cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1685
Views
0
Helpful
22
Replies

vlan issue

csco11257494
Level 1
Level 1

Hi,

I am having an issue two diff switches both running on 3 diff vlans and both are connected together. e.g vlan 10, 20 and 30

this 3 vlans are configured on the two switches that are connected to each other and could ping each vlans having configured the ports of the

two switches connected to trunk and having all ports in each vlan connectint to a pc to be in access but those pcs canot ping other vlans the could only ping them selfs even the switch could not ping the PC IP succesfully.

thank you would appreciate any help   

22 Replies 22

Gregory Snipes
Level 4
Level 4

Please post up scrubbed configs for these devices. This will be a much easier way to determine what any issues with these devices are.

FOR SW A

spanning-tree mode pvst

spanning-tree extend system-id

!

vlan internal allocation policy ascending

!

!

!

interface FastEthernet1/0/1

switchport mode access

!

interface FastEthernet1/0/2

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/3

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/4

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/5

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/6

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/7

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/8

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/9

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/10

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/11

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/12

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/13

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/14

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/15

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/16

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/17

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/18

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/19

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/20

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/21

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/22

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/23

switchport trunk encapsulation dot1q

switchport mode access

!

interface FastEthernet1/0/24

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/1

description link to AGGRSW2

switchport trunk encapsulation dot1q

switchport mode trunk

!

interface GigabitEthernet1/0/2

!

interface Vlan1

no ip address

!

interface Vlan105

ip address 192.168.1.1 255.255.255.224

!

interface Vlan120

ip address 192.168.1.33 255.255.255.224

!

interface Vlan250

ip address 192.168.1.65 255.255.255.224

!

ip classless

ip http server

ip http secure-server

FOR  SW B

interface GigabitEthernet1/0/1

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/2

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/3

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/4

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/5

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/6

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/7

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/8

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/9

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/10

switchport access vlan 105

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/11

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/12

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/13

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/14

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/15

switchport access vlan 120

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/16

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/17

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/18

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/19

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/20

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/21

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/22

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/23

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/24

switchport access vlan 250

switchport trunk encapsulation dot1q

switchport mode access

!

interface GigabitEthernet1/0/25

description link to AGGRSW1

switchport trunk encapsulation dot1q

switchport mode trunk

!

interface GigabitEthernet1/0/26

!

interface GigabitEthernet1/0/27

!

interface GigabitEthernet1/0/28

!

interface Vlan1

no ip address

!

interface Vlan105

ip address 192.168.1.2 255.255.255.224

!

interface Vlan120

ip address 192.168.1.34 255.255.255.224

!

interface Vlan250

ip address 192.168.1.66 255.255.255.224

!

   PCs config in vlan 105

ip add 192.168.1.10, S/M:255.255.255.224, D.G:192.168.1.1

PCs config in vlan 120

IP add 192.168.1.34, S/M:255.255.255.224 D.G 192.168.1.32

PC in VLAN 120 has a duplicate IP to one of the switches.

I belive you want to change the IP on the second switch to:

interface Vlan120

ip address 192.168.1.32 255.255.255.224

This is a fairly simple config and I do not see any issues with it assuming that they are properly connected together port g1/0/1 to port g1/0/25.

Things to check:

1. Do the vlans exist in both switches "Sh VLAN"

2. Is IP routing enabled, just put "IP routing" into each one for good measure

3. Check the client IP configurations

4. Do a "Sh CDP nei" just to verify layer 2

5. Ensure the hosts are connected to the correct ports

all seems to be fine i have checked all you said but i cant just figure out why vlan 105 is not pinging vlan 120

AGGRSW2#sh cdp nei

Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

                  S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,

                  D - Remote, C - CVTA, M - Two-port Mac Relay

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID

AGGRSW1          Gig 1/0/25        137             R S I  WS-C3750V Gig 1/0/1

AGGRSW2#

VLAN Name                             Status    Ports

---- -------------------------------- --------- -------------------------------

1    default                          active    Gi1/0/26, Gi1/0/27, Gi1/0/28

105  uservlan                         active    Gi1/0/1, Gi1/0/2, Gi1/0/3

                                                Gi1/0/4, Gi1/0/5, Gi1/0/6

                                                Gi1/0/7, Gi1/0/8, Gi1/0/9

                                                Gi1/0/10

120  facility                         active    Gi1/0/11, Gi1/0/12, Gi1/0/13

                                                Gi1/0/14, Gi1/0/15

150  VLAN0150                         active

250  IASsecurity                      active    Gi1/0/16, Gi1/0/17, Gi1/0/18

                                                Gi1/0/19, Gi1/0/20, Gi1/0/21

                                                Gi1/0/22, Gi1/0/23, Gi1/0/24

1002 fddi-default                     act/unsup

1003 token-ring-default               act/unsup

1004 fddinet-default                  act/unsup

1005 trnet-default                    act/unsup

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------

1    enet  100001     1500  -      -      -        -    -        0      0

105  enet  100105     1500  -      -      -        -    -        0      0

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------

120  enet  100120     1500  -      -      -        -    -        0      0

150  enet  100150     1500  -      -      -        -    -        0      0

250  enet  100250     1500  -      -      -        -    -        0      0

1002 fddi  101002     1500  -      -      -        -    -        0      0

1003 tr    101003     1500  -      -      -        -    -        0      0

1004 fdnet 101004     1500  -      -      -        ieee -        0      0

1005 trnet 101005     1500  -      -      -        ibm  -        0      0

^Please see my reply to your client configs.^

sorry the ipp add is 192.168.1.39 (not .34) it was a mistake

The gateway is pointed at .32 and there is no .32. You will either need to change the switch IP to .32 or point your gateway at .34.

this is it the ip is 192.168.1.39 255.255.255.224 gateway:192.168.1.34 this is the right config

If you put both clients in the same VLAN/subnet can they ping each other?

will try that

they cant ping each other even in the same vlan

Review Cisco Networking for a $25 gift card