06-28-2022 05:22 PM - last edited on 06-30-2022 04:50 AM by Translator
This is a just a home setup for a Noob "Talking about myself here"
Setup is below.
- 1 Personal Computer.
- 3 ESXi Server.
- 1 Switch 3650 --> 192.168.0.30
- Cox router for internet access --> 192.168.0.1
I have created created some trunk cables and to connect to the ESXi and I created vlan 10. VMs inside the ESXi are working fine and now issues.
Here is the problem.
I was not able to connect to those VMs from my personal computer "IP 192.168.0.137" until I created a static route as following on windows.
# route add 10.10.10.0 MASK 255.255.255.0 192.168.0.30
Now, I can connect to those virtual machines on network 10.10.10.0 VLAN 10. But those virtual machines cannot ping me back and cannot access the internet. No issues on the VMs from DNS .... etc. and they are configured to use the GW 10.10.10.1 but cannot even ping the COX router 192.168.0.1
*** Appreciate if you can provide the commands beside the explanation
Running Config is below
waelswitch#show running-config
Building configuration...
Current configuration : 3376 bytes
!
! Last configuration change at 23:52:11 UTC Tue Jun 28 2022
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
service compress-config
!
hostname waelswitch
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 5 **********************
enable password 7 ************************
!
username admin privilege 15 password 7 *********************
username wmasry password 7 ********************
username cisco privilege 15 password 7 **********************
no aaa new-model
switch 1 provision ws-c3650-24ps
!
!
!
!
!
ip routing
!
ip name-server 8.8.8.8
ip name-server 8.8.4.4
!
!
qos queue-softmax-multiplier 100
!
!
diagnostic bootup level minimal
spanning-tree mode pvst
spanning-tree extend system-id
hw-switch switch 1 logging onboard message level 3
!
redundancy
mode sso
!
mode sso
!
!
!
class-map match-any non-client-nrt-class
!
!
!
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet1/0/1
!
interface GigabitEthernet1/0/2
!
interface GigabitEthernet1/0/3
!
interface GigabitEthernet1/0/4
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
switchport trunk allowed vlan 1,10
switchport mode trunk
switchport nonegotiate
spanning-tree portfast
!
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
switchport trunk allowed vlan 1,10
switchport mode trunk
switchport nonegotiate
spanning-tree portfast
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
switchport trunk allowed vlan 1,10
switchport mode trunk
switchport nonegotiate
spanning-tree portfast
!
interface GigabitEthernet1/0/24
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface Vlan1
ip address 192.168.0.30 255.255.255.0
!
interface Vlan2
no ip address
!
interface Vlan10
ip address 10.10.10.1 255.255.255.0
!
ip default-gateway 192.168.0.1
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
!
!
!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
privilege level 15
password 7 *********************
login local
transport input ssh
line vty 5 15
privilege level 15
password 7 ****************
login local
transport input ssh
!
wsma agent exec
profile httplistener
profile httpslistener
!
wsma agent config
profile httplistener
profile httpslistener
!
wsma agent filesys
profile httplistener
profile httpslistener
!
wsma agent notify
profile httplistener
profile httpslistener
!
!
wsma profile listener httplistener
transport http
!
wsma profile listener httpslistener
transport https
!
wireless security strong-password
ap group default-group
end
Solved! Go to Solution.
06-29-2022 12:26 AM - last edited on 06-30-2022 04:52 AM by Translator
If you looking this switch to be inter-vlan routing.
no ip default-gateway 192.168.0.1
ip route 0.0.0.0 0.0.0.0 192.168.0.1
if your 10.10.10.X network required Internet ( then you need to add this network into NAT Acl for that to work.)
also from that router, you need to route back to switch, since the Router do not know 10.10.10.X network, since you are not running any dynamic routing protocol here.
Cox router - you need route back 10.10.10.0 255.255.255.0 192.168.0.30
test and let us know.
06-28-2022 08:27 PM
makesure your VMs have correct gateway and virtual switches assigned with correct VLANs and VM network card assigned to correct VLAN.
06-29-2022 12:26 AM - last edited on 06-30-2022 04:52 AM by Translator
If you looking this switch to be inter-vlan routing.
no ip default-gateway 192.168.0.1
ip route 0.0.0.0 0.0.0.0 192.168.0.1
if your 10.10.10.X network required Internet ( then you need to add this network into NAT Acl for that to work.)
also from that router, you need to route back to switch, since the Router do not know 10.10.10.X network, since you are not running any dynamic routing protocol here.
Cox router - you need route back 10.10.10.0 255.255.255.0 192.168.0.30
test and let us know.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide