cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
356
Views
0
Helpful
3
Replies

TRUNK between 2 SG Switches Grabbing IP NOT in vlan

TheGoob
Level 4
Level 4

Hey there

So, I have

SG350XG, 6 vlans [2-6 to be trunked], each vlan has it's own DHCP Server [vlan 2, 192.168.2.0, vlan 3 192.168.3.0 and so on]. I have GE XG/1 set as TRUNK, and then port to vlan has vlan 2-6. vlan 1 is NOT in the Trunk, and is 192.168.5.0.

SG500X, 6 vlans, 4 ports associated to each vlan [2-6]. GE 1/24 set as TRUNK and then port to vlan has vlan 2-6. NO DHCP, NO DNS, Nothing; Just 5 vlans [2-6] and then the TRUNK Interface.

When I plug into GE 1/1 - 1/4 I get...wait for it... 192.168.5.0??? #1 Not even on this SG500X and #2 not even part of the vlans on the Trunk; 192.168.5.0 is vlan 1 from SG350XG.So 1-4 grabs 192.168.5.0 [should be 192.168.1.0] but strangely enough GE 5-8 grabs 192.168.2.0, GE 9-12 grabs 1o2.168.3.0 and so on.

So that is first weird thing, 1-4 grabs a sub net not even on trunk, second, the other Interfaces DO grab their correct DHCP IP, but apparently does not grab DNS or any routing. Am I missing more config? Something just seems off.

1 Accepted Solution

Accepted Solutions

TheGoob
Level 4
Level 4

Created vlan Interfaces on "receiving" TRUNK, now seems to all work correctly.

View solution in original post

3 Replies 3

TheGoob
Level 4
Level 4

Bump

TheGoob
Level 4
Level 4

Here are both my Switches configs.. Anyone see something I am not?

 

SERVER SWITCH [1ST]

show running-config
config-file-header
switchbf585b
v2.5.9.54 / RCBS3.1_930_871_120
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network te uplink none
unit-type unit 2 network te uplink none
unit-type unit 3 network te uplink none
unit-type unit 4 network te uplink none
unit-type-control-end
!
vlan database
vlan 2-6
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone
voice vlan oui-table add 00036b Cisco_phone
voice vlan oui-table add 00096e Avaya
voice vlan oui-table add 000fe2 H3C_Aolynk
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone
voice vlan oui-table add 00e075 Polycom/Veritel_phone
voice vlan oui-table add 00e0bb 3Com_phone
ip dhcp server
ip dhcp pool network 177
address low 192.168.6.1 high 192.168.6.254 255.255.255.0
dns-server 192.168.4.115
exit
ip dhcp pool network fhc
address low 192.168.2.1 high 192.168.2.254 255.255.255.0
dns-server 192.168.4.115
exit
ip dhcp pool network ceyea
address low 192.168.3.1 high 192.168.3.254 255.255.255.0
dns-server 192.168.4.115
exit
ip dhcp pool network fbeye
address low 192.168.1.1 high 192.168.1.254 255.255.255.0
dns-server 192.168.4.115
exit
ip dhcp pool network proxmox
address low 192.168.4.1 high 192.168.4.254 255.255.255.0
dns-server 192.168.4.115
exit
bonjour interface range oob
hostname switchbf585b
username cisco password encrypted $15$7FFi5X/ArRy2Bbd/$E6B2+QPb/Kb91F0eWlcSF+8dbk5L7ytA6uF7lE9GZEvIAylhp+6AbheJWZ048vTrlAGn3FF4UBZapDuY71D2aw== privilege 15
ip ssh server
ip name-server  192.168.4.115
!
interface vlan 2
 name fbeye
 ip address 192.168.1.1 255.255.255.0
!
interface vlan 3
 name fhc
 ip address 192.168.2.1 255.255.255.0
!
interface vlan 4
 name ceyea
 ip address 192.168.3.1 255.255.255.0
!
interface vlan 5
 name proxmox
 ip address 192.168.4.1 255.255.255.0
!
interface vlan 6
 name 177
 ip address 192.168.6.1 255.255.255.0
!
interface TenGigabitEthernet1/0/5
 switchport access vlan 2
 switchport trunk native vlan 2
!
interface TenGigabitEthernet1/0/6
 switchport access vlan 3
 switchport trunk native vlan 3
!
interface TenGigabitEthernet1/0/7
 switchport mode trunk
 switchport access vlan none
 switchport trunk native vlan none
 switchport trunk allowed vlan 2-6
!
interface TenGigabitEthernet1/0/8
 switchport access vlan 5
 switchport trunk native vlan 5
!
interface TenGigabitEthernet1/0/9
 switchport access vlan 6
 switchport trunk native vlan 6
!
interface TenGigabitEthernet1/0/10
 ip address 192.168.8.2 255.255.255.0
 no switchport
!
interface Port-Channel1
 switchport mode trunk
 switchport access vlan none
 switchport trunk native vlan none
 switchport trunk allowed vlan 2-6
!
interface oob
 ip address 192.168.7.254 255.255.255.0
 no ip address dhcp
!
exit
no macro auto processing cdp
no macro auto processing lldp
macro auto processing type ip_phone disabled
macro auto processing type ip_phone_desktop disabled
macro auto processing type switch disabled
macro auto processing type ap disabled
ip default-gateway 192.168.8.1

RECEIVING SWITCH [2ND]

running-config
config-file-header
switchff1e41
v2.5.9.54 / RCBS3.1_930_871_120
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
voice vlan oui-table add 0001e3 Siemens_AG_phone
voice vlan oui-table add 00036b Cisco_phone
voice vlan oui-table add 00096e Avaya
voice vlan oui-table add 000fe2 H3C_Aolynk
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone
voice vlan oui-table add 00e075 Polycom/Veritel_phone
voice vlan oui-table add 00e0bb 3Com_phone
bonjour interface range vlan 1
hostname switchff1e41
username cisco password encrypted $15$ax5unu8ewy8d7MT7$MIsdHCksWynAtZX0B78mAKezgHGZWZ2yEeZ+3k+TiddwPWWe8Ym8vD5werFFEGxjYv0d15Sq1JauzX6ML7Yz9Q== privilege 15
!
interface vlan 1
 ip address 192.168.7.254 255.255.255.0
 no ip address dhcp
!
interface GigabitEthernet1/0/1
 switchport access vlan 2
!
interface GigabitEthernet1/0/2
 switchport access vlan 2
!
interface GigabitEthernet1/0/3
 switchport access vlan 2
!
interface GigabitEthernet1/0/4
 switchport access vlan 2
!
interface GigabitEthernet1/0/5
 switchport access vlan 3
!
interface GigabitEthernet1/0/6
 switchport access vlan 3
!
interface GigabitEthernet1/0/7
 switchport access vlan 3
!
interface GigabitEthernet1/0/8
 switchport access vlan 3
!
interface GigabitEthernet1/0/9
 switchport access vlan 5
!
interface GigabitEthernet1/0/10
 switchport access vlan 5
!
interface GigabitEthernet1/0/11
 switchport access vlan 5
!
interface GigabitEthernet1/0/12
 switchport access vlan 5
!
interface GigabitEthernet1/0/13
 switchport access vlan 6
!
interface GigabitEthernet1/0/14
 switchport access vlan 6
!
interface GigabitEthernet1/0/15
 switchport access vlan 6
!
interface GigabitEthernet1/0/16
 switchport access vlan 6
!
interface TenGigabitEthernet1/0/1
 switchport mode trunk
 switchport access vlan none
 switchport trunk native vlan none
 switchport trunk allowed vlan 2-6
!
exit

 

It has got to be the easiest trunk ever. SW1 vlan 1-6 [2-6 for TRUNK] SW2 vlan 1-6 [2-6] for TRUNK.

Maybe I just dont know how a trunk works, I ASSUME anything on SW in whatever vlan, will grab its DHCP IP from SWITCH1 of that vlan. Just making SW2 an "EXTENSION" of SW, but with the DHCP Server

TheGoob
Level 4
Level 4

Created vlan Interfaces on "receiving" TRUNK, now seems to all work correctly.