03-15-2018 06:29 AM - edited 03-08-2019 02:16 PM
Right now I have a firewall with a switch(BSW1) on the same and only vlan(vlan 1) that can communicate and the pcs can get out to the internet. I attached another SG550-x switch using an SFP cable on ports te1/0/2 on both switches. I am looking to set it up so that the 2nd switch can support vlan 1 plus 2 other vlans on specific ports. I have tinkered with it and tried multiple solutions but I can't seem to get the trunking to work between the switches. I have attached running configurations of both switches. I am probably overlooking something or missing something simple but I can't seem to find it.
SW1 - Switch 1 that connects directly to firewall inside interface
SW2- Switch 2 that connects directly to switch 1 using SFP cable.
BSW1
v2.3.5.63 / RLINUX_923_093
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan state disabled
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
port-channel load-balance src-dst-mac-ip
bonjour interface range vlan 1
hostname BSW1
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
logging origin-id hostname
logging file notifications
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
clock timezone " " -5
clock summer-time web recurring usa
no clock source sntp
ip domain name Bluemont
ip name-server 192.168.1.160
!
interface vlan 1
ip address 192.168.1.149 255.255.255.0
no ip address dhcp
!
interface vlan 9
name BSW2
!
interface vlan 10
name BSW2POE
!
interface GigabitEthernet1/0/5
speed 100
no negotiation
!
interface GigabitEthernet1/0/6
speed 100
no negotiation
!
interface GigabitEthernet1/0/7
speed 100
no negotiation
!
interface GigabitEthernet1/0/12
switchport trunk native vlan none
!
interface GigabitEthernet1/0/14
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/16
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/19
speed 100
no negotiation
!
interface GigabitEthernet1/0/22
channel-group 23 mode auto
switchport protected-port
!
interface GigabitEthernet1/0/23
channel-group 23 mode auto
switchport general allowed vlan add 1 tagged
switchport protected-port
switchport trunk allowed vlan remove 2-4094
!
interface GigabitEthernet1/0/24
switchport mode trunk
!
interface TengigabitEthernet1/0/2
description "Trunk to BSW2"
ip address 192.168.9.1 255.255.255.0
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan none
switchport trunk allowed vlan remove 2-8,11-4094
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface Port-Channel23
description S1
switchport general allowed vlan add 1 tagged
switchport trunk native vlan none
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
macro auto processing type router enabled
arp 192.168.1.160 98:f2:b3:ed:97:35 vlan1
ip route 192.168.1.0 /24 192.168.1.1
ip route 192.168.9.0 /24 192.168.1.1
BSW2
v2.3.0.130 / RLINUX_913_193
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network "Pub Wireles"
address low 192.168.10.140 high 192.168.10.160 255.255.255.0
lease 8
dns-server 208.67.222.222
no auto-default-router
exit
bonjour interface range vlan 1
ip access-list extended Router
exit
hostname BSW2
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 pri vilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
ip domain name bluemont
ip name-server 208.67.222.222
!
interface vlan 1
name Internal
no ip address dhcp
!
interface vlan 9
name "Router to Switch 10"
!
interface vlan 10
name Public
ip address 192.168.10.150 255.255.255.0
!
interface GigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/2
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/3
switchport access vlan 10
!
interface GigabitEthernet1/0/4
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/9
switchport access vlan 10
!
interface GigabitEthernet1/0/10
spanning-tree link-type point-to-point
switchport mode trunk
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/11
spanning-tree link-type point-to-point
switchport mode trunk
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/12
spanning-tree link-type point-to-point
switchport mode trunk
switchport protected-port
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/13
switchport access vlan 10
!
interface GigabitEthernet1/0/14
switchport access vlan 10
!
interface GigabitEthernet1/0/15
switchport access vlan 10
!
interface GigabitEthernet1/0/16
switchport access vlan 10
!
interface GigabitEthernet1/0/23
spanning-tree link-type point-to-point
switchport mode trunk
switchport general allowed vlan add 9 tagged
switchport access vlan 9
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/24
storm-control broadcast level 10
spanning-tree link-type point-to-point
switchport access vlan 9
switchport trunk native vlan 9
switchport trunk allowed vlan remove 1-8,11-4094
macro description router
macro auto smartport type router $native_vlan 9
!
interface TengigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface TengigabitEthernet1/0/2
description "Trunk Vlan1 BSW2"
ip address 192.168.9.2 255.255.255.0
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan none
switchport trunk allowed vlan remove 2-8,11-4094
macro description "switch "
macro auto smartport type switch $native_vlan 1,9,10
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
mac address-table static ec:1d:8b:b1:e7:b1 vlan 9 interface GigabitEthernet1/0/2 4
ip route 192.168.1.0 /24 192.168.9.1
ip route 192.168.10.0 /24 192.168.9.1
Solved! Go to Solution.
03-25-2018 06:30 AM
Hi,
Then I am advised to you that you have to reconfigure both switches and add an L3 switch on top of both switches (Between Sw1 and Firewall) and create SVI (VLAN 9 & VLAN 10) on the L3 switch and create both VLANs on both L2 switches. So there will no routing required on your L2 switches. All routing parts will be done by your L3 switch as Intervlan routing and a default route to ASA also.
Regards,
Deepak Kumar
03-15-2018 07:19 AM
Hi,
Please check your trunk port configuration:
interface TengigabitEthernet1/0/2
description "Trunk Vlan1 BSW2"
ip address 192.168.9.2 255.255.255.0
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan none
switchport trunk allowed vlan remove 2-8,11-4094
macro description "switch "
macro auto smartport type switch $native_vlan 1,9,10
Please remove all commands which are for trunk port configuration (bold) on both switches.
And check the route configuration on switch 1:
ip route 192.168.1.0 /24 192.168.1.1
ip route 192.168.9.0 /24 192.168.1.1
It must be as
ip route 192.168.10.0/24 192.168.1.2
and same check on switch 2:
ip route 192.168.1.0 /24 192.168.9.1
ip route 192.168.10.0 /24 192.168.9.1
It must be as:
ip route 0.0.0.0 0.0.0.0 192.168.9.1
Regards,
Deepak Kumar
03-23-2018 04:52 PM
Sorry for the late response but I wanted to let you know I made the changes but the 2nd switch still cant communicate to the first switch through the SFP ports. I made the changes you recommended and I noticed the 2nd switch isn't adding the 0.0.0.0 0.0.0.0 192.168.9.1 to the IP routes. I have the updated Switch 1 and 2 information below. The 2nd switch keeps saying Net-unreachable when I try to ping 192.168.9.1 on the first switch.
BSW2#sh run brief
config-file-header
BSW2
v2.3.0.130 / RLINUX_913_193
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network "Pub Wireles"
address low 192.168.10.140 high 192.168.10.160 255.255.255.0
lease 8
dns-server 208.67.222.222
no auto-default-router
exit
bonjour interface range vlan 1
ip access-list extended Router
exit
hostname BSW2
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
ip domain name bluemont
ip name-server 208.67.222.222
!
interface vlan 1
name Internal
no ip address dhcp
!
interface vlan 9
name "Router to Switch 10"
!
interface vlan 10
name Public
ip address 192.168.10.150 255.255.255.0
!
interface GigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/2
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/3
switchport access vlan 10
!
interface GigabitEthernet1/0/4
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/9
switchport access vlan 10
!
interface GigabitEthernet1/0/10
spanning-tree link-type point-to-point
switchport mode trunk
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/11
spanning-tree link-type point-to-point
switchport mode trunk
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/12
spanning-tree link-type point-to-point
switchport mode trunk
switchport protected-port
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/13
switchport access vlan 10
!
interface GigabitEthernet1/0/14
switchport access vlan 10
!
interface GigabitEthernet1/0/15
switchport access vlan 10
!
interface GigabitEthernet1/0/16
switchport access vlan 10
!
interface GigabitEthernet1/0/23
spanning-tree link-type point-to-point
switchport mode trunk
switchport general allowed vlan add 9 tagged
switchport access vlan 9
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/24
storm-control broadcast level 10
spanning-tree link-type point-to-point
switchport access vlan 9
switchport trunk native vlan 9
switchport trunk allowed vlan remove 1-8,11-4094
macro description router
macro auto smartport type router $native_vlan 9
!
interface TengigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface TengigabitEthernet1/0/2
description "Trunk Vlan1 BSW2"
ip address 192.168.9.2 255.255.255.0
no macro auto smartport
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
mac address-table static ec:1d:8b:b1:e7:b1 vlan 9 interface GigabitEthernet1/0/24
ip default-gateway 192.168.9.1
ip route 192.168.1.0 /24 192.168.9.1
ip route 192.168.10.0 /24 192.168.9.1
Switch 1 Config
BSW1#show run brief
config-file-header
BSW1
v2.3.5.63 / RLINUX_923_093
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan state disabled
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
port-channel load-balance src-dst-mac-ip
bonjour interface range vlan 1
hostname BSW1
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
logging origin-id hostname
logging file notifications
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
clock timezone " " -5
clock summer-time web recurring usa
no clock source sntp
ip domain name Bluemont
ip name-server 192.168.1.160
!
interface vlan 1
ip address 192.168.1.149 255.255.255.0
no ip address dhcp
!
interface vlan 9
name BSW2
!
interface vlan 10
name BSW2POE
!
interface GigabitEthernet1/0/5
speed 100
no negotiation
!
interface GigabitEthernet1/0/6
speed 100
no negotiation
!
interface GigabitEthernet1/0/7
speed 100
no negotiation
!
interface GigabitEthernet1/0/12
switchport trunk native vlan none
!
interface GigabitEthernet1/0/14
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/16
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/19
speed 100
no negotiation
!
interface GigabitEthernet1/0/22
channel-group 23 mode auto
switchport protected-port
!
interface GigabitEthernet1/0/23
channel-group 23 mode auto
switchport general allowed vlan add 1 tagged
switchport protected-port
switchport trunk allowed vlan remove 2-4094
!
interface GigabitEthernet1/0/24
switchport mode trunk
!
interface TengigabitEthernet1/0/2
description "Trunk to BSW2"
ip address 192.168.9.1 255.255.255.0
macro description no_switch
no macro auto smartport
!
interface Port-Channel23
description S1
switchport general allowed vlan add 1 tagged
switchport trunk native vlan none
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
macro auto processing type router enabled
arp 192.168.1.160 98:f2:b3:ed:97:35 vlan1
ip route 192.168.1.0 /24 192.168.1.1
ip route 192.168.9.0 /24 192.168.1.1
ip route 192.168.10.0 /24 192.168.1.1
03-24-2018 05:18 AM
Hi,
There is a lot of routing misconfiguration on Switch 1 and Switch 2.
Run below commands on Sw1:
no ip route 192.168.1.0 /24 192.168.1.1
no ip route 192.168.9.0 /24 192.168.1.1
no ip route 192.168.10.0 /24 192.168.1.1
ip route 192.168.10.0 /24 192.168.1.2
ip default-gateway <Firewall IP address>
Run below commands om Sw2:
no ip route 192.168.10.0 /24 192.168.9.1
Regards,
Deepak Kumar
03-24-2018 07:01 AM
I appreciate the assistance. I made the changes you recommended and Vlan 1 now works fine on Switch 2 and is able to get out and communicate. The only other problem is Vlan 10 cant get out to the internet.
BSW2#sh run brief
config-file-header
BSW2
v2.3.0.130 / RLINUX_913_193
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network "Pub Wireles"
address low 192.168.10.140 high 192.168.10.160 255.255.255.0
lease 8
dns-server 208.67.222.222
no auto-default-router
exit
bonjour interface range vlan 1
ip access-list extended Router
exit
hostname BSW2
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
ip domain name bluemont
ip name-server 208.67.222.222
!
interface vlan 1
name Internal
no ip address dhcp
!
interface vlan 9
name "Router to Switch 10"
!
interface vlan 10
name Public
ip address 192.168.10.150 255.255.255.0
!
interface GigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/2
spanning-tree link-type point-to-point
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/3
switchport access vlan 10
!
interface GigabitEthernet1/0/4
spanning-tree link-type point-to-point
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/10
spanning-tree link-type point-to-point
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/11
spanning-tree link-type point-to-point
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/12
spanning-tree link-type point-to-point
switchport protected-port
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/13
switchport access vlan 10
!
interface GigabitEthernet1/0/14
switchport access vlan 10
!
interface GigabitEthernet1/0/15
switchport access vlan 10
!
interface GigabitEthernet1/0/16
switchport access vlan 10
!
interface GigabitEthernet1/0/23
spanning-tree link-type point-to-point
switchport general allowed vlan add 9 tagged
switchport access vlan none
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/24
storm-control broadcast level 10
spanning-tree link-type point-to-point
switchport access vlan 9
switchport trunk native vlan 9
switchport trunk allowed vlan remove 1-8,11-4094
macro description router
macro auto smartport type router $native_vlan 9
!
interface TengigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport access vlan none
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface TengigabitEthernet1/0/2
description "Trunk Vlan1 BSW2"
ip address 192.168.9.2 255.255.255.0
no macro auto smartport
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
mac address-table static ec:1d:8b:b1:e7:b1 vlan 9 interface GigabitEthernet1/0/24
ip default-gateway 192.168.9.1
BSW2#
03-24-2018 07:35 AM
Hi,
I am happy to know that some of your problems have rectified.
Kindly share following command output from Sw1 and Firewall:
1. Show IP Route
If you have Cisco ASA then command: Show route
Is the VLAN 10 subnet added in NAT configuration? If not sure then please share the running configuration of the firewall.
Regards,
Deepak Kumar
03-24-2018 07:44 AM
Here is the Switch IP Route.
BSW1#show ip route
Maximum Parallel Paths: 1 (1 after reset)
IP Forwarding: enabled
Codes: > - best, C - connected, S - static,
R - RIP
S 0.0.0.0/0 [1/4] via 192.168.1.1, 01:25:49, vlan 1
C 192.168.1.0/24 is directly connected, vlan 1
S 192.168.10.0/24 [1/4] via 192.168.1.2, 01:26:02, vlan 1
Firewall Configuration
: Serial Number: JAD214101CD
: Hardware: ASA5508, 8192 MB RAM, CPU Atom C2000 series 2000 MHz, 1 CPU (8 cores)
: Written by Bluemont at 08:51:44.915 EDT Sun Mar 11 2018
!
ASA Version 9.8(1)
!
hostname ciscoasa
domain-name Bluemont
enable password $sha512$5000$jH+6BPdsWTcZUPu50bAkgQ==$ZaIAWtoELaHrkBb3w9xk/Q== pbkdf2
names
!
interface GigabitEthernet1/1
nameif outside
security-level 0
ip address 96.84.234.178 255.255.255.248
!
interface GigabitEthernet1/2
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface GigabitEthernet1/3
nameif Public
security-level 100
ip address 192.168.10.1 255.255.255.0
!
interface GigabitEthernet1/4
shutdown
no nameif
security-level 0
no ip address
!
interface GigabitEthernet1/5
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/6
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/7
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/8
shutdown
no nameif
no security-level
no ip address
!
interface Management1/1
management-only
nameif MGMT
security-level 0
ip address 192.168.45.1 255.255.255.0
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup inside
dns domain-lookup MGMT
dns server-group DefaultDNS
name-server 192.168.1.160
domain-name Bluemont
same-security-traffic permit inter-interface
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network MGMT
subnet 192.168.45.0 255.255.255.0
object network Gateway
host 96.84.234.182
description Outside Interface
object network SwitchNet
subnet 192.168.10.0 255.255.255.0
object network Public
subnet 0.0.0.0 0.0.0.0
description Public
object-group security Everyone
security-group name Everyone
access-list outside_access_in extended permit ip any 192.168.1.0 255.255.255.0
access-list outside_access_in extended permit icmp any any
access-list OutsideIn standard permit 73.147.208.0 255.255.255.0
access-list InsideOut standard permit 192.168.1.0 255.255.255.0
access-list PublicOut standard permit 192.168.10.0 255.255.255.0
access-list OutsideInPub standard permit 73.147.208.0 255.255.255.0
access-list Outside_Access_Public_In extended permit ip any 192.168.10.0 255.255.255.0
access-list Outside_Access_Public_In extended permit icmp any any
pager lines 24
logging enable
logging asdm informational
logging from-address email.com
logging recipient-address email.com level emergencies
mtu outside 1500
mtu inside 1500
mtu Public 1500
mtu MGMT 1500
ip verify reverse-path interface inside
no failover
no monitor-interface service-module
icmp unreachable rate-limit 1 burst-size 1
asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
object network obj_any
nat (inside,outside) dynamic interface
!
nat (Public,outside) after-auto source dynamic obj_any interface
route outside 0.0.0.0 0.0.0.0 96.84.234.182 1
route Public 192.168.9.0 255.255.255.0 192.168.10.2 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication ssh console LOCAL
aaa authentication serial console LOCAL
aaa authentication telnet console LOCAL
aaa authorization http console LOCAL
aaa authentication login-history
http server enable
http server idle-timeout 5
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpoint ASDM_TrustPoint0
enrollment terminal
subject-name CN=ciscoasa
crl configure
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 5
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcp-client update dns server both
dhcpd update dns both override
!
dhcpd update dns both override interface outside
!
dhcpd address 192.168.1.149-192.168.1.149 inside
dhcpd dns 192.168.1.160 interface inside
dhcpd domain Bluemont interface inside
dhcpd auto_config outside interface inside
dhcpd update dns both override interface inside
!
threat-detection basic-threat
threat-detection scanning-threat
threat-detection statistics
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 192.168.1.160 source inside prefer
dynamic-access-policy-record DfltAccessPolicy
password-policy minimum-length 8
quota management-session 10
username cisco password $sha512$5000$q7RKKA78ZRN6/3LEAI2r2Q==$4hPhSkOLkeyIMP7htoMEsA== pbkdf2
username Bluemont password $sha512$5000$Rhi7waUz0fSNP2xnxG/r9g==$Mpd5O2BFBekqdxdPI+7Wkg== pbkdf2 privilege 15
!
class-map sfr
match any
class-map inspection_default
match default-inspection-traffic
class-map type inspect http match-all asdm_high_security_methods
match not request method get
match not request method head
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
tcp-inspection
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
class sfr
sfr fail-open
class class-default
user-statistics accounting
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
hpm topN enable
Cryptochecksum:33f938db9b1b0ae90da5cd880137e7cd
03-24-2018 08:06 AM
Hi,
There is no route on ASA also.
Please add below command on asa:
route inside 192.168.10.0 255.255.255.0 192.168.1.149
Regards,
Deepak Kumar
03-24-2018 08:51 AM
I added the route on the ASA but still no luck. I did find out though that when I hooked my laptop into the DHCP ports on Switch 2 that it gives me an address but it does not assign me a default gateway and leaves it blank. At the end of Switch 2s configuration should I change the Default-Gateway from ip default-gateway 192.168.9.1 to 192.168.1.1 ?
03-24-2018 09:48 PM
Hi,
Run the below command on sw2:
ip dhcp pool network "Pub Wireles"
default-router 192.168.10.150
Regards,
Deepak Kumar
03-25-2018 05:43 AM
I added that command to the Pub Wireles and I now get the 192.168.10.150 as the default gateway to devices but I am still unable to get out to the internet.
I ran a Sh ip route and found out that it is only showing 192.168.10.0 as directly connected while the 0.0.0.0 192.168.9.1 is considered inactive. Could this be the problem?
03-25-2018 05:51 AM
Hi,
Why is static route inactive?
Is the VLAN 9 down or removed?
There must be two directly connected network as VLAN 9 and VLAN 10.
Regards,
Deepak Kumar
03-25-2018 05:58 AM
I don't remember moving or deleting it. I think I may have found out the issue. Vlan 9 doesn't have an IP address associated with it. It should have one correct?
BSW2#sh run brief
config-file-header
BSW2
v2.3.0.130 / RLINUX_913_193
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network "Pub Wireles"
address low 192.168.10.140 high 192.168.10.160 255.255.255.0
lease 8
default-router 192.168.10.150
dns-server 208.67.222.222
exit
bonjour interface range vlan 1
ip access-list extended Router
exit
hostname BSW2
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
ip domain name bluemont
ip name-server 208.67.222.222
!
interface vlan 1
name Internal
no ip address dhcp
!
interface vlan 9
name "Router to Switch 10"
!
interface vlan 10
name Public
ip address 192.168.10.150 255.255.255.0
!
interface GigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/2
spanning-tree link-type point-to-point
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/3
switchport access vlan 10
!
interface GigabitEthernet1/0/4
spanning-tree link-type point-to-point
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/10
spanning-tree link-type point-to-point
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/11
spanning-tree link-type point-to-point
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/12
spanning-tree link-type point-to-point
switchport protected-port
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/13
switchport access vlan 10
!
interface GigabitEthernet1/0/14
switchport access vlan 10
!
interface GigabitEthernet1/0/15
switchport access vlan 10
!
interface GigabitEthernet1/0/16
switchport access vlan 10
!
interface GigabitEthernet1/0/23
spanning-tree link-type point-to-point
switchport general allowed vlan add 9 tagged
switchport access vlan none
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/24
storm-control broadcast level 10
spanning-tree link-type point-to-point
switchport access vlan 9
switchport trunk native vlan 9
switchport trunk allowed vlan remove 1-8,11-4094
macro description router
macro auto smartport type router $native_vlan 9
!
interface TengigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport access vlan none
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface TengigabitEthernet1/0/2
description "Trunk Vlan1 BSW2"
ip address 192.168.9.2 255.255.255.0
no macro auto smartport
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
mac address-table static ec:1d:8b:b1:e7:b1 vlan 9 interface GigabitEthernet1/0/24
ip default-gateway 192.168.9.1
03-25-2018 06:03 AM - edited 03-25-2018 06:06 AM
Hi,
Sorry for misguided. Can you check there is an L3 interface between Sw1 and Sw2?
interface TengigabitEthernet1/0/2
description "Trunk Vlan1 BSW2"
ip address 192.168.9.2 255.255.255.0
no macro auto smartport
Is it down? can you ping 192.168.9.1 and 192.168.9.2 from the switch2?
Second: Is the Switch in L2 mode?
run a command to check:
show system mode
Regards,
Deepak Kumar
03-25-2018 06:19 AM
The show system mode command didn't work but I did find out what the ports were operating in. After checking Switch 1 it is in layer 2 mode on all ports and Switch 2 is in layer 2 mode on all ports. I cant ping 192.168.9.1 on Switch 1 using 192.168.9.2 on Switch 2. It shouldn't matter that the only thing connecting these 2 switches is an SFP cable correct? I don't have an L3 device in between them but I could use the Cisco 4331 model router that was recently bought if needed to stick between them. Maybe Router On A Stick is needed?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide