03-31-2016 01:33 PM
I have 8 Catalyst 2960X-24TS-L switches, all configured the same. 4 switches make up one network and 4 switches make up another. I have an Fluke analyzer that I connect to the networks to "see" what's out there. When I connect to the first network I am not able to "discover" anything. The only thing reported is the analyzer (ip and subnet are correct on analyzer). When I connect to the second network, I am able to "discover" everything as expected.
These are new switches that are just being put into service.
I have tried disconnecting everything (copper and fiber) from one switch except the analyzer and the switch. The analyzer finds itself but not the switch. I have plugged in one PC and still only the analyzer shows. I reset the switch to the factory settings this morning and reconfigured. The only changes are IP address, no spanning tree, no igmp snooping and enable snmp.
Any idea what I am missing? I would really appreciate any suggestions. Thanks
Below is the configuration, I removed passwords/ip for obvious reasons.
User Access Verification
Password:
1ON1-SW09-SCA>en
Password:
1ON1-SW09-SCA#show running-config
Building configuration...
Current configuration : 4993 bytes
!
! Last configuration change at 07:17:56 MDT Thu Mar 31 2016
! NVRAM config last updated at 07:13:10 MDT Thu Mar 31 2016
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service sequence-numbers
!
hostname 1ON1-SW09-SCA
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$Yv4R$dn7C5tSdZ5gUs7bMT2uZC.
enable password
!
no aaa new-model
clock timezone MST -7 0
clock summer-time MDT recurring
switch 1 provision ws-c2960x-24ts-l
!
!
no ip igmp snooping
!
!
crypto pki trustpoint TP-self-signed-2646719360
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2646719360
revocation-check none
rsakeypair TP-self-signed-2646719360
!
!
crypto pki certificate chain TP-self-signed-2646719360
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363436 37313933 3630301E 170D3136 30333331 31323533
30355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36343637
31393336 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
810098A1 312ED4B5 C990EABE 3BF86D5F 2F22A775 FF988434 4A852427 64F0D88D
B3328B8E 107C5782 A22FF125 02953035 B730CB68 7B81B591 17D637B1 542A6B88
A05F23F4 C8F86475 7064C916 28CD26E6 CC216195 82F6E61B B12A199C FF61BA6B
B86BA540 7CB639E3 AEB5EDFC 364D1824 B067BE9F 088B38EA 1F61EDDA 5CD662BB
71A50203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 141F4422 89D8C9A3 1FF3D117 33DF3CEB FCACF5E0 B8301D06
03551D0E 04160414 1F442289 D8C9A31F F3D11733 DF3CEBFC ACF5E0B8 300D0609
2A864886 F70D0101 05050003 81810036 EA68F995 2C72908F E5696565 6E235E67
44CB9985 1F69D594 A0906376 40DB227E 89BE4319 3E77AC24 D0714955 5261F494
817A70FD CBD7191E DEA776EF DD659FFE F5576B55 C570A013 F4D7EAE9 20098385
FCB1591D AD0F1DE4 CB3A46E2 55656A8A 7FD22AFA AB3B574C 9D87AD75 82CDFB91
35AFD661 87907872 D2C03A07 132FAA
quit
!
spanning-tree mode pvst
spanning-tree extend system-id
no spanning-tree vlan 1
!
!
!
!
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet0
no ip address
shutdown
!
interface GigabitEthernet1/0/1
!
interface GigabitEthernet1/0/2
!
interface GigabitEthernet1/0/3
!
interface GigabitEthernet1/0/4
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
description VM1
!
interface GigabitEthernet1/0/23
description VM2
!
interface GigabitEthernet1/0/24
description VM3
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface Vlan1
ip address
!
ip http server
ip http secure-server
!
!
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps transceiver all
snmp-server enable traps call-home message-send-fail server-fail
snmp-server enable traps tty
snmp-server enable traps license
snmp-server enable traps auth-framework sec-violation
snmp-server enable traps cluster
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps fru-ctrl
snmp-server enable traps entity
snmp-server enable traps event-manager
snmp-server enable traps power-ethernet police
snmp-server enable traps cpu threshold
snmp-server enable traps rep
snmp-server enable traps vstack
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps stpx inconsistency root-inconsistency loop-inconsistency
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps stackwise
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
!
!
line con 0
password
login
line vty 0 4
password
login
line vty 5 15
password
login
!
end
1ON1-SW09-SCA#
03-31-2016 02:50 PM
STP portfast not enabled. SO I guess nearly all the clients don't have a valid IP address?
04-01-2016 07:36 AM
All the clients have valid IP addresses. The system works fine other than I cannot "see" any devices when I connect the analyzer to the switch to "discover" everything that is connected. I do this to determine if there is something out there that shouldn't be.
04-01-2016 02:57 PM
All the clients have valid IP addresses.
Are the clients getting DHCP or static IP address?
03-31-2016 04:32 PM
You should never ever configure "no spanning tree" globally.
I had to do it for one VLAN once (in 25 years of working with LANs) and it was only to work with a Spanish telco with some very strange requirements that were non-negotiable since we were putting equipment in their data center. Usually it's a recipe for disaster.
"spanning-tree portfast" on user-facing ports is good for many use cases but can be problematic if a user plugs in hubs and such. It's best used in conjunction with bpduguard.
04-01-2016 06:17 AM
The system we have requires spanning tree be disabled.
04-04-2016 10:48 AM
I finally found it. There was a setting in the analyzer that was restricting the ip addresses of the network in question. Removed the restriction and now the analyzers "discovers" everything.
Thanks to those who responded with suggestions.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide