IP Overlap issues
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-20-2017 12:03 PM - edited 03-08-2019 09:50 AM
I am trying to intergrate my wireless router into my 4300 Router I believe I have done everything right however I am getting an overlap error with my subinterface. I don't know how to fix this because on that VLAN which is a client VLAN (VLAN2) has mainly static IP's except for a few. I am connected to a Layer2 SG-300-52p (via port 49) and there are 5 other switches off of that. I believe I am doing everything right but IP's are not my strong suit.
wireless router IP's: (192.168.0.229) LAN side (192.31.83.238) WAN side.
Cisco 4300:
version 15.5
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime
service timestamps log datetime
service password-encryption
service compress-config
no platform punt-keepalive disable-kernel-core
!
hostname MasterControlRouter
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-intf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
logging count
logging snmp-authfail
logging userinfo
no logging rate-limit
no logging cns-events
enable secret 5 $1$ml1a$SyIYjZdtSLlKif4W6qbTK1
!
aaa new-model
!
!
!
!
!
!
!
!
aaa session-id common
no ip source-route
no ip gratuitous-arps
!
!
!
!
!
!
!
!
!
!
!
no ip bootp server
no ip domain lookup
ip domain name okstate.edu
ip dhcp excluded-address 192.168.0.1 192.168.0.149
ip dhcp excluded-address 192.168.0.177 192.168.0.253
!
ip dhcp pool MC1
network 192.168.0.0 255.255.255.0
domain-name okstate.edu
dns-server 139.78.100.2
default-router 192.168.0.1
lease 7
!
!
!
!
!
!
!
!
!
!
subscriber templating
multilink bundle-name authenticated
!
!
!
!
license udi pid ISR4321/K9 sn FDO21032SKK
archive
log config
logging enable
logging size 1000
hidekeys
!
spanning-tree extend system-id
!
username ITLEAdmin privilege 15 secret 5 $1$rIJz$XTOgNdDTZglXiwpAjUH1B1
!
redundancy
mode none
!
!
vlan internal allocation policy ascending
!
ip tcp synwait-time 10
ip tcp path-mtu-discovery
ip telnet source-interface Loopback0
lldp run
!
!
!
!
!
interface Null0
no ip unreachables
!
interface Loopback0
ip address 192.168.4.198 255.255.255.192
!
interface GigabitEthernet0/0/0
description MY_LAN
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
negotiation auto
!
interface GigabitEthernet0/0/0.2
description Evertz
encapsulation dot1Q 2
ip address 192.168.0.1 255.255.255.0
!
interface GigabitEthernet0/0/0.3
description Dante
encapsulation dot1Q 3
ip address 192.168.1.1 255.255.255.0
!
interface GigabitEthernet0/0/0.4
description Broadcast
encapsulation dot1Q 4
ip address 192.168.2.1 255.255.255.0
!
interface GigabitEthernet0/0/0.5
description Business
encapsulation dot1Q 5
ip address 192.168.3.1 255.255.255.0
!
interface GigabitEthernet0/0/0.6
description Managment
encapsulation dot1Q 6
ip address 192.168.4.1 255.255.255.192
!
interface GigabitEthernet0/0/1
description Internet
ip address dhcp
ip nat outside
ip access-group MY_WAN in
negotiation auto
!
interface GigabitEthernet0
vrf forwarding Mgmt-intf
no ip address
shutdown
negotiation auto
!
interface Vlan1
no ip address
shutdown
!
router ospf 10
router-id 192.168.4.198
network 192.168.0.0 0.0.0.255 area 0
network 192.168.1.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 0
network 192.168.3.0 0.0.0.255 area 0
network 192.168.4.0 0.0.0.127 area 0
network 192.168.4.198 0.0.0.0 area 0
!
ip nat inside source list MY_LAN interface GigabitEthernet0/0/0 overload
ip forward-protocol nd
no ip http server
no ip http secure-server
ip tftp source-interface Loopback0
ip route profile
ip ssh time-out 60
ip ssh source-interface Loopback0
ip ssh version 2
!
!
ip access-list standard MY_LAN
permit 192.168.0.0 0.0.0.255
!
ip access-list extended MY_WAN
permit tcp any any
deny tcp any any
permit ip any any
!
logging history size 20
logging source-interface Loopback0
!
!
!
!
!
control-plane
!
!
line con 0
exec-timeout 0 0
logout-warning 60
stopbits 1
line aux 0
no exec
stopbits 1
line vty 0
exec-timeout 0 0
logging synchronous
transport input telnet ssh
line vty 1 4
exec-timeout 9 0
logging synchronous
transport input telnet ssh
!
!
end
Layer 2 SG-300-52p:
v1.4.7.5 / R800_NIK_1_4_194_194
CLI v1.0
set system mode switch
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0
!
vlan database
vlan 2-6
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
hostname MasterControlSW
line console
exec-timeout 0
exit
line ssh
exec-timeout 0
exit
line telnet
exec-timeout 5
exit
username ITLEAdmin password encrypted 05f3d5d2e34aa1fbcb96de4f40309ddcd6687979 privilege 15
ip http timeout-policy 0
clock timezone " " 0 minutes 0
!
interface vlan 2
name Evertz
ip address 192.168.0.5 255.255.255.0
no ip address dhcp
!
interface vlan 3
name Dante
!
interface vlan 4
name Broadcast
!
interface vlan 5
name Business
!
interface vlan 6
name Management
!
interface gigabitethernet1
switchport mode access
switchport access vlan 2
!
interface gigabitethernet2
switchport trunk allowed vlan add 3-6
switchport trunk native vlan 2
!
interface gigabitethernet3
switchport trunk native vlan 2
!
interface gigabitethernet4
switchport mode access
switchport access vlan 2
!
interface gigabitethernet5
switchport mode access
switchport access vlan 2
!
interface gigabitethernet6
switchport trunk native vlan 2
!
interface gigabitethernet7
switchport mode access
switchport access vlan 2
!
interface gigabitethernet8
switchport trunk native vlan 2
!
interface gigabitethernet9
switchport mode access
switchport access vlan 2
!
interface gigabitethernet10
switchport mode access
switchport access vlan 2
!
interface gigabitethernet11
switchport mode access
switchport access vlan 2
!
interface gigabitethernet12
switchport mode access
switchport access vlan 2
!
interface gigabitethernet13
switchport mode access
switchport access vlan 2
!
interface gigabitethernet14
switchport mode access
switchport access vlan 2
!
interface gigabitethernet15
switchport mode access
switchport access vlan 2
!
interface gigabitethernet16
switchport mode access
switchport access vlan 2
!
interface gigabitethernet17
switchport mode access
switchport access vlan 2
!
interface gigabitethernet18
switchport mode access
switchport access vlan 2
!
interface gigabitethernet19
switchport mode access
switchport access vlan 2
!
interface gigabitethernet20
switchport mode access
switchport access vlan 2
!
interface gigabitethernet21
switchport mode access
switchport access vlan 2
!
interface gigabitethernet22
switchport mode access
switchport access vlan 2
!
interface gigabitethernet23
switchport mode access
switchport access vlan 2
!
interface gigabitethernet24
switchport trunk native vlan 2
!
interface gigabitethernet25
switchport trunk native vlan 2
!
interface gigabitethernet26
switchport mode access
switchport access vlan 2
!
interface gigabitethernet27
switchport mode access
switchport access vlan 2
!
interface gigabitethernet28
switchport mode access
switchport access vlan 2
!
interface gigabitethernet29
switchport mode access
switchport access vlan 2
!
interface gigabitethernet30
switchport trunk native vlan 2
!
interface gigabitethernet31
switchport mode access
switchport access vlan 2
!
interface gigabitethernet32
switchport mode access
switchport access vlan 2
!
interface gigabitethernet33
switchport mode access
switchport access vlan 2
!
interface gigabitethernet34
switchport mode access
switchport access vlan 2
!
interface gigabitethernet35
switchport mode access
switchport access vlan 2
!
interface gigabitethernet36
switchport mode access
switchport access vlan 2
!
interface gigabitethernet37
switchport mode access
switchport access vlan 2
!
interface gigabitethernet38
switchport mode access
switchport access vlan 2
!
interface gigabitethernet39
switchport mode access
switchport access vlan 2
!
interface gigabitethernet40
switchport mode access
switchport access vlan 2
!
interface gigabitethernet41
switchport mode access
switchport access vlan 2
!
interface gigabitethernet42
switchport mode access
switchport access vlan 2
!
interface gigabitethernet43
switchport mode access
switchport access vlan 2
!
interface gigabitethernet44
switchport mode access
switchport access vlan 2
!
interface gigabitethernet45
switchport mode access
switchport access vlan 2
!
interface gigabitethernet46
switchport mode access
switchport access vlan 2
!
interface gigabitethernet47
switchport mode access
switchport access vlan 2
!
interface gigabitethernet48
switchport mode access
switchport access vlan 2
!
interface gigabitethernet49
switchport trunk allowed vlan add 2
!
exit
ip default-gateway 192.168.0.1
- Labels:
-
Other Switching
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-20-2017 12:28 PM
Can you select to turn your wireless "router" into just an AP? Then it will simply bridge the traffic, and not use an extra subnet.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 07:17 AM
Yes I can but do I still use a static route to bridge traffic or will it just happen? I ask because right now some devices on my L2 main switch are able to be pinged but not controlled.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 07:50 AM
Being layer 2, it will be as though the device is plugged directly into the port that the access point plugs into. Whatever IP configuration you would need that scenario will be the same as for bridged WiFi.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 08:12 AM
Will that be a trunk or access?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 08:27 AM
I would make it an access point.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 08:44 AM
ok so when setting up that port it will be
switchport mode access
switchport access VLAN (X)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 08:47 AM
Correct.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 08:55 AM
thank you Philip
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 09:40 AM
Well that didn't work.. I have it as an AP and the port is configured. Do I need a static route as well?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 09:46 AM
Make sure you can plug a PC directly into the port and get that going first, and then add the AP back into the equation.
You only have DHCP configured for VLAN2, so you will want to be in that VLAN.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 10:07 AM
Ok I checked in its in VLAN 2 and the port does work. This is quite odd. Now the AP only has one IP right now (.229) which was the inside address. Do I need to give it the outside IP?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 10:36 AM
The only thing you need to do now is out the AP into simple bridging mode. You don't want it working as a router.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 12:17 PM
It is in AP mode but I am not pulling anything from it. I can ping the IP, thats about it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2017 12:18 PM
If everything works when you plug directly into the switch port, but doesn't when you connect to the AP on that same port then it must be the AP configuration.
What are you trying to ping and from where?
