04-29-2024 01:03 AM
suppose i have a Mikrotik ROS as main Router and also as CAPsMAN to manage my Mikrotik cAP's that connected to my network cisco switches.
i had Cisco SF300 24P 10/100Mbs but based on my network considerations, i decided to upgrade them to higher speed switches and replaced them with Cisco catalyst 2960X 24PSL.
unfortunately from that time my Mikrotik cAPs can not connect to their CapsMAN, but they were working on Cisco SF300 switches.
also working without any issue if i connect them to my newer cisco CBS350 switches.
even shocking thing is that while they are connected to Problematic catalyst 2960x Switches i can access their IP address and login to cAP's using Winbox.
i think the problem is with my catalyst 2960X switches. but don't know how to solve this issue.
if someone has experienced the same issue, please let me know what was the solution?
thank you all.
04-29-2024 01:23 AM
Hello,
odd, as the default settings (if you are using those) of the 2960X are similar or equal to those of the newer CBS switches. Can you post the running config (sh run) of the 2960X ? Maybe we can spot something...
04-29-2024 01:57 AM - edited 04-29-2024 02:07 AM
Hello and Thank you for taking your time
here is the Running Config on Catalyst 2960X
Current configuration : 2004 bytes
!
! Last configuration change at 05:56:04 UTC Tue Mar 5 2024
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname SW-2960X-Line1
!
boot-start-marker
boot-end-marker
!
enable secret 5 ********************.
!
username <USERNAME> secret 5 ********************
no aaa new-model
switch 1 provision ws-c2960x-24ps-l
!
!
ip domain-name <DOMAIN-NAME>
!
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0
no ip address
shutdown
!
interface GigabitEthernet1/0/1
!
interface GigabitEthernet1/0/2
!
interface GigabitEthernet1/0/3
!
interface GigabitEthernet1/0/4
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet1/0/24
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface Vlan1
ip address 192.168.1.205 255.255.255.0
!
ip default-gateway 192.168.1.254
ip http server
ip http secure-server
!
!
!
no vstack
!
line con 0
logging synchronous
login local
line vty 0 4
password 7 ********************
login local
transport preferred ssh
transport input ssh
line vty 5 15
password 7 ********************
login local
transport preferred ssh
transport input ssh
!
end
The only config i set on is:
1- assigning an IP address on VLAN 1
2- enabling SSH
(nothing more)
and here is my other switch CBS350 Config:
config-file-header
SW24-CBS350
v3.0.0.69 / RCBS3.0_930_770_008
CLI v1.0
file SSD indicator encrypted
@
ssd-control-start
ssd config
ssd file passphrase control unrestricted
no ssd file integrity control
ssd-control-end
!
!
unit-type-control-start
unit-type unit 1 network gi uplink none
unit-type-control-end
!
voice vlan oui-table add 0001e3 Siemens_AG_phone
voice vlan oui-table add 00036b Cisco_phone
voice vlan oui-table add 00096e Avaya
voice vlan oui-table add 000fe2 H3C_Aolynk
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone
voice vlan oui-table add 00e075 Polycom/Veritel_phone
voice vlan oui-table add 00e0bb 3Com_phone
bonjour interface range vlan 1
hostname SW24-CBS350
line ssh
password *********************== encrypted
exit
username <USERNAME> password encrypted *********************== privilege 15
ip ssh server
ip ssh password-auth
!
interface vlan 1
ip address 192.168.1.212 255.255.255.0
no ip address dhcp
!
interface GigabitEthernet7
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet9
storm-control broadcast level 10
storm-control multicast level 10
port security max 10
port security mode max-addresses
port security discard trap 60
spanning-tree portfast
spanning-tree bpduguard enable
switchport mode trunk
switchport trunk allowed vlan 1
macro description ip_phone_desktop
!next command is internal.
macro auto smartport dynamic_type ip_phone_desktop
!
interface GigabitEthernet11
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet19
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet21
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet23
spanning-tree link-type point-to-point
switchport mode trunk
More: <space>, Quit: q or CTRL+Z, One line: <return>
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
interface GigabitEthernet24
spanning-tree link-type point-to-point
switchport mode trunk
macro description switch
!next command is internal.
macro auto smartport dynamic_type switch
!
exit
ip default-gateway 192.168.1.254
Thank you Again For your Kindness
04-29-2024 01:58 AM
- Check logs on the catalyst 2960X when traffic is intended from/to the particular device (too)
M.
04-29-2024 02:11 AM
04-29-2024 02:30 AM
- Basic examining of the logs on the is done with the command show logging , but sometimes it becomes even better in such cases to configure a syslog server on the devices as explained in https://community.cisco.com/t5/networking-knowledge-base/how-to-configure-logging-in-cisco-ios/ta-p/3132434 part D)
Keeping logs on a syslog server (too) improves overall logging management and flexible scrutinizing of possible issues (afterwards)
M.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide