cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
875
Views
0
Helpful
6
Replies

Cisco Catalyst 2960X

Sally Daugherty
Level 1
Level 1

I have 8 Catalyst 2960X-24TS-L switches, all configured the same. 4 switches make up one network and 4 switches make up another. I have an Fluke analyzer that I connect to the networks to "see" what's out there. When I connect to the first network I am not able to "discover" anything. The only thing reported is the analyzer (ip and subnet are correct on analyzer). When I connect to the second network, I am able to "discover" everything as expected.

These are new switches that are just being put into service.

I have tried disconnecting everything (copper and fiber) from one switch except the analyzer and the switch. The analyzer finds itself but not the switch. I have plugged in one PC and still only the analyzer shows. I reset the switch to the factory settings this morning and reconfigured. The only changes are IP address, no spanning tree, no igmp snooping and enable snmp.

Any idea what I am missing? I would really appreciate any suggestions. Thanks

Below is the configuration, I removed passwords/ip for obvious reasons.

User Access Verification

Password:
1ON1-SW09-SCA>en
Password:
1ON1-SW09-SCA#show running-config
Building configuration...

Current configuration : 4993 bytes
!
! Last configuration change at 07:17:56 MDT Thu Mar 31 2016
! NVRAM config last updated at 07:13:10 MDT Thu Mar 31 2016
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service sequence-numbers
!
hostname 1ON1-SW09-SCA
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$Yv4R$dn7C5tSdZ5gUs7bMT2uZC.
enable password
!
no aaa new-model
clock timezone MST -7 0
clock summer-time MDT recurring
switch 1 provision ws-c2960x-24ts-l
!
!
no ip igmp snooping
!
!
crypto pki trustpoint TP-self-signed-2646719360
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-2646719360
 revocation-check none
 rsakeypair TP-self-signed-2646719360
!
!
crypto pki certificate chain TP-self-signed-2646719360
 certificate self-signed 01
  3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 32363436 37313933 3630301E 170D3136 30333331 31323533
  30355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36343637
  31393336 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  810098A1 312ED4B5 C990EABE 3BF86D5F 2F22A775 FF988434 4A852427 64F0D88D
  B3328B8E 107C5782 A22FF125 02953035 B730CB68 7B81B591 17D637B1 542A6B88
  A05F23F4 C8F86475 7064C916 28CD26E6 CC216195 82F6E61B B12A199C FF61BA6B
  B86BA540 7CB639E3 AEB5EDFC 364D1824 B067BE9F 088B38EA 1F61EDDA 5CD662BB
  71A50203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
  551D2304 18301680 141F4422 89D8C9A3 1FF3D117 33DF3CEB FCACF5E0 B8301D06
  03551D0E 04160414 1F442289 D8C9A31F F3D11733 DF3CEBFC ACF5E0B8 300D0609
  2A864886 F70D0101 05050003 81810036 EA68F995 2C72908F E5696565 6E235E67
  44CB9985 1F69D594 A0906376 40DB227E 89BE4319 3E77AC24 D0714955 5261F494
  817A70FD CBD7191E DEA776EF DD659FFE F5576B55 C570A013 F4D7EAE9 20098385
  FCB1591D AD0F1DE4 CB3A46E2 55656A8A 7FD22AFA AB3B574C 9D87AD75 82CDFB91
  35AFD661 87907872 D2C03A07 132FAA
        quit
!
spanning-tree mode pvst
spanning-tree extend system-id
no spanning-tree vlan 1
!
!
!
!
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet0
 no ip address
 shutdown
!
interface GigabitEthernet1/0/1
!
interface GigabitEthernet1/0/2
!
interface GigabitEthernet1/0/3
!
interface GigabitEthernet1/0/4
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
 description VM1
!
interface GigabitEthernet1/0/23
 description VM2
!
interface GigabitEthernet1/0/24
 description VM3
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface Vlan1
 ip address
!
ip http server
ip http secure-server
!
!
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps transceiver all
snmp-server enable traps call-home message-send-fail server-fail
snmp-server enable traps tty
snmp-server enable traps license
snmp-server enable traps auth-framework sec-violation
snmp-server enable traps cluster
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps fru-ctrl
snmp-server enable traps entity
snmp-server enable traps event-manager
snmp-server enable traps power-ethernet police
snmp-server enable traps cpu threshold
snmp-server enable traps rep
snmp-server enable traps vstack
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps stpx inconsistency root-inconsistency loop-inconsistency
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps stackwise
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
!
!
line con 0
 password
 login
line vty 0 4
 password
 login
line vty 5 15
 password
 login
!
end

1ON1-SW09-SCA#

6 Replies 6

Leo Laohoo
Hall of Fame
Hall of Fame

STP portfast not enabled.  SO I guess nearly all the clients don't have a valid IP address?

All the clients have valid IP addresses. The system works fine other than I cannot "see" any devices when I connect the analyzer to the switch to "discover" everything that is connected. I do this to determine if there is something out there that shouldn't be.

All the clients have valid IP addresses.

Are the clients getting DHCP or static IP address?

Marvin Rhoads
Hall of Fame
Hall of Fame

You should never ever configure "no spanning tree" globally.

I had to do it for one VLAN once (in 25 years of working with LANs) and it was only to work with a Spanish telco with some very strange requirements that were non-negotiable since we were putting equipment in their data center. Usually it's a recipe for disaster.

"spanning-tree portfast" on user-facing ports is good for many use cases but can be problematic if a user plugs in hubs and such. It's best used in conjunction with bpduguard.

The system we have requires spanning tree be disabled.

Sally Daugherty
Level 1
Level 1

I finally found it. There was a setting in the analyzer that was restricting the ip addresses of the network in question. Removed the restriction and now the analyzers "discovers" everything.

Thanks to those who responded with suggestions.

Review Cisco Networking for a $25 gift card