Example for Configuring MFF to Implement Layer 2 Isolation and Layer 3 Connection
Networking Requirements
As shown in Figure 7-5, a department of an enterprise uses SwitchA and SwitchB as the access devices for users, and SwitchC functions as the aggregation device. The administrator requires that user hosts in VLAN 10 be isolated on the access device and communicate with each other through the gateway. This allows the gateway to monitor user traffic. When a large number of users exist on the network, a DHCP server is deployed to allocate IP addresses to the users. Forwarding heavy amounts of traffic between the application server and users will cause the gateway to overload. Therefore, the administrator configures the application server (DHCP server) to transparently transmit user traffic.
Configuration Roadmap
The configuration roadmap is as follows:
Configure DHCP snooping on SwitchA and SwitchB to provide dynamic user information such as IP address, MAC address, and VLAN to implement Layer 2 isolation and Layer 3 connection.
Configure MFF on SwitchA and SwitchB to redirect user traffic to the gateway so that users are isolated at Layer 2 and communicate with each other at Layer 3. This configuration also allows the gateway to monitor user traffic.
Configure the DHCP server address on SwitchA and SwitchB so that traffic from the DHCP server to users can be transparently transmitted at Layer 2. This configuration relieves the traffic load on the gateway.
Configure transparent transmission of ARP request packets on SwitchA and SwitchB so that the gateway can detect the user status immediately.
Procedure
- Create VLANs and add interfaces to the VLANs.
# Create VLAN 10 on SwitchA and add interfaces 10GE1/0/1, 10GE1/0/2, and 10GE1/0/3 to VLAN 10.
<HUAWEI> system-view [~HUAWEI] sysname SwitchA [*HUAWEI] commit [~SwitchA] vlan batch 10
[*SwitchA] interface 10ge 1/0/1 [*SwitchA-10GE1/0/1] port link-type access [*SwitchA-10GE1/0/1] port default vlan 10 [*SwitchA-10GE1/0/1] quit
[*SwitchA] interface 10ge 1/0/2 [*SwitchA-10GE1/0/2] port link-type access [*SwitchA-10GE1/0/2] port default vlan 10 [*SwitchA-10GE1/0/2] quit
[*SwitchA] interface 10ge 1/0/3 [*SwitchA-10GE1/0/3] port link-type trunk [*SwitchA-10GE1/0/3] port trunk allow-pass vlan 10 [*SwitchA-10GE1/0/3] quit
# Create VLAN 10 on SwitchB and add interfaces 10GE1/0/1, 10GE1/0/2, and 10GE1/0/3 to VLAN 10.
<HUAWEI> system-view [~HUAWEI] sysname SwitchB [*HUAWEI] commit [~SwitchB] vlan batch 10
[*SwitchB] interface 10ge 1/0/1 [*SwitchB-10GE1/0/1] port link-type access [*SwitchB-10GE1/0/1] port default vlan 10 [*SwitchB-10GE1/0/1] quit
[*SwitchB] interface 10ge 1/0/2 [*SwitchB-10GE1/0/2] port link-type access [*SwitchB-10GE1/0/2] port default vlan 10 [*SwitchB-10GE1/0/2] quit
[*SwitchB] interface 10ge 1/0/3 [*SwitchB-10GE1/0/3] port link-type trunk [*SwitchB-10GE1/0/3] port trunk allow-pass vlan 10 [*SwitchB-10GE1/0/3] quit
- Configure DHCP snooping.
# Enable global DHCP snooping on SwitchA.
[*SwitchA] dhcp enable [*SwitchA] dhcp snooping enable
# All user hosts are in VLAN 10, so enable DHCP snooping for VLAN 10 on SwitchA.
[*SwitchA] vlan 10 [*SwitchA-vlan10] dhcp snooping enable [*SwitchA-vlan10] quit
# Configure 10GE1/0/3 on SwitchA as the trusted interface.
[*SwitchA] interface 10ge 1/0/3
[*SwitchA-10GE1/0/3] dhcp snooping trusted
[*SwitchA-10GE1/0/3] quit
# Enable global DHCP snooping on SwitchB.
[*SwitchB] dhcp enable [*SwitchB] dhcp snooping enable
# All user hosts are in VLAN 10, so enable DHCP snooping for VLAN 10 on SwitchB.
[*SwitchB] vlan 10 [*SwitchB-vlan10] dhcp snooping enable [*SwitchB-vlan10] quit
# Configure 10GE1/0/3 on SwitchB as the trusted interface.
[*SwitchB] interface 10ge 1/0/3
[*SwitchB-10GE1/0/3] dhcp snooping trusted
[*SwitchB-10GE1/0/3] quit
- Configure basic MFF functions.
# Enable global MFF on SwitchA.
[*SwitchA] mac-forced-forwarding enable
# Configure 10GE1/0/3 on SwitchA as a network interface.
[*SwitchA] interface 10ge 1/0/3
[*SwitchA-10GE1/0/3] mac-forced-forwarding network-port
[*SwitchA-10GE1/0/3] quit
# Enable MFF in VLAN 10 on SwitchA.
[*SwitchA] vlan 10
[*SwitchA-vlan10] mac-forced-forwarding enable
# Configure timed gateway detection on SwitchA.
[*SwitchA-vlan10] mac-forced-forwarding gateway-detect
# Enable global MFF on SwitchB.
[*SwitchB] mac-forced-forwarding enable
# Configure 10GE1/0/3 on SwitchB as a network interface.
[*SwitchB] interface 10ge 1/0/3
[*SwitchB-10GE1/0/3] mac-forced-forwarding network-port
[*SwitchB-10GE1/0/3] quit
# Enable MFF in VLAN 10 on SwitchB.
[*SwitchB] vlan 10
[*SwitchB-vlan10] mac-forced-forwarding enable
# Configure timed gateway detection on SwitchB.
[*SwitchB-vlan10] mac-forced-forwarding gateway-detect
- Set the application server IP address.
# Set the application server IP address on SwitchA.
[*SwitchA-vlan10] mac-forced-forwarding server 10.1.1.2
# Set the application server IP address on SwitchB.
[*SwitchB-vlan10] mac-forced-forwarding server 10.1.1.2
- Configure transparent transmission of ARP request packets.
# Configure SwitchA to transparently transmit ARP request packets.
[*SwitchA-vlan10] mac-forced-forwarding user-detect transparent
[*SwitchA-vlan10] quit
[*SwitchA] commit
[~SwitchA] quit
# Configure SwitchB to transparently transmit ARP request packets.
[*SwitchB-vlan10] mac-forced-forwarding user-detect transparent
[*SwitchB-vlan10] quit
[*SwitchB] commit
[~SwitchB] quit
- Verify the configuration.
# Run the display mac-forced-forwarding vlan 10 command to view the MFF configuration in VLAN 10.
<SwitchB> display mac-forced-forwarding vlan 10
Flags: S - static, D - dynamic --------------------------------------------------------------------------- Gateway detect : enable Dynamic user learning : enable User-detect transparent: enable Static gateway : - Max user : - Servers : 10.1.1.2 --------------------------------------------------------------------------- Gateway IP Gateway MAC --------------------------------------------------------------------------- 10.1.1.1 3867-9a11-0111 10.1.1.2 3867-9a11-0112 --------------------------------------------------------------------------- --------------------------------------------------------------------------- User IP User MAC Gateway IP Interface Flags --------------------------------------------------------------------------- 10.1.1.10 0001-0001-0002 10.1.1.1 10GE1/0/2 D --------------------------------------------------------------------------- MFF host total count = 1
# After the gateway interface connected to SwitchC is shut down, users in VLAN 10 cannot ping each other. After the gateway interface is recovered, users can ping each other. This indicates that the users are isolated at Layer 2 and communicate with each other at Layer 3. The MFF function takes effect.
Configuration Files
Configuration file of SwitchA
# sysname SwitchA # vlan batch 10 # mac-forced-forwarding enable # dhcp enable # dhcp snooping enable # vlan 10 dhcp snooping enable mac-forced-forwarding enable mac-forced-forwarding user-detect transparent mac-forced-forwarding gateway-detect mac-forced-forwarding server 10.1.1.2 # interface 10GE1/0/1 port default vlan 10 # interface 10GE1/0/2 port default vlan 10 # interface 10GE1/0/3 port link-type trunk port trunk allow-pass vlan 10 mac-forced-forwarding network-port dhcp snooping trusted # return
Configuration file of SwitchB
# sysname SwitchB # vlan batch 10 # mac-forced-forwarding enable # dhcp enable # dhcp snooping enable # vlan 10 dhcp snooping enable mac-forced-forwarding enable mac-forced-forwarding user-detect transparent mac-forced-forwarding gateway-detect mac-forced-forwarding server 10.1.1.2 # interface 10GE1/0/1 port default vlan 10 # interface 10GE1/0/2 port default vlan 10 # interface 10GE1/0/3 port link-type trunk port trunk allow-pass vlan 10 mac-forced-forwarding network-port dhcp snooping trusted # return