- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 11:46 AM - edited 03-04-2019 01:40 PM
I'm sure it's something simple, but I can't for the life of me figure out why our new connection isn't working.
We have a Main office with a connection through our Internet service providers TLS (transparent lan service) connection to a shop location, and an Austin office. Main Office has been connected to the Austin office for years, and we are just now setting up the Shop location. I've copied most of the config from the Austin router, and don't see why Austin is working but the Shop isn't. ISP says the only requirement is that the traffic be vlan tagged. If someone could tell me what I'm misssing, I'd be super grateful.
Main Office uses a C3750 switch, Austin uses a SR520 Router, and Shop location uses a C3560g-48ts switch. Main office ip is 192.168.254.1/29, Austin is 192.168.254.2/29, and Shop is 192.168.254.6/29. Austin and Main office used to be on /30.
here is the config for the Shop Switch showing 0/1 (a pc port) and 0/47 (routing port):
Shop-switch#sh run
Building configuration...
Current configuration : 8420 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Shop-switch
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$z09n$sFRRWgWerDW9rpbpAE8Sn0
enable password xxxxx
!
no aaa new-model
system mtu routing 1500
ip routing
!
!
!
mls qos
!
crypto pki trustpoint TP-self-signed-2514150528
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2514150528
revocation-check none
rsakeypair TP-self-signed-2514150528
!
!
crypto pki certificate chain TP-self-signed-2514150528
certificate self-signed 01
30820244 308201AD A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32353134 31353035 3238301E 170D3933 30333031 30303032
35315A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 35313431
35303532 3830819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100D166 D0204894 B3EF9CA3 F7F38B30 DDB2AE31 FC575418 8A8AB65C 0AEAA3FD
7CD36522 1EEBD6B3 78D74E95 BA443C90 3C04E88D DEBEDC91 7C4C7B29 64EBA008
651FECF2 B8698EAB 3FAE3DEE 0269B293 B805D435 228D761F AD4C1E6E FAC0D074
1E407FD6 55D80528 34317655 BBE49006 855918A8 53E32814 F268CE82 4BE38DF3
811D0203 010001A3 6C306A30 0F060355 1D130101 FF040530 030101FF 30170603
551D1104 10300E82 0C53686F 702D7377 69746368 2E301F06 03551D23 04183016
8014173D C95B6E52 AF5F4219 D106FC17 2D1B5313 54E0301D 0603551D 0E041604
14173DC9 5B6E52AF 5F4219D1 06FC172D 1B531354 E0300D06 092A8648 86F70D01
01040500 03818100 A6EA9D74 B449344F 484495F9 1BF3F9A3 2A250DF6 D871ADB7
59F642EF A83E6557 6352987D 2A67B215 8ABC916C FDE96C5F 5BA8E44D BCF88463
DC306EA0 B7013FA6 EA38729A 6AB8D7B9 D2C34A8C AD1F1256 8FAA06E5 0704F0AF
EE88EF56 AD27EDFB 3E333268 F044A29F 23F8FE9B 584477AE 25EB945B EBFD98B2
FF04425C 3C4DB1C4
quit
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface GigabitEthernet0/1
switchport access vlan 14
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet0/47
no switchport
ip address 192.168.254.6 255.255.255.248
!
interface Vlan1
no ip address
shutdown
!
interface Vlan14
ip address 192.168.14.1 255.255.255.0
ip helper-address 192.168.1.15
ip helper-address 192.168.1.46
!
interface Vlan15
ip address 192.168.15.1 255.255.255.0
ip helper-address 192.168.1.15
ip helper-address 192.168.1.46
!
ip http server
ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 192.168.254.1
ip route 0.0.0.0 0.0.0.0 192.168.254.4
!
logging esm config
snmp-server community xxxxx RO
!
!
line con 0
line vty 0 4
Solved! Go to Solution.
- Labels:
-
Other Routing
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 12:01 PM
Justin
You have not given us much to work with. We see a config for something that you say is not working but not anything to compare it to that is working. And very little about what is not working. From the config it looks like the switch connects to TLS on interface Gig0/47. Is that right? What is the interface state? Does the switch see any other devices over that connection? What is in the output of show arp? If we knew these things we might be in better position for giving answers.
But there is one clue in what you gave us. You said: " ISP says the only requirement is that the traffic be vlan tagged". When you configured Gig0/47 with no switchport then you disabled the ability to vlan tag.
HTH
Rick
Rick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 12:01 PM
Justin
You have not given us much to work with. We see a config for something that you say is not working but not anything to compare it to that is working. And very little about what is not working. From the config it looks like the switch connects to TLS on interface Gig0/47. Is that right? What is the interface state? Does the switch see any other devices over that connection? What is in the output of show arp? If we knew these things we might be in better position for giving answers.
But there is one clue in what you gave us. You said: " ISP says the only requirement is that the traffic be vlan tagged". When you configured Gig0/47 with no switchport then you disabled the ability to vlan tag.
HTH
Rick
Rick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 12:49 PM
Sorry, work is crazy and its taken me a couple hours just to get to typing a simple post.
So by not working, I mean I cant ping or transfer anything over the connection from either side. sh arp shows only the connections for the Main office connection on the Austin router, and the Austin Router on the Main Office switch. Shop switch does not show up on either. On the Office switch, sh arp only shows local interfaces.
Interface is up/up.
I'm very much a n00b to cisco, so I had put "no switchport" because I read that was how you enable the ability to assign an ip address to the port and enable routing. If that diables vlan tagging, then I guess it make sense that it wouldn't work. How can I route from one switch to the without doing "no switchport"? Looking at the Main Office switch, that port is configured with "no switchport" and seems to be working fine?
Main office switch interface config:
!
interface GigabitEthernet3/0/17
description Grande TLS to Austin 1.5mb
no switchport
bandwidth 1500
ip address 192.168.254.1 255.255.255.248
end
and here is the config for the Austin office interface:
!
interface FastEthernet4
ip address 192.168.254.2 255.255.255.248
duplex auto
speed auto
service-policy output QOS-Policy
end
let me know if you need any other info.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 12:58 PM
Justin
The working connections are not using vlan tags at all because they are routed ports. So you need to clarify with your provider what exactly they mean.
I think your TLS setup simply means you have the same IP subnet ie. 192.168.254.0/29 between sites and not that you actually need to use vlan tags. Certainly that looks like what is happening with your existing sites.
On your new router you have 2 default-routes
192.168.254.1 and .4 - what is .4 ?
Jon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 01:14 PM
I had wondered that. The ISP guy said it could be done without tagging, but that it took an act of congress to be done. I asked if our Austin shop was setup like that, and he said it was indeed setup for vlan tagged packets only. Looks like I may have to ask him again.
.4 is nothing. Its just left over from me screwing around when I had set the Austin router to .4 while changing the addresses from /30 to /29 to accomadate the extra ip that was needed for the shop.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 01:18 PM
Justin
I would go back to him with your existing config. If gi3/0/17 anf fa4 are the WAN connections then there is definitely no vlan tagging going on so they may have to set something else up for the new site.
Jon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 01:25 PM
Justin
It may be helpful information that the shop switch shows only local connections in the output of show arp. If there are no arp entries for anywhere else that would certainly explain the lack of connectivity. Would you be able to post the output of show interface gig0/47 from the shop switch?
HTH
Rick
Rick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 01:29 PM
Shop-switch#sh int gig0/47
GigabitEthernet0/47 is up, line protocol is up (connected)
Hardware is Gigabit Ethernet, address is 0017.95da.e4c1 (bia 0017.95da.e4c1)
Internet address is 192.168.254.6/29
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,
reliability 235/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
input flow-control is off, output flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output 00:00:40, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 3000 bits/sec, 4 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
481288 packets input, 58806184 bytes, 0 no buffer
Received 374767 broadcasts (0 IP multicasts)
34136 runts, 0 giants, 0 throttles
34136 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 369713 multicast, 0 pause input
0 input packets with dribble condition detected
1497 packets output, 624070 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-20-2011 01:45 PM
Here is the Austin router's config if it helps:
We have a switch that connects to Fe0, and the WAN connection connects to Fe4.
Current configuration : 4235 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec localtime
service timestamps log datetime msec localtime
service password-encryption
!
hostname yantis-austin-rtr
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
enable secret 5 $1$GZAk$rs5C5q5ohGeX6dHXsKkUD/
!
no aaa new-model
!
crypto pki trustpoint TP-self-signed-1686741757
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1686741757
revocation-check none
rsakeypair TP-self-signed-1686741757
!
!
crypto pki certificate chain TP-self-signed-1686741757
certificate self-signed 01
30820249 308201B2 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31363836 37343137 3537301E 170D3032 30333031 30303036
32345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 36383637
34313735 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
810099A7 B15D95DB 0AF4189B C31FD714 2AE72EFE 66D28416 6FC49769 BEFB1A0C
58B6B5BC 372A805B 701186A1 CA6B69A9 250FA8C4 1B08039D 9C74BA45 6D33DC8C
4B329AC0 18510F3D 5CD6AC4D 454B028A 81242E88 9BB06902 7AF921AA BA9EB220
88C182A7 1936A178 5EF28E82 FCA63AD1 0410E276 6AB257E3 F14C9A36 D5EF7E69
77890203 010001A3 71306F30 0F060355 1D130101 FF040530 030101FF 301C0603
551D1104 15301382 1179616E 7469732D 61757374 696E2D72 7472301F 0603551D
23041830 168014C7 030E84CC DE26A141 E3F0B709 3ACB240B 62FDE930 1D060355
1D0E0416 0414C703 0E84CCDE 26A141E3 F0B7093A CB240B62 FDE9300D 06092A86
4886F70D 01010405 00038181 006F5583 30DC9C04 C797A23F C2631B72 6B87D82B
B6037724 BF2F0E4C 1D220C0A C9A0B00E 58E75777 8952EBC1 7A890196 7B92F7C9
0B9205FB 18FC58C0 8E2F2210 DFAAED7D 86899C2D C1836505 99DDFD4D F3F94468
485BF206 25A58DF0 0BB46826 B686854A 1E69BAA4 576AEB27 3F10886A D114090A
C5E53198 302DBA1E DFE6DBC3 83
quit
dot11 syslog
ip source-route
!
!
!
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
!
!
!
archive
log config
hidekeys
!
!
!
class-map match-any VOIP-SIGNAL
match ip dscp cs5
match ip precedence 4
match ip precedence 3
class-map match-any VOIP-RTP
match ip dscp ef
match ip precedence 5
!
!
policy-map QOS-Policy
class VOIP-SIGNAL
priority percent 10
class VOIP-RTP
priority percent 50
class class-default
fair-queue
random-detect
!
!
!
!
interface FastEthernet0
switchport mode trunk
bandwidth 1500
!
interface FastEthernet1
switchport access vlan 12
switchport voice vlan 13
!
interface FastEthernet2
switchport access vlan 12
switchport voice vlan 13
!
interface FastEthernet3
switchport access vlan 12
switchport voice vlan 13
!
interface FastEthernet4
ip address 192.168.254.2 255.255.255.252
duplex auto
speed auto
service-policy output QOS-Policy
!
interface Vlan1
no ip address
!
interface Vlan12
ip address 192.168.12.1 255.255.255.0
ip helper-address 192.168.1.15
!
interface Vlan13
ip address 192.168.13.1 255.255.255.0
ip helper-address 192.168.1.15
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.254.1
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-23-2011 08:18 AM
Thanks guys. I had figured it wasn't tagging, but the ISP had insisted that it couldn't possibly be passing information from the Austin location if it wasn't vlan tagged. After you guys confirmed it, I called the ISP again and they said "Well, I guess its POSSIBLE since they had turned tagging off then back on for that location". So I completely redid the connection as a config for two switches connected together with trunking, encapsulation, ect. Working great now as if the two were just connected with a long cable, which is how it was supposed to work. Only thing I couldn't get to work was VTP. Not a big deal, but my configs look solid and it seems to be pretty simple from what I've read. Best guess is that however the switches share vtp isn't compatible with the packets needed to cross the TLS connection. No biggy though.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-23-2011 09:42 AM
Justin
I am glad that you got it working and that our suggestions were helpful in getting to the solution. Thank you for posting back that it was solved and what the solution was. This helps make the forum be an effective tool when readers can read about an issue and can read what the solution turned out to be.
HTH
Rick
Rick
