08-26-2022 11:16 AM
Got in some new C9300L units, one L3 the other L2. Setup VTP server on the L3 and all four VLAN's are showing up fine in the L2. However, the L2 can't ping anything or be pinged by anything but the L3 switch it's directly connected to. Both switches see each other in CDP/LLDP Neighbors. I feel like I'm missing something super simple but my first discipline is not in Cisco so I'm grasping at straws.
Solved! Go to Solution.
08-26-2022 12:06 PM
remove the management VRF and try again.
08-26-2022 11:42 AM
for L2 to ping you need
ip defualt-gateway
08-26-2022 11:43 AM
L2 Gateway is set to the SVI address of the L3 interface (Native VLAN IP). I've had this set to the DG of the router and it made no difference. I'm open to suggestions though.
08-26-2022 11:46 AM
are you run any VRF for management ?
08-26-2022 12:02 PM
I have a VRF Management statement on the default 0/0 interface but that's not hooked into anything on either unit and the L3 is working fine (except not passing data from the L2 properly).
08-26-2022 12:06 PM
remove the management VRF and try again.
08-26-2022 12:11 PM
When I try that, I get two errors. The first is: Management interface VRF Mgmt-vrf can not be removed.
The second (trying to remove it from the default Gig0/0 interface) is Error in configuring Ethernet: No switchport
08-26-2022 12:26 PM
show ip route
and share the SW model and IOS Ver.
08-26-2022 12:38 PM
Both switches are Cisco C9300L units running IOS 17.9.1.
===================================================================================
#show ip route
Extended Host Mode is enabled
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, m - OMP
n - NAT, Ni - NAT inside, No - NAT outside, Nd - NAT DIA
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
H - NHRP, G - NHRP registered, g - NHRP registration summary
o - ODR, P - periodic downloaded static route, l - LISP
a - application route
+ - replicated route, % - next hop override, p - overrides from PfR
& - replicated local route overrides by connected
Gateway of last resort is 192.168.4.3 to network 0.0.0.0
S* 0.0.0.0/0 [0/0] via 192.168.4.3
192.168.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 192.168.4.0/24 is directly connected, Vlan172
L 192.168.4.1/32 is directly connected, Vlan172
192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.1.0/24 is directly connected, Vlan100
L 192.168.1.1/32 is directly connected, Vlan100
08-26-2022 12:57 PM
try this way
ping x.x.x.x source vlan <x> <<<- VLAN IP
if you success then
this is bug and I will search and find this bug number and update you.
note:- use the VLAN can access GW
08-26-2022 01:19 PM - edited 08-26-2022 01:28 PM
From the L3 switch (the one that can ping everything) I can ping the L2 switch with normal command as well as the source VLAN command. From L2 switch, I can't ping anything even with the source VLAN command.
So, I found a VRF statement on the non-working switch and removed it. I can now PING to the L3 switch it's directly connected to and up into the server stack. Can you explain why VRF is so destructive that it would prevent this?
08-26-2022 01:43 PM - edited 08-26-2022 01:44 PM
Yes this simple L2 not L3 but still add VRF make connectivity issue.
so I will search and check Cisco release note for 17.9.1., try to figure out why this happened or what is workaround instead of remove VRF.
If I get answer I will update you.
08-26-2022 01:44 PM
Thank you! Your help has been much appreciated!
08-26-2022 02:11 PM
One more thing...minor really, but on the L2, though I can ping out from that unit, I can't ping that unit from my PC so I can't login remotely.
And a curiosity I haven't looked into yet...but one of my VLAN's keeps bringing down the L3 unit (VLAN101). I have tried different IP's and it'll stay up fine for a few minutes then crash. I have to command-line in and disable the VLAN to get it back. Once it comes back, it acts fine until I re-enable the VLAN. The 101 is the more important one as it actually hosts the end-user PC's and will be necessary later on.
08-26-2022 02:28 PM
you meaning the VLAN is UP for few time then down ?
OK
show vlan
check which port connect to this VLAN
then
show spanning tree
check the port is FWD or BLK ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide