cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
499
Views
0
Helpful
5
Replies

Inter-Vlan communication issue in 3850 cisco switch

I have 4 location in the company. I am using the 3850 Cisco switch in one location of my company and that location is mediatory for other 3 location also. I am using the same 192.168.0.x subnet for 3 location & one location using 172.16.15.x subnet and connectivity between all units are working through RF. I created two VLAN (VLAN 10 & VLAN 20) on one 3850 cisco switch. In VLAN 10 my all RF connectivity is existing and I am able to connect any machine/device of any location of my company and also I am able to connect with VLAN 20's machine. but I am not able to connect with VLAN 10's machine from Vlan20's Machine. Gateway of VLAN 10 is pinging in VLAN 20's machine.

 

IP Routing command is enabled in the switch. but still, I am not able to understand that, why I am not able to ping any machine of VLAN 10 from VLAN 20's machine.

5 Replies 5

Hello,

 

post the full configuration of your 3850, and indicate which ports provide connectvity to the other locations...

Hello,

 

 

Unit-1ciscoSW#sh running-config
Building configuration...

Current configuration : 5884 bytes
!
! Last configuration change at 04:01:31 UTC Mon May 27 2019
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
service compress-config
!
hostname Unit-1ciscoSW
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable password 7 06070223454D08
!
username admin privilege 15 password 7 070E2541470739544541
no aaa new-model
switch 1 provision ws-c3850-24t
ip routing
!
ip multicast auto-enable
ip device tracking
!
!
!
crypto pki trustpoint TP-self-signed-2877194490
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2877194490
revocation-check none
rsakeypair TP-self-signed-2877194490
!
!
crypto pki certificate chain TP-self-signed-2877194490
certificate self-signed 01
30820245 308201AE A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32383737 31393434 3930301E 170D3139 30353234 32303334
34315A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 38373731
39343439 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100D3E8 38589E24 8BD28E3C F6C83D42 25C07995 E8449D9F 16418226 07229842
9B4E1238 1DCACFD3 D0A7FF4F 02C18C74 BBC52773 AD838203 9DE2A275 778C8268
121569BB 42084264 994B2614 A083E1A5 EF1AB506 95718DAD 2F9BA07D C2B2BB6A
18E3706E D247DAEB 43CC088E 4AAB6050 611CE7F7 94DC6FC0 66CE3DD1 3F72491E
DE850203 010001A3 6D306B30 0F060355 1D130101 FF040530 030101FF 30180603
551D1104 11300F82 0D556E69 742D3163 6973636F 5357301F 0603551D 23041830
168014BB DC3B2901 D6F14C35 BB25B62A E90CBEA0 8F825430 1D060355 1D0E0416
0414BBDC 3B2901D6 F14C35BB 25B62AE9 0CBEA08F 8254300D 06092A86 4886F70D
01010405 00038181 002B9943 AB7936E8 99E6BEC7 4DB8ECCA 1BE83121 9BB6CA73
21CEA0F1 BE581A83 93CD4F5F 84CA46B6 4A032C88 0E5C75F3 7C0BE02C 1D9646C1
90F905F3 A5AEF821 CA67817C 980EB1FE E45389A8 A32E7C6A 21ED7836 6B694E4C
A7407E54 D84E6E02 BCA528EC 9DE6F1A4 38AB059B CB000B27 6D1ED338 2F4C4ADB
254526E1 BAD34981 D6
quit
!
!
!
!
!
diagnostic bootup level minimal
!
spanning-tree mode pvst
spanning-tree extend system-id
spanning-tree vlan 20 priority 24576
!
redundancy
mode sso
!
!
!
class-map match-any non-client-nrt-class
match non-client-nrt
!
policy-map port_child_policy
class non-client-nrt-class
bandwidth remaining ratio 10
!
!
!
!
!
!
interface Loopback1
no ip address
ip mtu 1500
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 10
switchport mode trunk
!
interface GigabitEthernet1/0/2
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/3
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/4
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/5
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/6
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/7
switchport access vlan 20
switchport mode access
!
interface GigabitEthernet1/0/8
switchport access vlan 20
switchport mode access
!
interface GigabitEthernet1/0/9
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/10
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/11
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/12
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/13
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/14
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/15
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/16
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/17
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/18
switchport access vlan 10
switchport mode access
speed 100
!
interface GigabitEthernet1/0/19
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/20
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/21
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/22
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/23
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/0/24
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
no ip address
shutdown
!
interface Vlan10
ip address 192.168.0.178 255.255.255.0
!
interface Vlan20
ip address 192.168.10.1 255.255.255.0
!
ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 192.168.0.1
!
!
!
!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password 7 01120B06520807
login local
transport input ssh
line vty 5 15
password 7 094D430B100616
login
!
wsma agent exec
profile httplistener
profile httpslistener
wsma agent config
profile httplistener
profile httpslistener
wsma agent filesys
profile httplistener
profile httpslistener
wsma agent notify
profile httplistener
profile httpslistener
!
wsma profile listener httplistener
transport http
!
wsma profile listener httpslistener
transport https
ap group default-group
end

 

 

My main motive for creating the VLAN for controlling the broadcasting. Is there any other way to control the broadcasting in 3850 switch?

Hello,

 

-->  am using the same 192.168.0.x subnet for 3 location & one location using 172.16.15.x subnet and connectivity between all units are working through RF.

 

I can only see two VLAN interfaces in your configuration:

 

interface Vlan10
ip address 192.168.0.178 255.255.255.0
!
interface Vlan20
ip address 192.168.10.1 255.255.255.0

 

How is the 172.x.x.x subnet involved here ? So basically you are saying that 192.168.10.0/24 cannot reach anything on 192.168.0.0/24 ? What is the IP address of the device(s) connected to:

 

interface GigabitEthernet1/0/7
switchport access vlan 20
switchport mode access
!
interface GigabitEthernet1/0/8
switchport access vlan 20
switchport mode access

 

 

the IP address of the device(s) connected to:

 

interface GigabitEthernet1/0/7
switchport access vlan 20
switchport mode access

 

IP Address:- 192.168.10.123

Subnet:- 255.255.255.0

Gateway:-192.168.10.1

 

 

 


interface GigabitEthernet1/0/8
switchport access vlan 20
switchport mode access

 

IP Address:- 192.168.10.169

Subnet:- 255.255.255.0

Gateway:-192.168.10.1

 

Hii Georg Pauwen, 

 

have you found any error in configuration? or Is there any solution to resolve my issue? So that I can stop the broadcasting in the Cisco switch.

Review Cisco Networking for a $25 gift card