cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
416
Views
0
Helpful
1
Replies

Cannot ping SVI

tedauction
Level 1
Level 1

Hello, I have connected up a new ws-c3650-48td to a WS-C3850-48P via Gi1/1/1.

The new switch simply has two vlans i.e. vlan 20 for all of the 48 access ports and vlan 200 for switch management simply via an SVI interface and a trunk uplink allowing both vlans 20 and 200.

The trunk has come up successfully, but I cannot ping the VLAN 200 SVI interface on the new switch 10.50.130.10.

Can anyone see why ?

Is it because I did not specifically define 'vlan 200' in the config - or perhaps I needed to enter 'ip routing' ?

Thanks kindly.

 

Current configuration : 21190 bytes
!
! Last configuration change at 13:50:00 NZDT Tue Nov 13 2018
!
version 16.3
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec
service timestamps log datetime localtime
service password-encryption
service compress-config
no platform punt-keepalive disable-kernel-core
!
hostname xxxxxx
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
logging discriminator DISCRIM msg-body drops 10.21.250.110
logging buffered discriminator DISCRIM 409600
!
no aaa new-model
clock timezone NZST 12 0
clock summer-time NZDT recurring 4 Sun Sep 2:00 1 Sun Apr 3:00
switch 1 provision ws-c3650-48td
!

!
no ip domain lookup
ip domain name xxxx.mediaworks.co.nz
!
ip dhcp snooping vlan 20
ip dhcp snooping
login on-failure log
login on-success log
!

!
vtp domain xxxxx.mediaworks.domain
vtp mode transparent
!
!
crypto pki trustpoint TP-self-signed-1939744218
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1939744218
revocation-check none
rsakeypair TP-self-signed-1939744218
!
!
crypto pki certificate chain TP-self-signed-1939744218
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31393339 37343432 3138301E 170D3138 31313133 30303037
32345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 39333937
34343231 38308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100A3EC CA5BACF0 88FD5AD0 F66F2AD7 392A9FCC 841AF66F 9B335D2C
4FBDC76D D6780134 B3B33216 D5DF48BC AED5865C EDD6829D 7C3C0BD3 635EC39C
29F8617A BC97FB3C 78DC9681 881FD3C9 7F6CBF6A 8C00718F 79FFB2B3 731C6DD0
0FDD8B20 A19AB37B 4FE74AAF 4EBC7396 26D81764 EAB46800 8C4EB044 D141FAD2
176E6747 57BEB763 9A671F08 BCE65DB0 3267F830 C6EFB98A 061036B8 1D46EBF9
CD80E74C 6039341D 4CDF1B64 CD9280FD 1FB8D930 E7FAF1E3 C5634B1F 34946AF2
B0131B6E AABE3A93 C5795172 5513652E BE98ADC4 52561583 EBFC9F32 3A47451F
160A10C8 5C557D6A E30822D0 978DD92B 221E01C8 C9B8A5E9 3A2A8BF3 04EF80EE
F9800E87 48F10203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 140D9C0E 32EAD338 100BB4CF 6177F7D5 D0699DF7
7C301D06 03551D0E 04160414 0D9C0E32 EAD33810 0BB4CF61 77F7D5D0 699DF77C
300D0609 2A864886 F70D0101 05050003 82010100 3572106B 2EC5A835 08F9F73D
C7732BA5 6973CE03 74CAB738 EA5B4E85 761E71DD C0EF2B9D A8417F0E 605BB60C
F10BA324 2F98D3DE 4DE0AFB2 E9414D85 CAE75470 A8A1105E 276D4179 0C71325B
A0D9B2E1 E1557718 B181F7C4 D0C54D6F 49F9C429 B7E76109 A7D90BF8 91305CED
5E50EC49 F44DDB56 5D996BA1 3796C2B7 9A1BE5B7 72D152BF 40368A03 86852DF2
16E1E1F4 DE80CFDA 6601E748 1D8941AA 6E938B5D 6435E16C E3019835 31E3F872
6CC1EA90 E61AA117 FCA6FD82 CD66BC07 DA0BA65F 1C3BE861 C126E689 E6CA045C
7F66A285 98D252E8 B7D39ABC BC8EC11D 6AE877F0 C273B364 4CEDF8ED 2E5E5625
DB04E71B 856A48D4 F13F20D5 529D060A 615688C2
quit
!
license boot level ipbasek9
diagnostic bootup level minimal
spanning-tree mode rapid-pvst
spanning-tree portfast bpduguard default
spanning-tree extend system-id
!
!
redundancy
mode sso
!
!
vlan 20
!
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, SGT Cache Full, LOGGING
class-map match-any IA-High
match ip dscp cs3
match ip dscp af31
match ip dscp af32
match ip dscp af33
class-map match-any system-cpp-default
description DHCP snooping, show forward and rest of traffic
class-map match-any system-cpp-police-sys-data
description Learning cache ovfl, Crypto Control, Exception, EGR Exception, NFL SAMPLED DATA, Gold Pkt, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any Multi-Media
match ip dscp cs6
match ip dscp ef
match ip dscp cs4
match ip dscp af41
match ip dscp af42
match ip dscp af43
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any Presence_Traffic
match access-group name Presence_Traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any IPPhone-SIGNALING
match access-group name IPPhone-SIGNALING
class-map match-any system-cpp-police-multicast
description Transit Traffic and MCAST Data
class-map match-any IPPhone-VOICE
match access-group name IPPhone-VOICE
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-control-low-priority
description ICMP redirect and general punt
class-map match-any system-cpp-police-wireless-priority1
description Wireless priority 1
class-map match-any system-cpp-police-wireless-priority2
description Wireless priority 2
class-map match-any system-cpp-police-wireless-priority3-4-5
description Wireless priority 3,4 and 5
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any DataTrans
match ip dscp af11
match ip dscp af12
match ip dscp af13
class-map match-any IA-Low
match ip dscp cs2
match ip dscp af21
match ip dscp af22
match ip dscp af23
!
policy-map port_child_policy
class non-client-nrt-class
bandwidth remaining ratio 10
policy-map Marking
class IPPhone-VOICE
set dscp ef
class IPPhone-SIGNALING
set dscp cs3
class Presence_Traffic
set dscp cs3
class class-default
set dscp af11
policy-map QUEUES
class Multi-Media
priority level 1
class IA-Low
bandwidth remaining percent 10
class DataTrans
bandwidth remaining percent 60
class IA-High
bandwidth remaining percent 15
class class-default
bandwidth remaining percent 15
policy-map system-cpp-policy
class system-cpp-police-data
police rate 200 pps
class system-cpp-police-sys-data
police rate 100 pps
class system-cpp-police-sw-forward
police rate 1000 pps
class system-cpp-police-multicast
police rate 500 pps
class system-cpp-police-multicast-end-station
police rate 2000 pps
class system-cpp-police-punt-webauth
class system-cpp-police-l2-control
class system-cpp-police-routing-control
police rate 1800 pps
class system-cpp-police-control-low-priority
class system-cpp-police-wireless-priority1
class system-cpp-police-wireless-priority2
class system-cpp-police-wireless-priority3-4-5
class system-cpp-police-topology-control
class system-cpp-police-dot1x-auth
class system-cpp-police-protocol-snooping
class system-cpp-police-forus
class system-cpp-default
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 20
switchport mode access
ip flow monitor NETFLOW-TRAFFIC input
spanning-tree portfast
service-policy input Marking
!
all interfaces same as above
!
interface GigabitEthernet1/1/1
switchport trunk allowed vlan 20,200
switchport mode trunk
switchprot trunk native vlan 200
switchport block multicast
service-policy output QUEUES
no ip igmp snooping tcn flood
ip dhcp snooping trust
!
interface GigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
no ip address
shutdown
!
interface Vlan200
ip address 10.50.130.10 255.255.255.0
no ip redirects
no ip proxy-arp
!
ip default-gateway 10.50.130.1
ip forward-protocol nd
no ip http server
ip http authentication local
no ip http secure-server
ip tftp source-interface Vlan200
ip tacacs source-interface Vlan200
ip ssh source-interface Vlan200
!
ip access-list standard ACL_Restrict_SNMP
permit 10.21.250.0 0.0.0.255
permit 10.5.1.0 0.0.0.255
!
ip access-list extended AutoQos-4.0-wlan-Acl-Bulk-Data
permit tcp any any eq 22
permit tcp any any eq 465
permit tcp any any eq 143
permit tcp any any eq 993
permit tcp any any eq 995
permit tcp any any eq 1914
permit tcp any any eq ftp
permit tcp any any eq ftp-data
permit tcp any any eq smtp
permit tcp any any eq pop3
ip access-list extended AutoQos-4.0-wlan-Acl-MultiEnhanced-Conf
permit udp any any range 16384 32767
permit tcp any any range 50000 59999
ip access-list extended AutoQos-4.0-wlan-Acl-Scavanger
permit tcp any any range 2300 2400
permit udp any any range 2300 2400
permit tcp any any range 6881 6999
permit tcp any any range 28800 29100
permit tcp any any eq 1214
permit udp any any eq 1214
permit tcp any any eq 3689
permit udp any any eq 3689
permit tcp any any eq 11999
ip access-list extended AutoQos-4.0-wlan-Acl-Signaling
permit tcp any any range 2000 2002
permit tcp any any range 5060 5061
permit udp any any range 5060 5061
ip access-list extended AutoQos-4.0-wlan-Acl-Transactional-Data
permit tcp any any eq 443
permit tcp any any eq 1521
permit udp any any eq 1521
permit tcp any any eq 1526
permit udp any any eq 1526
permit tcp any any eq 1575
permit udp any any eq 1575
permit tcp any any eq 1630
permit udp any any eq 1630
permit tcp any any eq 1527
permit tcp any any eq 6200
permit tcp any any eq 3389
permit tcp any any eq 5985
permit tcp any any eq 8080
ip access-list extended IPPhone-SIGNALING
permit tcp 10.22.130.0 0.0.0.255 host 10.22.250.20 eq 2000
permit tcp 10.22.130.0 0.0.0.255 host 10.22.250.21 eq 2000
permit tcp 10.22.130.0 0.0.0.255 host 10.22.250.22 eq 2000
permit tcp 10.22.130.0 0.0.0.255 host 10.22.132.23 eq 2000
permit tcp 10.22.131.0 0.0.0.255 host 10.22.250.20 eq 2000
permit tcp 10.22.131.0 0.0.0.255 host 10.22.250.21 eq 2000
permit tcp 10.22.131.0 0.0.0.255 host 10.22.250.22 eq 2000
permit tcp 10.22.131.0 0.0.0.255 host 10.22.132.23 eq 2000
ip access-list extended IPPhone-VOICE
permit udp 10.22.130.0 0.0.0.255 any range 16384 32767
permit udp 10.22.131.0 0.0.0.255 any range 16384 32767
ip access-list extended Presence_Traffic
permit tcp 10.21.130.0 0.0.0.255 any eq 5060
permit udp 10.21.130.0 0.0.0.255 any eq 5060
permit tcp 10.21.131.0 0.0.0.255 any eq 5060
permit udp 10.21.131.0 0.0.0.255 any eq 5060
!
logging source-interface Vlan200
logging host 10.21.250.23
logging host 10.21.250.110
!
snmp-server group mediaworksGroup v3 priv read ALL-ACCESS access ACL_Restrict_SNMP
snmp-server view ALL-ACCESS iso included
snmp-server location Wellington
snmp-server contact Mediaworks IT Department noc@mediaworks.co.nz
tacacs-server host 10.21.250.212
tacacs-server host 10.21.132.28
tacacs-server timeout 10
tacacs-server key 7 000A1E2C0E62182D2D6A5E760C4C290E08
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
login local
transport input ssh
line vty 5 15
login
transport input ssh
!
ntp source Vlan200
ntp server 10.14.254.116 prefer
ntp server 10.14.254.117
!
wsma agent exec
!
wsma agent config
!
wsma agent filesys
!
wsma agent notify
!
!
ap dot11 airtime-fairness policy-name Default 0
ap group default-group
ap hyperlocation ble-beacon 0
ap hyperlocation ble-beacon 1
ap hyperlocation ble-beacon 2
ap hyperlocation ble-beacon 3
ap hyperlocation ble-beacon 4
end

 

 

 

existingSwitch#sh int gi2/0/30 status

Port Name Status Vlan Duplex Speed Type
Gi2/0/30 connected trunk a-full a-1000 10/100/1000BaseTX

 

 

existingSwitch# ping
Protocol [ip]: ip
Target IP address: 10.50.130.10
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 10.50.130.1
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.50.130.10, timeout is 2 seconds:
Packet sent with a source address of 10.50.130.1
.....
Success rate is 0 percent (0/5)
existingSwitch#sh mac address-table int gi 2/0/30
Mac Address Table
-------------------------------------------

Vlan Mac Address Type Ports
---- ----------- -------- -----
20 a8b4.562e.5ab1 DYNAMIC Gi2/0/30
Total Mac Addresses for this criterion: 1

1 Reply 1

Deepak Kumar
VIP Alumni
VIP Alumni

Hi,

Duplicate post.

https://community.cisco.com/t5/routing/cannot-ping-svi/m-p/3746242

 

Regards,

Deepak Kumar

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: