05-05-2017 12:58 PM - edited 03-08-2019 10:28 AM
I have two layer two switches, lets call the switch X and switch Y. On these two switches I have two VLANS defined 41 and 42. I have setup one of the gigabit ports on each switch to be a trunk port and the two switches and communicating successfully. It has come to my attention that both VLAN 41 and 42 will have a few multicast devices on them which has me thinking about IGMP snooping on both VLANS. From the reading I have done it looks like IGMP snooping is globally enabled and also enabled per VLAN as you create them. What I would like to do is have switch X be the VLAN 41 querier and have switch Y be the VLAN 42 querier. I have an IP address assigned to VLAN 41 on switch X and an IP address assigned to VLAN 42 on Switch Y.What I have tried so far has not worked successfully. I have posted the config from switch X and switch Y below. Can anyone offer me some knowledge with how to complete this probably very simple task? Thanks in advance.
Switch X:
Using 2341 out of 65536 bytes
!
! Last configuration change at 17:21:22 UTC Sat Mar 6 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
system mtu routing 1500
ptp mode e2etransparent
!
!
!
!
Switch#terminal length 0
Switch#show config
Using 2341 out of 65536 bytes
!
! Last configuration change at 17:21:22 UTC Sat Mar 6 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
system mtu routing 1500
ptp mode e2etransparent
!
!
!
!
!
!
!
ip igmp snooping querier
!
!
crypto pki trustpoint TP-self-signed-1768263040
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1768263040
revocation-check none
rsakeypair TP-self-signed-1768263040
!
!
crypto pki certificate chain TP-self-signed-1768263040
certificate self-signed 01 nvram:IOS-Self-Sig#1.cer
no mac authentication
mac authentication table version 0
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
vlan configuration 1,40,43
no ip igmp snooping
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet1/1
switchport access vlan 42
!
interface FastEthernet1/2
switchport access vlan 42
!
interface FastEthernet1/3
switchport access vlan 42
!
interface FastEthernet1/4
switchport access vlan 42
!
interface FastEthernet1/5
switchport access vlan 42
!
interface FastEthernet1/6
switchport access vlan 42
!
interface FastEthernet1/7
switchport access vlan 41
!
interface FastEthernet1/8
switchport access vlan 41
!
interface FastEthernet2/1
switchport access vlan 41
!
interface FastEthernet2/2
switchport access vlan 41
!
interface FastEthernet2/3
switchport access vlan 41
!
interface FastEthernet2/4
switchport access vlan 41
!
interface FastEthernet2/5
switchport access vlan 41
!
interface FastEthernet2/6
switchport access vlan 41
!
interface FastEthernet2/7
switchport mode trunk
!
interface FastEthernet2/8
switchport mode trunk
!
interface FastEthernet3/1
switchport access vlan 40
!
interface FastEthernet3/2
!
interface FastEthernet3/3
!
interface FastEthernet3/4
!
interface GigabitEthernet1/1
switchport mode trunk
!
interface GigabitEthernet1/2
switchport mode trunk
!
interface Vlan1
no ip address
!
interface Vlan41
no ip address
!
interface Vlan42
ip address 192.168.42.73 255.255.255.0
!
ip http server
ip http secure-server
!
!
!
line con 0
line vty 0 4
login
line vty 5 15
login
!
!
end
Switch Y:
Using 2305 out of 65536 bytes
!
! Last configuration change at 00:08:53 UTC Mon Mar 1 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
system mtu routing 1500
ptp mode e2etransparent
!
!
!
!
Switch#terminal length 0
Switch#show config
Using 2305 out of 65536 bytes
!
! Last configuration change at 00:08:53 UTC Mon Mar 1 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
system mtu routing 1500
ptp mode e2etransparent
!
!
!
!
!
!
!
ip igmp snooping querier address 192.168.41.28
ip igmp snooping querier
!
!
crypto pki trustpoint TP-self-signed-1768256128
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1768256128
revocation-check none
rsakeypair TP-self-signed-1768256128
!
!
crypto pki certificate chain TP-self-signed-1768256128
certificate self-signed 01 nvram:IOS-Self-Sig#1.cer
no mac authentication
mac authentication table version 0
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
vlan configuration 1,40,43
no ip igmp snooping
vlan configuration 42
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet1/1
switchport access vlan 41
switchport mode access
!
interface FastEthernet1/2
switchport access vlan 41
!
interface FastEthernet1/3
switchport access vlan 41
!
interface FastEthernet1/4
switchport access vlan 41
!
interface FastEthernet1/5
switchport access vlan 41
!
interface FastEthernet1/6
switchport access vlan 41
!
interface FastEthernet1/7
switchport access vlan 41
!
interface FastEthernet1/8
switchport access vlan 41
!
interface FastEthernet2/1
switchport access vlan 41
!
interface FastEthernet2/2
switchport access vlan 41
!
interface FastEthernet2/3
switchport access vlan 41
!
interface FastEthernet2/4
switchport access vlan 41
!
interface FastEthernet2/5
switchport access vlan 41
!
interface FastEthernet2/6
switchport access vlan 41
!
interface FastEthernet2/7
switchport access vlan 41
!
interface FastEthernet2/8
switchport access vlan 41
!
interface GigabitEthernet1/1
switchport mode trunk
!
interface GigabitEthernet1/2
switchport mode trunk
!
interface Vlan1
no ip address
!
interface Vlan41
ip address 192.168.41.28 255.255.255.0
!
interface Vlan42
no ip address
!
ip http server
ip http secure-server
!
!
!
line con 0
line vty 0 4
login
line vty 5 15
login
!
!
end
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide