cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1028
Views
0
Helpful
4
Replies

VLANs unable to connect to the internet on C3650 switch

Rolf Pacleb
Level 1
Level 1

PLS HELP! i'm having a hard time configuring our c3650 switch to connect to the internet, our layer 3 switch is connected directly to the modem of the ISP with static ip addresses, i can ping public ip on the CLI but  my PC connected to the switch vlan interface cannot connect. here is the configuration of the switch.

C3650#sh running-config
Building configuration...

Current configuration : 8174 bytes
!
! Last configuration change at 08:51:06 UTC Wed Feb 10 2016
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service compress-config
!
hostname C3650
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 5 $1$OqaI$6MixCY4Ebj8/EkBGIaLzs1
!
no aaa new-model
switch 1 provision ws-c3650-24ts
ip routing
!
ip device tracking
!
ip dhcp pool vlan2
network 192.168.2.0 255.255.255.0
default-router 192.168.2.1
dns-server 210.4.2.61
!
ip dhcp pool vlan3
network 192.168.3.0 255.255.255.0
default-router 192.168.3.1
dns-server 210.4.2.61
!
ip dhcp pool vlan4
network 192.168.4.0 255.255.255.0

default-router 192.168.4.1
dns-server 210.4.2.61
!
ip dhcp pool vlan5
network 192.168.5.0 255.255.255.0
default-router 192.168.5.1
dns-server 210.4.2.61
!
ip dhcp pool vlan6
network 192.168.6.0 255.255.255.0
default-router 192.168.6.1
dns-server 210.4.2.61
!
ip dhcp pool vlan7
network 192.168.7.0 255.255.255.0
default-router 192.168.7.1
dns-server 210.4.2.61
!
ip dhcp pool vlan8
network 192.168.8.0 255.255.255.0
default-router 192.168.8.1
dns-server 210.4.2.61
!
ip dhcp pool vlan9
network 192.168.9.0 255.255.255.0
default-router 192.168.9.1
dns-server 210.4.2.61
!
ip dhcp pool vlan10
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 210.4.2.61
!
ip dhcp pool vlan11
network 192.168.11.0 255.255.255.0
default-router 192.168.11.1
dns-server 210.4.2.61
!
ip dhcp pool vlan12
network 192.168.12.0 255.255.255.0
default-router 192.168.12.1
dns-server 210.4.2.61
!
ip dhcp pool vlan13
network 192.168.13.0 255.255.255.0
default-router 192.168.13.1

dns-server 210.4.2.61
!
ip dhcp pool vlan14
network 192.168.14.0 255.255.255.0
default-router 192.168.14.1
dns-server 210.4.2.61
!
ip dhcp pool vlan15
network 192.168.15.0 255.255.255.0
default-router 192.168.15.1
dns-server 210.4.2.61
!
ip dhcp pool vlan16
network 192.168.16.0 255.255.255.0
default-router 192.168.16.1
dns-server 210.4.2.61
!
ip dhcp pool vlan17
network 192.168.17.0 255.255.255.0
default-router 192.168.17.1
dns-server 210.4.2.61
!
ip dhcp pool vlan18
network 192.168.18.0 255.255.255.0
default-router 192.168.18.1
dns-server 210.4.2.61
!
!
!
crypto pki trustpoint TP-self-signed-3586922170
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3586922170
revocation-check none
rsakeypair TP-self-signed-3586922170
!
!
crypto pki certificate chain TP-self-signed-3586922170
certificate self-signed 01
3082023D 308201A6 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C6

diagnostic bootup level minimal
spanning-tree mode pvst
spanning-tree extend system-id
!
redundancy
mode sso
!
!
!
class-map match-any non-client-nrt-class
match non-client-nrt
!
policy-map port_child_policy
class non-client-nrt-class
bandwidth remaining ratio 10
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
negotiation auto
!
interface GigabitEthernet1/0/1
switchport mode access
!
interface GigabitEthernet1/0/2
switchport access vlan 2
switchport mode access
!
interface GigabitEthernet1/0/3
switchport access vlan 3
switchport mode access
!
interface GigabitEthernet1/0/4
switchport access vlan 4
switchport mode access
!
interface GigabitEthernet1/0/5
switchport access vlan 5
switchport mode access
!
interface GigabitEthernet1/0/6
switchport access vlan 6
switchport mode access
!
interface GigabitEthernet1/0/7

switchport access vlan 7
switchport mode access
!
interface GigabitEthernet1/0/8
switchport access vlan 8
switchport mode access
!
interface GigabitEthernet1/0/9
switchport access vlan 9
switchport mode access
!
interface GigabitEthernet1/0/10
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/11
switchport access vlan 11
switchport mode access
!
interface GigabitEthernet1/0/12
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/13
switchport access vlan 13
switchport mode access
!
interface GigabitEthernet1/0/14
switchport access vlan 14
switchport mode access
!
interface GigabitEthernet1/0/15
switchport access vlan 15
switchport mode access
!
interface GigabitEthernet1/0/16
switchport access vlan 16
switchport mode access
!
interface GigabitEthernet1/0/17
switchport access vlan 17
switchport mode access
!
interface GigabitEthernet1/0/18
switchport access vlan 18
switchport mode access

interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
no switchport
ip address 125.xxx.xx.148 255.255.255.240 (static public IP)
ip nat outside
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
switchport mode trunk
channel-group 1 mode active
!
interface GigabitEthernet1/0/24
switchport mode trunk
channel-group 1 mode active
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface Vlan1
ip address 192.168.1.205 255.255.255.0
!
interface Vlan2
ip address 192.168.2.1 255.255.255.0
ip access-group 101 in
ip nat inside
!
interface Vlan3
ip address 192.168.3.1 255.255.255.0
!
interface Vlan4
ip address 192.168.4.1 255.255.255.0
!
interface Vlan5
ip address 192.168.5.1 255.255.255.0
!
interface Vlan6

ip address 192.168.6.1 255.255.255.0
!
interface Vlan7
ip address 192.168.7.1 255.255.255.0
!
interface Vlan8
ip address 192.168.8.1 255.255.255.0
!
interface Vlan9
ip address 192.168.9.1 255.255.255.0
!
interface Vlan10
ip address 192.168.10.1 255.255.255.0
!
interface Vlan11
ip address 192.168.11.1 255.255.255.0
!
interface Vlan12
ip address 192.168.12.1 255.255.255.0
!
interface Vlan13
ip address 192.168.13.1 255.255.255.0
!
interface Vlan14
ip address 192.168.14.1 255.255.255.0
!
interface Vlan15
ip address 192.168.15.1 255.255.255.0
!
interface Vlan16
ip address 192.168.16.1 255.255.255.0
!
interface Vlan17
ip address 192.168.17.1 255.255.255.0
!
interface Vlan18
ip address 192.168.18.1 255.255.255.0
!
ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 125.xxx.xx.145
!
!
access-list 101 permit ip any any
!

!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
login
line vty 5 15
login
!
wsma agent exec
profile httplistener
profile httpslistener
wsma agent config
profile httplistener
profile httpslistener
wsma agent filesys
profile httplistener
profile httpslistener
wsma agent notify
profile httplistener
profile httpslistener
!
wsma profile listener httplistener
transport http
!
wsma profile listener httpslistener
transport https
ap group default-group
end

1 Accepted Solution

Accepted Solutions

Jon Marshall
Hall of Fame
Hall of Fame

As far as I know the 3650 does not support NAT, even though the commands are available.

Very few L3 switches do eg. the 6500 is the main one I know of.

So your configuration is not going to work.

You need a router for the NAT (or a firewall) unless your modem is capable of doing NAT for all the subnets and also being able to route back to your switch for those subnets as well.

Jon

View solution in original post

4 Replies 4

Cisco Freak
Level 4
Level 4

Is your PC connected to the VLAN 2 on switchport GigabitEthernet1/0/2?

Does it get an IP address from DHCP? Can you please share the ipconfig and trace output from the PC?

CF

Yes my PC is connected to VLAN2 and no problem with the DHCP, I also tried ping to other VLANs and got no error.

Jon Marshall
Hall of Fame
Hall of Fame

As far as I know the 3650 does not support NAT, even though the commands are available.

Very few L3 switches do eg. the 6500 is the main one I know of.

So your configuration is not going to work.

You need a router for the NAT (or a firewall) unless your modem is capable of doing NAT for all the subnets and also being able to route back to your switch for those subnets as well.

Jon

Thanks Jon now i know why my vlans cant connect to ISP.

I installed  a linksys RV016 router in between my 3650 and ISP then it works, but the problem is i can only put 5 subnets to my linksys router which means i can only have 5 vlans to implement on my network design. 

Rolf

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card