cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2251
Views
3
Helpful
8
Replies

Solarwinds, SNMP, VLANS, and Edge switches

Hey guys,

I know I'm missing something very simple here, but please help me out. We just purchased SolarWinds NPM, NTA, etc. We are using SNMP to pull data from the devices.

My problem is that I cannot see any of my edge devices from SolarWinds server. The solarwinds server ip is 10.22.0.181. I can ping the solarwinds server from a client on one of these floor switches, but I cannot ping it (or any other server) from the switch itself. I also cannot ping the edge switches from the solarwinds server. I can reach the Core and Client switches just fine.

Here are the vlan and routing information, which is where I suspect the issue is. Every switch in this scenario is a Catalyst 3750.

Please let me know if you have any ideas. I suspect this is an issue with our vlan1's.

2nd Floor Switch:

interface Vlan1

ip address 10.0.1.20 255.255.255.0

!

interface Vlan44

ip address 10.44.0.38 255.255.255.0

!

interface Vlan200

ip address 10.22.0.250 255.255.255.0

!

interface Vlan220

ip address 10.22.20.2 255.255.255.0

ip helper-address 10.22.0.57

!

interface Vlan999

no ip address

!

ip default-gateway 10.22.20.1

Client Switch (connects floors to core)

interface Vlan1

ip address 10.0.1.88 255.255.255.0

!

interface Vlan5

ip address 172.16.0.12 255.255.255.0

ip helper-address 10.22.99.2

!

interface Vlan44

ip address 10.44.0.50 255.255.255.0 secondary

ip address 10.44.0.1 255.255.255.0

ip helper-address 10.22.0.58

!

interface Vlan208

description 8th floor

ip address 10.22.8.1 255.255.255.0

ip helper-address 10.22.0.58

!

interface Vlan209

description 9th floor

ip address 10.22.9.1 255.255.255.0

ip helper-address 10.22.0.58

!

interface Vlan210

description 1st floor

ip address 10.22.15.1 255.255.255.0

ip helper-address 10.22.0.58

!

interface Vlan211

description 11th floor

ip address 10.22.11.1 255.255.255.0

ip helper-address 10.22.0.58

!

interface Vlan220

description 2nd floor

ip address 10.22.20.1 255.255.255.0

ip helper-address 10.22.0.58

!

interface Vlan240

description VC VLAN

ip address 10.22.40.1 255.255.255.0

!

interface Vlan299

description Internet VLAN

ip address 10.22.99.8 255.255.255.0

!

interface Vlan389

description MPLS VLAN

ip address 10.89.0.80 255.255.255.0

!

interface Vlan999

no ip address

!

ip classless

ip route 0.0.0.0 0.0.0.0 10.22.99.1

ip route 10.22.0.0 255.255.255.0 10.22.99.1

ip route 10.23.0.0 255.255.0.0 10.89.0.1

ip route 10.24.0.0 255.255.0.0 10.89.0.1

ip route 10.25.0.0 255.255.0.0 10.89.0.1

ip route 10.26.0.0 255.255.0.0 10.89.0.1

ip route 10.27.0.0 255.255.0.0 10.89.0.1

ip route 10.28.0.0 255.255.0.0 10.89.0.1

ip route 10.29.0.0 255.255.0.0 10.89.0.1

ip route 10.30.0.0 255.255.0.0 10.89.0.1

ip route 10.37.0.0 255.255.0.0 10.22.20.230

ip route 10.55.0.0 255.255.0.0 10.89.0.1

ip route 10.89.0.0 255.255.0.0 10.89.0.1

ip http server

ip http secure-server

CORE Switch:

interface Vlan1

ip address 10.0.1.1 255.255.255.0

!

interface Vlan5

ip address 172.16.0.11 255.255.255.0

!

interface Vlan200

ip address 10.22.0.1 255.255.255.0

ip helper-address 10.22.0.58

!

interface Vlan242

ip address 10.22.42.1 255.255.255.0

ip helper-address 10.22.40.56

!

interface Vlan299

description Internet Access

ip address 10.22.99.1 255.255.255.0

!

interface Vlan300

no ip address

!

interface Vlan331

ip address 10.22.31.1 255.255.255.0

ip helper-address 10.22.0.58

!

interface Vlan999

description Internet

no ip address

!

ip default-gateway 10.22.99.2

ip classless

ip route 0.0.0.0 0.0.0.0 10.22.99.3

ip route 10.15.0.0 255.255.255.0 10.22.99.15

ip route 10.22.1.0 255.255.255.0 10.22.99.3

ip route 10.22.8.0 255.255.255.0 10.22.99.8

ip route 10.22.9.0 255.255.255.0 10.22.99.8

ip route 10.22.11.0 255.255.255.0 10.22.99.8

ip route 10.22.15.0 255.255.255.0 10.22.99.8

ip route 10.22.20.0 255.255.255.0 10.22.99.8

ip route 10.22.40.0 255.255.255.0 10.22.99.8

ip route 10.23.0.0 255.255.0.0 10.22.99.5

ip route 10.24.0.0 255.255.0.0 10.22.99.5

ip route 10.24.0.0 255.255.0.0 10.22.99.2 10

ip route 10.25.0.0 255.255.0.0 10.22.99.5

ip route 10.25.0.0 255.255.0.0 10.22.99.2 10

ip route 10.26.0.0 255.255.255.0 10.22.99.5

ip route 10.26.32.0 255.255.255.0 10.22.99.89

ip route 10.27.0.0 255.255.0.0 10.22.99.8

ip route 10.28.0.0 255.255.0.0 10.22.99.5

ip route 10.29.0.0 255.255.0.0 10.22.99.5

ip route 10.29.32.0 255.255.255.0 10.22.99.89

ip route 10.30.0.0 255.255.0.0 10.22.99.8

ip route 10.37.0.0 255.255.0.0 10.22.20.1

ip route 10.44.0.0 255.255.255.0 10.22.99.8

ip route 10.55.0.0 255.255.0.0 10.22.99.89

ip route 10.89.0.0 255.255.0.0 10.22.99.89

ip http server

ip http secure-server

!

Thanks in advance for your help. I know I'm going to hit myself once I am pointed in the right direction.

Jonathan Beardsley CCNA Voice; MCITP Telecom & Network Administrator DECOSIMO
8 Replies 8

HI There,

on the client switch it is missing the Solar Wind server vlan. I don't get why you are using the ip default-gateway command. If you enabled ip routing you should not use it. BTW implement a dynamic routing protocol or you will get lost in all these static routing!!!

Please share (if you can) the trunk interface configuration(uplinks) and verify the vlan database.

Alessio

Yeah, no kidding about the routing protocols. I was the Telecom Admin here, and when I got certified they promoted me out of the help desk and gave me the network. I'm still getting my head around our network here.

I added the server vlan to the client switch, thinking the same thing. blocked all traffic through the client switch from seeing the server vlan completely. Glad I added it back within 20 seconds!!!

CLIENT:

chaclt01#sh vlan

VLAN Name                             Status    Ports

---- -------------------------------- --------- -------------------------------

1    default                          active    Gi1/0/8

2    VLAN0002                         active

5    VLAN0005                         active    Gi1/0/12, Gi1/0/23

6    Management                       active

44   VOICE                            active    Gi1/0/19

200  Server_Vlan                      active

201  VLAN0201                         active

202  DMZ                              active

208  8th_Floor                        active    Gi1/0/16

209  VLAN0209                         active

210  1st_Floor                        active    Gi1/0/15

211  11th_Floor                       active

212  11thFloor_Secure_VLAN            active

213  VLAN0213                         active

215  VLAN0215                         active

220  VLAN0220                         active    Gi1/0/5, Gi1/0/6, Gi1/0/7, Gi1/0/9, Gi1/0/11, Gi1/0/13, Gi1/0/14, Gi1/0/17, Gi1/0/18, Gi1/0/21, Gi1/0/22, Gi1/0/24

222  VLAN0222                         active

223  VLAN0223                         active

229  VLAN0229                         active

240  10th_Street_Capital              active

242  10th_Steet_Clients               active

250  InternetAccessOnly               active

290  VLAN0290                         active

299  Internet_Access                  active    Gi1/0/1, Gi1/0/10

389  VLAN0389                         active    Gi1/0/2

999  Internet_NoIP                    active    Gi1/0/20

1002 fddi-default                     act/unsup

1003 trcrf-default                    act/unsup

1004 fddinet-default                  act/unsup

1005 trbrf-default                    act/unsup

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------

1    enet  100001     1500  -      -      -        -    -        0      0

2    enet  100002     1500  -      -      -        -    -        0      0

5    enet  100005     1500  -      -      -        -    -        0      0

6    enet  100006     1500  -      -      -        -    -        0      0

44   enet  100044     1500  -      -      -        -    -        0      0

200  enet  100200     1500  -      -      -        -    -        0      0

201  enet  100201     1500  -      -      -        -    -        0      0

202  enet  100202     1500  -      -      -        -    -        0      0

208  enet  100208     1500  -      -      -        -    -        0      0

209  enet  100209     1500  -      -      -        -    -        0      0

210  enet  100210     1500  -      -      -        -    -        0      0

211  enet  100211     1500  -      -      -        -    -        0      0

212  enet  100212     1500  -      -      -        -    -        0      0

213  enet  100213     1500  -      -      -        -    -        0      0

215  enet  100215     1500  -      -      -        -    -        0      0

220  enet  100220     1500  -      -      -        -    -        0      0

222  enet  100222     1500  -      -      -        -    -        0      0

223  enet  100223     1500  -      -      -        -    -        0      0

229  enet  100229     1500  -      -      -        -    -        0      0

240  enet  100240     1500  -      -      -        -    -        0      0

242  enet  100242     1500  -      -      -        -    -        0      0

250  enet  100250     1500  -      -      -        -    -        0      0

290  enet  100290     1500  -      -      -        -    -        0      0

299  enet  100299     1500  -      -      -        -    -        0      0

389  enet  100389     1500  -      -      -        -    -        0      0

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------

999  enet  100999     1500  -      -      -        -    -        0      0

1002 fddi  101002     1500  -      -      -        -    -        0      0

1003 trcrf 101003     4472  1005   3276   -        -    srb      0      0

1004 fdnet 101004     1500  -      -      -        ieee -        0      0

1005 trbrf 101005     4472  -      -      15       ibm  -        0      0

VLAN AREHops STEHops Backup CRF

---- ------- ------- ----------

1003 7       7       off

Remote SPAN VLANs

------------------------------------------------------------------------------

Primary Secondary Type              Ports

------- --------- ----------------- ------------------------------------------

chaclt01#

interface GigabitEthernet1/0/3

description CNCT to chaswt0201 1/0/24

switchport trunk encapsulation dot1q

switchport mode trunk

2nd Floor Switch:

chaswt0201#sh vlan

VLAN Name                             Status    Ports

---- -------------------------------- --------- -------------------------------

1    default                          active    Gi1/0/1, Gi1/0/2

2    VLAN0002                         active

5    VLAN0005                         active

6    Management                       active

44   VOICE                            active    Fa1/0/1, Fa1/0/2, Fa1/0/3

                                                Fa1/0/4, Fa1/0/6, Fa1/0/7

                                                Fa1/0/8, Fa1/0/10, Fa1/0/11

                                                Fa1/0/13, Fa1/0/14, Fa1/0/15

                                                Fa1/0/17, Fa1/0/18, Fa1/0/19

                                                Fa1/0/21, Fa1/0/22, Fa1/0/23

200  Server_Vlan                      active    Fa1/0/21

201  VLAN0201                         active

202  DMZ                              active

208  8th_Floor                        active

209  VLAN0209                         active    Fa1/0/16

210  1st_Floor                        active

211  11th_Floor                       active

212  11thFloor_Secure_VLAN            active

213  VLAN0213                         active

215  VLAN0215                         active

VLAN Name                             Status    Ports

---- -------------------------------- --------- -------------------------------

220  VLAN0220                         active    Fa1/0/1, Fa1/0/2, Fa1/0/3, Fa1/0/4, Fa1/0/6, Fa1/0/7, Fa1/0/8, Fa1/0/9, Fa1/0/10, Fa1/0/11, Fa1/0/12, Fa1/0/13, Fa1/0/14, Fa1/0/15, Fa1/0/17, Fa1/0/18

                                                Fa1/0/19, Fa1/0/22, Fa1/0/23

222  VLAN0222                         active

223  VLAN0223                         active

229  VLAN0229                         active

240  10th_Street_Capital              active

242  10th_Steet_Clients               active

250  InternetAccessOnly               active

290  VLAN0290                         active

299  Internet_Access                  active

389  VLAN0389                         active

999  Internet_NoIP                    active

1002 fddi-default                     act/unsup

1003 trcrf-default                    act/unsup

1004 fddinet-default                  act/unsup

1005 trbrf-default                    act/unsup

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------

1    enet  100001     1500  -      -      -        -    -        0      0

2    enet  100002     1500  -      -      -        -    -        0      0

5    enet  100005     1500  -      -      -        -    -        0      0

6    enet  100006     1500  -      -      -        -    -        0      0

44   enet  100044     1500  -      -      -        -    -        0      0

200  enet  100200     1500  -      -      -        -    -        0      0

201  enet  100201     1500  -      -      -        -    -        0      0

202  enet  100202     1500  -      -      -        -    -        0      0

208  enet  100208     1500  -      -      -        -    -        0      0

209  enet  100209     1500  -      -      -        -    -        0      0

210  enet  100210     1500  -      -      -        -    -        0      0

211  enet  100211     1500  -      -      -        -    -        0      0

212  enet  100212     1500  -      -      -        -    -        0      0

213  enet  100213     1500  -      -      -        -    -        0      0

215  enet  100215     1500  -      -      -        -    -        0      0

220  enet  100220     1500  -      -      -        -    -        0      0

222  enet  100222     1500  -      -      -        -    -        0      0

223  enet  100223     1500  -      -      -        -    -        0      0

229  enet  100229     1500  -      -      -        -    -        0      0

240  enet  100240     1500  -      -      -        -    -        0      0

242  enet  100242     1500  -      -      -        -    -        0      0

250  enet  100250     1500  -      -      -        -    -        0      0

290  enet  100290     1500  -      -      -        -    -        0      0

299  enet  100299     1500  -      -      -        -    -        0      0

389  enet  100389     1500  -      -      -        -    -        0      0

999  enet  100999     1500  -      -      -        -    -        0      0

1002 fddi  101002     1500  -      -      -        -    -        0      0

1003 trcrf 101003     4472  1005   3276   -        -    srb      0      0

1004 fdnet 101004     1500  -      -      -        ieee -        0      0

1005 trbrf 101005     4472  -      -      15       ibm  -        0      0

VLAN AREHops STEHops Backup CRF

---- ------- ------- ----------

1003 0       0       off

Remote SPAN VLANs

------------------------------------------------------------------------------

Primary Secondary Type              Ports

------- --------- ----------------- ------------------------------------------

chaswt0201#

interface FastEthernet1/0/24

description Connection to chaclt01 1/0/2

switchport trunk encapsulation dot1q

switchport mode trunk

Thanks. Let me know what else you need to assist me.

Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO

Jonathan Beardsley CCNA Voice; MCITP Telecom & Network Administrator DECOSIMO

HI Jon,

from the output it seems you are using VTP..

show vtp status to verify

Check this out because you need to implement only the vlan you need on each floor to avoid to extend your spanning-tree calculations and not desired effects!!

I believe you did not change any of those from the VTP server mode...

On each trunk side disable the DTP negotiation with the interface command:

switchport nonegotiate

on both sides of all your trunks. Then something else.. is ip routing in your config?

what is telling show ip route ?

Alessio

I disabled the DTP negotiation.

I have not changed any vtp configurations on any of the switches here since I took over the network. Here are the info you requested:

chaclt01#sh vtp status

VTP Version                     : running VTP2

Configuration Revision          : 60

Maximum VLANs supported locally : 1005

Number of existing VLANs        : 30

VTP Operating Mode              : Server

VTP Domain Name                 : cisco

VTP Pruning Mode                : Disabled

VTP V2 Mode                     : Enabled

VTP Traps Generation            : Disabled

MD5 digest                      : 0x9B 0x85 0x89 0x9A 0x90 0xB9 0x4C 0xFA

Configuration last modified by 10.0.1.88 at 8-26-95 15:24:43

Local updater ID is 10.0.1.88 on interface Vl1 (lowest numbered VLAN interface found)

chaclt01#

chaswt0201#sh vtp stat

VTP Version                     : 2

Configuration Revision          : 60

Maximum VLANs supported locally : 1005

Number of existing VLANs        : 30

VTP Operating Mode              : Server

VTP Domain Name                 : cisco

VTP Pruning Mode                : Disabled

VTP V2 Mode                     : Enabled

VTP Traps Generation            : Enabled

MD5 digest                      : 0x9B 0x85 0x89 0x9A 0x90 0xB9 0x4C 0xFA

Configuration last modified by 10.0.1.88 at 8-26-95 15:24:43

Local updater ID is 10.0.1.20 on interface Vl1 (lowest numbered VLAN interface found)

chaswt0201#

here is the sh ip route from client:

chaclt01#sh ip route

Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP

       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

       E1 - OSPF external type 1, E2 - OSPF external type 2

       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2

       ia - IS-IS inter area, * - candidate default, U - per-user static route

       o - ODR, P - periodic downloaded static route

Gateway of last resort is 10.22.99.1 to network 0.0.0.0

     172.16.0.0/24 is subnetted, 1 subnets

C       172.16.0.0 is directly connected, Vlan5

     10.0.0.0/8 is variably subnetted, 22 subnets, 2 masks

C       10.22.20.0/24 is directly connected, Vlan220

C       10.0.1.0/24 is directly connected, Vlan1

S       10.26.0.0/16 [1/0] via 10.89.0.1

S       10.27.0.0/16 [1/0] via 10.89.0.1

S       10.24.0.0/16 [1/0] via 10.89.0.1

S       10.25.0.0/16 [1/0] via 10.89.0.1

C       10.22.15.0/24 is directly connected, Vlan210

S       10.30.0.0/16 [1/0] via 10.89.0.1

C       10.22.8.0/24 is directly connected, Vlan208

C       10.22.9.0/24 is directly connected, Vlan209

S       10.28.0.0/16 [1/0] via 10.89.0.1

S       10.29.0.0/16 [1/0] via 10.89.0.1

C       10.22.11.0/24 is directly connected, Vlan211

S       10.22.0.0/24 [1/0] via 10.22.99.1

S       10.23.0.0/16 [1/0] via 10.89.0.1

C       10.44.0.0/24 is directly connected, Vlan44

S       10.37.0.0/16 [1/0] via 10.22.20.230

C       10.22.40.0/24 is directly connected, Vlan240

S       10.55.0.0/16 [1/0] via 10.89.0.1

C       10.89.0.0/24 is directly connected, Vlan389

S       10.89.0.0/16 [1/0] via 10.89.0.1

C       10.22.99.0/24 is directly connected, Vlan299

S*   0.0.0.0/0 [1/0] via 10.22.99.1

chaclt01#

And now from 2nd floor:

chaswt0201#sh ip route

Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP

       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

       E1 - OSPF external type 1, E2 - OSPF external type 2

       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2

       ia - IS-IS inter area, * - candidate default, U - per-user static route

       o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

     10.0.0.0/24 is subnetted, 4 subnets

C       10.22.20.0 is directly connected, Vlan220

C       10.0.1.0 is directly connected, Vlan1

C       10.22.0.0 is directly connected, Vlan200

C       10.44.0.0 is directly connected, Vlan44

chaswt0201#

Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO

Jonathan Beardsley CCNA Voice; MCITP Telecom & Network Administrator DECOSIMO

OK, a little more information....

I can ping Solarwinds from the client switch

I can ping the 2nd floor switch vlan1 (10.0.1.20) from client switch

I can NOT ping the CORE vlan1 (10.0.1.1) from client switch

I can ping solarwinds from CORE

I can NOT ping 2nd floor switch vlan1 from CORE

I can NOT ping Client switch vlan1 from CORE

I can ping Client switch vlan1 from 2nd floor

I can NOT ping CORE vlan1 from 2nd floor

I can NOT ping Solarwinds from 2nd floor

all is same for other floor switches.Problem is getting from client to CORE on vlan1. Not sure how to fix, as vlan1 seems to be configured correctly on all. very strange to me. As I understand it, when I ping directly from the switch, it uses the native vlan (vlan1) to get to the layer 3 device for routing to the destination. In this case, both Client and CORE are layer 3 devices.

Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO

Jonathan Beardsley CCNA Voice; MCITP Telecom & Network Administrator DECOSIMO

HI Jon,

listen, verify the intervlan-routing because if the network are not transporting info from one place to another one via routing your infrastructure will not work in any case. Is ip routing in your configuration? From your descriptions it seems that part of your network is doing layer 3 communications and part is layer 2 only or even broadcast out packets.

1) Check the routing table : show ip route

2) Check the VTP status: show vtp status

3) Check by CDP which neighbours can be seen : show cdp nei and show cdp nei det

4) You tell the main issue is on vlan 1. Are the vlan allowed over the trunks?

5) If you do not want to use VTP:

vlan data

vtp mode trans

exit

wr

!

6) if you do not want to use VTP and you set it transparent, remove all the unnecessary vlans to reduce the spanning-tree instances and the reconvergence time.

7) Check the allowed vlans across your trunks

Let me know

Alessio

PS: in few mins i am going because here is nearly 3 am!!!

Thank you for your help. I'll read through this and respond. Get some rest. Getting late here too.

Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO

Jonathan Beardsley CCNA Voice; MCITP Telecom & Network Administrator DECOSIMO

1.) sh ip routes for both client and 2nd floor are listed above in my previous post. here is the sh ip route in core

chaswtcore#sh ip route

Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP

       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area

       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

       E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP

       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2

       ia - IS-IS inter area, * - candidate default, U - per-user static route

       o - ODR, P - periodic downloaded static route

Gateway of last resort is 10.22.99.3 to network 0.0.0.0

     172.16.0.0/24 is subnetted, 1 subnets

C       172.16.0.0 is directly connected, Vlan5

     10.0.0.0/8 is variably subnetted, 27 subnets, 2 masks

C       10.22.31.0/24 is directly connected, Vlan331

S       10.15.0.0/24 [1/0] via 10.22.99.15

S       10.22.20.0/24 [1/0] via 10.22.99.8

C       10.0.1.0/24 is directly connected, Vlan1

S       10.26.0.0/24 [1/0] via 10.22.99.5

S       10.27.0.0/16 [1/0] via 10.22.99.8

S       10.24.0.0/16 [1/0] via 10.22.99.5

S       10.25.0.0/16 [1/0] via 10.22.99.5

S       10.22.15.0/24 [1/0] via 10.22.99.8

S       10.30.0.0/16 [1/0] via 10.22.99.8

S       10.22.8.0/24 [1/0] via 10.22.99.8

S       10.22.9.0/24 [1/0] via 10.22.99.8

S       10.28.0.0/16 [1/0] via 10.22.99.5

S       10.29.0.0/16 [1/0] via 10.22.99.5

S       10.22.11.0/24 [1/0] via 10.22.99.8

C       10.22.0.0/24 is directly connected, Vlan200

S       10.23.0.0/16 [1/0] via 10.22.99.5

S       10.22.1.0/24 [1/0] via 10.22.99.3

S       10.44.0.0/24 [1/0] via 10.22.99.8

S       10.37.0.0/16 [1/0] via 10.22.20.1

S       10.26.32.0/24 [1/0] via 10.22.99.89

S       10.22.40.0/24 [1/0] via 10.22.99.8

C       10.22.42.0/24 is directly connected, Vlan242

S       10.29.32.0/24 [1/0] via 10.22.99.89

S       10.55.0.0/16 [1/0] via 10.22.99.89

S       10.89.0.0/16 [1/0] via 10.22.99.89

C       10.22.99.0/24 is directly connected, Vlan299

S*   0.0.0.0/0 [1/0] via 10.22.99.3

chaswtcore#

2.)  we configure our vlans manually on each switch. I understand that  typically we would configure neighbor switches in transparent mode.  Still, I'm unclear that this could be the issue. I'm reluctant to go  around changing too much in our production infrastructure. None of these  switches were configured for vtp, so they are in their default mode of  Server.

3.)

chaswtcore#sh cdp nei

Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

                  S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone

Device ID            Local Intrfce         Holdtme   Capability    Platform   Port ID

dirswt02            Gig 3/0/1             177           R S I     WS-C3560G-Gig 0/2

chaswt389           Gig 1/0/4             153           R S I     WS-C3750G-Gig 2/0/1

chaclt01.decosimo.com

                    Gig 1/0/1             161           R S I     WS-C3750G-Gig 1/0/1

chaswtcore#

As  you can see below, the client switch can see all of our edge switches  that are directly connected. chaswtXXYY, where XX = floor number, and YY  = switch identifier per floor we have floors 1, 2, 8, 9, and 11 in this  building.

chaclt01#sh cdp nei

Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

                  S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID

chaswtcore       Gig 1/0/1         167          R S I     WS-C3750G Gig 1/0/1

chaswt0901       Gig 1/0/27        179           S I      WS-C3750- Gig 1/0/1

chaswt0801       Gig 1/0/28        120           S I      WS-C3750- Gig 1/0/1

chaswt1101       Gig 1/0/26        156           S I      WS-C3750- Gig 4/0/1

chaswt389        Gig 1/0/2         172          R S I     WS-C3750G Gig 2/0/4

SEP001FCAE7BCF4  Gig 1/0/13        167            H       ATA 186   Port 1

chaswt0101.Decosimo.com

                 Gig 1/0/25        121          R S I     WS-C3750- Gig 1/0/2

chaswt02TR.decosimo.com

                 Gig 1/0/4         121           S I      WS-C3750- Fas 1/0/24

chaswt0201.decosimo.com

                 Gig 1/0/3         178          R S I     WS-C3750- Fas 1/0/24

chaclt01#

chaswt0201#sh cdp nei

Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

                  S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID

chawlc01         Fas 1/0/9         169            H       AIR-WLC21 Fastethernet0/0/1

SEP001FCAEA3AB7  Fas 1/0/11        148           H P      IP Phone  Port 1

SEP001FCAEA4D2B  Fas 1/0/13        176           H P      IP Phone  Port 1

SEP002290042D04  Fas 1/0/7         162           H P      IP Phone  Port 1

LABswt01         Fas 1/0/5         135           S I      WS-C3750- Fas 2/0/1

SEP00229003C563  Fas 1/0/8         139           H P      IP Phone  Port 1

SEP002290050419  Fas 1/0/23        137           H P      IP Phone  Port 1

SEP001FCAEA4D10  Fas 1/0/4         160           H P      IP Phone  Port 1

SEP0023331B592B  Fas 1/0/1         154           H P      IP Phone  Port 1

chaclt01.decosimo.com

                 Fas 1/0/24        157          R S I     WS-C3750G Gig 1/0/3

chaswtmkt        Fas 1/0/20        141          R S I     WS-C3560- Gig 0/1

chaswt0201#

4.)  The connections between client and floor switches are all trunks. The  connection between CORE and CLIENT switches are access ports. Does this  help? All vlans should be going over the trunks. It seems to me that  this has something to do with it. I believe these are access ports in an  effort to restrict LAN traffic from hitting the WAN VLAN on the WAN  switch......? I'm still getting my head around our strange setup  here....

7.)I added vlan1 just to be sure. no help.

Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO

Jonathan Beardsley CCNA Voice; MCITP Telecom & Network Administrator DECOSIMO
Review Cisco Networking products for a $25 gift card