08-19-2011 12:39 PM
Hi everyone!
I'm a self taught cisco type person who really specialises in ASA rather than routers, but have fumbled my way through many a task with the help of this site and google... However! I am currently tasked with setting up a network, pretty much from scratch, that requires some fairly hefty VLAN deployment.
My hardware on hand (already existed so can't can't change anything easily) 5x ESW-540-48 Switches, 1x3750g switch, 1x2811 router.
I don't believe the router should be required as the 3750 is capable of intervlan routing. So what i'm trying to achieve is as follows:
VLAN 1 - 172.16.8.0/22 (A)
VLAN 2 - 10.0.2.0/24 (B)
VLAN 3 - 10.0.3.0/24 (C)
VLAN 4 - 10.0.4.0/24 (D)
VLAN 5 - 10.0.5.0/24 (E)
VLAN 6 - 10.0.6.0/24 (F)
VLAN 7 - 10.0.7.0/24 (G)
VLAN 8 - 10.0.8.0/24 (H)
VLAN 9 - 10.0.9.0/24 (I)
Server Room - Servers connected to the 3750G
3750G connected to 5 ESW switches distributed around the building.
ESW-1 Will have VLAN(A) and VLAN(B) devices connected, specified at port level.
ESW-2 Will have VLAN(A) and (C) devices connected, specified at port level.
ESW-3 Will have VLAN(A), (D), (E) and (F) devices connected, specified at port level.
ESW-4 Will have VLAN(A), (G) devices connected specified at port level.
ESW-5 Will have VLAN(A), (H) and (I) devices connected, specified at port level.
Now at one point I actually had the VLAN's *working* in that I could specify an IP address and could ping to and from it! However DHCP wasn't passing despite numerous attempts with DHCP relay and IP-Helper configurations.
Also I was having issues with VLAN 1 as the native VLAN, the ESW switches don't allow you to do much with them, as they 'weren't created by the user'. So tried switching that out to VLAN11 also but with very little success there (I had to change the native vlan on all trunks to VLAN 11)
All the 10.x.x.x addresses need to be able to communicate with each other
All the ESW switches need to be able to handle their respective VLAN's as well as VLAN 1 (for Printers and wireless access points distributed around the building).
Partly i'm doing this in the hope that maybe some helpful soul can make some sense of it, but also just the fact of writing it down MAY firm it up in my head somewhat
Thanks in advance!
Simon
Solved! Go to Solution.
08-20-2011 02:50 PM
Not sure, if you have looked at the config guide of ESW.
Let's do a cross check on ESW for the smartport roles and make sure they are configured as per config guide.
08-19-2011 12:59 PM
Oh some IP addresses just for referencing when discussing!
3750G - VLAN 1 - 172.17.8.253
VLAN 2 - 10.0.2.254
VLAN 3 - 10.0.3.254
VLAN 4 - 10.0.4.254 through to VLAN 9 (you get the idea i'm sure).
ESW1 172.17.8.101
ESW2 172.17.8.102
ESW3 172.17.8.103
ESW4 172.17.8.104
ESW5 172.17.8.105
We also have an ASA in there, which is currently the default gateway for everyone at 172.17.8.1 - for simplification I'm going to be moving the 3750G VLAN 1 to 172.17.8.1 and moving the ASA to 172.17.8.253, adding a default route on the 3750G for 0.0.0.0 0.0.0.0 --> 172.17.8.253.
08-19-2011 01:58 PM
Ok so this isn't SUPPOSED to be a blog, but here's an update - still not working but have worked SOMETHING out at least.
On the 3750, when I specify a port to be explicitly VLAN 2, and connect one of the ESW switches to that port it WILL assign a DHCP address to a device connected to any port on the ESW from the alternate scope on my 2003 DHCP server. However, I need to be able to have numerous VLAN's specified on the 3750 port, and then specify on the ESW 540 switch on the other side what VLAN a device will be a member of, have it pass that info down to the 3750, back to the DHCP server and assign the address according to which VLAN I have specified!
(Does any of that make sense???)
At the moment, if I have numerous VLAN's specified on the 3750 port, then it only appears to take notice of VLAN 1 and assign an address from the default DHCP scope.
08-20-2011 12:16 PM
Hello Simon,
I must admit first that my work with Catalyst series is limited, but I can tell you the ESW switches look to be setup correctly for your vlan needs. I have found the following Cisco guide which may help you with what you are looking to do.
Might I also recommend running a packet capture on the server to verify if the dhcp request is arriving. If the request is getting there and correct, then I would suggest looking at the reply the server gives.
I hope this information helps you with your network setup.
08-20-2011 12:44 PM
Ok so - i gave up at 2am this morning, and going back to it with a fresh head! Here's the situation as it has unfolded...
I have configured up 4 of my vlans for the purpose of testing, so you'll note there are a few missing.
I have moved the Native to VLAN 11 because the ESW's were doing something weird, and wouldn't allow me to do anything with trunking... If anyone can see a MUCH easier way of doing this, please feel free to chime in!
Primarily my question though is - why isn't DHCP working? Do I need to configure DHCP relaying on the ESW switches? Or should the DHCP REQ be passed across the entire vlan back to the 3750 regardless. And if I do need to configure relaying on the ESW - how?
My ESW switches have been moved to native vlan11 and trunked each of their port 48's to allow all vlans.
So as you can see i've done my homework - well most of it obviously. Because it still isn't working
Here's the config of the 3750, the ESWs of course are a bit harder to just post my config, but the general state is something like this...
ESW Switch 1
Native VLAN 11
IP Address: 172.17.8.101 255.255.252.0
Default Gateway: 172.17.8.253
Port 48 802.1q trunk - allowed VLAN's 1-3 (tagged), 11 (untagged)
ESW Switch 2
Native VLAN 11
IP Address: 172.17.8.102 255.255.252.0
Default Gateway: 172.17.8.253
Port 48 802.1q trunk - allowed VLAN's 1-3 (tagged), 11 (untagged)
ESW Switch 3
Native VLAN 11
IP Address: 172.17.8.103 255.255.252.0
Default Gateway: 172.17.8.253
Port 48 802.1q trunk - allowed VLAN's 1-3 (tagged), 11 (untagged)
hostname 3750switch
!
enable secret 5 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
enable password xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
!
no aaa new-model
switch 2 provision ws-c3750g-48ts
system mtu routing 1500
udld aggressive
ip subnet-zero
ip routing
ip domain-name mydomain.com
ip name-server 172.17.10.216
ip name-server 172.17.10.229
!
!
mls qos map cos-dscp 0 8 16 26 32 46 48 56
mls qos srr-queue input bandwidth 90 10
mls qos srr-queue input threshold 1 8 16
mls qos srr-queue input threshold 2 34 66
mls qos srr-queue input buffers 67 33
mls qos srr-queue input cos-map queue 1 threshold 2 1
mls qos srr-queue input cos-map queue 1 threshold 3 0
mls qos srr-queue input cos-map queue 2 threshold 1 2
mls qos srr-queue input cos-map queue 2 threshold 2 4 6 7
mls qos srr-queue input cos-map queue 2 threshold 3 3 5
mls qos srr-queue input dscp-map queue 1 threshold 2 9 10 11 12 13 14 15
mls qos srr-queue input dscp-map queue 1 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue input dscp-map queue 1 threshold 3 32
mls qos srr-queue input dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue input dscp-map queue 2 threshold 2 33 34 35 36 37 38 39 48
mls qos srr-queue input dscp-map queue 2 threshold 2 49 50 51 52 53 54 55 56
mls qos srr-queue input dscp-map queue 2 threshold 2 57 58 59 60 61 62 63
mls qos srr-queue input dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31
mls qos srr-queue input dscp-map queue 2 threshold 3 40 41 42 43 44 45 46 47
mls qos srr-queue output cos-map queue 1 threshold 3 5
mls qos srr-queue output cos-map queue 2 threshold 3 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 2 4
mls qos srr-queue output cos-map queue 4 threshold 2 1
mls qos srr-queue output cos-map queue 4 threshold 3 0
mls qos srr-queue output dscp-map queue 1 threshold 3 40 41 42 43 44 45 46 47
mls qos srr-queue output dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 3 threshold 3 32 33 34 35 36 37 38 39
mls qos srr-queue output dscp-map queue 4 threshold 1 8
mls qos srr-queue output dscp-map queue 4 threshold 2 9 10 11 12 13 14 15
mls qos srr-queue output dscp-map queue 4 threshold 3 0 1 2 3 4 5 6 7
mls qos queue-set output 1 threshold 1 138 138 92 138
mls qos queue-set output 1 threshold 2 138 138 92 400
mls qos queue-set output 1 threshold 3 36 77 100 318
mls qos queue-set output 1 threshold 4 20 50 67 400
mls qos queue-set output 2 threshold 1 149 149 100 149
mls qos queue-set output 2 threshold 2 118 118 100 235
mls qos queue-set output 2 threshold 3 41 68 100 272
mls qos queue-set output 2 threshold 4 42 72 100 242
mls qos queue-set output 1 buffers 10 10 26 54
mls qos queue-set output 2 buffers 16 6 17 61
mls qos
!
!
macro global description cisco-global
errdisable recovery cause link-flap
errdisable recovery interval 60
no file verify auto
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface GigabitEthernet2/0/1
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/2
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/3
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/4
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/5
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/6
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/7
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/8
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/9
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
!
interface GigabitEthernet2/0/10
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/11
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
!
interface GigabitEthernet2/0/12
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
!
interface GigabitEthernet2/0/13
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
!
interface GigabitEthernet2/0/14
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/15
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/16
switchport access vlan dynamic
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
**************
snip
**************
!
interface GigabitEthernet2/0/47
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet2/0/48
switchport trunk encapsulation dot1q
switchport trunk native vlan 11
switchport trunk allowed vlan 1-3,11
switchport mode trunk
!
interface GigabitEthernet2/0/49
!
interface GigabitEthernet2/0/50
!
interface GigabitEthernet2/0/51
!
interface GigabitEthernet2/0/52
!
interface Vlan1
ip address 10.0.1.254 255.255.255.0
ip helper-address 172.17.10.229
!
interface Vlan2
ip address 10.0.2.254 255.255.255.0
ip helper-address 172.17.10.229
!
interface Vlan3
ip address 10.0.3.254 255.255.255.0
ip helper-address 172.17.10.229
!
interface Vlan11
ip address 172.17.8.253 255.255.252.0
!
ip default-gateway 172.17.8.1
ip classless
ip route 0.0.0.0 0.0.0.0 172.17.8.1
ip http server
!
!
control-plane
!
!
line con 0
line vty 0 4
password xxxxxxxxxxxxxxxxxxxxx
login
length 0
line vty 5 15
password xxxxxxxxxxxxxxxxxxxxx
login
length 0
!
end
3750switch#
08-20-2011 01:22 PM
Thanks Robert, i'll look at doing a packet capture - and see if i can figure out where the packets disappearing to!
Cheers
Simon
08-20-2011 01:50 PM
Simon,
Let me verify the topology first:
ESW500 -----3750---DHCP server(172.17.10.229)
Lot of vlans defined on the ESW500. You need DHCP for the devices in the vlans on ESW. If this is correct, following is what you need:
1) How would 3750 route packets to 172.17.10.229? Where exactly on the 3750 switch is this server connected? I would advise to put it in a vlan, let's say vlan 17, create its SVI, let's say 172.17.10.1.
2) Vlans (L2) should be defined both on ESW & 3750 switch so that both can understand vlan tagging.
I would like to make sure by looking at "show vlan br" from 3750.
3) All the vlans should be forwarded on the trunk.
I would like to make sure by looking at "show int trunk" from 3750.
The answer to your question on whether you should define "helper-address" on ESW is NO, this isn't required. As long as the frames from different vlans can get to 3750 & hit their specific SVI, we should be good.
Please check if the above points help you or else share the outputs I mentioned above.
Let's make it working
Regards,
Amit Aneja
08-20-2011 01:56 PM
Also, there is one more thing that I would like to test, i.e. if we create DHCP server on the 3750 itself, do the devices in different vlans get the DHCP or not.
Following is the config that you would need to configure the switch as DHCP server:
ip dhcp excluded-address 10.0.2.254 10.0.2.255
ip dhcp excluded-address 10.0.3.254 10.0.3.255
ip dhcp excluded-address 10.0.1.254 10.0.1.255
!
!
ip dhcp pool VLAN2
network 10.0.2.0 255.255.255.0
default-router 10.0.2.254
!
ip dhcp pool VLAN1
network 10.0.1.0 255.255.255.0
default-router 10.0.1.254
!
ip dhcp pool VLAN3
network 10.0.3.0 255.255.255.0
default-router 10.0.3.254
Regards,
Amit Aneja
08-20-2011 02:25 PM
putting DHCP server on 3750 didn't work either - i'm wondering if it's some broadcast security feature on the esw. Anyway, i'm working through the items you mentioned, and as a start, here's the show int trunk...
Oh and the dhcp server exists on the native vlan 11 along with all the other servers in the 172.17.8.0/22 network.
And yes the topology is correct.
Client ---- ESW ----3750 ----- DHCP
Port Mode Encapsulation Status Native vlan
Gi2/0/1 on 802.1q trunking 11
Gi2/0/2 on 802.1q trunking 11
Gi2/0/3 on 802.1q trunking 11
Gi2/0/4 on 802.1q trunking 11
Gi2/0/5 on 802.1q trunking 11
Gi2/0/6 on 802.1q trunking 11
Gi2/0/7 on 802.1q trunking 11
Gi2/0/8 on 802.1q trunking 11
Gi2/0/10 on 802.1q trunking 11
Gi2/0/14 on 802.1q trunking 11
Gi2/0/15 on 802.1q trunking 11
Gi2/0/16 on 802.1q trunking 11
Gi2/0/47 on 802.1q trunking 11
Gi2/0/48 on 802.1q trunking 11
Port Vlans allowed on trunk
Gi2/0/1 1-3,11
Gi2/0/2 1-3,11
Gi2/0/3 1-3,11
Gi2/0/4 1-3,11
Gi2/0/5 1-3,11
Gi2/0/6 1-3,11
Port Vlans allowed on trunk
Gi2/0/7 1-3,11
Gi2/0/8 1-3,11
Gi2/0/10 1-3,11
Gi2/0/14 1-3,11
Gi2/0/15 1-3,11
Gi2/0/16 1-3,11
Gi2/0/47 1-3,11
Gi2/0/48 1-3,11
Port Vlans allowed and active in management domain
Gi2/0/1 1-3,11
Gi2/0/2 1-3,11
Gi2/0/3 1-3,11
Gi2/0/4 1-3,11
Gi2/0/5 1-3,11
Gi2/0/6 1-3,11
Gi2/0/7 1-3,11
Gi2/0/8 1-3,11
Gi2/0/10 1-3,11
Gi2/0/14 1-3,11
Gi2/0/15 1-3,11
Gi2/0/16 1-3,11
Port Vlans allowed and active in management domain
Gi2/0/47 1-3,11
Gi2/0/48 1-3,11
Port Vlans in spanning tree forwarding state and not pruned
Gi2/0/1 1-3,11
Gi2/0/2 1-3,11
Gi2/0/3 1-3,11
Gi2/0/4 1-3,11
Gi2/0/5 1-3,11
Gi2/0/6 1-3,11
Gi2/0/7 1-3,11
Gi2/0/8 1-3,11
Gi2/0/10 1-3,11
Gi2/0/14 1-3,11
Gi2/0/15 1-3,11
Gi2/0/16 1-3,11
Gi2/0/47 1-3,11
and heres the show vlan br
VLAN Name Status Ports
---- -------------------------------- --------- ----------------------------
1 default active Gi2/0/9, Gi2/0/11, Gi2/0/12
Gi2/0/13, Gi2/0/17, Gi2/0/18
Gi2/0/19, Gi2/0/20, Gi2/0/21
Gi2/0/22, Gi2/0/23, Gi2/0/24
Gi2/0/25, Gi2/0/26, Gi2/0/27
Gi2/0/28, Gi2/0/29, Gi2/0/30
Gi2/0/31, Gi2/0/32, Gi2/0/33
Gi2/0/34, Gi2/0/35, Gi2/0/36
Gi2/0/37, Gi2/0/38, Gi2/0/39
Gi2/0/40, Gi2/0/41, Gi2/0/42
Gi2/0/43, Gi2/0/44, Gi2/0/45
Gi2/0/46, Gi2/0/49, Gi2/0/50
Gi2/0/51, Gi2/0/52
2 Performance active
3 Design active
11 Servers active
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
08-20-2011 02:38 PM
Simon,
I missed noticing that vlan 11 is /22. I have worked with this ESW switch just once, so, I am not sure if there is a problem with trunking/native vlan issue.
Guess, the best way to rule out any issues with 3750 switch is to put one of the clients directly on 3750 in different vlans & see if gets an IP for all the vlans one by one. If that's the case, it has to be a trunk issue b/w the 3750 & ESW or else the vlan issue on ESW.
Regards,
Amit
08-20-2011 02:41 PM
Yep, it works fine when i specify a vlan to a port on the 3750, will assign address happily. Likewise if i connect a dumb switch to the port on the 3750 all clients connected get a dhcp address. So beginning to look more and more like a trunking issue
08-20-2011 02:46 PM
I would agree with you.
I read your posts again & you mentioned that at one point you were able to ping the SVI. So, you can ping SVI of vlan 3 on 3750 if you assign a static IP address on one of the devices in vlan 3 on ESW. Is that what you meant?
So, for now, we can concentrate on ESW thing. have you configured native vlan as 11 on that as well?
How about the allowed vlans on it? I am guessing that you are using smartport Macros to define the config on that switch. How are access ports on ESW configured?
08-20-2011 02:50 PM
Not sure, if you have looked at the config guide of ESW.
Let's do a cross check on ESW for the smartport roles and make sure they are configured as per config guide.
08-20-2011 03:28 PM
So I just went through the smart port config again now that the 3750's configured, and while the vlan connectivity is still good, i still have no dhcp *sigh*!
08-20-2011 02:50 PM
Smart ports weren't very smart - tended to cause me more grief than not, so i stopped using them.
The ports are set up on the ESW for the clients as VLAN 2 untagged, all others Excluded, setup in access mode.
Yes i can ping the SVI's from these ports if i specify an IP address on the machine.
The ESW is set native 11, but i have modified the pvid of the client ports to be VLAN 2.
The uplink port is configured as 11 untagged, everything else tagged.
Thanks again for all your help everyone by the way Hopefully i'll get it sorted today!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide