cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1373
Views
0
Helpful
1
Replies

Inter-vlan routing on SG350-10MP

FabioLanza89974
Level 1
Level 1

I have a Cisco SG350 that I am trying to configure for my domestic network. There is just one thing that I am not able to do, and I would like to know if you can help me out why and how to fix.

So my problem is: I have a NAS in vlan 30 and a PC in vlan 20. My PC cannot ping or access the NAS. My switch, however, can ping it from vlan 30 interface, but cannot ping it from any other vlan.

My vlans are all created in the firewall/router that is acting as the gateway for the SG350. From firewall to SG350 I have trunk ports configured.

I thought that because I have IP routing enabled in the switch, the inter vlan routing would happen naturally, but it does not seem to be true.

 

Thanks for the help!

 

This is the config that I have on the switch:

config-file-header
switch6a6d71
v2.5.0.83 / RTESLA2.5_930_364_091
CLI v1.0
file SSD indicator plaintext
@
!
unit-type-control-start 
unit-type unit 1 network gi uplink none 
unit-type-control-end 
!
vlan database
vlan 10,20-21,30 
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
bonjour interface range vlan 1
hostname switch6a6d71
username fabio password encrypted 8006c3b9215a15248f77214fca75f423a57a98a6 privilege 15 
!
interface vlan 10
 name mngt 
 ip address 10.1.0.2 255.255.255.248 
!
interface vlan 20
 name user 
 ip address 10.0.1.2 255.255.255.0 
!
interface vlan 21
 name wireless 
 ip address 10.0.2.2 255.255.255.0 
!
interface vlan 30
 name dmz 
 ip address 10.0.0.2 255.255.255.0 
!
interface GigabitEthernet1
 switchport access vlan 20 
!
interface GigabitEthernet2
 switchport access vlan 20 
!
interface GigabitEthernet3
 switchport access vlan 20 
!
interface GigabitEthernet4
 switchport access vlan 20 
!
interface GigabitEthernet5
 switchport access vlan 20 
!
interface GigabitEthernet6
 switchport access vlan 20 
!
interface GigabitEthernet7
 switchport access vlan 30 
!
interface GigabitEthernet8
 switchport access vlan 30 
 switchport trunk native vlan none 
!
interface GigabitEthernet9
 switchport mode trunk 
!
interface GigabitEthernet10
 switchport mode trunk 
!
exit
ip default-gateway 10.0.1.1 

image.pngimage.pngimage.pngimage.pngimage.png

1 Reply 1

Sujoy Paria
Cisco Employee
Cisco Employee

Hi,

You need to first decide where you want to perform the inter-VLAN routing, if the necessary IP interfaces for respective VLANs are already configured in Firewall/ Router then you can remove the IP interfaces configured in the Switch (you can assign only one management IP for the switch), in this case switch will act as an layer 2 device; if not, then inter-VLAN routing configuration on the switch is fine. Please make sure you are creating the IP interface for VLANs at one place, either on the Firewall/Router or switch.

Gateway on the NAS device will be the VLAN30 interface IP and similarly devices in each VLAN need to use the respective VLAN IP interface as gateway for inter-VLAN routing. On the SG350 switch you need allow the VLANs (for which you want forward the traffic with Firewall/router) as tagged in trunk port, one VLAN will be native. As per the config, Firewall/ Router IP is 10.0.1.1 (belongs to VLAN 20) so please keep the VLAN 20 as native VLAN in SG350 on the trunk port connected to the Firewall, remaining VLANs can be tagged.