MSR36-60 設備一台,沒有增加板卡,用主機自帶的三個網口,其中GE2配置interface GigabitEthernet0/2;port link-mode bridge; port access vlan 244;設置了一個VLAN244 ,並且在VLANif中設置ip地址 192.168.233.1 24 ,將筆記本接GE2下配置192.168.233.100 無法與VLANif (192.168.233.1)通信,這是怎麼回事啊?
(0)
最佳答案
你的問題是:在 H3C MSR36-60 路由器上,將 GE2 設置為 access 模式並加入 VLAN 244,同時給 VLAN 244 的三層接口 Vlan-interface 244 配了 IP 地址 192.168.233.1/24,但筆記本接在 GE2(配置 IP 為 192.168.233.100)無法與網關通信。
這類問題通常可以從以下幾個方向入手排查:
請確認是否 VLAN 244 已生效,並且綁定在了 GE2 接口上:
[MSR] display vlan 244
輸出應該包含 GE2 接口:
VID Type Ports
244 static GE2
如果 Ports 一欄沒有包含 GE2,說明 port access vlan 244 沒有生效或 VLAN 沒有創建成功。
如果 VLAN 244 沒有創建,可以先執行:
[MSR] vlan 244
[MSR-vlan244] quit
執行:
[MSR] display interface Vlan-interface 244
你應該看到 Line protocol is UP。如果顯示 down,說明三層接口沒有“活”起來,常見原因是:
沒有任何物理口屬於 VLAN 244;
或者所有下屬物理口都是 down 狀態;
👉 請檢查 GE2 接口狀態:
[MSR] display interface GigabitEthernet 0/2
確認它是 up 狀態。
簡單辦法:
看網卡燈是否亮;
在筆記本執行 ping 192.168.233.1 是否返回 "Destination host unreachable"(說明鏈路斷);
再執行:arp -a 看看是否有路由器的 MAC 地址。
你寫了如下配置:
interface GigabitEthernet 0/2
port link-mode bridge
port access vlan 244
這個配置是正確的。隻要你使用 port link-mode bridge 並配置 access vlan,路由器就會按 L2 模式接入 VLAN 244。
如果你不使用 port link-mode bridge,MSR 默認是路由(L3)口,不能加入 VLAN。
MSR 有可能默認配置了 ACL、Zone、防火牆策略。
如果你用了安全域(security-zone),請檢查是否存在禁止規則。
你可以暫時清除所有 ACL 做測試:
[MSR] undo packet-filter inbound
[MSR] undo packet-filter outbound
以下是一個最小可用配置,建議你對比一下:
vlan 244
interface GigabitEthernet 0/2
port link-mode bridge
port access vlan 244
interface Vlan-interface 244
ip address 192.168.233.1 255.255.255.0
在筆記本上抓包(用 Wireshark)看是否能收到 ARP 請求或應答;
從路由器上 ping 192.168.233.100,看是否能雙向;
嚐試從 MSR 上抓包:
[MSR] debugging packet vlan 244
| 問題 | 排查建議 |
|---|---|
| VLAN 未正確創建 | display vlan 244,是否有 GE2 接口 |
| 接口沒 up | display interface 看 GE2 和 Vlan-interface 是否都 up |
| 接口未加入 VLAN | port access vlan 244 是否配置生效 |
| 物理線纜問題 | 換線纜或確認網卡燈是否亮 |
| 防火牆/安全域攔截 | 檢查是否配置 zone、ACL、packet-filter |
(0)
正常來說不會不通的
你配置能發一下看一下嗎?

(0)
你好,配置已經貼出,麻煩幫忙排查一下。
重新修改了,麻煩您看看,這個基礎的錯誤還是不可能出現的
[MSR36-60]dis cu
#
version 7.1.064, Release 0707P21
#
sysname MSR36-60
#
telnet server enable
#
ip pool l2tp997 192.168.100.2 192.168.100.254
#
dhcp enable
dhcp server always-broadcast
#
dns proxy enable
dns server 221.7.1.20
#
password-recovery enable
#
vlan 1
#
vlan 233
#
vlan 244
#
controller Cellular0/0
#
controller Cellular0/1
#
interface Aux0
#
interface Virtual-Template0
#
interface Virtual-Template1
remote address pool l2tp997
ip address 192.168.100.1 255.255.255.0
#
interface NULL0
#
interface Vlan-interface233
#
interface Vlan-interface244
ip address 192.168.233.1 255.255.255.0
local-proxy-arp enable
tcp mss 1460
#
interface GigabitEthernet0/0
port link-mode route
combo enable copper
ip address 124.88.XX.XX 255.255.255.128
tcp mss 1280
nat outbound 3999
undo dhcp select server
ipsec apply policy XBBZ123
#
interface GigabitEthernet0/1
port link-mode route
combo enable copper
ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet0/2
port link-mode bridge
port access vlan 244
#
object-policy ip Any-Any
rule 0 pass time-range any
#
security-zone name Local
#
security-zone name Trust
#
security-zone name DMZ
#
security-zone name Untrust
#
security-zone name Management
#
zone-pair security source Any destination Any
object-policy apply ip Any-Any
#
scheduler logfile size 16
#
line class aux
user-role network-admin
#
line class tty
user-role network-operator
#
line class vty
user-role network-operator
#
line aux 0
user-role network-admin
#
line vty 0 5
authentication-mode scheme
user-role network-operator
protocol inbound ssh
#
line vty 6 63
authentication-mode scheme
user-role network-operator
#
ip route-static 0.0.0.0 0 124.88.XX.XX
#
ssh server enable
ssh user admin service-type stelnet authentication-type password
ssh server port 65535
#
undo gratuitous-arp-learning enable
#
acl advanced 3999
rule 2 deny ip source 192.168.1.0 0.0.0.255 destination 192.168.200.0 0.0.0.255
rule 3 permit ip source 192.168.233.0 0.0.0.255
rule 100 permit ip
#
password-control enable
undo password-control aging enable
undo password-control history enable
password-control length 6
password-control login-attempt 3 exceed lock-time 10
password-control update-interval 0
password-control complexity user-name check
#
domain system
#
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
local-user admin class manage
service-type ssh telnet terminal http https
authorization-attribute user-role network-admin
#
local-user guanli class manage
authorization-attribute user-role network-operator
#
local-user root class manage
service-type ftp
service-type ssh telnet terminal http https
authorization-attribute user-role network-admin
authorization-attribute user-role network-operator
#
ipsec transform-set XBBZ123
esp encryption-algorithm 3des-cbc
esp authentication-algorithm md5
#
ipsec policy-template XBBZ123 65534
transform-set XBBZ123
ike-profile XBBZ123
sa duration time-based 3600
sa duration traffic-based 1843200
#
ipsec policy XBBZ123 65534 isakmp template XBBZ123
#
l2tp-group 997 mode lns
allow l2tp virtual-template 1 remote kpx4g
tunnel name kpx
tunnel password cipher $c$3$fCOm
#
l2tp enable
#
ike profile XBBZ123
keychain XBBZ123
dpd interval 60 on-demand
exchange-mode aggressive
local-identity address 124.88.XX.XX
match remote identity address 0.0.0.0 0.0.0.0
proposal 65534
#
ike proposal 65534
encryption-algorithm 3des-cbc
dh group2
authentication-algorithm md5
#
ike keychain XBBZ123
pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$2riRn
#
ip http port 65534
ip https port 4433
ip http enable
ip https enable
#
wlan global-configuration
#
wlan ap-group default-group
vlan 1
#
return
[MSR36-60]
(0)
親~登錄後才可以操作哦!
確定你的郵箱還未認證,請認證郵箱或綁定手機後進行當前操作
舉報
×
侵犯我的權益
×
侵犯了我企業的權益
×
抄襲了我的內容
×
原文鏈接或出處
誹謗我
×
對根叔社區有害的內容
×
不規範轉載
×
舉報說明