10-25-2016 08:40 PM - edited 03-08-2019 07:55 AM
Hi all,
I've been at this for hours and cannot get it to work. I was hoping someone can hopefully see my mistake and correct me.
I have 2 3750 in a stack with multiple different VLANs I'm trying to set Default-gateway or last resort-gateway to go to my firewall (SonicWALL).
My sonicwall Lan interface is configured 192.168.8.1 255.255.255.0 connected to the GigabitEthernet1/0/1 int on the 3750s
This is my configuration
Building configuration...
Current configuration : 5724 bytes
!
! Last configuration change at 02:14:50 UTC Mon Mar 1 1993
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Main-3750s
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$79lP$5mHCkUDUe5yECkH74LHad.
enable password password
!
no aaa new-model
switch 1 provision ws-c3750x-24
switch 2 provision ws-c3750x-24
system mtu routing 1500
ip routing
!
!
!
!
crypto pki trustpoint TP-self-signed-487821440
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-487821440
revocation-check none
rsakeypair TP-self-signed-487821440
!
!
crypto pki certificate chain TP-self-signed-487821440
certificate self-signed 01
30820240 308201A9 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 34383738 32313434 30301E17 0D393330 33303130 30303135
305A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3438 37383231
34343030 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
ADC072D4 B3C5CB20 668C23BA 19B45FB0 24F5FDEB EE4F6E3C 08952A94 1BD84C89
C9959090 42B7CD7E 05CFF46C EDFAF040 B69558A8 6F46898A 665C7D5E 10098EA1
59B443A2 EBCECBD7 6D4EA9AF C4F7AAEB 46316068 BD935A79 5B0E3DFA 6E51878A
1F0C4D9A 4B2C015A C510ECD6 D213FD20 A2030E14 877E0CA9 1D022728 EF985605
02030100 01A36A30 68300F06 03551D13 0101FF04 05300301 01FF3015 0603551D
11040E30 0C820A4D 61696E2D 33373530 73301F06 03551D23 04183016 80145D3A
04C80742 73097123 EFCD446B 2873547D C3C0301D 0603551D 0E041604 145D3A04
C8074273 097123EF CD446B28 73547DC3 C0300D06 092A8648 86F70D01 01040500
03818100 A18E6586 8C286F1E E1BD5720 74446D10 E4816F66 971A7792 C4CC523C
5A1AE479 6C94B28E F9BFCB27 2C6B7BD3 C7D803A5 2CDA3D30 770DA4FB 0E5176E8
BCD6F2F2 032036F7 92306936 C1380A57 766B2284 440223B6 2AB23703 7055AB0C
D18862F7 60D5D7DF 7953B174 83E886CB AAE9C336 6D3888CC 518A5E50 D28B08C8 5D2519BD
quit
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet0
no ip address
no ip route-cache
shutdown
!
interface GigabitEthernet1/0/1
switchport access vlan 8
!
interface GigabitEthernet1/0/2
switchport access vlan 10
!
interface GigabitEthernet1/0/3
switchport access vlan 10
!
interface GigabitEthernet1/0/4
switchport access vlan 10
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
switchport access vlan 20
!
interface GigabitEthernet1/0/14
switchport access vlan 20
!
interface GigabitEthernet1/0/15
switchport access vlan 20
!
interface GigabitEthernet1/0/16
switchport access vlan 20
!
interface GigabitEthernet1/0/17
switchport access vlan 20
!
interface GigabitEthernet1/0/18
switchport access vlan 20
!
interface GigabitEthernet1/0/19
switchport access vlan 10
!
interface GigabitEthernet1/0/20
switchport access vlan 10
!
interface GigabitEthernet1/0/21
switchport access vlan 10
!
interface GigabitEthernet1/0/22
switchport access vlan 10
!
interface GigabitEthernet1/0/23
switchport access vlan 10
!
interface GigabitEthernet1/0/24
switchport access vlan 10
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface GigabitEthernet2/0/1
switchport access vlan 25
!
interface GigabitEthernet2/0/2
switchport access vlan 10
!
interface GigabitEthernet2/0/3
switchport access vlan 10
!
interface GigabitEthernet2/0/4
switchport access vlan 10
!
interface GigabitEthernet2/0/5
!
interface GigabitEthernet2/0/6
!
interface GigabitEthernet2/0/7
!
interface GigabitEthernet2/0/8
!
interface GigabitEthernet2/0/9
!
interface GigabitEthernet2/0/10
!
interface GigabitEthernet2/0/11
!
interface GigabitEthernet2/0/12
!
interface GigabitEthernet2/0/13
switchport access vlan 20
!
interface GigabitEthernet2/0/14
switchport access vlan 20
!
interface GigabitEthernet2/0/15
switchport access vlan 20
!
interface GigabitEthernet2/0/16
switchport access vlan 20
!
interface GigabitEthernet2/0/17
switchport access vlan 20
!
interface GigabitEthernet2/0/18
switchport access vlan 20
!
interface GigabitEthernet2/0/19
switchport access vlan 10
!
interface GigabitEthernet2/0/20
switchport access vlan 10
!
interface GigabitEthernet2/0/21
switchport access vlan 10
!
interface GigabitEthernet2/0/22
switchport access vlan 10
!
interface GigabitEthernet2/0/23
switchport access vlan 10
!
interface GigabitEthernet2/0/24
switchport access vlan 10
!
interface GigabitEthernet2/1/1
!
interface GigabitEthernet2/1/2
!
interface GigabitEthernet2/1/3
!
interface GigabitEthernet2/1/4
!
interface TenGigabitEthernet2/1/1
!
interface TenGigabitEthernet2/1/2
!
interface Vlan1
ip address 192.168.1.20 255.255.255.0
!
interface Vlan8
ip address 192.168.8.210 255.255.255.0
!
interface Vlan10
ip address 192.168.10.1 255.255.255.0
!
interface Vlan20
ip address 192.168.20.1 255.255.255.0
!
interface Vlan25
ip address 192.168.25.1 255.255.255.0
!
ip default-gateway 192.168.8.1
ip http server
ip http secure-server
!
ip default-network 192.168.8.0
ip route 0.0.0.0 0.0.0.0 192.168.8.1
!
logging esm config
!
!
line con 0
line vty 0 4
password password
login
length 0
line vty 5 15
password password
login
!
end
Main-3750s#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is not set
S* 0.0.0.0/0 [0/0] via 0.0.0.0, Vlan8
192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.1.0/24 is directly connected, Vlan1
L 192.168.1.20/32 is directly connected, Vlan1
* 192.168.8.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.8.0/24 is directly connected, Vlan8
L 192.168.8.210/32 is directly connected, Vlan8
192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.10.0/24 is directly connected, Vlan10
L 192.168.10.1/32 is directly connected, Vlan10
192.168.25.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.25.0/24 is directly connected, Vlan25
L 192.168.25.1/32 is directly connected, Vlan25
The Cisco 3750 can ping the SonicWALL but no other device on other vlans. But other devices on different vlans can ping other vlans.
Please help. Thank you
Solved! Go to Solution.
10-25-2016 09:17 PM
Is your Sonic connected to your switch on interface GigabitEthernet1/0/1?????
can you do extended pings:
from 192.168.8.210 to 192.168.8.1
from 192.168.25.1 to 192.168.8.1
also does your sonic have a route back all the other subnets (vlan 1, 20 etc???)
you might need to add a static route to these subnets on your sonic, pointing to 192.168.8.210
10-25-2016 09:17 PM
Is your Sonic connected to your switch on interface GigabitEthernet1/0/1?????
can you do extended pings:
from 192.168.8.210 to 192.168.8.1
from 192.168.25.1 to 192.168.8.1
also does your sonic have a route back all the other subnets (vlan 1, 20 etc???)
you might need to add a static route to these subnets on your sonic, pointing to 192.168.8.210
10-26-2016 09:58 AM
My sonicwall is connected to Gi1/0/1.
I can ping 192.168.8.1 and any device on any vlan from the switch while in terminal.
Any device from any vlan can ping any other device on any vlan.
None of the devices from any vlan can ping 192.168.8.1 but can ping 192.168.8.210.
Adding a route back on my sonicwall does make sense. I will try that tonight and let you know if that worked.
As for proper gateway, all I need is
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.8.1
or do I also need to add or remove
ip default-gateway 192.168.8.1
ip default-network 192.168.8.0
Thanks
10-26-2016 10:23 AM
Hi,
if I understand you well, you can ping 192.168.8.210
then add this route on your switches:
ip route 192.168.8.0 255.255.255.0 192.168.8.210
Thanks
10-26-2016 08:43 PM
Dennis,
Thank you, all I had to do is create a route for my subnets on my SonicWALL and everything started working.
10-27-2016 06:30 AM
Thank you for posting back to the forum and for confirming that adding the routes to your subnets did resolve your problem.
HTH
Rick
10-25-2016 11:13 PM
Hi justilya,
As Dennis said , you have to add routes on the Sonicwall back to the switches. Can you share the Sonicwall Configurations?
Thanks
10-26-2016 06:15 PM
You can certainly remove these statements
ip default-gateway 192.168.8.1
ip default-network 192.168.8.0
These commands are intended for layer 2 switches. Since you have enabled ip routing these statements will have no effect on your switch.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide