cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
533
Views
0
Helpful
4
Replies

HSRP between core switches , issue with reach SVI

ATHISESAN R
Level 1
Level 1

I have two core and two access switches to create HSRP redundancy for VLANs 100 and 200.  all configuration done by successfully. But here my problem is while I am trying int vlan 100 to across the int vlan 200. I cannot able to ping. as same as cannot able to ping from core switch to access switch.

 

I have set from access switches for default-gateway as their HSRP VIPs.

 

and enabled RSTP for al switches.

    VLAN 100 - root switch for iosvl2-1

    VLAN 200 - root switch for iosvl2-2

 

 

anyone could help us to resolve this?

 

 

"core switches iosvl2-1 and iosvl2-2"

"access switches iosvl2-3 and iosvl2-4"

 

configuration:-

 

iosvl2-1:-
int vlan 100
standby 1 ip 100.1.1.254
standby 1 priority 105
standby 1 preempt
standby 1 authentication HSRP1
!
int vlan 200
standby 2 ip 200.1.1.254
standby 2 priority 100
standby 2 preempt
standby 2 authentication HSRP2

 

iosvl2-2:-
int vlan 100
standby 1 ip 100.1.1.254
standby 1 priority 100
standby 1 preempt
standby 1 authentication HSRP1
!
int vlan 200
standby 2 ip 200.1.1.254
standby 2 priority 105
standby 2 preempt
standby 2 authentication HSRP2


iosvl2-3:-
int vlan 100
ip add 100.1.1.3 /24
!
ip default-gateway 100.1.1.254

iosvl2-4:-
int vlan 200
ip add 200.1.1.3 /24
!
ip default-gateway 200.1.1.254

*enabled RSTP for all switches.

 

 

4 Replies 4

Reza Sharifi
Hall of Fame
Hall of Fame

The SVI for each vlan need to have an IP address in the same subnet as the virtual IP. See example.

Also, post the output of "sh hsrp" after the modifications.

 

nt vlan 100

ip address 100.1.1.100 255.255.255.0
standby 1 ip 100.1.1.254
standby 1 priority 105
standby 1 preempt
standby 1 authentication HSRP1
!
int vlan 200

ip address 200.1.1.100 255.255.255.0
standby 2 ip 200.1.1.254
standby 2 priority 100
standby 2 preempt
standby 2 authentication HSRP2

before the change , I have one query for what about inter VLAN route, just I did it for static route for all switches. Now I can able to reachable.
Is that correct way to do ? or without route, can we reach different VLANs to together?

If the vlans reside on the same switch, there is no need for static routes. The switch will route between vlans but you need to have "ip routing" enabled.

HTH

ATHISESAN R
Level 1
Level 1

Hi.

I am not sure of is that without routing, it will ping or not.
But, as of now, I have enabled routing for access switches respectively below.

Gateway of last resort is not set

100.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 100.1.1.0/24 is directly connected, Vlan100
L 100.1.1.3/32 is directly connected, Vlan100
S 200.1.1.0/24 is directly connected, Vlan100
IOS2-3-ALS1#
IOS2-3-ALS1#

and

Gateway of last resort is not set

100.0.0.0/24 is subnetted, 1 subnets
S 100.1.1.0 is directly connected, Vlan200
200.1.1.0/24 is variably subnetted, 2 subnets, 2 masks
C 200.1.1.0/24 is directly connected, Vlan200
L 200.1.1.3/32 is directly connected, Vlan200
IOS2-4-ALS2#


after enabled this routing at both access switches with through their VLAN. I can ping together VLANs successfully. 

 

.. This above way is to be right or any other way to be there?

 

Note.. Core switches don't have any of routing .. just have both of VLANs and through ping has successfully.

 

Review Cisco Networking products for a $25 gift card