Header Only - DO NOT REMOVE - Extreme Networks

Routing multiple vlan's (within one switch x670) to other switch (not extreme)


We have currently a 'stand-alone' setup with one x670 with 7 vlan's (OR0-OR7). Which use multicast (PIM) and ip forwarding.

current config:
configure snmp sysName "Switch_A" configure sys-recovery-level switch reset configure vlan default delete ports all create vlan "OR1" configure vlan OR1 tag 11 create vlan "OR2" configure vlan OR2 tag 12 create vlan "OR3" configure vlan OR3 tag 13 create vlan "OR4" configure vlan OR4 tag 14 create vlan "OR5" configure vlan OR5 tag 15 create vlan "OR6" configure vlan OR6 tag 16 create vlan "OR0" configure vlan OR0 tag 10 create vlan "Local_1" enable loopback-mode vlan Local_1 configure vlan OR1 add ports 32-35 untagged configure vlan OR2 add ports 1-19 untagged configure vlan OR3 add ports 20-31 untagged configure vlan OR4 add ports 36-39 untagged configure vlan OR5 add ports 40-43 untagged configure vlan OR6 add ports 46-47 untagged configure vlan OR0 add ports 48 untagged configure vlan Mgmt ipaddress 10.0.0.1 255.0.0.0 configure vlan OR1 ipaddress 10.74.24.1 255.255.255.0 enable ipforwarding vlan OR1 configure vlan OR2 ipaddress 10.74.25.1 255.255.255.0 enable ipforwarding vlan OR2 configure vlan OR3 ipaddress 10.74.26.1 255.255.255.0 enable ipforwarding vlan OR3 configure vlan OR4 ipaddress 10.74.27.1 255.255.255.0 enable ipforwarding vlan OR4 configure vlan OR5 ipaddress 10.74.28.1 255.255.255.0 enable ipforwarding vlan OR5 configure vlan OR6 ipaddress 10.74.29.1 255.255.255.0 enable ipforwarding vlan OR6 configure vlan OR0 ipaddress 10.74.23.1 255.255.255.0 enable ipforwarding vlan OR0 configure vlan Local_1 ipaddress 192.168.100.1 255.255.255.255 enable ipforwarding vlan Local_1 create stpd s11 configure stpd s11 mode dot1w configure stpd s11 default-encapsulation dot1d configure stpd s11 add vlan OR1 ports 32-35 dot1d configure stpd s11 ports link-type edge 32-35 edge-safeguard enable bpdu-restrict recovery-timeout 60 configure stpd s11 tag 11 enable stp s11 create stpd s12 configure stpd s12 mode dot1w configure stpd s12 default-encapsulation dot1d configure stpd s12 add vlan OR2 ports 1-19 dot1d configure stpd s12 ports link-type edge 1-19 edge-safeguard enable bpdu-restrict recovery-timeout 60 configure stpd s12 tag 12 enable stp s12 create stpd s13 configure stpd s13 mode dot1w configure stpd s13 default-encapsulation dot1d configure stpd s13 add vlan OR3 ports 20-31 dot1d configure stpd s13 ports link-type edge 20-31 edge-safeguard enable bpdu-restrict recovery-timeout 60 configure stpd s13 tag 13 enable stp s13 create stpd s14 configure stpd s14 mode dot1w configure stpd s14 default-encapsulation dot1d configure stpd s14 add vlan OR4 ports 36-39 dot1d configure stpd s14 ports link-type edge 36-39 edge-safeguard enable bpdu-restrict recovery-timeout 60 configure stpd s14 tag 14 enable stp s14 create stpd s15 configure stpd s15 mode dot1w configure stpd s15 default-encapsulation dot1d configure stpd s15 add vlan OR5 ports 40-43 dot1d configure stpd s15 ports link-type edge 40-43 edge-safeguard enable bpdu-restrict recovery-timeout 60 configure stpd s15 tag 15 enable stp s15 create stpd s16 configure stpd s16 mode dot1w configure stpd s16 default-encapsulation dot1d configure stpd s16 add vlan OR6 ports 46-47 dot1d configure stpd s16 ports link-type edge 46-47 edge-safeguard enable bpdu-restrict recovery-timeout 60 configure stpd s16 tag 16 enable stp s16 create stpd s10 configure stpd s10 mode dot1w configure stpd s10 default-encapsulation dot1d configure stpd s10 add vlan OR0 ports 48 dot1d configure stpd s10 ports link-type edge 48 edge-safeguard enable bpdu-restrict recovery-timeout 60 configure stpd s10 tag 10 enable stp s10 configure ospf add vlan OR1 area 0.0.0.0 passive configure ospf add vlan OR2 area 0.0.0.0 passive configure ospf add vlan OR3 area 0.0.0.0 passive configure ospf add vlan OR4 area 0.0.0.0 passive configure ospf add vlan OR5 area 0.0.0.0 passive configure ospf add vlan OR6 area 0.0.0.0 passive configure ospf add vlan OR0 area 0.0.0.0 passive configure ospf add vlan "Local_1" area 0.0.0.0 passive configure ospf area 0.0.0.0 priority 10 enable ospf configure igmp 60 10 1 2 enable igmp snooping "OR1" fast-leave enable igmp snooping "OR2" fast-leave enable igmp snooping "OR3" fast-leave enable igmp snooping "OR4" fast-leave enable igmp snooping "OR5" fast-leave enable igmp snooping "OR6" fast-leave enable igmp snooping "OR0" fast-leave enable ipmcforwarding vlan "OR1" enable ipmcforwarding vlan "OR2" enable ipmcforwarding vlan "OR3" enable ipmcforwarding vlan "OR4" enable ipmcforwarding vlan "OR5" enable ipmcforwarding vlan "OR6" enable ipmcforwarding vlan "OR0" enable ipmcforwarding vlan "Local_1" configure vlan OR1 dhcp-address-range 10.74.24.20 - 10.74.24.200 configure vlan OR1 dhcp-options default-gateway 10.74.24.1 enable dhcp ports 32-35 vlan OR1 configure vlan OR2 dhcp-address-range 10.74.25.20 - 10.74.25.200 configure vlan OR2 dhcp-options default-gateway 10.74.25.1 enable dhcp ports 1-19 vlan OR2 configure vlan OR3 dhcp-address-range 10.74.26.20 - 10.74.26.200 configure vlan OR3 dhcp-options default-gateway 10.74.26.1 enable dhcp ports 20-31 vlan OR3 configure vlan OR4 dhcp-address-range 10.74.27.20 - 10.74.27.200 configure vlan OR4 dhcp-options default-gateway 10.74.27.1 enable dhcp ports 36-39 vlan OR4 configure vlan OR5 dhcp-address-range 10.74.28.20 - 10.74.28.200 configure vlan OR5 dhcp-options default-gateway 10.74.28.1 enable dhcp ports 40-43 vlan OR5 configure vlan OR6 dhcp-address-range 10.74.29.20 - 10.74.29.200 configure vlan OR6 dhcp-options default-gateway 10.74.29.1 enable dhcp ports 46-47 vlan OR6 configure vlan OR0 dhcp-address-range 10.74.23.20 - 10.74.23.200 configure vlan OR0 dhcp-options default-gateway 10.74.23.1 enable dhcp ports 48 vlan OR0 configure pim add vlan "OR1" sparse passive configure pim add vlan "OR2" sparse passive configure pim add vlan "OR3" sparse passive configure pim add vlan "OR4" sparse passive configure pim add vlan "OR5" sparse passive configure pim add vlan "OR6" sparse passive configure pim add vlan "OR0" sparse passive configure pim add vlan "Local_1" sparse passive configure pim crp vlan "Local_1" "rp-list1" 30 configure pim cbsr vlan "Local_1" enable pim
[/code]
preconfigured rp-list:

entry extreme_rp1 { if match any { } then { nlri 239.1.24.0/24 ; nlri 239.1.25.0/24 ; nlri 239.1.26.0/24 ; nlri 239.1.27.0/24 ; nlri 239.1.28.0/24 ; nlri 239.1.29.0/24 ; nlri 239.1.23.0/24 ; nlri 239.249.0.0/24 ; nlri 239.255.255.0/24 ; nlri 224.2.127.254/32 ; } }[/code]
Now we need to connect to a different network (from OR0 port 48 through a gateway on
10.74.23.254) to another switch (on our customers network) where two servers are situated in the ip range 10.64.23.0/24 with GW 10.64.23.254.

The server must recieve the multicast and ip traffic from OR0-OR6.

Can this be done with a static route ? What else does need to be configured?

Kind regards,

Erwin

7 replies

Userlevel 6
Simpliest way would be to create vlan or08 with ip 10.64.23.254 and enable all for that. If you need to go through another router/switch you can do a static route but that other router should also do pim otherwise multicast is not gonna work.
But there is one issue....

I get from my client on the extreme switch 10.74.23.1 as my ip address (for the interface on port 48) which should use 10.74.23.254 as gateway

Then there is the clients routers/switchers which support ip forwarding and pim.

Then the servers are on the clients network on 10.64.23.0/24.

The option of setting up an or08 will not work then with 10.64.23.254 ?
Userlevel 6
ok, then the vlan create would not help.

Either do OSPF between your switch and clients switch or do static route to clients network. The clients switch should also have static routes to your IP subnets.
Userlevel 6
Hello Erwin

ok so the user traffic is coming in 10.74.23.x and need to get to 10.64.23.254 which is off another router in the network, correct?

How is the 670 connecting to the customers network? what port is it using? If the port is using 10 as an example then I think you will need a transition subnet to route from the 670 to the user. So something like 10.74.x.0 routed to 10.1.1.1/30 (port 10) to 10.1.1.2/30 (user router) 10.64.23.0 the 10.1.1.0 subnet needs to be added to OSPF and PIM.

So if I am completely wrong on what you are doing please let me know. 🙂

P
Paul Russo wrote:

Hello Erwin

ok so the user traffic is coming in 10.74.23.x and need to get to 10.64.23.254 which is off another router in the network, correct?

How is the 670 connecting to the customers network? what port is it using? If the port is using 10 as an example then I think you will need a transition subnet to route from the 670 to the user. So something like 10.74.x.0 routed to 10.1.1.1/30 (port 10) to 10.1.1.2/30 (user router) 10.64.23.0 the 10.1.1.0 subnet needs to be added to OSPF and PIM.

So if I am completely wrong on what you are doing please let me know. 🙂

P

Thanks for your reply.

The port used for the connection to the clients network is 48 and all traffic needs to be routed from vlan's OR0-6 to ip 10.74.23.254 (which is my clients gateway) on the other end we get the range 10.64.23.x with gw 10.64.23.254 for the servers.

Which commands should be used for ospf and PIM.... and do I need to add lines to my RP-List
Userlevel 7
Paul Russo wrote:

Hello Erwin

ok so the user traffic is coming in 10.74.23.x and need to get to 10.64.23.254 which is off another router in the network, correct?

How is the 670 connecting to the customers network? what port is it using? If the port is using 10 as an example then I think you will need a transition subnet to route from the 670 to the user. So something like 10.74.x.0 routed to 10.1.1.1/30 (port 10) to 10.1.1.2/30 (user router) 10.64.23.0 the 10.1.1.0 subnet needs to be added to OSPF and PIM.

So if I am completely wrong on what you are doing please let me know. 🙂

P

Hi Erwin,

the first step is to create unicast connectivity to the remote servers. That can be a static route:
configure iproute 10.64.23.0/24 10.74.23.254[/code]Routes to your IP networks need to be present on the client's router(s) for return traffic.

You might want to redistribute the static route into OSPF:
enable ospf export static cost 10 type ase-type-2[/code]Then you need to change the PIM in VLAN OR0 (transit VLAN to the client's router) from passive to active:
configure pim del vlan "OR0" configure pim add vlan "OR0" sparse[/code]You should not need to adjust your RP list, unless the multicast groups using your RP have changed.

HTH,
Erik
Paul Russo wrote:

Hello Erwin

ok so the user traffic is coming in 10.74.23.x and need to get to 10.64.23.254 which is off another router in the network, correct?

How is the 670 connecting to the customers network? what port is it using? If the port is using 10 as an example then I think you will need a transition subnet to route from the 670 to the user. So something like 10.74.x.0 routed to 10.1.1.1/30 (port 10) to 10.1.1.2/30 (user router) 10.64.23.0 the 10.1.1.0 subnet needs to be added to OSPF and PIM.

So if I am completely wrong on what you are doing please let me know. 🙂

P

Thank you very much for your help.

Reply