Routing multiple vlan's (within one switch x670) to other switch (not extreme)

  • 0
  • 1
  • Question
  • Updated 2 years ago
  • Answered
We have currently a 'stand-alone' setup with one x670 with 7 vlan's (OR0-OR7). Which use multicast (PIM) and ip forwarding. 

current config:
configure snmp sysName "Switch_A"
configure sys-recovery-level switch reset

configure vlan default delete ports all
create vlan "OR1"
configure vlan OR1 tag 11
create vlan "OR2"
configure vlan OR2 tag 12
create vlan "OR3"
configure vlan OR3 tag 13
create vlan "OR4"
configure vlan OR4 tag 14
create vlan "OR5"
configure vlan OR5 tag 15
create vlan "OR6"
configure vlan OR6 tag 16
create vlan "OR0"
configure vlan OR0 tag 10
create vlan "Local_1"
enable loopback-mode vlan Local_1

configure vlan OR1 add ports 32-35 untagged
configure vlan OR2 add ports 1-19 untagged
configure vlan OR3 add ports 20-31 untagged
configure vlan OR4 add ports 36-39 untagged
configure vlan OR5 add ports 40-43 untagged
configure vlan OR6 add ports 46-47 untagged
configure vlan OR0 add ports 48 untagged

configure vlan Mgmt ipaddress 10.0.0.1 255.0.0.0
configure vlan OR1 ipaddress 10.74.24.1 255.255.255.0
enable ipforwarding vlan OR1
configure vlan OR2 ipaddress 10.74.25.1 255.255.255.0
enable ipforwarding vlan OR2
configure vlan OR3 ipaddress 10.74.26.1 255.255.255.0
enable ipforwarding vlan OR3
configure vlan OR4 ipaddress 10.74.27.1 255.255.255.0
enable ipforwarding vlan OR4
configure vlan OR5 ipaddress 10.74.28.1 255.255.255.0
enable ipforwarding vlan OR5
configure vlan OR6 ipaddress 10.74.29.1 255.255.255.0
enable ipforwarding vlan OR6
configure vlan OR0 ipaddress 10.74.23.1 255.255.255.0
enable ipforwarding vlan OR0
configure vlan Local_1 ipaddress 192.168.100.1 255.255.255.255
enable ipforwarding vlan Local_1

create stpd s11
configure stpd s11 mode dot1w
configure stpd s11 default-encapsulation dot1d
configure stpd s11 add vlan OR1 ports 32-35 dot1d
configure stpd s11 ports link-type edge 32-35 edge-safeguard enable bpdu-restrict recovery-timeout 60
configure stpd s11 tag 11
enable stp s11
create stpd s12
configure stpd s12 mode dot1w
configure stpd s12 default-encapsulation dot1d
configure stpd s12 add vlan OR2 ports 1-19 dot1d
configure stpd s12 ports link-type edge 1-19 edge-safeguard enable bpdu-restrict recovery-timeout 60
configure stpd s12 tag 12
enable stp s12
create stpd s13
configure stpd s13 mode dot1w
configure stpd s13 default-encapsulation dot1d
configure stpd s13 add vlan OR3 ports 20-31 dot1d
configure stpd s13 ports link-type edge 20-31 edge-safeguard enable bpdu-restrict recovery-timeout 60
configure stpd s13 tag 13
enable stp s13
create stpd s14
configure stpd s14 mode dot1w
configure stpd s14 default-encapsulation dot1d
configure stpd s14 add vlan OR4 ports 36-39 dot1d
configure stpd s14 ports link-type edge 36-39 edge-safeguard enable bpdu-restrict recovery-timeout 60
configure stpd s14 tag 14
enable stp s14
create stpd s15
configure stpd s15 mode dot1w
configure stpd s15 default-encapsulation dot1d
configure stpd s15 add vlan OR5 ports 40-43 dot1d
configure stpd s15 ports link-type edge 40-43 edge-safeguard enable bpdu-restrict recovery-timeout 60
configure stpd s15 tag 15
enable stp s15
create stpd s16
configure stpd s16 mode dot1w
configure stpd s16 default-encapsulation dot1d
configure stpd s16 add vlan OR6 ports 46-47 dot1d
configure stpd s16 ports link-type edge 46-47 edge-safeguard enable bpdu-restrict recovery-timeout 60
configure stpd s16 tag 16
enable stp s16
create stpd s10
configure stpd s10 mode dot1w
configure stpd s10 default-encapsulation dot1d
configure stpd s10 add vlan OR0 ports 48 dot1d
configure stpd s10 ports link-type edge 48 edge-safeguard enable bpdu-restrict recovery-timeout 60
configure stpd s10 tag 10
enable stp s10

configure ospf add vlan OR1 area 0.0.0.0 passive
configure ospf add vlan OR2 area 0.0.0.0 passive
configure ospf add vlan OR3 area 0.0.0.0 passive
configure ospf add vlan OR4 area 0.0.0.0 passive
configure ospf add vlan OR5 area 0.0.0.0 passive
configure ospf add vlan OR6 area 0.0.0.0 passive
configure ospf add vlan OR0 area 0.0.0.0 passive
configure ospf add vlan "Local_1" area 0.0.0.0 passive
configure ospf area 0.0.0.0 priority 10
enable ospf

configure igmp 60 10 1 2
enable igmp snooping "OR1" fast-leave
enable igmp snooping "OR2" fast-leave
enable igmp snooping "OR3" fast-leave
enable igmp snooping "OR4" fast-leave
enable igmp snooping "OR5" fast-leave
enable igmp snooping "OR6" fast-leave
enable igmp snooping "OR0" fast-leave

enable ipmcforwarding vlan "OR1"
enable ipmcforwarding vlan "OR2"
enable ipmcforwarding vlan "OR3"
enable ipmcforwarding vlan "OR4"
enable ipmcforwarding vlan "OR5"
enable ipmcforwarding vlan "OR6"
enable ipmcforwarding vlan "OR0"
enable ipmcforwarding vlan "Local_1"


configure vlan OR1 dhcp-address-range 10.74.24.20 - 10.74.24.200
configure vlan OR1 dhcp-options default-gateway 10.74.24.1
enable dhcp ports 32-35 vlan OR1
configure vlan OR2 dhcp-address-range 10.74.25.20 - 10.74.25.200
configure vlan OR2 dhcp-options default-gateway 10.74.25.1
enable dhcp ports 1-19 vlan OR2
configure vlan OR3 dhcp-address-range 10.74.26.20 - 10.74.26.200
configure vlan OR3 dhcp-options default-gateway 10.74.26.1
enable dhcp ports 20-31 vlan OR3
configure vlan OR4 dhcp-address-range 10.74.27.20 - 10.74.27.200
configure vlan OR4 dhcp-options default-gateway 10.74.27.1
enable dhcp ports 36-39 vlan OR4
configure vlan OR5 dhcp-address-range 10.74.28.20 - 10.74.28.200
configure vlan OR5 dhcp-options default-gateway 10.74.28.1
enable dhcp ports 40-43 vlan OR5
configure vlan OR6 dhcp-address-range 10.74.29.20 - 10.74.29.200
configure vlan OR6 dhcp-options default-gateway 10.74.29.1
enable dhcp ports 46-47 vlan OR6
configure vlan OR0 dhcp-address-range 10.74.23.20 - 10.74.23.200
configure vlan OR0 dhcp-options default-gateway 10.74.23.1
enable dhcp ports 48 vlan OR0

configure pim add vlan "OR1" sparse passive
configure pim add vlan "OR2" sparse passive
configure pim add vlan "OR3" sparse passive
configure pim add vlan "OR4" sparse passive
configure pim add vlan "OR5" sparse passive
configure pim add vlan "OR6" sparse passive
configure pim add vlan "OR0" sparse passive
configure pim add vlan "Local_1" sparse passive

configure pim crp vlan "Local_1" "rp-list1" 30
configure pim cbsr vlan "Local_1"

enable pim

preconfigured rp-list:

entry extreme_rp1 {
	if match any { }
	then { 
	nlri 239.1.24.0/24 ;
	nlri 239.1.25.0/24 ;
	nlri 239.1.26.0/24 ;
	nlri 239.1.27.0/24 ;
	nlri 239.1.28.0/24 ;
	nlri 239.1.29.0/24 ;
	nlri 239.1.23.0/24 ;
	nlri 239.249.0.0/24 ;
	nlri 239.255.255.0/24 ;
	nlri 224.2.127.254/32 ;
	}
}
 
Now we need to connect to a different network (from OR0 port 48 through a gateway on
10.74.23.254) to another switch (on our customers network) where two servers are situated in the ip range 10.64.23.0/24 with GW 10.64.23.254. 

The server must recieve the multicast and ip traffic from OR0-OR6. 

Can this be done with a static route ? What else does need to be configured?

Kind regards, 

Erwin
Photo of Erwin van Hoof

Erwin van Hoof

  • 344 Points 250 badge 2x thumb

Posted 2 years ago

  • 0
  • 1
Photo of OscarK

OscarK, ESE

  • 7,702 Points 5k badge 2x thumb
Simpliest way would be to create vlan or08 with ip 10.64.23.254 and enable all for that. If you need to go through another router/switch you can do a static route but that other router should also do pim otherwise multicast is not gonna work.
Photo of Erwin van Hoof

Erwin van Hoof

  • 344 Points 250 badge 2x thumb
But there is one issue.... 

I get from my client on the extreme switch 10.74.23.1 as my ip address (for the interface on port 48) which should use 10.74.23.254 as gateway

Then there is the clients routers/switchers which support ip forwarding and pim.

Then the servers are on the clients network on 10.64.23.0/24.

The  option of setting up an or08 will not work then with 10.64.23.254 ? 
Photo of OscarK

OscarK, ESE

  • 7,702 Points 5k badge 2x thumb
ok, then the vlan create would not help.

Either do OSPF between your switch and clients switch or do static route to clients network. The clients switch should also have static routes to your IP subnets.
Photo of Paul Russo

Paul Russo, Alum

  • 9,694 Points 5k badge 2x thumb
Hello Erwin

ok so the user traffic is coming in 10.74.23.x and need to get to 10.64.23.254 which is off another router in the network, correct?

How is the 670 connecting to the customers network?  what port is it using?  If the port is using 10 as an example then I think you will need a transition subnet to route from the 670 to the user.  So something like 10.74.x.0 routed to 10.1.1.1/30 (port 10) to 10.1.1.2/30 (user router) 10.64.23.0  the 10.1.1.0 subnet needs to be added to OSPF and PIM.

So if I am completely wrong on what you are doing please let me know. :)

P
Photo of Erwin van Hoof

Erwin van Hoof

  • 344 Points 250 badge 2x thumb
Thanks for your reply. 

The port used for the connection to the clients network is 48 and all traffic needs to be routed from  vlan's OR0-6 to ip 10.74.23.254 (which is my clients gateway) on the other end we get the range 10.64.23.x with gw 10.64.23.254 for the servers. 

Which commands should be used for ospf and PIM.... and do I need to add lines to my RP-List
Photo of Erik Auerswald

Erik Auerswald, Embassador

  • 12,782 Points 10k badge 2x thumb
Hi Erwin,

the first step is to create unicast connectivity to the remote servers. That can be a static route:
configure iproute 10.64.23.0/24 10.74.23.254
Routes to your IP networks need to be present on the client's router(s) for return traffic.

You might want to redistribute the static route into OSPF:
enable ospf export static cost 10 type ase-type-2
Then you need to change the PIM in VLAN OR0 (transit VLAN to the client's router) from passive to active:
configure pim del vlan "OR0"
configure pim add vlan "OR0" sparse
You should not need to adjust your RP list, unless the multicast groups using your RP have changed.

HTH,
Erik
Photo of Erwin van Hoof

Erwin van Hoof

  • 344 Points 250 badge 2x thumb
Thank you very much for your help.