faq обучение настройка
Текущее время: Пн июл 21, 2025 12:04

Часовой пояс: UTC + 3 часа




Начать новую тему Ответить на тему  [ 1 сообщение ] 
Автор Сообщение
 Заголовок сообщения: LACP агрегация DGS-3024 и Cisco 3560G
СообщениеДобавлено: Чт дек 15, 2011 15:25 
Не в сети

Зарегистрирован: Чт дек 15, 2011 11:29
Сообщений: 1
Добрый день. Есть вопрос по агрегации между DGS-3024 и Cisco 3560G. Привожу конфиги:

Cisco3560G#sh run
Building configuration...

Current configuration : 10960 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log datetime
service password-encryption
service sequence-numbers
!
hostname OIT-Cisco3560G
!
enable password 7 00000000000000000000000000
!
username room810 password 7 00000000000000000000000000
username room811 privilege 15 password 7 000000000000000000000000000000
username administrator privilege 15 password 7 000000000000000000000000000000000
aaa new-model
aaa authentication login default local
aaa authorization exec default local
!
aaa session-id common
clock timezone MSK 4
clock summer-time MSD recurring last Sun Mar 2:00 last Sun Oct 3:00
vtp domain cisco
vtp mode transparent
ip subnet-zero
ip routing
ip domain-list bnet
ip name-server 172.17.114.231
!
!
!
!
no file verify auto
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
vlan 52
!
vlan 53
name Office
!
vlan 54,56
!
vlan 58
name External_Vlan
!
vlan 70
name Management_Vlan
!
vlan 200
name vlan_200
!
vlan 201
name vlan_201
!
vlan 202
name vlan_202
!
vlan 252
name LAB-net
!
vlan 253
name stend-net
!
vlan 450
!
vlan 503
name cluster_heartbeats
!
vlan 600
name sdfsd
!
vlan 870
name OIT_ILO
!
vlan 943
name Internet-Bnet-OIT
!
interface Loopback0
ip address 192.168.254.22 255.255.255.255
!
interface Port-channel1
description SRV191_NIC_teaming
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
!
interface Port-channel2
description SRV190 NIC teaming
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
!
interface Port-channel3
description SRV167 NIC teaming
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
!
interface Port-channel4
description SRV168 NIC teaming
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
!
interface Port-channel5
description SRV180_NIC_teaming
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
!
interface Port-channel6
description SRV181_NIC_teaming
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
!
interface Port-channel7
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,200-202,252,253,943
switchport mode trunk
!
interface GigabitEthernet0/1
description SRV180_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 5 mode on
!
interface GigabitEthernet0/2
description SRV181_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 6 mode on
!
interface GigabitEthernet0/3
description SRV180_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 5 mode on
!
interface GigabitEthernet0/4
description SRV191_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 1 mode on
!
interface GigabitEthernet0/5
description SRV191_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 1 mode on
!
interface GigabitEthernet0/6
description to srv228
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,252
switchport mode trunk
!
interface GigabitEthernet0/7
description SRV239
switchport access vlan 53
!
interface GigabitEthernet0/8
description SOV003
switchport access vlan 201
switchport trunk encapsulation dot1q
switchport trunk native vlan 201
switchport trunk allowed vlan 53,58,201,252,253
!
interface GigabitEthernet0/9
description Srv107
switchport access vlan 53
!
interface GigabitEthernet0/10
description SRV167_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 3 mode on
!
interface GigabitEthernet0/11
description SRV181_NIC_team
switchport access vlan 53
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 6 mode on
!
interface GigabitEthernet0/12
description SRV167_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 3 mode on
!
interface GigabitEthernet0/13
description SRV168_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 4 mode on
!
interface GigabitEthernet0/14
description SRV168_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 4 mode on
!
interface GigabitEthernet0/15
description SOV005
switchport access vlan 201
switchport trunk encapsulation dot1q
switchport trunk native vlan 201
switchport trunk allowed vlan 53,58,201,252,253
!
interface GigabitEthernet0/16
description Compaqnt
switchport access vlan 53
!
interface GigabitEthernet0/17
description SRV190_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 2 mode on
!
interface GigabitEthernet0/18
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,200-202,252,253,943
switchport mode trunk
channel-group 7 mode active
!
interface GigabitEthernet0/19
description SRV190_NIC_team
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,252,253,503
switchport mode trunk
duplex full
speed 1000
channel-group 2 mode on
!
interface GigabitEthernet0/20
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,200-202,252,253,943
switchport mode trunk
channel-group 7 mode active
!
interface GigabitEthernet0/21
description empty
!
interface GigabitEthernet0/22
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,200-202,252,253,943
switchport mode trunk
channel-group 7 mode active
!
interface GigabitEthernet0/23
description to SHOUT900
switchport access vlan 53
!
interface GigabitEthernet0/24
switchport trunk encapsulation dot1q
switchport trunk native vlan 53
switchport trunk allowed vlan 53,58,200-202,252,253,943
switchport mode trunk
channel-group 7 mode active
!
interface GigabitEthernet0/25
description To CISCO 2960-1 (8 floor)
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 52-54,56,58,70,253
switchport mode trunk
duplex full
!
interface GigabitEthernet0/26
description To CISCO 2960-2 (9 floor)
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 53,54,70
switchport mode trunk
duplex full
!
interface GigabitEthernet0/27
description to nd001
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 53,202
switchport mode trunk
!
interface GigabitEthernet0/28
description Internet
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 943
switchport mode trunk
duplex full
!
interface Vlan1
no ip address
!
interface Vlan52
description free
ip address 194.117.65.65 255.255.255.224
ip access-group From_VLan52 in
!
interface Vlan53
ip address 172.17.114.253 255.255.252.0
ip access-group From_Office_Workstations_Vlan53 in
!
interface Vlan54
description Video_LAN
ip address 194.117.65.1 255.255.255.240
ip access-group From_video in
!
interface Vlan56
description OPEN-IT_LAN
ip address 194.117.65.177 255.255.255.240
ip access-group From_VLan56 in
!
interface Vlan58
description - OIT open services -
ip address 194.117.85.1 255.255.255.0
ip access-group From_VLan58 in
!
interface Vlan70
ip address 192.168.70.1 255.255.255.0
!
interface Vlan200
no ip address
!
interface Vlan201
ip address 10.201.0.254 255.255.255.0
!
interface Vlan202
ip address 10.202.0.254 255.255.255.0
!
interface Vlan870
ip address 172.17.111.1 255.255.255.0
ip helper-address 172.17.112.1
ip helper-address 172.17.112.2
no ip proxy-arp
!
interface Vlan943
description === Internet ===
ip address 194.117.66.234 255.255.255.252
!
ip classless
ip route 0.0.0.0 0.0.0.0 194.117.66.233
ip http server
ip http authentication local
!
ip access-list extended From_Office_Workstations_Vlan53
permit ip 172.17.112.100 0.0.0.1 any
deny ip 172.17.112.0 0.0.0.255 any
permit ip 172.17.112.0 0.0.3.255 any
ip access-list extended From_VLan52
deny ip any 172.17.112.0 0.0.3.255
deny ip any 192.168.70.0 0.0.0.255
permit ip any any
ip access-list extended From_VLan56
deny ip any 172.17.112.0 0.0.3.255
deny ip any 192.168.70.0 0.0.0.255
permit ip any any
ip access-list extended From_VLan58
deny ip any 172.17.112.0 0.0.3.255
deny ip any 192.168.70.0 0.0.0.255
permit ip any any
ip access-list extended From_video
deny tcp host 194.117.65.2 any eq 1433
deny ip any 172.17.112.0 0.0.3.255
deny ip any 192.168.70.0 0.0.0.255
permit ip any any
!
logging history debugging
logging trap debugging
logging facility local1
logging source-interface Vlan53
logging 172.17.114.238
access-list 25 permit 192.168.70.0 0.0.0.255
access-list 25 permit 172.17.112.0 0.0.3.255
snmp-server community set RO
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps stpx root-inconsistency loop-inconsistency
radius-server source-ports 1645-1646
!
control-plane
!
privilege exec level 1 ping ip
privilege exec level 1 trace ip
privilege exec level 1 clear counters
!
line con 0
line vty 0 4
access-class 25 in
exec-timeout 15 0
password 7 1256
transport input telnet
line vty 5 15
access-class 25 in
exec-timeout 15 0
password 7 1256
transport input telnet
!
ntp clock-period 36029417
ntp source Vlan70
ntp server 172.17.114.231
!
end




Cisco3560G#show version
Cisco IOS Software, C3560 Software (C3560-IPBASE-M), Version 12.2(25)SEB4, RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Tue 30-Aug-05 14:19 by yenanh

ROM: Bootstrap program is C3560 boot loader
BOOTLDR: C3560 Boot Loader (C3560-HBOOT-M) Version 12.2(25r)SE1, RELEASE SOFTWARE (fc)

OIT-Cisco3560G uptime is 3 days, 5 hours, 3 minutes
System returned to ROM by power-on
System image file is "flash:c3560-ipbase-mz.122-25.SEB4/c3560-ipbase-mz.122-25.SEB4.bin"

cisco WS-C3560G-24PS (PowerPC405) processor (revision E0) with 118784K/12280K bytes of memory.
Processor board ID FOC000000CB
Last reset from power-on
12 Virtual Ethernet interfaces
28 Gigabit Ethernet interfaces
The password-recovery mechanism is enabled.

512K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address : 00:00:00:00:00:00
Motherboard assembly number : 0-0000-00
Power supply part number : 000-0000-00
Motherboard serial number : FOC00000000
Power supply serial number : DCA00000000
Model revision number : E0
Motherboard revision number : A0
Model number : WS-C3560G-24PS-S
System serial number : FOC00000000
SFP Module assembly part number : 00-0000-00
SFP Module revision Number : A0
SFP Module serial number : CAT00000000
Top Assembly Part Number : 000-00000-00
Top Assembly Revision Number : A0
Version ID : V04
CLEI Code Number : COM000000
Hardware Board Revision Number : 0x05


Switch Ports Model SW Version SW Image
------ ----- ----- ---------- ----------
* 1 28 WS-C3560G-24PS 12.2(25)SEB4 C3560-IPBASE-M


Configuration register is 0xF




DGS-3024:4#show config current_config
Command: show config current_config

#-------------------------------------------------------------------
# DGS-3024 Configuration
#
# Firmware: Build 4.01-B01
# Copyright(C) 2003-2004 D-Link Corporation. All rights reserved.
#-------------------------------------------------------------------


# BASIC

config serial_port baud_rate 9600 auto_logout 10_minutes
enable telnet 23
enable web 80

# STORM

config traffic control storm_type broadcast_multicast_dlf threshold 15000
config traffic control ports 1 state disable
config traffic control ports 2 state disable
config traffic control ports 3 state disable
config traffic control ports 4 state disable
config traffic control ports 5 state disable
config traffic control ports 6 state disable
config traffic control ports 7 state disable
config traffic control ports 8 state disable
config traffic control ports 9 state disable
config traffic control ports 10 state disable
config traffic control ports 11 state disable
config traffic control ports 12 state disable
config traffic control ports 13 state disable
config traffic control ports 14 state disable
config traffic control ports 15 state disable
config traffic control ports 16 state disable
config traffic control ports 17 state disable
config traffic control ports 18 state disable
config traffic control ports 19 state disable
config traffic control ports 20 state disable
config traffic control ports 21 state disable
config traffic control ports 22 state disable
config traffic control ports 23 state disable
config traffic control ports 24 state disable

# SSH

config ssh algorithm 3DES enable
config ssh algorithm AES128 enable
config ssh algorithm AES192 enable
config ssh algorithm AES256 enable
config ssh algorithm arcfour enable
config ssh algorithm blowfish enable
config ssh algorithm cast128 enable
config ssh algorithm twofish128 enable
config ssh algorithm twofish192 enable
config ssh algorithm twofish256 enable
config ssh algorithm MD5 enable
config ssh algorithm SHA1 enable
config ssh algorithm RSA enable
config ssh algorithm DSA enable
config ssh authmode hostbased enable
config ssh authmode password enable
config ssh authmode publickey enable
config ssh user administrator authmode Password
config ssh server maxsession 8 contimeout 120 authfail 2 rekey never port 22
disable ssh

# SYSLOG

disable syslog

# QOS

config scheduling_mechanism round_robin
config scheduling_mechanism round_robin
config scheduling_mechanism round_robin
config scheduling_mechanism round_robin
config scheduling_mechanism round_robin
config scheduling_mechanism round_robin
config scheduling_mechanism round_robin
config scheduling_mechanism round_robin
config 802.1p user_priority 0 1
config 802.1p user_priority 1 0
config 802.1p user_priority 2 0
config 802.1p user_priority 3 1
config 802.1p user_priority 4 2
config 802.1p user_priority 5 2
config 802.1p user_priority 6 3
config 802.1p user_priority 7 3
config scheduling 3 max_packet 3
config scheduling 2 max_packet 2
config scheduling 1 max_packet 1
config scheduling 0 max_packet 0
config 802.1p default_priority 1-24 0
config bandwidth_control 1-16,18,20,22-24 rx_rate no_limit

# MIRROR

disable mirror
config mirror source port 1
config mirror ingress_target disable
config mirror egress_target disable

# SSL

enable ssl ciphersuite RSA_with_RC4_128_MD5
enable ssl ciphersuite RSA_with_3DES_EDE_CBC_SHA
enable ssl ciphersuite DHE_DSS_with_3DES_EDE_CBC_SHA
enable ssl ciphersuite RSA_EXPORT_with_RC4_40_MD5
disable ssl

# PORT

disable jumbo_frame
config ports 1-24 speed auto flow_control disable learning enable state enable

# 8021X

disable 802.1x
config 802.1x capability ports 1-24 none
config 802.1x auth_parameter ports 1-24 direction both port_control auto quiet_period 60 tx_period 30 supp_timeout 30 server_timeout 30 max_req 2 reauth_period 3600 enable_reauth disable

# SNMPv3

delete snmp community public
delete snmp community private
delete snmp user initial
delete snmp group initial
delete snmp view restricted all
delete snmp view CommunityView all
config snmp engineID 800000ab0300179a79f655
create snmp view restricted 1.3.6.1.2.1.1 view_type included
create snmp view restricted 1.3.6.1.2.1.11 view_type included
create snmp view restricted 1.3.6.1.6.3.10.2.1 view_type included
create snmp view restricted 1.3.6.1.6.3.11.2.1 view_type included
create snmp view restricted 1.3.6.1.6.3.15.1.1 view_type included
create snmp view CommunityView 1 view_type included
create snmp view CommunityView 1.3.6.1.6.3 view_type excluded
create snmp view CommunityView 1.3.6.1.6.3.1 view_type included
create snmp group public v1 read_view CommunityView notify_view CommunityView
create snmp group public v2c read_view CommunityView notify_view CommunityView
create snmp group initial v3 noauth_nopriv read_view restricted notify_view restricted
create snmp group private v1 read_view CommunityView write_view CommunityView notify_view CommunityView
create snmp group private v2c read_view CommunityView write_view CommunityView notify_view CommunityView
create snmp community private view CommunityView read_write
create snmp community public view CommunityView read_only
create snmp user

# MANAGEMENT

enable snmp traps
enable snmp authenticate trap
disable rmon

# VLAN

config vlan default delete 1-24
config vlan default advertisement enable
create vlan vlan_53 tag 53
config vlan vlan_53 add tagged 17,19,21,23-24
config vlan vlan_53 advertisement disable
create vlan vlan_58 tag 58
config vlan vlan_58 add tagged 17,19,21,23
config vlan vlan_58 advertisement disable
create vlan vlan_200 tag 200
config vlan vlan_200 add tagged 17,19,21,23
config vlan vlan_200 add untagged 1-6
config vlan vlan_200 advertisement disable
create vlan vlan_201 tag 201
config vlan vlan_201 add tagged 17,19,21,23
config vlan vlan_201 advertisement disable
create vlan vlan_202 tag 202
config vlan vlan_202 add tagged 17,19,21,23-24
config vlan vlan_202 advertisement disable
create vlan vlan_252 tag 252
config vlan vlan_252 add tagged 17,19,21,23
config vlan vlan_252 advertisement disable
create vlan vlan_253 tag 253
config vlan vlan_253 add tagged 17,19,21,23
config vlan vlan_253 advertisement disable
create vlan vlan_943 tag 943
config vlan vlan_943 add tagged 17,19,21,23
config vlan vlan_943 advertisement disable
disable gvrp
config gvrp 1-6 state disable ingress_checking enable acceptable_frame admit_all pvid 200
config gvrp 7-24 state disable ingress_checking enable acceptable_frame admit_all pvid 1

# FDB

config fdb aging_time minutes 5
config multicast port_filtering_mode forward_unregistered_groups

# MAC_ADDRESS_TABLE_NOTIFICATION

config mac_notification interval 1 historysize 1
disable mac_notification
config mac_notification ports 1-24 disable

# STP

config stp version rstp
config stp maxage 20 maxhops 20 forwarddelay 15 txholdcount 3 fbpdu enable hellotime 2 lbd enable lbd_recover_timer 60
config stp priority 32768 instance_id 0
config stp mst_config_id name 00:17:9A:79:F6:55 revision_level 0
disable stp
config stp ports 1-24 externalCost auto edge false p2p auto state enable lbd disable
config stp mst_ports 1-24 instance_id 0 internalCost auto priority 128
config stp ports 1-24 fbpdu enable

# BANNER_PROMP

config command_prompt default
config greeting_message default

# SNOOP

disable igmp_snooping
config igmp_snooping default host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier default query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier default last_member_query_interval 1 state disable
config igmp_snooping vlan_53 host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier vlan_53 query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier vlan_53 last_member_query_interval 1 state disable
config igmp_snooping vlan_58 host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier vlan_58 query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier vlan_58 last_member_query_interval 1 state disable
config igmp_snooping vlan_200 host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier vlan_200 query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier vlan_200 last_member_query_interval 1 state disable
config igmp_snooping vlan_201 host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier vlan_201 query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier vlan_201 last_member_query_interval 1 state disable
config igmp_snooping vlan_202 host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier vlan_202 query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier vlan_202 last_member_query_interval 1 state disable
config igmp_snooping vlan_252 host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier vlan_252 query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier vlan_252 last_member_query_interval 1 state disable
config igmp_snooping vlan_253 host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier vlan_253 query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier vlan_253 last_member_query_interval 1 state disable
config igmp_snooping vlan_943 host_timeout 260 router_timeout 260 leave_timer 2 state disable
config igmp_snooping querier vlan_943 query_interval 125 max_response_time 10 robustness_variable 2
config igmp_snooping querier vlan_943 last_member_query_interval 1 state disable

# SNTP

disable sntp
config time_zone operator + hour 4 min 0
config sntp primary 172.17.112.1 secondary 172.17.112.2 poll-interval 720
config dst disable

# LACP

config link_aggregation algorithm mac_destination
create link_aggregation group_id 1 type lacp
config link_aggregation group_id 1 master_port 23 ports 17,19,21,23 state enable
config lacp_port 1-24 mode passive

# IP

config ipif System vlan vlan_202 ipaddress 10.202.0.3/24 state enable

# ACCESS_AUTHENTICATION_CONTROL

config authen_login default method local
config authen_enable default method local_enable
config authen application console login default
config authen application console enable default
config authen application telnet login default
config authen application telnet enable default
config authen application ssh login default
config authen application ssh enable default
config authen application http login default
config authen application http enable default
config authen parameter response_timeout 30
config authen parameter attempt 3
disable authen_policy

# AAA_LOCAL_ENABLE_PASSWORD

config admin local_enable




# ROUTE

create iproute default 10.202.0.254 1

#-------------------------------------------------------------------
# End of configuration file for DGS-3024
#-------------------------------------------------------------------


В такой конфигурации ethernet-channel на циске не поднимается (статус Down), каждый порт - член агрегации - статус suspended.
Если конфигурацию Dlink отредактировать, сделав его порты 17,19,21,23, участвующие в агрегировании, lacp-активными, у циски ethernet-channel поднимается, но каждый порт - член агрегации статус Down. Тем не менее, я вижу ооочень низкую передачу на портах. Что я могу предположить - это трафик vlan1 \default vlan. Мне же важен трафик в недефолтном вланах, который не проходит по агрегации.
Если порты lacp на длинке сделать активными, а на циске пассивными, то ситуация повторяется описанной выше: трафик внутри вланов не идет, на циске ethernet-channel поднимается, но каждый порт - член агрегации статус Down.

Что можно предпринять? Большое спасибо


Вернуться наверх
 Профиль  
 
Показать сообщения за:  Сортировать по:  
Начать новую тему Ответить на тему  [ 1 сообщение ] 

Часовой пояс: UTC + 3 часа


Кто сейчас на форуме

Сейчас этот форум просматривают: Ivan Karbovskii и гости: 13


Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете добавлять вложения

Найти:
Перейти:  
Создано на основе phpBB® Forum Software © phpBB Group
Русская поддержка phpBB