cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1956
Views
0
Helpful
11
Replies

Unable to Access Cisco 2960 from all VLANs Except one

Gokul Varma
Beginner
Beginner

Hi,

I am able to access this switch only from 40 ( 192.168.40.0/24 ) VLAN and am unable to ping or ssh into it from any other VLAN. I have pasted below the running config of the switch. Please advice what could be preventing the switch from being accessed from the other VLANs.

BSL-BNG-S001#sh run
Building configuration...

Current configuration : 7302 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec localtime year
service timestamps log datetime msec
service password-encryption
service sequence-numbers
!
hostname BSL-BNG-S001
!
boot-start-marker
boot-end-marker
!
logging buffered 65535
enable secret 5 xxx
enable password 7 xxx
!
username netadmin privilege 15 password 7 xxx
username administrator privilege 15 secret 5 xxx
!
!
aaa new-model
!
!
aaa group server radius BETSOL_ADS
server-private 192.168.1.7 auth-port 1645 acct-port 1646 key 7
server-private 192.168.1.9 auth-port 1645 acct-port 1646 key 7

!
aaa authentication login default group BETSOL_ADS local
aaa authorization exec default group BETSOL_ADS local
!
!
!
aaa session-id common
clock timezone IST 5 30
system mtu routing 1500
!
!
ip domain-name betsol.com
!
!
crypto pki trustpoint TP-self-signed-xxx
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-xxx
revocation-check none
rsakeypair TP-self-signed-xxx
!
!
crypto pki certificate chain TP-self-signed-xx
certificate self-signed 01



quit
!
!
!
archive
log config
logging enable
logging size 1000
notify syslog contenttype plaintext
hidekeys
!
spanning-tree mode pvst
spanning-tree extend system-id
spanning-tree vlan 1,10,20,30,40 priority 4096
!
vlan internal allocation policy ascending
!
ip ssh authentication-retries 5
!
!
interface FastEthernet0/1
description Untangle
switchport access vlan 50
!
interface FastEthernet0/2
description WAP_1_80.25
switchport access vlan 80
srr-queue bandwidth limit 30
!
interface FastEthernet0/3
description DHCP_DNS_Servers
!
interface FastEthernet0/4
description Server_Ports
!
interface FastEthernet0/5
description Server_Ports
!
interface FastEthernet0/6
description Server_Ports
!
interface FastEthernet0/7
description Server_Ports
!
interface FastEthernet0/8
description Server_Ports
!
interface FastEthernet0/9
description Server_Ports
!
interface FastEthernet0/10
description Server_Ports
!
interface FastEthernet0/11
description DECK01
switchport mode access
!
interface FastEthernet0/12
description DECK02
switchport access vlan 80
!
interface FastEthernet0/13
!
interface FastEthernet0/14
description ***PRINTER***
!
interface FastEthernet0/15
switchport access vlan 40
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
description WAP_3_80.29
switchport access vlan 80
!
interface FastEthernet0/22
switchport access vlan 80
switchport mode access
!
interface FastEthernet0/23
description Port_Mirror
switchport access vlan 30
switchport mode access
!
interface FastEthernet0/24
description Downlink_G04
switchport mode trunk
!
interface GigabitEthernet0/1
description Uplink_Router
switchport trunk allowed vlan 1-59,61-69,71-4094
switchport mode trunk
!
interface GigabitEthernet0/2
description Downlink_G01
switchport mode trunk
!
interface Vlan1
ip address 192.168.1.50 255.255.255.0
ip helper-address 192.168.1.1
!
interface Vlan10
ip address 192.168.10.10 255.255.255.0
ip helper-address 192.168.10.1
!
interface Vlan20
ip address 192.168.20.10 255.255.255.0
ip helper-address 192.168.20.1
!
interface Vlan30
ip address 192.168.30.10 255.255.255.0
ip helper-address 192.168.30.1
!
interface Vlan40
ip address 192.168.40.10 255.255.255.0
ip helper-address 192.168.40.1
!
interface Vlan50
ip address 192.168.50.10 255.255.255.0
!
interface Vlan60
ip address 192.168.60.10 255.255.255.0
ip helper-address 192.168.60.1
!
interface Vlan70
ip address 192.168.70.10 255.255.255.0
ip helper-address 192.168.70.1
!
interface Vlan80
ip address 192.168.80.10 255.255.255.0
!
interface Vlan100
ip address 192.168.100.10 255.255.255.0
ip helper-address 192.168.100.1
!
ip http server
ip http secure-server
logging trap debugging
logging source-interface Vlan1
logging 192.168.1.5
snmp-server community xxx RO
snmp-server community xxx RO
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps transceiver all
snmp-server enable traps tty
snmp-server enable traps cluster
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps rep
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps auth-framework sec-violation
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps power-ethernet group 1
snmp-server enable traps power-ethernet police
snmp-server enable traps fru-ctrl
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps energywise
snmp-server enable traps rtr
snmp-server enable traps vstack
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps stpx inconsistency root-inconsistency loop-inconsistency
snmp-server enable traps syslog
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server enable traps errdisable
!
line con 0
password 7 xxx
line vty 0 1
privilege level 15
password 7 xxx
transport input ssh
line vty 2 4
privilege level 15
transport input ssh
line vty 5 15
!
end

BSL-BNG-S001#

1 Accepted Solution

Accepted Solutions

That command is added under config mode not interface mode.

By the way if you pick an SVI you need to shut the others down.

If it is acting as L2 switch it should only have one SVI up.

Only L3 switches should have multiple SVIs up.

Jon

View solution in original post

11 Replies 11

Jon Marshall
VIP Community Legend VIP Community Legend
VIP Community Legend

Is this switch meant to be acting as L3 ie. routing between vlans because you have a trunk uplink to a router which suggests it is not.

If it is not meant to be routing between vlans then why does it have all those SVIs ("int vlan x") configured.

From a client that cannot ping, what is the client's IP address and default gateway ?

Jon