cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3392
Views
0
Helpful
18
Replies

2 SG550-x switches wont communicate

Jah8887
Level 1
Level 1

Right now I have a firewall with a switch(BSW1) on the same and only vlan(vlan 1) that can communicate and the pcs can get out to the internet.  I attached another SG550-x switch using an SFP cable on ports te1/0/2 on both switches.  I am looking to set it up so that the 2nd switch can support vlan 1 plus 2 other vlans on specific ports.  I have tinkered with it and tried multiple solutions but I can't seem to get the trunking to work between the switches.  I have attached running configurations of both switches.  I am probably overlooking something or missing something simple but I can't seem to find it.

SW1 - Switch 1 that connects directly to firewall inside interface

SW2- Switch 2 that connects directly to switch 1 using SFP cable.

 

BSW1
v2.3.5.63 / RLINUX_923_093
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan state disabled
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
port-channel load-balance src-dst-mac-ip
bonjour interface range vlan 1
hostname BSW1
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
logging origin-id hostname
logging file notifications
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
clock timezone " " -5
clock summer-time web recurring usa
no clock source sntp
ip domain name Bluemont
ip name-server 192.168.1.160
!
interface vlan 1
ip address 192.168.1.149 255.255.255.0
no ip address dhcp
!
interface vlan 9
name BSW2
!
interface vlan 10
name BSW2POE
!
interface GigabitEthernet1/0/5
speed 100
no negotiation
!
interface GigabitEthernet1/0/6
speed 100
no negotiation
!
interface GigabitEthernet1/0/7
speed 100
no negotiation
!
interface GigabitEthernet1/0/12
switchport trunk native vlan none
!
interface GigabitEthernet1/0/14
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/16
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/19
speed 100
no negotiation
!
interface GigabitEthernet1/0/22
channel-group 23 mode auto
switchport protected-port
!
interface GigabitEthernet1/0/23
channel-group 23 mode auto
switchport general allowed vlan add 1 tagged
switchport protected-port
switchport trunk allowed vlan remove 2-4094
!
interface GigabitEthernet1/0/24
switchport mode trunk
!
interface TengigabitEthernet1/0/2
description "Trunk to BSW2"
ip address 192.168.9.1 255.255.255.0
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan none
switchport trunk allowed vlan remove 2-8,11-4094
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface Port-Channel23
description S1
switchport general allowed vlan add 1 tagged
switchport trunk native vlan none
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
macro auto processing type router enabled
arp 192.168.1.160 98:f2:b3:ed:97:35 vlan1
ip route 192.168.1.0 /24 192.168.1.1
ip route 192.168.9.0 /24 192.168.1.1

 

BSW2
v2.3.0.130 / RLINUX_913_193
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network "Pub Wireles"
address low 192.168.10.140 high 192.168.10.160 255.255.255.0
lease 8
dns-server 208.67.222.222
no auto-default-router
exit
bonjour interface range vlan 1
ip access-list extended Router
exit
hostname BSW2
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 pri vilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
ip domain name bluemont
ip name-server 208.67.222.222
!
interface vlan 1
name Internal
no ip address dhcp
!
interface vlan 9
name "Router to Switch 10"
!
interface vlan 10
name Public
ip address 192.168.10.150 255.255.255.0
!
interface GigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/2
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/3
switchport access vlan 10
!
interface GigabitEthernet1/0/4
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/9
switchport access vlan 10
!
interface GigabitEthernet1/0/10
spanning-tree link-type point-to-point
switchport mode trunk
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/11
spanning-tree link-type point-to-point
switchport mode trunk
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/12
spanning-tree link-type point-to-point
switchport mode trunk
switchport protected-port
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/13
switchport access vlan 10
!
interface GigabitEthernet1/0/14
switchport access vlan 10
!
interface GigabitEthernet1/0/15
switchport access vlan 10
!
interface GigabitEthernet1/0/16
switchport access vlan 10
!
interface GigabitEthernet1/0/23
spanning-tree link-type point-to-point
switchport mode trunk
switchport general allowed vlan add 9 tagged
switchport access vlan 9
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/24
storm-control broadcast level 10
spanning-tree link-type point-to-point
switchport access vlan 9
switchport trunk native vlan 9
switchport trunk allowed vlan remove 1-8,11-4094
macro description router
macro auto smartport type router $native_vlan 9
!
interface TengigabitEthernet1/0/1
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan 10
macro description "switch "
!next command is internal.
macro auto smartport dynamic_type switch
!
interface TengigabitEthernet1/0/2
description "Trunk Vlan1 BSW2"
ip address 192.168.9.2 255.255.255.0
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan none
switchport trunk allowed vlan remove 2-8,11-4094
macro description "switch "
macro auto smartport type switch $native_vlan 1,9,10
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
mac address-table static ec:1d:8b:b1:e7:b1 vlan 9 interface GigabitEthernet1/0/2 4
ip route 192.168.1.0 /24 192.168.9.1
ip route 192.168.10.0 /24 192.168.9.1

 

 

 

1 Accepted Solution

Accepted Solutions

Hi, 

Then I am advised to you that you have to reconfigure both switches and add an L3 switch on top of both switches (Between Sw1 and Firewall) and create SVI (VLAN 9 & VLAN 10) on the L3 switch and create both VLANs on both L2 switches. So there will no routing required on your L2 switches. All routing parts will be done by your L3 switch as Intervlan routing and a default route to ASA also.

 

Regards,
Deepak Kumar

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

View solution in original post

18 Replies 18

Deepak Kumar
VIP Alumni
VIP Alumni

Hi, 

Please check your trunk port configuration:

 

interface TengigabitEthernet1/0/2
description "Trunk Vlan1 BSW2"
ip address 192.168.9.2 255.255.255.0
spanning-tree link-type point-to-point
switchport mode trunk
switchport access vlan none
switchport trunk allowed vlan remove 2-8,11-4094
macro description "switch "
macro auto smartport type switch $native_vlan 1,9,10

 

Please remove all commands which are for trunk port configuration (bold) on both switches.

 

And check the route configuration on switch 1:

 

ip route 192.168.1.0 /24 192.168.1.1
ip route 192.168.9.0 /24 192.168.1.1

 

It must be as

ip route 192.168.10.0/24 192.168.1.2

 

and same check on switch 2:

ip route 192.168.1.0 /24 192.168.9.1
ip route 192.168.10.0 /24 192.168.9.1

 

It must be as:

ip route 0.0.0.0 0.0.0.0 192.168.9.1

 

Regards,

Deepak Kumar

 

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

Sorry for the late response but I wanted to let you know I made the changes but the 2nd switch still cant communicate to the first switch through the SFP ports.  I made the changes you recommended and I noticed the 2nd switch isn't adding the 0.0.0.0 0.0.0.0 192.168.9.1 to the IP routes.  I have the updated Switch 1 and 2 information below.  The 2nd switch keeps saying Net-unreachable when I try to ping 192.168.9.1 on the first switch.

 

BSW2#sh run brief
config-file-header
BSW2
v2.3.0.130 / RLINUX_913_193
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network "Pub Wireles"
address low 192.168.10.140 high 192.168.10.160 255.255.255.0
lease 8
dns-server 208.67.222.222
no auto-default-router
exit
bonjour interface range vlan 1
ip access-list extended Router
exit
hostname BSW2
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
ip domain name bluemont
ip name-server  208.67.222.222
!
interface vlan 1
 name Internal
 no ip address dhcp
!
interface vlan 9
 name "Router to Switch 10"
!
interface vlan 10
 name Public
 ip address 192.168.10.150 255.255.255.0
!
interface GigabitEthernet1/0/1
 spanning-tree link-type point-to-point
 switchport mode trunk
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/2
 spanning-tree link-type point-to-point
 switchport mode trunk
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/3
 switchport access vlan 10
!
interface GigabitEthernet1/0/4
 spanning-tree link-type point-to-point
 switchport mode trunk
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/9
 switchport access vlan 10
!
interface GigabitEthernet1/0/10
 spanning-tree link-type point-to-point
 switchport mode trunk
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/11
 spanning-tree link-type point-to-point
 switchport mode trunk
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/12
 spanning-tree link-type point-to-point
 switchport mode trunk
 switchport protected-port
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/13
 switchport access vlan 10
!
interface GigabitEthernet1/0/14
 switchport access vlan 10
!
interface GigabitEthernet1/0/15
 switchport access vlan 10
!
interface GigabitEthernet1/0/16
 switchport access vlan 10
!
interface GigabitEthernet1/0/23
 spanning-tree link-type point-to-point
 switchport mode trunk
 switchport general allowed vlan add 9 tagged
 switchport access vlan 9
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/24
 storm-control broadcast level 10
 spanning-tree link-type point-to-point
 switchport access vlan 9
 switchport trunk native vlan 9
 switchport trunk allowed vlan remove 1-8,11-4094
 macro description router
 macro auto smartport type router $native_vlan 9
!
interface TengigabitEthernet1/0/1
 spanning-tree link-type point-to-point
 switchport mode trunk
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface TengigabitEthernet1/0/2
 description "Trunk Vlan1 BSW2"
 ip address 192.168.9.2 255.255.255.0
 no macro auto smartport
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
mac address-table static ec:1d:8b:b1:e7:b1 vlan 9 interface GigabitEthernet1/0/24
ip default-gateway 192.168.9.1
ip route 192.168.1.0 /24 192.168.9.1
ip route 192.168.10.0 /24 192.168.9.1

 

 

 

 

 

Switch 1 Config

 

BSW1#show run brief
config-file-header
BSW1
v2.3.5.63 / RLINUX_923_093
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan state disabled
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
port-channel load-balance src-dst-mac-ip
bonjour interface range vlan 1
hostname BSW1
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
logging origin-id hostname
logging file notifications
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
clock timezone " " -5
clock summer-time web recurring usa
no clock source sntp
ip domain name Bluemont
ip name-server  192.168.1.160
!
interface vlan 1
 ip address 192.168.1.149 255.255.255.0
 no ip address dhcp
!
interface vlan 9
 name BSW2
!
interface vlan 10
 name BSW2POE
!
interface GigabitEthernet1/0/5
 speed 100
 no negotiation
!
interface GigabitEthernet1/0/6
 speed 100
 no negotiation
!
interface GigabitEthernet1/0/7
 speed 100
 no negotiation
!
interface GigabitEthernet1/0/12
 switchport trunk native vlan none
!
interface GigabitEthernet1/0/14
 spanning-tree link-type point-to-point
 switchport mode trunk
 macro description switch
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/16
 spanning-tree link-type point-to-point
 switchport mode trunk
 macro description switch
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/19
 speed 100
 no negotiation
!
interface GigabitEthernet1/0/22
 channel-group 23 mode auto
 switchport protected-port
!
interface GigabitEthernet1/0/23
 channel-group 23 mode auto
 switchport general allowed vlan add 1 tagged
 switchport protected-port
 switchport trunk allowed vlan remove 2-4094
!
interface GigabitEthernet1/0/24
 switchport mode trunk
!
interface TengigabitEthernet1/0/2
 description "Trunk to BSW2"
 ip address 192.168.9.1 255.255.255.0
 macro description no_switch
 no macro auto smartport
!
interface Port-Channel23
 description S1
 switchport general allowed vlan add 1 tagged
 switchport trunk native vlan none
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
macro auto processing type router enabled
arp 192.168.1.160 98:f2:b3:ed:97:35  vlan1
ip route 192.168.1.0 /24 192.168.1.1
ip route 192.168.9.0 /24 192.168.1.1
ip route 192.168.10.0 /24 192.168.1.1

 

Hi, 

There is a lot of routing misconfiguration on Switch 1 and Switch 2. 

Run below commands on Sw1:

 

no ip route 192.168.1.0 /24 192.168.1.1
no ip route 192.168.9.0 /24 192.168.1.1
no ip route 192.168.10.0 /24 192.168.1.1
ip route 192.168.10.0 /24 192.168.1.2
ip default-gateway <Firewall IP address>

 

Run below commands om Sw2:

 

 no ip route 192.168.10.0 /24 192.168.9.1

 

Regards,

Deepak Kumar

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

I appreciate the assistance.  I made the changes you recommended and Vlan 1 now works fine on Switch 2 and is able to get out and communicate.  The only other problem is Vlan 10 cant get out to the internet.

 

 

BSW2#sh run brief
config-file-header
BSW2
v2.3.0.130 / RLINUX_913_193
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network "Pub Wireles"
address low 192.168.10.140 high 192.168.10.160 255.255.255.0
lease 8
dns-server 208.67.222.222
no auto-default-router
exit
bonjour interface range vlan 1
ip access-list extended Router
exit
hostname BSW2
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
ip domain name bluemont
ip name-server  208.67.222.222
!
interface vlan 1
 name Internal
 no ip address dhcp
!
interface vlan 9
 name "Router to Switch 10"
!
interface vlan 10
 name Public
 ip address 192.168.10.150 255.255.255.0
!
interface GigabitEthernet1/0/1
 spanning-tree link-type point-to-point
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/2
 spanning-tree link-type point-to-point
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/3
 switchport access vlan 10
!
interface GigabitEthernet1/0/4
 spanning-tree link-type point-to-point
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/10
 spanning-tree link-type point-to-point
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/11
 spanning-tree link-type point-to-point
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/12
 spanning-tree link-type point-to-point
 switchport protected-port
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/13
 switchport access vlan 10
!
interface GigabitEthernet1/0/14
 switchport access vlan 10
!
interface GigabitEthernet1/0/15
 switchport access vlan 10
!
interface GigabitEthernet1/0/16
 switchport access vlan 10
!
interface GigabitEthernet1/0/23
 spanning-tree link-type point-to-point
 switchport general allowed vlan add 9 tagged
 switchport access vlan none
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/24
 storm-control broadcast level 10
 spanning-tree link-type point-to-point
 switchport access vlan 9
 switchport trunk native vlan 9
 switchport trunk allowed vlan remove 1-8,11-4094
 macro description router
 macro auto smartport type router $native_vlan 9
!
interface TengigabitEthernet1/0/1
 spanning-tree link-type point-to-point
 switchport access vlan none
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface TengigabitEthernet1/0/2
 description "Trunk Vlan1 BSW2"
 ip address 192.168.9.2 255.255.255.0
 no macro auto smartport
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
mac address-table static ec:1d:8b:b1:e7:b1 vlan 9 interface GigabitEthernet1/0/24
ip default-gateway 192.168.9.1
BSW2#

Hi,

I am happy to know that some of your problems have rectified. 

Kindly share following command output from Sw1 and Firewall:

 

1. Show IP Route

If you have Cisco ASA then command: Show route

 

Is the VLAN 10 subnet added in NAT configuration? If not sure then please share the running configuration of the firewall.

 

Regards,

Deepak Kumar 

 

 

 

 

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

Here is the Switch IP Route.

 

BSW1#show ip route
Maximum Parallel Paths: 1 (1 after reset)
IP Forwarding: enabled
Codes: > - best, C - connected, S - static,
       R - RIP


S   0.0.0.0/0 [1/4] via 192.168.1.1, 01:25:49, vlan 1
C   192.168.1.0/24 is directly connected, vlan 1
S   192.168.10.0/24 [1/4] via 192.168.1.2, 01:26:02, vlan 1

 

 

 

 

Firewall Configuration

: Serial Number: JAD214101CD
: Hardware:   ASA5508, 8192 MB RAM, CPU Atom C2000 series 2000 MHz, 1 CPU (8 cores)
: Written by Bluemont at 08:51:44.915 EDT Sun Mar 11 2018
!
ASA Version 9.8(1)
!
hostname ciscoasa
domain-name Bluemont
enable password $sha512$5000$jH+6BPdsWTcZUPu50bAkgQ==$ZaIAWtoELaHrkBb3w9xk/Q== pbkdf2
names

!
interface GigabitEthernet1/1
 nameif outside
 security-level 0
 ip address 96.84.234.178 255.255.255.248
!
interface GigabitEthernet1/2
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0
!
interface GigabitEthernet1/3
 nameif Public
 security-level 100
 ip address 192.168.10.1 255.255.255.0
!
interface GigabitEthernet1/4
 shutdown
 no nameif
 security-level 0
 no ip address
!
interface GigabitEthernet1/5
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/6
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/7
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/8
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management1/1
 management-only
 nameif MGMT
 security-level 0
 ip address 192.168.45.1 255.255.255.0
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup inside
dns domain-lookup MGMT
dns server-group DefaultDNS
 name-server 192.168.1.160
 domain-name Bluemont
same-security-traffic permit inter-interface
object network obj_any
 subnet 0.0.0.0 0.0.0.0
object network MGMT
 subnet 192.168.45.0 255.255.255.0
object network Gateway
 host 96.84.234.182
 description Outside Interface
object network SwitchNet
 subnet 192.168.10.0 255.255.255.0
object network Public
 subnet 0.0.0.0 0.0.0.0
 description Public
object-group security Everyone
 security-group name Everyone
access-list outside_access_in extended permit ip any 192.168.1.0 255.255.255.0
access-list outside_access_in extended permit icmp any any
access-list OutsideIn standard permit 73.147.208.0 255.255.255.0
access-list InsideOut standard permit 192.168.1.0 255.255.255.0
access-list PublicOut standard permit 192.168.10.0 255.255.255.0
access-list OutsideInPub standard permit 73.147.208.0 255.255.255.0
access-list Outside_Access_Public_In extended permit ip any 192.168.10.0 255.255.255.0
access-list Outside_Access_Public_In extended permit icmp any any
pager lines 24
logging enable
logging asdm informational
logging from-address email.com
logging recipient-address email.com level emergencies
mtu outside 1500
mtu inside 1500
mtu Public 1500
mtu MGMT 1500
ip verify reverse-path interface inside
no failover
no monitor-interface service-module
icmp unreachable rate-limit 1 burst-size 1
asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
object network obj_any
 nat (inside,outside) dynamic interface
!
nat (Public,outside) after-auto source dynamic obj_any interface
route outside 0.0.0.0 0.0.0.0 96.84.234.182 1
route Public 192.168.9.0 255.255.255.0 192.168.10.2 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication ssh console LOCAL
aaa authentication serial console LOCAL
aaa authentication telnet console LOCAL
aaa authorization http console LOCAL
aaa authentication login-history
http server enable
http server idle-timeout 5
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpoint ASDM_TrustPoint0
 enrollment terminal
 subject-name CN=ciscoasa
 crl configure
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 5
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcp-client update dns server both
dhcpd update dns both override
!
dhcpd update dns both override interface outside
!
dhcpd address 192.168.1.149-192.168.1.149 inside
dhcpd dns 192.168.1.160 interface inside
dhcpd domain Bluemont interface inside
dhcpd auto_config outside interface inside
dhcpd update dns both override interface inside
!
threat-detection basic-threat
threat-detection scanning-threat
threat-detection statistics
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 192.168.1.160 source inside prefer
dynamic-access-policy-record DfltAccessPolicy
password-policy minimum-length 8
quota management-session 10
username cisco password $sha512$5000$q7RKKA78ZRN6/3LEAI2r2Q==$4hPhSkOLkeyIMP7htoMEsA== pbkdf2
username Bluemont password $sha512$5000$Rhi7waUz0fSNP2xnxG/r9g==$Mpd5O2BFBekqdxdPI+7Wkg== pbkdf2 privilege 15
!
class-map sfr
 match any
class-map inspection_default
 match default-inspection-traffic
class-map type inspect http match-all asdm_high_security_methods
 match not request method get
 match not request method head
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
  tcp-inspection
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  inspect ip-options
  inspect icmp
 class sfr
  sfr fail-open
 class class-default
  user-statistics accounting
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
hpm topN enable
Cryptochecksum:33f938db9b1b0ae90da5cd880137e7cd

 

Hi, 

There is no route on ASA also.

Please add below command on asa:

 

route inside 192.168.10.0 255.255.255.0 192.168.1.149 

 

Regards,

Deepak Kumar

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

I added the route on the ASA but still no luck.  I did find out though that when I hooked my laptop into the DHCP ports on Switch 2 that it gives me an address but it does not assign me a default gateway and leaves it blank.  At the end of Switch 2s configuration should I change the Default-Gateway from ip default-gateway 192.168.9.1 to 192.168.1.1 ?

Hi, 

Run the below command on sw2:

ip dhcp pool network "Pub Wireles"
default-router 192.168.10.150

 

Regards,

Deepak Kumar

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

I added that command to the Pub Wireles and I now get the 192.168.10.150 as the default gateway to devices but I am still unable to get out to the internet. 

I ran a Sh ip route and found out that it is only showing 192.168.10.0 as directly connected while the 0.0.0.0 192.168.9.1 is considered inactive.  Could this be the problem?

 

ip route inactive.PNGip route only connect.PNG

Hi,

 

Why is static route inactive?

Is the VLAN 9 down or removed?

There must be two directly connected network as VLAN 9 and VLAN 10.

 

Regards,

Deepak Kumar

 

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

I don't remember moving or deleting it. I think I may have found out the issue.  Vlan 9 doesn't have an IP address associated with it.  It should have one correct?

 

BSW2#sh run brief
config-file-header
BSW2
v2.3.0.130 / RLINUX_913_193
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
!
unit-type-control-start
unit-type unit 1 network gi uplink te
unit-type unit 2 network gi uplink te
unit-type unit 3 network gi uplink te
unit-type unit 4 network gi uplink te
unit-type unit 5 network gi uplink te
unit-type unit 6 network gi uplink te
unit-type unit 7 network gi uplink te
unit-type unit 8 network gi uplink te
unit-type-control-end
!
vlan database
vlan 9-10
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
ip dhcp server
ip dhcp pool network "Pub Wireles"
address low 192.168.10.140 high 192.168.10.160 255.255.255.0
lease 8
default-router 192.168.10.150
dns-server 208.67.222.222
exit
bonjour interface range vlan 1
ip access-list extended Router
exit
hostname BSW2
line console
exec-timeout 5
exit
line ssh
exec-timeout 5
exit
line telnet
exec-timeout 5
exit
username Techman password encrypted 6ca1abfa2ab82599f5277ec0a5786098feb01bb4 privilege 15
ip ssh server
snmp-server location Luray
snmp-server contact John
ip http timeout-policy 300
ip domain name bluemont
ip name-server  208.67.222.222
!
interface vlan 1
 name Internal
 no ip address dhcp
!
interface vlan 9
 name "Router to Switch 10"
!
interface vlan 10
 name Public
 ip address 192.168.10.150 255.255.255.0
!
interface GigabitEthernet1/0/1
 spanning-tree link-type point-to-point
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/2
 spanning-tree link-type point-to-point
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/3
 switchport access vlan 10
!
interface GigabitEthernet1/0/4
 spanning-tree link-type point-to-point
 switchport access vlan 10
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/10
 spanning-tree link-type point-to-point
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/11
 spanning-tree link-type point-to-point
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/12
 spanning-tree link-type point-to-point
 switchport protected-port
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/13
 switchport access vlan 10
!
interface GigabitEthernet1/0/14
 switchport access vlan 10
!
interface GigabitEthernet1/0/15
 switchport access vlan 10
!
interface GigabitEthernet1/0/16
 switchport access vlan 10
!
interface GigabitEthernet1/0/23
 spanning-tree link-type point-to-point
 switchport general allowed vlan add 9 tagged
 switchport access vlan none
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface GigabitEthernet1/0/24
 storm-control broadcast level 10
 spanning-tree link-type point-to-point
 switchport access vlan 9
 switchport trunk native vlan 9
 switchport trunk allowed vlan remove 1-8,11-4094
 macro description router
 macro auto smartport type router $native_vlan 9
!
interface TengigabitEthernet1/0/1
 spanning-tree link-type point-to-point
 switchport access vlan none
 macro description "switch "
 !next command is internal.
 macro auto smartport dynamic_type switch
!
interface TengigabitEthernet1/0/2
 description "Trunk Vlan1 BSW2"
 ip address 192.168.9.2 255.255.255.0
 no macro auto smartport
!
exit
macro auto enabled
macro auto processing type ip_phone disabled
mac address-table static ec:1d:8b:b1:e7:b1 vlan 9 interface GigabitEthernet1/0/24
ip default-gateway 192.168.9.1

Hi,

Sorry for misguided. Can you check there is an L3 interface between Sw1 and Sw2?

interface TengigabitEthernet1/0/2
 description "Trunk Vlan1 BSW2"
 ip address 192.168.9.2 255.255.255.0
 no macro auto smartport

 

Is it down? can you ping 192.168.9.1 and 192.168.9.2 from the switch2?

 

Second: Is the Switch in L2 mode?

run a command to check: 

show system mode

 

Regards,

Deepak Kumar

 

 

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

The show system mode command didn't work but I did find out what the ports were operating in.  After checking Switch 1 it is in layer 2 mode on all ports and Switch 2 is in layer 2 mode on all ports.  I cant ping 192.168.9.1 on Switch 1 using 192.168.9.2 on Switch 2.  It shouldn't matter that the only thing connecting these 2 switches is an SFP cable correct?  I don't have an L3 device in between them but I could use the Cisco 4331 model router that was recently bought if needed to stick between them.  Maybe Router On A Stick is needed?

Review Cisco Networking for a $25 gift card