跳到主要內容

Brocade ICX6430 Switch 啟用 DHCP Snooping

Brocade ICX6430 Switch 啟用 DHCP Snooping

假設我的DHCP Server接在24 Port,其他Port不允許有DHCP Server


ICX6430-24 Switch>enable
No password has been assigned yet...
ICX6430-24 Switch#configure terminal
ICX6430-24 Switch(config)#ip dhcp snooping vlan 1
ICX6430-24 Switch(config)#interface ethernet 1/1/24
ICX6430-24 Switch(config-if-e1000-1/1/24)#dhcp snooping trust


預設Spanning Tree是開啟的,我把Port 9與Port 11接成Loop

ICX6430-24 Switch#show span

STP instance owned by VLAN 1

Global STP (IEEE 802.1D) Parameters:

     Root             Root Root   Prio Max He- Ho- Fwd Last    Chg Bridge
      ID              Cost Port   rity Age llo ld  dly Chang   cnt Address
                                  Hex  sec sec sec sec sec
     8000cc4e2434dda0 0    Root   8000 20  2   1   15  6       2   cc4e2434dda0

Port STP Parameters:

Port   Prio Path  State       Fwd    Design  Designated       Designated
Num    rity Cost              Trans  Cost    Root             Bridge
       Hex
1/1/1  80   4     DISABLED    1      0       8000cc4e2434dda0 8000cc4e2434dda0
1/1/2  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/3  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/4  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/5  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/6  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/7  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/8  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/9  80   4     LEARNING    0      0       8000cc4e2434dda0 8000cc4e2434dda0
1/1/10 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/11 80   4     BLOCKING    0      0       8000cc4e2434dda0 8000cc4e2434dda0
1/1/12 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/13 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/14 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/15 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/16 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/17 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/18 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/19 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/20 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/21 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/22 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/23 80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/1/24 80   4     DISABLED    1      0       8000cc4e2434dda0 8000cc4e2434dda0
1/2/1  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/2/2  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/2/3  80   0     DISABLED    0      0       0000000000000000 0000000000000000
1/2/4  80   0     DISABLED    0      0       0000000000000000 0000000000000000

留言

這個網誌中的熱門文章

使用Cisco L3 Switch做VLAN的Routing

目標: 讓VLAN100與VLAN200的電腦透過L3 Swtich做VLAN的Routing,並且可以互相存取資源與上網,另外再使用Windows Server 2012配發VLAN100,VLAN200的IP Firewall: 使用ASUS AP當Firewall,並設兩條Static Route Switch: Core Switch為Cisco 3750切VLAN 10,VLAN100,VLAN200,VLAN10為預設的VLAN,VLAN100為Sales,VLAN200為RD Edge Switch為Cisco 3750與2950,其中2950為VLAN100,3750為VLAN200,如果要By Port切VLAN也可以,這裡只是為了方便說明,所以Edge Switch都直接設為單一VLAN Core Switch的設定 原本我只想Show Running-config其中比較重要的設定,後來想想還是全部列出,用紅色標記重要的設定 Gi 1/0/1接2950 Gi 1/0/2接3750 Gi 1/0/24接Router Core-3750#show running-config Building configuration... Current configuration : 2436 bytes ! version 12.2 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Core-3750 ! boot-start-marker boot-end-marker ! ! ! ! no aaa new-model switch 1 provision ws-c3750g-24t system mtu routing 1546 ip routing no ip domain-lookup ! ! ! ! ! ! ! ! spanning-tree mode pvst spanning-tree portfas...

Cisco Switch 發生Loopback

User告知網路無法使用,看了Switch的狀況後,發現那個Port的狀態是Error Disable,接著又看了Switch的log Feb  8 12:14:14 TW: %DHCP_SNOOPING-5-DHCP_SNOOPING_UNTRUSTED_PORT: DHCP_SNOOPING drop message on untrusted port, message type: DHCPNAK, MAC sa: 2c56.dc86.xxxx Feb  8 12:15:49 TW: %DHCP_SNOOPING-5-DHCP_SNOOPING_UNTRUSTED_PORT: DHCP_SNOOPING drop message on untrusted port, message type: DHCPNAK, MAC sa: 2c56.dc86.xxxx Feb  8 12:18:00 TW: %ETHCNTR-3-LOOP_BACK_DETECTED: Keepalive packet loop-back detected on FastEthernet0/10. Feb  8 12:18:00 TW: %PM-4-ERR_DISABLE: loopback error detected on Fa0/10, putting Fa0/10 in err-disable state Feb  8 12:18:01 TW: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to down Feb  8 12:18:02 TW: %LINK-3-UPDOWN: Interface FastEthernet0/10, changed state to down 應該是User私接設備,除了造成Loopback之外,又在隨便發放IP....... 不過因為那個User比較特殊,先教育了一下之後,再把那個Port shutdown , no shutdown,接著把Recovery設了上去,下次如果再遇到相同狀況,10分鐘後會自動恢復 xxx...

2台 Vigor 2920建立 LAN To LAN VPN (IPsec)

我有兩台Vigor 2920,環境如下: Vigor B 撥出 LAN:192.168.1.0/24 Vigor A 撥入 LAN:172.16.1.0/24 設定如下: Vigor B設定 Vigor A設定 詳細設定請參考官網 http://www.draytek.com/index.php?option=com_k2&view=item&id=2666&Itemid=264&lang=tw