Перейти к содержимому
Калькуляторы

Egro

Пользователи
  • Публикации

    11
  • Зарегистрирован

  • Посещение

О Egro

  • Звание
    Абитуриент
    Абитуриент

Посетители профиля

Блок посетителей профиля отключен и не будет отображаться другим пользователям

  1. Доброго времени суток. Столкнулся с такой ситуацией. На линии стоит Dlink DGS-3420-26SC оптическим портом соединён с SNR 2965_24T в 25 порт. С SRN 2965_24T в 23 порт воткнута магистраль на следующее оборудование snr 2965_8T в 7 порт. Со стороны snr 2965_8T идёт петля и не один из двух snr её не замечает. Тем самым вырубается оптический порт на Dlink DGS-3420-26SC. Можете ткнуть пальцем где я и что не правильно настроил? Конфиг 2965_24T SNR-S2965-24T#sh version SNR-S2965-24T Device, Compiled on Sep 12 11:18:50 2018 sysLocation Building 57/2,Predelnaya st, Ekaterinburg, Russia CPU Mac f8:f0:82:78:2f:b9 Vlan MAC f8:f0:82:78:2f:b8 SoftWare Version 7.0.3.5(R0241.0276) BootRom Version 7.2.33 HardWare Version 2.0.1 CPLD Version N/A Serial No.:SW073420H914003059 Copyright (C) 2018 NAG LLC All rights reserved Last reboot is cold reset. Uptime is 0 weeks, 0 days, 18 hours, 17 minutes service password-encryption ! ! ssh-server enable ! snmp-server enable snmp-server securityip *.*.*.* snmp-server securityip *.*.*.* snmp-server community ro 7 ******* snmp-server user initial initial snmp-server group ****** noauthnopriv read Community snmp-server view CommunityView 1. include snmp-server view CommunityView 1.3.6.1.6.3. exclude snmp-server enable traps ! ip forward-protocol udp bootps ! ! ip dhcp snooping enable ! ! ! logging *.*.*.* ! ! ! ! ! loopback-detection interval-time 10 3 ! loopback-detection control-recovery timeout 30 ! loopback-detection trap enable ! vlan 1 ! vlan * name управляющий влан ! ip multicast source-control ! storm-control pps ! firewall enable ! access-list 110 deny tcp any-source any-destination d-port 135 access-list 110 deny tcp any-source any-destination d-port 136 access-list 110 deny tcp any-source any-destination d-port 137 access-list 110 deny tcp any-source any-destination d-port 138 access-list 110 deny tcp any-source any-destination d-port 139 access-list 110 deny tcp any-source any-destination d-port 445 access-list 110 deny tcp any-source any-destination d-port 1900 access-list 110 deny tcp any-source any-destination d-port 2869 access-list 110 deny udp any-source any-destination d-port 135 access-list 110 deny udp any-source any-destination d-port 136 access-list 110 deny udp any-source any-destination d-port 137 access-list 110 deny udp any-source any-destination d-port 138 access-list 110 deny udp any-source any-destination d-port 139 access-list 110 deny udp any-source any-destination d-port 445 access-list 110 deny udp any-source any-destination d-port 1900 access-list 110 deny udp any-source any-destination d-port 2869 access-list 110 permit ip any-source any-destination access-list 110 deny tcp any-source s-port 135 any-destination access-list 110 deny udp any-source s-port 135 any-destination access-list 110 deny tcp any-source s-port 136 any-destination access-list 110 deny udp any-source s-port 136 any-destination access-list 110 deny tcp any-source s-port 137 any-destination access-list 110 deny udp any-source s-port 137 any-destination access-list 110 deny tcp any-source s-port 138 any-destination access-list 110 deny udp any-source s-port 138 any-destination access-list 110 deny tcp any-source s-port 139 any-destination access-list 110 deny udp any-source s-port 139 any-destination access-list 110 deny tcp any-source s-port 445 any-destination access-list 110 deny udp any-source s-port 445 any-destination access-list 110 deny tcp any-source s-port 1900 any-destination access-list 110 deny udp any-source s-port 1900 any-destination access-list 110 deny tcp any-source s-port 2869 any-destination access-list 110 deny udp any-source s-port 2869 any-destination ! userdefined-access-list standard offset window1 l4start 0 window2 l4start 2 userdefined-access-list standard 1204 deny packet-type ipv4 window1 89 ffff window2 89 ffff userdefined-access-list standard 1204 deny packet-type ipv4 window1 8a ffff window2 8a ffff ! Interface Ethernet1/0/1 switchport mode trunk loopback-detection specified-vlan 1 loopback-detection control shutdown ip dhcp snooping action blackhole recovery 3600 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/21 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1 loopback-detection control shutdown ip dhcp snooping trust storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/22 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1 loopback-detection control shutdown ip dhcp snooping trust storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/23 /// Уход на SNR 2965_8T switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1 loopback-detection control shutdown ip dhcp snooping trust storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/24 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1 loopback-detection control shutdown ip dhcp snooping trust storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/25 // Приход с Dlink DGS-3420-26SC switchport mode trunk switchport trunk allowed vlan управляющий влан ip dhcp snooping trust storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! interface управляющий влан ip address *.*.*.* 255.0.0.0 ! sntp server *.*.*.* version 2 ! no login ! ! captive-portal ! end Конфиг с 2965_8T ip forward-protocol udp bootps ! ! ip dhcp snooping enable ! ! ! ! ! ! ! loopback-detection interval-time 10 3 ! loopback-detection control-recovery timeout 30 ! loopback-detection trap enable ! vlan 1 ! vlan * name управляющий влан ! ip multicast source-control ! firewall enable ! access-list 110 deny tcp any-source any-destination d-port 135 access-list 110 deny tcp any-source any-destination d-port 136 access-list 110 deny tcp any-source any-destination d-port 137 access-list 110 deny tcp any-source any-destination d-port 138 access-list 110 deny tcp any-source any-destination d-port 139 access-list 110 deny tcp any-source any-destination d-port 445 access-list 110 deny tcp any-source any-destination d-port 1900 access-list 110 deny tcp any-source any-destination d-port 2869 access-list 110 deny udp any-source any-destination d-port 135 access-list 110 deny udp any-source any-destination d-port 136 access-list 110 deny udp any-source any-destination d-port 137 access-list 110 deny udp any-source any-destination d-port 138 access-list 110 deny udp any-source any-destination d-port 139 access-list 110 deny udp any-source any-destination d-port 445 access-list 110 deny udp any-source any-destination d-port 1900 access-list 110 deny udp any-source any-destination d-port 2869 access-list 110 permit ip any-source any-destination access-list 110 deny tcp any-source s-port 135 any-destination access-list 110 deny udp any-source s-port 135 any-destination access-list 110 deny tcp any-source s-port 136 any-destination access-list 110 deny udp any-source s-port 136 any-destination access-list 110 deny tcp any-source s-port 137 any-destination access-list 110 deny udp any-source s-port 137 any-destination access-list 110 deny tcp any-source s-port 138 any-destination access-list 110 deny udp any-source s-port 138 any-destination access-list 110 deny tcp any-source s-port 139 any-destination access-list 110 deny udp any-source s-port 139 any-destination access-list 110 deny tcp any-source s-port 445 any-destination access-list 110 deny udp any-source s-port 445 any-destination access-list 110 deny tcp any-source s-port 1900 any-destination access-list 110 deny udp any-source s-port 1900 any-destination access-list 110 deny tcp any-source s-port 2869 any-destination access-list 110 deny udp any-source s-port 2869 any-destination ! userdefined-access-list standard offset window1 l4start 0 window2 l4start 2 userdefined-access-list standard 1204 deny packet-type ipv4 window1 89 ffff window2 89 ffff userdefined-access-list standard 1204 deny packet-type ipv4 window1 8a ffff window2 8a ffff ! Interface Ethernet1/0/1 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1;управляющий влан loopback-detection control shutdown ip dhcp snooping action blackhole recovery 3600 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/2 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1;управляющий влан loopback-detection control shutdown ip dhcp snooping action blackhole recovery 3600 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/3 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1;управляющий влан loopback-detection control shutdown ip dhcp snooping action blackhole recovery 3600 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/4 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1;управляющий влан loopback-detection control shutdown ip dhcp snooping action blackhole recovery 3600 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/5 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1;управляющий влан loopback-detection control shutdown ip dhcp snooping action blackhole recovery 3600 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/6 switchport mode trunk switchport trunk allowed vlan управляющий влан loopback-detection specified-vlan 1;управляющий влан loopback-detection control shutdown ip dhcp snooping action blackhole recovery 3600 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/7 //// Приход с 2965_24T switchport mode trunk switchport trunk allowed vlan управляющий влан ip dhcp snooping trust loopback-detection specified-vlan 1 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/8 switchport mode trunk switchport trunk allowed vlan управляющий влан ip dhcp snooping trust loopback-detection specified-vlan 1 loopback-detection control shutdown storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic Не один из SNR не видит петлю. Заранее спасибо за отзыв.
  2. Вот вывод от этих команд при запросе айпи... %Jun 12 21:02:38 2019 DHCPS: rcv packet from client 10-fe-ed-d4-c6-8b, interface Ethernet1/0/8(portID 0x1000008), length 594, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:38 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:39 2019 DHCPS: rcv packet from client 38-60-77-f5-3d-7f, interface Ethernet1/0/8(portID 0x1000008), length 346, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:39 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:39 2019 DHCPS: rcv packet from client b0-be-76-7f-83-61, interface Ethernet1/0/8(portID 0x1000008), length 594, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:39 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:40 2019 DHCPS: rcv packet from client b0-4e-26-62-f2-11, interface Ethernet1/0/8(portID 0x1000008), length 594, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:40 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:40 2019 DHCPS: rcv packet from client b0-4e-26-1f-93-59, interface Ethernet1/0/8(portID 0x1000008), length 594, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:40 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:40 2019 DHCPS: rcv packet from client b0-4e-26-63-09-37, interface Ethernet1/0/8(portID 0x1000008), length 594, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:40 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:40 2019 DHCPS: rcv packet from client b0-4e-26-63-3f-3f, interface Ethernet1/0/8(portID 0x1000008), length 594, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:40 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:40 2019 DHCPS: rcv packet from client f0-76-1c-25-fe-31, interface Ethernet1/0/8(portID 0x1000008), length 346, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:40 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:41 2019 DHCPS: do requset binding event: %Jun 12 21:02:42 2019 DHCPS: rcv packet from client 38-60-77-f5-3d-7f, interface Ethernet1/0/8(portID 0x1000008), length 346, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:42 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 %Jun 12 21:02:42 2019 DHCP SNOOPING: Delete a binding is failed %Jun 12 21:02:42 2019 DHCPS: rcv packet from client b0-be-76-56-28-25, interface Ethernet1/0/8(portID 0x1000008), length 594, type DHCPDISCOVER, opcode BOOTREQUEST, stacking 0 %Jun 12 21:02:42 2019 DHCPS: flood dhcp pkt from Ethernet1/0/8 dst mac ff-ff-ff-ff-ff-ff to all up port except input port Ethernet1/0/8 in vlan 1 как только убираю ip dhcp snooping enable Всё начинает отлично работать. Хочу ещё раз повторить, на 2965-24T проблем не замечается.
  3. ! service password-encryption ! username admin privilege 15 password 7 ********** ! authentication line console login local ! ! clock timezone Islamabad add 5 0 ! ! ssh-server enable ! snmp-server enable snmp-server securityip *.*.*.* snmp-server securityip *.*.*.* snmp-server community ro 7 ******** snmp-server user initial initial snmp-server group ***** noauthnopriv read Community snmp-server view CommunityView 1. include snmp-server view CommunityView 1.3.6.1.6.3. exclude snmp-server enable traps ! ip forward-protocol udp bootps ! ! ip dhcp snooping enable ! ! ! ! ! ! ! loopback-detection interval-time 10 3 ! loopback-detection control-recovery timeout 30 ! loopback-detection trap enable ! vlan 1 ! vlan * name MANAGER ! ip multicast source-control ! firewall enable ! access-list 110 deny tcp any-source any-destination d-port 135 access-list 110 deny tcp any-source any-destination d-port 136 access-list 110 deny tcp any-source any-destination d-port 137 access-list 110 deny tcp any-source any-destination d-port 138 access-list 110 deny tcp any-source any-destination d-port 139 access-list 110 deny tcp any-source any-destination d-port 445 access-list 110 deny tcp any-source any-destination d-port 1900 access-list 110 deny tcp any-source any-destination d-port 2869 access-list 110 deny udp any-source any-destination d-port 135 access-list 110 deny udp any-source any-destination d-port 136 access-list 110 deny udp any-source any-destination d-port 137 access-list 110 deny udp any-source any-destination d-port 138 access-list 110 deny udp any-source any-destination d-port 139 access-list 110 deny udp any-source any-destination d-port 445 access-list 110 deny udp any-source any-destination d-port 1900 access-list 110 deny udp any-source any-destination d-port 2869 access-list 110 permit ip any-source any-destination access-list 110 deny tcp any-source s-port 135 any-destination access-list 110 deny udp any-source s-port 135 any-destination access-list 110 deny tcp any-source s-port 136 any-destination access-list 110 deny udp any-source s-port 136 any-destination access-list 110 deny tcp any-source s-port 137 any-destination access-list 110 deny udp any-source s-port 137 any-destination access-list 110 deny tcp any-source s-port 138 any-destination access-list 110 deny udp any-source s-port 138 any-destination access-list 110 deny tcp any-source s-port 139 any-destination access-list 110 deny udp any-source s-port 139 any-destination access-list 110 deny tcp any-source s-port 445 any-destination access-list 110 deny udp any-source s-port 445 any-destination access-list 110 deny tcp any-source s-port 1900 any-destination access-list 110 deny udp any-source s-port 1900 any-destination access-list 110 deny tcp any-source s-port 2869 any-destination access-list 110 deny udp any-source s-port 2869 any-destination ! userdefined-access-list standard offset window1 l4start 0 window2 l4start 2 userdefined-access-list standard 1204 deny packet-type ipv4 window1 89 ffff window2 89 ffff userdefined-access-list standard 1204 deny packet-type ipv4 window1 8a ffff window2 8a ffff ! Interface Ethernet1/0/1 switchport mode trunk switchport trunk allowed vlan * loopback-detection specified-vlan 1 loopback-detection control shutdown ip dhcp snooping action blackhole recovery 120 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/2 switchport mode trunk switchport trunk allowed vlan * loopback-detection specified-vlan 1 loopback-detection control shutdown ip dhcp snooping action blackhole recovery 120 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/3 switchport mode trunk switchport trunk allowed vlan * loopback-detection specified-vlan 1;* loopback-detection control shutdown ip dhcp snooping action blackhole recovery 120 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/4 switchport mode trunk switchport trunk allowed vlan * loopback-detection specified-vlan 1;* loopback-detection control shutdown ip dhcp snooping action blackhole recovery 120 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/5 switchport mode trunk switchport trunk allowed vlan * loopback-detection specified-vlan 1;* loopback-detection control shutdown ip dhcp snooping action blackhole recovery 120 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/6 switchport mode trunk switchport trunk allowed vlan * loopback-detection specified-vlan 1;* loopback-detection control shutdown ip dhcp snooping action blackhole recovery 120 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/7 switchport mode trunk switchport trunk allowed vlan * ip dhcp snooping trust loopback-detection specified-vlan 1 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/8 switchport mode trunk switchport trunk allowed vlan * ip dhcp snooping trust loopback-detection specified-vlan 1 loopback-detection control shutdown storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/9 switchport mode trunk switchport trunk allowed vlan * ip dhcp snooping trust loopback-detection specified-vlan 1 loopback-detection control shutdown storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Interface Ethernet1/0/10 switchport mode trunk switchport trunk allowed vlan * ip dhcp snooping trust loopback-detection specified-vlan 1 loopback-detection control shutdown storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! interface Vlan* ip address *.*.*.* 255.0.0.0 ! sntp server *.*.*.* version 2 ! no login ! ! captive-portal ! end SNR-S2965-8T Device, Compiled on May 16 10:56:37 2019 sysLocation Building 57/2,Predelnaya st, Ekaterinburg, Russia CPU Mac f8:f0:82:7a:0b:bf Vlan MAC f8:f0:82:7a:0b:be SoftWare Version 7.0.3.5(R0241.0308) BootRom Version 7.2.21 HardWare Version 1.0.3 CPLD Version N/A Serial No.:SW052610I505001504 Copyright (C) 2019 NAG LLC All rights reserved Last reboot is warm reset. Uptime is 0 weeks, 0 days, 0 hours, 0 minutes
  4. Доброго времени суток... При конфиге: ip dhcp snooping enable ! ! ! ! ! ! Interface Ethernet1/0/1 (абоненский порт) switchport mode trunk switchport trunk allowed vlan *(Управляющий) loopback-detection specified-vlan 1 loopback-detection control shutdown ip dhcp snooping action blackhole recovery 120 storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! ......... Interface Ethernet1/0/10 (Uplink) switchport mode trunk switchport trunk allowed vlan *(Управляющий) ip dhcp snooping trust loopback-detection specified-vlan 1 loopback-detection control shutdown storm-control broadcast 16 storm-control multicast 16 storm-control unicast 16 ip access-group 110 in traffic-statistic ! Абонент перестаёт получать IP от DHCP сервера....Хотя 2965_24 с аналогичным конфигом всё работает исправно. Т.е откидывает абонентские dhcp сервера при этом пропуская наш. Тыкните пальцем что не так я делаю?
  5. Доброго времени суток. Случилась беда с 2990. Подключили (гении) на 24 вольта акб. Нашли пару сгоревших деталей. Хотелось бы уточнить маркировку дабы заменить их.
  6. Здравствуйте ещё раз.. Dlink используем в DHCP Сервере вот такой формат поля Option 82: http://www.dlink.ru/ru/faq/62/print_228.html А мы принимаем с SNR-2990 : Это с вашего сайта Если пакет с Option 82, то пишем в syslog информацию: log ( info, concat( о коммутаторе и порту подключения, с которого пришел пакет: «Switch MAC:», binary-to-ascii(16, 8, «:», option agent.remote-id), «Switch port:», binary-to-ascii(10, 8, «.», option agent.circuit-id) )); } Если можно вышлите пожалуйста точнее какой формат поля Option 82 Вы используете.
  7. Можете тыкнуть пальцем где я не правильно делаю? При такой настройке клиент не может получить айпи.. ! service dhcp ! ip forward-protocol udp bootps ip dhcp relay information option ip dhcp relay information option subscriber-id format hex ! ! ! ! ! ! ! Interface Ethernet0 ! ! vlan 1 ! vlan 1237 name net1237 ! Interface Ethernet1/0/21 #uplink switchport mode trunk switchport trunk allowed vlan *;1237 ! Interface Ethernet1/0/22 #клиентский порт switchport mode trunk switchport trunk allowed vlan *(управление) switchport trunk native vlan 1237 ! ! interface Vlan1 ip address 10.0.0.86 255.255.240.0 ! ! interface Vlan1237 ip address 10.237.0.1 255.255.240.0 ip address 172.16.244.1 255.255.254.0 secondary !forward protocol udp 67(active)! ip helper-address 10.237.0.2 ! Дамп с DHCP сервера: listening on vlan1237, link-type EN10MB (Ethernet), capture size 65535 bytes 16:44:43.920964 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from *MAC*, length 300 16:44:43.921847 IP 10.237.0.1.67 > 10.237.0.2.67: BOOTP/DHCP, Request from *MAC*, length 300 16:44:44.006218 IP 10.237.0.2.67 > 10.237.0.1.67: BOOTP/DHCP, Reply, length 300 16:44:44.007378 IP 10.237.0.1.67 > 255.255.255.255.68: BOOTP/DHCP, Reply, length 300 16:44:49.020738 ARP, Request who-has 10.237.0.1 tell 10.237.0.2, length 28 16:44:49.021753 ARP, Reply 10.237.0.1 is-at f8:f0:82:77:85:75, length 46 16:44:51.999169 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from *MAC*, length 300 16:44:52.000064 IP 10.237.0.1.67 > 10.237.0.2.67: BOOTP/DHCP, Request from *MAC*, length 300 16:44:52.170269 IP 10.237.0.2.67 > 10.237.0.1.67: BOOTP/DHCP, Reply, length 300 16:44:52.171491 IP 10.237.0.1.67 > 255.255.255.255.68: BOOTP/DHCP, Reply, length 300 16:45:07.171202 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from *MAC*, length 300 16:45:07.172032 IP 10.237.0.1.67 > 10.237.0.2.67: BOOTP/DHCP, Request from *MAC*, length 300 16:45:07.281327 IP 10.237.0.2.67 > 10.237.0.1.67: BOOTP/DHCP, Reply, length 300 16:45:07.282576 IP 10.237.0.1.67 > 255.255.255.255.68: BOOTP/DHCP, Reply, length 300 16:45:39.286799 ARP, Request who-has 169.254.125.227 tell 169.254.125.227, length 46 16:45:39.671398 ARP, Request who-has 169.254.125.227 tell 169.254.125.227, length 46 16:45:40.678842 ARP, Request who-has 169.254.125.227 tell 169.254.125.227, length 46 Заранее прошу прощение....До этого сидел исключительно на Dlink...
  8. Хотелось бы узнать..Как включить в логи RPS сообщение. Т.е Что задействовано доп.питание. ?
  9. Спасибо, помогло. Пока не нашёл настройку syslog сервера. Для отправки логов на сервер. Из мануала на сайте: Направление вывода на syslog-сервер: info-center loghost "server_ip" facility facility channel "channel_id" server_ip - адрес syslog-сервера facility - категория сообщения для syslog-серверa channel_id - номер канала.
  10. Доброго времени суток. Взяли на замену DGS-3627 (Dlink) - SNR-S2990G UPS на вооружение. Накопилось очень много вопросов. 1) Есть на старом кучерявом Dlink команда "trusted_host network", есть ли аналог тут? 2) При прописывании команды sh info-center logsdram говорит что её попросту нету. Тем самым не могу настроить оповещение. Либо я что то не так делаю, помогите если есть возможность. Версия ПО: SoftWare Version 7.0.3.5(R0102.0266) BootRom Version 7.1.41 HardWare Version 1.0.2-UPS