cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
917
Views
0
Helpful
4
Replies

Unable to ping internet from lab switch connected to PC

kermit4ip
Level 1
Level 1

Hello everyone. In the interest of full disclosure, I've also posted this in other online communities but haven't found a solution yet. For starters, I'm a Cisco noob, comparatively speaking to others here. I'm trying to get more familiar with IOS and have started acquiring some test lab equipment at home. I have a Catalyst 3560 now and plan to add a couple more older devices to play with. 

 

One thing I'm trying to figure out is why I can't ping IP addresses on the internet from the 3560. It's directly connected to a PC (192.168.50.121) through its gig interface. I can ping the PC from the switch but can't ping the PC's gateway (192.168.50.1) or anything beyond it on the internet. 

 

I'm not sure if it's relevant, but the PC has two network interfaces. One of them (192.168.50.121) is the one connected to the 3560, and the other one (192.168.50.41) is connected to an ethernet port on my primary internet router (192.168.50.1), which is a Ubiquiti Edgerouter X. Everything is on the same subnet, but the PC is only thing directly connected to a port on the 3560. 
 
Is there something I need to do with IP routing to allow the switch to see the Edgerouter? What am I missing? 

 

Here's the config on the switch:

 

Current configuration : 3261 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname LU-CISCO-3560-8P-1
!
boot-start-marker
boot-end-marker
!
enable secret 5 ##############################
!
username ##### privilege 15 secret 5 ##############################
!
!
no aaa new-model
system mtu routing 1500
vtp domain #####.com
vtp mode transparent
authentication mac-move permit
ip subnet-zero
ip domain-name #####.com
!
!
!
!
crypto pki trustpoint TP-self-signed-21811#####
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-21811#####
 revocation-check none
 rsakeypair TP-self-signed-21811#####
!
!
crypto pki certificate chain TP-self-signed-21811#####
 certificate self-signed 01
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ######## ########
  ######## ######## ######## ######## ######## ######## ##
  quit
!
!
!
spanning-tree mode pvst
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
vlan 100
 name #####_Default
lldp run
!
ip ssh version 2
!
!
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface GigabitEthernet0/1
 description MANAGEMENT PORT
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface Vlan1
 description MANAGEMENT VLAN
 ip address 192.168.50.122 255.255.255.0
 no ip route-cache
!
ip default-gateway 192.168.50.1
ip classless
ip http server
ip http secure-server
!
!
ip sla enable reaction-alerts
logging trap debugging
no cdp run
!
!
banner login ^CWelcome to #####!^C
!
line con 0
 exec-timeout 45 0
 login local
line vty 0 4
 exec-timeout 45 0
 privilege level 15
 login local
 transport input ssh
line vty 5 15
 exec-timeout 45 0
 privilege level 15
 login local
 transport input ssh
!
end

I imagine it's something obvious, but for the life of me I'm not seeing it. Thank you.

1 Accepted Solution

Accepted Solutions

Hello

First of all your pc having its 2 network cards in the same network should not be possible i am assuming that are in different subnets 

with the one of them having a default gateway of the router lan facing interface 

 

also for the a non public routable network such as the one you have shown to access the internet you would  require the router to perform NAT as the switch won’t be able to do this.


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

View solution in original post

4 Replies 4

Hello

First of all your pc having its 2 network cards in the same network should not be possible i am assuming that are in different subnets 

with the one of them having a default gateway of the router lan facing interface 

 

also for the a non public routable network such as the one you have shown to access the internet you would  require the router to perform NAT as the switch won’t be able to do this.


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

Hi Paul, 

 

The 2nd adapter in the PC was in the same subnet and was statically assigned. The switch wasn't connected to any router at all, only directly to the PC through that 2nd network card. 

 

My test lab is on the other side of the house from the one-and-only router I own, which is that Edgerouter. Is there a way to use the PC as a router to reroute traffic from the switch bound for the internet through the PC's primary network card (the one going back to the router)? 

rupeshah
Community Manager
Community Manager

Hi kermit4ip,

Could you please try to access it now.

Regards,
Rupesh

Hi Rupesh, the question is no longer marked as spam. Thank you. 

Review Cisco Networking products for a $25 gift card