10-31-2023
12:34 AM
- last edited on
10-31-2023
01:55 AM
by
rupeshah
Hi everyone,
I'm having problem with my Catalyst 9200, I can't connect using Telnet or SSH but I can connect to the IP through other switch
This is my configuration
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable password xxx
!
!
!
!
aaa new-model
!
!
aaa authentication login default local
!
!
!
!
!
!
aaa session-id common
switch 1 provision c9200-24p
!
!
!
!
!
!
!
!
!
ip arp entry learn 10240
!
!
!
!
!
!
!
!
login on-success log
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
no destination transport-method email
!
!
no device-tracking logging theft
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-1700122547
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1700122547
revocation-check none
rsakeypair TP-self-signed-1700122547
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-1700122547
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31373030 31323235 3437301E 170D3230 30343235 30333031
31305A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 37303031
32323534 37308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 01008503 41315377 1D6B6276 67F65412 9D4181EC AE8B367D D63C773A
8A24B8FC 88D7B52F 11650F59 A881D70A ACF566BE BCF399E3 EF539C8D 1D299FB7
F50E7E51 EFE8703E D547C8E3 95114862 1A793C23 563AA734 28BE3A35 734D7C39
13DEF660 6CB61A10 32452816 8C483443 DF1ABE6D FBC8BB9D BA234D65 EEA9A899
3B68C321 88451524 E4E9ABCD E13E446E FD128A57 78A3D85E 433255F4 2A3B678B
545E55D0 43A064E8 176D060A 16C82465 E2E78A4D 4D691D6D 19B7E558 19CC0D91
B415D699 60C2CD68 34A802A9 913F578C DC8B267D B260283B 79101BDA C65598E1
73A5CC86 111777B7 1DC1F97B 78F4837C 01646DB3 6567D904 F8DCCA78 61FB1043
A3C9F274 B2270203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 149728F0 4C28B838 00BBF5E9 AB31E82C E77557DD
72301D06 03551D0E 04160414 9728F04C 28B83800 BBF5E9AB 31E82CE7 7557DD72
300D0609 2A864886 F70D0101 05050003 82010100 6AA582C3 20393ACA 5E6FEF94
A87ACE05 96D045C3 DBA35446 756AD2F9 49826248 DFD96F7D 30DB9702 D5A1EE34
99F17E19 415991FD A03877D7 88C46DFA 5E152ADD 25F81A62 8E2792C1 B4A5DB69
476F817F 44FB975F 3C019CE8 15C533AF 380A69BA 3DC122F7 131064BA 283F3D72
9757DD68 95D39E27 CFBC3419 46A4AF99 E2681DA4 B50E72A7 0ECF887C 31D234A3
65D6D065 6C69A959 35B3650E 637582B6 CCA5D97D AF1FDB73 1D8A7E6E D655CA2D
E421A019 DD4A169E 1E274A5A F0442122 D23E26A4 979CD432 EB97F85D 12CBA718
500AED36 6ECF9A28 5F9B171D 102FC703 99C428CE 72AA9AE8 0BCCC8BB 07B9797B
CFE2125E 31CB404B 5006C7B1 72439E3C C3EF87B9
quit
!
license boot level network-advantage addon dna-advantage
!
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
memory free low-watermark processor 87534
!
!
username xxx password xxx
!
redundancy
mode sso
!
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic
class-map match-any system-cpp-default
description EWLC data, Inter FED Traffic
class-map match-any system-cpp-police-sys-data
description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual OOB
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
speed 1000
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/2
switchport trunk native vlan 152
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet1/0/3
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/4
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/5
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/6
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/7
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/8
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/9
switchport access vlan 108
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/10
switchport access vlan 108
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/11
switchport access vlan 108
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/12
switchport access vlan 110
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/13
switchport access vlan 108
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/14
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/15
switchport access vlan 104
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/16
switchport access vlan 12
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/17
switchport access vlan 91
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/18
switchport access vlan 108
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/19
switchport access vlan 104
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/20
switchport access vlan 91
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/21
switchport access vlan 116
switchport mode access
switchport voice vlan 116
spanning-tree portfast
!
interface GigabitEthernet1/0/22
switchport access vlan 152
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/23
switchport access vlan 104
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/24
switchport trunk native vlan 11
switchport mode trunk
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
switchport trunk native vlan 11
switchport mode trunk
!
interface TenGigabitEthernet1/1/2
switchport trunk native vlan 11
switchport mode trunk
!
interface TenGigabitEthernet1/1/3
switchport trunk native vlan 11
switchport mode trunk
!
interface TenGigabitEthernet1/1/4
switchport trunk native vlan 11
switchport mode trunk
!
interface Vlan1
no ip address
!
interface Vlan11
ip address 10.11.1.5 255.255.255.0
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 10.11.1.1
!
!
!
!
!
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
transport input all
line vty 5 15
transport input all
!
!
!
!
!
!
!
end
Anyone can tell me if I configured wrong or forgot some needed command
Best Regards
Sigit
10-31-2023 04:52 AM
>....but I can connect to the IP through other switch
- What access method are you using then ?
M.
10-31-2023 06:55 PM
I have to telnet from other switch then I connect to that switch
11-01-2023 12:12 AM
- I suspect there is an intranet firewall restriction , preventing access from the segment your PC is on ,
M.
11-01-2023 01:51 AM
If that has restriction why can I connect to the other switch with the same VLAN and I can connect to that switch through other switch?
11-01-2023 02:10 AM - edited 11-01-2023 02:44 AM
The traffic typically won't traverse any firewall within the same VLAN.
You can reach the other switch on it's address in VLAN 11? What output do you get if you traceroute 10.11.1.5?
11-01-2023 07:32 AM
I think asking for traceroute is a good suggestion. The symptoms suggest that it might be an IP connectivity issue. So another question would be whether you can ping to the switch?
11-01-2023 08:28 PM
I can ping the IP but I can't connect directly to the IP by telnet or SSH
11-02-2023 02:57 AM
Would you post the output of these commands
show ip interface brief
show ip route
11-02-2023 11:27 PM
Here is the result of the command
Interface IP-Address OK? Method Status Protocol
Vlan1 unassigned YES NVRAM up up
Vlan11 10.11.1.5 YES NVRAM up up
GigabitEthernet0/0 unassigned YES NVRAM down down
GigabitEthernet1/0/1 unassigned YES unset up up
GigabitEthernet1/0/2 unassigned YES unset up up
GigabitEthernet1/0/3 unassigned YES unset up up
GigabitEthernet1/0/4 unassigned YES unset up up
GigabitEthernet1/0/5 unassigned YES unset down down
GigabitEthernet1/0/6 unassigned YES unset up up
GigabitEthernet1/0/7 unassigned YES unset up up
GigabitEthernet1/0/8 unassigned YES unset up up
GigabitEthernet1/0/9 unassigned YES unset up up
GigabitEthernet1/0/10 unassigned YES unset up up
GigabitEthernet1/0/11 unassigned YES unset up up
GigabitEthernet1/0/12 unassigned YES unset up up
GigabitEthernet1/0/13 unassigned YES unset up up
GigabitEthernet1/0/14 unassigned YES unset up up
GigabitEthernet1/0/15 unassigned YES unset down down
GigabitEthernet1/0/16 unassigned YES unset up up
GigabitEthernet1/0/17 unassigned YES unset up up
GigabitEthernet1/0/18 unassigned YES unset up up
GigabitEthernet1/0/19 unassigned YES unset down down
GigabitEthernet1/0/20 unassigned YES unset up up
GigabitEthernet1/0/21 unassigned YES unset down down
GigabitEthernet1/0/22 unassigned YES unset down down
GigabitEthernet1/0/23 unassigned YES unset up up
GigabitEthernet1/0/24 unassigned YES unset up up
GigabitEthernet1/1/1 unassigned YES unset down down
GigabitEthernet1/1/2 unassigned YES unset down down
GigabitEthernet1/1/3 unassigned YES unset down down
GigabitEthernet1/1/4 unassigned YES unset down down
Te1/1/1 unassigned YES unset up up
Te1/1/2 unassigned YES unset down down
Te1/1/3 unassigned YES unset up up
Te1/1/4 unassigned YES unset down down
Extended Host Mode is enabled
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, m - OMP
n - NAT, Ni - NAT inside, No - NAT outside, Nd - NAT DIA
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
H - NHRP, G - NHRP registered, g - NHRP registration summary
o - ODR, P - periodic downloaded static route, l - LISP
a - application route
+ - replicated route, % - next hop override, p - overrides from PfR
Gateway of last resort is 10.11.1.1 to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via 10.11.1.1
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 10.11.1.0/24 is directly connected, Vlan11
L 10.11.1.5/32 is directly connected, Vlan11
11-03-2023 06:51 AM
Thank you for the outputs. The outputs do have some helpful information. They do confirm that ip routing is enabled and that you do have a valid default route. So access to remote subnets should work. They show that there are multiple vlans with access ports in them. There is only one vlan with a vlan interface with an IP address. It shows several trunk ports with vlan 11 as the native vlan. I do not see any access ports in vlan 11. But since vlan 11 is carried on a trunk connection the vlan 11 interface is in the up state and the subnet for vlan 11 is in the routing table. I can see why devices connected to this switch would not be able to communicate to anything remote. But the switch itself should be able to communicate.
I suspect that the issue is with something upstream. What can you tell us about the device at 10.11.1.1? What kind of device is this? Does it have any security policies implemented? Does it perhaps use VRFs?
11-05-2023 06:55 PM - edited 11-05-2023 06:56 PM
Hi,
10.11.1.1 is my main switch . I don't think I use VRF
I use 10.11.1.1 as my vtp mode server and the other as vtp mode client
Sigit
11-01-2023 08:28 PM
I can get to 10.11.1.5 from other switch in the same VLAN 11 for example 10.11.1.1 that's why I said that to get to 10.11.1.5 I have to go throught other switch
This is the result for the trace route from command prompt and from 10.11.1.1
Tracing route to 5.1.11.10.in-addr.arpa [10.11.1.5]
over a maximum of 30 hops:
1 <1 ms <1 ms <1 ms 5.1.11.10.in-addr.arpa [10.11.1.5]
Tracing the route to 10.11.1.5
VRF info: (vrf in name/id, vrf out name/id)
1 10.11.1.5 (10.11.1.5) 12 msec * 4 msec
10-31-2023 05:02 AM - edited 10-31-2023 05:16 AM
If you can reach the IP of the switch address I don't see any reason you shouldn't be able to connect with telnet. But you need to enter "login local" under "line vty 0 15" to be able to authenticate using a local user. EDIT: I just noticed the "aaa authentication login default local", "login local" isn't necessary.
To be able to connect to the device with SSH you need to configure a domain name and generate RSA keys.
ip domain name {your domain name)
crypto key gen rsa modulus 4096
10-31-2023 08:57 PM
Could not open connection to the host, on port 23: Connect failed
This is the error when I connect using telnet
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide