流途径接口 qos apply policy MQC inbound qos apply policy MQC outbound   查看流统: Display  qos policy interface   举例: <H3C>dis qos policy interface   Interface: GigabitEthernet1/0/5                 //该接口inbound计数与G1/0/6接口outbound计数一致,即说明转发未丢包,若inbound计数多于outbound计数,则说明设备侧丢包了     Direction: Inbound   Policy: teat    Classifier: teat      Operator: AND      Rule(s) :       If-match acl 3002      Behavior: teat       Accounting enable:         45 (Packets)   Interface: Ten-GigabitEthernet1/0/5     //该接口outbound计数与G1/0/6接口inbound计数一致,即说明转发未丢包,若inbound计数多于outbound计数,则说明设备侧丢包了     Direction: Outbound   Policy: teat    Classifier: teat      Operator: AND      Rule(s) :       If-match acl 3002      Behavior: teat       Accounting enable:         45 (Packets)   Interface: GigabitEthernet1/0/6   Direction: Outbound   Policy: teat    Classifier: teat      Operator: AND      Rule(s) :       If-match acl 3002      Behavior: teat       Accounting enable:         45 (Packets)   Interface: Ten-GigabitEthernet1/0/6   Direction: Inbound   Policy: teat    Classifier: teat      Operator: AND      Rule(s) :       If-match acl 3002      Behavior: teat       Accounting enable:         45 (Packets)  

佚名 发表时间:2020-05-21 更多>>

网关设置了静态路由的,现在是都能上外网的

zhiliao_OK3fv 发表时间:2020-05-21
回复zhiliao_OK3fv:

测试下,比如vlan 20下终端去ping vlan 100或者vlan 10的地址,能不能通

佚名 发表时间:2020-05-21

可以的,拼这些管理IP都可以ping通,就是这些VLAN 下的客户端ping不通

zhiliao_OK3fv 发表时间:2020-05-21
回复zhiliao_OK3fv:

终端防火墙软件开了?

佚名 发表时间:2020-05-21

没开的,我试过两台设备在同一wlan下是通的

zhiliao_OK3fv 发表时间:2020-05-21
回复zhiliao_OK3fv:

流统看下吧,丢哪了

佚名 发表时间:2020-05-21

这个怎么看的,

zhiliao_OK3fv 发表时间:2020-05-21
回复zhiliao_OK3fv:

流统配置: acl number 3010 rule 1 permit icmp source 10.0.254.26 0 destination 10.0.254.17 0    //10.0.254.26为PING发起源地址,10.0.254.17为PING的目的地址 rule 2 permit icmp source 10.0.254.17 0 destination 10.0.254.26 0  // 源目的调换,用于匹配ICMP回程流量   traffic classifier MQC operator and if-match acl 3010       If-match destination-mac 88df-9e65-67b3 同时匹配mac和vlan       If-match service-vlan-id 1876   traffic behavior MQC accounting packet   qos policy MQC classifier MQC behavior MQC   interface Ten-GigabitEthernet1/0/5    //对应流途径接口 qos apply policy MQC inbound qos apply policy MQC outbound   interface Ten-GigabitEthernet1/0/6     //对应流途径接口 qos apply policy MQC inbound qos apply policy MQC outbound   查看流统: Display  qos policy interface   举例: <H3C>dis qos policy interface   Interface: GigabitEthernet1/0/5                 //该接口inbound计数与G1/0/6接口outbound计数一致,即说明转发未丢包,若inbound计数多于outbound计数,则说明设备侧丢包了     Direction: Inbound   Policy: teat    Classifier: teat      Operator: AND      Rule(s) :       If-match acl 3002      Behavior: teat       Accounting enable:         45 (Packets)   Interface: Ten-GigabitEthernet1/0/5     //该接口outbound计数与G1/0/6接口inbound计数一致,即说明转发未丢包,若inbound计数多于outbound计数,则说明设备侧丢包了     Direction: Outbound   Policy: teat    Classifier: teat      Operator: AND      Rule(s) :       If-match acl 3002      Behavior: teat       Accounting enable:         45 (Packets)   Interface: GigabitEthernet1/0/6   Direction: Outbound   Policy: teat    Classifier: teat      Operator: AND      Rule(s) :       If-match acl 3002      Behavior: teat       Accounting enable:         45 (Packets)   Interface: Ten-GigabitEthernet1/0/6   Direction: Inbound   Policy: teat    Classifier: teat      Operator: AND      Rule(s) :       If-match acl 3002      Behavior: teat       Accounting enable:         45 (Packets)  

佚名 发表时间:2020-05-21
1 个回答
粉丝:112人 关注:1人

配置没有问题,dis ip int bri 看看不通的vlan虚接口是否up,如果没有,找一个不用的端口

配置成trunk口,放行所有vlan或者在其他vlan里面也接一台pc,应该就没有问题了。

虚接口是UP状态,不用端口配置成trunk口,这个请问怎么操作呢,谢谢大神

zhiliao_OK3fv 发表时间:2020-05-21 更多>>

虚接口是UP状态,不用端口配置成trunk口,这个请问怎么操作呢,谢谢大神

zhiliao_OK3fv 发表时间:2020-05-21

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明