02-15-2011 10:19 AM - edited 03-06-2019 03:34 PM
Good Day,
I'm doing the initial (and test) configuration of a cat 3650. I can't seem to get the routes to default out to the next hop router. Inter vlan routing succeeds and I can access hosts beyond the next hop router from the router itself. I'm hoping it's just a simple oversight on my behalf.
The config (with unconfigured ports omitted) and routing table are below.
Thanks
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2011.02.15 09:58:01 =~=~=~=~=~=~=~=~=~=~=~=
sh run
Building configuration...
Current configuration : 2201 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ih-edge
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$nLHM$U.XmQ/YDG0pqmRmeleOXC0
!
!
!
no aaa new-model
system mtu routing 1500
authentication mac-move permit
ip subnet-zero
ip routing
!
!
ip domain-name bobsdomain.edu
ip name-server 136.32.136.9
vtp mode transparent
!
!
!
spanning-tree mode pvst
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
vlan 10,20
!
!
!
interface FastEthernet0
no ip address
no ip route-cache cef
no ip route-cache
!
interface GigabitEthernet0/1
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet0/2
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet0/23
no switchport
ip address 166.229.52.2 255.255.255.128
!
interface Vlan1
no ip address
shutdown
!
interface Vlan10
ip address 192.168.2.1 255.255.255.0
!
interface Vlan20
ip address 192.168.1.1 255.255.255.0
!
ip classless
ip route 0.0.0.0 0.0.0.0 166.229.52.1
ip http server
ip http secure-server
!
ip sla enable reaction-alerts
!
!
line con 0
line vty 0 4
password xxx
login
line vty 5 15
password xxx
login
!
end
ih-edge#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 166.229.52.1 to network 0.0.0.0
166.229.0.0/25 is subnetted, 1 subnets
C 166.229.52.0 is directly connected, GigabitEthernet0/23
C 192.168.1.0/24 is directly connected, Vlan20
C 192.168.2.0/24 is directly connected, Vlan10
S* 0.0.0.0/0 [1/0] via 166.229.52.1
ih-edge#
02-15-2011 10:44 AM
Cisco switch 3650 doesnot support NAT , so your internal vlan on private ip's (rfc 1918) wont be able to reach out to public ip's outside your administration.
I think , the only cisco switch that supports NAT is 6500 series.
Manish
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide