-
It should be possible to communicate with each other, because there is no need to assign IP to the VLAN at Layer 2, if the VLAN is in the Layer 2 switch, add a Layer 3 or route, and then do static or dynamic routing for Layer 3.
-
You also need a router to connect to the switch, the interface connected by the router and the switch does not need to configure the IP address, but you need to configure two subnets, encapsulate them separately, and then configure the IP address, the IP address is the default gateway of each company's PC, and finally don't forget to activate these router sub-interfaces.
-
I don't know if your company has a public IP address, if you have, you can assign a server, so that all the companies can be accessed through the public network, server. The problem is that if your unit users can't access the Internet, then they must use single-arm routing to complete, but the problem is that single-arm routing is connected between subnets, that is, each office can also access each other, and there are security risks, so you need to do ACL control. Either a Layer 3 switch or a router, anyway, you need to use a Layer 3 device to implement your requirements.
-
The personal analysis is SVI 10 down, which directly causes the gateway to fail.
The reason for the SVI 10 down is likely to be that all the Ethernet ports belonging to VLAN 10 are down, that is, the ports connected to SW1.
Check the cables and try replacing the ports. There is a small chance that it is a port issue, or it is possible that there is an address conflict.
-
It is better to have a networking diagram
As long as one of the down ports in the problematic VLAN on 65 is up, all the servers that are not working will be connected. If you shut down the int vlan port and then no shutdown, you can also get through the server. ”
From this it feels like there may be a loop or an address conflict.
-
There are two ways to do it:
1. Only use Layer 2 switches, must support VLAN trunk, the method is: three VLANs are divided according to the port, and the server's network card is connected by VLAN trunk, which is equivalent to dividing the server's network card into 3 logical network cards, each with its own address, that is, setting 3 IP addresses, corresponding to 3 VLANs; Because you prohibit three VLANs from accessing each other, a Layer 2 switch is fine.
2. If you use a Layer 3 switch and turn on the routing function, in this way, the 3 VLANs can access each other by default, of course, on the Layer 3 switch, you must set the port addresses corresponding to the 3 VLANs, and the server can be placed in any VLAN, or build another VLAN room server; However, it is necessary to build access control to ensure that the three VLANs cannot access each other, and the server must be opened.
3. There is another way, that is, the server port can use the multihome mode, but the switch must support it, that is, this port can access 3 VLANs at the same time, I have not used it, and the server may need to set 3 IP addresses.
-
To communicate in a VLAN, of course, you need to enable the routing function!
After enabling the routing function under the interface!
Add a static route entry and you're good to go!
-
If the PC and server are in the same VLAN, the IP addresses of the same network segment can be configured to communicate directly.
If the two cars are not in the same VLAN, you need to configure inter-VLAN routing.
The method of implementing inter-VLAN routing is as follows:
In this diagram, a Layer 3 switch is used. You need to configure an IP address for the VLAN interface on the Layer 3 switch as the gateway address of the computer in the local VLAN. Then, run the ip routing command to start the inter-VLAN routing function.
Or you can use a single-arm route on the router to implement inter-VLAN communication. If you don't know the command, you can find a case for the out-of-the-box configuration by one-arm routing.
If the computer IP addresses and gateways in the VLAN are assigned by the DHCP server, you need to create multiple scopes on the DHCP server to use different IP addresses and gateway addresses from different network segments for different VLANs. Then start the DHCP relay on the device that implements VLAN routing and specify the IP address of the DHCP server.
-
Drop the PC and server gateway on the switch and you're good to go.
-
IP addresses in the same VLAN can be different, but different network segments cannot communicate with each other.
VLAN Introduction:
1. Virtual Local Area Network (VLAN): Virtual LAN is not a new type of LAN, it is just a technology applied to the switch or a protocol running on the switch.
2. The function of VLAN: Implement broadcast isolation on Layer 2 switches.
3. Characteristics of VLAN: Devices under the same VLAN can communicate, but devices under different VLANs cannot communicate.
Benefits of partitioning VLANs:
i: Isolated broadcast domain.
ii: Improved security;
iii: Easy to maintain and manage;
-
If you set it up like that, the two machines are in different subnets, and they can't communicate with each other, so it doesn't make sense for you to divide them into a VLAN. VLAN means virtual LAN, and the concept of LAN is a local area network, and the IP in it must be a network segment.
-
Hello, the network segment is based on the third bit of plagiarism, for example, in the 1 network segment is analogous. For example, if you divide 100 network segments, that is, you can choose on-demand.
If you want to communicate with each other from different network segments, you can use routes to communicate with each other. If it is in a Layer 3 switch, it has its own routing function, and you can directly access each other in different network segments, thank you!
-
Tool: Come *** rabbit. Sub **ip***
Language: Chinese Simplified.
Environment BAI: WinXP Vista Win7-10 Mobile 1Break through the DU corporate campus.
2.Dynamic zhiip to do web crawler! dao
3.Brush the traffic, brush the click traffic!
Rank up!
5.Modify the IP address
Dual IP effect.
-
Generally speaking, dividing VLANs is to divide different subnets for isolation, and to distinguish whether they are in the same subnet, the subnet mask is relied on. This is both a little bit of a connection between the VLAN and the subnet mask.
-
This can be done through a router or with a Layer 3 switch.
500 is definitely a problem on the server side, have confidence in your own computer.
Summary. The main differences between server hard drives and storage hard drives are in terms of purpose, performance, and reliability. >>>More
If VPS is like a faucet, the computing and storage resources of a server are a water pipe with many faucets on it. You will need to pay to rent this faucet, and its water flow is limited. If you want to get a bigger flow of water, then you need to rent more taps, and at the same time, if all the taps are running water, then the water flow rate of each tap will be reduced. >>>More
From a technical point of view:
Cloud servers use cloud computing technology, which integrates various software and hardware technologies such as computing, networking, and storage. Dedicated servers, that is, independent, do not integrate these resources. >>>More
In fact, U is a unit that represents the external dimensions of a server. >>>More