我继承了一些Cisco Aironet 1042脂肪a和一个平面的、单一的VLAN (10)的网络设计。
为了提供多个SSID,Cisco坚持为每个SSID提供一个VLAN。
通过将接口放在桥接器组上,当AP连接到Cisco上的一个简单端口时,我可以提供所有三个SSID的网络访问,局域网配置为:
switchport access vlan 10
switchport mode access或者在HP ProCurve上配置为
untagged然而,我有一个AP (相反,一个位置-它发生在任何AP插头在那里)是连接在两个交换器后,拒绝通过交通-除非我有一个哑开关在前面。连接到交换机的所有其他AP都没有问题--包括连接在另一个交换机后面的AP。
这让我觉得这个哑开关正在剥夺它的VLAN身份?这会把它推到VLAN 1作为缺省值吗?我看不出这是怎么工作的,因为AP只是在哑巴开关后面工作得很好,而不是开关本身。
我不知道如何让这个AP在没有哑开关的情况下工作在两个开关后面。
AP被插入到一个连接到另一个交换机的开关上,并且交换机之间的连接是一个无标记的上行链路。
这是我的配置。有什么想法?
T-0060#show running-config
Building configuration...
Current configuration : 4101 bytes
!
! Last configuration change at 11:26:47 EDT Sun Aug 14 2016 by newlifeadmin
! NVRAM config last updated at 11:21:11 EDT Sun Aug 14 2016
! NVRAM config last updated at 11:21:11 EDT Sun Aug 14 2016
version 15.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname T-0060
!
!
logging rate-limit console 9
enable secret 5 #SECRET#
!
no aaa new-model
clock timezone EST -5 0
clock summer-time EDT recurring
no ip source-route
no ip cef
!
!
!
!
dot11 syslog
!
dot11 ssid RN Faculty
vlan 10
authentication open
authentication key-management wpa
mbssid guest-mode
wpa-psk ascii 7 #SECRET#
!
dot11 ssid RN Guest
vlan 30
authentication open
authentication key-management wpa
mbssid guest-mode
wpa-psk ascii 7 #SECRET#
!
dot11 ssid RN Students
vlan 20
authentication open
authentication key-management wpa
mbssid guest-mode
wpa-psk ascii 7 #SECRET#
!
!
!
no ipv6 cef
!
!
username #SECRET# password 7 #SECRET#
username #SECRET# privilege 15 password 7 #SECRET#
username #SECRET# privilege 15 password 7 #SECRET#
!
!
bridge irb
!
!
!
interface Dot11Radio0
no ip address
no ip route-cache
!
encryption vlan 10 mode ciphers aes-ccm tkip
!
encryption vlan 20 mode ciphers aes-ccm tkip
!
encryption vlan 30 mode ciphers aes-ccm tkip
!
ssid RN Faculty
!
ssid RN Guest
!
ssid RN Students
!
antenna gain 0
mbssid
station-role root
!
interface Dot11Radio0.10
encapsulation dot1Q 10 native
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio0.20
encapsulation dot1Q 20
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio0.30
encapsulation dot1Q 30
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio1
no ip address
no ip route-cache
!
encryption vlan 20 mode ciphers aes-ccm tkip
!
encryption vlan 10 mode ciphers aes-ccm tkip
!
encryption vlan 30 mode ciphers aes-ccm tkip
!
ssid RN Faculty
!
ssid RN Guest
!
ssid RN Students
!
antenna gain 0
peakdetect
dfs band 3 block
mbssid
channel dfs
station-role root
!
interface Dot11Radio1.10
encapsulation dot1Q 10 native
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio1.20
encapsulation dot1Q 20
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio1.30
encapsulation dot1Q 30
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface GigabitEthernet0
no ip address
duplex auto
speed auto
bridge-group 1
bridge-group 1 spanning-disabled
no bridge-group 1 source-learning
!
interface BVI1
mac-address ccef.484c.bab0
ip address 192.168.1.60 255.255.255.0
!
ip default-gateway 192.168.1.254
ip forward-protocol nd
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
!
!
bridge 1 route ip
!
!
!
line con 0
login local
line vty 0 4
login local
transport input all
!
end
T-0060#发布于 2017-08-15 16:43:34
这个AP直接连接到一个没有VLAN设置的HP交换机上,而不是被取消标记。这不是最好的解决方案,但可以实现所有目标,而无需对AP/交换机/VLAN进行任何更改。
对我来说,解决方案是删除端口上无标记的VLAN。
发布于 2017-02-17 17:17:25
如果你想做一个快速和肮脏的黑客,只需循环回VLAN进入彼此的开关。只需在VLAN10中添加两个无标记/访问端口,为VLAN20和VLAN30添加一个端口,只需将端口修补到一起即可。
非常丑陋,非常粗略,但只要您没有启用生成树(即使在端口上放置BPDU过滤,它也会工作)。但是,正如其他人已经说过的,拥有多个said的意义在于分离通信量,如果您将所有内容都输入到同一个网络中,那么拥有多个said实际上没有任何意义。
https://networkengineering.stackexchange.com/questions/34831
复制相似问题