{"id":1033,"date":"2019-07-24T09:16:51","date_gmt":"2019-07-24T15:16:51","guid":{"rendered":"https:\/\/ugit.siua.ac.cr\/?p=1033"},"modified":"2019-09-25T14:35:51","modified_gmt":"2019-09-25T20:35:51","slug":"zoneminder-crear-bridge-a-vlan-210-camaras","status":"publish","type":"post","link":"https:\/\/sada.services\/?p=1033","title":{"rendered":"ZONEMINDER: Crear Bridge a VLAN 210 C\u00e1maras"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li>Paso 1: sobre el servidor proxmox \u00abzeus\u00bb ingresamos por SSH como ugit-&gt;root<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>ssh 10.200.0.10 -l ugit<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 2: Lo segundo que debemos saber es si debian tiene activado el m\u00f3dulo 802.1q utilizado para enlaces truncales<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>lsmod | grep 8021q<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Si no da ning\u00fan resultado el m\u00f3dulo no esta instalado, por lo que para instalarlo ejecutamos:<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>modprobe 8021q<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Una vez instalado podemos ejecutar el comando \u00ablsmod\u00bb de nuevo para comprobar la instalaci\u00f3n:<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>lsmod | grep 8021q<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>RESULTADO:<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>8021q 32768 0\ngarp 16384 1 8021q\nmrp 20480 1 8021q<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 3: modificamos el \u00abinterfaces\u00bb para agregar las interfaces virtuales<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>nano \/etc\/network\/interfaces<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Actualmente el archivo se encuentra as\u00ed<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># network interface settings; autogenerated\n# Please do NOT modify this file directly, unless you know what\n# you're doing.\n#\n# If you want to manage part of the network configuration manually,\n# please utilize the 'source' or 'source-directory' directives to do\n# so.\n# PVE will preserve these directives, but will NOT its network\n# configuration from sourced files, so do not attempt to move any of\n# the PVE managed interfaces into external files!\n\nauto lo\niface lo inet loopback\n\nauto enp66s0\niface enp66s0 inet manual\n\nauto enp4s0\niface enp4s0 inet manual\n\nauto vmbr0\niface vmbr0 inet static\naddress 10.200.0.10\nnetmask 255.255.255.0\nbridge_ports enp66s0\nbridge_stp off\nbridge_fd 0\n\nauto vmbr1\niface vmbr1 inet static\naddress 181.193.87.5\nnetmask 255.255.255.240\ngateway 181.193.87.1\nbridge_ports enp4s0\nbridge_stp off\nbridge_fd 0\n#Interfaz Publica<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 4: Modificamos el archivo para crear las 2 interfaces virtuales una sobre la VLAN 200 y otra en la VLAN 210<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># network interface settings; autogenerated\n# Please do NOT modify this file directly, unless you know what\n# you're doing.\n#\n# If you want to manage part of the network configuration manually,\n# please utilize the 'source' or 'source-directory' directives to do\n# so.\n# PVE will preserve these directives, but will NOT its network\n# configuration from sourced files, so do not attempt to move any of\n# the PVE managed interfaces into external files!\n\nauto lo\niface lo inet loopback\n\nauto enp66s0\niface enp66s0 inet manual\n\nauto enp4s0\niface enp4s0 inet manual\n\n#******************************************\n#*** INTERFAZ VLAN 200 ****\n#******************************************\nauto enp66s0.200\niface enp66s0.200 inet manual\n\n\n#******************************************\n#*** INTERFAZ VLAN 210 ****\n#******************************************\nauto enp66s0.210\niface enp66s0.210 inet manual\n\n\nauto vmbr0\niface vmbr0 inet static\naddress 10.200.0.10\nnetmask 255.255.255.0\n#Le agregamos la etiqueta de la VLAN\nbridge_ports enp66s0.200 \nbridge_stp off\nbridge_fd 0\n\nauto vmbr1\niface vmbr1 inet static\naddress 181.193.87.5\nnetmask 255.255.255.240\ngateway 181.193.87.1\nbridge_ports enp4s0\nbridge_stp off\nbridge_fd 0\n#Interfaz Publica<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 5: Vamos dentro de la interfaz web de Proxmox \u00abZEUS\u00bb a la secci\u00f3n de redes y vamos a encontrar las nuevas interfaces virtuales<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"192\" src=\"\/wp-content\/uploads\/2019\/07\/1-16.png\" alt=\"\" class=\"wp-image-1034\" srcset=\"https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/1-16.png 1000w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/1-16-300x58.png 300w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/1-16-768x147.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 6: Verificamos los datos del bridge creado<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1000\" height=\"195\" src=\"\/wp-content\/uploads\/2019\/07\/2-15.png\" alt=\"\" class=\"wp-image-1035\" srcset=\"https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/2-15.png 1000w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/2-15-300x59.png 300w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/2-15-768x150.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Verificamos los siguientes datos: <ul><li>Direcci\u00f3n IP: asignada<\/li><li>M\u00e1scara: de red<\/li><li>Inicio Autom\u00e1tico: check = TRUE<\/li><li>VLAN aware: enviar etiqueta de VLAN check = TRUE<\/li><li>Puertos puente:\u00bbenp66s0&#8243;<\/li><li>Comentario<\/li><\/ul><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"662\" height=\"385\" src=\"\/wp-content\/uploads\/2019\/07\/3-11.png\" alt=\"\" class=\"wp-image-1036\" srcset=\"https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/3-11.png 662w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/3-11-300x174.png 300w\" sizes=\"(max-width: 662px) 100vw, 662px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 7: creamos el nuevo puente que dar\u00e1 acceso a la VLAN 210 \u00abzeus-&gt;Redes-&gt;Crear-&gt;Linux Bridge\u00bb<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"566\" height=\"323\" src=\"\/wp-content\/uploads\/2019\/07\/4-11.png\" alt=\"\" class=\"wp-image-1037\" srcset=\"https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/4-11.png 566w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/4-11-300x171.png 300w\" sizes=\"(max-width: 566px) 100vw, 566px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 8: Completamos los datos<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"623\" height=\"360\" src=\"\/wp-content\/uploads\/2019\/07\/5-10.png\" alt=\"\" class=\"wp-image-1038\" srcset=\"https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/5-10.png 623w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/5-10-300x173.png 300w\" sizes=\"(max-width: 623px) 100vw, 623px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 9: para comprobar que tenemos acceso a la VLAN 210 podemos hacer ping a un aip de la VLAN 210<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>ping 10.210.0.1<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 10: Ahora dentro de la m\u00e1quina virtual de zoneminder vamos a crear un dispositivo de red que acceda a la VLAN 210 \u00abzeus-&gt;102(zoneminder1)-&gt;Hardware-&gt;A\u00f1adir-&gt;Dispositivo de Red\u00bb<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"623\" height=\"285\" src=\"\/wp-content\/uploads\/2019\/07\/6-12.png\" alt=\"\" class=\"wp-image-1039\" srcset=\"https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/6-12.png 623w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/6-12-300x137.png 300w\" sizes=\"(max-width: 623px) 100vw, 623px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 11: ahora a\u00f1adimos el dispositivo en \u00abModo puente\u00bb, seleccionando el puente a la LAN 210 de los pasos anteriores<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"307\" src=\"\/wp-content\/uploads\/2019\/07\/7-11.png\" alt=\"\" class=\"wp-image-1040\" srcset=\"https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/7-11.png 666w, https:\/\/sada.services\/wp-content\/uploads\/2019\/07\/7-11-300x138.png 300w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 12: reiniciamos el servidor \u00abzoneminder\u00bb y podemos probar que hace ping a una ip de la VLAN 210<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>ping 10.210.0.1<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>RESULTADO:<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>PING 10.210.0.1 (10.210.0.1) 56(84) bytes of data.\n64 bytes from 10.210.0.1: icmp_seq=1 ttl=64 time=0.213 ms\n64 bytes from 10.210.0.1: icmp_seq=2 ttl=64 time=0.345 ms<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Paso 13: asignarle IP fija, primeo ejecutamos el comando para ver que ahora contamos con otra tarjeta de red ens18 (VLAN: 200) y ens19 (VLAN 210)<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>ip a<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>1: lo: &lt;LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1\nlink\/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\ninet 127.0.0.1\/8 scope host lo\nvalid_lft forever preferred_lft forever\ninet6 ::1\/128 scope host \nvalid_lft forever preferred_lft forever\n2: ens19: &lt;BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000\nlink\/ether 62:b0:6c:ed:01:c7 brd ff:ff:ff:ff:ff:ff\n3: ens18: &lt;BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\nlink\/ether b2:f3:67:c1:23:55 brd ff:ff:ff:ff:ff:ff\ninet 10.200.0.19\/24 brd 10.200.0.255 scope global ens18\nvalid_lft forever preferred_lft forever\ninet6 fe80::b0f3:67ff:fec1:2355\/64 scope link \nvalid_lft forever preferred_lft forever<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Ahora editamos el archivo:<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>nano \/etc\/network\/interfaces<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>El archivo se encuentra as\u00ed actualmente<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># This file describes the network interfaces available on your system\n# and how to activate them. For more information, see interfaces(5).\n\nsource \/etc\/network\/interfaces.d\/*\n\n# The loopback network interface\nauto lo\niface lo inet loopback\n\n# The primary network interface\n\nallow-hotplug ens18\niface ens18 inet static\naddress 10.200.0.19\nnetmask 255.255.255.0\nbroadcast 10.200.0.255\ngateway 10.200.0.1<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Le agregamos los siguiente datos<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># This file describes the network interfaces available on your system\n# and how to activate them. For more information, see interfaces(5).\n\nsource \/etc\/network\/interfaces.d\/*\n\n# The loopback network interface\nauto lo\niface lo inet loopback\n\n# The primary network interface\n\nallow-hotplug ens18\niface ens18 inet static\naddress 10.200.0.19\nnetmask 255.255.255.0\nbroadcast 10.200.0.255\ngateway 10.200.0.1\n\nallow-hotplug ens19\niface ens19 inet static\naddress 10.210.0.11\nnetmask 255.255.255.0\nbroadcast 10.210.0.255<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Y con esto ya tenemos acceso a la VLAN 210<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Esta gu\u00eda explica c\u00f3mo crear interfaces virtuales para acceder al a VLAN 200 y VLAN 210 a la m\u00e1quina virtual de Zoneminder<\/p>\n","protected":false},"author":2,"featured_media":2072,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[48],"class_list":["post-1033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zoneminder","tag-zoneminder"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/sada.services\/index.php?rest_route=\/wp\/v2\/posts\/1033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sada.services\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sada.services\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sada.services\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sada.services\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1033"}],"version-history":[{"count":2,"href":"https:\/\/sada.services\/index.php?rest_route=\/wp\/v2\/posts\/1033\/revisions"}],"predecessor-version":[{"id":2105,"href":"https:\/\/sada.services\/index.php?rest_route=\/wp\/v2\/posts\/1033\/revisions\/2105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sada.services\/index.php?rest_route=\/wp\/v2\/media\/2072"}],"wp:attachment":[{"href":"https:\/\/sada.services\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sada.services\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sada.services\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}