03-18-2013 08:37 AM - edited 03-07-2019 12:18 PM
Hello Everyone and thank you in advance for any help.
My configuration is as follows
3 Cisco 2960 switches all dasiyed chained via Gigabit Trunking ports using Network Assistant SmartPorts Program and marked as Switch Trunk Ports.
All switches have Vlan1, Vlan 10, Vlan 20, Vlan 30, Vlan 40 and Vlan 50.
Switch A has Ip address of 192.168.99.1 on interface Vlan1
Switch B has Ip address of 192.168.99.2 on interface Vlan1
Switch C has Ip address of 192.168.99.3 on interface Vlan1
Cisco Router series 2901 has the following config on Gigabit port 0/0
interface GigabitEthernet 0/0
Description Trunk to Switch A
ip address 192.168.99.254 255.255.255.0
!
interface GigabitEthernet 0/0.10
Description Vlan 10
encapsulation dot1q 10
ip address 192.168.10.254 255.255.255.0
!
interface GigabitEthernet 0/0.20
Description Vlan 20
encapsulation dot1q 20
ip address 192.168.20.254 255.255.255.0
!
interface GigabitEthernet 0/0.30
Description Vlan 30
encapsulation dot1q 30
ip address 192.168.30.254 255.255.255.0
!
interface GigabitEthernet 0/0.40
Description Vlan 40
encapsulation dot1q 40
ip address 192.168.40.254 255.255.255.0
!
interface GigabitEthernet 0/0.50
Description Vlan 50
encapsulation dot1q 50
ip address 192.168.50.254 255.255.255.0
!
Router EIGRP 1
network 192.168.99.0
network 192.168.10.0
network 192.168.20.0
network 192.168.30.0
network 192.168.40.0
network 192.168.50.0
auto-summary
All of the Vlans are active, All of the Switches can ping each other and the different Vlans ip's on the router.
there Router can ping all of the switches
However I cannot ping a windows 7 PC that is on Vlan10.
The Port is configured as such
Interface FastEthernet 0/6
switchport mode access
switchport access vlan 10
The PC can ping the Default gateway 192.168.10.254
the PC is configured as Such
Ip 192.168.10.250
Mask 255.255.255.0
GW 192.168.10.254
when I try to ping any other device that is also on Vlan 10.
I get a response from the PC the the Destination Host is Unreachable.
This seams like a very simple set up but can't make it work.
I have configured the switch ports both using the CLI and the Cisco Network Assistant as Desktop Ports on Vlan 10.
Please HELP!!!
Pablo
03-18-2013 08:44 AM
Hello,
Have you created the layer 2 vlans on the switches?
conf t
vlan 10,20,30,40,50
exit
Can you post your config of the switches?
res
Paul
Please don't forget to rate any posts that have been helpful.
Thanks.
03-18-2013 08:57 AM
Hello Paul,
I did try it once but I gave them Ip address and it still did not work
should I just add them without any Ip addresses?
I will post switch config shortly
thanks
Pablo
03-18-2013 09:21 AM
DPS_CSW_A# sho run Building configuration... Current configuration : 11075 bytes ! version 12.2 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname DPS_CSW_A ! boot-start-marker boot-end-marker no aaa new-model system mtu routing 1500 ip subnet-zero ! ! no ip domain-lookup ! ! ! spanning-tree mode pvst spanning-tree extend system-id ! vlan internal allocation policy ascending ! ! ! interface FastEthernet0/1 ! interface FastEthernet0/2 ! interface FastEthernet0/3 ! interface FastEthernet0/4 switchport access vlan 10 swithcpor mode access spanning-tree portfast ! interface FastEthernet0/5 switchport access vlan 10 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/6 switchport access vlan 50 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/7 switchport access vlan 10 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/8 switchport access vlan 50 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/9 switchport access vlan 10 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/10 switchport access vlan 50 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/11 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/12 switchport access vlan 50 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/13 switchport access vlan 10 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/14 ! interface FastEthernet0/15 switchport access vlan 20 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/16 switchport access vlan 20 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/17 switchport access vlan 20 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/18 switchport access vlan 20 switchport mode access switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security aging type inactivity macro description cisco-desktop spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 description To DPS_CSW_B switchport mode trunk srr-queue bandwidth share 10 10 60 20 queue-set 2 priority-queue out mls qos trust cos macro description cisco-switch auto qos voip trust spanning-tree link-type point-to-point ! interface GigabitEthernet0/2 description TO DPS_C2900 RT switchport mode trunk srr-queue bandwidth share 10 10 60 20 queue-set 2 priority-queue out mls qos trust dscp macro description cisco-router auto qos voip trust spanning-tree portfast trunk spanning-tree bpduguard enable ! interface Vlan1 ip address 192.168.99.1 255.255.255.0 no ip route-cache ! ! ip http server ip http secure-server ! control-plane ! ! line con 0 line vty 0 4 password login length 0 line vty 5 15 password login ! end DPS_CSW_A#sho vlan VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/11, Fa0/14, Fa0/19, Fa0/20 Fa0/21, Fa0/24 10 V10Etherstack active Fa0/5, Fa0/7, Fa0/9, Fa0/13 20 V20Avtec active Fa0/15, Fa0/16, Fa0/17, Fa0/18 30 V3OGovnet active 40 V40Govnet2 active 50 V50NetMon active Fa0/6, Fa0/8, Fa0/10, Fa0/12 Fa0/23 1002 fddi-default act/unsup 1003 trcrf-default act/unsup 1004 fddinet-default act/unsup 1005 trbrf-default act/unsup VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------ 1 enet 100001 1500 - - - - - 0 0 5 enet 100005 1500 - - - - - 0 0 VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------ 10 enet 100010 1500 - - - - - 0 0 20 enet 100020 1500 - - - - - 0 0 30 enet 100030 1500 - - - - - 0 0 40 enet 100040 1500 - - - - - 0 0 50 enet 100050 1500 - - - - - 0 0 1002 fddi 101002 1500 - - - - - 0 0 1003 trcrf 101003 4472 1005 3276 - - srb 0 0 1004 fdnet 101004 1500 - - - ieee - 0 0 1005 trbrf 101005 4472 - - 15 ibm - 0 0 VLAN AREHops STEHops Backup CRF ---- ------- ------- ---------- 1003 7 7 off Remote SPAN VLANs ------------------------------------------------------------------------------ Primary Secondary Type Ports ------- --------- ----------------- ------------------------------------------ DPS_CSW_A#sho inte vlan 10 Vlan10 is up, line protocol is up Hardware is EtherSVI, address is 1833.9d5d.f5c2 (bia 1833.9d5d.f5c2) MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive not supported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:00, output never, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 10000 bits/sec, 22 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 120803 packets input, 7270944 bytes, 0 no buffer Received 0 broadcasts (0 IP multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 interface resets 0 output buffer failures, 0 output buffers swapped out DPS_CSW_A#
03-18-2013 09:29 AM
Hello
You havent specified a sub interface for vlan 1
interface GigabitEthernet 0/0
no ip addess
interface GigabitEthernet 0/0.1
Description Trunk to Switch A
encapsulation dot1q 1 native
ip address 192.168.99.254 255.255.255.0
res
Paul
Please don't forget to rate any posts that have been helpful.
Thanks.
03-18-2013 09:41 AM
Paul,
The Switch A has the Ip Address on Interface Vlan 1
the Router has and Ip Address on GigabitEthernet 0/0
Ip Address is 192.168.99.255 255.255.255.0
Should the Trunk sub-Interface on the swtich also have an IP address?
I don't see the logic of it but I will try it.
The PC in the VLAN 10 cannot ping any other devices on VLan 10 because it gives me an error.
"Destination Host Unreachable"
which googleing this error states that the ARP request for Layer 2 is not recieved there for ICMP was not sent.
But I don't know what is wrong with the ARP request or the Broadcast Address on this subnet for it not to be acknowledged.
I should be able to ping anything on the same vlan even without a Router Right?
No luck here!
Pablo
03-18-2013 09:43 AM
The Router IP address is
192.168.99.254 not 192.168.99.255 like mentioned in my previous post.
Thanks
03-18-2013 10:43 AM
Hello Pablo,
Your router is providing the communication between vlans,
Your default native vlan is 1, but that isn't defined in your config on the router/
Take the ip address of the main interface and apply it to subinterface gig0/0.1.
Also I would remove the port-security off the access ports until you have establish basic communication. The when you have that re-apply you additional security.
res
Paul
Please don't forget to rate any posts that have been helpful.
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide