Добрый день. Есть вопрос по агрегации между DGS-3024 и Cisco 3560G. Привожу конфиги:
Cisco3560G#sh run Building configuration...
Current configuration : 10960 bytes ! version 12.2 no service pad service timestamps debug uptime service timestamps log datetime service password-encryption service sequence-numbers ! hostname OIT-Cisco3560G ! enable password 7 00000000000000000000000000 ! username room810 password 7 00000000000000000000000000 username room811 privilege 15 password 7 000000000000000000000000000000 username administrator privilege 15 password 7 000000000000000000000000000000000 aaa new-model aaa authentication login default local aaa authorization exec default local ! aaa session-id common clock timezone MSK 4 clock summer-time MSD recurring last Sun Mar 2:00 last Sun Oct 3:00 vtp domain cisco vtp mode transparent ip subnet-zero ip routing ip domain-list bnet ip name-server 172.17.114.231 ! ! ! ! no file verify auto spanning-tree mode pvst spanning-tree extend system-id ! vlan internal allocation policy ascending ! vlan 52 ! vlan 53 name Office ! vlan 54,56 ! vlan 58 name External_Vlan ! vlan 70 name Management_Vlan ! vlan 200 name vlan_200 ! vlan 201 name vlan_201 ! vlan 202 name vlan_202 ! vlan 252 name LAB-net ! vlan 253 name stend-net ! vlan 450 ! vlan 503 name cluster_heartbeats ! vlan 600 name sdfsd ! vlan 870 name OIT_ILO ! vlan 943 name Internet-Bnet-OIT ! interface Loopback0 ip address 192.168.254.22 255.255.255.255 ! interface Port-channel1 description SRV191_NIC_teaming switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk ! interface Port-channel2 description SRV190 NIC teaming switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk ! interface Port-channel3 description SRV167 NIC teaming switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk ! interface Port-channel4 description SRV168 NIC teaming switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk ! interface Port-channel5 description SRV180_NIC_teaming switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk ! interface Port-channel6 description SRV181_NIC_teaming switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk ! interface Port-channel7 switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,200-202,252,253,943 switchport mode trunk ! interface GigabitEthernet0/1 description SRV180_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 5 mode on ! interface GigabitEthernet0/2 description SRV181_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 6 mode on ! interface GigabitEthernet0/3 description SRV180_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 5 mode on ! interface GigabitEthernet0/4 description SRV191_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 1 mode on ! interface GigabitEthernet0/5 description SRV191_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 1 mode on ! interface GigabitEthernet0/6 description to srv228 switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,252 switchport mode trunk ! interface GigabitEthernet0/7 description SRV239 switchport access vlan 53 ! interface GigabitEthernet0/8 description SOV003 switchport access vlan 201 switchport trunk encapsulation dot1q switchport trunk native vlan 201 switchport trunk allowed vlan 53,58,201,252,253 ! interface GigabitEthernet0/9 description Srv107 switchport access vlan 53 ! interface GigabitEthernet0/10 description SRV167_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 3 mode on ! interface GigabitEthernet0/11 description SRV181_NIC_team switchport access vlan 53 switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 6 mode on ! interface GigabitEthernet0/12 description SRV167_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 3 mode on ! interface GigabitEthernet0/13 description SRV168_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 4 mode on ! interface GigabitEthernet0/14 description SRV168_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 4 mode on ! interface GigabitEthernet0/15 description SOV005 switchport access vlan 201 switchport trunk encapsulation dot1q switchport trunk native vlan 201 switchport trunk allowed vlan 53,58,201,252,253 ! interface GigabitEthernet0/16 description Compaqnt switchport access vlan 53 ! interface GigabitEthernet0/17 description SRV190_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 2 mode on ! interface GigabitEthernet0/18 switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,200-202,252,253,943 switchport mode trunk channel-group 7 mode active ! interface GigabitEthernet0/19 description SRV190_NIC_team switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,252,253,503 switchport mode trunk duplex full speed 1000 channel-group 2 mode on ! interface GigabitEthernet0/20 switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,200-202,252,253,943 switchport mode trunk channel-group 7 mode active ! interface GigabitEthernet0/21 description empty ! interface GigabitEthernet0/22 switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,200-202,252,253,943 switchport mode trunk channel-group 7 mode active ! interface GigabitEthernet0/23 description to SHOUT900 switchport access vlan 53 ! interface GigabitEthernet0/24 switchport trunk encapsulation dot1q switchport trunk native vlan 53 switchport trunk allowed vlan 53,58,200-202,252,253,943 switchport mode trunk channel-group 7 mode active ! interface GigabitEthernet0/25 description To CISCO 2960-1 (8 floor) switchport trunk encapsulation dot1q switchport trunk allowed vlan 52-54,56,58,70,253 switchport mode trunk duplex full ! interface GigabitEthernet0/26 description To CISCO 2960-2 (9 floor) switchport trunk encapsulation dot1q switchport trunk allowed vlan 53,54,70 switchport mode trunk duplex full ! interface GigabitEthernet0/27 description to nd001 switchport trunk encapsulation dot1q switchport trunk allowed vlan 53,202 switchport mode trunk ! interface GigabitEthernet0/28 description Internet switchport trunk encapsulation dot1q switchport trunk allowed vlan 943 switchport mode trunk duplex full ! interface Vlan1 no ip address ! interface Vlan52 description free ip address 194.117.65.65 255.255.255.224 ip access-group From_VLan52 in ! interface Vlan53 ip address 172.17.114.253 255.255.252.0 ip access-group From_Office_Workstations_Vlan53 in ! interface Vlan54 description Video_LAN ip address 194.117.65.1 255.255.255.240 ip access-group From_video in ! interface Vlan56 description OPEN-IT_LAN ip address 194.117.65.177 255.255.255.240 ip access-group From_VLan56 in ! interface Vlan58 description - OIT open services - ip address 194.117.85.1 255.255.255.0 ip access-group From_VLan58 in ! interface Vlan70 ip address 192.168.70.1 255.255.255.0 ! interface Vlan200 no ip address ! interface Vlan201 ip address 10.201.0.254 255.255.255.0 ! interface Vlan202 ip address 10.202.0.254 255.255.255.0 ! interface Vlan870 ip address 172.17.111.1 255.255.255.0 ip helper-address 172.17.112.1 ip helper-address 172.17.112.2 no ip proxy-arp ! interface Vlan943 description === Internet === ip address 194.117.66.234 255.255.255.252 ! ip classless ip route 0.0.0.0 0.0.0.0 194.117.66.233 ip http server ip http authentication local ! ip access-list extended From_Office_Workstations_Vlan53 permit ip 172.17.112.100 0.0.0.1 any deny ip 172.17.112.0 0.0.0.255 any permit ip 172.17.112.0 0.0.3.255 any ip access-list extended From_VLan52 deny ip any 172.17.112.0 0.0.3.255 deny ip any 192.168.70.0 0.0.0.255 permit ip any any ip access-list extended From_VLan56 deny ip any 172.17.112.0 0.0.3.255 deny ip any 192.168.70.0 0.0.0.255 permit ip any any ip access-list extended From_VLan58 deny ip any 172.17.112.0 0.0.3.255 deny ip any 192.168.70.0 0.0.0.255 permit ip any any ip access-list extended From_video deny tcp host 194.117.65.2 any eq 1433 deny ip any 172.17.112.0 0.0.3.255 deny ip any 192.168.70.0 0.0.0.255 permit ip any any ! logging history debugging logging trap debugging logging facility local1 logging source-interface Vlan53 logging 172.17.114.238 access-list 25 permit 192.168.70.0 0.0.0.255 access-list 25 permit 172.17.112.0 0.0.3.255 snmp-server community set RO snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart snmp-server enable traps stpx root-inconsistency loop-inconsistency radius-server source-ports 1645-1646 ! control-plane ! privilege exec level 1 ping ip privilege exec level 1 trace ip privilege exec level 1 clear counters ! line con 0 line vty 0 4 access-class 25 in exec-timeout 15 0 password 7 1256 transport input telnet line vty 5 15 access-class 25 in exec-timeout 15 0 password 7 1256 transport input telnet ! ntp clock-period 36029417 ntp source Vlan70 ntp server 172.17.114.231 ! end
Cisco3560G#show version Cisco IOS Software, C3560 Software (C3560-IPBASE-M), Version 12.2(25)SEB4, RELEASE SOFTWARE (fc1) Copyright (c) 1986-2005 by Cisco Systems, Inc. Compiled Tue 30-Aug-05 14:19 by yenanh
ROM: Bootstrap program is C3560 boot loader BOOTLDR: C3560 Boot Loader (C3560-HBOOT-M) Version 12.2(25r)SE1, RELEASE SOFTWARE (fc)
OIT-Cisco3560G uptime is 3 days, 5 hours, 3 minutes System returned to ROM by power-on System image file is "flash:c3560-ipbase-mz.122-25.SEB4/c3560-ipbase-mz.122-25.SEB4.bin"
cisco WS-C3560G-24PS (PowerPC405) processor (revision E0) with 118784K/12280K bytes of memory. Processor board ID FOC000000CB Last reset from power-on 12 Virtual Ethernet interfaces 28 Gigabit Ethernet interfaces The password-recovery mechanism is enabled.
512K bytes of flash-simulated non-volatile configuration memory. Base ethernet MAC Address : 00:00:00:00:00:00 Motherboard assembly number : 0-0000-00 Power supply part number : 000-0000-00 Motherboard serial number : FOC00000000 Power supply serial number : DCA00000000 Model revision number : E0 Motherboard revision number : A0 Model number : WS-C3560G-24PS-S System serial number : FOC00000000 SFP Module assembly part number : 00-0000-00 SFP Module revision Number : A0 SFP Module serial number : CAT00000000 Top Assembly Part Number : 000-00000-00 Top Assembly Revision Number : A0 Version ID : V04 CLEI Code Number : COM000000 Hardware Board Revision Number : 0x05
Switch Ports Model SW Version SW Image ------ ----- ----- ---------- ---------- * 1 28 WS-C3560G-24PS 12.2(25)SEB4 C3560-IPBASE-M
Configuration register is 0xF
DGS-3024:4#show config current_config Command: show config current_config
#------------------------------------------------------------------- # DGS-3024 Configuration # # Firmware: Build 4.01-B01 # Copyright(C) 2003-2004 D-Link Corporation. All rights reserved. #-------------------------------------------------------------------
# BASIC
config serial_port baud_rate 9600 auto_logout 10_minutes enable telnet 23 enable web 80
# STORM
config traffic control storm_type broadcast_multicast_dlf threshold 15000 config traffic control ports 1 state disable config traffic control ports 2 state disable config traffic control ports 3 state disable config traffic control ports 4 state disable config traffic control ports 5 state disable config traffic control ports 6 state disable config traffic control ports 7 state disable config traffic control ports 8 state disable config traffic control ports 9 state disable config traffic control ports 10 state disable config traffic control ports 11 state disable config traffic control ports 12 state disable config traffic control ports 13 state disable config traffic control ports 14 state disable config traffic control ports 15 state disable config traffic control ports 16 state disable config traffic control ports 17 state disable config traffic control ports 18 state disable config traffic control ports 19 state disable config traffic control ports 20 state disable config traffic control ports 21 state disable config traffic control ports 22 state disable config traffic control ports 23 state disable config traffic control ports 24 state disable
# SSH
config ssh algorithm 3DES enable config ssh algorithm AES128 enable config ssh algorithm AES192 enable config ssh algorithm AES256 enable config ssh algorithm arcfour enable config ssh algorithm blowfish enable config ssh algorithm cast128 enable config ssh algorithm twofish128 enable config ssh algorithm twofish192 enable config ssh algorithm twofish256 enable config ssh algorithm MD5 enable config ssh algorithm SHA1 enable config ssh algorithm RSA enable config ssh algorithm DSA enable config ssh authmode hostbased enable config ssh authmode password enable config ssh authmode publickey enable config ssh user administrator authmode Password config ssh server maxsession 8 contimeout 120 authfail 2 rekey never port 22 disable ssh
# SYSLOG
disable syslog
# QOS
config scheduling_mechanism round_robin config scheduling_mechanism round_robin config scheduling_mechanism round_robin config scheduling_mechanism round_robin config scheduling_mechanism round_robin config scheduling_mechanism round_robin config scheduling_mechanism round_robin config scheduling_mechanism round_robin config 802.1p user_priority 0 1 config 802.1p user_priority 1 0 config 802.1p user_priority 2 0 config 802.1p user_priority 3 1 config 802.1p user_priority 4 2 config 802.1p user_priority 5 2 config 802.1p user_priority 6 3 config 802.1p user_priority 7 3 config scheduling 3 max_packet 3 config scheduling 2 max_packet 2 config scheduling 1 max_packet 1 config scheduling 0 max_packet 0 config 802.1p default_priority 1-24 0 config bandwidth_control 1-16,18,20,22-24 rx_rate no_limit
# MIRROR
disable mirror config mirror source port 1 config mirror ingress_target disable config mirror egress_target disable
# SSL
enable ssl ciphersuite RSA_with_RC4_128_MD5 enable ssl ciphersuite RSA_with_3DES_EDE_CBC_SHA enable ssl ciphersuite DHE_DSS_with_3DES_EDE_CBC_SHA enable ssl ciphersuite RSA_EXPORT_with_RC4_40_MD5 disable ssl
# PORT
disable jumbo_frame config ports 1-24 speed auto flow_control disable learning enable state enable
# 8021X
disable 802.1x config 802.1x capability ports 1-24 none config 802.1x auth_parameter ports 1-24 direction both port_control auto quiet_period 60 tx_period 30 supp_timeout 30 server_timeout 30 max_req 2 reauth_period 3600 enable_reauth disable
# SNMPv3
delete snmp community public delete snmp community private delete snmp user initial delete snmp group initial delete snmp view restricted all delete snmp view CommunityView all config snmp engineID 800000ab0300179a79f655 create snmp view restricted 1.3.6.1.2.1.1 view_type included create snmp view restricted 1.3.6.1.2.1.11 view_type included create snmp view restricted 1.3.6.1.6.3.10.2.1 view_type included create snmp view restricted 1.3.6.1.6.3.11.2.1 view_type included create snmp view restricted 1.3.6.1.6.3.15.1.1 view_type included create snmp view CommunityView 1 view_type included create snmp view CommunityView 1.3.6.1.6.3 view_type excluded create snmp view CommunityView 1.3.6.1.6.3.1 view_type included create snmp group public v1 read_view CommunityView notify_view CommunityView create snmp group public v2c read_view CommunityView notify_view CommunityView create snmp group initial v3 noauth_nopriv read_view restricted notify_view restricted create snmp group private v1 read_view CommunityView write_view CommunityView notify_view CommunityView create snmp group private v2c read_view CommunityView write_view CommunityView notify_view CommunityView create snmp community private view CommunityView read_write create snmp community public view CommunityView read_only create snmp user
# MANAGEMENT
enable snmp traps enable snmp authenticate trap disable rmon
# VLAN
config vlan default delete 1-24 config vlan default advertisement enable create vlan vlan_53 tag 53 config vlan vlan_53 add tagged 17,19,21,23-24 config vlan vlan_53 advertisement disable create vlan vlan_58 tag 58 config vlan vlan_58 add tagged 17,19,21,23 config vlan vlan_58 advertisement disable create vlan vlan_200 tag 200 config vlan vlan_200 add tagged 17,19,21,23 config vlan vlan_200 add untagged 1-6 config vlan vlan_200 advertisement disable create vlan vlan_201 tag 201 config vlan vlan_201 add tagged 17,19,21,23 config vlan vlan_201 advertisement disable create vlan vlan_202 tag 202 config vlan vlan_202 add tagged 17,19,21,23-24 config vlan vlan_202 advertisement disable create vlan vlan_252 tag 252 config vlan vlan_252 add tagged 17,19,21,23 config vlan vlan_252 advertisement disable create vlan vlan_253 tag 253 config vlan vlan_253 add tagged 17,19,21,23 config vlan vlan_253 advertisement disable create vlan vlan_943 tag 943 config vlan vlan_943 add tagged 17,19,21,23 config vlan vlan_943 advertisement disable disable gvrp config gvrp 1-6 state disable ingress_checking enable acceptable_frame admit_all pvid 200 config gvrp 7-24 state disable ingress_checking enable acceptable_frame admit_all pvid 1
# FDB
config fdb aging_time minutes 5 config multicast port_filtering_mode forward_unregistered_groups
# MAC_ADDRESS_TABLE_NOTIFICATION
config mac_notification interval 1 historysize 1 disable mac_notification config mac_notification ports 1-24 disable
# STP
config stp version rstp config stp maxage 20 maxhops 20 forwarddelay 15 txholdcount 3 fbpdu enable hellotime 2 lbd enable lbd_recover_timer 60 config stp priority 32768 instance_id 0 config stp mst_config_id name 00:17:9A:79:F6:55 revision_level 0 disable stp config stp ports 1-24 externalCost auto edge false p2p auto state enable lbd disable config stp mst_ports 1-24 instance_id 0 internalCost auto priority 128 config stp ports 1-24 fbpdu enable
# BANNER_PROMP
config command_prompt default config greeting_message default
# SNOOP
disable igmp_snooping config igmp_snooping default host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier default query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier default last_member_query_interval 1 state disable config igmp_snooping vlan_53 host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier vlan_53 query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier vlan_53 last_member_query_interval 1 state disable config igmp_snooping vlan_58 host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier vlan_58 query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier vlan_58 last_member_query_interval 1 state disable config igmp_snooping vlan_200 host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier vlan_200 query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier vlan_200 last_member_query_interval 1 state disable config igmp_snooping vlan_201 host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier vlan_201 query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier vlan_201 last_member_query_interval 1 state disable config igmp_snooping vlan_202 host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier vlan_202 query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier vlan_202 last_member_query_interval 1 state disable config igmp_snooping vlan_252 host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier vlan_252 query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier vlan_252 last_member_query_interval 1 state disable config igmp_snooping vlan_253 host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier vlan_253 query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier vlan_253 last_member_query_interval 1 state disable config igmp_snooping vlan_943 host_timeout 260 router_timeout 260 leave_timer 2 state disable config igmp_snooping querier vlan_943 query_interval 125 max_response_time 10 robustness_variable 2 config igmp_snooping querier vlan_943 last_member_query_interval 1 state disable
# SNTP
disable sntp config time_zone operator + hour 4 min 0 config sntp primary 172.17.112.1 secondary 172.17.112.2 poll-interval 720 config dst disable
# LACP
config link_aggregation algorithm mac_destination create link_aggregation group_id 1 type lacp config link_aggregation group_id 1 master_port 23 ports 17,19,21,23 state enable config lacp_port 1-24 mode passive
# IP
config ipif System vlan vlan_202 ipaddress 10.202.0.3/24 state enable
# ACCESS_AUTHENTICATION_CONTROL
config authen_login default method local config authen_enable default method local_enable config authen application console login default config authen application console enable default config authen application telnet login default config authen application telnet enable default config authen application ssh login default config authen application ssh enable default config authen application http login default config authen application http enable default config authen parameter response_timeout 30 config authen parameter attempt 3 disable authen_policy
# AAA_LOCAL_ENABLE_PASSWORD
config admin local_enable
# ROUTE
create iproute default 10.202.0.254 1
#------------------------------------------------------------------- # End of configuration file for DGS-3024 #-------------------------------------------------------------------
В такой конфигурации ethernet-channel на циске не поднимается (статус Down), каждый порт - член агрегации - статус suspended. Если конфигурацию Dlink отредактировать, сделав его порты 17,19,21,23, участвующие в агрегировании, lacp-активными, у циски ethernet-channel поднимается, но каждый порт - член агрегации статус Down. Тем не менее, я вижу ооочень низкую передачу на портах. Что я могу предположить - это трафик vlan1 \default vlan. Мне же важен трафик в недефолтном вланах, который не проходит по агрегации. Если порты lacp на длинке сделать активными, а на циске пассивными, то ситуация повторяется описанной выше: трафик внутри вланов не идет, на циске ethernet-channel поднимается, но каждый порт - член агрегации статус Down.
Что можно предпринять? Большое спасибо
|