01-25-2013 11:38 AM - edited 03-07-2019 11:18 AM
I am setting up a vm environment for a customer in my lab off site. I have two stacked 3750-x switches, a san, and threes UCS c220 M3S servers for hosts. I am trying to separate the lan traffic, san iscsi traffic, and san management traffic using vlans.
The problem is i'm unable to communicate cross vlan with my current config, which I have attached to this post. The only noteworthy things in my conifg is that the ip route 0.0.0.0 0.0.0.0 192.168.83.6 is referring to a switch stack they have on site, that I will connect this stack to using the first two trunk ports on each switch, that I do not have here in the lab. I don't want to cause any confusion in why I have things set a certain way.
I have the devices on each vlan using the ip for the respective vlan as their default gateway. With my current config I am unable to reach the management interface of my SAN on vlan100 with my laptop on vlan1.
Can anyone take a peek at my config and see if they spot what i'm missing to communicate cross vlan?
01-25-2013 01:41 PM
Hello Mit,
The stack config looks okay.
Do your clients have default-gateway assigned?
Can your ping all your clients from the this stack?
Can your clients ping the svi ip address of their assigned vlan?
res
Paul
Please don't forget to rate this post if it has been helpful.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide