04-05-2020 03:26 PM
Hey guys. I'm still in the early stages of this stuff. I have a Cisco 1841 router double NATing from my ISP router. My 1841 router is then connected to switch 1 via Fa0/1. Switch 1 is connected to switch 2 via Fa0/13 on both switches.I trunked it. So if I have some ports set for Vlan 50 on both switches why would they not be able to ping each other? I may have some leftover configurations in these outputs but I tried to clear out everything from the messing around I did previous to this. Please let me know what I am doing wrong.This is driving me crazy. Suggestions for configs for starting anew (that would help me all the same)? All I want to do is set up a VLAN that spans across two switches and allows me to ping between hosts on that same VLAN that are connected to different switches. I am at my wits end. Also, this is not an issue of firewalls blocking the pings. I am sure of that, as I have temporarily turned them off and was able to ping in other scenarios I have set up in the past. Below are configs for Sw1 and 2.
Thank you,
Switch#show vlan brief
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/3, Fa0/4, Fa0/6
Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/14, Fa0/15
Fa0/16, Fa0/17, Fa0/18, Fa0/19
Fa0/20, Fa0/21, Fa0/22, Fa0/23
Fa0/24, Gi0/1, Gi0/2
50 VLAN0050 active Fa0/2, Fa0/5
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
Switch#
Switch#
Switch#show running-config
Building configuration...
Current configuration : 1303 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch
!
!
no aaa new-model
system mtu routing 1500
ip subnet-zero
!
!
!
!
!
!
no file verify auto
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
!
interface FastEthernet0/2
switchport access vlan 50
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
switchport access vlan 50
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
switchport mode trunk
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address dhcp
no ip route-cache
!
ip http server
ip http secure-server
!
control-plane
!
!
line con 0
line vty 5 15
!
end
Switch#show interfaces trunk
Port Mode Encapsulation Status Native vlan
Fa0/13 on 802.1q trunking 1
Port Vlans allowed on trunk
Fa0/13 1-4094
Port Vlans allowed and active in management domain
Fa0/13 1,50
Port Vlans in spanning tree forwarding state and not pruned
Fa0/13 1,50
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
And Switch 2:
Switch2#show running-config
Building configuration...
Current configuration : 1495 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch2
!
!
no aaa new-model
system mtu routing 1500
ip subnet-zero
!
!
!
!
!
!
no file verify auto
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface Port-channel1
!
interface FastEthernet0/1
switchport access vlan 99
switchport mode access
!
interface FastEthernet0/2
switchport access vlan 50
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
channel-group 1 mode on
!
interface FastEthernet0/15
channel-group 1 mode on
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
switchport access vlan 99
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
switchport access vlan 99
switchport mode dynamic desirable
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
no ip route-cache
!
ip http server
ip http secure-server
!
control-plane
!
!
line con 0
line vty 0 4
login
line vty 5 15
login
!
end
Switch2#show interface trunk
Port Mode Encapsulation Status Native vlan
Fa0/13 auto 802.1q trunking 1
Port Vlans allowed on trunk
Fa0/13 1-4094
Port Vlans allowed and active in management domain
Fa0/13 1,50
Port Vlans in spanning tree forwarding state and not pruned
Fa0/13 1,50
Switch2#show vlan brief
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6
Fa0/7, Fa0/8, Fa0/9, Fa0/10
Fa0/11, Fa0/12, Fa0/14, Fa0/15
Fa0/16, Fa0/17, Fa0/18, Fa0/19
Fa0/20, Fa0/21, Fa0/23, Fa0/24
Gi0/2
50 VLAN0050 active Fa0/2
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
04-05-2020 03:47 PM
Hi,
For testing, if you are using only one vlan (50) you can but don't have to trunk the connection between the 2 switches. You can simply configure port fa0/13 on both switch as access port.
config t
int fa0/13
switchport
switchport mode access
switchport access vlan 50
same on switch-2
Now if you pick a port (say fa0/1) on both switches,configure them the same as above (access port with vlan 50) and connect 2 laptops to these ports, give each laptop an IP in the same subnet, you should be able to ping between the 2 hosts.
laptop-1 port fa0/1 ip 10.10.10.2
laptop-2 port fa0/1 ip 10.10.10.3
HTH
04-09-2020 04:44 AM
I don't see anything in my quick perusal of your code that would suggest a lingering configuration blocking the ports from communicating with each other.
I've seen some strange things on switches before where the interfaces for the VLAN are not active and this causes issue. You could check this with "show run int vlan 50"; if it comes back saying it doesn't exist, you just create it by going into the interface (int vlan 50) and this will create the VLAN interface and set it to Up/Up. Do it on both switches.
If that doesn't work, I would honestly start over: it's not worth the stress.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide