cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3235
Views
5
Helpful
17
Replies

Virtual Interface is not reachable

Zafer*
Level 1
Level 1

Hello,

We saved the config and upgraded (The version is SY10) our Cisco Catalyst 6807 XL switch yesterday. The configuration is same, but we cannot reach our switch with management IP. It can not be pinged. We have multiple switches sitting in the same vlan, all these switches are accessible except this switch. We can reach it from console port and it handles all the traffic and working properly from the same vlan(management vlan) and other vlans as well. We checked the config of the management vlan and default gateway, everything seems right like other switches. All of the vlans are also active in this core switch. We tried to downgrade it to previous version(The version is SY8) but the remains the same. We compared running config of the core router with the saved config, everything looks same. I controlled the logs, and they also don't show any problem. There is no acces list which block Ip adresses. We tried to change also management Ip address of the core switch, the issue still remains same. What can be the problem, I am waiting for your helps. Thanks in advance.

 

 

1 Accepted Solution

Accepted Solutions

Zafer*
Level 1
Level 1

Thank you Guys for your help . Issue got fixed for our Core switch.

 

Resolution: As I said above we are using 6807-XL as Layer 2 distribution switch . When you reboot 6807-XL it automatically enables the “IP routing” after reboot . Since IP routing got enabled and no layer 3 route was configured , switch was not able to reach layer 2 gateway. We shut down the layer 3 routing with command “No IP routing “ automatically Layer 2 gateway of SVI started talking to distribution switch. 

View solution in original post

17 Replies 17

Hi @Zafer* 

 I had a similar issue in the past with this very same switch model and the problem was related to ARP. For some reason the ARP for management IP address was not taking place. In that situation a reload on the switch fixed the problem but it seems in your case it did not, right?

  Check if the ARP is there or not. If not, you can try to add a static ARP entry for testing. 

Thanks for reply,
i see arp entry correctly in the Switch and gateway firewall (Layer 3 ). We already rebooted the router . We changed the IP of the this switch as well to see there is no arp issue . I think the problem related with gateway. I am able to ping switch IP from the same switch(from itself) but not able to ping to gate way ip address (Configured on firewall). In the same vlan there are other switches and they are able to ping gateway ip address. (There is no polices on internal firewall to block the traffic . Same way from firewall i am able to ping other switches in the same vlan, but i can't ping only this switch in this vlan. MAC and ARP looks good.

What is the management interface and what is its IP address? Would you post the output of these commands on the switch

show ip route

show arp

HTH

Rick

Hello Rechard,


Thanks for reply ! Please find details attached.

 

Thank you for the output that I requested. Show ip route shows one connected subnet and no default route, which is probably what we would expect if ip routing were not enabled. And (importantly) it shows an arp entry for the 10.130.9.1 address. So there is some communication between your switch and its gateway. I am puzzled that ping fails.

As a next step in investigating the issue would you attempt the ping and then quickly check the logs of both the switch and the gateway to see if any messages were generated about the ping attempt?

Is it possible that some config change was made on the switch but not saved to startup config and therefore was lost in the reboot of the upgrade? 

HTH

Rick

Internal firewall ' here issue I think 

The traffic use different vlan tag when go and return back through fw.

Hello MHM,

It seems that we're facing an issue after upgrading the iOS on our router. Prior to the upgrade, everything was functioning correctly. The upgrade was performed virtually using SSH, but after completing it, we lost access to the router and are unable to ping the management IP address. It's important to note that we didn't make any changes to the firewall vlans ( there is no policies configured on internal firewall) or router configuration, except for modifying the router boot statement.

Clear arp in fw 

And check drop in fw

As i mention it vlan tag issue 

Hello MHM , Thanks for your reply . We are using PA320 there is no command to delete specific Arp entry . I have to delete entire interface Arp entry . We are in production now bit hesitate to clear all arp entry on interface , I will do that after working hours. But just for your Information We had rebooted our core distribution switch , when this issue started . also rebooted firewall . I believe this should clear entire arp table. Also we tried to change the IP of switch to generate new apr entry with new IP. 

Ok' FW inbetween 

From FW try ping mgmt IP of SW and use same subnet and different subnet 

Firewall is acting as our core L3 router . All L3 gateways are on firewall.  Distribution switch is configured same as other 40 switches on the network. only difference other switch's are  not connected directly on firewall . Distribution is connected directly. I can try changing the subnet after hours . but it will not me i believe.  Please check the topology for more details. Please review the attached image. 

We have configured ip default gateway (firewall Management Vlan IP) already on core switch (It was working before upgrade, i mean the same config was working without problem, that means default gateway config is correct) . On all our switches have SVI Management IP from this Vlan. Firewall has SVI Vlan (default gateway ip address) I don't think we need IP routing for this problem, because this is layer 2 communication (Without configuring IP routing we were able to access core) and now all other switches are working fine without configuring ip routing on them, just with default gateway. The core switch passing all the traffic through without issue. We are not able access only its management IP.

Yes' I know it l2 

And same defualt gateway config before and after upgrading.

This issue I see before for cata9000 series' the solution was enable ip routing.

So just for checking then you can disbale it.