cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
415
Views
2
Helpful
10
Replies

Telnet not working From windows PC

Hayat Zarin
Level 1
Level 1

Hi everyone.

i have 6 VLANs and VLAN 15 i used for management  i faced issue with telnet and ssh from switch to switch telnet is working but when i try telnet from Window PC ( vlan 16 and other VLANs ) telnet session open with blank screen,  i opened telnet client session from Window PC ( Control Panel ) also i can ping each Vlan ( 16,17,18,19,20 ) gateway from Windows PC , inter-Vlan routing enabled.

at core switch there is no security ( ACL ) only dhcp running there, traffic all going through FortiGate firewall , in firewall policy services all allowed .

Firewall firmware , license etc updated. 

from firewall to core switch telnet is ok .

10 Replies 10

I see this issue before upgrade putty you use and I think issue will solve 

MHM

If telnet does work switch to switch and firewall to switch but does not work PC to switch my first guess at the issue is that you may have configured access-class on the vty of the switch. Can you post the config of the switch, or at least the part for the vty.

HTH

Rick

Cabinet_01_FF#show running-config
Building configuration...

Current configuration : 5851 bytes
!
! Last configuration change at 14:01:06 KSA Fri Mar 29 2024
! NVRAM config last updated at 14:03:36 KSA Wed May 29 2024
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Cabinet_01_FF
!
boot-start-marker
boot-end-marker
!
enable password 7 08316C0A4D0E550516
!
username admin password 7 08316C0A4D0E550516
!
!
no aaa new-model
clock timezone KSA 3
switch 1 provision ws-c2960s-24ps-l
!
!
!
!
crypto pki trustpoint HTTPS_SS_CERT_KEYPAIR
enrollment selfsigned
serial-number
revocation-check none
rsakeypair HTTPS_SS_CERT_KEYPAIR
!
!
crypto pki certificate chain HTTPS_SS_CERT_KEYPAIR
certificate self-signed 01
30820253 308201BC A0030201 02020101 300D0609 2A864886 F70D0101 04050030
3B311030 0E060355 04031307 53776974 63682E31 27300F06 03550405 13083134
33353033 30303014 06092A86 4886F70D 01090216 07537769 7463682E 301E170D
39333033 32363230 33353533 5A170D32 30303130 31303030 3030305A 303B3110
300E0603 55040313 07537769 7463682E 3127300F 06035504 05130831 34333530
33303030 1406092A 864886F7 0D010902 16075377 69746368 2E30819F 300D0609
2A864886 F70D0101 01050003 818D0030 81890281 8100A746 32B81181 C1FD5DCA
A3493207 EA5E9484 A48C11B9 6E4D90E9 9C3387FF 2C872924 083C13D8 8AC7C8BA
54E25C76 24AD161B 4F79ADA8 33293750 2674F650 F3BAEDD5 7612BB9F B0B00AD3
795FB752 7665FD0D 2D51BA78 621FB994 11898851 332CC67E 82064C5F AD95DB87
D735202C 30965A9A 328BA89A B22244ED ECBF07FB F1B10203 010001A3 67306530
0F060355 1D130101 FF040530 030101FF 30120603 551D1104 0B300982 07537769
7463682E 301F0603 551D2304 18301680 14257971 4B842A25 67D2BAFD 54150DFB
180B88D3 B7301D06 03551D0E 04160414 2579714B 842A2567 D2BAFD54 150DFB18
0B88D3B7 300D0609 2A864886 F70D0101 04050003 8181000C EE3E68A0 04E081DA
DCB49CEE B38D19DC D02834D1 E5B9826A 68C86F9F 74018F0E 44E991A1 36411470
FD134B87 E17D309B 60476830 1EA67B39 CD3ADBEF F17FBFC2 B12B9B0E 4822DBE5
4B026262 1B614A63 4FF9694A C25B1454 B3A2F755 6529FF5D 9A8AD61F 36D4F359
4D128634 D9E94D6E FDC25854 B4DDEE05 58A5B702 328351
quit
spanning-tree mode rpvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0
no ip address
shutdown
!
interface GigabitEthernet1/0/1
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/2
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/3
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/4
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/5
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/6
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/7
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/8
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/9
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/10
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/11
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/12
switchport access vlan 16
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/13
switchport access vlan 17
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/14
switchport access vlan 17
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/15
switchport access vlan 18
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/16
switchport access vlan 18
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/17
switchport access vlan 19
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/18
switchport access vlan 19
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/19
switchport access vlan 20
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/20
switchport access vlan 20
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/21
switchport access vlan 20
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/22
switchport access vlan 20
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/23
switchport access vlan 20
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/24
switchport access vlan 20
switchport mode access
spanning-tree portfast
ip dhcp snooping trust
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
switchport mode trunk
!
interface Vlan1
no ip address
shutdown
!
interface Vlan15
ip address 172.15.15.2 255.255.255.0
!
ip http server
ip http secure-server
!
line con 0
line vty 0 4
login local
transport input all
line vty 5 15
login
!
end

Cabinet_01_FF#

i upgraded already but faced same issue.

first please remove solved from my previous comment
second there is no default GW in SW so only PC in VLAN15 subnet will accept to access it 

MHM

Hayat Zarin
Level 1
Level 1

sorry by mistake i press solved tick.

but ping is working between different vlans ( 15,16,.... ) trunk is already configured .

at this scenario gateway must need ????.

another site same configuration done its working . 

''''another site same configuration done its working''''

Are other site use defualt route? Do show ip route to compare between two SW 

MHM

core switch 

172.100.0.0/24 is subnetted, 1 subnets
C 172.100.100.0 is directly connected, Vlan100
172.15.0.0/24 is subnetted, 1 subnets
C 172.15.15.0 is directly connected, Vlan15
172.17.0.0/24 is subnetted, 1 subnets
C 172.17.17.0 is directly connected, Vlan17
172.16.0.0/24 is subnetted, 1 subnets
C 172.16.16.0 is directly connected, Vlan16
172.19.0.0/24 is subnetted, 1 subnets
C 172.19.19.0 is directly connected, Vlan19
172.18.0.0/24 is subnetted, 1 subnets
C 172.18.18.0 is directly connected, Vlan18
172.20.0.0/21 is subnetted, 1 subnets
C 172.20.16.0 is directly connected, Vlan20

core switch interface connected to firewall as a trunk all vlans.

That why it not need GW' it can use any vlan' 

But this SW can only use vlan15.

This make SW need GW to connect to any PC outside subnet of vlan15

MHM

in firewall i also create SVI for all vlans with ip .1s.

if need route from core sw to fw then what is the default gateway ??

Review Cisco Networking for a $25 gift card