03-27-2022 12:10 PM
Hi
we have cisco cat 9400 as our core sw in VSS.
I am trying to apply a default gateway via a command # ip default gateway x.x.x.x
the sw is taking the command but when i recheck the config by show ip route, it does not show the new config and displays no gateway last resort
why it is not taking. anyone can help here
03-27-2022 12:17 PM
VSS Aka new terminology ( Stachwise Virtual)
if the default gateway reachable ? (if not it will not show you show ip route)
But you see the in the config :
#show run all | in gateway
03-27-2022 08:59 PM
thank you guys for the reply.
@balaji , after running the cmmand #show run all | in gateway i can see the default gatewy which i applied.
However, when i do show ip route, here it shows as Gateway of last resort is not set.
Can you please let me know why is it?
03-28-2022 12:14 AM
Until the gateway not reachable the route will not show there.
we do not see the Full config, is this a new SVL setup? do you have VLAN with Layer3 interface to reach the default gateway?
post-
show run
show vlan
show ip interface briend
show ip route (full output)
Note: we are just assuming your setup how that looks like, maybe not not correct so we need to see show run
03-28-2022 09:32 PM
hi Balaji.
=~sh running-config
Building configuration...
Current configuration : 26451 bytes
!
! Last configuration change at 11:15:25 GST Wed Feb 2 2022 by zaid.shaikh
! NVRAM config last updated at 18:20:45 GST Sun Nov 28 2021 by admin
!
version 16.9
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
service call-home
platform punt-keepalive disable-kernel-core
!
!
!
!
address-family ipv4
exit-address-family
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 5 $1$dmR6$l4iVT6.23bIp6gRGdWJl1/
!
aaa new-model
!
!
aaa group server tacacs+ I
server name
!
aaa authentication login default group tacacs+ local
aaa authentication login VTY group ISE-TACACS local
aaa authentication enable default group ISE-TACACS enable
aaa authorization config-commands
aaa authorization exec default group tacacs+ local
aaa authorization exec VTY group ISE-TACACS local if-authenticated
aaa authorization commands 1 VTY group ISE-TACACS local if-authenticated
aaa authorization commands 15 VTY group ISE-TACACS local if-authenticated
aaa authorization network default group radius
aaa accounting exec default start-stop group ISE-TACACS
aaa accounting commands 1 default start-stop group ISE-TACACS
aaa accounting commands 15 default start-stop group ISE-TACACS
aaa accounting network default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
!
!
!
!
!
!
aaa session-id common
clock timezone GST 4 0
boot system bootflash:packages.conf
power redundancy-mode switch 1 combined
power redundancy-mode switch 2 combined
no power supply switch 1 autoLC shutdown
no power supply switch 2 autoLC shutdown
power supply switch 1 autoLC priority 1 2 5 6 7
power supply switch 2 autoLC priority 1 2 5 6 7
!
!
!
!
stackwise-virtual
domain 1
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
no destination transport-method email
!
!
!
!
!
ip domain name
!
!
!
login on-success log
!
!
!
!
!
!
!
vtp domain
vtp mode transparent
udld enable
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-3112835500
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3112835500
revocation-check none
rsakeypair TP-self-signed-3112835500
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-3112835500
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33313132 38333535 3030301E 170D3230 30323131 30373138
33375A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 31313238
333535
!
license boot level network-advantage addon dna-advantage
!
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 1-40,43-253,255-999,1001-4093 priority 0
spanning-tree vlan 41-42,254,1000 priority 61440
memory free low-watermark processor 186813
!
!
!
redundancy
mode sso
!
!
!
!
!
vlan 10
name U
!
vlan 12
name L
!
vlan 15
!
vlan 20
name U
!
vlan 21
name ACC
!
vlan 22-23
!
vlan 25
name
!
vlan 30
name
vlan 41
name
!
vlan 42
name
!
vlan 49
name
!
vlan 50
name C
!
vlan 51
name
!
vlan 52
name H
!
vlan 53
name
!
vlan 60
name
!
vlan 61
name
!
vlan 76
!
vlan 88
name
!
vlan 99
name
!
vlan 100
name
!
vlan 101
name
!
vlan 102
name T
!
vlan 175
name TE
!
vlan 200
name
!
vlan 254
name
!
vlan 1000
name
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data, LOGGING
class-map match-any system-cpp-default
description Inter FED, EWLC control, EWLC data
class-map match-any system-cpp-police-sys-data
description Learning cache ovfl, High Rate App, Exception, EGR Exception, NFL SAMPLED DATA, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description Transit Traffic and MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
interface Port-channel1
!
interface Port-channel2
d
interface Port-channel5
!
interface Port-channel6
!
interface Port-channel10
!
interface Port-channel20
!
interface Port-channel30
!
interface Port-channel40
!
interface Port-channel50
!
interface Port-channel60
!
interface Port-channel70
!
interface GigabitEthernet0/0
shutdown
negotiation auto
!
interface TenGigabitEthernet1/1/0/1
!
interface TenGigabitEthernet1/1/0/2
!
interface TenGigabitEthernet1/1/0/3
s
!
interface TenGigabitEthernet1/1/0/4
!
interface TenGigabitEthernet1/1/0/5
description ***CONNECTED TO FGT01-PORT17***
switchport mode trunk
channel-group 5 mode active
!
!
ip default-gateway 10.x.x.1
ip forward-protocol nd
no ip http server
ip http secure-server
ip route 1.x.x.4 255.255.255.255 1.x.x.1
ip route 1.x.x.4 255.255.255.255 1.x.x.1
ip tacac
!
!
!
ip access-list extended G
permit ip any any
logging trap notifications
logging facility syslog
logging host
logging host
access-list 1
access-list 1
!
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
banner exec ^CC
****************************************************************
* *
* This node is the property of DCD *
* Changes to the hardware or software of this *
* node may only be performed by selected DCD *
* employees and/or contractors. *
* *
****************************************************************
^C
banner motd ^CC
!!!WARNING!!!
****************************************************************
* The use of DCD computer and network resources is *
* intended for business Purposes by authorized personnel *
* Only. Unauthorized access is strictly prohibited. *
* *
* Resources utilization may be monitored in accordance *
* With DCD policies. *
****************************************************************
^C
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
access-class 1 in
authorization commands 1 VTY
authorization commands 15 VTY
authorization exec VTY
login authentication VTY
transport input telnet ssh
transport output ssh
line vty 5 15
access-class 1 in
transport input ssh
transport output none
!
!
!
!
!
!
!
end
# show ip route
Gateway of last resort is not set
X.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C x.x.x.0/24 is directly connected, Vlan100
L x.x.100.27/32 is directly connected, Vlan100
x.x.0.0/32 is subnetted, 1 subnets
S x.x.x.4 [1/0] via 10.94.100.1
All Vlans are layer 2 only mgmt vlan has ip add for the core sw management purpose
hope this will help you to guide me
03-29-2022 04:59 PM
the routing is enable in this Switch
so you need default route
ip route 0.0.0.0 0.0.0.0 interface
ip default gateway not work here.
03-29-2022 08:59 PM
Thanks for the reply
Can u pls guide what shall i do.
Shall i remove the ip default gateway command and instead put a # ip route 0.0.0.0 0.0.0.0 (next hop ip ) ?
03-30-2022 10:25 PM
Yes exactly that
03-29-2022 11:56 PM
enable ip routing
remove default-gateway
add IP route as you mentioned other post
03-30-2022 08:40 PM
thanks balaji,
since ip routing is enabled.
i will just add the ip route pointing towards the next hop address on the sw .
03-31-2022 03:34 AM
Sure and let us know how it goes ?
03-31-2022 04:38 AM
Thank you all .
I will do the change in weekend.
let u all knw how it goes
03-31-2022 05:29 AM
Sure please do report back outcome. Good luck !
03-27-2022 12:28 PM - edited 03-27-2022 12:29 PM
VSS as I know by default ip routing is enable so
ip default GW is not work you need default route instead.
Note:- ip default GW use only when SW have L2 not L3.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide