The server is on port 8 which is set to VLAN100 The reason you only see 3 networks is because 2 of them have different IP ranges so I was able to seperate them onto a VLAN, when discovering the other three networks they want seperated, I found that they all have the exact same gateway and IP range. Behind the switches are several different devices doing something different and they all come to a dumb switch running VLAN 1 and the three networks have the same gateway which is listed in the VLAN interface.. each network is connected to a switch which now connects to my switch. I was able to make that VLAN with the shared gateway and I could ping each device.... getting them seperated is a whole other beast and my router crashed and it will not be possible because the Switch I have cannot do NAT, so for now I am making all ports for the networks that use the same gateway, on the same VLAN. There are no duplicate IP's.. Also, I just added the dot1q trunking as a test to see if this would work... I also have had the switches port as trunking and access... sigh...
... View more
Hello. I have never configured a catalyst 3560 for inter VLAN switching and I am on a project with no support, this may be very basic for some. The issue I am having is ONE I am not even sure if I am doing this correctly so I do not know where the problem is The project is to take 5 existing stub networks with semi dumb switches ( not cisco ) hook them all up to a managed switch and on this switch there will be a server that all past stub networks will need to access for backups. I was using a router but the flash port died, not the card, the port, so now I am stuck doing what I can with the layer three switch. In the end I will need the server to be able to access the internet as well for RDP sessions. The switch is plugged into another switch where the config is unknown so if I can somehow get the uplink interface to be DHCP, that would be great. I was able to ping each VLAN and devices behind the VLANs with the server running Windows 2008 as long as I was on the VLAN of the devices ONLY, otherwise I could not talk to the deivces. I added multiple IP's and gateways to the server and this did not work. One subnet did not even have a gateway so I am using Proxy ARP. Power inline never had to be activated because the ports were bouncing due to it being on. Please help.. IOS Cisco IOS Software, C3560 Software (C3560-IPBASE-M), Version 12.2(35)SE5, RELEASE SOFTWARE (fc1) System image file is "flash:c3560-ipbase-mz.122-35.SE5/c3560-ipbase-mz.122-35.SE5.bin" CONFIG: enable password cisco ! username cisco password 0 cisco no aaa new-model system mtu routing 1500 vtp domain cisco vtp mode transparent ip subnet-zero ip routing ! ! ! ! no file verify auto spanning-tree mode pvst spanning-tree logging spanning-tree portfast bpdufilter default spanning-tree extend system-id ! vlan internal allocation policy ascending ! vlan 31 name PLC31 ! vlan 32 name PLC32 ! vlan 74 name PLC74 ! vlan 100 name-Server ! interface FastEthernet0/1 power inline never switchport access vlan 31 switchport mode dot1q-tunnel spanning-tree portfast ! interface FastEthernet0/2 description PLC Port VLAN 74 power inline never switchport access vlan 74 switchport mode dot1q-tunnel spanning-tree portfast ! interface FastEthernet0/3 description PLC port VLAN 74 power inline never switchport access vlan 74 switchport mode dot1q-tunnel spanning-tree portfast ! interface FastEthernet0/4 description PLC port VLAN 74 power inline never switchport access vlan 74 switchport mode dot1q-tunnel spanning-tree portfast ! interface FastEthernet0/5 description PLC port VLAN 32 power inline never switchport access vlan 32 switchport mode dot1q-tunnel spanning-tree portfast ! interface FastEthernet0/6 power inline never shutdown ! interface FastEthernet0/7 power inline never shutdown ! interface FastEthernet0/8 power inline never SERVER VLAN switchport access vlan 100 switchport mode dot1q-tunnel spanning-tree portfast ! interface GigabitEthernet0/1 description -=Server=- switchport trunk encapsulation dot1q switchport mode trunk ! interface Vlan1 no ip address interface Vlan31 ip address 192.168.31.0 255.255.240.0 ! interface Vlan32 ip address 192.168.32.254 255.255.255.0 ! interface Vlan74 ip address 172.29.75.158 255.255.255.0 ! interface Vlan100 ip address 192.168.254.254 255.255.255.0 ! ip default-gateway 172.19.75.1 ?????????? ip classless ip route 0.0.0.0 0.0.0.0 0.0.0.0 no ip http server ?????????????? ! ! control-plane ! ! line con 0 line vty 0 4 password cisco login line vty 5 15 password cisco login ! end
... View more