07-25-2018 03:27 PM - edited 07-25-2018 06:35 PM
**************************************************************************
Update to problem on Page 2
********************************************************************
Hey guys, hoping I can get some help with a little issue I'm having.
So recently we deployed a switch to "Zone B" to extend a slice of our network to that zone for certain services.
From Router B, we can ping and traceroute to the switch no problem.
From Router A, pings and trace stops at Router B.
Router A shows that it know to go to Rtr B to get to the switch.
If I place a static route in RTR A I get the same results.
I also have no control over Zone B Cloud, they are tracking the issue and also looking into possible problems.
Any ideas about this?
On a basic level, I can't seem to figure out why a traceroute would stop at a router that can successfully traceroute to the switch.
Any ideas are greatly appreciated
Solved! Go to Solution.
07-25-2018 06:34 PM
SWEET MERCY THAT WORKED!
I can now ping and trace from RTR A.
So new problem now. We have the large distribution switch before Rtr A. My workstation and network analyzing suite is all connected to that. I cant ping or trace to the Zone B switch from the Distribution switch before Rtr A?
Would this just be another addition to the same problem?
thanks for your help.
************************************************Update to Problem******************
07-25-2018 06:42 PM
07-25-2018 06:44 PM
Thanks for your advise!
I will continue forth.
Big Help.
07-25-2018 06:46 PM
You are very welcome : )
Do not forget to rate helpful answers and mark it as solved once the problem is resolved!
07-26-2018 03:41 AM - edited 07-26-2018 03:48 AM
Glad to see that the NAT helped prove that the switch had no default-gateway set. This should not be used as a solution as it only helps identify and prove the problem, as you can see you have the same issue with another switch.
Now that we know there's no defualt-gateway set we can continue to ajust the switch configuration.
It's important that all your layer2 switches point to a default-gateway allowing you to manage them remotely.
Use the command on layer2 switches,
"ip default-gateway x.x.x.x"
Hope this helps you out, great work everyone.
- Piero
07-25-2018 05:57 PM
07-25-2018 06:08 PM
Do you manage router B? We manage it but it was shipped to a location that told us how to configure it to pass through their cloud. Witch turned out to be, make a trunk port and and interface vlan.
You also talked about sub-interfaces. Where are these sub interfaces? On router A or B? There are sub interfaces on both routers but the gateway for the switch is on router B
You said no acls. Does this mean no acl on router A and router B ? Both routers technically have ACLs but none that relate to this that would hinder traffic.
Does router B have vrfs? None
Does it have done firewall rules (ZBF)? None that are zone base. Also, all FW's in play have been tested with any/any permit rules turned on for testing.
Thanks for your reply
07-25-2018 07:12 PM - edited 07-25-2018 07:12 PM
Are you able to do a debug ip packet filtered with an acl that'll catch icmp traffic between rtr A and switch on router B and then try ping from rtr A to switch.
Share please this output of you can.
Also dumb question. Is there any nat on router B?
07-25-2018 07:17 PM
Thanks for your response.
I did debugging on rtr A and saw packets successfully being sent to Rtr B.
Via access list tracking.
Also, I am not logged into the switch via another commenter's suggestion on adding NAT.
Thanks for your help though
07-25-2018 07:32 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide