07-24-2012 03:24 PM - edited 03-07-2019 07:57 AM
Hey guys,
I know I'm missing something very simple here, but please help me out. We just purchased SolarWinds NPM, NTA, etc. We are using SNMP to pull data from the devices.
My problem is that I cannot see any of my edge devices from SolarWinds server. The solarwinds server ip is 10.22.0.181. I can ping the solarwinds server from a client on one of these floor switches, but I cannot ping it (or any other server) from the switch itself. I also cannot ping the edge switches from the solarwinds server. I can reach the Core and Client switches just fine.
Here are the vlan and routing information, which is where I suspect the issue is. Every switch in this scenario is a Catalyst 3750.
Please let me know if you have any ideas. I suspect this is an issue with our vlan1's.
2nd Floor Switch:
interface Vlan1
ip address 10.0.1.20 255.255.255.0
!
interface Vlan44
ip address 10.44.0.38 255.255.255.0
!
interface Vlan200
ip address 10.22.0.250 255.255.255.0
!
interface Vlan220
ip address 10.22.20.2 255.255.255.0
ip helper-address 10.22.0.57
!
interface Vlan999
no ip address
!
ip default-gateway 10.22.20.1
Client Switch (connects floors to core)
interface Vlan1
ip address 10.0.1.88 255.255.255.0
!
interface Vlan5
ip address 172.16.0.12 255.255.255.0
ip helper-address 10.22.99.2
!
interface Vlan44
ip address 10.44.0.50 255.255.255.0 secondary
ip address 10.44.0.1 255.255.255.0
ip helper-address 10.22.0.58
!
interface Vlan208
description 8th floor
ip address 10.22.8.1 255.255.255.0
ip helper-address 10.22.0.58
!
interface Vlan209
description 9th floor
ip address 10.22.9.1 255.255.255.0
ip helper-address 10.22.0.58
!
interface Vlan210
description 1st floor
ip address 10.22.15.1 255.255.255.0
ip helper-address 10.22.0.58
!
interface Vlan211
description 11th floor
ip address 10.22.11.1 255.255.255.0
ip helper-address 10.22.0.58
!
interface Vlan220
description 2nd floor
ip address 10.22.20.1 255.255.255.0
ip helper-address 10.22.0.58
!
interface Vlan240
description VC VLAN
ip address 10.22.40.1 255.255.255.0
!
interface Vlan299
description Internet VLAN
ip address 10.22.99.8 255.255.255.0
!
interface Vlan389
description MPLS VLAN
ip address 10.89.0.80 255.255.255.0
!
interface Vlan999
no ip address
!
ip classless
ip route 0.0.0.0 0.0.0.0 10.22.99.1
ip route 10.22.0.0 255.255.255.0 10.22.99.1
ip route 10.23.0.0 255.255.0.0 10.89.0.1
ip route 10.24.0.0 255.255.0.0 10.89.0.1
ip route 10.25.0.0 255.255.0.0 10.89.0.1
ip route 10.26.0.0 255.255.0.0 10.89.0.1
ip route 10.27.0.0 255.255.0.0 10.89.0.1
ip route 10.28.0.0 255.255.0.0 10.89.0.1
ip route 10.29.0.0 255.255.0.0 10.89.0.1
ip route 10.30.0.0 255.255.0.0 10.89.0.1
ip route 10.37.0.0 255.255.0.0 10.22.20.230
ip route 10.55.0.0 255.255.0.0 10.89.0.1
ip route 10.89.0.0 255.255.0.0 10.89.0.1
ip http server
ip http secure-server
CORE Switch:
interface Vlan1
ip address 10.0.1.1 255.255.255.0
!
interface Vlan5
ip address 172.16.0.11 255.255.255.0
!
interface Vlan200
ip address 10.22.0.1 255.255.255.0
ip helper-address 10.22.0.58
!
interface Vlan242
ip address 10.22.42.1 255.255.255.0
ip helper-address 10.22.40.56
!
interface Vlan299
description Internet Access
ip address 10.22.99.1 255.255.255.0
!
interface Vlan300
no ip address
!
interface Vlan331
ip address 10.22.31.1 255.255.255.0
ip helper-address 10.22.0.58
!
interface Vlan999
description Internet
no ip address
!
ip default-gateway 10.22.99.2
ip classless
ip route 0.0.0.0 0.0.0.0 10.22.99.3
ip route 10.15.0.0 255.255.255.0 10.22.99.15
ip route 10.22.1.0 255.255.255.0 10.22.99.3
ip route 10.22.8.0 255.255.255.0 10.22.99.8
ip route 10.22.9.0 255.255.255.0 10.22.99.8
ip route 10.22.11.0 255.255.255.0 10.22.99.8
ip route 10.22.15.0 255.255.255.0 10.22.99.8
ip route 10.22.20.0 255.255.255.0 10.22.99.8
ip route 10.22.40.0 255.255.255.0 10.22.99.8
ip route 10.23.0.0 255.255.0.0 10.22.99.5
ip route 10.24.0.0 255.255.0.0 10.22.99.5
ip route 10.24.0.0 255.255.0.0 10.22.99.2 10
ip route 10.25.0.0 255.255.0.0 10.22.99.5
ip route 10.25.0.0 255.255.0.0 10.22.99.2 10
ip route 10.26.0.0 255.255.255.0 10.22.99.5
ip route 10.26.32.0 255.255.255.0 10.22.99.89
ip route 10.27.0.0 255.255.0.0 10.22.99.8
ip route 10.28.0.0 255.255.0.0 10.22.99.5
ip route 10.29.0.0 255.255.0.0 10.22.99.5
ip route 10.29.32.0 255.255.255.0 10.22.99.89
ip route 10.30.0.0 255.255.0.0 10.22.99.8
ip route 10.37.0.0 255.255.0.0 10.22.20.1
ip route 10.44.0.0 255.255.255.0 10.22.99.8
ip route 10.55.0.0 255.255.0.0 10.22.99.89
ip route 10.89.0.0 255.255.0.0 10.22.99.89
ip http server
ip http secure-server
!
Thanks in advance for your help. I know I'm going to hit myself once I am pointed in the right direction.
07-24-2012 04:44 PM
HI There,
on the client switch it is missing the Solar Wind server vlan. I don't get why you are using the ip default-gateway command. If you enabled ip routing you should not use it. BTW implement a dynamic routing protocol or you will get lost in all these static routing!!!
Please share (if you can) the trunk interface configuration(uplinks) and verify the vlan database.
Alessio
07-24-2012 05:30 PM
Yeah, no kidding about the routing protocols. I was the Telecom Admin here, and when I got certified they promoted me out of the help desk and gave me the network. I'm still getting my head around our network here.
I added the server vlan to the client switch, thinking the same thing. blocked all traffic through the client switch from seeing the server vlan completely. Glad I added it back within 20 seconds!!!
CLIENT:
chaclt01#sh vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Gi1/0/8
2 VLAN0002 active
5 VLAN0005 active Gi1/0/12, Gi1/0/23
6 Management active
44 VOICE active Gi1/0/19
200 Server_Vlan active
201 VLAN0201 active
202 DMZ active
208 8th_Floor active Gi1/0/16
209 VLAN0209 active
210 1st_Floor active Gi1/0/15
211 11th_Floor active
212 11thFloor_Secure_VLAN active
213 VLAN0213 active
215 VLAN0215 active
220 VLAN0220 active Gi1/0/5, Gi1/0/6, Gi1/0/7, Gi1/0/9, Gi1/0/11, Gi1/0/13, Gi1/0/14, Gi1/0/17, Gi1/0/18, Gi1/0/21, Gi1/0/22, Gi1/0/24
222 VLAN0222 active
223 VLAN0223 active
229 VLAN0229 active
240 10th_Street_Capital active
242 10th_Steet_Clients active
250 InternetAccessOnly active
290 VLAN0290 active
299 Internet_Access active Gi1/0/1, Gi1/0/10
389 VLAN0389 active Gi1/0/2
999 Internet_NoIP active Gi1/0/20
1002 fddi-default act/unsup
1003 trcrf-default act/unsup
1004 fddinet-default act/unsup
1005 trbrf-default act/unsup
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
2 enet 100002 1500 - - - - - 0 0
5 enet 100005 1500 - - - - - 0 0
6 enet 100006 1500 - - - - - 0 0
44 enet 100044 1500 - - - - - 0 0
200 enet 100200 1500 - - - - - 0 0
201 enet 100201 1500 - - - - - 0 0
202 enet 100202 1500 - - - - - 0 0
208 enet 100208 1500 - - - - - 0 0
209 enet 100209 1500 - - - - - 0 0
210 enet 100210 1500 - - - - - 0 0
211 enet 100211 1500 - - - - - 0 0
212 enet 100212 1500 - - - - - 0 0
213 enet 100213 1500 - - - - - 0 0
215 enet 100215 1500 - - - - - 0 0
220 enet 100220 1500 - - - - - 0 0
222 enet 100222 1500 - - - - - 0 0
223 enet 100223 1500 - - - - - 0 0
229 enet 100229 1500 - - - - - 0 0
240 enet 100240 1500 - - - - - 0 0
242 enet 100242 1500 - - - - - 0 0
250 enet 100250 1500 - - - - - 0 0
290 enet 100290 1500 - - - - - 0 0
299 enet 100299 1500 - - - - - 0 0
389 enet 100389 1500 - - - - - 0 0
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
999 enet 100999 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 trcrf 101003 4472 1005 3276 - - srb 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trbrf 101005 4472 - - 15 ibm - 0 0
VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
1003 7 7 off
Remote SPAN VLANs
------------------------------------------------------------------------------
Primary Secondary Type Ports
------- --------- ----------------- ------------------------------------------
chaclt01#
interface GigabitEthernet1/0/3
description CNCT to chaswt0201 1/0/24
switchport trunk encapsulation dot1q
switchport mode trunk
2nd Floor Switch:
chaswt0201#sh vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Gi1/0/1, Gi1/0/2
2 VLAN0002 active
5 VLAN0005 active
6 Management active
44 VOICE active Fa1/0/1, Fa1/0/2, Fa1/0/3
Fa1/0/4, Fa1/0/6, Fa1/0/7
Fa1/0/8, Fa1/0/10, Fa1/0/11
Fa1/0/13, Fa1/0/14, Fa1/0/15
Fa1/0/17, Fa1/0/18, Fa1/0/19
Fa1/0/21, Fa1/0/22, Fa1/0/23
200 Server_Vlan active Fa1/0/21
201 VLAN0201 active
202 DMZ active
208 8th_Floor active
209 VLAN0209 active Fa1/0/16
210 1st_Floor active
211 11th_Floor active
212 11thFloor_Secure_VLAN active
213 VLAN0213 active
215 VLAN0215 active
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
220 VLAN0220 active Fa1/0/1, Fa1/0/2, Fa1/0/3, Fa1/0/4, Fa1/0/6, Fa1/0/7, Fa1/0/8, Fa1/0/9, Fa1/0/10, Fa1/0/11, Fa1/0/12, Fa1/0/13, Fa1/0/14, Fa1/0/15, Fa1/0/17, Fa1/0/18
Fa1/0/19, Fa1/0/22, Fa1/0/23
222 VLAN0222 active
223 VLAN0223 active
229 VLAN0229 active
240 10th_Street_Capital active
242 10th_Steet_Clients active
250 InternetAccessOnly active
290 VLAN0290 active
299 Internet_Access active
389 VLAN0389 active
999 Internet_NoIP active
1002 fddi-default act/unsup
1003 trcrf-default act/unsup
1004 fddinet-default act/unsup
1005 trbrf-default act/unsup
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
2 enet 100002 1500 - - - - - 0 0
5 enet 100005 1500 - - - - - 0 0
6 enet 100006 1500 - - - - - 0 0
44 enet 100044 1500 - - - - - 0 0
200 enet 100200 1500 - - - - - 0 0
201 enet 100201 1500 - - - - - 0 0
202 enet 100202 1500 - - - - - 0 0
208 enet 100208 1500 - - - - - 0 0
209 enet 100209 1500 - - - - - 0 0
210 enet 100210 1500 - - - - - 0 0
211 enet 100211 1500 - - - - - 0 0
212 enet 100212 1500 - - - - - 0 0
213 enet 100213 1500 - - - - - 0 0
215 enet 100215 1500 - - - - - 0 0
220 enet 100220 1500 - - - - - 0 0
222 enet 100222 1500 - - - - - 0 0
223 enet 100223 1500 - - - - - 0 0
229 enet 100229 1500 - - - - - 0 0
240 enet 100240 1500 - - - - - 0 0
242 enet 100242 1500 - - - - - 0 0
250 enet 100250 1500 - - - - - 0 0
290 enet 100290 1500 - - - - - 0 0
299 enet 100299 1500 - - - - - 0 0
389 enet 100389 1500 - - - - - 0 0
999 enet 100999 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 trcrf 101003 4472 1005 3276 - - srb 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trbrf 101005 4472 - - 15 ibm - 0 0
VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
1003 0 0 off
Remote SPAN VLANs
------------------------------------------------------------------------------
Primary Secondary Type Ports
------- --------- ----------------- ------------------------------------------
chaswt0201#
interface FastEthernet1/0/24
description Connection to chaclt01 1/0/2
switchport trunk encapsulation dot1q
switchport mode trunk
Thanks. Let me know what else you need to assist me.
Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO
07-24-2012 06:11 PM
HI Jon,
from the output it seems you are using VTP..
show vtp status to verify
Check this out because you need to implement only the vlan you need on each floor to avoid to extend your spanning-tree calculations and not desired effects!!
I believe you did not change any of those from the VTP server mode...
On each trunk side disable the DTP negotiation with the interface command:
switchport nonegotiate
on both sides of all your trunks. Then something else.. is ip routing in your config?
what is telling show ip route ?
Alessio
07-24-2012 06:23 PM
I disabled the DTP negotiation.
I have not changed any vtp configurations on any of the switches here since I took over the network. Here are the info you requested:
chaclt01#sh vtp status
VTP Version : running VTP2
Configuration Revision : 60
Maximum VLANs supported locally : 1005
Number of existing VLANs : 30
VTP Operating Mode : Server
VTP Domain Name : cisco
VTP Pruning Mode : Disabled
VTP V2 Mode : Enabled
VTP Traps Generation : Disabled
MD5 digest : 0x9B 0x85 0x89 0x9A 0x90 0xB9 0x4C 0xFA
Configuration last modified by 10.0.1.88 at 8-26-95 15:24:43
Local updater ID is 10.0.1.88 on interface Vl1 (lowest numbered VLAN interface found)
chaclt01#
chaswt0201#sh vtp stat
VTP Version : 2
Configuration Revision : 60
Maximum VLANs supported locally : 1005
Number of existing VLANs : 30
VTP Operating Mode : Server
VTP Domain Name : cisco
VTP Pruning Mode : Disabled
VTP V2 Mode : Enabled
VTP Traps Generation : Enabled
MD5 digest : 0x9B 0x85 0x89 0x9A 0x90 0xB9 0x4C 0xFA
Configuration last modified by 10.0.1.88 at 8-26-95 15:24:43
Local updater ID is 10.0.1.20 on interface Vl1 (lowest numbered VLAN interface found)
chaswt0201#
here is the sh ip route from client:
chaclt01#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 10.22.99.1 to network 0.0.0.0
172.16.0.0/24 is subnetted, 1 subnets
C 172.16.0.0 is directly connected, Vlan5
10.0.0.0/8 is variably subnetted, 22 subnets, 2 masks
C 10.22.20.0/24 is directly connected, Vlan220
C 10.0.1.0/24 is directly connected, Vlan1
S 10.26.0.0/16 [1/0] via 10.89.0.1
S 10.27.0.0/16 [1/0] via 10.89.0.1
S 10.24.0.0/16 [1/0] via 10.89.0.1
S 10.25.0.0/16 [1/0] via 10.89.0.1
C 10.22.15.0/24 is directly connected, Vlan210
S 10.30.0.0/16 [1/0] via 10.89.0.1
C 10.22.8.0/24 is directly connected, Vlan208
C 10.22.9.0/24 is directly connected, Vlan209
S 10.28.0.0/16 [1/0] via 10.89.0.1
S 10.29.0.0/16 [1/0] via 10.89.0.1
C 10.22.11.0/24 is directly connected, Vlan211
S 10.22.0.0/24 [1/0] via 10.22.99.1
S 10.23.0.0/16 [1/0] via 10.89.0.1
C 10.44.0.0/24 is directly connected, Vlan44
S 10.37.0.0/16 [1/0] via 10.22.20.230
C 10.22.40.0/24 is directly connected, Vlan240
S 10.55.0.0/16 [1/0] via 10.89.0.1
C 10.89.0.0/24 is directly connected, Vlan389
S 10.89.0.0/16 [1/0] via 10.89.0.1
C 10.22.99.0/24 is directly connected, Vlan299
S* 0.0.0.0/0 [1/0] via 10.22.99.1
chaclt01#
And now from 2nd floor:
chaswt0201#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 4 subnets
C 10.22.20.0 is directly connected, Vlan220
C 10.0.1.0 is directly connected, Vlan1
C 10.22.0.0 is directly connected, Vlan200
C 10.44.0.0 is directly connected, Vlan44
chaswt0201#
Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO
07-24-2012 06:15 PM
OK, a little more information....
I can ping Solarwinds from the client switch
I can ping the 2nd floor switch vlan1 (10.0.1.20) from client switch
I can NOT ping the CORE vlan1 (10.0.1.1) from client switch
I can ping solarwinds from CORE
I can NOT ping 2nd floor switch vlan1 from CORE
I can NOT ping Client switch vlan1 from CORE
I can ping Client switch vlan1 from 2nd floor
I can NOT ping CORE vlan1 from 2nd floor
I can NOT ping Solarwinds from 2nd floor
all is same for other floor switches.Problem is getting from client to CORE on vlan1. Not sure how to fix, as vlan1 seems to be configured correctly on all. very strange to me. As I understand it, when I ping directly from the switch, it uses the native vlan (vlan1) to get to the layer 3 device for routing to the destination. In this case, both Client and CORE are layer 3 devices.
Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO
07-24-2012 06:39 PM
HI Jon,
listen, verify the intervlan-routing because if the network are not transporting info from one place to another one via routing your infrastructure will not work in any case. Is ip routing in your configuration? From your descriptions it seems that part of your network is doing layer 3 communications and part is layer 2 only or even broadcast out packets.
1) Check the routing table : show ip route
2) Check the VTP status: show vtp status
3) Check by CDP which neighbours can be seen : show cdp nei and show cdp nei det
4) You tell the main issue is on vlan 1. Are the vlan allowed over the trunks?
5) If you do not want to use VTP:
vlan data
vtp mode trans
exit
wr
!
6) if you do not want to use VTP and you set it transparent, remove all the unnecessary vlans to reduce the spanning-tree instances and the reconvergence time.
7) Check the allowed vlans across your trunks
Let me know
Alessio
PS: in few mins i am going because here is nearly 3 am!!!
07-24-2012 06:43 PM
Thank you for your help. I'll read through this and respond. Get some rest. Getting late here too.
Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO
07-25-2012 02:48 PM
1.) sh ip routes for both client and 2nd floor are listed above in my previous post. here is the sh ip route in core
chaswtcore#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 10.22.99.3 to network 0.0.0.0
172.16.0.0/24 is subnetted, 1 subnets
C 172.16.0.0 is directly connected, Vlan5
10.0.0.0/8 is variably subnetted, 27 subnets, 2 masks
C 10.22.31.0/24 is directly connected, Vlan331
S 10.15.0.0/24 [1/0] via 10.22.99.15
S 10.22.20.0/24 [1/0] via 10.22.99.8
C 10.0.1.0/24 is directly connected, Vlan1
S 10.26.0.0/24 [1/0] via 10.22.99.5
S 10.27.0.0/16 [1/0] via 10.22.99.8
S 10.24.0.0/16 [1/0] via 10.22.99.5
S 10.25.0.0/16 [1/0] via 10.22.99.5
S 10.22.15.0/24 [1/0] via 10.22.99.8
S 10.30.0.0/16 [1/0] via 10.22.99.8
S 10.22.8.0/24 [1/0] via 10.22.99.8
S 10.22.9.0/24 [1/0] via 10.22.99.8
S 10.28.0.0/16 [1/0] via 10.22.99.5
S 10.29.0.0/16 [1/0] via 10.22.99.5
S 10.22.11.0/24 [1/0] via 10.22.99.8
C 10.22.0.0/24 is directly connected, Vlan200
S 10.23.0.0/16 [1/0] via 10.22.99.5
S 10.22.1.0/24 [1/0] via 10.22.99.3
S 10.44.0.0/24 [1/0] via 10.22.99.8
S 10.37.0.0/16 [1/0] via 10.22.20.1
S 10.26.32.0/24 [1/0] via 10.22.99.89
S 10.22.40.0/24 [1/0] via 10.22.99.8
C 10.22.42.0/24 is directly connected, Vlan242
S 10.29.32.0/24 [1/0] via 10.22.99.89
S 10.55.0.0/16 [1/0] via 10.22.99.89
S 10.89.0.0/16 [1/0] via 10.22.99.89
C 10.22.99.0/24 is directly connected, Vlan299
S* 0.0.0.0/0 [1/0] via 10.22.99.3
chaswtcore#
2.) we configure our vlans manually on each switch. I understand that typically we would configure neighbor switches in transparent mode. Still, I'm unclear that this could be the issue. I'm reluctant to go around changing too much in our production infrastructure. None of these switches were configured for vtp, so they are in their default mode of Server.
3.)
chaswtcore#sh cdp nei
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID Local Intrfce Holdtme Capability Platform Port ID
dirswt02 Gig 3/0/1 177 R S I WS-C3560G-Gig 0/2
chaswt389 Gig 1/0/4 153 R S I WS-C3750G-Gig 2/0/1
chaclt01.decosimo.com
Gig 1/0/1 161 R S I WS-C3750G-Gig 1/0/1
chaswtcore#
As you can see below, the client switch can see all of our edge switches that are directly connected. chaswtXXYY, where XX = floor number, and YY = switch identifier per floor we have floors 1, 2, 8, 9, and 11 in this building.
chaclt01#sh cdp nei
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID Local Intrfce Holdtme Capability Platform Port ID
chaswtcore Gig 1/0/1 167 R S I WS-C3750G Gig 1/0/1
chaswt0901 Gig 1/0/27 179 S I WS-C3750- Gig 1/0/1
chaswt0801 Gig 1/0/28 120 S I WS-C3750- Gig 1/0/1
chaswt1101 Gig 1/0/26 156 S I WS-C3750- Gig 4/0/1
chaswt389 Gig 1/0/2 172 R S I WS-C3750G Gig 2/0/4
SEP001FCAE7BCF4 Gig 1/0/13 167 H ATA 186 Port 1
chaswt0101.Decosimo.com
Gig 1/0/25 121 R S I WS-C3750- Gig 1/0/2
chaswt02TR.decosimo.com
Gig 1/0/4 121 S I WS-C3750- Fas 1/0/24
chaswt0201.decosimo.com
Gig 1/0/3 178 R S I WS-C3750- Fas 1/0/24
chaclt01#
chaswt0201#sh cdp nei
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID Local Intrfce Holdtme Capability Platform Port ID
chawlc01 Fas 1/0/9 169 H AIR-WLC21 Fastethernet0/0/1
SEP001FCAEA3AB7 Fas 1/0/11 148 H P IP Phone Port 1
SEP001FCAEA4D2B Fas 1/0/13 176 H P IP Phone Port 1
SEP002290042D04 Fas 1/0/7 162 H P IP Phone Port 1
LABswt01 Fas 1/0/5 135 S I WS-C3750- Fas 2/0/1
SEP00229003C563 Fas 1/0/8 139 H P IP Phone Port 1
SEP002290050419 Fas 1/0/23 137 H P IP Phone Port 1
SEP001FCAEA4D10 Fas 1/0/4 160 H P IP Phone Port 1
SEP0023331B592B Fas 1/0/1 154 H P IP Phone Port 1
chaclt01.decosimo.com
Fas 1/0/24 157 R S I WS-C3750G Gig 1/0/3
chaswtmkt Fas 1/0/20 141 R S I WS-C3560- Gig 0/1
chaswt0201#
4.) The connections between client and floor switches are all trunks. The connection between CORE and CLIENT switches are access ports. Does this help? All vlans should be going over the trunks. It seems to me that this has something to do with it. I believe these are access ports in an effort to restrict LAN traffic from hitting the WAN VLAN on the WAN switch......? I'm still getting my head around our strange setup here....
7.)I added vlan1 just to be sure. no help.
Jonathan Beardsley
CCNA Voice; MCITP
Telecom & Network Administrator
DECOSIMO
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide