HPE Aruba Networking & ProVision-based
1823377 Members
2555 Online
109654 Solutions
New Discussion

Connecting another network to an Aruba switch

 
WernerReiche
Occasional Contributor

Connecting another network to an Aruba switch

I have a HP Aruba switch already configured with several vlans - 192.168.14/24, 192.168.15/24, 192.168.16/24.  Now I would like to connect a separate network to this switch.  I would be accepting traffic from several vlans - 192.168.21/24 to 192.168.42/24, 192.168.52/24, 192.168.55/24 and 192.168.66/24.

How would be the best way to go about this?  Create a vlan on the 192.168.14/24 network with a netmask of 255.255.0.0 and connect the outside network to a port on that vlan?

If I need a router in between the switches, I do have a CISCO 2921 that I could use, but I don't think that should be necessary.

My knowlege of networking is somewhat limited.  I don't think this is a complex problem, but I don't know offhand the best solution.  Normally I have a "networks guy" that looked after issues like this, but he has left our organisation I and I can't wait for on his replacement to be hired for this.

Thanks in advance,

Werner

 

7 REPLIES 7
parnassus
Honored Contributor

Re: Connecting another network to an Aruba switch

Hello Werner


@WernerReiche wrote: I have a HP Aruba switch already configured with several vlans - 192.168.14/24, 192.168.15/24, 192.168.16/24.  Now I would like to connect a separate network to this switch.

First of all: who is responsible for IP routing on your network? in other terms...who lets an host on a VLAN X to speak with another host on a VLAN Y? is the Aruba switch (which model?)?


I'm not an HPE Employee
Kudos and Accepted Solution banner
WernerReiche
Occasional Contributor

Re: Connecting another network to an Aruba switch

The switch is a JL072A (Aruba E3810M).   This is a system we are deploying at a client site, so the networking within this switch is all within our control.  We connect to external systems through a cisco router.  My previously noted "networks guy" set this up.  I did the original setup for this 8 years ago and didn't use any VLANs - he's looked after it since then. The guy is/was pretty smart - but liked doing things in excessively complicated ways because it was "proper".  I take it from your comment that cross VLAN communications is not as an acceptable practice as I have been told.

Normally this is isolated from other networks and connects only to specific servers via the CISCO router, but in this case, they want it connected to their LAN as many of the workstations are at remote sites and are only connected to this site via the LAN.  Each remote site has it's own subnet - that's why I have workstations connecting via the IT network (LAN).

I've included the switch config below.

ports 1-12 are the servers.

1-4 are on the 192.168.14 subnet

5-8 are on the 192.168.15 subnet

9-12 are on the 192.168.16 subnet (this is used for clustering and shouldn't be accessed by any workstations or other servers).

13-18 are ip devices on the 192.168.14 subnet

19-20 are NTP servers on the  192.168.14 subnet

23-26 are external machines on the 192.168.12 subnet.

>>> Similar to ports 23-26, I was going to create another VLAN - for port 27, for example on its own VLAN.

Workstations are all on the 192.168.13 subnet and are attached to ports in vlan 1031.

These workstations need to access the servers on the 192.168.14 and 192.168.15 subnets.

=================================================================

; JL072A Configuration Editor; Created on release #KB.16.05.0007
; Ver #12:08.1d.fb.7f.bf.bb.ff.7c.59.fc.7b.ff.ff.fc.ff.ff.3f.ef:f6

hostname "idscoresw1"
module 1 type jl072x
module 2 type jl072y
trunk 1 trk1 dt-lacp
trunk 2 trk2 dt-lacp
trunk 3 trk3 dt-lacp
trunk 4 trk4 dt-lacp
trunk 5 trk5 dt-lacp
trunk 6 trk6 dt-lacp
trunk 7 trk7 dt-lacp
trunk 8 trk8 dt-lacp
trunk 9 trk9 dt-lacp
trunk 10 trk10 dt-lacp
trunk 11 trk11 dt-lacp
trunk 12 trk12 dt-lacp
trunk 47-48 trk100 trunk
no telnet-server
web-management
ip ssh filetransfer
ip route 1.1.1.0 255.255.255.0 192.168.14.5
ip route 10.10.101.0 255.255.255.0 192.168.14.5
ip route 10.10.104.0 255.255.255.0 192.168.14.5
ip route 10.48.164.0 255.255.255.0 192.168.14.5
ip route 172.16.10.0 255.255.255.0 192.168.14.5
ip route 192.168.39.0 255.255.255.0 192.168.14.5
ip route 192.168.60.0 255.255.255.0 192.168.14.5
---
no ip route 192.168.15.0 255.255.255.0 192.168.15.2
ip routing
switch-interconnect trk100
interface 1
   name "SW1.01 - ubiua1.eth0"
   exit
interface 2
   name "SW1.02 - ubiua2.eth0"
   exit
interface 3
   name "SW1.03 - ubimta1.eth0"
   exit
interface 4
   name "SW1.04 - ubimta2.eth0"
   exit
interface 5
   name "SW1.05 - aimweb1.eth0"
   exit
interface 6
   name "SW1.06 - aimweb2.eth0"
   exit
interface 7
   name "SW1.07 - aimdb1.eth0"
   exit
interface 8
   name "SW1.08 - aimdb2.eth0"
   exit
interface 9
   name "SW1.09 - aimweb1.eth2"
   exit
interface 10
   name "SW1.10  - aimweb2.eth2"
   exit
interface 11
   name "SW1.11 - aimdb1.eth2"
   exit
interface 12
   name "SW1.12 - aimdb2.eth2"
   exit
interface 13
   name "SW1.13 - CADMOS1.eth0"
   exit
interface 14
   name "SW1.14 - CADMOS2.eth0"
   exit
interface 15
   name "SW1.15 - CADMOS3.eth0"
   exit
interface 16
   name "SW1.16 - CADMOS4.eth0"
   exit
interface 17
   name "SW1.17 - CADMOS5.eth0"
   exit
interface 18
   name "SW1.18 - CADMOS6.eth0"
   exit
interface 19
   name "SW1.19 - NTP 1 port 1"
   exit
interface 20
   name "SW1.20 - NTP 2 port 1"
   exit
interface 21
   name "SW1.21 - CISCO SW1 0/0"
   exit
interface 22
   name "SW1.22 - CISCO SW2 0/0"
   exit
interface 23
   name "SW1.23 - FDPS/XXXX"
   exit
interface 24
   name "SW1.24 - FDPS/XXXX"
   exit
interface 25
   name "SW1.25 - FDPS/XXXX"
   exit
interface 26
   name "SW1.26 - FDPS/XXXX"
   exit
interface 27
   name "---unused---"
   exit
interface 28
   name "---unused---"
   exit
interface 29
   name "---unused---"
   exit
interface 30
   name "---unused---"
   exit
interface 31
   name "---unused---"
   exit
interface 32
   name "---unused---"
   exit
interface 33
   name "---unused---"
   exit
interface 34
   name "---unused---"
   exit
interface 35
   name "SW1.35 - REMOTE WS1"
   exit
interface 36
   name "SW1.36 - REMOTE WS2"
   exit
interface 37
   name "SW1.37 - REMOTE WS3"
   exit
interface 38
   name "SW1.38 - REMOTE WS4"
   exit
interface 39
   name "SW1.39 - REMOTE WS5"
   exit
interface 40
   name "SW1.40 - REMOTE WS6"
   exit
interface 41
   name "SW1.41 - REMOTE WS7"
   exit
interface 42
   name "SW1.42 - REMOTE WS8"
   exit
interface 43
   name "SW1.43 - REMOTE WS9"
   exit
interface 44
   name "SW1.44 - REMOTE WS10"
   exit
interface 45
   name "technician port"
   exit
interface 46
   name "SW1.46/SW2.46 - Peer Keepalive"
   exit
interface 47
   name "SW1.47/SW2.47 - Interswitch Trunk"
   exit
interface 48
   name "SW1.48/SW2.48 - Interswitch Trunk"
   exit
interface Trk1
   unknown-vlans disable
   exit
interface Trk2
   unknown-vlans disable
   exit
interface Trk3
   unknown-vlans disable
   exit
interface Trk4
   unknown-vlans disable
   exit
interface Trk5
   unknown-vlans disable
   exit
interface Trk6
   unknown-vlans disable
   exit
interface Trk7
   unknown-vlans disable
   exit
interface Trk8
   unknown-vlans disable
   exit
interface Trk9
   unknown-vlans disable
   exit
interface Trk10
   unknown-vlans disable
   exit
interface Trk11
   unknown-vlans disable
   exit
interface Trk12
   unknown-vlans disable
   exit
snmp-server community "public_ids" operator unrestricted
oobm
   no ip address
   exit
router vrrp
   virtual-ip-ping
   exit
vlan 1
   name "DEFAULT_VLAN"
   no untagged 13-46,Trk1-Trk12
   untagged Trk100
   no ip address
   exit
vlan 1000
   name "IDS_MGNT"
   tagged Trk100
   ip address 192.168.1.1 255.255.255.0
   exit
vlan 1001
   name "AMHS_PUBLIC"
   untagged 13-22,27-34,45-46,Trk1-Trk4
   tagged Trk100
   ip address 192.168.14.1 255.255.255.0
   vrrp vrid 101
      virtual-ip-address 192.168.14.1
      priority 255
      enable
      exit
   exit
vlan 1005
   name "AIM_PUBLIC"
   untagged Trk5-Trk8
   tagged Trk100
   ip address 192.168.15.1 255.255.255.0
   vrrp vrid 105
      virtual-ip-address 192.168.15.1
      priority 255
      enable
      exit
   exit
vlan 1006
   name "AIM_CLUSTER"
   untagged Trk9-Trk12
   tagged Trk100
   ip address 192.168.16.1 255.255.255.0
   vrrp vrid 106
      virtual-ip-address 192.168.16.1
      priority 255
      enable
      exit
   exit
vlan 1021
   name "EXTERNAL_FDPS"
   untagged 23-26
   tagged Trk100
   ip address 192.168.12.83 255.255.255.0
   exit
vlan 1024
   name "VLAN1024"
   tagged Trk100
   no ip address
   exit
vlan 1031
   name "WS_LOCAL"
   untagged 35-44
   tagged Trk100
   ip address 192.168.13.1 255.255.255.0
   exit
vlan 1049
   name "IDS_iLO"
   tagged Trk100
   ip address 192.168.2.1 255.255.255.0
   vrrp vrid 149
      virtual-ip-address 192.168.2.1
      priority 255
      enable
      exit
   exit
vlan 1050
   name "PEER_KEEPALIVE"
   ip address 192.168.3.1 255.255.255.0
   exit
spanning-tree Trk1 priority 4 bpdu-filter
spanning-tree Trk2 priority 4 bpdu-filter
spanning-tree Trk3 priority 4 bpdu-filter
spanning-tree Trk4 priority 4 bpdu-filter
spanning-tree Trk5 priority 4 bpdu-filter
spanning-tree Trk6 priority 4 bpdu-filter
spanning-tree Trk7 priority 4 bpdu-filter
spanning-tree Trk8 priority 4 bpdu-filter
spanning-tree Trk9 priority 4 bpdu-filter
spanning-tree Trk10 priority 4 bpdu-filter
spanning-tree Trk11 priority 4 bpdu-filter
spanning-tree Trk12 priority 4 bpdu-filter
spanning-tree Trk100 priority 4
no tftp client
no tftp server
distributed-trunking peer-keepalive vlan 1050
distributed-trunking peer-keepalive destination 192.168.3.2
no autorun
no dhcp config-file-update
no dhcp image-file-update
password manager
password operator

 

 

parnassus
Honored Contributor

Re: Connecting another network to an Aruba switch


@WernerReiche wrote: I take it from your comment that cross VLAN communications is not as an acceptable practice as I have been told.

Hi Werner, absolutely not.

I didn't mean that with my question about who is responsible for IP Routing.

Generally IP Routing enabled on a Switch (clearly a Layer 3 Switch) means fast inter-VLAN routing performances. Add to that proper ACLs in order to strictly manage inter-VLANs communications and you're exactly following a usual best practice (better than leaving the router role to a Firewall....with all limitations such a choice has, in primis being a SPoF and providing uplink interfaces throughput bottlenecks not present on a switch backplane).

My question was asked instead to understand an approximate network topology (question: where is the core router for the network?).

So...you said you have a Switch...but from the configuration you attached I see few DT-LACP Port Trunks so - immediately - a second question pops up well before trying to argument other answers: are you really sure you're dealing with just one switch instead of a pair?

See here what I mean:

 

trunk 1 trk1 dt-lacp
trunk 2 trk2 dt-lacp
trunk 3 trk3 dt-lacp
trunk 4 trk4 dt-lacp
trunk 5 trk5 dt-lacp
trunk 6 trk6 dt-lacp
trunk 7 trk7 dt-lacp
trunk 8 trk8 dt-lacp
trunk 9 trk9 dt-lacp
trunk 10 trk10 dt-lacp
trunk 11 trk11 dt-lacp
trunk 12 trk12 dt-lacp

 

 

Above there are twelve DT-LACP Trunks (port aggregations): DT-LACP means Distributed Trunking LACP Trunk...so not a normal LACP Trunk, not a normal port aggregation...it means that there is ANOTHER switch in the picture...where is the SW2?

By the way the fact that this swith is (or was) part of a pair is clearly evident looking at the few running configuration lines (I rearranged their order to make that more evident):

 

interface 47
   name "SW1.47/SW2.47 - Interswitch Trunk"
   exit
interface 48
   name "SW1.48/SW2.48 - Interswitch Trunk"
   exit
trunk 47-48 trk100 trunk
switch-interconnect trk100
interface 46
   name "SW1.46/SW2.46 - Peer Keepalive"
   exit
vlan 1050
   name "PEER_KEEPALIVE"
   ip address 192.168.3.1 255.255.255.0
   exit
distributed-trunking peer-keepalive vlan 1050
distributed-trunking peer-keepalive destination 192.168.3.2

 

 

Interface 47 and 48 are aggregated in a static trunk logical interface (trunk 100) used as the ISC Inter-Switch Connection link (also known as Switch-Interconnect) between SW1 and SW2 Switches. Interface 46 instead is used as the necessary Peer Keepalive link between the two switches and it should be configured ad untagged member of a dedicated VLAN id 1050 and it is also configured to speak with its SW2 peer Switch contacing its peer interface at 192.168.3.2 (from 192.168.3.1).

The strange thing is that port 46 was configured to be untagged member of VLAN id 1001 "AHMS_PUBLIC" instead. of being untagged member of just dedicated VLAN id 1050...and I believe this was (is) an error.

Then the things go nice...IP Routing is enabled and there are few static routes, that's fine...but...since there are signs of Distributed Trunking there are also signs of VRRP (Virtual Routing)...and indeed you can found them here:

 

router vrrp
   virtual-ip-ping
   exit

vlan 1001
   name "AMHS_PUBLIC"
   untagged 13-22,27-34,45-46,Trk1-Trk4
   tagged Trk100
   ip address 192.168.14.1 255.255.255.0
   vrrp vrid 101
      virtual-ip-address 192.168.14.1
      priority 255
      enable
      exit
   exit

vlan 1005
   name "AIM_PUBLIC"
   untagged Trk5-Trk8
   tagged Trk100
   ip address 192.168.15.1 255.255.255.0
   vrrp vrid 105
      virtual-ip-address 192.168.15.1
      priority 255
      enable
      exit
   exit

vlan 1006
   name "AIM_CLUSTER"
   untagged Trk9-Trk12
   tagged Trk100
   ip address 192.168.16.1 255.255.255.0
   vrrp vrid 106
      virtual-ip-address 192.168.16.1
      priority 255
      enable
      exit
   exit

 

So...what are you trying exactly to achieve? are you trying to repropouse a switch previously used (and so the posted running configuration is only partially good for the new role...) or is this just half of the whole picture?

I suspect - I say with totally positive and genuine intents - you aren't fully aware (I mean...it's not your fault!) of what the configuration you posted means...actually.


I'm not an HPE Employee
Kudos and Accepted Solution banner
parnassus
Honored Contributor

Re: Connecting another network to an Aruba switch

Just an addition...


@WernerReiche wrote: My previously noted "networks guy" set this up.  I did the original setup for this 8 years ago and didn't use any VLANs - he's looked after it since then. The guy is/was pretty smart - but liked doing things in excessively complicated ways because it was "proper".

well...I didn't know the story and the evolution of your network setup...so I don't know if - initially - you designed your network with the Distributed Trunking and VRRP approach in mind...I don't believe so...because you wrote you didn't use any VLAN (apart the default VLAN, I add)...but I can't be sure about that.

