在我的IBM刀片中心不堆叠一个Cisco交换机之后,我就不能再使用我在管理VLAN上配置的管理IP了。我看到的唯一改变是Bladecenter AMM增加了一个内部以太网管理端口。关于reddit,已经有了一些讨论。在未堆叠之前,这个VLAN接口是工作的。
我仍然没有找到一个解决方案来解释为什么这不起作用,或者如何允许通过当前的管理VLAN访问。如果可能的话,我想保持L3在交换机上的路由。
至于测试,我已经配置了一个本机管理VLAN的访问端口和卡车端口。我将一台笔记本电脑与管理VLAN范围内的静态IP连接到这些端口上,无法打开或访问swith。当交换机连接时,它确实按预期在所有端口/VLAN上通过通信量。但是,我仍然无法直接切换到ping或SSH。
为测试目的:
下面是部分配置
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname sw-7-tsting
!
boot-start-marker
boot-end-marker
!
enable secret ...
!
username ....
no aaa new-model
clock timezone EST -5 0
switch 1 provision ws-cbs3110g-s-i
system mtu routing 1500
!
!
ip domain-name abc.def
vtp mode transparent
!
!
crypto pki ...
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree pathcost method long
no spanning-tree vlan 1-4094
!
!
port-channel load-balance src-dst-ip
!
!
vlan internal allocation policy ascending
!
vlan N
name traffic N
!
vlan NN
name traffic NN
!
vlan NNN
name traffic NNN
!
vlan XXX
name network management
!
ip ssh time-out 60
ip ssh version 2
!
!
!
interface FastEthernet0
ip address 192.168.x.x 255.255.255.0
!
interface GigabitEthernet1/0/17
description used to test all vlans
switchport trunk native vlan XXX
switchport trunk allowed vlan N,NN,NNN,XXX
switchport mode trunk
switchport nonegotiate
!
interface GigabitEthernet1/0/18
description used to test network VLAN XXX
switchport access vlan XXX
switchport mode access
switchport nonegotiate
!
interface Vlan1
no ip address
shutdown
!
interface Vlan XXX
ip address 10.XXX.200.236 255.255.255.0
!
ip default-gateway 10.XXX.200.1
ip http server
ip http secure-server
!
snmp-server community public RO
snmp-server host 10.XXX.200.30 version 2c public udp-port 161
!
line con 0
line vty 0 4
login
transport input ssh
line vty 5 15
login
!
ntp server 129.6.15.30
end发布于 2017-01-20 14:54:46
我最终能够把/ssh转到交换机上。问题在BladeCenter配置中。为了解决这个问题,我需要
如果前面的步骤不起作用,您可能需要在I/O模块>管理/电源/重新启动中激活保护模式。在选择“执行操作”之后,将显示以下消息。您已选择启用I/O模块(S) 10上的保护模式。
Protected mode allows you to limit the actions that an MM user can perform on an I/O module. Specifically, the following actions
cannot be performed on the MM user interfaces while an I/O module is in protected mode. These actions can only be performed
using the native management interface of the selected I/O module in protected mode.
Changing the I/O module IP configuration (IP address, subnet mask, gateway)
Resetting the I/O module settings to their factory defaults
Changing the I/O module external port settings
Changing the I/O module external management settings
Note that activating protected mode on an I/O module is a two step process. Once protected mode is enabled on this page, you
must access the native management interface of the selected I/O modules and activate protected mode there. After this second
step, protected mode becomes fully activated, and the actions listed above can no longer be performed on the MM user interfaces.
Also note that, once protected mode is fully active on an I/O module, it cannot be disabled using the MM user interfaces. It has
to be disabled on the I/O module's native management interface first.
If you want to enable protected mode on the selected I/O modules, click the "Enable Protected Mode" button. Otherwise click the
"Cancel" button.保护模式以保护网络组件不受BladeCenter AMM的影响。如果一个开关是堆叠,这将被激活,是默认的。
https://serverfault.com/questions/826761
复制相似问题