Comware Based
cancel
Showing results for 
Search instead for 
Did you mean: 

3com 4800G & HP network

 
arachna
Occasional Visitor

3com 4800G & HP network

This is my first post :)



Ok here it is.I am having problem with inter vlan routing in my network.The core switch is 3com 4800g and other switches are mixed HP 2610 pwr ,HP 2626 pwr and HP 2626 without pwr in total there is one 3com and 23 HP's



On HP i managed to bring up vlans and they are working corectly but only in its own subnet and across network.Can anybody tell me how to manage inter vlan routing.I have 8 VLANs.



Below is current config of 3com.



192.168.80.254 is default gateway to internet



192.168.80.80 is juniper for VPN connection to remote location



192.168.80.31 is 3com



 



******************************************************************************


* Copyright (c) 2004-2008 3Com Corp. and its licensors. All rights reserved. *


* This software is protected by copyright law and international treaties.    *


* Without the prior written permission of 3Com Corporation and its licensors,*


* any reproduction republication, redistribution, decompiling, reverse       *


* engineering is strictly prohibited. Any unauthorized use of this software  *


* or any portion of it may result in severe civil and criminal penalties, and*


* will be prosecuted to the maximum extent possible under the applicable law.*


******************************************************************************








Login authentication








Username:manager


Password:


<4800G>dis


<4800G>display ru


<4800G>display curr


<4800G>display current-configuration


#


 version 5.20 Release 2102P02, Release 2102P02


#


 sysname 4800G


#


 domain default enable system


#


 telnet server enable


#


 undo cluster enable


#


 port-security enable


#


igmp-snooping


#


vlan 1


 description DEFAULT_VLAN


 igmp-snooping enable


#


vlan 10


 description VLAN 10


 ip-subnet-vlan 10 ip 192.168.90.0 255.255.255.0


#


vlan 20


 description VLAN 20


 ip-subnet-vlan 0 ip 192.168.100.0 255.255.255.0


#


vlan 30


 description VLAN 30


 ip-subnet-vlan 0 ip 192.168.101.0 255.255.255.0


#


vlan 102


 description VLAN 102


 ip-subnet-vlan 0 ip 192.168.102.0 255.255.255.0


#


vlan 103


 description VLAN 103


 ip-subnet-vlan 0 ip 192.168.103.0 255.255.255.0


#


vlan 104


 description VLAN 104


 ip-subnet-vlan 0 ip 192.168.104.0 255.255.255.0


#


vlan 105


 description VLAN 105


 ip-subnet-vlan 0 ip 192.168.105.0 255.255.255.0


#


radius scheme system


 server-type extended


 primary authentication 127.0.0.1 1645


 primary accounting 127.0.0.1 1646


 user-name-format without-domain


#


domain system


 access-limit disable


 state active


 idle-cut disable


 self-service-url disable


#


local-user admin


 service-type telnet terminal


 level 3


local-user manager


 password simple manager


 service-type telnet terminal


 level 2


local-user monitor


 password simple monitor


 service-type telnet terminal


 level 1


#


interface NULL0


#


interface Vlan-interface1


 ip address 192.168.80.31 255.255.255.0


#


interface Vlan-interface10


 ip address 192.168.90.254 255.255.255.0


#


interface Vlan-interface20


 ip address 192.168.100.254 255.255.255.0


#


interface Vlan-interface30


 ip address 192.168.101.254 255.255.255.0


#


interface Vlan-interface102


 ip address 192.168.102.254 255.255.255.0


#


interface Vlan-interface103


 ip address 192.168.103.254 255.255.255.0


#


interface Vlan-interface104


 ip address 192.168.104.254 255.255.255.0


#


interface Vlan-interface105


 ip address 192.168.105.254 255.255.255.0


#


interface GigabitEthernet1/0/1


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/2


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/3


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/4


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/5


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/6


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/7


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/8


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/9


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/10


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/11


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/12


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/13


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/14


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/15


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/16


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/17


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 shutdown


 stp edged-port enable


#


interface GigabitEthernet1/0/18


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 shutdown


 stp edged-port enable


#


interface GigabitEthernet1/0/19


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 shutdown


 stp edged-port enable


#


interface GigabitEthernet1/0/20


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 shutdown


 stp edged-port enable


#


interface GigabitEthernet1/0/21


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 shutdown


 stp edged-port enable


#


interface GigabitEthernet1/0/22


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 shutdown


 stp edged-port enable


#


interface GigabitEthernet1/0/23


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 shutdown


 stp edged-port enable


#


interface GigabitEthernet1/0/24


 port link-type hybrid


 port hybrid vlan 10 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 shutdown


 stp edged-port enable


#


interface GigabitEthernet1/0/25


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 stp edged-port enable


#


interface GigabitEthernet1/0/26


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/27


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/28


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


 broadcast-suppression pps 3000


 undo jumboframe enable


 stp edged-port enable


#


interface GigabitEthernet1/0/29


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


#


interface GigabitEthernet1/0/30


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


#


interface GigabitEthernet1/0/31


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


#


interface GigabitEthernet1/0/32


 port link-type hybrid


 port hybrid vlan 10 20 30 102 to 105 tagged


 port hybrid vlan 1 untagged


#


 ip route-static 0.0.0.0 0.0.0.0 192.168.80.254


 ip route-static 192.168.10.0 255.255.255.0 192.168.80.80


 ip route-static 192.168.80.0 255.255.255.0 192.168.80.31


 ip route-static 192.168.81.0 255.255.255.0 192.168.80.80


 ip route-static 192.168.90.0 255.255.255.0 192.168.90.254


 ip route-static 192.168.100.0 255.255.255.0 192.168.100.254


 ip route-static 192.168.101.0 255.255.255.0 192.168.101.254


 ip route-static 192.168.102.0 255.255.255.0 192.168.102.254


 ip route-static 192.168.103.0 255.255.255.0 192.168.103.254


 ip route-static 192.168.104.0 255.255.255.0 192.168.104.254


 ip route-static 192.168.105.0 255.255.255.0 192.168.105.254


#


 snmp-agent


 snmp-agent local-engineid 8000002B03002473317741


 snmp-agent community read public


 snmp-agent community write private


 snmp-agent sys-info version all


#


 load xml-configuration


#


user-interface aux 0


 authentication-mode scheme


user-interface vty 0 4


 authentication-mode scheme


#


return


<4800G>



 



tnx in advance



2 REPLIES
Rob_Korn
Advisor

Re: 3com 4800G & HP network

 Welcome aboard...



I am not a "routing expert" so please bear with me.



What I didn't understand in your post was what routing you wish to do.  If you look at your config, the section on the "route" commands, you will see that you defined the address of the vlan int in the switch as the default route for each of the segments/vlans.  But I don't see where the traffic is supposed to go from there.



 



For example, if you were trying to all of the vlans to the same segment - say the one with internet access - then in your "route" commands you would want to define that interface.  



 



ip route-static 0.0.0.0 0.0.0.0 192.168.80.254   <-- your path to internet





 ip route-static 192.168.10.0 255.255.255.0 192.168.80.80  <--- Wouldn't you want this to also be the 80.254, thus the packet is routed from 10.0 to 80.254 interface and then internet beyond?





 ip route-static 192.168.80.0 255.255.255.0 192.168.80.31  <-  route to 3com switch?





 ip route-static 192.168.81.0 255.255.255.0 192.168.80.80  <-- route to VPN box




Do you see what is confusing me?  



Check out "3Com Stackable Switch Family Advanced Configuration Guide" , it has some good chapters on the routing setups including RIP and OSPF.



 



Sorry if I didn't help any.... I am learning this myself.



ROb.



 



 



arachna
Occasional Visitor

Re: 3com 4800G & HP network

What I didn't understand in your post was what routing you wish to do.  If you look at your config, the section on the "route" commands, you will see that you defined the address of the vlan int in the switch as the default route for each of the segments/vlans.  But I don't see where the traffic is supposed to go from there.




For example, if you were trying to all of the vlans to the same segment - say the one with internet access - then in your "route" commands you would want to define that interface.   



ip route-static 0.0.0.0 0.0.0.0 192.168.80.254   <-- your path to internet




ip route-static 192.168.10.0 255.255.255.0 192.168.80.80  <--- Wouldn't you want this to also be the 80.254, thus the packet is routed from 10.0 to 80.254 interface and then internet beyond?




ip route-static 192.168.80.0 255.255.255.0 192.168.80.31  <-  route to 3com switch?




ip route-static 192.168.81.0 255.255.255.0 192.168.80.80  <-- route to VPN box




Do you see what is confusing me?




 



OK



first tnx for your aswer



192.168.80.254 is default gateway and i cant access it beacouse it is router from internet provider and a dont have user/pass combination



192.168.10.0/24 is remote location in another city and it is connected through juniper on adress 192.168.80.80



192.168.81.0/24 same thing like 192.168.10.0/24



Would it make any difference if i change route 192.168.80.0/24 from 192.168.80.31 to 192.168.80.254



I would like that all vlans are conected to internet and only some of them to see eachoder.Today I started to create plan for VLANs and it looks like this



vlan80    192.168.80.0/24   manage vlan ,routers ,switches, servers, Avaya Communication server , IT Computers,must see all vlans


vlan90    192.168.90.0/24   Domain users , must see vlan 80 and vlan 110


vlan100 192.168.100.0 /24 toll gates must see vlan80 (192.168.80.254) for internet and toll gates server


vlan110 192.168.110.0 /24 printers,POS hardware must see vlan80 (192.168.80.254) for internet and servers


vlan120 192.168.120.0 /24 Video surveilance must see vlan80 (192.168.80.254) for internet


vlan130 192.168.130.0 /24 IP phones, must see vlan80 (192.168.80.200-201) for Avaya Comm server


vlan140 192.168.140.0 /24 IP phones, must see vlan80 (192.168.80.200-201) for Avaya Comm server


vlan150 192.168.150.0 /24 WIFI must see vlan80 (192.168.80.254) for internet


vlan160 192.168.160.0/24  audio streaming must see vlan80 (192.168.80.254) for internet


vlan170 192.168.170.0/24  reserved must see vlan80 (192.168.80.254) for internet


vlan180 192.168.180.0/24  reserved must see vlan80 (192.168.80.254) for internet


vlan190 192.168.190.0/24  reserved must see vlan80 (192.168.80.254) for internet



i wonder can someone tell me routes that i must deploy in order to make this to work?



tnx in advance