Apart from that I find the sentence about doing things in excessicely complicated ways...funny...indeed the guy could have planned to stack (Backplane Stacking) the two JL076A switches together to let them form a single logical entity...avoinding DT and, more important, avoiding VRRP (...there always many ways to skin a cat (sometime you have to pay a little bit more - backplane stacking deployment requires to purchase two Stacking Modules and at least one Stacking Cable - but the design outcoming is that doing so the system will become simple to maintain and shows benefits...example you would have saved six - 3+3 - 10GBase-T ports on the frontplane, just as example).


I'm not an HPE Employee
Kudos and Accepted Solution banner
WernerReiche
Occasional Contributor

Re: Connecting another network to an Aruba switch

There are two identical switches in a redundant configuration - as you have already guessed.

I left out the second switch to try to keep the scenario simpler.

The connection to the IT LAN is not redundant - it is only to switch 1.

These two switches are the core of the network.  There is also a non-redundant CISCO router we use for external connections via V.35 serial modems.

Normally, we install this system on an isolated network - no connections to anything other than our own workstations.

In this case, they want to use their own workstations, which are connected to their existing IT LAN - which makes sense as these workstations are distributed in several different cities.

WernerReiche
Occasional Contributor

Re: Connecting another network to an Aruba switch

As to what I am trying to do:

I have a HP Aruba switch already configured with several vlans - 192.168.14/24, 192.168.15/24, 192.168.16/24.  Now I would like to connect a separate network to this switch.  I would be accepting traffic from several vlans - 192.168.21/24 to 192.168.42/24, 192.168.52/24, 192.168.55/24 and 192.168.66/24.

parnassus
Honored Contributor

Re: Connecting another network to an Aruba switch

Hi Werner, your purpose and your scenario are now clear.

Since:

  1. the remote VLAN ids don't exist (yet) on the Aruba 3810M DT pair
  2. your network designs are focused on deploying isolated networks (would be insecure to simply stretch an existing Layer 2 VLAN to a new network switch...better to route)
  3. you have just one single physical interface (On SW1) for interconnecting the remote Network (this for some STP features intended to protect a STP Topology when you interconnect two networks)

Why not to follow an approach that will treat your two networks (the one represented by the DT Switches pair and the other represented by the external workstations you want to be connected) as two separate entities leaving them isolated as much as possible (STP) but routed each others (Transit VLAN + Static Routing)?

Eventually you can then create proper ACLs (on both sides or just on one side) if reciprocal routing between both networks looks too insecure for you (remember that such approach will requires to create specific static routes to let each end to understand how to reach the far one...and that is already a form of "obfuscation"...clearly ACLs will enforce another level of security).

Something like:

  • VLAN ids will left behind the DT Switches pair and their routing will continue to be done on that core
  • You will add a NEW VLAN id - let's say VLAN id 2255 - used as transit network (/29 should suffice, 6 IP addressable hosts: 192.168.255.0/29) using a two IP Address(es) on DT Switches pair - let's say 192.168.255.1 on SVI VLAN 2255 on SW1, 192.168.255.2 on SVI VLAN 2255 on SW2 and 192.168.255.1 again as the the Virtual-IP (VRRP) for the new VRID 2255
  • Someone will add a corresponding NEW VLAN id as above (VLAN id 2255 in my example) used as transit network assigning one of remaining three free IP Addresses, let's say the 192.168.255.4, on its SVI.
  • tag (or untag) the ports involved on the interconnection between your Network and the remote one to be member of that VLAN 2255.
  • Add static routes (one for each remote network to be reached by the local peers) on DT Switch pair to say that remote subnets 192.168.21/24 to 192.168.42/24, 192.168.52/24, 192.168.55/24 and 192.168.66/24 can be reached through the 192.168.255.4.
  • Add static routes (one for each local network to be reached by the remote peers) remote Switch to say that your local subnets 192.168.14/24, 192.168.15/24, 192.168.16/24 can be reached through the 192.168.255.1 (which corresponds to your Virtual IP).
  • Protect interfaces involved from exchanging STP...since both networks should be kept in separated STP domains and each core should be STP Root of its network topology.
  • In absence of proper ACLs any host on DT Switch pair being member of a routed subnet should be able to connect to any other host of routed remote networks and vice-versa.

If too complex (but it's not)...use a Firewall to protect both networks each others.


I'm not an HPE Employee
Kudos and Accepted Solution banner