02-17-2015 01:03 PM - edited 03-07-2019 10:42 PM
Hello Folks,
I will keep it short and simple , here is the scenario:
1. got the dedicated fibre ring (single , not dual) covering almost 50 km and there are 24 layer 3 switches hooked up with it.
2: want to run OSPF on this ring to keep the things simple and easy.
3: thinking to have DR/BDR in my network.
4: got different VLANS's in different subnets.
can someone send configuration example based on ring topology please?
your quick response will be very much appreciated.
Thanks,
mir
02-17-2015 01:10 PM
Hi,
Are all these 24 switches core/distro switches or these are access layer switches.
If you only have 2 or 4 core switches and the rest (20) are access, than you may keep the access switches as layer-2 and run layer-3 (OSPF) on the cores
Can you provide a diagram of your network?
HTH
02-17-2015 01:30 PM
Reza thanks for quick reply,
there is no segregation in core/distribution and access.
these are the only switches hooked up on the ring and these are layer 3 switches . There is a LAN behind these switches. I got 24 like these on the ring. Sorry don,t have diagram at this point but it will be like this roughly:
02-17-2015 01:44 PM
Hi,
Thanks for clarification.
So one way to do this is to have /30 between each segment. For example: configure a /30 subnet between switch-1 and switch-2 and another /30 between 2 and 3 and so on...
If you don't have a lot of vlans in each location, you can simply put all 24 switches in one area (area 0). This configuration is pretty simple, as you just need to add each /30 and the SVIs for the local vlans to the OSPF. You also need a loopback interface for each switch/router.
HTH
02-17-2015 01:54 PM
Thanks Reza, I don;t have more than 5 vlans , maximum on each site. here is what I have done . This is example of just two sites.
Few more things which I forgot to mentione before , that I want to make one site as primary and other one as secondary , that other 20 sites could only talk in DR/BDR fashion.
should I configure RSTP in that: look at this config and please let me know:
vlan 10
name SCADA_MGMT
vlan 20
name SCADA_LAN
vlan 50
name SCADA_DMZ
!
ip subnet-zero
spanning-tree mode rapid-pvst
no spanning-tree optimize bpdu transmission
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
spanning-tree vlan 10,20,50,105
!
vlan internal allocation policy ascending
!
interface range ------- (WILL DECIDE LATER)
shutdown
ip routing
!
vlan internal allocation policy ascending
!
!
interface GigabitEthernet0/1
description "LINK TO "
switchport trunk encapsulation dot1q
switchport trunk native vlan 105
switchport trunk allowed vlan 10,20,50,105
switchport mode trunk
switchport nonegotiate
!
interface GigabitEthernet0/15
description "LINK TO "
switchport trunk encapsulation dot1q
switchport trunk native vlan 105
switchport trunk allowed vlan 10,20,50,105
switchport mode trunk
switchport nonegotiate
!
interface Vlan1
no ip address
shutdown
!
interface Vlan10
description "SCADA_MGMT_VLAN"
ip address 192.168.10.10 255.255.255.0
!
interface Vlan20
description "SCADA_LAN"
ip address 10.10.10.10 255.255.255.0
!
INTERFACE LO0
IP ADDRESS 20.20.20.20 255.255.255.0
!
ROUTER OSPF 1
ROUTER_ID 20.20.20.20
NETWORK 20.20.0.0 0.0.255.255 AREA 0
NETWORK 192.168.10.0 0.0.0.255 AREA 0
NETWORK 10.10.10.0 0.0.0.255 AREA 0
===============================================
SITE B
vlan 10
name SCADA_MGMT
vlan 20
name SCADA_LAN
vlan 50
name SCADA_DMZ
!
ip subnet-zero
spanning-tree mode rapid-pvst
no spanning-tree optimize bpdu transmission
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
spanning-tree vlan 10,20,50,105
!
vlan internal allocation policy ascending
!
interface range ------- (WILL DECIDE LATER)
shutdown
ip routing
!
vlan internal allocation policy ascending
!
!
interface GigabitEthernet0/1
description "LINK TO "
switchport trunk encapsulation dot1q
switchport trunk native vlan 105
switchport trunk allowed vlan 10,20,50,105
switchport mode trunk
switchport nonegotiate
!
interface GigabitEthernet0/15
description "LINK TO "
switchport trunk encapsulation dot1q
switchport trunk native vlan 105
switchport trunk allowed vlan 10,20,50,105
switchport mode trunk
switchport nonegotiate
!
interface Vlan1
no ip address
shutdown
!
interface Vlan10
description "SCADA_MGMT_VLAN"
ip address 192.168.20.10 255.255.255.0
!
interface Vlan20
description "SCADA_LAN"
ip address 30.30.30.0 255.255.255.0
!
INTERFACE LO0
IP ADDRESS 40.40.40.10 255.255.255.0
!
ROUTER OSPF 1
ROUTER_ID 40.40.40.10
NETWORK 192.168.0 0.0.255.255 AREA 0
NETWORK 30.30.0.0 0.0.0.255 AREA 0
NETWORK 40.40.0.0 0.0.0.255 AREA 0
02-17-2015 02:04 PM
Ok, lets first figure out few things:
1-How physically your access switches are connected to each local core switch?
2-what type of switches you are using for the core and what technology i.e stacking, VSS, VPC, etc.. are you using?
3-are all vlans unique to that local location or the vlans span across multiple sites?
HTH
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide